The digital age is launching an assault on privacy as we've known it. As social sites collect more and more data how will attitudes toward privacy change. And what can be done from a self-regulation, legal and end-user stand point to put more control back into the hands of consumers.
John Fontana's blog traverses the evolving digital identity landscape and its intersection with the cloud, compliance, audit, privacy, mobile computing, API integration and security.
John Fontana is a journalist focusing in identity, privacy and security issues. Currently, he is the Identity Evangelist for cloud identity security vendor Ping Identity, where he blogs about relevant issues related to digital identity.
The Mozilla Foundation is finally testing its BrowserID authentication system, but a missing part of the architecture used to validate a user's credentials is a big gap the Foundation must address.
A federal case that may have helped define constitutional law in the digital age turns not on the defendant's rights in regard to her encryption password, but on the fact that evidence clearly showed she owned a laptop in question and had access to its contents.
OAuth 2.0, a key framework for securing native mobile applications and APIs, Monday moved a step from being declared an official Internet Engineering Task Force standard. The authentication/authorization framework, which aids in cloud security, lays out an identity access token exchange in lieu of username and password.
Zappos Thursday said it was using a SHA-2 cryptographic hash but would not disclose any details about its "cryptographically scrambled" password format in the wake of a breach that forced the company to reset 24 million passwords.
DARPA is working on a plan to create innovative biometric measurements, such as keystrokes and mouse tracking, as a means of authenticating users to Department of Defense (DOD) IT systems. The full system would eventually replace passwords and government Common Access Cards.
Zappos.com resets 24+ million user passwords after hackers attack its servers. The incident reveals once again the frailty of passwords, especially when used across sites, and that the long-term value to hackers of other personal information stored online is higher than credit card numbers.
The Electronic Privacy Information Center has sent a letter to the Federal Trade Commission asking it to investigate Google's integration of Google+ and Google Search. EPIC cites the FTC's ongoing antitrust investigation of Google and Google's April 2011 settlement with the FTC over deceptive privacy practices.
The government has committed multi-millions to helping the private sector build an identity layer for the Internet. But one analyst says either the Stop Online Piracy Act (SOPA) and the Protect IP Act (PIPA) could result in one government action rendering another moot and bungling the promise of secure IDs.
A bank fraud case in Colorado could help determine the legal protection of users who password protect data. In the case, a woman is arguing that giving up her password to unlock encrypted data stored on a laptop is a violation of her Fifth Amendment rights.