Posted on Wednesday 18 July 2007
This blog is about building a multi-centered system of digital identity that its users control. All kinds of things pass themselves off as “digital identity”, so I want to start by pruning enough trees that we can see a forest.
Basic ideas
In these pages, I’ll make it clear that digital identity can’t be confused with ”a unique identifier” like an SSN or a biometric like DNA. In fact, digital identity can often just convey that you are a member of some group, or possess some characteristic (for example, your profession, employer, citizenship, role or age). Similarly, it can indicate that you are the same person who visited a site previously - without conveying any personally identifying information.
In other words, digital identity has a complex relationship with flesh-and-blood identity, which I’ll call natural identity. Sometimes we want digital identity to correspond to natural identity, and sometimes we want the two to be isolated, or the knowledge of the connection to be highly controlled. This has become necessary because the digital world has its own “physics” that is quite different from that of the natural world. Here space becomes more or less irrelavent and isolation very difficult to achieve, while “now” extends through great slices of time. The result is not only that our friends and loved ones are closer: so is every actor, good and bad, and every monitoring device in the world.
This leads us to conclude that digital identity must embrace both being public and being private. It must provide both anonymity and pseudonymity. It must embrace being public and being private. It always exists in a context, and we expect the context to have the same degree of separation we are used to in the natural world, even though space and time no longer serve as insulation.
I’m interested in history and philosophy, and realize philosophers have had much to say about identity, but don’t discuss these issues on this blog. I stick to matters of technology, with the express goal of creating a digital world in which none of the richness of our natural world is lost, so that everything that can be expressed there can be expressed digitally.
Download the poster. Read the explanation of the Laws of Identity.
Blogroll
- 1 raindrop
- AD Cookbook
- Alex Barnett’s Blog
- Andre Durand
- Andy’s InfoCard Blog
- Anti Phishing Working Group
- Apache Trust Services Toolkit
- Ash’s Identity Management
- Avert Labs Blog
- Axel Nennker’s Blog
- Ben Laurie’s Links
- Between the Lines
- Big Bang Technologies
- Bill Barnes
- Bob Blakley
- Burton Group Identity Blog
- cardcarrying
- Carl’s Spam
- Charles Fitzgerald’s Platformonics
- Chris Ceppi
- Craig Burton
- Dale Olds’ VirtualSoul
- Dave Kearns
- David Goodman on Identity
- Dick Hardt
- Digital dialogs
- Digital ID World
- Digital Identity Forum
- Doc Searls
- Don Box
- Don Park’s Daily Habit
- Dr. Starcat
- Drummond Reed
- Emergent Chaos
- Eric Norlin
- Eric Norman
- Eternal Optimist
- Federated Media
- FEIDE & SimpleSAML
- Francis Shanahan
- Free2Surf
- FutureSalon
- Geek Feminism Blog
- Hubert Le Van Gong
- I Started Something
- Ian Grigg
- Ideal Government
- Identity Woman
- InfoSec Daily
- IT Conversations
- Jackson Shaw
- James Governor
- James Kobielus
- Jamie Lewis
- Jeff Bohren
- Jerry Fishenden’s Blog
- Johannes Ernst
- Julian Bond
- Julian on Software
- Kapil Sachdeva
- Kermit
- Kim Cameron
- Light Blue Touchpaper
- Marc Canter
- Marco Casassa Mont
- Marcus Lasance’s IdentitySpace
- Martin Kuppinger
- Matias Woloski
- Matt Flynn’s Identity Management Blog
- Michael Graves
- Mike Jones
- Mike Shaver
- My Blog of HR
- My Son Max Cameron
- On The Identity Trail
- Open Legal Writing
- Opinity Reputation Talk
- P. T. Ong
- Pamela Dingle’s Blog
- panGloss
- Pat Patterson
- Pete Rowley
- Peter Fleischer: Privacy…?
- Phil Becker
- Phil Windley
- Planet Identity
- Planet Security
- Planetary.net
- Privacy and Identity Theft
- Privacy Imperative
- Privacy International
- Radovan Janecek
- Raving Lunacy
- Ray Corrigan
- ReplaceGoogle
- Robert Scoble
- Robin Wilton
- Scott C. Lemon
- Sean Convery
- Simon Grice
- Stefan Brands
- Steve’s Identity Corner
- Stolen Identity
- Technorati Identity Page
- The ARCH Blog
- The Hogg Blog
- The Progress Bar
- The security blog of Felician Intini
- The Tao of XDI
- Tiara.org
- Toby Stevens
- Twisted World
- Usable Security
- Valleywag
- Vibro.net
- Watching Them, Watching Us
- Weaverluke
- Welcome to the Metaverse
- Zero Influence