Beyond Identity Theft – Location Theft

Ross Mayfield posits at barcamp there could be a phenomena called location theft.

When talking about this and he shared that this would apparently this already happens with DodgeBall in NYC. The founders of the company would do that so that they would not get swarmed

Poking around I found reference to it but with a different meaning.

Identity Theft Protection from ReliaCredit.

One of the best ways to protect against identity theft is to monitor your protection report. By signing up with a credit monitoring service you will be advised whenever anyone obtains access to you protection report or when new accounts are opened, this provides substantial location theft protection. Any unusual activity or the opening of new accounts or other unauthorized protection inquiries will, raise a red flag and allow you to contact a creditor or other law enforcement agency to stop or prevent any ongoing fraud. Identity theft is a criminal act punishable under federal or state law.

Hunting for the Glory of God

Hunting unto the glory of God also demands that we must have a high measure of ethics. Ethics goes beyond the written hunting regulations. It may be legal, but is it ethical? Hunting on public land gives you the legal right to set your hunting stand wherever you desire. Is it ethical to set your stand at a location you have heard about, where another hunter claims he has seen deer? Unfortunately, I have witnessed what I would call location theft. If we are going to hunt unto the glory of God, we must ask God to grant us a greater understanding of ethical conduct and to practice His ethics.

Technorati Tags: , , ,

Canada Exploring Web Servalance

I often think my country of origin would do things like the following from the Winsor Star:

The federal cabinet will review new legislation this fall that would give police and security agencies vast powers to begin surveillance of the Internet without court authority.

The new measures would allow law-enforcement agents to intercept personal e-mails, text messages and possibly even password-secure websites used for purchasing and financial transactions.

Geist said the version of the legislation that was circulated by the government failed to protect the privacy and legal rights of citizens. It also placed a severe requirement on Internet service providers to hold data and records of Internet and e-mail use by their clients.

He said the draft version allowed police the right to telephone Internet service providers around the clock, and require them to provide records and data on client files within 30 minutes.

I am reminded of the EFF talk from last week at NTEN with the analogy that we would never tolerate the government photo coping and retaining all of our snail mail but some how in the digital realm it is ok.

Technorati Tags: , , , , ,

Co-Evolutions of Knowledge Networks

I listened to this podcast last night and was surprised to learn that national science foundation is funding the building of a really cool DataWeb. Enjoy…Noshir Contractor at MeshForum 2005

Dr. Contractor presents a multi-theoretical multilevel model of using technologies to understand knowledge and social network organization through the discussion of real-world examples. From the ‘Lovegety’ to Amazon purchase suggestions and beyond, Dr. Contractor outlines the concepts that form the basis of social and knowledge networks.
Those concepts are:

  1. the social network, “it’s not what you know, but who you know”;
  2. the cognitive-social network, “it’s not who you know, it’s who they you think you know”;
  3. the knowledge network, “it’s not who you know, it’s what they think you know”;
  4. the cognitive-knowledge network, “it’s not who you know, it’s what who you know knows.”

Technorati Tags: , ,

People like Gnomdex so there is BAR Camp

From Marc Canter

Doc and I are doing a panel on the ‘OpenWeb’ so I hope folks come or at least tune-in via webcast or IRC. But the AO conference WILL be propogated by VCs and rich people – and I prefer hanging out with normal people the best.

That’s why I love Gnomedex. I sure hope there’s another one – soon – like at the end of September.

I found this in my list of saved but not posted blog posts. Seems like Marc’s wish is going to come true – BAR Camp is this weekend. I just found out about it from Eugene Kim’s blog (he has been posting some great stuff this past week about wikimania and collaboration patterns). Likely I will go down with Mary and share the demo of i-names sso working on wordpress that I did at DrupalCon in Porland two weeks ago.

TLD Craziness

.mobi
DESPITE FIERCE CRITICISM from Tim Berners-Lee, the father of the Web, ICANN has decided to go ahead and create a new TLD (Top Level Domain) aimed at mobile phones and other mobile devices.

.tel
ICANN hasn’t posted it on their website yet, but according to one of their board members, the .tel top-level domain was approved.” notellmo.tel is going to be one of the first domains sold.

Perhaps there is one good thing about xdi – there is one organizational names space @name.

Information and Ethics on the Future Salon

Like I said before I am going through the backlog of snipits in my blog posting tool and finding some cool stuff. Here are two great posts on the Future Salon site that are worth thinking about in terms of identity.

They point to an issue in business week, a book by a nobel prize winner and article series highlighting the fact that information is power particularly when shared amongst people and in community. This power that people have to share their own data/inforamtion to trusted parties has the power to radically shift the economic landscape and one reason I am so excited about projects like Interra (BTW they will be using i-names).

Ethics and discernment will be a key job qualification in the coming era.

…as automation replaces our more rote cognitive and behavioral tasks, workers will transition into an increasingly transparent, highly connected society. In that environment our ability to be fair, responsible, dependable, trustable, and credible (doing what we promise), as well as our ability to empower and help others, as determined by their public feedback, will become the primary propositions differentiating our value to the system.

Technorati Tags:

Community Based Algorithm for the Blogoshere

I went to BlogHer, didn’t blog a whole lot about it. Mary Hodder was of course an inspiration with new ideas for us to consider. She has started thespeakers wiki so we can find new and interesting people to talk and particularly highlighting cool women doing cool work in technology. (I am still trying to figure out what to say in my bio.)

She also announced publicly the outlines of an open source algorithm for the blogosphere since sketching it on a napkin at Les Blogs in Paris. Link Love Lost or How Social Gestures within Topic Groups are More Interesting Than Link Counts. highlights:

We are going to do this, I think the algorithm has to be open source, at least as far as the weighting of social gestures and what gestures are to be included. Many people are upset that page rank is secret, and that something so powerful online is not open to scrutiny by the community it ranks. So this is an attempt to have the community determine the social weighting as it goes into algorithm, and have it be transparent to the community.

There is a very detailed chart on Mary’s site with it all mapped out.

This post set the blogsphere a light with feedback and commentary. Here are some highlights from the First set of responses:
This is not about making a single list. This is about making a metric that takes several factors into consideration, to find topic groups who consistently talk about something.

From Dana Boyde:

There are a few things that we know in social networks. First, our social networks are frequently split by gender (from childhood on). Second, men tend to have large numbers of weak ties and women tend to have fewer, but stronger ties. This means that in traditional social networks, men tend to know far more people but not nearly as intimately as those women know. (This is a huge advantage for men in professional spheres but tends to wreak havoc when social support becomes more necessary and is often attributed to depression later in life.)

Second set of responses highlights:

Maybe a better way to approach this issue is to define Robert Fuller’s ideas around dignitarianism, where those in power don’t abuse their power and the community creates solutions to problems as they arise. It seems to me that the solution to our rankist issues with inbound links is much more appropriately solved by changing the system, than by asking those who benefit from rankism to share some power with a few (there is no way A Listers have the time or the blogspace to do all the linking we would need to see to correct the problems of rankism with linking.)

And Halley again,recounting Doc’s notion that the internet is intrinsically feminine(Britt Blaser was the first to actually tell me this a year or so ago and I think it’s pretty insightful):

Even the word “LINK” is not neutral. It describes the way the brain synapses work. It describes the way the Net was built. It describes an attitude of distributed SHARED intelligence. It’s funny to remember what Doc concluded — it’s so FEMALE, the Net is so feminine, as is the notion of sharing power in a networked structure. (Ever heard of a “family?”)

Technorati Tags: , , , , , ,

I own my own Attention. Do you?

This week I joined Attention Trust. Steve Gilmore is the president and Mary Hodder is the Chair of the advisory board. It seems like a great application for the Identity systems we are working on.

What Matters?

What does matter is a pool of attention metadata owned by the users. This open cloud of reputational presence and authority can be mined by each group of constituents. Users can barter their attention in return for access to full content, membership priviliges, and incentives for strategic content. Vendors can build on top of that cloud of data with their own special sauce–the newbie crowd of MyYahoo, the pacesetter early adopters of Diller/Ask/Bloglines, the social attention farm of RoJo, and Google’s emerging Office service components orchestrated by the core GMail inforouter. And the media, which now includes publishers, analysts, researches, rating services, advertisers, sponsors, and underwriters, can use the data as a giant inference engine for leveraging the fat middle of the long tail.

Nick Bradbury puts it this way:

I want personalized search. I want my attention data to help tools and services find the stuff that matters to me so I can cut down on information overload. But I only want this if:
1 It’s done in a way that protects my privacy
2 The service that collects my attention data lets me get it back, so I can share it with other services

Aldo agrees

Much of what they have to say jibes with my thoughts on digital identity and new collaborative finance models and reputation systems and all that abstract stuff that is still too messy for me to explain with much clarity…..I’ll continue to work on that….in the mean time please read Nick’s piece.

Technorati Tags: , , , ,

Building for Peace | Cell Phone Presence

One of the things that I have always been inspired by since first going to Planetwork’s first conference in 2000 is the potential of these tools do do good. Johannes posted this on the Empowered citizen after the London Bombings and is a great reminder to consider why digital identity is important to continue building. While we must continue building we also must think about what we are building and how it can be used. Below is a post I found a while back that reminds us we must think about the implications of the powers we build into these new gadgets.

Empowered connected citizens are what changes the terrorist dynamic.

As a Silicon Valley entrepreneur whose very life is centered around building things, not destroying them, I watch in utter disbelief and complete incomprehension. How can anyone’s goal be total destruction? How can any of them believe anything will come out of these acts, except for more destruction? What sick world view is that?

There is a clear line. There are those who build, and those who destroy. Those who construct, and those who destruct. Deep down, I feel there is little middle ground. You are either with us pushing forward for positive, constructive change, or against us, killing and burning. There cannot be a compromise.

Many asked the question last week: “what can I do, how can I help?” My answer is simple: “Keep building.” Whether you are in high-tech, building new companies, products and markets; or a street sweeper, helping to build a beautiful city; or a parent or teacher, building understanding and new lives; or wherever you are. We, the builders, can build more than they can ever destroy. We can build better and stronger. And we will. We, the builders, will prevail, and there is no doubt about that.

Some interesting issues from the CTO forum on the Entrepreneurship Blog.

Presence information Cell phone providers could exploit.

  • Cellular providers know who you are and where you are as long as your cell phone is on. If you are with a group of people they could detect who you are with.
  • The aggregate statistics and behaviors that could be mined from cell phone presence/position data must be worth billions.
  • The identity and security implication are fun to think about. Your cell phone presence information becomes another part of your digital identity.
  • How much presence information should a cell phone customer share with their peers?
  • Maybe the customer would like to place delay loops for some of their contacts. Do you inform a peer that the information they see is delayed or do you want them to believe it is in real time? Perhaps you want you location to be fuzzy like consumer GPS. How fuzzy? It probably depends on who wants to know.

I was surprised Digital Identity wasn’t discussed.

#11 – Free Identity!

Eugene just did a great post about Free Identity as a recommendation of what should fill out Jimmy Wale’s post from wikimania of 10 things that need to be free.

Here is a sumary of the top 10 so far
1. Free the Encyclopedia!
2. Free the Dictionary!
3. Free the Curriculum!
4. Free the Music!
5. Free the Art!
6. Free the File Formats!
7. Free the Maps!
8. Free the Product Identifiers!
9. Free the TV Listings!
10. Free the Communities!
It does seem very relevant to have free communities one needs to have free identity to move between communities smoothly. Hopefully the walled gardens will figure it out.

NTEN-SF: EFF Keynote

I had a really busy two weeks. It ended finally on Friday with the NTEN (Nonprofit Technology Enterprise Network) Conference on Emerging Technology. I got to hang with some of my favorite folks from the NonProfit Tech world but more on that later. One of the good things was we keynote talk from Kevin Bankston from the EFF.

He was less articulate then Daniel Solve about why the courts have ruled that information held by third parties are not protected under the 4th amendment. It is because the courts interpret a third party even the service provider of knowing your phone number (because they are providing you that service) as not private. In the digital age this third party status expands to so many many things.

He talked about the laws they have and are considering about e-mail. They basically mandate the service providers keep copies of everything that comes to your in-box and the records of where you travel on the net. He gave a great analogy about this. It is like the government is mandating the post office to photocopy every piece for mail you ever get and store it for 10 years in case some government agency needs to search it.

Technorati Tags: , , , ,

Women in Open Source

There was a great panel on Women in Open Source at OSCON. It raised some very interesting issues including the open question of why there is 10x fewer women in Open Source then in the regular tech industry (as programmers and technical roles). Worth thinking about more and I hope that O’Reilly and others can continue the inquiry within its events.

I Drupal and Flocking

The first day of OSCON05 was great.
I had a meeting with a potential client for Integrative Activism in the morning went to downtown and picked up more business cards and headed to the Airport.

I had an identity ‘incident’ after making it through security. I went to add minutes to my phone and some how got popped out to a personal operated. She REQUIRED the last four digits of my SSN so they could ‘verify’ my identity by pulling information for the cloud to determine I am me. They would have the service that does this call me within the hour to ask me questions. This happened the last time I went to put money on this phone. It is quite disconcerting. Luckly this time I canceled the order and managed to make it through just ‘touch’ tone and get it minuets on my phone.

I took a cab from the airport to Drupal Con and make a great short presentation about i-names It was a big moment- I got to show it really working with the Identity Commons News Blog and Planetwork. I also showed my Integrative Activism’s first CS/Drupal – for spiritual activist leaders. I also showed them some of the most graphically stunning Drupal sites ever build byCivicActions – Open Network.TV and Shift in Action for IONS.

Then I headed over to the Flocking Party. Flock is a new Mozilla based social web browser. Hopefully the identity stuff we have been working on is applicable.

Technorati Tags: , , , , , , , , , , , ,

Passel: identity. remixed.

DizzyD presented on Passel and The Identity Gang is in the HOUSE! Johanes, Doc, Phil, Mary and Mary – wow three identity women.
He also didn’t really approach it right he didn’t get all the different systems and how they worked and we were all in the audience correcting him. It really highlighted the need for the workshop we are hosting in October.

Here is the summary:
How do I as user my identity on the web?
The ‘story that started it all’
Wife’s machine got Trojan. I had to change all passwords everywhere.

What is Identity?!
Identity is just another class of information we manage.
It’s a second-order problem. When I get on the net I get on it to do Identity Management other tasks.

What is Identity [Italicized] ?
Depends on the setting

Bottom line two fundamental types
third party vouch for and self asserted

His summary of the other stuff..

What are the options:
Passport
All others are not inherently evil.
everyone is throwing protocols against the wall and seeing which ones stick.
who do you trust to host you identity?

SAML
SAML/Liberty
trust relatinoship between two entities on your behalf
“asserting” used a lot in this world….and I will use it a lot

Standards are well documented and widely deployed. Lots of infrastructure required for trust relationships. Conditionals and trust relationships not viable from an open source stand point. Took a lot of time for a second order problem.

SXIP
Identity is locked into who the identity provider. You can change home sites. not locked in. Run on own machine. Powerful for users with centralized for user to move.

LID
Send information back and forth and urls based.

OpenID
No dynamic scripting needed. You have your identity URL tell via meta tag where identity server is. enter URL – blog URL. LiveJournal do you allow it to authenticate?

Can’t i-names do this?
He asserted wrongly that there was not reputation (global services launch will embed reputation in the messaging/contact system.

For Internet-scale Identity needs

  • Aggregate IDentity
  • Decentralized and open
  • Divers programming Language/environments
  • Interoperable implementations
  • Bootstrap off existing trust models

PASSEL
Gives you more control over data
Aggregates your identity via user-centric three-piece architechure
implemntations already started Perl, PHP, Java and C#
Pluggable trust models.

Generalized model for proving any DNS-based identifier
Trust Model

  • how you prove the signer
  • person x
  • Moving identity information proving that a
  • protocol how move around
  • plug in how you trust information

PIECES:
Agent (principle’s computer)

  • aggregates into portfolio
  • public private key and fingerprint
  • natively if not
  • Zip file on key – use on different locations

Signer (site that makes assertions)

  • signer issues token with for example 4 hour life span
  • agent must retrieve new token from dizzyd.com

Target (relying party)

  • how does the
  • retrieval of public key.

Technorati Tags: , , ,

R0mL..as I was saying

Ok in the treasure trove of yet to be posted posts is this gem from OSCON. R0ml gave an amazing (part II) of his talk that he did not complete last year. He will likely give part three the conclusion next year. The audience will be eagerly anticipating it. Here is the summary as best I can (his words are in italics). I must preface this by saying that words in text form are a poor representation of this man’s work as he takes presentation very seriously as a form of performance art.

He began with … as I was saying

Semasiology is the science of the meanings or sense development of words; the explanation of the words.

I wonder if we can collectively do a Semasiology of Identity perhaps that is a topic we can invite R0ml to consider with us since Optaros is considering and ‘identity’ practice.

He returns to a quote from the princess Bride where the guy says Inconceivable ‘I do not think it means what you think it means’

Summarizes last year’s talkwhere he made the point that the source of open source was not ‘code’ but instead was the requirements.

PART II – Really it was all about the CODE

Programs must be written for poeple to read, and only incidentially for machines to execute.

APL progammling language by Kenneth Iverson it was ‘easy to read’ and designed for Notation an a Tool of Thought.

(check out what it really looks like – totally not ‘easy to read’)

Why read?
70-80% of all “software development is maintenance
70-80% of all maintenance is reading old code and understanding
49-64% of the cost of CODE

WEB originates from this work Literate Programming by Donald Knuth. It is a method of composing programs. He felt the time was ripe for significantly better documentation of program and saw them as Works of Literature. He was an essayist whose main concern is with exposition and excellence of style.

With Literate Programming there are two steps
Tangle (create the code)
Weave (create the documentation)

Hence the aphorism: Given one Literate eyeball, most bugs are shallow.

This language and its associated programs have come to be known as the WEB system.

He said: I chose the name WEB partly becasue iftwas one of the fe three-letter words of the Engligh lanauge not applied to computers

We can also invite some other words to describe the programming process from this set of words.

SPIN (create requirements) …a ask in spining a yarn

Knit (create the test cases)

Fashion (generate the models)

We might wonder how good our spinning, knitting and fashioning are going in the identity space. Hopefully the IIW in October can help with all three.

Warning this next section has a lot of free association

Steven Roger Fischer wrote A History of Reading

How many people are computer literate?
The census bureau says there are
600,000 programmers in the US.
If you include other professions that also would read code as part of their job you reach about 1.9 million which is less then one percent. It is about 16 million people world wide which is 1/6th of one percent world wide.

Where does reading come from? All early reading involved simple code recognition very task oriented.

Sumarian writing developed
Enheduanna was the first poet in 2285 BC. and was the daughter of Kin Sargon.
Ada Byron – first programmer Countess of Lovelase is the daughter of a poet.

In Sumaria at the time this poem was written only 1% of population knows how to read in the Great City of UR.

Around 500BC.. Athenians 5% could read.

This was the Dark Ages 500 AD at it was asserted that what writing made presnet to reader pictures make present ot the illiterate.

That is the GUI…(Graphical USer interface)

Words were written down for Public Performance:

scripta manet verba volat

script remains verbal is volitle
writing is eternal, talk is ephemeral

This phrase did not mean this

To ‘read’ was to transmit, not to receive. Things written were written as memory aids.
To read was to speak…because of not for orators…

So this phrase really meant:

Writing reposes, speaking soars


Writing isn’t any good unless you read it out loud. Existance of the book meant that the speaker could be anybody.

GPL3 – GPL is a copyright.

Copyright protects against unauthorisze copying derivation, distribution or publicly performance.

What does it mean to publically perform software?

It means to ‘run the code’

The purpose of the code is to be performed.

GPL defines source code’s preferred form of the work for making modifications to it.

Refrain

Voices of the Absent
The spanish theologian – Isidor of Seville (560-636 BC) – praised silent reading, too, for being without effort, reflecting on the which has been read rednering their in.

In 1999 St Isidore was named the patron saint of programmers
Why?
He wrote a treatise – Etymologiae (source) or Origines as sometimes called.
He compiled it – all existing knowledge and literature.

Authorship does not matter the collection of knowledge matters.

What happen next? In the early middle ages changes our understanding of authorship changed. Integrity of the Authors Source Code

Something changed meaning of word to read… it was now possible to read in silence…

789 Admonitio Generalis no standards improve aimed specifically at educaiton reading and writing.

Carolingian Minuscurle brought some standards in.
Alcuin of York 798-804

Words are separated use a blank space.
What 0 did for math the space di for reading.

Irish scribes created the fullstop, comma, semicolon
Standards emerged for heights (m) ascenders (b) decenders (g)

Reading went form public act to private act – reader is no longer shared the text with others.

Reading and writing was collaborative and became individual.
Reusable Software is collaborative.

will it become individual?

Readable software needs typography.

If you write scripts they will need maintenance.
If you write readable code they will soar.

Writing reposes, speaking soars
scripta manet verba volat

Programming is literature.
Reading is not performance.

Two gods of literature the reader and writer.
Rewriting of what the author has originally authored.

Moving away from respect to original author when writing became a silent and private act.

Intellectual Property is invented in 1251

So we flip back to authorship…

In antiquity we gave credit to original author because failure to respect honored ancestor.

Post renaissance -> more about legal requirement.

Couple hundred years 40-50% will read can read CODE.

When this happens will the collaborative nature dissipate?
Power of collaboration is essence of what it is about now but it may become a private act.

Symbolic manipulation skill.
Extent to writing skill – literary skill.
We have done this before.

Speaking venacular of that people are talking.

Semiotic agreement about core set of concepts.
Be liberal in what you understand.
Be strict in what in what you are trying to say.

Poetry is obfuscated.

Poetry is set in LINE.
The white space is significant.
Prose it is not.

Come to OSCON for Part III next year.

Tagging using XRI

Drummond just posted a fantastic articulation how on might use XRI to do open tagging. Some of you may not be following the emergence of Tagging in the blogoshpere but it is really real with many services now empowering their members to tag. It has exploded so much that they have begun he World’s First Social Social Tagging Site Tagging Site site Supercilious. Tag Tuesday is the real hub of this emerging developer/social media creator community. Perhaps Drummond has just created the outlines for a presentation there I know Nile was asking for suggestions about who could present the next month so let them know when you will be in town D.

Announcing The Virtual Rights Symposium on Digital Identity & Human Rights

This is the first of what we hope to be an annual event about Digital
Identity and Human Rights covering social issues, policy and
legislation in this arena.

The goal is to foster international cooperation on virtual rights
through high quality dialogue and deliberation between legislators,
researchers, service providers, and citizens.

The symposium will begin in September with interaction online both
synchronous and asynchronous. It will peak with a meeting in Costa Rica November 17-18th and continue online afterwards.

Virtual Rights Association is organizing the event in cooperation with Costa Rica University and the Berkman Center. Chair Jaco Aizerman please contact him at =jaco or http://public.xdi.org/=jaco

Please go to thewebsite at Virtual Rights to see the current version of the agenda.

Announcing the Internet Identity Workshop (IIW2005)

There’s been considerable conversation around identity on the Internet, or what some would call grassroots identity. Providing identity services between people, websites, and organizations that may or may not have any kind of formalized relationship is a different problem than providing authentication and authorization services within a single organization. Many have argued that the lack of a credible identity infrastructure will eventually result in the Internet being so overrun with fraud as to make it useless for many interesting uses.

To solve this problem, or pieces of it, companies and individuals have made a variety of architectural and governance proposals. Some of these include:

Myself, Phil Windley, Drummond Reed, and Doc Searls are hosting the Internet Identity Workshop in Berkeley on October 25 and 26th to provide a forum to disucss these and other architectural and governance proposals for Internet-wide identity services and their underlying philosophies. The workshop will comprise a day of presentations on Internet-scale identity architectures followed by a day of structured open space to accommodate the range of topics and issues that will emerge from day one and other issues and identity services that do not fit into the scope of the formal presentations. We’re hoping that adding a little more formality to the conversation will aid in digesting some of the various proposals.
We’re inviting presentations for the first day on the following topics:

  • Problems, issues, politics, and economics or Internet-scale identity systems.
  • Architectures for Internet-scale identity systems
  • Philosophies that drive architectural decisions in these systems (see Kim Cameron’s Laws of Identity for an example of such a philosophy

If you’d like to present on some other topic, drop one of us a line first and we’ll see how it fits in. Prospective presenters will be asked to submit a 250-300 word abstract. We hope to accomodate everyone, but we may end up picking from the abstracts.

I’m excited about this and looking forward to it. I hope we can have a good set of presentations the first day and a solid day of discussion the second. If you’re interested in this sort of thing, I hope to see you there. Please read the full announcement for some other details and register if you’re coming. There is a $75 charge to cover the cost of the venue, administrative expenses, and the cost of snacks and lunch both dats.

Find Use Share and Expand all Knowledge

danah boyd talked briefly about this new initiative at BlogHer yesterday. FUSE is the name of the new initiative that Jeff Weiner from Yahoo outlined at SuperNova.

I had fun at BlogHer :) I did my first podcast there with Halley (you can see the picture over on Marc’s site) It was about 10 min talking about identity in various forms. I wonder when Podtech will put it up?

Yahoo! who hosted the cocktail party and did demo’s of Yahoo 360. I got to talk with one of the guys from the company and he raised some issues about identity 2.0 that I had not thought about. The power to enforce the of the EULA (end user license agreement) for a company like Yahoo! is in large part tied to their right to ‘terminate’ identities when the principles behind them misbehave. It seems key to include them more of the folks working for ‘the big guys’ in our identity workshop discussions and perhaps particularly policy usability.

Talk about changing identity (if where you work is a part of ones identity) Dana now works for the Yahoo! Berkeley Research and resigned from Google.

Jerry’s experiment tomorrow

Jerry Michalskiis going to be doing an experiment tomorrow – Monday night at the Hillside club.

At this Fireside Meeting, Jerry will blend a performance piece that involves the audience and a piece of concept-mapping software called TheBrain with a thesis he’s developing that will either have you grinning enthusiastically or throwing spoiled vegetables. It’s an experiment, and whoever shows up will help shape it.

This is an interesting fact I didn’t know Marc Finnern posted on the Future Salon.

At AlwaysOn a week ago I talked to Doc Searls and he told me that the original idea for the Cluetrain Manifesto was born 10 years ago at one of Jerry’s retreats. There are many events in the Bay Area, but this one you shouldn’t miss.

As a forward looking thinker Jerry has a lot of good things to say about identity and we often chat about the field. I am looking forward to going to the next (my first) “Jerry’s retreat.” Hopefully he can come to the Identity Event in Berkeley in October details to follow this week.