I had a wonderful time at Foo Camp. The OpenID meeting yesturday was interesting. Identity Commons call this morning went well. Lots to blog about but I am off to the Plya now. So I look forward seeing all at the Identity Open Space (register now if you have not done so yet … if you don’t we can’t order you lunch) and Digital Identity World. It should be a fantastic show.
So I am back from the Art of Leadership at HollyHock that was both a vacation and a bit of work. While I was away the announcement went out about a conference I agreed to speak at about identity in October – Office 2.0.
I didn’t really have time to do a bio while off retreating and I pointed them to my broad “who I am” page at kaliyasblogs. In reading this they picked up on a positional title I had and decided to list me with that just linking to Identity Woman under the blog link (without mentioning it in text). I find this odd because Ismael asked me to speak at the conference because I am Identity Woman.
From IT Redux: Kaliya’s participation should help us understand if there is a chance that we could get single sign-on for Office 2.0 in our lifetimes.
I would like to ask all the folks who blogged about the upcoming conference to list me as “Kaliya Hamlin aka Identity Woman, Network Director Planetwork”.
I find it interesting there is such a focus on that positional title to have legitimacy in this industry. I really think it is a disservice all around there are people who contribute a lot without positional ‘titles’ who deserve to be on stage some times perhaps more then those on stage who have ‘titles’. I hope we as a community can look at this bias towards ‘titles’ and reflect on the unique gifts and talents that are not being recognized because of it.
I found this the other day after I loaded flash 9 it just appeared. It is amazing and very relaxing. So if you can’t be on vacation with me you can just watch it and float away for 5-15 min. Enjoy.
Ashes and Snow.
I am back August 24th until them I am sans computer.
Dave Winer wrote this post about patriotism and highlighted the canadian singing of O’Canada at Gnomedex.
Anyway, the last day of Gnomedex happened to fall on Canada Day, and in celebration, Chris and Ponzi brought out a big cake and the Canadians rose, and sang their national anthem, Oh Canada. I had heard it before, but never in its entirety and for some reason this time it really grabbed me. Patriotism is moving, even when it’s not your patriotism. Maybe even more so, because it doesn’t get all mixed up with personal stuff, you get to experience love of country through someone else’s eyes, and it’s really beautiful. But then I saw a friend of mine from Berkeley, Kaliya Hamlin, standing, and singing. I had to look twice and think, and then I remembered, she’s Canadian! That’s right. I’ll never forget that image, Kaliya is tall and strong, opinionated, a bit nutty (in a nice way), a leader, and underneath it all, she’s even more different from me than Jackie Robinson was, because she’s patriotic to a different country, and Robinson and I are both from the United States.
<div style=”float: right; margin-left: 10px; margin-bottom: 10px”><img style=”border: 2px solid #000000″ src=”http://static.flickr.com/74/180471515_4b3e417a54_s.jpg” /></a>
</div>This was actually a very moving moment for me to because I have been living in the united states for a about 10 years. I have not travelled back all that often. (In part cause I didn’t have the papers to return for quite a while when I was in paper limbo – yes I know what identity issues are first hand). It was just so wonderful to be an American context that celebrated the diversity in the room that included Canadians. I got to sing with my Canadian Geeky friends the anthem in front of our American Geeky friends. We got to share an identity moment together. It was lovely. Since when do you sing anything let alone anthems at tech conferences anyways.
So today I also by chance joined the Canadian Tech Mob…. the trouble is I can’t seem to get WP to actually display my recently uploaded sidebar so the code is in there just not ‘displaying’.
In two days I am travelling to Canada for a little vacation and a leadership workshop. The thing is I have to fly there and what I am hearing about the whole ‘no liquids’ thing makes me mad. Can I take a tamale for lunch? Please let it be so cause now they don’t feed you on planes what are you supposed to do starve?
Bruce Schnier is a great communicator when it comes to security issues. I saw him twice at RSA this year and found his talks to be informative and entertaining.
We have a ‘security theater‘ situation happening and I hope the performance can end soon. What was most awful was reading all the streeter quotes from people in the paper saying things like…well “I had to through out my $150 box of contact lenses but I am so happy they are making us safer”. Like someone actually said that!What a mind control thing they got going it makes me really worried for the future.
Hours-long waits in the security line. Ridiculous prohibitions on what you can carry onboard. Last week’s foiling of a major terrorist plot and the subsequent airport security graphically illustrates the difference between effective security and security theater.
None of the airplane security measures implemented because of 9/11 — no-fly lists, secondary screening, prohibitions against pocket knives and corkscrews — had anything to do with last week’s arrests. And they wouldn’t have prevented the planned attacks, had the terrorists not been arrested. A national ID card wouldn’t have made a difference, either.
Instead, the arrests are a victory for old-fashioned intelligence and investigation. Details are still secret, but police in at least two countries were watching the terrorists for a long time. They followed leads, figured out who was talking to whom, and slowly pieced together both the network and the plot.
Please believe me I am the last person I would imagine saying yes to more spying and investigation but after seeing Syriana, reading Bob Bears book and the article in the New Yorker (based on this guys story [God I hate old media. I want an real article to link to not an interview and an option to buy a DVD]). I am convinced that our government for its own internal political conveniences cut back on real human intelligence gathering and investigation. This systemic failure is why the ‘terror’ network are functioning so well and why we have a threat today. If we had invested in understanding and infiltrating these islamic networks as they formed instead of ignoring them… (Seeing no Evil) things would be different.
Systemic surveillance of our electronic systems is not going to make us safer. It brings us closer to the possibility fascist state. I do hope more of us working in this industry can speak up publicly about this danger and not just watch in silence as it forms around us. A state that is highly invasive into all our personal activities to make us safer. Meanwhile off somewhere in the middle east “they” are making plans in real human face to face networks that we can not spy into using these new electro gadgets.
Speaking of ‘they’ – who are they? I just watched a film from Netflicks – Death in Gaza. It was of two documentary film makers one of whom died while shooting the film. I spent the summer of 2000 in Jerusalem for 10 weeks I lived and worked there and did what I call “NGO tourism”. I worked at one of the worlds foremost human rights organizations – BTselem the Israeli Information Center for Human Rights in the Occupied Territories and then also worked at the PCATI the Public Committee Against Torture in Israel (while there I got my education in what torture is going on and how it affects people – really awful). My fellow international interns and I would spend our weekends traveling about going through the Westbank and up to Nazareth, and Haifa over to Televiv down to Hebron. One time we got to go to Gaza for 2 days. One of the interviewers for B’Tselem was traveling there so the two of us got to go with him. We got hooked up with two guys who worked in an NGO in Gaza and went on a tour for a day… from one end to the other … inside the camps and everything. It was amazingly powerful. Just like in the movie I saw the little kids the ones who are 5 and 6 happily playing away not really knowing there life circumstances yet. Then the older boys would glare glints of anger in there eyes. They are 10-13 years old knowing what they don’t have. The get that it is not normal to have open sewers in the streets. It is not normal to have 10 people living in one room. It is not normal to be growing bunnies up stairs that you kill to have food or a donkey living in your living room. Why do they know this…there are satalite dishes…basically everyone has a TV and can see what life is like in Isreal, and America and the rest of the normal arab world. When you think about that maybe some of this makes a bit more sense. It is not normal to feel like going to school you could get killed (as they young girl in Death in Gaza talks about). It is not normal to have your school playmates killed by gunfire (like the little boys have happen to them in the movie). Or bulldozers coming to plow your house down in the middle of the night (like threatens to happen in the movie ) How can you feel peaceful in this kind of environment?
I know after witnessing what I did that day I was shaken. I really felt my soul had been shaken up like my body was still and it was moving. It was eerily like the feeling I had after exiting the memorial museum at Hiroshima. The thing was…what I had witnessed that day was happening to real people ‘now’ not a historical event from 60 years ago. The depth of suffering is quite intense and the failure to connect with people as people and to really resolve the conflict continues to cause suffering. More bombs and planes and threats of nuclear weapons going off doesn’t make the situation better. It makes it worse. Send in armies of compassionate empathetic listeners. Make public peoples family stories and histories. Find some way through. There are some amazing stories of reconciliation that have happened in Israel/Palestine. They prove it is possible. I do have hope but not if everyone just sees an enemy instead of people, families and societies with real human and community needs.
I was sorting through my stuff over the weekend and found something from B’Tselem. They still send me the reports the write. It was a 11×17 fold over about the wall situation in Jerusalem. Just really disruptive to normal peoples lives. The whole of the Westbank is oriented around the trade flows through main cities. The most main one being East Jerusalem. The fact that they want to cut the Palestinians off from their main economic hub is just mean. People don’t like people who do mean things. Why is this so hard to understand!
I got a note from this guy like a month ago..saying help! I am about to do a Joomla! (the a fork of to Mambo an open source CMS ) install and we are looking at Identity what do we do? I pointed him towards OpenID and he wrote this back after a few weeks…I think it speaks to the major market communication issues we face.
Dear Ms Hamlin,
The difficult questions always remains how you will cover the ground technically and how it will be socially translated. In the Digital Identity field, it’s just hard to pick an option. There are so many but which one will be or evolve itself in the “swiss-knife” of digital identity. You mention OpenID is gathering steam and seems destined to a promising run.
What I’m still unclear of is:
**How the heavyweights (IBM, Microsoft, Sun, Yahoo, Google & al.) will play along with digital identity and its standardization?
I think you need to differentiate the type of heavyweights there are primarily consumer facing ones – Microsoft, Yahoo, Google, AOL, Amazon, eBay/PayPal/Skype, FoxInteractive (mySpace). Then there are enterprise tool providers – IBM, Sun, Oracle, CA, etc. who are building out primarily for the enterprise.
For the consumer facing companies will they play along? Will they they allow users to sign in using OpenID’s that originate from places other then themselves. Kim has already stated emphatically that Microsoft Spaces Live will allow more then just Windows Live IDs. Will others? I know that many of them have individuals participating on the public mailing list and showing up at conferences. Will choose to adopt supporting users doing SSO beyond there silos – that is a question only they can answer. I think it is worth asking them.
The Enterprise world is a bit different. They have some ‘answers’ to SSO with things like LDAP. There are well accepted standards for authentication like SAML2. Some of them are also very interested in XRI for what it can help with for managing identity in the enterprise and beyond. They don’t need web wide distributed identity as much. I think part of what CardSpace is about is supporting better enterprise implementations of managed cards to support sign-on across systems.
**How all the proposed projects & solutions (OpenID, i-Names, LID, Higgins, Shibboleth, Liberty Alliance + others) will and plan to interoperate? Can it be considered an issue?
So for starters OpenID2 already does OpenID url and i-names ‘interoperability’ in the sense you can use them both in an OpenID2 login box. LID was woven in with this version of the spec too.
At the Identity Open Space that happened immediately following the Liberty Alliance meetings in Vancouver in July one of the main outcomes was an agreement by the OpenID guys to have a dialogue in earnest with the SAML2 guys about how the next version of the spec moved towards convergence between the two. Just so you can orient so this makes sense the SAML2 spec arose because the SAML1 spec didn’t meet all the needs of the enterprise sector so Liberty built on top of that spec and then they incorporated those changes and made SAML2. Shibboleth particular implementation of SAML2 that has been widely adopted in higher education and has some capacity to support authenticated anonymity. (one institution knows that this person ‘is’ from a partner institution but does not know exactly who the person is).
Higgins is a ‘framework’ for developing profile management at this point I think within an enterprise context. It is farther out in its development cycle. and has an aspect that is a card selector simliar to the Microsoft CardSpace that will be coming out with Vista. They are working in a community with IBM and Novell and some others to build an Open Source Identity Selector.
This is where there is a distinction between address based and card based identity. The two are complementary. Drummond has a good post about them.
**In conclusion, I’m curious to know your opinion on the viability of commercial venture in the digital identity such as i-Names when “similar” offering are given for free with OpenID and LID? I might be misinterpreting some concepts here.
All entities offering digital identities right now are doing so for free. You can get a free OpenID or a free i-name. Both are ‘2nd tier’
I can go to Verisign’s pip and get http://eddie.verisignlabs.com and authenticate against that – the thing is that verisign owns the .verisignlabs.com bit and is giving you a space under that. Or you could have a Blog hosted some where like livejournal that you just use the URL from that. (AOL just said it was letting people register domains for free though).
You can get a free i-name doing a similar thing FreeID is offering @freeid*eddie as an option.
In both cases you can go and buy a global level domain or i-name and pay for that. With a URL you have to pay for the domain name but also know enough to get the URL set up to do OpenID authentication.
With the i-names they are designed from the beginning to let you authenticate against them and do other things that people might like to do on the web. So you can get =eddie and also use it to point persistently at your blog or your resume..and even if those resources move around the web..the link via your i-name can stay persistent. You can do this with a URL too…but so far none of the UI’s I have ever used for managing my Domain names are really user friendly or designed to support normal people creating links to persistent resources.
As non programmer-coder, gaining a deep understanding of the digital identity field can be daunting. I deeply appreciate the time you devoted me!
I would like to start a ‘user group’ as part of the identity dialogue of interested non programmers – non-identity geeks like yourself to be a forum to voice your thoughts and opinions and help us get clear about what we are doing. Would you be the first member of such a group? Do others think this is a good idea or want to join?
This is really quite bazar. Boing Boing reported.
Confirm your identity with “MySpace salute”
MySpace says that if someone is pretending to be you on their site, you can confirm your identity by sending in a picture of yourself giving a “MySpace salute” (“holding a handwritten sign with the word ‘MySpace.com’ and your Friend ID”). As Waxy notes, “it’s a good thing there’s no way to fake photographs on a computer.” Pictured here: an Iraqi child confirming his identity as Rupert Murdoch. Link (via Waxy)
That seems so easy. Send in a picture with your name on it. It really begs the question what is Identity verification anyways.
Astroturf has grown into new quaters of the mainstream
In the San Francisco Cronicle: Paternity trial shocks Egyptians
Court rules against famous actor, siding with mother, child This situation where children are not recognized by the state when no father is present. It is quite concerning to think about the range of social norms that are different in different cultural contexts that really limit peoples freedom to be full citizens. I am sure this is not the only example.
There are an estimated 2 million unregistered children in Egypt, according to Lamya Lotfey, a specialist on paternity law at the New Women Foundation, a Cairo-based feminist organization. Since the ministry of health refuses to issue a birth certificate without the father’s presence or consent, illegitimate children don’t officially exist unless the mother undertakes a legal process that can take as long as six years so the child bears the last name of the maternal grandfather. In the meantime, the child cannot obtain a passport, enroll in school or qualify for state-sponsored vaccinations. As a result, most unmarried women choose abortion or orphanages, according to Lotfey.
A group of nongovernmental organizations is lobbying for the right of all children to have birth certificates, regardless of a recognized father.
Two stories that I have read in the print the last two weeks about Identity issues in the Arab world that are worth surfacing.
First of all this story in Newsweek Iraq:A Deadly Name Game
By law, all Iraqis carry jinsiyas, or national ID cards. But in a country where your ethnicity can make you a target, a jinsiya can become a death warrant. If your name is Omar you’re likely a Sunni Muslim, named after a seventh-century imam despised by Shiites. If you’re Amar or Aamer, pronounced almost the same, you could be from either sect. If you’re Ali, you’re probably Shiite. As a result, many Iraqis have started carrying two jinsiyas—a real one, and a fake one linking them to the rival sect. The demand for false ID cards has spiked as bodies pile up in the Baghdad morgue at the rate of 35 to 50 a day, frequently bound and blindfolded, a jinsiya in their shirt pocket.
It seems that we often think of identity in the context of western liberal democracy this situation in Iraq makes me wonder about what it means to make ‘really secure’ documents and identifying papers for people.
My plea for help got some responses and some how by clearing the cache and restarting my computer I was once again able to access Gmail.
Thanks for your help!
I have no idea what is going on.
I have not been able for the past 2 days get to gmail. That is right. I put in the URL http://mail.google.com and it just sits there spinning….basically forever – 10+min. Never going to the site…never saying 404. I don’t get it. I asked someone yesturday if there were able to get there. They said they had checked there account lately. I am totally mystified. I need to get mailings out about the OpenID thing on Thursday but I can’t get to my account. It is very frustrating. If anyone knows what is going on and can tell me I would be appreciative. (To comment you actually need to ‘login’ which is hard to find on my blog it is up in the righthand corner.)
This was on Wired yesterday (posted on Slashdot). I think it highlights the importance of thinking deeply about how these proposed identity systems work. The other security flaw is the ‘integrity’ of the databases that the passport system is built on.
A German computer security consultant has shown that he can clone the electronic passports that the United States and other countries are beginning to distribute this year.
The controversial e-passports contain radio frequency ID, or RFID, chips that the U.S. State Department and others say will help thwart document forgery.
“The whole passport design is totally brain damaged,” Grunwald says. “From my point of view all of these RFID passports are a huge waste of money. They’re not increasing security at all.”
Grunwald plans to demonstrate the cloning technique Thursday at the Black Hat security conference in Las Vegas.
The United States has led the charge for global e-passports because authorities say the chip, which is digitally signed by the issuing country, will help them distinguish between official documents and forged ones. The United States plans to begin issuing e-passports to U.S. citizens beginning in October.
Although countries have talked about encrypting data that’s stored on passport chips, this would require that a complicated infrastructure be built first, so currently the data is not encrypted.
“And of course if you can read the data, you can clone the data and put it in a new tag,” Grunwald says.
The cloning news is confirmation for many e-passport critics that RFID chips won’t make the documents more secure.
“Either this guy is incredible or this technology is unbelievably stupid,” says Gus Hosein, a visiting fellow in information systems at the London School of Economics and Political Science and senior fellow at Privacy International, a U.K.-based group that opposes the use of RFID chips in passports.
Open Standards have interesting consequences…anyone can use them… it also highlights the need to have ‘social’ fabric underlying any identifier system/network.
Grunwald says it took him only two weeks to figure out how to clone the passport chip. Most of that time he spent reading the standards for e-passports that are posted on a website for the International Civil Aviation Organization, a United Nations body that developed the standard. He tested the attack on a new European Union German passport, but the method would work on any country’s e-passport, since all of them will be adhering to the same ICAO standard.
How did he do it?
- Grunwald then prepared a sample blank passport page embedded with an RFID tag by placing it on the reader — which can also act as a writer — and burning in the ICAO layout, so that the basic structure of the chip matched that of an official passport.
- As the final step, he used a program that he and a partner designed two years ago, called RFDump, to program the new chip with the copied information.
- The result was a blank document that looks, to electronic passport readers, like the original passport.He obtained the reader by ordering it from the maker — Walluf, Germany-based ACG Identification Technologies — but says someone could easily make their own for about $200 just by adding an antenna to a standard RFID reader.
Why it is a security failure…
The demonstration means a terrorist whose name is on a watch list could carry a passport with his real name and photo printed on the pages, but with an RFID chip that contains different information cloned from someone else’s passport. Any border-screening computers that rely on the electronic information — instead of what’s printed on the passport — would wind up checking the wrong name.
This NYTimes piece hightlights an interesting perspective about why regulating the Internet may not be a good idea to protect Net Nuetrality.
It’s tempting to believe that government regulation of the Internet would be more consumer-friendly; history and economics suggest otherwise. The reason is simple: a regulated industry has a far larger stake in regulatory decisions than any other group in society. As a result, regulated companies spend lavishly on lobbyists and lawyers and, over time, turn the regulatory process to their advantage.
Economists have dubbed this process “regulatory capture,” and they can point to plenty of examples. The airline industry was a cozy cartel before being deregulated in the 1970’s. Today, government regulation of cable television is the primary obstacle to competition.
Of course, incumbent broadband providers do have some limited monopoly powers, and there is cause for concern that they might abuse them. Last fall, the chief executive of AT&T, Ed Whitacre, argued that Internet giants like Google and Microsoft should begin paying for access to his “pipes”— never mind that consumers already pay AT&T for the bandwidth they use to gain access to these services. If broadband providers like AT&T were to begin blocking or degrading the content and services of companies that didn’t pay up, both consumers and the Internet would suffer.
So we have had a fabulous series of open space events since May’s Internet Identity Workshop . The Identity Mashup at Berkman 3rd Day Open Space Post Liberty Alliance Identity Open Space specifically but also as major themes at Mashup Camp that had 5 sessions on identity and at OSCON and OSCamp.
I think one the reason things have been developing rapidly is because of the open opportunities to address critical issues and reflect as a community on next steps. So there is another one coming up before the next Internet Identity Workshop in December.
The Monday of Digital Identity World’s start we are hosting an Identity Open Space at the Santa Clara Convention Center. It will begin at 9am with agenda creation with sessions starting at 9:30 going until 3 when DIDW officially starts.
You also get a discount on attending Digital Identity World if you come to the Identity Open Space.
I know it is a bit of a challenge to travel on Sunday but I hope those of you from out of town will choose to do that. Hopefully we can get lost of folks working on new web tools who might be able to actually use – user-centric identity. Besides who wants to get on a plane on September 11th.
Technorati Tags: identity
So I am here at yet another conference – the ever wonderful National Coalition on Dialogue and Deliberation. I just had to post this as soon as I saw it in the swag bag – TrustTalk (tm) – everybody’s talkin’ about it…
- Trust in the works place
- But what is it?
- Which one of the hundreds of models of trust do you want to adopt?
- How do you help a team talk about trust and collaboration without it turning into therapy? Or so squishy that no one knows what it means?
- We’ve done the research for you!
So if you want I can bring this nifty little deck to our next Identity Gang meeting and we can see what it might add to our thinking about trust…catch is that the deck of cards cost $75. I am up for it if others thing it might be worth a shot.
I also find that my entire lens – frame of looking at everything is impacted by ‘identity’ and the work of our community in addressing it on the web. I don’t know if I will ever look at the world the same again.
Back to NCDD… I heard rave reviews about there first conference 4 years ago. I went to there second one 2 years ago and now I am here at number three and liking it so far. This year I am presenting on Social Media Tools: How They Fit Together Supporting Community & Conversation. At the very end I might mention why SSO would be cool but this is more about how it can help fit all those tools together.
And for those of you who are tracking these things this will be the fourth one in the last seven days (OSCON, BlogHer, Advocacy Developer 3 and now the National Coalition on Dialogue and Deliberation) [and for those of you concerned about this trend I am not going anywhere beyond they Bay Area until the 16th then I am on vacation for a week at a ‘leadership workshop at a heavenly retreat center’ then it back to FooCamp and off to Burning Man]
Apparently some how the announcement was not clear.
The OpenID Informational Evening is for Developers…of all stripes, open source, free software, “source available”, and closed source.
August 10th, 6-9, 2029 University Avenue (upstairs) Berkeley, CA. Please RSVP to me – kaliya [at] mac (dot) com.
I have lots to say about BlogHer – and will be sharing it over the next few weeks. It was quite an emotional event for me on a bunch of levels. With all the buzz about Microsoft is launching Windows Live Spaces tonight I thought I would chime in on that aspect of BlogHer.
Basically I was completely turned off what ever they might be doing in there space by the “BE JANE” skit at BlogHer.
Amy Gahran sums it up:
“Still, I had to cringe at the campy, off-target Microsoft presentation during the welcome session just a few minutes ago.
To promote its new Windows Live Spaces service, someone at Microsoft thought it would be appropriate and fun to send a couple of bouncy, bubbly, sexy, carefully scripted 20-somethings uniformed in tight t-shirts and jeans to banter giddily for about 10 minutes on home improvement. It sounded like Barbie doing ‘Tool Time’ in stereo.”
Teachermama also had thoughts:
All around me, people were making comments about feeling like ‘Math is hard’ Barbie was up on stage talking WAY down to us. Here’s a hint: if you’re facing a ballroom full of hundreds of smart, tech-savvy women, ‘home improvement is scary’ isn’t the way to our hearts.”
I know some great people at MSFT – Kim Cameron, Lilly Chang and some other great folks who are actually the best human being marketer types you could imagine – Brady who just left for O’Reilly, Liz Lawley who just left after her sabbatical year there and of course the biggest loss of all – Scoble.
Imagine how cool MSFT’s blogging tools platform and approach could have been if they had just listened to the people who get it and have a relationship to the community (like Scoble who instead he is off making PodTech cool).
Note to Balmer – stop letting the good people you have go and stop putting the marketing morons in charge. And for god sakes don’t fuck up the messaging around Vista, Cardspace and Identity. I think we need to have an intensive heart to heart with the identity community and your marketing ‘army’ before things roll out.
Some folks like Kevin O’Keefe at Lexblog picked up on this, and gave some constructive feedback –
Microsoft “should have gone the low key approach as at Gnomedex. Write a check to a worthwhile program, get thanked on various occasions, and get out of the way.”
On the up side….Kim just blogged this…
An unequivocal Yes: Windows Live ID will accept third party authentication for access to Microsoft properties.
I am really pleased to announce that we have an
OpenID Informational Evening for Developers
August 10th 6-9 in Berkeley at 2029 University, Upstairs.
The Big news is the community has converged and figured out the authentication layer – OpenID…OpenID is just the authentication layer – but on top of this ad hoc standard lots of cool stuff can happen. The goal of the evening is not to geek out on identity but to connect with a developers working on applications that require users to login.
Find out more about what it is…how it works…how you can install. The incentives to learn are high with the $5000 bounty for having OpenID in Open Source projects.
Presenting and answering Questions
David Recordon formerly of Live Journal/Six Appart now of Verisign will be presenting a bit about the origins of OpenID but most importantly how it works…and how you install it.
Andy Dale from ooTao will talk a bit about i-names and how they work with OpenID2 and looking forward to what comes next after authentication – profile sharing. ooTao is also data sharing are running ibroker services.
I am helping coordinate the evening please RSVP to me – kaliya (at) Mac (dot) com and feel free to ask me any questions.
If you know a developer – pass the word along.
ps. for all you Technorati guys who keep having questions…now is your chance to ask the guys who know.
UPDATE: Scott Keveton from JanRain will be there too…He just posted an OpenID walk through on his site.
UPDATE 2:Dick Hardt from Sxip will be in town and will also be joining us for the evening. Hopefully he will share some of the cool stuff sxip is doing with OpenID.
This is really FREEKY – DOPA “Deleating Online Predators Act” passed the house!!!! I blogged about this before Congress Targets Social Network sites – to be blocked from Schools and Libraries I then had a blog exchange with a parent about where the line was to protect children but I never thought it would actually become law. This whole thing highlights again the need to organize ‘technical’ people…Silona Bonewald is beginning the League of Technical Voters.
Fitzpatrick’s the sponsor highlights these elemetns of the bill in his press release:
- H.R. 5319 requires schools that receive Federal Universal Service Funding to prevent the access of children to a chat room or social networking website. Schools may disable protection measures in order to allow use by students with adult supervision for educational purposes, or by adults;
- H.R. 5319 requires libraries that receive Federal Universal Service Funding to prevent the access of children without parental authorization to a chat room or social networking website;
- H.R. 5319 requires the Federal Trade Commission (FTC) to create a website and issue consumer alerts to inform parents, teachers and school officials about the potential dangers on the Internet, specifically online sexual predators and their ability to contact children through social networking sites and chat rooms.
When i expressed my concern over DOPA, everyone told me i was being paranoid, that it would never pass, that it was too absurd. DOPA passed. By a 410-15 vote. Dear god.
and this one…
Anti Social Networking legislation
Earlier, i spoke about how the MySpace panic was likely to cause legislation proposals. Today, Congressperson Fitzpatrick proposed legislation to amend the Communications Act of 1934 “to require recipients of universal service support for schools and libraries to protect minors from commercial social networking websites and chat rooms.” This legislation broadly defines social network sites as anything that includes a Profile plus an ability to communicate with strangers. It covers social networking sites, chatrooms, bulletin boards. Obviously, the target is MySpace but most of our industry would be affected. Blogger, Flickr, Odeo, LiveJournal, Xanga, Neopets, MySpace, Facebook, AIM, Yahoo! Groups, MSN Spaces, YouTube, eBaumsworld, Slashdot. It would affect Wikipedia if there wasn’t a special clause for non-commercial sites. Because many news sites (NYTimes, CNN, the Post) allow people to login and create profiles and comment, it might affect them too.
Because it affects both libraries and schools, it will dramatically increase the digital divide. Poor youth only gain access to these sites through libraries and schools(1). With this ban, poor youth will have no access to the cultural artifacts of their day. Furthermore, because libraries won’t be able to maintain separate 18+ and minor computers, this legislation will affect everyone who uses libraries, including adults (2).
This legislation is horrifying and culturally damaging. Please, all of you invested in social technologies, do something to make this stop.
This was one woman’s thoughts while at BloGher:
And so while I was pleasantly surprised to see how many people showed up for the edublogging session, and how they really wanted to talk about all kinds of Web 2.0 and learning topics (and how challenging so many of them felt sifting through the Web to find helpful sites on pedagogy and technology integration, on places for teachers to gather) I was dismayed by the lack of substantive talk about what’s going on with the Internet and kids. And in fact there were very very very few teens in attendance. And teens of color?
Maybe I just felt uneasy in a crowd of women who were basically having a ball blogging and meeting other women who blog and whose lives have changed through finding this means of expression. Maybe I’m too wrapped up in the future, on trying to reform education. Maybe I should have sat down with a couple of Yahootinis and stopped thinking about DOPA. But I can’t…it’s too big…
(Found Congressman Inslee’s remaks from 7/26/06 via http://thomas.loc.gov)
Mr. INSLEE. Mr. Speaker, I hate to spoil this garden party, but this is not, in truth, suburban legislation, it is substandard legislation. And the reason for that is that it is, in effect, a good press release, but it is not effective legislation addressing a huge problem threatening our children.
The reason I say that is, after sitting through many hearings in the Commerce Committee about this enormous problem, I reached one conclusion. After listening to those thousands of children who are being abused on these horrendous occasions across this country, I concluded that this legislation would not save one single child one single time.
What we learned is that the problem is not in our schools. These kids are not hanging in the library with these sexual predators. They are hanging around in their dens, in their basements, in their living rooms, and in their upstairs bedrooms. That is where we have to get to the problem.
If you look at the problem here on this chart, only 10 percent of the abused kids are online and hardly any of them from schools. A tiny, tiny, infinitesimal portion. This will not solve the problem.
Now, there are things we can do, but, unfortunately, this legislation doesn’t do a single one of them. I used to prosecute cases, so I know a little bit about law enforcement. I raised three kids, so I know a little bit about the terror of worrying about your children. But what this legislation does not do is the three things we need to do.
Number one, we have to give resources to law enforcement to prosecute these horrendous monsters. We had detective after detective come to our hearings and say, give us some money; we can prosecute these people. This doesn’t give them a penny.
Number two, we need to protect the data. What the detectives told us is that this data, once it disappears, they can’t find the culprits. Now we could require the data to be maintained for a year or two, like we are trying to do. This bill doesn’t do that.
Third, what this bill could do is provide some real meaningful tools for our schools to educate our children on how to avoid these monsters on the Internet. This doesn’t do that.
The three effective things that we could do to really save our kids is not done in this legislation.
Now, why is this such a pathetic wave at trying to do something? Why has Congress failed so miserably here? There is a reason for that. The reason is we want press releases, without having to do the hard work to do legislation. That is why we didn’t go through the Commerce Committee to have a markup on this bill so they could rush this thing to the floor and have their suburban agenda.
Well, speaking as a parent who represents 650,000 people, and probably 200,000 parents in suburbia, I think suburban parents, urban parents, rural parents, big-city parents and little-city parents deserve real legislation to stomp out the monstrosity that is going on on the Internet and not these little press releases. We can’t go home and just say that we are heroes without having really done something.
When I go home, I am going to tell my constituents that, yes, maybe there are some headlines, but there wasn’t real relief. And I look forward to the day when this Congress gets down to the nitty-gritty and really does something about this terrible problem.