{"id":163,"date":"2012-12-08T23:33:30","date_gmt":"2012-12-09T07:33:30","guid":{"rendered":"http:\/\/blogs.scu.edu\/webculture\/?p=163"},"modified":"2012-12-08T23:34:07","modified_gmt":"2012-12-09T07:34:07","slug":"cyber-ids","status":"publish","type":"post","link":"https:\/\/blogs.scu.edu\/webculture\/2012\/12\/08\/cyber-ids\/","title":{"rendered":"Cyber ID&#8217;s"},"content":{"rendered":"<p><a href=\"http:\/\/blogs.scu.edu\/webculture\/files\/2012\/12\/18stream-pic-articleInline.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-164\" src=\"http:\/\/blogs.scu.edu\/webculture\/files\/2012\/12\/18stream-pic-articleInline.jpg\" alt=\"\" width=\"190\" height=\"200\" \/><\/a>In the early days of the Internet, online and offline identities were often kept separate. Anonymity was more commonplace. But today, verifying online identity is an increasingly important consideration as more official business is conducted online. There are many different online identity management solutions available and in use by various large companies, governmental entities and other organizations. These use different technologies and aren\u2019t generally compatible with one another. The situation is a little like the state of offline identification credentials in the US, especially before 9- 11, with each state issuing its own driver\u2019s licenses or ID cards.<\/p>\n<p>In 2011 the plan, called the <a href=\"http:\/\/www.whitehouse.gov\/sites\/default\/files\/rss_viewer\/NSTICstrategy_041511.pdf\" target=\"_blank\">National Strategy for Trusted Identities in Cyberspace<\/a> encourages the private-sector development and public adoption of online user authentication systems. As Natasha Singer explains in her article, <em><a href=\"http:\/\/www.nytimes.com\/2011\/09\/18\/business\/online-id-verification-plan-carries-risks.html?_r=0\" target=\"_blank\">Call It Your Online Driver\u2019s License<\/a>,<\/em><\/p>\n<blockquote><p>\u00a0The idea is that if people have a simple, easy way to prove who they are online with more than a flimsy password, they\u2019ll naturally do more business on the Web.<\/p><\/blockquote>\n<p>Singer explains that the authentication proponents and privacy advocates disagree about whether Internet IDs would actually heighten consumer protection.<\/p>\n<blockquote><p>\u00a0\u00a0\u2014 or end up increasing consumer exposure to online surveillance and identity theft.<\/p><\/blockquote>\n<p>The system would allow Internet users to use the same secure credential on many Web sites. This can be both a good and bad thing depending on the way you look at. It would be beneficial in the sense that people won\u2019t have to memorize different passwords for different accounts. On the other hand gathering information all in one area can be dangerous; if people start entrusting their most sensitive information to a few third-party verifiers and use the ID credentials for a variety of transactions, authentication companies would become \u201choney pots\u201d for hackers.\u00a0Google already has a free system, called the \u201c<a href=\"https:\/\/developers.google.com\/identity-toolkit\/\" target=\"_blank\">Google Identity Toolkit<\/a>,\u201d for Web site operators who want to shift users from passwords to third-party authentication.<\/p>\n<p>Also the government would need new privacy laws or regulations to prohibit identity verifiers from selling user\u2019s data or sharing it with law enforcement officials without a warrant.\u00a0So which would you prefer: one key that opens every lock for everything you might need or would you rather have different keys for different locks?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the early days of the Internet, online and offline identities were often kept separate. Anonymity was more commonplace. But today, verifying online identity is an increasingly important consideration as more official business is conducted online. There are many different &hellip; <a href=\"https:\/\/blogs.scu.edu\/webculture\/2012\/12\/08\/cyber-ids\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":321,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"qubely_global_settings":"","qubely_interactions":"","kk_blocks_editor_width":"","_kiokenblocks_attr":"","_kiokenblocks_dimensions":"","ngg_post_thumbnail":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-163","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"gutentor_comment":0,"qubely_featured_image_url":null,"qubely_author":{"display_name":"erozil","author_link":"https:\/\/blogs.scu.edu\/webculture\/author\/erozil\/"},"qubely_comment":0,"qubely_category":"<a href=\"https:\/\/blogs.scu.edu\/webculture\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","qubely_excerpt":"In the early days of the Internet, online and offline identities were often kept separate. Anonymity was more commonplace. But today, verifying online identity is an increasingly important consideration as more official business is conducted online. There are many different &hellip; Continue reading &rarr;","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/blogs.scu.edu\/webculture\/wp-json\/wp\/v2\/posts\/163","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.scu.edu\/webculture\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.scu.edu\/webculture\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.scu.edu\/webculture\/wp-json\/wp\/v2\/users\/321"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.scu.edu\/webculture\/wp-json\/wp\/v2\/comments?post=163"}],"version-history":[{"count":2,"href":"https:\/\/blogs.scu.edu\/webculture\/wp-json\/wp\/v2\/posts\/163\/revisions"}],"predecessor-version":[{"id":166,"href":"https:\/\/blogs.scu.edu\/webculture\/wp-json\/wp\/v2\/posts\/163\/revisions\/166"}],"wp:attachment":[{"href":"https:\/\/blogs.scu.edu\/webculture\/wp-json\/wp\/v2\/media?parent=163"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.scu.edu\/webculture\/wp-json\/wp\/v2\/categories?post=163"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.scu.edu\/webculture\/wp-json\/wp\/v2\/tags?post=163"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}