One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Lab Blog
Identifiant 8445587
Date de publication 2024-02-01 11:00:00 (vue: 2024-02-01 15:07:45)
Titre Identité auto-souveraine: De quelle vie est-ce de toute façon?
Self-sovereign identities: Whose life is it anyway?
Texte The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  In 2023, the unfettered expansion and acceleration of internet technologies crashed headlong into the generative abilities of  AI, leaving people struggling with the concept of what reality is now. Can we trust what we see and hear on social media? Is the image of the person you are looking at a real person? Most importantly, after all those times you have logged into websites using a password and maybe even a phone-based multi-factor authentication (MFA) code, do you know if you are keeping yourself and your information safe? Self-sovereign identity was the topic for discussion with Paul Fisher, Lead Analyst at KuppingerCole, Ward Duchamps, Director of Strategy & Innovation at Thales, and myself, host Steve Prentice, on the Security Sessions Podcast, Self-Sovereign Identities: Whose Life is it Anyway? We explored the idea that personal identity is a crucial part of your existence, but more often than not, we give much of it away or at least use it as payment for access to some highly desired service like TikTok, LinkedIn, or Google. All these services, which appear free, are purely a trade: their engaging content for your data. We have commoditized ourselves through our fascination with everything the internet can deliver. Control over the movement and storage of data Some countries have worked hard to establish controls over the movement and storage of personal information. Perhaps the most famous of these remains Europe’s GDPR. There are others, of course, but they are frequently countered by divisive issues ranging from defending personal freedom through to political agendas. There is no global protection for personal identities. Added to this mess is the fact that consumers find password management tedious and tend to believe any data breach involving their identity will quickly blow over, and life will just go on. It might be time for people to take greater responsibility for their identities – owning and sharing, but in a manner that doesn’t give it all away, retaining control over it while also removing the need to have dozens or hundreds of passwords, basically, creating an identity system for this new century. When people first talk about moving beyond typed passwords, the first thing that often comes to mind is biometrics, like retinal scans, palm scans, and the type of facial recognition technology that allows us all to unlock our phones simply by looking at the camera. But these simple biometric techniques tend to work just like passwords in that they are presented as tokens that open a door somewhere. They are ideally better than text-based passwords since the owner of the face or fingerprint needs to be present to push through the transaction, but they are still static identifiers. There needs to be something more – something deeper, more complex, and most importantly, something that remains solely with its owner, from which selected parts may be produced as needed, without giving everything away to an organization that keeps it all forever. We never needed a wallet inspector to buy a coffee On our podcast, Ward Duchamps analogized this to a physical wallet or purse. A wallet is a physical holder into which you add credit cards, loyalty cards, a driver’s license, health card, paper money, and more. When you go to make a purch
Envoyé Oui
Condensat  ai  self 2023 abilities about abuse abused acceleration accent acceptance access accessing account add added addresses adopt after against agendas all allow allows also although amount analogized analyst any anyway anywhere appeal appear architecture are article at&t attributes authentication author away bank barrier base based basically become been behavior behavioral believe better beyond biometric biometrics birthdates blockchain blow both breach brick build but buy camera can can’t capacity car card cards cashier centralized century ceo choose claims clear clearly closely code coffee comes comfortable commoditized common companies complex conceivably concept consider consumers content control controls conversely copy corporation could countered countries course crashed creating credentials credit crucial currently cybercrime data deeper defending deliver desired devices digital dimensional directly director discussion divisive does doesn’t don’t door down dozens driver’s duchamps easier easily either else endorse ends engaging enough enter entire establish establishes europe’s even everything example exchange existence expansion explored extra eye face facial fact factor famous fascination favour feel find fingerprint firm first fisher fob forever formalized free freedom frequently from full further gangs gdpr generated generative gestures give given giving global goes google greater grown hand handing happy hard have having headlong health hear highly hold holder home host however huge human humans hundreds idea ideally identification identifiers identities identities: identity illegally image immediately importantly include individual individuals information infrastructure innovation inside inspector instead instinctively interact intermediary internet interpret involving issues its jason just keenaghan keep keeping keeps key know kuppingercole lack later lead least leaving legally lexicon license life like linkedin lived location log logged looking loyalty make management managing manner marketplace matter may maybe media mess method mfa middle might mika mind money more mortar most movement movements moving much multi must myself nascent need needed needs never new not nothing noticed now occur occurs offers often one online only onscreen open organization organizations other others ourselves out over own owner ownership owning palm paper part parties parts password passwords paul payment peer people people’s perhaps person person’s personal phone phone’s phones phrase physical picked piece podcast points political positions post prentice present presented process produced product protect protection provided purchase purely purse push quickly quite ranging rather read real reality recognition regional relatively rely remains removing repository required responsibility retaining retention retinal robots root safe safely same scans secret secure security see selected selective selectively self service services sessions set share sharing shift should similarly simple simply since social solely some someone something somewhere sooner sources sovereign specializes ssi staggering states static step steve storage store stored strategic strategy struggling subtle such suggesting support system take talk tap techniques technologies technology tedious tend text thales than them themselves these thing third those through tiktok time times today together tokens topic track trade: transaction transactions trust turn type typed ultimately under undertake unfettered unlikely unlock use used uses using views vital wait wallet wallets want ward way websites what when where whether which who whose will willingness wireless without word words work worked works world’s writes: your yourself
Tags
Stories
Notes ★★
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: