Microsoft Launches Decentralized Identity Tool on the Bitcoin Blockchain

Microsoft Launches Decentralized Identity Tool on the Bitcoin Blockchain

York Rhodes, a programme manager on Microsoft’s Blockchain Engineering Team, mentioned to CoinDesk that the Microsoft team has been working for a year on a key signing validation software founded on public networks like Bitcoin or Ethereum, and one that can handle a great number of throughput than the underlying Blockchain on which it is run.

Twitter accidentally shares user location data with advertising partner

Twitter accidentally shares user location data with advertising partner

Twitter Inc said on Monday it may have accidentally collected and shared location data of some users accessing its app through Apple devices with an advertising partner.

Microsoft Confirms Intent To Replace Windows 10 Passwords For 800 Million Users

Microsoft Confirms Intent To Replace Windows 10 Passwords For 800 Million Users

Microsoft's crypto, identity and authentication team group manager, Yogesh Mehta, has made an announcement that he says puts "the 800 million people who use Windows 10 one step closer to a world without passwords."

The Customer Identity Infrastructure that Cruise Line Passengers Don’t See

The Customer Identity Infrastructure that Cruise Line Passengers Don’t See

The Customer Identity Infrastructure that Cruise Line Passengers Don’t See. Yash Rathi. Cruise lines are well-known for their innovation in creating enormous ships and fun stuff to do on them. But what travelers like me don’t see is the infrastructure that makes them possible: a customer identity solution.

EU Biometric Database To Be One of World's Largest—What Could Go Wrong

EU Biometric Database To Be One of World's Largest—What Could Go Wrong

The Common Identity Repository (CIR) will consolidate biometric data on almost all visitors and migrants to the bloc, as well as some EU citizens—connecting existing criminal, asylum, and migration databases and integrating new ones.

EU merges giant biometrics database. What could possibly go wrong?

EU merges giant biometrics database. What could possibly go wrong?

CIR will aggregate both identity records (names, dates of birth, passport numbers, and other identification details) and biometrics (fingerprints and facial scans), and make its data available to all border and law enforcement authorities.

The EU voted to create a giant biometric database just 1 year after introducing the world’s strictest privacy laws

The EU voted to create a giant biometric database just 1 year after introducing the world’s strictest privacy laws

The new system will pull together identifying information of more than 35o million EU and non-EU citizens, ZDNet reported, including passport numbers and dates of birth. The European Parliament says the the giant database "will make EU information systems used in security, border and migration management interoperable enabling data exchange between the systems."

Startups and the Rise of Digital Identity

Startups and the Rise of Digital Identity

Well, if you want to keep your identity safe from hackers, see people in developing nations open a bank account for the first time, and take control over your personal data—digital identity matters.

“5 Surprisingly Easy Ways We Let People Steal Our Identity.” (From our Forums.)

“5 Surprisingly Easy Ways We Let People Steal Our Identity.” (From our Forums.)

When personal information is fraudulently used to open new accounts, BJS says, people affected experience a lot financial problems in the future. Someone calls you claiming to be from your bank and asks for sensitive personally identifiable information like your social security number.

The march to mandatory, nationwide DNA databases picks up pace around the world

The march to mandatory, nationwide DNA databases picks up pace around the world

It is likely to spread thanks to a new generation of small, quick and low-cost DNA sequencers that can be installed in police stations and run by officers, as this New York Times story explains: in early 2017, the police booking station in Bensalem became the first in the country to install a Rapid DNA machine, which provides results in 90 minutes, and which police can operate themselves.

How much privacy do you have left on the web?

How much privacy do you have left on the web?

The former requires providing your mobile phone number which is immediately tied to your real-life identity — more on that soon. So it seems that having your accounts linked to your real-life identity via your mobile phone number is usually unavoidable even if it’s not the same number you normally use.

Why Phone Numbers Stink As Identity Proof — Krebs on Security

Why Phone Numbers Stink As Identity Proof — Krebs on Security

Nixon said countless companies have essentially built their customer authentication around the phone number, and that a great many sites still let users reset their passwords with nothing more than a one-time code texted to a phone number on the account.

Apple makes cool new ad about iPhone Privacy

Apple makes cool new ad about iPhone Privacy

That’s iPhone.” Then we’re shown how we already value privacy in the everyday world in ways we might not relate to digital privacy: no trespassing signs and vicious guard dogs to protect our property, pausing a private conversation or swallowing a secret note from a classmate to avoid others receiving the message, and shredding personal information to leave no trace for identity thieves.

9 Digital Identity Trends That Will Make or Break Businesses in 2019

9 Digital Identity Trends That Will Make or Break Businesses in 2019

4. Deepfakes mean “Fake News” With the proliferation of emerging “deepfakes” technologies, news and social media channels will be under pressure to guard against fraud.

Uproar Over Facebook 2FA Privacy Violation

Uproar Over Facebook 2FA Privacy Violation

Connor Jones says it’s not for the first time we’ve heard complaints like these: [Facebook] encourages its users to set up 2FA account protection which requires a phone number.

Beijing AI Targets “Hospital Scalpers”

Beijing AI Targets “Hospital Scalpers”

An AI system misunderstood a bus ad featuring Chinese billionaire Mingzhu Dong, falsely identifying her as a jaywalker Over 900 hospital scalpers were detained in Beijing last year as part of a citywide crackdown.

Data breach at UConn Health affects 326k patients

Data breach at UConn Health affects 326k patients

Healthcare Data Breach Hack Sensitive data accessed after employee email accounts hacked A security incident at US medical center UConn Health may have exposed the sensitive details of more than 326,000 patients.

Impersonation and Identity Theft Risk on GitHub and How to Prevent It

Impersonation and Identity Theft Risk on GitHub and How to Prevent It

Open source software is supposed to be all about the code rather than the author so this doesn’t seem like a serious problem at first, but in practice most software developers can’t verify all the code all the time, so reputation-based trust becomes a habit.

When Kids Realize Their Whole Life Is Already Online

When Kids Realize Their Whole Life Is Already Online

“These parents act as both gatekeepers of their children’s personal information and as narrators of their children’s personal stories.” Read: The perils of “sharenting” Preschools and elementary schools often keep blogs or upload photos of kids to Instagram accounts and Facebook pages so that working parents can feel like a part of their kids’ day.

#1: You Don’t Own Your Identity — The Digital Identity Podcast

#1: You Don’t Own Your Identity — The Digital Identity Podcast

We are delighted to present the first episode of our Digital Identity Podcast: You Don’t Own Your Identity . This podcast aims to steer you through those murky waters by providing insight into how personal information is managed and how we can provide a better alternative.

Understanding Identity Systems Part 1: Why ID?

Understanding Identity Systems Part 1: Why ID?

The second section, Discrimination and Identity, explores how an ID scheme operates in the context of an existing identity infrastructure, and the issues surrounding discrimination that can emerge.

Chinese face-recognition technology spots wanted man at 60,000-people concert

Chinese face-recognition technology spots wanted man at 60,000-people concert

The most funny and cyberpunk dystopia part was, during a test run, if the jaywalkers don't want to pay a fine, traffic police has given them another opinion: posting an warning of your misbehave on your social media account!The mass-deployment may be coming soon.And it is rumored that the subways would soon require a proof of identity.

Google Takes Its First Steps Toward Killing the URL

Google Takes Its First Steps Toward Killing the URL

It shouldn’t take advanced knowledge of how the internet works to figure that out." "A key challenge is avoiding flagging legitimate domains as suspicious." Emily Stark, Google Chrome The Chrome team's efforts so far focus on figuring out how to detect and warn users about URLs that seem to deviate in some way from standard practice.

Exposing Harms, Fighting Back

Exposing Harms, Fighting Back

But, as the Privacy International Network continues to uncover, campaign and advocate on these issues, it becomes clear that that it is possible to begin to achieve change.

Poor practices expose 24 million financial records

Poor practices expose 24 million financial records

“Numerous suppliers and partners may urgently need their data for various legitimate business purposes, but fail to maintain appropriate internal security controls.” Read more about data protection Third-party risk management is not a silver bullet either, said Kolochenko.

Declutter Your Data 2019

Declutter Your Data 2019

Day 5 – Change Your Passwords on Remaining Accounts After you have reduced or simplified your list of online accounts, you now have an inventory of the websites and companies that constitute your digital identity.

EPIC Asks UN to Question US About Privacy Violations by Private Firms

EPIC Asks UN to Question US About Privacy Violations by Private Firms

EPIC Asks UN to Question US About Privacy Violations by Private Firms As part of a routine review, EPIC asked the United Nations Human Rights Committee to question the US about the failure to protect individuals against privacy violations by private industry.

How Microsoft has (so far) avoided tough scrutiny over privacy issues

How Microsoft has (so far) avoided tough scrutiny over privacy issues

Microsoft sells targeted ads against search results, and users have complained about how their data is secured in the cloud, the company hasn’t received nearly the same level of scrutiny, and it’s been years since its executives were hauled before Congress.

What happens to identity and privacy when every biometric can be faked?

What happens to identity and privacy when every biometric can be faked?

Alongside traditional approaches like passwords and hardware tokens, biometrics are increasingly employed to authenticate people, notably with smartphones, many of which now come with fingerprint sensors and facial recognition built in as standard.

Is FIDO the future instrument to prove our identity?

Is FIDO the future instrument to prove our identity?

Posted: by Pieter Arntz FIDO, short for Fast IDentity Online, is an industry consortium started in 2013 to address the lack of interoperability among strong authentication devices and the problems users face creating and remembering multiple usernames and passwords.

More