Tweets
- Tweets
- Tweets & replies
- Photos & videos
@IDmachines is blocked
Are you sure you want to view these Tweets? Viewing Tweets won't unblock @IDmachines.
Fake identiy (twitter) relationships via The Hacker News #irmwg pic.twitter.com/Mo60VDab1H
MT @ID4Africa: UN conference in New York to focus on #stateless people http://www.irishtimes.com/news/world/un-conference-in-new-york-to-focus-on-stateless-people-1.2132384#.VP9Gf6F3CuY.twitter … <- now there is an identity use case.
DRAM Rowhammer vulnerability Leads to Kernel Privilege Escalation http://thehackernews.com/2015/03/dram-rowhammer-vulnerability.html … via @TheHackersNews #Security
Abbreviated applications for the 2015 #NSTIC pilot projects are due next week on 3/17! Start your application now: http://bit.ly/1yRwQ48 .
.@ForEffectiveGov gave U.S. government a 1.3 GPA in #FOIA compliance http://www.foreffectivegov.org/access-to-information-scorecard-2015 … #OpenGov pic.twitter.com/s2EjfU5J2O
So how does end of life play with wearable tech (10k Applewatch)? Obsolence expands to platform as well as style (if the bellbottoms fit..)
Signing HTTP Request fo OAuth https://datatracker.ietf.org/doc/draft-ietf-oauth-signed-http-request/ … @zer0n1ne @ve7jtb @shingou example of JSON signing <- important tool, #identity
Identity + its relationships r moving inside out, importanly includes customers, @gigaom infographic details #irmwg pic.twitter.com/4pVXm8jWQP
MT @ID4Africa Nigeria Banks Fingerprint-enabled ATMs http://buff.ly/1CLptCZ pic.twitter.com/mcBh43dmi9 #identity <-careful w/those prints..
MT @bo_novak: illustration of consent, whether sex or *offering a cup of tea*. HT @margotmcuaig pic.twitter.com/IiLuTrYwEh re: @KantaraCISWG
Latest rev of System for Cross-Domain #identity Management: Protocol Internet draft https://datatracker.ietf.org/doc/draft-ietf-scim-api/ … #scim
Mozilla considering name constraintes on public CAs https://wiki.mozilla.org/CA:NameConstraints … #identity
Day 2 of the #MITBitcoinExpo picks up this morning, early due to DST! Tweet #MITBTC15 Livestream here: https://www.youtube.com/watch?v=96ULlHhia_Q&annotation_id=54f6493a-0000-295c-acbe-001a11c01e10&src_vid=lIgjogLipvk&feature=iv … --@raywang0
Computer security: The law and unintended consequences http://econ.st/1KmcBHo via @TheEconomist <- no such thing as a back door for good
@shiladitya @maelorin @Steve_Lockstep @robchandhok #irmwg Disturbing use of #IoT. Very annoying but not yet disruptive/dangerous to people
NPR on passwords and DARPA efforts to replace them http://www.npr.org/2015/03/08/391619540/darpa-explores-new-ways-to-secure-our-lives-online … not much new, lotsa buzz on authN, needs to be on authZ imo #idesg
FAA not up to snuff on IT security GAO report, http://www.gao.gov/assets/670/668169.pdf … dinged on access and change control and updates and segmentation
Different version of #identity theft, thieve take "machine" used to print identity cards at Thai consulate in LA http://www.nationmultimedia.com/national/ID-printing-machine-stolen-from-Thai-consulate-in--30255417.html …
@neilch on Identity Relationship Managment in InfoSecurity Magazine http://www.infosecurity-magazine.com/opinions/managing-digital-identities/ … glad to see the word is getting out #irmwg
Identity Mixer is an anonymous credential system that enables strong authentication and privacy. This account is used by the IBM scientists developing it.
Bricoleur numérique et digital. Chercheur en InfoCom. Spécialisé vie privée et numérique. Prof' webdesign. Et aime aussi tout le reste !
Twitter may be over capacity or experiencing a momentary hiccup.
Visit Twitter Status for more information.