Remove tags pseudonymity
article thumbnail

Verifying Twitter

Phil Windley

Matthew makes some good points: Pseudonymity has value and offers protection to people who might not otherwise feel free to post if Twitter required real names like Facebook tries to. Tags: twitter identity verifiable+credentials. Verification tells the reader that the account is run by a person. But, I can dream.

article thumbnail

Ephemeral Relationships

Phil Windley

And the identification is likely pseudonymous (e.g. Tags: identity ssi privacy relationships. While the ticket taker at the movies and the server at the restaurant certainly "identify" patrons, they forget them as soon as the transaction is complete. the couple at table four" rather than "Phillip and Lynne Windley").

System 119
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Announcing the Sovrin Whitepaper

Phil Windley

Most importantly, Sovrin implements Privacy by Design on a global scale, including pairwise pseudonymous identifiers, peer-to-peer private agents, and selective disclosure of personal data using zero-knowledge proof cryptography. Tags: sovrin identity whitepaper verifiable+claims sovrin+token. I hope you'll spend some time reading it.

Internet 103
article thumbnail

Privacy, Authenticity, and Confidentiality

Phil Windley

In the language we're developing here, they create authenticated, permanent relationships, at the expense of privacy, when they could use pseudonymous, ephemeral relationships and preserve privacy. Tags: ssi identity privacy authenticity confidentiality. Too often, digital systems opt for knowing who when they could get by with what.

article thumbnail

Fluid Multi-Pseudonymity

Phil Windley

Summary: Fluid multi-pseudonymity perfectly describes the way we live our lives and the reality that identity systems must realize if we are to live authentically in the digital sphere. In response to my recent post on Ephemeral Relationships , Emil Sotirov tweeted that this was an example of "fluid multi-pseudonymity as the norm."

Network 107
article thumbnail

GeoGuessr made figuring out where on Earth you are the hottest new esport

The Verge

“You might not see that car again for two years playing the game,” says RadoX1988, one of the moderators of GeoGuessr’s competitive subreddit, who asks to be referred to by his online pseudonym. But if you can remember it, over a long period of time, that becomes a massive advantage.”. GeoGuessr was never designed to be played at high stakes.

Google 69
article thumbnail

Token-Based Identity

Phil Windley

Most are ephemeral and pseudonymous. And the identification is usually pseudonymous (e.g. Token-based identity allows people to operationalize their digital lives by supporting online interactions that are multi-source , fluid multi-pseudonymous , and decentralized. Photo Credit: Tickets from Clint Hilbert (Pixabay).

Insurance 137