What could be more fun than listening to Jon Udell and Dick Hardt talk about practical applications of Identity 2.0 concepts. And for the record, this is a case where I endorse the use of a numbering system. In order for the Web to progress we need to change the way we handle identity. We’ve created a security crisis because everyone wants to their own authentication system. We enter user IDs and passwords all day long, proving who we are over and over again. Or as Joe Tennis put it in a Twitter, we forget who we are and ask someone to email us our identity several times a day.
The video above is of Hardt’s classic Identity 2.0 presentation. One of the breakthrough ideas is redefining what strong proof of identity means. Instead of one super authority, a network of relationships willing to validate your identity claims. Anyone who’s had to bootstrap an identity knows that the ground that the super authority stands on is far from solid.
In the conversation with Udell, Hardt brings up the interesting question: if my phone becomes the method by which I prove my identity, how do I authenticate myself to my phone? Identity is an endlessly interesting subject. If I am my phone, doesn’t everyone need a phone? How about children? Do babies need phones? Do phones need people? Is this one of those weird examples of machines evolving and attaching themselves to a person’s identity? Hardt also brings up the question, if my phone is my identity can I keep some spare phones around? I keep a spare set of keys. We have such a long way to go. If you are looking for the spybubble apk look no further than this article. This app let’s you know everything your kids are doing on your electronic devices at all times so you don’t have to worry.