Identification, Identity Systems, and the REAL ID Act

In a recent presentation to the Summer 2007 Privacy Symposium, Jim Harper lays out a series of concerns about a national identification system. I’m just going to run through them quickly – watch the video that I link to at the end of the post to view his presentation yourself.

Authentication versus Identification

  • Authentication is where you are challenged to provide a set of items/data in order to gain access to something. An example would be the requirement to have both a banking card and a PIN to access your bank account – this authenticates your access to the resource, but it isn’t a wholesale validation that it is actually Christopher Parsons who is accessing my bank account. Instead, what this does it is gives enough information to the bank that it is comfortable providing access to my bank account, without actually knowing for sure that it is me accessing the account.
  • Identification draws on unique characteristics that make up who you are, and validates that person attempting to gain access to X or do Y against the recorded characteristics that identify that person. This involves validating a person against facets of their constitutive being, with a popular identifier coming from biometric information. This passes beyond authentication systems because the person is certifiably identified. Whereas I can give you my bank card and PIN, I would have a far harder (and more painful) time giving you my right eye and left thumb.

Continue reading

The Book Industry Needs to Change! Why (most) authors and publishers need not fear online piracy

Ars technica has a pretty good rebuttal to the recent piece in the London Times that offered the (seeming) common line of crap that you hear when old industries talk about peer to peer networks. You know what the line is in its general format: “Without the guarantee of making money through our tried, tired and tested revenue streams, authors will stop writing, culture with wither away AND IT’S ALL YOUR FAULT!” (There is often a “Think of the children!” added in there for good measure.)

Now, why isn’t it likely that authors are going to flee writing like bookworms from a server farm?

(1) It’s a pain in the ass to scan a book, cover to cover. Don’t believe me? Scan a decent book and then post it for all of us at The Student Bay. I bet you give up before you get halfway through your task. And I bet that you can’t scan in Communicative Action (ISBN-10 0807015075) in a searchable PDF format! (Let’s see if this whole reverse psychology stuff really works…)

Continue reading

A Not-Good Relationship

I tried. I tried so hard. I’ve spent literally years drooling over her. I’ve seen her cousins at some of my friends’ offices, and I was blown away. My choice of either a tall, slim image or one with a little more meat on the sides. My choice, and I could switch things around whenever I want.

I wanted to be with her so bad. After the time we’ve been together, I’ve touched her. I’ve caressed her. I’ve spent tens of hours reading about how to make us work together a bit more. I’ve really tried – I mean that. I realize that all relationships have a honeymoon phase, and that I might have been a little too optimistic that everything would work out between us, but I’ve never had a relationship like this be so challenging.

In this case, there is no compromise with her; she’s definitely a prima donna. In the past I’ve been able to put my ladies to either side of my primary display. This time, however, my Dell 1907 has to be in the front of me or else the colours are washed out. It’s amazingly annoying – to have spent a ton of money on a nice new 19′ monitor that I have the ability to rotate 90 degrees is pretty awesome. I had hoped that I could just wait it out, that I could adjust where it was and things would be better. Of course, this meant that I waited beyond the time that I could return the monitor. It’s not that it’s bad per se, but simply that it’s not good. Continue reading

Obama Race Speech

There’s a good chance that you’ve heard of the recent speech that Obama gave about racial issues in the US, but there is (unfortunately) a good change that you haven’t read it. I wouldn’t blame you if you haven’t – a lot of speeches that are talked about really aren’t worth reading. That said, if you haven’t read a speech in decades, read this one. It’s powerful, it’s poignant, and it’s deep. It’s also written by the candidate himself.

Link to Speech: Obama Race Speech

Privacy: A Quick Lit Review

This isn’t a ‘full’ post, in the sense that I’m not actually going to get into any issues. Instead I’m going to put up a list of texts that are particularly helpful in getting into debates surrounding privacy, as well as some texts that deal with privacy as it relates to the process of digitization. I want to do this for two reasons: First, because I am curious to see how I would change this list in a year or two’s time, and second because when I was getting into my Master’s project I couldn’t find anything like the list I’ve prepared.

For the usual purposes of full disclosure/covering my ass, I’ll note that this list should be read as something ‘ongoing’/’in development’. It’s not comprehensive of everything that I’ve ever read and only reflects what I’ve been exposed to up until this point.

Core Books

Philosophical Dimensions of Privacy: An Anthology by Ferdinand D. Schoeman.
Somewhat amusingly, I finally got this book just a month or so after receiving my MA. Why is this the first book on the list? Because it would have saved me a metric buttload of time in going to primary sources to ‘catch up’ on the genealogy of privacy debates. Schoeman has done an exceptional job in collecting major issues and debates in privacy, drawing from prominent philosophical and legal theorists. The downside: it was published in 1984, so it misses the more contemporary discussions in the ongoing debates surrounding privacy. That said, its indispensable if you’re looking for a solid first academic discussion of privacy.

Continue reading

Mobiles and Your Identity

Today I want to just briefly talk about the competition between Apple’s iPhone and Research in Motion’s Blackberry. I’m not going to bother with things like the aesthetics or the ease of using one over the other. Instead what I want to talk about is how these devices are, and will (in the iPhone’s case) be used. I’ll, as usual, provide a bit of background and then get to what is the real issue with these devices: unless secured, these devices, and other like them, can reveal a substantial amount about yourself and others, enough that it would be a relatively simple task to assume your identity and potentially negatively affect others’ identities/reputations.

Packing Some Confidential Property

I’ll admit it: whenever I go anywhere, my Blackberry comes with me. I use it to track all facets of my life: my contacts (i.e. who I know, what I know about them, notes that I see as important about them), my calendar (i.e. what I do at almost all points of my day, who I’m meeting with, why I’m meeting with them), my email (i.e the communication that I have and think should be recorded for a later date), and my instant messaging (i.e my personal discussions that let me be me with friends). This is super-convenient for me. It also means that I’m carrying a device that would give someone who found/stole it a significant insight into my life and some insight into the lives of people that I know.

Continue reading