Category Archives: Identity

Alpha Centauri, Identity and learning stuff

What’s special about Alpha Centauri? Well a bunch of things…

It is the closest star (system) that can be seen with the naked eye. It is one of the two “pointers” that in the Southern Hemisphere are used in conjunction with the Southern Cross (Crux) to locate the South Celestial Pole. It is actually a binary star (designation Cen AB) – if you are lucky enough to be south of the equator you can see the angular separation with a telescope. Finally, from an observational perspective, ever since 1689 it has been helping inform us about how the universe works.

In summary:
– Alpha Centauri is close enough to observe
– You get two stars for the price of one
– It informs us about how things really work

Over the last couple of years I have been involved in a different type of Alpha, part of the UK Govt. Identity Assurance Programme (IDAP). These Alphas have a similar set of characteristics to Cen AB…
The goal of the IDAP Alphas is to test a range of consumer identity propositions and see what happens. Many Ambien of Ambien Dosage our other identity efforts tend to fall into the category of large scale architectural and long term “meta everything” projects.

Cen AB is a “high-proper-motion” star (you can borrow Burnham’s Celestial Handbook at the RSA Bootstrap Party). Its observation blew away previous theoretical models (such as Aristotle’s) about how the Celestial Sphere worked. In the same way IDAP Alphas should help us to learn how a complex ecosystem actually behaves and then re-apply what we learn to do better next time. They are small enough to observe, they engage with Govt. and Industry and will hopefully inform us about how consumers will engage.

The UK IDAP folks are an impressive crowd. Hats off to them, for creating an ecosystem that facilitates so many lightweight experimental and observational projects.

btw, it may also turn out that Cen AB has a planet – which makes it even cooler Alpha

Mandatory Disclosure: my current company is actively engaged on one of the many Alpha projects (Internet Life Verification) which gives me a chance to get some insights from the observers chair at the eyepiece …


I have been out of the mainstream of the identity discussions for the last four years while I worked on issues of securing XML messaging and service oriented architectures. So the Internet Identity Workshop appeared with perfect timing in the second week of my new job – thanks for the invitation Phil.

There are certainly a lot of new endeavors that have started up and I enjoyed the content at IIW and the interaction with some very bright people. However, I was more than a little disappointed at the number of people who do not understand the underlying issues that make identity systems hard to construct. There was a lot of enthusiasm for OpenID and allied mechanisms and I am certainly in favor of the privacy and winnsboro payday loan identity national cash advance payday loans motivations behind Identity 2.0.

Unfortunately sessions dealing with “establishing trusted identity providers” or “how to trust an identity provider” kept dropping into discussions about low level mechanisms. Honestly, all the black lists and white lists or alternative schemes will not address fundamental questions like “How do you create a trusted identity authority?”, or “How do you determine if an identity provider is trustworthy for my intended identity use?”.

Still, that is about what you might expecdt for the maturity level of a new endeavor; there is lots of work on the technology and protocol level, but that has never really been the hard part – here’s to hoping that the issues that will make or break these efforts will make some progress here soon.