- From: Peter Williams <home_pw@msn.com>
- Date: Wed, 21 May 2014 23:23:04 +0000
- To: Melvin Carvalho <melvincarvalho@gmail.com>, Kingsley Idehen <kidehen@openlinksw.com>
- CC: "public-lod@w3.org" <public-lod@w3.org>, "foaf-protocols@lists.foaf-project.org" <foaf-protocols@lists.foaf-project.org>, "public-webid@w3.org" <public-webid@w3.org>, "public-rww@w3.org" <public-rww@w3.org>
- Message-ID: <SNT404-EAS358C5123D8AE78465CBB01A923C0@phx.gbl>
Ive kinda moved on from pure browser theory (and I know that will alarm some purists). But, the good news I feed is that the nuveau world of sandboxed apps (that talk https) still used good ol X.509 certs. Indeed, they make rather better use of client-authn certs than browser EVER did. I some sense, its like browsers were supposed to be (before PGP theorists threw out the baby with the bath water, for a quick fix [that didnt scale to a global trust model suiting consumers]). Though we are JUST ABOUT to catch up with app-fever (started 4 years ago), we know that we do so ONLY because apps themselves are evolving - to (GUESS WHAT) be more like web-era browsers (doing HTML rendering, and HTML5-mediation to device-API features like location sensors or NSA’s remote microphones). So, I feel that the linked-data story now has to merge with client certs mgt used now in app land - where the MDM (mobile device manager PROVISIONS the client cert, typically used to control the posture of the device - limiting its open behaviour to fit a endpoint security model. If we do so, then one has a hybrid trust model world, that is not just an NSA/CIA/DHS/NIST/FISMA/openid cyberwar prep initiative. The same cert can also be used in webby interactions (for loosely coupled trust models). that the set of such interactions IS constrained by the MDM (which says one can ONLY talk to certain linked data endpoints) by governance policy does NOT worry me - since we are SEEKING a nuveau happyland, that mixes public/enterprise/cloud/personal models of crypto that are NOT founded in internet militarism. Sent from Surface Pro From: Melvin Carvalho Sent: Wednesday, May 21, 2014 2:50 PM To: Kingsley Idehen Cc: public-lod@w3.org, foaf-protocols@lists.foaf-project.org, public-webid@w3.org, public-rww@w3.org On 21 May 2014 23:26, Kingsley Idehen <kidehen@openlinksw.com> wrote: All, I am pleased to announce immediate availability of our YouID 1.7.1 app for the Android platform. Along side its iOS counterpart, you now have a "deceptively simple" Linked Open Data based solution that puts you in full control of your digital identity. In a nutshell, YouID provides a wizard-interaction based solution for: 1. obtaining profile data from various social media/networking services 2. generating key pairs (public and private) 3. generating an digital identity card (x.509 standard compliant) 4. generating a secure pkcs#12 document for storing your digital identity card and its associated private key 5. generating a public artifacts that are semantically linked to your local identity card -- in the form of HTML+Microdata, HTML+RDFa, HTML+Turtle, HTML+JSON-LD, Turtle, JSON-LD documents 6. generating other relevant artifacts (e.g., vCard) for easy networking 7. saving all of the aforementioned public artifacts to a storage location provided by your preferred Web storage provider -- e.g., Dropbox, Google Drive, Microsoft OneDrive, Box., OpenLink ODS-Briefcase instances etc.. I've published a blog post [1] that delves deeper into what YouID offers. Awesome! Decentralized identity for the masses! Enjoy! Links: [1] http://bit.ly/1tkOWv1 -- YouID for iOS and Android Blog Post [2] http://youid.openlinksw.com -- YouID home page [3] http://id.myopenlink.net/DAV/home/KingsleyUyiIdehen/Public/YouID/IDcard_Twitter_140521_171112/ -- YouID folder containing artifacts generated (just now) from my Android device [4] http://bit.ly/1mZZD4m -- HTML+Microdata based digital identity card generated by YouID for my Twitter Persona. -- Regards, Kingsley Idehen Founder & CEO OpenLink Software Company Web: http://www.openlinksw.com Personal Weblog: http://www.openlinksw.com/blog/~kidehen Twitter Profile: https://twitter.com/kidehen Google+ Profile: https://plus.google.com/+KingsleyIdehen/about LinkedIn Profile: http://www.linkedin.com/in/kidehen
_______________________________________________ foaf-protocols mailing list foaf-protocols@lists.foaf-project.org http://lists.foaf-project.org/mailman/listinfo/foaf-protocols
Received on Wednesday, 21 May 2014 23:34:05 UTC