- From: Kingsley Idehen <kidehen@openlinksw.com>
- Date: Wed, 11 Jun 2014 11:52:59 -0400
- To: public-webid@w3.org
- Message-ID: <53987B5B.6090504@openlinksw.com>
On 6/11/14 7:27 AM, henry.story@bblfish.net wrote: > > Sorry for the Spam! it was generated by the LinkedIn Android App that > I accidentally tried out, where it suggested it would > put me in contact with people I allready know on linkedIn. I never > used these tools before, and assumed that a large company > like this would be a little careful about what they did, but it seems not. You do know that its slurped up all your contacts, right? As you can imagine, doing that is really dangerous to both you and your contacts. This is why (as you know) we need to have ACLs that protect vCard documents as well as RDF renditions of the same data. This is something we've incorporated into all aspects of our RDF based Linked Data solutions, for a number of years. I can drop a vCard document into my data space (Virtuoso hosted) via the ODS-Briefcase UI (part of ODS) or via cURL etc.. The destination already has ACL settings (kind of like umask in Unix), so once loaded the data is subject to those ACLs. Demonstrating such functionality, once a user has acquired a WebID boils down to a copy and paste using the familiar File create, save, and share pattern. WebID's imminent inflection point will be triggered the cumulative pain associated with Identity and Privacy compromises surpassing the perceived benefits of $0.00 social media services. There are no free lunches and ignorance will never be truly blissful :-) -- Regards, Kingsley Idehen Founder & CEO OpenLink Software Company Web: http://www.openlinksw.com Personal Weblog: http://www.openlinksw.com/blog/~kidehen Twitter Profile: https://twitter.com/kidehen Google+ Profile: https://plus.google.com/+KingsleyIdehen/about LinkedIn Profile: http://www.linkedin.com/in/kidehen
Attachments
- application/pkcs7-signature attachment: S/MIME Cryptographic Signature
Received on Wednesday, 11 June 2014 15:53:22 UTC