The Laws "Live"

I intended to make this my first live blogging entry from Digital Identity World this week, starting with Kim Cameron’s talk on the Laws of Identity. As expected, it was packed (in fact it needed a larger room — at least 30 folks were standing.)

But as it ended I was engulfed in followup conversations. Then Dick Hardt did a very cool presentation about Identity 2.0 and what it really means for it to be user-centric. (I’ve never seen a presentation in the style of Larry Lessig, to whom Dick attributed the format, but I’ll never think about powerpoint the same way again.) After that I got deep into a deep discussion with Paul Trevithick and Andy Dale about XDI architecture, which led to a highly enlightening conversation with Jamie Lewis in which he explained to me how he thinks the marriage between SAML and WS-Trust will really work.

Here’s the simple way to put it: if WS-Trust is “tubes for tokens” (Kim’s great phrase that for me immediately conjures up the byzantine pneumatic plumbing system in the movie “Brazil”), then SAML 2.0 is the “default token”. According to Jamie, WS-Trust provides a really good token tube, one that has smart “transformers” at each junction that can transform from one token format into another (what Kim calls “claims transformation”). But WS-Trust doesn’t know anything about the tokens. SAML, on the other hand, defines a very good token format, but not as strong a “token tube”.

So, put the two together by shipping primarily SAML tokens over a WS-Trust tube, then transforming them when necessary into other token formats like Kerberos or X.509, and you have a pretty good solution for interoperable identity assertions.

We’ll see how closely this matches to Jamie’s presentation tomorrow morning (always one of the highlights of the show), but it sure helped my understanding.

Posted in Blogging, General, Identity Commons, XDI, XRI | Leave a comment

DIDW "Bottoms Up" Identity Meeting

As Kim notes, there will be an open meeting on “Bottoms Up” identity at the Pacific room of the San Fransisco Hyatt Embarcadero at 1pm Pacific on Monday May 9. I’ll be there as well as at DIDW all week and would be happy to discuss the Corallaries, XRI, or XDI – just look me up or send me a note via my i-name contact page at =Drummond.

Posted in General | Leave a comment

The Fifth Corollary of Identifiers

[This is the fifth of seven proposed “Corollaries of Identifiers” to Kim Cameron’s Laws of Identity.]

Kim’s Fifth Law is the one that most directly explains his use of the term “metasystem”:

5. The Law of Pluralism

A universal identity system MUST channel and enable the internetworking of multiple identity technologies run by multiple identity providers.

Again, the corollary from an identifier standpoint falls out nicely:

5a. The Corollary of Identifier Plurality

A universal identifier system MUST channel and enable the internetworking of multiple identifier schemes run by multiple identifier authorities.

This corollary highlights the architectural parallels between TCP/IP as an internetworking protocol and a universal identity metasystem as an “interidentity protocol”. TCP/IP solved the problem of interoperable network packet exchange by providing a way to map local LAN protocols to a common internetworking protocol. The LAN protocols themselves did not need to change; only mappings to the internetworking protocol needed to be added.

The Fifth Corollary postulates that the same solution will be required for the identifiers in a universal identity metasystem. In other words, identifiers designed for local “islands” of identity can’t be expected to provide cross-domain interoperability any more than a LAN protocol could be expected to produce the Internet. Instead, we need a universal identifier metasystem — a “TCP/IP of identifiers”.

A first temptation might be to say: “We already have it – URIs.” It’s hard to argue with the most successful identifiers in history, and URIs have been as integral to the success of the Web as IP addresses were to the Internet. However the Fifth Corollary adds an interesting new requirement when it comes to a universal identity metasystem: the need to “channel and enable the internetworking of multiple identifier schemes operated by multiple identifier authorities”.

While this might sound like what URIs do today, in fact interoperability is limited to a handful of broadly supported URI schemes (chiefly HTTP/HTTPS, but also mailto, ftp, and a few others). In addition, generic URI syntax uses a “single hierarchy” structure, i.e., a URI always represents a single identifier authority. There is no standard way in generic URI syntax to express “cross hierarchy” relationships, a directory concept known as polyarchy. Yet those of us working on the OASIS XRI TC have found polyarchy (which we call cross-references) as essential to the “internetworking of multiple identifier schemes” as TCP/IP packet exchange is to the internetworking of multiple LAN protocols.

For example, the following URIs might represent myself as a personal authority, and my employer, Cordance Corporation, as an organizational authority, respectively:

http://www.equalsdrummond.name/
http://www.cordance.net/

With URI syntax, each of these authorities may be the root of its own infinitie hierarchy of local resources, e.g.:

http://www.equalsdrummond.name/blog/identifier-corollaries-5.html
http://www.cordance.net/directory/employees/hourly.xls

But there is no standard HTTP URI syntax for referring across these hierarchies, i.e., for referencing “the resource known by the URI ‘http://www.equalsdrummond.name’ in the context of the resource known as ‘http://www.cordance.net’.”

With XRIs, this is easy:

xri://(http://www.cordance.net)/(http://www.equalsdrummond.name)

XRIs that use global context symbols (and therefore make the “xri://” prefix optional) can make cross-references even more compact:

@Cordance.Corporation/(=Drummond.Reed)

While there are other features that (in my humble opinion as XRI TC chair) qualify XRI as the “TCP/IP of identifiers”, cross-references is the feature that speaks most directly to interoperability. To my knowledge, the XRI scheme is the first URI-compatible identifier scheme that permits the use of all valid URIs (and all valid XRIs) within the context of a single resolvable identifier.

If you don’t already have my email address, please send comments via my i-name contact page at =Drummond

Posted in General, Identity Commons, XRI | 1 Comment

Fen adds Four More Laws

Fen Labalme has published Four More Laws of Identity that adds some key additional perspectives on Kim Cameron’s original seven. Specifically, Fen covers:

  • Freedom
  • Decentralization
  • Portability
  • Transparency

Well worth reading as we head into the conversations at Digital Identity World next week.

Posted in Blogging, General, Identity Commons | Leave a comment

The Fourth Corollary of Identifiers

[This is the fourth of seven proposed “Corollaries of Identifiers” to Kim Cameron’s Laws of Identity.]

Kim’s Fourth Law is the only one that deals directly with digital identifiers:

4. The Law of Directed Identity

A universal identity system MUST support both “omnidirectional” identifiers for use by public entities and “unidirectional” identifiers for use by private entities, thus facilitating discovery while preventing unnecessary release of correlation handles.

Of all seven of Kim’s Laws, this one has the most obvious corollary:

4a. The Corollary of Directed Identifiers

A universal identifier system MUST support both “omnidirectional” identifiers and “unidirectional” identifiers and MUST make it practical for the identified party to control which type of identifier is used in any particular identification relationship.

In short, the Third Law requires an identifier infrastructure capable of fulfilling its requirements as well as those of the First Law (user control of information disclosure).

As is often the case, “public is easy and private is hard”. In other words, it’s not difficult to meet the need for public, omnidirectional identifiers. Wired/wireless phone numbers, domain names, email addresses, or instant messaging addresses all fulfill this requirement to a greater or lesser extent. (In fact, though they are much less user-friendly, so do public keys.)

The challenge lies in the second half of the equation: unidirectional identifiers. None of the identifier systems named above were designed to meet the requirement of easily producing and managing private unidirectional identifiers that are not public and do not provide the “correlation handles” Kim refers to.

For example, I’ve always thought it amusing that phone companies charge you extra for NOT publishing your phone number. After all, aren’t they saving work and paper? In fact not – phone numbers were designed to be omnidirectional identifiers, and any attempt to try to constrain that omnidirectionality requires extra work on the part of the phone company (and many other parties).

The same goes for publicly available DNS infrastructure. When registering the domain name “equalsdrummond.name” I was astounded that it cost me MORE to keep my registration information private (using a proxy registration service for the Whois listing) than I paid for the name itself!

As Mark Baker pointed out in his feedback on the Second Corollary, the situation is slightly better with email – services like Hushmail exist to help you register anonymous, privacy-protected email addresses. Unfortunately by themselves these don’t fulfill the requirements for “unidirectional” identifiers. If you reuse an email address — or any other identifier — across websites it renders it as much of a correlation handle as a real-world name, phone number, or URI.

This means unidirectional identifiers must be generated on a per-relationship basis – a requirement that is anything but trivial. Bell Labs developed an entire email technology, Target-Revocable Email Addresses, to do this. The Liberty Alliance Project bent over backwards to bake pseudononymity into its architecture. So does WS-Trust.

[Warning: stepping on my XRI soapbox now.]

So here’s a simple way to look at the XRI 2.0 specifications from OASIS: they are the first identifier specifications that provide equal support for both omnidirectional and unidirectional identifiers. In other words, they provide a uniform syntax and resolution protocol for both human-friendly, reassignable i-names and machine-friendly, persistent i-numbers. The former are designed explicitly for public, reusable, omnidirectional identifiers, while the latter are ideal for private, one-time, machine-generated unidirectional identifiers (though not all i-numbers will be unidirectional – some will serve as synonyms for omnidirectional i-names.)

XRIs also go one step further in supporting the Fourth Corollary: because XRIs are abstract, the XRI resolution protocol enables XRI authorities to control access to the attributes of an omnidirectional XRI like an i-name. In some cases this may lessen the need for unidirectional identifiers, but in all cases it helps fulfill the First Law requirement that every authority should have control over the release of its information.

(A case-in-point is my own i-name contact page at =Drummond. If you don’t already have my email address, please send me any comments there.)

Posted in General, Identity Commons, XRI | Leave a comment

The Third Corollary of Identifiers

[This is the third of seven proposed “Corollaries of Identifiers” to Kim Cameron’s Laws of Identity.]

Kim’s Third Law is the one he used to explain the failure of MS Passport:

3. The Law of Fewest Parties

Technical identity systems MUST be designed so the disclosure of identifying information is limited to parties having a necessary and justifiable place in a given identity relationship.

Passport violated this law by putting a third party – the Microsoft Passport authentication database – between every website and the users who wanted to authenticate themselves to that website. As Kim explains, this was as certain to lead to failure as a bridge designer ignoring the Law of Gravity when designing a bridge.

So here’s the corollary for identifiers:

3a. The Corollary of Fewest Identifiers

Technical identifier systems MUST be designed so the disclosure of identifying information (including other identifiers) is limited to parties having a necessary and justifiable place in a given identity relationship.

Note that the only difference between the Third Law and the Third Corollary is the reference to “identifiers” instead of “identity”. More than anything what this highlights is the critical role of identifiers in any type of digital identity infrastructure. There are two fundamental reasons:

  1. Every identifier inherently reveals a relationship between the resource it identifies (such as a person or organization) and the authority responsible for assigning the identifier. Thus for certain types of identification relationships, the very existence of the identifier can potentially reveal sensitive information.
  2. Every identifier is a “lightning rod for data”. Simply put, an identifier is a path to the data it represents – even if the identifier is not itself directly resolvable.

On the latter point, Fen Labalme likes to tell the story of the data aggregator that (privately) says they need just two items of data about a person, such as their age and zip code, to identify them with about 98% certainty. This goes to show that in the age of Google, any identifier, even traditionally public, non-resolvable identifiers such as a person’s real-world name, are suddenly “resolvable” in an entirely new way. This capacity – the ability to look up information about a person knowing only their name and perhaps their company, industry, or school – that has led to popular adoption of the term “Googling someone”.

So, in the age of Google, how are digital identity systems supposed to conform to the Third Corollary? How can they use identifiers that limit disclosure of identifying information to necessary and justifiable parties? The answer jumps us forward to the Fourth Corollary (coming later this week), but to preview:

  • Use unidirectional identifiers whenever possible (private identifiers or “pseudonyms” that only resolve in the context of a specific identification relationship).
  • When using public, omnidirectional identifiers, make them abstract so they can maintain the privacy of the real-world authority they represent.

(Speaking of omnidirectional identifiers, if you don’t have my email address, please send any comments through my i-name contact page at =Drummond.)

Posted in General, Identity Commons, XRI | Leave a comment

Mike Phillips on Digital Citizenship

Mike Phillips, Chairman of Frank Russell Company and one of the most progressive thinkers I know about the convergence of digital identity and the real world of commerce and government, had this to say about the Laws and the Corollaries:

Kim Cameron is wonderfully refreshing and it is outlandish that he works for Microsoft in such a senior role. If his thoughts can prevail there maybe they are in for a whole new iteration of growth.

I think there is a relevance of digital identity to outsourcing. Outsourcing of jobs is not new, manufacturing jobs have been leaving the US for decades. The difference now is that people are physically located in one place (say, India) but essentially working in the US. This causes problems. Nations cannot tax, regulate or sanction these people. We clearly need to differentiate between someone’s physical identity, and their digital identity when it comes to the business process. We can regulate and have sanctions over people’s physical identity but it is tough right now to do this with their digital identity even in a self governing way.

Is it not likely that in the long term the issue of persistent identity becomes an issue of citizenship? We cannot regulate fungibility enabled by the digital world by attempting to control the atomic identities of people. We can only do it by regulating their digital identities. Once we can do that, it actually becomes easier than regulating atomic identity. In fact you can operate outside the realm of regulation and control of the atomic world. Transients, criminals, mountain men etc all do this. Given that one’s digital identity HAS to exist in a machine friendly environment, regulations, sanctions, rules actually are easier because one cannot exist in an alternative digital environment.

So maybe we will develop a dual citizenship structure over the next few decades; a physical identity or citizenship, and a digital one. Nation states are physical entities and the political process governing them will find it hard to cope with digital citizenship. Governments will find this very challenging, but there won’t be that much they can do about it. When things stabilize, digital citizenship will require some form of supra-national supervision and rule enforcement which goes well beyond the current policing structures of the Internet. Kim Cameron’s rules seem to be a great place to begin this process. An essential feature of this would seem to be self-empowerment and self-regulation.

This may be the human race’s only real hope of World government in the foreseeable future. As you listen to Drummond and Kim, the refreshing thing is that it has a chance of being global self government. As digital interaction between humans becomes more core to the economic life of the planet, the evolution of persistent digital identity into true citizenship is an exciting prospect. [The Laws and the Corollaries] hold the keys to the next steps. I am eagerly watching developments!

I’ve been telling Mike that he needs to start blogging. I’d be his first subscriber. I couldn’t agree more that the intersection of digital identity, commerce, and citizenship may the loudest noise in the Big Bang of a universal identity metasystem.

Posted in General, Identity Commons, Social Web, XRI | Leave a comment

Andy Dale on the Second Corollary

Andy Dale sent me this comment about the Second Corollary:

Drummond, you say:

“[Concrete identifiers such as an email address] reveal a direct method of interacting with me (as would a phone number, fax number, IM address, postal address, etc.)”

This is an argument you also made in the First Corollary. I want to point out that my i-name [XRI] is also a direct method of interacting with me. BUT, I maintain control of the channels of communication so I don’t have to be protective of it.

I give out my home address (fairly) freely because I trust the security (my dog) to help me manage and maintain control of ingress and egress, much as I trust my authentication service and related communications service providers.

Andy is correct — I keep referring as XRIs as abstract identifiers that do not reveal a direct method of interaction with the resource they represent, particularly when the resource is a person who wishes to keep those methods of interaction private. Andy’s point is that XRI resolution CAN provide such a direct interaction method (such as i-name contact pages), but that due to the additional level of indirection, the XRI authority can control the use of this method of interaction.

Net net: XRIs for people can provide the best of both worlds – direct interaction and privacy protection.

Posted in General, Identity Commons, XRI | Leave a comment

The Second Corollary of Identifiers

[Note: This is the second of seven proposed “Corollaries of Identifiers” for Kim Cameron’s Laws of Identity. See the First Corollary for more background info.]

Kim’s Second Law follows closely from his First Law:

2. The Law of Minimal Disclosure

The solution which discloses the least identifying information is the most stable, long-term solution.

2a. The Corollary of Minimal Disclosure for Identifiers

The identifier which discloses the least identifying information is the most stable, long-term identifier.

At first reading, this corollary seems tantamount to a prescription for URNs (Uniform Resource Names). It has long been a maxim that if you want a long-term, persistent, stable identifier for a resource, the identifier itself must contain little or no semantics, because semantics are always subject to change. By this maxim, either of the following two identifiers (a conventional UUID expressed as a URN, and persistent XRI) are ideal from the standpoint of minimal disclosure:

urn:uuid:f0502a17-4503-4463-8516-f1225b330e4d
=!(!762A!C40D!28E7!BB9C)

By contrast, the following globally-unique identifiers (XRIs) contain real-world semantics that may change over time:

=Drummond
@Cordance*Drummond
@Cordance*(=Drummond)

However, all of the XRIs above contain less identifying information than the following globally-unique identifiers (DNS names and email addresses):

equalsdrummond.name
drummond@example.com

Why? The first is a registered DNS name that requires the registration of real-world contact data which, even though registered using a proxy registration service (that cost me as much as the name itself!), is still available should someone have an important enough reason to identify me as the real-world owner of this domain name (were I not publicly blogging about it).

The second, an email address, reveals a direct method of interacting with me (as would a phone number, fax number, IM address, postal address, etc.)

So a first observation about the Second Corollary is that it is best served by abstract identifiers – identifiers that by themselves do not reveal a direct interaction method with a resource, but must first be resolved into one or more concrete interaction addresses.

A second observation is that abstract identifiers themselves fall into two classes: those that contain the very least identifying information (and thus can serve as the most persistent, as with the first set of examples above), and those that contain some degree of real-world semantic information and therefore may be less persistent — but much easier for ordinary mortals to use (like the second set of examples).

[Caution: XRI soapbox follows. Full disclosure that I am co-chair of the OASIS XRI TC.]

XRIs are, to my knowledge, the only abstract identifiers that natively support both of these classes: persistent XRIs (called i-numbers) and reassignable XRIs (called i-names) — or any combination of the two within a single XRI. A more detailed discussion of how XRI syntax does this is in section 3.1 of the Introduction to XRIs document published by the OASIS XRI TC as part of the current OASIS public review.

As we’ll see in future Corollaries, a unified syntax for both i-names and i-numbers allows XRIs to support any point in the continuum of perpetually persistent to rapidly reassignable, while at the same time supporting any point in the continuum of zero disclosure (disclosing no real-world identifying information) to full disclosure (such as disclosing one’s full legal name).

(Since I’m on the minimal disclosure side myself, unless you already have my email address, please send any comments through my i-name contact page at =Drummond.)

Posted in General, Identity Commons, XRI | Leave a comment

Mark Baker on the First Corollary

Mark Baker, one of the “gods of REST” whose work I have referenced many times in my work on the XDI protocol at OASIS, makes some excellent points in his commentary on the First Corollary. To my contention that many domain names break the First Corollary because they require public Whois data about a registrant, he says:

DNS does certainly require a small amount of information be made available, and though I’m hardly a historian, the little I do know of the history of this data suggests that it represents the minimum amount that a mature industry – which has had to balance the needs of domain owners (anonymity) with those of the public at large (accountability) over many years – has reached concensus on requiring. So I doubt that any competing centralized solution would be able to reach widespread deployment without, in the steady state, providing a similar amount of info about registrants.

Also, who says that there’s a direct correspondence between a DNS name and the person who uses the email address? I don’t own gmail.com, nor yahoo.com, yet have email addresses at both of those domains. Google and Yahoo, in offering an email service, provide a degree of anonymity via proxy; if you want to learn more about me there, you have to go through them, and I’m not required to publish any info about myself there.
Hushmail‘s probably the extreme case here, as they seem to exist to provide as-anonymous-as-possible email services.

Mark is right that the generalizations I made about privacy and DNS in the First Corollary were too strong. I agree with him that DNS has evolved a balance between anonymity and accountability (the balancing factors of which I think brilliantly are discussed in The Accountable Net paper originally inspired by Esther Dyson.)

I don’t agree with his contention, however, that any other federated identifier infrastructure must end out “providing a similar amount of info about registrants”. While accountability ultimately requires identifiability at some level, as The Accountable Net points out there are other (and arguably more effective) ways to provide it than direct public disclosure of identifying information. The XDI.ORG solution for global i-name/i-number accountability is only one example.

On Mark’s second point, about the privacy of email addresses, I completely agree with him that they can protect the real-world identity of the owner. I was trying to make a slightly different point, which is that an email address inherently discloses a method of interaction with its owner — less-than-ideal from the standpoint of the First Corollary. For example, giving a website a Hushmail address when registering may not reveal any personally identifying information about me, yet it still gives the website a way to send me email (unless I never use the account, which has its own drawbacks).

So having a way of being able to identify and authenticate oneself online without providing an email address, which is an advantage of LID, SXIP, and other digital identifier systems in addition to XRI i-names and i-numbers, gives users greater control under the First Corollary. Which leads us nicely to the Second Corollary…

Posted in General, Identity Commons, XRI | Leave a comment

The inimitable PeterD

In keeping with my pledge to introduce new links on my blogroll, herewith the inimitable Peter Davis and his Identity4All blog. Peter is part of the powerhouse tech team assembled by CTO Mark Foster at NeuStar to create the world’s most innovative registry and network interconnection services. No wonder NeuStar is poised to be the first XRI global registry services provider – as abstract identifiers, XRIs are perfect to bridge the multiple networks and communications protocols that NeuStar serves, from wired to wireless to Internet to [insert next new new internetworking thing here].

Posted in Blogging, General, XRI | Leave a comment

First Corollary of Identifiers

Kim Cameron published his Laws of Identity for one central reason:

“People who work on or with identity systems need to obey the Laws of Identity. When we don’t, we leave behind us a wake of reinforcing side-effects that eventually undermine all resulting technology. The result is similar to what would happen if civil engineers were to flaunt the law of gravity.

“The Laws of Identity are not about the ‘philosophy of identity’ – which is a compelling but entirely orthogonal pursuit.

“Instead, they define the set of ‘objective’ dynamics that constrain the definition of an identity system capable of being widely enough accepted that can serve as a backplane for distributed computing on a universal scale. Our goal is to change the identity conversation enough that its laws are no longer argued as ‘moral imperatives’, but rather as explanations of dynamics which must be mastered to craft such a universal system.”

I am a strong proponent of Kim’s laws because I believe his rationale is so sound: by extracting and distilling the natural laws of identity systems, we can avoid designs for a universal identity metasystem that don’t conform, just as a mechanical engineer can eliminate bridge designs that don’t conform to the law of gravity.

When Kim published his Fourth Law (the Law of Directed Identity), it was the first (and only) law that touched directly on identifiers. I knew his Laws had gained quite a following when I quickly received several email messages asking if XRIs (Extensible Resource Identifiers), the new OASIS specifications for abstract identifiers, conformed to the 4th Law.

In discussing this with other members of the XRI TC, as well as with Kim, we realized that each of his “Laws of Identity” has a “Corollary For Identifiers”. In particular, these corollaries would apply to any universal identifier metasystem that aspired to be the addressing scheme for the “mega momma backplane” (as Kim, Marc Canter, and Craig Burton put it.)

That, of course, is precisely the goal of the OASIS XRI effort dating back to 2003 (and previously to the XNS work dating back to 1999.) Given that the XRI 2.0 specifications are currently in public review in advance of a full OASIS vote, now seems like a good time to follow Kim’s lead and publish “The Seven Corollaries of Identifiers”.

1. The Law of Control

Technical identity systems MUST only reveal information identifying a user with the user’s consent.

1a. The Corollary of Identifier Control.

The identifiers in a universal identifier metasystem MUST only reveal information identifying a user with the user’s consent.

Funny how intuitive it seems when you put it this way. A user’s online identifier should not force the user to reveal any more information than they wish. And yet one of the online identifiers most frequently requested from users squarely violates this principle: an email address. Websites who require an email address to register – and many have no choice because it is often the only easy, universal way to perform basic user authentication – force individuals into revealing information that in many cases they would rather not.

So half the Web breaks this corollary before we’re even out of the starting gate. But it gets worse. Look at one of the current bulwarks of online identification: DNS. A standard requirement for most DNS name registries is accurate, current contact data for the registrant that is published publicly as “Whois” data. Although many registrars now offer proxy registration services to preserve registrant privacy and prevent spam, there’s no escaping that a major component of our current Internet identifier infrastructure breaks the First Corollary squarely in two.

So can XRIs fix this problem? Yes. The first principle of XRI architecture is that XRIs are abstract – the association between an XRI and the real-world resource it represents is entirely under the control of its XRI authority (the person or organization registering the XRI, at any level of delegation). So nothing in an XRI need reveal anything about the authority’s identity or messaging address.

So how can the identifier be authenticated, i.e., what’s the XRI equivalent of the simple email address verification test that websites use every day? The ISSO (I-Name Single Sign-On) protocol, which combines XRI 2.0 resolution with SAML 2.0 authentication assertion exchange. It’s easier, faster, and much more secure than email authentication – and still does not require revealing any other information identifying the user.

So that fixes the first problem. What about the second – the DNS “Whois” problem? What registrant data is required when registering an XRI? Here I can only speak for the XRI global registry services to be offered by XDI.ORG. Based on its Global Services Specifications (GSS) that have been in public review since December, the answer is: none. Following XDI.ORG’s Minimum Information Policy, a cornerstone of its Data Protection Policies, the XDI.ORG global registries will store only registered XRIs, resolution values, and authentication credentials. There is no public (or private) “Whois” service. (There is a Public Trustee Service that provides an alternate means of authenticating a registrant to XDI.ORG if they lose their registration credential, but that data is entirely private.)

So what provides accountability for global registrations? Dispute Notification Service. Every global XRI registrar is required to provide a means of forwarding authenticated dispute notifications to a registrant. This accomplishes the same goal as DNS Whois service but without revealing registrant identifying data or exposing registrants to spam.

Enough already. We’ve got six more Corollaries to go. But even the First Corollary alone suggests that Kim’s universal identity metasystem might have a good partner in XRIs as a universal identifier metasystem.

Speaking of protecting privacy, please send any comments to =Drummond, my i-name contact page.

Posted in General, XRI | Leave a comment

The Personal XDI Server

Andy Dale posted another head-banger on his Tao of XDI blog about personal XDI servers. It sounds like science fiction, but no one knows better than Andy and ooTao how real it is becoming with their alpha XDI code.

I could spend all day sharing the thoughts that Andy’s post sets off like fireworks, but I have to blog one Piccolo Pete he set off on the phone with me just now: the XDI watch. “Why on earth would I want a personal XDI server on my watch?” I asked him. “To tell you what you really want to know when you look at it,” he replied. “Not what time it is, but what you need to do next, and when.”

As a dues-paying member of the Clan of the Perpetually Tardy, I gasped. What better place to have all my schedules in all my contexts (family, work, sports, social) sync’d up than on my watch?

With one protocol to share and sync this data between every person and community on the Social Web, suddenly I can see this science-fiction scenario coming to a Best Buy near you within the next 5 years.

Or less. After all, how much would you pay for a watch that could do that? (Seiko, are you listening?)

Posted in General, Social Web, XDI | Leave a comment

Comments turned off, i-name turned on

I think it’s pretty ironic that it took Kim Cameron adding his i-name to his blog (see the right-hand frame below “Recap of the Laws of Identity”) to show me how turn off comment spam. I don’t know about others, but I started receiving it almost the day I started my blog. Drives me nuts because the email that should be the MOST relevant — comments directly on your blog posts — is actually the most irritating.

It took only about a minute to add a Comments link to my i-name contact page (see the upper right-hand corner). Now any comment can be authenticated by my i-broker, 2idi, automatically. Not quite as handy as a direct trackback, but it eliminates comment spam completely, and I like to hear directly from anyone who’d interested enough to comment.

Other good ideas about using i-names in the blogosphere? Let me know via my i-name contact page at =Drummond. (Now you know where the name of the blog came from.)

Posted in Blogging, General, XRI | Leave a comment

The Tao of XDI

Andy Dale, CEO of ooTao has started a blog called The Tao of XDI that gets my vote for “best themed blog of 2005”. Of course, I’m only slightly biased.

Seriously, Andy is the Chuck Yeager of XDI. He and his team at ooTao are pushing the XDI envelope as fast as it can expand. The OASIS XDI TC has taken the position from the start that it would like proposed XDI specifications proven out in implementations before anything is brought to a vote, and Andy is demonstrating this wisdom by starting to exercise the XDI universal schema and REST protocol model in very practical ways.

Use his i-name contact page to ask him about his XDI viewer that uses SVG to display XDI documents as visual XDI graphs, including showing how link contracts and rights paths automatically select the permissioned portion of an XDI document.

The Tao of XDI promises to be the focal point for many an XDI design discussion or revelation. Go Andy!

Posted in Blogging, General, XDI | Leave a comment

Kim's the real thing

Eric Norlin posted a great piece about Kim Cameron as the news started to come out about InfoCards (an MS codename) this week. Kim himself explains how the story started coming out without anyone ever checking with him.

I just want to go on record that Kim is 100% the real thing. I’ve never met anyone like him. The Laws didn’t come from any preconceived agenda or marketing spin, they came straight from the heart of Kim’s lifetime of messaging and metadirectory experience and his passion for creating a true Internet-wide identity infrastructure that will finally usher in what he calls “the big bang” — the explosion of new applications that will be possible with authenticated online trust relationships (also known as the Social Web.)

As he began to talk to the open standard/open source/open trust community about the basic principles and architecture underlying InfoCards — and the fact that it must be an open, platform-independent solution that we all agree to, not unlike TCP/IP itself — he ran into a steady stream of gaping jaws. Could this be this the same Microsoft that had only three years ago proposed Passport and Hailstorm to the world?

Well, it’s not the same Microsoft. It’s the Kim Cameron-inspired Microsoft. Call me a starry-eyed optimist, but to put a twist on my favorite quote from Margaret Mead : “Never doubt that a small group of thoughtful, committed citizens can change Microsoft. Indeed, it’s the only thing that ever has.”

Kim needs our support to pull this off. He’s got mine.

Posted in Blogging, General, Social Web | 1 Comment

The calm before the storm

Why so quiet of late? First because the OASIS XRI TC was completely heads-down finishing the XRI 2.0 specifications. They were unanimously approved as a Committee Draft on March 14, and now have entered a 30-day public review period (required before any Committee Draft goes to a full OASIS vote.) I strongly encourage review and feedback by anyone who cares about abstract identifiers and Internet infrastructure. You can access all the specs as well as the Comments link directly off the XRI TC home page.

Then there was completion of the XDI.ORG Global Services Specifications (GSS). These are the specs that will govern global XRI registration and resolution services from XDI.ORG. They have been in public review since late December but have been awaiting completion of XRI 2.0 before approval by the XDI.ORG trustees. Now we are rolling in a handful of changes (mostly based on the more powerful features of XRI 2.0 resolution) before they go into production. Again, public review and feedback of the GSS specs is strongly encouraged by anyone who cares about Internet infrastructure for persistent identity and trusted data sharing.

On top of this there’s the ongoing “Identity Gang” conversation with Doc Searls, Craig Burton, Kim Cameron, Marc Canter, Dick Hardt, Owen Davis, Kaliya Hamlin, Jan Hauser, and others. We just met again last Sunday in Phoenix on the opening day of Esther Dyson’s PC Forum conference. It was a great conversation that is starting to become very focused on how Internet identity infrastructure can unify around a single harmonious “metasystem” (to use Kim’s and Craig’s term) that fully encompasses both personal and commercial identity. Just keeping up with this conversation while trying to build one piece of this metasystem leaves zeeeeeeero time left over.

Anyway, once these various specs are done I hope I’ll come up for air, although any way you look at it it’s going to be a wild spring as we work through the XRI 2.0 vote, prepare for the OASIS Symposium, head into Digital ID World, and prepare for the XDI.ORG registry launch.

I’m going to need a loooooooong summer vacation this year.

Posted in General, Identity Commons, XRI | Leave a comment

Extending Identity Mgmt's Realm

John Fontana of Network World just published a nice article in CIO Today called Extending Identity Management’s Realm that points out the central role identifiers play in identity management infrastructure, especially when it is extended beyond people to “all things”.

This is exactly the job XRIs were designed for, as I’ll discuss more once the Introduction to XRIs publication from the OASIS XRI TCis ready next week (the XRI 2.0 vote is now scheduled for Monday the 14th).

Posted in General, Identity Commons, XRI | Leave a comment

XRIs vs. URLs (Preview)

As the OASIS XRI Technical Committee heads into the final stages of completing the XRI 2.0 specifications (currently scheduled for a Committee Draft vote on March 11), I’m spending a bunch of time on the XRI Primer, the first general-audience document that addresses the question, “Why would I want to use XRIs? What problems do they help me solve?”

An early preview of the type of content that will be available is the answer I just posted to a question on the Identity Commons i-broker mailing list. It addresses the topic of the advantages of XRIs vs. URLs when it comes to two key areas: persistent identity and semantic integration. (If you have any burning questions about XRIs that you’ve been dying to see answered in the XRI Primer, please let me know via my i-name contact page at =Drummond.Reed.)

Once the XRI Primer is published, I’m working with other XRI TC members on what we hope will be a fascinating series of blog entries that will help shed light on where XRIs fit into the emerging “Identity 2.0” picture, and specifically into Kim Cameron’s enormously powerful Laws of Identity.

Posted in General, Identity Commons, XRI | Leave a comment

Chris Allen & Life with Alacrity

I met Chris Allen two years ago at PlaNetwork and for the first time got the full story on how TLS (the successor to SSL) came into being. Chris is the man responsible, and after that modest accomplishment, he’s now carefully discerning the most significant developments in social software. His blog, Life With Alacrity, is highly recommended to anyone interested in the development of the Social Web.

Posted in Blogging, General, Social Web | Leave a comment