• Home
  • About
  • Contact
  • Privacy
  • Terms
  • DCMA
  • Write For Us / Submit
Tech News, Magazine & Review WordPress Theme 2017
  • Tech
    Silhouette of smartphone with Facebook, Messenger, whatsApp, Instagram, Oculus apps and blurred META logo on background.

    Meta Aims to Encrypt All Facebook Messenger Chats – Review Geek

    How Trump changed Facebook - Vox

    How Trump changed Facebook – Vox

    Facebook's Message Encryption Was Built to Fail

    Facebook’s Message Encryption Was Built to Fail

    Parents are introducing kids to the original starter Pokémon on TikTok

    Parents are introducing kids to the original starter Pokémon on TikTok

    Facepalm: USPTO Grants Ohio State University Trademark On The Word ‘The’

    Teaching Content Moderators About How To Moderate Is Tough, But TikTok’s Partner Using Actual Child Sexual Abuse Material Is Likely Criminal

    Will Europe Force a Facebook Blackout?

    Will Europe Force a Facebook Blackout?

    Deepfakes on the rise as tools for cyberattacks, report finds

    Deepfakes on the rise as tools for cyberattacks, report finds

    The 10 Best Pokemon Gift Ideas for Geeky Adults and Friends

    The 10 Best Pokemon Gift Ideas for Geeky Adults and Friends

    Hashtag Trending June 28 – ‘how to move to Canada’ surges in searches; MacBook Pro M2 SSD speed; streaming ‘moochers’ may not pay for a sub

    Hashtag Trending Aug 4 – Facebook ends live shopping feature; Motorola cancels foldable phone launch event; Robinhood fires 23 per cent of staf

  • Gear
    • All
    • Camera
    • Laptop
    • Smartphone
    Moonside Neon Lighthouse Blue Light On Desk

    A Simple, Sleek Smart Lamp – Review Geek

    Cyberize One 65W PD power adapter

    65W PD power adapter, SSD, hub and 4K dock

    convergence roads merger aquisition

    Visual Studio Code 1.70 eases title bar customization

    Image showing the blue bubbles vs. green bubbles from Google's latest campaign against iMessages.

    Google is absolutely terrified of iMessage on the iPhone

    Google's Android Red Team Had a Full Pixel 6 Pwn Before Launch

    Google’s Android Red Team Had a Full Pixel 6 Pwn Before Launch

    Intel launches their Arc Pro A-series GPUs for professional workstations and laptops

    Intel launches their Arc Pro A series GPUs for professional workstations and laptops- Technology News, Firstpost

    Trending Tags

    • Best iPhone 7 deals
    • Apple Watch 2
    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • iOS 10
    • iPhone 7
    • Sillicon Valley
  • Apps
    Sloppy Software Patches Are a ‘Disturbing Trend’

    Sloppy Software Patches Are a ‘Disturbing Trend’

    Cyber Security Today for June 29, 2022 — A list of the most dangerous software weaknesses is updated, a warning to Kubernetes administrators, and more

    Cyber Security Today, August 10, 2022 – Bad apps are found in the PyPI repository, six backdoors are used in a gang’s cyber attacks, a new botnet found and more

    Software development

    IT leaders struggle with application modernization, survey finds

    travel apps

    Travel Easy with These Android Apps

    GitHub moves to protect open-source software from supply chain attacks

    GitHub moves to protect open-source software from supply chain attacks

    Amazon Fire Tablet.

    How to Install the Google Play Store on an Amazon Fire Tablet

  • Gaming
    Future of esports in a country economy

    Future of esports in a country economy

    10 Awesome PC Gaming Accessories and Peripherals Worth Getting

    10 Awesome PC Gaming Accessories and Peripherals Worth Getting

    M'sia bags 3 golds at the Commonwealth Esports Championships

    M’sia bags 3 golds at the Commonwealth Esports Championships

    Microsoft Testing PC Game Pass Widget for Windows 11

    Microsoft Testing PC Game Pass Widget for Windows 11

    Genshin Impact game artwork

    10 Best Crossplay Games for Consoles and PC (2022): Xbox, PlayStation, Switch, Mobile

    Activision Blizzard makes more money from mobile games than PC and console combined

    Activision Blizzard makes more money from mobile games than PC and console combined

  • Crypto
    Silhouette of smartphone with Facebook, Messenger, whatsApp, Instagram, Oculus apps and blurred META logo on background.

    Meta Aims to Encrypt All Facebook Messenger Chats – Review Geek

    How Trump changed Facebook - Vox

    How Trump changed Facebook – Vox

    Facebook's Message Encryption Was Built to Fail

    Facebook’s Message Encryption Was Built to Fail

    Parents are introducing kids to the original starter Pokémon on TikTok

    Parents are introducing kids to the original starter Pokémon on TikTok

    Facepalm: USPTO Grants Ohio State University Trademark On The Word ‘The’

    Teaching Content Moderators About How To Moderate Is Tough, But TikTok’s Partner Using Actual Child Sexual Abuse Material Is Likely Criminal

    Will Europe Force a Facebook Blackout?

    Will Europe Force a Facebook Blackout?

    Deepfakes on the rise as tools for cyberattacks, report finds

    Deepfakes on the rise as tools for cyberattacks, report finds

    The 10 Best Pokemon Gift Ideas for Geeky Adults and Friends

    The 10 Best Pokemon Gift Ideas for Geeky Adults and Friends

    Hashtag Trending June 28 – ‘how to move to Canada’ surges in searches; MacBook Pro M2 SSD speed; streaming ‘moochers’ may not pay for a sub

    Hashtag Trending Aug 4 – Facebook ends live shopping feature; Motorola cancels foldable phone launch event; Robinhood fires 23 per cent of staf

  • Business
    Silhouette of smartphone with Facebook, Messenger, whatsApp, Instagram, Oculus apps and blurred META logo on background.

    Meta Aims to Encrypt All Facebook Messenger Chats – Review Geek

    How Trump changed Facebook - Vox

    How Trump changed Facebook – Vox

    Facebook's Message Encryption Was Built to Fail

    Facebook’s Message Encryption Was Built to Fail

    Parents are introducing kids to the original starter Pokémon on TikTok

    Parents are introducing kids to the original starter Pokémon on TikTok

    Facepalm: USPTO Grants Ohio State University Trademark On The Word ‘The’

    Teaching Content Moderators About How To Moderate Is Tough, But TikTok’s Partner Using Actual Child Sexual Abuse Material Is Likely Criminal

    Will Europe Force a Facebook Blackout?

    Will Europe Force a Facebook Blackout?

    Deepfakes on the rise as tools for cyberattacks, report finds

    Deepfakes on the rise as tools for cyberattacks, report finds

    The 10 Best Pokemon Gift Ideas for Geeky Adults and Friends

    The 10 Best Pokemon Gift Ideas for Geeky Adults and Friends

    Hashtag Trending June 28 – ‘how to move to Canada’ surges in searches; MacBook Pro M2 SSD speed; streaming ‘moochers’ may not pay for a sub

    Hashtag Trending Aug 4 – Facebook ends live shopping feature; Motorola cancels foldable phone launch event; Robinhood fires 23 per cent of staf

No Result
View All Result
Geeky Insider
  • Tech
    Silhouette of smartphone with Facebook, Messenger, whatsApp, Instagram, Oculus apps and blurred META logo on background.

    Meta Aims to Encrypt All Facebook Messenger Chats – Review Geek

    How Trump changed Facebook - Vox

    How Trump changed Facebook – Vox

    Facebook's Message Encryption Was Built to Fail

    Facebook’s Message Encryption Was Built to Fail

    Parents are introducing kids to the original starter Pokémon on TikTok

    Parents are introducing kids to the original starter Pokémon on TikTok

    Facepalm: USPTO Grants Ohio State University Trademark On The Word ‘The’

    Teaching Content Moderators About How To Moderate Is Tough, But TikTok’s Partner Using Actual Child Sexual Abuse Material Is Likely Criminal

    Will Europe Force a Facebook Blackout?

    Will Europe Force a Facebook Blackout?

    Deepfakes on the rise as tools for cyberattacks, report finds

    Deepfakes on the rise as tools for cyberattacks, report finds

    The 10 Best Pokemon Gift Ideas for Geeky Adults and Friends

    The 10 Best Pokemon Gift Ideas for Geeky Adults and Friends

    Hashtag Trending June 28 – ‘how to move to Canada’ surges in searches; MacBook Pro M2 SSD speed; streaming ‘moochers’ may not pay for a sub

    Hashtag Trending Aug 4 – Facebook ends live shopping feature; Motorola cancels foldable phone launch event; Robinhood fires 23 per cent of staf

  • Gear
    • All
    • Camera
    • Laptop
    • Smartphone
    Moonside Neon Lighthouse Blue Light On Desk

    A Simple, Sleek Smart Lamp – Review Geek

    Cyberize One 65W PD power adapter

    65W PD power adapter, SSD, hub and 4K dock

    convergence roads merger aquisition

    Visual Studio Code 1.70 eases title bar customization

    Image showing the blue bubbles vs. green bubbles from Google's latest campaign against iMessages.

    Google is absolutely terrified of iMessage on the iPhone

    Google's Android Red Team Had a Full Pixel 6 Pwn Before Launch

    Google’s Android Red Team Had a Full Pixel 6 Pwn Before Launch

    Intel launches their Arc Pro A-series GPUs for professional workstations and laptops

    Intel launches their Arc Pro A series GPUs for professional workstations and laptops- Technology News, Firstpost

    Trending Tags

    • Best iPhone 7 deals
    • Apple Watch 2
    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • iOS 10
    • iPhone 7
    • Sillicon Valley
  • Apps
    Sloppy Software Patches Are a ‘Disturbing Trend’

    Sloppy Software Patches Are a ‘Disturbing Trend’

    Cyber Security Today for June 29, 2022 — A list of the most dangerous software weaknesses is updated, a warning to Kubernetes administrators, and more

    Cyber Security Today, August 10, 2022 – Bad apps are found in the PyPI repository, six backdoors are used in a gang’s cyber attacks, a new botnet found and more

    Software development

    IT leaders struggle with application modernization, survey finds

    travel apps

    Travel Easy with These Android Apps

    GitHub moves to protect open-source software from supply chain attacks

    GitHub moves to protect open-source software from supply chain attacks

    Amazon Fire Tablet.

    How to Install the Google Play Store on an Amazon Fire Tablet

  • Gaming
    Future of esports in a country economy

    Future of esports in a country economy

    10 Awesome PC Gaming Accessories and Peripherals Worth Getting

    10 Awesome PC Gaming Accessories and Peripherals Worth Getting

    M'sia bags 3 golds at the Commonwealth Esports Championships

    M’sia bags 3 golds at the Commonwealth Esports Championships

    Microsoft Testing PC Game Pass Widget for Windows 11

    Microsoft Testing PC Game Pass Widget for Windows 11

    Genshin Impact game artwork

    10 Best Crossplay Games for Consoles and PC (2022): Xbox, PlayStation, Switch, Mobile

    Activision Blizzard makes more money from mobile games than PC and console combined

    Activision Blizzard makes more money from mobile games than PC and console combined

  • Crypto
    Silhouette of smartphone with Facebook, Messenger, whatsApp, Instagram, Oculus apps and blurred META logo on background.

    Meta Aims to Encrypt All Facebook Messenger Chats – Review Geek

    How Trump changed Facebook - Vox

    How Trump changed Facebook – Vox

    Facebook's Message Encryption Was Built to Fail

    Facebook’s Message Encryption Was Built to Fail

    Parents are introducing kids to the original starter Pokémon on TikTok

    Parents are introducing kids to the original starter Pokémon on TikTok

    Facepalm: USPTO Grants Ohio State University Trademark On The Word ‘The’

    Teaching Content Moderators About How To Moderate Is Tough, But TikTok’s Partner Using Actual Child Sexual Abuse Material Is Likely Criminal

    Will Europe Force a Facebook Blackout?

    Will Europe Force a Facebook Blackout?

    Deepfakes on the rise as tools for cyberattacks, report finds

    Deepfakes on the rise as tools for cyberattacks, report finds

    The 10 Best Pokemon Gift Ideas for Geeky Adults and Friends

    The 10 Best Pokemon Gift Ideas for Geeky Adults and Friends

    Hashtag Trending June 28 – ‘how to move to Canada’ surges in searches; MacBook Pro M2 SSD speed; streaming ‘moochers’ may not pay for a sub

    Hashtag Trending Aug 4 – Facebook ends live shopping feature; Motorola cancels foldable phone launch event; Robinhood fires 23 per cent of staf

  • Business
    Silhouette of smartphone with Facebook, Messenger, whatsApp, Instagram, Oculus apps and blurred META logo on background.

    Meta Aims to Encrypt All Facebook Messenger Chats – Review Geek

    How Trump changed Facebook - Vox

    How Trump changed Facebook – Vox

    Facebook's Message Encryption Was Built to Fail

    Facebook’s Message Encryption Was Built to Fail

    Parents are introducing kids to the original starter Pokémon on TikTok

    Parents are introducing kids to the original starter Pokémon on TikTok

    Facepalm: USPTO Grants Ohio State University Trademark On The Word ‘The’

    Teaching Content Moderators About How To Moderate Is Tough, But TikTok’s Partner Using Actual Child Sexual Abuse Material Is Likely Criminal

    Will Europe Force a Facebook Blackout?

    Will Europe Force a Facebook Blackout?

    Deepfakes on the rise as tools for cyberattacks, report finds

    Deepfakes on the rise as tools for cyberattacks, report finds

    The 10 Best Pokemon Gift Ideas for Geeky Adults and Friends

    The 10 Best Pokemon Gift Ideas for Geeky Adults and Friends

    Hashtag Trending June 28 – ‘how to move to Canada’ surges in searches; MacBook Pro M2 SSD speed; streaming ‘moochers’ may not pay for a sub

    Hashtag Trending Aug 4 – Facebook ends live shopping feature; Motorola cancels foldable phone launch event; Robinhood fires 23 per cent of staf

Submit
Geeky Insider
No Result
View All Result

Identity, trust, and their role in modern applications

by Staff Writer
July 4, 2022
in Apps and softwares
Reading Time: 5 mins read
Identity, trust, and their role in modern applications
Share on FacebookShare on Twitter

In the software world, identity is the mapping of a person, place, or thing in a verifiable manner to a software resource. Whenever you interact with nearly anything on the internet, you are dealing with identities:

  • Facebook identity
  • Email address
  • Login name and password for a website

Everyone has multiple identities—multiple ways that people know who you are and interact with you in the virtual world. Here are a few of my identities:

READ ALSO

GitHub moves to protect open-source software from supply chain attacks

GitHub moves to protect open-source software from supply chain attacks

August 10, 2022
Amazon Fire Tablet.

How to Install the Google Play Store on an Amazon Fire Tablet

August 9, 2022
  • Twitter: @leeatchison
  • LinkedIn: leeatchison
  • Email address: lee###@####.com
  • Phone number: (360) ###-####

Each of these is a different way of identifying me to my friends, family, co-workers, partners, and vendors. You deal with identities all the time. Identities can represent more than people. Everything you interact with in the real world that has a presence in the virtual world has to deal with identity and identity management:

  • The money in your savings account or stock you own
  • The Uber driver that just dropped you off
  • Your shipping address
  • Inventory levels for the products that you sell
  • The pizza that you ordered online

Identity is everywhere. But when you need to correlate an item in the virtual world with an item in the real world, and you need to validate that they are one and the same—you require a way of identifying the item and validating the connection.

Bad actors are always trying to thwart this process. Whether they are trying to steal your login credentials to get access to your Instagram account, or trying to take ownership of your savings account to steal your hard-earned money, bad actors play havoc with our real lives when they thwart our identity in the virtual world.

Nearly every person and every company in existence today needs to deal with identity, and every executive, director, and manager needs to understand what identity management is about and why it’s important.

What makes up an identity?

An identity in the modern world typically is composed of three distinct segments:

  • Authentication. This is a method for associating an entity in the virtual world with its real-world equivalent. Typically, for a person using a website, this is logging on to the website using their username and password. But it could also be the bank account that is authenticated to belong to you, specifically, and not someone who looks like you or has the same name as you. Authentication is the connection between an entity in the physical world and its counterpart in the virtual world.
  • Authorization. This is the description of what the particular identity has access to or permission to use. For a user on a website, this is the permission they’ve been granted. For the bank account, it’s what type of deposits and withdrawals are allowed, and what account limits exist. Authorization is the permission given to identities in the virtual world.
  • Profiles/attributes. This is a set of information associated with the identity that can be used by the application, and related services, when interacting with the identity. For an identity representing a person, this could be their name, a photo, and their home address. For the bank account it could be the name of the account, account number, and account balance. Profiles or attributes are extended information available that describes the entity.

When you log in to Facebook, you make use of your Facebook identity. First, you log in using a username and password—this is authentication, and it confirms that you are the person associated with this Facebook identity.

You move to your favorite group and you start reading messages in that group. Before you are allowed to view the messages in the group, though, Facebook has checked to make sure you have the necessary permission to do so—this is authorization, and it confirms that this identity has access to interact with this particular group.

You click “New Post” and type a post you want to send to the members of the group. Facebook is doing further authorization checks to make sure you have all the correct permissions to, first, create new posts, and, second, to put that post into this particular group.

Finally, someone reads your post and wants to find out more about you. So, they click on your picture to find out who you are and what topics you are interested in. They are looking at your profile and other attributes to find out more information about the identity they’ve been interacting with.

Where trust comes from

Have you ever viewed a Facebook profile and wondered whether the information in the profile was accurate? Or, to bring up the worst-case scenario, have you wondered whether the person associated with the profile was actually real? It should be no surprise that there is no magic method of validating that the profile of an identity contains accurate and useful information about the real-world entity associated with the virtual identity. Or even if the person represented by the profile truly exists.

How can the online identity be useful without knowing whether or not the information it includes is accurate, or even real? Because there is nothing about the identity itself to give you that information, you instead have to rely on the applications that create, manage, and use the identity to ensure the identity is valid. This is a matter of trust.

In the modern internet world, trust is an attribute associated not with the virtual identity itself, but with the application that is making use of the entity.

When you view your account balance at the bank, you have trust in the bank, which gives you a belief that the account balance is accurate and the funds are available. The bank elicits a high level of trust from you.

When you view someone’s photograph on a dating application or public chat room, you have no trust that the application validated that photograph, and hence you may have little trust that it is a valid photograph of the person the identity represents. The dating site elicits very little trust from you.

Trust can be inherited. You may have no trust in the chat room application. But you likely have a higher level of trust that someone’s LinkedIn identity is a more accurate view of who they say they are. This is because you have a higher level of trust in LinkedIn than you do in that chat room app.

But what if the chat room application makes use of your LinkedIn profile to facilitate logging you in (authenticating you)—hence associating your chat identity with your LinkedIn identity. Then, the reliability that the chat application’s view of an identity is accurate, increases. The chat application’s trust has been increased.

Trust and trust sharing are indispensable to our belief in the validity of the services we interact with on the internet. Trust is important when dealing with e-commerce companies, absolutely essential when dealing online with our banks and bank accounts, and potentially a matter of life or death when dealing online with our medical providers. While our trust may be (appropriately) low for the random chat room, trust must be extremely high when dealing with critical systems.

The technologies underpinning identity and trust on the internet are constantly evolving to keep pace with the threats posed by bad actors, who are constantly working to exploit any weakness. We’ll continue to need better mechanisms that are stronger, faster, easier to implement, and easier to use, or we will lose the race to maintain safe and secure systems. The next generation of systems may even be less reliant on central authority, thanks to blockchain and related technologies.

Eventually, we should expect trusted identity-sharing to become commonplace, improving our ability to interact safely with one another in the online world. Someday, we might even stop worrying whether a Facebook profile is real.

Copyright © 2022 IDG Communications, Inc.

Source by www.infoworld.com

Related Posts

Sloppy Software Patches Are a ‘Disturbing Trend’
Apps and softwares

Sloppy Software Patches Are a ‘Disturbing Trend’

August 11, 2022
Cyber Security Today for June 29, 2022 — A list of the most dangerous software weaknesses is updated, a warning to Kubernetes administrators, and more
Apps and softwares

Cyber Security Today, August 10, 2022 – Bad apps are found in the PyPI repository, six backdoors are used in a gang’s cyber attacks, a new botnet found and more

August 11, 2022
Software development
Apps and softwares

IT leaders struggle with application modernization, survey finds

August 11, 2022
travel apps
Apps and softwares

Travel Easy with These Android Apps

August 10, 2022

Recommended.

Technology Helps Traffickers Hunt Their Victims, Enslave Them, Sell Their Organs — Global Issues

Technology Helps Traffickers Hunt Their Victims, Enslave Them, Sell Their Organs — Global Issues

August 3, 2022
hydra bot discord

How to Set Up and Use Hydra Bot on Discord

June 30, 2022

Trending.

AI in Retail: How Artificial Intelligence is transforming Retails

How Artificial Intelligence is transforming Retails

July 13, 2022
There are 10 benefits of working with a digital marketing company

The Benefits Of Working With A Digital Marketing Company

July 18, 2022
Facebook Accused of ‘Whitewashing’ India Human Rights Report

Facebook Accused of ‘Whitewashing’ India Human Rights Report

July 14, 2022
SFI’s Insight partners with Cadence to use quantum computing in chip design

SFI’s Insight partners with Cadence to use quantum computing in chip design

July 15, 2022
Facebook considering allowing 5 profiles per account #1612

Facebook considering allowing 5 profiles per account #1612

July 15, 2022
Geeky Insider

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Check our landing page for details.

Categories

  • Android
  • Apple
  • Apps and softwares
  • Articles
  • Business
  • Camera
  • Crypto
  • Education
  • Entertainment
  • Gadget and Gear
  • Gaming
  • How To
  • Laptop
  • Marketing
  • Microsoft
  • Review
  • Security
  • Smartphone
  • Technology

Submit a Techy Post | Write For Us

Feel free to contact us for submission queries. via contact form or email us at [email protected].

  • Home
  • About
  • Contact
  • Privacy
  • Terms
  • DCMA
  • Write For Us / Submit

© 2022 GeekyInsider.com

No Result
View All Result
  • Home
  • Review
  • Apple
  • Apps and softwares
  • Gaming
  • Gadget and Gear
    • Camera
    • Smartphone
  • Microsoft
  • Security