Who Controls Identity on the Web?

The race to own your virtual identity is on. In announcements made just days apart at the end of April, Facebook and the Mozilla Foundation launched parallel efforts to extend the way users are identified and connected on the Web.

The two approaches are fundamentally different. Facebook’s Open Graph Protocol uses the oAuth standard, which lets a website identify a user via a third-party site without exchanging sensitive information. Facebook–whose 400 million active users make it the world’s largest social network in the world–stands to benefit as other sites come to rely on the information it holds about users and their social connections.

The approach taken by the Mozilla Foundation, which makes the Firefox browser, comes in the form of a suite of browser extensions. One of the extensions, called Account Manager, can replace all of a user’s online passwords with secure, computer-generated strings that are encrypted and protected with a single master password. Mozilla’s identity extensions can interact with other identity standards, including OpenGraph, oAuth, and OpenID, a standard that allows any website or Web service provider to host a social network-style profile of a user. The goal of the Mozilla Foundation’s efforts is to establish a set of open standards and protocols that could be implemented in any browser or website.

As much as possible, identity would be moved out of the webpage itself and into the “chrome” of the browser–the parts around of the webpage. Logging in and out of sites would be accomplished through buttons at the top of the browser that would activate secure protocols–rendering the process of creating and memorizing usernames and passwords obsolete. Continue reading

Related Posts

Google Buzz Privacy Update Over the weekend, Google announced significant changes to its new social networking service, Buzz. Responding to criticism (including EFF's), Google ...
File-Sharing Software Potential Threat to Health Privacy The personal health and financial information stored in thousands of North American home computers may be vulnerable to theft through file-sharing sof...
A Primer on Information Theory and Privacy If we ask whether a fact about a person identifies that person, it turns out that the answer isn't simply yes or no. If all I know about a person is t...
Help EFF Research Web Browser Tracking What fingerprints does your browser leave behind as you surf the web? Traditionally, people assume they can prevent a website from identifying them...
The Evil That Apple Does Apple’s new iPad is going to be a laptop supplement for some early-adopters, a laptop replacement for others, and a laptop instead-of for still other ...
The Multiple Meanings of the Term “Open” Over the last couple of months I’ve found myself involved, both actively and passively, in several conversations that contained terms like “open” or “...

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


Leave a Comment

Your email address will not be published. Required fields are marked *

*