boedicca
Uppity Water Nymph from the Land of Funk
- Feb 12, 2007
- 59,439
- 24,109
- 2,290
So, the Obamanoids are working on what is in essence a National Cyber ID system.
If a National ID Card is a bad idea, why is having the Feds oversee a National Cyber Identity ECOSYSTEM any better?
making it that much easier for identity thieves.
The National Strategy for Trusted Identities in Cyberspace (NSTIC) envisions a cyber world - the Identity Ecosystem - that improves upon the passwords currently used to log-in online. It would include a vibrant marketplace that allows people to choose among multiple identity providers - both private and public - that would issue trusted credentials that prove identity.
For example, student Jane Smith could get a digital credential from her cell phone provider and another one from her university and use either of them to log-in to her bank, her e-mail, her social networking site, and so on, all without having to remember dozens of passwords. If she uses one of these credentials to log into her Web email, she could use only her pseudonym, "Jane573." If however she chose to use the credential to log-in to her bank she could prove that she is truly Jane Smith. People and institutions could have more trust online because all participating service providers will have agreed to consistent standards for identification, authentication, security, and privacy.
National Strategy on Trusted Identities in Cyberspace
This is to individual privacy what Card Check is to employee free choice.
If a National ID Card is a bad idea, why is having the Feds oversee a National Cyber Identity ECOSYSTEM any better?
making it that much easier for identity thieves.
The National Strategy for Trusted Identities in Cyberspace (NSTIC) envisions a cyber world - the Identity Ecosystem - that improves upon the passwords currently used to log-in online. It would include a vibrant marketplace that allows people to choose among multiple identity providers - both private and public - that would issue trusted credentials that prove identity.
For example, student Jane Smith could get a digital credential from her cell phone provider and another one from her university and use either of them to log-in to her bank, her e-mail, her social networking site, and so on, all without having to remember dozens of passwords. If she uses one of these credentials to log into her Web email, she could use only her pseudonym, "Jane573." If however she chose to use the credential to log-in to her bank she could prove that she is truly Jane Smith. People and institutions could have more trust online because all participating service providers will have agreed to consistent standards for identification, authentication, security, and privacy.
National Strategy on Trusted Identities in Cyberspace
This is to individual privacy what Card Check is to employee free choice.