Understanding the digital identity ecosystem can be easier. Korismoro is visualizing this complex web through browser based
D3explorers and exportable
Gephi graphs powered by traditional API-backed NoSQL databases. Using these tools we track the state of the art in digital identity.
The technology of digital identity remains difficult to access, even for the experienced developer. Discussions and analysis in essential working groups is often hampered by the need to tailor the details of Alice and Bob for each discussion. Both of these factors slow the development of a robust global identity ecosystem.
- Managed/Sovereign Bridge
Managed identity systems, such as the IAM environments operated by governments and employers, are a vital and integral part of modern life. Regulatory requirements are often at odds with the principles of self-sovereignty, resulting in pragmatically mandatory surrender of sovereignty. While you may choose to participate in social networks or consumer loyalty programs, you may not choose to participate in governmental systems. For pragmatic reasons it may not be possible to opt out of employer IAM systems, resulting in loss of sovereignty in exchange for a paycheck. Cryptographic and technical practice solutions to these problems are well established, but bridging the social gap is a more difficult battle. Through visualization we can identify the points at which governments, regulatory agencies, and employment practices introduce risk and threaten sovereignty. Having done so we can communicate and suggest how to deploy existing technical solutions to maximize individual control over identity while honoring the requirements of governments, regulatory agencies, and corporate IAM.
- Reclusivity Rights
Reculsivity is a fundamental human right, but is bounded by the social contract. Is it possible to regain reclusivity while supporting the demands of a global society? While GDPR is a first and enlightened step in the right direction, it is not yet a global solution. In fact, it is actively and persistently challenged in autocratic environments and in societies hampered by intrasocial wars and assaulted by politically motivated paranoia and hysteria. In terms of specific institutions and legal frameworks, is it even practical to regain lost reclusivity and if so, how?
- iFreedom - Device Decoupling
Your identity is a matter of physics and it has no direct relationship to a handheld computer or other device. Over-reliance upon smartphones, software, and hardware gadgetry such as cryptographic processors and embedded biometric sensors, is a serious and blossomming threat to the integrity of personal identity. The physical management of centrally manufactured, heavily monitored, fundamentally insecure, bricks of plastic and metal should never be the foundation upon which a digital identity is anchored. Device reliance has endangered the personal identity of billions through inappropriate cultivation of the myth of device integrity. Many groups and organizations are actively engaged in responding to the threats imposed by governments which continually pressure device manufacturers to weaken privacy protection. The scope and details of this contest can be hard to grasp and will benefit from improved visualization of the key players and contests.
- A Bit of Fun
Issues of individuality and identity are weighty, so watch for the Korsimoro logo in your environment and engage the levity of identity. We have introduced a physical testbed of non-electronic identities and are in the process of deploying a card based PoC. This silly project, precisely because it involves absolutely no sensitive data, is a fundamental test of the technical reality of bootstrapping and managing a limited identity domain.