The transparent society gets closer … or a closeup?
There is a merging of technologies, and the evolution of technologies, that is creating the possiblity of every person becoming a “sensor” that can be used by others. With the Internet, 802.11 wireless, wearable computers, cell phones with cameras, and now embedded cameras … we’ll soon be able to share and broker audible and visual information from anywhere.

This article shows what HP engineers have been up to with embedded cameras in glasses. When coupled with a small computer that has recording capabilities, GPS, and wireless connectivity, we could all be sharing recorded information about almost anything that we experience. If you have not read David Brin’s The Transparent Society … you ought to. We’re getting closer and closer …

Man and Machine merging …
I have continued to read about Kevin Warwick and his work with Cybernetics. He is becoming one of the earths first true Cyborgs. Along with Steve Mann (who I’ll post about in the next few days) they are leading the world with this type of research.

In this latest article called “No more talk … Just think” he is exploring an area that I have discussed with friends for quite some time. If the proper sensors were inserted into the brain, a simple application could be used to learn certain neural firing patterns as you thought, or thought of moving a muscle, etc. Once these patterns were learned, we could assign new ways to communicate the presence of these patterns. So now simply thinking about something could be detected by software, and then that software could trigger any type of action. This puts a very different type of spin on “my ears were burning” … I might think about my wife, which would trigger the software to send an instant message to my wife. Even further, it might send a message to her cyborg-implant, which would then activate a small heater implanted in her ear. 😉

With cyborg implants that have visible or non-visible (wireless) communciations you will have whole new ways of communicating … between humans, and between humans and machines.

Tim writes about the “undercurrents” of innovation …
We all hear about Open Source and it’s implications, however Tim is really doing something about it. It is great that he and his organization are taking on the role of assisting in the communication of new and innovative ideas coming from the “trenches” … these are the ideas that are the real “undercurrents” that will emerge as the next big thing.

In this article, he does a great job of outline many of the new innovations are are coming …

O’Reilly Network: Inventing the Future. Tim O’Reilly. But the most interesting part of the story is still untold, in the work of hundreds or thousands of independent projects that, like a progressively rendered image, will suddenly snap into focus. That’s why I like to use the word “emergent.” There’s a story here that is emerging with increasing clarity. [Tomalak’s Realm]

Faking videos … the future of “proof” and “evidence” …
I was recently at the Foresight Institute conference and saw a presentation by David Friedman. He was talking about the issues of technology and the justice system … and joked about the use of technology to create pictures and videos. (Visit this link and search for “Say It Ain’t So” …) As the technology evolves forward, it will be harder and harder to determine a “real” video from one that has been “created” … and this work is providing that we are already there. It is only a matter of time till we are going to be questioning more and more what we “see” with our own eyes!

*************************
At MIT, they can put words in our
mouths

May 15, 2002
*************************
MIT scientists have created the
first realistic videos of people
saying things they never said,
raising serious questions about
falsifying video and film images.
The MIT technology is the first that
is “video-realistic”: volunteers in
a laboratory test could not
distinguish between real and…

Growing interest in REAL digital identity …
After my experiences at Novell with digital identity, I quickly realized that it’s a tough vision to communicate without having the whole subject tainted with corporate profit making mentalities. What’s funny, is that those exact mentalities are what will prevent their architectures from ever being successful!

This is a very cool effort that I am going to be following, and that I am going to get involved in. Once digital identity moves outside of Novell, Microsoft, Sun, AOL, etc. it will be able to evolve in a more natural framework that mirrors reality.

RFC: Sponsored Feature Section on Digital Identity. I have a proposal for the site, that I’d like your comments and thoughts on. Jabber.com founder Andre Durand and ISPCON founder Phil Becker recently started a new website called DigitalIDWorld.com. K5er Adam Theo is also working with them, and thought that the subject of digital identity would be something other K5ers might have some interest in, and perhaps we could arrange some kind of syndication agreement. I talked to Andre and Phil a few times, and below is what we came up with. We all think it has a lot of potential, but as always, you make the final call as to what’s good for K5. So read on for the idea, and let us know what you think of it. [kuro5hin.org]

Time between posting …
I am starting to learn that my weblog provides a good display of time for me. I can’t believe that it has been almost a month since I caught up on my back-log of reading, and made my last posts.

I have been having a lot of fun though … and am about to venture out and make some more changes to my blog page. I have been in contact with a few open source projects … working on some digital identity work, and getting NoCat working for our http://80211.net project. I also was able to buy and install a new keyboard on my laptop which is making typing a lot easier! I had started to learn whole new ways of typing when my left-hand CTRL and Shift keys started to fail. 😉

Overall the last month has been a blast … I had a few trips on the road – New York to Chase Manhatten for work on a disaster recovery solution – Silicon Valley for the Foresight Institute Senior Associates Gathering and a series of analyst and partner meetings with Vultus. The more I have been working with Vultus the more I am learning about the implications of the Web Services revolution … giving me lots of ideas about the future.

I also ended up doing a couple of presentations on Wearable Computers … one for the State of Utah School systems “Test-out” Challenge talking to a lot of high school students from across the state … another for the Utah Computer Society. I’m also meeting with a variety of companies on my “mesh network” ideas … one that is implementing a last mile solution – UINetworks – and another making some inexpensive radios that will provide me with some peer-to-peer wireless that I have been looking for.

Lastly … I’m completing some work on my video/photo kiosk ideas, my wearables, and my location-based services applictions. Oh yeah … and I have a baby coming in September, so I have been learning a lot about what to expect with fatherhood!

It’s been a fun month … and it’s going to be a fun summer …

Thoughts on Digital Identity …
I read the following article and immediately visited the new DigitalIDWorld web site … it’s a very good start. I read a number of their posts, and had the following thoughts that I forwarded to Andre …

—–
This is a very powerful conversation, and I like the way that you have started to examine identity. I would really enjoy exploring this entire space with you as I have done some extensive thinking about digital identity over the last several years.

For some background, I was the original architect of digitalme at Novell several years ago. This project was the result of my research into directories and presence/instant messaging and how they relate to, and can be used in, digital identity management. Since leaving Novell I have continued my research and development of digital identity and identity management applications.

One of the core issues that I came across in my original research was that identity was always related to communities or organizations. Your “tiers” also indicate that you are on the same track. You are moving down some of the same paths that we explored when creating digitalme … that there are many different forms of identity. I want to offer some of my current frameworks and “axioms” for an extended conversation to explore this further.

  • Consider the possibility that no one has any inherent identity. Identity is not something that we have, it is something that we are given by others … usually communities or organizations. If you were to examine the Latin roots of the word “identity” you would find that it comes from “similar to” or “same as”. In our modern world we have failed to distinguish this subtle aspect of our own language. If we view a part of our identity as something that we are “similar to”, then we can see that we are not “6 feet tall”, but instead we are “similar to something that a bunch of us call 6 feet tall”. In my opinion, this is one of the most important distinctions in exploring identity because it then begs the questions “Then how did I get to be 6 feet tall?” and “Who is this ‘bunch of us’ that are saying I’m 6 feet tall?”
  • Consider the possibility that all of our identity is given to us by the various communities that we are a member of … including our families. Attributes of identity are all forms of language and measurement of an individual … comparisons to concepts that are known to a community. Again, some group of people made the choice that a “foot” was the term used to name the length of a physical piece of material. That same group also gave the name “six” to a specific count of elements, and when combining the two and looking at you they said that you are “six feet”. If we were to leave the context of this community and travel to a foreign land we might find that they do not have a “foot” and so that identity of yours doesn’t even exist to them. This then opens up the conversation about context of identity.
  • Consider the possibility that you have no identity outside the context of a community. Every attribute of your identity only exists within the context of the community that gave it to you. It might exist in another community, however only if that community has a relationship with the community that gave you that identity. For example, in the United States you have a Social Security Number, and it only exists in the context of the US. Since my bank has a relationship with the US, and they have also been given a Federal Tax ID number, these attributes of identity exist for us both in the context of the US and in our business relationship. Likewise, since many communities have adopted the common identity measurement of height using feet, my height is valid in the context of numerous communities around the world.
  • Consider the possibility that you started to accumulate identity the moment that you were conceived, and will continue to accumulate identity after you have died! Again, if we agree that identity is given to you by the communities that you interact with, then that interaction began upon conception, and people will continue to give you identity in their conversations about you after you die. If we go back to when you were born the community of your family gave you what we think is the first piece of identity that you get … your name! In most cases though, the delivering doctor or nurse might have already started to give you identity before your name by defining the medical and physical attributes about you before handing you to your parents! In addition, after you die, there are all of the documents and certificates that are generated that people will assign to you … adding to your identity. If they then start to clean out your house, they might find things that you left behind that continue to be added to your identity!
  • Consider the possibility that real identity management will become a reality when we can create applications which will accumulate your entire lifetime of identity, managing the relationships with the communities that gave identity to me. These applications will automate the process of requesting and granting identity, keeping identity information in sync, and allowing for historical searching of identity. (What were my last three addresses for this credit app?)

I believe that there is an abstraction of identity that we have created that allows us to view your three tiers as one and the same. This is really an exploration of the fundamentals of the human experience, and an ontological study. If we step back and truly examine what it is to be human, and a part of various communities, then a solid model for digital identity management begins to emerge. What’s funny is that the process of identity creation and granting has been going on since humans existed and they are all around us. Most people just don’t see them because they have become so commonplace.

These are the areas that I have been researching and developing solutions. I currently have my third generation of an application that begins to define the high-level “protocol” of identity transactions, and then the accumulation and management of that information.

I look forward to discussing these subjects further with you!

Scott C. Lemon
http://www.HumanXtensions.com
http://the.Inevitable.Org/anism

RFC: Sponsored Feature Section on Digital Identity. I have a proposal for the site, that I’d like your comments and thoughts on. Jabber.com founder Andre Durand and ISPCON founder Phil Becker recently started a new website called DigitalIDWorld.com. K5er Adam Theo is also working with them, and thought that the subject of digital identity would be something other K5ers might have some interest in, and perhaps we could arrange some kind of syndication agreement. I talked to Andre and Phil a few times, and below is what we came up with. We all think it has a lot of potential, but as always, you make the final call as to what’s good for K5. So read on for the idea, and let us know what you think of it. [kuro5hin.org]

More support for DSML and LDAP Directories …
As we started to renew our efforts on digital identity, we quickly embraced the DSML standard as an xML solution for representing directory information. These tools appear to be a very endorsement of the DSML standard and can assist Java developers in writing more and more directory enabled applications.

Open-source DSML tools. Gerv
Markham has released DSML Tools,
a suite of open-source Java
utilities for handling Directory Services Markup
Language (DSML) data. [xmlhack]

Peer to peer and community proxies will wipe this out …
If you read this article, you might get the idea that people can track down your geographic location accurately when you are cruising the web. Although this is true for now, it is becoming easier to “mask” your location with simple peer to peer or community proxies.

A proxy is a machine that someone places on the internet which allows you to “relay” your web requests through. Any web site that you then visit will see the requests coming from the proxy, rather than your computer! In the example in the article, if you were to locate a proxy in the UK, you would be able to visit the UK gambling sites since they would see the traffic coming from a UK computer … not yours in the US.

This entire situation gets more and more complex as more people allow for the sharing of computing resources on their laptops and home computers. As the desire for more privacy increases … at least among groups of computer users … I believe that people will begin to install proxies to share for a variety of purposes …

Geolocation will not have a chance against these types of proxies and relays …

Geolocation Enables Internet Borders [Slashdot]

A very cool proxy/redirection script …
I have recently been working on learning Perl. It’s a fairly amazing and flexible language, there is a ton of open source code written in Perl, and it’s available for almost every platform out there.

In looking around recently, I found this Proxy script that is a very powerful script. It provides a flexible proxy for HTTP and FTP that can strip various content, manage cookies, and provide nearly anonymous browsing. There are a whole slew of things that I can think of possible using this code. The author even added a number of features similar to the Crowds proxies with groups of proxies.

I’m going to install this on a couple of my servers and do some experimentation. If you want to see a demo of this, visit the authors homepage and he has a demo version up and running!

CGIProxy 1.5. Anonymizing, filter-bypassing HTTP proxy in a CGI script (in Perl) [freshmeat.net]