• About
  • Advertise
  • Contact
Saturday, April 25, 2026
No Result
View All Result
NEWSLETTER
iotphoenix
  • Home
  • Tech

    Cisco, AWS integrate IoT, edge network software and services

    5G research by DARPA will lead to commercial applications

    Siemens and Google Cloud team to deliver AI-based manufacturing solutions

    Will Apple’s Internet of Things vision hurt a beautiful idea?

    Katherine the White Shark crashes research site’s servers

    TCP/IP stack vulnerabilities threaten IoT devices

    Trending Tags

    • IIoT
    • You’re probably doing your IIoT implementation wrong
    • Splunk debuts IIoT product for in-depth analytics
  • Mobile
  • Internet of Things
  • Technology Industry
  • Networking
  • Software
  • Cloud Computing
  • Security
  • Home
  • Tech

    Cisco, AWS integrate IoT, edge network software and services

    5G research by DARPA will lead to commercial applications

    Siemens and Google Cloud team to deliver AI-based manufacturing solutions

    Will Apple’s Internet of Things vision hurt a beautiful idea?

    Katherine the White Shark crashes research site’s servers

    TCP/IP stack vulnerabilities threaten IoT devices

    Trending Tags

    • IIoT
    • You’re probably doing your IIoT implementation wrong
    • Splunk debuts IIoT product for in-depth analytics
  • Mobile
  • Internet of Things
  • Technology Industry
  • Networking
  • Software
  • Cloud Computing
  • Security
No Result
View All Result
iotphoenix
No Result
View All Result
Home Security

Wrapping up some thoughts on RFID and trust

in Security
0 0
0
SHARES
40
VIEWS
Share on FacebookShare on Twitter

I’m at Digital ID World right now, and the next few issues will deal extensively with the people I’ve spoken with and the presentations I’ve listened to at the show. This does seem, then, an ideal time to catch up on some notes from the mailbag as well as go through a few bits and pieces that have been accumulating but keep getting shunted aside for some bigger story.

Reader Larry Tally pointed out that the use of a magnetic stripe, rather than an RFID chip, in passports (see http://www.nwfusion.com/newsletters/dir/2005/0502id1.html) could lead to horrible holdups at border crossings and airport points of entry as passport holders inevitably carry their documents through magnetic fields and wipe out the data. I’d guess that there could be some sort of shielding in the passport to protect it, but I also noted that credit and debit cards seem to be very successful with magstripes holding the data. Still, it might be worth a test to see if the cost of providing duplicates (and the cost of validating “blank” passports) overcame the objection to RFID chips.

Concerning Circles of Trust (http://www.networkworld.com/newsletters/dir/2005/0425id2.html), Maurus Stadnyk reminded me that much of the world of social networking (Friendster, Orkut, Hi5, etc.) is built on circles of trust. To my mind, they more closely resemble the sort of introductions we might make in a bar on Friday night, rather than the imprimatur a trusted source places on a financial deal – but it is a good analogy.

Speaking of “trust”, the Burton Group’s Jamie Lewis has posted a number of snippets to his blog (http://www.burtongroupblogs.com/jamielewis/2005/05/thinking_out_lo.html) under the rubric “Thinking Out Loud about Trust.” Lewis laments the use of the word “trust” – “In short, ‘trust’ serves as an all-too-convenient alias for a lot of hard problems. And in digital identity discussions, it’s impossible to avoid either the term or those problems.”

But he does realize that it has been used for a long time (as part of public key infrastructure – PKI) and wouldn’t be easy to change. Still, he does seem to think that “reliance” is a better term for what we’re trying to accomplish when weighing the risks of accepting a third party’s assurance on a user’s identity.

Rather than using PKI and key pairs as the tunnel for our vision, we might want to look on how we judge the reliability of information obtained from friends, acquaintances and strangers. We’ll talk more about this in the not-too-distant future, but if you send me your thoughts on it now, I’ll include them in the discussion later. Or stop me in the hallway here at Digital ID World and let me know what you think.

Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.

Copyright © 2005 IDG Communications, Inc.

Download Premium WordPress Themes Free
Download WordPress Themes Free
Download Best WordPress Themes Free Download
Download WordPress Themes
ZG93bmxvYWQgbHluZGEgY291cnNlIGZyZWU=
download lenevo firmware
Download Premium WordPress Themes Free
online free course
Tags: Wrapping up some thoughts on RFID and trust
Next Post

C1G2 standard revs up RFID

Recommended

Slideshow: Beyond passwords

New Microsoft BizTalk Server coming in Sept.

RFID boosts supply chain performance

Loading

Category

  • Analysis
  • Careers
  • Cloud Computing
  • Data Center
  • Data Centers
  • Databases
  • Guest Opinions
  • Hardware
  • Infrastructure
  • Insider Insights
  • Internet of Things
  • IT Leadership
  • Mobile
  • Networking
  • New Connections
  • News
  • Open Source
  • Opinion
  • Research
  • Security
  • Software
  • Software Development
  • Technology Industry
  • Uncategorized
  • Unified Communications
  • Videos
  • Virtualization
  • WAN

About Us

Get updated with latest IOT related news and information with us.

© 2024 iotphoenix.

No Result
View All Result
  • Home
  • Internet of Things
  • Security
  • WAN
  • Cloud Computing
  • Data Centers
  • Mobile
  • Networking
  • Software
  • Technology Industry

© 2024 iotphoenix.

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In