A Deep Dive into the Blockstack Token Sale Registration App: The Blockstack Token Sale Voucher Registration App uses decentralized Blockstack IDs and social media account proofs to make sure registrants are real humans. Read on for a behind-the-scenes look into how it works…
A comprehensive guide to digital consent in the personal data economy. Consent is at the frontline of the drive to create new standards of digital privacy...
Self-sovereign identity is the concept that people and businesses can store their own identity data on their own devices, and provide it efficiently to those who need to validate it, without relying on a central repository of identity data. It’s a digital way of doing what we do today with bits of paper.
Valentin Bercovici, founder and CEO of PencilDATA in conversation with the Cube's John Furrier on today's dependency on FANG, the move to decentralise the web and the power of personal privacy rights under GDPR.
Our Strategy proposed a solution for storing and sharing KYC data between PSPs and potentially other participants, focusing on business customers, enabling more efficient and effective AML and KYC checks. We have undertaken more research to confirm the viability of this solution, and have developed a data sharing framework which is expected to enable the development of a market for the provision of KYC services and a range of facilities supporting other business activities.
Two tweets allowed me to formulate a vision as to why it is we're heading in a slightly different direction for identity in the future. The first is this one: Identity is an edge protocol.
The revised Directive on Payment Services (PSD2) forces European banks to open their data and infrastructure. Initially the focus will be on payments and access to accounts and fulfilling regulatory requirements. However, when banks and third-party providers will be able to use APIs more strategically, a world of opportunities arises.
As the volume of data being generated about individuals increases, technology is making it ever easier for that data to be transferred, and ever more powerful analysis allows valuable insights to be gained from it. How companies collect, process and protect data on their customers, staff and suppliers has turned into one of the biggest debates of our decade.
A technology platform for the secure and traceable exchange of customer information for small and medium enterprises (SMEs), through digital channels controlled by authorized users.
To understand what this newsletter is about it’s important that we have an agreement on what we mean when we use the term “adaptive authentication”. It isn’t a difficult concept, but it’s best if we’re all on the same page, so to speak.
Personal data is rising rapidly up the strategic agenda of many companies. Consumer facing brands are recognising the possibilities of engaging their customers in a more intimate information based relationship, one that offers far more than insight and inference based on legacy business intelligence models.
The free and open Internet is now centralized and controlled by a handful of companies that provide services such as search, social networking, and cloud storage. If left unchecked, these centralized platforms could continue their control of information, personal data, and communication on the Internet.