Wednesday, September 28, 2011

Not Too Late

"Sounds to me like something I would like to understand better."

"Security and much more based on 'trusted volume', for lack of a better term."

"You mean white lists?"

"Not really the same thing. Let me explain. White lists are an important subset. Dynamically modulated identity linkage adds value to the collection of whites lists."

Half a century ago, certain folks would go through elaborate protocols to verify authenticity of high value individuals 'far from home.' The intervening years have seen tremendous improvement in technology for this purpose.

Then, as now, certain parties had/have a vested interest in thwarting the pure functions surrounding and including personal ID.

© 2011 Buzz Hill

No comments:

Post a Comment