#openid-connect

[ follow ]
Information security
fromBusiness Matters
1 day ago

Why Trust and Verification Are Critical for Modern Online Platform Businesses

Trust is essential yet fragile in the digital economy, with platforms facing increasing challenges from sophisticated online scams.
EU data protection
fromwww.independent.co.uk
1 day ago

What are EU digital identity wallets? The benefits and risks explained

The Independent provides accessible journalism on critical issues like reproductive rights and digital identity, emphasizing the importance of on-the-ground reporting.
fromNature
4 days ago

Researchers: here's how to audit your fragmented digital identity

A search for 'Guo Wei' in ORCID returned 616 profiles, none affiliated with the Jiangsu University of Science and Technology, highlighting the difficulty in verifying academic identities.
Higher education
#ai-governance
#digital-sovereignty
Europe politics
fromTheregister
5 days ago

Digital sovereignty isn't just a buzzword - it's the future

European governments and companies are prioritizing digital sovereignty due to concerns over US control and dependency.
Information security
fromInfoQ
3 weeks ago

Architecting Portable Systems on Open Standards for Digital Sovereignty

Digital sovereignty involves having a valid 'Plan B' for critical systems to avoid reliance on single vendors.
Europe politics
fromTheregister
5 days ago

Digital sovereignty isn't just a buzzword - it's the future

European governments and companies are prioritizing digital sovereignty due to concerns over US control and dependency.
Information security
fromInfoQ
3 weeks ago

Architecting Portable Systems on Open Standards for Digital Sovereignty

Digital sovereignty involves having a valid 'Plan B' for critical systems to avoid reliance on single vendors.
#digital-identity
#identity-management
Information security
fromThe Hacker News
1 week ago

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

Identity programs are maturing, yet the risk from disconnected applications and AI agents is increasing for enterprises.
fromInfoWorld
2 months ago
Information security

Descope introduces Agentic Identity Hub 2.0 for managing AI agents

Agentic Identity Hub 2.0 enables managing AI agents and MCP servers as first-class identities, adding OAuth 2.1, tool-level scopes, and enterprise-grade access control.
Information security
fromThe Hacker News
1 week ago

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

Identity programs are maturing, yet the risk from disconnected applications and AI agents is increasing for enterprises.
Privacy technologies
fromnews.bitcoin.com
1 day ago

Anthropic Adds ID Verification to Claude for Select AI Users

Anthropic implemented ID checks for Claude users in April 2026 to limit abuse and meet legal obligations, while not storing ID images on its systems.
fromnews.bitcoin.com
2 weeks ago

Circle Deploys USDC and CCTP on Pharos Network to Advance RealFi Goals

The integration of USDC at the protocol level introduces a transparent, fully reserved, dollar-denominated stablecoin into the Pharos ecosystem, enhancing its financial capabilities.
Cryptocurrency
#okta
#age-verification
Privacy technologies
fromThe Verge
2 days ago

Age verification is a mess but we're doing it anyway

Age verification methods on the internet are flawed, leading to challenges in effectively preventing underage access to inappropriate content.
fromTechRepublic
2 months ago
Privacy technologies

Discord to Roll Out Global Age Verification Using Facial Scans, ID

Discord will require global age verification using facial scans or ID uploads, estimate age with AI, and not store verification media.
fromPrivacy International
1 month ago
Privacy technologies

Discord pushes back age verification after security risks revealed

Age verification systems create significant privacy risks by collecting sensitive biometric and identity data that cannot be recovered if compromised, and normalizing pervasive digital identity checks across the internet.
Privacy technologies
fromThe Verge
2 days ago

Age verification is a mess but we're doing it anyway

Age verification methods on the internet are flawed, leading to challenges in effectively preventing underage access to inappropriate content.
Social media marketing
fromTechCrunch
3 weeks ago

Mastodon is making its decentralized social network easier to use with its latest revamp | TechCrunch

Mastodon is redesigning user profiles to attract mainstream users and simplify the platform's usability.
#identity-verification
Privacy technologies
fromFast Company
1 month ago

This crypto ring certifies your digital self with real-life handshakes

Quartz is a speculative ring concept using biometric verification and physical handshakes to authenticate identity and prevent AI-driven spoofing scams targeting older adults.
Privacy technologies
fromFast Company
1 month ago

This crypto ring certifies your digital self with real-life handshakes

Quartz is a speculative ring concept using biometric verification and physical handshakes to authenticate identity and prevent AI-driven spoofing scams targeting older adults.
Privacy professionals
fromZDNET
4 weeks ago

Incogni review: The easiest way to remove myself from the internet took just seconds

Incogni is a data removal service that helps reduce personal information exposure by targeting data brokers, with plans starting at $8/month and offering identity protection features.
Tech industry
fromFast Company
1 month ago

Is it even possible to decentralize social networking?

Jay Graber stepped down as Bluesky CEO to become chief innovation officer, with venture capitalist Toni Schneider taking the interim CEO role to help scale the platform's growth.
Privacy technologies
fromComputerWeekly.com
2 weeks ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
Privacy professionals
fromTheregister
1 month ago

Age verification isn't sage verification inside OSes

California's Digital Age Assurance Act attempts age verification for minors but is vague, incoherent, and creates liability risks without clearly defining compliance requirements or addressing practical implementation across diverse computing devices.
Artificial intelligence
fromTheregister
1 month ago

World pitch: scan eyeballs to tie identity to AI agents

World is launching AgentKit, a technology linking AI agents to verified human identities through iris-scanning orbs to prevent AI abuse and establish trust in agentic systems.
fromTechCrunch
1 month ago

Periwinkle is making self-hosted social media on Bluesky's AT Protocol even easier | TechCrunch

Periwinkle allows anyone to set up a social media account on their own domain, under their own control. Built on top of the AT Protocol, the same open source technology that powers the X alternative Bluesky, Periwinkle aims to provide the infrastructure you need to run your own social media.
Startup companies
#ai-agent-security
Information security
fromTheregister
1 month ago

Okta made a nightmare micromanager for your AI agents

Okta launched Okta for AI Agents, enabling organizations to discover, monitor, and disable AI agents through centralized identity and access management controls.
Information security
fromTechzine Global
1 month ago

Okta launches platform to secure AI agents

Okta for AI Agents provides organizations with discovery, access management, and immediate revocation capabilities to secure non-human identities and address the 88 percent of organizations experiencing AI agent security incidents.
Information security
fromTheregister
1 month ago

Okta made a nightmare micromanager for your AI agents

Okta launched Okta for AI Agents, enabling organizations to discover, monitor, and disable AI agents through centralized identity and access management controls.
Information security
fromTechzine Global
1 month ago

Okta launches platform to secure AI agents

Okta for AI Agents provides organizations with discovery, access management, and immediate revocation capabilities to secure non-human identities and address the 88 percent of organizations experiencing AI agent security incidents.
#reddit
Privacy technologies
fromMashable
3 weeks ago

Reddit officially addresses bot problems, ID verification stance

Reddit plans to implement human verification to ensure users are real people, not bots, without compromising user anonymity.
Privacy technologies
fromMashable
3 weeks ago

Reddit officially addresses bot problems, ID verification stance

Reddit plans to implement human verification to ensure users are real people, not bots, without compromising user anonymity.
Privacy technologies
fromNextgov.com
4 weeks ago

New methods for assuring digital identity and authenticity

Generative AI is transforming content creation, increasing the need for reliable identity verification and authenticity in digital media.
#agentic-commerce
Privacy technologies
fromAzure DevOps Blog
1 month ago

Authentication Tokens Are Not a Data Contract - Azure DevOps Blog

Authentication tokens should only validate authorization, not serve as data interfaces; upcoming encryption will make token payloads unreadable, breaking applications that decode token claims.
Privacy professionals
fromwww.socialmediatoday.com
1 month ago

Concerns with third party partner could derail LinkedIn's verification push

LinkedIn implements expanded verification requirements for company, workplace, and executive-level roles to combat scams and misrepresentation, though concerns about verification partner Persona may hinder progress.
fromThe Drum
2 months ago

The next generation of social networking

Whilst many of the tools of social media - blogs, ugc, forums - are now increasingly brought into new web design and development, there are companies, from British Airways to Lego who view social media as the starting point - not the added feature. Others, such as ruumz.com, are already operating the 'next generation' of social networks with a new blend of online and offline activity.
fromblog.logrocket.com
3 months ago

What are the key challenges in scaling MFA for large organizations? - LogRocket Blog

Most design specs break down in development because they're built for designers, not developers. This article shows how to write specs that reflect real-world logic, states, constraints, and platform behavior not just pixels. Rafael Basso Jan 20, 2026 11 min read A practical guide to AI in UX design, covering predictive UX, generative assistance, personalization, automation, and the risks of overusing AI. Shalitha Suranga Jan 14, 2026 11 min read
UX design
Privacy technologies
fromArs Technica
1 month ago

World ID wants you to put a cryptographically unique human identity behind your AI agents

World ID's Agent Kit enables AI agents to prove human authorization through iris-verified identity tokens, allowing websites to distinguish legitimate automated requests from malicious Sybil attacks.
Privacy technologies
fromArs Technica
1 month ago

After Discord fiasco, age-check tech promises privacy by running locally. Does it work?

Age-verification systems using on-device face scans and cross-platform age keys reduce privacy risks, but widespread distrust of vendors and past data breaches undermine user confidence in these technologies.
#discord
fromZDNET
2 months ago
Privacy professionals

My 5 favorite Discord alternatives - no ID verification required

fromZDNET
2 months ago
Information security

Discord's age verification lockdown: What to know, and alternatives users are considering

fromZDNET
2 months ago
Privacy professionals

My 5 favorite Discord alternatives - no ID verification required

fromZDNET
2 months ago
Information security

Discord's age verification lockdown: What to know, and alternatives users are considering

Artificial intelligence
fromPsychology Today
2 months ago

What If API Tokens Became a Universal Monetary Standard?

A universal token standard for AI computational work would create a common unit of account, making the economy of intelligence legible and enabling integrated multi-model systems.
Information security
fromSecurityWeek
2 months ago

Webinar Today: Identity Under Attack - Strengthen Your Identity Defenses

Adopt an identity-first security strategy to protect sensitive data, meet compliance requirements, and balance security, user experience, and operational efficiency against identity threats.
fromSilicon Canals
1 month ago

The global infrastructure of digital ID is being built right now - and nobody voted for it - Silicon Canals

What I walked through wasn't just an immigration gate. It was a node in a rapidly expanding global infrastructure of digital identity, one being constructed at extraordinary speed, across dozens of countries, by a mix of governments, multilateral organizations, and private technology vendors. The people building it believe they are solving real problems: fraud, statelessness, inefficient public services, financial exclusion.
Privacy technologies
fromBitcoin Magazine
1 month ago

Discord Wants Your Face, Here's Why You Should Say No

Discord presents its move as inevitable. It's not. I know that Discord isn't trying to harm anyone. The company genuinely believes it's protecting users. But good intentions don't prevent the drift. They accelerate it. There's also the risk that the collected data becomes exposed.
Privacy technologies
Privacy technologies
fromYahoo
2 months ago

Your privacy choices

Yahoo and partners use cookies and technical identifiers to deliver services, measure usage, secure accounts, and provide personalized advertising unless users reject consent.
[ Load more ]