Stephan EDecember 29, 2009 10:34 AM

The paper seems to be focussing on a wrong dictonomy - instead of adreasing the question of getting service without indentifying altogether, the discussion is only about varaiations of transactions where consumer loose control.

It is true that most communication technology today is designed to strip consumers of control. But nothing prevents us from making transactions┬┤systems without trusted parties collecting personal data and accumulating power.

Leave a comment

Allowed HTML: <a href="URL"> • <em> <cite> <i> • <strong> <b> • <sub> <sup> • <ul> <ol> <li> • <blockquote> <pre>

Photo of Bruce Schneier by Per Ervland.

Schneier on Security is a personal website. Opinions expressed are not necessarily those of IBM Resilient.