Posts – Page 3

architecture,identity

NGI 3: Own your IDentity

When you were born, your parents selected a name (usually one that was not given to any siblings yet) and attached one of their last names. They registered you with that combination, and this is how you have been known for all your life. Wouldn't it be eerie when, upon registration of your name, the clerk had told you that all last names are coerced to that of an industrial who is currently sponsoring a new highway project? On today's Internet, this pattern is standard practice!

>> Continue reading <<

architecture

NGI 2: The poverty of HTTP

Give a technician a hammer, and soon she'll see nails everywhere. Why use other tools, if a hammer works so well? This is pretty much the position that HTTP is in, and this is far from well-deserved. A healthy Internet requires a plethora of protocols, all optimised for their particular purposes.

>> Continue reading <<

architecture

NGI 1: IPv4 is Killing Progress

IPv4 is no longer possible without NAT, which holds back the development of the Internet. In short, IPv4 has served its time and should be forcefully replaced by IPv6 in the coming 5-6 years.

>> Continue reading <<

architecture

IdentityHub: Built with Blocks

The IdentityHub is a rather complex composition of processes. How are we going to design it with practical software? How are we going to help you run your own components? Here's what we have in mind.

>> Continue reading <<

architecture

Identity 9: Phone Numbers are User Identities

Although the InternetWide Architecture is building structures to support advanced modern-day users now and in the far future, the properties of personal control over online identity can start really modest, with a simple phone number.

>> Continue reading <<