News

Aggregated blog posts from the community (including ourselves)

The six-hour odd-couple OAuth 2.0 tour

I spent six hours with OAuth yesterday.
If you are deploying native mobile applications, run in this direction.
If you want to secure API connections to SaaS applications, Web applications or even desktop applications, run in this direction.
If you are…

Understanding the Players in the Social Data Layer | Sachin Rekhi

Singly is the company behind the Locker Project, an open-source effort to create a personal data store of all your personal data from across the web. While a useful end-user service in itself, they also plan on offering a rich set of APIs for …

Kevin Marks: Google Plus must stop this Identity Theatre

Bruce Schneier in Beyond Fear coined a phrase:one of the goals of a security countermeasure is to provide people with a feeling of security in addition to the reality. But some countermeasures provide the feeling of security instead of the reality. The…

The Many Bills of Rights

The second recommendation of the World Economic Forum report Personal Data: The Emergence of a New Asset Class after innovation around User-Centricity and Trust is the definition of global principles for using and sharing personal data. The The Startup Circle of PDEC is forming and defining its core principles now too. This post is an […]