Colin will be on a panel at the KNOW conference in Vegas and is collecting input fom the community.
The world of digital identity suffers from a lot of common myths and misunderstandings related to the concepts belonging to it. The panel wants to use the participants experience of implementing digital ID in real life and bring down a few common misunderstood and confused terms. The idea is to collect all of these suggestions and play them back to the audience.
Robin: Are you asking for more elaborate statements at this state or examples that disprove existing statements?
Colin: We are using these big examples as a way to attract the audience. New ones are always welcome
Suggestions for myths out there:
If the relying party will add attributes to fix sector related issues, they might as well implement the entire capabilities.
In the ISO standards for data security techniques, it defines the cryptographic key as the piece of data which controls the operation of the algorithm. It is a nonsense definition but it’s the only one that they could get approved by everyone in the room.
It is important to have precise definitions or at least a good substantial debate about them.
The room is voting on the proposed myths, to decide which ones of the suggestions should be taken by Collin and added to the official list. There are 16 participants in the room, each has three votes. Voting conclusion is noted within brackets in the list of suggestions.