The eIDAS regulation came to life in 2014. Now it looks like decentralized identities (self-sovereign identities) for eIDs will follow. The idea is interesting: the user is in control of their identities. So far, however, self-sovereign identities has been a research topic and have hardly been tested in real-world. This raises the question which lessons […]
Googeling Nerdhorn
By using the Internet and its services, such as social media, we leave behind data about ourselves. This data can potentially be used for attacks. For example, bloggers’ addresses and vacation times can be found and used for theft. Even pseudonyms can be correlated if things go wrong. It is, therefore, important to think in […]
Nerdhorn falls Victim to Identity Theft
Identity theft refers to the misuse of personal data, such as ID number, address, or credit card number, of a natural person by third parties. This can happen not only in the analog world, but also digitally, for example, through successful phishing attacks.
Reference Model for Federated Identity Managmeent
At the end of the month, I’ll be presenting our reference model for federated identity management at EMMSAD 2021. As soon as the paper is online at arxiv.org, I will link it here. But why is it working? There are more and more identities, whether for one person or for an organization. In my password […]
Nerdhorn and Fallback Authentication
Fallback Authentication describes the authentication method that is used if one of the commonly used factors does not work. The nerdhorn usually authenticates itself via face recognition on the smartphone. However, it is no longer recognized by the mask, for example. As an alternative, the font counts here. As is the case here, the alternative […]