Microsoft Privacy & Safety

Microsoft's Approach to Helping Protect Privacy and Safety Online

Browse by Tags

Related Posts
  • Blog Post: National Strategy for Trusted Identities in Cyberspace

    The report understands the spectrum of use cases and specifically calls out the need for identity solutions to be privacy enhancing and voluntary for the public ...read more
  • Blog Post: Why location services have to be done right…

    49% of testers said privacy and security concerns were the top reason they don’t use check-in services more often ...read more
  • Blog Post: Non-Personal Information - like where you live?

    Kim Cameron of Microsoft writes on his Identity Blog: Non-Personal Information - like where you live? The notion that location information tied to random identifiers is not personally identifiable information is total hogwash. Posted on Tuesday 24 August 2010 Last week I gave a presentation...
  • Blog Post: MAC addresses will be used to reveal where you live

    Once you have snooped peoples' MAC addresses, and put them into a database linking them to a street address, you have dramatically changed the way network identifiers work. ...read more
  • Blog Post: Building Global Trust Online Volume 2: Policymaker Guide to Privacy, Safety, and Security

    Today, I’m happy to announce we are releasing Building Global Trust Online Volume 2: Policymaker Guide to Privacy, Safety, and Security at the International Association of Privacy Professionals (IAPP) Global Privacy Summit in Washington, D.C. Complimentary copies are available for conference attendees...
  • Blog Post: Title 18 - Part II - Chapter 206 - § 3121

    § 3121. General prohibition on pen register and trap and trace device use; exception ...read more
  • Blog Post: Kim Cameron's Proposal for a Common Identity Framework

    From Kim Cameron's blog : Today I am posting a new paper called, Proposal for a Common Identity Framework: A User-Centric Identity Metasystem . Good news: it doesn’t propose a new protocol! Instead, it attempts to crisply articulate the requirements in creating a privacy-protecting identity...
  • Blog Post: Cloud Fundamentals Video Series: Evolving Identity Requirements

    From the Trustworthy Computing Blog: Posted By: Tim Rains , Director, Trustworthy Computing A key topic when it comes to security is identity. But, the laws of identity tell us “the Internet was built without a way to know who and what you are connecting to…Since this essential...
  • Blog Post: Signing in to Windows 8 with a Windows Live ID: Privacy and Security

    Steven Sinofsky, President, Windows and Windows Live Division at Microsoft, writes on the Building Windows 8 blog about Signing in to Windows 8 with a Windows Live ID, including a section on "Privacy and Security" below: With Windows 8, we introduce the optional capability to sign in to your PC with...
  • Blog Post: Gstumbler tells all

    Google's new report on its activities states, "All available MAC addresses are... written to disk for frames transmitted over both encrypted and unencrypted wireless networks." ...read more
  • Blog Post: Microsoft: minimum disclosure about minimum disclosure?

    Microsoft's Kim Cameron on his Identity Blog: Back from vacation and catching up on some blogs I found this piece by Felix Gaehtgens at Kuppinger Cole in Germany: A good year ago, Microsoft acquired an innovative company called U-Prove. That company, founded by visionary Stephan Brandt, had...
  • Blog Post: Information Cards in Industry Verticals

    Kim Cameron,Chief Architect of Identity at Microsoft, writes on his Identity Blog : The recent European Identity Conference , hosted in Munich by the analyst firm Kuppinger Cole , had great content inspiring an ongoing stream of interesting conversations. Importantly, attendance was up despite...
  • Blog Post: Conor changes his mind

    Conor: Google has clearly stepped into the arena of doing something that could be detrimental to the user's privacy ...read more
  • Blog Post: The core of the matter at hand

    All the brooms have started dancing. I wonder if Mickey will get out of this one? ...read more
  • Blog Post: How to Recover your Hotmail account

    Chris Stetkiewicz writes on the Security Tips & Talk Blog : We recently received this email: “My Hotmail account was hacked and taken over by the classic ‘I'm in London and I’ve been mugged’ scam . It appears that the hacker has changed the basic verification information...
  • Blog Post: Microsoft’s response to the DigiNotar compromise

    An important update from the Microsoft Security Response Center : This blog post was updated Sept. 5, 2011 below. Microsoft’s investigation into the scope and impact of the DigiNotar compromise has continued over the holiday weekend. We’ve now confirmed that spoofed certificates for...
  • Blog Post: Windows Live ID OpenID Status Update

    Here's an update from the Windows Live Group on integrating Windows Live ID with OpenID from the Windows Live blog: Many people have asked recently about the status of the Windows Live® ID community technology preview (CTP) OpenID endpoints, so here is a quick update. We gathered a lot of great...
  • Blog Post: Kim Cameron Responds to Critique of Identity Federation

    Microsoft's Kim Cameron responds on his Identity Blog to recent criticism of the concept of identity federation : in a recent piece at The Federal Circle , Earl Smith II, managing partner, comes out “all guns blazing” against identity federation and the “weird and wonderful”...
  • Blog Post: Using Consumer Identities for Business Interactions

    Microsoft's Kim Cameron writes on his Identity Blog : Using Consumer Identities for Business Interactions Posted on Saturday 10 July 2010 Mike Jones writes about an “identity mashup” that drives home a really important lesson: the organizational and technical walls that used to...
  • Blog Post: Identity Crisis? What Crisis?

    Jerry Fishenden, National Technology Officer for the UK, here ... If you think the current problems of online safety and Internet e-crime (or cybercrime if you prefer) appear challenging, what on earth is going to happen when the Internet pervades every aspect of our daily lives? As the Internet...
  • Blog Post: Digital Playgrounds presentation at the Berkman Center

    Last week I presented the concepts from Microsoft's paper, " Digital Playgrounds: Creating Safer Online Environments for Children ," at the Internet Safety Technical Task Force (ISTTF) Open Meeting at the Berkman Center for Internet & Society in Cambridge, Mass. The Digital Playgrounds paper outlines...
  • Blog Post: Doing it right: Touch2Id

    Microsoft's Kim Cameron writes on his Identity blog : And now for something refreshingly different: an innovative company that is doing identity right. I’m talking about a British outfit called Touch2Id . Their concept is really simple. They offer young people a smart card that can be...
  • Blog Post: Privacy & Identity Theft Conference

    I recently delivered a keynote address at the Privacy & Identity Theft Conference in Vancouver, Canada. My keynote was entitled, "The Big Picture: Defining and Redefining Identity Fraud." Below is the major portion of my keynote, along with the relevant slides here in a pdf . At the time it...
  • Blog Post: There is a fundamental problem here

    Collection of the MAC addresses of phones and laptops is especially worrisome ...read more
  • Blog Post: Kim Cameron on Information Cards as a solution to site redirection

    Kim Cameron, Chief Architect of Identity in the Connected Systems Division at Microsoft has an interesting post up about at his Laws of Identity blog on the vulnerability of passwords to "site redirection ", a problem that Information Cards don't have: The UK's Register has been running a a series...