See all products »
Curah! curation service
Microsoft Tech Companion App
Microsoft Technical Communities
Microsoft Virtual Academy
Server and Tools Blogs
TechNet Flash Newsletter
Cloud and Datacenter
Windows Server 2012 R2
System Center 2012 R2
Microsoft SQL Server 2012 SP1
Windows 8.1 Enterprise
See all trials »
Microsoft Download Center
TechNet Evaluation Center
Microsoft Virtual Academy
Free Windows Server 2012 courses
Free Windows 8 courses
SQL Server training
MCSA: Windows 8
Windows Server Certification (MCSE)
Private Cloud Certification (MCSE)
SQL Server Certification (MCSE)
Second shot for certification
Born To Learn blog
Find technical communities in your area
For small and midsize businesses
For IT professionals
For technical support
For home users
Microsoft Premier Online
Microsoft Fix It Center
Security Bulletins & Advisories
International support solutions
Log a support ticket
Not an IT pro?
Microsoft Customer Support
Microsoft Community Forums
Microsoft Privacy & Safety
Microsoft's Approach to Helping Protect Privacy and Safety Online
Cloud Computing Privacy
Browse by Tags
Microsoft Privacy & Safety
National Strategy for Trusted Identities in Cyberspace
The report understands the spectrum of use cases and specifically calls out the need for identity solutions to be privacy enhancing and voluntary for the public ...read more
27 Jun 2010
Why location services have to be done right…
49% of testers said privacy and security concerns were the top reason they don’t use check-in services more often ...read more
12 Jun 2010
Non-Personal Information - like where you live?
Kim Cameron of Microsoft writes on his Identity Blog: Non-Personal Information - like where you live? The notion that location information tied to random identifiers is not personally identifiable information is total hogwash. Posted on Tuesday 24 August 2010 Last week I gave a presentation...
26 Aug 2010
MAC addresses will be used to reveal where you live
Once you have snooped peoples' MAC addresses, and put them into a database linking them to a street address, you have dramatically changed the way network identifiers work. ...read more
6 Jun 2010
Building Global Trust Online Volume 2: Policymaker Guide to Privacy, Safety, and Security
Today, I’m happy to announce we are releasing Building Global Trust Online Volume 2: Policymaker Guide to Privacy, Safety, and Security at the International Association of Privacy Professionals (IAPP) Global Privacy Summit in Washington, D.C. Complimentary copies are available for conference attendees...
7 Mar 2012
Title 18 - Part II - Chapter 206 - § 3121
§ 3121. General prohibition on pen register and trap and trace device use; exception ...read more
16 Jun 2010
Kim Cameron's Proposal for a Common Identity Framework
From Kim Cameron's blog : Today I am posting a new paper called, Proposal for a Common Identity Framework: A User-Centric Identity Metasystem . Good news: it doesn’t propose a new protocol! Instead, it attempts to crisply articulate the requirements in creating a privacy-protecting identity...
9 Jun 2009
Cloud Fundamentals Video Series: Evolving Identity Requirements
From the Trustworthy Computing Blog: Posted By: Tim Rains , Director, Trustworthy Computing A key topic when it comes to security is identity. But, the laws of identity tell us “the Internet was built without a way to know who and what you are connecting to…Since this essential...
11 May 2012
Signing in to Windows 8 with a Windows Live ID: Privacy and Security
Steven Sinofsky, President, Windows and Windows Live Division at Microsoft, writes on the Building Windows 8 blog about Signing in to Windows 8 with a Windows Live ID, including a section on "Privacy and Security" below: With Windows 8, we introduce the optional capability to sign in to your PC with...
28 Sep 2011
Gstumbler tells all
Google's new report on its activities states, "All available MAC addresses are... written to disk for frames transmitted over both encrypted and unencrypted wireless networks." ...read more
10 Jun 2010
Microsoft: minimum disclosure about minimum disclosure?
Microsoft's Kim Cameron on his Identity Blog: Back from vacation and catching up on some blogs I found this piece by Felix Gaehtgens at Kuppinger Cole in Germany: A good year ago, Microsoft acquired an innovative company called U-Prove. That company, founded by visionary Stephan Brandt, had...
2 Sep 2009
Information Cards in Industry Verticals
Kim Cameron,Chief Architect of Identity at Microsoft, writes on his Identity Blog : The recent European Identity Conference , hosted in Munich by the analyst firm Kuppinger Cole , had great content inspiring an ongoing stream of interesting conversations. Importantly, attendance was up despite...
4 Jun 2009
Conor changes his mind
Conor: Google has clearly stepped into the arena of doing something that could be detrimental to the user's privacy ...read more
13 Jun 2010
The core of the matter at hand
All the brooms have started dancing. I wonder if Mickey will get out of this one? ...read more
8 Jun 2010
How to Recover your Hotmail account
Chris Stetkiewicz writes on the Security Tips & Talk Blog : We recently received this email: “My Hotmail account was hacked and taken over by the classic ‘I'm in London and I’ve been mugged’ scam . It appears that the hacker has changed the basic verification information...
22 Sep 2011
Microsoft’s response to the DigiNotar compromise
An important update from the Microsoft Security Response Center : This blog post was updated Sept. 5, 2011 below. Microsoft’s investigation into the scope and impact of the DigiNotar compromise has continued over the holiday weekend. We’ve now confirmed that spoofed certificates for...
6 Sep 2011
Windows Live ID OpenID Status Update
Here's an update from the Windows Live Group on integrating Windows Live ID with OpenID from the Windows Live blog: Many people have asked recently about the status of the Windows Live® ID community technology preview (CTP) OpenID endpoints, so here is a quick update. We gathered a lot of great...
28 Aug 2009
Kim Cameron Responds to Critique of Identity Federation
Microsoft's Kim Cameron responds on his Identity Blog to recent criticism of the concept of identity federation : in a recent piece at The Federal Circle , Earl Smith II, managing partner, comes out “all guns blazing” against identity federation and the “weird and wonderful”...
9 Sep 2010
Using Consumer Identities for Business Interactions
Microsoft's Kim Cameron writes on his Identity Blog : Using Consumer Identities for Business Interactions Posted on Saturday 10 July 2010 Mike Jones writes about an “identity mashup” that drives home a really important lesson: the organizational and technical walls that used to...
14 Jul 2010
Identity Crisis? What Crisis?
Jerry Fishenden, National Technology Officer for the UK, here ... If you think the current problems of online safety and Internet e-crime (or cybercrime if you prefer) appear challenging, what on earth is going to happen when the Internet pervades every aspect of our daily lives? As the Internet...
12 Jun 2007
Digital Playgrounds presentation at the Berkman Center
Last week I presented the concepts from Microsoft's paper, " Digital Playgrounds: Creating Safer Online Environments for Children ," at the Internet Safety Technical Task Force (ISTTF) Open Meeting at the Berkman Center for Internet & Society in Cambridge, Mass. The Digital Playgrounds paper outlines...
29 Sep 2008
Doing it right: Touch2Id
Microsoft's Kim Cameron writes on his Identity blog : And now for something refreshingly different: an innovative company that is doing identity right. I’m talking about a British outfit called Touch2Id . Their concept is really simple. They offer young people a smart card that can be...
7 Jul 2010
Privacy & Identity Theft Conference
I recently delivered a keynote address at the Privacy & Identity Theft Conference in Vancouver, Canada. My keynote was entitled, "The Big Picture: Defining and Redefining Identity Fraud." Below is the major portion of my keynote, along with the relevant slides here in a pdf . At the time it...
23 Dec 2008
There is a fundamental problem here
Collection of the MAC addresses of phones and laptops is especially worrisome ...read more
7 Jun 2010
Kim Cameron on Information Cards as a solution to site redirection
Kim Cameron, Chief Architect of Identity in the Connected Systems Division at Microsoft has an interesting post up about at his Laws of Identity blog on the vulnerability of passwords to "site redirection ", a problem that Information Cards don't have: The UK's Register has been running a a series...
27 Oct 2008
© 2014 Microsoft Corporation.
Privacy & Cookies