Identity Models in the Internet

Photo by William Iven on Unsplash

Centralised Identity/Internal Identity Management

  • An individual can have up to 70–80 passwords. Remembering them is impossible unless you’re a genius!
  • Data leaks are becoming increasingly common, and can have devastating impact on individuals which ranges from stolen identities to sharing of personal data.

Federated Identity

External Authentication

Decentralised Identity

Image from blockchain.com

--

--

--

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Unblock WhatsApp account,when it is blocked

AWS Security Best Practices

Hacking JWT Tokens: Verification Key Mismanagement II

Certified Kubernetes Security Specialist(CKS) Ultimate Guide

Microsoft Hacking Call 2022 — Video Record & Consequences

Small Security Teams — Foundational Elements First

A07:2021-Identification and Authentication Failures

{UPDATE} 经典斗地主-癞子真人版单机斗地主游戏 Hack Free Resources Generator

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Abrar Rauf

Abrar Rauf

More from Medium

Why are VCs so Interested in African Fintech Startups?

WHY IS UNDERSTANDING INNOVATION IN CHINA CRUCIAL FOR INVESTORS & INNOVATORS IN EUROPE?

How the UN’s Ruggie Principles set corporate responsibility