{"id":8266,"date":"2017-07-04T23:58:18","date_gmt":"2017-07-04T21:58:18","guid":{"rendered":"https:\/\/magazine.swissinformatics.org\/identity-in-cyberspace\/"},"modified":"2022-07-02T14:05:26","modified_gmt":"2022-07-02T12:05:26","slug":"identity-in-cyberspace","status":"publish","type":"post","link":"https:\/\/magazine.swissinformatics.org\/fr\/identity-in-cyberspace\/","title":{"rendered":"Identity in Cyberspace"},"content":{"rendered":"<p>I have a colleague \u2013 and this not me myself \u2013 who has recently become victim of several identity thefts in a row. The goal of the thefts was to severely damage his life and to get into his footsteps, assignments, and contracts in business. According to popular assumptions the whole case is impossible: Money or other direct benefits were not the goal of the thief. Real world communities and activities were involved but this did not protect the victim. There is also no evidence that some unusually careless behavior took place. Following the German poet Christian Morgenstern, we could conclude that there were no identity thefts:<\/p>\n<p>Und er kommt zu dem Ergebnis:<br \/>\n\u00bbNur ein Traum war das Erlebnis.<br \/>\nWeil\u00ab, so schlie\u00dft er messerscharf,<br \/>\n\u00bbnicht sein kann, was nicht sein darf.\u00ab<\/p>\n<p>Still the impact of the identity thefts is very real. So why could it happen? The key problem was that out of very little evidence (coming from the thief owning a copy of the victim\u2019s passport) a convincing chain of trust could emerge, because in the online world identity is usually not scrutinized. If for the involved transactions a legal electronic identity (eID) \u2013 that is an online equivalent to a passport in the physical world, whose data a guaranteed by a national state \u2013 would be mandatory, the thief would have needed significantly more criminal energy and higher technical skills to pursue his goals. In addition, he would face now a significantly higher likelihood for a significantly higher punishment by Justice. Therefore, it is fair to assume that the enforcement to use legal eIDs and other trust services for critical online transactions and the enforcement to validate identities in critical organizational processes would have saved my colleague from becoming a victim \u2013 and it would help in many similar scenarios for identity theft, too.<\/p>\n<p><strong>Two types of problems<\/strong><\/p>\n<p>The sketched case is one where things went wrong because in many settings people do not care about the evidence for another\u2019s identity. The more real and digital worlds become inseparably entangled the more such cases we shall see. On the contrary, many transactions do not take place on the Internet and services are either not offered or hardly used when they are offered just because people and the lawmakers are aware of the risks. Both, the misuse and the non-use, hinder the digital transformation of economy and society significantly.<\/p>\n<p><strong>Trust services are must-haves<\/strong><\/p>\n<p>Relying on insurances for payments is not enough to make the Internet a trustworthy place. If we want to establish a sustainable digital transformation then we urgently need<\/p>\n<ol>\n<li>Universally usable trust services providing capabilities for trustworthy authentication, time stamping, digital signing, and certifications of properties \u2013 for individuals, organizations, and also for Websites and machines<\/li>\n<li>Enforcement to use these services in all contexts where an identity theft could realistically take place<\/li>\n<\/ol>\n<p><strong>The role of government<\/strong><\/p>\n<p>Like in the physical world in case of passports, at least authentication and the certification of basic attributes should be provided by the government. Outsourcing this to private industry or NGOs puts up the question whether we need a state in the future at all. In this context, countries like Denmark and Austria have decided to re-nationalize their so far half-private legal eIDs.<\/p>\n<p>Also the cross-border usability requires government involvement. The EU has paved the way through its Large Scale Pilots from the STORK family and the eIDAS regulation, which is based on mutual recognition of notified national legal eIDs through an interoperability infrastructure.<\/p>\n<p><strong>Self-managed privacy<\/strong><\/p>\n<p><strong>T<\/strong>rust services like those depicted above also contribute to the protection of privacy. On the one hand trustworthy attributes reduce the amount of information needed for trust management. On the other hand the ultimate goal of privacy protection is to give concerned citizens control over how others store data about them. Practically feasible and user-friendly solutions are much easier to design and implement, when the concerned citizens own universally usable legal eIDs.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I have a colleague \u2013 and this not me myself \u2013 who has recently become victim of several identity thefts in a row. The goal of the thefts was to severely damage his life and to get into his footsteps, assignments, and contracts in business. According to popular assumptions the whole case is impossible: Money [&hellip;]<\/p>\n","protected":false},"author":1516,"featured_media":10563,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1246,460],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Identity in Cyberspace - SI Digital Magazine<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/magazine.swissinformatics.org\/fr\/identity-in-cyberspace\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Identity in Cyberspace - SI Digital Magazine\" \/>\n<meta property=\"og:description\" content=\"I have a colleague \u2013 and this not me myself \u2013 who has recently become victim of several identity thefts in a row. The goal of the thefts was to severely damage his life and to get into his footsteps, assignments, and contracts in business. According to popular assumptions the whole case is impossible: Money [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/magazine.swissinformatics.org\/fr\/identity-in-cyberspace\/\" \/>\n<meta property=\"og:site_name\" content=\"SI Digital Magazine\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/www.swissinformatics.org\/?fref=ts\" \/>\n<meta property=\"article:published_time\" content=\"2017-07-04T21:58:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-02T12:05:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2017\/07\/Economy2.FeatImage_SOMMER.png\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"344\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Reinhard Riedl\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@SIGesellschaft\" \/>\n<meta name=\"twitter:site\" content=\"@SIGesellschaft\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Reinhard Riedl\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/fr\/identity-in-cyberspace\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/magazine.swissinformatics.org\/fr\/identity-in-cyberspace\/\"},\"author\":{\"name\":\"Reinhard Riedl\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/person\/cd91ee114c126cf88b8b23019229804c\"},\"headline\":\"Identity in Cyberspace\",\"datePublished\":\"2017-07-04T21:58:18+00:00\",\"dateModified\":\"2022-07-02T12:05:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/magazine.swissinformatics.org\/fr\/identity-in-cyberspace\/\"},\"wordCount\":659,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#organization\"},\"articleSection\":[\"\u2022 Point de vue \u2022\",\"Societ\u00e9\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/magazine.swissinformatics.org\/fr\/identity-in-cyberspace\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/fr\/identity-in-cyberspace\/\",\"url\":\"https:\/\/magazine.swissinformatics.org\/fr\/identity-in-cyberspace\/\",\"name\":\"Identity in Cyberspace - SI Digital Magazine\",\"isPartOf\":{\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#website\"},\"datePublished\":\"2017-07-04T21:58:18+00:00\",\"dateModified\":\"2022-07-02T12:05:26+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/magazine.swissinformatics.org\/fr\/identity-in-cyberspace\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/magazine.swissinformatics.org\/fr\/identity-in-cyberspace\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/fr\/identity-in-cyberspace\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/magazine.swissinformatics.org\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Identity in Cyberspace\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#website\",\"url\":\"https:\/\/magazine.swissinformatics.org\/en\/\",\"name\":\"SI Digital Magazine\",\"description\":\"News - Nachrichten - Nouvelles - Notizie\",\"publisher\":{\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/magazine.swissinformatics.org\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#organization\",\"name\":\"Swiss Informatics Society\",\"url\":\"https:\/\/magazine.swissinformatics.org\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2017\/11\/SI_KeyImage_4to3.jpg\",\"contentUrl\":\"https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2017\/11\/SI_KeyImage_4to3.jpg\",\"width\":1441,\"height\":1081,\"caption\":\"Swiss Informatics Society\"},\"image\":{\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.swissinformatics.org\/?fref=ts\",\"https:\/\/twitter.com\/SIGesellschaft\",\"https:\/\/www.youtube.com\/channel\/UCYUEr1Qkbri9GDTa84z415g\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/person\/cd91ee114c126cf88b8b23019229804c\",\"name\":\"Reinhard Riedl\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/244c2719ab9d6130c3d585f5172c2b0b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/244c2719ab9d6130c3d585f5172c2b0b?s=96&d=mm&r=g\",\"caption\":\"Reinhard Riedl\"},\"description\":\"Reinhard Riedl, MEng PhD, is a mathematician who focuses on transdisciplinary research combining computer science, business administration, law, political science, economics, psychology, sociology, and ethnology.\",\"url\":\"https:\/\/magazine.swissinformatics.org\/fr\/author\/reinhard-riedl\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Identity in Cyberspace - SI Digital Magazine","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/magazine.swissinformatics.org\/fr\/identity-in-cyberspace\/","og_locale":"fr_FR","og_type":"article","og_title":"Identity in Cyberspace - SI Digital Magazine","og_description":"I have a colleague \u2013 and this not me myself \u2013 who has recently become victim of several identity thefts in a row. The goal of the thefts was to severely damage his life and to get into his footsteps, assignments, and contracts in business. According to popular assumptions the whole case is impossible: Money [&hellip;]","og_url":"https:\/\/magazine.swissinformatics.org\/fr\/identity-in-cyberspace\/","og_site_name":"SI Digital Magazine","article_publisher":"https:\/\/www.facebook.com\/www.swissinformatics.org\/?fref=ts","article_published_time":"2017-07-04T21:58:18+00:00","article_modified_time":"2022-07-02T12:05:26+00:00","og_image":[{"width":612,"height":344,"url":"https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2017\/07\/Economy2.FeatImage_SOMMER.png","type":"image\/png"}],"author":"Reinhard Riedl","twitter_card":"summary_large_image","twitter_creator":"@SIGesellschaft","twitter_site":"@SIGesellschaft","twitter_misc":{"\u00c9crit par":"Reinhard Riedl","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/magazine.swissinformatics.org\/fr\/identity-in-cyberspace\/#article","isPartOf":{"@id":"https:\/\/magazine.swissinformatics.org\/fr\/identity-in-cyberspace\/"},"author":{"name":"Reinhard Riedl","@id":"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/person\/cd91ee114c126cf88b8b23019229804c"},"headline":"Identity in Cyberspace","datePublished":"2017-07-04T21:58:18+00:00","dateModified":"2022-07-02T12:05:26+00:00","mainEntityOfPage":{"@id":"https:\/\/magazine.swissinformatics.org\/fr\/identity-in-cyberspace\/"},"wordCount":659,"commentCount":0,"publisher":{"@id":"https:\/\/magazine.swissinformatics.org\/en\/#organization"},"articleSection":["\u2022 Point de vue \u2022","Societ\u00e9"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/magazine.swissinformatics.org\/fr\/identity-in-cyberspace\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/magazine.swissinformatics.org\/fr\/identity-in-cyberspace\/","url":"https:\/\/magazine.swissinformatics.org\/fr\/identity-in-cyberspace\/","name":"Identity in Cyberspace - SI Digital Magazine","isPartOf":{"@id":"https:\/\/magazine.swissinformatics.org\/en\/#website"},"datePublished":"2017-07-04T21:58:18+00:00","dateModified":"2022-07-02T12:05:26+00:00","breadcrumb":{"@id":"https:\/\/magazine.swissinformatics.org\/fr\/identity-in-cyberspace\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/magazine.swissinformatics.org\/fr\/identity-in-cyberspace\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/magazine.swissinformatics.org\/fr\/identity-in-cyberspace\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/magazine.swissinformatics.org\/en\/"},{"@type":"ListItem","position":2,"name":"Identity in Cyberspace"}]},{"@type":"WebSite","@id":"https:\/\/magazine.swissinformatics.org\/en\/#website","url":"https:\/\/magazine.swissinformatics.org\/en\/","name":"SI Digital Magazine","description":"News - Nachrichten - Nouvelles - Notizie","publisher":{"@id":"https:\/\/magazine.swissinformatics.org\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/magazine.swissinformatics.org\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/magazine.swissinformatics.org\/en\/#organization","name":"Swiss Informatics Society","url":"https:\/\/magazine.swissinformatics.org\/en\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/logo\/image\/","url":"https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2017\/11\/SI_KeyImage_4to3.jpg","contentUrl":"https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2017\/11\/SI_KeyImage_4to3.jpg","width":1441,"height":1081,"caption":"Swiss Informatics Society"},"image":{"@id":"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/www.swissinformatics.org\/?fref=ts","https:\/\/twitter.com\/SIGesellschaft","https:\/\/www.youtube.com\/channel\/UCYUEr1Qkbri9GDTa84z415g"]},{"@type":"Person","@id":"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/person\/cd91ee114c126cf88b8b23019229804c","name":"Reinhard Riedl","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/244c2719ab9d6130c3d585f5172c2b0b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/244c2719ab9d6130c3d585f5172c2b0b?s=96&d=mm&r=g","caption":"Reinhard Riedl"},"description":"Reinhard Riedl, MEng PhD, is a mathematician who focuses on transdisciplinary research combining computer science, business administration, law, political science, economics, psychology, sociology, and ethnology.","url":"https:\/\/magazine.swissinformatics.org\/fr\/author\/reinhard-riedl\/"}]}},"_links":{"self":[{"href":"https:\/\/magazine.swissinformatics.org\/fr\/wp-json\/wp\/v2\/posts\/8266"}],"collection":[{"href":"https:\/\/magazine.swissinformatics.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/magazine.swissinformatics.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/magazine.swissinformatics.org\/fr\/wp-json\/wp\/v2\/users\/1516"}],"replies":[{"embeddable":true,"href":"https:\/\/magazine.swissinformatics.org\/fr\/wp-json\/wp\/v2\/comments?post=8266"}],"version-history":[{"count":0,"href":"https:\/\/magazine.swissinformatics.org\/fr\/wp-json\/wp\/v2\/posts\/8266\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/magazine.swissinformatics.org\/fr\/wp-json\/wp\/v2\/media\/10563"}],"wp:attachment":[{"href":"https:\/\/magazine.swissinformatics.org\/fr\/wp-json\/wp\/v2\/media?parent=8266"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/magazine.swissinformatics.org\/fr\/wp-json\/wp\/v2\/categories?post=8266"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/magazine.swissinformatics.org\/fr\/wp-json\/wp\/v2\/tags?post=8266"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}