Tag Archives: authentication

Identity and Authentication Online

The architectures of control, argues Lessig, are in fact as much driven by commerce as they are by the government, and are not, in and of themselves, a bad thing, but being ignorant of the direction we are headed toward, certainly is not good. As you read the chapter, share your thoughts on:

  1. How is identity and authentication played out in real space? (p. 39–43) and why is it important to have solid technologies for better authentication?
  2. What about identity and authentication in cyberspace? What does TCP/IP have to do with the internet’s design to protect identity and functional efficiency?  (pp. 43–45).
  3. How does the IP address reveal a trace or provide a clue to your identity? (p. 46).What does “reverse DNS look-up” have to do with it? What role do cookies play in this process? (p. 48).
  4. How does SSO (single sign-on) technology provide better authentification? Which organizations use it? (p. 49). What is the Identity Layer and how is it better? (p. 50–52). What is “packet filtering” technology (p. 56)?