What is the Data Economy? And Why Should We Care?

Forget the private eye sitting in his car across the street with his binoculars trained on a single subject. Surveillance has moved en masse and mainstream. The ‘binoculars’ of the Internet are trained on You. Me. Us. 24/7.  This surveillance is driving the ‘digital revolution’ and its engine room, the ‘data economy’, in which digital data […]

441 views

What is Anonyome Labs’ Social License to Operate?

All companies and government agencies operate under multiple formal laws and regulations – employment and workplace laws, financial and accounting standards, data breach notification requirements and many more. But whether they know it or not, these organizations also operate in the informal context of their social license to operate (social license), which measures the community acceptance granted […]

508 views

What is Pseudonymization?

Our personal identities are complex. We choose to share information about ourselves differently depending on the context of a relationship or situation. Aspects of our identity can change over time. We may choose to compartmentalize aspects of our lives for a greater feeling of privacy and safety. Pseudonyms are Not New Pseudonyms are an old concept that people […]

536 views

What is a Sudo?

A core capability of Anonyome Labs’ products is the Sudo—a secure, customizable digital identity or ‘profile’ that intentionally differentiates from a consumer’s personal identity and protects their personal data.  A Sudo isn’t a ‘burner’ or fake ID—it’s a real, alternative identity that a consumer can use anywhere their personal identity is required. The consumer’s Sudo profile is a secure stand-in […]

583 views

What Are Consumers Saying About Privacy and Safety?

A quick search will tell you that consumers have a lot to say about data privacy and safety. It’s a hot topic among global professional service providers like McKinsey, Cisco and PwC and the trending messages are:  High profile, significant, and regular data breaches have spooked consumers.  Consumers generally get that they have to trade certain personal information for services, but are now warier […]

769 views

What is Homomorphic Encryption?

Whether for a business or an individual, there is no such thing as absolute privacy or absolute security. Security and privacy are continua that contribute to overall feelings of safety and trust, and are considered in the context of: What data or systems are being protected? What are the benefits of the protection? What is […]

836 views

Where Will Privacy Be in 10 Years?

When the International Association of Privacy Professionals recently released Visions of Privacy, a future-looking anthology of contributions from privacy thought-leaders around the world, we got to thinking about our own response to the big questions:  How far has privacy come in the past 20 years?  Where do we see privacy and data protection in 10 years’ time?  What […]

875 views

The Limitations of Traditional PKIs for Delivering the Customer Identity Management Solution Enterprises Urgently Need

Public key infrastructures (PKIs) cover all elements of establishing and managing public key encryption, currently the foundational form of encryption used to communicate securely on the Internet and within organizations.   Public key encryption includes generating, exchanging, storing, using, destroying, and replacing keys, plus the procedures and protocols around those functions.   PKIs enable trustworthy communications between users and systems. Successfully managing the cryptographic keys in a cryptosystem is essential to the security of that cryptosystem.  Traditional PKI systems and […]

935 views

The Business Benefits From Using Decentralized Identity Technologies For Customer Identity Management

Businesses that recognize and seize the opportunity to use emerging standardized decentralized identity technologies for customer identity management will create a long-term competitive advantage that will enable them to leapfrog the competition and maintain their lead far into the future.  This leading edge will come from having a holistic solution to identity management that encompasses identity, security, and privacy. For the organizations with the foresight to embrace them, decentralized identity technologies will:   Reduce the need for centralized databases to the absolute minimum […]

1.1K views

The California Consumer Privacy Act and Why You Must Still Keep Control of Your Personal Information

If you live in California or elsewhere in the United States, you may have heard of the California Consumer Privacy Act (CCPA). You might not have read the legislation or our take on it for businesses, but you may have seen CCPA mentioned on web sites you access. So, what exactly does CCPA mean for you? CCPA Benefits You  If you […]

941 views

How Sudos are Making Decentralized Identity Usable for Most People

Decentralized identity (also known as self-sovereign identity) is the future—and our secure digital identity, the Sudo, is opening up the possibility of decentralized identity for most people. Decentralized identity  is maturing. Many companies, organizations and individuals have been working to establish open standards for decentralized identity. Widespread adoption of decentralized identity seems to be inevitable, and companies […]

938 views

Businesses Must Become Smaller Cybersecurity Targets, For Their Sake and Their Users’

Every enterprise in the world, whether major brand or small business, faces cybercrime as a major threat. This growing challenge, and the cybersecurity innovations designed to thwart it, will be hallmarks of the coming decades.   Solutions will lie in greater investment in cybersecurity systems, and increasingly sophisticated innovations like secure digital identities and decentralized identity management.  The goal is […]

883 views

Decentralized Identity: Key Concepts Explained

Upcoming advancements in digital identity technologies build on the Sudo concept and include identity decentralization. Decentralized identities give users back control over their personal data, give these identities the verifiable assurance of blockchain technologies, and enable users to make assertions about their data (e.g., I’m over 21) without revealing the actual data itself (e.g., birthdate:  1 Jan 1970).  Decentralized […]

1.3K views

Anonyome Labs Joins Global Fight Against Stalkerware

Stalkerware is a serious threat to privacy and safety that demands urgent attention.  Stalkerware is software, made available directly to individuals, that enables a remote user to monitor the activities on another user’s device without that user’s consent and without explicit, persistent notification to that user in order to intentionally or unintentionally facilitate intimate partner […]

790 views