What Are Consumers Saying About Privacy and Safety?

A quick search will tell you that consumers have a lot to say about data privacy and safety. It’s a hot topic among global professional service providers like McKinsey, Cisco and PwC and the trending messages are:  High profile, significant, and regular data breaches have spooked consumers.  Consumers generally get that they have to trade certain personal information for services, but are now warier […]


What is Homomorphic Encryption?

Whether for a business or an individual, there is no such thing as absolute privacy or absolute security. Security and privacy are continua that contribute to overall feelings of safety and trust, and are considered in the context of: What data or systems are being protected? What are the benefits of the protection? What is […]


Where Will Privacy Be in 10 Years?

When the International Association of Privacy Professionals recently released Visions of Privacy, a future-looking anthology of contributions from privacy thought-leaders around the world, we got to thinking about our own response to the big questions:  How far has privacy come in the past 20 years?  Where do we see privacy and data protection in 10 years’ time?  What […]


The Limitations of Traditional PKIs for Delivering the Customer Identity Management Solution Enterprises Urgently Need

Public key infrastructures (PKIs) cover all elements of establishing and managing public key encryption, currently the foundational form of encryption used to communicate securely on the Internet and within organizations.   Public key encryption includes generating, exchanging, storing, using, destroying, and replacing keys, plus the procedures and protocols around those functions.   PKIs enable trustworthy communications between users and systems. Successfully managing the cryptographic keys in a cryptosystem is essential to the security of that cryptosystem.  Traditional PKI systems and […]


The Business Benefits From Using Decentralized Identity Technologies For Customer Identity Management

Businesses that recognize and seize the opportunity to use emerging standardized decentralized identity technologies for customer identity management will create a long-term competitive advantage that will enable them to leapfrog the competition and maintain their lead far into the future.  This leading edge will come from having a holistic solution to identity management that encompasses identity, security, and privacy. For the organizations with the foresight to embrace them, decentralized identity technologies will:   Reduce the need for centralized databases to the absolute minimum […]


The California Consumer Privacy Act and Why You Must Still Keep Control of Your Personal Information

If you live in California or elsewhere in the United States, you may have heard of the California Consumer Privacy Act (CCPA). You might not have read the legislation or our take on it for businesses, but you may have seen CCPA mentioned on web sites you access. So, what exactly does CCPA mean for you? CCPA Benefits You  If you […]


How Sudos are Making Decentralized Identity Usable for Most People

Decentralized identity (also known as self-sovereign identity) is the future—and our secure digital identity, the Sudo, is opening up the possibility of decentralized identity for most people. Decentralized identity  is maturing. Many companies, organizations and individuals have been working to establish open standards for decentralized identity. Widespread adoption of decentralized identity seems to be inevitable, and companies […]


Businesses Must Become Smaller Cybersecurity Targets, For Their Sake and Their Users’

Every enterprise in the world, whether major brand or small business, faces cybercrime as a major threat. This growing challenge, and the cybersecurity innovations designed to thwart it, will be hallmarks of the coming decades.   Solutions will lie in greater investment in cybersecurity systems, and increasingly sophisticated innovations like secure digital identities and decentralized identity management.  The goal is […]


Decentralized Identity: Key Concepts Explained

Upcoming advancements in digital identity technologies build on the Sudo concept and include identity decentralization. Decentralized identities give users back control over their personal data, give these identities the verifiable assurance of blockchain technologies, and enable users to make assertions about their data (e.g., I’m over 21) without revealing the actual data itself (e.g., birthdate:  1 Jan 1970).  Decentralized […]


Anonyome Labs Joins Global Fight Against Stalkerware

Stalkerware is a serious threat to privacy and safety that demands urgent attention.  Stalkerware is software, made available directly to individuals, that enables a remote user to monitor the activities on another user’s device without that user’s consent and without explicit, persistent notification to that user in order to intentionally or unintentionally facilitate intimate partner […]


What’s the Big Problem with Using Your Personal Identity Online?

Identity is an important part of what it means to be human. People commonly believe they have a single, consistent, and unique identity that makes them who they are. They each have different values and experiences that they believe defines them.  In reality, identity is much more dynamic. People tailor their identity to different contexts, […]


Why We Need Decentralized Identity

Decentralized identity is a new approach to user identity on the Internet. It is a set of emerging technologies, standards, and protocols for giving users back their privacy. It is alternatively known as ‘self-sovereign identity’ or ‘self-owned identity’—and is the future for privacy and security online. Given the alarming statistics, current methods for managing identity […]


What Constitutes Personally Identifiable Information or PII?

If you’re trying to protect something, it’s important to understand exactly what it is you’re trying to protect.  This is true of personally identifiable information or PII. PII is any data that can be used to identify a person. It’s the personal information we’re trying to protect with data privacy and cybersafety technologies, because it’s […]


How We Apply the 7 Principles of Privacy by Design

Achieving great privacy outcomes does not happen by chance. It requires thoughtful, informed design. Most importantly, privacy management demands an interdisciplinary, systems engineering approach because it spans: the entire data lifecycle—acquisition, use, storage, retention and disposal multiple teams with differing objectives (e.g. product management and engineering, user support, sales and marketing finance, risk and compliance) multiple control […]