FIDO & Privacy

  In time for the data privacy day the FIDO Privacy & Public Policy working group released their FIDO Privacy whitepaper. This new whitepaper is targeted at regulators, data protection authorities, and “policy makers”. Of course, everyone with interest in privacy is also welcome to take a look at it. Due

Internet of Things (IoT) Semantic Interoperability Workshop 2016

Today’s Internet of Things deployments are not known for their great interoperability. Typically, devices are only able to speak to one specific gateway, app downloaded from the device vendor, or to a single cloud provider. Getting devices from different vendors to talk to each other is challenging. The reason for

My Guide to Running

[Warning: This is not one of my IETF/Internet standardization blog posts.] It is known to many that I like running; I also talk about it, show pictures from various running events, and offer recommendations. Hence, it is not unreasonable to ask me what recommendations I can offer for someone who wants

Webinar about the Kantara User-Managed Access (UMA) working group to the IETF ACE Working Group

[UPDATED: 14. January 2015] Early 2014 we organized a couple of webinars to hear about technologies that allowed to provide authentication of Internet of Things devices and to control access to resources. We learned more about OAuth, Kerberos, and the PKI/certificate model and all talks have been recorded and can be found

Webinar about “How to Select Hardware for Internet of Things Systems?”

Various groups in the IETF currently standardize technology for use with constrained devices and the choice of hardware impacts the design of Internet of Things (IoT) systems. To provide guidance RFC 7228 “Terminology for Constrained-Node Networks” defines three classes of devices depending on their RAM and flash memory size. Class