This is an archive for my blog, originally placed at pcis.com/vaclav
Security is always based on a risk analysis. Just make sure you do one.
The computer people should work harder to create systems for people, which are easier to use.
The question is not only who is in charge of your identity, but also who owns your identity.
Organizations should make this part of their business continuity planning.