<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="https://shkspr.mobi/blog/wp-content/themes/edent-wordpress-theme/rss-style.xsl" type="text/xsl"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	    xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	     xmlns:dc="http://purl.org/dc/elements/1.1/"
	   xmlns:atom="http://www.w3.org/2005/Atom"
	     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	  xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>
<channel>
	<title>identity &#8211; Terence Eden’s Blog</title>
	<atom:link href="https://shkspr.mobi/blog/tag/identity/feed/" rel="self" type="application/rss+xml" />
	<link>https://shkspr.mobi/blog</link>
	<description>Regular nonsense about tech and its effects 🙃</description>
	<lastBuildDate>Sun, 22 Feb 2026 10:32:06 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://shkspr.mobi/blog/wp-content/uploads/2023/07/cropped-avatar-32x32.jpeg</url>
	<title>identity &#8211; Terence Eden’s Blog</title>
	<link>https://shkspr.mobi/blog</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title><![CDATA[How do you link Verifiable Credentials to a human?]]></title>
		<link>https://shkspr.mobi/blog/2021/06/how-do-you-link-verifiable-credentials-to-a-human/</link>
					<comments>https://shkspr.mobi/blog/2021/06/how-do-you-link-verifiable-credentials-to-a-human/#comments</comments>
				<dc:creator><![CDATA[@edent]]></dc:creator>
		<pubDate>Sat, 19 Jun 2021 11:37:51 +0000</pubDate>
				<category><![CDATA[/etc/]]></category>
		<category><![CDATA[ID]]></category>
		<category><![CDATA[identity]]></category>
		<guid isPermaLink="false">https://shkspr.mobi/blog/?p=39140</guid>

					<description><![CDATA[Verifiable Credentials are a brilliant standard to help... well... Verify Credentials. How do you know that someone has an MBA from Harvard? It&#039;s pretty easy to fake a degree certificate, or to change your name to George W. Bush, or simply lie.  The same is true with any attestation - it&#039;s often hard to contact the issuer of a claim and check that it is genuine.  Verifiable Credentials aims to…]]></description>
										<content:encoded><![CDATA[<p><a href="https://www.w3.org/TR/vc-data-model/">Verifiable Credentials</a> are a brilliant standard to help... well... Verify Credentials. How do you know that someone has an MBA from Harvard? It's pretty easy to fake a degree certificate, or to change your name to George W. Bush, or simply lie.  The same is true with any attestation - it's often hard to contact the issuer of a claim and check that it is genuine.</p>

<p>Verifiable Credentials aims to solve that. The standard describes a document which includes the claim (this person is an airline pilot), the person's identity (name, DOB, etc), the party making the claim (Name, ID, date of issuing), and a digital signature to tie it all together. (It is a lot more complicated than that, obviously.)</p>

<p>Let's take a look at <a href="https://github.pathcheck.org/debug.html">the data inside COVID Vaccine "Passport"</a>.  I've removed some of the metadata for simplicity, but you can <a href="https://ec.europa.eu/info/live-work-travel-eu/coronavirus-response/safe-covid-19-vaccines-europeans/eu-digital-covid-certificate_en">read the full spec if you're interested</a>.</p>

<pre><code class="language-json">   {
   "ver": "1.0.0",
   "nam": {
     "fn": "Smith",
     "gn": "Jo",
   },
   "dob": "1984-02-29",
   "t": [
     {
       "tg": "840539006",
       "tt": "LP217198-3",
       "tr": "260415000",
       "ma": "1232",
       "sc": "2021-04-13T14:20:00+00:00",
       "dr": "2021-04-13T14:40:01+00:00",
       "tc": "GGD Fryslân, L-Heliconweg",
       "co": "NL",
       "is": "Ministry of VWS",
       "ci": "urn:uvci:01:NL:GGD/81AAH16AZ"
     }
   ]
},
"YR/yMsyE3AOysWLCXuDc/Rlu507gH0/wgok+P8dxJtCwy0ydsIE2J5MeMxbynynU3n//zgOKSTB20FN0Fs1bgQ=="
</code></pre>

<p>It tells you the person's name, date of birth, when they had the vaccine, which vaccine it is, who administered it, some administrative codes, and then gives it a digital signature which can be verified without needing an Internet connection. Nifty!</p>

<p>The same is broadly true with academic qualifications. It lists your names, birthday, university, level obtained. Or your employment history can be encoded with your employment dates, salary, references.</p>

<p>So you can show the above - encoded as a QR code - to anyone. They can scan it and verify that it is authentic! AWESOME!</p>

<p>Except...</p>

<p>How do you prove that you're the person mentioned in the credential?</p>

<p>You could show your passport or driving licence at the same time. Assuming you can afford either of those documents.  But that still leaves the same problem. How do you prove that the passport belongs to you?  Perhaps you grabbed it at the same time you stole the certificate.</p>

<p>Humans are not very good at recognising faces from photos. So comparing the picture of me in my passport (young! clean shaven! well lit!) with the person in front of you (old and tired! beardy! under a street lamp!) is always going to be error prone.</p>

<p>This isn't a problem which can be solved by adding more digital signatures. Even if I co-signed the credential with my private key - you have no way of linking that key to a corporeal human being.</p>

<p>A Verifiable Credential <em>could</em> also contain a hash of biometric data like a fingerprint, for example. But that leads to further problems. Are people comfortable giving away their biometrics to lots of different organisations? Do verifiers want the extra expense of getting fingerprint readers? That might work for an airport, but is probably prohibitive for a café.  You could use proxies - did I see this person unlock their phone to present the claim - but these are weak ties at best.</p>

<p>To be clear, this problem isn't limited to vaccine certificates. It applies to any Verifiable Credential. Whether it is an academic qualification, a health certificate, employment status, or any other claim.</p>

<p>This isn't something which can be solved by putting a claim on a blockchain (lolsob) - it is a fundamental limitation of the fact that humans don't come with built in, irrevocable, digital signatures.</p>
<img src="https://shkspr.mobi/blog/wp-content/themes/edent-wordpress-theme/info/okgo.php?ID=39140&HTTP_REFERER=RSS" alt="" width="1" height="1" loading="eager">]]></content:encoded>
					
					<wfw:commentRss>https://shkspr.mobi/blog/2021/06/how-do-you-link-verifiable-credentials-to-a-human/feed/</wfw:commentRss>
			<slash:comments>20</slash:comments>
		
		
			</item>
		<item>
		<title><![CDATA[One Avatar To Rule Them All]]></title>
		<link>https://shkspr.mobi/blog/2020/03/one-avatar-to-rule-them-all/</link>
					<comments>https://shkspr.mobi/blog/2020/03/one-avatar-to-rule-them-all/#comments</comments>
				<dc:creator><![CDATA[@edent]]></dc:creator>
		<pubDate>Wed, 11 Mar 2020 13:35:40 +0000</pubDate>
				<category><![CDATA[/etc/]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[ReDeCentralize]]></category>
		<category><![CDATA[web]]></category>
		<guid isPermaLink="false">https://shkspr.mobi/blog/?p=34204</guid>

					<description><![CDATA[Someone took a nice photo of me recently. I&#039;d like to use it as my avatar photo everywhere to present a consistent image. This is not easy to do.  I&#039;ve had to manually change it on a dozen different Slacks, a bunch of social networks, a few forums, all my email accounts, and I&#039;m still not done.  I just want to change my photo once. Because I&#039;m vain and lazy.  For a nerd like me, the solution is…]]></description>
										<content:encoded><![CDATA[<p>Someone took a nice photo of me recently. I'd like to use it as my avatar photo <em>everywhere</em> to present a consistent image. This is not easy to do.</p>

<p>I've had to manually change it on a dozen different Slacks, a bunch of social networks, a few forums, all my email accounts, and I'm still not done.</p>

<p>I just want to change my photo once. Because I'm vain and lazy.</p>

<p>For a nerd like me, the solution is obvious:</p>

<ul>
<li>My latest avatar image has a permanent web address - <a href="https://edent.tel/avatar">https://edent.tel/avatar</a>.</li>
<li>When I register for a service, it should ask me for my homepage address and automatically detect the URl for my avatar.</li>
<li>Periodically, it should check for an update.</li>
</ul>

<h2 id="what-about-gravatar"><a href="https://shkspr.mobi/blog/2020/03/one-avatar-to-rule-them-all/#what-about-gravatar">What about Gravatar?</a></h2>

<p>The <a href="https://en.gravatar.com/">Globally Recognised Avatar</a> project from WordPress is supposed to be a solution to this problem. But it doesn't work, for two main reasons.</p>

<ol>
<li>Not everywhere uses it.</li>
<li>Works on a per-email basis.</li>
</ol>

<p>Nothing we can do about (1), but I find (2) is <em>annoying</em>.  I use a different email address for each website I use. Which means I have <em>dozens</em> of Gravatars!</p>

<p>Because Gravatar uses MD5 hashes, there's no way around this. It's also a (minor) privacy concern.</p>

<h2 id="what-about-libravatar"><a href="https://shkspr.mobi/blog/2020/03/one-avatar-to-rule-them-all/#what-about-libravatar">What about Libravatar?</a></h2>

<p>The <a href="https://www.libravatar.org/">Libravatar project</a> is basically an open source version of Gravatar. It also uses hashes for email addresses. And, sadly, very few sites use it.</p>

<h2 id="what-about-webfinger"><a href="https://shkspr.mobi/blog/2020/03/one-avatar-to-rule-them-all/#what-about-webfinger">What about Webfinger?</a></h2>

<p>The <a href="https://webfinger.net/rel/avatar/">documentation for Webfinger</a> is comically absent.</p>

<h2 id="what-about-microformats"><a href="https://shkspr.mobi/blog/2020/03/one-avatar-to-rule-them-all/#what-about-microformats">What about Microformats?</a></h2>

<p>Standards like <a href="http://microformats.org/wiki/microformats-2#hyperlinked_person_image">microformats2</a> let you add an image to your profile.</p>

<p>Similarly, <a href="https://schema.org/image">Schema.org an add an image to your personal metadata</a>.</p>

<h2 id="social-networking-sites"><a href="https://shkspr.mobi/blog/2020/03/one-avatar-to-rule-them-all/#social-networking-sites">Social Networking Sites</a></h2>

<p>This <em>sort of</em> exists. Services like <a href="https://web.archive.org/web/20200108124642/https://avatars.io/">Avatars.io</a> let you use you Twitter &amp; Facebook avatars as a URl - for example <code>avatars.io/twitter/edent</code>.</p>

<p>Sadly, the service isn't maintained any more, has broken images for Instagram, and doesn't include newer services like GitHub.</p>

<h2 id="regain-control"><a href="https://shkspr.mobi/blog/2020/03/one-avatar-to-rule-them-all/#regain-control">Regain Control</a></h2>

<p>There are two fundamental mistakes we're making.</p>

<ul>
<li>An email address is not an identity.</li>
<li>A 3rd party service is not an identity.</li>
</ul>

<p>Given that Gravatar is promoted by WordPress - the largest website provider on the planet - and it still isn't universally accepted, I don't think there's any hope for smaller services.</p>

<p>So, I guess what I need is an app which can log in to all my accounts and automatically change the avatar whenever I want.</p>

<p>Or is there some other practical action I can take?</p>
<img src="https://shkspr.mobi/blog/wp-content/themes/edent-wordpress-theme/info/okgo.php?ID=34204&HTTP_REFERER=RSS" alt="" width="1" height="1" loading="eager">]]></content:encoded>
					
					<wfw:commentRss>https://shkspr.mobi/blog/2020/03/one-avatar-to-rule-them-all/feed/</wfw:commentRss>
			<slash:comments>7</slash:comments>
		
		
			</item>
		<item>
		<title><![CDATA[Can I own my identity on the Internet?]]></title>
		<link>https://shkspr.mobi/blog/2017/02/can-i-own-my-identity-on-the-internet/</link>
					<comments>https://shkspr.mobi/blog/2017/02/can-i-own-my-identity-on-the-internet/#comments</comments>
				<dc:creator><![CDATA[@edent]]></dc:creator>
		<pubDate>Wed, 22 Feb 2017 19:19:42 +0000</pubDate>
				<category><![CDATA[/etc/]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[thoughts]]></category>
		<guid isPermaLink="false">https://shkspr.mobi/blog/?p=24840</guid>

					<description><![CDATA[The ultra secure messaging app, Signal, requires a mobile phone number in order to sign up to it. This, as my friend Tom Morris, points out, is madness.  People don&#039;t own mobile phone numbers. They are rented from mobile operators. Yes, you may be able to move &#34;your&#34; number between a limited set of providers - but it ultimately doesn&#039;t belong to you. An operator can unilaterally take your number…]]></description>
										<content:encoded><![CDATA[<p>The ultra secure messaging app, <a href="https://whispersystems.org/">Signal</a>, requires a mobile phone number in order to sign up to it. This, as my friend Tom Morris, points out, <a href="https://shkspr.mobi/blog/2017/02/i-dont-have-an-email-address-so-what/#comment-5402">is madness</a>.</p>

<p>People don't own mobile phone numbers. They are <i>rented</i> from mobile operators. Yes, you may be able to move "your" number between a limited set of providers - but it ultimately doesn't belong to you. An operator can unilaterally take your number away from you.</p>

<p>If you move to a different country, you will almost certainly have to change your number - thus invalidating any account which relies on a mobile being your primary identifier.</p>

<p>That's before we get on to how hideously insecure phone numbers are. Transmitting an SMS with a sensitive one-time code over a cleartext which can be easily intercepted is not a sensible approach to security.  Modern phone networks are designed to accommodate Lawful Intercept - and suffer from a range of security weaknesses.</p>

<p>Fine. Whatever. Let's use emails as our primary ID. <em>Bzzzt!</em> Wrong! Email addresses are <strong>just as ephemeral</strong> as mobile numbers.</p>

<p>If you use a service like Gmail, Yahoo, or Hotmail, then you're at the mercy of those providers. They can revoke your access at any time. They can give away your cherished address. And, like phones, they can be legally compelled to give access to certain 3rd parties.</p>

<p>Social Media IDs are equally rubbish. Your presence on Twitter or Facebook is little more than virtual sharecropping. You don't own or control your ID.  If the provider goes bust, you've lost the ability to identify yourself.</p>

<p>OK, here's an answer! What if I run my own domain? Then I'll be in control of my identity. And my email as well!</p>

<p>No. Not really. Your domain is only temporarily leased from your registrar. Perhaps you forget to renew your domain. Or renewal prices will jump and you can't afford your "home" any more. Perhaps a global corporation insists that they alone have the right to use your name and take you to court.
That kills off the ability to use something like <a href="https://indieauth.com/">IndieAuth</a>.</p>

<p>Umm... How about IP addresses? Again, for most people these are leased from ISPs and are dynamic. Even with a switch to IPv6, there's no way to own an address permanently and move it between ISPs.</p>

<p>I want an online identity which is immune from 3rd parties to take back. Something unaffected by <a href="http://www.legislation.gov.uk/ukpga/1981/67/contents">Eminent Domain</a>. That - no matter the social and technological changes of the Internet - will remain valid throughout my lifetime.</p>

<h2 id="lets-craft-a-problem-statement"><a href="https://shkspr.mobi/blog/2017/02/can-i-own-my-identity-on-the-internet/#lets-craft-a-problem-statement">Let's craft a problem statement</a></h2>

<blockquote>
<p>As a user, I want to have an identifier on the Internet which can only be revoked by me.
</p></blockquote>

<p>(That's not a perfect story, of course. It says nothing about security, access rights, or usability. But it is a simple starting point.)</p>

<p>Does such an identifier exist today?</p>

<p>Something like a Public/Private keypair is <i>almost</i> right. Ignoring the many usability issues with things like PGP, it is conceivable that you could authenticate yourself to a service by cryptographically signing a challenge they send you which is then verified against your public key.</p>

<p>This is more-or-less how <a href="https://fidoalliance.org/download/">FIDO UAF</a> works.  You generate and store your keypair on a piece of cryptographic hardware and use that for authentication and identification.</p>

<p>But there is a more fundamental flaw - a keypair <b>doesn't provide a method for delivering a message or a service</b>.</p>

<p>At the moment there's no way to say</p>

<ul>
<li>"Visit my website at <code>impossibly long cryptographic string</code>" or </li>
<li>"Give me a call at ..." or </li>
<li>"Let's exchange data via ..."</li>
</ul>

<p>OK, I can <a href="https://www.katescomment.com/how-to-add-additional-email-addresses-to-your-gpg-identity/">add multiple email addresses to a PGP key</a> and hope that all the major email providers don't go bust, or sell me out.</p>

<p>I'm sure there are hacks which will turn <code>000D05F640557C62</code> into a DNS entry for a website.  But that still falls back on requiring an existing domain name. Which can be taken away from you.</p>

<p>(As an aside, if you're an intergovernmental agency registered by an international treaty, <a href="https://www.iana.org/domains/int/policy">you can apply for a <code>.int</code> domain</a>. That's probably harder for someone to unilaterally revoke.)</p>

<p>The Internet, <a href="https://cyber.harvard.edu/archived_content/people/reagle/inet-quotations-19990709.html">so we are told</a>, routes around damage. <em>But where does it route to?</em></p>

<p>I don't have an answer to this.  It seems like a fundamental design flaw with existing Internet infrastructure.  How can I carve out a permanent home here?</p>
<img src="https://shkspr.mobi/blog/wp-content/themes/edent-wordpress-theme/info/okgo.php?ID=24840&HTTP_REFERER=RSS" alt="" width="1" height="1" loading="eager">]]></content:encoded>
					
					<wfw:commentRss>https://shkspr.mobi/blog/2017/02/can-i-own-my-identity-on-the-internet/feed/</wfw:commentRss>
			<slash:comments>19</slash:comments>
		
		
			</item>
		<item>
		<title><![CDATA[Mydex XSS Flaw (Disclosed & Fixed)]]></title>
		<link>https://shkspr.mobi/blog/2014/02/mydex-xss-flaw-disclosed-fixed/</link>
					<comments>https://shkspr.mobi/blog/2014/02/mydex-xss-flaw-disclosed-fixed/#respond</comments>
				<dc:creator><![CDATA[@edent]]></dc:creator>
		<pubDate>Thu, 06 Feb 2014 12:03:40 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[xss]]></category>
		<guid isPermaLink="false">http://shkspr.mobi/blog/?p=9631</guid>

					<description><![CDATA[Ever heard of Mydex?  Here&#039;s how they describe themselves:  Mydex provides the individual with a hyper-secure storage area to enable them to manage their personal data, including text, numbers, images, video, certificates and sound. No-one but the individual can access or see the data.  Not just secure, but hyper-secure!  They&#039;ve been signed up by the UK Government to provide Identity Assurance.  …]]></description>
										<content:encoded><![CDATA[<p>Ever heard of <a href="http://mydex.org">Mydex</a>?  Here's how they describe themselves:</p>

<blockquote><p>Mydex provides the individual with a hyper-secure storage area to enable them to manage their personal data, including text, numbers, images, video, certificates and sound. No-one but the individual can access or see the data.</p></blockquote>

<p>Not just secure, but <em>hyper-secure</em>!  They've been <a href="https://gds.blog.gov.uk/2013/09/03/identity-assurance-first-delivery-contracts-signed/">signed up by the UK Government to provide Identity Assurance</a>.  Pretty impressive, eh?</p>

<p>Let's ignore the fact that their website doesn't use SSL and concentrate on the XSS flaw on the site.</p>

<p>Cross-Site-Scripting (XSS) is, in simple terms, a way to force a web page to run some malicious code against the wishes of its owner.  Let's take a look at a simple example:</p>

<p>By searching for</p>

<pre>&lt;em&gt;test</pre>

<p>We can force the page to display in italics.</p>

<img src="https://shkspr.mobi/blog/wp-content/uploads/2014/01/mydex-XSS-em-fs8.png" alt="mydex XSS em" width="804" height="857" class="aligncenter size-full wp-image-9641">

<p>This is because the search box's input isn't sanitised.  You can put whatever you want in there and the web page will display it.  For example, if you paste in the HTML code to display a photo, then this happens:</p>

<p><img src="https://shkspr.mobi/blog/wp-content/uploads/2014/01/mydex-img-xss-fs8.png" alt="mydex img xss" width="804" height="857" class="aligncenter size-full wp-image-9642">
Ok - so that's a bit annoying, but nothing too bad.  So, what happens if we try to inject JavaScript into the page?
<img src="https://shkspr.mobi/blog/wp-content/uploads/2014/01/mydex-xss-script-fs8.png" alt="mydex xss script" width="896" height="857" class="aligncenter size-full wp-image-9640">
Aha!  Now we can <strong>run arbitrary code</strong> on this website.  In fact, we can completely take it over.  Using JavaScript we can tell the page to redirect to some other website, we can switch on the user's microphone and camera - all sorts of naughty tricks.</p>

<p>To Mydex's credit, a few minutes after reporting the flaw it was fixed.</p>

<p>There's absolutely <strong>no suggestion</strong> that any user's personal data was at risk here.  I would consider it extremely unlikely that anything entered into that search field could have caused an <a href="https://xkcd.com/327/">SQL injection attack</a>.</p>

<p>Mydex also operates a strict separation of their "publicity" site and their <a href="https://pds.mydex.org/">Personal Data Service</a> - which really does seem very secure.</p>

<p>It would, however, have been very easy for a scammer to set up a JavaScript redirection to a phishing site in order to trick a user into entering her personal details.  Similarly, an attacker could have sent Mydex staff a link saying "Please reset your admin password - click here" and been granted the keys to the kingdom.</p>

<p>The Open Web Application Security Project list their <a href="https://www.owasp.org/index.php/Top_10_2013-Top_10">top ten most critical web security risks facing organizations</a>.  XSS is number 3.</p>

<p>If you're running a website - especially one which deals in security - please take the time to read over the list and understand how to protect your business and your users.</p>

<h2 id="timeline"><a href="https://shkspr.mobi/blog/2014/02/mydex-xss-flaw-disclosed-fixed/#timeline">Timeline</a></h2>

<ul>
<li>January 23rd - Reported and fixed.</li>
<li>February 5th - Publication agreed.</li>
</ul>
<img src="https://shkspr.mobi/blog/wp-content/themes/edent-wordpress-theme/info/okgo.php?ID=9631&HTTP_REFERER=RSS" alt="" width="1" height="1" loading="eager">]]></content:encoded>
					
					<wfw:commentRss>https://shkspr.mobi/blog/2014/02/mydex-xss-flaw-disclosed-fixed/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title><![CDATA[Social Media Camp London 2008 - #smclondon08]]></title>
		<link>https://shkspr.mobi/blog/2008/10/social-media-camp-london-2008-smclondon08/</link>
					<comments>https://shkspr.mobi/blog/2008/10/social-media-camp-london-2008-smclondon08/#comments</comments>
				<dc:creator><![CDATA[@edent]]></dc:creator>
		<pubDate>Sun, 05 Oct 2008 10:57:00 +0000</pubDate>
				<category><![CDATA[/etc/]]></category>
		<category><![CDATA[awesome]]></category>
		<category><![CDATA[blog]]></category>
		<category><![CDATA[FOAF]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[presenting]]></category>
		<category><![CDATA[smclondon08]]></category>
		<guid isPermaLink="false">http://shkspr.mobi/blog/index.php/2008/10/social-media-camp-london-2008-smclondon08/</guid>

					<description><![CDATA[((Work In Progress - still need to add pics, videos and links))Yesterday, myself and a few hundred other bloggers, geeks, marketing droids and other social media maverns descended on Wallacepace St Pancras for the inaugural Social Media Camp London 2008.This is just a quick post to say what I did, what I liked and what I thought could go better,First off, enormous thanks to Vero for single…]]></description>
										<content:encoded><![CDATA[<p>((Work In Progress - still need to add pics, videos and links))<br>Yesterday, myself and a few hundred other bloggers, geeks, marketing droids and other social media maverns descended on Wallacepace St Pancras for the inaugural <a href="https://web.archive.org/web/20081105083715/http://www.socialmediacamp.co.uk/">Social Media Camp</a> London 2008.<br><br>This is just a quick post to say what I did, what I liked and what I thought could go better,<br><br>First off, enormous thanks to Vero for single handedly organising the whole shebang.  Her <a href="http://en.wikipedia.org/wiki/Whuffie">Whuffie</a> must be through the roof by now.  The venue was fantastic and - perhaps a first for a BarCamp - the food was freshly cooked and delicious.<br><br>There were around 150 participants - many of whom I'll name check - all of them interesting in their own special way. It was great to meet technology writer (and fellow log-haired scruff) <a href="http://www.thebillblog.com/">Bill Thompson</a>.<br><br>Our rampant <a href="http://twitter.com/search?q=smclondon08">twittering</a> pumped us to the top of the twitter trends for the day. You can find all sorts of digital footprints from searching for our tag <a href="http://www.google.co.uk/search?num=20&amp;hl=en&amp;q=smclondon08&amp;btnG=Search&amp;meta=">#smclondon</a><br><br>So, on to the sessions I attended.<br><br><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://farm4.static.flickr.com/3069/2913695829_6cac810827.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px;" src="https://farm4.static.flickr.com/3069/2913695829_6cac810827.jpg" border="0" alt=""></a><br><br>1) "I Have Nothing To Say".<br>Someone -I have no idea who - put up a session called "I Have Nothing To Say".  I think they meant it as a joke - because no one turned up to say anything.  So, being the extrovert that I am, I moderated a session on why people abandon their blogs (via an <a href="http://twitter.com/anniemole/statuses/945988053">unsuccessful attempt at why women don't speak out more in technology</a> - see Suw's posting on the subject).<br><br>We looked at what reasons people have for starting to blog and what prevents them from blogging.  It's often a time constraint but - more often - it's the fear that nothing one says will be of interest.<br><br>We looked at a few semi-abandoned blogs that participants had started.  Zoe from <a href="http://girlwithaonetrackmind.blogspot.com/">Girl With A one Track Mind</a>, talked about her anonymity being blown and the effect that had on her blogging.  Annie Mole talked about the pressure to write on <a href="http://london-underground.blogspot.com/">Going Underground</a> and how she sometimes feels constrained by her subject matter from venturing into other areas that interest her. ((I'll try and put up the other blogs as I remember them!))<br><br>For me, there's a clear divide between writing in order to attract an audience and writing to satisfy a creative itch.  I think my blog falls into the latter camp.  I'm hugely gratified when people read and comment - but it exists primarily as a way to get my thoughts out of my head.  That some of those thoughts might has a positive affect on others and perhaps change the world is, to me, a fringe benefit.<br><br>It has inspired me to keep this blog going.  I'll try an put more of my thoughts down in long form rather than just 140 Character brain dumps on Twitter.<br><br>I'd like to thank whoever placed the topic up there.  It really helped me warm up for my presentation and I think all the participants found it a useful discussion. I want to reiterate <i>it wasn't my idea or session!</i><br><br>2) "Social Media Activism"<br>This session focused on <a href="http://www.getmiro.com/">Miro</a> and its role in activism.  An interesting session which showed off some of the reasons behind the software and how it is being used.  While interesting, I would have appreciated a bit more focus on how <b>and</b> why.<br><br>It will be interesting to see if "counter culture" ever breaks in to the mainstream.  We're now seeing User Generated Content popping up in the news - but it's only in terms of footage from an event.  I hope it's not too long before commentary can become part of the discussion.<br><br>3) "How To Present To Big Scary Companies*  *And Look Like You Know What You're Doing"<br>My presentation!  I was lovely to see so many people turn up.  Some kind soul has done <a href="http://web.archive.org/web/20090425195221/http://www.socialmediacamp.co.uk:80/2008/10/how-to-present-to-big-scary-companies-presented-by-terence-eden-vodafone/">a write up of my presentation</a>. I'll write a full blog post in the next few days expanding on some of the themes.<br><br>Critically, I over-ran and didn't cover some of the points that I wanted to make.  I'm also worried that I didn't create enough discussion in the room.  Some of the best sessions I attended were discussions lead rather than presenter focused.<br><br>I'll let the other attendants have their say about me - and I'll link to them from here if I find any!<br><br>However, it was great to teach a new group of people my favourite tongue-twister <a href="http://twitter.com/Suw/statuses/946027009">"Peggy Babcock"</a><br><br>4) "Alternate Reality Games"<br>Hosted by <a href="http://missgeeky.com/">Miss Geeky - AKA Melinda Seckington</a> this was a fascinating look in to the ARG phenomenon.  I'd seen things like the Heroes ARG but I'd never really been bothered to play.  I thought they'd take up too much time and would be to US focused.  This presentation really opened my eyes to how much fun they can be.<br><br>I'm a little worried that most of them are - at heart - marketing campaigns.  I get a fun game to play in return for being marketed to <i>and</i> becoming a marketeer for the product.  It's a reasonable trade-off, I suppose.  Not much different from getting a free TV show in return for watching adverts.<br><br>5) "Managing Your Online Reputation"<br>Vero's presentation was well attended.  It started with the rather brazen assertation that "Your CV Sucks!" It's true.  Your CV only shows a fraction of your life.  If future employers (or friends) want to know you better - they're heading off to Google, Linkedin, twitter and facebook.<br><br>As with all good sessions, this rapidly became a heated discussion.  Should we teach children digital literacy - or will they teach us?  Does seeing a picture on facebook of a potential employee drunk, taking drugs, misbehaving at university colour your judgement?  If you post about your sexuality - or any other subject - can it land you in hot water?<br><br>Again, I have so many things to say about this, it might become another blog entry!<br><br>6) "Social Media - How Not To Get Fucked"<br>Zoe from <a href="http://girlwithaonetrackmind.blogspot.com/">Girl With A One Track Mind</a> gave a brief presentation about what it was like to <a href="http://girlwithaonetrackmind.blogspot.com/2006/08/outed.html">lose her anonymity</a>.  While I generally like presentations that turn in to discussions - I really would have liked to have heard more from Zoe about how she coped with - as she put it - getting fucked.<br><br>That said, it was fascinating to see how people perceive their digital identities as - contrasted with Vero's talk - how they compartmentalise them.  The ramifications when those compartments break down was also a subject of interest.  As some bright spark put it, the reasons weddings are so traumatic is that you have your friends, your family and you colleagues all in one place.  Those compartments totally break down and - in extreme cases - can become toxic.<br><br>7) "6 Degrees of Separation - Now 3"<br>Ben gave a high level overview of FOAF, it's implications in the semantic web and social media.  It was great to see a "techie" talk.  Well put together and with an excellent interpretation of Dunbar's Number.<br><br>8) "Social Media Bingo"<br>A litt
le bit of fun for the end
of the day.  Slightly chaotic and disorganised - but that may have been part of the charm.  The highlight was the projector screen showing the tweets of participants.<br><br>Overall, the day was fantastic.  The only criticisms I'd make is that the venue wasn't wonderfully accessible for those with mobility issue (or, in my case, the plain lazy).  It might have been nice to stick a copy of the day plan in each room, just so people didn't over-run their slots and participants knew where to go without crowding round the main board.<br><br>Also, I should have won the year's free Sky HD. ;-p<br><br>Too knackered to write anything else.  The day was a roaring success.  It's great to meet new friends.</p>
<img src="https://shkspr.mobi/blog/wp-content/themes/edent-wordpress-theme/info/okgo.php?ID=37&HTTP_REFERER=RSS" alt="" width="1" height="1" loading="eager">]]></content:encoded>
					
					<wfw:commentRss>https://shkspr.mobi/blog/2008/10/social-media-camp-london-2008-smclondon08/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
	</channel>
</rss>
