Identity Crisis We are surrounded by our identity like a second skin. Signatures, photographs, passwords, ID cards, biometrics, phone numbers, email addresses, the list of identifying characteristics is endless. When I send an email, I type it out and then wait as a system of identities verifies the bonafides of the message before it reaches my recipient. My email ID and my correspondent's email ID are merely the endpoints in this vast chain of authentication and identification, which also includes IP addresses, encryption keys, server IDs and other electronic signatures.
Jayary Newsletter # 64
Jayary Newsletter # 64
Jayary Newsletter # 64
Identity Crisis We are surrounded by our identity like a second skin. Signatures, photographs, passwords, ID cards, biometrics, phone numbers, email addresses, the list of identifying characteristics is endless. When I send an email, I type it out and then wait as a system of identities verifies the bonafides of the message before it reaches my recipient. My email ID and my correspondent's email ID are merely the endpoints in this vast chain of authentication and identification, which also includes IP addresses, encryption keys, server IDs and other electronic signatures.