Questions tagged [identity]

Identity is the property of an object which allows it to be uniquely specified.

Identity allows you to specify a specific object or individual out of a group of objects or individuals.

For example: If Ann asks Bob to move a rock, she may specify the specific rock from rocks in the general area by:

  • pointing her finger at the rock
  • describing the rock's size, shape and color
  • giving map coordinates of the intended rock.

For people an ambiguous specification is a person's name which may not be unique. There may be more than one Ann or even more than one Ann Baker. For computer systems individuals are usually give a unique username, so that the use of a username is unambiguous.

232 questions
0
votes
1 answer

How did a website make an accurate assumption of my identity in incognito mode?

What piece of information can websites retrieve that would allow for later identification without cookies? Intro Out of interest I jumped into the rabbit hole of online marketing scams. The site I visited* used a system called Proof** to show…
M.G.Poirot
  • 101
  • 4
0
votes
1 answer

Identifying devices in mobile app using UUID

I have a mobile application, for Android and iOS (both native), that communicates with the backend through a REST API (over HTTPS). The application allows users to sign in or use the app as a guest, but in both cases I need to track user's activity…
blejzz
  • 101
  • 2
0
votes
0 answers

Checking authenticity of a mobile app (digital staff card)

I've been asked to implement a digital card for member's of our organisation, to replace the old plastic ones. Members would install our app on their phone and setup a "card" with their photo on it within the app. Once setup they could not change…
TerryB
  • 101
0
votes
1 answer

How is Privileged identity management (PIM) different from privileged access management (PAM)?

I am very confused about those two, I was trying to understand the difference but it all sounds the same from what I read online.
Filipon
  • 1,204
  • 10
  • 22
0
votes
1 answer

Data leakage in internet-only services

Nowadays, internet-only services became very popular, for example, direct bank and many others. The advantage of such services is you don't have to spend the time to get to the office in order to get a service, everything can be done online.…
gar
  • 3
  • 2
0
votes
2 answers

Someone is pretending to be me

Need some help! Someone has opened up an email account and is sending emails pretending to be me, to my office. They are asking for large invoices to be paid into a specific account. We realised immediately this was a fake email account, but my…
Hammyq
  • 1
0
votes
1 answer

Requiring e-mail from user when using ASP.NET Identity password reset features

I am implementing ASP.NET Core Identity with IdentityServer4. One feature is password reset, and I found that all the examples (e.g. the IdentityServer4 quick start and the ASP.NET Identity example) tend to do this: The Password Reset Token…
Jeroen
  • 839
  • 9
  • 15
0
votes
1 answer

Site asking for driver's license when buying items

I recently made a purchase on a website that asked for my Drivers license or government ID. I gave them a Drivers license photo I covered my license number and DD number but the license number can be decoded using an online tool (with the info I…
Alaa
  • 11
  • 4
0
votes
1 answer

How do I get unique users signed up? [Canada or US]

Clients can win prizes on service and our team has to check their identity before giving prizes to them. Is there any way to collect photo ID while people signing up? Is it legal? Or there is some other way to check that it is not the same person…
Nick
  • 1
0
votes
1 answer

Preventing unauthorized key-listings

I just noticed that anyone who has root access to my computer can list the keys in my keyring. He would not be able to use any of my private keys without knowing the passphrase, but he could examine the stored public keys and conclude who I…
0
votes
4 answers

Does Facebook merge accounts? In what circumstances?

I have two different Facebook accounts with two different passwords and two distinct online personalities, one as myself and one as someone else. Since the last one week, to my horror, both accounts were fused as one. Has this happened to anyone…
John
  • 25
  • 2
0
votes
2 answers

Verifying users location & authenticity

I am builduing a business to business website, and users are able to sign up with a personal profile and create a business (like linkedin). I need to verify the following: Business Name Representative First & Last Name Address Phone Number Other…
Rod Vaugh
  • 61
  • 1
0
votes
1 answer

Who's been accessing my computer with TeamViewer? Tracking through UUID

So here I am, sitting at my computer screen on the one day of the week I stayed home from work, checking messages on my phone, when out the corner of my eye I see a browser page being opened. It was PayPal. Luckily for me, I'm not so careless to…
0
votes
2 answers

Guarantee one unique identity per node

I'm in the early stages of designing a decentralised systems protocol, based on a blockchain, for a thesis. For the protocol to remain secure, each node in the system must be capable of generating one, and only one, unique identity for itself. Nodes…
0
votes
2 answers

Disclosing too much info over email just to close account?

I have account with a stock option trading platform. They are well known and reputable. I had a couple thousand in the account, bought and sold for a while, and then cashed out and withdrew. So I'm not concerned this a is some scam to get money or…
DasBeasto
  • 1,796
  • 2
  • 14
  • 14
1 2 3
15
16