We’re introducing this beta version of our landing page to you before it goes to a wider audience.
We support the efforts of the decentralized identity (DID) community to bring personally identifiable Information (PII) under the control of the person identified. Identity in the control of centralized authority – whether government, Silicon Valley, or the broadband industry – is a threat to us all.
The DID community’s “verifiable claims” work provides a welcome resource for assuring relying parties that people are who they claim to be. But verifiable claims, like PGP and so many other “collegial attestation” systems before it, can be defeated when there is sufficient incentive to do so. Osmio’s Identity Quality Assurance (IDQA™) system incorporates verifiable claims as one of eight Identity Quality metrics, each scored on a scale of 0-9 for an aggregate Identity Quality score of 0-72.
Osmio is a certification authority. But unlike other certification authorities, Osmio is owned and governed by those whose identities it attests to – via Accountable Anonymity™. Just as your car’s license plate makes you accountable for what happens while it’s on public roadways but no one gets to know your identity unless there’s an incident, so your Osmio identity certificate lets you assert your identity without disclosing your identity. Only a valid court order can uncover a user’s identity in cases of fraud, illegal activity, or claims of civil damage.
We’re planning an extensive outreach campaign. We hope you’ll join us in instigating a big change to solve a set of big problems.
There's much more about Authenticity™ and
the City of Osmio in the videos later on this page
Join any or all of them, but be aware that in order to be able to vote on issues before any commission, you must participate in the meetings (chats and forums) of the commission and be present for its quorum calls. Again, this will require a significant commitment of your time.
That’s because Osmio is governed by a system called Optimocracy, where anyone can participate – but you must participate in order to vote. People whose views are formed from bumper sticker slogans will need to depend upon their more informed neighbors to look out for their interests.
Just as you own the city where you live, you – the online resident – own the City of Osmio
Osmio's place in a new coalition of time-tested ideas brought together to rescue the world's information infrastructure.
Things are NOT working.
A big problem requires a big change.
It seemed like the right thing at the time – but old assumptions wear out, and now we're in dangerous territory.
A quick look at how PKI makes Authenticity actually work.
How the essential parts of Authenticity work together.
where security technology has failed us.
is the solution
hiding in plain sight.
Join the Authenticity Alliance as an individual member to receive updates and watch progress. For less than the cost of a monthly pizza, you can "stay tuned" and see for yourself how things really CAN get better and how you can join the effort.
Digital signatures may seem almost like magic – here's how they work.
can change everything.
Your private digital file cabinet called MOI (My Own Information) turns information about you into YOUR personal intellectual property. Anyone accessing it will need to sign your NDA and get a license from YOU.
Silicon Valley, the NSA, and the botnet builders intend to own you. Read this book to find out how to prevent it.Get the book
Just as you should own and control information that identifies you, you should own and govern the vital records department that attests to your identity.
An ancient and respected concept retooled for the digital age.
For a physician 150 years ago, a substantial part of medical training was about bloodletting.
Is security technology — built on the assumption that you can catch the bad guys by looking at the
stream of bits
they send — today's bloodletting? This spoof
white paper will make you smile — and think.
Best Practices in the Use of Bloodletting Technology
and Information Security Technology
We didn't, for a number of reasons – but we're ready now.
Sometimes inventors have difficulty communicating with those who can make their creations usable in the real world. PKI is that kind of solution-in-waiting.
The misunderstandings and resistance that have prevented PKI from delivering on its promise.
Whether your network is cloud-based or on premises, chances are you have outsiders such as contractors, suppliers, distributors, and others accessing your precious digital assets. Learn how a program of enrollment to digital identity certificates and a policy of DSE — digital signatures everywhere — will bring pervasive accountability, and with it real security, to your enterprise.
HAVE Identities Before You MANAGE Them
Authenticity and Accountability in Identity-Critical Environments
Security technology is not working. Without measurably reliable identities and accountability, your door is wide open to nefarious action by intruders and inside bad actors. Read how the unthinkable happened to a multi-billion-dollar company that spiraled into astonishingly quick bankruptcy because of a shockingly elementary — and preventable — breach.
where security technology has failed us.