Liberating Personal Data

Web inventor Sir Tim Berners-Lee has created a technology he says will give people more control over their data.

Called Solid, the technology puts personal information in one place so people can decide what is shared with which service or site.

Sir Tim said Solid was needed because the current model of handing over lots of data to many different online services did not serve people well.

Solid has been set up as an open source project to which anyone can contribute.

In addition, Sir Tim has created a company called Inrupt to build Solid's basic infrastructure.

Data silos

"The web has evolved into an engine of inequity and division, swayed by powerful forces who use it for their own agendas," wrote Sir Tim, on a blog on the Medium website.

Solid would restore balance to the web because it meant people never lost control of their data, he said.

"People want apps that help them do what they want and need to do - without spying on them," wrote Sir Tim.

"Apps that don't have an ulterior motive of distracting them with propositions to buy this or that."

Solid involves secure silos called pods into which people deposit data such as contact information, images and video.

This data always remains in its pod and online services would request access to it rather than expect it to be lodged on their sites and servers.

The pods could be thought of as a secure USB stick or personal website, Sir Tim said, and it was up to users to decide to whom to give access to the different types of data they were storing.

People could have more than one pod for different purposes or types of data, he said.

"With Solid, you will have far more personal agency over data - you decide which apps can access it," Sir Tim said.

Gathering data into one silo should also make it easier for apps to analyse it and deliver benefits to individuals, he said.

Solid could help to make the web closer to the way it was originally envisioned, said Sir Tim.

BBC:

You Might Also Read:

The App That Lets You Sell Your Personal Healthcare Data

« Ports Of San Diego & Barcelona Come Under Attack
UK’s New Generation Of Cyber Cadets »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Snort

Snort

Snort is an open source intrusion prevention system capable of real-time traffic analysis and packet logging.

SK-CERT

SK-CERT

SK-CERT National Computer Computer Emergency Response Team of Slovakia.

Avast Software

Avast Software

Avast Software is a security software company that develops antivirus software and internet security services.

Galvanize

Galvanize

Galvanize is a leading provider of award-winning, cloud-based security, risk management, compliance, and audit software for some of the world’s largest organizations.

Cybersixgill

Cybersixgill

Cybersixgill was founded with a single mission: to protect organizations against malicious cyber attacks that come from the deep and dark web, before they materialize.

Hack The Box

Hack The Box

Hack The Box is an online platform allowing you to test your penetration testing skills and exchange ideas and methodologies with thousands of people in the security field.

LSoft Technologies

LSoft Technologies

LSoft Technologies is a leader in data recovery software technologies.

AiCULUS

AiCULUS

AiCULUS is a global technology company that specializes in API security and Risk Management products.

Privakey

Privakey

Transaction Intent Verification. Privakey delivers a secure channel to streamline high risk transactions, enabling digital trust between services and their users.

Valarian

Valarian

Valarian (formerly Worldr) is on a mission to build cutting-edge solutions that empower borderless collaboration in the new era of digital sovereignty.

ISECURION Technology & Consulting

ISECURION Technology & Consulting

ISECURION is an information security consulting company. We provide a unique blend of services to our customers catering to the current information security landscape.

Intel 471

Intel 471

Intel 471 provides adversary and malware intelligence for leading intelligence, security and fraud teams.

Pulsant

Pulsant

Pulsant is the UK’s premier digital edge infrastructure company providing next-generation cloud, colocation and connectivity services.

Centric Consulting

Centric Consulting

Centric Consulting is an international management consulting firm with unmatched expertise in business transformation, AI strategy, cyber risk management, technology implementation and adoption. 

Ampsight

Ampsight

Ampsight specializes in enabling cloud integration, securing data, and navigating complications that drive critical-mission success.

Longbow Security

Longbow Security

Longbow automates root cause for your application and cloud risks, enabling teams with intelligent remediation actions that reduce the most risk with the least effort.