Liberating Personal Data

Web inventor Sir Tim Berners-Lee has created a technology he says will give people more control over their data.

Called Solid, the technology puts personal information in one place so people can decide what is shared with which service or site.

Sir Tim said Solid was needed because the current model of handing over lots of data to many different online services did not serve people well.

Solid has been set up as an open source project to which anyone can contribute.

In addition, Sir Tim has created a company called Inrupt to build Solid's basic infrastructure.

Data silos

"The web has evolved into an engine of inequity and division, swayed by powerful forces who use it for their own agendas," wrote Sir Tim, on a blog on the Medium website.

Solid would restore balance to the web because it meant people never lost control of their data, he said.

"People want apps that help them do what they want and need to do - without spying on them," wrote Sir Tim.

"Apps that don't have an ulterior motive of distracting them with propositions to buy this or that."

Solid involves secure silos called pods into which people deposit data such as contact information, images and video.

This data always remains in its pod and online services would request access to it rather than expect it to be lodged on their sites and servers.

The pods could be thought of as a secure USB stick or personal website, Sir Tim said, and it was up to users to decide to whom to give access to the different types of data they were storing.

People could have more than one pod for different purposes or types of data, he said.

"With Solid, you will have far more personal agency over data - you decide which apps can access it," Sir Tim said.

Gathering data into one silo should also make it easier for apps to analyse it and deliver benefits to individuals, he said.

Solid could help to make the web closer to the way it was originally envisioned, said Sir Tim.

BBC:

You Might Also Read:

The App That Lets You Sell Your Personal Healthcare Data

« Ports Of San Diego & Barcelona Come Under Attack
UK’s New Generation Of Cyber Cadets »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CIO

CIO

CIO provides technology and business leaders with insight and analysis on information technology trends

Foundation Futuristic Technologies (FFT)

Foundation Futuristic Technologies (FFT)

FFT is a global leader in computer forensics and digital investigation solutions.

Wind River

Wind River

Wind River delivers the technology and expertise that enables the deployment of safe, secure, and reliable intelligent connected systems.

Protectimus

Protectimus

Affordable two factor authentication (2FA) provider. Protect your data from theft with multi factor authentication service from Protectimus.

TrainACE

TrainACE

TrainACE, is a professional computer training school offering courses in information technology with a focus on Advanced Security training.

Travelers

Travelers

Travelers is a leading writer of US commercial property casualty insurance and one of the world’s largest global insurers for cyber insurance.

Jumio

Jumio

Jumio’s end-to-end identity verification and authentication solutions fight fraud, maintain compliance and onboard good customers faster.

Sovereign Intelligence

Sovereign Intelligence

Sovereign Intelligence provides automated insight into the relative intensity of hidden Cyber, Brand, and Financial Risks to your company.

Perch Security

Perch Security

Perch is a co-managed threat detection and response platform backed by an in-house Security Operations Center (SOC).

SpecterOps

SpecterOps

SpecterOps has unique insight into the cyber adversary mindset and brings the highest caliber, most experienced resources to assess your organizations defenses.

Kratos Defense & Security Solutions

Kratos Defense & Security Solutions

The Kratos Space, Training, and Cybersecurity division addresses key cybersecurity challenges, including cloud security, continuous monitoring, IT security, and risk management.

LocateRisk

LocateRisk

LocateRisk provides more efficiency, transparency and comparability in IT security with automated, KPI-based IT risk analyses.

Prevasio

Prevasio

Prevasio is a next-gen Cloud Security Posture Management (CSPM) with a built-in Vulnerability and Anti-Malware Scan for Containers.

Guardey

Guardey

Guardey protects thousands of SME's environments. Whether your team works at the office, at home, at the customer or remotely. We protect your business. We do this in an accessible and affordable way.

InfoSecTrain

InfoSecTrain

InfoSecTrain are a leading training and consulting organization dedicated to providing top-tier IT security training and information security services to organizations and individuals across the globe

IT-Schulungen.com / New Elements GmbH

IT-Schulungen.com / New Elements GmbH

Under the name IT-Schulungen.com, the Nuremberg-based New Elements GmbH has been operating one of the largest training centres in the German-speaking world for over 20 years.