{"id":5625,"date":"2018-09-26T17:38:26","date_gmt":"2018-09-26T21:38:26","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/?p=5625"},"modified":"2018-09-26T17:39:09","modified_gmt":"2018-09-26T21:39:09","slug":"u-s-mobile-giants-want-to-be-your-online-identity","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/2018\/09\/26\/u-s-mobile-giants-want-to-be-your-online-identity\/","title":{"rendered":"U.S. Mobile Giants Want to be Your Online Identity"},"content":{"rendered":"<p><a href=\"https:\/\/krebsonsecurity.com\/2018\/09\/u-s-mobile-giants-want-to-be-your-online-identity\/\">https:\/\/krebsonsecurity.com\/2018\/09\/u-s-mobile-giants-want-to-be-your-online-identity\/<\/a><\/p>\n<p>The four major U.S. wireless carriers today detailed a new initiative that may soon let Web sites eschew passwords and instead authenticate visitors by leveraging data elements unique to each customer\u2019s phone and mobile subscriber account, such as location, customer reputation, and physical attributes of the device. Here\u2019s a look at what\u2019s coming, and the potential security and privacy trade-offs of trusting the carriers to handle online authentication on your behalf.<\/p>\n<p>Considering these firms have not had such a great track record in safeguarding customer information and accounts&#8230;this probably is not the best idea.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>https:\/\/krebsonsecurity.com\/2018\/09\/u-s-mobile-giants-want-to-be-your-online-identity\/ The four major U.S. wireless carriers today detailed a new initiative that may soon let Web sites eschew passwords and instead authenticate visitors by leveraging data elements unique to each customer\u2019s phone and mobile subscriber account, such as location, customer reputation, and physical attributes of the device. Here\u2019s a look at what\u2019s coming, and [&hellip;]<\/p>\n","protected":false},"author":17292,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[715709],"tags":[],"class_list":{"0":"post-5625","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-05it-strategy","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/posts\/5625","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/users\/17292"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/comments?post=5625"}],"version-history":[{"count":2,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/posts\/5625\/revisions"}],"predecessor-version":[{"id":5627,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/posts\/5625\/revisions\/5627"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/media?parent=5625"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/categories?post=5625"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/tags?post=5625"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}