Feeds

Microsoft ID expert confirms departure from Redmond

Kim Cameron worries about industry trends on privacy, security

The Power of One eBook: Top reasons to choose HP BladeSystem

Kim Cameron has broken his silence and confirmed that he has indeed quit his identity architect job at Microsoft.

In an interview posted on the ID conferences website, Cameron said he was worried about what he described as "forward-facing issues" at the software company.

He went on to explain that Redmond's core plans on identity access would "still be put in place", and pushed aside suggestions that Microsoft was neglecting development of its ID technology.

Cameron said any big business, such as Google or Microsoft, which sells its wares in the cloud understands that the infrastructure is dependent on ID technology.

"My concerns are things like privacy and security," he said. "Microsoft has a very good record on that over the last number of years. I expect and hope it to continue. But I look at the industry as a whole, and Microsoft is part of that industry.

"Trends that happen in the industry will affect Microsoft ... This shouldn't just be a concern for me, it should be a concern for everybody."

Cameron said that he was disappointed about the lack of an industry advocate championing what he has dubbed "user-centric identity", which is about keeping various bits of an individual's online life totally separated.

"[That model] can be much more effective than shotgun splattering of ads or profiling that alienates us and makes us feel like robots are ruling our lives. Lots of people are set about this," said Cameron, who used Microsoft, Google and Facebook as examples of companies pursuing those strategies.

"My view is that those things will come to the thaw in certain companies, and those companies will have an advantage."

As The Register reported yesterday, Microsoft has quietly been making changes to its identity access group by shifting some of its key engineers out of the team in favour of fresh blood at the company's cryptography division.

Microsoft is searching for a senior software development engineer to improve its U-Prove technology, which, El Reg understands, is currently without a leader.

Sources have told us that key engineers on the identity access team in Redmond, including Lee Nackman and Craig Wittenberg, were recently sidelined.

The Reg has asked Microsoft to tell us what changes are afoot for its U-Prove technology, as well as the group tasked with steering its respected cryptography unit.

But Redmond is yet to comment on this story. ®

Designing a Defense for Mobile Applications

More from The Register

next story
DARPA-derived secure microkernel goes open source tomorrow
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.