Enforcing IAM on IoT Devices
How can one enforce identity and access management on IoT devices that are less capable than typical compute devices, and yet render their network vulnerable?
How can one enforce identity and access management on IoT devices that are less capable than typical compute devices, and yet render their network vulnerable?
To help solve the identity problem, enter Self-Sovereign Identity (SSID), which enables users to own, control, and present their identity data as needed all the while enabling service providers to securely validate and trust the identity claim.
Even Leon understands the appeal of FaceApp.