What’s in a rename? (Or, what is an oosto?)

The naming, or renaming, of a company is an important step in a company’s journey. While one should rightly concentrate on mission statements and processes and the like, the first impression many people will have of a company is its name.

So it’s important to get it right.

How my company was named

Sometimes the naming of a company is a relatively simple affair. For example, the company name “Bredemarket” is a combination of the beginning of my last name, Bredehoft, with the word market (derived from marketing).

Certainly the name is open to confusion (not that I was planning on doing business in East Sussex), but the name does communicate what the company is about.

I guess I could have called the company Bredewrite, but Bredemarket has grown on me.

Sometimes the naming of a company gets a little more involved.

How my former employer was renamed

When Oberthur was merged with the Morpho portion of Safran, the combined company needed a name (Oberthur was ruled out). So the company adopted the name “OT-Morpho,” indicating the heritage of the two parts of the company.

However, OT-Morpho was never intended to be the permanent name of the company. Everyone knew that the company would be renamed at some point in the future.

A few months later, as part of a razzle dazzle event, the new name of the company was revealed to an in-person audience in France and to people watching remotely all over the world (including myself).

If you don’t want to watch the entire video, the new name was…IDEMIA.

Some thought went into this name, as the accompanying press release noted.

In a world directly impacted by the exponential growth of connected objects, the increasing globalisation of exchanges, the digitalisation of the economy and the consumerisation of technology, IDEMIA stands as the new leader in trusted identities placing “Augmented Identity” at the heart of its actions. As an expression of this innovative strategy, the group has been renamed IDEMIA in reference to powerful terms: Identity, Idea and the Latin word idem, reflecting its mission to guarantee everyone a safer world thanks to its expertise in trusted identities.

However, some people didn’t like the new name at the time, and there was a big ruckus about how to pronounce the name. But at least some thought went into the name, and potential customers at least made the connection between IDEMIA and identity, if not to the other influences.

IDEM means – The same, me too. No, IDEMIA didn’t want to position itself as a “me too” company, but as a company that asserted the identity of an individual. From http://acronymsandslang.com/definition/7720102/IDEM-meaning.html.

Some of IDEMIA’s corporate predecessors also had some stories behind their names.

  • My former employer MorphoTrak was the result of a merger between Tacoma-based Sagem Morpho and the Anaheim-based Biometric Business Unit of Motorola that was previously known as Printrak. In the same way that OT-Morpho represented the union of Oberthur and Morpho, MorphoTrak represented the union of Sagem Morpho and Printrak.
  • The Morpho in Sagem Morpho was an element of the name of the original French company that was founded in the 1980s, Morpho Systèmes. I don’t know exactly why the company was named Morpho, but the term can mean form or structure, or it can refer to a particular group of butterflies with distinct wing patterns.
  • And Printrak, a product name before it was a company name, was derived from the word fingerprint. (And presumably from the system that tracked the fingerprints.)

So even if you don’t like these names, at least some thought went behind them.

And then there are other cases.

How another company was renamed

Anyvision was a company that had been around for a while, specializing in using artificial intelligence and vision to provide security solutions. But recently the company decided to expand its focus.

[T]he company’s evolution and vision for the future…is shaped, in part, by a new collaboration with Carnegie Mellon University’s (CMU) CyLab Biometric Research Center. The CMU partnership will focus on early-stage research in object, body, and behavior recognition….

“Historically, the company has focused on security-related use cases for our watchlist alerting and touchless access control solutions….[W]e’re looking beyond the lens of security to include ways our solutions can positively impact an organization’s safety, productivity and customer experience.”

So with this expanded focus, Anyvision decided that its corporate name was too limiting. So the company announced that is was renaming itself.

The new name is…Oosto.

Now some of you may have noticed that the name “Oosto” does not convey the idea of object, body, or behavior recognition in English, Latin, Hebrew (Anyvision started in Israel), or any other known language. As far as I know. (And yes, I saw what The Names Dictionary says.)

So why Oosto? According to Chris Burt at Biometric Update:

The new name was chosen because it is short, easy to pronounce, and free from pre-existing associations….

Well, at least you don’t have to worry about how to say Oosto, unlike Eye DEM ee uh or Eye DEEM e uh or Ih dem EE uh or whatever.

And it’s short.

And it’s obviously extremely free from pre-existing associations.

Which unfortunately means that people have no idea what an “oosto” is.

But it will probably grow on us over time, just as people now use the word “IDEMIA” without a second thought.

Hopefully there isn’t a market in East Sussex named Oosto.

So who is Cubox?

Some people like to look at baseball statistics or movie reviews for fun.

Here at Bredemarket, we scan the latest one-to-many (identification) results from NIST’S Ongoing Face Recognition Vendor Test (FRVT).

Hey, SOMEBODY has to do it.

Dicing and slicing the FRVT tests

For those who have never looked at FRVT before, it does not merely report the accuracy results of searches against one database, but reports accuracy results for searches against eight different databases of different types and of different sizes (N).

  • Mugshot, Mugshot, N = 12000000
  • Mugshot, Mugshot, N = 1600000
  • Mugshot, Webcam, N = 1600000
  • Mugshot, Profile, N = 1600000
  • Visa, Border, N = 1600000
  • Visa, Kiosk, N = 1600000
  • Border, Border 10+YRS, N = 1600000
  • Mugshot, Mugshot 12+YRS, N = 3000000

This is actually good for the vendors who submit their biometric algorithms, because even if the algorithm performs poorly on one of the databases, it may perform wonderfully on one of the other seven. That’s how so many vendors can trumpet that their algorithm is the best. When you throw in other qualifiers such as “top five,” “best non-Chinese vendor,” and even “vastly improved,” you can see how dozens of vendors can issue “NIST says we’re the best” press releases.

Not that I knock the practice; after all, I myself have done this for years. But you need to know how to interpret these press releases, and what they’re really saying. Remember this when you read the vendor announcement toward the end of this post.

Anyway, I went to check the current results, which when you originally visit the page are sorted in the order of the fifth database, the Visa Border database. And this is what I saw this morning (October 27):

For the most part, the top five for the Visa Border test contain the usual players. North Americans will be most familiar with IDEMIA and NEC, and Cloudwalk and Sensetime have been around for a while.

A new algorithm from a not-so-new provider

But I had never noticed Cubox in the NIST testing before. And the number attached to the Cubox algorithm, “000,” indicates that this is Cubox’s first submission.

And Cubox did exceptionally well, especially for a first submission.

As you can see by the superscripts attached to each numeric value, Cubox had the second most accurate algorithm for the Visa Border test, the most accurate algorithm for the Visa Kiosk test, and placed no lower than 12th in the six (of eight) tests in which it participated. Considering that 302 algorithms have been submitted over the years, that’s pretty remarkable for a first-time submission.

Well, as an ex-IDEMIA employee, my curious nature kicked in.

Who is Cubox?

I’ll start by telling you who Cubox is not. Specifically, Cubox is not CuBox the low-power computer.

The Cubox that submitted an algorithm to NIST is a South Korean firm with the website cubox.aero, self-described as “The Leading Provider in Biometrics” (aren’t they all?) with fingerprint and face solutions. Cubox competes in the access control and border control markets.

Cubox’s ten-year history and “overseas” page details its growth in its markets, and its solutions that it has provided in South Korea, Mongolia, and Vietnam.

And although Cubox hasn’t trumpeted its performance on its own website (at least in the English version; I don’t know about the Korean version), Cubox has publicized its accomplishment on a LinkedIn post.

Why NIST tests aren’t important

But before you get excited about the NIST results from Cubox, Sensetime, or any of the algorithm providers, remember that the NIST test is just a test. NIST cautions people about this, I have cautioned people about this (see the fourth point in this post), and Mike French has also discussed this.

However, it is also important to remember that NIST does not test operational systems, but rather technology submitted as software development kits or SDKs. Sometimes these submissions are labeled as research (or just not labeled), but in reality it cannot be known if these algorithms are included in the product that an agency will ultimately receive when they purchase a biometric system. And even if they are “the same”, the operational architecture could produce different results with the same core algorithms optimized for use in a NIST study.

The very fact that test results vary between the NIST databases explicitly tells you that a number one ranking on one database does not mean that you’ll get a number one ranking on every database. And as French reminds us, when you take an operational algorithm in an operational system with a customer database, the results may be quite different.

Which is why French recommends that any government agency purchasing a biometric system should conduct its own test, with vendor operational systems (rather than test systems) loaded with the agency’s own data.

Incidentally, if your agency needs a forensic expert to help with a biometric procurement or implementation, check out the consulting services offered by French’s company, Applied Forensic Services.

And if you need help communicating the benefits of your biometric solution, check out the consulting services offered by my own company, Bredemarket. After all, I am a biometric content marketing expert.

What if your business has no website or web page?

In January of this year, I wrote a couple of posts about websites with outdated content.

The posts were obviously self-serving (since Bredemarket happens to sell services to update website text), but the second post backed my points up with data.

Specifically, a study noted that when people want to research a solution, 53% of them perform a web search for the solution, and 41% of them go to vendor web sites.

I used this data to make the point that your website had better be up to date, if you want your potential customers to have a good impression of your business.

An outdated website looks bad.

But I just ran across something even worse.

Worse than an outdated website

I’m not going to provide specifics, but I just saw a Facebook post in a local business group that promoted a service. This happens to be a service that is popular with individuals and businesses. The Facebook post stated that the service provider was the best provider in the local area, and was better than the competition. The post then gave the company name of the service provider, and…

…a local phone number.

You can guess what I did next. Like 53% of you, I searched for information on this particular company. I started on Facebook itself; since the individual made the post on Facebook, I figured that the company had a Facebook page.

It didn’t. The company had no Facebook presence.

So I got out of Facebook and went off into the World Wide Web and (like 41% of you) searched for the company’s web page.

I found no company web page with that name in California, but I did find a company with that name in another part of the country that coincidentally provided the same service. But I could tell that this was a separate company.

So I went back to the original Facebook post and asked a question.

Does [COMPANY NAME] have a website, or just a phone number?

I received a response from the original poster.

Bredemarket, no, just a number.

I made no further comment, but it got me thinking.

What’s worse than a website with outdated content?

No website or web page at all.

And I’m not talking about a fancy-dancy website. If you’ve seen Bredemarket’s website, it’s not fancy-dancy.

I’m just talking about a simple page. It doesn’t have to be on your own domain; it could be on wordpress.com (like my jebredcal site) or wix.com even facebook.com (Bredemarket has one of those too). Just something that ideally tells you the company name, the person who runs the company, the address of the company (yes, UPS Store addresses are acceptable; I know), a phone number, and an email address.

When all of these elements are available, and they’re present on a website, you have at least some assurance that the company is a viable concern. (I’ll grant that this can be faked, like Abdul Enterprises was faked, but at least a name, address, email, and phone number suggest that the company is real.)

A company name and a phone number with no website, no email address, and no company ownership information is…well, it’s sketchy.

So how does a company without an online presence establish one?

There are a variety of ways to establish a company online presence. You could pay for a website, you could set up a free website via a variety of service providers, or you could simply set up a social media page such as a Facebook page.

Now Bredemarket doesn’t create websites, and Bredemarket doesn’t create Facebook business pages. Facebook offers step-by-step instructions on how to create a Facebook business page, and there are guides on how to create complete websites such as a Wix site (and you can do it for free if you don’t need a custom domain and use accountname.wixsite.com/siteaddress).

Creating the site, however, is only part of the story.

Bredemarket can help you establish the initial content for a website or a Facebook page. (And if you desire, I can help you refresh the content also.)

Let’s look at the simplest example, where you just want to establish a presence with a few hundred words (say 400 to 600 words).

I’ll start by asking you a bunch of questions.

  • Topic. Well, the topic is your business, of course, but how would you summarize your business in one sentence?
  • Goal. What is the goal of your site or page? Do you want people to immediately buy something online? Do you want people to rush to your business location and buy something? Or do you just want people to talk to you about your product or service?
  • Benefits. I’ve talked about this ad nauseum, but it’s important to explain why people should want your product or service. If your explanation results in a “so what?” from the potential customer, then you need to refine your benefit statement.
  • Target audience. The message on your site or page is obviously affected by your target audience. A page intended for forensic scientists will have different messaging than a page intended for high school students who want an after school snack.
  • Other questions. These are going to vary from engagement to engagement, but it’s important to ask these questions up front to minimize any misunderstandings later.

After you and I have talked through these questions, I’ll start creating the text to place on your website. By the time we’ve gone through the process and we’re done, you’ll have an initial website presence for your business. People will be able to find your business, find out what it’s about, contact you, and give you lots of money.

But that won’t happen until the people can find out what you offer.

And it won’t happen if they only have a business name and a phone number.

If you want Bredemarket to help you establish an online presence with the correct words to woo customers:

Inland Empire West businesses should visit https://bredemarket.com/local/ for a special “locals only” discount.

Coffee and hair styling in Ontario, California

My local area is undergoing a transformation, with a number of new businesses appearing in the area. Oddly enough, I keep on seeing two distinctly different types of businesses appearing here.

Over the last couple of years, a number of coffee shops have opened in downtown Ontario (California, not Canada). I’m unintentionally going to leave many of them off this list, but a few of the new coffee shops include Mestiza Cakehouse and Cafe, Special Needz Coffee (with a second location inside 4th Sector Innovations), and Starbucks.

At the same time, a number of new hair stylists and barber shops have opened in downtown Ontario. Trust me, there’s a bunch of them.

I don’t know if this is public knowledge (it’s been discussed at the Ontario IDEA Exchange and other B2B forums), but downtown Ontario is even on track to have an establishment that combines the two business types. (Of course, a few of you have already figured out who I’m talking about.)

I guess that’s real life.

If you have a business and need to stand out from the crowd:

Also see https://bredemarket.com/bredemarket-2800-medium-writing-service/.

What is a bridge?

A bridge helps you get from one place to another.

By Anneli Salo – Own work, CC BY-SA 3.0, https://commons.wikimedia.org/w/index.php?curid=15716878

Without a bridge, you’re stuck at one place and can’t get to the other place. Or you can try to get to the other place, but you may get very wet.

Businesses need bridges to connect with their customers. When the bridges are erected, the customers understand what the businesses can do for them. If the customers need those particular services, they can buy them.

In two hours, I plan to attend the Ontario (California, not Canada) IDEA Exchange at 4th Sector Innovations.

And if some of the attendees ask, I can explain how Bredemarket can be a bridge.

Stupid tech tricks: no permission to respond to calendar invites? (The UID:X trick)

I use two separate Google calendars: one for Bredemarket, and one for personal non-Bredemarket meetings. I receive meeting invitations on both of these calendars. This usually isn’t a problem.

Usually.

Over the last year, I have accepted a variety of calendar invites from external inviters, including invites to Zoom meetings, invites to Microsoft Teams meetings, invites to Google Meet meetings, and even old-fashioned invites for Plain Old Telephone Service (POTS) calls. (Yes, these still exist.) These have originated from Google-managed domains, Microsoft-managed domains, and other domains.

When you accept a calendar invite, you send a message to the inviter that contains your acceptance of the message, and this acceptance is recorded both on your calendar and on the inviter’s calendar.

Except for the invite that I received yesterday evening.

I was reading email on my mobile phone and received a calendar invite. When Gmail displays calendar invites, it displays them with “Yes,” “Maybe,” and “No” buttons.

Calendar invite, the expurgated version.

So I clicked “Yes” on the invite…and received a message that I didn’t have permission to access to the target calendar.

That seemed odd, but I noticed that there was an “invite.ics” file attached to the invitation. While ics files are designed for Microsoft calendars, they can be imported into Google calendars, so I figured that I’d just import the invite.ics file when I had access to my computer the following morning.

So this morning I imported the invite.ics file…and got the same error stating that I didn’t have permission to access the target calendar.

Curious, I researched and found a solution:

“The solution for this is to manually edit the .ics file prior to importing it and replace all occurrences of “UID:” with “UID:X” (without the quotes). After doing this and saving the file, proceed with the import and all should be fine.”

So I opened up the invite.ics file in Notepad, performed the manual edit, and successfully imported the calendar entry.

As it turns out, the inviter doesn’t usually schedule meetings with people outside of the inviter’s domain, which explains why I was the first person to mention the issue.

While the problem was solved, I had no idea WHY the UID:X trick worked. And I’m not the only one asking this question.

Most of the time when I receive a meeting request in my gmail account, Google Calendar understands exactly what is going on and handles the request pleasantly.

But for some zoom meeting requests originating from one particular client, Google Calendar refuses to admit that it’s a meeting request until I edit the ICS file and insert an “X” after the “UID:” prefix per the suggestion here.

Looking at RFC 5545, it doesn’t look like the “X” is required but it’s not terribly clear.

Does RFC 5545 in any way require that “X” to be there?

As of this morning, no one has answered the question, but I found a comment in a separate thread that appeared to be relevant.

After investigating for a while, it seems adding the “X” is not a permanent solution. The UID is a global identifier, if two events have the same UID in the same calendar there’s a collision. Some calendar services like Outlook (which I use) seem to handle this, while Google and probably many others don’t.

So the mystery continues.

P.S. If you happen across this post and find it helpful, also see my 2009 tip about the spurious “remove probe” error for KitchenAid ovens. (TL;DR: use a blow dryer to remove moisture from the probe hole where the temperature probe is inserted.)

Meta-repurposing

I like to publish “in case you missed it” (ICYMI) posts over the weekend, just in case my Facebook, LinkedIn, or Twitter followers might have missed something that I originally published in the preceding week.

Last weekend I tried something a little different. Now that Bredemarket has been a going concern for over a year, I chose to publish some items that my followers might have missed when I originally published them in the preceding YEAR.

Although there are some parts of 2020 that aren’t fun to revisit.

But this past weekend, I went back to October 2020 for my latest #ICYMI offerings. I want to talk about two of these offerings in particular.

The first #ICYMI item

The first item that I shared last weekend was a Bredemarket blog post from October 17, 2020 entitled “You go back, Jack, do it again” that talked about repurposing content. Here’s a brief excerpt that links to a Neil Patel post.

Why repurpose content?

To reach audiences that you didn’t reach with your original content, and thus amplify your message. (There’s data behind this.)

If you’re a data lover, check the link.

The second ICYMI item

Waylon Jennings promotional picture for RCA, circa 1974. By Waylon_Jennings_RCA.jpg: RCA Records derivative work: GDuwenTell me! – This file was derived from:  Waylon Jennings RCA.jpg:, Public Domain, https://commons.wikimedia.org/w/index.php?curid=17091525

The second item that I shared last weekend was a Bredemarket Spotify podcast episode from the same period entitled “A special episode for Spotify subscribers, with Waylon Jennings’ ‘Do It Again.'” You can probably guess that it was about repurposing content.

To answer a few questions about the podcast:

  • Yes, it was a repurposing of the blog post.
  • Yes, this particular podcast episode was only on Spotify because it included a song sample.
  • Yes, I chose Waylon’s version of the song rather than Steely Dan’s because I like Waylon’s version better.
  • Yes, you have to be on Spotify Premium to hear the whole song, rather than a 30-second snippet. (I’m not on Spotify Premium, so even I haven’t heard the entire podcast as envisioned.)

I don’t really have anything profound to say about repurposing that hasn’t been said already, so treat this as a reminder that you can easily repurpose content on new platforms to reach new readers/listeners.

As I just did.

Again.

Postscripts

For the record, I haven’t created any other Spotify-only podcast episodes with music since that initial one a year ago. So all of the other podcast episodes that I’ve recorded are available on ALL of my platforms, including Anchor.

By the way, there was a third #ICYMI item that I re-shared last weekend on Facebook, LinkedIn, and Twitter. But it didn’t deserve its own re-blog.

(You gotta know when to hold ’em. Yes, that’s Kenny, not Waylon.)

A QR code is not a way of life

For years I have adopted and used the phrase “a tool is not a way of life,” and almost started a blog with that title. I’m glad I didn’t, because…well, because a tool is not a way of life, and who would want to read an entire blog with posts about THAT?

One tool that I have used off and on is the QR code. Years ago, one of my annual corporate goals was to explore how my then-employer could use QR codes; at the time, there wasn’t any pressing need to adopt them.

I have since chosen to adopt QR codes for some of my Bredemarket work, especially in cases where an online reader may need additional information.

(UPDATE February 20, 2023: Did I really write that? Read why I regret one word in the paragraph above.)

For more information about the Bredemarket 2800 Medium Writing Service, scan the QR code above. My content creation process didn’t fit on this brochure.

Of course, I’m not the only one who has adopted QR codes, and dissemination of detailed information isn’t the only reason to use QR codes.

For example, you may want to use QR codes to prevent yourself from dying due to a global pandemic.

And when that particular use case emerged about two years ago, restaurants rushed to adopt it, and vendors of QR code solutions rushed to promote them.

[M]any of these fortune tellers have something to sell. The most recent of these visionaries are those who have declared that QR codes are here to stay. Leaders in the online ordering and pay-by-phone business offer statistics to prove that the technology has been fully embraced and will continue to outlive the pandemic as the norm for restaurants. Operators who have fully leaned into QR code integration celebrate the news, broadcasting to investors that the technological investments and the pivots to less employee-reliant labor models were prudent, if not prescient, moves.

But now that the pandemic is (hopefully) receding, the shakeout (no, not THAT shakeout) is occurring. For some restaurants, ordering and paying with QR codes and other technological devices is a benefit, but for others, it is a detriment.

If your product is an immersive experience—or the facilitation of relationships—QR code usage may turn out to be counterproductive….

At Barcelona Wine Bar, we heard early on the frequent complaints from guests about QR fatigue and pivoted back to paper menus. Sales increased as each of our restaurants returned to in-person service. More importantly, so did guest satisfaction. We have recently returned thick, leather-bound wine lists to our tables for guests to leaf through instead of asking them to do more mindless online scrolling. QR ordering and payment will remain an option out of courtesy to those who feel safer or find it more convenient. However, as hosts, we would much prefer the opportunity for a final check-in and good-bye.

Here is another example of using a tool when it makes sense, and not using it when it doesn’t.

And this doesn’t have to do with “authenticity,” since the Barcelona Wine Bar concept is just as much a manufactured concept as that of Cracker Barrel and Starbucks (which have embraced QR codes and related technologies).

I only have one complaint that applied to both the Barcelona Wine Bar concept AND the Starbucks concept.

If you are an operator who puts little stock in on-site dining, recognize that customers on their phones often do not hear music, notice artwork and architectural details, nor care if the bartender is smiling or not. 

Perhaps there’s a reason why customers do not hear your music.

Perhaps the customers do not like your music.

If a restaurant truly wants to facilitate conversation, turn the danged music off!

Digital identity and…the United Nations Sustainable Development Goals?

Over the last few years, I have approached digital identity(ies) from a particular perspective, concentrating on the different types of digital identities that we have (none of us has a single identity, when you think about it), and the usefulness of these identities for various purposes, including purposes in which the identity of the person must be well established.

I have also noted the wide list of organizations that have expressed an interest in digital identity. Because of pressing digital identity needs, many of these organizations have moved forward with their own digital identity proposals, although now they are devoting more effort to ensure that their individual proposals play well with the proposals of other organizations.

Enter the United Nations (or part of it)

Well, let’s add one more organization to the list of those concerned about digital identity: the United Nations.

Although actually “the United Nations” is in reality a whole bunch of separate organizations that kinda sorta work together under the UN umbrella. But each of these organizations can get some oomph (an international relations diplomatic turn) from trumpeting a UN affiliation.

So let’s look at the Better Than Cash Alliance.

Based at the United Nations, the Better Than Cash Alliance is a partnership of governments, companies, and international organizations that accelerates the transition from cash to responsible digital payments to help achieve the Sustainable Development Goals

Note right off the bat that the Better Than Cash Alliance is not focused on digital identity per se, but digital payments. (Chris Burt of Biometric Update notes this focus.) Of course, digital payments and digital identity are necessarily intertwined, as we will see in a minute.

Enter the Sustainable Development Goals

But more importantly, digital payments themselves are not the ultimate goal of the Better Than Cash Alliance. Digital payments are only a means to an end to realize the United Nations Sustainable Development Goals, issued by a different UN organization.

Because of its primary focus, the Better Than Cash Alliance concentrates on issues that I myself have only studied in passing. For example, I have concentrated on the issues faced by people with no verifiable identity, but have not specifically looked at this from the lens of Sustainable Development Goal number 5, Gender Equality.

Principle 2 of the UN Principles for Responsible Digital Payments (October 2021 revision)

For this post, however, I’m going to focus on the digital identity aspects of the Better Than Cash Alliance and its report, UN Principles for Responsible Digital Payments (PDF), which was just updated this month (October 2021).

One of the key factors outlined in the report is “trust.” Now trust can have a variety of meanings (including trust that the information about my identity will not be used to throw me into a terrorist concentration camp), but for my purposes I want to concentrate on the trust that I, as a digital payments recipient, will receive the payments to which I am entitled.

To that end, the revised principles include items such as “ensure funds are protected and accessible” (principle 2), “champion value chain accountability” (principle 9), and other principles that impact on digital identity.

The introduction to the discussion on principle 2 highlights the problem:

A prerequisite of digital payments is that they match or surpass the
qualities of cash. All users rightly expect their funds to be safe and readily available, but this is not always the case. The causal factors behind this are multiplex.

(“Multiplex”? Yes, this document was written by government committees. Or movie theater owners.)

AMC Ontario Mills. (California, not Canada.) By Coolcaesar – Own work, CC BY-SA 4.0, https://commons.wikimedia.org/w/index.php?curid=104309320

To avoid the multiplexity of these issues, one offered response is to “proactively track and protect against unauthorized transactions, including fraud and mistakes.” This can be done by several methods near and dear to us in identity-land:

Advocate for appropriate security controls to mitigate transaction risks (e.g., biometric security,34 two factor authentication,35 limits on logins or transaction amounts,36 creating “need-to-know” administrative privileges for interacting with client data).

Now most people who read this report aren’t interested in the footnotes. But I am. Here are footnotes 34, 35, and 36 from the document.

34 Examples include the use of biometrics in India’s Aadhaar identification system, and UNHCR’s use of iris technology to distribute cash to refugees in Jordan

35 See EU PSD2 Articles 97–98, Ghana’s Payments Systems and Service Act, 2019 (section 65(1)), and Malawi’s 2019 e-Money regulations (section 17)

36 India Master Direction on Prepaid Payment Instruments, Section 15.3

Of course the report could have cited other examples, such as the use of fingerprints for benefits payments in the United States in the 1990s and 2000s, but I’m sure that falls afoul of some Sustainable Development Goal.

Although it’s harder to criticize a UN entity, such as the aforementioned UNHCR, when it uses biometrics.

Or maybe it isn’t that hard, when you think about Access Now’s criticisms of the UNHCR program.

Refugees should not be required to hand over personal biometric data in exchange for basic needs such as purchasing food, or accessing money. However, iris scan technology supplied by UK-registered company, IrisGuard, is reportedly being used by the World Food Programme (WFP) and the United Nations High Commissioner for Refugees (UNHCR) in refugee camps and urban centers in Jordan.

Based on reports suggesting the absence of meaningful consent, and an opaque privacy policy, Access Now has serious objections to the lack of transparency and privacy safeguards around this precarious tech rollout. 

Wow. Jordan is as bad as Illinois. Maybe Jordan needs a BIPA! Hope their doorbell cameras aren’t a problem…

So while the Better Than Cash Alliance is focusing on other things, it’s at least paying lip service to some of the stronger identity controls that many in the identity industry advocate.

Of course, it’s outside of the scope of the Better Than Cash Alliance to dictate HOW to implement “appropriate security controls.”

But anything that saves the whales AND the plankton (and complies with BIPA) will be met with approval.

Freelancing example from Florida

I’m obviously interested in freelancing stories, so I was intrigued when PBS shared this story from Next Avenue. It’s an update on the story of Joan and Steve Reid, who moved from suburban New York to Vero Beach, Florida on 2019.

Photo by Don Lamson from City of Vero Beach website. https://www.covb.org/gallery.aspx?PID=156

While it’s cast as a “retirement” story (both were 67 in 2019), it’s actually a freelancing story.

Both Joan and Steve had been working part-time in New York (as a librarian and florist, respectively), and they initially planned to get part-time employment (minimum wage, 10 hours a week) when they relocated to Vero Beach.

They’ve given up on that idea. “We looked initially, when we arrived,” Joan explains. “But both of us quickly realized we were square pegs trying to fit into round holes.”

So they turned to freelancing.

Steve, who creates art from found objects and mixed media, sold two pieces of art this year for a total of $350.

From November 2019 to April 2021, Joan worked as a content editor for two local magazines, grossing $800 a month. “This was an incredible boost for us,” she says. She earned $630 in 2019 from freelance writing, editing and teaching, but only $305 in 2020 and zero so far in 2021.

Joan also self-published a book on Amazon, and expects to earn $45 from the book in November.

So they’re not getting rich from freelancing, but luckily have other sources of income including pensions and Social Security (which they began to receive at age 62).

Perhaps they could increase their freelancing income, but they’re retired. And apparently enjoying themselves.