Connect with us


Microsoft Alliance ID2020 Universal Digital Identity and You

Last year, Microsoft joined the ID2020, a global alliance whose goal is to create universal digital identities for everyone. What are the social, economic, and ethical implications of such an initiative? Our digital activities are more and more consistent with our real activities. Participation in the modern economy, the ability to buy and sell, get jobs, medical care, social services and much more is almost impossible without a digital identity.

In May 2016, at the United Nations headquarters in New York, ID2020, an alliance of governments, nonprofits, academia, more than 150 private sector companies and 11 United Nations agencies collaborated on how to ensure a unique digital identity for everyone on the planet. Most of the scope of the ID2020 alliance is focused on its noble goal of providing digital identification to more than one billion refugees, women, children and others without any form of identification.

The idea of ​​providing digital identification of this “invisible” part of the world’s population to ensure their participation in society puts a human face on a true mission. It also creates a unifying point, which this Open Alliance hopes that other organizations, such as Microsoft, will accept and become part of this global effort. The fundamental mission of creating a universal identification system that includes every person on the globe, using modern technology and the support of various governments, financial institutions and much more, is the goal hidden behind the humanitarian cause.

Alliance ID2020 and its goal until 2030

According to the alliance’s guidance, “By 2030, it seeks to contribute to the expansion of a secure, verifiable and sustainable digital identification system in line with the Sustainable Development Goals” agreed by the United Nations. “This is a short-term focus on achieving this goal – developing and testing the best technology solutions for digital identification; and working with governments and other entities to implement them. The emphasis on 1.5 billion undocumented people is part of this short-term vision.

The long-term outlook is built around Case for Action alliances, which argue that convergence of trends provides an unprecedented opportunity for coordinated, coordinated progress towards the goal of universal digital identity. These trends include political consensus among United Nations members, the expansion of global ties, the advent of new technologies, and global calls for a new identity model.

– Political unity: in 2015, all countries of the United Nations committed themselves to a global commitment to ensure legal identity for all by 2030.
– Global connectivity: the proliferation of smart devices allows the use of new registration methods and ensures consistent interaction with credentials.
– New technologies: blockchain technology, for example, used with bitcoin, and in which Microsoft has invested in the creation of a decentralized id (DID), makes secure and verifiable technology available to the masses.
– New identification model: consumers want a seamless and secure digital experience.

Microsoft, in a recent announcement regarding the use of blockchain technology for decentralized identification, further stated its support for this initiative, saying: “Each of us needs the digital identity that we own, which securely and confidentially stores all the elements of our digital identity.”

Microsoft, blockchain and universal identifiers

In a statement confirming its position as a founding member of the ID2020 alliance, Microsoft shared that it, the developers and partners in the Alliance will cooperate on the basis of blockchain, an open source identification system. This system will ensure the compatibility of people, applications, products and services between cloud providers, other blockchains and organizations.

Microsoft’s goal is to help set universal and scalable standards for these decentralized digital identities using blockchain technology. In the blockchain, information exists as a common database that is consistently consistent. Blockchain data does not exist in a centralized location, but is located on millions of computers across the Internet. The Alliance uses this secure and virtually “elusive” system to create a decentralized system for identifying the world’s population.

If blockchains sound familiar, they should be. Wallet apps, such as those used to buy things with popular cryptocurrencies like bitcoin, are the user interface that most people associate with blockchain technology. This technology has secure identity management at its core. It is on this technology that Microsoft and the Alliance are developing applications for global identity management.

It’s about the global community and the economy

Mobile technology is becoming an increasingly important tool for confirming your identity in various transaction scenarios, including buying and selling goods online or in person, using public transport, opening hotel room doors, participating in amusement parks and much more. Our smartphones are currently the main portal, intricately intertwining our digital identity with our physical world. Recognizing this, GSMA, an alliance of nearly 800 mobile operators, seeks to simplify SIM registration by encouraging flexible approaches to identity verification requirements for IDPs so that they can access mobile, SIM-based energy services and wallets .

This inclusion of even those who are deprived of suffrage in the digital landscape is of utmost importance for the ID2020 Alliances to provide a universally accepted identification system for everyone on the planet. It is important to note that the purpose of this identification system is to create the basis for integrating the participation of world citizens in the global community and the universal digital economy. A robust and verifiable identity, like any digital transaction, is fundamental to this vision.

Obvious concerns

The Alliance emphasizes that digital identity is the cornerstone of international development, and believes that digital identity should be with a person from birth to death. This goal, pursued by global cooperation, raises many ethical issues.

As the digital landscape is becoming more common, the boundaries between the physical and the real world continue to blur. If the lack of digital identity within the current paradigm limits participation in the modern economy, then the absence of such a single global globally recognized system can completely impede participation.

If the goal of the alliance is a globally recognized Digital Identity for everyone from birth to death, will this become a global mandate?

How will this be implemented and by whom?

What will happen to those people who do not want to participate?

Will they be chased?

How will the implementation of identification develop with technologies that go beyond smartphones?

Will there be wearable devices, implants like the ones used in the Swedish metro, or will some form of digital tattoo become the norm?

As more and more transactions become digital and are built around a single global identity standard supported by Microsoft, the question of who will manage this evolving global community and economy becomes relevant.

Moreover, non-participants in this system will not be able to buy or sell goods or services.



In the US, there is a detainee on suspicion of the largest hacker attack on Twitter. He is 17

Graham Clark / © WFLA

On the night of July 16, Twitter was massively hacked. Fraudsters gained access to the accounts of celebrities and large companies and published records on them with a proposal to transfer bitcoins. Now the police have detained a group of hackers, whose “brain” was a 17-year-old teenager.

Graham Clark is now in the Hillsborough County Jail in Oregon, USA. He was the mastermind and brain behind the attack, reported on the WFLA , citing District Attorney Andrew Warren. The teenager faced 30 criminal charges, including for organized fraud and illegal use of personal data. Despite his age, he is going to be tried as an adult.

Shortly after Clark’s arrest, the US Department of Justice announced that he worked as part of the group, and told about the arrest of two more suspects. They were 22-year-old Nima Faseli and 19-year-old Mason Sheppard, who operated under the nicknames “Rolex” and “Chevon”, respectively. Faselli was charged with burglary, she faces up to 5 years in prison, and Sheppard – up to 20 for burglary and conspiracy to commit fraud and money laundering. Both will also have to pay a $ 250,000 fine if the charges are confirmed.

The group hacked Twitter accounts of large companies and famous personalities. Among the victims are Elon Musk, Bill Gates, Barack Obama, Kanye West, as well as Apple and Uber. From their names, the attackers posted ads asking them to transfer bitcoins to a teenager’s account in Tampa. 

They also gained access to internal network administration tools. It is reported that in the course of their actions several hundred people were injured, and they received 400 transfers totaling $ 100,000 in just one day. Warren described their actions as “an intricately organized attack of unprecedented magnitude.”

Examples of posts published by scammers / © tjournal
Examples of posts published by scammers / © tjournal

́After the attack, Twitter deleted posts and temporarily restricted the ability to publish for verified accounts. Later, the company said that the hacker attack was carried out using social engineering, and also noted that after the hack, their access to the network’s internal tools was limited.

Shortly after the arrest of the hackers, Twitter issued a statement thanking the local police, the IRS, the Secret Service and the FBI for their investigation. 

“We appreciate the prompt actions of law enforcement agencies and will continue to cooperate with them as the case develops,” the company said. 

They also talked about being transparent and regularly updating information about the investigation. In addition, the network has removed restrictions on the publication of posts by popular accounts and on changing passwords for some users.

Continue Reading


The case of pedophiles among the Anglo-Saxon elite continues to kill

Pedophile financier Jeffrey Epstein was friends with the world’s most influential people and paid off with business partners with orgies involving teenage girls. A year ago, he passed away under suspicious circumstances, but now his case – one of the most scandalous in the history of the United States, Britain and the largest bank of the Federal Republic of Germany – has received a second wind and continued to grow overgrown with corpses.

It is well known that the United States is a country with a heavily armed population, so killings are not infrequent, five to ten times more than in Western Europe. However, there is a category of citizens whose lives, in spite of Hollywood films, are extremely rarely attempted in America – these are federal judges.

Since Harry Truman’s time, only four of them have been killed, and the last time this happened was over 30 years ago. This is easy to explain: the point is not even that such people are well guarded, but that such an attempt would be very expensive – the entire life spent in prison, and in states where the death penalty has not been abolished, it is even more expensive.

In other words, to take up arms against a federal judge, you have to be either a psycho, or someone who has nothing to lose, or someone who, on the contrary, risks losing too much.

A few days ago, such a man knocked on the door of Judge Esther Salas’ home in New Jersey, disguised as a delivery officer. A few minutes later, Salas’s son was killed, her husband was seriously wounded, and the judge herself escaped because she was in the basement at the time of the attack.

Despite the fact that all this happened during the day, the killer managed to escape. But the FBI soon identified the main suspect – Roy Dan Hollander. He is a well-known man in his own way – he periodically participated in TV shows from the standpoint of an anti-feminist and “public defender of men.” It is not known what claims he had against the judge, but it will not be so easy to find out.

Hollander’s body was found in a remote area north of New York. The official version of the cause of his death is suicide.

Esther Salas

The version with a lone psychopath, of course, has a right to exist. But there is another circumstance that turns this whole story into a continuous stream of conspiracy theories – Salas was engaged in the case of the pedophile financier Jeffrey Epstein, who, according to an equally official version, committed suicide while awaiting trial in his cell.

This case, dealt an incomparable blow to the reputation of the American political elite and the British monarchy. Let’s remember the main thing.

The secular lion and millionaire Epstein managed the assets of world famous brands and personified ostentatious wealth – the largest residence in Manhattan, private jet flights, regular parties on remote islands, friendship with the “cream of society”. He was one of the prominent sponsors of the Democratic Party, for which its top officials showered him with gratitude, as if not noticing one strange feature of the financier – he preferred to communicate with very young girls.

In 2005, part of the truth was revealed: Epstein was accused of having ties with minors and of persuading them to have sex. However, the millionaire got out – he made a deal with the investigation and served a little more than a year in exchange for forgiveness for all possible episodes and compensation for three dozen victims in civil suits.

The prosecutor who agreed to the deal was named Alexander Acosta. In 2019, when he was the Minister of Labor in the Trump administration, this deal “caught up” with him – against the background of a new scandal related to Epstein, he was forced to resign, and the agreement with the pedophile was deemed illegal since the victims knew nothing about him.

By this time, the Epstein case was not at all what it initially appeared to be. The lover of sex with minors “has grown” to a seasoned pimp who supplied “live goods” as part of lobbying activities. Parties, suites, islands, teenage prostitutes – all of this turned out to be not only the nouveau riche’s vacation, but also his business. Bribes for lucrative contracts and specific services.

How many businessmen and high-ranking politicians were involved in these orgies, only Epstein himself knew, but he had no shortage of rich and powerful friends. Among them, for example, former US President Bill Clinton, who regularly used Epstein’s plane and was once spotted on one of his two islands used for meetings with teenagers.

Two victims testified directly against Prince Andrew – the youngest son of Elizabeth II, who is now confused in his memories and refuses to cooperate with the investigation (but at the same time he is lying that he is meeting the American prosecutors).

A well-founded accusation of these two is enough to shake the political foundations of the Anglo-Saxon world.

But the list of Epstein’s close friends is not limited to them – it includes ex-Prime Minister of Israel Ehud Barak, and ex-Prime Minister of Great Britain Tony Blair, and Crown Prince of Saudi Arabia Mohammed (the most influential Saudi in the world after his 84-year-old father, the king), and even Donald Trump.

True, the friendship with the latter fell on a period when the influence of the developer Trump was not as powerful (and suitable) as Clinton’s. After the very first case against Epstein, the current president stopped all communication with him, but even before that he was among those who publicly drew attention to the financier’s love for young people. The media that hate Trump do not care about this, so the documentary series “Jeffrey Epstein: Filthy Rich” is sometimes edited in the spirit of a propaganda video – the revelations of the victims are given against the background of Epstein’s photographs with Trump, not Clinton or Andrew.

Be that as it may, Epstein is dead, and that he passed away of his own free will, there are reasonable doubts. And everyone in the United States (even if he himself never admits it) understands that the Democratic Party, opposition to Trump, and, especially, the Clintons, around which a full-fledged necropolis of people who died under suspicious circumstances, has already formed, is more interested in the silence of a pedophile.

Now the case of a super-influential pedophile has been closed, but cases of fraud remain – underage girls, as mentioned above, were part of dirty deals. One of them concerns the largest financial conglomerate in Germany – Deutsche Bank, which Epstein used to launder money thanks to connections in his leadership.

It is not known whether he thanked these “connections” of his the way he used to – orgies with minors on remote islands. But it is known that federal judge Esther Salas, who miraculously escaped death, was engaged in exactly this case.

At the same time, right now the scandal around Epstein and his influential friends has received a second wind. In early July, Ghislaine Maxwell, the daughter of a media mogul, a close friend and, allegedly, Epstein’s accomplice, was arrested. She does not believe that the scandalous financier himself took his own life. And he is the only person who is able to shed light on the participants in pedophile orgies.

If, of course, she lives to see the trial, and is not found dead, after which the world will hear the official version of “suicide” for the umpteenth time.

Continue Reading


Chinese diplomats in the US are urgently burning all documents

According to Houston city portals, on July 21, 2020, at approximately 8:00 pm local time, people living in the Montrose Boulevard area smelled a strong smell of burning paper – as if an entire paper mill was on fire. 

The firefighters and police who went to the scene quickly found the fire, located at Montrose 3417 – that is, a fire was burning in the building where the Chinese embassy is located:

However, the Chinese who met the firefighters reassured the outfit, saying that everything was under control and the trash can simply caught fire. However, from the surrounding balconies, the burning urn looked like this:

Thus, throughout the night from 21st to 22nd of July, employees of the Chinese embassy urgently destroyed documents. 

Since the embassy is Chinese and the documents there are Chinese, the employees of the diplomatic mission have every right to destroy their documents – which is done in all the embassies of the world from time to time. But in this case, the documents were burned in bundles, in huge quantities. 

There is nothing new in such destruction of documents. In particular, on the eve of the attack on Pearl Harbor on December 7, 1941, the Japanese ambassadors also burned documents in centners. 

This is also not surprising, since the burning of documents by embassies is a worldwide practice in the event of a war between states. Naturally, no one kills or arrests the ambassadors, but already in the first hours of hostilities they are offered to leave. Therefore, one half of the ambassadors after that packs their clothes, and the other half urgently burns secret documents – so as not to leave it to the enemy. 

Sometimes, of course, there are overlays – as is the case, for example, with the Japanese who ran ahead of the locomotive. And this is a historical fact. They say that a similar story happened during the German attack on the USSR on June 22, 1941.

So, the Germans began to burn the documents on the 20th, and in the evening of June 21st, the German ambassador informed Joseph Stalin of their plan to bomb the next day.

And now, it seems, history is repeating itself, only this time the Chinese and, possibly, diplomats from the Russian Federation played the role of the Japanese, who, it seems, also have something burning somewhere:

We do not vouch for the accuracy of the information from Miami, since there is only one text tweet. However, the information from Houston is reliable and the actual DEFCON is now at level 2-3.

EAM will be decisive in the near future, that is, messages about actions in an emergency situation – if now telegrams longer than 100 characters are sent to the American Air Force and the nuclear submarine, then DEFCON will already be somewhere 1-2 – that is, time to crawl under the table and monitor the situation from there. 

Continue Reading