Banner Logo
Home
The Real Kato
About Me
Twitter
Facebook
Frozen Lunches
Links
Kottke
Daring Fireball
Amalah
Secret Agent Josephine
Dooce
Contact



Archives
Most Recent

2024 December
2012 February
2012 January
2011 November
2011 October
2011 September
2011 August
2011 July
2011 June
2011 May
2011 March
2011 February
2011 January


Categories
All Categories 

bloggers 
books 
commentary 
dating 
food 
funnyhaha 
interesting 
life 
movies 
music 
politics 
reviews 
science 
site-business 
sports 
style 
techwatch 
television 
theater 
travel 


Recent Comments
On College Football 2022: Week 6 Recap and Week 7 Pre...
Ken said:
Yeah, we've both had our share of hope and disappointment in this game. Let's just hope for a good b...
On College Football 2022: Week 6 Recap and Week 7 Pre...
Dan* said:
I'm not sure how I feel about this game. On one hand, I feel pretty optimistic that we have the tale...
On College Football 2022: Week 1 Preview
Dan* said:
Glad to see you'll be back writing football again, Ken! Congrats on the easy win today. You didn't ...
On College Football 2021: Week 10 Recap and Week 11 P...
Ken said:
Yeah, sorry one of our teams had to lose. I've come to appreciate Penn State as a classy and sympath...
On College Football 2021: Week 10 Recap and Week 11 P...
Dan* said:
Hey Ken, congratulations on the win yesterday! Some really odd choices by our coaching staff in that...


Articles: techwatch: 2012 February

<< Previous: 2012 January | Back to Most Recent | Next: 2012 May >>

Page 1

Security
Sunday, 2012 February 5 - 3:46 pm
Amy's wallet was lost or stolen last week, when we were out at a douchey nightclub downtown (we didn't even want to be there, but got roped into it). In the wallet were a driver's license, a credit card, a bank card, and her social security card. Yeah, we know, no one should carry their social security card around with them, but an employer said they needed to see it. (They don't, by the way; the SSN can be verified by employers online.)

Anyway, that got me thinking about the antiquated mechanisms we have for identity security.

Read more...
Permalink   Bookmark and Share
Posted by Ken in: commentarytechwatch


Page 1


Login


Search This Site
Powered by FreeFind