{"id":48601,"date":"2014-06-18T02:30:09","date_gmt":"2014-06-18T02:30:09","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=48601"},"modified":"2014-06-18T02:30:09","modified_gmt":"2014-06-18T02:30:09","slug":"restoring-trust-online","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/restoring-trust-online\/","title":{"rendered":"Restoring Trust Online?"},"content":{"rendered":"<p><\/p>\n<p><i><font SIZE=\"2\">Could this government backed internet ID system be the answer to cybersecurity concerns and restoring trust online?&#8211;PC Pitstop.<\/i><\/font><\/p>\n<h3>Restoring Trust Online?<\/h3>\n<p>by Natasha Stokes for Techlicious<\/p>\n<p>Internet users are pushing back against the National Strategy for Trusted Identities in Cyberspace (NSTIC) initiative, a government-led online identification system currently in the pilot phase. Much of the furor circles around the possibility, stoked by all-too-frequent revelations of surveillance by the National Security Agency, that NSTIC pushes toward a single-ID system that would enable the U.S. government to track its citizens online.<\/p>\n<p>In reality, NSTIC software prohibits tracking. The program&#8217;s aim is to create a standard for high-security internet identity, initially for users of the government&#8217;s digital services. In an era of lax attitudes to online privacy and deep security exploitations like the Heartbleed virus, could such an online ID system be the sensible next step? Or is the NSTIC setting the United States more firmly on the path to becoming a Big Brother state?<\/p>\n<p><strong><br \/>\nWhat is NSTIC?<\/strong><\/p>\n<p>NSTIC is a federated ID system in which third-party companies verify an account for use in other services. In this case, several companies chosen by the government create high-security accounts initially for use in digital government services such as voter registration or driver&#8217;s license applications.<\/p>\n<p>The secure ID could eventually be used at other sites around the Internet. Given that NSTIC is funded by the Department of Commerce and was originally devised to reduce fraud in online transactions, it isn&#8217;t a leap to imagine that e-tailers might be the next to offer log-ins using an NSTIC credential.<\/p>\n<p>The NSTIC ID is opt in, meaning that signing up is still optional for now. However, the government will encourage all new users of its digital services to create an NSTIC-aligned ID, offering a standalone government account as a last resort.<\/p>\n<h3><a href=\"http:\/\/www.techlicious.com\/blog\/what-is-the-nstic-online-id\/\" target=\"_blank\">Article continued here<\/a><\/h3>\n<p>This excerpt appears with the permission of Techlicious.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Could this government backed internet ID system be the answer to cybersecurity concerns and restoring trust online?<\/p>\n","protected":false},"author":28,"featured_media":48606,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[671],"tags":[4672],"class_list":["post-48601","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-techlicious","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Restoring Trust Online?<\/title>\n<meta name=\"description\" content=\"Restoring Trust Online? - Could this government backed internet ID system be the answer to cybersecurity concerns and restoring trust online?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/restoring-trust-online\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Restoring Trust Online?\" \/>\n<meta property=\"og:description\" content=\"Restoring Trust Online? - Could this government backed internet ID system be the answer to cybersecurity concerns and restoring trust online?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/restoring-trust-online\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2014-06-18T02:30:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/NSTIC150.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"150\" \/>\n\t<meta property=\"og:image:height\" content=\"150\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Techlicious\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Techlicious\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/restoring-trust-online\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/restoring-trust-online\\\/\"},\"author\":{\"name\":\"Techlicious\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/00ed303fb3673e23b03fdf5893ec6ab9\"},\"headline\":\"Restoring Trust Online?\",\"datePublished\":\"2014-06-18T02:30:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/restoring-trust-online\\\/\"},\"wordCount\":323,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/restoring-trust-online\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/NSTIC150.jpg\",\"keywords\":[\"cybersecurity\"],\"articleSection\":[\"Techlicious\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/restoring-trust-online\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/restoring-trust-online\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/restoring-trust-online\\\/\",\"name\":\"Restoring Trust Online?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/restoring-trust-online\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/restoring-trust-online\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/NSTIC150.jpg\",\"datePublished\":\"2014-06-18T02:30:09+00:00\",\"description\":\"Restoring Trust Online? - Could this government backed internet ID system be the answer to cybersecurity concerns and restoring trust online?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/restoring-trust-online\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/restoring-trust-online\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/restoring-trust-online\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/NSTIC150.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/NSTIC150.jpg\",\"width\":150,\"height\":150},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/restoring-trust-online\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Restoring Trust Online?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/00ed303fb3673e23b03fdf5893ec6ab9\",\"name\":\"Techlicious\",\"description\":\"Techlicious was founded by consumer tech guru, Suzanne Kantra, Techlicious is your daily scoop on everything from the best new mobile phones and apps to holiday shopping guides to step-by-step instructions for protecting your privacy on the Internet.\",\"sameAs\":[\"http:\\\/\\\/techlicious.com\"],\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/techlicious\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Restoring Trust Online?","description":"Restoring Trust Online? - Could this government backed internet ID system be the answer to cybersecurity concerns and restoring trust online?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/restoring-trust-online\/","og_locale":"en_US","og_type":"article","og_title":"Restoring Trust Online?","og_description":"Restoring Trust Online? - Could this government backed internet ID system be the answer to cybersecurity concerns and restoring trust online?","og_url":"https:\/\/www.pcmatic.com\/blog\/restoring-trust-online\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2014-06-18T02:30:09+00:00","og_image":[{"width":150,"height":150,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/NSTIC150.jpg","type":"image\/jpeg"}],"author":"Techlicious","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Techlicious","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/restoring-trust-online\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/restoring-trust-online\/"},"author":{"name":"Techlicious","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/00ed303fb3673e23b03fdf5893ec6ab9"},"headline":"Restoring Trust Online?","datePublished":"2014-06-18T02:30:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/restoring-trust-online\/"},"wordCount":323,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/restoring-trust-online\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/NSTIC150.jpg","keywords":["cybersecurity"],"articleSection":["Techlicious"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/restoring-trust-online\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/restoring-trust-online\/","url":"https:\/\/www.pcmatic.com\/blog\/restoring-trust-online\/","name":"Restoring Trust Online?","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/restoring-trust-online\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/restoring-trust-online\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/NSTIC150.jpg","datePublished":"2014-06-18T02:30:09+00:00","description":"Restoring Trust Online? - Could this government backed internet ID system be the answer to cybersecurity concerns and restoring trust online?","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/restoring-trust-online\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/restoring-trust-online\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/restoring-trust-online\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/NSTIC150.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/NSTIC150.jpg","width":150,"height":150},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/restoring-trust-online\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Restoring Trust Online?"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/00ed303fb3673e23b03fdf5893ec6ab9","name":"Techlicious","description":"Techlicious was founded by consumer tech guru, Suzanne Kantra, Techlicious is your daily scoop on everything from the best new mobile phones and apps to holiday shopping guides to step-by-step instructions for protecting your privacy on the Internet.","sameAs":["http:\/\/techlicious.com"],"url":"https:\/\/www.pcmatic.com\/blog\/author\/techlicious\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/48601","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/28"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=48601"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/48601\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/48606"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=48601"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=48601"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=48601"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}