|
All of those can be encrypted coming from the device.
Peter
_________________________Peter J. Cranstone CEO. 3PMobile Boulder,
CO USA
![]() Improving the Mobile Web Experience Cell:
720.663.1752
Web site: www.3pmobile.com
CONFIDENTIALITY NOTICE: This e-mail transmission, and any documents, files or previous e-mail messages
attached to it may contain information that is confidential or legally privileged. Any unauthorized review, use, disclosure or distribution of such information is prohibited. If you are not the intended recipient, please notify the sender by telephone or return
e-mail and delete the original transmission and its attachments and destroy any copies thereof. Thank you.
From: Devon M T Loffreto <
">
>
Date: Sunday, July 14, 2013 8:27 AM To: Kevin Cox < "> > Cc: ProjectVRM list < "> > Subject: Re: [projectvrm] Towards a Behavioural Identity Framework So... the device id is encrypted... email is used for personal control of context... behavior is correlated at the site level based on a matrix of weighted characteristics applied to devices... what about the leaky data that comes with the user
like IP, location ,etc...? How are those managed (captured/not captured)?
Devon
On Sat, Jul 13, 2013 at 7:35 PM, Kevin Cox
<
" target="_blank">
> wrote:
|
Archive powered by MHonArc 2.6.19.