"The identity claims get picked up by a relying party that provides information that is not very sensitive, such as access to a discussion forum." . . . .