mirror of
https://github.com/Decentralized-ID/decentralized-id.github.io.git
synced 2024-12-25 23:29:26 -05:00
sort \ organize
This commit is contained in:
parent
8f0affac76
commit
073249e95d
@ -37,6 +37,8 @@ last_modified_at: 2023-06-16
|
|||||||
> The Super Skills app combines a custodial wallet (Torus) and Ceramic VC/storage tooling to give children private, exportable, future-proof achievement records – a self-sovereign educational credentialing system in miniature.
|
> The Super Skills app combines a custodial wallet (Torus) and Ceramic VC/storage tooling to give children private, exportable, future-proof achievement records – a self-sovereign educational credentialing system in miniature.
|
||||||
* [Super Skills, a mobile application use case for DIDs and VCs](https://medium.com/@ntonani/super-skills-a-mobile-application-use-case-for-dids-and-vcs-d174467ccf46) 2021-12-01 Ntonani
|
* [Super Skills, a mobile application use case for DIDs and VCs](https://medium.com/@ntonani/super-skills-a-mobile-application-use-case-for-dids-and-vcs-d174467ccf46) 2021-12-01 Ntonani
|
||||||
> Super Skills falls into the category of informal learning, but with the use of DIDs, VCs, and digital wallets, we are able to issue provable credentials for children that persist outside of the game. They can be presented and verified without having to communicate with our systems or LEGO, capturing the learning and putting control into the learner’s hands.
|
> Super Skills falls into the category of informal learning, but with the use of DIDs, VCs, and digital wallets, we are able to issue provable credentials for children that persist outside of the game. They can be presented and verified without having to communicate with our systems or LEGO, capturing the learning and putting control into the learner’s hands.
|
||||||
|
* [learningeconomy, LEGO] [Using Blockchain to Get Information When You Need It from Wherever You Are](http://informationmatters.org/2021/08/using-blockchain-to-get-information-when-you-need-it-from-wherever-you-are/) 2021-08-05 Information Matters
|
||||||
|
> The ULC will leverage blockchain technology to deploy a library identity and credentialing application to be developed by the Learning Economy. It will connect existing library information and library card systems while allowing libraries to continue managing users with their existing technology infrastructures already in use. The design architecture (as shown in the figures below) will provide for the following:
|
||||||
* [Education Blockchain Initiative](https://www.acenet.edu/Research-Insights/Pages/Education-Blockchain-Initiative.aspx) ACENet
|
* [Education Blockchain Initiative](https://www.acenet.edu/Research-Insights/Pages/Education-Blockchain-Initiative.aspx) ACENet
|
||||||
* [ACE Selects Four Blockchain Innovation Challenge Winners to Expand Economic Opportunity to Underserved Learners](https://www.acenet.edu/News-Room/Pages/Four-Blockchain-Innovation-Challenge-Economic-Opportunity-Underserved-Learners.aspx) 2021-02-11
|
* [ACE Selects Four Blockchain Innovation Challenge Winners to Expand Economic Opportunity to Underserved Learners](https://www.acenet.edu/News-Room/Pages/Four-Blockchain-Innovation-Challenge-Economic-Opportunity-Underserved-Learners.aspx) 2021-02-11
|
||||||
> The [Lifelong Learner Project](https://www.lifelonglearnerproject.org/), Powered by Teachers, to develop a digital wallet in which teachers can store and access their credentials, certifications, and learning resources and securely share these verifiable credentials with entities such as state licensing systems, human resources departments, and learning management systems. The project is led by RANDA Solutions, in partnership with the Utah State Board of Education, ETS, Digital Promise, University Instructors, University of Colorado, Colorado Springs, Blockframe, Fluree, Evernym, Velocity Network Foundation, IDRamp, PhilosBDL, UPD Consulting, IATC, Credential Engine, and IMS Global.
|
> The [Lifelong Learner Project](https://www.lifelonglearnerproject.org/), Powered by Teachers, to develop a digital wallet in which teachers can store and access their credentials, certifications, and learning resources and securely share these verifiable credentials with entities such as state licensing systems, human resources departments, and learning management systems. The project is led by RANDA Solutions, in partnership with the Utah State Board of Education, ETS, Digital Promise, University Instructors, University of Colorado, Colorado Springs, Blockframe, Fluree, Evernym, Velocity Network Foundation, IDRamp, PhilosBDL, UPD Consulting, IATC, Credential Engine, and IMS Global.
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: KYC and Self Sovereign Identity
|
title: KYC\AML and Self Sovereign Identity
|
||||||
description: SSI solutions offer opportunities to obtain more accurate background data, faster
|
description: SSI solutions offer opportunities to obtain more accurate background data, faster
|
||||||
excerpt: >
|
excerpt: >
|
||||||
traditional KYC/AML practices can give way to a more practical framework, where businesses can remain compliant with regulations and collect data without threatening privacy, data security, and breaching data laws.
|
traditional KYC/AML practices can give way to a more practical framework, where businesses can remain compliant with regulations and collect data without threatening privacy, data security, and breaching data laws.
|
||||||
@ -7,7 +7,7 @@ layout: single
|
|||||||
permalink: application/kyc/
|
permalink: application/kyc/
|
||||||
canonical_url: 'https://decentralized-id.com/application/kyc/'
|
canonical_url: 'https://decentralized-id.com/application/kyc/'
|
||||||
categories: ["Application"]
|
categories: ["Application"]
|
||||||
tags: ["KYC","Compliance","eKYC","Cryptocurrency","KYC-Chain"]
|
tags: ["KYC","Compliance","eKYC","Cryptocurrency","KYC-Chain","Real World"]
|
||||||
last_modified_at: 2023-06-16
|
last_modified_at: 2023-06-16
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -37,6 +37,10 @@ last_modified_at: 2023-06-16
|
|||||||
* [DIDComm for KYC](https://www.youtube.com/watch?v=PWrZxRbCG88) 2021-05-25 Trustbloc
|
* [DIDComm for KYC](https://www.youtube.com/watch?v=PWrZxRbCG88) 2021-05-25 Trustbloc
|
||||||
> Demonstrates a financial "KYC" identity proofing using TrustBloc DIDComm capabilities. Stored credentials and real-time attestations can be authorized in a single flow.
|
> Demonstrates a financial "KYC" identity proofing using TrustBloc DIDComm capabilities. Stored credentials and real-time attestations can be authorized in a single flow.
|
||||||
|
|
||||||
|
### CDE Services
|
||||||
|
* [Real World] [Age-Verification Solution TruAge to be Deployed by CDE Services, Inc., Expanding Access to Convenience Stores Nationwide](https://www.prnewswire.com/news-releases/age-verification-solution-truage-to-be-deployed-by-cde-services-inc-expanding-access-to-convenience-stores-nationwide-301597284.html) 2022-08-02 PRNewswire
|
||||||
|
> "The convenience retailing industry conducts 165 million transactions a day and 50 million of them involve an age-restricted product. It is exciting to announce that TruAge will be implemented into thousands of stores that conduct age-restricted transactions," said TruAge CEO Kyle McKeen.
|
||||||
|
|
||||||
## Crypto
|
## Crypto
|
||||||
* [Gaining trust during uncertain times – How KYC crypto solutions can lead the way](https://www.idnow.io/blog/crypto-kyc-uk-trends/) 2023-01-11 IDnow
|
* [Gaining trust during uncertain times – How KYC crypto solutions can lead the way](https://www.idnow.io/blog/crypto-kyc-uk-trends/) 2023-01-11 IDnow
|
||||||
> recently-released ‘[Crypto in KYC – Growth through trust’](https://www.idnow.io/portfolio/crypto-in-kyc-growth-through-trust/) ebook helps organizations to better understand the notoriously unstable market
|
> recently-released ‘[Crypto in KYC – Growth through trust’](https://www.idnow.io/portfolio/crypto-in-kyc-growth-through-trust/) ebook helps organizations to better understand the notoriously unstable market
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: The Covid Pandemic and Self Sovereign Identity
|
title: Covid-19, Vaccine Passports, Health Credentials, and Self Sovereign Identity
|
||||||
description: How a cryptographically secure digital credential can be used instead of paper documents
|
description: How a cryptographically secure digital credential can be used instead of paper documents
|
||||||
excerpt: >
|
excerpt: >
|
||||||
In a lot of places around the world, a COVID passport is simply a paper document. This has led to a couple of expected problems, one to mention is forgery. Paper documents can easily be forfeited, and paper-based COVID passports are no exception.
|
In a lot of places around the world, a COVID passport is simply a paper document. This has led to a couple of expected problems, one to mention is forgery. Paper documents can easily be forfeited, and paper-based COVID passports are no exception.
|
||||||
@ -281,7 +281,17 @@ last_modified_at: 2023-06-16
|
|||||||
>
|
>
|
||||||
> It will be run in conjunction with joint business and Oneworld partner American Airlines, [which is already using the technology on international routes to the US.](https://www.businesstraveller.com/business-travel/2021/01/17/american-airlines-launches-verifly-health-passport-for-travel-to-the-us/)
|
> It will be run in conjunction with joint business and Oneworld partner American Airlines, [which is already using the technology on international routes to the US.](https://www.businesstraveller.com/business-travel/2021/01/17/american-airlines-launches-verifly-health-passport-for-travel-to-the-us/)
|
||||||
* [PocketCred Verifiable Credentials](https://www.pocketcred.com/) PocketCred
|
* [PocketCred Verifiable Credentials](https://www.pocketcred.com/) PocketCred
|
||||||
> Pravici PocketCred (formerly VeriCred) is built on Blockchain technology, specifically to address credential issuance and verification, such as one for COVID-19 vaccines. We at Pravici have been working to build a digital pass that citizens can carry in their mobile device or digital card to prove that they have taken a test or vaccine. Our software application features user-friendly creation of schemas* and proof templates, as well as QR code technology for credential issuance and verification.
|
> Pravici PocketCred (formerly VeriCred) is built on Blockchain technology, specifically to address credential issuance and verification, such as one for COVID-19 vaccines. We at Pravici have been working to build a digital pass that citizens can carry in their mobile device or digital card to prove that they have taken a test or vaccine. Our software application features user-friendly creation of schemas* and proof templates, as well as QR code technology for credential issuance and verificatio
|
||||||
|
|
||||||
|
### NHS - Digital Staff Passport
|
||||||
|
* [NHS England Transformation Directorate - Digital staff passport](https://transform.england.nhs.uk/information-governance/guidance/digital-staff-passport/) 2022-06-22
|
||||||
|
> This guidance provides a summary of the information governance (IG) steps which need to be taken so that the Digital Staff Passport can be set up safely and efficiently within an NHS organisation. This allows authorised staff to temporarily work at another NHS organisation more quickly and safely. Digital Staff Passports are not available in social care organisations.
|
||||||
|
* [Real World] [Building an SSI Ecosystem: Digital Staff Passports at the NHS](https://www.windley.com/archives/2021/05/building_an_ssi_ecosystem_digital_staff_passports_at_the_nhs.shtml) 2021-05-11 Phil Windley
|
||||||
|
> How does a functioning credential ecosystem get started? This post goes deep on Manny Nijjar’s work to create a program for using digital staff passports in the sprawling UK NHS bureaucracy.
|
||||||
|
* [NHS Staffpassport; Based on Evernym Verity built by Sitekit/Condatis; A 12 month experience](https://iiw.idcommons.net/22C/_NHS_Staffpassport;_Based_on_Evernym_Verity_built_by_Sitekit/Condatis;_A_12_month_experience) 2021-05-06 Chris Eckl, Richard Astley
|
||||||
|
> The NHS Staff passport system was created to allow NHS employees to be redeployed between different organisations to meet urgent demand and remove the onboarding challenges when staff onboard with new organisations.
|
||||||
|
* [Condatis IIW32 NHS Digital Staffpassport Learnings (slideshare.net)](https://www.slideshare.net/secret/JGSugec83U6ouP) 2021-04-23 Conditis
|
||||||
|
> Presentation at IIW32
|
||||||
|
|
||||||
## Caution
|
## Caution
|
||||||
|
|
||||||
|
@ -79,6 +79,8 @@ last_modified_at: 2023-06-15
|
|||||||
> The Finnish Government has awarded a €3m (£2.6m) grant to [Findynet Cooperative](https://findy.fi/en/) for a pilot project aiming to build a self-sovereign identity network.
|
> The Finnish Government has awarded a €3m (£2.6m) grant to [Findynet Cooperative](https://findy.fi/en/) for a pilot project aiming to build a self-sovereign identity network.
|
||||||
* [The Findynet Cooperative receives a government grant to develop a trusted way to share information in electronic interactions](https://findy.fi/en/findy-a-visionary-initiative-by-the-public-and-private-sectors-is-developing-a-new-type-of-verifiable-data-network-that-strengthens-finlands-position-as-a-driving-force-in-building-digital/) 2022-08-31 Findy.fi
|
* [The Findynet Cooperative receives a government grant to develop a trusted way to share information in electronic interactions](https://findy.fi/en/findy-a-visionary-initiative-by-the-public-and-private-sectors-is-developing-a-new-type-of-verifiable-data-network-that-strengthens-finlands-position-as-a-driving-force-in-building-digital/) 2022-08-31 Findy.fi
|
||||||
> The aim of this public-private cooperation is to strengthen Finland’s leading position in digitalization and support the emergence of investments in new digital services.
|
> The aim of this public-private cooperation is to strengthen Finland’s leading position in digitalization and support the emergence of investments in new digital services.
|
||||||
|
* [The Missing Network Layer Model](https://findy-network.github.io/blog/2022/03/05/the-missing-network-layer-model/) 2022-03-05 Findy *Epic Post*
|
||||||
|
> You might think that I have lost my mind. We have just reported that our Indy SDK based DID agency is [AIP 1.0](https://github.com/hyperledger/aries-rfcs/blob/main/concepts/0302-aries-interop-profile/README.md) compatible, and everything is wonderful. What’s going on?
|
||||||
|
|
||||||
### Spain
|
### Spain
|
||||||
* [Verifiable Credentials for Digital Identity Projects](https://knowledge.wealize.digital/en/blog/verifiable-credentials-for-digital-identity-projects) 2021-08-26
|
* [Verifiable Credentials for Digital Identity Projects](https://knowledge.wealize.digital/en/blog/verifiable-credentials-for-digital-identity-projects) 2021-08-26
|
||||||
|
50
unsorted/supply-chain.md
Normal file
50
unsorted/supply-chain.md
Normal file
@ -0,0 +1,50 @@
|
|||||||
|
---
|
||||||
|
published: false
|
||||||
|
---
|
||||||
|
|
||||||
|
* [Controlling Our ID with Self-Sovereign Identities](https://fromknowhowtowow.podigee.io/19-ssi) KnowHowToWow
|
||||||
|
> Bosch researcher Christian Borman explains how SSI will not only increase privacy but also have a positive impact on B2B interactions and supply chain management. Meanwhile, Geoff meets mentalist Thorsten Havener. Will he reveal Geoff’s true identity?
|
||||||
|
|
||||||
|
* [Trusted Supply Chain: end-to-end compliance in multi-tier supply chain](https://evan.network/use-cases/trusted-supply-chain/) Evan Network
|
||||||
|
> In the real estate industry, TRUST&TRACE can be used by companies to obtain required compliance information from a network of participating companies. In this way, all property data is collected step by step: from building construction and leasing to sale and demolition.
|
||||||
|
* [SAP Completes Pharmaceutical Industry Pilot to Improve Supply Chain Authenticity](https://news.sap.com/2021/03/pharmaceutical-supply-chain-industry-pilot/) 2021-03 SAP
|
||||||
|
> today announced the completion of an industry-wide pilot utilizing self-sovereign identity (SSI) credentials to establish trust in the pharmaceutical supply chain for indirect trade relationships.
|
||||||
|
* [The missing link: digitizing supply chains with portable data](https://medium.com/mavennet/the-missing-link-digitizing-supply-chains-with-portable-data-583b66acc9bc) Mavnet
|
||||||
|
> The traceability vocabulary bridges the gap between existing record-keeping systems and the verifiable exchange of supply chain information across organizations envisioned by proponents of these data portability technologies.
|
||||||
|
* [The Phygital Future of the Supply Chain](https://nextlevelsupplychainpodwithgs1us.libsyn.com/the-phygital-future-of-the-supply-chain) Next Level Supply Chain Podcast with GS1
|
||||||
|
> The digital and physical world are merging more than ever before. As the supply chain becomes more ‘phygital,’ innovative ways of sharing data – like using verifiable credentials – are helping to build more trust with data along the supply chain. Join us as we chat with Senior VP of Innovation & Partnerships at GS1 US, Melanie Nuce, as we explore what’s around the corner and how standards play
|
||||||
|
* [How to Prevent Supply Chain Fraud With Blockchain](https://www.dock.io/post/supply-chain-fraud-blockchain) Dock
|
||||||
|
> The global [supply chain management market size](https://www.prnewswire.com/news-releases/supply-chain-management-scm-market-size-worth--19-3-billion-globally-by-2028-at-9-02--cagr-verified-market-research-301540702.html) was valued at USD 10.1 Billion in 2020 and is projected to reach USD 19.3 Billion by 2028. Supply chain is the path for any product such as food, clothes, or appliances to go from where it was a produced, to distributors, procurement officers (quality inspections), and the market.
|
||||||
|
* [SAP Pharma Solution Supports Supply Chain Compliance](https://insidesap.com.au/sap-pharma-solution-supports-supply-chain-compliance/) SAP
|
||||||
|
> SAP has chosen an open, interoperable technology to validate all stakeholders in the pharma supply chain in order to provide customers with the best solution for compliance under the U.S. Drug Supply Chain Security Act (DSCSA) requirements. The DSCSA also limits stakeholders’ interactions to ATPs.
|
||||||
|
|
||||||
|
* [The Digital Supply Chain of the Future](https://medium.com/transmute-techtalk/the-digital-supply-chain-of-the-future-79e9431aaa0d) Nis Jespersen Transmute
|
||||||
|
|
||||||
|
There is no limit to what a DID can identify. The obvious examples are organizations and people, as explained above. They can also represent assets such as shipping containers, seals, boxes, vessels, or locations, and intangible concepts like bookings, agreements, transactions, or documents.
|
||||||
|
|
||||||
|
* [Identity Terms Provide Value along the Supply Chain: How We Know When to Buy the Farm](https://medium.com/@Transmute/identity-terms-provide-value-along-the-supply-chain-how-we-know-when-to-buy-the-farm-738701967e3d) 2022-06-10 Jessica Tacka, Transmute
|
||||||
|
> Supply chain credentialing in the form of bills of lading, certificates of origin, or letters of credit is used to protect honest parties and their merchandise from being confused with dishonest parties or entities that are engaged in unethical practices, such as environmental destruction, or forced labor.
|
||||||
|
* [Visibility 2.0: Creating Digital Consistency in an International Supply Chain](https://nextlevelsupplychainpodwithgs1us.libsyn.com/visibility-20-creating-digital-consistency-in-an-international-supply-chain) 2022-08-10 Next Level Supply
|
||||||
|
> how can something as complicated as the international supply chain take fundamental trade practices and marry them with innovation so we can move at the speed of digitization? Join us for a mind-blowing discussion with Karyl Fowler, CEO at Transmute
|
||||||
|
* [Identity in the Supply Chain](https://vimeo.com/669713750) 2022-01-25 Vienna Digital Identity #30
|
||||||
|
> GS1 is the global association for supply chain identifiers with members across all industry sectors and interacting (unbeknownst) with general consumer on a daily basis. Transmute a foundational member of the DID/VC community and a participant in the US DHS Silicon Valley Innovation Program’s cross-border shipping use case.
|
||||||
|
>
|
||||||
|
> - Transmute Deck: [thedinglegroup.com/s/Transmute_Vienna-Digital-ID-Forum-Jan-2022.pdf](https://www.thedinglegroup.com/s/Transmute_Vienna-Digital-ID-Forum-Jan-2022.pdf)
|
||||||
|
> - GS1 Deck: [thedinglegroup.com/s/2022-01-24_ViennaDigitalIdentityPhilA.pdf](https://www.thedinglegroup.com/s/2022-01-24_ViennaDigitalIdentityPhilA.pdf)
|
||||||
|
* [eDATA Verifiable Credentials for Cross Border Trade](https://unece.org/sites/default/files/2022-07/WhitePaper_VerifiableCredentials-CBT.pdf) 2022-07 UNECE UN/CEFACT White Paper
|
||||||
|
* [Transmute @TransmuteNews](https://twitter.com/TransmuteNews/status/1572692362148847619) via Twitter
|
||||||
|
> The "[[Fake] 30TB hard drive](https://www.vice.com/en/article/akek8e/walmart-30tb-ssd-hard-drive-scam-sd-cards)" investigation shows the real impact verification could have on #eCommerce. #verifiablecredentials
|
||||||
|
|
||||||
|
|
||||||
|
## Literature
|
||||||
|
* [Providing Assurance and Scrutability on Shared Data and Machine Learning Models with Verifiable Credentials](https://www.researchgate.net/publication/351575047_Providing_Assurance_and_Scrutability_on_Shared_Data_and_Machine_Learning_Models_with_Verifiable_Credentials)
|
||||||
|
|
||||||
|
This paper introduces a software architecture and implementation of a system based on design patterns from the field of self-sovereign identity. Scientists can issue signed credentials attesting to qualities of their data resources. Data contributions to ML models are recorded in a bill of materials (BOM), which is stored with the model as a verifiable credential. The BOM provides a traceable record of the supply chain for an AI system, which facilitates on-going scrutiny of the qualities of the contributing components. The verified BOM, and its linkage to certified data qualities, is used in the AI Scrutineer, a web-based tool designed to offer practitioners insight into ML model constituents and highlight any problems with adopted datasets, should they be found to have biased data or be otherwise discredited.
|
||||||
|
|
||||||
|
|
||||||
|
* [Blockchain and SSI Support Quality in Food Supply Chain](https://www.researchgate.net/publication/356608292_Blockchain_and_Self_Sovereign_Identity_to_Support_Quality_in_the_Food_Supply_Chain) Luisanna Cocco, Roberto Tonelli, Michele Marchesi - Università degli studi di Cagliari
|
||||||
|
|
||||||
|
using standards that are WWW Consortium-compatible and the Ethereum Blockchain, ensures eligibility, transparency, and traceability of the certifications along a food supply chain, and could be an innovation model/idea that the companies that adopt the Open Innovation paradigm might want to pursue.
|
||||||
|
* [Blockchain-Based Self-Sovereign Identity Approach for Inter-Organizational Business Processes](https://annals-csis.org/proceedings/2022/pliks/194.pdf) Annals
|
||||||
|
|
||||||
|
To address trust and privacy issues in IOBP, this paper presents a Blockchain-based Self-Sovereign Identity (SSI) approach. The SSI concept is combined with a registry proof smart contract to provide an efficient privacy-preserving solution. The proposed approach is applied to the pharmaceutical supply chain case study and implemented on the Ethereum Blockchain
|
@ -5,6 +5,8 @@ published: false
|
|||||||
> I had a stab at why Cardspace failed, in “[Identities Evolve: Why Federated Identity is Easier Said than Done](https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2163241)
|
> I had a stab at why Cardspace failed, in “[Identities Evolve: Why Federated Identity is Easier Said than Done](https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2163241)
|
||||||
>
|
>
|
||||||
> Why does digital identity turn out to be such a hard problem? People are social animals with deep seated intuitions and conventions around identity, but exercising our identities online has been hugely problematic.
|
> Why does digital identity turn out to be such a hard problem? People are social animals with deep seated intuitions and conventions around identity, but exercising our identities online has been hugely problematic.
|
||||||
|
* [OWI Digital Forum Recap: The Rise & Adoption of Verifiable Credentials](https://trinsic.id/owi-digital-forum-recap-the-rise-adoption-of-verifiable-credentials/) 2021-05-21 Trinsic
|
||||||
|
> Trinsic CEO Riley Hughes sat down with [One World Identity](https://oneworldidentity.com/) (OWI) CEO Travis Jarae to have a one-on-one conversation about [“The Rise & Adoption of Verifiable Credentials”](https://oneworldidentity.com/session/trinsic/). Below is a short summary
|
||||||
|
|
||||||
* [4 Keys to Self-sovereign Identity Adoption](https://medium.com/trinsic/4-keys-to-self-sovereign-identity-adoption-ad269b208569) 2021-01-19 Trinsic
|
* [4 Keys to Self-sovereign Identity Adoption](https://medium.com/trinsic/4-keys-to-self-sovereign-identity-adoption-ad269b208569) 2021-01-19 Trinsic
|
||||||
> Many implementers won’t realize the potential of SSI until it’s deployed at scale, but in order to get to scale, we need implementers to realize value. It’s the classic chicken & egg problem.
|
> Many implementers won’t realize the potential of SSI until it’s deployed at scale, but in order to get to scale, we need implementers to realize value. It’s the classic chicken & egg problem.
|
@ -1,15 +1,265 @@
|
|||||||
---
|
---
|
||||||
title: SSI-Meetup - Use Cases
|
|
||||||
layout: single
|
|
||||||
permalink: organizations/ssi-meetup/use-cases/
|
|
||||||
canonical_url: 'https://decentralized-id.com/organizations/ssi-meetup/use-cases/'
|
|
||||||
categories: ["Media"]
|
|
||||||
tags: ["SSI-Meetup","IOT","Financial Services","Healthcare","Verifiable Credentials","Truu","Media"]
|
|
||||||
last_modified_at: 2019-07-20
|
|
||||||
toc_sticky: false
|
|
||||||
published: false
|
published: false
|
||||||
---
|
---
|
||||||
|
|
||||||
|
## Use-Case
|
||||||
|
* [25+ Proof of Concepts (PoCs) for Verifiable Credentials](https://academy.affinidi.com/25-proof-of-concept-poc-for-verifiable-credentials-edf684b592f2) 2021-05-20 Affinidi
|
||||||
|
> Today, we proudly present another 25+ Proof of Concepts for VC implementation. These use cases are a compilation of the [submissions](https://affinidipocathon.devpost.com/) (in no particular order) made by the participants of the Affindi PoCathon 2021.
|
||||||
|
* [Self-Sovereign Identity: More Use Cases](https://www.bankinfosecurity.com/self-sovereign-identity-more-use-cases-a-16448): Heather Dahl and Ken Ebert of Indicio Discuss Decentralized ID Management
|
||||||
|
> In a video interview with Information Security Media Group, Dahl and Ebert discuss:
|
||||||
|
>
|
||||||
|
> - The evolution of Indicio.tech from the Sovrin Foundation;
|
||||||
|
> - Key initiatives in implementing and testing decentralized identity;
|
||||||
|
> - How a decentralized workforce is accelerating the need for identity management.
|
||||||
|
* [How Exactly Are Verifiable Credentials Making the World Better?](https://sgershuni.medium.com/how-exactly-are-verifiable-credentials-making-the-world-better-eb72145c061) Stepan Gershuni
|
||||||
|
> 6 stories of how verifiable credentials can improve the lives of every day people:
|
||||||
|
>
|
||||||
|
> Ajay is an Uber driver in San Francisco. He wants to try various temporary jobs while he’s studying but joining Lyft, Postmates and other platforms requires going through a long and tedious background verification and car certification process over and over again.
|
||||||
|
|
||||||
|
## Real World Implementations
|
||||||
|
* [Notes from W3C TPAC on major deployments of Verifiable Credentials](https://twitter.com/philarcher1/status/1570082512122294273) Manu Sporny via Phil Archer
|
||||||
|
> - Steel, Oil Agriculture Shipment into US Customs ($2.3T in good/year)
|
||||||
|
> - European Digital Wallet (€163M funding, 450M people)
|
||||||
|
> - Digital Education Credentials in Uganda, Nigeria, Kenya (323M people)
|
||||||
|
> - Digital Age Verfication (152k retail stores, 200M people)
|
||||||
|
> - Content Authenticity Initative (30M Adobe customers)
|
||||||
|
> - Digital Permanent Resident Cards (14M people)
|
||||||
|
* [IIW verifiable credentials - Decentralized VC integration with Eventbrite and Qiqo chat. This session will review the implementation process, lessons learned, and community discussion on related use cases.](https://iiw.idcommons.net/11A/_IIW_verifiable_credentials_-_Decentralized_VC_integration_with_Eventbrite_and_Qiqo_chat._This_session_will_review_the_implementation_process,_lessons_learned,_and_community_discussion_on_related_use_cases.) 2021-05-07 Mike Vesey, Karl Kneis
|
||||||
|
> * IIW is now issuing verifiable credentials for registration and access to live events managed through Qiqo chat forums.
|
||||||
|
> * Credentials, verification proofing, and integration provided by the IdRamp Zero Trust ecosystem management platform and APIs.
|
||||||
|
> * IIW credentials are interoperable with a range of standardised wallet providers.
|
||||||
|
> * Issuance and proofing are incorporated seamlessly within the existing customer communications flow.
|
||||||
|
> * Integration with Qiqo and Eventbrite required no significant development effort.
|
||||||
|
|
||||||
|
## Product
|
||||||
|
|
||||||
|
* [Divitel & Ledger Leopard Team Up to Apply Blockchain & Self Sovereign Identity Technology to Video Distribution](https://www.canto.org/blog/divitel-and-ledger-leopard-team-up-to-apply-blockchain-self-sovereign-identity-technology-to-video-distribution/) 2021-06-11 Canto
|
||||||
|
> ready to market by end of end of 2022 offering increased flexibility, control, ease of use and speed when managing the access of video distribution ecosystem data, independent of the technology used. Divitel video carrier customers will be offered the option to include this blockchain module on top of their ecosystems.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
# Verifiable Credentials
|
||||||
|
|
||||||
|
* [Reimagining Customer Loyalty Programs With Verifiable Credentials: A Pravici Case Study](https://www.evernym.com/blog/customer-loyalty-verifiable-credentials/) Evernym
|
||||||
|
> [Pravici](https://pravici.com/), an Evernym customer and startup based out of Chandler, Arizona, is looking to flip the equation. Their solution, Tokenized Loyalty Points (TLP), uses verifiable credential technology to give individual consumers control over their data, while empowering them to direct how their favorite brands can use this data for loyalty and other campaigns.
|
||||||
|
* [26 Suggested Use Cases of Verifiable Credentials (With Some Real-World Examples)](https://academy.affinidi.com/25-real-world-use-cases-of-verifiable-credentials-4657c9cbc5e) Affinidi
|
||||||
|
> we hope that business leaders, entrepreneurs, and developers will use this article as a guide to create some breakthrough solutions that will benefit the society at large.
|
||||||
|
|
||||||
|
|
||||||
|
## Personal Data
|
||||||
|
* [Why Location Data Brokers Put All Communities At Risk](https://me2ba.org/why-location-data-brokers-put-all-communities-at-risk/) Zach Edwards M2BA
|
||||||
|
> New work that may leverage decentralized ID from the supply chain side of things…but not sure (lots of links inside on data brokers harm)
|
||||||
|
* [Julian Wilson: Self-Sovereign Data meets Open Banking](https://mastersofprivacy.com/julian-wilson-self-sovereign-data-meets-open-banking/) Masters of Privacy
|
||||||
|
> Julian Wilson began his career at Apple in the late 80s [...] joined Ecospend in 2019 to build a self-sovereign data service on top of an Open Banking platform. He describes his role as putting an Internet lens onto product design.
|
||||||
|
|
||||||
|
## Banking
|
||||||
|
* [Impacts from a new reality drive the need for an enhanced digital identity framework](https://bankautomationnews.com/allposts/risk-security/impacts-from-a-new-reality-drive-the-need-for-an-enhanced-digital-identity-framework/) Bank Automation News
|
||||||
|
> While US-based entities are adhering to an enhanced regulatory framework, these mandates are particularly applicable in Europe, where there is necessary compliance with enacted standards (such as the General Data Protection Regulation—commonly known as GDPR—and the Payment Service Providers Directive 2—referred to as PSD2. A clear need for a true and persistent digital identity as a solution to the ancillary—and sometimes unforeseen—challenges that have arisen.
|
||||||
|
* [Banking’s identity problem](https://www.globalbankingandfinance.com/bankings-identity-problem/) Global Banking and Finance
|
||||||
|
> Banks have sought to overcome some of these challenges with the use of biometrics such as facial recognition and fingerprints. These are now more commonly used to login to, or unlock devices, and increase usability, but still leave the challenge of proving the authenticity of a document wide open to abuse.
|
||||||
|
- [New Bank Account Use Case](https://www.youtube.com/watch?v=YRLu4U4hSZ8)
|
||||||
|
|
||||||
|
* [How to Prevent Fraud using #MARKs](https://dhiway.com/prevent-credential-fraud/) DHIWay
|
||||||
|
> Credential fraud has, unfortunately, become commonplace in today’s instant electronic age. Especially problematic in [higher education](https://dhiway.com/hashmarks-in-the-education-sector/), credential fraud has spiralled into a multi-billion-dollar industry
|
||||||
|
|
||||||
|
## Security
|
||||||
|
* [Digital IDs under attack: How to tackle the threat?](https://www.helpnetsecurity.com/2022/01/27/ssi-face-presentation-attacks/) 2022-01-27 HelpnetSecurity
|
||||||
|
> - photo attacks based on the presentation of facial evidence of an image of a face printed or displayed via a device’s screen.
|
||||||
|
> - video of user replay attack usually consisting of placing the screen of the attacker’s device in front of the camera.
|
||||||
|
> - 3D mask attacks where 3D masks are crafted to reproduce the real traits of a human face and even include eyes holes to fool the liveliness detection based on eye gaze, blinking and motion.
|
||||||
|
> - deepfake attacks make use of leveraging software capable to create a synthetic video or image realistically representing someone else. Attackers are suspected to have access to a wide dataset containing images or a video of their target.
|
||||||
|
|
||||||
|
## Hiring \ Resume
|
||||||
|
* [Trusted Career Credentials](https://www.linkedin.com/pulse/trusted-career-credentials-dr-gordon-jones/) Dr Gordon Jones
|
||||||
|
> Today, even in this digital world that has expanded over the past two years, the job market still relies on self-reported attributes, records, resumes, and/or LinkedIn profiles, that individuals share with employers or recruiters as the source for applicants and employee data.
|
||||||
|
|
||||||
|
### Smart Home
|
||||||
|
|
||||||
|
* [SSI for smart locks](https://twitter.com/AnimoSolutions/status/1394895595236626433) h\t Animo
|
||||||
|
|
||||||
|
|
||||||
|
### loyalty rewards
|
||||||
|
|
||||||
|
* [@_XPID_](https://twitter.com/_XPID_) · [Nov 2](https://twitter.com/_XPID_/status/1323371035484250113)
|
||||||
|
> Check out the latest version of our beta prototype in the Appstore for #verifiablecredentials for #LoyaltyPrograms. https://apps.apple.com/us/app/id1458328593 When #sovereign #decentralized #identity becomes a reality, your #Loyalty and #loyaltyrewards #Wallet will be on XPID. #SSI
|
||||||
|
|
||||||
|
## Passwordless
|
||||||
|
* [The End of Logins and Passwords, Just for Starters](https://thereboot.com/the-end-of-logins-and-passwords-just-for-starters/) The Reboot
|
||||||
|
|
||||||
|
## Identos
|
||||||
|
* [Groundwork laid for mass digital identity take up as use cases grow](https://www.biometricupdate.com/202108/groundwork-laid-for-mass-digital-identity-take-up-as-use-cases-grow) Biometric update
|
||||||
|
> Identos is adding W3C (World Wide Web Consortium) verifiable credentials as a product feature for its digital ID solutions by the end of the year, announcing its position in the race to incorporate international standards for how digital credentials – from health records to degree certificates – are stored and verified.
|
||||||
|
|
||||||
|
## Meeco
|
||||||
|
* [Opening the domestic card rails to innovation](https://blog.meeco.me/opening-the-domestic-card-rails-to-innovation/) Meeco
|
||||||
|
> Enabling Australian FinTechs a direct avenue to discuss how they partner and collaborate to access the eftpos payments network through the Committee resulted in recommendations that covered a number of central themes, including consultation and engagement, regulation, and technology and solutionsBen Tabell, eftpos Chief Information Officer and Committee Chair
|
||||||
|
|
||||||
|
## Gaming
|
||||||
|
* [Self-Sovereign Identity for Online Gaming, VR, & AR – Crucible](https://identity-economy.de/self-sovereign-identity-for-online-gaming-vr-ar-crucible) Evernym (via identity-economy.de)
|
||||||
|
> Crucible's CEO (Ryan Gill) and CTO (Toby Tremayne) for a discussion on what self-sovereign identity (SSI) and verifiable credentials mean for gaming and the greater online entertainment sector.
|
||||||
|
|
||||||
|
## Credit unions
|
||||||
|
* [Building an SSI Ecosystem: MemberPass and Credit Unions](https://www.windley.com/archives/2021/06/building_an_ssi_ecosystem_memberpass_and_credit_unions.shtml) 2021/06 Phil Windley
|
||||||
|
> Credit unions and their members face the threat of fraud on all sides. And credit unions employ lots of tools to fight it. But ultimately, the problem comes down to the member and credit union authenticating each other. The problem is that doing this securely annoys people.
|
||||||
|
|
||||||
|
|
||||||
|
## Memberpass
|
||||||
|
* [MemberPass Digital ID can help Reduce Expenses and Build Member Trust](https://www.memberpass.com/2021/06/memberpass-digital-id-can-help-reduce-expenses-and-build-member-trust/)
|
||||||
|
|
||||||
|
You can probably use the good news. It’s never been easy to run a credit union, especially when you get whacked from all sides. Regulations change, members always seem to want access to another shiny new technology gadget, and financial fraud continues to be a threat. On top of that, we’ve all had to grapple with the pervasive life-changing effects of the coronavirus pandemic for the past year.
|
||||||
|
|
||||||
|
## E-Commerce
|
||||||
|
|
||||||
|
* [Self-Sovereign E-Commerce](https://iiw.idcommons.net/23J/_Self-Sovereign_E-Commerce) by Doc Searls
|
||||||
|
There is momentum here, and a need to start building out much of what was discussed.
|
||||||
|
> Doc introduced the session with the slide deck [here](https://www.slideshare.net/dsearls/day3iiw-sesion), wearing his hat as a founding member of [Customer Commons](http://customercommons.org), the .org working on the Intention Byway discussed at earlier IIW sessions and described in [this blog](https://customercommons.org/2021/04/27/a-new-way/), posed later. 2021-04-27
|
||||||
|
>
|
||||||
|
> His case is that the incumbent e-commece system hasn’t progressed past its dependence on the cookie, and perhaps never will; and that there is a need to stand up an alternate model, built on asynchronous pub-sub messaging and compute nodes that run apps that don’t have to come from the stores of Apple and Google.
|
||||||
|
>
|
||||||
|
> First examples of target areas (where communities are already active) are food distribution in Michigan and real estate in Boston. Hadrian Zbarcea led the discussion of both, using slides from the deck above.
|
||||||
|
|
||||||
|
### Career Creds
|
||||||
|
* [Self sovereign career identity](https://diginomica.com/self-sovereign-career-identity-conversation-meg-bear-sap-successfactors) Diginomica Meg Bear
|
||||||
|
> The Velocity piece is a way for me as an individual to own my credentials, to say, these are the things that I know. And these are the things I've done. And if I can own that, I have a lot more interest in it. And I can use it in a lot more interesting ways. In the past, that might have just been something that I built as reputation within a company, I can now make that a more dynamic and portable reputation I can take with me anywhere.
|
||||||
|
|
||||||
|
* [A brighter future for tenant/landlord relationships](https://domilabs.io/tenant-landlord-relationships/) Domi Labs
|
||||||
|
> it’s hard to keep track since some call, some… email, and still others send you a message on WhatsApp.” Going through all of these disparate messages is its own fulltime job!
|
||||||
|
>
|
||||||
|
> That’s why Domi locates all communication about a property in one place, making it easy for tenants and property managers to stay in touch.
|
||||||
|
|
||||||
|
* [Blockchain and the Decentralised Workforce](https://workforcefuturist.substack.com/p/blockchain-and-the-decentralised-workforce) WorkforceFuturist
|
||||||
|
|
||||||
|
## Trade
|
||||||
|
|
||||||
|
[Vincent Annunziato,](https://www.spreaker.com/user/13158652/ep8-cbp-vincent-annunziato) talks about his work with The Silicon Valley Innovation Program. He is the Director of Transformation & Innovation Division of the Customs and Border Patrol Office of Trade, talks about shaping blockchain technologies to make imports safer and more secure. CBP's current projects include tracking steel, oil, and natural gas imports from Canada.
|
||||||
|
|
||||||
|
* [The Equifax Incident, And How SSI Could Have Prevented It](https://europechain.io/identity/equifax-incident-ssi-prevented-it/) Europechain
|
||||||
|
> On March 8, 2017, Cisco staff found and reported a critical flaw in Apache Struts, an open-source framework that enables the creation of web-based Java applications. The vulnerability in question was identified as CVE-2017-5638. In short, Strut’s parser tool, Jakarta, could be manipulated to enable a malicious actor to upload files remotely to a server, and potentially run code on that compromised server.
|
||||||
|
|
||||||
|
|
||||||
|
* [A Holochain DocuSign Challenge](https://blog.holochain.org/a-holochain-docusign-challenge/)
|
||||||
|
* [Use Case: American Electric Power](https://idramp.com/use-case-american-electric-power/)
|
||||||
|
> What kind of strategy will take you to being a next-generation utility company? For AEP Ohio, a large electric utility company based in Columbus, this challenge began with a comprehensive review of their entire ecosystem and which identified their key pain points for innovation.
|
||||||
|
|
||||||
|
|
||||||
|
* [5 Promising Use Cases for Verifiable Credentials](https://hackernoon.com/5-promising-use-cases-for-verifiable-credentials-tu1y348k) Hackernoon
|
||||||
|
> several industries are already digging in. Here are some of the most visible and promising use cases.
|
||||||
|
* [Are we doing enough to align our work with Zero Trust Architecture?](https://lists.w3.org/Archives/Public/public-did-wg/2021Jan/0000.html) Adrian Gropper on Public DID-WG mailing list
|
||||||
|
> [https://www.nytimes.com/2021/01/02/us/politics/russian-hacking-government.html](https://www.nytimes.com/2021/01/02/us/politics/russian-hacking-government.html) 2021-01-02
|
||||||
|
> What would be a good way for our SSI communities to advance zero trust architecture through more effective accountability and audit?
|
||||||
|
|
||||||
|
* [Manu responds](https://lists.w3.org/Archives/Public/public-did-wg/2021Jan/0003.html)
|
||||||
|
> Could DIDs and VCs help with systems architected with Zero Trust in mind? Yeah, probably:
|
||||||
|
>
|
||||||
|
> 1) You could use VCs to prove that you should have certain levels of access to certain systems. Checking this could happen automatically, but while ensuring that you're "live" and not some bot.
|
||||||
|
> 2) Logs could be kept of which VCs were used when to receive the authority to do something.
|
||||||
|
> 3) ZCAPs could be used to provide fine-grained access to very specific resources, even behind the firewall, within an organizations systems.
|
||||||
|
> DIDs could power much of this... but shouldn't promise any of it. The closest we could probably get to what you're asking, Adrian, is to align the Zero Trust Architecture principles to how DIDs and VCs can help -- primarily around: identity verification (VCs), login authentication (DIDs), least-privilege access (ZCAPs, Confidential Storage), and HTTP API access authorization (ZCAPs).
|
||||||
|
|
||||||
|
* [More from Adrian](https://lists.w3.org/Archives/Public/public-did-wg/2021Jan/0004.html)
|
||||||
|
> The most important message from the SolarWinds hack and much of the ransomware havoc is that our systems are not set up for individual accountability or independent audit.
|
||||||
|
>
|
||||||
|
> The VC and ZCAPs perspective is inadequate. As an SSI community we need to address the separation of concerns between authentication, authorization, and audit as equally important and needing a harmonized best-practice perspective. Standardized EDVs are table stakes but not terribly relevant to the protocols that link authentication, authorization, and audit. Confidential Storage should be adopting the protocols that connect authentication, authorization, and audit rather than introducing protocols narrowly scoped to the narrow and obvious role of encryption at rest.
|
||||||
|
>
|
||||||
|
> I've put together a few slides in an attempt to clarify the relationship between non-repudiable accountability and audits (and EDVs).
|
||||||
|
> [https://docs.google.com/presentation/d/1ksKal62ZiApX09Nejm4RSqHzHJbgwpu_l2Ho64_ePKU/edit#slide=id.p](https://docs.google.com/presentation/d/1ksKal62ZiApX09Nejm4RSqHzHJbgwpu_l2Ho64_ePKU/edit#slide=id.p)
|
||||||
|
|
||||||
|
* [Adrian follows up with some explanation of the slides](https://lists.w3.org/Archives/Public/public-did-wg/2021Jan/0005.html)
|
||||||
|
> Considering risk mitigation, based on SSI principles, there are four separate actors:
|
||||||
|
> 1. Resource Owner (RO) their user agent (mobile wallet), and cloud agent (AS)
|
||||||
|
> 2. Service Provider (SP), by definition has data in the clear
|
||||||
|
> 3. Requesting Party (RQ) and their user agent (mobile wallet)
|
||||||
|
> 4. Requesting Client (RC), by definition has data in the clear
|
||||||
|
|
||||||
|
* [Digital Identity Isn’t Only For People](https://www.forbes.com/sites/davidbirch/2020/12/22/digital-identity-isnt-only-for-people/) 2020-12-22 David Birch, Forbes
|
||||||
|
> fintechs and regtechs looking for opportunities in the digital identity space should cast their ideas net pretty wide. Digital identities are not only for people and the future desperately needs digital identities for pretty much everything to underpin recognition, relationships and reputation (the 3Rs of the online economy).
|
||||||
|
|
||||||
|
* [Why self-sovereign identity will get adopted (and it’s not the reason you probably want)](https://www.tuesdaynight.org/2018/06/15/why-self-sovereign-identity-will-get-adopted-and-its-not-the-reason-you-probably-want/) 2018-06-15 Tuesday Night
|
||||||
|
> In the payment card world, there are clear guidelines on personal liability. $50 if you use credit and up to $500 for debit depending on when you report the issue. Based on that, different people choose to use different “systems.”
|
||||||
|
>
|
||||||
|
> However, no such guidelines exist for the use of identity information (e.g. attributes.)
|
||||||
|
|
||||||
|
* [ID Verification Threats On the Horizon](https://stateofidentity.libsyn.com/id-verification-threats-on-the-horizon) Liminal Podcasts
|
||||||
|
> Cognito's CEO Alain Meier joins the State of Identity host Cameron D’Ambrosi to dive into why industries beyond financial services are now in the market for identity verification. They also unpack the impact of synthetic identity fraud across verticals, and how platforms find the balance when building their onboarding processes.
|
||||||
|
|
||||||
|
* [Hackers Gaining Power of Subpoena Via Fake “Emergency Data Requests”](https://krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/) 2022-03
|
||||||
|
> If there was a trust framework for police departments and a DID registry for them - the police departments could issue VCs to their officers.
|
||||||
|
>
|
||||||
|
> If you want to se how hard this was/would have been to achieve in earlier technology stacks take a look at [conceptual outlines](https://trustmark.gtri.gatech.edu/concept/) from this NSTIC (National Strategies for Trusted Identities in Cyberspace) developing a trust framework for law enforcement federations done by the Georgia Technology Reserach Institute and the [results/learnings.](https://trustmark.gtri.gatech.edu/insights/)
|
||||||
|
|
||||||
|
* [Trusted Timestamping Part 1: Scenarios](https://medium.com/finema/trusted-timestamping-part-1-scenarios-9bf4a7cc2364) Nunnaphat Songmanee, Finema
|
||||||
|
> Evidentiary value is an essential component of important transactions. When a transaction is recorded in a printed document, one way to impart evidentiary value is by including date and time
|
||||||
|
|
||||||
|
* [Survey: How Do You Use Your Identity at Work?](https://findbiometrics.com/survey-how-do-you-use-your-identity-at-work/) FindBiometrics
|
||||||
|
> The COVID-19 pandemic rapidly shifted the way we work, coinciding with digital transformation trends that depend on strong identity assurance. Hybrid workplaces are more common, as is completely remote work
|
||||||
|
|
||||||
|
* [Sandeep Shukla · Professor, Computer Science and Engineering at Indian Institute of Technology, Kanpur](https://www.linkedin.com/feed/update/urn:li:ugcPost:6924705964537389056/) Linkedin
|
||||||
|
> IGNOU (Indira Gandhi National Open University) had their convocation today and they issued more than 60000 degrees and certificates as Self-Sovereign Identity document (Cryptographically verifiable Credential) on [National Blockchain Project](https://www.linkedin.com/company/national-blockchain-project/) and [CRUBN](https://www.linkedin.com/company/crubn/)'s SSI blockchain.
|
||||||
|
* [Self-Sovereign Identity as a Service: Architecture in Practice](https://arxiv.org/pdf/2205.08314.pdf) Yepeng Ding, Hiroyuki Sato, University of Tokyo
|
||||||
|
> We propose a practical architecture by elaborating the service concept, SSI, and DLT to implement SSIaaS platforms and SSI services. Besides, we present an architecture for constructing and customizing SSI services with a set of architectural patterns and provide corresponding evaluations. Furthermore, we demonstrate the feasibility of our proposed architecture in practice with Selfid, an SSIaaS platform based on our proposed architecture.
|
||||||
|
|
||||||
|
* [@tmarkovski Jun 10](https://twitter.com/tmarkovski/status/1535240038803464195)
|
||||||
|
> 1/ Can [QUIC](https://www.akamai.com/blog/news/the-next-generation-of-http) use DIDComm as a Handshake protocol instead TLS1.3? The spec provides enough abstraction for the session handling, and most crypto operations are the same. The main difference is the trust architecture and model: certificate chain vs DID Documents.
|
||||||
|
|
||||||
|
* [SSI Essentials: 35 use cases of decentralized identities that will make your life easier](https://gataca.io/blog/ssi-essentials-35-use-cases-of-decentralized-identities-that-will-make-your-life-easier) Gataca
|
||||||
|
|
||||||
|
* [The Importance of Verifiable Credentials to Training Providers](https://uploads-ssl.webflow.com/6269810a06ae9fafd52556a3/629f94235eabc454ea48c117_The%20Importance%20of%20Verifiable%20Credentials%20for%20Training%20Providers.pdf?__hstc=100632769.d32f75d38c42eaa77409051b21d73653.1655033322879.1655033322879.1655033322879.1&__hssc=100632769.1.1655033322879&__hsfp=2803731784) Credivera
|
||||||
|
> Digital badges or PDF credentials lack proof of being authentic and current, and can be easily reproduced or falsified, impacting both the individual and the reputation of the training provider.
|
||||||
|
|
||||||
|
* [Transferable Accounts Putting Passengers at Risk](https://www.windley.com/archives/2022/06/transferable_accounts_putting_passengers_at_risk.shtml) Phil Windley
|
||||||
|
> The non-transferability of verifiable credential is one of their super powers. This post examines how that super power can be used to reduce fraud and increase safety in a hired car platform.
|
||||||
|
|
||||||
|
* [How Self-Sovereign Identity Helps Your Enterprise](https://zaisan.io/self-sovereign-identity-enterprise/) Zaisan
|
||||||
|
> - Identity is the sum of a lot of individual parts that, when pieced together, paint a comprehensive and multi-layered picture of who someone truly is
|
||||||
|
> - Zaisan’s my.D platform leverages blockchain technology to provide a [comprehensive digital identity management solution](https://myd.online/)
|
||||||
|
> - My.D enables a cost-effective and efficient management solution for an individual’s digital credentials
|
||||||
|
|
||||||
|
* [How Blockchain Technology and Self-Sovereign Identity Enables the New Normal of Remote Learning, Training and Working](https://www.linkedin.com/pulse/how-blockchain-technology-self-sovereign-identity-enables-hossain-) Md Sabbir Hossain
|
||||||
|
|
||||||
|
* [An autonomous reputation system](https://reb00ted.org/tech/20220810-autonomous-reputation-system/) reb00ted
|
||||||
|
> we need to figure out how to give more power to “better” actors within a given community or context, and disempower or keep out the detractors and direct opponents. All without putting a centralized authority in place.
|
||||||
|
|
||||||
|
## Energy Systems
|
||||||
|
|
||||||
|
* [Digital identities – building block for an automated energy system](https://www.smart-energy.com/digitalisation/digital-identities-building-block-for-an-automated-energy-system/) Smart Energy
|
||||||
|
> New features include credential revocation and expiration, full support for role-authorised issuance, credential issuance based on email verification and asset administration as well as better alignment with the W3C’s Verifiable Credential Standards.
|
||||||
|
|
||||||
|
|
||||||
|
* [War Against the Robots – Pick your Side with SelfKey & Metaproof Platform](https://selfkey.org/war-against-the-robots-pick-your-side-with-selfkey-metaproof-platform/) SelfKey Foundation
|
||||||
|
> Trying to ban or sideline bots is not a solution. The solution is to distinguish bots from humans so that humans can do human stuff and bots can do bot stuff.
|
||||||
|
|
||||||
|
|
||||||
|
* [OpenEarth partners with BCGov to develop a digital trust marketplace for climate accounting](https://www.openearth.org/blog/openearth-partners-with-the-government-of-british-columbia-to-develop-a-digital-trust-marketplace-for-climate-accounting) OpenEarth Foundation
|
||||||
|
> OpenEarth Foundation partnered with the Mines Digital Trust initiative to allow BC companies to also share their greenhouse gas (GHG) emissions credentials to the [OpenClimate](https://www.openearth.org/projects/openclimate) platform so that they can be integrated into BC’s subnational climate inventory and showcased to interested purchasers and civic society
|
||||||
|
|
||||||
|
|
||||||
|
* [Event tickets as verifiable credentials](https://lissi-id.medium.com/event-tickets-as-verifiable-credentials-31f4a10b28cc) Lissi
|
||||||
|
> This article explains how verifiable credentials can be used to benefit event organizers and visitors alike based on a practical usage of the Lissi team.
|
||||||
|
|
||||||
|
* [Yes, verifiable authentic human content is important.](https://twitter.com/OR13b/status/1573100718164164610) Orie Steele
|
||||||
|
*The [Content Authenticity Initiative](https://contentauthenticity.org/how-it-works) one of Orie’s favoriate Use-cases for VCS*
|
||||||
|
> I also think cryptography can provide better transparency for synthetic content. It's one of my favorite applications of W3C Verifiable Credentials.
|
||||||
|
|
||||||
|
|
||||||
|
* [Blockchains in HR: Prosoon and Talao go together on SSI and HR credentials](https://medium.com/@talao_io/blockchains-in-hr-prosoon-and-talao-go-together-on-ssi-and-hr-credentials-3b92968011fe) Talao
|
||||||
|
> This partnership will enable the use of Blockchain and Self-Sovereign Identity technologies such as verifiable credentials to enable the support of diplomas and professional certifications in compliance with personal data in a decentralized environment (#web3).
|
||||||
|
|
||||||
|
* [Self sovereign online identity is going to be a CRITICAL tool for everyone on the internet.](https://twitter.com/ericxtang/status/1575645620659900417) EricTang.eth
|
||||||
|
> Without it, we will lose trust of any content on the internet due to AI advancement in the next 12-24 months.
|
||||||
|
>
|
||||||
|
> This one of the most urgent issues in our society today.
|
||||||
|
|
||||||
|
* [Lost and Found: Digital identity Can Be The Difference Between Life And Death For Refugees](https://diacc.ca/2022/09/27/lost-and-found-digital-identity-can-be-the-difference-between-life-and-death-for-refugees/) 2022-09-27 DIACC
|
||||||
|
|
||||||
|
Most Refugees and IDPs did not have the time to properly prepare by gathering all their important documents such as passports, identity cards, driver’s licenses, and land titles or rental agreements. Fleeing your home may save your life, but fleeing without identity documents can lead to a very long wait – sometimes a decade or more – before your life is stable again.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
* [Creating trust in assertions, claims and the authenticity of the original content](https://liccium.com/) LICCIUM
|
||||||
|
|
||||||
|
* [Coming soon — a resume-validating blockchain network for job seeker](https://www.computerworld.com/article/3675547/coming-soon-a-resume-validating-blockchain-network-for-job-seekers.html#tk.rss_security) Computer World
|
||||||
|
> "Verifying applicant career records can take days, weeks, if not months, to complete," said Dror Gurevich, founder and CEO of the Velocity Network Foundation. "Hiring methods are severely outdated to the point that one in three Americans have [admitted to lying on their resumes](https://t.yesware.com/tt/0db4de0058ee9613cdfcabd5fae96c6ca51e1b7f/275468cd0c53df0b2dfa60dbb913464b/c19e9bd03a563c32bab519acc1fa9f5b/www.resumebuilder.com/1-in-3-americans-admit-to-lying-on-resume/), which slows the hiring process immensely.
|
||||||
|
|
||||||
|
|
||||||
* [The Nail Finds a Hammer: Self-Sovereign Identity, Design Principles, and Property Rights in the Developing World](https://www.newamerica.org/future-property-rights/reports/nail-finds-hammer/) 2018-10-18 New America
|
* [The Nail Finds a Hammer: Self-Sovereign Identity, Design Principles, and Property Rights in the Developing World](https://www.newamerica.org/future-property-rights/reports/nail-finds-hammer/) 2018-10-18 New America
|
||||||
|
@ -1,121 +0,0 @@
|
|||||||
---
|
|
||||||
published: false
|
|
||||||
---
|
|
||||||
|
|
||||||
# Real World Implementations
|
|
||||||
* [Notes from W3C TPAC on major deployments of Verifiable Credentials](https://twitter.com/philarcher1/status/1570082512122294273) Manu Sporny via Phil Archer
|
|
||||||
|
|
||||||
- Steel, Oil Agriculture Shipment into US Customs ($2.3T in good/year)
|
|
||||||
- European Digital Wallet (€163M funding, 450M people)
|
|
||||||
- Digital Education Credentials in Uganda, Nigeria, Kenya (323M people)
|
|
||||||
- Digital Age Verfication (152k retail stores, 200M people)
|
|
||||||
- Content Authenticity Initative (30M Adobe customers)
|
|
||||||
- Digital Permanent Resident Cards (14M people)
|
|
||||||
* [IIW verifiable credentials - Decentralized VC integration with Eventbrite and Qiqo chat. This session will review the implementation process, lessons learned, and community discussion on related use cases.](https://iiw.idcommons.net/11A/_IIW_verifiable_credentials_-_Decentralized_VC_integration_with_Eventbrite_and_Qiqo_chat._This_session_will_review_the_implementation_process,_lessons_learned,_and_community_discussion_on_related_use_cases.) by Mike Vesey, Karl Kneis
|
|
||||||
## Real World
|
|
||||||
|
|
||||||
* [NHS Staffpassport; Based on Evernym Verity built by Sitekit/Condatis; A 12 month experience](https://iiw.idcommons.net/22C/_NHS_Staffpassport;_Based_on_Evernym_Verity_built_by_Sitekit/Condatis;_A_12_month_experience) by Chris Eckl, Richard Astley
|
|
||||||
> The NHS Staff passport system was created to allow NHS employees to be redeployed between different organisations to meet urgent demand and remove the onboarding challenges when staff onboard with new organisations.
|
|
||||||
* [Condatis IIW32 NHS Digital Staffpassport Learnings (slideshare.net)](https://www.slideshare.net/secret/JGSugec83U6ouP)
|
|
||||||
* [Building an SSI Ecosystem: Digital Staff Passports at the NHS](https://www.windley.com/archives/2021/05/building_an_ssi_ecosystem_digital_staff_passports_at_the_nhs.shtml) Windley
|
|
||||||
> How does a functioning credential ecosystem get started? This post goes deep on Manny Nijjar’s work to create a program for using digital staff passports in the sprawling UK NHS bureaucracy.
|
|
||||||
|
|
||||||
* [Using Blockchain to Get Information When You Need It from Wherever You Are](http://informationmatters.org/2021/08/using-blockchain-to-get-information-when-you-need-it-from-wherever-you-are/) Information Matters
|
|
||||||
> The goal of this project is to provide unencumbered access to digital content and print collections while ensuring the privacy and personal identity of each user is secure. Partner libraries will issue a ULC to any individual with either a fixed or descriptive address. Information access will be increased as users gain access to resources and services in those libraries that recognize the ULC.
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
* [Divitel & Ledger Leopard Team Up to Apply Blockchain & Self Sovereign Identity Technology to Video Distribution](https://www.canto.org/blog/divitel-and-ledger-leopard-team-up-to-apply-blockchain-self-sovereign-identity-technology-to-video-distribution/)
|
|
||||||
|
|
||||||
ready to market by end of end of 2022 offering increased flexibility, control, ease of use and speed when managing the access of video distribution ecosystem data, independent of the technology used. Divitel video carrier customers will be offered the option to include this blockchain module on top of their ecosystems.
|
|
||||||
|
|
||||||
* [https://app.slidebean.com/p/6acrochkpj/IIW-April-22-2021](https://app.slidebean.com/p/6acrochkpj/IIW-April-22-2021) RANDA
|
|
||||||
|
|
||||||
State agency feedback:
|
|
||||||
|
|
||||||
- Identity is at the heart
|
|
||||||
- Disconnect between the data desired and the data entered
|
|
||||||
- Confusing fields, more confusing mapping
|
|
||||||
- Mismatched data
|
|
||||||
- Stick to 99% of a standard
|
|
||||||
|
|
||||||
School has changed:
|
|
||||||
|
|
||||||
- Used to be:
|
|
||||||
- District organized by physical location
|
|
||||||
- Revenue systems based on seat time
|
|
||||||
- School buildings
|
|
||||||
- Classrooms divided into grades
|
|
||||||
- Teachers as sage on the stage
|
|
||||||
- COVID:
|
|
||||||
- Some kids still out of school
|
|
||||||
- Playlists, virtual classrooms, hybrid
|
|
||||||
- Access to food. Access to internet. Access to a device.
|
|
||||||
- Teachers maxed to the limit
|
|
||||||
- FUTURE:
|
|
||||||
- Learning Loss?!?
|
|
||||||
- Social Emotional Learning?!?
|
|
||||||
- 1/3 of students expected not to return
|
|
||||||
- Virtual models abound
|
|
||||||
- Teacher mobility and agency
|
|
||||||
- Chaos versus Opportunity?
|
|
||||||
|
|
||||||
Questions for discussion:
|
|
||||||
|
|
||||||
- Identity technical solutions are easy. The data clean up and alignment is the first problem to solve.
|
|
||||||
- How can self attestation be trustworthy?
|
|
||||||
- What are the responsibilities of a proxy issuer?
|
|
||||||
- How far can we move people's cheese before they rebel?
|
|
||||||
|
|
||||||
https://unece.org/trade/uncefact/guidance-material
|
|
||||||
|
|
||||||
* [The Verifiable Economy: Fully Decentralized Object (FDO) Example: Bob’s UDID Document](https://hyperonomy.com/2021/06/15/the-verifiable-economy-fully-decentralized-object-fdo-example-bobs-udid-document/) 2021-06-15
|
|
||||||
|
|
||||||
Strongly-typed Code to Generate Bob’s UDID Document
|
|
||||||
|
|
||||||
A pertinent example of how this can be applied in the corporate world is this example of the [Scottish Social Services Council uses them](https://www.badges.sssc.uk.com/getting-started/what-you-need-to-know-about-open-badges/) to underpin workforce learning. The BCS describes this as the [future of professional development](https://www.bcs.org/content-hub/digital-badging-the-future-of-professional-development/), with many organizations like [Siemens](https://new.siemens.com/uk/en/company/education/teachers/siemens-digital-badges.html) using them this way.
|
|
||||||
* [OWI Digital Forum Recap: The Rise & Adoption of Verifiable Credentials](https://trinsic.id/owi-digital-forum-recap-the-rise-adoption-of-verifiable-credentials/)
|
|
||||||
> Trinsic CEO Riley Hughes sat down with [One World Identity](https://oneworldidentity.com/) (OWI) CEO Travis Jarae to have a one-on-one conversation about [“The Rise & Adoption of Verifiable Credentials”](https://oneworldidentity.com/session/trinsic/). Below is a short summary
|
|
||||||
|
|
||||||
|
|
||||||
* [25+ Proof of Concepts (PoCs) for Verifiable Credentials](https://academy.affinidi.com/25-proof-of-concept-poc-for-verifiable-credentials-edf684b592f2) Affinidi
|
|
||||||
> Today, we proudly present another 25+ Proof of Concepts for VC implementation. These use cases are a compilation of the [submissions](https://affinidipocathon.devpost.com/) (in no particular order) made by the participants of the Affindi PoCathon 2021.
|
|
||||||
|
|
||||||
|
|
||||||
## Real World
|
|
||||||
- [DIF F2F demo session](https://www.youtube.com/watch?v=SaNvIorKQ9I)
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
* [The Missing Network Layer Model](https://findy-network.github.io/blog/2022/03/05/the-missing-network-layer-model/) Findy 2022-03-05
|
|
||||||
|
|
||||||
Epic Post
|
|
||||||
|
|
||||||
You might think that I have lost my mind. We have just reported that our Indy SDK based DID agency is [AIP 1.0](https://github.com/hyperledger/aries-rfcs/blob/main/concepts/0302-aries-interop-profile/README.md) compatible, and everything is wonderful. What’s going on?
|
|
||||||
|
|
||||||
* [Digitizing the 1st Mile with Blockchain, AI, and Self Sovereign Identity Connecting Coffee Farmers from Field to 1st Sip in Sustainable Supply Chains with Farmer Connect](https://podcasts.apple.com/us/podcast/supply-chain-revolution/id1496899179?i=1000507363757) Supply Chain Revolution
|
|
||||||
|
|
||||||
Think about the journey of a coffee bean from East Africa to the consumer. Thousands of miles away in the 1 sip to field wrapped in a complex, and often unsustainable, inequitable supply chain. There are 25 million people living in the coffee ecosystem, and 2.5 billion coffee drinkers worldwide, and that number is expected to 2-3X in coming years.
|
|
||||||
## Cerebrum
|
|
||||||
* [Cerebrum Launches Identity Pittsburgh Initiative in Partnership with Carnegie Mellon University's ETIM Program](https://www.prnewswire.com/news-releases/cerebrum-launches-identity-pittsburgh-initiative-in-partnership-with-carnegie-mellon-universitys-etim-program-301616404.html) PRNewswire
|
|
||||||
|
|
||||||
One example use case is medical records, which are often stored in central repositories and are hard for patients to access or share. Verifiable credentials offer an alternative — have patients store their medical records in digital wallets they control — which solves issues with interoperability, data ownership, and data access.
|
|
||||||
### CDE Services
|
|
||||||
* [Age-Verification Solution TruAge to be Deployed by CDE Services, Inc., Expanding Access to Convenience Stores Nationwide](https://www.prnewswire.com/news-releases/age-verification-solution-truage-to-be-deployed-by-cde-services-inc-expanding-access-to-convenience-stores-nationwide-301597284.html) PRNewswire
|
|
||||||
|
|
||||||
"The convenience retailing industry conducts 165 million transactions a day and 50 million of them involve an age-restricted product. It is exciting to announce that TruAge will be implemented into thousands of stores that conduct age-restricted transactions," said TruAge CEO Kyle McKeen.
|
|
||||||
|
|
||||||
## Supply chain
|
|
||||||
|
|
||||||
* [Identity Terms Provide Value along the Supply Chain: How We Know When to Buy the Farm](https://medium.com/@Transmute/identity-terms-provide-value-along-the-supply-chain-how-we-know-when-to-buy-the-farm-738701967e3d) Jessica Tacka, Transmute
|
|
||||||
> Supply chain credentialing in the form of bills of lading, certificates of origin, or letters of credit is used to protect honest parties and their merchandise from being confused with dishonest parties or entities that are engaged in unethical practices, such as environmental destruction, or forced labor.
|
|
||||||
* [Visibility 2.0: Creating Digital Consistency in an International Supply Chain](https://nextlevelsupplychainpodwithgs1us.libsyn.com/visibility-20-creating-digital-consistency-in-an-international-supply-chain) Next Level Supply
|
|
||||||
> how can something as complicated as the international supply chain take fundamental trade practices and marry them with innovation so we can move at the speed of digitization? Join us for a mind-blowing discussion with Karyl Fowler, CEO at Transmute
|
|
||||||
* [Identity in the Supply Chain](https://vimeo.com/669713750) Vienna Digital Identity #30
|
|
||||||
> GS1 is the global association for supply chain identifiers with members across all industry sectors and interacting (unbeknownst) with general consumer on a daily basis. Transmute a foundational member of the DID/VC community and a participant in the US DHS Silicon Valley Innovation Program’s cross-border shipping use case.
|
|
||||||
>
|
|
||||||
> - Transmute Deck: [thedinglegroup.com/s/Transmute_Vienna-Digital-ID-Forum-Jan-2022.pdf](https://www.thedinglegroup.com/s/Transmute_Vienna-Digital-ID-Forum-Jan-2022.pdf)
|
|
||||||
> - GS1 Deck: [thedinglegroup.com/s/2022-01-24_ViennaDigitalIdentityPhilA.pdf](https://www.thedinglegroup.com/s/2022-01-24_ViennaDigitalIdentityPhilA.pdf)
|
|
||||||
* [eDATA Verifiable Credentials for Cross Border Trade](https://unece.org/sites/default/files/2022-07/WhitePaper_VerifiableCredentials-CBT.pdf) UNECE UN/CEFACT White Paper
|
|
||||||
* [Transmute @TransmuteNews](https://twitter.com/TransmuteNews/status/1572692362148847619) via Twitter
|
|
||||||
> The "[[Fake] 30TB hard drive](https://www.vice.com/en/article/akek8e/walmart-30tb-ssd-hard-drive-scam-sd-cards)" investigation shows the real impact verification could have on #eCommerce. #verifiablecredentials
|
|
@ -1,251 +0,0 @@
|
|||||||
---
|
|
||||||
published: false
|
|
||||||
---
|
|
||||||
|
|
||||||
* [Self-Sovereign Identity: More Use Cases](https://www.bankinfosecurity.com/self-sovereign-identity-more-use-cases-a-16448): Heather Dahl and Ken Ebert of Indicio Discuss Decentralized ID Management
|
|
||||||
> In a video interview with Information Security Media Group, Dahl and Ebert discuss:
|
|
||||||
>
|
|
||||||
> - The evolution of Indicio.tech from the Sovrin Foundation;
|
|
||||||
> - Key initiatives in implementing and testing decentralized identity;
|
|
||||||
> - How a decentralized workforce is accelerating the need for identity management.
|
|
||||||
|
|
||||||
# Verifiable Credentials
|
|
||||||
|
|
||||||
* [How Exactly Are Verifiable Credentials Making the World Better?](https://sgershuni.medium.com/how-exactly-are-verifiable-credentials-making-the-world-better-eb72145c061) Stepan Gershuni
|
|
||||||
> 6 stories of how verifiable credentials can improve the lives of every day people:
|
|
||||||
>
|
|
||||||
> Ajay is an Uber driver in San Francisco. He wants to try various temporary jobs while he’s studying but joining Lyft, Postmates and other platforms requires going through a long and tedious background verification and car certification process over and over again.
|
|
||||||
* [Reimagining Customer Loyalty Programs With Verifiable Credentials: A Pravici Case Study](https://www.evernym.com/blog/customer-loyalty-verifiable-credentials/) Evernym
|
|
||||||
> [Pravici](https://pravici.com/), an Evernym customer and startup based out of Chandler, Arizona, is looking to flip the equation. Their solution, Tokenized Loyalty Points (TLP), uses verifiable credential technology to give individual consumers control over their data, while empowering them to direct how their favorite brands can use this data for loyalty and other campaigns.
|
|
||||||
* [26 Suggested Use Cases of Verifiable Credentials (With Some Real-World Examples)](https://academy.affinidi.com/25-real-world-use-cases-of-verifiable-credentials-4657c9cbc5e) Affinidi
|
|
||||||
> we hope that business leaders, entrepreneurs, and developers will use this article as a guide to create some breakthrough solutions that will benefit the society at large.
|
|
||||||
|
|
||||||
## Supply Chain
|
|
||||||
* [Trusted Supply Chain: end-to-end compliance in multi-tier supply chain](https://evan.network/use-cases/trusted-supply-chain/) Evan Network
|
|
||||||
> In the real estate industry, TRUST&TRACE can be used by companies to obtain required compliance information from a network of participating companies. In this way, all property data is collected step by step: from building construction and leasing to sale and demolition.
|
|
||||||
* [SAP Completes Pharmaceutical Industry Pilot to Improve Supply Chain Authenticity](https://news.sap.com/2021/03/pharmaceutical-supply-chain-industry-pilot/) 2021-03 SAP
|
|
||||||
> today announced the completion of an industry-wide pilot utilizing self-sovereign identity (SSI) credentials to establish trust in the pharmaceutical supply chain for indirect trade relationships.
|
|
||||||
* [The missing link: digitizing supply chains with portable data](https://medium.com/mavennet/the-missing-link-digitizing-supply-chains-with-portable-data-583b66acc9bc) Mavnet
|
|
||||||
> The traceability vocabulary bridges the gap between existing record-keeping systems and the verifiable exchange of supply chain information across organizations envisioned by proponents of these data portability technologies.
|
|
||||||
* [The Phygital Future of the Supply Chain](https://nextlevelsupplychainpodwithgs1us.libsyn.com/the-phygital-future-of-the-supply-chain) Next Level Supply Chain Podcast with GS1
|
|
||||||
> The digital and physical world are merging more than ever before. As the supply chain becomes more ‘phygital,’ innovative ways of sharing data – like using verifiable credentials – are helping to build more trust with data along the supply chain. Join us as we chat with Senior VP of Innovation & Partnerships at GS1 US, Melanie Nuce, as we explore what’s around the corner and how standards play
|
|
||||||
* [How to Prevent Supply Chain Fraud With Blockchain](https://www.dock.io/post/supply-chain-fraud-blockchain) Dock
|
|
||||||
> The global [supply chain management market size](https://www.prnewswire.com/news-releases/supply-chain-management-scm-market-size-worth--19-3-billion-globally-by-2028-at-9-02--cagr-verified-market-research-301540702.html) was valued at USD 10.1 Billion in 2020 and is projected to reach USD 19.3 Billion by 2028. Supply chain is the path for any product such as food, clothes, or appliances to go from where it was a produced, to distributors, procurement officers (quality inspections), and the market.
|
|
||||||
* [SAP Pharma Solution Supports Supply Chain Compliance](https://insidesap.com.au/sap-pharma-solution-supports-supply-chain-compliance/) SAP
|
|
||||||
> SAP has chosen an open, interoperable technology to validate all stakeholders in the pharma supply chain in order to provide customers with the best solution for compliance under the U.S. Drug Supply Chain Security Act (DSCSA) requirements. The DSCSA also limits stakeholders’ interactions to ATPs.
|
|
||||||
|
|
||||||
## Personal Data
|
|
||||||
* [Why Location Data Brokers Put All Communities At Risk](https://me2ba.org/why-location-data-brokers-put-all-communities-at-risk/) Zach Edwards M2BA
|
|
||||||
> New work that may leverage decentralized ID from the supply chain side of things…but not sure (lots of links inside on data brokers harm)
|
|
||||||
* [Julian Wilson: Self-Sovereign Data meets Open Banking](https://mastersofprivacy.com/julian-wilson-self-sovereign-data-meets-open-banking/) Masters of Privacy
|
|
||||||
> Julian Wilson began his career at Apple in the late 80s [...] joined Ecospend in 2019 to build a self-sovereign data service on top of an Open Banking platform. He describes his role as putting an Internet lens onto product design.
|
|
||||||
|
|
||||||
## Banking
|
|
||||||
* [Impacts from a new reality drive the need for an enhanced digital identity framework](https://bankautomationnews.com/allposts/risk-security/impacts-from-a-new-reality-drive-the-need-for-an-enhanced-digital-identity-framework/) Bank Automation News
|
|
||||||
> While US-based entities are adhering to an enhanced regulatory framework, these mandates are particularly applicable in Europe, where there is necessary compliance with enacted standards (such as the General Data Protection Regulation—commonly known as GDPR—and the Payment Service Providers Directive 2—referred to as PSD2. A clear need for a true and persistent digital identity as a solution to the ancillary—and sometimes unforeseen—challenges that have arisen.
|
|
||||||
* [Banking’s identity problem](https://www.globalbankingandfinance.com/bankings-identity-problem/) Global Banking and Finance
|
|
||||||
> Banks have sought to overcome some of these challenges with the use of biometrics such as facial recognition and fingerprints. These are now more commonly used to login to, or unlock devices, and increase usability, but still leave the challenge of proving the authenticity of a document wide open to abuse.
|
|
||||||
- [New Bank Account Use Case](https://www.youtube.com/watch?v=YRLu4U4hSZ8)
|
|
||||||
|
|
||||||
* [How to Prevent Fraud using #MARKs](https://dhiway.com/prevent-credential-fraud/) DHIWay
|
|
||||||
> Credential fraud has, unfortunately, become commonplace in today’s instant electronic age. Especially problematic in [higher education](https://dhiway.com/hashmarks-in-the-education-sector/), credential fraud has spiralled into a multi-billion-dollar industry
|
|
||||||
|
|
||||||
## Security
|
|
||||||
* [Digital IDs under attack: How to tackle the threat?](https://www.helpnetsecurity.com/2022/01/27/ssi-face-presentation-attacks/) 2022-01-27 HelpnetSecurity
|
|
||||||
> - photo attacks based on the presentation of facial evidence of an image of a face printed or displayed via a device’s screen.
|
|
||||||
> - video of user replay attack usually consisting of placing the screen of the attacker’s device in front of the camera.
|
|
||||||
> - 3D mask attacks where 3D masks are crafted to reproduce the real traits of a human face and even include eyes holes to fool the liveliness detection based on eye gaze, blinking and motion.
|
|
||||||
> - deepfake attacks make use of leveraging software capable to create a synthetic video or image realistically representing someone else. Attackers are suspected to have access to a wide dataset containing images or a video of their target.
|
|
||||||
|
|
||||||
## Hiring \ Resume
|
|
||||||
* [Trusted Career Credentials](https://www.linkedin.com/pulse/trusted-career-credentials-dr-gordon-jones/) Dr Gordon Jones
|
|
||||||
> Today, even in this digital world that has expanded over the past two years, the job market still relies on self-reported attributes, records, resumes, and/or LinkedIn profiles, that individuals share with employers or recruiters as the source for applicants and employee data.
|
|
||||||
|
|
||||||
### Smart Home
|
|
||||||
|
|
||||||
* [SSI for smart locks](https://twitter.com/AnimoSolutions/status/1394895595236626433) h\t Animo
|
|
||||||
|
|
||||||
|
|
||||||
### loyalty rewards
|
|
||||||
|
|
||||||
* [@_XPID_](https://twitter.com/_XPID_) · [Nov 2](https://twitter.com/_XPID_/status/1323371035484250113)
|
|
||||||
> Check out the latest version of our beta prototype in the Appstore for #verifiablecredentials for #LoyaltyPrograms. https://apps.apple.com/us/app/id1458328593 When #sovereign #decentralized #identity becomes a reality, your #Loyalty and #loyaltyrewards #Wallet will be on XPID. #SSI
|
|
||||||
|
|
||||||
## Passwordless
|
|
||||||
* [The End of Logins and Passwords, Just for Starters](https://thereboot.com/the-end-of-logins-and-passwords-just-for-starters/) The Reboot
|
|
||||||
|
|
||||||
## Identos
|
|
||||||
* [Groundwork laid for mass digital identity take up as use cases grow](https://www.biometricupdate.com/202108/groundwork-laid-for-mass-digital-identity-take-up-as-use-cases-grow) Biometric update
|
|
||||||
> Identos is adding W3C (World Wide Web Consortium) verifiable credentials as a product feature for its digital ID solutions by the end of the year, announcing its position in the race to incorporate international standards for how digital credentials – from health records to degree certificates – are stored and verified.
|
|
||||||
|
|
||||||
## Meeco
|
|
||||||
* [Opening the domestic card rails to innovation](https://blog.meeco.me/opening-the-domestic-card-rails-to-innovation/) Meeco
|
|
||||||
> Enabling Australian FinTechs a direct avenue to discuss how they partner and collaborate to access the eftpos payments network through the Committee resulted in recommendations that covered a number of central themes, including consultation and engagement, regulation, and technology and solutionsBen Tabell, eftpos Chief Information Officer and Committee Chair
|
|
||||||
|
|
||||||
## Gaming
|
|
||||||
* [Self-Sovereign Identity for Online Gaming, VR, & AR – Crucible](https://identity-economy.de/self-sovereign-identity-for-online-gaming-vr-ar-crucible) Evernym (via identity-economy.de)
|
|
||||||
> Crucible's CEO (Ryan Gill) and CTO (Toby Tremayne) for a discussion on what self-sovereign identity (SSI) and verifiable credentials mean for gaming and the greater online entertainment sector.
|
|
||||||
|
|
||||||
## Credit unions
|
|
||||||
* [Building an SSI Ecosystem: MemberPass and Credit Unions](https://www.windley.com/archives/2021/06/building_an_ssi_ecosystem_memberpass_and_credit_unions.shtml) 2021/06 Phil Windley
|
|
||||||
> Credit unions and their members face the threat of fraud on all sides. And credit unions employ lots of tools to fight it. But ultimately, the problem comes down to the member and credit union authenticating each other. The problem is that doing this securely annoys people.
|
|
||||||
|
|
||||||
|
|
||||||
## Memberpass
|
|
||||||
* [MemberPass Digital ID can help Reduce Expenses and Build Member Trust](https://www.memberpass.com/2021/06/memberpass-digital-id-can-help-reduce-expenses-and-build-member-trust/)
|
|
||||||
|
|
||||||
You can probably use the good news. It’s never been easy to run a credit union, especially when you get whacked from all sides. Regulations change, members always seem to want access to another shiny new technology gadget, and financial fraud continues to be a threat. On top of that, we’ve all had to grapple with the pervasive life-changing effects of the coronavirus pandemic for the past year.
|
|
||||||
|
|
||||||
## E-Commerce
|
|
||||||
|
|
||||||
* [Self-Sovereign E-Commerce](https://iiw.idcommons.net/23J/_Self-Sovereign_E-Commerce) by Doc Searls
|
|
||||||
There is momentum here, and a need to start building out much of what was discussed.
|
|
||||||
> Doc introduced the session with the slide deck [here](https://www.slideshare.net/dsearls/day3iiw-sesion), wearing his hat as a founding member of [Customer Commons](http://customercommons.org), the .org working on the Intention Byway discussed at earlier IIW sessions and described in [this blog](https://customercommons.org/2021/04/27/a-new-way/), posed later. 2021-04-27
|
|
||||||
>
|
|
||||||
> His case is that the incumbent e-commece system hasn’t progressed past its dependence on the cookie, and perhaps never will; and that there is a need to stand up an alternate model, built on asynchronous pub-sub messaging and compute nodes that run apps that don’t have to come from the stores of Apple and Google.
|
|
||||||
>
|
|
||||||
> First examples of target areas (where communities are already active) are food distribution in Michigan and real estate in Boston. Hadrian Zbarcea led the discussion of both, using slides from the deck above.
|
|
||||||
|
|
||||||
### Career Creds
|
|
||||||
* [Self sovereign career identity](https://diginomica.com/self-sovereign-career-identity-conversation-meg-bear-sap-successfactors) Diginomica Meg Bear
|
|
||||||
> The Velocity piece is a way for me as an individual to own my credentials, to say, these are the things that I know. And these are the things I've done. And if I can own that, I have a lot more interest in it. And I can use it in a lot more interesting ways. In the past, that might have just been something that I built as reputation within a company, I can now make that a more dynamic and portable reputation I can take with me anywhere.
|
|
||||||
|
|
||||||
* [A brighter future for tenant/landlord relationships](https://domilabs.io/tenant-landlord-relationships/) Domi Labs
|
|
||||||
> it’s hard to keep track since some call, some… email, and still others send you a message on WhatsApp.” Going through all of these disparate messages is its own fulltime job!
|
|
||||||
>
|
|
||||||
> That’s why Domi locates all communication about a property in one place, making it easy for tenants and property managers to stay in touch.
|
|
||||||
|
|
||||||
* [Blockchain and the Decentralised Workforce](https://workforcefuturist.substack.com/p/blockchain-and-the-decentralised-workforce) WorkforceFuturist
|
|
||||||
|
|
||||||
## Trade
|
|
||||||
|
|
||||||
[Vincent Annunziato,](https://www.spreaker.com/user/13158652/ep8-cbp-vincent-annunziato) talks about his work with The Silicon Valley Innovation Program. He is the Director of Transformation & Innovation Division of the Customs and Border Patrol Office of Trade, talks about shaping blockchain technologies to make imports safer and more secure. CBP's current projects include tracking steel, oil, and natural gas imports from Canada.
|
|
||||||
|
|
||||||
* [The Equifax Incident, And How SSI Could Have Prevented It](https://europechain.io/identity/equifax-incident-ssi-prevented-it/) Europechain
|
|
||||||
> On March 8, 2017, Cisco staff found and reported a critical flaw in Apache Struts, an open-source framework that enables the creation of web-based Java applications. The vulnerability in question was identified as CVE-2017-5638. In short, Strut’s parser tool, Jakarta, could be manipulated to enable a malicious actor to upload files remotely to a server, and potentially run code on that compromised server.
|
|
||||||
|
|
||||||
|
|
||||||
* [A Holochain DocuSign Challenge](https://blog.holochain.org/a-holochain-docusign-challenge/)
|
|
||||||
* [Use Case: American Electric Power](https://idramp.com/use-case-american-electric-power/)
|
|
||||||
> What kind of strategy will take you to being a next-generation utility company? For AEP Ohio, a large electric utility company based in Columbus, this challenge began with a comprehensive review of their entire ecosystem and which identified their key pain points for innovation.
|
|
||||||
|
|
||||||
|
|
||||||
* [5 Promising Use Cases for Verifiable Credentials](https://hackernoon.com/5-promising-use-cases-for-verifiable-credentials-tu1y348k) Hackernoon
|
|
||||||
> several industries are already digging in. Here are some of the most visible and promising use cases.
|
|
||||||
* [Are we doing enough to align our work with Zero Trust Architecture?](https://lists.w3.org/Archives/Public/public-did-wg/2021Jan/0000.html) Adrian Gropper on Public DID-WG mailing list
|
|
||||||
> [https://www.nytimes.com/2021/01/02/us/politics/russian-hacking-government.html](https://www.nytimes.com/2021/01/02/us/politics/russian-hacking-government.html) 2021-01-02
|
|
||||||
> What would be a good way for our SSI communities to advance zero trust architecture through more effective accountability and audit?
|
|
||||||
|
|
||||||
* [Manu responds](https://lists.w3.org/Archives/Public/public-did-wg/2021Jan/0003.html)
|
|
||||||
> Could DIDs and VCs help with systems architected with Zero Trust in mind? Yeah, probably:
|
|
||||||
>
|
|
||||||
> 1) You could use VCs to prove that you should have certain levels of access to certain systems. Checking this could happen automatically, but while ensuring that you're "live" and not some bot.
|
|
||||||
> 2) Logs could be kept of which VCs were used when to receive the authority to do something.
|
|
||||||
> 3) ZCAPs could be used to provide fine-grained access to very specific resources, even behind the firewall, within an organizations systems.
|
|
||||||
> DIDs could power much of this... but shouldn't promise any of it. The closest we could probably get to what you're asking, Adrian, is to align the Zero Trust Architecture principles to how DIDs and VCs can help -- primarily around: identity verification (VCs), login authentication (DIDs), least-privilege access (ZCAPs, Confidential Storage), and HTTP API access authorization (ZCAPs).
|
|
||||||
|
|
||||||
* [More from Adrian](https://lists.w3.org/Archives/Public/public-did-wg/2021Jan/0004.html)
|
|
||||||
> The most important message from the SolarWinds hack and much of the ransomware havoc is that our systems are not set up for individual accountability or independent audit.
|
|
||||||
>
|
|
||||||
> The VC and ZCAPs perspective is inadequate. As an SSI community we need to address the separation of concerns between authentication, authorization, and audit as equally important and needing a harmonized best-practice perspective. Standardized EDVs are table stakes but not terribly relevant to the protocols that link authentication, authorization, and audit. Confidential Storage should be adopting the protocols that connect authentication, authorization, and audit rather than introducing protocols narrowly scoped to the narrow and obvious role of encryption at rest.
|
|
||||||
>
|
|
||||||
> I've put together a few slides in an attempt to clarify the relationship between non-repudiable accountability and audits (and EDVs).
|
|
||||||
> [https://docs.google.com/presentation/d/1ksKal62ZiApX09Nejm4RSqHzHJbgwpu_l2Ho64_ePKU/edit#slide=id.p](https://docs.google.com/presentation/d/1ksKal62ZiApX09Nejm4RSqHzHJbgwpu_l2Ho64_ePKU/edit#slide=id.p)
|
|
||||||
|
|
||||||
* [Adrian follows up with some explanation of the slides](https://lists.w3.org/Archives/Public/public-did-wg/2021Jan/0005.html)
|
|
||||||
> Considering risk mitigation, based on SSI principles, there are four separate actors:
|
|
||||||
> 1. Resource Owner (RO) their user agent (mobile wallet), and cloud agent (AS)
|
|
||||||
> 2. Service Provider (SP), by definition has data in the clear
|
|
||||||
> 3. Requesting Party (RQ) and their user agent (mobile wallet)
|
|
||||||
> 4. Requesting Client (RC), by definition has data in the clear
|
|
||||||
|
|
||||||
* [Digital Identity Isn’t Only For People](https://www.forbes.com/sites/davidbirch/2020/12/22/digital-identity-isnt-only-for-people/) 2020-12-22 David Birch, Forbes
|
|
||||||
> fintechs and regtechs looking for opportunities in the digital identity space should cast their ideas net pretty wide. Digital identities are not only for people and the future desperately needs digital identities for pretty much everything to underpin recognition, relationships and reputation (the 3Rs of the online economy).
|
|
||||||
|
|
||||||
* [Why self-sovereign identity will get adopted (and it’s not the reason you probably want)](https://www.tuesdaynight.org/2018/06/15/why-self-sovereign-identity-will-get-adopted-and-its-not-the-reason-you-probably-want/) 2018-06-15 Tuesday Night
|
|
||||||
> In the payment card world, there are clear guidelines on personal liability. $50 if you use credit and up to $500 for debit depending on when you report the issue. Based on that, different people choose to use different “systems.”
|
|
||||||
>
|
|
||||||
> However, no such guidelines exist for the use of identity information (e.g. attributes.)
|
|
||||||
|
|
||||||
* [ID Verification Threats On the Horizon](https://stateofidentity.libsyn.com/id-verification-threats-on-the-horizon) Liminal Podcasts
|
|
||||||
> Cognito's CEO Alain Meier joins the State of Identity host Cameron D’Ambrosi to dive into why industries beyond financial services are now in the market for identity verification. They also unpack the impact of synthetic identity fraud across verticals, and how platforms find the balance when building their onboarding processes.
|
|
||||||
|
|
||||||
* [Hackers Gaining Power of Subpoena Via Fake “Emergency Data Requests”](https://krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/) 2022-03
|
|
||||||
> If there was a trust framework for police departments and a DID registry for them - the police departments could issue VCs to their officers.
|
|
||||||
>
|
|
||||||
> If you want to se how hard this was/would have been to achieve in earlier technology stacks take a look at [conceptual outlines](https://trustmark.gtri.gatech.edu/concept/) from this NSTIC (National Strategies for Trusted Identities in Cyberspace) developing a trust framework for law enforcement federations done by the Georgia Technology Reserach Institute and the [results/learnings.](https://trustmark.gtri.gatech.edu/insights/)
|
|
||||||
|
|
||||||
* [Trusted Timestamping Part 1: Scenarios](https://medium.com/finema/trusted-timestamping-part-1-scenarios-9bf4a7cc2364) Nunnaphat Songmanee, Finema
|
|
||||||
> Evidentiary value is an essential component of important transactions. When a transaction is recorded in a printed document, one way to impart evidentiary value is by including date and time
|
|
||||||
|
|
||||||
* [Survey: How Do You Use Your Identity at Work?](https://findbiometrics.com/survey-how-do-you-use-your-identity-at-work/) FindBiometrics
|
|
||||||
> The COVID-19 pandemic rapidly shifted the way we work, coinciding with digital transformation trends that depend on strong identity assurance. Hybrid workplaces are more common, as is completely remote work
|
|
||||||
|
|
||||||
* [Sandeep Shukla · Professor, Computer Science and Engineering at Indian Institute of Technology, Kanpur](https://www.linkedin.com/feed/update/urn:li:ugcPost:6924705964537389056/) Linkedin
|
|
||||||
> IGNOU (Indira Gandhi National Open University) had their convocation today and they issued more than 60000 degrees and certificates as Self-Sovereign Identity document (Cryptographically verifiable Credential) on [National Blockchain Project](https://www.linkedin.com/company/national-blockchain-project/) and [CRUBN](https://www.linkedin.com/company/crubn/)'s SSI blockchain.
|
|
||||||
* [Self-Sovereign Identity as a Service: Architecture in Practice](https://arxiv.org/pdf/2205.08314.pdf) Yepeng Ding, Hiroyuki Sato, University of Tokyo
|
|
||||||
> We propose a practical architecture by elaborating the service concept, SSI, and DLT to implement SSIaaS platforms and SSI services. Besides, we present an architecture for constructing and customizing SSI services with a set of architectural patterns and provide corresponding evaluations. Furthermore, we demonstrate the feasibility of our proposed architecture in practice with Selfid, an SSIaaS platform based on our proposed architecture.
|
|
||||||
|
|
||||||
* [@tmarkovski Jun 10](https://twitter.com/tmarkovski/status/1535240038803464195)
|
|
||||||
> 1/ Can [QUIC](https://www.akamai.com/blog/news/the-next-generation-of-http) use DIDComm as a Handshake protocol instead TLS1.3? The spec provides enough abstraction for the session handling, and most crypto operations are the same. The main difference is the trust architecture and model: certificate chain vs DID Documents.
|
|
||||||
|
|
||||||
* [SSI Essentials: 35 use cases of decentralized identities that will make your life easier](https://gataca.io/blog/ssi-essentials-35-use-cases-of-decentralized-identities-that-will-make-your-life-easier) Gataca
|
|
||||||
|
|
||||||
* [The Importance of Verifiable Credentials to Training Providers](https://uploads-ssl.webflow.com/6269810a06ae9fafd52556a3/629f94235eabc454ea48c117_The%20Importance%20of%20Verifiable%20Credentials%20for%20Training%20Providers.pdf?__hstc=100632769.d32f75d38c42eaa77409051b21d73653.1655033322879.1655033322879.1655033322879.1&__hssc=100632769.1.1655033322879&__hsfp=2803731784) Credivera
|
|
||||||
> Digital badges or PDF credentials lack proof of being authentic and current, and can be easily reproduced or falsified, impacting both the individual and the reputation of the training provider.
|
|
||||||
|
|
||||||
* [Transferable Accounts Putting Passengers at Risk](https://www.windley.com/archives/2022/06/transferable_accounts_putting_passengers_at_risk.shtml) Phil Windley
|
|
||||||
> The non-transferability of verifiable credential is one of their super powers. This post examines how that super power can be used to reduce fraud and increase safety in a hired car platform.
|
|
||||||
|
|
||||||
* [How Self-Sovereign Identity Helps Your Enterprise](https://zaisan.io/self-sovereign-identity-enterprise/) Zaisan
|
|
||||||
> - Identity is the sum of a lot of individual parts that, when pieced together, paint a comprehensive and multi-layered picture of who someone truly is
|
|
||||||
> - Zaisan’s my.D platform leverages blockchain technology to provide a [comprehensive digital identity management solution](https://myd.online/)
|
|
||||||
> - My.D enables a cost-effective and efficient management solution for an individual’s digital credentials
|
|
||||||
|
|
||||||
* [How Blockchain Technology and Self-Sovereign Identity Enables the New Normal of Remote Learning, Training and Working](https://www.linkedin.com/pulse/how-blockchain-technology-self-sovereign-identity-enables-hossain-) Md Sabbir Hossain
|
|
||||||
|
|
||||||
* [An autonomous reputation system](https://reb00ted.org/tech/20220810-autonomous-reputation-system/) reb00ted
|
|
||||||
> we need to figure out how to give more power to “better” actors within a given community or context, and disempower or keep out the detractors and direct opponents. All without putting a centralized authority in place.
|
|
||||||
|
|
||||||
## Energy Systems
|
|
||||||
|
|
||||||
* [Digital identities – building block for an automated energy system](https://www.smart-energy.com/digitalisation/digital-identities-building-block-for-an-automated-energy-system/) Smart Energy
|
|
||||||
> New features include credential revocation and expiration, full support for role-authorised issuance, credential issuance based on email verification and asset administration as well as better alignment with the W3C’s Verifiable Credential Standards.
|
|
||||||
|
|
||||||
|
|
||||||
* [War Against the Robots – Pick your Side with SelfKey & Metaproof Platform](https://selfkey.org/war-against-the-robots-pick-your-side-with-selfkey-metaproof-platform/) SelfKey Foundation
|
|
||||||
> Trying to ban or sideline bots is not a solution. The solution is to distinguish bots from humans so that humans can do human stuff and bots can do bot stuff.
|
|
||||||
|
|
||||||
|
|
||||||
* [OpenEarth partners with BCGov to develop a digital trust marketplace for climate accounting](https://www.openearth.org/blog/openearth-partners-with-the-government-of-british-columbia-to-develop-a-digital-trust-marketplace-for-climate-accounting) OpenEarth Foundation
|
|
||||||
> OpenEarth Foundation partnered with the Mines Digital Trust initiative to allow BC companies to also share their greenhouse gas (GHG) emissions credentials to the [OpenClimate](https://www.openearth.org/projects/openclimate) platform so that they can be integrated into BC’s subnational climate inventory and showcased to interested purchasers and civic society
|
|
||||||
|
|
||||||
|
|
||||||
* [Event tickets as verifiable credentials](https://lissi-id.medium.com/event-tickets-as-verifiable-credentials-31f4a10b28cc) Lissi
|
|
||||||
> This article explains how verifiable credentials can be used to benefit event organizers and visitors alike based on a practical usage of the Lissi team.
|
|
||||||
|
|
||||||
* [Yes, verifiable authentic human content is important.](https://twitter.com/OR13b/status/1573100718164164610) Orie Steele
|
|
||||||
*The [Content Authenticity Initiative](https://contentauthenticity.org/how-it-works) one of Orie’s favoriate Use-cases for VCS*
|
|
||||||
> I also think cryptography can provide better transparency for synthetic content. It's one of my favorite applications of W3C Verifiable Credentials.
|
|
||||||
|
|
||||||
|
|
||||||
* [Blockchains in HR: Prosoon and Talao go together on SSI and HR credentials](https://medium.com/@talao_io/blockchains-in-hr-prosoon-and-talao-go-together-on-ssi-and-hr-credentials-3b92968011fe) Talao
|
|
||||||
> This partnership will enable the use of Blockchain and Self-Sovereign Identity technologies such as verifiable credentials to enable the support of diplomas and professional certifications in compliance with personal data in a decentralized environment (#web3).
|
|
||||||
|
|
||||||
* [Self sovereign online identity is going to be a CRITICAL tool for everyone on the internet.](https://twitter.com/ericxtang/status/1575645620659900417) EricTang.eth
|
|
||||||
> Without it, we will lose trust of any content on the internet due to AI advancement in the next 12-24 months.
|
|
||||||
>
|
|
||||||
> This one of the most urgent issues in our society today.
|
|
||||||
|
|
||||||
* [Lost and Found: Digital identity Can Be The Difference Between Life And Death For Refugees](https://diacc.ca/2022/09/27/lost-and-found-digital-identity-can-be-the-difference-between-life-and-death-for-refugees/) 2022-09-27 DIACC
|
|
||||||
|
|
||||||
Most Refugees and IDPs did not have the time to properly prepare by gathering all their important documents such as passports, identity cards, driver’s licenses, and land titles or rental agreements. Fleeing your home may save your life, but fleeing without identity documents can lead to a very long wait – sometimes a decade or more – before your life is stable again.
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
* [Creating trust in assertions, claims and the authenticity of the original content](https://liccium.com/) LICCIUM
|
|
||||||
|
|
||||||
* [Coming soon — a resume-validating blockchain network for job seeker](https://www.computerworld.com/article/3675547/coming-soon-a-resume-validating-blockchain-network-for-job-seekers.html#tk.rss_security) Computer World
|
|
||||||
> "Verifying applicant career records can take days, weeks, if not months, to complete," said Dror Gurevich, founder and CEO of the Velocity Network Foundation. "Hiring methods are severely outdated to the point that one in three Americans have [admitted to lying on their resumes](https://t.yesware.com/tt/0db4de0058ee9613cdfcabd5fae96c6ca51e1b7f/275468cd0c53df0b2dfa60dbb913464b/c19e9bd03a563c32bab519acc1fa9f5b/www.resumebuilder.com/1-in-3-americans-admit-to-lying-on-resume/), which slows the hiring process immensely.
|
|
||||||
|
|
Loading…
Reference in New Issue
Block a user