This commit is contained in:
⧉ infominer 2023-06-20 00:07:05 +05:30
parent f06275f8f7
commit 161ed4be04
26 changed files with 466 additions and 801 deletions

View File

@ -20,12 +20,16 @@ last_modified_at: 2023-06-17
> As the world becomes even more connected and more machines are hooked up to the internet, the ability for machines to move, trade and interact securely and efficiently becomes increasingly important to life and business. Todays centralized networks do not enable this. Machines today exist on closed, permission-based environments which massively limit which other machines can be interacted with, what machines can do and where they can go.
* [Self-Sovereign Identity and IoT insights from the Sovrin Foundation](https://insureblocks.com/?p=12699) 2021-09-21 Insureblocks
> Michael Shea is the Managing Director of the Dingle Group and the Chair of Sovrin FoundationsSSI in IoT Working Group. In this podcast we discussed the white paper he authored on Self Sovereign Identity and IoT. To explain the opportunities SSI can provide to IoT, Michael introduces us to three profiles: Jamie (machine to person), Bob (machine to machine) and Bessie the cow (digital twin).
* [Toothbrush Identity](https://www.windley.com/archives/2021/09/toothbrush_identity.shtml) 2021-09 Phil Windey
> Identity finds its way into everything—even toothbrushes. Careful planning can overcome privacy concerns to yield real benefits to businesses and customers alike.
* [Smart Property](https://www.windley.com/archives/2021/08/smart_property.shtml) 2021-08 Phil Windley
> Smart property is much more than the anemic connected things we have now. Smart property imagines a world where every thing participates in digital communities and ecosystems, working through programmable agents under the owners control.
* [Digital Twins and Self-Sovereign Identity: Build the next generation of Simulation with privacy preservation](https://iotpractitioner.com/digital-twins-and-self-sovereign-identity-build-the-next-generation-of-simulation-with-privacy-preservation/) 2021-07-30 IOT Practicioner
> Managing IoT devices and user identities as well as the relationships among various devices and their digital twins face significant challenges. First, a lack of Identity Credential and Access Management (ICAM) standards for IoT creates proprietary standards and a lack of interoperability. Second, the operational lifecycle of IoT devices complicates integration of traditional ICAM. Lastly, ICAM technology must adapt to the proliferation of connected devices. This evolution requires a digital trust framework and the decentralized architecture of Self-Sovereign Identity (SSI).
* [Alternatives to the CompuServe of Things](https://www.windley.com/archives/2021/07/alternatives_to_the_compuserve_of_things.shtml) 2021-07 Phil Windley
> The current model for connected things puts manufacturers in between people and their things. That model negatively affects personal freedom, privacy, and society. Alternate models can provide the same benefits of connected devices without the societal and personal costs.
* [Decentralized identity can bring the analog world into the digital one](https://cointelegraph.com/news/decentralized-identity-can-bring-the-analog-world-into-the-digital-one) 2021-06-20 Cointelegraph
> DID does not require analog objects to become digitized, and it does not need expensive sensors or hi-tech tags to work correctly. Instead, it offers an affordable, reliable and versatile way to take offline items out of the digital blindspot.
* [Relationships in the Self-Sovereign Internet of Things](https://www.windley.com/archives/2020/12/relationships_in_the_self-sovereign_internet_of_things.shtml) 2020-12 Phil Windley
> DIDComm-capable agents provide a flexible infrastructure for numerous internet of things use cases. This post looks at Alice and her digital relationship with her F-150 truck. She and the truck have relationships and interactions with the people and institutions she engages as she co-owns, lends and sells it. These and other complicated workflows are all supported by a standards-based, open-source, protocol-supporting system for secure, privacy-preserving messaging.
* [Distributed Ledger Technologies, IAM, and the Truth in Things](https://www.youtube.com/watch?v=VV2rLgH9TUE) 2019-06-27 Identiverse Robert Brown

View File

@ -67,5 +67,7 @@ last_modified_at: 2023-06-16
> Although the blockchain has long been identified as an opportunity for driving much-needed change in the core processes of the education sector, use cases to date have been limited in scope and execution, with blockchain advocates and education policy makers seemingly disconnected on fundamental issues such as governance, self-sovereignty, interoperability, choice of blockchain platforms and overall trust in standards and the integrity of the infrastructure.
* [Whitepaper, Hyperledger] [Blockchain in the Education Sector](https://potech.global/web/images/Potech%20Labs%20White%20Paper_Blockchain%20in%20the%20Education%20Sector.pdf) 2021-03-23 Potech
> Since most of the educational institutes were facing security crises, new challenges are added to the security system to identify and manage the users access to these platforms.The most relevant challenges include but not limited to, legacy identity infrastructure, student lifecycle and users access complexity and new cyber threats.
* [Report] [APPLYING SELF -SOVEREIGN IDENTITY PRINCIPLES TO INTEROPERABLE LEARNING RECORDS](https://www.uschamberfoundation.org/sites/default/files/media-uploads/Applying%20SSI%20Principles%20to%20ILRs%20Report.pdf) 2020-06 US Chamber Foundation
> SSI technologies and concepts can provide valuable insights to jumpstart our efforts and provide opportunities to improve the talent marketplace for all learners and stakeholders by examining ILR systems potential risks, such as discrimination, manipulation, over-disclosure, tracking, and lock-in/lock-out. Stakeholders should be encouraged to work toward and implement the following principles and tools, when possible, to mitigate risks that are further explained throughout the paper and highlighted below.
* [Report] [CONNECTED IMPACT Unlocking Education and Workforce Opportunity Through Blockchain](https://www.acenet.edu/Documents/ACE-Education-Blockchain-Initiative-Connected-Impact-June2020.pdf?fbclid=IwAR22cl_g-DzoZOEBStwKhrsuQpqqA66ZyZhKdd_4NmER2GyDMXbatuUsUuw) 2020-06 ACE
> This report is the first phase of the Education Blockchain Initiative, funded by the U.S. Department of Education and managed by the American Council on Education (ACE). It summarizes an intensive research project to better understand the application of blockchain, a form of distributed ledger technology, to education. Its content is intended to inform policymakers, technology developers, education practitioners, and workforce entities about the state of and potential of interoperable digital credentials anchored on blockchains. This report also provides guidance to these stakeholders on the effective implementation of blockchain-based digital credentials infrastructure.

View File

@ -119,6 +119,8 @@ last_modified_at: 2023-06-18
> DIWG member countries each have relevant policies and/or legislation which cover their respective approaches towards digital identity, captured through policy, legislative and trust frameworks governing the digital identity systems. For most, trust frameworks and digital identity systems were implemented using existing government policies and legislation as a foundation, for example existing privacy legislation, and broadly align to ISO standards (as defined by the International Organisation for Standardisation), European Union (EU) standards (as defined through the eIDAS regulation) or industry best practice. A similar model was found for technical settings across digital identity systems
* [Blockchain Identity Management Market by End-user, Application, and Geography - Forecast and Analysis 2021-2025](https://www.technavio.com/report/blockchain-identity-management-market-industry-analysis) 2021-07
> This blockchain identity management market research report provides valuable insights on the post COVID-19 impact on the market, which will help companies evaluate their business approaches. Furthermore, this report extensively covers blockchain identity management market segmentations by end-user (BFSI, government, healthcare, and others), application (end-point, network, and infrastructure), and geography (North America, Europe, APAC, South America, and MEA). The blockchain identity management market report also offers information on several market vendors, including Accenture Plc, Amazon.com Inc., Bitfury Group Ltd., BLOCKCHAINS LLC, Broadcom Inc., Civic Technologies Inc., International Business Machines Corp., Oracle Corp., SAP SE, and SecureKey Technologies Inc. among others.
* [Research] [Identity Credential and Personal Data Ownership Perspectives](https://openidentityexchange.org/networks/87/item.html?id=404) 2020-12-10 OIX
> Many global organisations are using their citizens identity and their other personally identifiable information (PII) to help combat the global Covid-19 crisis  […] reignited the debate around protecting public safety vs protecting privacy:  how to combat the contagious threat whilst preserving citizens digital identity, security and anonymity?
* [Disposable Yet Official Identities (DYOI)](https://zenodo.org/record/4016977#.X4NIjy2ZMWq) 2020-09-06 Petros Kavassalis, Nikos Triantafyllou, Panagiotis Georgakopoulos, Antonis Stasis, Rob van Kranenburg
> for Privacy-Preserving System Design - The case of COVID-19 digital document verification and credential-based access control in ad hoc outdoor and indoor settings (and beyond)
> In this paper we report on the design of a service system to endow next-generation COVID-19 mobile applications with the capacity: a) to instantly manage and verify a wide range of possible COVID-19 digital documents (circulation attestations, work or travel permits based on approved COVID-19 tests, vaccination certificates, etc.) and, b) to provide credential-based access control, especially in cases where the Verifier is not a web entity but a human agent with a smartphone, or an IoT device -- mainly in ad hoc outdoor and indoor settings. The system has been designed as a response to the specific needs of a health emergency situation, but it may have a broader application in different cased and areas of control (such as airport and train stations checking points and board controls), where the verification process must exclude the possibility of a physical interaction between the controller and the subject of control, by maintaining a “safe distance” between them and while preserving a certain privacy for the subject of control. Our approach levers the potential of Disposable Identities, Self-Sovereign Identities technologies and Verifiable Credentials (VCs) to enable digital document verification and credential-based access control in ad hoc outdoor and indoor settings (and beyond). Towards this, we specifically introduce the concept of “Derivative” (i.e., transcoded/contextual) Verifiable Credentials. A Derivative VC is a derived bond contract guaranteeing the validity and ownership over the underlying contracts (VCs) whose: a) usability is restricted in a very specific context (that of the “local” and time-limited interaction between a Subject and a Service Provider) and, b) linking table points only to a specific “Pairwise DID”.

View File

@ -7,7 +7,7 @@ layout: single
permalink: application/use-cases/
canonical_url: 'https://decentralized-id.com/application/use-cases/'
categories: ["Application"]
tags: ["Content Attribution","Events","Climate","Bots","IAM","Reputation","Workplace","Record Keeping","Energy Systems","Property Management","Gaming","Business","Career","Security","Banking","Loyalty Programs"]
tags: ["Content Attribution","Events","Climate","Bots","IAM","Reputation","Workplace","Energy Systems","Property Management","Gaming","Business","Career","Security","Banking","Loyalty Programs"]
last_modified_at: 2023-06-18
---
@ -30,10 +30,13 @@ last_modified_at: 2023-06-18
> 6 stories of how verifiable credentials can improve the lives of every day people:
>
> Ajay is an Uber driver in San Francisco. He wants to try various temporary jobs while hes studying but joining Lyft, Postmates and other platforms requires going through a long and tedious background verification and car certification process over and over again.
* [Digital Identity Isnt Only For People](https://www.forbes.com/sites/davidbirch/2020/12/22/digital-identity-isnt-only-for-people/) 2020-12-22 David Birch, Forbes
> fintechs and regtechs looking for opportunities in the digital identity space should cast their ideas net pretty wide. Digital identities are not only for people and the future desperately needs digital identities for pretty much everything to underpin recognition, relationships and reputation (the 3Rs of the online economy).
* [5 Promising Use Cases for Verifiable Credentials](https://hackernoon.com/5-promising-use-cases-for-verifiable-credentials-tu1y348k) 2020-12-05 Hackernoon
> several industries are already digging in. Here are some of the most visible and promising use cases.
* [SSI Essentials: 35 use cases of decentralized identities that will make your life easier](https://gataca.io/blog/ssi-essentials-35-use-cases-of-decentralized-identities-that-will-make-your-life-easier) Gataca
* [SSI Essentials: 35 use cases of decentralized identities that will make your life easier](https://gataca.io/blog/ssi-essentials-35-use-cases-of-decentralized-identities-that-will-make-your-life-easier) 2022-04-07 Gataca
> It is not farfetched to assume that we all strive to perform routine activities in the most simple and efficient way. This can include relatively easy activities such as logging in to your student/employee portal and shopping online or slightly more complex activities such as opening a bank account, renting an apartment, or applying to a masters program or job.
## Use Cases
### Career
* [Coming soon — a resume-validating blockchain network for job seeker](https://www.computerworld.com/article/3675547/coming-soon-a-resume-validating-blockchain-network-for-job-seekers.html#tk.rss_security) 2022-10-05 Computer World
@ -67,9 +70,13 @@ last_modified_at: 2023-06-18
> Without it, we will lose trust of any content on the internet due to AI advancement in the next 12-24 months.
>
> This one of the most urgent issues in our society today.
* [Adobe Coalition for Content Provenance and Authenticity at LF, Wacom and IdentityNet](https://www.youtube.com/watch?v=_YDP-lAewis) 2021-11-19 Connected Ink
> SSI has the power to change the world for the better by flipping the power dynamic surrounding digital identities and trust from large corporations and governments back to the individual. This technology empowers individuals and communities to take back control of both their personal data as well as of their digital assets and identities, and decide exactly how and when this information is to be used and shared. This session explores how SSI-based ecosystems are built and how this transition benefits both individuals and the wider global community.
* [Creating trust in assertions, claims and the authenticity of the original content](https://liccium.com/) LICCIUM
> Introducing Liccium Trust Engine the next generation rights and media asset management for the web3. With Liccium, content creators can digitally sign their original creative works to increase trust in claims and attribution.
* [Why all living artists should create their provenance and self-sovereign identity with their art?](https://artracx.medium.com/why-all-living-artists-should-create-their-provenance-and-self-sovereign-identity-with-their-art-fffb03720c40) 2022-03-01 Artracx
> This self-sovereign capability of associating the artist, the collector and the art work itself with an identity — creates value for everyone. We did also share that the opportunity of secondary sale income / commission that could be attributed back to him as the original artists is also possible (albeit very complicated).
### Events
* [Event tickets as verifiable credentials](https://lissi-id.medium.com/event-tickets-as-verifiable-credentials-31f4a10b28cc) 2022-09-22 Lissi
> This article explains how verifiable credentials can be used to benefit event organizers and visitors alike based on a practical usage of the Lissi team.

View File

@ -44,16 +44,21 @@ We went through the paywall so you dont have to - SSI only mentioned once. Fr
> - [cheqd launch](https://cheqd.io/blog/cheqd-launches-mainnet-network/)
* [Top 5 digital identity trends injecting trust back into governance](https://www.openaccessgovernment.org/digital-identity-trends/125013/) 2021-11-29 Open Access Government
> As early SSI use cases develop and legal and political institutions evolve, the reality of impactful, integrated SSI systems becomes more tangible. Such use cases include privacy-preserving vaccination certificates, digital identity wallets, and decentralised data verification and certification services that streamline processes like visa applications and workplace credential checks.
* [Is Self-Sovereign Identity Going Exponential?](https://www.youtube.com/watch?v=xWy0rP8uTiU&t=2406s) 2021-10-27 Sybrin [Recap](https://corporate.sybrin.com/webinar-SSI)
> with [Andrew Baker](https://www.linkedin.com/in/andrew-baker-b1357939/), Head of EC2 Engineering at AWS, and [Lohan Spies](https://www.linkedin.com/in/lohanspies/), Chair of the [Sovrin Steward Council](https://sovrin.org/join-the-new-sovrin-steward-council/), they explore the concept of Self-Sovereign Identity (SSI) in detail, discussing what profound implications SSI will have and whether it is indeed the next game changer?
* [How Verifiable Credentials Can Rebuild Trust On The Internet](https://www.forbes.com/sites/forbestechcouncil/2020/12/18/how-verifiable-credentials-can-rebuild-trust-on-the-internet/) 2020-12-18 Forbes
> Berners-Lee recently suggested that the web needs a midcourse correction. Part of that change involves making systems accountable and making it easy for users to find where information comes from. Verifiable credentials promise major strides in that direction.
* [Thoughtworks put Decentralized Identity into the "Assess" category of their technology radar map](http://web.archive.org/web/20201120201821/https://www.thoughtworks.com/radar/techniques?blipid=202005083) 2020-05-19 Thoughtworks Technology Radar
> Adopting and implementing decentralized identity is gaining momentum and becoming attainable. We see its adoption in privacy-respecting customer health applications, government healthcare infrastructure and corporate legal identity.
* [Self-sovereign identity](https://en.m.wikipedia.org/wiki/Self-sovereign_identity) 2020-06 Wikipedia - WE have a wikipedia article!
* [Self Sovereign Identity - A glossary of distributed technologies](https://policyreview.info/open-abstracts/self-sovereign-identity) 2020-05-18 Policy Review
> Released by the Internet Policy Review Journal on Internet Regulations received an entry on Self-Sovereign Identity By Alexandra Giannopoulou & Fennie Wang
## Market Signals
* [Decentralized Identity Market Signals](https://indicio.tech/decentralized-identity-market-signals/) 2022-05-25 Tim Spring Indicio
> In this rapid fire review we will take a look at, and break down, the biggest recent stories in digital identity and what they could mean for business and the average person using the internet.
* [The Shape of your Identity](https://stateofidentity.libsyn.com/the-shape-of-your-identity) 2022-03-17 State of Identity Podcast
> How are personal data and digital identity reshaping society? [...] Cameron D'Ambrosi is joined by Michael Becker, CEO of Identity Praxis, to discuss the evolution of the identity industry, the latest trends to follow (or flee), and predictions for the future of both consumer and enterprise digital identity.
* [The Market Opportunity for Reusable Identity and How to Get There](https://liminal.co/reports/market-opportunity-for-reusable-identity/) 2022-02-03 Liminal
> The Total Addressable Market is $32.8B in 2022, to reach $266.5B by 2027, with a CAGR of 68.9%. Today, the market is still nascent but is posed for strong growth.
* [Institutions digitising credentials, but blockchain use remains low](https://thepienews.com/news/digitising-credentials-blockchain-use/) 2021-05-17 The Pie News [Research](https://www.aacrao.org/research-publications/aacrao-research/meeting-the-moment-transforming-the-digital-credentials-space)
@ -76,6 +81,8 @@ We went through the paywall so you dont have to - SSI only mentioned once. Fr
* [Nice overview, somewhat questionable assumptions](https://twitter.com/UbikomProject/status/1405945396208209932) 2021-06-18 UbikomProject
* [To Succeed In Decentralizing Digital Identity, Focus On Relationships First](https://www.forbes.com/sites/forbestechcouncil/2021/06/16/to-succeed-in-decentralizing-digital-identity-focus-on-relationships-first/?sh=6f133ef11824) 2021-06-16 Forbes
> when it comes to consumers of services, we need to think about identity in terms of building and maintaining trusted digital relationships. With adtech cookies in the regulatory crosshairs, and our research finding that 70% of consumers prefer apps that won't sell their personally identifiable information, we can't afford to think in terms of one-time purchases or disappointing experiences. Many consumers need to manage person-to-person and person-to-device relationships, too. We're not alone in this connected world.
* [The Growth Factors of Self Sovereign Identity](https://medium.com/@SSI_Ambassador/the-growth-factors-of-self-sovereign-identity-33aa3cc17ce7) 2020-08-14 Adrian Doerk
> The post details 5 components necessary for the advance of SSI: Business, Technology, User Experience, Compliance, and Governance.
* [Why self-sovereign identity will get adopted (and its not the reason you probably want)](https://www.tuesdaynight.org/2018/06/15/why-self-sovereign-identity-will-get-adopted-and-its-not-the-reason-you-probably-want/) 2018-06-15 Tuesday Night
> In the payment card world, there are clear guidelines on personal liability. $50 if you use credit and up to $500 for debit depending on when you report the issue. Based on that, different people choose to use different “systems.”
>
@ -87,3 +94,5 @@ We went through the paywall so you dont have to - SSI only mentioned once. Fr
> ![](https://pbs.twimg.com/media/EwhlfT-XEAE672y?format=jpg&name=large)
* [4 Keys to Self-sovereign Identity Adoption](https://medium.com/trinsic/4-keys-to-self-sovereign-identity-adoption-ad269b208569) 2021-01-19 Trinsic
> Many implementers wont realize the potential of SSI until its deployed at scale, but in order to get to scale, we need implementers to realize value. Its the classic chicken & egg problem.
* [The challenge for self-sovereign identity (SSI)](https://nickbyrne.substack.com/p/the-challenge-for-self-sovereign) 2020-09-10 Nick Byrne
> The reason why we have seen less uptake in SSI solutions is because the people behind these solutions fail to recognise the design principles that will be most important to its success. Instead, we see people focusing on technological nirvanas like blockchain or an over-emphasis on governance.

View File

@ -18,12 +18,29 @@ toc: false
* [curated list] [Peacekeeper's Blockchain and Identity](https://github.com/peacekeeper/blockchain-identity) 2021-11-23
* [Identity Blockchains and Energy Consumption](https://indicio.tech/identity-blockchains-and-energy-consumption/) 2021-10-19 Indicio
A decentralized network using a blockchain-based distributed ledger means you can use [Peer DIDs](https://identity.foundation/peer-did-method-spec/) to move most “transactions” and their cryptographic proofing off ledger. This means that for those peer-to-peer interactions, identity blockchains dont need to do any ledger transactions at all.
* [NIST CYBERSECURITY WHITE PAPER] [**_A Taxonomic Approach to Understanding Emerging Blockchain Identity Management Systems_**](https://arxiv.org/pdf/1908.00929.pdf) 2019-06-09
> Identity management systems (IDMSs) are widely used to provision user identities while managing authentication, authorization, and data sharing both within organizations as well as on the Internet more broadly. Traditional identity systems typically suffer from single points of failure, lack of interoperability, and privacy issues such as encouraging mass data collection and user tracking. Blockchain technology has the potential to support novel data ownership and governance models with built-in control and consent mechanisms, which may benefit both users and businesses by alleviating these concerns; as a result, blockchain-based IDMSs are beginning to proliferate. This work categorizes these systems into a taxonomy based on differences in architecture, governance models, and other salient features. We provide context for the taxonomy by describing related terms, emerging standards, and use cases, while highlighting relevant security and privacy considerations.
* [Self Sovereign Identity ≠ Blockchain](https://jolocom.io/blog/dezentrale-identitaten-%e2%89%a0-blockchain-2/) 2021-11-09 Jolocom
> Due to the ID-Wallet project in Germany, some articles and comments have equated Self Sovereign Identity (SSI) with blockchain technology in the last few weeks. The impression is given that SSI only works in conjunction with a blockchain. Spoiler, thats not the case.
* [tweet thread] [Technically you're right. Blockchain is not inherent to DIDs](https://twitter.com/Steve_Lockstep/status/1425924860312645633) 2021-08-13 Steve Wilson
> Most DID presentations (as with much SSI) open with a bit of a disclaimer that these technologies don't need blockchain. And yet the word-association is strong. Many DID block diagrams feature a blockchain. -/2
* [Legitimacy and Decentralized Systems](https://www.windley.com/archives/2021/04/legitimacy_and_decentralized_systems.shtml) 2021-04 Windley
> Why are some decentralized systems accepted and widely used while others wither? Why do some “hard forks” succeed while others fail? It all comes down to legitimacy.
* [Why Distributed Ledger Technology (DLT) for Identity?](https://www.hyperledger.org/blog/2021/04/21/why-distributed-ledger-technology-dlt-for-identity) 2021-04-21 Hyperledger
> So why DLT? First, we can get the good parts of paper credentials—private transactions between holders and verifiers and no callback to the issuer. Second, the issuer gets a trusted, open and transparent way to publish the cryptographic material needed for those private holder-verifier transactions. Third, there is no need to have a “Trusted Third Party” participating in the interactions.
>
> And did I mention, no private data goes on the DLT!!!
* [Digital Identity and Blockchain Its Place in Newer Identity Models](https://cyber.ee/blog/2021/04-21/) 2021-04-21
> In the [first part of this series](https://cyber.ee/blog/2021/04-14/), we introduced the idea that traditional PKI-based digital identity solutions can potentially benefit from blockchain technology.
> [...]
> For this next part of the series, well touch on the relatively new idea of self-sovereign identity, or SSI.
* [Blockchain is the Least Interesting Thing About Self-sovereign Identity](https://medium.com/trinsic/blockchain-is-the-least-interesting-thing-about-self-sovereign-identity-75c1b56ce497) 2020-09-23 Riley Huges
> as useful as blockchain is for SSI, its nowhere near as interesting as:
> - The impact on the internet
> - The benefits of technical standards
> - The economic opportunity for early innovators
* [Identity and Distributed Ledger - Today and Tomorrow - June 26 - Identiverse 2019](https://www.youtube.com/watch?v=l04AHP7kPPw) 2019-06-26
> Join our expert panel, moderated by Paul Madsen, as they discuss and debate the future of distributed identity technology and its applications in solving identity problems.
* [Phil Windley (@windley)](https://twitter.com/windley/status/1071469217650638848) 2018-12-09
> If ledger isnt used, then every issuer of a credential has to maintain infrastructure or contract service provider to respond to DID resolution & revocation requests. And, credential issuers would know when the credential was used, impacting privacy.
* [If ledger isnt used, then every issuer of a credential has to maintain infrastructure](https://twitter.com/windley/status/1071469217650638848) 2018-12-09 Phil Windley
> or contract service provider to respond to DID resolution & revocation requests. And, credential issuers would know when the credential was used, impacting privacy.
* [Part 3: Blockchange and Identity The Foundational Use Case](https://blockchan.ge/fieldreport/identity.html) GovLab 2018-11-01
> The contemporary IAM literature focuses on two central types of identity. The first is foundational identity, which is usually equated with legal identity. Here, after collecting attributes, individuals are issued a unique ID that is legally recognized at the national level and can be used to access different services. Legal IDs are almost always issued by the state in a centralized fashion. National ID cards are perhaps the best example of a foundational identity.
>
@ -37,10 +54,15 @@ toc: false
> There were 15 direct responses and then a whole lot of subthreads.
* [Blockchain-Anchored Identity A Gateway to Decentralized Apps and Services](https://www.youtube.com/watch?v=hUYpvI43bHA) 2017-05-10 Daniel Buchner
> Blockchains possess unique properties that can be used to build systems that significantly impact our world. Perhaps no area of utilization, besides raw value exchange, is as intriguing as decentralized identity. In this talk we will discuss how blockchain-anchored decentralized identity can be used as a substrate for secure, user-centric apps and services.
* [Towards Self-Sovereign Identity using Blockchain Technology](https://essay.utwente.nl/71274/1/Baars_MA_BMS.pdf) 2016-10-26
> Blockchain technology could function as the foundation of such system being a network for decentralized trust and exchange. Because everyone can participate as issuer or acquirer (and both), there are low adoption barriers and low costs. This allows new business opportunities for governments, banks and other authorities and more transparency and control for end-users.
* [Self-Sovereign Identity and the Legitimacy of Permissioned Ledgers](http://www.windley.com/archives/2016/09/self-sovereign_identity_and_the_legitimacy_of_permissioned_ledgers.shtml) 2016-09
> This post justifies the claim that an identity system based on a permissioned distributed ledger is legitimately self-sovereign. The post also examines the claims to legitimacy that social login and distributed ledger identity systems make.
* [Blockchain for Identity - Myth or Potential](https://www.kuppingercole.com/blog/kuppinger/blockchain-for-identity-myth-or-potential) 2018-06-16
> Authentication might definitely become simpler, by having various authenticators and IDs, from eIDs to social logins, associated with a wallet. Just one simple store to get access. Yes, there are challenges in creating secure, easy-to-use wallets, but there is potential as well.
![](https://i.imgur.com/YSyv11h.png)
## Literature
* [NIST CYBERSECURITY WHITE PAPER] [**_A Taxonomic Approach to Understanding Emerging Blockchain Identity Management Systems_**](https://arxiv.org/pdf/1908.00929.pdf) 2019-06-09
> Identity management systems (IDMSs) are widely used to provision user identities while managing authentication, authorization, and data sharing both within organizations as well as on the Internet more broadly. Traditional identity systems typically suffer from single points of failure, lack of interoperability, and privacy issues such as encouraging mass data collection and user tracking. Blockchain technology has the potential to support novel data ownership and governance models with built-in control and consent mechanisms, which may benefit both users and businesses by alleviating these concerns; as a result, blockchain-based IDMSs are beginning to proliferate. This work categorizes these systems into a taxonomy based on differences in architecture, governance models, and other salient features. We provide context for the taxonomy by describing related terms, emerging standards, and use cases, while highlighting relevant security and privacy considerations.
* [Towards Self-Sovereign Identity using Blockchain Technology](https://essay.utwente.nl/71274/1/Baars_MA_BMS.pdf) 2016-10-26
> Blockchain technology could function as the foundation of such system being a network for decentralized trust and exchange. Because everyone can participate as issuer or acquirer (and both), there are low adoption barriers and low costs. This allows new business opportunities for governments, banks and other authorities and more transparency and control for end-users.

View File

@ -1,6 +1,6 @@
---
date: 2019-03-01
title: Decentralized Identity and the Public Sector
title: Governments and Decentralized Identity
description: "Assorted Resources Related to Blockchain and Identity for Government and the Public Sector."
excerpt: "Modern identity and access management (IAM) came into focus during the late 1930s, when a group of European countries began issuing national ID cards. During this time, creating a more systematic approach for establishing and authenticating the official use of trusted identities emerged."
layout: single
@ -16,15 +16,23 @@ header:
image: /images/blockchange-identity-header.webp
caption: "[On the Emergent Use of Distributed Ledger Technologies for Identity Management](https://blockchan.ge/blockchange-fieldreport.pdf)"
categories: ["Regional"]
tags: ["Global","Tokyo","China","Korea","Latin America","Japan","Africa"]
tags: ["Government","Global","Tokyo","China","Korea","Latin America","Japan","Africa"]
last_modified_at: 2023-06-06
toc: false
toc: true
toc_sticky: false
---
## Explainer
* [Its time for digital self-sovereign identity](https://gcn.com/emerging-tech/2022/08/its-time-digital-self-sovereign-identity/375285/) 2022-08 GCN
> But while digital IDs may offer residents convenience, they also open the flood gates for fraud and identity theft. Thats because to verify an individuals information, agencies and businesses must collect, validate and store massive amounts of personal information. These large caches of personal information are prime targets for cyberattacks.
* [Impacts from a new reality drive the need for an enhanced digital identity framework](https://bankautomationnews.com/allposts/risk-security/impacts-from-a-new-reality-drive-the-need-for-an-enhanced-digital-identity-framework/) 2022-02-28 Bank Automation News
> While US-based entities are adhering to an enhanced regulatory framework, these mandates are particularly applicable in Europe, where there is necessary compliance with enacted standards (such as the General Data Protection Regulation—commonly known as GDPR—and the Payment Service Providers Directive 2—referred to as PSD2. A clear need for a true and persistent digital identity as a solution to the ancillary—and sometimes unforeseen—challenges that have arisen.
* [Decentralized Identity & Government](https://www.youtube.com/watch?v=l8pHUdjKfes) Evernym 2021-12-08
> The key differences between federated and decentralized identity systems - An analysis of a few notable government-led projects, such as Aadhaar (India), Verify (UK), eIDAS (EU), and the Ontario Digital Identity Program (Canada) - What decentralization means for portability, scalability, flexibility, and privacy - How governments and commercial organizations can enhance existing federated identity systems with verifiable credentials
* [Self-Sovereign Identity (SSI) schemes and the public sector](https://www.impulse-h2020.eu/2021/11/05/self-sovereign-identity-ssi-schemes-and-the-public-sector/) Impulse H20 2021-11-05
> While the structural difference between SSI approaches and conventional centralised or federated eID schemes is, on one level, profound (full control over data and identity with the user; no third-party intermediary between the user and the service provider), on another level, these differences may also appear highly abstract to ordinary users. What societal and economic consequences they may unfold remains, so far, little understood, also because research on the real social and economic effects of SSI solutions is only beginning.
* [Verifying documents & identity in the public services and beyond](https://www.openaccessgovernment.org/w3c-verifiable-credentials-verifying-documents-identity/123049/) 2021-10-25 OpenAccessGovernment  David Chadwick
> A particularly useful aspect of the Verifiable Credentials standard is that the parties undertake the specific roles of Issuer, Holder or Verifier, but they are not constrained in how many roles, or when, they can employ them. Each party can be a device, a person or an institution, meaning that verifications can take place directly between automated systems, even verifying that each other is genuine before establishing a connection to share data
* [Digital Identity Around the World: Why Some Countries are Embracing Self Sovereign Identity Quicker](https://hackernoon.com/digital-identity-around-the-world-why-some-countries-are-embracing-self-sovereign-identity-quicker) 2021-09-03 Hackernoon
> Each government moves at its own pace for as many reasons as there are countries, and digital identity/SSI will only become a reality once governments voice their support, regulations, and standards are adopted, infrastructure is created or upgraded, and interoperability, inclusion, and education are all addressed.
* [Navigating Digital Identity in Political Economies RxC Panel](https://identitywoman.net/navigating-digital-identity-in-political-economies-rxc-talk/) 2021-08-25 IdentityWoman.net
@ -39,6 +47,8 @@ toc: false
> When it comes to identity management the involvement of the government can be a tricky topic. It needs to be involved to enable access to public services, adapt legislature and guarantee equal access for its citizens. However, it should not be able to control or monitor all aspects and activities of its citizens. Self-sovereign identity (SSI) might for some imply, that a citizen is suddenly able to issue his own ID-card, which isnt the case. Governments are still the primary source of foundational identities."
* [Data: Governance and Geopolitics](https://www.mydigitalfootprint.com/2021/01/data-governance-and-geopolitics.html) 2021-01-16 Tony Fish
> How data is governed can be thought of along several lines of activity: legislating privacy and data use, regulating content, using antitrust laws to dilute data monopolies, self-regulating by the tech giants, regulating digital trade, addressing intellectual property rights (IPR) infringement, assuring cybersecurity, and practicing cyber diplomacy. Of these, antitrust, regulation, and privacy are most immediately in the spotlight, and are the focus of this commentary, but it will also touch briefly on the connections with other issues.
* [Do we really need (or want) the State to provide us with digital identification?](https://www.libertarianism.org/articles/self-sovereign-identity-blockchain-age) 2020-07-20 Libertarianism
> Just as the State still manages our “analog” identities, the online giants have vast power to manage the online data and identity of their users. Internet users are now both consumer and product: by using free online services, users feed companies with data, which those companies in turn process and monetize.
* [Its time for governments to get serious about digital identities](https://www2.deloitte.com/global/en/pages/risk/articles/solving-the-public-sector-identity-crisis.html?id=global:2sm:3tw:4dcom_share:5awa:6dcom:risk) 2020-02-25 Deloitte
> While the tools may already exist to solve the governments identity crisis, real progress will only be made if governments significantly evolve their legacy approaches to digital identity.
* [The Digital Identity Crisis and what it means for Governments and individuals](https://procivis.ch/2019/11/18/the-digital-identity-crisis-and-what-it-means-for-governments-and-individuals/) 2019-11-18 ProCivis

View File

@ -15,19 +15,6 @@ last_modified_at: 2023-06-07
* [Dynamic Data Economy Presented to Technology Consortium in India](https://humancolossus.foundation/blog/dde-amp-hasgeek) 2023-06-09 HumanColossus Foundation
> The "Data Governance and Semantics" project featured three webinars introducing DDE as a decentralised trust infrastructure acutely aligned with the current movement toward data exchange models in the Economic domain where actors regain transactional sovereignty to share accurate information bilaterally.
## Application
* [Real World] [Sandeep Shukla · Professor, Computer Science and Engineering at Indian Institute of Technology, Kanpur](https://www.linkedin.com/feed/update/urn:li:ugcPost:6924705964537389056/) Linkedin
> IGNOU (Indira Gandhi National Open University) had their convocation today and they issued more than 60000 degrees and certificates as Self-Sovereign Identity document (Cryptographically verifiable Credential) on [National Blockchain Project](https://www.linkedin.com/company/national-blockchain-project/) and [CRUBN](https://www.linkedin.com/company/crubn/)'s SSI blockchain.
## Kochi
* [Hyperledger KochiOrgBook Meetup](https://www.youtube.com/watch?v=HU0zXKiFYD0) 2020-10-27 (modeled after [BCGov Orgbook](https://www.orgbook.gov.bc.ca/search)), in collaboration with Wipro, CUSAT, and KBA.
> “KochiOrgBook is a Verifiable Organization Network for the city of Kochi [India]. It is a technology demonstrator to launch a DID based utility compliant with the ToIP standards to enable trusted digital verification for various associations within the city of Kochi.”
* [The KochiOrgBook Association Wallet](https://hyperledgerkochi.github.io/KOBAW/)
> KochiOrgBook Association Wallet(KOBAW) is an online directory that makes finding authentic and authoritative data about associations faster and easier. Association Wallet is a searchable database, where the verifiable credentials of associations under the jurisdiction of Kochi are stored in a decentralized manner. The KOBAW provides all the services offered by a Association authorized to work in Kochi. If a citizen want to be part in an association then, a request for enrolling is moved from the KOB Connect App to KOB Association Wallet. KOBAW process various claim requests.
* [The Orgbook for Kochi](https://github.com/hyperledgerkochi/KochiOrgBook) 2021-09-04
> KOB includes [Decentralized Identity(DID)](docs/gf_controlled/glossary.md#did-decentralized-identifier) based [Public Identiy Utility (KOBPIU)](docs/gf_info/sub_projects.md#kochiorgbook-public-identity-utility-kobpiu) network, [A Verifiable Organizations Network(KOBVON)](docs/gf_info/sub_projects.md#kobvon) for Associations in Kochi, [Association Wallet Application(KOBAW)](docs/gf_info/sub_projects.md#kochiorgbook-association-wallet-kobaw), DID based [Mobile Wallet for Citizens(KOBConnect)](docs/gf_info/sub_projects.md#kobconnect) and a [community cloud (KOBCC)](docs/gf_info/sub_projects.md#kochiorgbook-community-cloud-kobcc).
## Background
* [Identity in the 21st Century India: Where are we?](http://web.archive.org/web/20220207113647/https://www.crubn.com/_files/ugd/3e90e2_82e2de11e1194f1c93ed68c411d78564.pdf?index=true) 2022-02-06 Crubn
@ -36,10 +23,12 @@ last_modified_at: 2023-06-07
> However, all of this has not proceeded without dissent and challenges. The 2018 Supreme Court verdict limited Aadhaar authentication only to public service delivery and taxation purposes, prohibiting even its voluntary use in the private sector.
* [India-stack and self-sovereign identity](https://www.youtube.com/watch?v=of-iuDZpWuA) EUBS 2022
> A panel discussion with Akhilesh Srivastava (IT Advisor at Government of Uttarakhand), Mallikarjun Karra (Director of Research And Partnerships at Timechain Labs), Prof. Sandeep Shukla (Computer Science & Engineering at Indian Institute of Technology Kanpur), Swapnil Pawar (Founder of Newrl) and Ishan Roy (Head of Blockchain at Tamil Nadu E-Governance Agency)
* [Self Sovereign Identities](https://www.academia.edu/7401699/Self_Sovereign_Identities) RISHABH GARG, 2021
> The book encompasses the physical or paper forms of identity, together with the benefits and pitfalls of Aadhaar - a multimillion biometrics enabled UID project of the Government of India. Taking into account the central, federated and self-sovereign models of digital identity, the self-sovereign model has been explained, in detail, for identification and access management leveraging blockchain technology.
* [Revisiting the non-personal data governance framework](https://www.orfonline.org/expert-speak/data-development-revisiting-non-personal-data-governance-framework/) 2020-12-30
> In July 2020, an expert committee established by the Ministry of Electronics and Information Technology (MEITY) released a report on the Non-Personal Data (NPD) governance framework for India. The document is well-intentioned in that it recognises the public value of data, and the need to democratise its use.
* [Self-sovereign identity system: Blockchain-based tech for identity verification](https://www.youtube.com/watch?v=Q7IhaY4eKEc) 2021-12-28 Economic Times
> Professor Manindra Agrawal, Department of CSE, IIT Kanpur, explains how the self-sovereign identity system can ease issues like certification, verification and eliminate forgery of identity using blockchain technology.
* [Self Sovereign Identities](https://www.academia.edu/7401699/Self_Sovereign_Identities) RISHABH GARG, 2021
> The book encompasses the physical or paper forms of identity, together with the benefits and pitfalls of Aadhaar - a multimillion biometrics enabled UID project of the Government of India. Taking into account the central, federated and self-sovereign models of digital identity, the self-sovereign model has been explained, in detail, for identification and access management leveraging blockchain technology.
* [Practising data stewardship in India, early questions](https://www.adalovelaceinstitute.org/blog/practising-data-stewardship-in-india/) 2020-10-23
> Another functional question that needs to be resolved concerns how we communicate the value of data stewardship as an ideal, and relatedly the value of data itself. Given the unequal relationships between technology companies and people, the fact that data is a valuable resource that can be used for negotiation is still not necessarily understood. For instance, drivers on ride-hailing applications are forced to part with significant data that is used to generate profits for companies, but the drivers who are struggling for social security, and labour rights are not equipped to also bargain for data rights.
* [How can India spur a self sovereign identity revolution?](https://community.nasscom.in/communities/emerging-tech/how-can-india-spur-a-self-sovereign-identity-revolution.html) 2019-11-04 Sharat Chandra
@ -47,3 +36,16 @@ last_modified_at: 2023-06-07
* [Exploring Self Sovereign Identity in India](https://www.windley.com/archives/2018/07/exploring_self-sovereign_identity_in_india.shtml) 2018-07 Phil Windley
> In a multi-source identity world, Aadhaar is just one more (important) credential that Indian citizens would hold in their wallets. The other government issued documents that are used, for example, in the food distrubtion system could also be in the wallet. Aadhaar doesn't have change how it works now, but simply issue a verifiable credential based on the Aadhaar identity. Once they're available as verifiable credentials, they could be used in any digital scenario where foundation identity information is needed. As a bonus, thanks to minimal disclosure, most of the time the Aadhaar number wouldn't even have to be disclosed.
## Application
* [Real World] [Sandeep Shukla · Professor, Computer Science and Engineering at Indian Institute of Technology, Kanpur](https://www.linkedin.com/feed/update/urn:li:ugcPost:6924705964537389056/) Linkedin
> IGNOU (Indira Gandhi National Open University) had their convocation today and they issued more than 60000 degrees and certificates as Self-Sovereign Identity document (Cryptographically verifiable Credential) on [National Blockchain Project](https://www.linkedin.com/company/national-blockchain-project/) and [CRUBN](https://www.linkedin.com/company/crubn/)'s SSI blockchain.
### Kochi
* [Hyperledger KochiOrgBook Meetup](https://www.youtube.com/watch?v=HU0zXKiFYD0) 2020-10-27 (modeled after [BCGov Orgbook](https://www.orgbook.gov.bc.ca/search)), in collaboration with Wipro, CUSAT, and KBA.
> “KochiOrgBook is a Verifiable Organization Network for the city of Kochi [India]. It is a technology demonstrator to launch a DID based utility compliant with the ToIP standards to enable trusted digital verification for various associations within the city of Kochi.”
* [The KochiOrgBook Association Wallet](https://hyperledgerkochi.github.io/KOBAW/)
> KochiOrgBook Association Wallet(KOBAW) is an online directory that makes finding authentic and authoritative data about associations faster and easier. Association Wallet is a searchable database, where the verifiable credentials of associations under the jurisdiction of Kochi are stored in a decentralized manner. The KOBAW provides all the services offered by a Association authorized to work in Kochi. If a citizen want to be part in an association then, a request for enrolling is moved from the KOB Connect App to KOB Association Wallet. KOBAW process various claim requests.
* [The Orgbook for Kochi](https://github.com/hyperledgerkochi/KochiOrgBook) 2021-09-04
> KOB includes [Decentralized Identity(DID)](docs/gf_controlled/glossary.md#did-decentralized-identifier) based [Public Identiy Utility (KOBPIU)](docs/gf_info/sub_projects.md#kochiorgbook-public-identity-utility-kobpiu) network, [A Verifiable Organizations Network(KOBVON)](docs/gf_info/sub_projects.md#kobvon) for Associations in Kochi, [Association Wallet Application(KOBAW)](docs/gf_info/sub_projects.md#kochiorgbook-association-wallet-kobaw), DID based [Mobile Wallet for Citizens(KOBConnect)](docs/gf_info/sub_projects.md#kobconnect) and a [community cloud (KOBCC)](docs/gf_info/sub_projects.md#kochiorgbook-community-cloud-kobcc).

View File

@ -144,8 +144,6 @@ last_modified_at: 2023-06-05
## Industry Insights
* [DIACC Industry Insights: Digital ID in Government Services](https://diacc.ca/wp-content/uploads/2019/11/Industry-Insights-Digital-ID-in-Government-Services_Nov-2019.pdf) 2019-11
* [Smart cities need user centric digital id to be built on foundational principles](https://diacc.ca/2019/11/22/smart-cities-need-user-centric-digital-id-to-be-built-on-foundational-principles/) 2019-11
> DIACC firmly believes in user-centred digital ID designed to prioritize and require user choice, control and consent regarding access to collect and manage data. As Sidewalk Labs looks to move forward in their work in Waterfront Toronto, we reiterate the importance of these principles as foundational to the empowerment of a digital society that works for all Canadians.
* [DIACC Industry Insights: Digital ID in Civic Engagement](https://diacc.ca/wp-content/uploads/2019/10/Industry-Insights-Digital-ID-in-Civic-Engagement_October-2019-1.pdf) 2019-10
* [DIACC Industry Insights: Digital ID in Commerce](https://diacc.ca/wp-content/uploads/2019/09/Industry-Insights-Digital-ID-in-Commerce_September-2019.pdf) 2019-09
* [DIACC Industry Insights: Digital ID in Health Care](https://diacc.ca/2019/08/15/diacc-industry-insights-digital-id-in-health-care/) 2019-08-15

View File

@ -109,6 +109,8 @@ last_modified_at: 2023-06-15
### Germany
* [Fintech Humans and One37 Identity Enter Into Strategic Partnership in Germany](https://www.bloomberg.com/press-releases/2022-07-28/fintech-humans-and-one37-identity-enter-into-strategic-partnership-in-germany) 2022-07-28 Bloomberg
> SSI framework is adopted in Germany and throughout the EU as a key privacy-by-design framework. Through its membership in DIACC, One37 contributes to the future of digital identity by leveraging the lessons from its own real-life use-cases in Canada where Verifiable Credentials play an increasingly crucial role.
* [Reinventing Government with Technology - Sebastian Manhart](https://www.youtube.com/watch?v=1fTJA0r_XFg) 2021-12-01 KuppingerCole
> Raj Hegde is joined by Sebastian Manhart - Technical Advisor on Digital Identity for the German Chancellery to explore governmental reform and understand stakeholder expectations behind the rollout of digital identity projects in the post-COVID era.
* ["Irresponsible and Dangerous"](https://www.spiegel.de/netzwelt/apps/id-wallet-was-nach-dem-fehlstart-mit-dem-digitalen-fuehrerschein-passiert-a-f4bc10bc-08ab-42b4-9325-5de5cdc66e05) 2021-12-10 Spigel

View File

@ -26,6 +26,8 @@ last_modified_at: 2023-06-09
> How to move forward when expectations are high whilst divers and many open questions seem to lure on the way? How to demonstrate value of a constantly developing technology before all open issues are clarified? These uncertainties seemingly dominated the recent participation conference organized by the federal project team as the start of a series of similar events to accompany in the most transparent way the development and legislation of the newly proposed E-ID-Ecosystem for Switzerland.
- Stream 1 Exploring the Foundations
- Stream 2 Building the Extended SSI Ecosystem
* [Self-Sovereign Identity and how we can get there](https://www.procivis.ch/post/self-sovereign-identity-and-how-we-can-get-there) 2021-07-09 ProCivis
> Enabled by recent advances in the realm of cryptography, mobile devices and decentralized identity standards we can now put citizens firmly in control of their digital identities while ensuring the level of trust needed to unlock the full potential of a digital society.
* [Self-Sovereign Identity a game changer regarding privacy: The next level of identity management](https://adnovum.ch/en/company/blog/self_sovereign_identity_a_game_changer_regarding_privacy.html) 2022-01-12 Adnovum
> After rejection of the e-ID Act in March 2021, the Swiss Federal government is working at full speed on a new proposal. The first results were published in a [discussion paper](https://www.bj.admin.ch/dam/bj/en/data/staat/gesetzgebung/staatliche-e-id/diskussionspapier-zielbild-e-id.pdf.download.pdf/diskussionspapier-zielbild-e-id.pdf) is one of three possible solutions proposed for the implementation of the future e-ID.
* [the potential of Self-Sovereign Identity with representative use cases](https://www.adnovum.ch/en/company/blog/exploring_the_potential_of_self-sovereign_identity_with_representative_use_cases.html) Adnovum 2022-01-12

View File

@ -47,6 +47,8 @@ I think all of this thought should be consolidated into a cohesive declaration o
* [How to Convince Dad* of the Importance of Self-Sovereign Identity](https://github.com/WebOfTrustInfo/rwot7/blob/master/final-documents/convincing-dad.md)
* \*and your sister and your daughter and your best friend and your nephew (SSI Use-Cases)
* [Principles or Cult - An Irreverant Discussion on the Principles of SSI](https://www.thedinglegroup.com/blog/2021/9/1/principles-or-cult-an-irreverant-discussion-on-the-principles-of-ssi) 2021-09-01 Dingle Group
> The evolution of the Principles of SSI came about through the need to differentiate what is true SSI versus marketing forces twisting the concept. This market driven motivator can bring cultish overtones to the process.
<!-- This could also be modularized -->
Other content highlighted in [WebOfTrustInfo/self-sovereign-identity](https://github.com/WebOfTrustInfo/self-sovereign-identity) that I haven't had a chance to fully review, yet:

View File

@ -61,6 +61,15 @@ last_modified_at: 2023-06-12
> Tools and utilities to make working with the ION network and using ION DIDs easy peasy lemon squeezy
#### About ION
* [ION 101-401: what is ION (the public, permissionless DID network), how can you use it today, and what comes next](https://iiw.idcommons.net/3A/_ION_101-401:_what_is_ION_(the_public,_permissionless_DID_network),_how_can_you_use_it_today,_and_what_comes_next) 2021-05-06 Daniel Buchner (Microsoft)
> - Decentralization of did:ion if anchoring transactions are batched by an operator: its possible to choose the operator or to incur the cost of anchoring the transactions. Furthermore, the operator doesnt gain access to the private key.
> - ION delivers: massive scale, cost efficiency (despite running on the bitcoin network - best case if bitcoin a transaction costs 100 USD one action costs 1 cent), decentralized & flexible, decentralized registries
> - ION has a type system so that DIDs can be used, e.g. for software packages, vehicles, … This makes it possible to make the centralized data repositories that we rely on today, npm registries etc., to be fully decentralized. This is a Sidetree feature that is currently only used by ION.
> - DIF is currently working on personal data stores. Expected impact on private messaging, social media, gig services, ..
> - ION is live and in production today
> - Ion-tools is a selection of tools to interact with the ION network: [https://github.com/decentralized-identity/ion-tools](https://github.com/decentralized-identity/ion-tools)
> - Resilience of ION: Its pointed out that not only Bitcoin needs to survive attacks but also the IPFS network as both are required for ION to work properly. With Bitcoin it looks unlikely that its currently possible to reverse transactions on the network. However, with IPFS data can be unpinned and potentially disappear from the network.
* [ION We Have Liftoff!](https://techcommunity.microsoft.com/t5/identity-standards-blog/ion-we-have-liftoff/ba-p/1441555) 2021-03-25
> We are excited to share that v1 of [ION](https://identity.foundation/ion/) is complete and has been launched on Bitcoin mainnet. We have deployed an ION node to our production infrastructure and are working together with other companies and organizations to do so as well. ION does not rely on centralized entities, trusted validators, or special protocol tokens ION answers to no one but you, the community. Because ION is an open, permissionless system, anyone can run an ION node, in fact the more nodes in operation, the stronger the network becomes. Development of ION, and the Sidetree standard ION is based on, takes place in the [Decentralized Identity Foundation](https://identity.foundation/) (DIF). Read on to learn how you can integrate ION, DIDs, and Verifiable Credentials in your applications and services.
* [Introduction to Ion a layer 2 network for Decentralized Identifiers with Bitcoin - Daniel Buchner](https://www.slideshare.net/SSIMeetup/introduction-to-ion-a-layer-2-network-for-decentralized-identifiers-with-bitcoin-daniel-buchner) 2019-06-13 [SSI Meetup](https://ssimeetup.org/introduction-ion-layer-2-network-decentralized-identifiers-bitcoin-daniel-buchner-webinar-29/)

View File

@ -96,14 +96,6 @@ last_modified_at: 2023-06-18
* [Connecting Citizens and Government for Better Designed Services](https://medium.com/mydex/connecting-citizens-and-government-for-better-designed-services-9b58205185ce) 2021-05-19 MyData
Our vision for [Inclued](https://mydex.org/platform-services/) is for it to become the de facto choice for two-way, secure citizen engagement that empowers citizens to not only access services but influence what is delivered to them, while giving governments and citizens insight and evidence into the value and impact of working with, not for citizens.
### Smart Cities
* [Catalysing transformative change: new project to produce innovative services in smart cities](https://mydata.org/2021/09/02/catalysing-transformative-change-new-project-to-produce-innovative-services-in-smart-cities/) 2021-09-02 MyData
> “Cities around the world are racing ahead to be smarter by taking ethical approaches to personal data”, explains Teemu Ropponen, General Manager of MyData Global “MyData Global is a centre of excellence for personal data management expertise, with the H3C project we are bringing together city administrations, companies and individuals to find solutions that put people in control of their personal data”
* [Data Co-Operatives through Data Sovereignty](https://www.mdpi.com/2624-6511/4/3/62) 2021-08-15 Igor Calzada
> This article illustrates an open debate in data governance and the data justice field related to current trends and challenges in smart cities, resulting in a new approach advocated for and recently coined by the UN-Habitat programme People-Centred Smart Cities.
* [Training: Building smart cities services 2.0](https://oldwww.mydata.org/h3c/) 2021-08 MyData
> You will learn about business models, compliance with complex regulatory regimes, standards, and governance mechanisms. You will be connected with EU funding opportunities, and you will learn how to build successful partnerships with companies and cities
## [My Data 2018 Presentations](https://mydata2018.org/presentations/)

View File

@ -73,6 +73,12 @@ ZADA apps are all launched and our first digital ID a COVIDPASS is being
* [Encoding Trust that Travels with Data — A New Product Introduction Case Study Powered by Solutions Design with Transmute](https://medium.com/transmute-techtalk/encoding-trust-that-travels-with-data-a-new-product-introduction-case-study-powered-by-solutions-a4be7e80bfdf)
> underpinned by GS1 as a root of trust in the network — continuing a rich history for GS1 in this role. GS1 licenses and identifiers are and will continue to be at the foundation of trusting products and companies. Combining current practices with verifiable credential, decentralized identifier, and [GS1 Digital Link](https://www.gs1us.org/industries/emerging-topics/gs1-digital-link) standards disambiguating products builds business reputation for just-in-time engagement while keeping information up to date.
* [Community Credentials](https://credentials.resonate.is) Resonate
> [Verifiable Credentials](https://www.w3.org/TR/vc-use-cases/) are a new web standard for proving things digitally, thanks to some clever cryptography.  We are building Community Credentials to be the Know Your Co-operator equivalent of KYC (Know Your Customer for business) for co-op social trust, all without reliance on centralised providers (or blockchains).
* [Ontology Collaborates With The Block To Uncover The Decentralized Identity Industry](https://medium.com/ontologynetwork/ontology-collaborates-with-the-block-to-uncover-the-decentralized-identity-industry-1c2c51d02df0)
> Ning Hu, CTO of Ontology, spoke at a panel titled “The State of Decentralized Identity Solutions” in association with [The Block](https://www.theblockcrypto.com/), [...] accompanied by experts in the field of digital identity, Daniel Buchner, Senior PM of Decentralized Identity at Microsoft, and Tobias Fox, Co-founder of Serto. The discussion delved into how digital identity applies to everything from financial services to upskilling workforces, and how blockchain infrastructure can be utilized to lay the trust framework for decentralized identity solutions.
* [What is Self-Sovereign Identity? #AllYouNeedToKnowAbout OmniOne Series](https://medium.com/@RaonSecure/what-is-self-sovereign-identity-allyouneedtoknowabout-omnione-series-f51887d34be8) 2021-04-28 RAON
> OmniOne comes from the willingness to help transition from a service-centric identity to the self-sovereign identity paradigm, empowering anyone to control their identity in a highly secure manner while providing mutual benefits to the participants of its ecosystem.
## Tangle Labs
@ -82,3 +88,7 @@ ZADA apps are all launched and our first digital ID a COVIDPASS is being
By producing an accessible, open-source wrapper library, Tangle Labs provides any business or development team the opportunity to easily explore SSI and to test and prototype solutions that can bring added value to your business.
* [Decentralized identity explained](https://www.youtube.com/watch?v=Ew-_F-OtDFI) 2014-08-14 Microsoft
> What is decentralized identity? How does it give you more control over your digital identity and keep your information on the internet safer? This video explains in short what decentralized identity is and how it can replace usernames and passwords to verify you are who you say you are quickly and easily.
* [Changing the Game with Self-Sovereign Identity](https://eblockchainconvention.com/changing-the-game-with-self-sovereign-identity/) EblockchainConvention ValidatedID
> The EBC team had an insightful conversation with Ivan Basart, CTO at Validated ID, on how Self-Sovereign Identity technology is the ultimate solution to identity problems on the web.

View File

@ -28,3 +28,5 @@ This is not limited to alcohol, however. It also includes other age-restricted p
With identity being the missing link, the advent of selfsovereign identity could finally bring ambitious projects like [Bitnation](https://tse.bitnation.co/) to fruition. This virtual blockchain jurisdiction wants to establish a blockchainbased selfadministration or, as the project itself advertises, “a toolbox for doityourself governance.” With the concept of selfsovereign identity being implemented properly, new digital nations such as Bitnation could compete against old territorial tax states.
* [Beyond The Device With Self-Sovereign Identities](https://www.forbes.com/sites/alastairjohnson/2021/11/15/beyond-the-device-with-self-sovereign-identities/) Forbes 2021-11-15
> In 2021, the average cost of a data breach reached an all-time high of [$4.24 million](https://www.upguard.com/blog/cost-of-data-breach), even though businesses are already spending millions more to combat financial crime and meet their regulatory and compliance responsibilities.

View File

@ -1,2 +1,12 @@
* [Non-human Personas: Including Nature in the Participatory Design of Smart Cities](http://www.mifav.uniroma2.it/inevent/events/idea2010/doc/50_7.pdf) 2022-01-05 Martin Tomitsch, Joel Fredericks, Dan Vo, Jessica Frawley, Marcus Foth
> this article assesses how the personas method can be adapted to include morethan-human perspectives in the design process. Based on a case study, which involved designing smart urban furniture for human and non-human use, we introduce a framework for developing and employing non-human personas. As a key element of the framework, we describe a middle-out approach for forming a coalition that can speak on behalf of the non-human species that are impacted by design decisions.
* [What does it take to develop human-centric solutions for the built environment?](https://mydata.org/2022/05/13/built-for-people/) 2022-05-13 MyData [[Video](https://www.youtube.com/watch?v=VCjW0_NAPmQ)]
> Building better, more human-centric solutions in smart cities starts by realising that citizens and their digital footprints are not merely aspects to monitor and evaluate. They are active participants in the cities we live and work together and need to be engaged in designing better cities and managing the data about themselves. This is not important only for respecting citizens rights, but it is crucial to building sustainable services and humane cities.
* [Smart cities need user centric digital id to be built on foundational principles](https://diacc.ca/2019/11/22/smart-cities-need-user-centric-digital-id-to-be-built-on-foundational-principles/) 2019-11
> DIACC firmly believes in user-centred digital ID designed to prioritize and require user choice, control and consent regarding access to collect and manage data. As Sidewalk Labs looks to move forward in their work in Waterfront Toronto, we reiterate the importance of these principles as foundational to the empowerment of a digital society that works for all Canadians.
* [Catalysing transformative change: new project to produce innovative services in smart cities](https://mydata.org/2021/09/02/catalysing-transformative-change-new-project-to-produce-innovative-services-in-smart-cities/) 2021-09-02 MyData
> “Cities around the world are racing ahead to be smarter by taking ethical approaches to personal data”, explains Teemu Ropponen, General Manager of MyData Global “MyData Global is a centre of excellence for personal data management expertise, with the H3C project we are bringing together city administrations, companies and individuals to find solutions that put people in control of their personal data”
* [Data Co-Operatives through Data Sovereignty](https://www.mdpi.com/2624-6511/4/3/62) 2021-08-15 Igor Calzada
> This article illustrates an open debate in data governance and the data justice field related to current trends and challenges in smart cities, resulting in a new approach advocated for and recently coined by the UN-Habitat programme People-Centred Smart Cities.
* [Training: Building smart cities services 2.0](https://oldwww.mydata.org/h3c/) 2021-08 MyData
> You will learn about business models, compliance with complex regulatory regimes, standards, and governance mechanisms. You will be connected with EU funding opportunities, and you will learn how to build successful partnerships with companies and cities

View File

@ -92,3 +92,7 @@ For individuals in particular, DIDs can put them back in control of their person
* [SSI Interaction Patterns](https://www.windley.com/archives/2021/06/ssi_interaction_patterns.shtml)
> While the DID Authn pattern is simple, it is not as flexible as we need in some situations. For more complicated scenarios, we can use verifiable credentials. The first scenario well consider is where the same organization is issuing and verifying the credential.
> ![](https://s3.amazonaws.com/revue/items/images/009/411/724/mail/Credential_Internal.png?1621957585)
* [The Time for Self-Sovereign Identity is Now](https://medium.com/learning-machine-blog/the-time-for-self-sovereign-identity-is-now-222aab97041b) Kim Hamilton Duffy, Learning Machine (Now Hyland Credentials)
Oldie but Goodie by Kim Hamilton Duffy from when she worked at Learning Machines
> Technically, Verifiable Claims are claims made about a “subject” (identified by a digital identifier such as a DID) that are rendered tamper proof through digital signatures. The authenticity of digital signatures may, in turn, be established through issuer identifiers, which may also be expressed as DIDs.

View File

@ -7,6 +7,13 @@ published: false
> New work that may leverage decentralized ID from the supply chain side of things…but not sure (lots of links inside on data brokers harm)
* [INNOPAY paper on data sharing published in CEUR Workshop Proceedings](https://www.innopay.com/en/news/innopay-paper-data-sharing-published-ceur-workshop-proceedings) Innopay
> This week, CEUR-WS.org has published the paper titled [Harmonization Profiles for Trusted Data Sharing Between Data Spaces: Striking the Balance between Functionality and Complexity](http://ceur-ws.org/Vol-3214/WS6Paper2.pdf) in the CEUR Workshop Proceedings.
* [Self Sovereign Identity Systems](https://yathartharora.substack.com/p/self-sovereign-identity-systems) 2021-04-09 The Passion Pad
> We should have the right to manage our identity, free of any country or the place where we live. By giving this right to the government or any central authority, we give them much more power. Separating data rights from the actual data is important. User should have the right to decide who should have the access to his/her data.
* [Self-Sovereign Identity A Possibility for More Data Control for Users](https://dataethics.eu/self-sovereign-identity-a-possibility-for-more-data-control-for-users/) 2020-06-18 DataEthics.eu
> But also, the general populations computer skills must be taken into account when designing the solution, along with legal considerations of whether individuals should be allowed to sell sensitive data, such as health data to third parties. If it is legal to monetize personal data, users can be tempted to share personal data in a way that might harm them later e.g. sharing health data and later being denied an insurance. Monetization might also create a gap in the society and the world, having rich people prioritize protecting their privacy while less fortunate citizens might feel like they have no other option than selling their data. Thoughts about the monetization of data need to be considered in a legal context as it has been done with the donation of blood, when creating a self-sovereign identity solution. Furthermore, safeguard measures must be made against discrimination like only providing identity for a selected few, and to ensure that everyone have equal access to creating a trustworthy digital identity.
* [Whats in Your Data Ecosystem?](https://stateofidentity.libsyn.com/whats-in-your-data-ecosystem) State of Identity
> Indicio's CEO, Heather Dahl, and CTO, Ken Ebert, identity wallets, verified credentials, the role of the Sovrin Foundation, and new momentum around interoperability across decentralized identity.
* [UNDP LEGAL IDENTITY AGENDA ONLINE FORUM: PRIVATE SECTOR ENGAGEMENT ROUNDTABLES: DATA PROTECTION AND PRIVACY](https://unstats.un.org/LEGAL-IDENTITY-AGENDA/MEETINGS/2021/UNLIA-FUTURETECH/DOCS/REPORT2.PDF)

File diff suppressed because it is too large Load Diff

View File

@ -7,7 +7,8 @@ published: false
> In todays episode, we talk about his new book “Currency Cold War” and relationship, and lack thereof, between digital currency and identity.
* [IPR - what is it? why does it matter?](https://identitywoman.net/ipr%e2%80%8a-%e2%80%8awhat-is-it-why-does-it-matter/)
> At the time they kept worrying about how they could collaborate and they sensed that they needed to have IPR dealt with, but I couldnt understand what they were going on about. This small thing delayed them working together for a long time. They literally had to spin up a new organization, get new bylaws developed and get everyone to join and sign off on the IPR regime before they could formally talk together about how to get all work to align and come up with one protocol.
* [Decentralized identity discussed: An INATBA roundtable round-up](https://jolocom.io/blog/decentralized-identity-inatba-roundtable/)
> The paper, written over the course of a year by six key authors, was produced by INATBA with the aim of defining the expectations for an open and innovative market in decentralized identity. It analyzes the current state of SSI developments and opens up discussion of the next steps, taking a clear stance on how INATBA would like to see development continue, making demands of the key stakeholder groups and setting goals for the future of SSI.
* [Why do you care about identity?](https://wider.team/2022/01/18/phil-cares-about-identity/) Phil Wolff 2022-01-18
I love that its more than a technical discussion. Its laws. Sociology. Politics and civics. Commerce. Psychology. Ethics. History. Economy. All the humanities.

View File

@ -76,6 +76,21 @@ Investors and consumers show growing enthusiasm for privacy-focused alternatives
Increased supply of user-friendly private tech and increased demand for privacy have converged, creating a moment of unprecedented opportunity for founders with a vision for privacy-first online experiences.
* [Agency By Design (Privacy is not Enough)](https://iiw.idcommons.net/20B/_Agency_By_Design_(Privacy_is_not_Enough)) by Adrian Gropper
> Im not a fan of Privacy by Design.\
> In the industry are only concerned about compliance, very rarely talk about Human Agency\
> Privacy by Default is the opposite in some sense to privacy by design\
> The problem is that It conflict with community in many cases. (e.g. social credit score)\
> Cultural differences (EU accepts better centralization than US)\
> Delegation and agency are one the same thing\
> Agency is a much bigger thing and delegation is a mechanism that supports it\
> I want my fiduciaries to know as much as possible of me (e.g. my doctor, my lawyer) \
> Model Agency as hierarchy and delegation is the mean to have it.
* [Self-Sovereign Identity - The Nash Equilibrium Point of the Personal Identity Information Game](https://www.thoughtworks.com/insights/blog/self-sovereign-identity-nash-equilibrium-point-personal-identity-information-game)
> "A silent war is ongoing between users and companies over the control of data."
> 1. Privacy or convenience is a question
> 2. SSI is the answer to this question
* [Google Sued for Misleading Users Over Location Data Privacy](https://anonyome.com/2022/03/google-sued-for-misleading-users-over-location-data-privacy/) Anonyme
“Google falsely led consumers to believe that changing their account and device settings would allow customers to protect their privacy and control what personal data the company could access. The truth is that contrary to Googles representations it continues to systematically surveil customers and profit from customer data.”

View File

@ -47,9 +47,6 @@ The tech we use should be responsive to and responisble with the climate, enviro
That means 95% of US consumers are saying no way to cross-app tracking with Apples new [App Tracking Transparency](https://anonyome.com/2021/05/apples-new-att-and-why-facebook-is-hitting-back-hard/) (ATT) feature.
* [Your User Is Your API](https://www.evernym.com/blog/your-user-is-your-api/) Evernym
Rather than having one huge, expensive, and probably illegal data hub, every customer becomes a data hub in their own right. They provide the data needed, just-in-time, under their control.
* [Do Consumers Even Want Personalized Ads?](https://anonyome.com/2021/06/do-consumers-even-want-personalized-ads/) Anonyme
The [YouGov](https://www.globalwitness.org/en/blog/do-people-really-want-personalised-ads-online/) poll of consumers in France and Germany we mentioned earlier says its the [behind the scenes](https://mysudo.com/2021/02/beware-the-dark-patterns-trying-to-steal-your-data/) or back door nature of personalization that gives people the creeps.
@ -208,6 +205,8 @@ This session will share the results and learnings of the creation and developmen
* [Making The Intention Economy Happen](https://iiw.idcommons.net/10B/_Making_The_Intention_Economy_Happen,_Part_2), Part 2 by Doc Searls
This was a small meeting primarily meant to tee up Hadrian Zbarceas demo of Customer Commons new Intention Byway model for better signaling between demand and supply in markets of all kinds
* [Relationships and Identity](https://www.windley.com/archives/2020/07/relationships_and_identity.shtml) 2020-07 Phil Windley
> We build digital identity systems to create and manage relationships—not identities.
* [https://www.slideshare.net/dsearls/iiw-xxxiiintentionsession](https://www.slideshare.net/dsearls/iiw-xxxiiintentionsession)

View File

@ -13,6 +13,10 @@ In cross-border and migration contexts, digital wallets promise to have wide ran
* [Determinants of Behavioral Intention to Use a Self-Sovereign Identity Digital Wallet: Extending the UTAUT with Trustworthiness](https://www.proquest.com/openview/31100c6b38df3ef649156d35d0296db4/1) 2021-09-27 Kerri Lemoie
> The unified theory of acceptance and use of technology was extended to examine the potential influence of the self sovereign identity principles and trustworthyness, along with other factors such as percieved usefulness and perceived ease of use, on the adoption of this new approach to online identity
* [Self-Sovereign Identity: The Foundation of the Digital Wallet](https://www.nevis.net/en/blog/how-does-self-sovereign-identity-ssi-work) Nevis
> Turning identifying features into verified credentials
>
> How exactly does this work? Lets look at the three roles of user, issuer and verifier. Firstly, users can have any number of attributes such as their credit rating, national identity document or driving licence certified by the entity responsible for each attribute.
* [OKTA Cloud Identity Integration with SSI wallet](https://lists.w3.org/Archives/Public/public-credentials/2021Nov/0100.html)  sethi shivam (Tuesday, 23 November)

View File

@ -821,6 +821,17 @@ Decentralizing access to blockchain APIs is a vital step to improve network upti
* [SSI meets Metaverse for Industry 4.0 and Beyond](https://www.techrxiv.org/articles/preprint/SSI_meets_Metaverse_for_Industry_4_0_and_Beyond/21130375) Techrxiv
> The proposed holistic framework aims to ignite new ideas and discussions related to the combined deployment of DLT, SSI, and metaverse to inspire new implementation areas within the Industry 4.0 environment. The paper also discusses various opportunities, enablers, technical \& privacy aspects, legislation requirements, and other barriers related to SSI implementation.
* [The Sovereignty Stack: Re-thinking Digital Identity for Web3.0 w/ Greg KIDD](https://www.youtube.com/watch?v=CyGggZ2pT1I) 2021-10-04 Metaco
> Greg is a serial entrepreneur who is probably best known for founding and taking public Dispatch Management Services Corp, the worlds largest on demand dispatch network for urgent deliveries. In a highly interesting career so far, Greg was also Chief Risk Officer at Ripple Labs and a senior analyst for the Board of Governors of the Federal Reserve in Washington. In his latest venture Global ID, Greg is acting on his long-held belief that peoples identity should be truly portable and owned by individuals themselves rather than corporations or governments.
* [How Decentralized Identifiers and Bitcoin Fix the Web](https://bitcoinmagazine.com/technical/dids-built-on-bitcoin-fix-the-web) Bitcoin Magazine
> On October 4, 2021, Facebook, along with WhatsApp and Instagram, [disappeared from the internet](https://blog.cloudflare.com/october-2021-facebook-outage/).
Their DNS names stopped resolving, and their infrastructure IPs were offline. They were completely disconnected from the internet. At the same time, it was reported that [1.5 billion people allegedly had their personal data stolen from Facebook](https://www.privacyaffairs.com/facebook-data-sold-on-hacker-forum/) and posted for sale.
* [Nomadic Labs Research Seminars #20 | Self-Sovereign Identity and Storage](https://www.youtube.com/watch?v=HombbTvvets)
> In this talk, Wayne reviews the results of support with Tezos addresses, use cases that have been deployed, Tezos DID methods and Tezos profiles. Wayne also gives an overview of the Trail of Bits audit.
* [The Off Chain Internet: Decentralized Identity & Verifiable Credentials - Evin McMullen](https://www.youtube.com/watch?v=EZ_Bb6j87mg) 2022-02-19 ETH Denver
FANTASTIC NEW TALK!!!!
## Ethereum Merge