From 161ed4be04cfcf60eda310d63718023b0000b6c2 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?=E2=A7=89=20infominer?= Date: Tue, 20 Jun 2023 00:07:05 +0530 Subject: [PATCH] sort --- _posts/application/2023-06-14-iot.md | 4 + _posts/application/2023-06-15-education.md | 2 + .../2023-06-16-covid-coronavirus.md | 2 + _posts/application/2023-06-16-use-cases.md | 15 +- .../2023-06-18-trending-adoption.md | 9 + .../2019-04-11-blockchain-identity.md | 34 +- _posts/government/2019-03-01-government.md | 16 +- _posts/government/2023-06-09-india.md | 32 +- _posts/government/canada/2020-12-04-diacc.md | 2 - _posts/government/europe/2020-01-11-europe.md | 2 + .../europe/2023-06-09-switzerland.md | 2 + .../literature/2018-12-22-evolution-of-ssi.md | 2 + .../2023-06-11-sidetree.md | 9 + _posts/organizations/2019-04-04-mydata.md | 8 - unsorted/{topics => }/cbdc.md | 0 unsorted/companies/ssi.md | 10 + unsorted/resources/media-coverage.md | 2 + unsorted/smart-cities.md | 10 + unsorted/standards/standards.md | 4 + unsorted/topics/data-governance.md | 7 + unsorted/topics/explainer.md | 1057 +++++------------ unsorted/topics/meta.md | 3 +- unsorted/topics/privacy.md | 15 + unsorted/topics/user-experience.md | 5 +- unsorted/topics/wallets.md | 4 + .../web3-and-decentralized-identity/web3.md | 11 + 26 files changed, 466 insertions(+), 801 deletions(-) rename unsorted/{topics => }/cbdc.md (100%) diff --git a/_posts/application/2023-06-14-iot.md b/_posts/application/2023-06-14-iot.md index 73f8b1d3..0ff3ad17 100644 --- a/_posts/application/2023-06-14-iot.md +++ b/_posts/application/2023-06-14-iot.md @@ -20,12 +20,16 @@ last_modified_at: 2023-06-17 > As the world becomes even more connected and more machines are hooked up to the internet, the ability for machines to move, trade and interact securely and efficiently becomes increasingly important to life and business. Today’s centralized networks do not enable this. Machines today exist on closed, permission-based environments which massively limit which other machines can be interacted with, what machines can do and where they can go. * [Self-Sovereign Identity and IoT – insights from the Sovrin Foundation](https://insureblocks.com/?p=12699) 2021-09-21 Insureblocks > Michael Shea is the Managing Director of the Dingle Group and the Chair of Sovrin Foundation’sSSI in IoT Working Group. In this podcast we discussed the white paper he authored on Self Sovereign Identity and IoT. To explain the opportunities SSI can provide to IoT, Michael introduces us to three profiles: Jamie (machine to person), Bob (machine to machine) and Bessie the cow (digital twin). +* [Toothbrush Identity](https://www.windley.com/archives/2021/09/toothbrush_identity.shtml) 2021-09 Phil Windey + > Identity finds its way into everything—even toothbrushes. Careful planning can overcome privacy concerns to yield real benefits to businesses and customers alike. * [Smart Property](https://www.windley.com/archives/2021/08/smart_property.shtml) 2021-08 Phil Windley > Smart property is much more than the anemic connected things we have now. Smart property imagines a world where every thing participates in digital communities and ecosystems, working through programmable agents under the owners control. * [Digital Twins and Self-Sovereign Identity: Build the next generation of Simulation with privacy preservation](https://iotpractitioner.com/digital-twins-and-self-sovereign-identity-build-the-next-generation-of-simulation-with-privacy-preservation/) 2021-07-30 IOT Practicioner > Managing IoT devices and user identities as well as the relationships among various devices and their digital twins face significant challenges. First, a lack of Identity Credential and Access Management (ICAM) standards for IoT creates proprietary standards and a lack of interoperability. Second, the operational lifecycle of IoT devices complicates integration of traditional ICAM. Lastly, ICAM technology must adapt to the proliferation of connected devices. This evolution requires a digital trust framework and the decentralized architecture of Self-Sovereign Identity (SSI). * [Alternatives to the CompuServe of Things](https://www.windley.com/archives/2021/07/alternatives_to_the_compuserve_of_things.shtml) 2021-07 Phil Windley > The current model for connected things puts manufacturers in between people and their things. That model negatively affects personal freedom, privacy, and society. Alternate models can provide the same benefits of connected devices without the societal and personal costs. +* [Decentralized identity can bring the analog world into the digital one](https://cointelegraph.com/news/decentralized-identity-can-bring-the-analog-world-into-the-digital-one) 2021-06-20 Cointelegraph + > DID does not require analog objects to become digitized, and it does not need expensive sensors or hi-tech tags to work correctly. Instead, it offers an affordable, reliable and versatile way to take offline items out of the digital blindspot. * [Relationships in the Self-Sovereign Internet of Things](https://www.windley.com/archives/2020/12/relationships_in_the_self-sovereign_internet_of_things.shtml) 2020-12 Phil Windley > DIDComm-capable agents provide a flexible infrastructure for numerous internet of things use cases. This post looks at Alice and her digital relationship with her F-150 truck. She and the truck have relationships and interactions with the people and institutions she engages as she co-owns, lends and sells it. These and other complicated workflows are all supported by a standards-based, open-source, protocol-supporting system for secure, privacy-preserving messaging. * [Distributed Ledger Technologies, IAM, and the Truth in Things](https://www.youtube.com/watch?v=VV2rLgH9TUE) 2019-06-27 Identiverse Robert Brown diff --git a/_posts/application/2023-06-15-education.md b/_posts/application/2023-06-15-education.md index c51d072d..b8577e77 100644 --- a/_posts/application/2023-06-15-education.md +++ b/_posts/application/2023-06-15-education.md @@ -67,5 +67,7 @@ last_modified_at: 2023-06-16 > Although the blockchain has long been identified as an opportunity for driving much-needed change in the core processes of the education sector, use cases to date have been limited in scope and execution, with blockchain advocates and education policy makers seemingly disconnected on fundamental issues such as governance, self-sovereignty, interoperability, choice of blockchain platforms and overall trust in standards and the integrity of the infrastructure. * [Whitepaper, Hyperledger] [Blockchain in the Education Sector](https://potech.global/web/images/Potech%20Labs%20White%20Paper_Blockchain%20in%20the%20Education%20Sector.pdf) 2021-03-23 Potech > Since most of the educational institutes were facing security crises, new challenges are added to the security system to identify and manage the users’ access to these platforms.The most relevant challenges include but not limited to, legacy identity infrastructure, student lifecycle and users access complexity and new cyber threats. +* [Report] [APPLYING SELF -SOVEREIGN IDENTITY PRINCIPLES TO INTEROPERABLE LEARNING RECORDS](https://www.uschamberfoundation.org/sites/default/files/media-uploads/Applying%20SSI%20Principles%20to%20ILRs%20Report.pdf) 2020-06 US Chamber Foundation + > SSI technologies and concepts can provide valuable insights to jumpstart our efforts and provide opportunities to improve the talent marketplace for all learners and stakeholders by examining ILR systems’ potential risks, such as discrimination, manipulation, over-disclosure, tracking, and lock-in/lock-out. Stakeholders should be encouraged to work toward and implement the following principles and tools, when possible, to mitigate risks that are further explained throughout the paper and highlighted below. * [Report] [CONNECTED IMPACT Unlocking Education and Workforce Opportunity Through Blockchain](https://www.acenet.edu/Documents/ACE-Education-Blockchain-Initiative-Connected-Impact-June2020.pdf?fbclid=IwAR22cl_g-DzoZOEBStwKhrsuQpqqA66ZyZhKdd_4NmER2GyDMXbatuUsUuw) 2020-06 ACE > This report is the first phase of the Education Blockchain Initiative, funded by the U.S. Department of Education and managed by the American Council on Education (ACE). It summarizes an intensive research project to better understand the application of blockchain, a form of distributed ledger technology, to education. Its content is intended to inform policymakers, technology developers, education practitioners, and workforce entities about the state of and potential of interoperable digital credentials anchored on blockchains. This report also provides guidance to these stakeholders on the effective implementation of blockchain-based digital credentials infrastructure. diff --git a/_posts/application/2023-06-16-covid-coronavirus.md b/_posts/application/2023-06-16-covid-coronavirus.md index 52433853..29db7c74 100644 --- a/_posts/application/2023-06-16-covid-coronavirus.md +++ b/_posts/application/2023-06-16-covid-coronavirus.md @@ -119,6 +119,8 @@ last_modified_at: 2023-06-18 > DIWG member countries each have relevant policies and/or legislation which cover their respective approaches towards digital identity, captured through policy, legislative and trust frameworks governing the digital identity systems. For most, trust frameworks and digital identity systems were implemented using existing government policies and legislation as a foundation, for example existing privacy legislation, and broadly align to ISO standards (as defined by the International Organisation for Standardisation), European Union (EU) standards (as defined through the eIDAS regulation) or industry best practice. A similar model was found for technical settings across digital identity systems * [Blockchain Identity Management Market by End-user, Application, and Geography - Forecast and Analysis 2021-2025](https://www.technavio.com/report/blockchain-identity-management-market-industry-analysis) 2021-07 > This blockchain identity management market research report provides valuable insights on the post COVID-19 impact on the market, which will help companies evaluate their business approaches. Furthermore, this report extensively covers blockchain identity management market segmentations by end-user (BFSI, government, healthcare, and others), application (end-point, network, and infrastructure), and geography (North America, Europe, APAC, South America, and MEA). The blockchain identity management market report also offers information on several market vendors, including Accenture Plc, Amazon.com Inc., Bitfury Group Ltd., BLOCKCHAINS LLC, Broadcom Inc., Civic Technologies Inc., International Business Machines Corp., Oracle Corp., SAP SE, and SecureKey Technologies Inc. among others. +* [Research] [Identity Credential and Personal Data Ownership Perspectives](https://openidentityexchange.org/networks/87/item.html?id=404) 2020-12-10 OIX + > Many global organisations are using their citizens’ identity and their other personally identifiable information (PII) to help combat the global Covid-19 crisis  […] reignited the debate around protecting public safety vs protecting privacy:  how to combat the contagious threat whilst preserving citizens’ digital identity, security and anonymity? * [Disposable Yet Official Identities (DYOI)](https://zenodo.org/record/4016977#.X4NIjy2ZMWq) 2020-09-06 Petros Kavassalis, Nikos Triantafyllou, Panagiotis Georgakopoulos, Antonis Stasis, Rob van Kranenburg > for Privacy-Preserving System Design - The case of COVID-19 digital document verification and credential-based access control in ad hoc outdoor and indoor settings (and beyond) > In this paper we report on the design of a service system to endow next-generation COVID-19 mobile applications with the capacity: a) to instantly manage and verify a wide range of possible COVID-19 digital documents (circulation attestations, work or travel permits based on approved COVID-19 tests, vaccination certificates, etc.) and, b) to provide credential-based access control, especially in cases where the Verifier is not a web entity but a human agent with a smartphone, or an IoT device -- mainly in ad hoc outdoor and indoor settings. The system has been designed as a response to the specific needs of a health emergency situation, but it may have a broader application in different cased and areas of control (such as airport and train stations checking points and board controls), where the verification process must exclude the possibility of a physical interaction between the controller and the subject of control, by maintaining a “safe distance” between them and while preserving a certain privacy for the subject of control. Our approach levers the potential of Disposable Identities, Self-Sovereign Identities technologies and Verifiable Credentials (VCs) to enable digital document verification and credential-based access control in ad hoc outdoor and indoor settings (and beyond). Towards this, we specifically introduce the concept of “Derivative” (i.e., transcoded/contextual) Verifiable Credentials. A Derivative VC is a derived bond contract guaranteeing the validity and ownership over the underlying contracts (VCs) whose: a) usability is restricted in a very specific context (that of the “local” and time-limited interaction between a Subject and a Service Provider) and, b) linking table points only to a specific “Pairwise DID”. diff --git a/_posts/application/2023-06-16-use-cases.md b/_posts/application/2023-06-16-use-cases.md index d209644d..b0879628 100644 --- a/_posts/application/2023-06-16-use-cases.md +++ b/_posts/application/2023-06-16-use-cases.md @@ -7,7 +7,7 @@ layout: single permalink: application/use-cases/ canonical_url: 'https://decentralized-id.com/application/use-cases/' categories: ["Application"] -tags: ["Content Attribution","Events","Climate","Bots","IAM","Reputation","Workplace","Record Keeping","Energy Systems","Property Management","Gaming","Business","Career","Security","Banking","Loyalty Programs"] +tags: ["Content Attribution","Events","Climate","Bots","IAM","Reputation","Workplace","Energy Systems","Property Management","Gaming","Business","Career","Security","Banking","Loyalty Programs"] last_modified_at: 2023-06-18 --- @@ -30,10 +30,13 @@ last_modified_at: 2023-06-18 > 6 stories of how verifiable credentials can improve the lives of every day people: > > Ajay is an Uber driver in San Francisco. He wants to try various temporary jobs while he’s studying but joining Lyft, Postmates and other platforms requires going through a long and tedious background verification and car certification process over and over again. +* [Digital Identity Isn’t Only For People](https://www.forbes.com/sites/davidbirch/2020/12/22/digital-identity-isnt-only-for-people/) 2020-12-22 David Birch, Forbes + > fintechs and regtechs looking for opportunities in the digital identity space should cast their ideas net pretty wide. Digital identities are not only for people and the future desperately needs digital identities for pretty much everything to underpin recognition, relationships and reputation (the 3Rs of the online economy). * [5 Promising Use Cases for Verifiable Credentials](https://hackernoon.com/5-promising-use-cases-for-verifiable-credentials-tu1y348k) 2020-12-05 Hackernoon > several industries are already digging in. Here are some of the most visible and promising use cases. -* [SSI Essentials: 35 use cases of decentralized identities that will make your life easier](https://gataca.io/blog/ssi-essentials-35-use-cases-of-decentralized-identities-that-will-make-your-life-easier) Gataca - +* [SSI Essentials: 35 use cases of decentralized identities that will make your life easier](https://gataca.io/blog/ssi-essentials-35-use-cases-of-decentralized-identities-that-will-make-your-life-easier) 2022-04-07 Gataca + > It is not farfetched to assume that we all strive to perform routine activities in the most simple and efficient way. This can include relatively easy activities such as logging in to your student/employee portal and shopping online or slightly more complex activities such as opening a bank account, renting an apartment, or applying to a master’s program or job. + ## Use Cases ### Career * [Coming soon — a resume-validating blockchain network for job seeker](https://www.computerworld.com/article/3675547/coming-soon-a-resume-validating-blockchain-network-for-job-seekers.html#tk.rss_security) 2022-10-05 Computer World @@ -67,9 +70,13 @@ last_modified_at: 2023-06-18 > Without it, we will lose trust of any content on the internet due to AI advancement in the next 12-24 months. > > This one of the most urgent issues in our society today. +* [Adobe Coalition for Content Provenance and Authenticity at LF, Wacom and IdentityNet](https://www.youtube.com/watch?v=_YDP-lAewis) 2021-11-19 Connected Ink + > SSI has the power to change the world for the better by flipping the power dynamic surrounding digital identities and trust from large corporations and governments back to the individual. This technology empowers individuals and communities to take back control of both their personal data as well as of their digital assets and identities, and decide exactly how and when this information is to be used and shared. This session explores how SSI-based ecosystems are built and how this transition benefits both individuals and the wider global community. * [Creating trust in assertions, claims and the authenticity of the original content](https://liccium.com/) LICCIUM > Introducing Liccium Trust Engine – the next generation rights and media asset management for the web3. With Liccium, content creators can digitally sign their original creative works to increase trust in claims and attribution. - +* [Why all living artists should create their provenance and self-sovereign identity with their art?](https://artracx.medium.com/why-all-living-artists-should-create-their-provenance-and-self-sovereign-identity-with-their-art-fffb03720c40) 2022-03-01 Artracx + > This self-sovereign capability of associating the artist, the collector and the art work itself with an identity — creates value for everyone. We did also share that the opportunity of secondary sale income / commission that could be attributed back to him as the original artists is also possible (albeit very complicated). + ### Events * [Event tickets as verifiable credentials](https://lissi-id.medium.com/event-tickets-as-verifiable-credentials-31f4a10b28cc) 2022-09-22 Lissi > This article explains how verifiable credentials can be used to benefit event organizers and visitors alike based on a practical usage of the Lissi team. diff --git a/_posts/application/2023-06-18-trending-adoption.md b/_posts/application/2023-06-18-trending-adoption.md index ab5f41c5..d855160a 100644 --- a/_posts/application/2023-06-18-trending-adoption.md +++ b/_posts/application/2023-06-18-trending-adoption.md @@ -44,16 +44,21 @@ We went through the paywall so you don’t have to - SSI only mentioned once. Fr > - [cheqd launch](https://cheqd.io/blog/cheqd-launches-mainnet-network/) * [Top 5 digital identity trends injecting trust back into governance](https://www.openaccessgovernment.org/digital-identity-trends/125013/) 2021-11-29 Open Access Government > As early SSI use cases develop and legal and political institutions evolve, the reality of impactful, integrated SSI systems becomes more tangible. Such use cases include privacy-preserving vaccination certificates, digital identity wallets, and decentralised data verification and certification services that streamline processes like visa applications and workplace credential checks. +* [Is Self-Sovereign Identity Going Exponential?](https://www.youtube.com/watch?v=xWy0rP8uTiU&t=2406s) 2021-10-27 Sybrin [Recap](https://corporate.sybrin.com/webinar-SSI) + > with [Andrew Baker](https://www.linkedin.com/in/andrew-baker-b1357939/), Head of EC2 Engineering at AWS, and [Lohan Spies](https://www.linkedin.com/in/lohanspies/), Chair of the [Sovrin Steward Council](https://sovrin.org/join-the-new-sovrin-steward-council/), they explore the concept of Self-Sovereign Identity (SSI) in detail, discussing what profound implications SSI will have and whether it is indeed the next game changer? * [How Verifiable Credentials Can Rebuild Trust On The Internet](https://www.forbes.com/sites/forbestechcouncil/2020/12/18/how-verifiable-credentials-can-rebuild-trust-on-the-internet/) 2020-12-18 Forbes > Berners-Lee recently suggested that the web needs a midcourse correction. Part of that change involves making systems accountable and making it easy for users to find where information comes from. Verifiable credentials promise major strides in that direction. * [Thoughtworks put Decentralized Identity into the "Assess" category of their technology radar map](http://web.archive.org/web/20201120201821/https://www.thoughtworks.com/radar/techniques?blipid=202005083) 2020-05-19 Thoughtworks Technology Radar > Adopting and implementing decentralized identity is gaining momentum and becoming attainable. We see its adoption in privacy-respecting customer health applications, government healthcare infrastructure and corporate legal identity. +* [Self-sovereign identity](https://en.m.wikipedia.org/wiki/Self-sovereign_identity) 2020-06 Wikipedia - WE have a wikipedia article! * [Self Sovereign Identity - A glossary of distributed technologies](https://policyreview.info/open-abstracts/self-sovereign-identity) 2020-05-18 Policy Review > Released by the Internet Policy Review Journal on Internet Regulations received an entry on Self-Sovereign Identity By Alexandra Giannopoulou & Fennie Wang ## Market Signals * [Decentralized Identity Market Signals](https://indicio.tech/decentralized-identity-market-signals/) 2022-05-25 Tim Spring Indicio > In this rapid fire review we will take a look at, and break down, the biggest recent stories in digital identity and what they could mean for business and the average person using the internet. +* [The Shape of your Identity](https://stateofidentity.libsyn.com/the-shape-of-your-identity) 2022-03-17 State of Identity Podcast + > How are personal data and digital identity reshaping society? [...] Cameron D'Ambrosi is joined by Michael Becker, CEO of Identity Praxis, to discuss the evolution of the identity industry, the latest trends to follow (or flee), and predictions for the future of both consumer and enterprise digital identity. * [The Market Opportunity for Reusable Identity and How to Get There](https://liminal.co/reports/market-opportunity-for-reusable-identity/) 2022-02-03 Liminal > The Total Addressable Market is $32.8B in 2022, to reach $266.5B by 2027, with a CAGR of 68.9%. Today, the market is still nascent but is posed for strong growth. * [Institutions digitising credentials, but blockchain use remains low](https://thepienews.com/news/digitising-credentials-blockchain-use/) 2021-05-17 The Pie News [Research](https://www.aacrao.org/research-publications/aacrao-research/meeting-the-moment-transforming-the-digital-credentials-space) @@ -76,6 +81,8 @@ We went through the paywall so you don’t have to - SSI only mentioned once. Fr * [Nice overview, somewhat questionable assumptions](https://twitter.com/UbikomProject/status/1405945396208209932) 2021-06-18 UbikomProject * [To Succeed In Decentralizing Digital Identity, Focus On Relationships First](https://www.forbes.com/sites/forbestechcouncil/2021/06/16/to-succeed-in-decentralizing-digital-identity-focus-on-relationships-first/?sh=6f133ef11824) 2021-06-16 Forbes > when it comes to consumers of services, we need to think about identity in terms of building and maintaining trusted digital relationships. With adtech cookies in the regulatory crosshairs, and our research finding that 70% of consumers prefer apps that won't sell their personally identifiable information, we can't afford to think in terms of one-time purchases or disappointing experiences. Many consumers need to manage person-to-person and person-to-device relationships, too. We're not alone in this connected world. +* [The Growth Factors of Self Sovereign Identity](https://medium.com/@SSI_Ambassador/the-growth-factors-of-self-sovereign-identity-33aa3cc17ce7) 2020-08-14 Adrian Doerk + > The post details 5 components necessary for the advance of SSI: Business, Technology, User Experience, Compliance, and Governance. * [Why self-sovereign identity will get adopted (and it’s not the reason you probably want)](https://www.tuesdaynight.org/2018/06/15/why-self-sovereign-identity-will-get-adopted-and-its-not-the-reason-you-probably-want/) 2018-06-15 Tuesday Night > In the payment card world, there are clear guidelines on personal liability. $50 if you use credit and up to $500 for debit depending on when you report the issue. Based on that, different people choose to use different “systems.” > @@ -87,3 +94,5 @@ We went through the paywall so you don’t have to - SSI only mentioned once. Fr > ![](https://pbs.twimg.com/media/EwhlfT-XEAE672y?format=jpg&name=large) * [4 Keys to Self-sovereign Identity Adoption](https://medium.com/trinsic/4-keys-to-self-sovereign-identity-adoption-ad269b208569) 2021-01-19 Trinsic > Many implementers won’t realize the potential of SSI until it’s deployed at scale, but in order to get to scale, we need implementers to realize value. It’s the classic chicken & egg problem. +* [The challenge for self-sovereign identity (SSI)](https://nickbyrne.substack.com/p/the-challenge-for-self-sovereign) 2020-09-10 Nick Byrne + > The reason why we have seen less uptake in SSI solutions is because the people behind these solutions fail to recognise the design principles that will be most important to its success. Instead, we see people focusing on technological nirvanas like blockchain or an over-emphasis on governance. diff --git a/_posts/blockchain/2019-04-11-blockchain-identity.md b/_posts/blockchain/2019-04-11-blockchain-identity.md index 08a2fed7..6d1f1024 100644 --- a/_posts/blockchain/2019-04-11-blockchain-identity.md +++ b/_posts/blockchain/2019-04-11-blockchain-identity.md @@ -18,12 +18,29 @@ toc: false * [curated list] [Peacekeeper's Blockchain and Identity](https://github.com/peacekeeper/blockchain-identity) 2021-11-23 * [Identity Blockchains and Energy Consumption](https://indicio.tech/identity-blockchains-and-energy-consumption/) 2021-10-19 Indicio A decentralized network using a blockchain-based distributed ledger means you can use [Peer DIDs](https://identity.foundation/peer-did-method-spec/) to move most “transactions” and their cryptographic proofing off ledger. This means that for those peer-to-peer interactions, identity blockchains don’t need to do any ledger transactions at all. -* [NIST CYBERSECURITY WHITE PAPER] [**_A Taxonomic Approach to Understanding Emerging Blockchain Identity Management Systems_**](https://arxiv.org/pdf/1908.00929.pdf) 2019-06-09 - > Identity management systems (IDMSs) are widely used to provision user identities while managing authentication, authorization, and data sharing both within organizations as well as on the Internet more broadly. Traditional identity systems typically suffer from single points of failure, lack of interoperability, and privacy issues such as encouraging mass data collection and user tracking. Blockchain technology has the potential to support novel data ownership and governance models with built-in control and consent mechanisms, which may benefit both users and businesses by alleviating these concerns; as a result, blockchain-based IDMSs are beginning to proliferate. This work categorizes these systems into a taxonomy based on differences in architecture, governance models, and other salient features. We provide context for the taxonomy by describing related terms, emerging standards, and use cases, while highlighting relevant security and privacy considerations. +* [Self Sovereign Identity ≠ Blockchain](https://jolocom.io/blog/dezentrale-identitaten-%e2%89%a0-blockchain-2/) 2021-11-09 Jolocom + > Due to the ID-Wallet project in Germany, some articles and comments have equated Self Sovereign Identity (SSI) with blockchain technology in the last few weeks. The impression is given that SSI only works in conjunction with a blockchain. Spoiler, that’s not the case. +* [tweet thread] [Technically you're right. Blockchain is not inherent to DIDs](https://twitter.com/Steve_Lockstep/status/1425924860312645633) 2021-08-13 Steve Wilson + > Most DID presentations (as with much SSI) open with a bit of a disclaimer that these technologies don't need blockchain. And yet the word-association is strong. Many DID block diagrams feature a blockchain. -/2 +* [Legitimacy and Decentralized Systems](https://www.windley.com/archives/2021/04/legitimacy_and_decentralized_systems.shtml) 2021-04 Windley + > Why are some decentralized systems accepted and widely used while others wither? Why do some “hard forks” succeed while others fail? It all comes down to legitimacy. +* [Why Distributed Ledger Technology (DLT) for Identity?](https://www.hyperledger.org/blog/2021/04/21/why-distributed-ledger-technology-dlt-for-identity) 2021-04-21 Hyperledger + > So why DLT? First, we can get the good parts of paper credentials—private transactions between holders and verifiers and no callback to the issuer. Second, the issuer gets a trusted, open and transparent way to publish the cryptographic material needed for those private holder-verifier transactions. Third, there is no need to have a “Trusted Third Party” participating in the interactions. + > + > And did I mention, no private data goes on the DLT!!! +* [Digital Identity and Blockchain – Its Place in Newer Identity Models](https://cyber.ee/blog/2021/04-21/) 2021-04-21 + > In the [first part of this series](https://cyber.ee/blog/2021/04-14/), we introduced the idea that traditional PKI-based digital identity solutions can potentially benefit from blockchain technology. + > [...] + > For this next part of the series, we’ll touch on the relatively new idea of self-sovereign identity, or SSI. +* [Blockchain is the Least Interesting Thing About Self-sovereign Identity](https://medium.com/trinsic/blockchain-is-the-least-interesting-thing-about-self-sovereign-identity-75c1b56ce497) 2020-09-23 Riley Huges + > as useful as blockchain is for SSI, it’s nowhere near as interesting as: + > - The impact on the internet + > - The benefits of technical standards + > - The economic opportunity for early innovators * [Identity and Distributed Ledger - Today and Tomorrow - June 26 - Identiverse 2019](https://www.youtube.com/watch?v=l04AHP7kPPw) 2019-06-26 > Join our expert panel, moderated by Paul Madsen, as they discuss and debate the future of distributed identity technology and its applications in solving identity problems. -* [Phil Windley (@windley)](https://twitter.com/windley/status/1071469217650638848) 2018-12-09 - > If ledger isn’t used, then every issuer of a credential has to maintain infrastructure or contract service provider to respond to DID resolution & revocation requests. And, credential issuers would know when the credential was used, impacting privacy. +* [If ledger isn’t used, then every issuer of a credential has to maintain infrastructure](https://twitter.com/windley/status/1071469217650638848) 2018-12-09 Phil Windley + > or contract service provider to respond to DID resolution & revocation requests. And, credential issuers would know when the credential was used, impacting privacy. * [Part 3: Blockchange and Identity – The Foundational Use Case](https://blockchan.ge/fieldreport/identity.html) GovLab 2018-11-01 > The contemporary IAM literature focuses on two central types of identity. The first is foundational identity, which is usually equated with legal identity. Here, after collecting attributes, individuals are issued a unique ID that is legally recognized at the national level and can be used to access different services. Legal IDs are almost always issued by the state in a centralized fashion. National ID cards are perhaps the best example of a foundational identity. > @@ -37,10 +54,15 @@ toc: false > There were 15 direct responses and then a whole lot of subthreads. * [Blockchain-Anchored Identity – A Gateway to Decentralized Apps and Services](https://www.youtube.com/watch?v=hUYpvI43bHA) 2017-05-10 Daniel Buchner > Blockchains possess unique properties that can be used to build systems that significantly impact our world. Perhaps no area of utilization, besides raw value exchange, is as intriguing as decentralized identity. In this talk we will discuss how blockchain-anchored decentralized identity can be used as a substrate for secure, user-centric apps and services. -* [Towards Self-Sovereign Identity using Blockchain Technology](https://essay.utwente.nl/71274/1/Baars_MA_BMS.pdf) 2016-10-26 - > Blockchain technology could function as the foundation of such system being a network for decentralized trust and exchange. Because everyone can participate as issuer or acquirer (and both), there are low adoption barriers and low costs. This allows new business opportunities for governments, banks and other authorities and more transparency and control for end-users. * [Self-Sovereign Identity and the Legitimacy of Permissioned Ledgers](http://www.windley.com/archives/2016/09/self-sovereign_identity_and_the_legitimacy_of_permissioned_ledgers.shtml) 2016-09 > This post justifies the claim that an identity system based on a permissioned distributed ledger is legitimately self-sovereign. The post also examines the claims to legitimacy that social login and distributed ledger identity systems make. * [Blockchain for Identity - Myth or Potential](https://www.kuppingercole.com/blog/kuppinger/blockchain-for-identity-myth-or-potential) 2018-06-16 > Authentication might definitely become simpler, by having various authenticators and IDs, from eIDs to social logins, associated with a wallet. Just one simple store to get access. Yes, there are challenges in creating secure, easy-to-use wallets, but there is potential as well. ![](https://i.imgur.com/YSyv11h.png) + +## Literature + +* [NIST CYBERSECURITY WHITE PAPER] [**_A Taxonomic Approach to Understanding Emerging Blockchain Identity Management Systems_**](https://arxiv.org/pdf/1908.00929.pdf) 2019-06-09 + > Identity management systems (IDMSs) are widely used to provision user identities while managing authentication, authorization, and data sharing both within organizations as well as on the Internet more broadly. Traditional identity systems typically suffer from single points of failure, lack of interoperability, and privacy issues such as encouraging mass data collection and user tracking. Blockchain technology has the potential to support novel data ownership and governance models with built-in control and consent mechanisms, which may benefit both users and businesses by alleviating these concerns; as a result, blockchain-based IDMSs are beginning to proliferate. This work categorizes these systems into a taxonomy based on differences in architecture, governance models, and other salient features. We provide context for the taxonomy by describing related terms, emerging standards, and use cases, while highlighting relevant security and privacy considerations. +* [Towards Self-Sovereign Identity using Blockchain Technology](https://essay.utwente.nl/71274/1/Baars_MA_BMS.pdf) 2016-10-26 + > Blockchain technology could function as the foundation of such system being a network for decentralized trust and exchange. Because everyone can participate as issuer or acquirer (and both), there are low adoption barriers and low costs. This allows new business opportunities for governments, banks and other authorities and more transparency and control for end-users. diff --git a/_posts/government/2019-03-01-government.md b/_posts/government/2019-03-01-government.md index 9aefd51d..8ef0c103 100644 --- a/_posts/government/2019-03-01-government.md +++ b/_posts/government/2019-03-01-government.md @@ -1,6 +1,6 @@ --- date: 2019-03-01 -title: Decentralized Identity and the Public Sector +title: Governments and Decentralized Identity description: "Assorted Resources Related to Blockchain and Identity for Government and the Public Sector." excerpt: "Modern identity and access management (IAM) came into focus during the late 1930s, when a group of European countries began issuing national ID cards. During this time, creating a more systematic approach for establishing and authenticating the official use of trusted identities emerged." layout: single @@ -16,15 +16,23 @@ header: image: /images/blockchange-identity-header.webp caption: "[On the Emergent Use of Distributed Ledger Technologies for Identity Management](https://blockchan.ge/blockchange-fieldreport.pdf)" categories: ["Regional"] -tags: ["Global","Tokyo","China","Korea","Latin America","Japan","Africa"] +tags: ["Government","Global","Tokyo","China","Korea","Latin America","Japan","Africa"] last_modified_at: 2023-06-06 -toc: false +toc: true +toc_sticky: false --- +## Explainer +* [It’s time for digital self-sovereign identity](https://gcn.com/emerging-tech/2022/08/its-time-digital-self-sovereign-identity/375285/) 2022-08 GCN + > But while digital IDs may offer residents convenience, they also open the flood gates for fraud and identity theft. That’s because to verify an individual’s information, agencies and businesses must collect, validate and store massive amounts of personal information. These large caches of personal information are prime targets for cyberattacks. +* [Impacts from a new reality drive the need for an enhanced digital identity framework](https://bankautomationnews.com/allposts/risk-security/impacts-from-a-new-reality-drive-the-need-for-an-enhanced-digital-identity-framework/) 2022-02-28 Bank Automation News + > While US-based entities are adhering to an enhanced regulatory framework, these mandates are particularly applicable in Europe, where there is necessary compliance with enacted standards (such as the General Data Protection Regulation—commonly known as GDPR—and the Payment Service Providers Directive 2—referred to as PSD2. A clear need for a true and persistent digital identity as a solution to the ancillary—and sometimes unforeseen—challenges that have arisen. * [Decentralized Identity & Government](https://www.youtube.com/watch?v=l8pHUdjKfes) Evernym 2021-12-08 > The key differences between federated and decentralized identity systems - An analysis of a few notable government-led projects, such as Aadhaar (India), Verify (UK), eIDAS (EU), and the Ontario Digital Identity Program (Canada) - What decentralization means for portability, scalability, flexibility, and privacy - How governments and commercial organizations can enhance existing federated identity systems with verifiable credentials * [Self-Sovereign Identity (SSI) schemes and the public sector](https://www.impulse-h2020.eu/2021/11/05/self-sovereign-identity-ssi-schemes-and-the-public-sector/) Impulse H20 2021-11-05 > While the structural difference between SSI approaches and conventional centralised or federated eID schemes is, on one level, profound (full control over data and identity with the user; no third-party intermediary between the user and the service provider), on another level, these differences may also appear highly abstract to ordinary users. What societal and economic consequences they may unfold remains, so far, little understood, also because research on the real social and economic effects of SSI solutions is only beginning. +* [Verifying documents & identity in the public services and beyond](https://www.openaccessgovernment.org/w3c-verifiable-credentials-verifying-documents-identity/123049/) 2021-10-25 OpenAccessGovernment • David Chadwick + > A particularly useful aspect of the Verifiable Credentials standard is that the parties undertake the specific roles of Issuer, Holder or Verifier, but they are not constrained in how many roles, or when, they can employ them. Each party can be a device, a person or an institution, meaning that verifications can take place directly between automated systems, even verifying that each other is genuine before establishing a connection to share data * [Digital Identity Around the World: Why Some Countries are Embracing Self Sovereign Identity Quicker](https://hackernoon.com/digital-identity-around-the-world-why-some-countries-are-embracing-self-sovereign-identity-quicker) 2021-09-03 Hackernoon > Each government moves at its own pace for as many reasons as there are countries, and digital identity/SSI will only become a reality once governments voice their support, regulations, and standards are adopted, infrastructure is created or upgraded, and interoperability, inclusion, and education are all addressed. * [Navigating Digital Identity in Political Economies RxC Panel](https://identitywoman.net/navigating-digital-identity-in-political-economies-rxc-talk/) 2021-08-25 IdentityWoman.net @@ -39,6 +47,8 @@ toc: false > When it comes to identity management the involvement of the government can be a tricky topic. It needs to be involved to enable access to public services, adapt legislature and guarantee equal access for its citizens. However, it should not be able to control or monitor all aspects and activities of its citizens. Self-sovereign identity (SSI) might for some imply, that a citizen is suddenly able to issue his own ID-card, which isn’t the case. Governments are still the primary source of foundational identities." * [Data: Governance and Geopolitics](https://www.mydigitalfootprint.com/2021/01/data-governance-and-geopolitics.html) 2021-01-16 Tony Fish > How data is governed can be thought of along several lines of activity: legislating privacy and data use, regulating content, using antitrust laws to dilute data monopolies, self-regulating by the tech giants, regulating digital trade, addressing intellectual property rights (IPR) infringement, assuring cybersecurity, and practicing cyber diplomacy. Of these, antitrust, regulation, and privacy are most immediately in the spotlight, and are the focus of this commentary, but it will also touch briefly on the connections with other issues. +* [Do we really need (or want) the State to provide us with digital identification?](https://www.libertarianism.org/articles/self-sovereign-identity-blockchain-age) 2020-07-20 Libertarianism + > Just as the State still manages our “analog” identities, the online giants have vast power to manage the online data and identity of their users. Internet users are now both consumer and product: by using free online services, users feed companies with data, which those companies in turn process and monetize. * [It’s time for governments to get serious about digital identities](https://www2.deloitte.com/global/en/pages/risk/articles/solving-the-public-sector-identity-crisis.html?id=global:2sm:3tw:4dcom_share:5awa:6dcom:risk) 2020-02-25 Deloitte > While the tools may already exist to solve the government’s identity crisis, real progress will only be made if governments significantly evolve their legacy approaches to digital identity. * [The ‘Digital Identity Crisis’ and what it means for Governments and individuals](https://procivis.ch/2019/11/18/the-digital-identity-crisis-and-what-it-means-for-governments-and-individuals/) 2019-11-18 ProCivis diff --git a/_posts/government/2023-06-09-india.md b/_posts/government/2023-06-09-india.md index 9891c872..ace6918a 100644 --- a/_posts/government/2023-06-09-india.md +++ b/_posts/government/2023-06-09-india.md @@ -15,19 +15,6 @@ last_modified_at: 2023-06-07 * [Dynamic Data Economy Presented to Technology Consortium in India](https://humancolossus.foundation/blog/dde-amp-hasgeek) 2023-06-09 HumanColossus Foundation > The "Data Governance and Semantics" project featured three webinars introducing DDE as a decentralised trust infrastructure acutely aligned with the current movement toward data exchange models in the Economic domain where actors regain transactional sovereignty to share accurate information bilaterally. -## Application -* [Real World] [Sandeep Shukla · Professor, Computer Science and Engineering at Indian Institute of Technology, Kanpur](https://www.linkedin.com/feed/update/urn:li:ugcPost:6924705964537389056/) Linkedin - > IGNOU (Indira Gandhi National Open University) had their convocation today and they issued more than 60000 degrees and certificates as Self-Sovereign Identity document (Cryptographically verifiable Credential) on [National Blockchain Project](https://www.linkedin.com/company/national-blockchain-project/) and [CRUBN](https://www.linkedin.com/company/crubn/)'s SSI blockchain. - -## Kochi - -* [Hyperledger KochiOrgBook Meetup](https://www.youtube.com/watch?v=HU0zXKiFYD0) 2020-10-27 (modeled after [BCGov Orgbook](https://www.orgbook.gov.bc.ca/search)), in collaboration with Wipro, CUSAT, and KBA. - > “KochiOrgBook is a Verifiable Organization Network for the city of Kochi [India]. It is a technology demonstrator to launch a DID based utility compliant with the ToIP standards to enable trusted digital verification for various associations within the city of Kochi.” -* [The KochiOrgBook Association Wallet](https://hyperledgerkochi.github.io/KOBAW/) - > KochiOrgBook Association Wallet(KOBAW) is an online directory that makes finding authentic and authoritative data about associations faster and easier. Association Wallet is a searchable database, where the verifiable credentials of associations under the jurisdiction of Kochi are stored in a decentralized manner. The KOBAW provides all the services offered by a Association authorized to work in Kochi. If a citizen want to be part in an association then, a request for enrolling is moved from the KOB Connect App to KOB Association Wallet. KOBAW process various claim requests. -* [The Orgbook for Kochi](https://github.com/hyperledgerkochi/KochiOrgBook) 2021-09-04 - > KOB includes [Decentralized Identity(DID)](docs/gf_controlled/glossary.md#did-decentralized-identifier) based [Public Identiy Utility (KOBPIU)](docs/gf_info/sub_projects.md#kochiorgbook-public-identity-utility-kobpiu) network, [A Verifiable Organizations Network(KOBVON)](docs/gf_info/sub_projects.md#kobvon) for Associations in Kochi, [Association Wallet Application(KOBAW)](docs/gf_info/sub_projects.md#kochiorgbook-association-wallet-kobaw), DID based [Mobile Wallet for Citizens(KOBConnect)](docs/gf_info/sub_projects.md#kobconnect) and a [community cloud (KOBCC)](docs/gf_info/sub_projects.md#kochiorgbook-community-cloud-kobcc). - ## Background * [Identity in the 21st Century India: Where are we?](http://web.archive.org/web/20220207113647/https://www.crubn.com/_files/ugd/3e90e2_82e2de11e1194f1c93ed68c411d78564.pdf?index=true) 2022-02-06 Crubn @@ -36,10 +23,12 @@ last_modified_at: 2023-06-07 > However, all of this has not proceeded without dissent and challenges. The 2018 Supreme Court verdict limited Aadhaar authentication only to public service delivery and taxation purposes, prohibiting even its voluntary use in the private sector. * [India-stack and self-sovereign identity](https://www.youtube.com/watch?v=of-iuDZpWuA) EUBS 2022 > A panel discussion with Akhilesh Srivastava (IT Advisor at Government of Uttarakhand), Mallikarjun Karra (Director of Research And Partnerships at Timechain Labs), Prof. Sandeep Shukla (Computer Science & Engineering at Indian Institute of Technology Kanpur), Swapnil Pawar (Founder of Newrl) and Ishan Roy (Head of Blockchain at Tamil Nadu E-Governance Agency) -* [Self Sovereign Identities](https://www.academia.edu/7401699/Self_Sovereign_Identities) RISHABH GARG, 2021 - > The book encompasses the physical or paper forms of identity, together with the benefits and pitfalls of Aadhaar - a multimillion biometrics enabled UID project of the Government of India. Taking into account the central, federated and self-sovereign models of digital identity, the self-sovereign model has been explained, in detail, for identification and access management leveraging blockchain technology. * [Revisiting the non-personal data governance framework](https://www.orfonline.org/expert-speak/data-development-revisiting-non-personal-data-governance-framework/) 2020-12-30 > In July 2020, an expert committee established by the Ministry of Electronics and Information Technology (MEITY) released a report on the Non-Personal Data (NPD) governance framework for India. The document is well-intentioned in that it recognises the public value of data, and the need to democratise its use. +* [Self-sovereign identity system: Blockchain-based tech for identity verification](https://www.youtube.com/watch?v=Q7IhaY4eKEc) 2021-12-28 Economic Times + > Professor Manindra Agrawal, Department of CSE, IIT Kanpur, explains how the self-sovereign identity system can ease issues like certification, verification and eliminate forgery of identity using blockchain technology. +* [Self Sovereign Identities](https://www.academia.edu/7401699/Self_Sovereign_Identities) RISHABH GARG, 2021 + > The book encompasses the physical or paper forms of identity, together with the benefits and pitfalls of Aadhaar - a multimillion biometrics enabled UID project of the Government of India. Taking into account the central, federated and self-sovereign models of digital identity, the self-sovereign model has been explained, in detail, for identification and access management leveraging blockchain technology. * [Practising data stewardship in India, early questions](https://www.adalovelaceinstitute.org/blog/practising-data-stewardship-in-india/) 2020-10-23 > Another functional question that needs to be resolved concerns how we communicate the value of data stewardship as an ideal, and relatedly the value of data itself. Given the unequal relationships between technology companies and people, the fact that data is a valuable resource that can be used for negotiation is still not necessarily understood. For instance, drivers on ride-hailing applications are forced to part with significant data that is used to generate profits for companies, but the drivers who are struggling for social security, and labour rights are not equipped to also bargain for data rights. * [How can India spur a self sovereign identity revolution?](https://community.nasscom.in/communities/emerging-tech/how-can-india-spur-a-self-sovereign-identity-revolution.html) 2019-11-04 Sharat Chandra @@ -47,3 +36,16 @@ last_modified_at: 2023-06-07 * [Exploring Self Sovereign Identity in India](https://www.windley.com/archives/2018/07/exploring_self-sovereign_identity_in_india.shtml) 2018-07 Phil Windley > In a multi-source identity world, Aadhaar is just one more (important) credential that Indian citizens would hold in their wallets. The other government issued documents that are used, for example, in the food distrubtion system could also be in the wallet. Aadhaar doesn't have change how it works now, but simply issue a verifiable credential based on the Aadhaar identity. Once they're available as verifiable credentials, they could be used in any digital scenario where foundation identity information is needed. As a bonus, thanks to minimal disclosure, most of the time the Aadhaar number wouldn't even have to be disclosed. +## Application +* [Real World] [Sandeep Shukla · Professor, Computer Science and Engineering at Indian Institute of Technology, Kanpur](https://www.linkedin.com/feed/update/urn:li:ugcPost:6924705964537389056/) Linkedin + > IGNOU (Indira Gandhi National Open University) had their convocation today and they issued more than 60000 degrees and certificates as Self-Sovereign Identity document (Cryptographically verifiable Credential) on [National Blockchain Project](https://www.linkedin.com/company/national-blockchain-project/) and [CRUBN](https://www.linkedin.com/company/crubn/)'s SSI blockchain. + +### Kochi + +* [Hyperledger KochiOrgBook Meetup](https://www.youtube.com/watch?v=HU0zXKiFYD0) 2020-10-27 (modeled after [BCGov Orgbook](https://www.orgbook.gov.bc.ca/search)), in collaboration with Wipro, CUSAT, and KBA. + > “KochiOrgBook is a Verifiable Organization Network for the city of Kochi [India]. It is a technology demonstrator to launch a DID based utility compliant with the ToIP standards to enable trusted digital verification for various associations within the city of Kochi.” +* [The KochiOrgBook Association Wallet](https://hyperledgerkochi.github.io/KOBAW/) + > KochiOrgBook Association Wallet(KOBAW) is an online directory that makes finding authentic and authoritative data about associations faster and easier. Association Wallet is a searchable database, where the verifiable credentials of associations under the jurisdiction of Kochi are stored in a decentralized manner. The KOBAW provides all the services offered by a Association authorized to work in Kochi. If a citizen want to be part in an association then, a request for enrolling is moved from the KOB Connect App to KOB Association Wallet. KOBAW process various claim requests. +* [The Orgbook for Kochi](https://github.com/hyperledgerkochi/KochiOrgBook) 2021-09-04 + > KOB includes [Decentralized Identity(DID)](docs/gf_controlled/glossary.md#did-decentralized-identifier) based [Public Identiy Utility (KOBPIU)](docs/gf_info/sub_projects.md#kochiorgbook-public-identity-utility-kobpiu) network, [A Verifiable Organizations Network(KOBVON)](docs/gf_info/sub_projects.md#kobvon) for Associations in Kochi, [Association Wallet Application(KOBAW)](docs/gf_info/sub_projects.md#kochiorgbook-association-wallet-kobaw), DID based [Mobile Wallet for Citizens(KOBConnect)](docs/gf_info/sub_projects.md#kobconnect) and a [community cloud (KOBCC)](docs/gf_info/sub_projects.md#kochiorgbook-community-cloud-kobcc). + diff --git a/_posts/government/canada/2020-12-04-diacc.md b/_posts/government/canada/2020-12-04-diacc.md index eb26fc4e..bf628fe0 100644 --- a/_posts/government/canada/2020-12-04-diacc.md +++ b/_posts/government/canada/2020-12-04-diacc.md @@ -144,8 +144,6 @@ last_modified_at: 2023-06-05 ## Industry Insights * [DIACC Industry Insights: Digital ID in Government Services](https://diacc.ca/wp-content/uploads/2019/11/Industry-Insights-Digital-ID-in-Government-Services_Nov-2019.pdf) 2019-11 -* [Smart cities need user centric digital id to be built on foundational principles](https://diacc.ca/2019/11/22/smart-cities-need-user-centric-digital-id-to-be-built-on-foundational-principles/) 2019-11 - > DIACC firmly believes in user-centred digital ID – designed to prioritize and require user choice, control and consent regarding access to collect and manage data. As Sidewalk Labs looks to move forward in their work in Waterfront Toronto, we reiterate the importance of these principles as foundational to the empowerment of a digital society that works for all Canadians. * [DIACC Industry Insights: Digital ID in Civic Engagement](https://diacc.ca/wp-content/uploads/2019/10/Industry-Insights-Digital-ID-in-Civic-Engagement_October-2019-1.pdf) 2019-10 * [DIACC Industry Insights: Digital ID in Commerce](https://diacc.ca/wp-content/uploads/2019/09/Industry-Insights-Digital-ID-in-Commerce_September-2019.pdf) 2019-09 * [DIACC Industry Insights: Digital ID in Health Care](https://diacc.ca/2019/08/15/diacc-industry-insights-digital-id-in-health-care/) 2019-08-15 diff --git a/_posts/government/europe/2020-01-11-europe.md b/_posts/government/europe/2020-01-11-europe.md index 0d251dba..cf76b6f0 100644 --- a/_posts/government/europe/2020-01-11-europe.md +++ b/_posts/government/europe/2020-01-11-europe.md @@ -109,6 +109,8 @@ last_modified_at: 2023-06-15 ### Germany +* [Fintech Humans and One37 Identity Enter Into Strategic Partnership in Germany](https://www.bloomberg.com/press-releases/2022-07-28/fintech-humans-and-one37-identity-enter-into-strategic-partnership-in-germany) 2022-07-28 Bloomberg + > SSI framework is adopted in Germany and throughout the EU as a key privacy-by-design framework. Through its membership in DIACC, One37 contributes to the future of digital identity by leveraging the lessons from its own real-life use-cases in Canada where Verifiable Credentials play an increasingly crucial role. * [Reinventing Government with Technology - Sebastian Manhart](https://www.youtube.com/watch?v=1fTJA0r_XFg) 2021-12-01 KuppingerCole > Raj Hegde is joined by Sebastian Manhart - Technical Advisor on Digital Identity for the German Chancellery to explore governmental reform and understand stakeholder expectations behind the rollout of digital identity projects in the post-COVID era. * ["Irresponsible and Dangerous"](https://www.spiegel.de/netzwelt/apps/id-wallet-was-nach-dem-fehlstart-mit-dem-digitalen-fuehrerschein-passiert-a-f4bc10bc-08ab-42b4-9325-5de5cdc66e05) 2021-12-10 Spigel diff --git a/_posts/government/europe/2023-06-09-switzerland.md b/_posts/government/europe/2023-06-09-switzerland.md index ef0d83d1..65d8d5ae 100644 --- a/_posts/government/europe/2023-06-09-switzerland.md +++ b/_posts/government/europe/2023-06-09-switzerland.md @@ -26,6 +26,8 @@ last_modified_at: 2023-06-09 > How to move forward when expectations are high whilst divers and many open questions seem to lure on the way? How to demonstrate value of a constantly developing technology before all open issues are clarified? These uncertainties seemingly dominated the recent participation conference organized by the federal project team as the start of a series of similar events to accompany in the most transparent way the development and legislation of the newly proposed E-ID-Ecosystem for Switzerland. - Stream 1 – Exploring the Foundations - Stream 2 – Building the Extended SSI Ecosystem +* [Self-Sovereign Identity and how we can get there](https://www.procivis.ch/post/self-sovereign-identity-and-how-we-can-get-there) 2021-07-09 ProCivis + > Enabled by recent advances in the realm of cryptography, mobile devices and decentralized identity standards we can now put citizens firmly in control of their digital identities while ensuring the level of trust needed to unlock the full potential of a digital society. * [Self-Sovereign Identity – a game changer regarding privacy: The next level of identity management](https://adnovum.ch/en/company/blog/self_sovereign_identity_a_game_changer_regarding_privacy.html) 2022-01-12 Adnovum > After rejection of the e-ID Act in March 2021, the Swiss Federal government is working at full speed on a new proposal. The first results were published in a [discussion paper](https://www.bj.admin.ch/dam/bj/en/data/staat/gesetzgebung/staatliche-e-id/diskussionspapier-zielbild-e-id.pdf.download.pdf/diskussionspapier-zielbild-e-id.pdf) is one of three possible solutions proposed for the implementation of the future e-ID. * [the potential of Self-Sovereign Identity with representative use cases](https://www.adnovum.ch/en/company/blog/exploring_the_potential_of_self-sovereign_identity_with_representative_use_cases.html) Adnovum 2022-01-12 diff --git a/_posts/literature/2018-12-22-evolution-of-ssi.md b/_posts/literature/2018-12-22-evolution-of-ssi.md index 4e73d23b..530d5ef1 100644 --- a/_posts/literature/2018-12-22-evolution-of-ssi.md +++ b/_posts/literature/2018-12-22-evolution-of-ssi.md @@ -47,6 +47,8 @@ I think all of this thought should be consolidated into a cohesive declaration o * [How to Convince Dad* of the Importance of Self-Sovereign Identity](https://github.com/WebOfTrustInfo/rwot7/blob/master/final-documents/convincing-dad.md) * \*and your sister and your daughter and your best friend and your nephew (SSI Use-Cases) +* [Principles or Cult - An Irreverant Discussion on the Principles of SSI](https://www.thedinglegroup.com/blog/2021/9/1/principles-or-cult-an-irreverant-discussion-on-the-principles-of-ssi) 2021-09-01 Dingle Group + > The evolution of the Principles of SSI came about through the need to differentiate what is ‘true’ SSI versus marketing forces twisting the concept. This market driven motivator can bring cultish overtones to the process. Other content highlighted in [WebOfTrustInfo/self-sovereign-identity](https://github.com/WebOfTrustInfo/self-sovereign-identity) that I haven't had a chance to fully review, yet: diff --git a/_posts/open-source-projects/2023-06-11-sidetree.md b/_posts/open-source-projects/2023-06-11-sidetree.md index d2b10020..39d156a6 100644 --- a/_posts/open-source-projects/2023-06-11-sidetree.md +++ b/_posts/open-source-projects/2023-06-11-sidetree.md @@ -61,6 +61,15 @@ last_modified_at: 2023-06-12 > Tools and utilities to make working with the ION network and using ION DIDs easy peasy lemon squeezy #### About ION + +* [ION 101-401: what is ION (the public, permissionless DID network), how can you use it today, and what comes next](https://iiw.idcommons.net/3A/_ION_101-401:_what_is_ION_(the_public,_permissionless_DID_network),_how_can_you_use_it_today,_and_what_comes_next) 2021-05-06 Daniel Buchner (Microsoft) + > - Decentralization of did:ion if anchoring transactions are batched by an operator: it’s possible to choose the operator or to incur the cost of anchoring the transactions. Furthermore, the operator doesn’t gain access to the private key. + > - ION delivers: massive scale, cost efficiency (despite running on the bitcoin network - best case if bitcoin a transaction costs 100 USD one action costs 1 cent), decentralized & flexible, decentralized registries + > - ION has a type system so that DIDs can be used, e.g. for software packages, vehicles, … This makes it possible to make the centralized data repositories that we rely on today, npm registries etc., to be fully decentralized. This is a Sidetree feature that is currently only used by ION. + > - DIF is currently working on personal data stores. Expected impact on private messaging, social media, gig services, .. + > - ION is live and in production today + > - Ion-tools is a selection of tools to interact with the ION network: [https://github.com/decentralized-identity/ion-tools](https://github.com/decentralized-identity/ion-tools) + > - Resilience of ION: It’s pointed out that not only Bitcoin needs to survive attacks but also the IPFS network as both are required for ION to work properly. With Bitcoin it looks unlikely that it’s currently possible to reverse transactions on the network. However, with IPFS data can be unpinned and potentially disappear from the network. * [ION – We Have Liftoff!](https://techcommunity.microsoft.com/t5/identity-standards-blog/ion-we-have-liftoff/ba-p/1441555) 2021-03-25 > We are excited to share that v1 of [ION](https://identity.foundation/ion/) is complete and has been launched on Bitcoin mainnet. We have deployed an ION node to our production infrastructure and are working together with other companies and organizations to do so as well. ION does not rely on centralized entities, trusted validators, or special protocol tokens – ION answers to no one but you, the community. Because ION is an open, permissionless system, anyone can run an ION node, in fact the more nodes in operation, the stronger the network becomes. Development of ION, and the Sidetree standard ION is based on, takes place in the [Decentralized Identity Foundation](https://identity.foundation/) (DIF). Read on to learn how you can integrate ION, DIDs, and Verifiable Credentials in your applications and services. * [Introduction to Ion – a layer 2 network for Decentralized Identifiers with Bitcoin - Daniel Buchner](https://www.slideshare.net/SSIMeetup/introduction-to-ion-a-layer-2-network-for-decentralized-identifiers-with-bitcoin-daniel-buchner) 2019-06-13 [SSI Meetup](https://ssimeetup.org/introduction-ion-layer-2-network-decentralized-identifiers-bitcoin-daniel-buchner-webinar-29/) diff --git a/_posts/organizations/2019-04-04-mydata.md b/_posts/organizations/2019-04-04-mydata.md index 0a6b14a0..af9659d1 100644 --- a/_posts/organizations/2019-04-04-mydata.md +++ b/_posts/organizations/2019-04-04-mydata.md @@ -96,14 +96,6 @@ last_modified_at: 2023-06-18 * [Connecting Citizens and Government for Better Designed Services](https://medium.com/mydex/connecting-citizens-and-government-for-better-designed-services-9b58205185ce) 2021-05-19 MyData Our vision for [Inclued](https://mydex.org/platform-services/) is for it to become the de facto choice for two-way, secure citizen engagement that empowers citizens to not only access services but influence what is delivered to them, while giving governments and citizens insight and evidence into the value and impact of working with, not for citizens. -### Smart Cities - -* [Catalysing transformative change: new project to produce innovative services in smart cities](https://mydata.org/2021/09/02/catalysing-transformative-change-new-project-to-produce-innovative-services-in-smart-cities/) 2021-09-02 MyData - > “Cities around the world are racing ahead to be smarter by taking ethical approaches to personal data”, explains Teemu Ropponen, General Manager of MyData Global “MyData Global is a centre of excellence for personal data management expertise, with the H3C project we are bringing together city administrations, companies and individuals to find solutions that put people in control of their personal data” -* [Data Co-Operatives through Data Sovereignty](https://www.mdpi.com/2624-6511/4/3/62) 2021-08-15 Igor Calzada - > This article illustrates an open debate in data governance and the data justice field related to current trends and challenges in smart cities, resulting in a new approach advocated for and recently coined by the UN-Habitat programme ‘People-Centred Smart Cities’. -* [Training: Building smart cities services 2.0](https://oldwww.mydata.org/h3c/) 2021-08 MyData - > You will learn about business models, compliance with complex regulatory regimes, standards, and governance mechanisms. You will be connected with EU funding opportunities, and you will learn how to build successful partnerships with companies and cities ## [My Data 2018 Presentations](https://mydata2018.org/presentations/) diff --git a/unsorted/topics/cbdc.md b/unsorted/cbdc.md similarity index 100% rename from unsorted/topics/cbdc.md rename to unsorted/cbdc.md diff --git a/unsorted/companies/ssi.md b/unsorted/companies/ssi.md index 629db3d5..1f1de4c7 100644 --- a/unsorted/companies/ssi.md +++ b/unsorted/companies/ssi.md @@ -73,6 +73,12 @@ ZADA apps are all launched and our first digital ID – a COVIDPASS – is being * [Encoding Trust that Travels with Data — A New Product Introduction Case Study Powered by Solutions Design with Transmute](https://medium.com/transmute-techtalk/encoding-trust-that-travels-with-data-a-new-product-introduction-case-study-powered-by-solutions-a4be7e80bfdf) > underpinned by GS1 as a root of trust in the network — continuing a rich history for GS1 in this role. GS1 licenses and identifiers are and will continue to be at the foundation of trusting products and companies. Combining current practices with verifiable credential, decentralized identifier, and [GS1 Digital Link](https://www.gs1us.org/industries/emerging-topics/gs1-digital-link) standards disambiguating products builds business reputation for just-in-time engagement while keeping information up to date. +* [Community Credentials](https://credentials.resonate.is) Resonate + > [Verifiable Credentials](https://www.w3.org/TR/vc-use-cases/) are a new web standard for proving things digitally, thanks to some clever cryptography.  We are building Community Credentials to be the ‘Know Your Co-operator’ equivalent of KYC (Know Your Customer for business) for co-op social trust, all without reliance on centralised providers (or blockchains). +* [Ontology Collaborates With The Block To Uncover The Decentralized Identity Industry](https://medium.com/ontologynetwork/ontology-collaborates-with-the-block-to-uncover-the-decentralized-identity-industry-1c2c51d02df0) + > Ning Hu, CTO of Ontology, spoke at a panel titled “The State of Decentralized Identity Solutions” in association with [The Block](https://www.theblockcrypto.com/), [...] accompanied by experts in the field of digital identity, Daniel Buchner, Senior PM of Decentralized Identity at Microsoft, and Tobias Fox, Co-founder of Serto. The discussion delved into how digital identity applies to everything from financial services to upskilling workforces, and how blockchain infrastructure can be utilized to lay the trust framework for decentralized identity solutions. +* [What is Self-Sovereign Identity? #AllYouNeedToKnowAbout OmniOne Series](https://medium.com/@RaonSecure/what-is-self-sovereign-identity-allyouneedtoknowabout-omnione-series-f51887d34be8) 2021-04-28 RAON + > OmniOne comes from the willingness to help transition from a service-centric identity to the self-sovereign identity paradigm, empowering anyone to control their identity in a highly secure manner while providing mutual benefits to the participants of its ecosystem. ## Tangle Labs @@ -82,3 +88,7 @@ ZADA apps are all launched and our first digital ID – a COVIDPASS – is being By producing an accessible, open-source wrapper library, Tangle Labs provides any business or development team the opportunity to easily explore SSI and to test and prototype solutions that can bring added value to your business. +* [Decentralized identity explained](https://www.youtube.com/watch?v=Ew-_F-OtDFI) 2014-08-14 Microsoft + > What is decentralized identity? How does it give you more control over your digital identity and keep your information on the internet safer? This video explains in short what decentralized identity is and how it can replace usernames and passwords to verify you are who you say you are quickly and easily. +* [Changing the Game with Self-Sovereign Identity](https://eblockchainconvention.com/changing-the-game-with-self-sovereign-identity/) EblockchainConvention ValidatedID + > The EBC team had an insightful conversation with Ivan Basart, CTO at Validated ID, on how Self-Sovereign Identity technology is the ultimate solution to identity problems on the web. diff --git a/unsorted/resources/media-coverage.md b/unsorted/resources/media-coverage.md index 92d8caf8..5f44b85d 100644 --- a/unsorted/resources/media-coverage.md +++ b/unsorted/resources/media-coverage.md @@ -28,3 +28,5 @@ This is not limited to alcohol, however. It also includes other age-restricted p With identity being the missing link, the advent of self‐​sovereign identity could finally bring ambitious projects like [Bitnation](https://tse.bitnation.co/) to fruition. This virtual blockchain jurisdiction wants to establish a blockchain‐​based self‐​administration or, as the project itself advertises, “a toolbox for do‐​it‐​yourself governance.” With the concept of self‐​sovereign identity being implemented properly, new digital nations such as Bitnation could compete against old territorial tax states. +* [Beyond The Device With Self-Sovereign Identities](https://www.forbes.com/sites/alastairjohnson/2021/11/15/beyond-the-device-with-self-sovereign-identities/) Forbes 2021-11-15 + > In 2021, the average cost of a data breach reached an all-time high of [$4.24 million](https://www.upguard.com/blog/cost-of-data-breach), even though businesses are already spending millions more to combat financial crime and meet their regulatory and compliance responsibilities. diff --git a/unsorted/smart-cities.md b/unsorted/smart-cities.md index f2988ac7..bf52991b 100644 --- a/unsorted/smart-cities.md +++ b/unsorted/smart-cities.md @@ -1,2 +1,12 @@ * [Non-human Personas: Including Nature in the Participatory Design of Smart Cities](http://www.mifav.uniroma2.it/inevent/events/idea2010/doc/50_7.pdf) 2022-01-05 Martin Tomitsch, Joel Fredericks, Dan Vo, Jessica Frawley, Marcus Foth > this article assesses how the personas method can be adapted to include morethan-human perspectives in the design process. Based on a case study, which involved designing smart urban furniture for human and non-human use, we introduce a framework for developing and employing non-human personas. As a key element of the framework, we describe a middle-out approach for forming a coalition that can speak on behalf of the non-human species that are impacted by design decisions. +* [What does it take to develop human-centric solutions for the built environment?](https://mydata.org/2022/05/13/built-for-people/) 2022-05-13 MyData [[Video](https://www.youtube.com/watch?v=VCjW0_NAPmQ)] + > Building better, more human-centric solutions in smart cities starts by realising that citizens and their digital footprints are not merely aspects to monitor and evaluate. They are active participants in the cities we live and work together and need to be engaged in designing better cities and managing the data about themselves. This is not important only for respecting citizens’ rights, but it is crucial to building sustainable services and humane cities. +* [Smart cities need user centric digital id to be built on foundational principles](https://diacc.ca/2019/11/22/smart-cities-need-user-centric-digital-id-to-be-built-on-foundational-principles/) 2019-11 + > DIACC firmly believes in user-centred digital ID – designed to prioritize and require user choice, control and consent regarding access to collect and manage data. As Sidewalk Labs looks to move forward in their work in Waterfront Toronto, we reiterate the importance of these principles as foundational to the empowerment of a digital society that works for all Canadians. +* [Catalysing transformative change: new project to produce innovative services in smart cities](https://mydata.org/2021/09/02/catalysing-transformative-change-new-project-to-produce-innovative-services-in-smart-cities/) 2021-09-02 MyData + > “Cities around the world are racing ahead to be smarter by taking ethical approaches to personal data”, explains Teemu Ropponen, General Manager of MyData Global “MyData Global is a centre of excellence for personal data management expertise, with the H3C project we are bringing together city administrations, companies and individuals to find solutions that put people in control of their personal data” +* [Data Co-Operatives through Data Sovereignty](https://www.mdpi.com/2624-6511/4/3/62) 2021-08-15 Igor Calzada + > This article illustrates an open debate in data governance and the data justice field related to current trends and challenges in smart cities, resulting in a new approach advocated for and recently coined by the UN-Habitat programme ‘People-Centred Smart Cities’. +* [Training: Building smart cities services 2.0](https://oldwww.mydata.org/h3c/) 2021-08 MyData + > You will learn about business models, compliance with complex regulatory regimes, standards, and governance mechanisms. You will be connected with EU funding opportunities, and you will learn how to build successful partnerships with companies and cities diff --git a/unsorted/standards/standards.md b/unsorted/standards/standards.md index 8309f95f..1f4c1183 100644 --- a/unsorted/standards/standards.md +++ b/unsorted/standards/standards.md @@ -92,3 +92,7 @@ For individuals in particular, DIDs can put them back in control of their person * [SSI Interaction Patterns](https://www.windley.com/archives/2021/06/ssi_interaction_patterns.shtml) > While the DID Authn pattern is simple, it is not as flexible as we need in some situations. For more complicated scenarios, we can use verifiable credentials. The first scenario we’ll consider is where the same organization is issuing and verifying the credential. > ![](https://s3.amazonaws.com/revue/items/images/009/411/724/mail/Credential_Internal.png?1621957585) + +* [The Time for Self-Sovereign Identity is Now](https://medium.com/learning-machine-blog/the-time-for-self-sovereign-identity-is-now-222aab97041b) Kim Hamilton Duffy, Learning Machine (Now Hyland Credentials) +Oldie but Goodie by Kim Hamilton Duffy from when she worked at Learning Machines + > Technically, Verifiable Claims are claims made about a “subject” (identified by a digital identifier such as a DID) that are rendered tamper proof through digital signatures. The authenticity of digital signatures may, in turn, be established through issuer identifiers, which may also be expressed as DIDs. diff --git a/unsorted/topics/data-governance.md b/unsorted/topics/data-governance.md index 401c0109..816405cf 100644 --- a/unsorted/topics/data-governance.md +++ b/unsorted/topics/data-governance.md @@ -7,6 +7,13 @@ published: false > New work that may leverage decentralized ID from the supply chain side of things…but not sure (lots of links inside on data brokers harm) * [INNOPAY paper on data sharing published in CEUR Workshop Proceedings](https://www.innopay.com/en/news/innopay-paper-data-sharing-published-ceur-workshop-proceedings) Innopay > This week, CEUR-WS.org has published the paper titled ‘[Harmonization Profiles for Trusted Data Sharing Between Data Spaces: Striking the Balance between Functionality and Complexity](http://ceur-ws.org/Vol-3214/WS6Paper2.pdf)’ in the CEUR Workshop Proceedings. +* [Self Sovereign Identity Systems](https://yathartharora.substack.com/p/self-sovereign-identity-systems) 2021-04-09 The Passion Pad + > We should have the right to manage our identity, free of any country or the place where we live. By giving this right to the government or any central authority, we give them much more power. Separating data rights from the actual data is important. User should have the right to decide who should have the access to his/her data. +* [Self-Sovereign Identity – A Possibility for More Data Control for Users](https://dataethics.eu/self-sovereign-identity-a-possibility-for-more-data-control-for-users/) 2020-06-18 DataEthics.eu + > But also, the general populations’ computer skills must be taken into account when designing the solution, along with legal considerations of whether individuals should be allowed to sell sensitive data, such as health data to third parties. If it is legal to monetize personal data, users can be tempted to share personal data in a way that might harm them later e.g. sharing health data and later being denied an insurance. Monetization might also create a gap in the society and the world, having rich people prioritize protecting their privacy while less fortunate citizens might feel like they have no other option than selling their data. Thoughts about the monetization of data need to be considered in a legal context as it has been done with the donation of blood, when creating a self-sovereign identity solution. Furthermore, safeguard measures must be made against discrimination like only providing identity for a selected few, and to ensure that everyone have equal access to creating a trustworthy digital identity. + + * [What’s in Your Data Ecosystem?](https://stateofidentity.libsyn.com/whats-in-your-data-ecosystem) State of Identity + > Indicio's CEO, Heather Dahl, and CTO, Ken Ebert, identity wallets, verified credentials, the role of the Sovrin Foundation, and new momentum around interoperability across decentralized identity. * [UNDP LEGAL IDENTITY AGENDA ONLINE FORUM: PRIVATE SECTOR ENGAGEMENT ROUNDTABLES: DATA PROTECTION AND PRIVACY](https://unstats.un.org/LEGAL-IDENTITY-AGENDA/MEETINGS/2021/UNLIA-FUTURETECH/DOCS/REPORT2.PDF) diff --git a/unsorted/topics/explainer.md b/unsorted/topics/explainer.md index af70b31f..c27dbdc3 100644 --- a/unsorted/topics/explainer.md +++ b/unsorted/topics/explainer.md @@ -3,605 +3,272 @@ published: false --- # Explainer -* [ID Verification Threats On the Horizon](https://stateofidentity.libsyn.com/id-verification-threats-on-the-horizon) 2022-03-31 Liminal Podcasts - > Cognito's CEO Alain Meier joins the State of Identity host Cameron D’Ambrosi to dive into why industries beyond financial services are now in the market for identity verification. They also unpack the impact of synthetic identity fraud across verticals, and how platforms find the balance when building their onboarding processes. -* [It’s time for digital self-sovereign identity](https://gcn.com/emerging-tech/2022/08/its-time-digital-self-sovereign-identity/375285/) GCN - > the implementation of granular security measures to protect that data creates trusted networks between governments and the citizens they serve. Everyone wins. -* [Digital Identity Isn’t Only For People](https://www.forbes.com/sites/davidbirch/2020/12/22/digital-identity-isnt-only-for-people/) 2020-12-22 David Birch, Forbes - > fintechs and regtechs looking for opportunities in the digital identity space should cast their ideas net pretty wide. Digital identities are not only for people and the future desperately needs digital identities for pretty much everything to underpin recognition, relationships and reputation (the 3Rs of the online economy). -* [Impacts from a new reality drive the need for an enhanced digital identity framework](https://bankautomationnews.com/allposts/risk-security/impacts-from-a-new-reality-drive-the-need-for-an-enhanced-digital-identity-framework/) 2022-02-28 Bank Automation News - > While US-based entities are adhering to an enhanced regulatory framework, these mandates are particularly applicable in Europe, where there is necessary compliance with enacted standards (such as the General Data Protection Regulation—commonly known as GDPR—and the Payment Service Providers Directive 2—referred to as PSD2. A clear need for a true and persistent digital identity as a solution to the ancillary—and sometimes unforeseen—challenges that have arisen. -* [The Shape of your Identity](https://stateofidentity.libsyn.com/the-shape-of-your-identity) 2022-03-17 State of Identity Podcast - > How are personal data and digital identity reshaping society? [...] Cameron D'Ambrosi is joined by Michael Becker, CEO of Identity Praxis, to discuss the evolution of the identity industry, the latest trends to follow (or flee), and predictions for the future of both consumer and enterprise digital identity. -* [Is Self-Sovereign Identity Going Exponential?](https://www.youtube.com/watch?v=xWy0rP8uTiU&t=2406s) 2021-10-27 Sybrin [Recap](https://corporate.sybrin.com/webinar-SSI) - > with [Andrew Baker](https://www.linkedin.com/in/andrew-baker-b1357939/), Head of EC2 Engineering at AWS, and [Lohan Spies](https://www.linkedin.com/in/lohanspies/), Chair of the [Sovrin Steward Council](https://sovrin.org/join-the-new-sovrin-steward-council/), they explore the concept of Self-Sovereign Identity (SSI) in detail, discussing what profound implications SSI will have and whether it is indeed the next game changer? -* [Kaliya Young on Identikit with Michelle Dennedy](https://identitywoman.net/podcast-identikit-with-michelle-dennedy/) IdentityWoman + +## Self Sovereign Identity +* [What is Self Sovereign Identity](https://medium.com/coinmonks/what-is-self-sovereign-identity-a8087b2bf0ea) 2021-10-13 Florian Strauf + > The important thing in SSI is that instead of a stamp on the plastic card, the credential is signed cryptographically by the issuer, enabling anyone to verify who issued the credentials. This makes verification much easier than in the physical world. +* [Decentralizing Identity - Taking Back Control](https://www.madigansolutions.com/blog/decentralizing-identity-taking-back-control/) 2021-10-13 Madigan Solutions + > In a nutshell, Self-Sovereign Identity allows individuals to manage their own identities by moving physical credentials to digital devices. An individual will receive a credential from an issuer which will be stored in their digital wallet. +* [17 Things You Should Know About Self Sovereign Identity](https://www.linkedin.com/pulse/17-things-you-should-know-self-sovereign-identity-colin-iles/) 2021-10-29 Colin Iles + > lessons I took away from asking tech identity experts [Andrew Baker](https://www.linkedin.com/in/andrew-baker-b1357939/) (Head of EC2 Engineering at AWS), our mystery guest and [Marius Mare](https://www.linkedin.com/in/marius-mare-7b8536a/), to why we need self-sovereign identity and why it has such profound implications. +* [Is Self Sovereign Identity Going Exponential - With Andrew Baker and A Suprise Guest](https://www.youtube.com/watch?v=caZnuTBJ_TM) 2021-10-27 Colin Iles + > despite the technological revolution we are living through, identity management is still as objectionable as ever, which is allowing criminals and companies (particularly the social media giants) to know more about you than can ever be justifiable. + > + > In this discussion I ask Andrew Baker, AWS's Head of EC2 Engineering and a surprise guest, to share their views on whether Self Sovereign Identity management could be the solution and how likely it is +* [Digital Identity: The Trending Tech Concept Changing How We Live](https://www.forbes.com/sites/johnhall/2021/10/15/digital-identity-the-trending-tech-concept-changing-how-we-live/?sh=3e004c6c2c4c) 2021-10-15 Forbes + > Identification is key to our success. It determines the jobs we get, the money we make, how we can manage our health, and more. The fact of the matter is that 3.4 billion people have access to legally recognized identification but still [have difficulty using that identification online](https://www.mckinsey.com/business-functions/mckinsey-digital/our-insights/digital-identification-a-key-to-inclusive-growth). +* [Self-Sovereign Identity: a Primer](https://medium.com/@hartmut.obendorf/self-sovereign-identity-a-primer-ee3d7066348a) 2021-08-03 Hartmut Obendorf + > Digital trust is often centralised, with select, well-known entities providing an anchor of trust that is propagated to everyone else; you are using this mechanism as you read this paragraph, having accessed a https: URL to find this article on your trusted platform, Medium. +* [Why self-sovereign identity matters](https://medium.com/global-id/why-self-sovereign-identity-matters-8fd2c982ca2e) 2020-04-29 GlobalID + > your digital identity represents you as a unique real-life person in a secure digital format. In fact, we likely have many different virtual identities across a spectrum of platforms and services. +* [The Principles of User Sovereignty](https://uxdesign.cc/the-principles-of-user-sovereignty-515ac83401f6) 2020-07-31 UXDesign + > “Our identities have no bodies, so, unlike you, we cannot obtain order by physical coercion. We believe that from ethics, enlightened self-interest, and the commonweal, our governance will emerge. Our identities may be distributed across many of your jurisdictions. The only law that all our constituent cultures would generally recognize is the Golden Rule. We hope we will be able to build our particular solutions on that basis. But we cannot accept the solutions you are attempting to impose.” — John Perry Barlow +* [Distributed, Decentralized, Self-Sovereign Identity](https://condatis.com/news/blog/did-decentralized-ssi/) 2021-04-22 Condatis + > With DID already being implemented, this new and exciting technology is due to shake up the digital identity space. We expect decentralized identity to continue making headway, with more and more sectors and businesses adopting the technology. +* [Introduction to Self-Sovereign Identity](https://dev.to/jakubkoci/introduction-to-self-sovereign-identity-3kkm) 2021-03-28 Jakubkoci + > In this article, I will do my best to explain self-sovereign identity from the end-user perspective, without any technicalities. +* [Kaliya Young on Identikit with Michelle Dennedy](https://identitywoman.net/podcast-identikit-with-michelle-dennedy/) 2021-08-25 IdentityWoman > our latest series examining the evolution of digital identity, and how self-sovereign identity, specifically, can advance a consent-based economy. -* [Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledge Proofs —slideshare](https://www.slideshare.net/eralcnoslen/privacypreserving-authentication-another-reason-to-care-about-zeroknowledge-proofs) 2017-08-14 Clare Nelson - > In the near future, privacy-preserving authentication methods will flood the market, and they will be based on Zero-Knowledge Proofs. IBM and Microsoft invested in these solutions many years ago. * [Decentralized Identity Trilemma](http://maciek.blog/decentralized-identity-trilemma/) >There seems to exist a trilemma in decentralized identity analogous to @Zooko's triangle. None of the existing solutions are at the same time: 1) privacy-preserving, 2) Sybil-resistant 3) self-sovereign -[[**T**](https://twitter.com/MaciekLaskus/status/1031859093072424960)] +* [Self Sovereign Identity — explained](https://micha-roon.medium.com/self-sovereign-identity-explained-f5380c08e446) 2020-11-11 Micha Roon + > It would be great indeed if digital interactions became even more trustworthy without the need to present our data on a silver platter to large Internet corporations +* [When a user holds his:her own credentials locally on the phone, it creates a three-sided market](https://twitter.com/lissi_id/status/1334834875896004608) 2020-12-04 Lissi ID + > which puts the holder of the credential in the position of a carrier between issuer and verifiers. + > ![](https://pbs.twimg.com/media/EoZIgzqXIAE6mU5?format=jpg&name=large) +* [The Mental Models of Identity Enabled by SSI](https://ssi-ambassador.medium.com/the-mental-models-of-identity-enabled-by-ssi-d3e2d8d0f2b6) 2020-12-03 Adrian Doerk +The Models: Space Time • Presentation • Attribute • Relationship • Capability +* [Why is SSI becoming a necessity and what potential it holds?](https://www.aceblock.com/2020/11/12/news-lecture-why-is-ssi-becoming-a-necessity-and-what-potential-it-holds/) 2020-11-12 ACEBlock + > * Natural persons and legal entities interact in the digital world with the same freedom and capacities as in the offline world (e. g. signing, authorizing documents, validating signatures, communicating privately etc.) + > * Data is stored privately on a user device and not replicated numerous times across the digital world. + > + > In other words, when a user “shares” data, it shares only the access to his/her data. And, as easy as one can do that, they can also revoke it (unless they are legally bound to share it for a certain period). +* [The Implications of Bring Your Own Identity](https://www.idsalliance.org/blog/2020/12/03/the-implications-of-bring-your-own-identity/) Identity Defined Security Alliance 2020-12-03 + > My short stint as “Mark Jannell" taught me a lot of about trust and ease of use in a bring your own identity model. Trust, as always in security, is essential to this new class of relationships and must be established and then protected from abuse. Ease of use, it turns out, is a key factor in protecting that trust and promoting the adoption of good identity patterns. I’m sure that I could have learned these lessons in some other way, but I’ll never forget my half year answering to a pseudonym. +* [Evolution of Self-Sovereign Identity (SSI)](https://lionsgate.io/evolution-of-self-sovereign-identity-ssi/) 2021-11-16 LionsGate + > The public keys of the user and the third-party organization for verifying the digital signature are recorded in a distributed ledger, and the user of the identity information verifies the provided information using them. In this way, users can control their own identity information without relying on a specific central administrator. +* [Self-Sovereign Identity Crisis](https://lionsgate.io/self-sovereign-identity-crisis/) 2021-11-23 Lionsgate + > Through deceptive marketing practices the first-movers in the Digital ID market have done-away with the sovereignty. As a result a burgeoning new industry is experiencing a Self-Sovereign Identity Crisis. +* [Trusted Third Parties vs Self-Sovereign Identity](https://academy.affinidi.com/trusted-third-parties-vs-self-sovereign-identity-4e96de929b1b) 2021-12-30 Affinidi + > All of us have [multiple identities](https://academy.affinidi.com/what-links-identity-and-vcs-together-across-applications-9523af3884a9) at any point. We are sons, daughters, brothers, sisters, parents, partners, friends, colleagues, and more to different people. +* [A Future Built on Decentralized Identity](https://bloom.co/blog/a-future-built-on-decentralized-identity/) 2021-12-22 Bloom + > Decentralized identity is an emerging concept becoming more popular for online consumers by eliminating the need to pass personal identifiable information (PII) to an ever-increasing number of companies. However, in practice, decentralized identity has only existed for a handful of years, and its potential is still being discovered. So how did we get here? +* [SSI Essentials: Everything you need to know about Decentralized Identity](https://gataca.io/blog/ssi-essentials-everything-you-need-to-know-about-decentralized-identity/) 2021-11-29 Gataca + > Solving the identity paradox: the tradeoff between privacy, security, & user experience +* [Self-Sovereign Identities in Productive Systems - A Reality Check](https://www.youtube.com/watch?v=bRmhIL9sdd0) 2021-11-25 Frankfurt School Blockchain Center + > - Which use cases does SSI have? + > - What is the disruptive potential of SSI’s? + > - Which risks does the adoption of SSI pose? + > - What are the challenges and opportunities of SSI? + > - Where do the limitations of SSI lie? + > - How can SSI be incorporated into existing infrastructure? + > - Which steps need to be taken for the proliferation of SSI? +* [What is Self Sovereign Identity](https://medium.com/coinmonks/what-is-self-sovereign-identity-a8087b2bf0ea) 2021-10-13 Florian Strauf + > the digital representation of the identification process we know from the physical world. Things like showing our driver’s license to prove we are allowed to drive, or sending a bank statement to a real estate agent to prove our income and account balance. +* [Self Sovereign Identity Explainer](https://www.didas.swiss/2021/12/17/self-sovereign-identity-explainer-introduction-to-the-world-of-ssi/) 2021-12-17 DIDAS Swiss ([PDF](https://www.didas.swiss/wp-content/uploads/2021/12/SSI-Explainer-Introduction-final.pdf) + > The Self Sovereign Identity Explainer (in German) is the basis for the future discussions and in-depth learning. It briefly introduces the development history of digital identity and roughly describes the different phases of identity in the Internet age. +* [What Is Self-Sovereign Identity?](https://trinsic.id/what-is-self-sovereign-identity/) 2020-04-28 Trinsic + > Self-sovereign identity is the marriage of real identity with the digital world that will ultimately make people’s lives better.² It’s still in its infancy, and there is a long road ahead to truly make digital identity as legitimate and nuanced as a real-world identity. +* [Explaining SSI to C-suite executives, and anyone else for that matter – John Phillips](https://ssimeetup.org/explaining-ssi-c-suite-executives-anyone-else-john-phillips-webinar-48/) 2020-02-18 SSIMeetup + > John Phillips from 460degrees in Australia has been exploring with his team for more than two years for a way to describe Self-Sovereign Identity (SSI) that was easy to understand. We think he has found a good method to make SSI easy to understand for any C-suite executive and business people that goes beyond the technology. +* [Self-Sovereign Identity: The Ultimate Beginners Guide!](https://101blockchains.com/self-sovereign-identity/) 2021-02-23 101 Blockchains + > Apart from addressing the pitfalls in conventional identity management systems, SSI allows better functionalities for all users. With a wide range of benefits and the self-sovereign identity blockchain applications, it is important to take a step towards adopting SSI solutions. +* [Understanding the SSI Identity Model with Verifiable Credentials](https://www.youtube.com/watch?v=TRuz39SEX7E) 2021-11-13 Manning + > Drummond Reed, an expert in Internet identity, security, privacy, and trust frameworks, explains the basic building blocks of SSI and how this new identity model fundamentally works. +* [The 5P’s of a Self-Sovereign Identity](https://markvanrijmenam.medium.com/the-5ps-of-a-self-sovereign-identity-e6f6eb802d75) 2019-06-05 Dr Mark van Rijmenam + > A self-sovereign identity can be defined by the 5P’s as it is personal (it is about you), portable (meaning you can take your identity and data from one platform to another), private (you control your identity and data), persistent (it does not change without your consent) and protected (they cannot steal your identity). +* [Digital identities – steps on the path to an ID ecosystem](https://bankenverband.de/en/digitisation/digital-identities-steps-path-id-ecosystem/) 2021-03-18 Bankenverband +*This article is very very good in articulating the big picture of how SSI systems relative to older system and emerging fragmetned systems.* + > An answer to these challenges is an ecosystem in which digital identity data can be exchanged in a way that is secure, reliable, scalable and convenient. This will have a positive impact on the economic future of Germany and Europe while at the same time enhancing the private sphere of the individual. +* [A beginner’s guide to self-sovereign identity (SSI)](https://domilabs.io/beginners-guide-ssi/) 2021-06-02 Domilabs + > An issuer makes claims or assertions about a user. These claims are bundled together into verifiable credentials and given to the user, who stores them in their digital wallet. From there, they can decide which verifiers they want to present these credentials to. +* [Self-Sovereign ID (SSI), The Unhackable Digital ID: What It Is and How It Works](https://www.memberpass.com/2021/04/self-sovereign-id-ssi-the-unhackable-digital-id-what-it-is-and-how-it-works/) 2021-04 MemberPass + > * The Siloed Model: The organization owns the member information, not the member. + > * The Federated Model: The identity providers (IDP) owns the member data, not the member. + > * The Best Model: SSI • The members own their own data! +* [Karyl Fowler (Transmute) and Juan Caballero (DIF) present Intro to SSI at #IIW31](https://www.youtube.com/watch?v=DaM0UtQTLCs) 2020-10 Keryl Fowler, Juan Caballero [Slides](https://drive.google.com/file/d/1_9jCcxgcCrL4Dfjvr4z7XSIwxfadjveR/view?usp=sharingQ) + > Karyl and Juan revisited their slide deck from #IIW30 to give an overview of decentralized identity first as a "philosophy" at the confluence of ideological currents (Juan), and then as a set of specific emerging technologies which unlocks new mental models and business models that are still coming into focus sector by sector (Karyl). There follows a brief overview of educational resources, including some products of DIF's recent educational "content sprint," and a wide-ranging Q&A including podcast recommendations and how to navigate open standards for the first time. The slides are here, in downloadable and hyperlinked PDF form: +* [Podcast] [Defining Self-Sovereign Identity with Kaliya Young](https://www.youtube.com/watch?v=lCmMNDJcHuo) 2021-06-02 Coding Over Cocktails + > In this short preview, "Identity Woman" and digital identity advocate Kaliya Young tackles the issues around self-sovereign identity and how individuals are the rightful points of federation in sharing and controlling their online information. +* [19 FAQs on Verifiable Credentials and Self-Sovereign Identity](https://academy.affinidi.com/faqs-on-verifiable-credentials-and-self-sovereign-identity-3c3a505878bc) 2021-05-31 Affinidi + > This article has some FAQs on the basics of Verifiable Credentials (VCs) and Self-Sovereign Identity (SSI). +* [Self-Sovereign Identity: What You Can/Can’t Do With SSI?](https://academy.affinidi.com/self-sovereign-identity-what-you-can-cant-do-with-ssi-1284f7227b4e) 2021-06-24 Affinidi + > it gives complete control and ownership of data to the individual entities as they can decide what data to share and with whom. + > + > Beyond this encompassing vision, let’s drill down into the specifics to understand what you can and can’t do with SSI. +* [A Digital Identity Revolution](https://www.traceyfollows.com/a-digital-identity-revolution/) Tracey Follows + > In order to better understand the benefits and drawbacks of such a verification system, we have to look at the future and work backward to make the right decisions today. +* [The Basic Building Blocks of SSI](https://freecontent.manning.com/the-basic-building-blocks-of-ssi/) 2020-07-29 Drummond Reed, Alex Preukschat Manning + > In many cases these core concepts have been established for decades. What’s new is how they’re put together to create a new model for digital identity management. The purpose of this article is to quickly familiarize you with these seven basic building blocks from a conceptual and technical point-of-view. + > - Verifiable credentials (aka digital credentials) + > - Issuers, holders, and verifiers + > - Digital wallets + > - Digital agents and hubs + > - Decentralized identifiers (DIDs) + > - Blockchains + > - Governance frameworks (aka trust frameworks) +* [How to decentralize identity and empower individuals](https://medium.com/global-id/episode-10-how-to-decentralize-identity-and-empower-individuals-3e154612a85) 2021-07-26 GlobalID + > If the internet decentralized information and crypto decentralized money and payments, then verifiable credentials will decentralize identity. In this episode, we chat with Dev Bharel, the software architect leading the charge around verifiable credentials at GlobaliD. +* [Self-Sovereign Identity: What’s the Big Deal?](https://hackernoon.com/self-sovereign-identity-whats-the-big-deal-6i1a37z3) 2021-07-06 Affinidi, Hackernoon + > Do you know where your digital credentials like your full name, date of birth, phone number, government ID, and other Personally Identifiable Information (PII) are stored online, and how they are used? +* [The Role of Identity in Creating a Better Internet with Kaliya Young — Structure 3C](https://www.structure3c.com/cohere/online-identity-kaliya-young) 2021-11-21 CoHere +*Kaliya talking with a colleague from way back Bill Johnston.* + > On this episode of the Cohere podcast, Kaliya joins Bill to discuss the history of online identity, what events led us to the consolidation of identity into a few centralized platforms, and what steps we need to take to recover and protect our online identities. +* [Bright Story: Self Sovereign Identity](https://www.brightlands.com/brightlands-smart-services-campus/bright-story-self-sovereign-identity) 2019-05-05 Brightlands ([EN](https://translate.google.com/translate?sl=auto&tl=en&u=https://www.brightlands.com/brightlands-smart-services-campus/bright-story-self-sovereign-identity)) + > the benefits (The good) of SSI are illustrated with a range of examples, comparing SSI-based business transactions to their current non-SSI-based equivalents and thus more cumbersome. + > + > In addition, examples are given of the disadvantages (The bad); how SSI technology can be misused by unscrupulous organizations and how a combination of technology, knowledge and legislation could mitigate this risk. + > + > Finally, we give examples of the harmful side (The ugly); how SSI technology can be used by criminals and what countermeasures are possible. +* [How Verifiable Creds, Decentralized Identifiers and Blockchain Work Together for a Safer Internet](https://hackernoon.com/how-verifiable-creds-decentralized-identifiers-and-blockchain-work-together-for-a-safer-internet-k2u37bk) 2021-08-22 Fluree, Hackernoon + > Verifiable credentials, DIDs, and blockchain are evidence of what's to come: Web3, a more secure, widespread, machine-to-machine internet. +* [Beyond basics: Expert Q&A about SSI with Dr. Milly Perry and Martin Schäffner](https://europeanblockchainassociation.org/2021/06/01/ssi-beyond-basics-with-dr-milly-perry-and-martin-schaffner/) 2021-06-01 + > In May, [Dr. Milly Perry](https://www.linkedin.com/in/milly-perry-1b4682/), blockchain expert and former research director at the Open University of Israel, had invited [Martin Schäffner](https://www.linkedin.com/in/martinschaeffner/), the initiator of the SSI Working Group at the European Blockchain Association, to speak at a webinar of the Israeli Chamber of Information Technology (You can find the recording [here](https://europeanblockchainassociation.org/2021/05/06/eussi-israeli-chamber-of-information-technology/)). [...] Here is their exchange about Verifiable Credentials, biometrics, pitfalls and barriers, NFTs, the role of governments and the thing that could make SSI obsolete. +* [Self-Sovereign Identity Allows YOU to Control Your Personal Data](https://imageware.io/solutions/future-of-identity/) 2022-12-13 Imageware + > SSI supports credential leveling, including: + > - Authentication Assurance Levels (AAL) 1, 2 & 3 + > - Biometrics to protect your data + > - Affirmation/Metadata + > SSI credentials can be used: + > - In person or online + > - For government, financial, or high trust applications (document verification markets) + > - For asset ownership, decentralized finance (DeFi), and crypto markets -* [Agency By Design (Privacy is not Enough)](https://iiw.idcommons.net/20B/_Agency_By_Design_(Privacy_is_not_Enough)) by Adrian Gropper - > I’m not a fan of Privacy by Design.\ - > In the industry are only concerned about compliance, very rarely talk about Human Agency\ - > Privacy by Default is the opposite in some sense to privacy by design\ - > The problem is that It conflict with community in many cases. (e.g. social credit score)\ - > Cultural differences (EU accepts better centralization than US)\ - > Delegation and agency are one the same thing\ - > Agency is a much bigger thing and delegation is a mechanism that supports it\ - > I want my fiduciaries to know as much as possible of me (e.g. my doctor, my lawyer) \ - > Model Agency as hierarchy and delegation is the mean to have it. +## Security +* [ID Verification Threats On the Horizon](https://stateofidentity.libsyn.com/id-verification-threats-on-the-horizon) 2022-03-31 Liminal Podcasts + > Cognito's CEO Alain Meier joins the State of Identity host Cameron D’Ambrosi to dive into why industries beyond financial services are now in the market for identity verification. They also unpack the impact of synthetic identity fraud across verticals, and how platforms find the balance when building their onboarding processes. +* [How Decentralized Identifiers Will Shape the Future of Identity](https://hackernoon.com/how-decentralized-identifiers-will-shape-the-future-of-identity-iam3w9g) 2020-11-09 HackerNoon + > Hackers value personal information the most. 96% of hacking groups’ primary motive is intelligence gathering. Researchers at privacy website PrivacyAffairs.com found that you can obtain a person's full identity for the low price of $1,275. +* [Security, Silos, and Sovereignty](https://daniel-hardman.medium.com/security-silos-and-sovereignty-522e30bb8eb4) 2021-03-12 Daniel Hardman + > Why portable security is the sleeper — but killer — feature for SSI + > + > what’s cool about DIDs (besides their self-service creation) is that their metadata is cryptographically verifiable. That means that anyone in the world can tell whether the metadata is legit, in the blink of an eye, just by asking software to check some math. And it also means that you can build a transport-independent, tamper-proof, encrypted communication channel with whoever controls a DID. +## Cryptography +* [Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledge Proofs —slideshare](https://www.slideshare.net/eralcnoslen/privacypreserving-authentication-another-reason-to-care-about-zeroknowledge-proofs) 2017-08-14 Clare Nelson + > In the near future, privacy-preserving authentication methods will flood the market, and they will be based on Zero-Knowledge Proofs. IBM and Microsoft invested in these solutions many years ago. +* [How to Explain Public-Key Cryptography and Digital Signatures to Anyone](https://auth0.com/blog/how-to-explain-public-key-cryptography-digital-signatures-to-anyone/) + > Here’s an easy-to-understand analogy to help your non-technical friends and customers understand public keys and private keys, and how they relate to cryptography and digital signatures. +* [Zero Knowledge Proofs](https://www.windley.com/archives/2021/11/zero_knowledge_proofs.shtml) 2021-11 Phil Windley + > This problem was first explored by MIT researchers Shafi Goldwasser, Silvio Micali and Charles Rackoff in the 1980s as a way of combatting information leakage. The goal is to reduce the amount of extra information the verifier, Victor, can learn about the prover, Peggy. -* [The Architecture of Identity Systems](https://www.windley.com/archives/2020/09/the_architecture_of_identity_systems.shtml) by Phil Windley - > I recently read a paper from Sam Smith, [Key Event Receipt Infrastructure](https://arxiv.org/abs/1907.02143), that provided inspiration for a way to think about and classify identity systems. In particular his terminology was helpful to me. This blog post uses terminology and ideas from Sam's paper to classify and analyze three different identity system architectures. I hope it provides a useful model for thinking about identity online. +## System Architecture +* [Good Welfare, Bad Platforms?: The Risks of Centralized Digital Identity Systems](https://points.datasociety.net/good-welfare-bad-platforms-d65b412d962e) 2022-02-02 OpenID + > As S. Shakthi and I noted in a recent [research paper](https://journals.openedition.org/samaj/6279), digital identity systems are widely seen as datafiers by virtue of their core property of reducing the person to machine-readable data. A datafier is a system that performs the crucial operation of converting the physical into digital. A different, contrasting view is also emerging in research: digital identity systems are increasingly seen as platforms, i.e. “technological building blocks” on which different types of complements can be constructed. +* [Identity management is key to increasing security, reducing fraud and developing a seamless customer experience](https://identitypraxis.com/2022/01/07/identity-management-is-key-to-increasing-security-reducing-fraud-and-developing-a-seamless-customer-experience/) 2022-01-07 Identity Praxis + > - Identity management is an iterative process with three core elements – initial identification, authentication (re-identifying the individual) and verification (ensuring the individual is who they claim to be) + > - Enterprises employ a vast array of technologies to execute these processes which are growing in scope and complexity + > - Understanding why identity management is necessary to enterprises and how this creates opportunities for vendors +* [Leveraging the Identity Metasystem](https://www.windley.com/archives/2021/12/leveraging_the_identity_metasystem.shtml) 2021-12 Phil Windley + > the [metasystem guarantees the fidelity of the credential exchange](https://www.windley.com/archives/2021/06/ssi_interaction_patterns.shtml). Credential fidelity comprises four important attributes. Credential exchange on the identity metasystem: + > + > 1. Reveals the identifier of the issuer + > 2. Ensures the credential was issued to the party presenting it + > 3. Ensures the credential has not been tampered with + > 4. Reveals whether or not the credential has been revoked +* [Token-Based Identity](https://www.windley.com/archives/2021/10/token-based_identity.shtml) 2021-10 Windley + > Token-based identity systems move us from talking about who, to thinking about what, so that people can operationalize their digital lives. Token-based identity systems support complex online interactions that are flexible, ad hoc, and cross-domain. +* [Your User is Your API](https://www.evernym.com/blog/your-user-is-your-api/) 2021-05-17 Evernym + > The customer becomes the integration point. The customer is the API. Rather than having one huge, expensive, and probably illegal data hub, every customer becomes a data hub in their own right. They provide the data needed, just-in-time, under their control. +* [The Unbundling of Authentication vs Authorization - What You Need to Know](https://www.pingidentity.com/en/company/blog/posts/2021/authentication-vs-authorization.html) 2021-09-08 Ping Identity + > Authentication and authorization are both processes that fall under the category of [identity and access management (IAM)](https://www.pingidentity.com/en/company/blog/posts/2017/what-is-identity-and-access-management-iam.html), but they serve different purposes. +* [To Better Understand Digital Identity, Look to Physics](https://www.pingidentity.com/en/company/blog/posts/2021/digital-identity-physics.html) 2021-05-17 Ping + > In chaotic systems such as those that the discipline of physics seeks to describe, there is also the concept of the “self-organizing principle,” which dictates a tendency for chaotic systems to organize themselves. While this might be a tendency in physics, organization usually needs a nudge in the right direction in the identity world. Proper attention to requirements and a good change control process are a crucial part of the equation. * [The SSO Practitioner’s Introduction to Decentralized Identity](https://www.pingidentity.com/en/resources/blog/post/sso-practitioners-introduction-decentralized-identity.html) *Written for IAM professionals familiar with federations.* > In most self-sovereign and decentralized identity systems the trust model is fundamentally unidirectional, where a verifier will trust the issuer, but the issuer may have no knowledge of the verifier. -* [Relationships and Identity](https://www.windley.com/archives/2020/07/relationships_and_identity.shtml), We build digital identity systems to create and manage relationships—not identities. -* [The Architecture of Identity Systems](https://www.windley.com/archives/2020/09/the_architecture_of_identity_systems.shtml) +* [The Architecture of Identity Systems](https://www.windley.com/archives/2020/09/the_architecture_of_identity_systems.shtml) 2020-09 Phil Windley > We can broadly classify identity systems into one of three types based on their architectures and primary root of trust: > - Administrative > - Algorithmic > - Autonomic -* [Authentic Digital Relationships](https://www.windley.com/archives/2020/08/authentic_digital_relationships.shtml), - > Self-sovereign identity, supported by a heterarchical identity metasystem, creates a firm foundation for rich digital relationships that allow people to be digitally embodied so they can act online as autonomous agents. -* [Do we really need (or want) the State to provide us with digital identification?](https://www.libertarianism.org/articles/self-sovereign-identity-blockchain-age) - > Just as the State still manages our “analog” identities, the online giants have vast power to manage the online data and identity of their users. Internet users are now both consumer and product: by using free online services, users feed companies with data, which those companies in turn process and monetize. -* [How Decentralized Identifiers Will Shape the Future of Identity](https://hackernoon.com/how-decentralized-identifiers-will-shape-the-future-of-identity-iam3w9g) HackerNoon - > Hackers value personal information the most. 96% of hacking groups’ primary motive is intelligence gathering. Researchers at privacy website PrivacyAffairs.com found that you can obtain a person's full identity for the low price of $1,275. -* [Self Sovereign Identity — explained](https://micha-roon.medium.com/self-sovereign-identity-explained-f5380c08e446) Micha Roon - > It would be great indeed if digital interactions became even more trustworthy without the need to present our data on a silver platter to large Internet corporations -* [Self-Sovereign vs Administrative Identity](http://blogs.harvard.edu/vrm/2012/03/25/ssi/) Doc Searls 2012 2012-03-25 +* [Authentic Digital Relationships](https://www.windley.com/archives/2020/08/authentic_digital_relationships.shtml) 2020-08 Phil Windley + > Self-sovereign identity (SSI) systems offers an alternative model that supports richer relationships. Rather than provisioning identifiers and accounts in an administrative system where the power imbalance assures that one party to the relationship can dictate the terms of the interaction, SSI is founded on peer relationships that are co-provisioned by the exchange of decentralized identifiers. This architecture implies that both parties will have tools that speak a common protocol. +* [Self-Sovereign vs Administrative Identity](http://blogs.harvard.edu/vrm/2012/03/25/ssi/) 2012-03-25 Doc Searls > The problem I’m trying to surface here is that we need full respect for self-sovereign identities, and identifiers, before we can solve the problem of highly fractured and incompatible administrative identifiers — a problem that has only become worse with the growth of the Web, where by design we are always the submissive and dependent party: calves to administrative cows. -* [@lissi_id and the three-sided credentials market](https://twitter.com/lissi_id/status/1334834875896004608) - > When a user holds his:her own credentials locally on the phone, it creates a three-sided market, which puts the holder of the credential in the position of a carrier between issuer and verifiers. - * [Security, Silos, and Sovereignty](https://daniel-hardman.medium.com/security-silos-and-sovereignty-522e30bb8eb4) +* [Fluid Multi-Pseudonymity](https://www.windley.com/archives/2021/09/fluid_multi-pseudonymity.shtml) 2021-09-07 Windley + > Fluid multi-pseudonymity perfectly describes the way we live our lives and the reality that identity systems must realize if we are to live authentically in the digital sphere.‘ +* [What Is Zero Trust?](https://www.pingidentity.com/en/company/blog/posts/2021/what-is-zero-trust.html) Ping + > 1. The network is always assumed to be hostile. + > 2. External and internal threats exist on the network at all times. + > 3. Network locality is not sufficient for deciding trust in a network. + > 4. Every device, user and network flow is authenticated and authorized. + > 5. Policies must be dynamic and calculated from as many sources of data as possible. +* [What's the difference between identification, authentication and authorization?](https://twitter.com/doerkadrian/status/1397566626405421060) 2021-05-26 Adrian Doerk + > - Identification: Who are you? + > - Authentication: Is it you again? + > - Authorization: What rights do I want to grant you? -Why portable security is the sleeper — but killer — feature for SSI +## Related +* [Understanding Digital Credentials](https://www.bcdiploma.com/en/blog/understanding-digital-credentials-21-05-12) BCdiploma + > We are freeing ourselves from the management of “data hash” which leads to a centralization or complexification of verification procedures. This makes our solution new compared to traditional blockchain applications on the market. +* [DIGITAL SOVEREIGNTY](https://twit.tv/shows/floss-weekly/episodes/628) 2021-05-05 Doc Searls, Aaron Newcomb FLOSS WEEKLY + > Dr. Andre Kudra of esatus.com discusses SSI, or Self-Sovereign Identity. It's a hot and fast-moving topic with a growing base of hackers, companies, nonprofits, and whole states, provinces and countries. Aaron Newcomb and Doc Searls probe Andre for lots of great intelligence about how SSI puts individuals in full charge of how they present minimized ID credentials safely, and inside a whole new framework. They also talk with Andre about his involvement with the demoscene and retro computing, which are especially huge in Europe. It's a great discussion on this episode of FLOSS Weekly. +* [An Introduction to Digital Trust](https://northernblock.io/verifiable-credentials/introduction-to-digital-trust/) 2021-09-06 Northern Block + > what’s the purpose of SSI? It’s about enabling Digital Trust (which is quickly becoming an integral part of digital transformation for organizations). +* [Badges and Credentials – A new currency for the digital world?](https://www.speexx.com/speexx-resources/podcast/podcast-badges-credentials) 2021-11-12 Speexx Exchange + > Listen to this episode for an entertaining deep dive into the topic of badges and credentials, as Donald Taylor sits down with Dr. Doug Belshaw to discuss the importance, various fields of application -what’s cool about DIDs (besides their self-service creation) is that their metadata is cryptographically verifiable. That means that anyone in the world can tell whether the metadata is legit, in the blink of an eye, just by asking software to check some math. And it also means that you can build a transport-independent, tamper-proof, encrypted communication channel with whoever controls a DID. - -* [Identity Credential and Personal Data Ownership Perspectives](https://openidentityexchange.org/networks/87/item.html?id=404) Research from OIX - > Many global organisations are using their citizens’ identity and their other personally identifiable information (PII) to help combat the global Covid-19 crisis  […] reignited the debate around protecting public safety vs protecting privacy:  how to combat the contagious threat whilst preserving citizens’ digital identity, security and anonymity? -* [The Mental Models of Identity Enabled by SSI](https://ssi-ambassador.medium.com/the-mental-models-of-identity-enabled-by-ssi-d3e2d8d0f2b6) Adrian Doerk -The Models: Space Time • Presentation • Attribute • Relationship • Capability -* [Adrian Doerk writes](https://medium.com/@SSI_Ambassador/the-growth-factors-of-self-sovereign-identity-33aa3cc17ce7) - > The post details 5 components necessary for the advance of SSI: Business, Technology, User Experience, Compliance, and Governance. -* [Why is SSI becoming a necessity and what potential it holds?](https://www.aceblock.com/2020/11/12/news-lecture-why-is-ssi-becoming-a-necessity-and-what-potential-it-holds/) 2020-11-12 - > Problem 1: CENTRAL AUTHORITY CONTROLS ALL DATA\ - > Problem 2: NUMEROUS SIGNUPS WITH SAME DATA\ - > Problem 3: INCONVENIENCE OF ONLINE FORMS -* [The Implications of Bring Your Own Identity](https://www.idsalliance.org/blog/2020/12/03/the-implications-of-bring-your-own-identity/) Identity Defined Security Alliance 2020-12-03 - > My short stint as “Mark Jannell" taught me a lot of about trust and ease of use in a bring your own identity model. Trust, as always in security, is essential to this new class of relationships and must be established and then protected from abuse. Ease of use, it turns out, is a key factor in protecting that trust and promoting the adoption of good identity patterns. I’m sure that I could have learned these lessons in some other way, but I’ll never forget my half year answering to a pseudonym. -* [Blockchain is the Least Interesting Thing About Self-sovereign Identity](https://medium.com/trinsic/blockchain-is-the-least-interesting-thing-about-self-sovereign-identity-75c1b56ce497) Riley Huges - > as useful as blockchain is for SSI, it’s nowhere near as interesting as: - > - The impact on the internet - > - The benefits of technical standards - > - The economic opportunity for early innovators -* [Decentralized identity discussed: An INATBA roundtable round-up](https://jolocom.io/blog/decentralized-identity-inatba-roundtable/) - -We pointed to this before it happened. It was great. Here is a round up from Jolocom. It is highly recommended. - -> The paper Decentralised Identity: What’s at Stake?. Answering the paper’s core question of what’s at stake, it gives three essential scenarios: -> 1. Ideal – full convergence of SSI technology with interoperability by default. -> 2. Functional – partial convergence resulting in detached ecosystems. -> 3. Dysfunctional – no convergence and isolated, locked-in ecosystems. +## Business +* [New Indicio Executive Workshop Provides Essential Grounding in Digital Identity: The Business and Investor’s Guide to Self-Sovereign Identity](https://indicio.tech/new-indicio-executive-workshop-provides-essential-grounding-in-digital-identity-the-business-and-investors-guide-to-self-sovereign-identity/) 2021-12-14 Scott Harris + > Participants will [walk away with an essential understanding](https://indicio.tech/product/executive-education-ssi-workshop/) of how SSI works, the pain points it solves for, the risks it mitigates, the use cases currently in deployment, and the opportunities that are created by being able to build Trusted Data Ecosystems (TDEs). * [Who Controls Your Digital Identity?](https://blogs.sap.com/2021/02/18/who-controls-your-digital-identity/) SAP 2021-02-18 > SSI will have to be integrated with large existing business processes – and therefore enterprise systems such as ERPs, HCMs, or SCMs to name a few. If this integration results in SSI being as easy to use as clicking a button or selecting a menu item, it will lead to rapid uptake and acceptance. -* [The 5P’s of a Self-Sovereign Identity](https://markvanrijmenam.medium.com/the-5ps-of-a-self-sovereign-identity-e6f6eb802d75) - > A self-sovereign identity can be defined by the 5P’s as it is personal (it is about you), portable (meaning you can take your identity and data from one platform to another), private (you control your identity and data), persistent (it does not change without your consent) and protected (they cannot steal your identity). -* [Benefits of SSI and Blockchain in Digital Identity](https://www.good-id.org/en/articles/benefits-of-ssi-and-blockchain-in-digital-identity/) - > The needs and experiences of citizens are established with how digital identity networks should preserve the freedoms and rights of users over the needs of the network. Transparency is explicitly mentioned as part of SSI, and it places a high emphasis on the importance of the public’s trust. - > - > As we look to the future of digital identity, SSI principles with blockchain have already proven to be successful by bringing together stakeholders to create a mutually beneficial network. - - -* [Digital identities – steps on the path to an ID ecosystem](https://en.bankenverband.de/newsroom/comments/digital-identities-steps-path-id-ecosystem/) Bankenverband - > This article is very very good in articulating the big picture of how SSI systems relative to older system and emerging fragmetned systems. - -An answer to these challenges is an ecosystem in which digital identity data can be exchanged in a way that is secure, reliable, scalable and convenient. This will have a positive impact on the economic future of Germany and Europe while at the same time enhancing the private sphere of the individual. - -* [Getting Started with Self Sovereign Identity SSI](https://damienbod.com/2021/03/29/getting-started-with-self-sovereign-identity-ssi/) 2021-03-29 +## Development +* [resources] [Getting Started with Self Sovereign Identity SSI](https://damienbod.com/2021/03/29/getting-started-with-self-sovereign-identity-ssi/) 2021-03-29 > The blog is my getting started with Self Sovereign identity. I plan to explore developing solutions using Self Sovereign Identities, the different services and evaluate some of the user cases in the next couple of blogs. -* [Introduction to Self-Sovereign Identity](https://dev.to/jakubkoci/introduction-to-self-sovereign-identity-3kkm) Jakubkoci - > In this article, I will do my best to explain self-sovereign identity from the end-user perspective, without any technicalities. -* [Self Sovereign Identity Systems](https://yathartharora.substack.com/p/self-sovereign-identity-systems) - [The Passion Pad](https://yathartharora.substack.com) - > We should have the right to manage our identity, free of any country or the place where we live. By giving this right to the government or any central authority, we give them much more power. Separating data rights from the actual data is important. User should have the right to decide who should have the access to his/her data. -* [The Principles of User Sovereignty](https://uxdesign.cc/the-principles-of-user-sovereignty-515ac83401f6) and +* [Bootstrapping a VDR-based Fully Decentralized Object (FDO)/Credential Platform: VON Example](https://hyperonomy.com/2021/07/26/bootstrapping-a-vdr-based-decentralized-credential-object-platform-von-example/) 2021-07-26 Hyperonomy + > What are the common/known strategies for bootstrapping a VDR-based decentralized credential/object platform? …asked naively on purpose. Strategies for placing the first/initial DIDs in the VDR?  …presumably purposed to be the initial Issuer(s) of verifiable +* [Challenges to Self-Sovereign Identity](https://damienbod.com/2021/10/11/challenges-to-self-sovereign-identity/) 2021-10-11 Damien Bod + > I based my findings after implementing and testing solutions and wallets with the following SSI solution providers: + > - [Trinsic](https://trinsic.id/) + > - [MATTR.global](https://mattr.global/) + > - [Evernym](https://www.evernym.com/) + > - [Azure Active Directory Verifiable Credentials](https://docs.microsoft.com/en-us/azure/active-directory/verifiable-credentials/) + > - Different Wallets like [Lissi](https://lissi.id/) -* [Why Distributed Ledger Technology (DLT) for Identity?](https://www.hyperledger.org/blog/2021/04/21/why-distributed-ledger-technology-dlt-for-identity) 2021-04-21 - > So why DLT? First, we can get the good parts of paper credentials—private transactions between holders and verifiers and no callback to the issuer. Second, the issuer gets a trusted, open and transparent way to publish the cryptographic material needed for those private holder-verifier transactions. Third, there is no need to have a “Trusted Third Party” participating in the interactions. + + + + + +* [#SSI gives its owner control over some aspects of identity, but not all](https://twitter.com/GETJolocom/status/1470791578780413953) 2021-12-14 Jolocom + > Connections, relationships, and third-party issued credentials are not entirely self-sovereign, nor should they be. #JolocomAdvent #AdventCalendar +* [What are Verifiable Credentials? Why do they matter?](https://flur.ee/2022/01/10/what-are-verifiable-credentials-why-do-they-matter/) 2022-01-10 Fluree + > Authority Does Not Require Centralized Power > - > And did I mention, no private data goes on the DLT!!! -* [Community Credentials](https://credentials.resonate.is) Resonate - > [Verifiable Credentials](https://www.w3.org/TR/vc-use-cases/) are a new web standard for proving things digitally, thanks to some clever cryptography.  We are building Community Credentials to be the ‘Know Your Co-operator’ equivalent of KYC (Know Your Customer for business) for co-op social trust, all without reliance on centralised providers (or blockchains). + > As mentioned in my previous article, the trouble with centralization is that data is stored in a database. Once breached, a database can yield a treasure chest of information to be sold on the dark web. +* [What Are Verifiable Credentials? And How Can They Build Digital Trust?](https://www.salesforce.com/blog/verifiable-credentials/) 2022-02-01 Salesforce + > Verifiable credentials and verifiable credential management technology offer a direct and secure channel between an organization and its stakeholders. Learn how they bring control over digital identity and build trust with organizations – from health credentials to college degrees. - -* [Digital Identity and Blockchain – Its Place in Newer Identity Models](https://cyber.ee/blog/2021/04-21/) - > In the [first part of this series](https://cyber.ee/blog/2021/04-14/), we introduced the idea that traditional PKI-based digital identity solutions can potentially benefit from blockchain technology. - > [...] - > For this next part of the series, we’ll touch on the relatively new idea of self-sovereign identity, or SSI. -* [Distributed, Decentralized, Self-Sovereign Identity](https://condatis.com/news/blog/did-decentralized-ssi/) Condatis - > With DID already being implemented, this new and exciting technology is due to shake up the digital identity space. We expect decentralized identity to continue making headway, with more and more sectors and businesses adopting the technology. -* [Self-Sovereign ID (SSI), The Unhackable Digital ID: What It Is and How It Works](https://www.memberpass.com/2021/04/self-sovereign-id-ssi-the-unhackable-digital-id-what-it-is-and-how-it-works/) - > * [The Siloed Model](https://www.memberpass.com/2021/04/siloed-identity-what-it-is-and-how-it-works/) • The organization owns the member information, not the member. - > * [The Federated Model](https://www.memberpass.com/2021/04/federated-identity-what-it-is-and-how-it-works/) • The identity providers (IDP) owns the member data, not the member. - > * The Best Model: SSI • The members own their own data! -* [Legitimacy and Decentralized Systems](https://www.windley.com/archives/2021/04/legitimacy_and_decentralized_systems.shtml) Windley - > Why are some decentralized systems accepted and widely used while others wither? Why do some “hard forks” succeed while others fail? It all comes down to legitimacy. -* [Gravity Glossary](https://www.gravity.earth/gravity-glossary) - > Our Gravity Glossary offers basic definitions to help you untangle the confusing technical jargon behind decentralized identity and blockchain. - - -* [101 Session: Self Sovereign & Decentralized Identity](https://iiw.idcommons.net/4B/_101_Session:_Self_Sovereign_%26_Decentralized_Identity) by Karyl Fowler and Juan Caballero - -Links: - -- [Video](https://www.youtube.com/watch?v=DaM0UtQTLCs) from last IIW -- [Slides](https://drive.google.com/file/d/1_9jCcxgcCrL4Dfjvr4z7XSIwxfadjveR/view?usp=sharingQ) from this session [Karyl Fowler (Transmute) and Juan Caballero (DIF) present Intro to SSI at #IIW31, Oct 2020](https://www.youtube.com/watch?v=DaM0UtQTLCs) - -* [https://www.uschamberfoundation.org/sites/default/files/media-uploads/Applying%20SSI%20Principles%20to%20ILRs%20Report.pdf](https://www.uschamberfoundation.org/sites/default/files/media-uploads/Applying%20SSI%20Principles%20to%20ILRs%20Report.pdf) - -* [ION 101-401: what is ION (the public, permissionless DID network), how can you use it today, and what comes next](https://iiw.idcommons.net/3A/_ION_101-401:_what_is_ION_(the_public,_permissionless_DID_network),_how_can_you_use_it_today,_and_what_comes_next) by Daniel Buchner (Microsoft) - -Identifiers, DID, ion - -- Decentralization of did:ion if anchoring transactions are batched by an operator: it’s possible to choose the operator or to incur the cost of anchoring the transactions. Furthermore, the operator doesn’t gain access to the private key. -- ION delivers: massive scale, cost efficiency (despite running on the bitcoin network - best case if bitcoin a transaction costs 100 USD one action costs 1 cent), decentralized & flexible, decentralized registries -- ION has a type system so that DIDs can be used, e.g. for software packages, vehicles, … This makes it possible to make the centralized data repositories that we rely on today, npm registries etc., to be fully decentralized. This is a Sidetree feature that is currently only used by ION. -- DIF is currently working on personal data stores. Expected impact on private messaging, social media, gig services, .. -- ION is live and in production today -- Ion-tools is a selection of tools to interact with the ION network: [https://github.com/decentralized-identity/ion-tools](https://github.com/decentralized-identity/ion-tools) -- Resilience of ION: It’s pointed out that not only Bitcoin needs to survive attacks but also the IPFS network as both are required for ION to work properly. With Bitcoin it looks unlikely that it’s currently possible to reverse transactions on the network. However, with IPFS data can be unpinned and potentially disappear from the network. - -* [Revocation: Introduction & Overview - goal is to connect](https://iiw.idcommons.net/3G/_Revocation:_Introduction_%26_Overview_-_goal_is_to_connect) by Andreas Freitag - -* [20210420_IIW34_Revocation_D01_s.pdf](https://drive.google.com/file/d/1HBr2VinzbJxq8dOs4b398tOUbRXmhraE/view?usp=sharing) - -My Research Question and Goals - -As today a revocation method based on accumulators is not implemented on a large scale identity system. The overall question is: - -“How can current accumulator schemes support revocation of verifiable credentials for large scale production systems regarding performance, usability and privacy?” - -* [Accumulators and Credential Signatures AMA (You don’t need to know crypto)](https://iiw.idcommons.net/index.php?title=21H/_Accumulators_and_Credential_Signatures_AMA_(You_don%27t_need_to_know_crypto)&action=edit&redlink=1) by Michael Lodder -* [Ontology Collaborates With The Block To Uncover The Decentralized Identity Industry](https://medium.com/ontologynetwork/ontology-collaborates-with-the-block-to-uncover-the-decentralized-identity-industry-1c2c51d02df0) - -Ning Hu, CTO of Ontology, spoke at a panel titled “The State of Decentralized Identity Solutions” in association with [The Block](https://www.theblockcrypto.com/), [...] accompanied by experts in the field of digital identity, Daniel Buchner, Senior PM of Decentralized Identity at Microsoft, and Tobias Fox, Co-founder of Serto. The discussion delved into how digital identity applies to everything from financial services to upskilling workforces, and how blockchain infrastructure can be utilized to lay the trust framework for decentralized identity solutions. - -- [Panel discussion](https://www.theblockcrypto.com/post/102427/the-state-of-decentralized-identity-solutions-brought-to-you-by-ontology) -- The Block Research Report, “[An Introduction To Decentralized Identity Solutions](https://www.theblockcrypto.com/genesis/99285/an-introduction-to-decentralized-identity-solutions)” -* [DIGITAL SOVEREIGNTY](https://twit.tv/shows/floss-weekly/episodes/628) FLOSS WEEKLY 628 • [Doc Searls](https://twit.tv/people/doc-searls), [Aaron Newcomb](https://twit.tv/people/aaron-newcomb) - -Dr. Andre Kudra of esatus.com discusses SSI, or Self-Sovereign Identity. It's a hot and fast-moving topic with a growing base of hackers, companies, nonprofits, and whole states, provinces and countries. Aaron Newcomb and Doc Searls probe Andre for lots of great intelligence about how SSI puts individuals in full charge of how they present minimized ID credentials safely, and inside a whole new framework. They also talk with Andre about his involvement with the demoscene and retro computing, which are especially huge in Europe. It's a great discussion on this episode of FLOSS Weekly. -* [What is Self-Sovereign Identity? #AllYouNeedToKnowAbout OmniOne Series](https://medium.com/@RaonSecure/what-is-self-sovereign-identity-allyouneedtoknowabout-omnione-series-f51887d34be8) RAON - -OmniOne comes from the willingness to help transition from a service-centric identity to the self-sovereign identity paradigm, empowering anyone to control their identity in a highly secure manner while providing mutual benefits to the participants of its ecosystem. -* [Self-Sovereign Identity – A Possibility for More Data Control for Users](https://dataethics.eu/self-sovereign-identity-a-possibility-for-more-data-control-for-users/) DataEthics.eu -* [The Basic Building Blocks of SSI](https://freecontent.manning.com/the-basic-building-blocks-of-ssi/) Manning -* [Self-Sovereign Identity - The Nash Equilibrium Point of the Personal Identity Information Game](https://www.thoughtworks.com/insights/blog/self-sovereign-identity-nash-equilibrium-point-personal-identity-information-game) - -"A silent war is ongoing between users and companies over the control of data." - -1 Privacy or convenience is a question - -2 SSI is the answer to this question - -* [To Better Understand Digital Identity, Look to Physics](https://www.pingidentity.com/en/company/blog/posts/2021/digital-identity-physics.html) Ping - -In chaotic systems such as those that the discipline of physics seeks to describe, there is also the concept of the “self-organizing principle,” which dictates a tendency for chaotic systems to organize themselves. While this might be a tendency in physics, organization usually needs a nudge in the right direction in the identity world. Proper attention to requirements and a good change control process are a crucial part of the equation. - -* [Why self-sovereign identity matters](https://medium.com/global-id/why-self-sovereign-identity-matters-8fd2c982ca2e) GlobalID - -your digital identity represents you as a unique real-life person in a secure digital format. In fact, we likely have many different virtual identities across a spectrum of platforms and services. - -* [A beginner’s guide to self-sovereign identity (SSI)](https://domilabs.io/beginners-guide-ssi/) - -An issuer makes claims or assertions about a user. These claims are bundled together into verifiable credentials and given to the user, who stores them in their digital wallet. From there, they can decide which verifiers they want to present these credentials to. - -* [19 FAQs on Verifiable Credentials and Self-Sovereign Identity](https://academy.affinidi.com/faqs-on-verifiable-credentials-and-self-sovereign-identity-3c3a505878bc) -* [Defining Self-Sovereign Identity with Kaliya Young | Coding Over Cocktails Podcast](https://www.youtube.com/watch?v=lCmMNDJcHuo) - -* [Adrian Doerk](https://twitter.com/doerkadrian/status/1397566626405421060) on the difference between identification, authentication and authorization - -Identification: Who are you? - -Authentication: Is it you again? - -Authorization: What rights do I want to grant you? -* [Beyond basics: Expert Q&A about SSI with Dr. Milly Perry and Martin Schäffner](https://europeanblockchainassociation.org/2021/06/01/ssi-beyond-basics-with-dr-milly-perry-and-martin-schaffner/) 2021-06-01 - > In May, [Dr. Milly Perry](https://www.linkedin.com/in/milly-perry-1b4682/), blockchain expert and former research director at the Open University of Israel, had invited [Martin Schäffner](https://www.linkedin.com/in/martinschaeffner/), the initiator of the SSI Working Group at the European Blockchain Association, to speak at a webinar of the Israeli Chamber of Information Technology (You can find the recording [here](https://europeanblockchainassociation.org/2021/05/06/eussi-israeli-chamber-of-information-technology/)). His introduction to Self-Sovereign Identity (SSI) was met with great interest and sparked many questions from the audience. But why only take questions from the audience? We asked both experts, which questions they would like to know their peers’ thoughts about. Here is their exchange about Verifiable Credentials, biometrics, pitfalls and barriers, NFTs, the role of governments and the thing that could make SSI obsolete. 2021-05-06 -* [What Is Zero Trust?](https://www.pingidentity.com/en/company/blog/posts/2021/what-is-zero-trust.html) Ping - -1. The network is always assumed to be hostile. -2. External and internal threats exist on the network at all times. -3. Network locality is not sufficient for deciding trust in a network. -4. Every device, user and network flow is authenticated and authorized. -5. Policies must be dynamic and calculated from as many sources of data as possible. -* [Decentralized identity explained](https://www.youtube.com/watch?v=Ew-_F-OtDFI) MSFT - -* [Your User is Your API](https://www.evernym.com/blog/your-user-is-your-api/) Evernym - -The customer becomes the integration point. The customer is the API. Rather than having one huge, expensive, and probably illegal data hub, every customer becomes a data hub in their own right. They provide the data needed, just-in-time, under their control. - -* [Changing the Game with Self-Sovereign Identity](https://eblockchainconvention.com/changing-the-game-with-self-sovereign-identity/) - -The EBC team had an insightful conversation with Ivan Basart, CTO at Validated ID, on how Self-Sovereign Identity technology is the ultimate solution to identity problems on the web. - -* [Decentralized identity can bring the analog world into the digital one](https://cointelegraph.com/news/decentralized-identity-can-bring-the-analog-world-into-the-digital-one) Cointelegraph - -DID does not require analog objects to become digitized, and it does not need expensive sensors or hi-tech tags to work correctly. Instead, it offers an affordable, reliable and versatile way to take offline items out of the digital blindspot. - -* [Self-Sovereign Identity: What’s the Big Deal?](https://hackernoon.com/self-sovereign-identity-whats-the-big-deal-6i1a37z3) Hackernoon \ Affinidi - > Do you know where your digital credentials like your full name, date of birth, phone number, government ID, and other Personally Identifiable Information (PII) are stored online, and how they are used? - * [Bright Story: Self Sovereign Identity](https://www.brightlands.com/brightlands-smart-services-campus/bright-story-self-sovereign-identity) Brightlands ([EN](https://translate.google.com/translate?sl=auto&tl=en&u=https://www.brightlands.com/brightlands-smart-services-campus/bright-story-self-sovereign-identity)) - -In this May 2019 blog post, the benefits (The good) of SSI are illustrated with a range of examples, comparing SSI-based business transactions to their current non-SSI-based equivalents and thus more cumbersome. - -In addition, examples are given of the disadvantages (The bad); how SSI technology can be misused by unscrupulous organizations and how a combination of technology, knowledge and legislation could mitigate this risk. - -Finally, we give examples of the harmful side (The ugly); how SSI technology can be used by criminals and what countermeasures are possible. - -* [The challenge for self-sovereign identity (SSI)](https://nickbyrne.substack.com/p/the-challenge-for-self-sovereign) - -The reason why we have seen less uptake in SSI solutions is because the people behind these solutions fail to recognise the design principles that will be most important to its success. Instead, we see people focusing on technological nirvanas like blockchain or an over-emphasis on governance. -* [Beginners Guide to SSI](https://domilabs.io/beginners-guide-ssi/) Domi - -* [Bootstrapping a VDR-based Fully Decentralized Object (FDO)/Credential Platform: VON Example](https://hyperonomy.com/2021/07/26/bootstrapping-a-vdr-based-decentralized-credential-object-platform-von-example/) 2021-07-26 - -What are the common/known strategies for bootstrapping a VDR-based decentralized credential/object platform? …asked naively on purpose. Strategies for placing the first/initial DIDs in the VDR?  …presumably purposed to be the initial Issuer(s) of verifiable - - - -* [How to decentralize identity and empower individuals](https://medium.com/global-id/episode-10-how-to-decentralize-identity-and-empower-individuals-3e154612a85) GID - -If the internet decentralized information and crypto decentralized money and payments, then verifiable credentials will decentralize identity. In this episode, we chat with Dev Bharel, the software architect leading the charge around verifiable credentials at GlobaliD. -* [A Beginner’s Guide to Self-Sovereign Identity](https://www.good-id.org/en/articles/a-beginners-guide-to-self-sovereign-identity/) Domi - -This article explores the current state of our online identities, wherein our personal identity is siloed and held by third parties on various servers - and is therefore more vulnerable to cyberattacks. Corporations such as Google offer the ability to use your account with them to access other sites, but this comes with problems of its own: -* [Bright Story: Self Sovereign Identity: The good, the bad and the ugly](https://www.brightlands.com/en/brightlands-smart-services-campus/bright-story-self-sovereign-identity) Brightlands - -This blog presents a plethora of benefits of SSI technology to citizens, consumers, business, organisations and government. It also sketches potential abuse of the technology. None of these benefits and threats have already emerged, as SSI technology, its associated business models and its governance frameworks are still developing. - -* [Kaliya Young, The Identity Woman: Part I I Identikit Sequent X](https://www.smartermarketspod.com/kaliya-young-the-identity-woman-part-i-i-identikit-sequent-x-2/) - -For the opening episode of ‘Identikit Sequent X’, Michelle Dennedy welcomes Kaliya Young, also known as The Identity Woman, to Smarter Markets for our latest series examining the evolution of digital identity, and how self-sovereign identity, specifically, can advance a consent-based economy. - -* [Self-Sovereign Identity: What You Can/Can’t Do With SSI?](https://academy.affinidi.com/self-sovereign-identity-what-you-can-cant-do-with-ssi-1284f7227b4e) Affinidi - -it gives complete control and ownership of data to the individual entities as they can decide what data to share and with whom. - -Beyond this encompassing vision, let’s drill down into the specifics to understand what you can and can’t do with SSI. - -* [A Digital Identity Revolution](https://www.traceyfollows.com/a-digital-identity-revolution/) Tracey Follows - -In order to better understand the benefits and drawbacks of such a verification system, we have to look at the future and work backward to make the right decisions today. - -* [Twitter Thread of the Week](https://twitter.com/Steve_Lockstep/status/1425924860312645633) Steve Wilson -* [Evolving Identity Management Self-Sovereign Identity](https://trst01.com/f/evolving-identity-management-self-sovereign-identity) TRST01 - -Based on the emergence and critical features of valuable integration of Blockchain and Digital Identity Management, many critical approaches or use-cases could be raised to enhance the decentralisation feature with user identity control. Based on the validation mentioned above, TRST01, through its QR enabled Blockchain technology, has the ability and typical architecture for live integrations and implementations. - -* [How Verifiable Creds, Decentralized Identifiers and Blockchain Work Together for a Safer Internet](https://hackernoon.com/how-verifiable-creds-decentralized-identifiers-and-blockchain-work-together-for-a-safer-internet-k2u37bk) Hackernoon - -Verifiable credentials, DIDs, and blockchain are evidence of what's to come: Web3, a more secure, widespread, machine-to-machine internet. -* [Principles or Cult - An Irreverant Discussion on the Principles of SSI](https://www.thedinglegroup.com/blog/2021/9/1/principles-or-cult-an-irreverant-discussion-on-the-principles-of-ssi) Dingle Group - -The evolution of the Principles of SSI came about through the need to differentiate what is ‘true’ SSI versus marketing forces twisting the concept. This market driven motivator can bring cultish overtones to the process. -* [Self-Sovereign Identity: a Primer](https://medium.com/@hartmut.obendorf/self-sovereign-identity-a-primer-ee3d7066348a) Hartmut Obendorf - -Digital trust is often centralised, with select, well-known entities providing an anchor of trust that is propagated to everyone else; you are using this mechanism as you read this paragraph, having accessed a https: URL to find this article on your trusted platform, Medium. -* [What is Self-Sovereign Identity and how does it work?](https://www.peaq.com/blog/what-is-self-sovereign-identity-and-how-does-it-work) Peaq - > We currently live within the realms of two separate, yet intertwined worlds. They are the physical and the digital, and to accept the latter is necessary to survive within the 21st Century. -* [Fluid Multi-Pseudonymity](https://www.windley.com/archives/2021/09/fluid_multi-pseudonymity.shtml) Windley - -Fluid multi-pseudonymity perfectly describes the way we live our lives and the reality that identity systems must realize if we are to live authentically in the digital sphere.‘ -* [Self-Sovereign Identity and how we can get there](https://www.procivis.ch/post/self-sovereign-identity-and-how-we-can-get-there) ProCivis - -Enabled by recent advances in the realm of cryptography, mobile devices and decentralized identity standards we can now put citizens firmly in control of their digital identities while ensuring the level of trust needed to unlock the full potential of a digital society. - -* [The Unbundling of Authentication vs Authorization - What You Need to Know](https://www.pingidentity.com/en/company/blog/posts/2021/authentication-vs-authorization.html) Ping Identity - -Authentication and authorization are both processes that fall under the category of [identity and access management (IAM)](https://www.pingidentity.com/en/company/blog/posts/2017/what-is-identity-and-access-management-iam.html), but they serve different purposes. - -* [An Introduction to Digital Trust](https://northernblock.io/introduction-to-digital-trust/) Northern Block - -what’s the purpose of SSI? It’s about enabling Digital Trust (which is quickly becoming an integral part of digital transformation for organizations). - -* [Blockchain, The Missing Piece In Self-Sovereign Digital Identity](https://www.youtube.com/watch?v=GBLjJm-jvEo&list=PLzdCVbKVZxgeD4ql4C7C4hBKPFuJhb8QS&index=13) Modex (part of a youtube playlist) - -How do we prove we are who we say we are? In an identity context, blockchains permit people to prove things about themselves using decentralized, verifiable credentials without revealing the actual data. -* [Principal Authority: A New Perspective on Self-Sovereign Identity](https://www.blockchaincommons.com/articles/Principal-Authority/) Blockchain Commons - -One of the most important steps going forward will be to continue working with the Digital Identity subcommittee in the Wyoming legislature. However, I’d also welcome discussions with other states and nations, to ensure that we have great definitions of digital identity that support self-sovereign identity everywhere. - -* [Toothbrush Identity](https://www.windley.com/archives/2021/09/toothbrush_identity.shtml) - -Identity finds its way into everything—even toothbrushes. Careful planning can overcome privacy concerns to yield real benefits to businesses and customers alike. -* [How to Explain Public-Key Cryptography and Digital Signatures to Anyone](https://auth0.com/blog/how-to-explain-public-key-cryptography-digital-signatures-to-anyone/) - -Here’s an easy-to-understand analogy to help your non-technical friends and customers understand public keys and private keys, and how they relate to cryptography and digital signatures. - -* [Self-Sovereign Identity Allows YOU to Control Your Personal Data](https://imageware.io/solutions/future-of-identity/) Imageware - -SSI supports credential leveling, including: - -- Authentication Assurance Levels (AAL) 1, 2 & 3 -- Biometrics to protect your data -- Affirmation/Metadata - -SSI credentials can be used: - -- In person or online -- For government, financial, or high trust applications (document verification markets) -- For asset ownership, decentralized finance (DeFi), and crypto markets - -* [What is Self Sovereign Identity](https://medium.com/coinmonks/what-is-self-sovereign-identity-a8087b2bf0ea) Florian Strauf - -* [Decentralizing Identity - Taking Back Control](https://www.madigansolutions.com/blog/decentralizing-identity-taking-back-control/) Madigan Solutions - -In a nutshell, Self-Sovereign Identity allows individuals to manage their own identities by moving physical credentials to digital devices. An individual will receive a credential from an issuer which will be stored in their digital wallet. - -* [The Sovereignty Stack: Re-thinking Digital Identity for Web3.0 w/ Greg KIDD [METACO TALKS #23]](https://www.youtube.com/watch?v=CyGggZ2pT1I) - -Greg is a serial entrepreneur who is probably best known for founding and taking public Dispatch Management Services Corp, the world’s largest on demand dispatch network for urgent deliveries. In a highly interesting career so far, Greg was also Chief Risk Officer at Ripple Labs and a senior analyst for the Board of Governors of the Federal Reserve in Washington. In his latest venture Global ID, Greg is acting on his long-held belief that people’s identity should be truly portable and owned by individuals themselves rather than corporations or governments. -* [Challenges to Self-Sovereign Identity](https://damienbod.com/2021/10/11/challenges-to-self-sovereign-identity/) 2021-10-11 - -I based my findings after implementing and testing solutions and wallets with the following SSI solution providers: - -- [Trinsic](https://trinsic.id/) -- [MATTR.global](https://mattr.global/) -- [Evernym](https://www.evernym.com/) -- [Azure Active Directory Verifiable Credentials](https://docs.microsoft.com/en-us/azure/active-directory/verifiable-credentials/) -- Different Wallets like [Lissi](https://lissi.id/) -* [How Decentralized Identifiers and Bitcoin Fix the Web](https://bitcoinmagazine.com/technical/dids-built-on-bitcoin-fix-the-web) Bitcoin Magazine - - - - -On October 4, 2021, Facebook, along with WhatsApp and Instagram, [disappeared from the internet](https://blog.cloudflare.com/october-2021-facebook-outage/). - -Their DNS names stopped resolving, and their infrastructure IPs were offline. They were completely disconnected from the internet. At the same time, it was reported that [1.5 billion people allegedly had their personal data stolen from Facebook](https://www.privacyaffairs.com/facebook-data-sold-on-hacker-forum/) and posted for sale. - -* [17 Things You Should Know About Self Sovereign Identity](https://www.linkedin.com/pulse/17-things-you-should-know-self-sovereign-identity-colin-iles/) Colin Iles - -lessons I took away from asking tech identity experts [Andrew Baker](https://www.linkedin.com/in/andrew-baker-b1357939/) (Head of EC2 Engineering at AWS), our mystery guest and [Marius Mare](https://www.linkedin.com/in/marius-mare-7b8536a/), to why we need self-sovereign identity and why it has such profound implications. - -* [Is Self Sovereign Identity Going Exponential - With Andrew Baker and A Suprise Guest](https://www.youtube.com/watch?v=caZnuTBJ_TM) Colin Iles - -despite the technological revolution we are living through, identity management is still as objectionable as ever, which is allowing criminals and companies (particularly the social media giants) to know more about you than can ever be justifiable. - -In this discussion I ask Andrew Baker, AWS's Head of EC2 Engineering and a surprise guest, to share their views on whether Self Sovereign Identity management could be the solution and how likely it is - -* [Digital Identity: The Trending Tech Concept Changing How We Live](https://www.forbes.com/sites/johnhall/2021/10/15/digital-identity-the-trending-tech-concept-changing-how-we-live/?sh=3e004c6c2c4c) Forbes 2021-10-15 - -Identification is key to our success. It determines the jobs we get, the money we make, how we can manage our health, and more. The fact of the matter is that 3.4 billion people have access to legally recognized identification but still [have difficulty using that identification online](https://www.mckinsey.com/business-functions/mckinsey-digital/our-insights/digital-identification-a-key-to-inclusive-growth). - -* [Token-Based Identity](https://www.windley.com/archives/2021/10/token-based_identity.shtml) Windley - -Token-based identity systems move us from talking about who, to thinking about what, so that people can operationalize their digital lives. Token-based identity systems support complex online interactions that are flexible, ad hoc, and cross-domain. - -* [Nomadic Labs Research Seminars #20 | Self-Sovereign Identity and Storage](https://www.youtube.com/watch?v=HombbTvvets) - -This session features a presentation by Wayne Chang who introduces Self-Sovereign Identity and Storage. - -In this talk, Wayne reviews the results of support with Tezos addresses, use cases that have been deployed, Tezos DID methods and Tezos profiles. Wayne also gives an overview of the Trail of Bits audit. - -* [Verifying documents & identity in the public services and beyond](https://www.openaccessgovernment.org/w3c-verifiable-credentials-verifying-documents-identity/123049/) OpenAccessGovernment • David Chadwick - -A particularly useful aspect of the Verifiable Credentials standard is that the parties undertake the specific roles of Issuer, Holder or Verifier, but they are not constrained in how many roles, or when, they can employ them. Each party can be a device, a person or an institution, meaning that verifications can take place directly between automated systems, even verifying that each other is genuine before establishing a connection to share data - - -* Really Good: [Self Sovereign Identity ≠ Blockchain](https://jolocom.io/blog/dezentrale-identitaten-%e2%89%a0-blockchain-2/) Jolocom - -Due to the ID-Wallet project in Germany, some articles and comments have equated Self Sovereign Identity (SSI) with blockchain technology in the last few weeks. The impression is given that SSI only works in conjunction with a blockchain. Spoiler, that’s not the case. - -* [What Is Self-Sovereign Identity?](https://trinsic.id/what-is-self-sovereign-identity/) Trinsic - -Self-sovereign identity is the marriage of real identity with the digital world that will ultimately make people’s lives better.² It’s still in its infancy, and there is a long road ahead to truly make digital identity as legitimate and nuanced as a real-world identity. - -* [Explaining SSI to C-suite executives, and anyone else for that matter – John Phillips](https://ssimeetup.org/explaining-ssi-c-suite-executives-anyone-else-john-phillips-webinar-48/) SSIMeetup - -* [Self-Sovereign Identity: The Ultimate Beginners Guide!](https://101blockchains.com/self-sovereign-identity/) 101 Blockchains - -Apart from addressing the pitfalls in conventional identity management systems, SSI allows better functionalities for all users. With a wide range of benefits and the self-sovereign identity blockchain applications, it is important to take a step towards adopting SSI solutions. - -* [Zero Knowledge Proofs](https://www.windley.com/archives/2021/11/zero_knowledge_proofs.shtml) Windley - -This problem was first explored by MIT researchers Shafi Goldwasser, Silvio Micali and Charles Rackoff in the 1980s as a way of combatting information leakage. The goal is to reduce the amount of extra information the verifier, Victor, can learn about the prover, Peggy. - -* [Understanding the SSI Identity Model with Verifiable Credentials](https://www.youtube.com/watch?v=TRuz39SEX7E) Manning - -* [Badges and Credentials – A new currency for the digital world?](https://www.speexx.com/speexx-resources/podcast/podcast-badges-credentials) Speexx Exchange - -Listen to this episode for an entertaining deep dive into the topic of badges and credentials, as Donald Taylor sits down with Dr. Doug Belshaw to discuss the importance, various fields of application - -* [Evolution of Self-Sovereign Identity (SSI)](https://lionsgate.io/evolution-of-self-sovereign-identity-ssi/) - -The public keys of the user and the third-party organization for verifying the digital signature are recorded in a distributed ledger, and the user of the identity information verifies the provided information using them. In this way, users can control their own identity information without relying on a specific central administrator. - -* [Beyond The Device With Self-Sovereign Identities](https://www.forbes.com/sites/alastairjohnson/2021/11/15/beyond-the-device-with-self-sovereign-identities/) Forbes 2021-11-15 - -In 2021, the average cost of a data breach reached an all-time high of [$4.24 million](https://www.upguard.com/blog/cost-of-data-breach), even though businesses are already spending millions more to combat financial crime and meet their regulatory and compliance responsibilities. - -* [Decentralized Identity - Taking Back Control](https://www.madigansolutions.com/blog/decentralizing-identity-taking-back-control/) Madigan Solutions - -By moving identity to effectively require just a digital device and some sort of connection to the internet, the barriers to these interactions are more easily bridged. Both access to a digital device and availability of an internet connection are increasing, even in new or emerging economies. - -* [The Role of Identity in Creating a Better Internet with Kaliya Young — Structure 3C](https://www.structure3c.com/cohere/online-identity-kaliya-young) CoHere - -Kaliya talking with a colleague from way back Bill Johnston. - -On this episode of the Cohere podcast, Kaliya joins Bill to discuss the history of online identity, what events led us to the consolidation of identity into a few centralized platforms, and what steps we need to take to recover and protect our online identities. - -* [Self-Sovereign Identity Crisis](https://lionsgate.io/self-sovereign-identity-crisis/) Lionsgate - -Through deceptive marketing practices the first-movers in the Digital ID market have done-away with the sovereignty. As a result a burgeoning new industry is experiencing a Self-Sovereign Identity Crisis. -* [SSI Essentials: Everything you need to know about Decentralized Identity](https://gataca.io/blog/ssi-essentials-everything-you-need-to-know-about-decentralized-identity/) Gataca - -Solving the identity paradox: the tradeoff between privacy, security, & user experience - -* [Beyond The Device With Self-Sovereign Identities](https://www.forbes.com/sites/alastairjohnson/2021/11/15/beyond-the-device-with-self-sovereign-identities/) Forbes 2021-11-15 - -As we’ve moved more and more online, digital platforms and processes have failed to keep up. We can’t trust them to collect, store or share our personal information safely. In fact, consumers’ information is frequently abused and misused without our knowledge or consent. - - - -* [Self-Sovereign Identities in Productive Systems - A Reality Check](https://www.youtube.com/watch?v=bRmhIL9sdd0) Frankfurt School Blockchain Center - -Which use cases does SSI have? - -What is the disruptive potential of SSI’s? - -Which risks does the adoption of SSI pose? - -What are the challenges and opportunities of SSI? - -Where do the limitations of SSI lie? - -How can SSI be incorporated into existing infrastructure? - -Which steps need to be taken for the proliferation of SSI? -* [Adobe Coalition for Content Provenance and Authenticity at LF, Wacom and IdentityNet](https://www.youtube.com/watch?v=_YDP-lAewis) Connected Ink - -SSI has the power to change the world for the better by flipping the power dynamic surrounding digital identities and trust from large corporations and governments back to the individual. This technology empowers individuals and communities to take back control of both their personal data as well as of their digital assets and identities, and decide exactly how and when this information is to be used and shared. This session explores how SSI-based ecosystems are built and how this transition benefits both individuals and the wider global community. - -* [What is Self Sovereign Identity](https://medium.com/coinmonks/what-is-self-sovereign-identity-a8087b2bf0ea) Florian Strauf - -the digital representation of the identification process we know from the physical world. Things like showing our driver’s license to prove we are allowed to drive, or sending a bank statement to a real estate agent to prove our income and account balance. - -* [Self Sovereign Identity Explainer](https://www.didas.swiss/2021/12/17/self-sovereign-identity-explainer-introduction-to-the-world-of-ssi/) DIDAS ([PDF](https://www.didas.swiss/wp-content/uploads/2021/12/SSI-Explainer-Introduction-final.pdf) 2021-12-17 - -* [New Indicio Executive Workshop Provides Essential Grounding in Digital Identity: The Business and Investor’s Guide to Self-Sovereign Identity](https://indicio.tech/new-indicio-executive-workshop-provides-essential-grounding-in-digital-identity-the-business-and-investors-guide-to-self-sovereign-identity/) by [Scott Harris](https://indicio.tech/author/scott-harris/) - -Participants will [walk away with an essential understanding](https://indicio.tech/product/executive-education-ssi-workshop/) of how SSI works, the pain points it solves for, the risks it mitigates, the use cases currently in deployment, and the opportunities that are created by being able to build Trusted Data Ecosystems (TDEs). - -* [Trusted Third Parties vs Self-Sovereign Identity](https://academy.affinidi.com/trusted-third-parties-vs-self-sovereign-identity-4e96de929b1b) Affinidi - -All of us have [multiple identities](https://academy.affinidi.com/what-links-identity-and-vcs-together-across-applications-9523af3884a9) at any point. We are sons, daughters, brothers, sisters, parents, partners, friends, colleagues, and more to different people. - -* [A Future Built on Decentralized Identity](https://bloom.co/blog/a-future-built-on-decentralized-identity/) Bloom - -Decentralized identity is an emerging concept becoming more popular for online consumers by eliminating the need to pass personal identifiable information (PII) to an ever-increasing number of companies. However, in practice, decentralized identity has only existed for a handful of years, and its potential is still being discovered. So how did we get here? - -* [Webinar: The Future of Self Sovereign Identity](https://www.youtube.com/watch?v=gimrMbcj91A) Patientory - -Self-sovereign identity (SSI) is a movement that claims digital identity should be just as legitimate and nuanced as a person’s human identity, while being accessible to all, privacy-preserving, and not reliant on a single government or corporation. - -* [Identity management is key to increasing security, reducing fraud and developing a seamless customer experience](https://identitypraxis.com/2022/01/07/identity-management-is-key-to-increasing-security-reducing-fraud-and-developing-a-seamless-customer-experience/) Identity Praxis 2022-01-07 - -- Identity management is an iterative process with three core elements – initial identification, authentication (re-identifying the individual) and verification (ensuring the individual is who they claim to be) -- Enterprises employ a vast array of technologies to execute these processes which are growing in scope and complexity -- Understanding why identity management is necessary to enterprises and how this creates opportunities for vendors - -* [Leveraging the Identity Metasystem](https://www.windley.com/archives/2021/12/leveraging_the_identity_metasystem.shtml) Windley - -the [metasystem guarantees the fidelity of the credential exchange](https://www.windley.com/archives/2021/06/ssi_interaction_patterns.shtml). Credential fidelity comprises four important attributes. Credential exchange on the identity metasystem: - -1. Reveals the identifier of the issuer -2. Ensures the credential was issued to the party presenting it -3. Ensures the credential has not been tampered with -4. Reveals whether or not the credential has been revoked - -* [#SSI gives its owner control over some aspects of identity, but not all](https://twitter.com/GETJolocom/status/1470791578780413953) Jolocom - -Connections, relationships, and third-party issued credentials are not entirely self-sovereign, nor should they be. #JolocomAdvent #AdventCalendar - - -* [What’s in Your Data Ecosystem?](https://stateofidentity.libsyn.com/whats-in-your-data-ecosystem) State of Identity - -Indicio's CEO, Heather Dahl, and CTO, Ken Ebert, identity wallets, verified credentials, the role of the Sovrin Foundation, and new momentum around interoperability across decentralized identity. - - -* [Understanding Digital Credentials](https://www.bcdiploma.com/en/blog/understanding-digital-credentials-21-05-12) BCdiploma - -We are freeing ourselves from the management of “data hash” which leads to a centralization or complexification of verification procedures. This makes our solution new compared to traditional blockchain applications on the market. - -* [What are Verifiable Credentials? Why do they matter?](https://flur.ee/2022/01/10/what-are-verifiable-credentials-why-do-they-matter/) 2022-01-10 - -Authority Does Not Require Centralized Power - -As mentioned in my previous article, the trouble with centralization is that data is stored in a database. Once breached, a database can yield a treasure chest of information to be sold on the dark web. -* [What Are Verifiable Credentials? And How Can They Build Digital Trust?](https://www.salesforce.com/blog/verifiable-credentials/) Salesforce - -Verifiable credentials and verifiable credential management technology offer a direct and secure channel between an organization and its stakeholders. Learn how they bring control over digital identity and build trust with organizations – from health credentials to college degrees. - -* [Good Welfare, Bad Platforms?: The Risks of Centralized Digital Identity Systems](https://points.datasociety.net/good-welfare-bad-platforms-d65b412d962e) OpenID - -As S. Shakthi and I noted in a recent [research paper](https://journals.openedition.org/samaj/6279), digital identity systems are widely seen as datafiers by virtue of their core property of reducing the person to machine-readable data. A datafier is a system that performs the crucial operation of converting the physical into digital. A different, contrasting view is also emerging in research: digital identity systems are increasingly seen as platforms, i.e. “technological building blocks” on which different types of complements can be constructed. - - -* [Self-Sovereign Identity: The Foundation of the Digital Wallet](https://www.nevis.net/en/blog/how-does-self-sovereign-identity-ssi-work) Nevis - -Turning identifying features into verified credentials - -How exactly does this work? Let’s look at the three roles of user, issuer and verifier. Firstly, users can have any number of attributes – such as their credit rating, national identity document or driving licence – certified by the entity responsible for each attribute. - -* [WHAT IS PII (PERSONALLY IDENTIFIABLE INFORMATION)?](https://www.thrivacy.io/en-us/thrivacy_blogs/what-is-pii-personally-identifiable-information) Thrivacy - -Since we are experiencing massive boosts in our digital economy in the form of investment and innovation, being able to secure and "own" our PII is crucial. In an unprecedented time of hackable honey pots, we need to be able to protect our online and offline identities. - -* [Techgirl1908 on Twitter](https://twitter.com/techgirl1908/status/1499794912761589763) - -In case you missed it, learn about a new type of identification... Decentralized IDs (DID) - -We talk use cases, benefits, DIDs vs NFTs, and what should and shouldnt go on a blockchain. - -* [The Off Chain Internet: Decentralized Identity & Verifiable Credentials - Evin McMullen](https://www.youtube.com/watch?v=EZ_Bb6j87mg) - -FANTASTIC NEW TALK!!!! - -* [Self-sovereign identity - Wikipedia](https://en.m.wikipedia.org/wiki/Self-sovereign_identity) - -WE have a wikipedia article! - -* [Take Control of Your Data with Self-Sovereign Identity](https://rainfall.one/news/61dd6a20f4f3e8002260b268) Rainfall One - -The SSI identity system gives you the ability to authenticate your own identity, using credentials you have been issued or information you can verify directly, which is stored in a digital wallet. - -* [Why all living artists should create their provenance and self-sovereign identity with their art?](https://artracx.medium.com/why-all-living-artists-should-create-their-provenance-and-self-sovereign-identity-with-their-art-fffb03720c40) Artracx - -This self-sovereign capability of associating the artist, the collector and the art work itself with an identity — creates value for everyone. We did also share that the opportunity of secondary sale income / commission that could be attributed back to him as the original artists is also possible (albeit very complicated). * [The Decentralized Identity Schelling Point](https://www.linkedin.com/pulse/decentralized-identity-schelling-point-sarah-baldeo-bsc-mba/) Sarah Baldeo - -Back to the Schelling Point - communication requires a common language and understanding. As governments, banks, hospitals, etc. navigate how best to homogenize authenticating user identities in multiple contexts, solutions will depend on user adoption. Maximizing adoption requires avoiding a Schelling point by creating a shared, accessible, and evolving Decentralized Identity Lexicon. + > Back to the Schelling Point - communication requires a common language and understanding. As governments, banks, hospitals, etc. navigate how best to homogenize authenticating user identities in multiple contexts, solutions will depend on user adoption. Maximizing adoption requires avoiding a Schelling point by creating a shared, accessible, and evolving Decentralized Identity Lexicon. * [Self-Sovereign Identity (SSI) Explained](https://www.youtube.com/watch?v=kJAapPG_jBY) Animo - -In this video, we explain how third parties get to see a lot of personal information about you that they don't really need. Whether it is your local supermarket or your new job, you're often sharing a lot of data when all they really need is a very simple yes or no answer. + > In this video, we explain how third parties get to see a lot of personal information about you that they don't really need. Whether it is your local supermarket or your new job, you're often sharing a lot of data when all they really need is a very simple yes or no answer. * [Self Sovereign Identity Explainer](https://www.didas.swiss/wp-content/uploads/2021/12/SSI-Explainer-Introduction-final.pdf) DIDAS - -With this presentation we start the Self-Sovereign Identity journey for all Swiss people. + > With this presentation we start the Self-Sovereign Identity journey for all Swiss people. We look forward to exploring further relevant topics with you in the near future! * [Privacy, Authenticity, and Confidentiality](https://www.windley.com/archives/2022/03/privacy_authenticity_and_confidentiality.shtml) Phil Windely - -Authenticity allows parties to a conversation to know to whom they are talking. Confidentiality ensures that the content of the conversation is protected from others. These three create a tradespace because you can't achieve all three at the same time. + > Authenticity allows parties to a conversation to know to whom they are talking. Confidentiality ensures that the content of the conversation is protected from others. These three create a tradespace because you can't achieve all three at the same time. * [Verifiable Credentials explained](https://www.smartdegrees.es/en/verifiable-credentials-explained/) Smart Degrees - -Verifiable Credentials, its infrastructure ([European Blockchain Services Infrastructure](https://ec.europa.eu/ebsi), EBSI), and the vast opportunities that it currently provides, through a user’s journey (“Eva’s trip”). + > Verifiable Credentials, its infrastructure ([European Blockchain Services Infrastructure](https://ec.europa.eu/ebsi), EBSI), and the vast opportunities that it currently provides, through a user’s journey (“Eva’s trip”). * [Impacts from a new reality drive the need for an enhanced digital identity framework](https://bankautomationnews.com/allposts/risk-security/impacts-from-a-new-reality-drive-the-need-for-an-enhanced-digital-identity-framework/) Bank Automation News - -Consumers will benefit in instances such as loan processing (with accompanying credit check verification) or when establishing a new bank account or a new internet contract (with identity and residency manual verification). + > Consumers will benefit in instances such as loan processing (with accompanying credit check verification) or when establishing a new bank account or a new internet contract (with identity and residency manual verification). Service providers may benefit, as they will be able to minimize fraudulent account creation and simultaneously protect both parties from phishing attacks. - * [Perkins Coie on Twitter](https://mobile.twitter.com/PerkinsCoieLLP/status/1498757491659878401) - -On the @IAlsoPodcast, partner Charlyn Ho discusses w/hosts @nicolekyle and @SophieWHolm #digitalidentity, how #blockchain empowers users to take control of their data, #privacy under #Web2 vs. #Web3, and more. Tune in 🎧: [https://apple.co/3IvGVjr](https://podcasts.apple.com/us/podcast/45-self-sovereign-digital-identity-blockchain-web3/id1510232581?i=1000552163633). #womenintech #ialsowantmoney - + > On the @IAlsoPodcast, partner Charlyn Ho discusses w/hosts @nicolekyle and @SophieWHolm #digitalidentity, how #blockchain empowers users to take control of their data, #privacy under #Web2 vs. #Web3, and more. Tune in 🎧: [https://apple.co/3IvGVjr](https://podcasts.apple.com/us/podcast/45-self-sovereign-digital-identity-blockchain-web3/id1510232581?i=1000552163633). #womenintech #ialsowantmoney * [Blockchain for Decentralized Identity — Self-Sovereign Identity De-mystified](https://medium.com/blockchain-for-decentralized-identity/blockchain-for-decentralized-identity-self-sovereign-identity-de-mystified-f9bebd006e84) Anita Rao - -Web 3.0 presents a promise to address the above issues with Identity. The term Web 3.0 refers to a decentralized internet that uses crypto tokens. Decentralization is at the heart of Web 3.0 which has the potential to democratize technology and put the users in control of their data. + > Web 3.0 presents a promise to address the above issues with Identity. The term Web 3.0 refers to a decentralized internet that uses crypto tokens. Decentralization is at the heart of Web 3.0 which has the potential to democratize technology and put the users in control of their data. * [My first attempt at a business blockchain flowchart](https://twitter.com/JonRamvi/status/1491701376367403016) JonRamvi @@ -613,18 +280,14 @@ Self-sovereign identity Definition <-its quite good Self-sovereign identity (SSI) is rooted in the belief that individuals have the right to an identity independent of reliance on a third-party identity provider, such as the state or any other central authority. Its implementation requires the development of technical standards, as well as socio-political adaptations rooted in legal amendments in order to be successful. - * [SSI: self-sovereign identity explained](https://medium.com/geekculture/ssi-self-sovereign-identity-explained-b7d8cb9ae9c0) Cheqd > Unlike the existing system, it’s a user-centric and user-controlled approach to exchanging authentic data in a much more secure way. Authentic data is information that’s source can be proven. - * [Passwordless Authentication – Everything You Need to Know](https://imageware.io/passwordless-authentication/) - -When it comes to authentication, passwords were once the safest and most used methods of authentication + > When it comes to authentication, passwords were once the safest and most used methods of authentication * [Decentralized identities ≠ blockchain](https://jolocom-io.translate.goog/blog/dezentrale-identitaten-%e2%89%a0-blockchain/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=nl&_x_tr_pto=nui) Jolocom - -Decentralized digital identities are only possible due to cryptography. One of the cornerstones is asymmetric encryption. A key pair is generated using a cryptographic process. The pair consists of a public and a private key. As the names suggest, the private key must remain private and the public key can be shared. + > Decentralized digital identities are only possible due to cryptography. One of the cornerstones is asymmetric encryption. A key pair is generated using a cryptographic process. The pair consists of a public and a private key. As the names suggest, the private key must remain private and the public key can be shared. * [Self-Sovereign Identity (SSI) Foam Figure Explainer v2 - this time with two cameras](https://www.youtube.com/watch?v=81GkdBRmsbE) John Phillips @@ -637,72 +300,53 @@ In this short article, we investigate three different approaches to how SSI conc The third approach is, in a way, derived from the previous one, and is the one pursued by [uPort/Serto](https://www.uport.me/): the blockchain has one single registry that tracks down just the revocation of credentials, * [The Buzz Behind Zero Trust](https://stateofidentity.libsyn.com/zero-trust-architecture) State of Identity - -The Zero Trust model is the belief that no one should be trusted from inside or outside your network, until their identity has been verified. Zero trust refers to the alignment of maturing identity practices, an established understanding of user behaviors, and the application of least-privilege access security policy decisions to trust boundOaries + > The Zero Trust model is the belief that no one should be trusted from inside or outside your network, until their identity has been verified. Zero trust refers to the alignment of maturing identity practices, an established understanding of user behaviors, and the application of least-privilege access security policy decisions to trust boundOaries * [8 Benefits of Multi-Factor Authentication (MFA)](https://www.pingidentity.com/en/company/blog/posts/2021/eight-benefits-mfa.html) Ping - -Multi-factor authentication takes it step further by requiring users to provide proof from two or more authentication factors (categories) before access is granted. + > Multi-factor authentication takes it step further by requiring users to provide proof from two or more authentication factors (categories) before access is granted. * [Challenges to Self Sovereign Identity](https://damienbod.com/2021/10/11/challenges-to-self-sovereign-identity/) Damien Bod 2021-10-11 - -The article goes through some of the challenges we face when using or implementing identity, authentication and authorization solutions using self sovereign identity. I based my findings after implementing and testing solutions and wallets with the following SSI solution providers: Trinsic MATTR.global Evernym Azure Active Directory Verifiable Credentials Different Wallets like Lissi SSI - + > The article goes through some of the challenges we face when using or implementing identity, authentication and authorization solutions using self sovereign identity. I based my findings after implementing and testing solutions and wallets with the following SSI solution providers: Trinsic MATTR.global Evernym Azure Active Directory Verifiable Credentials Different Wallets like Lissi SSI * [Our Ultimate Guide to Authentication: Types, Mechanisms, Forms, Protocols and More](https://www.pingidentity.com/en/company/blog/posts/2021/ultimate-guide-authentication.html) Ping Identity - -When organizations employ authentication factors and protocols in a well-thought-out manner, users can still have excellent experiences while security administrators and auditors know operations are being executed securely. As we have seen, there are a number of ways to provide these services in any organization. + > When organizations employ authentication factors and protocols in a well-thought-out manner, users can still have excellent experiences while security administrators and auditors know operations are being executed securely. As we have seen, there are a number of ways to provide these services in any organization. * [ID Token and Access Token: What Is the Difference?](https://auth0.com/blog/id-token-access-token-what-is-the-difference/) - -"Let’s use a token to secure this API call. Should I use the ID token or the access token? 🤔 The ID token looks nicer to me. After all, if I know who the user is, I can make better authorization decisions, right?" + > "Let’s use a token to secure this API call. Should I use the ID token or the access token? 🤔 The ID token looks nicer to me. After all, if I know who the user is, I can make better authorization decisions, right?" * [Self-Sovereign Identity Foundations, Applications, and Potentials of Portable Digital Identities](https://www.fim-rc.de/wp-content/uploads/2021/09/20210811-SSI-Whitepaper-English.pdf) - -Fraunhofer Institute for Applied Information Technology FIT, Project Group Business & Information Systems Engineering + > Fraunhofer Institute for Applied Information Technology FIT, Project Group Business & Information Systems Engineering * [What is the Trust Triangle?](https://academy.affinidi.com/what-is-the-trust-triangle-9a9caf36b321) Affinidi - -The relationship between the issuers, holders, and verifiers is called the trust triangle simply because you need an element of trust among these entities for them to work together. + > The relationship between the issuers, holders, and verifiers is called the trust triangle simply because you need an element of trust among these entities for them to work together. * [Do You Need Blockchain for Enabling SSI?](https://academy.affinidi.com/do-you-need-blockchain-for-enabling-ssi-452d62b34890) Affinidi - -We hope this will get you thinking about enabling SSI using an option that best suits your application or business requirement. + > We hope this will get you thinking about enabling SSI using an option that best suits your application or business requirement. * [Identities Evolve: Why Federated Identity is Easier Said than Done](https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2163241) SSRN - -This paper shows that federated identity is really a radical and deeply problematic departure from the way we do routine business. Federation undoes and complicates long standing business arrangements, exposing customers and service providers alike to new risks that existing contracts are unable to deal with. Identity federations tend to overlook that identities are proxies for relationships we have in different contexts. Business relationships don’t easily “interoperate." + > This paper shows that federated identity is really a radical and deeply problematic departure from the way we do routine business. Federation undoes and complicates long standing business arrangements, exposing customers and service providers alike to new risks that existing contracts are unable to deal with. Identity federations tend to overlook that identities are proxies for relationships we have in different contexts. Business relationships don’t easily “interoperate." * [Verifiable credentials are key to the future of online privacy](https://www.helpnetsecurity.com/2021/07/26/verifiable-credentials/) Helpnet 2021-07-26 - -they offer a few advantages that we don’t get with paper records. Whereas a physical document (let’s say, a [vaccine card](https://www.helpnetsecurity.com/2021/06/15/vaccine-passports/)) can be forged and [passed off as authentic](https://www.npr.org/2021/06/08/1004264531/fake-covid-vaccine-cards-keep-getting-sold-online-using-one-is-a-crime?t=1626423870877), the [security mechanisms](https://www.evernym.com/blog/the-three-pillars-of-self-sovereign-identity/) behind a verifiable credential means that it can never be tampered with and that anyone shown the credential will be able to immediately verify who issued it and to whom it was issued. 2021-06-08 + > they offer a few advantages that we don’t get with paper records. Whereas a physical document (let’s say, a [vaccine card](https://www.helpnetsecurity.com/2021/06/15/vaccine-passports/)) can be forged and [passed off as authentic](https://www.npr.org/2021/06/08/1004264531/fake-covid-vaccine-cards-keep-getting-sold-online-using-one-is-a-crime?t=1626423870877), the [security mechanisms](https://www.evernym.com/blog/the-three-pillars-of-self-sovereign-identity/) behind a verifiable credential means that it can never be tampered with and that anyone shown the credential will be able to immediately verify who issued it and to whom it was issued. 2021-06-08 * [Selective Disclosure: Share Just What You Want](https://academy.affinidi.com/selective-disclosure-share-what-you-want-8ae367655b7b) Affinidi - -In the context of SSI, selective disclosure is best implemented through [verifiable credentials](https://academy.affinidi.com/what-are-verifiable-credentials-79f1846a7b9) where the user has separate credentials for each piece of information such as his/her date of birth, full name, vaccination details, address, passport number, etc. + > In the context of SSI, selective disclosure is best implemented through [verifiable credentials](https://academy.affinidi.com/what-are-verifiable-credentials-79f1846a7b9) where the user has separate credentials for each piece of information such as his/her date of birth, full name, vaccination details, address, passport number, etc. * [IDENTOS prepares customers for verifiable credentials](https://www.identos.ca/identos-prepares-customers-for-verifiable-credentials/) Identos - -Rather than trying to paste everything and everyone together, the path forward to help build trusted ecosystems relies on interoperability and leveraging existing assets while positioning the user in a disintermediated model of control and agency — possible with FPX and verifiable credentials. + > Rather than trying to paste everything and everyone together, the path forward to help build trusted ecosystems relies on interoperability and leveraging existing assets while positioning the user in a disintermediated model of control and agency — possible with FPX and verifiable credentials. ## [Sebastian Gebski's Reviews](https://www.goodreads.com/review/list/11116469-sebastian-gebski?shelf=read) > Self-Sovereign Identity: Decentralized Digital Identity and Verifiable Credentials by Alex Preukschat, Drummond Reed highly recommended. I strongly believe that the concept of SSI will be extremely important in the future - that's actually one of the few implementations on the blockchain that make a lot of sense. * [Techno-Feudalism Is Taking Over](https://docs.google.com/document/d/14V0keLs0r3AMGHRysFDI_-yRj4DsAHyq8cVk3-Vt2J0/edit) - -Meanwhile, digital platforms have replaced markets as the locus of private wealth extraction. For the first time in history, almost everyone produces for free the capital stock of large corporations. That is what it means to upload stuff on Facebook or move around while linked to Google Maps…. But while capitalism may end with a whimper, the bang may soon follow. If those on the receiving end of techno-feudal exploitation and mind-numbing inequality find a collective voice, it is bound to be very loud. + > Meanwhile, digital platforms have replaced markets as the locus of private wealth extraction. For the first time in history, almost everyone produces for free the capital stock of large corporations. That is what it means to upload stuff on Facebook or move around while linked to Google Maps…. But while capitalism may end with a whimper, the bang may soon follow. If those on the receiving end of techno-feudal exploitation and mind-numbing inequality find a collective voice, it is bound to be very loud. * [The Working Principles of 2FA (2-Factor Authentication) Software](https://auth0.com/blog/the-working-principles-of-2fa-2-factor-authentication-software/) Auth0 - -There’s a lot of “magic” happening under the hood of how software 2FA works. Today, we’re going to peel back the curtains and see how it works, how the codes are generated, what it protects and doesn’t protect from. + > There’s a lot of “magic” happening under the hood of how software 2FA works. Today, we’re going to peel back the curtains and see how it works, how the codes are generated, what it protects and doesn’t protect from. * [Blockchain, The Missing Piece In Self-Sovereign Digital Identity](https://modex.tech/blockchain-the-missing-piece-in-self-sovereign-digital-identity/) Modex Tech - -long but good overview article. - Modex, one of the earliest players in the blockchain market, has utilized its trademark Blockchain Database (BCDB) solution to develop PatientDataChain, a working proof of concept that utilizes the unique characteristics of blockchain to create a patient-centric ecosystem that gives patients control and ownership of their medical records and identity. * [What Is Authentication?](https://www.1kosmos.com/blog/authentication/what-is-authentication) 1Kosmos - -Authentication is the process of proving that a user is who they claim to be to access system resources or features. Typically, this calls for some type of proof, whether that is a physical piece of information, a secret piece of information or some other immutable form of evidence. + > Authentication is the process of proving that a user is who they claim to be to access system resources or features. Typically, this calls for some type of proof, whether that is a physical piece of information, a secret piece of information or some other immutable form of evidence. * [Self-Sovereign Identity: What You Can/Can’t Do With SSI?](https://academy.affinidi.com/self-sovereign-identity-what-you-can-cant-do-with-ssi-1284f7227b4e) Affinidi @@ -711,40 +355,31 @@ Authentication is the process of proving that a user is who they claim to be to > No problem, there are several beginner [#guides](https://threadreaderapp.com/hashtag/guides), which you can use to get familiar with the new standard for digital [#identity](https://threadreaderapp.com/hashtag/identity). * [What Are Self-Sovereign Identities (SSI)?](https://europechain.io/identity/self-sovereign-identities-explained/) Europechain - -In this context, ‘self-sovereignty’ refers to the ability of the individual or the organization in control of the identity to share it and present it to other agencies with no intermediaries. + > In this context, ‘self-sovereignty’ refers to the ability of the individual or the organization in control of the identity to share it and present it to other agencies with no intermediaries. * [Digital signatures, a fast track to digital transformation in the real estate sector](https://www.validatedid.com/post-en/digital-signatures-a-fast-track-to-digital-transformation-in-the-real-estate-sector) - -The implementation of the electronic signature was a major development in the development in management. + > The implementation of the electronic signature was a major development in the development in management. 99% of our documents are digitally signed digitally and we have eliminated many face-to-face meetings. * [7 Benefits Of Using Digital Identities](https://europechain.io/identity/7-benefits-digital-identities/) Europechain - -Mobile First • Establish Framework of Trust • Smart City Access • Digital Economy • Financial and Social Inclusion • Enhanced Portability + > Mobile First • Establish Framework of Trust • Smart City Access • Digital Economy • Financial and Social Inclusion • Enhanced Portability * [Comparing X.509 Certificates with SSI](https://www.windley.com/archives/2021/05/comparing_x509_certificates_with_ssi.shtml) Windley - -X.509 certificates have been around for 40 years and have proven to be a trustworthy means of exchanging data. So, what are the differences between X.509 ceritificates and SSI? And what are the advantages of each? + > X.509 certificates have been around for 40 years and have proven to be a trustworthy means of exchanging data. So, what are the differences between X.509 ceritificates and SSI? And what are the advantages of each? * Sovrin’s [12 Principles of Self-Sovereign Identity](https://sovrin.org/principles-of-ssi/) - -Representation • Interoperability • Decentralization • Control & Agency • Participation • Equity and Inclusion • Usability, Accessibility, and Consistency • Portability • Security • Verifiability and Authenticity • Privacy and Minimal Disclosure • Transparency + > Representation • Interoperability • Decentralization • Control & Agency • Participation • Equity and Inclusion • Usability, Accessibility, and Consistency • Portability • Security • Verifiability and Authenticity • Privacy and Minimal Disclosure • Transparency * [Digital Identities Explained](https://europechain.io/identity/digital-identities-explained/) > Let’s throw a widely accepted definition out there. According to Wikipedia, ‘A [digital identity](https://europechain.io/products/myd) is information on an entity used by computer systems to represent an external agent. That agent may be a person, organization, application, or device.’ * [Part 2: How DIDs Can Enable True Customer Centricity](https://www.evernym.com/blog/dids-customer-centricity/) - -By using Decentralized Identifiers (DIDs) – creating a unique identifier for each and every different relationship – customers can seamlessly set up a new, highly secure, two-way channel with the business + > By using Decentralized Identifiers (DIDs) – creating a unique identifier for each and every different relationship – customers can seamlessly set up a new, highly secure, two-way channel with the business * [Part 3: Digital Wallets and Digital Agents: Putting the Individual in Control](https://www.evernym.com/blog/digital-wallets-digital-agents/) Evernym - -Fittingly, some define wrath as “when anger is directed against an innocent person, and when it is unduly strong or long-lasting.” That feels right if you consider the real-life impacts of disabling someone’s digital identity without notice. + > Fittingly, some define wrath as “when anger is directed against an innocent person, and when it is unduly strong or long-lasting.” That feels right if you consider the real-life impacts of disabling someone’s digital identity without notice. * [Part 4: Getting on the Right Data Diet with Verifiable Credentials](https://www.evernym.com/blog/right-data-diet-verifiable-credentials/) - -Apparently gluttony means “overconsumption to the point of waste.” Sadly that feels apt when it comes to customer data APIs. + > Apparently gluttony means “overconsumption to the point of waste.” Sadly that feels apt when it comes to customer data APIs. * [Part 5: How Zero-Knowledge Proofs (ZKPs) Enable Smarter Customer Insights, With Less Liability](https://www.evernym.com/blog/zero-knowledge-proofs/) - -Put simply, most organizations are unthinkingly collecting more data from customers, without understanding the true impact: the real costs to themselves, and to customers. + > Put simply, most organizations are unthinkingly collecting more data from customers, without understanding the true impact: the real costs to themselves, and to customers. * [6: Breaking Down Silos with Open Ecosystems and True Data Portability](https://www.evernym.com/blog/open-ecosystems-data-portability/) @@ -753,44 +388,30 @@ Every company providing a new digital identity solution believes that all the ot Yet collaboration will be critical to making digital identity work properly at scale. * [Part 7: Envy Counting The Cost of Data Collection, And A New Paradigm Of ‘Identity Holder Present’](https://www.evernym.com/blog/identity-holder-present/) - -It all feels like data envy to me. Aristotle described envy as the pain at the sight of another’s good fortune, stirred by “those who have what we ought to have.” Precisely. + > It all feels like data envy to me. Aristotle described envy as the pain at the sight of another’s good fortune, stirred by “those who have what we ought to have.” Precisely. * [Seven Ways Self-Sovereign Identity Can Enable True Digital Transformation](https://www.evernym.com/blog/self-sovereign-identity-digital-transformation/): A CODA - -“Self-Sovereign Identity not only presents an opportunity for businesses to build smarter, more secure, and more scalable relationships with customers; but it will enable them to completely rethink how they build trusted digital relationships from the ground up.” + > “Self-Sovereign Identity not only presents an opportunity for businesses to build smarter, more secure, and more scalable relationships with customers; but it will enable them to completely rethink how they build trusted digital relationships from the ground up.” We expect Digital Transformation to be a more prevalent talking point around digital identity. FOMO can go a long way, to sell SII, for Goverments and Corporations striving to not be left behind in the digital age. This is excellent work, with lots of references, by Dr. Nuttawut Kongsuwan ([Finema](http://finema.co/) & [QTFT](http://qtft.org/)), and Rachata Tosirisuk ([Thailand Internet Exchange](https://th-ix.net/en/), [Finema](https://finema.co/) & [QTFT](https://qtft.org/)). - * [The Verifiable Credential’s Model](https://trinsic.id/trinsic-basics-the-verifiable-credentials-model/) > At the core of every self-sovereign identity (SSI) use case is what we call the verifiable credentials model. This simple yet effective model helps conceptualize how verifiable credentials are exchanged between people and organizations. - New [major white paper](https://www.blockchainresearchinstitute.org/project/self-sovereign-identity) by Phil Windley with the Blockchain Research Institute the relationship view of identity, the nature of authentic digital relationships, the trust bases of identity systems, and the architecture of the identity metasystem, including decentralized identifier communication and the self-sovereign Internet. He then explores how to operationalize digital relationships and the potential of generative identities (e.g., verifiable credentials) and credential exchange. He concludes with a deep dive into self-sovereign identities in production: the UK National Health Service staff passport, Bonifii’s MemberPass for credit unions, the International Air Transport Association Travel Pass, and others. * [The Era of Self-Sovereign Identity](https://www.chakray.com/era-self-sovereign-identity/) ChakRay - -Similar actions conducted in person do not represent the same amount of risk. For example, if someone asks you to verify your identity, we show our ID or driver’s license, and when you pay at the store, you provide your bank card. In this way, the control and the ownership of the data stays with you. - - - - - - + > Similar actions conducted in person do not represent the same amount of risk. For example, if someone asks you to verify your identity, we show our ID or driver’s license, and when you pay at the store, you provide your bank card. In this way, the control and the ownership of the data stays with you. * [Blockchain Self-Sovereign Identity: True Control Of Your Identity](https://komodoplatform.com/en/academy/self-sovereign-identity/) Komodo Platform + > The adoption of verifiable credentials is another fundamental part of the SSI concept. Verifiable credentials use a digital signature for identity claims by combining public-key hashing cryptography and privacy-protection techniques to convert credentials like ID cards to digital versions. -The adoption of verifiable credentials is another fundamental part of the SSI concept. Verifiable credentials use a digital signature for identity claims by combining public-key hashing cryptography and privacy-protection techniques to convert credentials like ID cards to digital versions. - -* [Exploring the Decentralized Web, Episode 4: Digital Identity](https://www.youtube.com/watch?v=jm8y56KMkIw) Filecoin Foundation - -10min Video Montage +* [Video] [Exploring the Decentralized Web, Episode 4: Digital Identity](https://www.youtube.com/watch?v=jm8y56KMkIw) Filecoin Foundation Episode 4 explores the relationship between authentication and authorization, the rise of single sign-on platforms, and the advantages of and use cases for self-sovereign identity. Guests include Brian Behlendorf, Rainey Reitman, Danny O'Brien, Sarah Friend, Wendy Hanamura, Andrew Hill, and Brad Kam. @@ -798,8 +419,6 @@ Episode 4 explores the relationship between authentication and authorization, th * [Impact of Self-Sovereign Identity on Cybersecurity](https://securityboulevard.com/2022/04/impact-of-self-sovereign-identity-on-cybersecurity-avast/) -Great explainer - infominer - How does this change the world of cybersecurity protection? Typically, bad actors approach cybersecurity attacks by developing solutions that exploit the attack vectors of their target victims. There are 4 attack vector categories to self-sovereign identity that map directly to each element: Issuer, Holder, Trust Registry and Verifier. @@ -807,23 +426,18 @@ There are 4 attack vector categories to self-sovereign identity that map directl ## Identity Proofing * [SSI & Proof of Reputation](https://www.youtube.com/watch?v=S95BoGgy3x0) Catalyst Swarm - -Join Frank Albanese (Snapbrillia), Lance Byrd (RootsID), Nick Mason (ProofSpace), Niels Kijf (Design Academy), Patrick Suzzi (F8 OSDE), Juan Sierra (HERG), Zoéys Welt, Brian Harper, Ashton Engberg, Ninh Tran (Snapbrillia) and many others as the community discusses the different what is SSI & Proof of Reputation and why it matters. + > Join Frank Albanese (Snapbrillia), Lance Byrd (RootsID), Nick Mason (ProofSpace), Niels Kijf (Design Academy), Patrick Suzzi (F8 OSDE), Juan Sierra (HERG), Zoéys Welt, Brian Harper, Ashton Engberg, Ninh Tran (Snapbrillia) and many others as the community discusses the different what is SSI & Proof of Reputation and why it matters. Presentation: [https://bit.ly/3OmuIRx](https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbk9pS0dsbzVIVG5RanhSQWVYWkkxOC1Bd0hmZ3xBQ3Jtc0tsSnRwWXhwS0UxUGRTV1VORzBmMzNhcllURHdJdWpOMHo5U0k5dFVaZms5enpMSjN6enhjLVhTYjNscDNRcjMtSFBUa1daN0tzZElDa2g1VHhzaGJ0YjN5R3gtX0tKMFVMZ2FTQWRSVmF3d0hpRmdYNA&q=https%3A//bit.ly/3OmuIRx) - * [Advocating for learner-centric badge systems](https://blog.weareopen.coop/advocating-for-learner-centric-badge-systems-21a65be4a725) We Are Open Coop - -how do we advocate for learner-centric badge systems? This is the piece that we’ve been thinking about the past couple of weeks. + > how do we advocate for learner-centric badge systems? This is the piece that we’ve been thinking about the past couple of weeks. * [Crafting a “no-bs” SSI platform](https://medium.com/@adityasanthanam/crafting-a-no-bs-ssi-platform-454b1d9c6f8d) Aditya Santhanarn - -Let’s look at a few pointers that I believe make it hard for the web3 protocols to work for businesses and users in general + > Let’s look at a few pointers that I believe make it hard for the web3 protocols to work for businesses and users in general * [Digital Wallet Systems: What is true decentralization ?](https://www.thrivacy.io/en-us/thrivacy_blogs/digital-wallet-systems) Thrivacy - -True decentralization in the digital world means that once verified, your PII is on your phone and under your control. The data doesn’t live anywhere else. + > True decentralization in the digital world means that once verified, your PII is on your phone and under your control. The data doesn’t live anywhere else. * [Self-Sovereign Identity (SSI) & Atala PRISM with Allison Fromm](https://www.youtube.com/watch?v=cSG148jbErs) Cardano Catalyst Women @@ -849,64 +463,46 @@ Podcast: [Digital Identity and Self Sovereignty](https://www.traceyfollows.com/t - Wallet Wars: how might wallets evolve and consolidate across the public and private sector * [Decentralization is the Future of Digitization](https://jolocom.io/blog/decentralization-is-the-future-of-digitization/) Jolocom - -Digital identity data is introduced as having a positive impact on Germany’s future as well as Europe’s. Following, benefits of a decentralized identity based on a fully open infrastructure are given. + > Digital identity data is introduced as having a positive impact on Germany’s future as well as Europe’s. Following, benefits of a decentralized identity based on a fully open infrastructure are given. * [What Will We Learn from the Market Failure of Digital Identity?](https://identiverse.com/idv2022/session/841420/) Identiverse - -We have a widely accepted Standard Model of Identity, or architecture, in which Subjects, Identity Providers and Relying Parties (aka Holders, Issuers and Verifiers) hold, present, exchange, use and/or consume digital identities. + > We have a widely accepted Standard Model of Identity, or architecture, in which Subjects, Identity Providers and Relying Parties (aka Holders, Issuers and Verifiers) hold, present, exchange, use and/or consume digital identities. * [The World’s First Verifiable Credentials](https://www.constellationr.com/blog-news/world-s-first-verifiable-credentials) Steve Wilson - -Commonly associated with blockchain and the Self-Sovereign Identity movement, Verifiable Credentials are in fact an old idea.  It is instructive to break down their essential properties and examine the pioneering examples. + > Commonly associated with blockchain and the Self-Sovereign Identity movement, Verifiable Credentials are in fact an old idea.  It is instructive to break down their essential properties and examine the pioneering examples. * [myths and facts. Is Self-Sovereign Identity Dangerous?](https://jolocom.io/blog/mythen-und-fakten-ist-self-sovereign-identity-gefahrlich/) Jolocom (in german) - -we examine more closely whether self-sovereign identity can increase or reduce risks for data misuse in certain cases. + > we examine more closely whether self-sovereign identity can increase or reduce risks for data misuse in certain cases. * [Digital Identity Conspiracies](https://www.continuumloop.com/digital-identity-conspiracies/) ContinuumLoop - -The only ones who will benefit from your digital ID are the Issuer (who gave you the credential), holder (you) and verifier (who you’re sharing it with). + > The only ones who will benefit from your digital ID are the Issuer (who gave you the credential), holder (you) and verifier (who you’re sharing it with). * [Compare and Contrast — Federated Identity vs Self-sovereign Identity](https://academy.affinidi.com/compare-and-contrast-federated-identity-vs-self-sovereign-identity-227a85cbab18) Affinidi * [What is Self-Sovereign Identity?](https://blog.tanglelabs.io/62782301a9ed0df5ace5be86) Tangle Labs -* [Self-sovereign identity system: Blockchain-based tech for identity verification](https://www.youtube.com/watch?v=Q7IhaY4eKEc) Economic Times - -Relative to the Indian context - -Professor Manindra Agrawal, Department of CSE, IIT Kanpur, explains how the self-sovereign identity system can ease issues like certification, verification and eliminate forgery of identity using blockchain technology. * [Digital sovereignty: Reclaiming your private data in Web3](https://cointelegraph.com/news/digital-sovereignty-reclaiming-your-private-data-in-web3) Cointelegraph - -this is a collaborative effort — one bigger than a single individual or organization — and the whole Web3 space should work together. + > this is a collaborative effort — one bigger than a single individual or organization — and the whole Web3 space should work together. * [SteveWilson](https://twitter.com/Steve_Lockstep/status/1524073204805160960) Considering SSI critics - -I reckon most cases of over-identification stem either from bad habits (e.g. RPs gathering circumstantial AuthN signals) or from Surveillance Capitalism. Either way, better deals for users will come from better design, not by weaponising Digital Identity (SSI, DIDs). + > I reckon most cases of over-identification stem either from bad habits (e.g. RPs gathering circumstantial AuthN signals) or from Surveillance Capitalism. Either way, better deals for users will come from better design, not by weaponising Digital Identity (SSI, DIDs). * [Understanding Verifiable Credentials](https://credivera.com/understanding-verifiable-credentials/) Credivera - -The value of verifiable credentials and the critical role they will play to our future digital identities is undeniable. As we enter a new era of online representation, trust in the internet will need to be vigorously robust. + > The value of verifiable credentials and the critical role they will play to our future digital identities is undeniable. As we enter a new era of online representation, trust in the internet will need to be vigorously robust. * [More security does not have to mean less user-friendliness](https://background.tagesspiegel.de/cybersecurity/mehr-sicherheit-muss-nicht-weniger-nutzerfreundlichkeit-bedeuten) Martin Kuppinger, Tagesspiegel - -The passwords that have been declared dead are far from dead. Nevertheless, the way in which users authenticate themselves is changing towards more security and convenience. + > The passwords that have been declared dead are far from dead. Nevertheless, the way in which users authenticate themselves is changing towards more security and convenience. * [Never mind who I am, ask me about my credentials](https://www.linkedin.com/pulse/never-mind-who-i-am-ask-me-my-credentials-john-phillips/) John Phillips - -Many (most) identity systems make a fundamental assumption that is built into their very architecture. This assumption creates three significant problems: privacy erosion; toxic data stores; and poor security. + > Many (most) identity systems make a fundamental assumption that is built into their very architecture. This assumption creates three significant problems: privacy erosion; toxic data stores; and poor security. * [Digital Identity Convenience](https://www.continuumloop.com/embrace-the-ethical-implementation-of-digital-identity/) Christine Martin, Continuum Loop - -You will take back control of your identity and hold it. Not Facebook, not Google, and you will decide what credentials to share on a need-to-know basis. We don’t have to be scared of the shift; we have to ensure the architecture is built ethically for all + > You will take back control of your identity and hold it. Not Facebook, not Google, and you will decide what credentials to share on a need-to-know basis. We don’t have to be scared of the shift; we have to ensure the architecture is built ethically for all * [Understanding Verifiable Credentials](https://www.credivera.com/blog/understanding-verifiable-credentials) by Credivera - -The value of verifiable credentials and the critical role they will play to our future digital identities is undeniable. As we enter a new era of online representation, trust in the internet will need to be vigorously robust. + > The value of verifiable credentials and the critical role they will play to our future digital identities is undeniable. As we enter a new era of online representation, trust in the internet will need to be vigorously robust. * [Rewiring the Internet with Self-Sovereign Identities](https://www.ledger.com/rewiring-the-internet-with-self-sovereign-identities). - -In “Self-Sovereign Identity,” [Johannes Sedlmeir](https://www.fim-rc.de/Paperbibliothek/Veroeffentlicht/1359/wi-1359.pdf) makes a clear distinction between two concepts too often mixed: “identity” and “identifiers”. What we are experiencing in today’s Web are some external organizations identifying us as citizens, community members, customers, etc. But this isn’t our “identity.” Those are identifiers. + > In “Self-Sovereign Identity,” [Johannes Sedlmeir](https://www.fim-rc.de/Paperbibliothek/Veroeffentlicht/1359/wi-1359.pdf) makes a clear distinction between two concepts too often mixed: “identity” and “identifiers”. What we are experiencing in today’s Web are some external organizations identifying us as citizens, community members, customers, etc. But this isn’t our “identity.” Those are identifiers. * [Digital Identities and Verifiable Credentials](https://www.fim-rc.de/Paperbibliothek/Veroeffentlicht/1359/wi-1359.pdf) Johannes Sedlmeir • Reilly Smethurst • Alexander Rieger • Gilbert Fridgen Published October 2021 @@ -915,18 +511,14 @@ In “Self-Sovereign Identity,” [Johannes Sedlmeir](https://www.fim-rc.de/Pape The idea that as a user of SSI I have complete sovereignty over my digital identity is often misunderstood. At its core, SSI is about my digital identity being under my own control, so I can decide to whom I show my data, when, and for what. * [Getting Data Security Right](https://medium.com/mydex/getting-data-security-right-36d291cac156) Alan Michel - -data security is about system-wide design, where many different elements need to fit together to create a working whole. - + > data security is about system-wide design, where many different elements need to fit together to create a working whole. * [What is Self-Sovereign Identity (SSI) with PeterMcCormack](https://twitter.com/justinrezvani/status/1532471536090656768) [@justinrezvani](https://twitter.com/justinrezvani) (short clip) * [Understanding Online Identity](https://educatedguesswork.org/posts/understanding-identity/) EducatedGuessWork (broad contextualization) - * [ISO/TR 23249:2022 – Overview of existing DLT systems for identity management](https://www.iso.org/standard/80805.html) ISO - - [The 5P’s of a Self-Sovereign Identity](https://markvanrijmenam.medium.com/the-5ps-of-a-self-sovereign-identity-e6f6eb802d75) - [Can Self-Sovereign Identity (SSI) fit within the GDPR? : a Conceptual Data Protection Analysis (Part II)](https://www.law.kuleuven.be/citip/blog/can-self-sovereign-identity-ssi-fit-within-the-gdpr-part-ii/) - [Can Self-Sovereign Identity (SSI) fit within the GDPR?: a Conceptual Data Protection Analysis (Part I)](https://www.law.kuleuven.be/citip/blog/can-self-sovereign-identity-ssi-fit-within-the-gdpr-part-i/) @@ -934,15 +526,12 @@ data security is about system-wide design, where many different elements need to - New Encyclopedia entry [Self-Sovereign Identity (SSI)](https://encyclopedia.pub/entry/23650) * [What are the main contributions of the Self-Sovereign Identity?](https://www.extrimian.com/resources/blog/251-2/) - -Identity represents a great asset. But we do not have control of this asset, as it is in the hands of organizations, governments, institutions, etc. These entities know everything about us from all this data. + > Identity represents a great asset. But we do not have control of this asset, as it is in the hands of organizations, governments, institutions, etc. These entities know everything about us from all this data. * [The Future of Self-Sovereign Identity (SSI)](https://www.youtube.com/watch?v=mx58bYHFrFk) Evernym - -Drummond Reed and Alex Preukschat, co-authors of Manning Publication's new book 'Self-Sovereign Identity,' for a conversation on the book's development and recent release and what the future holds for SSI as a technology, architecture, and movement. + > Drummond Reed and Alex Preukschat, co-authors of Manning Publication's new book 'Self-Sovereign Identity,' for a conversation on the book's development and recent release and what the future holds for SSI as a technology, architecture, and movement. * [The Evolution of Digital Identity](https://medium.com/helix-id/the-evolution-of-digital-identity-cc54917a6a49) Tomas Hahn - -How is it possible that the Internet has spread and developed to such an extent, while the unambiguous digital identification is not yet feasible? + > How is it possible that the Internet has spread and developed to such an extent, while the unambiguous digital identification is not yet feasible? * [What Does Self-Sovereign Identity Mean For My Business?](https://www.continuumloop.com/what-does-self-sovereign-identity-mean-for-my-business/) Continuum Loop @@ -952,24 +541,19 @@ How is it possible that the Internet has spread and developed to such an extent, - What changes when digital identity becomes a revenue driver and asset for your business? (hint: top and bottom line) - Which of my competitors is probably already doing this? - * [Simple Definitions for Complex Terms in Decentralized Identity](https://anonyome.com/2022/06/simple-definitions-for-complex-terms-in-decentralized-identity%ef%bf%bc/) * [What is Self-Sovereign Identity?](https://blog.tanglelabs.io/what-is-self-sovereign-identity/) TangleLabs * [How Do Verifiable Credentials and Decentralized Identities Work?](https://oxfordcomputergroup.com/resources/decentralized-identity-verifiable-credentials-webinar-recording/) - -Decentralized identity (DID) is a way for users to own their identity, using specific credentials to verify their identity to applications. These credentials, called Verifiable Credentials, enable you to do this. Verifiable Credentials are identity attestations that come from a trusted issuer, like proof of a workplace, student IDs, or official memberships. - + > Decentralized identity (DID) is a way for users to own their identity, using specific credentials to verify their identity to applications. These credentials, called Verifiable Credentials, enable you to do this. Verifiable Credentials are identity attestations that come from a trusted issuer, like proof of a workplace, student IDs, or official memberships. * [SSI 101: Online identity and the history of identifiers](https://medium.com/hypersign/ssi-101-online-identity-and-the-history-of-identifiers-963bff60c816) Hypersign - -This series is intended to be a basic, easy-to-understand introduction to SSI, but for a much deeper dive, check out Hypersign Labs — our technical blog. Here’s a good place to start on SSI: + > This series is intended to be a basic, easy-to-understand introduction to SSI, but for a much deeper dive, check out Hypersign Labs — our technical blog. Here’s a good place to start on SSI: * [Digital Identity: Past; Present; Future](https://labs.hypersign.id/posts/ssi-intro/) Hypersign - -As a result of limited and known users there was no layer of identity and authentication in the design of internet framework. With the invention of the World Wide Web (WWW), the users made it a common platform for data sciences. Various sectors of society like health and finance have started using the internet for their services. + > As a result of limited and known users there was no layer of identity and authentication in the design of internet framework. With the invention of the World Wide Web (WWW), the users made it a common platform for data sciences. Various sectors of society like health and finance have started using the internet for their services. * [In-depth introduction to Self Sovereign Identity (SSI)](https://labs.hypersign.id/posts/ssi-detail/) Hypersign @@ -982,20 +566,16 @@ Eventually, SSI will give people a super simple way to do the following and more 3. Maintain privacy and reduce the ability for corporations or nefarious actors to track you without your consent 4. Conveniently get access to services you need without usernames and passwords * [Crossfunctionality](https://docs.centre.io/blog/crossfunctionationality) Centre - -I have developed a pet peeve for "technosolutionism": the notion that a sufficiently innovative technology can solve a social problem, or a business problem, without complex and nuanced changes to social and business practice. + > I have developed a pet peeve for "technosolutionism": the notion that a sufficiently innovative technology can solve a social problem, or a business problem, without complex and nuanced changes to social and business practice. * [What does ‘open’ mean to you?](https://blog.weareopen.coop/what-does-open-mean-to-you-cec90dff6845) WeAreOpenCoop - -Even with a little bit of input and discussion, you can see the shift to words such as ‘inclusivity’ and phrases such as ‘being more accessible’ or ‘getting everyone involved’. + > Even with a little bit of input and discussion, you can see the shift to words such as ‘inclusivity’ and phrases such as ‘being more accessible’ or ‘getting everyone involved’. * [The Self-Sovereign Identity (SSI) Basics](https://santandergto.com/en/the-self-sovereign-identity-ssi-basics-what-is-it/) Santanderigo - -The very center of the digital identity is your documents: from your National ID or Passport to your degrees, mobile phone number, bank account number, or your medical records. Anything that is intrinsically bound to you is your data and therefore your identity. While talking about SSI these are called Verifiable Credentials (VC). + > The very center of the digital identity is your documents: from your National ID or Passport to your degrees, mobile phone number, bank account number, or your medical records. Anything that is intrinsically bound to you is your data and therefore your identity. While talking about SSI these are called Verifiable Credentials (VC). * [What is decentralized identity?](https://www.csoonline.com/article/3665692/what-is-decentralized-identity.html) In CSO - -The DID model allows you to establish a relationship between your private key (your blockchain wallet) and your citizenship.  The issuing authority signs off on the truth of your claim and, thereafter, third parties can check your public key to see that the holder of the private key is in fact a British citizen. + > The DID model allows you to establish a relationship between your private key (your blockchain wallet) and your citizenship.  The issuing authority signs off on the truth of your claim and, thereafter, third parties can check your public key to see that the holder of the private key is in fact a British citizen. * [How Self-Sovereign Identity Works with Trinsic's Riley Hughes](https://growth.georgian.io/c/how-self-sovereign-identity-works-with-trinsics-riley-hughes) Georgian @@ -1011,20 +591,16 @@ The DID model allows you to establish a relationship between your private key (y *  How identity will evolve with web 3 and the metaverse. - - [The Use of Self-Sovereign Identity With Zero-Knowledge Proof (ZKP)](https://medium.datadriveninvestor.com/self-sovereign-identity-with-zero-knowledge-proof-9a05f36f16da) Data Driven Investor - [Decentralization of Identity](https://exstalis.medium.com/decentralization-of-identity-e35a7414ce48) Exstalis - [What is decentralized identity?](https://www.csoonline.com/article/3665692/what-is-decentralized-identity.html) CSO Online * [The Journey of Decentralized Identity: Where It’s Been and Where It’s Going](https://trinsic.id/the-journey-of-decentralized-identity-where-its-been-and-where-its-going/) Trinsic - -Our goal has been to completely abstract away the complexity of the ever-changing landscape so organizations can focus on the important stuff—what product to build, and how to take it to market. Teams shouldn’t have to “pick winners” and wager what to build on. Their products should be interoperable with multiple ecosystems. That’s what Trinsic is providing, out-of-the-box. - + > Our goal has been to completely abstract away the complexity of the ever-changing landscape so organizations can focus on the important stuff—what product to build, and how to take it to market. Teams shouldn’t have to “pick winners” and wager what to build on. Their products should be interoperable with multiple ecosystems. That’s what Trinsic is providing, out-of-the-box. * [Self Sovereign Identity- Internet’s Missing Identity Layer](https://identrixprotocol.medium.com/self-sovereign-identity-internets-missing-identity-layer-90e06efbef4e) 2022-02-02 Identrix > When the Internet was built, it was done so in a way that you would not know who you were connecting to. To get rid of this loophole, the TCP/IP protocol was introduced, which gives us the address of the computer we are connecting to, but nothing about the person, organisation or thing we are communicating with! We can see how that be potentially dangerous for any online user, making your devices highly susceptible not only to hacking but also to identity theft. - * [Can Decentralized Identity Give You Greater Control of Your Online Identity?](https://anonyome.com/2022/07/can-decentralized-identity-give-you-greater-control-of-your-online-identity/) * [GlobaliD 101: What is the trust triangle?](https://medium.com/global-id/globalid-101-what-is-the-trust-triangle-260e85e1c640) @@ -1033,34 +609,19 @@ Our goal has been to completely abstract away the complexity of the ever-changin - [SSI (Self-Sovereign Identity): The Most Important Acronym You've Probably Never Heard Of](https://www.linkedin.com/pulse/ssi-self-sovereign-identity-most-important-acronym-youve-/) A glimpse of VR & AR * [For traditional identity models, the biggest misconception is “strong passwords”](https://idramp.com/for-traditional-identity-models-the-biggest-misconception-is-strong-passwords/) - -One way to avoid password-related problems is to use decentralized identity management. This method is relatively new, so the best way to gain knowledge about it – contact the experts. For this reason, we are speaking with Mike Vesey, CEO of [IdRamp](https://idramp.com/). + > One way to avoid password-related problems is to use decentralized identity management. This method is relatively new, so the best way to gain knowledge about it – contact the experts. For this reason, we are speaking with Mike Vesey, CEO of [IdRamp](https://idramp.com/). * [Introducing the Auth0 Research Program](https://auth0.com/blog/introducing-the-auth0-research-program/) auth0 - -give direct input towards our product improvements and be the first choice for research recruiting opportunities. + > give direct input towards our product improvements and be the first choice for research recruiting opportunities. * [Use the Okta CLI to Build Secure Python Apps](https://developer.okta.com/blog/2022/07/27/python-okta) Okta 2022-07-27 - -- Teach you how to create your first application + > - Teach you how to create your first application - Learn about authentication and authorization credentials - Set up hosted authentication with Okta and try it out -* [Fintech Humans and One37 Identity Enter Into Strategic Partnership in Germany](https://www.bloomberg.com/press-releases/2022-07-28/fintech-humans-and-one37-identity-enter-into-strategic-partnership-in-germany) Bloomberg - -SSI framework is adopted in Germany and throughout the EU as a key - -privacy-by-design framework. Through its membership in DIACC, One37 - -contributes to the future of digital identity by leveraging the lessons from - -its own real-life use-cases in Canada where Verifiable Credentials play an - -increasingly crucial role. * [Stoic Sovereign Identity (SSI)](https://www.linkedin.com/pulse/stoic-sovereign-identity-ssi-simone-ravaioli/) Simone Ravaioli - - [Online identity and the history of identifiers](https://medium.com/hypersign/ssi-101-online-identity-and-the-history-of-identifiers-963bff60c816) Hypersign - [Drawbacks of Traditional Identifiers and An Introduction to WEB3](https://medium.com/hypersign/ssi-101-part-2-drawbacks-of-traditional-identifiers-and-an-introduction-to-web3-a1bf791819b0) Hypersign - [Digital Identity: Past; Present; Future](https://labs.hypersign.id/posts/ssi-intro/) Hypersign @@ -1069,16 +630,13 @@ increasingly crucial role. - [Future with Decentralized Identity](https://blog.sparkplustech.com/future-with-decentralized-identity/) SparkPlusTech - [The changing landscape of digital identity](https://www.tcs.com/digital-identity-consent-management-solution) by Tata Consultancy Services - - [Future with Decentralized Identity](https://blog.sparkplustech.com/future-with-decentralized-identity/) SparkPlusTech - [The changing landscape of digital identity](https://www.tcs.com/digital-identity-consent-management-solution) by Tata Consultancy Services - [GlobaliD 101: ID wallets](https://medium.com/global-id/globalid-101-id-wallets-68fa77e6d0d7) GlobalID - * [Identity Insights - Basics of Verifiable Credentials](https://www.youtube.com/watch?v=RCCatllgNv4) Indicio, Youtube - -What are verifiable credentials? In this episode we are joined by Indicio software engineer Char Howland for an introduction to what this technology is and what it can do. + > What are verifiable credentials? In this episode we are joined by Indicio software engineer Char Howland for an introduction to what this technology is and what it can do. * [Get involved in the open source community](https://wiki.hyperledger.org/display/IWG/Identity+Implementers+WG+Call) @@ -1090,10 +648,8 @@ What are verifiable credentials? In this episode we are joined by Indicio softwa So I propose this outermost framework to help us think about how to interact with shared information environments - * [Self-sovereign identity: an ecosystem of digital identities](https://www.ergon.ch/en/news/2022/self-sovereign-identity-an-ecosystem-of-digital-identities) Ergon - -Even though some questions are still unanswered, self-sovereign identities will unlock enormous economic value. If you want to get some initial experience with SSI you can try the available open-source technologies. A successful proof of concept will enable companies to see the possibilities of the new technology and harness this potential more effectively. + > Even though some questions are still unanswered, self-sovereign identities will unlock enormous economic value. If you want to get some initial experience with SSI you can try the available open-source technologies. A successful proof of concept will enable companies to see the possibilities of the new technology and harness this potential more effectively. * [What is decentralized identity in blockchain?](https://cointelegraph.com/explained/what-is-decentralized-identity-in-blockchain) Cointelegraph @@ -1104,8 +660,7 @@ Even though some questions are still unanswered, self-sovereign identities will * [Self-Sovereign Identity Explained](https://zaisan.io/self-sovereign-identity-explained/) Zaisan * [The Top Five Misconceptions around Self-Sovereign Identity (SSI)](https://digitalstationeryconsortium.org/the-top-five-misconceptions-around-self-sovereign-identity-ssi/) - -We all have a cybersecurity problem, and SSI represents the most current thinking to address it.  For that reason, we believe that SSI is not just another technology. + > We all have a cybersecurity problem, and SSI represents the most current thinking to address it.  For that reason, we believe that SSI is not just another technology. * [GlobaliD 101: Bring Your Own Identity](https://medium.com/global-id/globalid-101-bring-your-own-identity-5b9927008190) @@ -1125,14 +680,11 @@ There is a real opportunity to combine technology that is being developed with t * [Self-sovereign identity: an ecosystem of digital identities](https://www.ergon.ch/en/news/2022/self-sovereign-identity-an-ecosystem-of-digital-identities) Ergon - * [Trust Registries in the Real World](https://www.continuumloop.com/trust-registries-in-the-real-world/) Continuum Loop - -Trust Registries allow us to know that the various shared credentials (e.g. proof of insurance) are accurate. A Homeowner can ask their Digital Wallet to verify an insurance Credential that the Contractor is honest. + > Trust Registries allow us to know that the various shared credentials (e.g. proof of insurance) are accurate. A Homeowner can ask their Digital Wallet to verify an insurance Credential that the Contractor is honest. * [Many articles are being written about SSI, not all so excellent](https://www.linkedin.com/feed/update/urn:li:share:6972350150291705857/) John Philip - -Most are probably not "written" in the normally understood sense of the word (auto-scraping and ctrl-c and ctrl-v isn't writing). Many are probably not written by a person at all. + > Most are probably not "written" in the normally understood sense of the word (auto-scraping and ctrl-c and ctrl-v isn't writing). Many are probably not written by a person at all. * [Centralized\Federated vs Self Sovereign](https://twitter.com/dominiumssi/status/1564188374529081345) dominiumssi @@ -1149,14 +701,12 @@ There is a real opportunity to combine technology that is being developed with t - [Debunking Common Misconceptions About Passwordless Authentication](https://auth0.com/blog/debunking-common-misconceptions-about-passwordless-authentication/) auth0 - [From DID to DeFi and EVM](https://medium.com/metadium/metadium-tech-the-series-38aa26a170fc) Metadium - * [A Beginners Guide to Decentralized Identifiers (DIDs)](https://medium.com/veramo/a-beginners-guide-to-decentralized-identifiers-dids-5e842398e82c) Veramo * [10 Resources for beginners in Decentralized Identity (DID)](https://medium.com/veramo/top-10-resources-for-beginners-in-decentralized-identity-di-2924e8571159) Veramo * [Self-Sovereign Identity: Taking Control Over Your Digital Identity](https://www.forbes.com/sites/forbestechcouncil/2022/09/26/self-sovereign-identity-taking-control-over-your-digital-identity/?sh=797222d64e0c) Forbes 2022-09-26 - -The two main ingredients of SSI are verifiable credentials (VCs) and decentralized identifiers (DIDs). + > The two main ingredients of SSI are verifiable credentials (VCs) and decentralized identifiers (DIDs). * [According to](https://www.w3.org/TR/vc-data-model/) W3: "Verifiable credentials represent statements made by an issuer in a tamper-evident and privacy-respecting manner." @@ -1165,23 +715,14 @@ The two main ingredients of SSI are verifiable credentials (VCs) and decentraliz No other additional information is needed to complete this data exchange. So how do you know that the information being provided is authentic? The identity ‘proof’ uses a cryptographic hash function that confirms beyond any doubt that the identity claim is accurate. * [The Importance of Self-Sovereign Identity Blockchain Solutions](https://zaisan.io/self-sovereign-identity-blockchain-solution/) Zaisan - -The public keys, as the name implies are there to view anytime and are used for exchanging information and can be revoked, however, the private key is for the account holder himself, be that an issuer, a verifier, or a subject. It is only through a private key that one can pass on his credentials using his DID to an issuer who then validates the credentials and sends them to the verifier using his DID. - + > The public keys, as the name implies are there to view anytime and are used for exchanging information and can be revoked, however, the private key is for the account holder himself, be that an issuer, a verifier, or a subject. It is only through a private key that one can pass on his credentials using his DID to an issuer who then validates the credentials and sends them to the verifier using his DID. * [WHAT’S DECENTRALIZED IDENTITY?](https://nftnewstoday.com/2022/10/06/what-is-decentralized-identity/) NFTNewsToday 2022-10-06 - -issuers or verifiers can only access the information shared by the DID holder. This information exchange can occur through [various technologies, like NFC](https://nftnewstoday.com/2022/10/03/nft-applications-in-the-supply-chain/), QR, or Bluetooth. [Zero-knowledge proofs](https://nftnewstoday.com/2022/09/15/immutable-x-layer-2-scaling-solution-for-nfts/) are applied to restrict full information access. 2022-09-15 + > issuers or verifiers can only access the information shared by the DID holder. This information exchange can occur through [various technologies, like NFC](https://nftnewstoday.com/2022/10/03/nft-applications-in-the-supply-chain/), QR, or Bluetooth. [Zero-knowledge proofs](https://nftnewstoday.com/2022/09/15/immutable-x-layer-2-scaling-solution-for-nfts/) are applied to restrict full information access. 2022-09-15 * [GlobaliD 101: Device-based identity](https://medium.com/global-id/globalid-101-device-based-identity-c6096a5b0890) + > That way, your sensitive personal data is stored locally on your own device rather than hosted on some company’s server that becomes a target for hackers. -That way, your sensitive personal data is stored locally on your own device rather than hosted on some company’s server that becomes a target for hackers. - -* [The Time for Self-Sovereign Identity is Now](https://medium.com/learning-machine-blog/the-time-for-self-sovereign-identity-is-now-222aab97041b) Kim Hamilton Duffy, Learning Machine (Now Hyland Credentials) - -Oldie but Goodie by Kim Hamilton Duffy from when she worked at Learning Machines - -Technically, Verifiable Claims are claims made about a “subject” (identified by a digital identifier such as a DID) that are rendered tamper proof through digital signatures. The authenticity of digital signatures may, in turn, be established through issuer identifiers, which may also be expressed as DIDs. * [DID, in short for Decentralized Identifier, is basically a unique string of random numbers and letters](https://twitter.com/fennykyun/status/1564249472053514240) fennykyun > tldr\ @@ -1191,8 +732,6 @@ Technically, Verifiable Claims are claims made about a “subject” (identified > :: Non-human (Machines, Bots, Goods, anything) also able to have DID, VC, and SSIs * [Decentralized Systems of Identity and Owning Your Own Data](https://www.coindesk.com/podcasts/coindesks-money-reimagined/decentralized-systems-of-identity-and-owning-your-own-data/) Coindesk + > On this episode of “Money Reimagined,” hosts [Michael Casey](https://twitter.com/mikejcasey) and [Sheila Warren](https://twitter.com/sheila_warren) are together again but this time, at Converge22 by Circle. They discuss the challenges of identity and verification in the U.S. and in other countries with [Daniel Buchner](https://www.linkedin.com/in/dbuchner/), head of decentralized identity at [Block](https://block.xyz/); and [Chi Nnadi](https://www.linkedin.com/in/chinnadi/?originalSubdomain=ke), the co-founder and CEO at [Mara](https://mara.xyz/). -On this episode of “Money Reimagined,” hosts [Michael Casey](https://twitter.com/mikejcasey) and [Sheila Warren](https://twitter.com/sheila_warren) are together again but this time, at Converge22 by Circle. They discuss the challenges of identity and verification in the U.S. and in other countries with [Daniel Buchner](https://www.linkedin.com/in/dbuchner/), head of decentralized identity at [Block](https://block.xyz/); and [Chi Nnadi](https://www.linkedin.com/in/chinnadi/?originalSubdomain=ke), the co-founder and CEO at [Mara](https://mara.xyz/). - -* [Introduction to Decentralized Identity](https://wiki.iota.org/identity.rs/decentralized_identity) IOTA Wiki - +* [Introduction to Decentralized Identity](https://wiki.iota.org/identity.rs/decentralized_identity) IOTA Wiki \ No newline at end of file diff --git a/unsorted/topics/meta.md b/unsorted/topics/meta.md index 8313c3fd..b01a7e7b 100644 --- a/unsorted/topics/meta.md +++ b/unsorted/topics/meta.md @@ -7,7 +7,8 @@ published: false > In today’s episode, we talk about his new book “Currency Cold War” and relationship, and lack thereof, between digital currency and identity. * [IPR - what is it? why does it matter?](https://identitywoman.net/ipr%e2%80%8a-%e2%80%8awhat-is-it-why-does-it-matter/) > At the time they kept worrying about how they could collaborate and they sensed that they needed to have IPR dealt with, but I couldn’t understand what they were going on about. This small thing delayed them working together for a long time. They literally had to spin up a new organization, get new bylaws developed and get everyone to join and sign off on the IPR regime before they could formally talk together about how to get all work to align and come up with one protocol. - +* [Decentralized identity discussed: An INATBA roundtable round-up](https://jolocom.io/blog/decentralized-identity-inatba-roundtable/) + > The paper, written over the course of a year by six key authors, was produced by INATBA with the aim of defining the expectations for an open and innovative market in decentralized identity. It analyzes the current state of SSI developments and opens up discussion of the next steps, taking a clear stance on how INATBA would like to see development continue, making demands of the key stakeholder groups and setting goals for the future of SSI. * [Why do you care about identity?](https://wider.team/2022/01/18/phil-cares-about-identity/) Phil Wolff 2022-01-18 I love that it’s more than a technical discussion. It’s laws. Sociology. Politics and civics. Commerce. Psychology. Ethics. History. Economy. All the humanities. diff --git a/unsorted/topics/privacy.md b/unsorted/topics/privacy.md index 23df7fa5..91b72b6a 100644 --- a/unsorted/topics/privacy.md +++ b/unsorted/topics/privacy.md @@ -76,6 +76,21 @@ Investors and consumers show growing enthusiasm for privacy-focused alternatives Increased supply of user-friendly private tech and increased demand for privacy have converged, creating a moment of unprecedented opportunity for founders with a vision for privacy-first online experiences. +* [Agency By Design (Privacy is not Enough)](https://iiw.idcommons.net/20B/_Agency_By_Design_(Privacy_is_not_Enough)) by Adrian Gropper + > I’m not a fan of Privacy by Design.\ + > In the industry are only concerned about compliance, very rarely talk about Human Agency\ + > Privacy by Default is the opposite in some sense to privacy by design\ + > The problem is that It conflict with community in many cases. (e.g. social credit score)\ + > Cultural differences (EU accepts better centralization than US)\ + > Delegation and agency are one the same thing\ + > Agency is a much bigger thing and delegation is a mechanism that supports it\ + > I want my fiduciaries to know as much as possible of me (e.g. my doctor, my lawyer) \ + > Model Agency as hierarchy and delegation is the mean to have it. +* [Self-Sovereign Identity - The Nash Equilibrium Point of the Personal Identity Information Game](https://www.thoughtworks.com/insights/blog/self-sovereign-identity-nash-equilibrium-point-personal-identity-information-game) + > "A silent war is ongoing between users and companies over the control of data." + > 1. Privacy or convenience is a question + > 2. SSI is the answer to this question + * [Google Sued for Misleading Users Over Location Data Privacy](https://anonyome.com/2022/03/google-sued-for-misleading-users-over-location-data-privacy/) Anonyme “Google falsely led consumers to believe that changing their account and device settings would allow customers to protect their privacy and control what personal data the company could access. The truth is that contrary to Google’s representations it continues to systematically surveil customers and profit from customer data.” diff --git a/unsorted/topics/user-experience.md b/unsorted/topics/user-experience.md index b0fce984..b10233dd 100644 --- a/unsorted/topics/user-experience.md +++ b/unsorted/topics/user-experience.md @@ -47,9 +47,6 @@ The tech we use should be responsive to and responisble with the climate, enviro That means 95% of US consumers are saying ‘no way’ to cross-app tracking with Apple’s new [App Tracking Transparency](https://anonyome.com/2021/05/apples-new-att-and-why-facebook-is-hitting-back-hard/) (ATT) feature. -* [Your User Is Your API](https://www.evernym.com/blog/your-user-is-your-api/) Evernym - -Rather than having one huge, expensive, and probably illegal data hub, every customer becomes a data hub in their own right. They provide the data needed, just-in-time, under their control. * [Do Consumers Even Want Personalized Ads?](https://anonyome.com/2021/06/do-consumers-even-want-personalized-ads/) Anonyme The [YouGov](https://www.globalwitness.org/en/blog/do-people-really-want-personalised-ads-online/) poll of consumers in France and Germany we mentioned earlier says it’s the [behind the scenes](https://mysudo.com/2021/02/beware-the-dark-patterns-trying-to-steal-your-data/) or back door nature of personalization that gives people the creeps. @@ -208,6 +205,8 @@ This session will share the results and learnings of the creation and developmen * [Making The Intention Economy Happen](https://iiw.idcommons.net/10B/_Making_The_Intention_Economy_Happen,_Part_2), Part 2 by Doc Searls This was a small meeting primarily meant to tee up Hadrian Zbarcea’s demo of Customer Commons’ new Intention Byway model for better signaling between demand and supply in markets of all kinds +* [Relationships and Identity](https://www.windley.com/archives/2020/07/relationships_and_identity.shtml) 2020-07 Phil Windley + > We build digital identity systems to create and manage relationships—not identities. * [https://www.slideshare.net/dsearls/iiw-xxxiiintentionsession](https://www.slideshare.net/dsearls/iiw-xxxiiintentionsession) diff --git a/unsorted/topics/wallets.md b/unsorted/topics/wallets.md index 8863fbef..0af68467 100644 --- a/unsorted/topics/wallets.md +++ b/unsorted/topics/wallets.md @@ -13,6 +13,10 @@ In cross-border and migration contexts, digital wallets promise to have wide ran * [Determinants of Behavioral Intention to Use a Self-Sovereign Identity Digital Wallet: Extending the UTAUT with Trustworthiness](https://www.proquest.com/openview/31100c6b38df3ef649156d35d0296db4/1) 2021-09-27 Kerri Lemoie > The unified theory of acceptance and use of technology was extended to examine the potential influence of the self sovereign identity principles and trustworthyness, along with other factors such as percieved usefulness and perceived ease of use, on the adoption of this new approach to online identity +* [Self-Sovereign Identity: The Foundation of the Digital Wallet](https://www.nevis.net/en/blog/how-does-self-sovereign-identity-ssi-work) Nevis + > Turning identifying features into verified credentials + > + > How exactly does this work? Let’s look at the three roles of user, issuer and verifier. Firstly, users can have any number of attributes – such as their credit rating, national identity document or driving licence – certified by the entity responsible for each attribute. * [OKTA Cloud Identity Integration with SSI wallet](https://lists.w3.org/Archives/Public/public-credentials/2021Nov/0100.html)  sethi shivam (Tuesday, 23 November) diff --git a/unsorted/web3-and-decentralized-identity/web3.md b/unsorted/web3-and-decentralized-identity/web3.md index e9270b0b..f33efe07 100644 --- a/unsorted/web3-and-decentralized-identity/web3.md +++ b/unsorted/web3-and-decentralized-identity/web3.md @@ -821,6 +821,17 @@ Decentralizing access to blockchain APIs is a vital step to improve network upti * [SSI meets Metaverse for Industry 4.0 and Beyond](https://www.techrxiv.org/articles/preprint/SSI_meets_Metaverse_for_Industry_4_0_and_Beyond/21130375) Techrxiv > The proposed holistic framework aims to ignite new ideas and discussions related to the combined deployment of DLT, SSI, and metaverse to inspire new implementation areas within the Industry 4.0 environment. The paper also discusses various opportunities, enablers, technical \& privacy aspects, legislation requirements, and other barriers related to SSI implementation. +* [The Sovereignty Stack: Re-thinking Digital Identity for Web3.0 w/ Greg KIDD](https://www.youtube.com/watch?v=CyGggZ2pT1I) 2021-10-04 Metaco + > Greg is a serial entrepreneur who is probably best known for founding and taking public Dispatch Management Services Corp, the world’s largest on demand dispatch network for urgent deliveries. In a highly interesting career so far, Greg was also Chief Risk Officer at Ripple Labs and a senior analyst for the Board of Governors of the Federal Reserve in Washington. In his latest venture Global ID, Greg is acting on his long-held belief that people’s identity should be truly portable and owned by individuals themselves rather than corporations or governments. +* [How Decentralized Identifiers and Bitcoin Fix the Web](https://bitcoinmagazine.com/technical/dids-built-on-bitcoin-fix-the-web) Bitcoin Magazine + > On October 4, 2021, Facebook, along with WhatsApp and Instagram, [disappeared from the internet](https://blog.cloudflare.com/october-2021-facebook-outage/). + +Their DNS names stopped resolving, and their infrastructure IPs were offline. They were completely disconnected from the internet. At the same time, it was reported that [1.5 billion people allegedly had their personal data stolen from Facebook](https://www.privacyaffairs.com/facebook-data-sold-on-hacker-forum/) and posted for sale. +* [Nomadic Labs Research Seminars #20 | Self-Sovereign Identity and Storage](https://www.youtube.com/watch?v=HombbTvvets) + > In this talk, Wayne reviews the results of support with Tezos addresses, use cases that have been deployed, Tezos DID methods and Tezos profiles. Wayne also gives an overview of the Trail of Bits audit. +* [The Off Chain Internet: Decentralized Identity & Verifiable Credentials - Evin McMullen](https://www.youtube.com/watch?v=EZ_Bb6j87mg) 2022-02-19 ETH Denver + +FANTASTIC NEW TALK!!!! ## Ethereum Merge