diff --git a/_posts/blockchain/application/2019-03-27-cryptonomica.md b/_posts/blockchain/application/2019-03-27-cryptonomica.md index 65409e07..92e54789 100644 --- a/_posts/blockchain/application/2019-03-27-cryptonomica.md +++ b/_posts/blockchain/application/2019-03-27-cryptonomica.md @@ -1,6 +1,13 @@ --- date: 2019-03-27 title: Cryptonomica +description: Cryptonomica.net is an identity verification service based on OpenPGP and Ethereum with legal framework and online dispute resolution for electronic contracts from London-based court of arbitration +excerpt: > + Users have been willing to accept certificates and check their validity manually or to simply accept them. No satisfactory solution has been found for the underlying problem + + We offer exactly the solution for this problem that is mentioned in Wikipedia as not yet found. We deny automatic key check, we are offering the user to check and download each key manually. + + We make verification of key owner's identity and store data about this verification: who, when, using which document made verification. And unlike in 'Web of trust' there is an established procedure for key verification, i.e. known rules according to witch identity of the key owner have to be proven. layout: single classes: wide toc: false diff --git a/_posts/blockchain/application/2019-03-28-uport.md b/_posts/blockchain/application/2019-03-28-uport.md index d20a0b1e..b86f9db8 100644 --- a/_posts/blockchain/application/2019-03-28-uport.md +++ b/_posts/blockchain/application/2019-03-28-uport.md @@ -1,8 +1,13 @@ --- date: 2019-03-28 title: uPort +description: A self-sovereign identity and user-centric data platform layout: single +excerpt: "In your application, you must first configure your uPort object with an identifier and a private key (or signer function). There are several ways to instantiate a credentials object. The most common approach is to save a DID and private key on a server for your application and create a credentials instance from your application's unique private key. Signed JWTs for requests and verifications can then be passed to a client-side application, and presented to a user using a QR code or via another transport." classes: wide +header: + image: /images/uport.png + caption: "[Releasing uPort Libraries 1.0](https://medium.com/uport/releasing-uport-developer-platform-1-0-97d6f70c5e4a)" toc: false permalink: /blockchain/ethereum/uPort/ canonical_url: 'https://decentralized-id.com/blockchain/ethereum/uPort/' @@ -50,7 +55,7 @@ last_modified_at: 2019-07-11 > >* Request Ethereum transaction signing with web3 >* Issue and Request Verified Credentials about your users - +* [/uport-credentials/docs/guides - Getting Started with uPort Credentials](https://github.com/uport-project/uport-credentials/blob/develop/docs/guides/index.md) * [Transactions](https://developer.uport.me/credentials/transactions) >It is possible with uport-credentials to create an ethereum transaction request and have a mobile client approve and sign that transaction. @@ -73,7 +78,7 @@ last_modified_at: 2019-07-11 ![](https://imgur.com/W1ppGwb.png) - +* [Goodbye uPort DIDs, Hello Ethr-DIDs](https://medium.com/uport/goodbye-uport-dids-hello-ethr-dids-ea2e80256f54) * Using the [Ethr-DID](https://developer.uport.me/categories/ethr-did/) library, you can: >* Create and manage keys for DID identities >* Sign JSON Web Tokens diff --git a/_posts/blockchain/ethereum/2019-03-05-ethereum.md b/_posts/blockchain/ethereum/2019-03-05-ethereum.md index 0716ca5b..8dde1b13 100644 --- a/_posts/blockchain/ethereum/2019-03-05-ethereum.md +++ b/_posts/blockchain/ethereum/2019-03-05-ethereum.md @@ -1,7 +1,8 @@ --- date: 2019-03-05 title : "Ethereum Identity Specs and Apps" -description : "A Collection of Ethereum-based Decentralized Identity Specs, Literature, (d)Apps, and GitHub Repositories." +description : "Ethereum-based Decentralized Identity Specs, Literature, (d)Apps, and GitHub Repositories." +excerpt : "Ethereum-based Decentralized Identity Specs, Literature, (d)Apps, and GitHub Repositories." image : "https://decentralized-id.com/images/ethereum.png" layout: single author_profile: true diff --git a/_posts/blockchain/ethereum/2019-03-26-eth-id-github.md b/_posts/blockchain/ethereum/2019-03-26-eth-id-github.md index 42b88947..0a53c8f0 100644 --- a/_posts/blockchain/ethereum/2019-03-26-eth-id-github.md +++ b/_posts/blockchain/ethereum/2019-03-26-eth-id-github.md @@ -1,6 +1,8 @@ --- date: 2019-03-26 title: Ethereum Decentralized-Identity Github Repositories +description: Github Repositories for projects related to Ethereum Based Decentralized Identity. +excerpt: A listing of Github Repositories for projects related to Ethereum Based Decentralized Identity. layout: single permalink: ethereum/id-github/ canonical_url: 'https://decentralized-id.com/ethereum/id-github/' diff --git a/_posts/literature/2019-03-11-literature.md b/_posts/literature/2019-03-11-literature.md index baf1b9ac..bacbd071 100644 --- a/_posts/literature/2019-03-11-literature.md +++ b/_posts/literature/2019-03-11-literature.md @@ -2,6 +2,7 @@ date: 2019-03-11 title: Identity Articles, Research and Literature layout: single +excerpt: A selection of DID literature and top level resources for discovery of more. permalink: literature/ canonical_url: 'https://decentralized-id.com/literature' redirect_from: literature @@ -55,7 +56,7 @@ last_modified_at: 2019-07-11 ## Bundlesblok Position Paper * [A position paper on blockchain enabled identity and the road ahead](https://www.bundesblock.de/wp-content/uploads/2018/10/ssi-paper.pdf)—Identity Working Group of the German Blockchain Association [[**ϟ**](https://www.bundesblock.de/2018/10/23/position-paper-self-sovereign-identity/)] - >### Appendix VII – Pilot Projects and Proof of Concepts + >**_Appendix VII – Pilot Projects and Proof of Concepts_** > >The provided list of pilot projects and proof of concepts is only preliminary, as the number of projects grows quickly. > diff --git a/images/uport.png b/images/uport.png new file mode 100644 index 00000000..67b36830 Binary files /dev/null and b/images/uport.png differ