mirror of
https://github.com/Decentralized-ID/decentralized-id.github.io.git
synced 2024-12-17 03:24:37 -05:00
add pages
This commit is contained in:
parent
2530a8b697
commit
5889025bb3
29
_posts/2020-01-10-getting-started.md
Normal file
29
_posts/2020-01-10-getting-started.md
Normal file
@ -0,0 +1,29 @@
|
||||
---
|
||||
title: "Getting Started - 101"
|
||||
permalink: /101/
|
||||
---
|
||||
|
||||
[karimStekelenburg/awesome-self-sovereign-identity](https://github.com/karimStekelenburg/awesome-self-sovereign-identity)
|
||||
[The Laws of Identity](http://www.windley.com/archives/2019/01/the_laws_of_identity.shtml)
|
||||
> In 2005, Microsoft's Chief Identity Architect, Kim Cameron wrote an influential paper called The Laws of Identity (PDF). Kim had been talking about and formulating these laws in 2004 and throughout 2005. It's no coincidence that Internet Identity Workshop got started in 2005. Many people were talking about user-centric identity and developing ideas about how we might be able to create an identity layer for the Internet. Fifteen years later, we're still at it, but getting closer and closer all the time.
|
||||
>
|
||||
> The Internet was created without any way to identify the people who used it. The Internet was a network of machines. Consequently, all the identity in Internet protocols is designed to identify machines and services. People used the Internet through some institution (their company or university) and were part of that institution's administrative identity system. This can still be seen in the format of email addresses that identify both recipient and sender as someone@someplace. As the Internet grew to include people who weren't formally associated with an institution, every Web site and service created their own administrative identity domains. The result is the fractured plethora of identifiers, policies, and user experiences that constitute digital identity in 2019.
|
||||
[Difference Between Authentication and Authorization](https://techdifferences.com/difference-between-authentication-and-authorization.html)
|
||||
> The identity of a person is assured by authentication. On the other hand, authorization checks the access list that the authenticated person has. In other words, the authorization includes the permissions that a person has given.
|
||||
[Identity: The Elephant in the Enterprise Blockchain Room](https://hackernoon.com/identity-the-elephant-in-the-enterprise-blockchain-room-6f31ed8d4132)
|
||||
> The adoption of permissioned blockchain technologies in the enterprise is a road full of challenges. The so called Web3 stack based on decentralized ledgers is still fundamentally immature to enable sophisticated enterprise business processes. Among the building blocks missing from enterprise blockchain platforms, identity raises to the top of the list as one of the omnipresent challenges of this new generation of enterprise solutions. At Invector Labs, we are regularly faced with the challenges of enabling identity management capabilities in permissioned blockchain solutions. As a result, we have developed certain ideas of the key capabilities and models of an identity layer for enterprise blockchain solutions which I would like to outline in this article.
|
||||
[What is Digital Identity?](https://medium.com/humanizing-the-singularity/what-is-digital-identity-c77983c03306)
|
||||
> The Sapir–Whorf Hypothesis, also known as the principle of linguistic relativity, posits that language constructs our reality and worldview. While the hypothesis has been contested over the years, language is unarguably fundamental to the models of the world we build in our heads — and in our systems.
|
||||
[IDPro Member Presentations - Identiverse 2019](https://idpro.org/member-present) - [playlist](https://www.youtube.com/playlist?list=PLpKq7xRiIHaTDwAqpIU1UYpKZY03tfTMf)
|
||||
* [2019 | Introduction to Identity Part 1 | Identiverse](https://www.youtube.com/watch?v=T5w1EXqMqR0&list=PLpKq7xRiIHaTDwAqpIU1UYpKZY03tfTMf&index=5&t=0s) - [slideshare](https://www.slideshare.net/Identiverse/2019-introduction-to-identity-part-1-identiverse-day-1-june-25)
|
||||
> This workshop — provided by IDPro — will provide a comprehensive (and fun) introductory view of the identity world that will give participants a solid understanding of IAM’s foundations. Part 1 of this 2-part class begins with the basics like directories, identity proofing, provisioning, authentication (including multi-factor), authorization, as well as federation technologies like SAML, OAuth, and OpenID Connect. In Part 2, we build on those foundational technologies to explain PKI & digital certificates, privileged access management, identity for IoT, identity assurance, privacy issues, identity standards organizations, and even known attack vectors.
|
||||
* [Introduction to Identity Part 2 - June 25 | Identiverse 2019](https://www.youtube.com/watch?v=zxKRUXmTLJs)
|
||||
* [Modern Identity for Developers 101 - June 25 | Identiverse 2019](https://www.youtube.com/watch?v=kWpqFWz_9II)
|
||||
> Modern identity promises to solve some of the thorniest problems that historically plagued handling authentication and access control in applications. That sounds great in theory, but how do thinks really look like when the rubber hits the road – what does it take to incorporate modern identity in your applications development practice? Come to this session to learn the basis of modern identity development and be better equipped to understand and participate to the session in this year’s Identiverse development track.
|
||||
* [An Introduction to Mobile Identity - June 25 | Identiverse 2019](https://www.youtube.com/watch?v=25qiVyZEZOg&list=PLpKq7xRiIHaTDwAqpIU1UYpKZY03tfTMf&index=18)
|
||||
|
||||
## Glossaries
|
||||
|
||||
[IDCommongs - Lexicon](http://wiki.idcommons.org/Lexicon)
|
||||
[Identipedia](http://wiki.idcommons.org/Identipedia)
|
||||
[Systemic Elements](http://wiki.idcommons.org/Systemic_Elements)
|
22
_posts/2020-01-10-welcome.md
Normal file
22
_posts/2020-01-10-welcome.md
Normal file
@ -0,0 +1,22 @@
|
||||
---
|
||||
title: Welcome to DIDecentral! -Infominer
|
||||
permalink: /welcome/
|
||||
categories: ["DIDecentral"]
|
||||
author: Infominer
|
||||
author_profile: true
|
||||
---
|
||||
|
||||
|
||||
Infominer, here. Just want to give a bit of an introduction to this site, share a bit of my philosophy around how I work, and why I built it.
|
||||
|
||||
I hadn't been involved with tech for nearly a decade, and came back excited about how the internet and software landscape had matured, in the blink of an eye. Initially, I advertised freelance writing services, for detail oriented, research based, content. However, I saw such a great need for quality references. It felt impossibile for anyone to do a good job writing about anything they hadn't already become immersed in.
|
||||
|
||||
I've become consumed with the idea of making curated lists for all the things, and make complex subjects easier to navigate, much more quickly than I could write about all the things.
|
||||
|
||||
The landscape is moving quickly, and so I'm just building out a map, as able. I'd also welcome any effort from visitors who feel inspired to spruce up a page, here and there, or potentially add pages \ sections. If not, I'll get around to it all, eventually.
|
||||
|
||||
The idea has always been for this to be a collaborative effort. Soon, there will be a public mailing list, as that seems to be how decentralized organizations actually work online.
|
||||
|
||||
I've found some work gathering information related to agents. That is all I wanted, when I started this project last year. That somehow my newfound passion for making curated lists, where I see the need, might develop into opportunity for gainful employ.
|
||||
|
||||
The work is greatly improving my domain knowledge and experience. However, all of that isn't available for publication under my NDA. Regardless, it helps to cement the relevance of this resource, and offers some incentive for me to update this site with, the plentiful material I'd had waiting for the opportunity to work with.
|
@ -21,6 +21,11 @@ JULY 9, 2019
|
||||
> If ledger isn’t used, then every issuer of a credential has to maintain infrastructure or contract service provider to respond to DID resolution & revocation requests. And, credential issuers would know when the credential was used, impacting privacy.
|
||||
|
||||
|
||||
<iframe src="https://channel9.msdn.com/Shows/Blocktalk/Decentralized-Identity-and-Blockchain/player" width="640" height="360" allowFullScreen frameBorder="0" title="Decentralized Identity and Blockchain - Microsoft Channel 9 Video"></iframe>
|
||||
|
||||
[Identity and Distributed Ledger - Today and Tomorrow - June 26 | Identiverse 2019](https://www.youtube.com/watch?v=l04AHP7kPPw)
|
||||
[Distributed Ledger Technologies, IAM, and the Truth in Things - June 27 | Identiverse 2019](https://www.youtube.com/watch?v=VV2rLgH9TUE) - Robert Brown
|
||||
[Decentralized Identity: Intersection of Identity and Distributed Ledger - June 25 | Identiverse 2019](https://www.youtube.com/watch?v=bjlnZyMTf1M) - Preeti Rastogi
|
||||
## Blockpass
|
||||
|
||||
<img src="https://imgur.com/mMZ4E2rl.png" />
|
||||
|
@ -39,6 +39,10 @@ last_modified_at: 2019-03-01
|
||||
* [indy-ecosystem/VON.md](indy-ecosystem/VON.md)
|
||||
<a href="https://twitter.com/sboots/status/1070320318487584768"><img src="https://i.imgur.com/wdbN3Ld.png"/></a>
|
||||
|
||||
[User-Centric Verifiable Digital Credentials](https://www.ic.gc.ca/eic/site/101.nsf/eng/00068.html)
|
||||
> The Treasury Board Secretariat of Canada (TBS) and Shared Services Canada (SSC) are seeking a standardized method to issue and rapidly verify portable digital credentials across many different contexts, thereby reducing human judgement error, increasing efficiency and ensuring digital credential veracity using cryptography.
|
||||
|
||||
[USER AUTHENTICATION GUIDANCE FORINFORMATION TECHNOLOGY SYSTEMS](https://www.cse-cst.gc.ca/en/system/files/pdf_documents/itsp.30.031v3-eng_0.pdf)
|
||||
|
||||
## European Union
|
||||
![](https://i.imgur.com/DuQXLhs.png)
|
||||
|
@ -0,0 +1,37 @@
|
||||
---
|
||||
title: "(DID) the Decentralized Identifier"
|
||||
permalink: /specs-standards/decentralized-identifier-did/
|
||||
tags: ["W3C","CCG","DID"]
|
||||
categories: ["Specs-Standards"]
|
||||
last_modified_at: 2020-01-10
|
||||
---
|
||||
|
||||
#### DID the Decentralized Identifier
|
||||
|
||||
<a href="https://www.w3.org/2018/vocabws/presentations/Sabadello.pdf"><img src="https://i.imgur.com/7NRcJbq.png"/></a>
|
||||
|
||||
* [DID Whitepaper](https://github.com/WebOfTrustInfo/rwot2-id2020/blob/master/topics-and-advance-readings/DID-Whitepaper.md)
|
||||
> A DID architecture should focus on the set of components that Mr. Gupta refers to as "the minimum required for people to be able to do business (or other critical functions) together".
|
||||
>
|
||||
>**A Decentralized Identifier (DID) Registry and Discovery Service**
|
||||
>
|
||||
> This "minimum required" is defined by a union of the proposed requirements identified by the W3C Credential Community Group, the XDI.org Registry Working Group, and the Rebooting the Web of Trust group. It consists of three functions that can be addressed by a combination of blockchain and DHT technology:
|
||||
>
|
||||
> * A DID registration function
|
||||
> * A discovery function that enables looking up a registered DID in the blockchain
|
||||
> * A master key recovery function
|
||||
* [A Universally Unique IDentifier (UUID) URN Namespace](https://www.ietf.org/rfc/rfc4122.txt) <-DID's modeled after
|
||||
* [All you need to know about sequential UUID generators](https://blog.2ndquadrant.com/sequential-uuid-generators/)
|
||||
* [w3c- Decentralized Identifiers (DIDs) v0.11](https://w3c-ccg.github.io/did-spec/)
|
||||
* [Understanding Decentralized IDs (DIDs)](https://medium.com/@adam_14796/understanding-decentralized-ids-dids-839798b91809)
|
||||
* [DID Primer](https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust-fall2017/blob/master/draft-documents/did-primer.md) [[**ϟ**](https://github.com/WebOfTrustInfo/rwot7-fall2018/blob/master/topics-and-advance-readings/did-primer-extended.md)]
|
||||
* [Decentralized IDentifers (DIDs)](https://www.w3.org/2018/vocabws/presentations/Sabadello.pdf)
|
||||
* [Requirements for DIDs](https://github.com/WebOfTrustInfo/ID2020DesignWorkshop/blob/master/final-documents/requirements-for-dids.pdf)
|
||||
* [DIDs in DPKI](https://github.com/WebOfTrustInfo/rwot7/blob/master/topics-and-advance-readings/dids-in-dpki.md)
|
||||
* [What is a DID?](https://docs.google.com/document/d/1Ym85y_bDVN9xkRZ-oD-zlUUIeZjVGWNihfZBk2GQidk/edit)
|
||||
* [The Path from an id (DID) to a Real-Life Something](https://hyperonomy.com/2019/01/04/the-path-from-a-id-did-to-a-real-life-something)
|
||||
|
||||
<a href="https://hyperonomy.files.wordpress.com/2019/01/path-id-did-real-life-somethings-v0.2-1.png"><img src="https://hyperonomy.files.wordpress.com/2019/01/path-id-did-real-life-somethings-v0.2-1.png?w=500"/></a>
|
||||
|
||||
|
||||
[1A/ DID 101 – Decentralized Identifiers & how they are the key to interoperable self-sovereign ID](http://iiw.identitycommons.net/1A/_DID_101_%E2%80%93_Decentralized_Identifiers_%26_how_they_are_the_key_to_interoperable_self-sovereign_ID)
|
Loading…
Reference in New Issue
Block a user