mirror of
https://github.com/Decentralized-ID/decentralized-id.github.io.git
synced 2024-12-24 06:39:31 -05:00
sort
This commit is contained in:
parent
2395f6d86f
commit
67ca322e3b
@ -47,6 +47,10 @@ published: true
|
||||
> For this research, PILPG conducted interviews with 15 transitional justice experts and held three focus groups.
|
||||
* [TAKEAWAYS FROM OUR COMMUNITY CALL ON INTERSECTIONS BETWEEN DATA & DIGITAL RIGHTS AND SOCIAL JUSTICE](https://www.theengineroom.org/takeaways-from-our-community-call-on-intersections-between-data-digital-rights-and-social-justice/) 2022-03-21 The Engine Room
|
||||
> On February 15, we held a community call to discuss our newly-published [research findings](https://www.theengineroom.org/new-research-community-call-intersectional-approaches-to-data-and-digital-rights-advocacy/) on intersectional collaboration between social justice communities and data and digital rights (DDR) communities. We were joined by speakers Temi Lasade-Anderson from Alaase Lab, Luã Cruz from IDEC, Patronella Nqaba from Atlantic Fellows for Racial Equity and Paromita Shah from Just Futures Law.
|
||||
* [Internet Governance - UDDI - Universal Declaration of Digital Identity](https://iiw.idcommons.net/10I/_Internet_Governance_-_UDDI_-_Universal_Declaration_of_Digital_Identity) 2021-05-06 Jeff Aresty, Kristina Yasuda IIW, IDCommons
|
||||
> Reaffirming the human rights and fundamental freedoms enshrined in the Universal Declaration of Human Rights and relevant international human rights agreements such as the UN GP on BHR and Constitutional Rights;
|
||||
>
|
||||
> Reaffirming the relevance of international human rights standards in the digital environment and the need to explore and expand new human rights guarantees for the future;
|
||||
* [Universal Declaration of Digital Rights](https://docs.google.com/document/d/1y9C-5TPYmRruRQqJq39-HePk3ypWLDpSAEVzuonOH2Q/edit) 2020-10-21 Johannes Ernst
|
||||
> all states should recognise and promote universal respect for and observance of both fundamental human and digital rights in physical domain and the digital spaces environment and ensure that these rights are upheld as core elements of a free, open and representative society
|
||||
|
||||
|
@ -21,6 +21,8 @@ last_modified_at: 2023-06-19
|
||||
We went through the paywall so you don’t have to - SSI only mentioned once. From page 99>>
|
||||
* [EIC2022 Centralized & Decentralized Identity converging](https://www.linkedin.com/pulse/eic2022-centralized-decentralized-identity-converging-kuppinger/) 2022-05-18 Martin Kuppinger
|
||||
> For me, the most relevant new topic and trend was to finally see the convergence of decentralized identities (DID) and traditional approaches on IAM starting. DID, also referred to as SSI (Self Sovereign Identity) or verifiable credentials, is a concept where the user has a wallet that holds proofs of identities and attributes. This could be an ID proof based on a government-issued ID card. It could be a proof of the employer that the user works in an organization in a certain role. It can be other proofs such as the drivers license, health cards, self-issued proofs, etc.
|
||||
* [Bullish Case for Self-Sovereign Identity](https://sgershuni.medium.com/bullish-case-for-self-sovereign-identity-c2c26857f0ab) 2021-03-01 Stepan Gershuni
|
||||
> This is the first part of the 2-part series covering self-sovereign identity technology. First part is covering the key problems that this technology is aiming to solve and how it is being achieved, and in the second part I’m focusing on the business model and go-to-market aspects.
|
||||
* [Digital identity market revenues to reach US$53bn in 2026](https://www.nfcw.com/2022/01/31/375825/digital-identity-market-revenues-to-reach-us53bn-in-2026/) 2022-01-31 NFCW
|
||||
> Juniper’s Digital Identity: Key Opportunities, Regulatory Landscape & Market Forecasts 2022-2026 report also identifies multimodal biometric authentication, digital onboarding — including single sign-on solutions and self-sovereign identity — as “growing trends” across the digital identity market.
|
||||
* [Digital Identity Trends and Predictions for 2022](https://www.signicat.com/blog/2022-trends-and-predictions) 2022-01-14 Signicat
|
||||
|
@ -2,7 +2,6 @@
|
||||
date: 2023-01-15
|
||||
title: Dock
|
||||
name: Dock
|
||||
|
||||
description: "Dock was founded with a mission to solve universal problems with existing data solutions: data silos and gatekeepers, untrusted and inaccurate information, incompatibilities across platforms, inefficiencies with verifying data, and lack of control and privacy for users."
|
||||
excerpt: >
|
||||
There is a problem in the digital economy. Paper and PDFs are easy to fake. Verifying the authenticity of a document or certificate is slow and manual. And if you don't verify them, you risk fraud. That's why world-class organisations use Verifiable Credentials to verify documents instantly. Verifiable Credentials are documents that contain a crypto signature: a permanent stamp that allows anyone to confirm you issued that credential.
|
||||
@ -15,3 +14,33 @@ last_modified_at: 2023-01-18
|
||||
toc: false
|
||||
published: false
|
||||
---
|
||||
|
||||
* [How Verifiable Credentials Will Change User Authentication](https://blog.dock.io/verifiable-credentials-changing-user-authentication/) Dock
|
||||
|
||||
Web 3 has brought a new way to engage with websites, and dare I say, it is almost magical. No cookies, no username, no password, no sharing personal information. I can browse freely and pseudo-anonymously without having to worry about the cookies and terms I was forced to accept.
|
||||
|
||||
* [Fundamentals of Decentralized Identity: Free Certification Course](https://blog.dock.io/decentralized-identity-certification-course/) Dock.io
|
||||
|
||||
35min course!
|
||||
|
||||
In the Fundamentals of Decentralized Identity certification, you'll learn how Verifiable Credentials, Decentralized Identifiers and Blockchain work. Complete the course, level up your skills and receive your certificate as a digital Verifiable Credential.
|
||||
|
||||
|
||||
* [Verifiable Credentials: The Ultimate Guide 2022](https://blog.dock.io/verifiable-credentials/) by Trinsic
|
||||
|
||||
1. Credential metadata: This might be cryptographically signed by the issuer and contains the credential identifier as well as properties about the credential itself such as the expiry date and who the issuer is.
|
||||
2. Claim(s): A tamper-proof set of claims made about the credential subject such as someone’s employee number and job title.
|
||||
3. Proof(s): Cryptographic method that allows people to verify
|
||||
|
||||
* [Dock’s Web3 ID Now Available on Auth0 Marketplace](https://blog.dock.io/docks-web3-id-now-available-on-auth0-marketplace/) Dock
|
||||
|
||||
Dock has partnered with Auth0, one of the world’s leading identity management companies. Auth0 has added the support for Dock’s Web3 IDs in their marketplace integration to enable Auth0’s enterprise customers to integrate Web3 IDs on their platforms.
|
||||
* [How to Prevent Supply Chain Fraud With Blockchain](https://www.dock.io/post/supply-chain-fraud-blockchain) 2023-05-01 Dock
|
||||
> The global [supply chain management market size](https://www.prnewswire.com/news-releases/supply-chain-management-scm-market-size-worth--19-3-billion-globally-by-2028-at-9-02--cagr-verified-market-research-301540702.html) was valued at USD 10.1 Billion in 2020 and is projected to reach USD 19.3 Billion by 2028. Supply chain is the path for any product such as food, clothes, or appliances to go from where it was a produced, to distributors, procurement officers (quality inspections), and the market.
|
||||
* [Dock Joins the Decentralized Identity Foundation](https://blog.dock.io/decentralized-identity-foundation/) 2022-08-10 Dock
|
||||
> As a decentralized identity management platform that complies with internationally-recognized technology standards, we are continuously keeping up to date with key discussions and updates in the industry which is why we joined the Decentralized Identity Foundation
|
||||
|
||||
* [Delegatable Credentials Now Available](https://blog.dock.io/delegatable-credentials-now-available/) 2021-03-15 Dock
|
||||
> An issuer may [grant delegation authority to another issuer](https://docknetwork.github.io/sdk/tutorials/concepts_private_delegation.html) simply by issuing them a vcdm credential. Let's say did:ex:a wants to grant delegation authority to did:ex:b. did:ex:a simply issues the credential saying that did:ex:b may make any claim.
|
||||
* [Verifiable Credentials set to Revolutionize Health and Safety Compliance](https://blog.dock.io/verifiable-credentials-set-to-revolutionize-health-and-safety-compliance/) 2021-11-05 Dock
|
||||
> By integrating with Dock and utilizing verifiable credentials, the process of verifying a workers qualifications goes from analysing paper-based certificates and calling each educational body to certify the legitimacy of it, to having the accreditations sitting in a tamper-proof digital wallet, with a digital signature signature from the issuing body certifying the legitimacy.
|
||||
|
@ -22,6 +22,18 @@ published: false
|
||||
* [Decentralized Identity Trilemma](http://maciek.blog/decentralized-identity-trilemma/)
|
||||
>There seems to exist a trilemma in decentralized identity analogous to @Zooko's triangle. None of the existing solutions are at the same time: 1) privacy-preserving, 2) Sybil-resistant 3) self-sovereign -[[**T**](https://twitter.com/MaciekLaskus/status/1031859093072424960)]
|
||||
|
||||
* [Agency By Design (Privacy is not Enough)](https://iiw.idcommons.net/20B/_Agency_By_Design_(Privacy_is_not_Enough)) by Adrian Gropper
|
||||
> I’m not a fan of Privacy by Design.\
|
||||
> In the industry are only concerned about compliance, very rarely talk about Human Agency\
|
||||
> Privacy by Default is the opposite in some sense to privacy by design\
|
||||
> The problem is that It conflict with community in many cases. (e.g. social credit score)\
|
||||
> Cultural differences (EU accepts better centralization than US)\
|
||||
> Delegation and agency are one the same thing\
|
||||
> Agency is a much bigger thing and delegation is a mechanism that supports it\
|
||||
> I want my fiduciaries to know as much as possible of me (e.g. my doctor, my lawyer) \
|
||||
> Model Agency as hierarchy and delegation is the mean to have it.
|
||||
|
||||
|
||||
* [The Architecture of Identity Systems](https://www.windley.com/archives/2020/09/the_architecture_of_identity_systems.shtml) by Phil Windley
|
||||
> I recently read a paper from Sam Smith, [Key Event Receipt Infrastructure](https://arxiv.org/abs/1907.02143), that provided inspiration for a way to think about and classify identity systems. In particular his terminology was helpful to me. This blog post uses terminology and ideas from Sam's paper to classify and analyze three different identity system architectures. I hope it provides a useful model for thinking about identity online.
|
||||
* [The SSO Practitioner’s Introduction to Decentralized Identity](https://www.pingidentity.com/en/resources/blog/post/sso-practitioners-introduction-decentralized-identity.html)
|
||||
@ -503,9 +515,6 @@ Connections, relationships, and third-party issued credentials are not entirely
|
||||
|
||||
Indicio's CEO, Heather Dahl, and CTO, Ken Ebert, identity wallets, verified credentials, the role of the Sovrin Foundation, and new momentum around interoperability across decentralized identity.
|
||||
|
||||
* [How Verifiable Credentials Will Change User Authentication](https://blog.dock.io/verifiable-credentials-changing-user-authentication/) Dock
|
||||
|
||||
Web 3 has brought a new way to engage with websites, and dare I say, it is almost magical. No cookies, no username, no password, no sharing personal information. I can browse freely and pseudo-anonymously without having to worry about the cookies and terms I was forced to accept.
|
||||
|
||||
* [Understanding Digital Credentials](https://www.bcdiploma.com/en/blog/understanding-digital-credentials-21-05-12) BCdiploma
|
||||
|
||||
@ -901,12 +910,6 @@ In “Self-Sovereign Identity,” [Johannes Sedlmeir](https://www.fim-rc.de/Pape
|
||||
|
||||
* [Digital Identities and Verifiable Credentials](https://www.fim-rc.de/Paperbibliothek/Veroeffentlicht/1359/wi-1359.pdf) Johannes Sedlmeir • Reilly Smethurst • Alexander Rieger • Gilbert Fridgen Published October 2021
|
||||
|
||||
* [Fundamentals of Decentralized Identity: Free Certification Course](https://blog.dock.io/decentralized-identity-certification-course/) Dock.io
|
||||
|
||||
35min course!
|
||||
|
||||
In the Fundamentals of Decentralized Identity certification, you'll learn how Verifiable Credentials, Decentralized Identifiers and Blockchain work. Complete the course, level up your skills and receive your certificate as a digital Verifiable Credential.
|
||||
|
||||
* [Myths about SSI](https://jolocom.io/blog/myths-about-ssi/) Jolocom
|
||||
|
||||
The idea that as a user of SSI I have complete sovereignty over my digital identity is often misunderstood. At its core, SSI is about my digital identity being under my own control, so I can decide to whom I show my data, when, and for what.
|
||||
@ -1017,12 +1020,6 @@ The DID model allows you to establish a relationship between your private key (y
|
||||
|
||||
Our goal has been to completely abstract away the complexity of the ever-changing landscape so organizations can focus on the important stuff—what product to build, and how to take it to market. Teams shouldn’t have to “pick winners” and wager what to build on. Their products should be interoperable with multiple ecosystems. That’s what Trinsic is providing, out-of-the-box.
|
||||
|
||||
* [Verifiable Credentials: The Ultimate Guide 2022](https://blog.dock.io/verifiable-credentials/) by Trinsic
|
||||
|
||||
1. Credential metadata: This might be cryptographically signed by the issuer and contains the credential identifier as well as properties about the credential itself such as the expiry date and who the issuer is.
|
||||
2. Claim(s): A tamper-proof set of claims made about the credential subject such as someone’s employee number and job title.
|
||||
3. Proof(s): Cryptographic method that allows people to verify
|
||||
|
||||
* [Can Decentralized Identity Give You Greater Control of Your Online Identity?](https://anonyome.com/2022/07/can-decentralized-identity-give-you-greater-control-of-your-online-identity/)
|
||||
|
||||
* [GlobaliD 101: What is the trust triangle?](https://medium.com/global-id/globalid-101-what-is-the-trust-triangle-260e85e1c640)
|
||||
|
@ -3,28 +3,24 @@ published: false
|
||||
---
|
||||
|
||||
# Future of Digital Identity
|
||||
* [The Future of Digital Identity: Separating the digital from the individual](https://www.finextra.com/the-long-read/421/the-future-of-digital-identity-separating-the-digital-from-the-individual) 2022-07-27 ([Report](https://www.finextra.com/finextra-downloads/research/documents/245/the-future-of-digital-identity-2022.pdf)
|
||||
* [The Future of Digital Identity: Separating the digital from the individual](https://www.finextra.com/the-long-read/421/the-future-of-digital-identity-separating-the-digital-from-the-individual) 2022-07-27 Finextra [[Report](https://www.finextra.com/finextra-downloads/research/documents/245/the-future-of-digital-identity-2022.pdf)]
|
||||
> the concept of real-time and frictionless processes is what is driving the future of digital identity forward.
|
||||
|
||||
While biometrics are now part and parcel of life in 2022 – with the prevalence of mobile payments with Face ID and Touch ID – the concept of real-time and frictionless processes is what is driving the future of digital identity forward.
|
||||
|
||||
* [The Future of Identity. A collection of interconnected research](https://borgbraincrypto.medium.com/the-future-of-identity-eee42109efd2)
|
||||
* [The Future of Identity. A collection of interconnected research](https://borgbraincrypto.medium.com/the-future-of-identity-eee42109efd2) 2020-12-02
|
||||
> A collection of interconnected research and thoughts, on the topics, technologies, and projects concerning the future of identification, DID’s, SSI’s, biometrics, data, ai, reputation, credentials, medical history, blockchain, privacy, and ethics, on what it should mean to us as humans, and the implications for the future of this world and our relationship with it.
|
||||
|
||||
* [Bullish Case for Self-Sovereign Identity](https://sgershuni.medium.com/bullish-case-for-self-sovereign-identity-c2c26857f0ab)
|
||||
> How is SSI technology creating a trillion dollar market?
|
||||
|
||||
There are more good pictures
|
||||
* [The way towards self-sovereign identity](https://innovalor.nl/en/Blogs/self-sovereign-identity) Ines Duits
|
||||
|
||||
* [The way towards self-sovereign identity](https://innovalor.nl/en/Blogs/self-sovereign-identity) 2020-09-28 Ines Duits
|
||||
> This series of blogs focus on self-sovereign identity, SSI. This post explains where SSI originated from by giving a timeline of how digital identity has changed over the years. [In the second blog](https://innovalor.nl/en/Blogs/what-is-self-sovereign-identity), we focus on what SSI is exactly. In the third blog, give two examples of use cases (IRMA and Sovrin) where SSI plays an important role.
|
||||
* [Inventories, Not Identities: Why multisigs are the future of online accounts](https://blog.gnosis.pm/inventories-not-identities-7da9a4ec5a3e)
|
||||
* [Inventories, Not Identities: Why multisigs are the future of online accounts](https://myhub.ai/items/inventories-not-identities-why-multisigs-are-the-future-of-online-by-kei-kreutler-gnosis) 2021-11-20 Gnosis
|
||||
> Embracing more than the normative individual as a fundamental unit of account, such a paradigm could better serve the creation of resilient, accountable, and mutualistic institutions leading into the twenty-first century.
|
||||
* [Can the Digital Future Be Our Home?](https://www.windley.com/archives/2021/05/can_the_digital_future_be_our_home.shtml) Windley
|
||||
* [Can the Digital Future Be Our Home?](https://www.windley.com/archives/2021/05/can_the_digital_future_be_our_home.shtml) 2021-05 Phil Windley
|
||||
> This post features three fantastic books from three great, but quite different, authors on the subject of Big Tech, surveillance capitalism, and what's to be done about it.
|
||||
* [Authentic Digital Relationships](https://www.windley.com/archives/2020/08/authentic_digital_relationships.shtml) Windley
|
||||
* [Authentic Digital Relationships](https://www.windley.com/archives/2020/08/authentic_digital_relationships.shtml) 2020-08 Phil Windley
|
||||
> Self-sovereign identity, supported by a heterarchical identity metasystem, creates a firm foundation for rich digital relationships that allow people to be digitally embodied so they can act online as autonomous
|
||||
* [The Future of Self-Sovereign Identity (SSI)](https://www.youtube.com/watch?v=mx58bYHFrFk)
|
||||
* [The Future of Self-Sovereign Identity (SSI)](https://www.youtube.com/watch?v=mx58bYHFrFk) 2021-06-03 Evernym
|
||||
> We were joined by Drummond Reed and Alex Preukschat, co-authors of Manning Publication's new book 'Self-Sovereign Identity,' for a conversation on the book's development and recent release and what the future holds for SSI as a technology, architecture, and movement.
|
||||
* [Personal Identity and the Future of Digital Interactions](https://www.pingidentity.com/en/company/blog/posts/2021/personal-identity-future-digital-interactions.html) Ping Identity
|
||||
* [Personal Identity and the Future of Digital Interactions](https://www.pingidentity.com/en/company/blog/posts/2021/personal-identity-future-digital-interactions.html) 2021-06-22 Ping Identity
|
||||
> What if individuals could determine how to share data and with whom? What if that data was always up to date? And what if instead of merely having a unified customer profile in a single company, each person could have one identity experience for all the companies and people they interact with?
|
||||
* [Why Should You Care about Digital Identity?](https://indicio.tech/market-signals-why-should-you-care-about-digital-identity/) 2022-09-02 Indicio
|
||||
> We take a look at a few of the best articles on why strong digital identity will be critical as we continue to build on the internet.
|
||||
@ -32,44 +28,28 @@ There are more good pictures
|
||||
> on the importance of verifying specific aspects or traits that people can claim to have, saying that for most people it’s “not about proving who you are but about proving what you are”
|
||||
* [Goodbye, physical identities: How organizations can prepare for digital identity challenges](https://www.biometricupdate.com/202208/goodbye-physical-identities-how-organizations-can-prepare-for-digital-identity-challenges) Philipp Pointner, Biometrics Update
|
||||
> He raises some interesting points about the [increasing number of digital identity wallets](https://www.gartner.com/en/newsroom/press-releases/2022-02-21-govt-tech-trends-2022-press-release) being offered by states and national governments, and how, with the rise in digitalization, there are more opportunities for bad actors to acquire and misuse your information. He leaves us with a few key attributes to look for in a secure digital identity system.
|
||||
* [Digital Identities Will Change The Nature Of Online Reputation](https://www.forbes.com/sites/alastairjohnson/2022/08/30/digital-identities-will-change-the-nature-of-online-reputation/?sh=bd1f30b584a3) Alastair Johnson, Forbes
|
||||
* [Digital Identities Will Change The Nature Of Online Reputation](https://www.forbes.com/sites/alastairjohnson/2022/08/30/digital-identities-will-change-the-nature-of-online-reputation/?sh=bd1f30b584a3) 2022-08-30 Alastair Johnson, Forbes
|
||||
> This article highlights how these centralized repositories will become redundant as verifiable credentials put control of data into the hands of the person or entity it belongs to.. Examples cited include medical information or your credit score, both of which are difficult to access, and require validation from a third party.
|
||||
|
||||
* [the most important questions](https://werd.io/2021/one-of-the-most-important-questions-turns) Ben Werdmuller
|
||||
* [GiD Report#181 — The future will be self sovereign](https://medium.com/global-id/gid-report-181-the-future-will-be-self-sovereign-d0218fff9989) 2021-10-12 GlobalID
|
||||
> Just as the World Wide Web empowered people to connect and share knowledge and information, the rise of Bitcoin taught us that we could have direct ownership over our valuable assets and payments — no middle man or central operator necessary.
|
||||
|
||||
what is the future you want to build?
|
||||
|
||||
Is it one where everyone has equal access to knowledge and opportunities? Where everyone can have a good life regardless of background?
|
||||
|
||||
Or is it something else?
|
||||
|
||||
* [GiD Report#181 — The future will be self sovereign](https://medium.com/global-id/gid-report-181-the-future-will-be-self-sovereign-d0218fff9989)
|
||||
|
||||
Just as the World Wide Web empowered people to connect and share knowledge and information, the rise of Bitcoin taught us that we could have direct ownership over our valuable assets and payments — no middle man or central operator necessary.
|
||||
* [The Future Now Problem](https://www.continuumloop.com/the-future-now-problem/) Continuum Loop
|
||||
|
||||
When the idea of what is available right NOW is blurred among the ideas of the FUTURE, you can’t differentiate between what is feasible TODAY from what is not ready for prime time.
|
||||
* [On the Trust and Trust Modelling for the Future Fully-Connected Digital World: A Comprehensive Study](https://arxiv.org/pdf/2106.07528.pdf) 2021-06-14 HANNAH LIM JING TING, XIN KANG IEEE
|
||||
> Under our analysis of trust and the digital world, we define different types of trust relationships and find out the factors that are needed to ensure a fully representative model.Next, to meet the challenges of digital trust modelling, comprehensive trust model evaluation criteria areproposed, and potential securities and privacy issues of trust modelling are analyzed. Finally, we provide awide-ranging analysis of different methodologies, mathematical theories, and how they can be applied totrust modelling
|
||||
* [The Future: Proving your Identity](https://gdprnow.fireside.fm/30) GDPR Now
|
||||
> we talk about the future of credential management – Self Sovereign Identity (SSI) also known as decentralised identity. SSI is an efficient, secure and privacy enhancing solution for identity verification. It puts individuals at the centre of the verification process and is the future of identity management.
|
||||
|
||||
* [The Future of Authenticating Your Data](https://www.reality2cast.com/61) with Doc Searls, Katherine Druckman and Dave Huseby
|
||||
* [The Future of Authenticating Your Data](https://www.reality2cast.com/61) 2021-03-12 Doc Searls, Katherine Druckman, Dave Huseby
|
||||
> Across time and space immediately being tracked and, and falling victim to what I call sort of casual surveillance or corporate surveillance, right? Where is your data flows through systems; businesses are able to observe that movement of your data, your information aggregated, develop some kind of psychological model and then able to sell that to people who wish to manipulate you, sell you things, that kind of stuff
|
||||
|
||||
* [Panel at Radical Exchange on Future Digital Identity](https://identitywoman.net/panel-at-rxc-digital-identity-a-look-ahead/)
|
||||
> Hosted by Kaliya Young this panel included Paula Burman form Democracy Earth and Supriyo Roy from Idena talking about the their different digital identity systems that are very future looking.
|
||||
* [Future 2030: Self Sovereign Identity Explained](https://www.coindesk.com/self-sovereign-identity-reshape-internet)
|
||||
A comprehensive Article on CoinDesk about the future and what SSI looks like in that future. Kaliya interviewed for it.
|
||||
* [Three Scenarios for Rolling Back Surveillance Capitalism](https://reb00ted.org/tech/20201009-three-scenarios-rolling-back-surveillance-captialism/).
|
||||
* [Next Stop: A Global Verification Network](https://trbouma.medium.com/next-stop-global-verification-network-69f14a6673ab) Tim Bouma
|
||||
* [Panel at Radical Exchange on Future Digital Identity](https://identitywoman.net/panel-at-rxc-digital-identity-a-look-ahead/) 2020-08-03 IdentityWoman
|
||||
> Hosted by Kaliya Young this panel included Paula Burman form Democracy Earth and Supriyo Roy from Idena talking about the their different digital identity systems that are very future looking.
|
||||
* [Future 2030: Self Sovereign Identity Explained](https://www.coindesk.com/self-sovereign-identity-reshape-internet) 2020-10-01
|
||||
> A comprehensive Article on CoinDesk about the future and what SSI looks like in that future. Kaliya interviewed for it.
|
||||
* [Three Scenarios for Rolling Back Surveillance Capitalism](https://reb00ted.org/tech/20201009-three-scenarios-rolling-back-surveillance-captialism/) 2020-10-09 Rebooted
|
||||
> what are realistic alternatives? Alternatives that keep the amazing wonders that are consumer technologies in 2020, but don’t invade our privacy, don’t spread misinformation, give us back a measure of control over our electronic lives, don’t set us up for manipulation and help rather than hurt our mental health?
|
||||
* [Next Stop: A Global Verification Network](https://trbouma.medium.com/next-stop-global-verification-network-69f14a6673ab) 2020-11-22 Tim Bouma
|
||||
> The hardest part ahead is not the technology, it’s the wholesale re-conceptualization of what is required for a global verification network that puts the power of the network back into the endpoints that is you and me.
|
||||
* [Four Future Scenarios about Identity & Access in 2040](https://esatus.com/wp-content/uploads/Broschuere_eng_final.html). We talk about Total Surveillance, Mega Corporations, Identity Chaos & Self-Sovereign Identity 2.0.
|
||||
> After a look into the past and present, we now fast-forward to the year 2040, where we meet Julia and accompany her through her everyday life. In four different IAM future scenarios, which can be viewed separately, we will understand how life under total surveillance feels for Julia. In times where identity chaos prevails, we can see what it means when Julia can no longer be sure about her digital identity, with only her physical identity being certain. In a world dominated by mega corporations Julia‘s experiences with her employer show us the far-reaching significance and influence such corporations have gained in relation to IAM. Finally, we experience how Julia is able to regain her informational self-determination thanks to her identity wallet - Self-Sovereign Identity 2.0.
|
||||
* [What does it take to develop human-centric solutions for the built environment?](https://mydata.org/2022/05/13/built-for-people/) MyData ([Video](https://www.youtube.com/watch?v=VCjW0_NAPmQ) 2022-05-13
|
||||
* [What does it take to develop human-centric solutions for the built environment?](https://mydata.org/2022/05/13/built-for-people/) 2022-05-13 MyData [[Video](https://www.youtube.com/watch?v=VCjW0_NAPmQ)]
|
||||
> Building better, more human-centric solutions in smart cities starts by realising that citizens and their digital footprints are not merely aspects to monitor and evaluate. They are active participants in the cities we live and work together and need to be engaged in designing better cities and managing the data about themselves. This is not important only for respecting citizens’ rights, but it is crucial to building sustainable services and humane cities.
|
||||
* [On Abortion and Data](https://www.mydata.org/2022/06/30/on-abortion-and-data/) MyData 2022-06-30
|
||||
> A basic insight of MyData is that the current systems of data are asymmetrical, imbalanced, and unfair. A basic motivation of MyData is to fix this by addressing business, legal, technical, and societal aspects of those systems.
|
||||
|
||||
|
||||
* [The Past, Present and Future of Identity](https://www.thinkdigitalpartners.com/guest-blog/2021/02/15/the-past-present-and-future-of-identity/) 2021-02-15
|
@ -1,213 +0,0 @@
|
||||
---
|
||||
published: false
|
||||
---
|
||||
|
||||
# Guardianship
|
||||
* [Guardianship In Self-Sovereign Identity](http://thedinglegroup.com/blog/2020/11/30/guardianship-in-self-sovereign-identity) 2020-11-30
|
||||
|
||||
* [Video] [Vienna Digital Identity Meetup #17](https://vimeo.com/482803989)
|
||||
> Guardianship is a complex topic, with many subtleties and layers [...] In this first event on this topic, Philippe has provided an overview of how SSI and Guardianship fit together and how SSI meets the lifecycle stages (Inception, Creation, Usage and Termination) of guardianship.
|
||||
* [The Sovrin Working Group Tech Requirements and Implementation Guidelines](https://docs.google.com/presentation/d/1aGTPmlno3WScpSYMs1HLhWsrVRx9B-I0yhOQsRgmqRw/edit?usp=sharing) John Phillips, Jo Spenser
|
||||
> Sovrin is looking to promote the governance process and where guardianship fits in. The IdRamp wallet is an example of how the wallet could provide helpful features.
|
||||
* [A Deeper Understanding of Implementing Guardianship](https://sovrinid.medium.com/a-deeper-understanding-of-implementing-guardianship-9a8ab749db90)
|
||||
|
||||
* [A Deeper Understanding of Implementing Guardianship](https://sovrinid.medium.com/a-deeper-understanding-of-implementing-guardianship-9a8ab749db90): Two new Guardianship papers from Sovrin at IIW #32
|
||||
> The first paper is called the [Guardianship Credentials Implementation Guidelines](https://drive.google.com/file/d/1vBePVx8n3MRDWcePkwVDya9ab4BHEyU_/view?usp=sharing) and its purpose is to provide readers with the background they need to implement IT systems that support various kinds of guardianship. The second paper is called [Guardianship Credentials Technical Requirements](https://drive.google.com/file/d/1M21PznPAd0H6z1t4ODl-jiEoXZjEhwcb/view?usp=sharing) which was developed by the technical requirements working group within the SGWG. The purpose of this document is twofold: i) provide principles under which guardianship scenario designs and requirements are considered and defined; and ii) provide technical requirements for SSI solutions that offer the capability of guardianship.
|
||||
|
||||
* [Internet Governance - UDDI - Universal Declaration of Digital Identity](https://iiw.idcommons.net/10I/_Internet_Governance_-_UDDI_-_Universal_Declaration_of_Digital_Identity) by Jeff Aresty, Kristina Yasuda
|
||||
|
||||
Internet governance, human rights, digital identity, Identity for All, Guardianship
|
||||
|
||||
* [Guardianship Showcase - The Sovrin Working Group Tech Requirements and Implementation Guidelines](https://iiw.idcommons.net/4G/_Guardianship_Showcase_-_The_Sovrin_Working_Group_Tech_Requirements_and_Implementation_Guidelines) by John Phillips, Jo Spenser
|
||||
|
||||
* [Guardianship, SSI, and the Sovrin Guardianship WG - Update for IIW #32](https://docs.google.com/presentation/d/1aGTPmlno3WScpSYMs1HLhWsrVRx9B-I0yhOQsRgmqRw/edit?usp=sharing)
|
||||
|
||||
1. Jurisdictions are essential [to Guardianship]
|
||||
2. Work with existing laws
|
||||
3. Build Guardianship on Verifiable Credentials
|
||||
4. Build a mental model
|
||||
5. Don’t build Guardianship [solely] on wallets
|
||||
|
||||
Sovrin is looking to promote the governance process and where guardianship fits in. The IdRamp wallet is an example of how the wallet could provide helpful features.
|
||||
|
||||
- Universal Wallet: [https://w3c-ccg.github.io/universal-wallet-interop-spec/](https://w3c-ccg.github.io/universal-wallet-interop-spec/)
|
||||
- Review/contribute to the draft spec (or portions you’re interested in): [https://docs.google.com/document/d/1vPqb4bJ6pfuAPYF_fMW_Lb-7GZugasWKfrSCotpuv6o/edit#](https://docs.google.com/document/d/1vPqb4bJ6pfuAPYF_fMW_Lb-7GZugasWKfrSCotpuv6o/edit#)
|
||||
- Verifiable Credentials for Education Task Force: [https://w3c-ccg.github.io/vc-ed/](https://w3c-ccg.github.io/vc-ed/)
|
||||
|
||||
* [Agency By Design (Privacy is not Enough)](https://iiw.idcommons.net/20B/_Agency_By_Design_(Privacy_is_not_Enough)) by Adrian Gropper
|
||||
|
||||
Agency vs. Delegation
|
||||
|
||||
Learning Stack:
|
||||
|
||||
- Me
|
||||
- My Agent / Fiduciary / semi-autonomous
|
||||
- Community
|
||||
- Vendors and Institutions
|
||||
|
||||
Relationship with companies
|
||||
|
||||
- Dashboard for our lives
|
||||
- Portable shopping cart
|
||||
|
||||
CAPCHAS
|
||||
|
||||
- Browser is not enough
|
||||
- Force APIs
|
||||
- GNAP
|
||||
- API in healthcare
|
||||
|
||||
How would an API World function
|
||||
|
||||
- Intelligence
|
||||
- Choice
|
||||
|
||||
The GNAP at the IETF: [https://tools.ietf.org/html/draft-ietf-gnap-core-protocol-04](https://tools.ietf.org/html/draft-ietf-gnap-core-protocol-04)
|
||||
|
||||
Is server a bad concept
|
||||
|
||||
- Ethereum as the ultimate server
|
||||
|
||||
Clear application? Needed a model how a real human uses / not the tech / highly motivated
|
||||
|
||||
Social Context is important to the average user
|
||||
|
||||
The back end is most important
|
||||
|
||||
Real estate “agents” vs. DSIY - Zillow - the GNAP RFC at the IETF: [https://tools.ietf.org/html/draft-ietf-gnap-core-protocol-04](https://tools.ietf.org/html/draft-ietf-gnap-core-protocol-04)
|
||||
|
||||
* [...]
|
||||
|
||||
HTML and JSON / OAuth 2.0 Token Exchange - support for delegation semantics ( [https://tools.ietf.org/html/rfc8693](https://tools.ietf.org/html/rfc8693) )
|
||||
|
||||
A password manager that puts the user in full control. [https://sitepassword.alanhkarp.com/](https://sitepassword.alanhkarp.com/)
|
||||
|
||||
* [...]
|
||||
|
||||
Agency by Design (Privacy is not Enough)
|
||||
|
||||
Adrian Gropper:
|
||||
|
||||
I’m not a fan of Privacy by Design.
|
||||
|
||||
In the industry are only concerned about compliance, very rarely talk about Human Agency
|
||||
|
||||
Privacy by Default is the opposite in some sense to privacy by design
|
||||
|
||||
The problem is that It conflict with community in many cases. (e.g. social credit score)
|
||||
|
||||
Cultural differences (EU accepts better centralization than US)
|
||||
|
||||
Delegation and agency are one the same thing
|
||||
|
||||
Agency is a much bigger thing and delegation is a mechanism that supports it
|
||||
|
||||
I want my fiduciaries to know as much as possible of me (e.g. my doctor, my lawyer)
|
||||
|
||||
Model Agency as hierarchy and delegation is the mean to have it.
|
||||
|
||||
* [...]
|
||||
|
||||
* [Why you know less about Guardianship than you think (because we ALL know less about Guardianship than we think)](https://iiw.idcommons.net/20L/_Why_you_know_less_about_Guardianship_than_you_think_(because_we_ALL_know_less_about_Guardianship_than_we_think)) by Jo Spencer, John Phillips, Sterre den Breeijen
|
||||
|
||||
Link to the deck we’ll use to start the conversation: [https://docs.google.com/presentation/d/1aGTPmlno3WScpSYMs1HLhWsrVRx9B-I0yhOQsRgmqRw/edit?usp=sharing](https://docs.google.com/presentation/d/1aGTPmlno3WScpSYMs1HLhWsrVRx9B-I0yhOQsRgmqRw/edit?usp=sharing)
|
||||
|
||||
Do we need to get more people interested in the “real life” application of
|
||||
|
||||
Four groups of people at IIW conferences?
|
||||
|
||||
- Technologists
|
||||
- Idealists
|
||||
- Pragmatists
|
||||
- Entrepreneurs
|
||||
1. In 2019 the Sovrin Foundation published a whitepaper on Guardianship; transitioned into the Working Group
|
||||
2. APAC and NA/EMEA WG meetings
|
||||
3. 2 key documents from the WG are going to be published by Sovrin Foundation - [https://sovrin.org/a-deeper-understanding-of-implementing-guardianship/](https://sovrin.org/a-deeper-understanding-of-implementing-guardianship/)
|
||||
4. Implementation guidelines
|
||||
5. Technical requirements
|
||||
6. Why are we looking at Guardianship and SSI?
|
||||
7. Guardianship is a part of life - we are rarely fully self-sovereign or independent
|
||||
8. Guardianship is not a part of SSI at this moment - is a missing ingredient in our digital lives
|
||||
9. The group thought guardianship was a simple concept
|
||||
10. Small set of SSI building blocks …
|
||||
11. Gap between use cases and requirements was too broad (see slides)
|
||||
12. A mental model for guardianship was required (see IIW30 and IIW31 for further context)
|
||||
13. ‘Squiggle’ - the journey
|
||||
14. 5 things the team worked out
|
||||
15. Jurisdictions are essential (gives meaning to the guardianship relation)
|
||||
16. Should work with existing laws
|
||||
17. Guardianship can be built on verifiable credentials
|
||||
18. Build a mental model (and test it) - 15 functional requirements, 6 technical requirements, 3 validator requirements
|
||||
19. Don’t build guardianship solely on wallets (mitigate the risk of wallet takeover and impersonation)
|
||||
20. Transparent vs Opaque guardianship scenario
|
||||
21. 5 things to consider
|
||||
22. Should discovery be enabled
|
||||
23. Ensuring appropriate representation
|
||||
24. Receiving parties are key
|
||||
25. Balancing agency, dignity and care
|
||||
26. Transitions : recovery, expiry and ends
|
||||
27. Alignment with SSI and ToIP
|
||||
28. Guardianship creates a tension between independence and dependence
|
||||
29. An obvious relationship with the ToIP (the ToIP model/diagram)
|
||||
30. Mapping concepts of Guardianship with the Trust Triangle diagram
|
||||
|
||||
---
|
||||
|
||||
31. Parties, Actors and Action pattern
|
||||
32. [https://essif-lab.pages.grnet.gr/framework/docs/notations-and-conventions](https://essif-lab.pages.grnet.gr/framework/docs/notations-and-conventions)
|
||||
33. [https://www.researchgate.net/publication/348325716_Decentralized_SSI_Governance_the_missing_link_in_automating_business_decisions](https://www.researchgate.net/publication/348325716_Decentralized_SSI_Governance_the_missing_link_in_automating_business_decisions)
|
||||
|
||||
* [What if the Credential Subject cannot be the Holder?](https://iiw.idcommons.net/20H/_What_if_the_Credential_Subject_cannot_be_the_Holder%3F) by Sam Curren
|
||||
|
||||
Quick intro outline: [https://hackmd.io/HhLGtxBPSeGpxtp30S5tOg](https://hackmd.io/HhLGtxBPSeGpxtp30S5tOg)
|
||||
|
||||
Where is the line at the limits of what a holder can hold?
|
||||
|
||||
How is user consent managed?
|
||||
|
||||
What are the protocols like?
|
||||
|
||||
How does this tie into OAuth, GNAP, etc?
|
||||
|
||||
How does this relate to DIDComm Credential Exchange Protocols and Secure Data Stores?
|
||||
|
||||
It’s possible that the intent of the law is not being met, if a provider refuses to share data on behalf of a user.
|
||||
|
||||
OpenID has a function for distributed claims that provide a URI and an access token for retrieval.
|
||||
|
||||
JWTs have AZP - The authorized presenter of a credential. The issuer may be the authorized presenter.
|
||||
|
||||
If the issuer wants to use existing protocols, a credential can be issued which functions as a ‘shadow’ of the main credential. Presenting the shadow credential provides consent for the verifier to ask for a presentation of the main credential from the issuer.
|
||||
|
||||
* [Identity Escrow - Accountability AND Privacy](https://iiw.idcommons.net/11I/_Identity_Escrow_-_Accountability_AND_Privacy) by Sam Curren, Ken Ebert, Suresh Batchu, Kiran Addepalli
|
||||
|
||||
1. Can the escrow hold the "Proof of the information" as opposed to the information itself.
|
||||
2. Mortgage Service - might seem to be an authorization to access the data directly or the issuer present directly.
|
||||
3. What gets put into escrow is flexible.
|
||||
4. Trigger event or a lockbox kind of capability. How is the claim released to relying parties? How does it eliminate mischief and false claims.
|
||||
5. There needs to be some accountability on the service provider to claim false releases. Automation may not be able to completely eliminate false triggers, some level of human intervention for complex cases.
|
||||
6. Contractual wrapper for
|
||||
7. Technical and legal framework for accountability.
|
||||
8. Don’t have data but key to unlock the escrow. So that no insider can unlock the data. Separating the data release from the encryption release would be better.
|
||||
9. It is better to hold proof of data. Because of the risk and liability, it can create incentives to escrow providers.
|
||||
10. We should chat about the CDDE (Community Distributed Data Escrow) that we have developed with UN, WEF, NYU Gov lab for data handling in disaster settings. Very related to this. Blind trust, etc. for self shielding.
|
||||
|
||||
* [...]
|
||||
|
||||
Links that came up during the call:
|
||||
|
||||
- [https://onlinelibrary.wiley.com/doi/abs/10.1111/j.1430-9134.2001.00173.x](https://onlinelibrary.wiley.com/doi/abs/10.1111/j.1430-9134.2001.00173.x)
|
||||
- [https://dhh1128.github.io/zkpcreds/trust-paradox-rebuttal.html](https://dhh1128.github.io/zkpcreds/trust-paradox-rebuttal.html)
|
||||
- Feedback loop into privacy law: [https://kantarainitiative.org/confluence/display/WA/Privacy+as+Expected%3A+UI+Signalling+a+Consent+Gateway+For+Human+Consent](https://kantarainitiative.org/confluence/display/WA/Privacy+as+Expected%3A+UI+Signalling+a+Consent+Gateway+For+Human+Consent)
|
||||
|
||||
* [https://link.springer.com/chapter/10.1007/978-3-540-45146-4_8](https://link.springer.com/chapter/10.1007/978-3-540-45146-4_8)
|
||||
|
||||
* [Let’s Go - Together!: Does international travel only ever involve independent adults?](https://trustoverip.org/blog/2021/11/24/lets-go-together/) ToIP 2021-11-24
|
||||
|
||||
Applying the developed models of guardianship, using the flexibility of Verifiable Credentials and the trusted mechanisms of sharing VCs, can provide the ability to add guardianship credentials into the travel process (or not) without breaking the existing approach and complicating the technical details defined in the Blueprint.
|
||||
|
||||
* [Delegatable Credentials Now Available](https://blog.dock.io/delegatable-credentials-now-available/)
|
||||
> An issuer may [grant delegation authority to another issuer](https://docknetwork.github.io/sdk/tutorials/concepts_private_delegation.html) simply by issuing them a vcdm credential. Let's say did:ex:a wants to grant delegation authority to did:ex:b. did:ex:a simply issues the credential saying that did:ex:b may make any claim.
|
||||
* [Common Delegation Patterns in the Verifiable Credential Ecosystem](https://kyledenhartog.com/delegation-in-verifiable-credentials/) Kyle Den Hartog
|
||||
|
||||
did you know that there are three ways in which you can utilize VCs and DIDs to enable delegation [...] look to the [ZCAP-LD data model](https://w3c-ccg.github.io/zcap-ld/) which is designed especially for these concepts. And if you’re still confused and would like some help please reach out and I can see how I can help.
|
@ -87,9 +87,6 @@ covers our work with DIF, Trust over IP, and attending Consensus 2022.
|
||||
* [A repository of JSON Schemas for Verifiable Credentials](https://github.com/rsksmart/vc-json-schemas)
|
||||
> The Credential Schema is a document that is used to guarantee the structure, and by
|
||||
|
||||
|
||||
|
||||
|
||||
### itheum
|
||||
* [5 Reasons Why Our NFMe ID is a Game Changer](https://itheum.medium.com/5-reasons-why-our-nfme-id-is-a-game-changer-6e07d704ebae) • [kabnItheum](https://www.itheum.io/)
|
||||
|
||||
|
@ -7,6 +7,7 @@ published: false
|
||||
> In today’s episode, we talk about his new book “Currency Cold War” and relationship, and lack thereof, between digital currency and identity.
|
||||
* [IPR - what is it? why does it matter?](https://identitywoman.net/ipr%e2%80%8a-%e2%80%8awhat-is-it-why-does-it-matter/)
|
||||
> At the time they kept worrying about how they could collaborate and they sensed that they needed to have IPR dealt with, but I couldn’t understand what they were going on about. This small thing delayed them working together for a long time. They literally had to spin up a new organization, get new bylaws developed and get everyone to join and sign off on the IPR regime before they could formally talk together about how to get all work to align and come up with one protocol.
|
||||
|
||||
* [Why do you care about identity?](https://wider.team/2022/01/18/phil-cares-about-identity/) Phil Wolff 2022-01-18
|
||||
|
||||
I love that it’s more than a technical discussion. It’s laws. Sociology. Politics and civics. Commerce. Psychology. Ethics. History. Economy. All the humanities.
|
||||
|
@ -8,6 +8,9 @@ published: false
|
||||
|
||||
In cross-border and migration contexts, digital wallets promise to have wide ranging implications for global governance, especially in identity management and finance. In this brief Margie Cheesman outlines use cases as well as concerns and risks when it comes to their adoption in the migration sector.
|
||||
|
||||
- Universal Wallet: [https://w3c-ccg.github.io/universal-wallet-interop-spec/](https://w3c-ccg.github.io/universal-wallet-interop-spec/)
|
||||
- Review/contribute to the draft spec (or portions you’re interested in): [https://docs.google.com/document/d/1vPqb4bJ6pfuAPYF_fMW_Lb-7GZugasWKfrSCotpuv6o/edit#](https://docs.google.com/document/d/1vPqb4bJ6pfuAPYF_fMW_Lb-7GZugasWKfrSCotpuv6o/edit#)
|
||||
|
||||
* [OKTA Cloud Identity Integration with SSI wallet](https://lists.w3.org/Archives/Public/public-credentials/2021Nov/0100.html) sethi shivam (Tuesday, 23 November)
|
||||
|
||||
I am successfully able to integrate Okta cloud identity with SSI agent .
|
||||
|
@ -819,9 +819,6 @@ A key opportunity Web3 presents in the identity space is the ability to interact
|
||||
Decentralizing access to blockchain APIs is a vital step to improve network uptime and importantly, give people sovereignty of their personal data.
|
||||
|
||||
|
||||
* [Dock’s Web3 ID Now Available on Auth0 Marketplace](https://blog.dock.io/docks-web3-id-now-available-on-auth0-marketplace/) Dock
|
||||
|
||||
Dock has partnered with Auth0, one of the world’s leading identity management companies. Auth0 has added the support for Dock’s Web3 IDs in their marketplace integration to enable Auth0’s enterprise customers to integrate Web3 IDs on their platforms.
|
||||
|
||||
## Ethereum Merge
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user