mirror of
https://github.com/Decentralized-ID/decentralized-id.github.io.git
synced 2024-10-01 01:05:54 -04:00
continue cleanup
This commit is contained in:
parent
7448f25c10
commit
6a0602c850
@ -1,35 +0,0 @@
|
|||||||
# IAM Companies
|
|
||||||
|
|
||||||
|
|
||||||
* [@open_measure](https://twitter.com/open_measure) · [44m](https://twitter.com/open_measure/status/1398540528090759170)
|
|
||||||
|
|
||||||
Our #IAM #VendorManagement database just exceeded the 100 entries threshold! There's still a lot of work but it shows already how the IAM #market is a vibrant, diverse, and innovative industry - find out more and contribute at [https://open-measure.atlassian.net/wiki/spaces/VEN/pages/195133452/Vendor+Database](https://open-measure.atlassian.net/wiki/spaces/VEN/pages/195133452/Vendor%2BDatabase)
|
|
||||||
|
|
||||||
|
|
||||||
### Identos
|
|
||||||
|
|
||||||
* [Identos builds Verifiable Credentials into updated federated digital ID API](https://www.biometricupdate.com/202209/identos-builds-verifiable-credentials-into-updated-federated-digital-id-api) Biometric Update
|
|
||||||
|
|
||||||
The new FPX Junction cloud software suite is designed for fine-grained API authorization and user-centric digital identity management. The digital wallet and user-managed access 2.0 authorization server work together to enable single-sign on federation. An optional user interface SDK for the digital wallet provides native mobile and web support.
|
|
||||||
* [IDENTOS puts developers first in its latest product release](https://www.identos.com/2022/09/07/identos-puts-developers-first-in-its-latest-product-release/)
|
|
||||||
|
|
||||||
FPX Junction is a cloud-based set of software products which provide fine-grained API authorization and user centric identity management capabilities.
|
|
||||||
|
|
||||||
Verifiable Credentials Support – Evolving to support Verifiable Credentials, FPX Junction includes an updated digital wallet API which enables the holding, receiving and presentation of [W3C Verifiable Credentials](https://www.w3.org/TR/vc-data-model/) using W3C Decentralized Identifiers. FPX Junction meets requirements for [Aries Interop Profile 2.0](https://aries-interop.info/aries-interop-intro.html) and [DIDComm](https://identity.foundation/didcomm-messaging/spec/) based credential exchanges.
|
|
||||||
|
|
||||||
### Forgerock
|
|
||||||
|
|
||||||
* [ForgeRock goes public](https://ludopoitou.com/2021/09/16/we-did-it/)
|
|
||||||
> Today is an huge milestone for ForgeRock. We are becoming a public company, with our stock publicly traded under the “FORG” symbol, at the New York Stock Exchange.
|
|
||||||
* [IAM 101 Series: What Are Directory Services?](https://www.forgerock.com/blog/iam-101-series-what-are-directory-services) Forgerock
|
|
||||||
|
|
||||||
### Ping
|
|
||||||
|
|
||||||
* [Ping to Target IAM Startups With New $50 Million Venture Fund](https://findbiometrics.com/ping-target-iam-startups-with-new-50-million-venture-fund-062205/)
|
|
||||||
|
|
||||||
That includes companies that are trying to prevent digital fraud, as well as companies that are engaged in identity verification and decentralized identity projects. However, the list is not exhaustive [...] [Allthenticate](https://www.allthenticate.com/) will be the recipient of its first investment.
|
|
||||||
|
|
||||||
* [Thoma Bravo to acquire Ping Identity for $2.8B](https://www.techtarget.com/searchsecurity/news/252523468/Thoma-Bravo-to-acquire-Ping-Identity-for-28B) TechTarget
|
|
||||||
|
|
||||||
* [Ping Identity to be Acquired by Thoma Bravo for $2.8 Billion](https://www.pingidentity.com/en/company/ping-newsroom/press-releases/2022/ping-identity-to-be-acquired-by-thoma-bravo-for-2-billion.html) Ping Identity
|
|
||||||
|
|
@ -1,36 +0,0 @@
|
|||||||
# Auth0
|
|
||||||
|
|
||||||
* [Auth0 Lab](https://twitter.com/Auth0Lab/status/1468974610058137604)
|
|
||||||
|
|
||||||
early experiment with Sign in With Ethereum + auth0
|
|
||||||
|
|
||||||
usernameless + passwordless auth
|
|
||||||
|
|
||||||
Support for [@MetaMask](https://twitter.com/MetaMask), walletlink
|
|
||||||
|
|
||||||
profile enriched with ENS + NFTs through [@graphprotocol](https://twitter.com/graphprotocol)
|
|
||||||
* [What Is an API? How APIs Work (for Non-Developers)](https://auth0.com/blog/what-is-an-api-how-apis-work-for-non-developers/) Auth0
|
|
||||||
|
|
||||||
Learn how APIs can accelerate software development and delivery.
|
|
||||||
|
|
||||||
* [How to Handle JWTs in Python](https://auth0.com/blog/how-to-handle-jwt-in-python/)
|
|
||||||
> JSON Web Tokens, or JWTs for short, are all over the web. They can be used to track bits of information about a user in a very compact way and can be used in APIs for authorization purposes. This post will cover what JSON Web Tokens are and how to create JWTs in Python using the most popular JWT library: [PyJWT](http://pyjwt.readthedocs.io/). We are also going to see how you can sign and verify JWTs in Python using asymmetric algorithms.
|
|
||||||
* [Auth0 Identity Platform Now Available on Microsoft Azure](https://auth0.com/blog/auth0-identity-platform-now-available-on-microsoft-azure/)
|
|
||||||
|
|
||||||
The addition of Azure as an Auth0 private cloud platform option unlocks a secure cloud deployment option for organizations seeking strategic fit with their technology stack, supporting regional data residency capabilities and higher control over customer data.
|
|
||||||
* [Sign-in with Decentralized Identifiers with Dock Labs](https://auth0.com/blog/sign-in-with-decentralized-identifiers-with-dock-labs/) Auth0
|
|
||||||
|
|
||||||
The DID and VC W3C standards are core building blocks to enable Decentralized Identity scenarios. [The Auth0 Lab team](https://twitter.com/Auth0Lab) has been following the space closely, and we're excited to support Dock with this important work.
|
|
||||||
* [Introducing the Identity Maturity Framework](https://auth0.com/blog/introducing-the-identity-maturity-framework/) Auth0
|
|
||||||
> we’ve consolidated our expertise and our customers’ knowledge and experiences into a solution we call the [Auth0 Identity Maturity Framework (IMF)](https://auth0.com/imf-form): a collection of tools, tactics, and expert input that will help you understand what’s working about your identity solution and what needs to change.
|
|
||||||
* [Building an Identity Solution — Quantity Doesn’t Equal Quality](https://auth0.com/blog/building-an-identity-solution-quantity-doesnt-equal-quality/) Auth0
|
|
||||||
|
|
||||||
Why adding more developers to an identity project doesn’t always work out as intended
|
|
||||||
|
|
||||||
* [Podcast] [Privacy-preserving measures and SD-JWT with Daniel Fett](https://identityunlocked.auth0.com/public/49/Identity%252C-Unlocked.--bed7fada/3bbcbab8) IdentityUnlocked Auth0
|
|
||||||
|
|
||||||
The discussion gets very concrete when Daniel describes selective disclosure JWT, or SD-JWT, a new IETF specification he is coauthoring that offers a simple and easy-to-adopt approach to produce JWTs capable of supporting selective disclosure. Here at Identity, Unlocked, we are huge fans of this new specification, and we hope this episode will help you get started!
|
|
||||||
|
|
||||||
* [State Identity Solutions: Build? Buy? Or Both?](https://auth0.com/blog/state-identity-solutions-build-buy-or-both/)
|
|
||||||
|
|
||||||
With a buyable solution like Auth0, state administrations are able to roll out digital services in days versus years for a custom-built in-house solution. The back-end of Auth0’s solutions are pre-built, allowing teams to customize quickly with low to no-code inputs from a development team to get a new release deployed faster.
|
|
@ -1,63 +0,0 @@
|
|||||||
# Okta
|
|
||||||
|
|
||||||
* [Okta + Auth0 Showcase 2021: Identity for All](https://auth0.com/blog/okta-auth0-showcase-2021-identity-for-all/)
|
|
||||||
> Together, Okta and Auth0 are reimagining identity’s role in every organization’s technology strategy. Cloud, mobile, and Bring Your Own Device (BYOD) have transformed the dynamics of the digital world over the past decade. At the same time, IT is struggling to keep up with all of these changes, and developers are more burdened than ever to build more applications quickly and without sacrificing security and user experience.
|
|
||||||
* [OKTA Identity Cloud Integration with SSI agent](https://medium.com/@sethisaab/okta-identity-cloud-integration-with-ssi-agent-ea1694a833cb) @sethisaab
|
|
||||||
> You will be able to learn how we can integrate existing centralized IDM solutions like Oracle Identity Cloud Service, OKTA identity Management, Sailpoint or Saviynt with SSI solutions like Hyperledger Aries, Spherity, or Trinsic to issue Verifiable credentials at the enterprise level as per business requirement.
|
|
||||||
* [Ping vs. Okta: Top 3 Indicators That You’ll Get the Customer Satisfaction You Deserve](https://www.pingidentity.com/en/company/blog/posts/2021/okta-vs-ping-cs.html)
|
|
||||||
> Some companies, like Ping, focus on being a long-term partner and are interested in understanding your identity and access management (IAM) challenges and implementing solutions to help improve your IAM journey. Others, like Okta, are interested in the short-term sale and may not always be there for you after the deal.
|
|
||||||
Otaka: [How to Authenticate with SAML in ASP.NET Core and C#](https://developer.okta.com/blog/2020/10/23/how-to-authenticate-with-saml-in-aspnet-core-and-csharp)
|
|
||||||
* [Okta + Auth0: Powering Identity for the Internet](https://www.okta.com/blog/2021/03/okta-auth0-powering-identity-for-the-internet/)
|
|
||||||
|
|
||||||
Today, we're taking a significant step forward — I'd go so far to call it a "leap" — to enhance the Okta Identity Cloud. We announced our agreement to join forces with Auth0, a leading identity platform for developers.
|
|
||||||
|
|
||||||
* [Okta Signs Definitive Agreement to Acquire Auth0](https://auth0.com/blog/okta-auth0-announcement/)
|
|
||||||
|
|
||||||
Auth0 will operate as an independent unit inside of Okta, and both platforms will be supported and invested in. As a result, organizations will have a wider breadth of identity solutions to fit their unique needs. Okta and Auth0’s comprehensive, complementary identity platforms are robust enough to serve the world’s largest organizations and flexible enough to address every identity use case, regardless of the audience or user.
|
|
||||||
* [Implement Client Credentials with Kong Konnect and Okta](https://developer.okta.com/blog/2021/05/25/client-credentials-kong-konnect)
|
|
||||||
> The OIDC plugin enables Kong, as the API gateway, to communicate with Okta via the OAuth/OIDC flows.
|
|
||||||
|
|
||||||
* [Beginners Guide to JWTs](https://developer.okta.com/blog/2020/12/21/beginners-guide-to-jwt)
|
|
||||||
> A JWT is a structured security token format used to encode JSON data. The main reason to use JWT is to exchange JSON data in a way that can be cryptographically verified. There are two types of JWTs:
|
|
||||||
> - JSON Web Signature (JWS)
|
|
||||||
> - JSON Web Encryption (JWE)
|
|
||||||
> The data in a JWS is public—meaning anyone with the token can read the data—whereas a JWE is encrypted and private. To read data contained within a JWE, you need both the token and a secret key.
|
|
||||||
* [Developers Guide to GPG and YubiKey](https://developer.okta.com/blog/2021/07/07/developers-guide-to-gpg) Okta
|
|
||||||
|
|
||||||
I’ll walk through configuring a YubiKey and highlight some of the things I’ve learned along the way.
|
|
||||||
* [Building and Securing a Go and Gin Web Application](https://developer.okta.com/blog/2021/02/17/building-and-securing-a-go-and-gin-web-application) Okta
|
|
||||||
> Today, we are going to build a simple web application that implements a to-do list. The backend will be written in Go. It will use the Go Gin Web Framework which implements a high-performance HTTP server. The front end will use the Vue.js JavaScript framework to implement a single page application (SPA). We will secure it using Okta
|
|
||||||
|
|
||||||
### Kuppinger Cole Comment: [Okta & Auth0](https://www.kuppingercole.com/blog/tolbert/okta-auth0)
|
|
||||||
|
|
||||||
Here are the strengths each has:
|
|
||||||
|
|
||||||
![https://www.notion.soimages/image1.png](https://www.notion.soimages/image1.png)
|
|
||||||
|
|
||||||
* [Why developer-first IAM ? And why Okta’s Auth0 acquisition matters?](https://medium.facilelogin.com/why-developer-first-iam-and-why-oktas-auth0-acquisition-matters-9fff3dde81) Prabath Siriwardena
|
|
||||||
|
|
||||||
Like Microsoft’s acquisition of GitHub for $7.5B in 2018, Okta’s acquisition of Auth0 for $6.5B is a win for developers!
|
|
||||||
|
|
||||||
### Auth0: [Our Commitment to You, Developers](https://auth0.com/blog/our-commitment-to-you-developers/)
|
|
||||||
|
|
||||||
Your Auth0 implementation will continue to receive the same support and services you have come to expect
|
|
||||||
|
|
||||||
* [Auth0 Names Jameeka Green Aaron as Chief Information Security Officer](https://auth0.com/blog/auth0-names-jameeka-green-aaron-as-chief-information-security-officer/)
|
|
||||||
|
|
||||||
Leadership change announced before acquisition
|
|
||||||
|
|
||||||
“In addition to the amazing roster of customers that puts their trust in Auth0 and fuels its growth, I was very much struck by the humanity of everyone I met with—a level of empathy that has been a rarity throughout my career,” said Aaron
|
|
||||||
* [Founders in Focus: Wayne Chang of Spruce](https://www.marketscreener.com/quote/stock/OKTA-INC-34515216/news/Founders-in-Focus-Wayne-Chang-of-Spruce-40101309/) Market Screener
|
|
||||||
> Each month we highlight one of the founders of Okta Ventures' portfolio companies. You'll get to know more about them and learn how they work with Okta.
|
|
||||||
* [Raising the Bar on Identity: One Year of Okta + Auth0](https://auth0.com/blog/raising-the-bar-on-identity-one-year-of-okta-auth0/)
|
|
||||||
> Today marks one year since Okta and Auth0 officially teamed up to lead together in the customer identity and access management (CIAM) market.
|
|
||||||
* [Vittorio @vibronet](https://threadreaderapp.com/thread/1521047438370299905.html) Auth0 via Twitter\Threaderapp (18 tweets, worth reading)
|
|
||||||
|
|
||||||
Yesterday I celebrated 4 years at [@auth0](https://twitter.com/auth0)... what an amazing ride!
|
|
||||||
|
|
||||||
Working here is an absolute dream, and joining forces with [@okta](https://twitter.com/okta) is a force multiplier 💪
|
|
||||||
|
|
||||||
Here's a🧵with a compilation of my favorite projects - the ones I can talk about in public anyway 😜
|
|
||||||
|
|
||||||
* [Okta CEO: Here’s where cloud identity management is headed](https://www.csoonline.com/article/3607350/okta-ceo-here-s-where-cloud-identity-management-is-headed.html) CSO
|
|
||||||
> CSO: Do you have an opinion on self-sovereign identity?McKinnon: I do. I think that it’s the future. We’ve got to get it done. The problem is: How does it get bootstrapped? How does it get useful in enough places so that enough people use it to make it useful? Where is it going to come from?
|
|
@ -1,76 +0,0 @@
|
|||||||
# evernym
|
|
||||||
|
|
||||||
* [Why we support EFF](https://www.evernym.com/blog/why-we-support-the-electronic-frontier-foundation/) Evernym
|
|
||||||
> Privacy gets too little emphasis from some participants in the decentralized identity movement. They claim to value confidential interactions, yet advocate that individuals create public decentralized identifiers (DIDs) on the blockchain (ignoring legal warnings about DIDs being PII). They are okay with “phone home” verifications of credentials and revocation and capabilities.
|
|
||||||
* [Evernym June Release notes](https://www.evernym.com/blog/june-2022-release-notes/)
|
|
||||||
|
|
||||||
we’ll be able to share more about our new work at Avast over the coming months. In the meantime, there are several great posts on the Avast blog that show the combined thinking of the Avast, Evernym, and SecureKey teams:
|
|
||||||
* [Introducing the Evernym Mobile SDK](https://www.evernym.com/blog/evernym-mobile-sdk/)
|
|
||||||
|
|
||||||
Today’s release was made possible with the help of many of our incredible customers who have participated in the product’s beta. It’s through your feedback that we’ve been able to iterate, refine, and ultimately launch a product that will help make self-sovereign identity more accessible to all.
|
|
||||||
* [Verity Flow: Evernym's no-code solution for issuing and verifying digital credentials](https://www.youtube.com/watch?v%3DNafQcqiyCJY) Evernym
|
|
||||||
|
|
||||||
* [Verifying credentials using Verity Flow](https://www.youtube.com/watch?v%3D9d2QMzw4bxY)
|
|
||||||
|
|
||||||
* [Creating a new verification flow in Verity Flow](https://www.youtube.com/watch?v%3DVYuoi_LMxiA)
|
|
||||||
|
|
||||||
|
|
||||||
* Evernym: [September 2021 Release Notes](https://www.evernym.com/blog/september-2021-release-notes/)
|
|
||||||
|
|
||||||
The most important changes are:
|
|
||||||
|
|
||||||
- A fee will be charged on a regular basis to remain an endorser on either MainNet or StagingNet.
|
|
||||||
- In addition to the endorser fee, write fees will now be charged for transactions on Sovrin StagingNet in a similar fashion to the existing fees on Sovrin MainNet.
|
|
||||||
- The current [Sovrin Self Serve website](https://selfserve.sovrin.org/) will stop being used to become an endorser on StagingNet, and instead endorsers will be charged a fee after registering.
|
|
||||||
|
|
||||||
|
|
||||||
* [Evernym: October 2021 Release Notes](https://www.evernym.com/blog/october-2021-release-notes/)
|
|
||||||
|
|
||||||
- [A new document verification feature in Connect.Me and our Mobile SDK](https://www.evernym.com/blog/october-2021-release-notes/%23IDV)
|
|
||||||
- [A new demo site to learn about self-sovereign identity and verifiable credentials](https://www.evernym.com/blog/october-2021-release-notes/%23tryconnectme)
|
|
||||||
- [Custom credential types in Verity Flow](https://www.evernym.com/blog/october-2021-release-notes/%23vflow)
|
|
||||||
- [Updated recommendation for securing Verity Webhooks](https://www.evernym.com/blog/october-2021-release-notes/%23webhooks)
|
|
||||||
- [A roundup of other updates, including the cheqd network and VDR Tools](https://www.evernym.com/blog/october-2021-release-notes/%23misc)
|
|
||||||
## Evernym joins Avast
|
|
||||||
|
|
||||||
* [Joining Forces with Avast](https://www.evernym.com/blog/joining-forces-with-avast/) Evernym
|
|
||||||
|
|
||||||
Joining forces with Avast represents the next step of our journey and an opportunity to bring the privacy, security, and trust benefits of decentralized identity to the entire world.
|
|
||||||
|
|
||||||
* [Avast to acquire Evernym](https://newsnreleases.com/2021/12/09/avast-to-acquire-evernym/) NewsNReleases \ Avast
|
|
||||||
|
|
||||||
Adding Evernym’s groundbreaking self-sovereign identity technology to our offering enables us to address this area and is a huge step forward in the realization of a digital world where decentralized, portable identities are available universally and globally.
|
|
||||||
|
|
||||||
* [Avast to Acquire Evernym: Consumer Cybersecurity Meets Decentralized Identity](https://www.kuppingercole.com/blog/bailey/avast-to-acquire-evernym-consumer-cybersecurity-meets-decentralized-identity) KuppingerCole
|
|
||||||
|
|
||||||
Avast’s product suite ranges from VPNs, antivirus, anti-tracking, monitoring of personal information potentially affected by data breaches, and so on. Evernym enables user-centric identity, where the individual user holds, controls, and shares their identity data in a privacy-preserving way.
|
|
||||||
|
|
||||||
* [Czech firm Avast acquiring self-sovereign identity pioneer Evernym](https://english.radio.cz/czech-firm-avast-acquiring-self-sovereign-identity-pioneer-evernym-8736279) Radio Pague International
|
|
||||||
|
|
||||||
Our vision for digital freedom is to enable people to manage and retain control over their personal data so that they can interact and transact safely, privately and with confidence. Decentralized digital identities are a key component of that vision
|
|
||||||
* [Avast To Acquire U.S.-based Self-sovereign Identity Pioneer Evernym](http://nasdaq.com/articles/avast-to-acquire-u.s.-based-self-sovereign-identity-pioneer-evernym) Nasdaq
|
|
||||||
* [Evernym Commits to Open Source](https://www.evernym.com/blog/evernym-commits-to-open-source/) “we’re doubling down on our commitment to open source by making the source code available for our commercial products with a binding commitment that they will be open source in three years”. They are using a [Business Source License](https://perens.com/2017/02/14/bsl-1-1/), which has some commercial restrictions, that eventually give way to open use.
|
|
||||||
* [Evernym Joins with Other Solution Providers to Achieve Interoperability Milestone](https://www.evernym.com/blog/evernym-joins-with-other-solution-providers-to-achieve-interoperability-milestone/)
|
|
||||||
|
|
||||||
* [Evernym’s Verity](https://www.evernym.com/products/%23verity) issuing to:
|
|
||||||
|
|
||||||
- [Trinsic Wallet](https://trinsic.id/trinsic-wallet/)
|
|
||||||
- [IBM Verify App](http://doc.ibmsecurity.verify-creds.com/whats_new/)
|
|
||||||
- [Lissi by Main Incubator](https://play.google.com/store/apps/details?id%3Dio.lissi.mobile)
|
|
||||||
- [esatus Wallet](https://self-ssi.com/en/%23walletc)
|
|
||||||
|
|
||||||
Evernym’s [Connect.Me](https://www.evernym.com/products/%23connectme) holding credentials issued from or proving to:
|
|
||||||
|
|
||||||
- [Aries Cloud Agent Python](https://github.com/hyperledger/aries-cloudagent-python)
|
|
||||||
- [Trinsic](https://trinsic.id/powerful-apis/)
|
|
||||||
- [IBM Security Verify](http://doc.ibmsecurity.verify-creds.com/whats_new/)
|
|
||||||
- [idRamp Passport](https://play.google.com/store/apps/details?id%3Dcom.idramp.passport%26hl%3Den_US)
|
|
||||||
- [esatus SeLF](https://self-ssi.com/en)
|
|
||||||
|
|
||||||
* [SSI Interop Video](https://youtu.be/1t9m-U-3lMk) NGIatlantic.eu
|
|
||||||
|
|
||||||
Results from an interoperability project in the are of Decentralized Identity, conducted by EU company Danube Tech and US company Digital Bazaar.
|
|
||||||
|
|
||||||
- Evernym’s [Verity](https://www.evernym.com/products/?#verity) is issuing to: [Trinsic Wallet](https://trinsic.id/trinsic-wallet/), [IBM Verify App](http://doc.ibmsecurity.verify-creds.com/whats_new/), [Lissi](https://play.google.com/store/apps/details?id=io.lissi.mobile) by Main Incubator, and [esatus Wallet](https://self-ssi.com/en/?#walletc).
|
|
||||||
- Evernym’s [Connect.Me](https://www.evernym.com/products/?#connectme) holding credentials issued from or proving to: [Aries Cloud Agent Python](https://github.com/hyperledger/aries-cloudagent-python), [Trinsic](https://trinsic.id/powerful-apis/), [IBM Security Verify](http://doc.ibmsecurity.verify-creds.com/whats_new/), [idRamp Passport](https://play.google.com/store/apps/details?id=com.idramp.passport&hl=en_US), [esatus SeLF](https://self-ssi.com/en).
|
|
||||||
|
|
@ -1,13 +0,0 @@
|
|||||||
# SecureKey Avast
|
|
||||||
|
|
||||||
* [SecureKey looks to the future by joining Avast](https://securekey.com/securekey-looks-to-the-future-by-joining-avast/)
|
|
||||||
|
|
||||||
* [Avast, a global leader in digital security and privacy, announced the acquisition of SecureKey](https://securekey.com/?securekey_pr%3Davast-to-acquire-securekey-technologies). Our expertise combined with the maturity and scalability of our services will allow our Canadian success story to expand globally and provide people around the world with safe and accessible means of authenticating their identities online while cementing SecureKey as a key provider of digital identity solutions.
|
|
||||||
|
|
||||||
* [Secure Key](https://www.youtube.com/user/SecureKeyTech) - Trust Block
|
|
||||||
* [Avast’s Charlie Walton wants you to Bring Your Own Identity](https://www.biometricupdate.com/202205/avasts-charlie-walton-wants-you-to-bring-your-own-identity) Biometric Update
|
|
||||||
|
|
||||||
What was a European security company doing buying a U.S.-based decentralized digital identity technology company? Could Avast bring the dream of decentralized identity to the masses? I sat down with Avast’s Senior Vice President and General Manager of Identity Charlie Walton to find out.
|
|
||||||
* [NortonLifeLock and Avast Merger Provisionally Approved](https://www.prnewswire.com/news-releases/nortonlifelock-and-avast-merger-provisionally-approved-301600277.html) PNNewswire
|
|
||||||
|
|
||||||
* [UK provisionally approves $8.1B NortonLifeLock-Avast merger, citing competition from Microsoft](https://techcrunch.com/2022/08/03/u-k-provisionally-approves-8-1b-nortonlifelock-avast-merger-citing-competition-from-microsoft/) TechCrunch
|
|
@ -1,7 +0,0 @@
|
|||||||
# Hedera Hashgraph
|
|
||||||
|
|
||||||
* [Meeco announced as Finnies 2021 finalist](https://blog.meeco.me/meeco-announced-as-finnies-2021-finalist/)
|
|
||||||
|
|
||||||
Meeco’s submission results from our work in collaboration with with [eftpos](https://www.eftposaustralia.com.au) and [Hedera Hashgraph](https://hedera.com/). The Australian payments giant eftpos recently announced joining the Hedera Governing Council after successfully conducting tests to determine the [feasibility of a digital Australian dollar stablecoin for micropayments](https://www.finextra.com/newsarticle/37360/australias-eftpos-to-set-up-hedera-hashgraph-node-for-micropayments). Meeco plays an important part in this world-leading initiative as the wallet provider for the proof-of-technology.
|
|
||||||
* [Hedera Hashgraph Joins World Wide Web Consortium (W3C)](https://hedera.com/blog/hedera-hashgraph-joins-world-wide-web-consortium-w3c-new-did-method-published-by-w3c-credentials-community-group)
|
|
||||||
> We welcome Hedera as a contributing member to the W3C DID Working Group and congratulate their team for reaching this milestone of a published implementation of the latest W3C DID Identifiers v1.0 draft,” said Ivan Herman
|
|
@ -1,19 +0,0 @@
|
|||||||
# US SSI Startups
|
|
||||||
- DocK
|
|
||||||
- Anonoyome
|
|
||||||
- Gatca
|
|
||||||
- GlboalID
|
|
||||||
- Hyland
|
|
||||||
- Magic
|
|
||||||
- IDRamp
|
|
||||||
- Indicio
|
|
||||||
- UNUM
|
|
||||||
- Animo
|
|
||||||
- Liquid Avatar
|
|
||||||
- Hedera
|
|
||||||
- IOTA
|
|
||||||
- Trinsic
|
|
||||||
- Transmute
|
|
||||||
- Spruce
|
|
||||||
- MATTR
|
|
||||||
- Disco.xyz
|
|
@ -1,21 +0,0 @@
|
|||||||
# Animo
|
|
||||||
|
|
||||||
* [@AnastasiaU · Apr 25](https://twitter.com/AnastasiaU/status/1518568893970894848)
|
|
||||||
|
|
||||||
8/ Animo ([@AnimoSolutions](https://twitter.com/AnimoSolutions) is DID/VC provider working on systems and infrastructure for SSI. They built this Aries CLI so you can play around and create invitations, schemas, and credentials.
|
|
||||||
|
|
||||||
* [https://agent-cli.animo.id/](https://agent-cli.animo.id/)
|
|
||||||
* [https://demo.animo.id/](https://demo.animo.id/)
|
|
||||||
|
|
||||||
It allows people to experience SSI first-hand by choosing a character and 'playing' through their unique use cases. The student can enrol in college, visit a club or join a gym, while the business woman can attend a conference and check into a hotel for example. It was built with Aries Framework JavaScript's REST API and supports the Lissi and the Trinsic wallet
|
|
||||||
8/ Animo ([@AnimoSolutions](https://twitter.com/AnimoSolutions) is DID/VC provider working on systems and infrastructure for SSI. They built this Aries CLI so you can play around and create invitations, schemas, and credentials.
|
|
||||||
|
|
||||||
* [https://agent-cli.animo.id/](https://agent-cli.animo.id/)
|
|
||||||
|
|
||||||
* [Why the SSI community should embrace million dollar apes](https://medium.com/coinmonks/why-the-ssi-community-should-embrace-million-dollar-apes-61d119f20331)* [BBS+ Credential Exchange in Hyperledger Aries](https://iiw.idcommons.net/11E/_BBS%252B_Credential_Exchange_in_Hyperledger_Aries) [[presentation](https://iiw.animo.id)]
|
|
||||||
* [Advanced DIDComm Messaging](https://github.com/WebOfTrustInfo/rwot11-the-hague/blob/master/advance-readings/advanced-didcomm-messaging.md) By: Karim Stekelenburg (Animo Solutions) -- karim@animo.id Date: 18-07-2022 Version: 0.1
|
|
||||||
> in order for DIDComm to provide a potential replacement for commonly used chat protocols like WhatsApp (Extensible Messaging and Presence Protocol (XMPP)), Telegram (MTProto), or Signal (Signal Protocol), it needs to support modern chat features we use everyday
|
|
||||||
* [BBS+ Signatures 2020](https://w3c-ccg.github.io/ldp-bbs2020/)
|
|
||||||
|
|
||||||
- What’s next for BBS+ LD-Proofs?
|
|
||||||
- Implementation in Aries ([https://iiw.animo.id/](https://iiw.animo.id/), Used in SVIP Plugfest
|
|
@ -1,34 +0,0 @@
|
|||||||
# Anonoyome - MySudo
|
|
||||||
|
|
||||||
* [Auto-Generating Language-Specific Wrappers for Rust Libraries](https://iiw.idcommons.net/22E/_Auto-Generating_Language-Specific_Wrappers_for_Rust_Libraries) by Steve McCown
|
|
||||||
|
|
||||||
Rust, FFI, Code generation, language bindings, UDL
|
|
||||||
|
|
||||||
- Implementation of FFI that makes it easy to call Rust code
|
|
||||||
- Define API contracts using UDL
|
|
||||||
- Generates language specific code that’s idiomatic to the language used
|
|
||||||
- Tutorial documentation and source code: [https://github.com/sudoplatform-labs/ffi-tutorials](https://github.com/sudoplatform-labs/ffi-tutorials)
|
|
||||||
- Slides: [https://docs.google.com/presentation/d/183cn6NyrMUJLdid8-IoKmPZjVslmp4X0UvYIQvyeSBU/edit#slide=id.p1](https://docs.google.com/presentation/d/183cn6NyrMUJLdid8-IoKmPZjVslmp4X0UvYIQvyeSBU/edit%23slide%3Did.p1)
|
|
||||||
* [How We Test Our Android Code at Anonyome Labs](https://anonyome.com/2021/08/insight-how-we-test-our-android-code-at-anonyome-labs/)
|
|
||||||
|
|
||||||
At Anonyome Labs we value well-written code that has good tests. This is a guide on how we go about producing useful and meaningful tests for our Android code. Testing approach: SDK or app?
|
|
||||||
- [We’ve Introduced the Sudo Platform Decentralized Identity Relay](https://anonyome.com/2022/06/weve-introduced-the-sudo-platform-decentralized-identity-relay/)
|
|
||||||
* [Whitepaper – Innovating Identity and Access Management with Decentralized Identity](https://anonyome.com/2022/08/whitepaper-innovating-identity-and-access-management-with-decentralized-identity/)
|
|
||||||
* [Dr Paul Ashley Presents on How to Solve the Privacy Problem](https://anonyome.com/2021/05/dr-paul-ashley-presents-on-how-to-solve-the-privacy-problem/) Anonyome
|
|
||||||
|
|
||||||
For Engineers Australia, Paul covered three big questions:
|
|
||||||
|
|
||||||
1. WHY we created [Anonyome Labs](https://anonyome.com/about/)
|
|
||||||
2. HOW we can solve the [global data privacy crisis](https://mysudo.com/2020/12/how-bad-is-the-global-data-privacy-crisis/)
|
|
||||||
3. WHAT we’ve built.
|
|
||||||
* [Anonyome Labs Listed in IAPP Privacy Tech Vendor Report 2021](https://anonyome.com/2021/06/anonyome-labs-listed-in-iapp-privacy-tech-vendor-report-2021/)
|
|
||||||
> Anonyome Labs joins 355 other qualified organizations in the 2021 compendium of privacy tech vendors. This is a significant increase from the 44 vendors listed in the inaugural report in 2017. The number of priv tech categories is also higher in 2021: now 11 categories split across two groups — Privacy program management and Enterprise privacy management.
|
|
||||||
* [Part 5: How Anonyome Labs is Actively Contributing to Decentralized Identity Development](https://anonyome.com/2022/05/part-5-how-anonyome-labs-is-actively-contributing-to-decentralized-identity-development/)
|
|
||||||
|
|
||||||
If you’re a long-time reader of this blog, you’ll know that Anonyome Labs supports the ongoing development of decentralized identity through:
|
|
||||||
|
|
||||||
- Products – building decentralized identity capabilities in the [Sudo Platform](https://sudoplatform.com/), which enterprises can leverage
|
|
||||||
- Utilities – helping to run three decentralized identity-focused blockchains
|
|
||||||
- Standards – being an active contributor to the decentralized identity standards area
|
|
||||||
- Open Source – contributing source code back to the decentralized identity open source community.
|
|
||||||
|
|
@ -1,27 +0,0 @@
|
|||||||
# Bonifii - Was CuLedger
|
|
||||||
|
|
||||||
|
|
||||||
* [Bonifii and Entersekt Announce New Context-Aware Authentication Solution for Credit Unions](https://bonifii.com/2022/04/bonifii-and-entersekt-announce-new-context-aware-authentication-solution-for-credit-unions/)
|
|
||||||
> Bonifii and Entersekt today announced a new partnership bringing context-aware authentication technology to credit unions through MemberPass Express, powered by Entersekt. MemberPass is the first KYC-compliant member-controlled digital identity issued by credit union cooperatives.
|
|
||||||
* [Equifax Launches Digital Identity as a Service](https://bonifii.com/2021/10/equifax-launches-digital-identity-as-a-service/) CU Ledger
|
|
||||||
> Equifax Digital Identity as a Service gives credit union members more control over their information and will help to facilitate faster and easier user experiences for previously onboarded users. Functionality from Equifax’s suite of identity protection products including [Digital Identity Trust](https://www.equifax.com/business/digital-authentication/), Document Verification and the recently acquired [Kount Identity Trust Global Network](https://linkprotect.cudasvc.com/url?a%3Dhttps%253a%252f%252fkount.com%252f%26c%3DE,1,P0Lh3syJAhSnb3ckebQ1p8C29xvkkJ94klUQn8bpJ0Dl1XUoFwXkyPWAlTmWqD3i3bv6IWqRyqfz7_JzzpwIpG4zrWtxyIfflytpAkuFg7nn_Q,,%26typo%3D1) are incorporated into the new holistic solution.
|
|
||||||
* [Liquid Avatar Technologies and Bonifii Make VCs Accessible for People and Financial Institutions in the Metaverse](https://bonifii.com/2021/11/liquid-avatar-technologies-and-bonifii-make-verifiable-credentials-accessible-for-people-and-financial-institutions-in-the-metaverse/) Bonifii
|
|
||||||
> “The metaverse and Web 3.0 are here, and we are building the infrastructure to manage how we’re going to live, work, and play in the intersection of the real and the digital,” said Heather Dahl, CEO of Indico. “Bonifii and Liquid Avatar get it, they’re on it and we’re excited to help them realize their vision.“
|
|
||||||
* [Bonfii announces partnership with Finclusive](https://bonifii.com/2021/11/credit-union-digital-identity-provider-bonifii-announces-new-partnership-with-finclusive/) CU Ledger
|
|
||||||
|
|
||||||
FinClusive’s AML/KYC capabilities create verified identity credentials that will be incorporated into MemberPass – Bonifii’s digital identity solution for Credit Unions Through this partnership, U.S. Credit Union members can now establish and maintain verifiable digital identities that enable safe, secure, and touchless experiences for many credit union service
|
|
||||||
* [How Credit Unions Use Verifiable Credentials with Members with John Ainsworth](https://northernblock.io/how-credit-unions-use-verifiable-credentials-with-members/) Northern Block
|
|
||||||
|
|
||||||
Learn how Bonifii is using Verifiable Credentials as a Digital Transformation mechanism for Credit Unions to Increase Engagement with their Members. John Ainsworth explains how they are revolutionizing how Credit Unions say “hello” to a member.
|
|
||||||
* [Bonifii increases financial inclusion with GlobaliD digital wallet and Indicio Network](https://bonifii.com/2021/10/bonifii-increases-financial-inclusion-with-globalid-digital-wallet-and-indicio-network/)
|
|
||||||
|
|
||||||
CULedger is now [Bonifii](https://bonifii.com/)! Delivering a trusted peer-to-peer services network of verifiable exchange for financial cooperatives.
|
|
||||||
* [Liquid Avatar Technologies and Bonifii Make Verifiable Credentials Accessible for People and Financial Institutions in the Metaverse](https://www.yahoo.com/now/liquid-avatar-technologies-bonifii-verifiable-133000234.html)
|
|
||||||
|
|
||||||
Oasis Digital Studios ("Oasis"), Bonifii will make its verifiable credential available for players in the game [Aftermath Islands](https://pr.report/KAodixO3) and facilitate in-game financial transactions in the same, privacy-preserving way real world customers use the Bonifii credential. This collaboration in the metaverse breaks new ground in the emerging digital experiences of Web 3.0.
|
|
||||||
|
|
||||||
* [Bonifii increases financial inclusion with GlobaliD digital wallet and Indicio Network](https://bonifii.com/2021/10/bonifii-increases-financial-inclusion-with-globalid-digital-wallet-and-indicio-network/)
|
|
||||||
|
|
||||||
CULedger is now [Bonifii](https://bonifii.com/)! Delivering a trusted peer-to-peer services network of verifiable exchange for financial cooperatives.
|
|
||||||
* [Liquid Avatar Technologies and Bonifii Make VCs Accessible for People and Financial Institutions in the Metaverse](https://bonifii.com/2021/11/liquid-avatar-technologies-and-bonifii-make-verifiable-credentials-accessible-for-people-and-financial-institutions-in-the-metaverse/) Bonifii
|
|
||||||
> “The metaverse and Web 3.0 are here, and we are building the infrastructure to manage how we’re going to live, work, and play in the intersection of the real and the digital,” said Heather Dahl, CEO of Indico. “Bonifii and Liquid Avatar get it, they’re on it and we’re excited to help them realize their vision.“
|
|
@ -1,11 +0,0 @@
|
|||||||
# Disco XYZ
|
|
||||||
|
|
||||||
* [The W3C’s Credentials Community is hosting a session on NFTs and Identity](https://lists.w3.org/Archives/Public/public-credentials/2022Apr/0049.html). 4/12 [9am PST](https://meet.w3c-ccg.org/weekly)
|
|
||||||
> There has been an explosion of interest in using NFT for identity, along with exploring how they could work with or support DIDs and VCs. Simone Ravaioli, Taylor Kendal and Heather Vescent have invited Evin Mcmullen of [Disco.xyz](https://www.disco.xyz/), Elina Cadouri of [Dock](https://www.dock.io/), Stepan Gershuni of [Affinidi](https://www.affinidi.com/) / [DeepSkills](https://www.deepskills.io/), and Dominik Beron of [Walt.id](https://walt.id/) to share their perspective on NFT identity and where it may overlap with DIDs and VCs
|
|
||||||
|
|
||||||
* [The Social Web3 | Protocols for a Digital Society | POAP, Lens Protocol, Disco.XYZ](http://podcast.banklesshq.com/the-social-web3-protocols-for-a-digital-society-poap-lens-protocol-discoxyz) Bankless
|
|
||||||
|
|
||||||
Web3 social media? Decentralized identity? Digital society in the metaverse? On this episode, we unpack the future social world in the metaverse and the protocols that will help shape it.
|
|
||||||
Real World Party! making DIDs and VCs cool & useful
|
|
||||||
|
|
||||||
* [DISCO](http://www.disco.xyz/) had a real life [Disconaut](https://twitter.com/provenauthority/status/1533469483263610885) party in Los Angeles! Kaliya attended with her Data BackPack where she verified the credentials created the day before proving i owned my twitter account and my discord account. ([photos from party](https://twitter.com/humptycalderon/status/1533607866577215488)
|
|
@ -1,40 +0,0 @@
|
|||||||
# DOCK
|
|
||||||
|
|
||||||
* [Welcome to Dock’s API - Testnet Sandbox](https://blog.dock.io/welcome-to-docks-api-testnet-sandbox/)
|
|
||||||
|
|
||||||
You can test our API in the sandbox testnet by simply switching the toggle to test mode. To get started; create a free account, log into your dashboard and acquire your API key.
|
|
||||||
|
|
||||||
* [Create Verifiable Credentials Without Writing a Single Line of Code](https://blog.dock.io/verifiable-credentials-without-code/) Dock
|
|
||||||
|
|
||||||
* [Dock DIDs Now Support Multiple Key Pairs](https://blog.dock.io/dids-multikey-support/) Dock
|
|
||||||
|
|
||||||
- Keys can be given different capabilities using Verification Relationships
|
|
||||||
- We support 4 Verification Relationships: Authentication, Assertion, Key Agreement, and Capability Invocation.
|
|
||||||
- DIDs can now be controlled by other DIDs
|
|
||||||
- DIDs can now have service endpoints
|
|
||||||
- Dock now supports off-chain DID Documents
|
|
||||||
* [Web3 ID - Privacy-preserving user verification for Web3](https://www.dock.io/web3id) Dock
|
|
||||||
> Web3 ID is a blockchain-based Authentication and Authorization system that puts user privacy first. Developers can grant access and verify end-user eligibility by requesting private data from users' non-custodial identity wallet apps. Always with the users’ consent.
|
|
||||||
* [New Mobile Dock Wallet Release: Users Can Create and Manage Decentralized Identifiers (DIDs)](https://blog.dock.io/dock-wallet-did-management/) Dock
|
|
||||||
> With the Dock Wallet, users can securely create, export, import, edit, delete, and copy/share their DIDs. The wallet enables users to fully own, control, and manage their credentials that are issued as Verifiable Credentials such as a university degree or government ID.
|
|
||||||
* [Dock To Release Verifiable Credentials API](https://blog.dock.io/dock-to-release-verifiable-credentials-api/)
|
|
||||||
> In Dock’s case, partners are looking to access blockchain solutions for the creation of decentralized identities and the issuance and management of verifiable credentials.
|
|
||||||
>
|
|
||||||
> These development teams can of course spend time learning new concepts, but learning curves can be a barrier to adoption whereas fast and less complex integrations are certainly preferred by organizations. For these reasons, Dock is going to be making some of the network’s features available via an API, which is in effect a HTTP wrapper of our [SDK](https://github.com/docknetwork/sdk).
|
|
||||||
* [Dock Partners with Digital Credentialing Platform Xertify](https://blog.dock.io/dock-partners-with-digital-credentialing-platform-xertify/)
|
|
||||||
> By partnering with Dock, Xertify ensures that credentials they issue are W3C-compliant, universally verifiable, and cryptographically secured.Xertify has significant traction with clients in various industries including education, health, automotive, veterinary, and agriculture.
|
|
||||||
>
|
|
||||||
> In addition, Xertify is working on a solution for Covid vaccine credentials to be deployed in Colombia and Mexico.
|
|
||||||
* [@docknetwork](https://twitter.com/docknetwork)
|
|
||||||
> Check out this video demo that shows how claim deduction, facial recognition, and #verifiablecredentials can be used together to verify a person's age and eliminates the need for manual checks:
|
|
||||||
* [Dock claim deduction demo](https://www.youtube.com/watch?v%3D8bZwkqqQju4%26t%3D6s)
|
|
||||||
> Andrew Dirksen, one of Dock’s core developers, walks you through a demo that shows how claim deduction, facial recognition, and verifiable credentials can be used together to cryptographically verify a person's age, eliminating the need for manual checks
|
|
||||||
* [Certs: Now Available as a Self-Guided Demo](https://blog.dock.io/certs-now-available-as-a-self-guided-demo/) Dock
|
|
||||||
> Curious about what you can build on Dock? Try for yourself!
|
|
||||||
* [Issue Hundreds of Credentials in Minutes with Dock Certs](https://blog.dock.io/bulk-issuance-issue-hundreds-of-verifiable-credentials-in-minutes/) Dock
|
|
||||||
> Bulk Issuance supports high customer volumes by bulk issuing verifiable credentials in batches of 100+. Simply import a CSV file and issue verifiable credentials within minutes, averaging 1 credential being issued every second.
|
|
||||||
* [Beta Test of the First W3C Compliant Credentials Management App](https://blog.dock.io/beta-test-of-the-credentials-management-app/) Dock
|
|
||||||
> The benefits of owning and storing your own credentials are unmatched by today’s standards. Dock’s Wallet App will allow users to store and manage their verifiable credentials from their mobile devices.
|
|
||||||
* [Exposing Bad Actors Who Hide Behind Anonymity With Traceable Credentials](https://blog.dock.io/exposing-bad-actors-behind-anonymity-with-traceable-credentials/) Dock
|
|
||||||
> Traceable credentials are a way of instilling that layer of privacy but allow the relevant authorities to ‘unwind’ that layer of privacy and identify those bad actors. We do this through verifiable encryption.
|
|
||||||
|
|
@ -1,33 +0,0 @@
|
|||||||
# Gataca
|
|
||||||
|
|
||||||
* [Jose San Juan, GATACA: “blockchain technology has become the protagonist of the world we live in”](https://cybernews.com/security/jose-san-juan-gataca-blockchain-technology-has-become-the-protagonist-of-the-world-we-live-in/) Cybernews
|
|
||||||
|
|
||||||
For the past 4 years, GATACA has focused the majority of its efforts on building an interoperable, secure, and user-friendly product for the European region. We not only plan to continue to focus on the needs of our clients and regulatory, as well as standardization demands from the market but to take our SSI tech to the next level.
|
|
||||||
|
|
||||||
* [SSI Essentials: Everything you need to know about Decentralized Identity](https://gataca.io/blog/ssi-essentials-everything-you-need-to-know-about-decentralized-identity/) Gataca
|
|
||||||
|
|
||||||
Solving the identity paradox: the tradeoff between privacy, security, & user experience
|
|
||||||
- [Verifier Universal Interface by Gataca España S.L.](https://www.gataca.io/)
|
|
||||||
|
|
||||||
* [Verifier Universal Interface by Gataca España S.L.](https://essif-lab.eu/verifier-universal-interface-by-gataca-espana-s-l/)
|
|
||||||
> This draft version can be found at [https://gataca-io.github.io/verifier-apis/](https://gataca-io.github.io/verifier-apis/) and has been built using ReSpec.
|
|
||||||
> This draft version for VUI includes today 6 APIs:
|
|
||||||
>
|
|
||||||
> - Presentation Exchange
|
|
||||||
> - Consent Management
|
|
||||||
> - Schema resolution
|
|
||||||
> - Issuer resolution
|
|
||||||
> - ID resolution
|
|
||||||
> - Credential status resolution
|
|
||||||
|
|
||||||
* [Congrats to the 11 wallet providers for being conformant to @EU_EBSI](https://mobile.twitter.com/IgrantIo/status/1532036324882104321/photo/1) @IgrantIo
|
|
||||||
|
|
||||||
We are glad to be among the first few along with [@ValidatedID](https://mobile.twitter.com/ValidatedID) [@danube](https://mobile.twitter.com/danube) [@GATACA_ID](https://mobile.twitter.com/GATACA_ID) [@walt_id](https://mobile.twitter.com/walt_id) [@DXCTechnology](https://mobile.twitter.com/DXCTechnology) [@CIMEA_Naric](https://mobile.twitter.com/CIMEA_Naric) [@identyum](https://mobile.twitter.com/identyum) [@ThalesDigiSec](https://mobile.twitter.com/ThalesDigiSec) [@posteitaliane](https://mobile.twitter.com/posteitaliane)
|
|
||||||
* [GATACA joins EU Commission’s Early Adopters Program as SSI provider in the Spanish group](https://gataca.io/insights/gataca-joins-the-european-commission-s-early-adopters-program-as-the-ssi-technology-provider-in-the-spanish-group)
|
|
||||||
> In Spain, three universities will pioneer the issuance of digital Academic Diplomas. The issuance will be performed 100% online, where students will authenticate themselves using a digital ID previously issued by FNMT (the Royal Mint of Spain) and stored in their mobile wallets.
|
|
||||||
* [Decentralized Finance & Self-sovereign Identity: A tale of decentralization, a new paradigm of trust](https://gataca.io/insights/decentralized-finance-self-sovereign-identity-a-tale-of-decentralization-a-new-paradigm-of-trust)
|
|
||||||
> We are aware that DeFi’s growth is explosive and inevitable yet its growth needs to be sustainable and responsible. This can be done with SSI.
|
|
||||||
|
|
||||||
* [This is how GATACA achieves blockchain interoperability](https://gataca.io/blog/this-is-how-gataca-achieves-blockchain-interoperability)
|
|
||||||
|
|
||||||
blockchain agnosticism is possible due to our DID registry component: all incoming activity is delegated to the DID registry with specific connections to each blockchain so that the rest of our technology components do not have to participate in the process. Other components need not know where the information persists from; they delegate that special knowledge to the DID registry and continue to perform their regular activities as usual.
|
|
@ -1,57 +0,0 @@
|
|||||||
# GlobalID
|
|
||||||
|
|
||||||
* [GlobalID Introduces Trustees for Key Recovery](https://medium.com/global-id/introducing-globalid-trustees-account-recovery-without-a-private-key-66142a21cba6)
|
|
||||||
> Trustees can be friends or family members from your contact list. Once selected, each Trustee is granted a shard of your private key. Restoring your lost Identity requires approval from the majority of your Trustees.
|
|
||||||
* [GlobaliD connects to the Indicio Network](https://medium.com/global-id/globalid-connects-to-the-indicio-network-2ad5688d72fd)
|
|
||||||
> The Indicio Network will enable the issuance and verification of credentials on the GlobaliD platform and in the app, allowing individuals to port their credentials for authentication and authorization into any participating use case scenario — including vaccine passports.
|
|
||||||
* [Introducing PRIVATE](https://medium.com/global-id/introducing-private-65fce62c6a8e) Calvin Burrows GlobalID
|
|
||||||
|
|
||||||
PRIVATE is a new technical framework developed in collaboration with AnChain.AI that carves out a path toward regulatory compliance for non-custodial wallets while preserving user privacy. (PRIVATE stands for Privacy Preservation through Resolution of Identity via Verification and Attestation for Travel Rule CompliancE)
|
|
||||||
* [Building a more inclusive and equitable future](https://medium.com/global-id/building-a-more-inclusive-and-equitable-future-745f897a2c2b) GlobalID
|
|
||||||
|
|
||||||
When we [first launched the GlobaliD Wallet](https://medium.com/global-id/globalid-app-introducing-the-wallet-87870843dc1b) powered by Uphold back in June of 2020, the goal was clear. Our vision has always been that anyone, anywhere should be able to create and own their [self-sovereign digital identity](https://medium.com/global-id/why-self-sovereign-identity-matters-8fd2c982ca2e). And along with that identity, they should get a wallet, providing them access to basic financial services.
|
|
||||||
* [Telling our story with the new GlobaliD website](https://medium.com/global-id/episode-20-telling-our-story-with-the-new-globalid-website-c38278b3e14c) GlobalID
|
|
||||||
|
|
||||||
about the brand new GlobaliD website and how it contextualizes our role in the world of digital identity while allowing us to tell our story more effectively.
|
|
||||||
|
|
||||||
* [Making decentralized identity mainstream w Heather Dahl and Ken Ebert (Indicio)](https://medium.com/global-id/episode-19-making-decentralized-identity-mainstream-1d9d8734a14f) GlobalID
|
|
||||||
|
|
||||||
how new identity-based technology can help people, governments and companies develop greater digital trust in a modern society.
|
|
||||||
|
|
||||||
* [Everyone will have an ID wallet](https://medium.com/global-id/episode-18-everyone-will-have-an-id-wallet-da5ac358ad60) GlobalID
|
|
||||||
|
|
||||||
how ID wallets work within the digital identity ecosystem, briefly explains the trust triangle, and previews the GlobaliD Wallet which will be released later this year
|
|
||||||
|
|
||||||
* [Understanding GlobaliD’s identity platform](https://medium.com/global-id/episode-09-understanding-globalids-identity-platform-b241a63ff5e0)
|
|
||||||
> within the context of a self-sovereign identity that means that i as the holder of that Credential i'm the only one that gets to decide who gets to see it which is a pretty wild concept
|
|
||||||
* [The future of COVID credentials on GlobaliD](https://medium.com/global-id/the-future-of-covid-credentials-on-globalid-7a19a882cf90)
|
|
||||||
|
|
||||||
With our new platform, we’ll also be releasing a brand new COVID credential. Users will be able to validate the authenticity of their digital vaccine record from around the world and store the proof of the validation as a credential in their GlobaliD app.
|
|
||||||
* [Why self-sovereign identity matters](https://medium.com/global-id/why-self-sovereign-identity-matters-8fd2c982ca2e) GlobalID
|
|
||||||
|
|
||||||
your digital identity represents you as a unique real-life person in a secure digital format. In fact, we likely have many different virtual identities across a spectrum of platforms and services.
|
|
||||||
* [How to decentralize identity and empower individuals](https://medium.com/global-id/episode-10-how-to-decentralize-identity-and-empower-individuals-3e154612a85) GID
|
|
||||||
|
|
||||||
If the internet decentralized information and crypto decentralized money and payments, then verifiable credentials will decentralize identity. In this episode, we chat with Dev Bharel, the software architect leading the charge around verifiable credentials at GlobaliD.
|
|
||||||
* [The Sovereignty Stack: Re-thinking Digital Identity for Web3.0 w/ Greg KIDD [METACO TALKS #23]](https://www.youtube.com/watch?v%3DCyGggZ2pT1I)
|
|
||||||
|
|
||||||
Greg is a serial entrepreneur who is probably best known for founding and taking public Dispatch Management Services Corp, the world’s largest on demand dispatch network for urgent deliveries. In a highly interesting career so far, Greg was also Chief Risk Officer at Ripple Labs and a senior analyst for the Board of Governors of the Federal Reserve in Washington. In his latest venture Global ID, Greg is acting on his long-held belief that people’s identity should be truly portable and owned by individuals themselves rather than corporations or governments.
|
|
||||||
* [GlobaliD 101: What is the trust triangle?](https://medium.com/global-id/globalid-101-what-is-the-trust-triangle-260e85e1c640)
|
|
||||||
- [GlobaliD 101: ID wallets](https://medium.com/global-id/globalid-101-id-wallets-68fa77e6d0d7) GlobalID
|
|
||||||
|
|
||||||
● [GlobaliD 101: Bring Your Own Identity](https://medium.com/global-id/globalid-101-bring-your-own-identity-5b9927008190)
|
|
||||||
|
|
||||||
● [Part 1:](https://medium.com/global-id/globalid-101-how-digital-identity-should-work-fc53ede7b86f) What a smart and humanistic approach to digital identity would like
|
|
||||||
|
|
||||||
● [Part 2:](https://medium.com/global-id/globalid-101-what-is-the-trust-triangle-260e85e1c640) The Trust Triangle — the system of issuers, holders, and verifiers that illustrates how identity works (and how it’s broken, today)
|
|
||||||
|
|
||||||
● [Part 3:](https://medium.com/global-id/globalid-101-id-wallets-68fa77e6d0d7) Why the ID Wallet is the first step toward achieving a new vision for digital identity
|
|
||||||
|
|
||||||
● [Part 4](https://medium.com/global-id/globalid-101-every-company-is-an-identity-company-a851beed999d): Why every company is an identity company
|
|
||||||
|
|
||||||
* [...]
|
|
||||||
|
|
||||||
There is a real opportunity to combine technology that is being developed with the concept of BYO Identity that will create a new identity framework where you own and control your data.
|
|
||||||
* [GlobaliD 101: Device-based identity](https://medium.com/global-id/globalid-101-device-based-identity-c6096a5b0890)
|
|
||||||
|
|
||||||
That way, your sensitive personal data is stored locally on your own device rather than hosted on some company’s server that becomes a target for hackers.
|
|
@ -1,51 +0,0 @@
|
|||||||
# IDRamp
|
|
||||||
|
|
||||||
|
|
||||||
* [Lessons From the School of Cyber Hard Knocks Podcast](https://idramp.com/school-of-cyber-hard-knocks-podcast-mike-vesey-pink-locker-rooms/) IDRamp
|
|
||||||
|
|
||||||
> Passwords and zero-trust and pink locker rooms, oh my! In this episode, Mike discusses IdRamp, what self-sovereign identity is, why we still have passwords today, zero-trust, what the near future holds, pink locker rooms!, his path to IdRamp, and as always, his toughest lesson learned.
|
|
||||||
* [IdRamp CEO Mike Vesey: Pink Locker Rooms](https://idramp.com/school-of-cyber-hard-knocks-podcast-mike-vesey-pink-locker-rooms/) School of Cyber Hard Knocks
|
|
||||||
> Passwords and zero-trust and pink locker rooms, oh my! In this episode, Mike discusses IdRamp, what self-sovereign identity is, why we still have passwords today, zero-trust, what the near future holds, pink locker rooms!, his path to IdRamp, and as always, his toughest lesson learned.
|
|
||||||
* [IdRamp partners with the Lifelong Learner Project to win the ACE Blockchain Innovation Challenge](https://idramp.com/idramp-partners-with-the-lifelong-learner-project-to-win-the-ace-blockchain-innovation-challenge/)
|
|
||||||
> Lifelong Learner Project is proud to announce its selection as a recipient of the first phase of the Blockchain Innovation Challenge, a competition funded by the U.S. Department of Education to identify ways in which blockchain technology can provide social mobility and equitable access to economic opportunity.
|
|
||||||
>
|
|
||||||
> Companies involved include, RANDA Solutions, ETS, Digital Promise, University Instructors, The Utah State BOE, BlockFrame Inc. IdRamp, Evernym, Velocity Career Network, Fluree, Crocus, IMS Global Learning Consortium, Credential Engine.
|
|
||||||
* [Trust Stamp and IdRamp Team Up for New Identity Platform](https://findbiometrics.com/trust-stamp-idramp-team-up-new-identity-platform-051901/) FindBiometrics
|
|
||||||
> a new multi-factor authentication platform that combines Trust Stamp’s [selfie-based Biometric MFA solution](https://mobileidworld.com/trust-stamp-replaces-otps-with-new-biometric-mfa-solution-042906/) with IdRamp’s no-code authentication infrastructure.
|
|
||||||
>
|
|
||||||
> The joint offering will make it easier for organizations to provide a more consistent authentication experience across all of their systems.
|
|
||||||
* [Orchestrate your identity management strategy](https://idramp.com/orchestrate-your-identity-management-strategy/) IDRamp
|
|
||||||
> It’s time to stop buying expensive bridges to Failureland. It’s time to shift our perspective on identity management away from what clearly doesn’t work and won’t work and instead, employ technologies that make the systems we have work better. It is time to focus on the technologies that simplify identity management, can be easily integrated, and provide a path to evolution at a pace and cost that meet business and government needs.
|
|
||||||
* [Zero Trust & Decentralized Identity Podcast](https://idramp.com/zero-trust-decentralized-identity-podcast/) IDRamp
|
|
||||||
> They explore low-code/no-code orchestration services, what to consider when making long-term complex identity decisions, and what the US is doing to protect Americans from sophisticated cyber threats after the White House issued Executive Order 14028 on Improving the Nation’s Cybersecurity.
|
|
||||||
New Companies we aren’t sure about:
|
|
||||||
* [Press Release](https://idramp.com/trust-stamp-partners-with-idramp-to-transform-multi-factor-biometric-authentication/) IDRamp & IDRamp
|
|
||||||
> Trust Stamp (Nasdaq: IDAI, Euronext Growth: AIID ID), the Privacy-First Identity CompanyTM providing AI-powered trust and identity services used globally across multiple sectors, announces a partnership with IdRamp, a leader in decentralized identity orchestration products and services. Together, they will launch an innovative biometric multi-factor authentication (“MFA”) offering that can be augmented with a range of leading access management, social sign-on, and bring-your-own identity services, all through IdRamp’s no-code platform.
|
|
||||||
* [Passwordless Credential Orchestration Manager is Now Available in the Oracle Cloud Marketplace](https://idramp.com/idramp-passwordless-credential-orchestration-manager-is-now-available-in-the-oracle-cloud-marketplace/) idRamp
|
|
||||||
> This new service offers password elimination, identity proofing, and orchestration capabilities for any Oracle ecosystem.
|
|
||||||
* [IdRamp Identity Solutions – Reality 2.0 Podcast](https://idramp.com/idramp-and-identity-solutions-reality-2-0-podcast/)
|
|
||||||
|
|
||||||
Doc Searls and Katherine Druckman talk to Mike Vesey, CEO of IdRamp, about verifiable credentials, decentralization, and real-world identity solutions.
|
|
||||||
* [IdRamp and QiqoChat Announce Verifiable Credentials for Online Collaboration](https://talkcmo.com/news/idramp-and-qiqochat-announce-verifiable-credentials-for-online-collaboration/)
|
|
||||||
|
|
||||||
QiqoChat has really stepped up in this time of need to provide an incredible online event user-experience, enabling a re-creation of the IIW experience throughout our Covid travel restrictions. This week they announced the launch of a Verifiable Credentials integration with the QiqoChat platform.
|
|
||||||
|
|
||||||
> The community of professionals working on data privacy & consumer protection has been an early adopter of QiqoChat. During regional and global conferences, they have used the platform to share ideas and deliberate about the future of user-centric identity. Through these conferences, we’ve learned how solutions like IdRamp can be tremendously empowering for Internet users.
|
|
||||||
* [21 Industry leaders from five continents join Indicio Network consortium to drive global adoption of decentralized identity](https://indicio.tech/blog/21-industry-leaders-from-five-continents-join-indicio-network-consortium-to-drive-global-adoption-of-decentralized-identity/)
|
|
||||||
|
|
||||||
* [GlobaliD](https://global.id/), USA; [Uphold](https://uphold.com/), Portugal; [ID Ramp](https://idramp.com/), USA; [Cynjatech](https://www.cynja.com/), USA; [Finclusive](https://finclusive.com/), USA; [Xertify](https://xertify.co/), Colombia; [Snowbridge Inc.](https://www.snowbridge.se/), Taiwan; Entrustient, USA; [Bot Ventures, Inc](https://botventures.io/)., Canada; [BlockSpaces](https://blockspaces.io/), USA; [Blockster Labs](https://blockster.global/), [Anonyome Labs](https://anonyome.com/), Australia; [Selfd.id](https://selfd.id/), Romania; [Liquid Avatar Technologies](https://liquidavatar.com/), Canada; [Snapper Future Tech](https://snapperfuturetech.com/), India; [Lorica Identity](https://loricaidentity.com/), USA; [BizSecure](https://bizsecure.com/), USA; [Networks Synergy](https://www.synergy.kz/), Kazakhstan; Absolutely Zero Cyber, USA; [Cysecure](https://cysecure.us/), USA; [VERSES Labs](https://www.verses.io/), USA
|
|
||||||
* [Hyperledger Forum Recap – Identity Proofing, and Passwordless User-friendly Digital Identity](https://idramp.com/hyperledger-forum-recap-identity-proofing-and-passwordless-user-friendly-digital-identity/)
|
|
||||||
|
|
||||||
IdRamp presented with Oracle at [Hyperledger Global Forum](https://events.linuxfoundation.org/hyperledger-global-forum/) June 2021. The event focused on enterprise use of blockchain technologies using the 15 projects that fall under the Hyperledger “greenhouse”. Keynotes and speakers shared their insights on the current state of enterprise blockchain adoption across several hot topics including central bank digital currencies (CBDCs), non fungible tokens (NFTs), and most importantly– identity.
|
|
||||||
|
|
||||||
* [IdRamp and QiqoChat Announce Verifiable Credentials for Online Collaboration](https://talkcmo.com/news/idramp-and-qiqochat-announce-verifiable-credentials-for-online-collaboration/)
|
|
||||||
|
|
||||||
QiqoChat has really stepped up in this time of need to provide an incredible online event user-experience, enabling a re-creation of the IIW experience throughout our Covid travel restrictions. This week they announced the launch of a Verifiable Credentials integration with the QiqoChat platform.
|
|
||||||
|
|
||||||
> The community of professionals working on data privacy & consumer protection has been an early adopter of QiqoChat. During regional and global conferences, they have used the platform to share ideas and deliberate about the future of user-centric identity. Through these conferences, we’ve learned how solutions like IdRamp can be tremendously empowering for Internet users.
|
|
||||||
* [Node Operator Spotlight: IdRamp](https://indicio.tech/node-operator-spotlight-idramp/) Indicio
|
|
||||||
|
|
||||||
Recently we caught up with Karl Kneis, COO of IdRamp, and Eric Vinton, Chief Business Officer of IdRamp, one of the first companies to become an Indicio Node Operator, to discuss their current projects, some goals for the future, and where they think decentralized identity is heading.
|
|
||||||
* [IDRamp partners with Indicio.Tech](https://idramp.com/idramp-offers-market-ready-decentralized-identity-platform-on-the-indicio-network/)
|
|
||||||
|
|
||||||
This is an interesting announcement with two companies partnering together to create new SSI services for the companies the work with.
|
|
@ -1,123 +0,0 @@
|
|||||||
# Indicio Tech
|
|
||||||
|
|
||||||
* [Machine Readable Governance is the Key to Scaling Decentralized Trust](https://indicio.tech/where-do-you-put-a-trust-registry-in-a-decentralized-digital-ecosystem-not-where-it-turns-into-a-wrench/) Indicio
|
|
||||||
> We’re not convinced that “constraint” is the right theoretical approach for an emerging technology, especially one that is being deployed in different sectors for different use cases. To underscore this, we want to address a particular constraint implied by ToIP’s design concepts that is likely to be fatal to any deployment.
|
|
||||||
* [Indicio Tech: Why we converted to a public benefit corporation](https://indicio.tech/blog/because-decentralized-identity-can-make-life-better-why-we-converted-to-a-public-benefit-corporation/)
|
|
||||||
> The idea of a benefit corporation begins with long-simmering dissatisfaction in the argument that the only responsibility or duty a company had was to increase its profits, a claim that had been forcefully made by University of Chicago economist Milton Friedman in the New York Times magazine in 1970.
|
|
||||||
* [21 Industry leaders from five continents join Indicio Network consortium to drive global adoption of decentralized identity](https://indicio.tech/blog/21-industry-leaders-from-five-continents-join-indicio-network-consortium-to-drive-global-adoption-of-decentralized-identity/)
|
|
||||||
|
|
||||||
* [GlobaliD](https://global.id/), USA; [Uphold](https://uphold.com/), Portugal; [ID Ramp](https://idramp.com/), USA; [Cynjatech](https://www.cynja.com/), USA; [Finclusive](https://finclusive.com/), USA; [Xertify](https://xertify.co/), Colombia; [Snowbridge Inc.](https://www.snowbridge.se/), Taiwan; Entrustient, USA; [Bot Ventures, Inc](https://botventures.io/)., Canada; [BlockSpaces](https://blockspaces.io/), USA; [Blockster Labs](https://blockster.global/), [Anonyome Labs](https://anonyome.com/), Australia; [Selfd.id](https://selfd.id/), Romania; [Liquid Avatar Technologies](https://liquidavatar.com/), Canada; [Snapper Future Tech](https://snapperfuturetech.com/), India; [Lorica Identity](https://loricaidentity.com/), USA; [BizSecure](https://bizsecure.com/), USA; [Networks Synergy](https://www.synergy.kz/), Kazakhstan; Absolutely Zero Cyber, USA; [Cysecure](https://cysecure.us/), USA; [VERSES Labs](https://www.verses.io/), USA
|
|
||||||
|
|
||||||
* [One woman’s open-source journey to decentralized identity](https://indicio.tech/blog/one-womans-open-source-journey-to-decentralized-identity-with-the-help-of-indicio-tech/) Indicio
|
|
||||||
> Noha Abuaesh, a Bahrain-based computer scientist, has been exploring decentralized identity for the last year, often with assistance from Indicio.tech’s open-source tools and free communications channels.
|
|
||||||
|
|
||||||
* [Indicio expands workshops and introduces a new certification program](https://indicio.tech/blog/indicio-expands-decentralized-identity-workshops-and-introduces-new-certification-program/)
|
|
||||||
|
|
||||||
Looking to get up to speed in decentralized digital identity and verifiable credentials? Our custom trainings and workshops are designed to provide key insights into fundamental use cases, dive deep into the impact of the technology, and offer both technical and nontechnical audiences the opportunity to ask the questions they need to continue their education in decentralized identity. Because nothing beats learning by doing.
|
|
||||||
* [SITA, Indicio pave way to safer travel experience with launch of Aruba Health App](https://www.sita.aero/pressroom/news-releases/sita-indicio-pave-way-to-safer-travel-experience-with-launch-of-aruba-health-app/)
|
|
||||||
|
|
||||||
SITA, together with [Indicio.tech](https://indicio.tech/) and the Aruba Health Department, are trialing the Aruba Health App, a pilot that makes it easy for visitors to share a trusted traveler credential – based on their health status – privately and securely on their mobile device. This credential will provide access to participating hospitality sites on the island.
|
|
||||||
* [Node Operator Spotlight: IdRamp](https://indicio.tech/node-operator-spotlight-idramp/) Indicio
|
|
||||||
|
|
||||||
Recently we caught up with Karl Kneis, COO of IdRamp, and Eric Vinton, Chief Business Officer of IdRamp, one of the first companies to become an Indicio Node Operator, to discuss their current projects, some goals for the future, and where they think decentralized identity is heading.
|
|
||||||
|
|
||||||
* [Indicio Named Finalist in IDC’s Inaugural Best in Future of Digital Infrastructure North America Awards](https://indicio.tech/indicio-named-finalist-in-idcs-inaugural-best-in-future-of-digital-infrastructure-north-america-awards/)
|
|
||||||
|
|
||||||
The finalists have effectively used digital infrastructure across on-prem, edge and public cloud platforms to transform their most important business processes and to launch new digital business innovations. They are to be congratulated for their vision and industry leadership!
|
|
||||||
* [Indicio.Tech Incorporates as a Public Benefit Corporation](https://indicio.tech/blog/indicio-becomes-a-public-benefit-corporation/)
|
|
||||||
> Indicio joins companies such as Patagonia and Kickstarter in embracing a corporate model that aligns shareholders and stakeholders around a shared mission to deliver a material benefit to society, not only through products and services and how they are made and delivered, but through prioritizing the welfare of employees, diversity and inclusion, and environmental impact.
|
|
||||||
|
|
||||||
* [IDRamp partners with Indicio.Tech](https://idramp.com/idramp-offers-market-ready-decentralized-identity-platform-on-the-indicio-network/)
|
|
||||||
|
|
||||||
This is an interesting announcement with two companies partnering together to create new SSI services for the companies the work with.
|
|
||||||
* [The Perfect Signature Style is the Enemy of the One that Works Today](https://indicio.tech/the-perfect-signature-style-is-the-enemy-of-the-one-that-works-today/) Indicio
|
|
||||||
> BBS+ signature styles are not going to be ready for deployment anytime soon. This is precisely why you should build today and in a way that allows you to add them later.
|
|
||||||
|
|
||||||
### Indicio Network
|
|
||||||
|
|
||||||
* [The Lissi wallet supports the Indicio Network](https://lissi-id.medium.com/the-lissi-wallet-supports-the-indicio-network-e2247f895d39)
|
|
||||||
> we are committed to not only provide individuals with the choice of their favourite wallet, but also organisations with the choice of their network. We are delighted to announce that the latest version of the Lissi wallet also supports the Indicio Network.
|
|
||||||
>
|
|
||||||
> Indicio.tech created the Indicio Network to meet the needs of companies and organizations that want a reliable and robust network to build, test, demo, and launch their identity solutions
|
|
||||||
|
|
||||||
* [Indicio named by New York VC Network in their list of the most exciting early-stage teams](https://indicio.tech/indicio-named-by-new-york-vc-network-in-their-list-of-the-most-exciting-early-stage-teams/)
|
|
||||||
|
|
||||||
Indicio is proud to have been named by [New York VC Network](https://www.vcnet.nyc/) in their recently compiled list of the most exciting early-stage teams that they’ll be following closely this year!
|
|
||||||
|
|
||||||
* [Node Operator Spotlight: Anonyome](https://indicio.tech/node-operator-spotlight-anonyome/) Indicio
|
|
||||||
|
|
||||||
Each of the capabilities of the Sudo Platform is attached to a persona. This includes masked email and masked credit cards, private telephony, private and compartmentalized browsing (with ad/tracker blocker and site reputation), VPN, password management, decentralized identity and more.
|
|
||||||
* [GlobaliD connects to the Indicio Network](https://medium.com/global-id/globalid-connects-to-the-indicio-network-2ad5688d72fd)
|
|
||||||
> The Indicio Network will enable the issuance and verification of credentials on the GlobaliD platform and in the app, allowing individuals to port their credentials for authentication and authorization into any participating use case scenario — including vaccine passports.
|
|
||||||
* [Privatyze collaborates with Indicio to build a decentralized data marketplace](https://indicio.tech/privatyze-collaborates-with-indicio-to-build-a-decentralized-data-marketplace/) Indicio
|
|
||||||
|
|
||||||
“In a data-driven economy, we need a marketplace for data that’s inclusive and not exploitative,” said Heather Dahl, CEO of Indicio. “That means that participants can meaningfully consent to data transactions and do so in a way that enables zero-trust security. This just isn’t possible without decentralized solutions, and we are excited to work with Privatyze on building this solution.
|
|
||||||
* [Indicio’s Associateships: A starting point for the next generation of professionals](https://indicio.tech/indicios-associateships-a-starting-point-for-the-next-generation-of-professionals/)
|
|
||||||
|
|
||||||
Learning new skills in a new industry and technology is always good for growth, both personally and professionally. It’s particularly important for those in college to be able dip their toes into different worlds off campus and get a sense of the kind of work they want—or don’t want—to pursue in life.
|
|
||||||
* [How to Create a Trusted Digital World](https://indicio.tech/how-to-create-a-trusted-digital-world/) Indicio Tech
|
|
||||||
|
|
||||||
We’ve completed what we set out to do two years ago: finish the technology’s foundation and create a full, open source ecosystem around it. You can issue, share, and verify data through verifiable digital credentials today. You can layer this on top of your existing identity and access management systems now.
|
|
||||||
|
|
||||||
* [What Indicio’s Seed Funding Means for Decentralized Identity Technology](https://indicio.tech/what-indicios-seed-funding-means-for-decentralized-identity-technology/) Indicio
|
|
||||||
|
|
||||||
Our [new funding](https://apnews.com/press-release/accesswire/technology-business-4dbf651613d76693bc479321f7b041f5) will be used to refine the open-source, decentralized-identity technology stack. We have the basic technology for a functional ecosystem, now we improve that functionality by adding all the features, user interfaces, and management tools that make it easier to deploy, use, and monitor.* [Indicio Launches Proven, A Complete Trusted Digital Ecosystem For Sharing Actionable, Trustworthy Data](https://www.accesswire.com/viewarticle.aspx?id%3D708970)
|
|
||||||
|
|
||||||
"Indicio Proven is how you get actionable data without sacrificing privacy or security," said Heather Dahl, CEO of Indicio. "What makes data actionable is that it can be trusted. You can prove its source. You can prove it hasn't been faked or tampered with. Decentralized identity has long been seen as the solution to the interconnected problems of verification, privacy, and security. With Indicio Proven, the marketplace now has a range of ready-to-use products to implement that solution and create Trusted Digital Ecosystems for sharing and verifying data at any scale."
|
|
||||||
* [Indicio launches blockchain-enabled network for identity](https://indicio.tech/blog/indicio-launches-blockchain-enabled-network-for-identity/)
|
|
||||||
> “Our clients asked for a stable, fully-staffed network based on Hyperledger Indy— one that could provide the Service Level Agreements their customers need for mission-critical workloads,” said Heather Dahl, CEO of Indicio. “Today, we are excited to announce that this MainNet is open for business.”
|
|
||||||
>
|
|
||||||
> “This is the network we need to accelerate adoption of passwordless zero trust ecosystems for enterprise customers” said Mike Vesey, President of [IdRamp](https://idramp.com), a leader in decentralized identity and a Genesis Node Operator on the Network.
|
|
||||||
* [Become a Node Operator](https://indicio.tech/blog/be-a-part-of-the-most-dynamic-network-community-in-decentralized-identity/) Indicio
|
|
||||||
> we’ve seen a rapid rise in demand for robust, stable, and professionally maintained networks to support decentralized identity solutions. It’s not a surprise: decentralized identity’s moment has arrived. That’s why we’ve been hard at work creating Hyperledger Indy networks upon which developers all over the world are building, testing, and launching their solutions.
|
|
||||||
* [Indicio completes Hyperledger Indy DID Method—A Milestone in the Evolution of DID Interop](https://indicio.tech/indicio-completes-hyperledger-indy-did-method-a-milestone-in-the-evolution-of-decentralized-identity-network-interoperability/)
|
|
||||||
|
|
||||||
The Indy DID Method paves the way for Hyperledger Indy credentials to scale globally by allowing Indy networks to seamlessly interoperate and create a “network-of-networks” effect.
|
|
||||||
|
|
||||||
* [Prove it all with Indicio Proven](https://indicio.tech/prove-it-all-with-indicio-proven/) Indicio
|
|
||||||
|
|
||||||
Sometimes called “self-sovereign identity,” or “user-centric identity,” or “reusable identity,” the open source technology behind Proven provides an authoritative way to authenticate any data without having to check in with the source of that data — or go through a third party.
|
|
||||||
* [Indicio Insights with Bullet ID and Verio ID](https://www.youtube.com/watch?v%3DYApp77o0qH4)
|
|
||||||
|
|
||||||
Literally doing ID management for bullets! Wow.
|
|
||||||
|
|
||||||
we sit down with Cristian Talle of Bullet ID to discuss the interesting technology they have created to improve the current systems for tracking bullets.
|
|
||||||
|
|
||||||
* [Making decentralized identity mainstream w Heather Dahl and Ken Ebert (Indicio)](https://medium.com/global-id/episode-19-making-decentralized-identity-mainstream-1d9d8734a14f) GlobalID
|
|
||||||
|
|
||||||
how new identity-based technology can help people, governments and companies develop greater digital trust in a modern society.
|
|
||||||
|
|
||||||
* [Finalist for CRN Social Impact Award](https://indicio.tech/the-crn-tech-impact-awards/) Indicio
|
|
||||||
|
|
||||||
Indicio worked with SITA and the Aruban government to develop a decentralized identity solution for managing Covid testing and vaccination for travelers to the tourism-dependent island.
|
|
||||||
|
|
||||||
|
|
||||||
## Code
|
|
||||||
|
|
||||||
* [Why the Indicio TestNet is the Best Way to Explore Decentralized Identity](https://indicio.tech/why-the-indicio-testnet-is-the-best-way-to-explore-decentralized-identity/)
|
|
||||||
|
|
||||||
Indicio Thought Leadership
|
|
||||||
* [Introducing the Indicio DemoNet—a new decentralized network for product demonstration](https://indicio.tech/blog/introducing-the-indicio-demonet-a-new-decentralized-network-for-product-demonstration/) Indicio
|
|
||||||
|
|
||||||
The Indicio DemoNet joins the [Indicio TestNet](https://indicio.tech/indicio-testnet/), which is used for developing new technology releases, and the [Indicio MainNet](https://indicio.tech/indicio-mainnet/), which hosts mission-critical products and services. With the DemoNet, Indicio now provides a full suite of networks for decentralized identity development and deployment.
|
|
||||||
* [Scale Your Decentralized Identity Solution by Upgrading to the Indy DID Method](https://indicio.tech/scale-your-decentralized-identity-solution-by-upgrading-to-the-indy-did-method/) Indicio
|
|
||||||
|
|
||||||
Again, the Indy DID Method is not an optional upgrade. It’s a major development that delivers interoperability.
|
|
||||||
* [Identity Blockchains and Energy Consumption](https://indicio.tech/identity-blockchains-and-energy-consumption/) Indicio
|
|
||||||
A decentralized network using a blockchain-based distributed ledger means you can use [Peer DIDs](https://identity.foundation/peer-did-method-spec/) to move most “transactions” and their cryptographic proofing off ledger. This means that for those peer-to-peer interactions, identity blockchains don’t need to do any ledger transactions at all.
|
|
||||||
* [Houston we have a Problem – An Identity Problem in the Oil and Gas industry](https://www.youtube.com/watch?v%3DIat3GYRyfpE) Indicio
|
|
||||||
> - President Biden’s cybersecurity executive order
|
|
||||||
> - The security landscape for global enterprises
|
|
||||||
> - Decentralized identity, what it is and how it fortifies existing data infrastructure
|
|
||||||
> - Case study: applying zero trust and decentralized identity to energy
|
|
||||||
* [Decentralized Identity opens the doors for safe travel and tourism](https://indicio.tech/blog/decentralized-identity-opens-the-doors-for-safe-travel-and-tourism/) Indicio
|
|
||||||
|
|
||||||
Machine readable governance enabled businesses and venues to trust that tourists had been tested on arrival by Aruba’s health department. Visitors using the digital Aruba Happy Traveler Card could be swiftly and reliably verified with a phone app. This freed both businesses and the government from the burden of mechanically collecting data with the attendant risk of error or fraud.
|
|
||||||
|
|
||||||
* [Paving the way to safer travel](https://indicio.tech/blog/paving-the-way-to-safer-travel/) Indicio
|
|
||||||
* [Bonifii increases financial inclusion with GlobaliD digital wallet and Indicio Network](https://bonifii.com/2021/10/bonifii-increases-financial-inclusion-with-globalid-digital-wallet-and-indicio-network/)
|
|
||||||
|
|
||||||
CULedger is now [Bonifii](https://bonifii.com/)! Delivering a trusted peer-to-peer services network of verifiable exchange for financial cooperatives.
|
|
||||||
* [Trust Registry or Machine-Readable Governance?](https://indicio.tech/trust-registry-or-machine-readable-governance/) Indicio Tech
|
|
||||||
|
|
||||||
The world will move towards decentralized identity if we make it easy for them to do so—and easy means, above all, fast. The solution is machine readable governance—a smart way of implementing rules for how to manage trust.
|
|
@ -1,22 +0,0 @@
|
|||||||
# IOTA
|
|
||||||
|
|
||||||
|
|
||||||
* [IOTA DID - Alpha Release for Rust & Javascript](https://blog.iota.org/releasing-iota-identity-alpha-a-standard-framework-for-digital-identity-cebabd108b4f) of a standard framework for digital identity, based upon the W3C standards for DID decentralized identifiers and Verifiable Credentials, including the [full Rust implementation and Web Assembly bindings](https://github.com/iotaledger/identity.rs/).
|
|
||||||
* [IOTA and TradeMark East Africa partner to improve infrastructure & trade through technology](https://www.youtube.com/watch?v%3DbnAfclXTaeI)
|
|
||||||
|
|
||||||
The Trade Logistics Information Pipeline (TLIP) aims to create an interconnectivity technology highway for Eastern African businesses and governments’ agencies systems to communicate in a transparent and secure manner amongst themselves and with international counterparts.
|
|
||||||
|
|
||||||
|
|
||||||
* [Selv identity wallet](https://github.com/iotaledger/selv-mobile)
|
|
||||||
* [IOTA Identity Experience Team](https://github.com/iota-community/X-Team_IOTA_Identity)
|
|
||||||
|
|
||||||
* [Introduction to Decentralized Identity](https://wiki.iota.org/identity.rs/decentralized_identity) IOTA Wiki
|
|
||||||
|
|
||||||
* [Selv identity wallet](https://github.com/iotaledger/selv-mobile)
|
|
||||||
|
|
||||||
* [Introducing: Disentangle Domains](https://twitter.com/disentangleDNS/status/1470747203635494916?s%3D20) Twitter
|
|
||||||
|
|
||||||
Your [@iota](https://twitter.com/iota) web3 username. We are buidling an #IOTA for gas-free, sapiens-friendly wallet & dApp addresses. Neat, easy and secure. +info
|
|
||||||
* [IOTA Identity: Beta Release](https://blog.iota.org/iota-identity-beta-release/)
|
|
||||||
|
|
||||||
The first major feature we introduced with this beta release is the account, a higher-level API to use IOTA Identity. Similar to the recent Chrysalis update, IOTA Identity becomes a lot easier to use by utilizing the account. It is intended to provide a much more simplified interface that is perfect for 90%+ of the use cases. The other 10% are more complex use cases that may still want to utilize the lower-level APIs to have more control over the Identities. The account doesn’t just simplify the interactions with DID Documents, but also with the Tangle and Stronghold.
|
|
@ -1,18 +0,0 @@
|
|||||||
# Liquid Avatar - KABN
|
|
||||||
|
|
||||||
* [Panel: Start Simple to Scale Decentralized Identity](https://hgf2021.sched.com/event/j3ej%23new_tab) HGF2021 • Indicio
|
|
||||||
> Liquid Avatar Technologies and Indicio.tech will share how together they are transitioning the current KABN ID solution to verifiable credentials by building the Liquid Avatar Verifiable Credentials Ecosystem utilizing Hyperledger Aries, Ursa, and Indy.
|
|
||||||
* [Liquid Avatar Technologies and Bonifii Make VCs Accessible for People and Financial Institutions in the Metaverse](https://bonifii.com/2021/11/liquid-avatar-technologies-and-bonifii-make-verifiable-credentials-accessible-for-people-and-financial-institutions-in-the-metaverse/) Bonifii
|
|
||||||
> “The metaverse and Web 3.0 are here, and we are building the infrastructure to manage how we’re going to live, work, and play in the intersection of the real and the digital,” said Heather Dahl, CEO of Indico. “Bonifii and Liquid Avatar get it, they’re on it and we’re excited to help them realize their vision.“
|
|
||||||
* [Indicio and Liquid Avatar Technologies Launch Canada’s First Privacy-Preserving Decentralized Technology for Sharing Health Data](https://indicio.tech/indicio-and-liquid-avatar-technologies-launch-canadas-first-privacy-preserving-decentralized-technology-for-sharing-health-data/) Indicio
|
|
||||||
|
|
||||||
“Liquid Avatar Technologies shares Indicio’s vision—the world needs technology that works for people by delivering real privacy and security,” said Heather Dahl, CEO of Indicio. “When we launched the Indicio Network, we saw the need for a space for innovative companies to collaborate on changing how we manage identity, enable verification, and create trust. Our partnership with Liquid Avatar Technologies, one of many, shows what can happen when innovators solve pressing problems with ground-breaking technology.”
|
|
||||||
* [Liquid Avatar and Ontario Convenience Stores Association (OSCA) Successful Pilot of Digital Age-Verification Solutions to Reach over 8,000 Retail Locations](https://www.accesswire.com/684666/Liquid-Avatar-Technologies-and-Ontario-Convenience-Stores-Association-OSCA-Deliver-Successful-Pilot-of-Digital-Age-Verification-Solutions-to-Reach-over-8000-Retail-Locations%23new_tab)
|
|
||||||
|
|
||||||
The Smart Age program provides digital age verification, supported with biometric authentication for restricted product sales like lottery tickets, tobacco, alcohol and other goods and services through a mobile device using verifiable digital credentials and biometrics without a user divulging any personally identifiable information to the store clerk.
|
|
||||||
* [Indicio and Liquid Avatar Technologies Launch Canada’s First Privacy-Preserving Decentralized Technology for Sharing Health Data](https://indicio.tech/indicio-and-liquid-avatar-technologies-launch-canadas-first-privacy-preserving-decentralized-technology-for-sharing-health-data/) Indicio
|
|
||||||
|
|
||||||
“Liquid Avatar Technologies shares Indicio’s vision—the world needs technology that works for people by delivering real privacy and security,” said Heather Dahl, CEO of Indicio. “When we launched the Indicio Network, we saw the need for a space for innovative companies to collaborate on changing how we manage identity, enable verification, and create trust. Our partnership with Liquid Avatar Technologies, one of many, shows what can happen when innovators solve pressing problems with ground-breaking technology.”
|
|
||||||
* [KABN Network Joins the Trust Over IP Foundation](https://www.accesswire.com/616265/KABN-Network-Joins-the-Trust-Over-IP-Foundation)
|
|
||||||
> KABN aims to use proven bank-grade identity verification processes to allow Holders (who use a credential), Verifiers (who confirm the validity of a credential) and Issuers (who produce the credential) to complete transactions of many kinds including financial services, eCommerce transactions, organization, building and visitor access badges among others.
|
|
||||||
[PassmateTM](https://www.thenewswire.com/press-releases/1k98Fpjr0-liquid-avatar-technologies-and-dynamics-inc-tap-payment-infrastructure-for-verification-of-digital-credentials.html) shows how decentralized identity will transform the world: by easily integrating into systems that already exist. The soon-to-be-launched Software as a Service — conceived by Liquid Avatar’s David Lucatch, enables verifiable credentials to run on existing payment rails.
|
|
@ -1,30 +0,0 @@
|
|||||||
# Magic Labs
|
|
||||||
* [Magic Product Updates: December Edition](https://medium.com/magiclabs/magic-product-updates-december-edition-7a24a3dcd4e4) MagicLabs
|
|
||||||
|
|
||||||
Since our last product update, we’ve launched a multifaceted set of capabilities that enable you to do more with Magic.
|
|
||||||
|
|
||||||
* [Building a low-code, opinionated approach to plug & play login](https://medium.com/magiclabs/building-a-low-code-opinionated-approach-to-plug-and-play-login-21bb30dca9a4) Magic Labs
|
|
||||||
|
|
||||||
Magic Login Form represents a new onboarding experience for end-users, so we wanted to revamp our own onboarding experience for developers to match. Learning about auth can quickly derail any developer’s good day. Striking the balance between good UX and good security can just boggle the mind.
|
|
||||||
* [Magic at HackOn2.0](https://medium.com/magiclabs/magic-at-hackon2-0-9187d0e24d86)
|
|
||||||
|
|
||||||
At Magic, we love to be where developers hang out. As a Developer Advocate, it’s especially fun to connect with devs dreaming up big ideas and hacking them into reality. Back in April, the HackOn2.0 team reached out to me to talk about getting Magic involved in their next hackathon. We jumped at the opportunity and were so glad to support the HackOn2.0’s vibrant community.
|
|
||||||
* [Developers: SMS Authentication is Challenging](https://medium.com/magiclabs/building-sms-authentication-c2cabccbd5f8) Magic Labs
|
|
||||||
> SMS (Short Message Service) messaging¹, despite a number of material challenges, has broad adoption, international regulations, and support across platforms.
|
|
||||||
|
|
||||||
* [3 Types of Passwordless Authentication for Web 3.0](https://medium.com/magiclabs/types-of-passwordless-authentication-for-web-3-958062e9d265) MagicLabs
|
|
||||||
|
|
||||||
Passwordless authentication is a fundamental shift in how people will access their tools and information online, and it will provide more security, prevent billions in losses, and create greater transparency.
|
|
||||||
|
|
||||||
* [Decrypt trusts Magic to onboard record new user growth with the launch of reader tokens and rewards](https://medium.com/magiclabs/decrypt-trusts-magic-to-onboard-record-new-user-growth-with-the-launch-of-reader-tokens-and-rewards-14d791e582d5)
|
|
||||||
|
|
||||||
I’ll cover how the Decrypt team streamlined development and onboarding to launch Decrypt Tokens and Drops — along with how crypto DNA and a leading product and team drove their trust in Magic.
|
|
||||||
|
|
||||||
|
|
||||||
* [Magic: A Key-Based Authentication System For Self-Sovereign Identity](https://www.dropbox.com/s/3flqaszoigwis5b/Magic%2520Whitepaper.pdf?dl%3D0)
|
|
||||||
|
|
||||||
Since Magic’s authentication protocol is based on key pairs provided by decentralized blockchain networks, it is platform-independent and thus able to provide authentication service without having to rely on centralized identity providers.
|
|
||||||
|
|
||||||
* [Magic Raises $27M to Future-Proof Authentication](https://medium.com/magiclabs/magic-raises-27m-to-future-proof-authentication-79d8c63b2813)
|
|
||||||
|
|
||||||
Magic makes it plug and play for developers to add secure, passwordless login, like magic links and WebAuthn, to their applications. Users are no longer exposed to password-related risks from the very start.
|
|
@ -1,72 +0,0 @@
|
|||||||
# Spruce
|
|
||||||
|
|
||||||
* [Spruce Developer Update #19](https://blog.spruceid.com/spruce-developer-update-19/)
|
|
||||||
> - Sign-In with Ethereum offers a new self-custodial option for users who wish to assume more control
|
|
||||||
> - Kepler is a decentralized storage network organized around data overlays called Orbits. Kepler allows users to Securely share their digital credentials, private files, and sensitive media to blockchain accounts, all using a Web3 wallet
|
|
||||||
* [Spruce At Graph Hack 2022](https://blog.spruceid.com/spruce-at-graph-hack/) SpruceID
|
|
||||||
> Earlier this month, The Graph hosted Graph Hack at the Palace of Fine Arts in San Francisco. Graph Hack was a three-day hackathon, bringing together developers to kickstart the latest dapps and ideas featuring a mix of on and off-chain data via a variety of impactful use-cases.
|
|
||||||
* [Spruce Developer Update #21](https://blog.spruceid.com/spruce-developer-update-21/)
|
|
||||||
> We're currently working on a new, ergonomic way to use Sign-In with Ethereum and session management for applications, and are currently in the process of setting up beta testing. If you're interested in trying this out, please get in touch.
|
|
||||||
* [Spruce Developer Update #23](https://blog.spruceid.com/spruce-developer-update-23/)
|
|
||||||
> Updates on Sign in with Ethereum, Kepler, DIDKit, Rebase
|
|
||||||
* [Spruce Developer Update #8](https://sprucesystems.medium.com/spruce-developer-update-8-70f04e95a5d4)
|
|
||||||
> - “We are currently working on a project that will enable creator authenticity for digital assets including NFTs.”
|
|
||||||
> - “focused on advancing did-tezos as the first formally verified DID Method.”
|
|
||||||
> - DIDKit Updates
|
|
||||||
> - Credible Updates
|
|
||||||
|
|
||||||
* [Spruce Raises $34M to Unbundle the Login for a User-Controlled Web](https://blog.spruceid.com/spruce-raises-34m-to-unbundle-the-login-for-a-user-controlled-web/)
|
|
||||||
> With the new funding, Spruce will spearhead research in cutting-edge privacy and usability technology for identity, grow its product teams, and continue to execute on partnerships across the ecosystem.
|
|
||||||
* [Decentralized Identity Startup Spruce Wants to Help Users Control their Sign-In Data](https://techcrunch.com/2022/04/20/decentralized-identity-startup-spruce-wants-to-help-users-control-their-sign-in-data/) TechCrunch
|
|
||||||
> The company [won an RFP](https://www.coindesk.com/policy/2021/10/08/sign-in-with-ethereum-is-coming/) from the Ethereum Foundation and Ethereum Name Service (ENS) to develop a standardized “sign-in with Ethereum” feature that could be interoperable with web2 identity systems [...] to let [users] control what information a platform receives about them when they sign in rather than automatically surrendering the data to the platform.
|
|
||||||
* [Spruce sets the bar for sovereign identity storage options, secures $7.5M](https://venturebeat.com/2021/11/02/spruce-sets-the-bar-for-sovereign-identity-and-storage-options-secures-7-5m/)
|
|
||||||
> Spruce, a service that allows users to control their data across the web, has raised $7.5 million. The company builds open source, open standard developer tools helping users collect and control their data across the web. It helps prevent NFT frauds and defines access rules for [decentralized](https://venturebeat.com/2020/10/28/decentralized-identity-the-key-to-the-digital-era/).
|
|
||||||
|
|
||||||
* [Future of Decentralized Identity- Wayne Chang & Kasima Tharnpipitchai](https://www.youtube.com/watch?v%3DpARtPe9Qvbo)
|
|
||||||
|
|
||||||
yeah so at spruce our mission is to let users control their data across the web we think that instead of users logging into platforms and trying to rest control over their data there platforms should have to log into the user's data vaults and the users can have at their discretion all the control over their data vaults and how their data are used
|
|
||||||
* [Introducing TreeLDR: A Canopy Across Your Data Schema Dreams](https://blog.spruceid.com/introducing-treeldr-a-canopy-across-your-data-schemas/) SpruceID
|
|
||||||
|
|
||||||
TreeLDR is an open-source developer tool with a DSL that makes managing data schemas as easy as defining data structures in your favorite (sane) statically-typed language.
|
|
||||||
|
|
||||||
Our open banking platform is guided by our [data responsibility principles](https://www.mastercard.com/news/perspectives/2022/data-responsibility-and-inclusion/). Mastercard
|
|
||||||
|
|
||||||
|
|
||||||
* [Spruce Developer Update #11](https://sprucesystems.medium.com/spruce-developer-update-11-7766b44e1075)
|
|
||||||
* [Spruce Developer Update #5](https://sprucesystems.medium.com/spruce-developer-update-5-86d6f517a220)
|
|
||||||
> This is so exciting to see what Wayne and his team are building.
|
|
||||||
>
|
|
||||||
> > At Spruce, we’re building a product suite to manage all aspects of the data supply chain.
|
|
||||||
- [Tezos DID Method](https://did-tezos-draft.spruceid.com/) - Specifies VC compatible DID creation and management
|
|
||||||
- [DIDKit](https://sprucesystems.medium.com/introducing-didkit-an-identity-toolkit-e0dfa292f53d) - cross-platform toolkit for working with DIDs and VCs.
|
|
||||||
- [Credible](https://medium.com/@sprucesystems/spruce-developer-update-2-484368f87ee9) - Spruce’s credential wallet.
|
|
||||||
- Intake - onboarding tool \ secure document collection and processing.
|
|
||||||
* [Spruce Systems introduces DIDKit](https://sprucesystems.medium.com/introducing-didkit-an-identity-toolkit-e0dfa292f53d)
|
|
||||||
> DIDKit is a cross-platform toolkit for working with W3C Decentralized Identifiers (DIDs) and Verifiable Credentials (VCs). It allows you to resolve and manage DID documents, and also manage the entire lifecycle of Verifiable Credentials including their issuance, presentation, and verification.
|
|
||||||
* [Spruce Systems Developer Update #4](https://sprucesystems.medium.com/spruce-developer-update-4-cd6472c58fe1)
|
|
||||||
- The [Tezos DID Method](https://did-tezos-draft.spruceid.com/) specifies how Tezos can be used for DID creation and management, compatible with the issuance, storage, and verification of Verifiable Credentials.
|
|
||||||
- [DIDKit](https://sprucesystems.medium.com/introducing-didkit-an-identity-toolkit-e0dfa292f53d) is a cross-platform toolkit for working with W3C Decentralized Identifiers (DIDs) and Verifiable Credentials (VCs).
|
|
||||||
- [Credible](https://medium.com/@sprucesystems/spruce-developer-update-2-484368f87ee9) is Spruce’s native credential wallet for the consumption, storage, and presentation of Verifiable Credentials on Android and iOS.
|
|
||||||
- Keylink is Spruce’s tool to link existing enterprise accounts to keypairs.
|
|
||||||
- Intake is a smarter onboarding tool for businesses via secure document collection and processing. These artifacts can then be used as evidence to generate and issue credentials to the counterparty that originally uploaded them.
|
|
||||||
|
|
||||||
* [Upgradeable Decentralized Identity - DID Method Traits](https://blog.spruceid.com/upgradeable-decentralized-identity/) SpruceID
|
|
||||||
|
|
||||||
DID method traits are testable properties about DID methods that can help implementers tame complexity and choose the right DID method(s) for their use case.
|
|
||||||
* [Spruce Developer Update #24](https://blog.spruceid.com/spruce-developer-update-24/)
|
|
||||||
|
|
||||||
- We recently added support for EIP-1271 (smart contract wallets) on our Python library ([siwe-py #30](https://github.com/spruceid/siwe-py/pull/30).
|
|
||||||
- There is ongoing work on supporting EIP-1271 in our Rust library as well, along with an API refactor ([siwe-rs #43](https://github.com/spruceid/siwe-rs/pull/43).
|
|
||||||
- We're updating dependencies in our NextAuth library ([siwe-next-auth-example #9](https://github.com/spruceid/siwe-next-auth-example/pull/9), [#14](https://github.com/spruceid/siwe-next-auth-example/pull/14)).
|
|
||||||
- We're finalizing various improvements to our Sign-In with Ethereum TypeScript library toward a v2.1 release.
|
|
||||||
* [...]
|
|
||||||
- We're adding support for did:jwk into ssi ([ssi #466](https://github.com/spruceid/ssi/pull/466).
|
|
||||||
- We've updated DIDKit to reflect the recent ssi refactor ([DIDKit #312](https://github.com/spruceid/didkit/pull/312).
|
|
||||||
|
|
||||||
Rebase
|
|
||||||
|
|
||||||
- We're making some additional changes and finalizing our Solana wallet flow ([rebase #32](https://github.com/spruceid/rebase/pull/32).
|
|
||||||
|
|
||||||
* [Sign in with Ethereum](https://login.xyz/) is being developed by Spruce
|
|
||||||
|
|
||||||
Already used throughout web3, this is an effort to standardize the method with best practices and to make it easier for web2 services to adopt it.
|
|
@ -1,27 +0,0 @@
|
|||||||
# TBD - Bluesky
|
|
||||||
|
|
||||||
* [tbDEX: A Liquidity Protocol v0.1](https://tbd54566975.ghost.io/introducing-tbdex/)
|
|
||||||
|
|
||||||
The tbDEX protocol facilitates decentralized networks of exchange between assets by providing a framework for establishing social trust, utilizing decentralized identity (DID) and verifiable credentials (VCs) to establish the provenance of identity in the real world.
|
|
||||||
* [A Self-Authenticating Social Protocol](https://blueskyweb.xyz/blog/3-6-2022-a-self-authenticating-social-protocol) Bluesky
|
|
||||||
|
|
||||||
In law, a [“self-authenticating” document](https://www.law.cornell.edu/rules/fre/rule_902) requires no extrinsic evidence of authenticity. In computer science, an [“authenticated data structure”](https://www.cs.umd.edu/~mwh/papers/gpads.pdf) can have its operations independently verifiable. When resources in a network can attest to their own authenticity, then that data is inherently live – that is, canonical and transactable – no matter where it is located.
|
|
||||||
* [dSocialCommons Hosts Twitter Spaces | Interoperable Formats](https://twitter.com/dsocialcommons/status/1519724178256982017)
|
|
||||||
|
|
||||||
Bluesky Community Voices #6: Interoperable Formats [https://twitter.com/i/spaces/1vAxRkVrMPzKl](https://twitter.com/i/spaces/1vAxRkVrMPzKl) Moderator [@kimdhamilton](https://twitter.com/kimdhamilton) Speakers [@kevinmarks](https://twitter.com/kevinmarks) [@mfosterio](https://twitter.com/mfosterio) [@JoeAndrieu](https://twitter.com/JoeAndrieu) [@harlantwood](https://twitter.com/harlantwood)
|
|
||||||
|
|
||||||
* [Working in Public](https://blueskyweb.xyz/blog/5-4-2022-working-in-public) BlueSky
|
|
||||||
|
|
||||||
Today we’re releasing [ADX, the “Authenticated Data Experiment”](https://github.com/bluesky-social/adx). Our company's name, “bluesky,” describes the open-ended nature of this project, and the freedom we were given to start from first principles. As we get more concrete, we’ll give more specific names to what we’re building, starting with ADX.
|
|
||||||
* [Spruce and TBD Demonstrate Decentralized Identity Interoperability](https://blog.spruceid.com/spruce-and-tbd-demonstrate-decentralized-identity-interoperability/) SpruceID
|
|
||||||
|
|
||||||
Spruce and TBD are the first two organizations to demonstrate support for all [five JWS algorithms](https://w3id.org/security/suites/jws-2020%23jose-conformance) for [JsonWebSignature2020](https://w3c-ccg.github.io/lds-jws2020/) (Data Integrity Proofs) and JWTs, for VCs and [W3C Verifiable Presentations](https://www.w3.org/TR/vc-data-model/%23presentations-0), which is a major step toward vendor interoperability.
|
|
||||||
* [TBD Partners with Circle!](https://developer.tbd.website/blog/tbd-circle-partnership/) TBD
|
|
||||||
|
|
||||||
TBD and [Circle](https://www.circle.com/en/?_gl%3D1*14yjcwp*_up*MQ..%26gclid%3DCjwKCAjwm8WZBhBUEiwA178UnPZbgZJJxhwK7ivE5Yx9FGW8PQ31-hc1O-njcLOmzcN2nzLz110FihoCgV4QAvD_BwE) are collaborating on a set of open standards and open source technologies aimed at enabling global-scale, mainstream adoption of digital currency in payments and financial applications. The first step of which will support cross-border remittances and self-custody wallets that can hold stablecoins.
|
|
||||||
At TBD, we support open standards wherever appropriate, and all of our projects are open source.
|
|
||||||
* [Our Interoperability Work in the Decentralized Identity Foundation](https://developer.tbd.website/blog/our-interop-work-in-dif/) TBD
|
|
||||||
|
|
||||||
More details about the Conformance Test Suite that was developed by members of DIF and our interoperability test reports can be found here:
|
|
||||||
|
|
||||||
|
|
@ -1,24 +0,0 @@
|
|||||||
# Transmute Industries
|
|
||||||
|
|
||||||
https://github.com/transmute-industries/xmss
|
|
||||||
https://www.dhs.gov/science-and-technology/news/2019/11/08/news-release-dhs-awards-198k-raw-material-import-tracking
|
|
||||||
https://www.prweb.com/releases/transmute_closes_2m_seed_round_from_moonshots_capital_tmv_kerr_tech_investments/prweb17487962.htm
|
|
||||||
- [Transmute Releases Technical Workbenches](https://medium.com/transmute-techtalk/transmute-releases-technical-workbenches-892f8140ac6e)
|
|
||||||
- [Element Ropsten Workbench](http://staging.element.transmute.industries/)
|
|
||||||
- [Encrypted Data Vault Workbench](https://staging.data-vault.transmute.industries/)
|
|
||||||
- [DID Key Workbench](http://did.key.transmute.industries/)
|
|
||||||
{% include video id="EKiqQnKQ-nM" provider="youtube" %}
|
|
||||||
- [GitHub DID](https://github-did.com/)
|
|
||||||
- [source](https://www.npmjs.com/package/@transmute/github-did)
|
|
||||||
`npm i -g @github-did/cli`\
|
|
||||||
`ghdid init "my-password" https://github.com/USERNAME/ghdid`\
|
|
||||||
`# if you need to revoke all / reset your DID`\
|
|
||||||
`ghdid init "my-password" https://github.com/USERNAME/ghdid --force`
|
|
||||||
* [Transmute releases technical workbenches](https://medium.com/transmute-techtalk/transmute-releases-technical-workbenches-892f8140ac6e) by Orie Steele, Transmute
|
|
||||||
This new suite of tools is available for developers to experiment with today and includes:
|
|
||||||
- [Element Ropsten Workbench](http://staging.element.transmute.industries/)
|
|
||||||
- [Encrypted Data Vault Workbench](https://staging.data-vault.transmute.industries/)
|
|
||||||
- [DID Key Workbench](http://did.key.transmute.industries/)
|
|
||||||
|
|
||||||
Transmute leverages these workbenches as part of our global trade solutions, where our customers benefit from verifiable data workflows and integrated capabilities.
|
|
||||||
|
|
@ -1,22 +0,0 @@
|
|||||||
# Africa SSI Startups
|
|
||||||
- [Daon Provides Biometric Authentication for African Blockchain Identity Platform](https://findbiometrics.com/daon-provides-biometric-authentication-african-blockchain-identity-platform-06100/)
|
|
||||||
|
|
||||||
### Diwala
|
|
||||||
|
|
||||||
### FLexID
|
|
||||||
|
|
||||||
* [FlexID gets Algorand funding to offer self-sovereign IDs to Africa’s unbanked](https://techcrunch.com/2022/05/26/zimbabwe-flexid-algorand-funding-decentralized-identity/) TechCrunch
|
|
||||||
|
|
||||||
FlexID is giving users a blockchain wallet that stores their verificable credentials. Verification is done on-chain through Algorand, which bills itself as a solution to the [blockchain trilemma](https://www.google.com/search?q%3Dalgorand%2Btrilemma%26oq%3Dalgorand%2Btrilem%26aqs%3Dchrome.0.0i512j69i57j0i390.2391j0j9%26sourceid%3Dchrome%26ie%3DUTF-8) of security, scalability and decentralization. FlexID will also be integrating with other Algorand decentralized apps (dApps).
|
|
||||||
|
|
||||||
* [Local digital identity startup FlexID receives funding from Algorand Foundation](https://www.techzim.co.zw/2022/05/local-digital-identity-startup-flexid-receives-funding-from-algorand-foundation/) TechZim
|
|
||||||
|
|
||||||
Zimbabwean founded blockchain start-up, [FlexID Technologies](https://www.flexfintx.com/) (formerly FlexFinTx), has signed a Simple Agreement For Equity (SAFE) with the [Algorand Foundation](https://www.algorand.com/), to further develop and scale their Self Sovereign Identity (SSI) platform
|
|
||||||
|
|
||||||
### Gravity Earth
|
|
||||||
* [Q&A with Gravity’s lead engineer: François Guérin](https://medium.com/gravity-earth/q-a-with-gravitys-lead-engineer-fran%25C3%25A7ois-gu%25C3%25A9rin-babb3659be86)
|
|
||||||
|
|
||||||
As the Lead Developer, a big part of my role is to build Gravity’s decentralized identity protocol and blockchain architecture on Tezos.
|
|
||||||
* [Gravity’s Decentralized Identity Protocol, Built on Tezos, To Power DIGID Project in Kenya](https://medium.com/gravity-earth/gravitys-decentralized-identity-protocol-built-on-tezos-to-power-digid-project-in-kenya-a85069f2a027)
|
|
||||||
|
|
||||||
This month, Gravity joined some of the largest international NGOs in the world to launch the [Dignified Identities in Cash Programming (DIGID)](https://hiplatform.org/digid) project in Kenya. The goal of this project is to help the Kenya Red Cross leverage Gravity’s decentralized identity protocol on Tezos to provide much-needed cash transfers to vulnerable Kenyan populations.
|
|
@ -1,93 +0,0 @@
|
|||||||
# Affinidi
|
|
||||||
|
|
||||||
* [A Conversation with Joseph Thompson of AID:Tech](https://academy.affinidi.com/a-conversation-with-joseph-thompson-of-aid-tech-4e7d8d73b3d2)
|
|
||||||
|
|
||||||
we can expect more awareness and adoption in five years because of the enormous upsides for both individuals and organizations.
|
|
||||||
|
|
||||||
* [An Overview of Affinidi’s Terms of Use for Developers](https://academy.affinidi.com/an-overview-of-affinidis-terms-of-use-for-developers-fa7a04bcf635) Affinidi
|
|
||||||
|
|
||||||
This article provides an overview of our [Terms of Use](https://www.affinidi.com/developer-terms-of-use) for any developer who wants to use our APIs and SDKs.
|
|
||||||
* [What is the VC-Generator App and How to Leverage it?](https://academy.affinidi.com/what-is-the-vc-generator-app-and-how-to-leverage-it-4fa5a54844f2)
|
|
||||||
> In simple terms, the VC-Generator allows you to choose a credential type that needs to be issued or verified from a drop-down list and displays the associated VC schema.
|
|
||||||
* [Create Custom Verifiable Credentials with Affinidi’s Schema Manager](https://academy.affinidi.com/create-custom-verifiable-credentials-with-affinidis-schema-manager-86149b2d49d6) Affinidi
|
|
||||||
|
|
||||||
Overall, the creation of a new schema type via the SDK was not a straightforward process.
|
|
||||||
|
|
||||||
This is where Affinidi’s [Schema Manager](http://ui.schema.affinidi.com/) comes into play
|
|
||||||
* [Using Decentralized Identifiers (DIDs) Without a Digital Wallet](https://academy.affinidi.com/using-decentralized-identifiers-dids-without-a-digital-wallet-34646074ba42) Affinidi
|
|
||||||
|
|
||||||
there are many known DID methods, but most of them require you to have a [digital identity wallet](https://academy.affinidi.com/5-reasons-to-use-an-identity-wallet-c289ba2980cf) 🔒, where you will keep a seed ([private key](https://academy.affinidi.com/role-of-public-key-cryptography-in-self-sovereign-identity-8c2dc37a2bf3) 🔑.
|
|
||||||
|
|
||||||
While this may sound convenient for many of us, it comes with its shortcomings as well.
|
|
||||||
* [The Journey of an SSI Developer](https://academy.affinidi.com/the-journey-of-an-ssi-developer-6ef4f642779c) Affinidi
|
|
||||||
|
|
||||||
* [Singapore Fintech Festival…Here We [Affinidi] Come!](https://academy.affinidi.com/singapore-fintech-festival-here-we-come-d8ffb59bc1cf)
|
|
||||||
|
|
||||||
In this virtual booth, you can explore about [Self-Sovereign Identity](https://academy.affinidi.com/self-sovereign-identity-what-you-can-cant-do-with-ssi-1284f7227b4e), [Verifiable Credentials](https://academy.affinidi.com/what-are-verifiable-credentials-79f1846a7b9) and their [implementation](https://academy.affinidi.com/how-to-implement-driving-license-use-case-using-verifiable-credentials-cef928222c92), [selective disclosure](https://academy.affinidi.com/a-detailed-guide-on-selective-disclosure-87b89cea1602), [identity wallet](https://academy.affinidi.com/5-reasons-to-use-an-identity-wallet-c289ba2980cf), and anything else related to [decentralized identity](https://academy.affinidi.com/what-links-identity-and-vcs-together-across-applications-9523af3884a9) and [web 3.0](https://academy.affinidi.com/web-2-0-vs-web-3-0-a-bridge-between-the-past-and-the-future-c99668c1e2f0).
|
|
||||||
* [What Can You Do With Affinidi’s Tech Stack?](https://academy.affinidi.com/what-can-you-do-with-affinidis-sdk-1966f4fef042) Affinidi
|
|
||||||
|
|
||||||
Affinidi’s SDK enables you to issue Verifiable Credentials (VCs), register accounts, collect and validate information, verify VCs, and more.
|
|
||||||
|
|
||||||
* [Expand SkillSet with Affinidi](https://certification.affinidi.com/)
|
|
||||||
|
|
||||||
|
|
||||||
* [Upgrade to the Latest Affinidi SDK Version for Improved Performance](https://academy.affinidi.com/upgrade-to-the-latest-affinidi-sdk-version-for-improved-performance-81e7d0cc7334) Affinidi
|
|
||||||
|
|
||||||
- Migrating from Bloom Vault to Affinidi Vault for improved performance
|
|
||||||
- Server-side search by credential Id
|
|
||||||
- Server-side search by credential types
|
|
||||||
|
|
||||||
|
|
||||||
* [Breaking Digital Borders: Scaling User-Owned Data from Zero to One Million — Key Takeaways](https://academy.affinidi.com/breaking-digital-borders-scaling-user-owned-data-from-zero-to-one-million-key-takeaways-ff9da04b5d24) Affinidi, Berlin Blockchain Week
|
|
||||||
|
|
||||||
Zain Yousaf, our Product Principal, and Marco took over to showcase Console to the audience. They did a walkthrough of the Console to help everyone understand how they can build privacy-preserving apps through this no-code dev tool.
|
|
||||||
|
|
||||||
* [Announcing the Affinidi Prize Winners of Hack the Mountain 2.0](https://academy.affinidi.com/announcing-the-affinidi-prize-winners-of-hack-the-mountain-2-0-48df8aead49d)
|
|
||||||
> The winning teams are JCoders and Team Straw hat coders. Congratulations to both teams. They will be receiving 10,000 INR worth ETH.
|
|
||||||
|
|
||||||
* [Selective Disclosure: Share What You Want](https://academy.affinidi.com/selective-disclosure-share-what-you-want-288f49e65680) Affinidi
|
|
||||||
|
|
||||||
|
|
||||||
* [Explore Affinidi Schema Manager](https://ui.schema.affinidi.com/schemas/)
|
|
||||||
- [Verifiable Credentials in Ben’s Serendipity](https://academy.affinidi.com/verifiable-credentials-in-bens-serendipity-b9acfa10f131) Affinidi (Drivers License, Medical, Employment)
|
|
||||||
> Think about it for a moment. No physical documents at all, but a simple and secure self-sovereign identity that Ben had complete control over. More importantly, look at the interoperability and flexibility as Ben could use them in different situations and across multiple platforms.
|
|
||||||
* [Protecting Your Driver’s License](https://medium.com/affinidi/protecting-your-drivers-license-a-use-case-for-verifiable-credentials-25d22aeac05b) Affinidi
|
|
||||||
> the biggest advantage of such an SSI-based driver’s license is that there’s absolutely no possibility of loss. Furthermore, there is no question of your PII on the license to fall into the wrong hands because the holder has complete control over how it is used and with whom it is shared.
|
|
||||||
- [Driving License as a Verifiable Credential](https://academy.affinidi.com/how-to-implement-driving-license-use-case-using-verifiable-credentials-cef928222c92) Affinidi
|
|
||||||
- [Opening a Bank Account](https://academy.affinidi.com/opening-a-bank-account-a-use-case-for-verifiable-credentials-53ea478b5414) Affinidi
|
|
||||||
* [Impact of Self-Sovereign Identity in Real Estate](https://academy.affinidi.com/impact-of-self-sovereign-identity-in-real-estate-11456c4b1faa) Affinidi
|
|
||||||
|
|
||||||
Real estate is one of the sectors that has not completely embraced digitalization, and this means, there’s a lot of potential to bring about change in this sector.
|
|
||||||
* [Is SSI the Disruptor for a Better World?](https://academy.affinidi.com/is-ssi-the-disruptor-for-a-better-world-aec34cef6275) Affinidi
|
|
||||||
|
|
||||||
There is a big need for solutions to enable trusted interactions, especially when it comes to identification and authentication. It all stems from the fact that the [Internet](https://academy.affinidi.com/web-2-0-vs-web-3-0-a-bridge-between-the-past-and-the-future-c99668c1e2f0) was never designed for identities of individuals in the first place. Though we have standards and protocols for transactions, these are not constructed to enable the average user control of his or her digital identity without depending on a single third party.
|
|
||||||
|
|
||||||
* [Using DID as a Second-factor Authentication](https://academy.affinidi.com/using-did-as-a-second-factor-authentication-198630db4a1c) Affinidi
|
|
||||||
|
|
||||||
you can provide your DID instead of disclosing your phone number or email ID as the second factor of authentication. In the second step of verification, you will have to prove that you are the owner of that DID provided during the initial setup.
|
|
||||||
|
|
||||||
* [Can Verifiable Credentials Make Life Better for Refugees?](https://academy.affinidi.com/can-verifiable-credentials-make-life-better-for-refugees-ea887300f18d) Affinidi
|
|
||||||
|
|
||||||
Let’s say Mr.X is forced out of his country due to war and he reaches the neighboring country but doesn’t have any physical document to prove his identity such as name, address, educational qualifications, work experience, etc.
|
|
||||||
* [Impact of Self-Sovereign Identity in Real Estate](https://academy.affinidi.com/impact-of-self-sovereign-identity-in-real-estate-11456c4b1faa) Affinidi
|
|
||||||
|
|
||||||
One sector where SSI is expected to have far-reaching implications is the real estate industry, as it has the potential to bring in a lot of transparency and trust among the stakeholders.
|
|
||||||
|
|
||||||
So, how does SSI fit into this traditional real-estate sector?
|
|
||||||
* [Supercharge your Job Search with Next-gen Tech](https://academy.affinidi.com/supercharge-your-job-search-with-next-gen-tech-5339e0008250) results of Affinidi hackathon
|
|
||||||
|
|
||||||
They came up with impressive submissions, ranging from job portals showcasing verified jobs and companies to scam alert verification features.
|
|
||||||
* [Creating an Enterprise DID to Provide Power of Attorney for Employees](https://academy.affinidi.com/creating-an-enterprise-did-to-provide-power-of-attorney-for-employees-c7f20cef884f) Affinidi
|
|
||||||
|
|
||||||
“How to have an enterprise [Decentralized Identifier (DID)](https://www.w3.org/TR/did-core/) when an employee 👨💼👩💼 can act on behalf of this company 🏢 with flexible permissions layer in a decentralized or peer-to-peer way?” [delagation]
|
|
||||||
- [On-Demand Employment Endorsements](https://academy.affinidi.com/on-demand-employment-endorsements-a-use-case-for-verifiable-credentials-d19d263a0fbb) Affinidi
|
|
||||||
* [Self Sovereign Identity/Decentralised Identity and Financial Services Webinar — A Synopsis](https://academy.affinidi.com/self-sovereign-identity-decentralised-identity-and-financial-services-webinar-a-recap-f5cecfb8b45c) Affinidi
|
|
||||||
> September 2nd, 2021 was a big day for all of us in the Global Developer Ecosystem (GDE) team of Affinidi as we geared to host our first [webinar on Self Sovereign Identity/Decentralised Identity and Financial Services](https://youtu.be/kR0IGOqmEwI) with Varsha Jagdale (General Manager of Financial Services at Affinidi) and Joseph Thompson (CEO of AID:Tech) as the speakers.
|
|
||||||
* [Can SSI Safeguard your Information from Hackers?](https://academy.affinidi.com/can-ssi-safeguard-your-information-from-hackers-1b256d3eb6cd) Affinidi
|
|
||||||
> The cryptography used is called the Public Key Infrastructure (PKI) that comprises a pair of public and private keys where the holder keeps the private keys, but shares the public keys.
|
|
||||||
* [Can SSI Disrupt Surveillance Capitalism?](https://academy.affinidi.com/can-ssi-disrupt-surveillance-capitalism-5c8cd6b50278) Affinidi
|
|
||||||
Are these advantages enough to disrupt surveillance capitalism? Do you think SSI is the antidote for today’s Internet identity problems and surveillance capitalism? Please share your thoughts with us.
|
|
||||||
|
|
||||||
* [Deciphering BBS+ Signatures](https://academy.affinidi.com/deciphering-bbs-signatures-e853bbf437bf) Affinidi
|
|
||||||
|
|
||||||
This digital signature was created by Dan Boneh, Xavier Boyen, and Hovav Shacham using the strong Diffie-Hellman encryption technique, and hence the name BBS (after their respective surnames). The original signature was modified later to include proof of knowledge, and hence the name BBS+
|
|
@ -1,10 +0,0 @@
|
|||||||
# KYC Chain
|
|
||||||
|
|
||||||
* [KYC-Chain Join Hands with enVoy](https://kyc-chain.com/kyc-chain-join-hands-with-envoy/)
|
|
||||||
|
|
||||||
KYC-Chain will enter a partnership with enVoy. enVoy offers sustainable DeFi, tokenized letters of credit, realtime x border payments, and tokenized documentation for the supply chain removing risk and creating trust for third-party trade on an end to end ESG and sustainable supply chain journey.
|
|
||||||
|
|
||||||
* [KYC-Chain & CrypTalk Join Hands](https://kyc-chain.com/kyc-chain-cryptalk-join-hands/)
|
|
||||||
* [Importance of an Integrated KYC solution for your compliance program](https://kyc-chain.com/importance-of-an-integrated-kyc-solution-for-your-compliance-program/) kyc-chain
|
|
||||||
|
|
||||||
The way many businesses have traditionally implemented KYC is by taking a manual, fragmented approach – essentially implementing various different KYC processes using different tools, methods and resources, including human compliance teams.
|
|
@ -1,22 +0,0 @@
|
|||||||
# Asia SSI Startups
|
|
||||||
|
|
||||||
- Afinidi
|
|
||||||
- ZADA
|
|
||||||
- Mattr
|
|
||||||
- Dihway
|
|
||||||
- Ayanworks
|
|
||||||
- NewLogic
|
|
||||||
|
|
||||||
### Zada
|
|
||||||
|
|
||||||
* [We are now officially live in Myanmar!](https://zada.io/we-are-now-officially-live-in-myanmar/)
|
|
||||||
|
|
||||||
ZADA apps are all launched and our first digital ID – a COVIDPASS – is being issued by Pun Hlaing Hospitals to everyone who gets vaccinated.
|
|
||||||
|
|
||||||
### AyanWorks
|
|
||||||
|
|
||||||
[AyanWorks](https://twitter.com/ayanworkstech/status/1488841615217098754): [@ayanworkstech](https://twitter.com/ayanworkstech) is excited to announce that we, along with our partners Vereign and [@DAASI_Int](https://twitter.com/DAASI_Int), have won 3 tenders from [@gaiax_aisbl](https://twitter.com/gaiax_aisbl) to build SSI solutions
|
|
||||||
* [Aries Mobile Agent SDK for Google Flutter](https://ayanworks.medium.com/announcing-arnima-fl-open-source-aries-flutter-mobile-agent-sdk-d3483744ffc8)
|
|
||||||
> Exactly a year ago in Jan 2020, we announced ARNIMA — first ever Aries React Native Mobile Agent SDK that we made open source for the Self-Sovereign Identity ecosystem.
|
|
||||||
>
|
|
||||||
> [...] We are very excited to announce [one more small open-source contribution](https://github.com/ayanworks/ARNIMA-flutter-sdk) from AyanWorks to the Aries community.
|
|
@ -1,27 +0,0 @@
|
|||||||
# EU SSI Startups
|
|
||||||
|
|
||||||
- MyDex
|
|
||||||
- MeeCo
|
|
||||||
- JoloCom
|
|
||||||
- ValidatedID
|
|
||||||
- Bloqzone
|
|
||||||
- Procivis
|
|
||||||
+ Kilt
|
|
||||||
+ Cheqd
|
|
||||||
|
|
||||||
## more
|
|
||||||
|
|
||||||
https://essif-lab.eu/wp-content/uploads/2022/09/essif-booklet-22a.pdf
|
|
||||||
|
|
||||||
[Ocean Protocol joins leading Web3 projects on the €20M+ Gaia-X moveID initiative to advance pan-European mobility](https://blog.oceanprotocol.com/ocean-protocol-joins-leading-web3-projects-on-the-20m-gaia-x-moveid-initiative-to-advance-72e4675d12d7) Ocean Protocol
|
|
||||||
|
|
||||||
Chainstep, Datarella, Fetch.ai, peaq and 51nodes
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## Tangle Labs
|
|
||||||
|
|
||||||
* [Identity Manager – Self Sovereign Identity made Simple](https://tanglelabs.io/identity-manager-self-sovereign-identity-made-simple/) TangleLabs
|
|
||||||
|
|
||||||
By producing an accessible, open-source wrapper library, Tangle Labs provides any business or development team the opportunity to easily explore SSI and to test and prototype solutions that can bring added value to your business.
|
|
||||||
|
|
@ -1,14 +0,0 @@
|
|||||||
# Bloqzone
|
|
||||||
|
|
||||||
* [Adding SSI to internet communications using Sylk Suite by Bloqzone B.V.](https://essif-lab.eu/adding-ssi-to-internet-communications-using-sylk-suite-by-bloqzone-b-v/) ESSIF LAB
|
|
||||||
|
|
||||||
The project SSIComms adds SSI to internet communications by adding SSI wallets to the renowned SYLK Suite, an award winning ensemble of communications solutions with the SIP protocol at its core.
|
|
||||||
|
|
||||||
* [verify the verifier use-case](https://bloqzone.com/who-wants-to-know/) TNO
|
|
||||||
> The article proposes including coercion countermeasures in governance frameworks:
|
|
||||||
> - Require authoritative verifier.
|
|
||||||
> - Require evidence collection.
|
|
||||||
> - Require enabling anonymous complaints.
|
|
||||||
> - Require remote/proxy verification.
|
|
||||||
> - Require complying holder agent.
|
|
||||||
|
|
@ -1,30 +0,0 @@
|
|||||||
# Cheqd
|
|
||||||
|
|
||||||
* [cheqd is launching a self-sovereign identity network on Cosmos this year](https://blog.cheqd.io/verim-is-launching-a-self-sovereign-identity-network-on-cosmos-in-2021-8949e68b2ef8)
|
|
||||||
|
|
||||||
It's Verim in New clothes. Kaliya still doesn’t like this model. Requiring verifiers to pay issuers is really really privacy problematic.
|
|
||||||
|
|
||||||
We want to provide a common and public infrastructure easily accessible to anyone and any organisation that provides B2B and B2B2C payment rails between issuers, holders, and receivers of trusted data. [...] cheqd is not and does not plan on dictating a single payment model. Rather, our product vision is to enable each ecosystem to decide this on their own through [Layer 1 vs Layer 2 mechanisms](https://blog.verim.id/self-sovereign-identity-semantics-an-economic-extension-to-the-trust-over-ip-stack-4a4197d8f6d3) and customisable tokenomics.
|
|
||||||
|
|
||||||
* [Why self-sovereign identity will increase university demands for a future in lifelong digital credentials](https://www.biometricupdate.com/202209/why-self-sovereign-identity-will-increase-university-demands-for-a-future-in-lifelong-digital-credentials) BiometricUpdate
|
|
||||||
|
|
||||||
Biometrics Update running a series by cheqd CEO Fraser Edwards
|
|
||||||
* [Self-sovereign identity use cases](https://blog.cheqd.io/self-sovereign-identity-use-cases-43bb03d49e13) Cheqd
|
|
||||||
|
|
||||||
While self-sovereign identity (SSI) sounds like an unfamiliar concept for some, others are actively leveraging the technology to address industry-specific challenges — take the KYC trial of the [Financial Conduct Authority](https://www.evernym.com/blog/evernym-accepted-into-fca-regulatory-sandbox/) or the [IATA Travel Pass.](https://www.iata.org/en/pressroom/pr/2020-12-16-01/)
|
|
||||||
* [Our Approach to Resources on-ledger](https://blog.cheqd.io/our-approach-to-resources-on-ledger-25bf5690c975): Using the capabilities of the DID Core specification for standards-compliant resource lookup
|
|
||||||
|
|
||||||
Decentralised Identifiers (DIDs): are often stored on ledgers (e.g., [cheqd](https://github.com/cheqd/node-docs/blob/adr-008-resources-updates/architecture/adr-list/adr-002-cheqd-did-method.md), [Hyperledger Indy](https://hyperledger.github.io/indy-did-method/), distributed storage (e.g., [IPFS](https://ipfs.io/) in [Sidetree](https://identity.foundation/sidetree/spec/)), or non-ledger distributed systems (e.g., [KERI](https://keri.one/)). Yet, DIDs can be stored on traditional centralised-storage endpoints (e.g., [did:web](https://w3c-ccg.github.io/did-method-web/), [did:git](https://github-did.com/)).
|
|
||||||
* [Metaverse and self-sovereign identity (SSI): new superpower?](https://blog.cheqd.io/metaverse-and-self-sovereign-identity-ssi-new-superpower-b4cac6319885) Cheqd
|
|
||||||
|
|
||||||
Besides an exciting front side of virtual reality (VR) element that everybody could at least vaguely relate to, there are a lot of other interesting developments, particularly around the digital economy and trusted interactions enabled through digital and self-sovereign identity (SSI).
|
|
||||||
* [Why cheqd has joined the Cosmos](https://blog.cheqd.io/why-cheqd-has-joined-the-cosmos-4db8845722c5)
|
|
||||||
|
|
||||||
We know that many communities are desirably and rightly passionate about their adopted protocols. We are not taking shots at any of the ones discussed below, which we didn’t take forward; we only want to explain our thinking and why we see using Cosmos as a massive boon for us.
|
|
||||||
|
|
||||||
* [AnonCreds Indy-Pendence](https://blog.cheqd.io/anoncreds-indy-pendence-4946367469d4) Cheqd
|
|
||||||
|
|
||||||
Part 1: Decoupling the reliance on Hyperledger Indy and creating more extensible AnonCreds Objects with cheqd.
|
|
||||||
* [Self-sovereign identity use cases](https://blog.cheqd.io/self-sovereign-identity-use-cases-43bb03d49e13) Cheqd
|
|
||||||
|
|
||||||
While self-sovereign identity (SSI) sounds like an unfamiliar concept for some, others are actively leveraging the technology to address industry-specific challenges — take the KYC trial of the [Financial Conduct Authority](https://www.evernym.com/blog/evernym-accepted-into-fca-regulatory-sandbox/) or the [IATA Travel Pass.](https://www.iata.org/en/pressroom/pr/2020-12-16-01/)
|
|
@ -1,28 +0,0 @@
|
|||||||
# Energy Web
|
|
||||||
|
|
||||||
* [Self-Sovereign Identity for the Enterprise with Switchboard](https://medium.com/energy-web-insights/unlocking-the-potential-of-self-sovereign-identity-for-enterprise-with-energy-web-switchboard-ab41499003a0) Energy Web
|
|
||||||
> This release includes major updates to the front-end Switchboard web application as well as the back-end libraries and components, giving companies access to the full suite features offered by legacy identity access management solutions in a decentralized architecture.
|
|
||||||
* [Energy Web Quarterly Update](https://medium.com/energy-web-insights/energy-web-quarterly-update-855feb5878b6)
|
|
||||||
> Switchboards, our enterprise-grade self sovereign identity and access management solution built on the W3C administered decentralized identifier standard. Examples include [Stedin’s identity and access management solution](https://medium.com/energy-web-insights/stedin-the-dutch-distribution-system-operator-announces-partnership-with-energy-web-to-explore-cd278623809b), [CAISO flex alert](https://medium.com/energy-web-insights/california-grid-operator-launches-new-demand-flexibility-platform-enhancements-to-flex-alert-system-e01ae8030da0), [and our work with Vodafone](https://medium.com/energy-web-insights/energy-web-announces-development-of-renewable-energy-ev-charging-with-vodafone-and-mastercard-94e1ac4c4aa1), [Kigen, and KORE wireless](https://medium.com/energy-web-insights/kore-collaborates-with-kigen-and-energy-web-to-provide-integrated-esim-based-trusted-identity-b22854958851).
|
|
||||||
* [How large is the market for Energy Web DIDs?](https://medium.com/energy-web-insights/how-large-is-the-market-for-energy-web-dids-bda42a2848cc) EnergyWeb
|
|
||||||
> At Energy Web, we understand that in order to have any meaningful adoption of enterprise applications using decentral technology, a DID-based tech stack has to be offered in a convenient and reliable way as well. This is why we’re developing the Decentralized Service Level Assurance (DLSA) solution.
|
|
||||||
* [Stedin, the Dutch Distribution System Operator, Announces Partnership with Energy Web to Explore the Future of Asset Management](https://medium.com/energy-web-insights/stedin-the-dutch-distribution-system-operator-announces-partnership-with-energy-web-to-explore-cd278623809b)
|
|
||||||
> Energy Web, the non-profit building operating systems for energy grids, and Stedin, the Dutch distribution system operator (DSO), announced a partnership today to deploy a future-proofed solution for managing energy assets. This would include DSO-native devices, such as smart meters and distribution automation devices, and consumer/prosumer devices commonly referred to as distributed energy resources (DERs).
|
|
||||||
* [An Energy Data Space to boost the European data economy](https://medium.com/energy-web-insights/an-energy-data-space-to-boost-the-european-data-economy-7edf6fc1f6f6) EnergyWeb
|
|
||||||
|
|
||||||
“There will be no Green Energy Transition without full digitalization. There will be no EU data strategy without data sharing. Data Spaces can answer to both challenges at once, being Energy one of the flagship use cases.” Javier Valiño — Atos
|
|
||||||
* [Energy Web and Volkswagen deliver 24/7 renewable energy charging solution for electric vehicles](https://medium.com/energy-web-insights/energy-web-and-volkswagen-deliver-24-7-renewable-energy-charging-solution-for-electric-vehicles-734132c5a737): Solution enables EV owners to charge from specific power plants and match their charging session with close to real-time production from renewables
|
|
||||||
|
|
||||||
The purpose of this project has been to showcase that advanced EV charging solutions can empower EV owners to set their own preferences for when and where they get their energy. For instance, they can select to charge using wind and solar resources, from energy assets within a 10 km radius, and target 80% charge by 5 pm — all from within a user-friendly application, with an accurate breakdown of their session’s carbon footprint
|
|
||||||
|
|
||||||
* [Unlocking the Potential of Self-Sovereign Identity for Enterprise with Energy Web Switchboard](https://medium.com/energy-web-insights/unlocking-the-potential-of-self-sovereign-identity-for-enterprise-with-energy-web-switchboard-ab41499003a0) EnergyWeb
|
|
||||||
|
|
||||||
At Energy Web we believe self-sovereign identity (SSI) will become a fundamental pillar of the energy transition, enhancing interoperability and strengthening security for billions of assets, organizations, and customers.
|
|
||||||
* [Digging Deeper into Self-sovereign Identity and Access Management](https://medium.com/energy-web-insights/digging-deeper-into-self-sovereign-identity-and-access-management-e6eefbac631e) Energy Web Foundation
|
|
||||||
> What we’d like to highlight in this simplified process is the fact that it is the user who stores the claim and anchors it on chain. Also, because it is a private claim, the contents are provable but not disclosed. The user can therefore prove that they have been granted a certain privilege, but unless they elect to disclose this information, it is impossible for a third party to find out.
|
|
||||||
* [DIDs are not enough - we need an Authoriziation standard too](https://medium.com/energy-web-insights/api-access-security-for-dapps-cfcfa928623c) Energy Web
|
|
||||||
|
|
||||||
If you are a developer and want to write a DApp [...] you probably are using API-Keys in your front-end. If this is the case, then you should consider the security risk the publication of the API-Key in your front end represents and ask yourself if it would make sense to switch to a user authentication scheme.
|
|
||||||
* [How staking EWT increases cybersecurity for energy grids and enterprises](https://medium.com/energy-web-insights/how-staking-ewt-increases-cybersecurity-for-energy-grids-and-enterprises-f26bb308bb1a) EnergyWeb
|
|
||||||
> this mechanism is to use public blockchains, paired with cryptocurrency, for staking and distributing awards to nodes performing the verification work. By doing so, the execution of the verification mechanism is completely automated, immediate, and impartial.
|
|
||||||
|
|
@ -1,14 +0,0 @@
|
|||||||
# Kilt
|
|
||||||
|
|
||||||
* [KILT Protocol first Parachain to Successfully Migrate from Kusama to Polkadot](https://polkadot.network/blog/first-parachain-successfully-migrates-from-kusama-to-polkadot/)
|
|
||||||
|
|
||||||
Besides marking an important technical milestone, the migration also represents the first instance of a parachain taking the upgrade path from Kusama to Polkadot. This demonstrates an important use case for the ‘canary network’ model pioneered by Polkadot
|
|
||||||
* [KILT Launches New Application for Digital Identities](https://cryptopotato.com/kilt-launches-new-application-for-digital-identities/) CryptoPotatoe
|
|
||||||
|
|
||||||
KILT, a blockchain identity protocol based on the Polkadot network, issues a new form of digital credentials, Web3name(w3n), for users to represent their own digital identities. The credentials recorded on the distributed ledgers will be permanent addresses users can access anytime on the Polkadot ecosystem, as [stated](https://medium.com/kilt-protocol/introducing-web3name-your-unique-digital-name-for-web3-the-internet-of-the-future-c301a18f75e8) in the announcement.
|
|
||||||
|
|
||||||
* [KILT: Self-Sovereign Identity for a Web3 World](https://pedroporky.medium.com/kilt-self-sovereign-identity-for-a-web3-world-929be0ac2afe) AMG-PORKY
|
|
||||||
|
|
||||||
the protocol uses a tiered approach with three roles — Claimer, Attester and Verifier
|
|
||||||
|
|
||||||
- [BTE and myNFT Announce AssetDIDs for NFTs, Built on KILT](https://medium.com/kilt-protocol/bte-and-mynft-announce-assetdids-for-nfts-built-on-kilt-6c06a2f9d8dd)
|
|
@ -1,26 +0,0 @@
|
|||||||
# Lissi
|
|
||||||
|
|
||||||
* [Digital Technologies Forum now includes the Lissi demo](https://lissi-id.medium.com/lissi-demonstration-im-forum-digitale-technologien-82d5f0c07a5d) <- in german
|
|
||||||
> Digital Technologies Forum is a networking platform and exhibition space for selected research projects and innovations in the field of digital technologies from Germany. The forum offers outstanding research projects a platform for more visibility and promotes exchange and knowledge transfer at national and international level.
|
|
||||||
* [EUDI Wallet: Illustration of the eIDAS roles and functions](https://lissi-id.medium.com/eu-id-wallet-illustration-of-the-eidas-roles-and-functions-6cb7bb6bca39) Lissi ID
|
|
||||||
> In the graphic below we reorganised and regrouped the stakeholders to map the requirements for the eIDAS toolbox architecture onto a SSI framework (Self-Sovereign Identity framework).
|
|
||||||
* [@lissi_id The European Digital Identity #Wallet #EUDI will have a modular framework](https://mobile.twitter.com/lissi_id/status/1536645378451333127)
|
|
||||||
> for the user interface, data storage, cryptographic protocols, sensitive cryptographic material and eID mean modules. "[Requirements and Solution CNECT/LUX/2022/OP/0011](http://etendering.ted.europa.eu/cft/cft-documents.html?cftId%3D10237)"
|
|
||||||
* [Trust in the digital space](https://lissi-id.medium.com/trust-in-the-digital-space-7762471351cf) Lissi ID
|
|
||||||
|
|
||||||
Would we rather have a high level of security or self-sovereignty? Unfortunately, the two aspects are at different ends of the spectrum. If we only allow pre-verified and approved parties to retrieve identity data, as currently envisaged by the [eIDAS regulation](https://lissi-id.medium.com/eidas-and-the-european-digital-identity-wallet-context-status-quo-and-why-it-will-change-the-2a7527f863b3), this severely restricts usage
|
|
||||||
|
|
||||||
issi
|
|
||||||
* [The Lissi Wallet now supports additional cards and convenience features](https://lissi-id.medium.com/the-lissi-wallet-now-supports-additional-cards-and-convenience-features-465aeedf5f5c)
|
|
||||||
|
|
||||||
The Lissi Wallet now supports additional cards and convenience features. Import of additional cards The Lissi Wallet does supports verified credentials, custom cards and pk.pass files The Lissi Wallet now supports .pkpass files, as well as other custom cards, in addition to verifiable credentials (first screen). Any card in the wallet that has a bar code or QR code can now be easi
|
|
||||||
* [eIDAS and the European Digital Identity Wallet](https://lissi-id.medium.com/eidas-and-the-european-digital-identity-wallet-context-status-quo-and-why-it-will-change-the-2a7527f863b3) Lissi
|
|
||||||
|
|
||||||
* [Lissi demonstrates authentication for Gaia-X Federation Services](https://lissi-id.medium.com/lissi-demonstrates-authentication-for-gaia-x-federation-services-819e9bbe70ad) Lissi ID
|
|
||||||
> Gaia-X creates an open, federated digital ecosystem for data infrastructure for decentralized cloud and edge workloads and data sharing capabilities. As part of the core services, the so-called Gaia-X Federation Services (GXFS) are targeting the areas of Identity & Trust, Federated Catalogue, Sovereign Data Exchange and Compliance as open-source reference implementations.
|
|
||||||
* [Lissi Connect Demo](https://lissi-id.medium.com/lissi-connect-demo-d6db29db7755) <- in German
|
|
||||||
> The login is only the start of the mutual customer relationship users do not want to monitor and maintain dozens of communication interfaces, but prefer a solution that brings these aspects together. This includes not only login services, but also newsletters, information letters from the bank, digital proof of any kind and other relevant personal information. The media break and the fragmentation of the current systems poses a major challenge for users and organizations. However, once stored in the user's wallet, this information can be easily managed, sorted and presented as needed.
|
|
||||||
* [The Lissi Wallet is now available in 12 languages!](https://lissi-id.medium.com/the-lissi-wallet-is-now-available-in-12-languages-f88e56b04e19)
|
|
||||||
> Lanugauges supported: Arabic • English • French • German • Italian • Korean • Polish • Portuguese • Russian • Romanian • Spanish • Turkish
|
|
||||||
|
|
||||||
> the language is only a small part of the whole user experience. The task is to design a universal cockpit, which people can navigate regardless of their social background. Similar to a dashboard in a car, which doesn’t look too different wherever you go. In order to achieve this, we have to standardize the icons, colours and user-flows to a certain degree. However, on the other hand, they need to be adjusted to the target audience.
|
|
@ -1,49 +0,0 @@
|
|||||||
# Mattereum
|
|
||||||
* [The Blockchain Sheep of Reason: Why the blockchain works for the young and old people hate it](https://medium.com/humanizing-the-singularity/the-blockchain-sleep-of-reason-b28f3bd3f83b) Ian Simmons, Mattereum
|
|
||||||
|
|
||||||
There is practically no boomer control of bitcoin or web3* [Decentralizing and Securing Collectible Card Grading Services with the Mattereum Protocol](https://medium.com/humanizing-the-singularity/decentralizing-and-securing-collectible-card-grading-services-with-the-mattereum-protocol-ead040351c2)
|
|
||||||
> Avoid costly industry deadlocks and gatekeeping with a peer-produced, decentralized alternative to centralized collectible grading and authentication services with the Mattereum Protocol
|
|
||||||
* [Countering Marketplace Deception with Mattereum’s Trust-as-a-Service Platform](https://medium.com/humanizing-the-singularity/countering-marketplace-deception-with-mattereums-trust-as-a-service-platform-2615dc2c47be)
|
|
||||||
|
|
||||||
Marketplace deception is everywhere, at great cost and risk to consumers and businesses. Regulation alone won’t fix it. Can Mattereum Asset Passports and Product Information Markets help secure trust in B2B and B2C trade?
|
|
||||||
* [Bringing Truth to Market with Trust Communities & Product Information Markets](https://medium.com/humanizing-the-singularity/bringing-truth-to-market-with-trust-communities-product-information-markets-d09fb4a6e780) Mattereum
|
|
||||||
|
|
||||||
With product information markets enabled by Trust Communities, we can incentivize truth in markets by allowing experts to make money on their expertise and face consequences for erroneous claims. Simple concept, powerful implications.
|
|
||||||
* [Introduction to Smart Property](https://medium.com/humanizing-the-singularity/introduction-to-smart-property-ecb446268f23) Humanizing the Singularity
|
|
||||||
|
|
||||||
How can we streamline and improve the techno-social protocols around commerce so we can better maintain equilibrium with our planet and ourselves?
|
|
||||||
* [The Best of Both Worlds: Solving Doctorow’s Oracle Problem](https://medium.com/humanizing-the-singularity/the-best-of-both-worlds-solving-doctorows-oracle-problem-3287cda2e48b)
|
|
||||||
|
|
||||||
So while the blockchain space is in some abstract sense perfectly private and perfectly reliable, things are weakest at the joints. The on-ramps and off-ramps are parts of the real world, they’re tied to physical reality and KYC/AML/CTF regulations.
|
|
||||||
|
|
||||||
Any system connected to the real world is going to have some of the problems of the real world connected to it too. That’s just life.
|
|
||||||
* [What is New in the World of Blockchain?](https://medium.com/humanizing-the-singularity/what-is-new-in-the-world-of-blockchain-8a95cb4ac7ac) An Interview with Vinay Gupta
|
|
||||||
|
|
||||||
Vinay: My history goes back to the 1990s. I was involved very heavily in the kind of cypherpunk movement in the ’90s. My first year where 100% of my salary went through crypto cash was 1999, so ‘99/2000 I got a full year of salary in crypto cash.
|
|
||||||
* [FOS Ep. 5: Ian Grigg on Crypto, Identity, Community, and Building Positive-Sum Systems](https://medium.com/humanizing-the-singularity/fos-ep-5-ian-grigg-on-crypto-identity-community-and-building-positive-sum-systems-17ef316703b9)
|
|
||||||
|
|
||||||
Ian Grigg is one of the most influential builders in the crypto space, having built digital asset systems since the nineties. We discuss his invention of the Ricardian contract framework, what makes cryptonetworks successful, identity as communal phenomenon, and the importance of building positive-sum systems.
|
|
||||||
|
|
||||||
* [Winter Has Come](https://medium.com/humanizing-the-singularity/winter-has-come-e56fcb667cfa) Humanizing the Singularity
|
|
||||||
|
|
||||||
crypto wins by solving problems that nobody else can solve, profitably. It has to win at three levels to survive:
|
|
||||||
|
|
||||||
- Ordinary people have to use it
|
|
||||||
- It has to generate actual value, not just move value around
|
|
||||||
- Governments have to tolerate it or use it themselves — either one will do
|
|
||||||
|
|
||||||
* [Build Back Better!](https://medium.com/humanizing-the-singularity/build-back-better-8a1be80623b2) Humanizing the Singularity
|
|
||||||
|
|
||||||
VR is not ready for artistic reasons, far more than for technical ones.
|
|
||||||
|
|
||||||
So my prediction is this: the Metaverse is going to fail.
|
|
||||||
|
|
||||||
The stay-at-home culture which VR is fundamentally rooted in doesn’t provide the lived experiences which people want.
|
|
||||||
|
|
||||||
* [How to Save the Blockchain](https://medium.com/humanizing-the-singularity/how-to-save-the-blockchain-cc404daecc69) Ian Simmons, Matterium
|
|
||||||
|
|
||||||
crypto wins by solving problems that nobody else can solve, profitably. It has to win at three levels to survive:
|
|
||||||
|
|
||||||
- Ordinary people have to use it
|
|
||||||
- It has to generate actual value, not just move value around
|
|
||||||
- Governments have to tolerate it or use it themselves — either one will do
|
|
@ -1,100 +0,0 @@
|
|||||||
# MyDex
|
|
||||||
|
|
||||||
|
|
||||||
* [The Perils of Pre-Copernican Data Strategy](https://medium.com/mydex/the-perils-of-pre-copernican-data-strategy-974827845585) Alan Mitchell, MyDex
|
|
||||||
|
|
||||||
Today, ‘everyone’ including powerful actors and decision-makers like the UK Government ‘just know’ that organisations are the centre of the personal data universe, and that everyone else including citizens revolves around these organisations.
|
|
||||||
|
|
||||||
* [Hidden in Plain Sight — the Transformational Potential of Personal Data](https://medium.com/mydex/hidden-in-plain-sight-the-transformational-potential-of-personal-data-da47f666713e) MyDex
|
|
||||||
> Personal data stores apply the same economic logic to transform the costs of producing data driven services. [Verified attributes](https://medium.com/mydex/unleashing-the-potential-of-verified-attributes-fe001e01b091) are the digital equivalents of Henry Ford’s standardised parts. By enabling one organisation to instantly re-use data verified by another organisation they eliminate the need for vast amounts of duplicated effort and rework (re-creating each data point from scratch or checking its details, provenance etc).
|
|
||||||
|
|
||||||
* [Helping Data Trusts Manage Personal Data](https://medium.com/mydex/helping-data-trusts-manage-personal-data-4215faaee5f2) Mydex
|
|
||||||
|
|
||||||
Mydex CIC has just published a blog for Cambridge University’s Data Trust Initiative on ‘Helping Data Trusts Manage Personal Data’. In it, we address the challenges that arise as the Data Trust movement begins to scale.
|
|
||||||
|
|
||||||
* [Getting Data Security Right](https://medium.com/mydex/getting-data-security-right-36d291cac156) Alan Michel
|
|
||||||
|
|
||||||
data security is about system-wide design, where many different elements need to fit together to create a working whole.
|
|
||||||
* [Why we need new, nationwide personal data infrastructure](https://medium.com/mydex/why-we-need-new-nationwide-personal-data-infrastructure-56513fb6daf4)
|
|
||||||
|
|
||||||
The central plank of Mydex CIC’s consultation response is that the UK needs to build a new layer of data logistics infrastructure that:
|
|
||||||
|
|
||||||
- Includes citizens in the workings of the data economy, empowering them with the ability to collect, store, use and share data about themselves independently of any data controllers they may have data relationships with.
|
|
||||||
- To achieve this, the Government needs to ensure that every citizen is provided with their own personal data store, which enables citizens to collect, store, share and use their own data, under their own control, for their own purposes, independently of any organisation that may have collected data about them.
|
|
||||||
- These personal data stores should be designed to act as neutral, enabling nodes in a vibrant data sharing network, whereby citizens can obtain copies of their data held by organisations and can forward relevant elements of this data (such as Verified Attributes) to other data users under their control, as and when beneficial and necessary.
|
|
||||||
|
|
||||||
|
|
||||||
* [Achieving Change At Scale](https://medium.com/mydex/transforming-the-system-a-roadmap-for-practical-implementation-411e8821ed19)
|
|
||||||
> This is the third in a series of blogs providing edited extracts from Mydex CIC’s response to the UK Government [consultation around a new National Data Strategy](https://www.gov.uk/government/consultations/uk-national-data-strategy-nds-consultation).
|
|
||||||
|
|
||||||
The first focused on [how to unleash the full potential of personal data](https://medium.com/mydex/how-to-unleash-the-full-potential-of-data-3676db8d7c03), the second on why [every citizen should be provided with their own personal data store](https://medium.com/mydex/how-to-unleash-the-full-potential-of-data-3676db8d7c03). This blog explains why this strategy can be quick and easy to implement.
|
|
||||||
|
|
||||||
To catch up on progress on our Macmillan My Data Store Pilot [click here](https://medium.com/macmillan-my-data-store-pilot).
|
|
||||||
* [Misconceptions that Kill Progress in Personal Data](https://medium.com/mydex/misconceptions-that-kill-progress-in-personal-data-4736b1d883c6)
|
|
||||||
> It is not possible to make good policy decisions about priorities for investments, grants, innovation and research projects or rules and regulations if the grounds for these decisions are faulty. Currently, effective policy making is hampered by widespread misunderstandings about where the biggest economic opportunities lie, the nature of issues such as control, and the role of citizens in the workings of the data economy.
|
|
||||||
|
|
||||||
* [Not Just Personal Data Stores](https://medium.com/mydex/not-just-personal-data-stores-f2070eada6be) Alan Mitchell
|
|
||||||
> This is the fifth in a series of blogs which provide edited extracts of key points made by Mydex CIC in its response to the UK Government [consultation around a new National Data Strategy](https://www.gov.uk/government/consultations/uk-national-data-strategy-nds-consultation).
|
|
||||||
|
|
||||||
This blog focuses on the main ingredients needed to unleash the full potential of personal data — in addition to personal data stores.
|
|
||||||
* [Can I trust you?](https://medium.com/mydex/can-i-trust-you-6771a6ca0e35) MyDex
|
|
||||||
> This is the second of two blogs on our new White Paper: [Achieving Transform At Scale](https://mydex.org/resources/papers/AchievingTransformationatScaleMydexCIC-2021-04-14.pdf). The [first blog](https://medium.com/mydex/our-new-white-paper-achieving-transformation-at-scale-f97320f8447e) focused on the infrastructure challenge. This blog focuses on the parallel need for institutional innovation.
|
|
||||||
|
|
||||||
* [Our New White Paper: Achieving Transformation At Scale](https://medium.com/mydex/our-new-white-paper-achieving-transformation-at-scale-f97320f8447e)
|
|
||||||
|
|
||||||
Link to [White paper](https://mydex.org/resources/papers/AchievingTransformationatScaleMydexCIC-2021-04-14.pdf) “It’s not enough to identify what’s wrong with how things work today.“
|
|
||||||
|
|
||||||
* [Revolutionising healthy ageing](https://medium.com/mydex/revolutionising-healthy-ageing-200a7edd1016)
|
|
||||||
|
|
||||||
Mydex’s role will be to provide the data sharing infrastructure to enable individuals and service providers to safely and efficiently share the right data at the right times, in ways that protects individuals’ privacy and puts them in control of their data at all times and enable two way engagement and feedback throughout the project.
|
|
||||||
* [Designed for Integrity](https://medium.com/mydex/designed-for-integrity-13a69bcda0b2) MyDEX
|
|
||||||
|
|
||||||
Below are some of the design principles that underpin our infrastructure and services — principles designed to ensure that what we do truly does serve citizens, today and into the future.
|
|
||||||
|
|
||||||
* [AI: The Emperor’s New Clothes?](https://medium.com/mydex/ai-the-emperors-new-clothes-91de9eed3650) Mydex
|
|
||||||
|
|
||||||
One reason the UK Government wants to abolish citizens’ rights to data protection is to create conditions for Artificial Intelligence (AI) to blossom. This, it says, will “bring incredible benefits to our lives”.
|
|
||||||
|
|
||||||
* [Deploying Personal Data Stores at Scale](https://medium.com/mydex/deploying-personal-data-stores-at-scale-ad35fb205e73)
|
|
||||||
|
|
||||||
The big question now is how to enable this to happen at scale, safely, securely and efficiently. One key element of this is useful, easy-to-use interfaces, the taps and switches that mean people can use the infrastructure without having to think much about it. .
|
|
||||||
|
|
||||||
* [Flicking the Switch of Personal Data](https://medium.com/mydex/flicking-the-switch-of-personal-data-4c5d0d368a31) MyDex
|
|
||||||
|
|
||||||
Over the last 14 years we have built the infrastructure needed to make citizen data empowerment possible — infrastructure capable of providing every individual with their own personal data store, where they can safely and securely collect their own data, use it and share it under their own control. This infrastructure is now live and operational, officially recognised as a supplier to public services on procurement platforms in both England and Scotland and independently accredited for data management security under ISO 27001.
|
|
||||||
* [Getting Identity Right. At Last.](https://medium.com/mydex/getting-identity-right-at-last-8512abadcfbc) MyDex
|
|
||||||
|
|
||||||
By recognising the pivotal importance of verified attributes and the potential role of personal data stores in enabling the sharing of these attributes, it is opening the door to actually solving the problem of identity. At last.
|
|
||||||
|
|
||||||
|
|
||||||
* [A critical fork in the data road?](https://medium.com/mydex/a-critical-fork-in-the-data-road-1eb29c5a42a8) MyData
|
|
||||||
|
|
||||||
Is the EU discussion about data portability missing a key point?
|
|
||||||
|
|
||||||
In its discussion of data portability the EU rightly recognises the economic importance of this issue, stressing that “market imbalances arising from the concentration of data restricts competition, increases market entry barriers and diminishes wider data access and use.”
|
|
||||||
|
|
||||||
it is likely that many dApp developers now need an identity solution that preserves privacy but ensures compliance – which is exactly the solution that we are building at SelfKey.
|
|
||||||
|
|
||||||
One of MyDex CIC’s founders, [Alan Mitchell shares a feeling of Vindication](https://medium.com/mydex/vindicated-cb897fb4e94b) in a post celebrating the companies early articulation of key principles and how the EU’s proposed new Data Governance Act aligns with that.
|
|
||||||
> These providers will have to comply with a number of requirements, in particular the requirement to remain neutral as regards the data exchanged. They cannot use such data for other purposes. In the case of providers of data sharing services offering services for natural persons, the additional criterion of assuming fiduciary duties towards the individuals using them will also have to be met.
|
|
||||||
* [Public Spending: One Way to Solve Many Problems](https://medium.com/mydex/public-spending-one-way-to-solve-many-problems-3ac394e46a9e) Digital Scot
|
|
||||||
“We will identify where there may be shared interest, duplication or overlap in intended policy outcomes over multiple portfolios. Where there is, we will look to develop a more effective and efficient cross-government solution.”
|
|
||||||
* [MyDex is working with the Scotish Government](https://blogs.gov.scot/digital/2020/05/13/digital-identity-scotland-prototype-draws-to-a-close/)
|
|
||||||
> MyDex is a community interest corporation that has been working on building *real products in the real world*. They [wrote about the ongoing work](https://medium.com/mydex/proving-verified-attributes-work-3f9ca813d43f) enabling public sector organizations to give citizens verifiable attributes they keep in their own data stores and can prove to other parties without the issuing organization in the middle.
|
|
||||||
* [MyDex CCI on working with the Scottish Government](https://medium.com/mydex/a-way-forward-for-personal-data-6251d1503bdd)
|
|
||||||
> Over the past months Mydex CIC has been [working for the Scottish Government](https://blogs.gov.scot/digital/2020/10/01/digital-identity-scotland-a-beta-industry-event/) on a strategy for implementing and scaling a system of ‘smart entitlements’ for the citizens of Scotland.
|
|
||||||
* [Design Principles for the Personal Data Economy](https://medium.com/mydex/design-principles-for-the-personal-data-economy-f63ffa93e382) MyDex ([whitepaper](https://mydex.org/resources/papers/)
|
|
||||||
|
|
||||||
A key part of this is continuity and longevity: a personal data store is for life, so the institutions providing personal data stores should be designed for decades (centuries, even). Whatever particular corporate form they take, legal safeguards relating to continuity and longevity of purpose need to be built into how they operate.
|
|
||||||
* [Getting Identity Right. At Last.](https://medium.com/mydex/getting-identity-right-at-last-8512abadcfbc) MyDex
|
|
||||||
|
|
||||||
By recognising the pivotal importance of verified attributes and the potential role of personal data stores in enabling the sharing of these attributes, it is opening the door to actually solving the problem of identity. At last.
|
|
||||||
* [Data: A New Direction — But Which Direction?](https://medium.com/mydex/data-a-new-direction-but-which-direction-da547b886ac0) Alan Mitchell
|
|
||||||
|
|
||||||
This is the fifth and final blog in our series about the UK Government’s proposals for data protection reform — “Data: A New Direction”. Previous blogs focused on the thinking behind the proposals. This blog summarises what the main proposals are.
|
|
||||||
* [Why is data valuable?](https://medium.com/mydex/why-is-data-valuable-59bd63e1a09f)
|
|
||||||
> prompted by the UK Government’s proposed reforms of data protection law contained in its consultation paper Data: A New Direction.
|
|
||||||
>
|
|
||||||
> […]
|
|
||||||
>
|
|
||||||
> Under the banner of tackling ‘consent fatigue’, abolish citizens’ right to consent to the collection and use of their data: achieved by expanding the definition of organisations’ ‘legitimate interests’ (where they don’t have to seek consent) to cover almost every activity
|
|
@ -1,11 +0,0 @@
|
|||||||
# Ocean Protocol
|
|
||||||
|
|
||||||
* [Self-Sovereign Identity (SSI) and Verifiable Credentials (VC) in Ocean Protocol](https://port.oceanprotocol.com/t/proposal-walt-id-bringing-self-sovereign-identity-ssi-and-verifiable-credentials-vc-to-ocean-protocol-proof-of-concept/976)
|
|
||||||
|
|
||||||
What already exists, more recently: [fine-grained permissions 1](https://blog.oceanprotocol.com/fine-grained-permissions-now-supported-in-ocean-protocol-4fe434af24b9):
|
|
||||||
|
|
||||||
1. Marketplace-level fine-grained permissions for browsing, publishing, etc within a marketplace frontend
|
|
||||||
2. Asset-level fine-grained permissions on consuming the asset itself
|
|
||||||
* [Ocean Protocol joins leading Web3 projects on the €20M+ Gaia-X moveID initiative to advance pan-European mobility](https://blog.oceanprotocol.com/ocean-protocol-joins-leading-web3-projects-on-the-20m-gaia-x-moveid-initiative-to-advance-72e4675d12d7) Ocean Protocol
|
|
||||||
|
|
||||||
Ocean Protocol, the Web3 platform to unlock data services for AI and business innovation, has joined forces with Chainstep, Datarella, Fetch.ai, peaq and 51nodes to develop the system architecture for European mobility with the preservation of data autonomy as its core principle, within the Gaia-X moveID project.
|
|
@ -1,23 +0,0 @@
|
|||||||
# Procivis
|
|
||||||
|
|
||||||
* [Self-Sovereign Identity and how we can get there](https://www.procivis.ch/post/self-sovereign-identity-and-how-we-can-get-there) ProCivis
|
|
||||||
|
|
||||||
Enabled by recent advances in the realm of cryptography, mobile devices and decentralized identity standards we can now put citizens firmly in control of their digital identities while ensuring the level of trust needed to unlock the full potential of a digital society.
|
|
||||||
* [ISO/IEC 18013-5 vs Self-Sovereign Identity: A proposal for an mDL Verifiable Credential](https://www.procivis.ch/post/iso-iec-18013-5-vs-self-sovereign-identity-a-proposal-for-an-mdl-verifiable-credential) Procivis
|
|
||||||
> in the context of government identity programs we see it as useful to compare them on the following parameters – background, credential data model & trust anchor and transmission protocols.
|
|
||||||
* [One step closer to self-sovereign identity - Procivis launches SSI+](https://www.procivis.ch/post/one-step-closer-to-self-sovereign-identity-procivis-launches-ssi)
|
|
||||||
|
|
||||||
Composed of the desk, wallet and gateway, SSI+ offers a complete solution for issuers, holders and verifiers of verifiable credentials (VCs) to get started with self-sovereign identity projects today. After evaluation of the emerging SSI frameworks, we determined that Hyperledger Indy delivers today the strongest privacy guarantees, interoperability and maturity.
|
|
||||||
|
|
||||||
* [The New Draft Law on eID Switzerland](https://www.procivis.ch/post/the-new-draft-law-on-eid-switzerland-en) Procivis
|
|
||||||
|
|
||||||
Yesterday's [media conference](https://www.youtube.com/watch?v%3DepW4xEqr3mw) and published [media release](https://www.bj.admin.ch/bj/de/home/aktuell/mm.msg-id-89515.html) opened the consultation process for the new E-ID law, which will last until October 20, 2022.
|
|
||||||
|
|
||||||
The preliminary [draft of the federal law](https://www.bj.admin.ch/dam/bj/de/data/staat/gesetzgebung/staatliche-e-id/vorentw.pdf) declared the purpose of the E-ID to be to ensure "secure identification by means of E-ID among private individuals and with authorities". The protection of the personality and fundamental rights of individuals is to be provided by the following principles defined in the law:
|
|
||||||
|
|
||||||
- Data protection through technology
|
|
||||||
- Data security
|
|
||||||
- Data economy
|
|
||||||
- Decentralized data storage
|
|
||||||
|
|
||||||
|
|
@ -1,44 +0,0 @@
|
|||||||
# Ubisecure
|
|
||||||
|
|
||||||
* [Digital identity in the UK in 2021 with TrueProfile.io’s René Seifert](https://www.ubisecure.com/podcast/digital-identity-uk-2021-ssi-trueprofile-rene-seifert/)
|
|
||||||
|
|
||||||
“I think it’s interesting if we overlay this utopia of a self-sovereign identity that sounds maybe like science fiction today, and where these UK digital initiatives are geared, and my best guess is we can and will land somewhere in the middle.”
|
|
||||||
* [vLEI 101 – the Verifiable Legal Entity Identifier](https://www.ubisecure.com/legal-entity-identifier-lei/vlei-101/) Ubisecure
|
|
||||||
|
|
||||||
We’ve been involved in some really cool work over the last few weeks focusing on the issuance of vLEIs and associated role credentials. Specifically, Ubisecure was the credential issuer for the GLEIF’s vLEI proof of concept project and issued the world’s first vLEI to the GLEIF, which was then used to sign the GLEIF’s 2021 annual report.
|
|
||||||
- [vLEI 101 – Issuance and Wallets](https://www.ubisecure.com/legal-entity-identifier-lei/vlei-101-issuance-and-wallets/) ubisecure
|
|
||||||
* [Verifiable Credentials – how does it work? Understanding key VC principles](https://www.ubisecure.com/identity-management/verifiable-credentials-understanding-key-principles/) Ubisecure
|
|
||||||
|
|
||||||
The Verifiable Credentials specification by W3C provides a way to express credentials on the web. In this article I’m giving an overview of components and terminology related to VCs, and also some information about other technologies and specifications that are needed when implementing Verifiable Credentials.
|
|
||||||
* [Making Identity Easy for Everyone - Heather Flanagan, Spherical Cow Consulting](https://www.ubisecure.com/podcast/making-identity-easy-heather-flanagan/) Ubisecure
|
|
||||||
|
|
||||||
how to explain digital identity to people outside of the identity industry, why is it important for everyone to understand, and what the industry can do to improve the understanding of identity for everyone.
|
|
||||||
* [Inclusive identity: are we doing enough? With Tricerion, Women in Identity and FinClusive](https://www.ubisecure.com/podcast/inclusive-identity-tricerion-women-in-identity-finclusive/) Ubisecure
|
|
||||||
|
|
||||||
One of the clearest areas of digital identity where we see the impact of not doing enough to include vulnerable people is authentication – the point where a user must verify their identity in order to gain access to a service.
|
|
||||||
* [Meet Kantara’s new Executive Director, Kay Chopard](https://www.ubisecure.com/podcast/kay-chopard-kantara/) Lets Talk about Digital Identity
|
|
||||||
> Kay explores why identity is so critical in so many applications; her hope for more promotion of Kantara’s great work and to advance opportunities for collaboration; Kantara’s new mobile drivers licenses (mDLs) work group; Women in Identity and the problem of lack of diversity in standards working groups; and why access and inclusion is one of the biggest challenges facing identity today.
|
|
||||||
* [Enhancing the Privacy of Mobile Credentials, with John Wunderlich](https://www.ubisecure.com/podcast/mobile-credentials-john-wunderlich/) Ubisecure
|
|
||||||
|
|
||||||
what are the challenges and solutions surrounding mobile credentials, what is IAM’s role in this and how systems need to be developed around trust.
|
|
||||||
* [Launching the Global Assured Identity Network (GAIN) with Elizabeth Garber](https://www.ubisecure.com/podcast/global-assured-identity-network-gain-elizabeth-garber/) UbiSecure
|
|
||||||
> fills us in on what the GAIN project is, explaining how it’s different from other trust networks and why GAIN is good for financial institutions. She also discusses the role of the Global Legal Entity Identifier Foundation (GLEIF) in the project, and what’s next for GAIN.
|
|
||||||
* [How to get a vLEI Credential](https://www.ubisecure.com/legal-entity-identifier-lei/how-to-get-a-vlei-credential/) Simon Wood, UbiSecure
|
|
||||||
|
|
||||||
The first step in issuance is for a representative to enter a contractual agreement with a QVI to provide the issuance service. The individual from the legal entity that undertakes this contractual signup is known as the Designated Authorised Representative (DAR) [...]
|
|
||||||
|
|
||||||
As per the LE-vLEI description the above is simplified. The full OOR-vLEIs issuance process is detailed in the [Ecosystem Governance Framework vLEI Credential Governance Framework Legal Entity Official Organizational Role](https://www.gleif.org/vlei/introducing-the-vlei-ecosystem-governance-framework/2022-02-07_legal-entity-vlei-credential-gf-draft-publication_v0.9-draft.pdf)
|
|
||||||
* [PSA Today: Kaliya & Seth talk LEIs](https://anchor.fm/psatoday/episodes/PSA-Today-34-Kaliya--Seth-talk-LEIs-Legal-Entity-Identifiers-with-Simon-Wood--CEO-of-Ubisecure-eqia74)
|
|
||||||
with Simon Wood, CEO of Ubisecure (#1 issuer of Legal Entity Identifiers)
|
|
||||||
> the evolution of LEIs since the financial crisis of 2008, the difference between high assurance and low assurance, and the relationship between rights and ownership as it relates to identity management of entities.
|
|
||||||
* [How LEIs streamline KYC](https://www.ubisecure.com/legal-entity-identifier-lei/lei-in-kyc/) Ubisecure
|
|
||||||
|
|
||||||
Ubisecure brought innovation to the LEI market by automating LEI issuance. Revolutionising how quickly and effectively an LEI can be registered. While improving data accuracy along the way by connecting directly to business registries globally. This innovation has helped RapidLEI to become the #1 LEI Issuer globally, issuing about 1 in 4 new LEIs monthly, in just 3 short years.
|
|
||||||
* [Lisa LeVasseur on the ethical behaviour of technology and the Me2B Alliance LTADI](https://www.ubisecure.com/podcast/lisa-levasseur-me2b-alliance/)
|
|
||||||
> the Me2B Alliance and how it aims to make technology better for humans, plus the businesses (B-s) which are shining a light on privacy issues and giving the Me-s more control.
|
|
||||||
>
|
|
||||||
> “We used to call ourselves something like the ‘organic food label’. But that’s actually not right. We’re more like independent automobile crash testing.”
|
|
||||||
* [Germany’s digital identity landscape with Verimi’s Roland Adrian](https://www.ubisecure.com/podcast/verimi-roland-adrian-identity-germany/)
|
|
||||||
|
|
||||||
In episode 40, Roland fills us in on how Verimi works and its privacy-by-design cornerstones, including data minimisation. Oscar and Roland also discuss the digital identity landscape in Germany
|
|
||||||
|
|
@ -1,80 +0,0 @@
|
|||||||
# Validated ID
|
|
||||||
|
|
||||||
* [Validated ID turns 10 years old! The best is yet to come](https://www.validatedid.com/post-en/validated-id-turns-10-years-old-the-best-is-yet-to-come) ValidatedID
|
|
||||||
> Today, we want to celebrate our ten years, reflecting on what we have accomplished and anticipating the future, because we are sure that there will be many more to come. As a result, we want to reaffirm our commitment to our objectives and mission. Moreover, we strive to improve our operations to ensure a prosperous future for our customers and partners.
|
|
||||||
* [Validated ID raises € 2M in financing round](https://www.validatedid.com/post-en/validated-id-raises-eu-2m-in-financing-round-from-randstad-innovation-fund-caixa-capital-risc-and-cuatrecasas-ventures)
|
|
||||||
|
|
||||||
The new financing is led by Randstad Innovation Fund, Caixa Capital Risc, and Cuatrecasas Ventures
|
|
||||||
* [Digital signatures, a fast track to digital transformation in the real estate sector](https://www.validatedid.com/post-en/digital-signatures-a-fast-track-to-digital-transformation-in-the-real-estate-sector)
|
|
||||||
|
|
||||||
The implementation of the electronic signature was a major development in the development in management.
|
|
||||||
|
|
||||||
99% of our documents are digitally signed digitally and we have eliminated many face-to-face meetings.
|
|
||||||
|
|
||||||
* [The time for the EIDAS bridge](http://validatedid.com/post-en/the-time-for-the-eidas-bridge)There’s an outstanding question, for us, around how this community explores and thinks about the theoretical underpinnings of a Community of Practice (CoP), but one thing is for sure, Keep Badges Weird is a CoP.
|
|
||||||
|
|
||||||
22. [https://github.com/validatedid/eidas-bridge](https://github.com/validatedid/eidas-bridge)
|
|
||||||
- [Infrastructure Development Winners](https://essif-lab.eu/meet-the-essif-labs-ecosystem-the-infrastructure-development-instrument-first-winners/) including SICPA, Jolocom, Evernym, ValidatedID
|
|
||||||
* [The time for the eIDAS Bridge](https://www.validatedid.com/post-en/the-time-for-the-eidas-bridge) ValidatedID
|
|
||||||
|
|
||||||
if you wonder how many of us, users, can really take advantage of PKI for identifying ourselves on the internet, the answer is quite deceiving. This mature technology has been available for decades but has never become mainstream among the society for identifying end users.
|
|
||||||
* [VIDchain is the first ID wallet to become EBSI compliant](https://www.validatedid.com/post-en/vidchain-is-the-first-id-wallet-to-become-ebsi-compliant)
|
|
||||||
|
|
||||||
* [Validated ID](https://bit.ly/3ipgSzB) participates in a project to build the [European Blockchain Services Infrastructure (EBSI)](https://ec.europa.eu/cefdigital/wiki/display/CEFDIGITAL/EBSI) for the support of cross-border public services, an initiative created by the European Commission. EBSI is developing a strong and mature ecosystem that Validated ID is proud to be part of.
|
|
||||||
|
|
||||||
* [Congrats to the 11 wallet providers for being conformant to @EU_EBSI](https://mobile.twitter.com/IgrantIo/status/1532036324882104321/photo/1) @IgrantIo
|
|
||||||
|
|
||||||
We are glad to be among the first few along with [@ValidatedID](https://mobile.twitter.com/ValidatedID) [@danube](https://mobile.twitter.com/danube) [@GATACA_ID](https://mobile.twitter.com/GATACA_ID) [@walt_id](https://mobile.twitter.com/walt_id) [@DXCTechnology](https://mobile.twitter.com/DXCTechnology) [@CIMEA_Naric](https://mobile.twitter.com/CIMEA_Naric) [@identyum](https://mobile.twitter.com/identyum) [@ThalesDigiSec](https://mobile.twitter.com/ThalesDigiSec) [@posteitaliane](https://mobile.twitter.com/posteitaliane)
|
|
||||||
|
|
||||||
|
|
||||||
* [The time for the eIDAS Bridge](http://validatedid.com/post-en/the-time-for-the-eidas-bridge) ValidatedID
|
|
||||||
|
|
||||||
The main goal of this new program was to provide an implementation of eIDAS bridge and to proof the interoperability between different provider implementations. Validated ID was selected to participate in part of the Call 1 of infrastructure. The results of this project are available as open source. If you are interested in digging into the code, you can find it all in the following repositories: [our open source version implementation](https://gitlab.grnet.gr/essif-lab/infrastructure/validated-id/seb) and the [SSI eIDAS Bridge interoperability](https://gitlab.grnet.gr/essif-lab/interoperability/ssi-eidas-bridge) performed with SICPA.
|
|
||||||
|
|
||||||
* [Validated ID's journey to becoming EBSI compliant](https://www.validatedid.com/post-en/validated-ids-journey-to-becoming-ebsi-compliant)
|
|
||||||
|
|
||||||
We at Validated ID have been betting on EBSI since the beginning. We started working to become conformant wallet providers since the very first version of [Wallet Conformance Tests (WCT)](https://ec.europa.eu/digital-building-blocks/wikis/display/EBSI/EBSI%2Bwallets) was published. The process of preparing our solution to become conformant has allowed us to appreciate how remarkable EBSI's work has been.
|
|
||||||
* [The digital transformation of the education sector](https://www.validatedid.com/post-en/the-digital-transformation-of-the-education-sector) ValidatedID
|
|
||||||
|
|
||||||
For schools and universities, adopting the electronic signature as a tool not only implies an improvement in the experience for students and employees, but it also means a great improvement in administrative processes.
|
|
||||||
* [The digital transformation of the education sector](https://www.validatedid.com/post-en/the-digital-transformation-of-the-education-sector) ValidatedID
|
|
||||||
|
|
||||||
The electronic signature improves the experience in education for students, teachers, parents, guardians and other school staff.
|
|
||||||
|
|
||||||
* [Electronic signatures for hospitality](https://www.validatedid.com/post-en/electronic-signatures-for-hospitality) ValidatedID
|
|
||||||
|
|
||||||
Looking at the many developments that have happened lately, digitization has become the center of attention for all kinds of industries, and yet many of the typical processes within the hospitality industry remain paper-based.
|
|
||||||
* [Digital signatures, a fast track to digital transformation in the real estate sector](https://www.validatedid.com/post-en/digital-signatures-a-fast-track-to-digital-transformation-in-the-real-estate-sector)
|
|
||||||
|
|
||||||
The latest real estate trend reports show how the pandemic has accelerated the use of technology and the implementation of trends such as teleworking and digitisation of processes. Find out how digital signatures are revolutionising the industry.
|
|
||||||
|
|
||||||
* [Digital signatures, a fast track to digital transformation in the real estate sector](https://www.validatedid.com/post-en/digital-signatures-a-fast-track-to-digital-transformation-in-the-real-estate-sector) ValidatedID
|
|
||||||
|
|
||||||
The report [Emerging Trends in Real Estate in Europe 2021](https://bit.ly/2Smqj8x), prepared by PwC and Urban Land Institute (ULI), presents a sector in full transformation. It also shows how the pandemic has accelerated the use of technology and the implementation of trends such as remote working and the digitisation of processes.
|
|
||||||
|
|
||||||
* [SportChain: a Decentralized Trust and Reputation Service for the Sports Industry](https://www.validatedid.com/post-en/sportchain-a-decentralized-trust-and-reputation-service-for-the-sports-industry) ValidatedID
|
|
||||||
|
|
||||||
Do you know the story of Carlos Kaiser? He was a professional Brazilian football player [that never played a single match](https://www.theguardian.com/football/blog/2017/apr/26/the-forgotten-story-of-carlos-kaiser-footballs-greatest-conman) but managed to still have a professional football career. He wanted the lifestyle without having to do the work.
|
|
||||||
|
|
||||||
* [A pilot project for interoperable decentralised identity between Aigües de Barcelona, CaixaBank and Validated ID](https://www.validatedid.com/post-en/open-innovation-project-for-the-collaboration-between-large-companies-and-emerging-companies) ValidatedID
|
|
||||||
|
|
||||||
the solution has allowed CaixaBank, at the request of a fictitious user, to issue an account ownership credential and, subsequently, this credential has been used to proceed with the direct debit of the invoices of Aigües de Barcelona
|
|
||||||
|
|
||||||
* [Validated ID's journey to becoming EBSI compliant](https://www.validatedid.com/post-en/validated-ids-journey-to-becoming-ebsi-compliant)
|
|
||||||
> [Wallet Conformance Tests] are designed to demonstrate that the wallet provider can onboard users safely, receive verifiable credentials from a trusted issuer, and present verifiable credentials to a verifier. All of these, using of course EBSI infrastructure.
|
|
||||||
|
|
||||||
* [Electronic signatures for hospitality](https://www.validatedid.com/post-en/electronic-signatures-for-hospitality) ValidatedID
|
|
||||||
|
|
||||||
Looking at the many developments that have happened lately, digitization has become the center of attention for all kinds of industries, and yet many of the typical processes within the hospitality industry remain paper-based.
|
|
||||||
|
|
||||||
* [A pilot project for interoperable decentralised identity between Aigües de Barcelona, CaixaBank and Validated ID](https://www.validatedid.com/post-en/open-innovation-project-for-the-collaboration-between-large-companies-and-emerging-companies) ValidatedID
|
|
||||||
|
|
||||||
the solution has allowed CaixaBank, at the request of a fictitious user, to issue an account ownership credential and, subsequently, this credential has been used to proceed with the direct debit of the invoices of Aigües de Barcelona
|
|
||||||
* [Digital signatures, a fast track to digital transformation in the real estate sector](https://www.validatedid.com/post-en/digital-signatures-a-fast-track-to-digital-transformation-in-the-real-estate-sector)
|
|
||||||
> The latest real estate trend reports show how the pandemic has accelerated the use of technology and the implementation of trends such as teleworking and digitisation of processes. Find out how digital signatures are revolutionising the industry.
|
|
||||||
* [Digital signatures, a fast track to digital transformation in the real estate sector](https://www.validatedid.com/post-en/digital-signatures-a-fast-track-to-digital-transformation-in-the-real-estate-sector) ValidatedID
|
|
||||||
> The report [Emerging Trends in Real Estate in Europe 2021](https://bit.ly/2Smqj8x), prepared by PwC and Urban Land Institute (ULI), presents a sector in full transformation. It also shows how the pandemic has accelerated the use of technology and the implementation of trends such as remote working and the digitisation of processes.
|
|
||||||
* [SportChain: a Decentralized Trust and Reputation Service for the Sports Industry](https://www.validatedid.com/post-en/sportchain-a-decentralized-trust-and-reputation-service-for-the-sports-industry) ValidatedID
|
|
||||||
|
|
||||||
Do you know the story of Carlos Kaiser? He was a professional Brazilian football player [that never played a single match](https://www.theguardian.com/football/blog/2017/apr/26/the-forgotten-story-of-carlos-kaiser-footballs-greatest-conman) but managed to still have a professional football career. He wanted the lifestyle without having to do the work.
|
|
||||||
|
|
@ -1,35 +0,0 @@
|
|||||||
# WaltID
|
|
||||||
|
|
||||||
* [The SSI Kit](https://walt.id/blog/p/ssi-kit) Walt ID
|
|
||||||
|
|
||||||
Introducing the SSI Kit, which offers developers and organisations an easy and fast way to use Self-Sovereign Identity (SSI).
|
|
||||||
|
|
||||||
* [Hello World. It’s Walt.id](https://walt.id/resources/blog/categories/company/hello-world-its-walt-id)
|
|
||||||
|
|
||||||
It is our goal to make SSI simple and accessible: to enable every developer and organisation to build identity and trust into the web and their applications. Ultimately, this will transform every digital interaction into an effortless and worry-free experience.
|
|
||||||
* [The SSI Kit](https://walt.id/blog/p/ssi-kit) Walt ID
|
|
||||||
> The SSI Kit bundles three components, one for each functionality profile:
|
|
||||||
>
|
|
||||||
> - Signatory ™ for Issuers enables organisations to transform any identity-related information into digital credentials in order to replace paper documents and automate data provision to stakeholders.
|
|
||||||
> - Custodian ™ for Holders enables individuals and organisations to securely store, manage and share keys and identity data via data hubs (“wallets”). (Web-Based wallet)
|
|
||||||
> - Auditor ™ for Verifiers enables organisations to verify identity data in order to authenticate or identify stakeholders and offer frictionless access to services or products.
|
|
||||||
* [The Wallet](https://walt.id/blog/p/wallet) Walt
|
|
||||||
> This post introduces our new open source product: the Wallet, which enables developers and organisations to put Self-Sovereign Identity (SSI) into the hands and pockets of the people via easy-to-use applications.
|
|
||||||
* [Me, myself and (SS)I Why everybody must have a Self-Sovereign Identity in 5 years](https://web-assets.bcg.com/6b/6d/84e00cad4c939c870d833b96321c/white-paper-me-myself-ssi.pdf)
|
|
||||||
* [Open Policy Agent: Credential validation powered by the Open Policy Agent](https://docs.walt.id/v/ssikit/ssi-kit/open-policy-agent) Walt ID
|
|
||||||
> The Open Policy Agent ([https://www.openpolicyagent.org](https://www.openpolicyagent.org)) is an open source, general-purpose policy engine that unifies policy enforcement. OPA provides a high-level declarative language called [Rego](https://www.openpolicyagent.org/docs/latest/%23rego) that lets you specify policy as code in order to offload policy decision-making from your business logic.
|
|
||||||
|
|
||||||
* [Introduction to NFTs for Identity](https://walt.id/decentralized-identity-explained/nfts) walt.id
|
|
||||||
|
|
||||||
NFT use cases can be found wherever there’s a need to digitally model ownership. In other words, the list of use cases is long and NFTs will likely be among the most important building blocks on which the digital world (or something like a metaverse) will be built.-
|
|
||||||
* [The future of Decentralized Identity: SSI vs NFTs](https://walt.id/decentralized-identity-explained/ssi-vs-nfts) Walt ID
|
|
||||||
|
|
||||||
While SSI has been developed to model digital identity, NFTs are used to model digital ownership. As a result, the concepts and technologies on which each approach is based differ with far reaching consequences. For example, while NFTs require blockchains, SSI can be used with or without them which is particularly important in the context of compliance and privacy.
|
|
||||||
* [The Pilot Playbook. Building Pilots with Self-Sovereign Identity](https://static1.squarespace.com/static/609c0ddf94bcc0278a7cbdb4/t/623434e67e0bf028a069dd44/1647588583759/The%2BPilot%2BPlaybook_Building%2BPilots%2Bwith%2BSelf-Sovereign%2BIdentity%2B%257C%2Bby%2Bwalt.id.pdf) walt.id
|
|
||||||
|
|
||||||
1. Identify use cases: A framework and examples will help you discover opportunities to create value for your organisation and stakeholders.
|
|
||||||
2. Select use cases: A matrix and different selection criteria will help you analyze and prioritize opportunities based on your strategy and requirements.
|
|
||||||
3. Select ecosystems: An elaboration of identity ecosystems and a simple approach for selecting the right one(s) based on your organisation’s operating model.
|
|
||||||
4. Plan your Implementation: Guidance for setting project requirements, technology selection and answering the question of “buy or build”.
|
|
||||||
5. Implement your Pilot: Tips to make sure you get the most out of your pilot project
|
|
||||||
|
|
@ -71,7 +71,7 @@ Your ID, your data storage [@ElastosInfo](https://twitter.com/ElastosInfo)
|
|||||||
|
|
||||||
Nice one [@everlastingOS](https://twitter.com/everlastingOS)
|
Nice one [@everlastingOS](https://twitter.com/everlastingOS)
|
||||||
|
|
||||||
* [Web 3.0 - How to get started!](https://www.youtube.com/watch?v%3DJckzkPAXdhU)
|
* [Web 3.0 - How to get started!](https://www.youtube.com/watch?v=JckzkPAXdhU)
|
||||||
|
|
||||||
What is Web3Auth???
|
What is Web3Auth???
|
||||||
|
|
||||||
@ -81,7 +81,7 @@ Web3Auth aggregates OAuth (Google, Twitter, Discord) logins, different wallets,
|
|||||||
|
|
||||||
Metaverse
|
Metaverse
|
||||||
|
|
||||||
* [A Digital Identity Fit For The Metaverse](https://www.forbes.com/sites/alastairjohnson/2022/01/07/a-digital-identity-fit-for-the-metaverse/?sh%3D70980509184b) Forbes
|
* [A Digital Identity Fit For The Metaverse](https://www.forbes.com/sites/alastairjohnson/2022/01/07/a-digital-identity-fit-for-the-metaverse/?sh=70980509184b) Forbes
|
||||||
|
|
||||||
The SSI model has an individual’s value — be it crypto, in-game items, or other NFTs — directly tied to their identity. It will be accessible with a simple click for physical services, like an Uber, as well as digital ones, like using a digital asset exchange.
|
The SSI model has an individual’s value — be it crypto, in-game items, or other NFTs — directly tied to their identity. It will be accessible with a simple click for physical services, like an Uber, as well as digital ones, like using a digital asset exchange.
|
||||||
|
|
||||||
|
@ -40,7 +40,7 @@ What are some limitations and opportunities for making profitable business in se
|
|||||||
- Cryptoeconomics x SSI (h/t [@mathieu_glaude](https://twitter.com/mathieu_glaude)
|
- Cryptoeconomics x SSI (h/t [@mathieu_glaude](https://twitter.com/mathieu_glaude)
|
||||||
|
|
||||||
* [On Self-Sovereign Identity: What's the Business Value of SSI?](https://hackernoon.com/self-sovereign-identity-what-is-the-business-value-uq6l36wh) Hackernoon
|
* [On Self-Sovereign Identity: What's the Business Value of SSI?](https://hackernoon.com/self-sovereign-identity-what-is-the-business-value-uq6l36wh) Hackernoon
|
||||||
> To businesses, immediate value comes from removal of the costly and challenging GDPR compliance. [Forbes reports](https://www.forbes.com/sites/oliversmith/2018/05/02/the-gdpr-racket-whos-making-money-from-this-9bn-business-shakedown/?ref%3Dhackernoon.com%235dd0efa234a2) that in 2018 in the UK alone $1,1 billion was spent by companies on GDPR preparation, while US companies allocated over $7.8 billion on protecting customers’ personal information.
|
> To businesses, immediate value comes from removal of the costly and challenging GDPR compliance. [Forbes reports](https://www.forbes.com/sites/oliversmith/2018/05/02/the-gdpr-racket-whos-making-money-from-this-9bn-business-shakedown/?ref=hackernoon.com#5dd0efa234a2) that in 2018 in the UK alone $1,1 billion was spent by companies on GDPR preparation, while US companies allocated over $7.8 billion on protecting customers’ personal information.
|
||||||
* [Career Advice for New Professionals in Identity](https://iiw.idcommons.net/22D/_Career_Advice_for_New_Professionals_in_Identity) by Megan Olsen
|
* [Career Advice for New Professionals in Identity](https://iiw.idcommons.net/22D/_Career_Advice_for_New_Professionals_in_Identity) by Megan Olsen
|
||||||
|
|
||||||
Simon: worked with Megan Olsen for 6(?) months as intern. Do not have job offer yet. Think this is the future. Hard to get from corporations taking advantage, bring freedom back as it was back in the day. Advise: do some research on your own, educate yourself, do development as much as you can.
|
Simon: worked with Megan Olsen for 6(?) months as intern. Do not have job offer yet. Think this is the future. Hard to get from corporations taking advantage, bring freedom back as it was back in the day. Advise: do some research on your own, educate yourself, do development as much as you can.
|
||||||
@ -122,7 +122,7 @@ There’s an economic theory here: Free customers are more valuable than captive
|
|||||||
We’d get the startup founders to figure out the biggest assumptions they were making across user risk (do people want this?), business risk (can this be the center of a viable business?), and feasibility risk (can we build this in a scalable way with the time, team, and resources potentially at our disposal?). And then we’d ask them to go out and figure out how to de-risk those assumptions in the real world, usually by talking to experts and asking smart questions.
|
We’d get the startup founders to figure out the biggest assumptions they were making across user risk (do people want this?), business risk (can this be the center of a viable business?), and feasibility risk (can we build this in a scalable way with the time, team, and resources potentially at our disposal?). And then we’d ask them to go out and figure out how to de-risk those assumptions in the real world, usually by talking to experts and asking smart questions.
|
||||||
|
|
||||||
|
|
||||||
* [Working Spaces Are Ecosystems Too!](https://www.youtube.com/watch?v%3DMfBoUDNcyW4) Autumn Watkinson - Trust over IP Foundation
|
* [Working Spaces Are Ecosystems Too!](https://www.youtube.com/watch?v=MfBoUDNcyW4) Autumn Watkinson - Trust over IP Foundation
|
||||||
|
|
||||||
An ecosystem is a community of living organisms interacting with each other and their physical environment. When you hear that definition, you might priture a pristine nature landscape, but that definition can also apply to how businesses, individual or organization interact with one and other. This talk is about natural ecosystem and how we can adapt nature's lessons to our industry ecosystems.
|
An ecosystem is a community of living organisms interacting with each other and their physical environment. When you hear that definition, you might priture a pristine nature landscape, but that definition can also apply to how businesses, individual or organization interact with one and other. This talk is about natural ecosystem and how we can adapt nature's lessons to our industry ecosystems.
|
||||||
|
|
||||||
@ -138,7 +138,7 @@ The KuppingerCole Identity Fabric, an indispensable component in modeling future
|
|||||||
|
|
||||||
* [Can Self-Sovereign Identity Deliver Business Value?](https://walton.uark.edu/insights/posts/can-self-sovereign-identity-deliver-business-value-lessons-learned-from-the-nhs.php) Walton College
|
* [Can Self-Sovereign Identity Deliver Business Value?](https://walton.uark.edu/insights/posts/can-self-sovereign-identity-deliver-business-value-lessons-learned-from-the-nhs.php) Walton College
|
||||||
|
|
||||||
As [Mary Lacity](https://walton.uark.edu/departments/information-systems/directory/uid/mclacity/name/Mary%2BLacity/) and [Erran Carmel](https://www.american.edu/kogod/faculty/carmel.cfm) explore in their whitepaper, [“Implementing Self-Sovereign Identity (SSI) for a digital staff passport at UK NHS,”](https://cpb-us-e1.wpmucdn.com/wordpressua.uark.edu/dist/5/444/files/2018/01/BCoE2022SS1FINAL.pdf) the lessons learned by the NHS may point towards ways of unlocking new business value.
|
As [Mary Lacity](https://walton.uark.edu/departments/information-systems/directory/uid/mclacity/name/Mary+Lacity/) and [Erran Carmel](https://www.american.edu/kogod/faculty/carmel.cfm) explore in their whitepaper, [“Implementing Self-Sovereign Identity (SSI) for a digital staff passport at UK NHS,”](https://cpb-us-e1.wpmucdn.com/wordpressua.uark.edu/dist/5/444/files/2018/01/BCoE2022SS1FINAL.pdf) the lessons learned by the NHS may point towards ways of unlocking new business value.
|
||||||
* [Identity Proofing – Definition, Importance, and Solutions](https://imageware.io/identity-proofing/) Imageware
|
* [Identity Proofing – Definition, Importance, and Solutions](https://imageware.io/identity-proofing/) Imageware
|
||||||
|
|
||||||
The global market for identity and access management was $9.53 billion USD in 2018 and is expected to reach $24.76 billion USD by the end of 2026, showing a CAGR of 13.2% during the forecast year.
|
The global market for identity and access management was $9.53 billion USD in 2018 and is expected to reach $24.76 billion USD by the end of 2026, showing a CAGR of 13.2% during the forecast year.
|
||||||
@ -208,10 +208,10 @@ It’s called decentralized identity orchestration and brings with it uniform se
|
|||||||
|
|
||||||
* [Digital Identity Market Signals](https://indicio.tech/digital-identity-market-signals/)
|
* [Digital Identity Market Signals](https://indicio.tech/digital-identity-market-signals/)
|
||||||
|
|
||||||
- [Digital ID bill sees action in the House and Senate](https://fcw.com/congress/2022/07/digital-id-bill-sees-action-house-and-senate/374552/%25C2%25A0)
|
- [Digital ID bill sees action in the House and Senate](https://fcw.com/congress/2022/07/digital-id-bill-sees-action-house-and-senate/374552/%C2%A0)
|
||||||
- [Will EU digital identity drop the unique identifier?](https://www.biometricupdate.com/202207/will-eu-digital-identity-drop-the-unique-identifier%25C2%25A0)
|
- [Will EU digital identity drop the unique identifier?](https://www.biometricupdate.com/202207/will-eu-digital-identity-drop-the-unique-identifier%C2%A0)
|
||||||
- [Why digital identity will make or break the Metaverse](https://eandt.theiet.org/content/articles/2022/07/why-digital-identity-will-make-or-break-the-metaverse/%25C2%25A0)
|
- [Why digital identity will make or break the Metaverse](https://eandt.theiet.org/content/articles/2022/07/why-digital-identity-will-make-or-break-the-metaverse/%C2%A0)
|
||||||
- [Young people at greater risk of falling victim to identity fraud](https://www.digit.fyi/young-people-at-greater-risk-of-falling-victim-to-identity-fraud/%25C2%25A0)
|
- [Young people at greater risk of falling victim to identity fraud](https://www.digit.fyi/young-people-at-greater-risk-of-falling-victim-to-identity-fraud/%C2%A0)
|
||||||
|
|
||||||
|
|
||||||
* [Why plastic cards are a model for verifiable credentials as a service](https://lockstep.com.au/magnetic-stripe-cards-and-verifiable-credentials/) Lockstep
|
* [Why plastic cards are a model for verifiable credentials as a service](https://lockstep.com.au/magnetic-stripe-cards-and-verifiable-credentials/) Lockstep
|
||||||
@ -227,11 +227,11 @@ Lead with key benefits. The release features two: support for diplex-matched an
|
|||||||
Clarify modifiers. A phrase like “diplex matched antennas” is ambiguous. Does “matched” modify “diplex” or “antennas”? The domain is unfamiliar to me, but I suspected it should be “diplex-matched” and a web search confirmed that hunch.
|
Clarify modifiers. A phrase like “diplex matched antennas” is ambiguous. Does “matched” modify “diplex” or “antennas”? The domain is unfamiliar to me, but I suspected it should be “diplex-matched” and a web search confirmed that hunch.
|
||||||
|
|
||||||
Omit needless words. The idea of faster workflow appears in the original first paragraph as “new efficiencies aimed at streamlining antenna design workflows and shortening design cycles.” That’s a long, complicated, yet vague way of saying “enables designers to work faster.”
|
Omit needless words. The idea of faster workflow appears in the original first paragraph as “new efficiencies aimed at streamlining antenna design workflows and shortening design cycles.” That’s a long, complicated, yet vague way of saying “enables designers to work faster.”
|
||||||
* [McK Insights: Why digital trust truly matters, and what it means for your bottom line](https://www.linkedin.com/posts/dr-carsten-st%25C3%25B6cker-1145871_mck-why-digital-trust-truly-matters-activity-6976042326783619072-uSIz/) Dr. Carsten Stöcker
|
* [McK Insights: Why digital trust truly matters, and what it means for your bottom line](https://www.linkedin.com/posts/dr-carsten-st%C3%B6cker-1145871_mck-why-digital-trust-truly-matters-activity-6976042326783619072-uSIz/) Dr. Carsten Stöcker
|
||||||
|
|
||||||
The results of our survey of more than 1,300 business leaders and 3,000 consumers globally suggest that establishing trust in products and experiences that leverage AI, digital technologies, and data not only meets consumer expectations but also could promote growth.
|
The results of our survey of more than 1,300 business leaders and 3,000 consumers globally suggest that establishing trust in products and experiences that leverage AI, digital technologies, and data not only meets consumer expectations but also could promote growth.
|
||||||
|
|
||||||
* [Instagram “slide show” about SSI Market Potential](https://www.instagram.com/p/CikfpR3PmbO/?igshid%3DNmNmNjAwNzg%253D) mehdicherifm
|
* [Instagram “slide show” about SSI Market Potential](https://www.instagram.com/p/CikfpR3PmbO/?igshid=NmNmNjAwNzg%3D) mehdicherifm
|
||||||
|
|
||||||
GROWTH
|
GROWTH
|
||||||
|
|
||||||
|
@ -12,9 +12,6 @@ It is evident that our ongoing discussions about identity, ethics, bias, privacy
|
|||||||
|
|
||||||
For example, projects such as PhotoChromic are developing a biometrically managed self-sovereign identity on the blockchain utilising the feature sets of NFTs (non fungible tokens). Self-sovereign identity ensures that a user retains complete control over their identity without anyone else having access to it.
|
For example, projects such as PhotoChromic are developing a biometrically managed self-sovereign identity on the blockchain utilising the feature sets of NFTs (non fungible tokens). Self-sovereign identity ensures that a user retains complete control over their identity without anyone else having access to it.
|
||||||
|
|
||||||
* [Why Self-Sovereign Identity needs a token?](https://blog.cheqd.io/why-self-sovereign-identity-needs-a-token-46e43dada01d) Cheqed
|
|
||||||
|
|
||||||
Usually the question of “why does SSI need a token”, stems from people’s belief that there are existing, viable payment rails. As Sovrin outlined in their whitepaper back in 2018, traditional rails don’t work when issuers and receivers of credentials are unlikely to have a direct contractual relationship since the user is at the center with SSI.
|
|
||||||
|
|
||||||
* [“The power to surveil, control, and punish”: The dystopian danger of a mandatory biometric database in Mexico](https://restofworld.org/2021/the-dystopian-danger-of-a-mandatory-biometric-database-in-mexico/) RestofWorld.org
|
* [“The power to surveil, control, and punish”: The dystopian danger of a mandatory biometric database in Mexico](https://restofworld.org/2021/the-dystopian-danger-of-a-mandatory-biometric-database-in-mexico/) RestofWorld.org
|
||||||
|
|
||||||
@ -94,6 +91,6 @@ Today, ‘everyone’ including powerful actors and decision-makers like the UK
|
|||||||
|
|
||||||
“I asked the driver why the app showed me a different driver’s face, and he claimed Bolt blocked his account so he was using his brother’s.”
|
“I asked the driver why the app showed me a different driver’s face, and he claimed Bolt blocked his account so he was using his brother’s.”
|
||||||
|
|
||||||
* [Is "acceptably non-dystopian" self-sovereign identity even possible?](https://blog.mollywhite.net/is-acceptably-non-dystopian-self-sovereign-identity-even-possible/) By Molly Wood ([Hacker News](https://news.ycombinator.com/item?id%3D31701601)
|
* [Is "acceptably non-dystopian" self-sovereign identity even possible?](https://blog.mollywhite.net/is-acceptably-non-dystopian-self-sovereign-identity-even-possible/) By Molly Wood ([Hacker News](https://news.ycombinator.com/item?id=31701601)
|
||||||
|
|
||||||
as more and more developers and companies and “blockchain visionaries” seek to eschew centralization and trust in the state and institutions, it seems that their definition of “acceptably” when they describe “acceptably non-dystopian” projects is very different from my own.
|
as more and more developers and companies and “blockchain visionaries” seek to eschew centralization and trust in the state and institutions, it seems that their definition of “acceptably” when they describe “acceptably non-dystopian” projects is very different from my own.
|
||||||
|
@ -24,11 +24,11 @@ Ted Thibodeau Jr Shares
|
|||||||
|
|
||||||
it was not the only nor the first related tweet emanating from Harry --
|
it was not the only nor the first related tweet emanating from Harry --
|
||||||
|
|
||||||
* [https://twitter.com/search?q=W3C%20(DID%20OR%20%22Verifiable%20Credentials%22%20OR%20VCs)%20(from%3Aharryhalpin)&src=typed_query&f=live](https://twitter.com/search?q%3DW3C%2520(DID%2520OR%2520%2522Verifiable%2520Credentials%2522%2520OR%2520VCs)%2520(from%253Aharryhalpin)%26src%3Dtyped_query%26f%3Dlive)
|
* [https://twitter.com/search?q=W3C%20(DID%20OR%20%22Verifiable%20Credentials%22%20OR%20VCs)%20(from%3Aharryhalpin)&src=typed_query&f=live](https://twitter.com/search?q=W3C%20(DID%20OR%20%22Verifiable%20Credentials%22%20OR%20VCs)%20(from%3Aharryhalpin)&src=typed_query&f=live)
|
||||||
|
|
||||||
Nor has he limited his commentary to Twitter --
|
Nor has he limited his commentary to Twitter --
|
||||||
|
|
||||||
* [https://www.google.com/search?q=W3C+(DID+OR+%22Verifiable+Credentials%22+OR+VCs)+%22harry+halpin%22](https://www.google.com/search?q%3DW3C%2B(DID%2BOR%2B%2522Verifiable%2BCredentials%2522%2BOR%2BVCs)%2B%2522harry%2Bhalpin%2522)
|
* [https://www.google.com/search?q=W3C+(DID+OR+%22Verifiable+Credentials%22+OR+VCs)+%22harry+halpin%22](https://www.google.com/search?q=W3C+(DID+OR+%22Verifiable+Credentials%22+OR+VCs)+%22harry+halpin%22)
|
||||||
* [An Examination of the Biases within Commercialized Identity](https://www.pingidentity.com/en/company/blog/posts/2021/biases-commercialized-identity.html) on [Hello User Podcast](https://www.pingidentity.com/en/company/podcast.html)
|
* [An Examination of the Biases within Commercialized Identity](https://www.pingidentity.com/en/company/blog/posts/2021/biases-commercialized-identity.html) on [Hello User Podcast](https://www.pingidentity.com/en/company/podcast.html)
|
||||||
|
|
||||||
“There is no discipline for software engineers when it comes to identity and privacy due to the pace at which they are expected to build, but this will likely change because of liabilities and regulation.”
|
“There is no discipline for software engineers when it comes to identity and privacy due to the pace at which they are expected to build, but this will likely change because of liabilities and regulation.”
|
||||||
@ -82,7 +82,7 @@ It’s time activists began to develop a working knowledge of Blockchain and sel
|
|||||||
|
|
||||||
By focusing on the risk to individual citizens, the Declaration complete ignores the systemic risks introduced by the digital transformation (and in general the reliance on so called [programmable infrastructures](https://www.tudelft.nl/tbm/programmable-infrastructures), as expressed by Seda Gürses and Martha Poon among others).
|
By focusing on the risk to individual citizens, the Declaration complete ignores the systemic risks introduced by the digital transformation (and in general the reliance on so called [programmable infrastructures](https://www.tudelft.nl/tbm/programmable-infrastructures), as expressed by Seda Gürses and Martha Poon among others).
|
||||||
|
|
||||||
* [Dividing the Movement w. Alison McDowell (Separating Signal from Noise)](https://www.youtube.com/watch?v%3DawCcnstfhLY) Doom&GloomHQ
|
* [Dividing the Movement w. Alison McDowell (Separating Signal from Noise)](https://www.youtube.com/watch?v=awCcnstfhLY) Doom&GloomHQ
|
||||||
|
|
||||||
|
|
||||||
* [SSI-on-Blockchain is Objectively a Bad Thing](https://weh.wtf/ssi.html) Niko
|
* [SSI-on-Blockchain is Objectively a Bad Thing](https://weh.wtf/ssi.html) Niko
|
||||||
|
@ -40,9 +40,6 @@ If you are in accounting, audit or finance shoes, how would you play the game to
|
|||||||
* [If your strategic plan is based on data, have you considered the consequences?](https://www.mydigitalfootprint.com/2021/04/if-your-strategic-plan-is-based-on-data.html) MyDigitalFootprint
|
* [If your strategic plan is based on data, have you considered the consequences?](https://www.mydigitalfootprint.com/2021/04/if-your-strategic-plan-is-based-on-data.html) MyDigitalFootprint
|
||||||
> How do you know your data set has the views of everyone who is critical to your business today and in the future? How do you know the tools you use provide equal weight to everyone to make our business thrive? How do you know if the recommendation was written before the analysis? How do your incentives create a new bias?
|
> How do you know your data set has the views of everyone who is critical to your business today and in the future? How do you know the tools you use provide equal weight to everyone to make our business thrive? How do you know if the recommendation was written before the analysis? How do your incentives create a new bias?
|
||||||
|
|
||||||
* [We Need Data Unions to Support the Data Economy](https://blog.oceanprotocol.com/voices-of-the-data-economy-shiv-malik-data-unions-84243ab965ee) Pool Foundation via Ocean Protocol
|
|
||||||
> In the twelfth episode of Voices of the Data Economy, we had a conversation with [Shiv Malik](https://twitter.com/shivmalik?s%3D20), CEO at Pool Foundation and former Head of Growth for Streamr where he evangelized about a new decentralized data economy. During this discussion, he tells us how Data Unions work, its real-life use cases, and legislative regulations supporting the Data Union model. Here are edited excerpts from the podcast.
|
|
||||||
|
|
||||||
* [Data for good: powering our way to a better world](https://blog.digi.me/2021/04/29/data-for-good-powering-our-way-to-a-better-world/)
|
* [Data for good: powering our way to a better world](https://blog.digi.me/2021/04/29/data-for-good-powering-our-way-to-a-better-world/)
|
||||||
> We should absolutely all be taking care of the data that belongs to us, our data that we create, that we have a right to be able to control and share exactly as we choose. But we should also bear in mind the power of that data to help each of us, every day, benefit from the good that can come when it is shared and used to create a better world for us all.
|
> We should absolutely all be taking care of the data that belongs to us, our data that we create, that we have a right to be able to control and share exactly as we choose. But we should also bear in mind the power of that data to help each of us, every day, benefit from the good that can come when it is shared and used to create a better world for us all.
|
||||||
* [Everybody has our data ... except us](https://reb00ted.org/personaldata/20210620-who-has-my-personal-data/) reb00ted
|
* [Everybody has our data ... except us](https://reb00ted.org/personaldata/20210620-who-has-my-personal-data/) reb00ted
|
||||||
@ -58,7 +55,7 @@ Instagram has all my photos. Well, the Instagram department of Facebook does. (C
|
|||||||
Amazon has the list of all my purchases, and knows what products I was interested in but didn’t buy after all. (AND I DON’T.)
|
Amazon has the list of all my purchases, and knows what products I was interested in but didn’t buy after all. (AND I DON’T.)
|
||||||
* [What the Heck is a Data Mesh?!](https://cnr.sh/essays/what-the-heck-data-mesh)
|
* [What the Heck is a Data Mesh?!](https://cnr.sh/essays/what-the-heck-data-mesh)
|
||||||
|
|
||||||
I re-read [Zhamak Dehghani](https://twitter.com/zhamakd) ’s [original](https://martinfowler.com/articles/data-monolith-to-mesh.html) and [follow-on](https://martinfowler.com/articles/data-mesh-principles.html) posts. Zhamak is the creator of the data mesh. In her second post she identifies [four data mesh principles](https://martinfowler.com/articles/data-mesh-principles.html%23CorePrinciplesAndLogicalArchitectureOfDataMesh):
|
I re-read [Zhamak Dehghani](https://twitter.com/zhamakd) ’s [original](https://martinfowler.com/articles/data-monolith-to-mesh.html) and [follow-on](https://martinfowler.com/articles/data-mesh-principles.html) posts. Zhamak is the creator of the data mesh. In her second post she identifies [four data mesh principles](https://martinfowler.com/articles/data-mesh-principles.html#CorePrinciplesAndLogicalArchitectureOfDataMesh):
|
||||||
|
|
||||||
1. Domain-oriented decentralized data ownership and architecture
|
1. Domain-oriented decentralized data ownership and architecture
|
||||||
2. Data as a product
|
2. Data as a product
|
||||||
@ -80,11 +77,11 @@ Given his breadth of experience and alignment with a number of strategic sectors
|
|||||||
|
|
||||||
The compelling data and research suggest that my original question now needs to be reframed. People most certainly do care about their data privacy. The question now is: how are organisations going to bridge this data privacy chasm?
|
The compelling data and research suggest that my original question now needs to be reframed. People most certainly do care about their data privacy. The question now is: how are organisations going to bridge this data privacy chasm?
|
||||||
|
|
||||||
* [Data Sovereignty International Forum 2021(English)](https://www.youtube.com/watch?v%3D2Q2DL0ojauA)
|
* [Data Sovereignty International Forum 2021(English)](https://www.youtube.com/watch?v=2Q2DL0ojauA)
|
||||||
|
|
||||||
* [FTC’s Shot Across the Bow: Purpose and Use Restrictions Could Frame The Future of Personal Data Management](https://identitypraxis.com/2021/11/03/ftcs-shot-across-the-bow-purpose-and-use-restrictions-could-frame-the-future-of-personal-data-management/) Identity Praxis
|
* [FTC’s Shot Across the Bow: Purpose and Use Restrictions Could Frame The Future of Personal Data Management](https://identitypraxis.com/2021/11/03/ftcs-shot-across-the-bow-purpose-and-use-restrictions-could-frame-the-future-of-personal-data-management/) Identity Praxis
|
||||||
|
|
||||||
So that there is no uncertainty or doubt, however, Duball[4](https://identitypraxis.com/2021/11/03/ftcs-shot-across-the-bow-purpose-and-use-restrictions-could-frame-the-future-of-personal-data-management/%23fn4) reports that, while consumer privacy is a chief concern for the commission, it is not the primary concern to the exclusion of other concerns. The commission is also worried about algorithmic bias and “dark patterns” practices.
|
So that there is no uncertainty or doubt, however, Duball[4](https://identitypraxis.com/2021/11/03/ftcs-shot-across-the-bow-purpose-and-use-restrictions-could-frame-the-future-of-personal-data-management/#fn4) reports that, while consumer privacy is a chief concern for the commission, it is not the primary concern to the exclusion of other concerns. The commission is also worried about algorithmic bias and “dark patterns” practices.
|
||||||
* [Self-Sovereign Identity Personal Data Usage Licensing (SSI-PDUL) Model: Whitepaper](https://hyperonomy.files.wordpress.com/2019/11/hyperonomy-ssi-personal-data-usage-licensing-model-ssi-pdul-model-2021-0.27rd.pdf) Hyperonomy
|
* [Self-Sovereign Identity Personal Data Usage Licensing (SSI-PDUL) Model: Whitepaper](https://hyperonomy.files.wordpress.com/2019/11/hyperonomy-ssi-personal-data-usage-licensing-model-ssi-pdul-model-2021-0.27rd.pdf) Hyperonomy
|
||||||
|
|
||||||
The scope of the Self-Sovereign Identity Personal Data Usage Licensing (SSI-PDUL) Model is personal digital identifiers and any associated identity data presented by Alice to the App. It does not include the permissioning of data internal to the App (although the natural extension of the solution to internal data is an obvious one)
|
The scope of the Self-Sovereign Identity Personal Data Usage Licensing (SSI-PDUL) Model is personal digital identifiers and any associated identity data presented by Alice to the App. It does not include the permissioning of data internal to the App (although the natural extension of the solution to internal data is an obvious one)
|
||||||
@ -178,7 +175,7 @@ I talked about how the break from the W3C DID specs and other key innovations in
|
|||||||
|
|
||||||
* [Credential Marketplaces](https://iiw.idcommons.net/12K/_Credential_Marketplaces) by Martin Riedel, Stepan Gershuni
|
* [Credential Marketplaces](https://iiw.idcommons.net/12K/_Credential_Marketplaces) by Martin Riedel, Stepan Gershuni
|
||||||
|
|
||||||
Presentation: [https://docs.google.com/presentation/d/1WOXgHhgAwG0Im45pZkTAhsadpd8xbck0xjlnsuVGGhI/edit?ts=60803bc8](https://docs.google.com/presentation/d/1WOXgHhgAwG0Im45pZkTAhsadpd8xbck0xjlnsuVGGhI/edit?ts%3D60803bc8%23slide%3Did.gd369c9df06_0_17)
|
Presentation: [https://docs.google.com/presentation/d/1WOXgHhgAwG0Im45pZkTAhsadpd8xbck0xjlnsuVGGhI/edit?ts=60803bc8](https://docs.google.com/presentation/d/1WOXgHhgAwG0Im45pZkTAhsadpd8xbck0xjlnsuVGGhI/edit?ts=60803bc8#slide=id.gd369c9df06_0_17)
|
||||||
|
|
||||||
The goal of this session is to present the idea and get community feedback regarding this.
|
The goal of this session is to present the idea and get community feedback regarding this.
|
||||||
|
|
||||||
@ -197,7 +194,7 @@ Credential Marketplace is quite high up the SSI stack but we want to start this
|
|||||||
11. Reputation mechanism for credential issuers
|
11. Reputation mechanism for credential issuers
|
||||||
12. Marketplace can also implement value transfer: paying for issuance by the verifier, for example. Even if they are part of different SSI ecosystems. This is optional but can help incentivize different participants.
|
12. Marketplace can also implement value transfer: paying for issuance by the verifier, for example. Even if they are part of different SSI ecosystems. This is optional but can help incentivize different participants.
|
||||||
|
|
||||||
* [https://docs.google.com/presentation/d/1VaxwE9d4kEvmsJGUMWcvLf5WOQRcv5o_wTGTsecfseA/edit?usp=sharing](https://docs.google.com/presentation/d/1VaxwE9d4kEvmsJGUMWcvLf5WOQRcv5o_wTGTsecfseA/edit?usp%3Dsharing)
|
* [https://docs.google.com/presentation/d/1VaxwE9d4kEvmsJGUMWcvLf5WOQRcv5o_wTGTsecfseA/edit?usp=sharing](https://docs.google.com/presentation/d/1VaxwE9d4kEvmsJGUMWcvLf5WOQRcv5o_wTGTsecfseA/edit?usp=sharing)
|
||||||
|
|
||||||
* [International Semantic Infrastructure: Requirements for a distributed data economy](https://iiw.idcommons.net/21L/_International_Semantic_Infrastructure:_Requirements_for_a_distributed_data_economy) by Paul Knowles
|
* [International Semantic Infrastructure: Requirements for a distributed data economy](https://iiw.idcommons.net/21L/_International_Semantic_Infrastructure:_Requirements_for_a_distributed_data_economy) by Paul Knowles
|
||||||
|
|
||||||
@ -207,11 +204,11 @@ Brent Shambaugh. Integrate computing, processing, storage. Virtual machine to in
|
|||||||
|
|
||||||
Linking data together is about machine readability. Involved humans… need to understand. Do it through language. Humans like OCA because can understand data in different languages, makes sense for people. Human element. In that capture space. Want to refine OCA, take out some of the rules parts, masking overlay, conditional overlays, and get it away from OCA as architecture - it convolutes things. OCA only meant for making theings human-readable.
|
Linking data together is about machine readability. Involved humans… need to understand. Do it through language. Humans like OCA because can understand data in different languages, makes sense for people. Human element. In that capture space. Want to refine OCA, take out some of the rules parts, masking overlay, conditional overlays, and get it away from OCA as architecture - it convolutes things. OCA only meant for making theings human-readable.
|
||||||
|
|
||||||
* [Creating a positive vision for the future - decentralised web + SSI](https://iiw.idcommons.net/21I/_Creating_a_positive_vision_for_the_future_-_decentralised_web_%252B_SSI) by Jemima Gibbons
|
* [Creating a positive vision for the future - decentralised web + SSI](https://iiw.idcommons.net/21I/_Creating_a_positive_vision_for_the_future_-_decentralised_web_+_SSI) by Jemima Gibbons
|
||||||
|
|
||||||
Discussion moved to this Miro board:
|
Discussion moved to this Miro board:
|
||||||
|
|
||||||
* [https://miro.com/app/board/o9J_lII_R8s=/](https://miro.com/app/board/o9J_lII_R8s%3D/)
|
* [https://miro.com/app/board/o9J_lII_R8s=/](https://miro.com/app/board/o9J_lII_R8s=/)
|
||||||
|
|
||||||
* [IIW32_TH_21I_Creating a Positive Visition for Future - Decentralised Wed + SSI](https://docs.google.com/document/d/1iELB7PlUp_5ZJa9LGxWXium_-pHcXS35MG4oGgDl98s/edit)
|
* [IIW32_TH_21I_Creating a Positive Visition for Future - Decentralised Wed + SSI](https://docs.google.com/document/d/1iELB7PlUp_5ZJa9LGxWXium_-pHcXS35MG4oGgDl98s/edit)
|
||||||
|
|
||||||
@ -224,8 +221,8 @@ Discussion moved to this Miro board:
|
|||||||
|
|
||||||
17:52:46 From Orie Steele to Everyone : Shameless plug for our work with GS1 on VCs
|
17:52:46 From Orie Steele to Everyone : Shameless plug for our work with GS1 on VCs
|
||||||
|
|
||||||
* [https://www.youtube.com/watch?v=iDkANArgdKI&t=15s](https://www.youtube.com/watch?v%3DiDkANArgdKI%26t%3D15s)
|
* [https://www.youtube.com/watch?v=iDkANArgdKI&t=15s](https://www.youtube.com/watch?v=iDkANArgdKI&t=15s)
|
||||||
* [The Anatomy Of Personal Data Sovereignty](https://www.forbes.com/sites/forbesbusinesscouncil/2021/05/04/the-anatomy-of-personal-data-sovereignty/?sh%3D69dbea5761e1) in Forbes
|
* [The Anatomy Of Personal Data Sovereignty](https://www.forbes.com/sites/forbesbusinesscouncil/2021/05/04/the-anatomy-of-personal-data-sovereignty/?sh=69dbea5761e1) in Forbes
|
||||||
|
|
||||||
The data privacy/control issue isn’t new, but the attitude shift is. People care more, demand more, and the scale of change that has occurred due to the Covid-19 pandemic is major. As we live through times exposing such injustice and inequality, it's becoming evident that this personal data ecosystem needs to undergo a major revamp.
|
The data privacy/control issue isn’t new, but the attitude shift is. People care more, demand more, and the scale of change that has occurred due to the Covid-19 pandemic is major. As we live through times exposing such injustice and inequality, it's becoming evident that this personal data ecosystem needs to undergo a major revamp.
|
||||||
* [BIS Annual Report](https://www.bis.org/publ/arpdf/ar2022e3.pdf) section III. The future monetary system on page 41 in the chart
|
* [BIS Annual Report](https://www.bis.org/publ/arpdf/ar2022e3.pdf) section III. The future monetary system on page 41 in the chart
|
||||||
|
@ -69,9 +69,8 @@ We pointed to this before it happened. It was great. Here is a round up from Jol
|
|||||||
> The needs and experiences of citizens are established with how digital identity networks should preserve the freedoms and rights of users over the needs of the network. Transparency is explicitly mentioned as part of SSI, and it places a high emphasis on the importance of the public’s trust.
|
> The needs and experiences of citizens are established with how digital identity networks should preserve the freedoms and rights of users over the needs of the network. Transparency is explicitly mentioned as part of SSI, and it places a high emphasis on the importance of the public’s trust.
|
||||||
>
|
>
|
||||||
> As we look to the future of digital identity, SSI principles with blockchain have already proven to be successful by bringing together stakeholders to create a mutually beneficial network.
|
> As we look to the future of digital identity, SSI principles with blockchain have already proven to be successful by bringing together stakeholders to create a mutually beneficial network.
|
||||||
* [Decentralized Digital IDs: What it means for people, big tech, and the public sector](https://blog.oceanprotocol.com/voices-of-the-data-economy-irene-adamski-digital-identities-1eaf24f2a8fb)
|
|
||||||
|
|
||||||
Irene Adamski, Blockchain Expert at German Blockchain Association and Bundesblock, on Self-Sovereign Identity
|
|
||||||
|
|
||||||
* [Digital identities – steps on the path to an ID ecosystem](https://en.bankenverband.de/newsroom/comments/digital-identities-steps-path-id-ecosystem/) Bankenverband
|
* [Digital identities – steps on the path to an ID ecosystem](https://en.bankenverband.de/newsroom/comments/digital-identities-steps-path-id-ecosystem/) Bankenverband
|
||||||
> This article is very very good in articulating the big picture of how SSI systems relative to older system and emerging fragmetned systems.
|
> This article is very very good in articulating the big picture of how SSI systems relative to older system and emerging fragmetned systems.
|
||||||
@ -110,14 +109,14 @@ An answer to these challenges is an ecosystem in which digital identity data can
|
|||||||
> Our Gravity Glossary offers basic definitions to help you untangle the confusing technical jargon behind decentralized identity and blockchain.
|
> Our Gravity Glossary offers basic definitions to help you untangle the confusing technical jargon behind decentralized identity and blockchain.
|
||||||
|
|
||||||
|
|
||||||
* [101 Session: Self Sovereign & Decentralized Identity](https://iiw.idcommons.net/4B/_101_Session:_Self_Sovereign_%2526_Decentralized_Identity) by Karyl Fowler and Juan Caballero
|
* [101 Session: Self Sovereign & Decentralized Identity](https://iiw.idcommons.net/4B/_101_Session:_Self_Sovereign_%26_Decentralized_Identity) by Karyl Fowler and Juan Caballero
|
||||||
|
|
||||||
Links:
|
Links:
|
||||||
|
|
||||||
- [Video](https://www.youtube.com/watch?v%3DDaM0UtQTLCs) from last IIW
|
- [Video](https://www.youtube.com/watch?v=DaM0UtQTLCs) from last IIW
|
||||||
- [Slides](https://drive.google.com/file/d/1_9jCcxgcCrL4Dfjvr4z7XSIwxfadjveR/view?usp%3DsharingQ) from this session [Karyl Fowler (Transmute) and Juan Caballero (DIF) present Intro to SSI at #IIW31, Oct 2020](https://www.youtube.com/watch?v%3DDaM0UtQTLCs)
|
- [Slides](https://drive.google.com/file/d/1_9jCcxgcCrL4Dfjvr4z7XSIwxfadjveR/view?usp=sharingQ) from this session [Karyl Fowler (Transmute) and Juan Caballero (DIF) present Intro to SSI at #IIW31, Oct 2020](https://www.youtube.com/watch?v=DaM0UtQTLCs)
|
||||||
|
|
||||||
* [https://www.uschamberfoundation.org/sites/default/files/media-uploads/Applying%20SSI%20Principles%20to%20ILRs%20Report.pdf](https://www.uschamberfoundation.org/sites/default/files/media-uploads/Applying%2520SSI%2520Principles%2520to%2520ILRs%2520Report.pdf)
|
* [https://www.uschamberfoundation.org/sites/default/files/media-uploads/Applying%20SSI%20Principles%20to%20ILRs%20Report.pdf](https://www.uschamberfoundation.org/sites/default/files/media-uploads/Applying%20SSI%20Principles%20to%20ILRs%20Report.pdf)
|
||||||
|
|
||||||
* [ION 101-401: what is ION (the public, permissionless DID network), how can you use it today, and what comes next](https://iiw.idcommons.net/3A/_ION_101-401:_what_is_ION_(the_public,_permissionless_DID_network),_how_can_you_use_it_today,_and_what_comes_next) by Daniel Buchner (Microsoft)
|
* [ION 101-401: what is ION (the public, permissionless DID network), how can you use it today, and what comes next](https://iiw.idcommons.net/3A/_ION_101-401:_what_is_ION_(the_public,_permissionless_DID_network),_how_can_you_use_it_today,_and_what_comes_next) by Daniel Buchner (Microsoft)
|
||||||
|
|
||||||
@ -131,9 +130,9 @@ Identifiers, DID, ion
|
|||||||
- Ion-tools is a selection of tools to interact with the ION network: [https://github.com/decentralized-identity/ion-tools](https://github.com/decentralized-identity/ion-tools)
|
- Ion-tools is a selection of tools to interact with the ION network: [https://github.com/decentralized-identity/ion-tools](https://github.com/decentralized-identity/ion-tools)
|
||||||
- Resilience of ION: It’s pointed out that not only Bitcoin needs to survive attacks but also the IPFS network as both are required for ION to work properly. With Bitcoin it looks unlikely that it’s currently possible to reverse transactions on the network. However, with IPFS data can be unpinned and potentially disappear from the network.
|
- Resilience of ION: It’s pointed out that not only Bitcoin needs to survive attacks but also the IPFS network as both are required for ION to work properly. With Bitcoin it looks unlikely that it’s currently possible to reverse transactions on the network. However, with IPFS data can be unpinned and potentially disappear from the network.
|
||||||
|
|
||||||
* [Revocation: Introduction & Overview - goal is to connect](https://iiw.idcommons.net/3G/_Revocation:_Introduction_%2526_Overview_-_goal_is_to_connect) by Andreas Freitag
|
* [Revocation: Introduction & Overview - goal is to connect](https://iiw.idcommons.net/3G/_Revocation:_Introduction_%26_Overview_-_goal_is_to_connect) by Andreas Freitag
|
||||||
|
|
||||||
* [20210420_IIW34_Revocation_D01_s.pdf](https://drive.google.com/file/d/1HBr2VinzbJxq8dOs4b398tOUbRXmhraE/view?usp%3Dsharing)
|
* [20210420_IIW34_Revocation_D01_s.pdf](https://drive.google.com/file/d/1HBr2VinzbJxq8dOs4b398tOUbRXmhraE/view?usp=sharing)
|
||||||
|
|
||||||
My Research Question and Goals
|
My Research Question and Goals
|
||||||
|
|
||||||
@ -141,7 +140,7 @@ As today a revocation method based on accumulators is not implemented on a large
|
|||||||
|
|
||||||
“How can current accumulator schemes support revocation of verifiable credentials for large scale production systems regarding performance, usability and privacy?”
|
“How can current accumulator schemes support revocation of verifiable credentials for large scale production systems regarding performance, usability and privacy?”
|
||||||
|
|
||||||
* [Accumulators and Credential Signatures AMA (You don’t need to know crypto)](https://iiw.idcommons.net/index.php?title%3D21H/_Accumulators_and_Credential_Signatures_AMA_(You_don%2527t_need_to_know_crypto)%26action%3Dedit%26redlink%3D1) by Michael Lodder
|
* [Accumulators and Credential Signatures AMA (You don’t need to know crypto)](https://iiw.idcommons.net/index.php?title=21H/_Accumulators_and_Credential_Signatures_AMA_(You_don%27t_need_to_know_crypto)&action=edit&redlink=1) by Michael Lodder
|
||||||
* [Ontology Collaborates With The Block To Uncover The Decentralized Identity Industry](https://medium.com/ontologynetwork/ontology-collaborates-with-the-block-to-uncover-the-decentralized-identity-industry-1c2c51d02df0)
|
* [Ontology Collaborates With The Block To Uncover The Decentralized Identity Industry](https://medium.com/ontologynetwork/ontology-collaborates-with-the-block-to-uncover-the-decentralized-identity-industry-1c2c51d02df0)
|
||||||
|
|
||||||
Ning Hu, CTO of Ontology, spoke at a panel titled “The State of Decentralized Identity Solutions” in association with [The Block](https://www.theblockcrypto.com/), [...] accompanied by experts in the field of digital identity, Daniel Buchner, Senior PM of Decentralized Identity at Microsoft, and Tobias Fox, Co-founder of Serto. The discussion delved into how digital identity applies to everything from financial services to upskilling workforces, and how blockchain infrastructure can be utilized to lay the trust framework for decentralized identity solutions.
|
Ning Hu, CTO of Ontology, spoke at a panel titled “The State of Decentralized Identity Solutions” in association with [The Block](https://www.theblockcrypto.com/), [...] accompanied by experts in the field of digital identity, Daniel Buchner, Senior PM of Decentralized Identity at Microsoft, and Tobias Fox, Co-founder of Serto. The discussion delved into how digital identity applies to everything from financial services to upskilling workforces, and how blockchain infrastructure can be utilized to lay the trust framework for decentralized identity solutions.
|
||||||
@ -177,7 +176,7 @@ your digital identity represents you as a unique real-life person in a secure d
|
|||||||
An issuer makes claims or assertions about a user. These claims are bundled together into verifiable credentials and given to the user, who stores them in their digital wallet. From there, they can decide which verifiers they want to present these credentials to.
|
An issuer makes claims or assertions about a user. These claims are bundled together into verifiable credentials and given to the user, who stores them in their digital wallet. From there, they can decide which verifiers they want to present these credentials to.
|
||||||
|
|
||||||
* [19 FAQs on Verifiable Credentials and Self-Sovereign Identity](https://academy.affinidi.com/faqs-on-verifiable-credentials-and-self-sovereign-identity-3c3a505878bc)
|
* [19 FAQs on Verifiable Credentials and Self-Sovereign Identity](https://academy.affinidi.com/faqs-on-verifiable-credentials-and-self-sovereign-identity-3c3a505878bc)
|
||||||
* [Defining Self-Sovereign Identity with Kaliya Young | Coding Over Cocktails Podcast](https://www.youtube.com/watch?v%3DlCmMNDJcHuo)
|
* [Defining Self-Sovereign Identity with Kaliya Young | Coding Over Cocktails Podcast](https://www.youtube.com/watch?v=lCmMNDJcHuo)
|
||||||
|
|
||||||
* [Adrian Doerk](https://twitter.com/doerkadrian/status/1397566626405421060) on the difference between identification, authentication and authorization
|
* [Adrian Doerk](https://twitter.com/doerkadrian/status/1397566626405421060) on the difference between identification, authentication and authorization
|
||||||
|
|
||||||
@ -195,7 +194,7 @@ Authorization: What rights do I want to grant you?
|
|||||||
3. Network locality is not sufficient for deciding trust in a network.
|
3. Network locality is not sufficient for deciding trust in a network.
|
||||||
4. Every device, user and network flow is authenticated and authorized.
|
4. Every device, user and network flow is authenticated and authorized.
|
||||||
5. Policies must be dynamic and calculated from as many sources of data as possible.
|
5. Policies must be dynamic and calculated from as many sources of data as possible.
|
||||||
* [Decentralized identity explained](https://www.youtube.com/watch?v%3DEw-_F-OtDFI) MSFT
|
* [Decentralized identity explained](https://www.youtube.com/watch?v=Ew-_F-OtDFI) MSFT
|
||||||
|
|
||||||
* [Your User is Your API](https://www.evernym.com/blog/your-user-is-your-api/) Evernym
|
* [Your User is Your API](https://www.evernym.com/blog/your-user-is-your-api/) Evernym
|
||||||
|
|
||||||
@ -211,7 +210,7 @@ DID does not require analog objects to become digitized, and it does not need ex
|
|||||||
|
|
||||||
* [Self-Sovereign Identity: What’s the Big Deal?](https://hackernoon.com/self-sovereign-identity-whats-the-big-deal-6i1a37z3) Hackernoon \ Affinidi
|
* [Self-Sovereign Identity: What’s the Big Deal?](https://hackernoon.com/self-sovereign-identity-whats-the-big-deal-6i1a37z3) Hackernoon \ Affinidi
|
||||||
> Do you know where your digital credentials like your full name, date of birth, phone number, government ID, and other Personally Identifiable Information (PII) are stored online, and how they are used?
|
> Do you know where your digital credentials like your full name, date of birth, phone number, government ID, and other Personally Identifiable Information (PII) are stored online, and how they are used?
|
||||||
* [Bright Story: Self Sovereign Identity](https://www.brightlands.com/brightlands-smart-services-campus/bright-story-self-sovereign-identity) Brightlands ([EN](https://translate.google.com/translate?sl%3Dauto%26tl%3Den%26u%3Dhttps://www.brightlands.com/brightlands-smart-services-campus/bright-story-self-sovereign-identity))
|
* [Bright Story: Self Sovereign Identity](https://www.brightlands.com/brightlands-smart-services-campus/bright-story-self-sovereign-identity) Brightlands ([EN](https://translate.google.com/translate?sl=auto&tl=en&u=https://www.brightlands.com/brightlands-smart-services-campus/bright-story-self-sovereign-identity))
|
||||||
|
|
||||||
In this May 2019 blog post, the benefits (The good) of SSI are illustrated with a range of examples, comparing SSI-based business transactions to their current non-SSI-based equivalents and thus more cumbersome.
|
In this May 2019 blog post, the benefits (The good) of SSI are illustrated with a range of examples, comparing SSI-based business transactions to their current non-SSI-based equivalents and thus more cumbersome.
|
||||||
|
|
||||||
@ -285,7 +284,7 @@ Authentication and authorization are both processes that fall under the category
|
|||||||
|
|
||||||
what’s the purpose of SSI? It’s about enabling Digital Trust (which is quickly becoming an integral part of digital transformation for organizations).
|
what’s the purpose of SSI? It’s about enabling Digital Trust (which is quickly becoming an integral part of digital transformation for organizations).
|
||||||
|
|
||||||
* [Blockchain, The Missing Piece In Self-Sovereign Digital Identity](https://www.youtube.com/watch?v%3DGBLjJm-jvEo%26list%3DPLzdCVbKVZxgeD4ql4C7C4hBKPFuJhb8QS%26index%3D13) Modex (part of a youtube playlist)
|
* [Blockchain, The Missing Piece In Self-Sovereign Digital Identity](https://www.youtube.com/watch?v=GBLjJm-jvEo&list=PLzdCVbKVZxgeD4ql4C7C4hBKPFuJhb8QS&index=13) Modex (part of a youtube playlist)
|
||||||
|
|
||||||
How do we prove we are who we say we are? In an identity context, blockchains permit people to prove things about themselves using decentralized, verifiable credentials without revealing the actual data.
|
How do we prove we are who we say we are? In an identity context, blockchains permit people to prove things about themselves using decentralized, verifiable credentials without revealing the actual data.
|
||||||
* [Principal Authority: A New Perspective on Self-Sovereign Identity](https://www.blockchaincommons.com/articles/Principal-Authority/) Blockchain Commons
|
* [Principal Authority: A New Perspective on Self-Sovereign Identity](https://www.blockchaincommons.com/articles/Principal-Authority/) Blockchain Commons
|
||||||
@ -319,7 +318,7 @@ SSI credentials can be used:
|
|||||||
|
|
||||||
In a nutshell, Self-Sovereign Identity allows individuals to manage their own identities by moving physical credentials to digital devices. An individual will receive a credential from an issuer which will be stored in their digital wallet.
|
In a nutshell, Self-Sovereign Identity allows individuals to manage their own identities by moving physical credentials to digital devices. An individual will receive a credential from an issuer which will be stored in their digital wallet.
|
||||||
|
|
||||||
* [The Sovereignty Stack: Re-thinking Digital Identity for Web3.0 w/ Greg KIDD [METACO TALKS #23]](https://www.youtube.com/watch?v%3DCyGggZ2pT1I)
|
* [The Sovereignty Stack: Re-thinking Digital Identity for Web3.0 w/ Greg KIDD [METACO TALKS #23]](https://www.youtube.com/watch?v=CyGggZ2pT1I)
|
||||||
|
|
||||||
Greg is a serial entrepreneur who is probably best known for founding and taking public Dispatch Management Services Corp, the world’s largest on demand dispatch network for urgent deliveries. In a highly interesting career so far, Greg was also Chief Risk Officer at Ripple Labs and a senior analyst for the Board of Governors of the Federal Reserve in Washington. In his latest venture Global ID, Greg is acting on his long-held belief that people’s identity should be truly portable and owned by individuals themselves rather than corporations or governments.
|
Greg is a serial entrepreneur who is probably best known for founding and taking public Dispatch Management Services Corp, the world’s largest on demand dispatch network for urgent deliveries. In a highly interesting career so far, Greg was also Chief Risk Officer at Ripple Labs and a senior analyst for the Board of Governors of the Federal Reserve in Washington. In his latest venture Global ID, Greg is acting on his long-held belief that people’s identity should be truly portable and owned by individuals themselves rather than corporations or governments.
|
||||||
* [Challenges to Self-Sovereign Identity](https://damienbod.com/2021/10/11/challenges-to-self-sovereign-identity/)
|
* [Challenges to Self-Sovereign Identity](https://damienbod.com/2021/10/11/challenges-to-self-sovereign-identity/)
|
||||||
@ -344,13 +343,13 @@ Their DNS names stopped resolving, and their infrastructure IPs were offline. Th
|
|||||||
|
|
||||||
lessons I took away from asking tech identity experts [Andrew Baker](https://www.linkedin.com/in/andrew-baker-b1357939/) (Head of EC2 Engineering at AWS), our mystery guest and [Marius Mare](https://www.linkedin.com/in/marius-mare-7b8536a/), to why we need self-sovereign identity and why it has such profound implications.
|
lessons I took away from asking tech identity experts [Andrew Baker](https://www.linkedin.com/in/andrew-baker-b1357939/) (Head of EC2 Engineering at AWS), our mystery guest and [Marius Mare](https://www.linkedin.com/in/marius-mare-7b8536a/), to why we need self-sovereign identity and why it has such profound implications.
|
||||||
|
|
||||||
* [Is Self Sovereign Identity Going Exponential - With Andrew Baker and A Suprise Guest](https://www.youtube.com/watch?v%3DcaZnuTBJ_TM) Colin Iles
|
* [Is Self Sovereign Identity Going Exponential - With Andrew Baker and A Suprise Guest](https://www.youtube.com/watch?v=caZnuTBJ_TM) Colin Iles
|
||||||
|
|
||||||
despite the technological revolution we are living through, identity management is still as objectionable as ever, which is allowing criminals and companies (particularly the social media giants) to know more about you than can ever be justifiable.
|
despite the technological revolution we are living through, identity management is still as objectionable as ever, which is allowing criminals and companies (particularly the social media giants) to know more about you than can ever be justifiable.
|
||||||
|
|
||||||
In this discussion I ask Andrew Baker, AWS's Head of EC2 Engineering and a surprise guest, to share their views on whether Self Sovereign Identity management could be the solution and how likely it is
|
In this discussion I ask Andrew Baker, AWS's Head of EC2 Engineering and a surprise guest, to share their views on whether Self Sovereign Identity management could be the solution and how likely it is
|
||||||
|
|
||||||
* [Digital Identity: The Trending Tech Concept Changing How We Live](https://www.forbes.com/sites/johnhall/2021/10/15/digital-identity-the-trending-tech-concept-changing-how-we-live/?sh%3D3e004c6c2c4c) Forbes
|
* [Digital Identity: The Trending Tech Concept Changing How We Live](https://www.forbes.com/sites/johnhall/2021/10/15/digital-identity-the-trending-tech-concept-changing-how-we-live/?sh=3e004c6c2c4c) Forbes
|
||||||
|
|
||||||
Identification is key to our success. It determines the jobs we get, the money we make, how we can manage our health, and more. The fact of the matter is that 3.4 billion people have access to legally recognized identification but still [have difficulty using that identification online](https://www.mckinsey.com/business-functions/mckinsey-digital/our-insights/digital-identification-a-key-to-inclusive-growth).
|
Identification is key to our success. It determines the jobs we get, the money we make, how we can manage our health, and more. The fact of the matter is that 3.4 billion people have access to legally recognized identification but still [have difficulty using that identification online](https://www.mckinsey.com/business-functions/mckinsey-digital/our-insights/digital-identification-a-key-to-inclusive-growth).
|
||||||
|
|
||||||
@ -358,7 +357,7 @@ Identification is key to our success. It determines the jobs we get, the money w
|
|||||||
|
|
||||||
Token-based identity systems move us from talking about who, to thinking about what, so that people can operationalize their digital lives. Token-based identity systems support complex online interactions that are flexible, ad hoc, and cross-domain.
|
Token-based identity systems move us from talking about who, to thinking about what, so that people can operationalize their digital lives. Token-based identity systems support complex online interactions that are flexible, ad hoc, and cross-domain.
|
||||||
|
|
||||||
* [Nomadic Labs Research Seminars #20 | Self-Sovereign Identity and Storage](https://www.youtube.com/watch?v%3DHombbTvvets)
|
* [Nomadic Labs Research Seminars #20 | Self-Sovereign Identity and Storage](https://www.youtube.com/watch?v=HombbTvvets)
|
||||||
|
|
||||||
This session features a presentation by Wayne Chang who introduces Self-Sovereign Identity and Storage.
|
This session features a presentation by Wayne Chang who introduces Self-Sovereign Identity and Storage.
|
||||||
|
|
||||||
@ -369,7 +368,7 @@ In this talk, Wayne reviews the results of support with Tezos addresses, use cas
|
|||||||
A particularly useful aspect of the Verifiable Credentials standard is that the parties undertake the specific roles of Issuer, Holder or Verifier, but they are not constrained in how many roles, or when, they can employ them. Each party can be a device, a person or an institution, meaning that verifications can take place directly between automated systems, even verifying that each other is genuine before establishing a connection to share data
|
A particularly useful aspect of the Verifiable Credentials standard is that the parties undertake the specific roles of Issuer, Holder or Verifier, but they are not constrained in how many roles, or when, they can employ them. Each party can be a device, a person or an institution, meaning that verifications can take place directly between automated systems, even verifying that each other is genuine before establishing a connection to share data
|
||||||
|
|
||||||
|
|
||||||
* Really Good: [Self Sovereign Identity ≠ Blockchain](https://jolocom.io/blog/dezentrale-identitaten-%25e2%2589%25a0-blockchain-2/) Jolocom
|
* Really Good: [Self Sovereign Identity ≠ Blockchain](https://jolocom.io/blog/dezentrale-identitaten-%e2%89%a0-blockchain-2/) Jolocom
|
||||||
|
|
||||||
Due to the ID-Wallet project in Germany, some articles and comments have equated Self Sovereign Identity (SSI) with blockchain technology in the last few weeks. The impression is given that SSI only works in conjunction with a blockchain. Spoiler, that’s not the case.
|
Due to the ID-Wallet project in Germany, some articles and comments have equated Self Sovereign Identity (SSI) with blockchain technology in the last few weeks. The impression is given that SSI only works in conjunction with a blockchain. Spoiler, that’s not the case.
|
||||||
|
|
||||||
@ -387,7 +386,7 @@ Apart from addressing the pitfalls in conventional identity management systems,
|
|||||||
|
|
||||||
This problem was first explored by MIT researchers Shafi Goldwasser, Silvio Micali and Charles Rackoff in the 1980s as a way of combatting information leakage. The goal is to reduce the amount of extra information the verifier, Victor, can learn about the prover, Peggy.
|
This problem was first explored by MIT researchers Shafi Goldwasser, Silvio Micali and Charles Rackoff in the 1980s as a way of combatting information leakage. The goal is to reduce the amount of extra information the verifier, Victor, can learn about the prover, Peggy.
|
||||||
|
|
||||||
* [Understanding the SSI Identity Model with Verifiable Credentials](https://www.youtube.com/watch?v%3DTRuz39SEX7E) Manning
|
* [Understanding the SSI Identity Model with Verifiable Credentials](https://www.youtube.com/watch?v=TRuz39SEX7E) Manning
|
||||||
|
|
||||||
* [Badges and Credentials – A new currency for the digital world?](https://www.speexx.com/speexx-resources/podcast/podcast-badges-credentials) Speexx Exchange
|
* [Badges and Credentials – A new currency for the digital world?](https://www.speexx.com/speexx-resources/podcast/podcast-badges-credentials) Speexx Exchange
|
||||||
|
|
||||||
@ -424,7 +423,7 @@ As we’ve moved more and more online, digital platforms and processes have fail
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
* [Self-Sovereign Identities in Productive Systems - A Reality Check](https://www.youtube.com/watch?v%3DbRmhIL9sdd0) Frankfurt School Blockchain Center
|
* [Self-Sovereign Identities in Productive Systems - A Reality Check](https://www.youtube.com/watch?v=bRmhIL9sdd0) Frankfurt School Blockchain Center
|
||||||
|
|
||||||
Which use cases does SSI have?
|
Which use cases does SSI have?
|
||||||
|
|
||||||
@ -439,7 +438,7 @@ Where do the limitations of SSI lie?
|
|||||||
How can SSI be incorporated into existing infrastructure?
|
How can SSI be incorporated into existing infrastructure?
|
||||||
|
|
||||||
Which steps need to be taken for the proliferation of SSI?
|
Which steps need to be taken for the proliferation of SSI?
|
||||||
* [Adobe Coalition for Content Provenance and Authenticity at LF, Wacom and IdentityNet](https://www.youtube.com/watch?v%3D_YDP-lAewis) Connected Ink
|
* [Adobe Coalition for Content Provenance and Authenticity at LF, Wacom and IdentityNet](https://www.youtube.com/watch?v=_YDP-lAewis) Connected Ink
|
||||||
|
|
||||||
SSI has the power to change the world for the better by flipping the power dynamic surrounding digital identities and trust from large corporations and governments back to the individual. This technology empowers individuals and communities to take back control of both their personal data as well as of their digital assets and identities, and decide exactly how and when this information is to be used and shared. This session explores how SSI-based ecosystems are built and how this transition benefits both individuals and the wider global community.
|
SSI has the power to change the world for the better by flipping the power dynamic surrounding digital identities and trust from large corporations and governments back to the individual. This technology empowers individuals and communities to take back control of both their personal data as well as of their digital assets and identities, and decide exactly how and when this information is to be used and shared. This session explores how SSI-based ecosystems are built and how this transition benefits both individuals and the wider global community.
|
||||||
|
|
||||||
@ -461,7 +460,7 @@ All of us have [multiple identities](https://academy.affinidi.com/what-links-ide
|
|||||||
|
|
||||||
Decentralized identity is an emerging concept becoming more popular for online consumers by eliminating the need to pass personal identifiable information (PII) to an ever-increasing number of companies. However, in practice, decentralized identity has only existed for a handful of years, and its potential is still being discovered. So how did we get here?
|
Decentralized identity is an emerging concept becoming more popular for online consumers by eliminating the need to pass personal identifiable information (PII) to an ever-increasing number of companies. However, in practice, decentralized identity has only existed for a handful of years, and its potential is still being discovered. So how did we get here?
|
||||||
|
|
||||||
* [Webinar: The Future of Self Sovereign Identity](https://www.youtube.com/watch?v%3DgimrMbcj91A) Patientory
|
* [Webinar: The Future of Self Sovereign Identity](https://www.youtube.com/watch?v=gimrMbcj91A) Patientory
|
||||||
|
|
||||||
Self-sovereign identity (SSI) is a movement that claims digital identity should be just as legitimate and nuanced as a person’s human identity, while being accessible to all, privacy-preserving, and not reliant on a single government or corporation.
|
Self-sovereign identity (SSI) is a movement that claims digital identity should be just as legitimate and nuanced as a person’s human identity, while being accessible to all, privacy-preserving, and not reliant on a single government or corporation.
|
||||||
|
|
||||||
@ -527,7 +526,7 @@ In case you missed it, learn about a new type of identification... Decentralized
|
|||||||
|
|
||||||
We talk use cases, benefits, DIDs vs NFTs, and what should and shouldnt go on a blockchain.
|
We talk use cases, benefits, DIDs vs NFTs, and what should and shouldnt go on a blockchain.
|
||||||
|
|
||||||
* [The Off Chain Internet: Decentralized Identity & Verifiable Credentials - Evin McMullen](https://www.youtube.com/watch?v%3DEZ_Bb6j87mg)
|
* [The Off Chain Internet: Decentralized Identity & Verifiable Credentials - Evin McMullen](https://www.youtube.com/watch?v=EZ_Bb6j87mg)
|
||||||
|
|
||||||
FANTASTIC NEW TALK!!!!
|
FANTASTIC NEW TALK!!!!
|
||||||
|
|
||||||
@ -546,7 +545,7 @@ This self-sovereign capability of associating the artist, the collector and the
|
|||||||
|
|
||||||
Back to the Schelling Point - communication requires a common language and understanding. As governments, banks, hospitals, etc. navigate how best to homogenize authenticating user identities in multiple contexts, solutions will depend on user adoption. Maximizing adoption requires avoiding a Schelling point by creating a shared, accessible, and evolving Decentralized Identity Lexicon.
|
Back to the Schelling Point - communication requires a common language and understanding. As governments, banks, hospitals, etc. navigate how best to homogenize authenticating user identities in multiple contexts, solutions will depend on user adoption. Maximizing adoption requires avoiding a Schelling point by creating a shared, accessible, and evolving Decentralized Identity Lexicon.
|
||||||
|
|
||||||
* [Self-Sovereign Identity (SSI) Explained](https://www.youtube.com/watch?v%3DkJAapPG_jBY) Animo
|
* [Self-Sovereign Identity (SSI) Explained](https://www.youtube.com/watch?v=kJAapPG_jBY) Animo
|
||||||
|
|
||||||
In this video, we explain how third parties get to see a lot of personal information about you that they don't really need. Whether it is your local supermarket or your new job, you're often sharing a lot of data when all they really need is a very simple yes or no answer.
|
In this video, we explain how third parties get to see a lot of personal information about you that they don't really need. Whether it is your local supermarket or your new job, you're often sharing a lot of data when all they really need is a very simple yes or no answer.
|
||||||
|
|
||||||
@ -573,7 +572,7 @@ Service providers may benefit, as they will be able to minimize fraudulent accou
|
|||||||
|
|
||||||
* [Perkins Coie on Twitter](https://mobile.twitter.com/PerkinsCoieLLP/status/1498757491659878401)
|
* [Perkins Coie on Twitter](https://mobile.twitter.com/PerkinsCoieLLP/status/1498757491659878401)
|
||||||
|
|
||||||
On the @IAlsoPodcast, partner Charlyn Ho discusses w/hosts @nicolekyle and @SophieWHolm #digitalidentity, how #blockchain empowers users to take control of their data, #privacy under #Web2 vs. #Web3, and more. Tune in 🎧: [https://apple.co/3IvGVjr](https://podcasts.apple.com/us/podcast/45-self-sovereign-digital-identity-blockchain-web3/id1510232581?i%3D1000552163633). #womenintech #ialsowantmoney
|
On the @IAlsoPodcast, partner Charlyn Ho discusses w/hosts @nicolekyle and @SophieWHolm #digitalidentity, how #blockchain empowers users to take control of their data, #privacy under #Web2 vs. #Web3, and more. Tune in 🎧: [https://apple.co/3IvGVjr](https://podcasts.apple.com/us/podcast/45-self-sovereign-digital-identity-blockchain-web3/id1510232581?i=1000552163633). #womenintech #ialsowantmoney
|
||||||
|
|
||||||
|
|
||||||
* [Blockchain for Decentralized Identity — Self-Sovereign Identity De-mystified](https://medium.com/blockchain-for-decentralized-identity/blockchain-for-decentralized-identity-self-sovereign-identity-de-mystified-f9bebd006e84) Anita Rao
|
* [Blockchain for Decentralized Identity — Self-Sovereign Identity De-mystified](https://medium.com/blockchain-for-decentralized-identity/blockchain-for-decentralized-identity-self-sovereign-identity-de-mystified-f9bebd006e84) Anita Rao
|
||||||
@ -599,11 +598,11 @@ Self-sovereign identity (SSI) is rooted in the belief that individuals have the
|
|||||||
|
|
||||||
When it comes to authentication, passwords were once the safest and most used methods of authentication
|
When it comes to authentication, passwords were once the safest and most used methods of authentication
|
||||||
|
|
||||||
* [Decentralized identities ≠ blockchain](https://jolocom-io.translate.goog/blog/dezentrale-identitaten-%25e2%2589%25a0-blockchain/?_x_tr_sl%3Dauto%26_x_tr_tl%3Den%26_x_tr_hl%3Dnl%26_x_tr_pto%3Dnui) Jolocom
|
* [Decentralized identities ≠ blockchain](https://jolocom-io.translate.goog/blog/dezentrale-identitaten-%e2%89%a0-blockchain/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=nl&_x_tr_pto=nui) Jolocom
|
||||||
|
|
||||||
Decentralized digital identities are only possible due to cryptography. One of the cornerstones is asymmetric encryption. A key pair is generated using a cryptographic process. The pair consists of a public and a private key. As the names suggest, the private key must remain private and the public key can be shared.
|
Decentralized digital identities are only possible due to cryptography. One of the cornerstones is asymmetric encryption. A key pair is generated using a cryptographic process. The pair consists of a public and a private key. As the names suggest, the private key must remain private and the public key can be shared.
|
||||||
|
|
||||||
* [Self-Sovereign Identity (SSI) Foam Figure Explainer v2 - this time with two cameras](https://www.youtube.com/watch?v%3D81GkdBRmsbE) John Phillips
|
* [Self-Sovereign Identity (SSI) Foam Figure Explainer v2 - this time with two cameras](https://www.youtube.com/watch?v=81GkdBRmsbE) John Phillips
|
||||||
|
|
||||||
* [Three approaches to Self-Sovereign Identity based on blockchain](https://medium.com/coinmonks/three-approaches-to-self-sovereign-identity-based-on-blockchain-301b18a49345)
|
* [Three approaches to Self-Sovereign Identity based on blockchain](https://medium.com/coinmonks/three-approaches-to-self-sovereign-identity-based-on-blockchain-301b18a49345)
|
||||||
|
|
||||||
@ -643,13 +642,13 @@ The relationship between the issuers, holders, and verifiers is called the trust
|
|||||||
|
|
||||||
We hope this will get you thinking about enabling SSI using an option that best suits your application or business requirement.
|
We hope this will get you thinking about enabling SSI using an option that best suits your application or business requirement.
|
||||||
|
|
||||||
* [Identities Evolve: Why Federated Identity is Easier Said than Done](https://papers.ssrn.com/sol3/papers.cfm?abstract_id%3D2163241) SSRN
|
* [Identities Evolve: Why Federated Identity is Easier Said than Done](https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2163241) SSRN
|
||||||
|
|
||||||
This paper shows that federated identity is really a radical and deeply problematic departure from the way we do routine business. Federation undoes and complicates long standing business arrangements, exposing customers and service providers alike to new risks that existing contracts are unable to deal with. Identity federations tend to overlook that identities are proxies for relationships we have in different contexts. Business relationships don’t easily “interoperate."
|
This paper shows that federated identity is really a radical and deeply problematic departure from the way we do routine business. Federation undoes and complicates long standing business arrangements, exposing customers and service providers alike to new risks that existing contracts are unable to deal with. Identity federations tend to overlook that identities are proxies for relationships we have in different contexts. Business relationships don’t easily “interoperate."
|
||||||
|
|
||||||
* [Verifiable credentials are key to the future of online privacy](https://www.helpnetsecurity.com/2021/07/26/verifiable-credentials/) Helpnet
|
* [Verifiable credentials are key to the future of online privacy](https://www.helpnetsecurity.com/2021/07/26/verifiable-credentials/) Helpnet
|
||||||
|
|
||||||
they offer a few advantages that we don’t get with paper records. Whereas a physical document (let’s say, a [vaccine card](https://www.helpnetsecurity.com/2021/06/15/vaccine-passports/)) can be forged and [passed off as authentic](https://www.npr.org/2021/06/08/1004264531/fake-covid-vaccine-cards-keep-getting-sold-online-using-one-is-a-crime?t%3D1626423870877), the [security mechanisms](https://www.evernym.com/blog/the-three-pillars-of-self-sovereign-identity/) behind a verifiable credential means that it can never be tampered with and that anyone shown the credential will be able to immediately verify who issued it and to whom it was issued.
|
they offer a few advantages that we don’t get with paper records. Whereas a physical document (let’s say, a [vaccine card](https://www.helpnetsecurity.com/2021/06/15/vaccine-passports/)) can be forged and [passed off as authentic](https://www.npr.org/2021/06/08/1004264531/fake-covid-vaccine-cards-keep-getting-sold-online-using-one-is-a-crime?t=1626423870877), the [security mechanisms](https://www.evernym.com/blog/the-three-pillars-of-self-sovereign-identity/) behind a verifiable credential means that it can never be tampered with and that anyone shown the credential will be able to immediately verify who issued it and to whom it was issued.
|
||||||
|
|
||||||
* [Selective Disclosure: Share Just What You Want](https://academy.affinidi.com/selective-disclosure-share-what-you-want-8ae367655b7b) Affinidi
|
* [Selective Disclosure: Share Just What You Want](https://academy.affinidi.com/selective-disclosure-share-what-you-want-8ae367655b7b) Affinidi
|
||||||
|
|
||||||
@ -659,7 +658,7 @@ In the context of SSI, selective disclosure is best implemented through [verifi
|
|||||||
|
|
||||||
Rather than trying to paste everything and everyone together, the path forward to help build trusted ecosystems relies on interoperability and leveraging existing assets while positioning the user in a disintermediated model of control and agency — possible with FPX and verifiable credentials.
|
Rather than trying to paste everything and everyone together, the path forward to help build trusted ecosystems relies on interoperability and leveraging existing assets while positioning the user in a disintermediated model of control and agency — possible with FPX and verifiable credentials.
|
||||||
|
|
||||||
## [Sebastian Gebski's Reviews](https://www.goodreads.com/review/list/11116469-sebastian-gebski?shelf%3Dread) > Self-Sovereign Identity: Decentralized Digital Identity and Verifiable Credentials by Alex Preukschat, Drummond Reed
|
## [Sebastian Gebski's Reviews](https://www.goodreads.com/review/list/11116469-sebastian-gebski?shelf=read) > Self-Sovereign Identity: Decentralized Digital Identity and Verifiable Credentials by Alex Preukschat, Drummond Reed
|
||||||
|
|
||||||
highly recommended. I strongly believe that the concept of SSI will be extremely important in the future - that's actually one of the few implementations on the blockchain that make a lot of sense.
|
highly recommended. I strongly believe that the concept of SSI will be extremely important in the future - that's actually one of the few implementations on the blockchain that make a lot of sense.
|
||||||
|
|
||||||
@ -743,7 +742,7 @@ This is excellent work, with lots of references, by Dr. Nuttawut Kongsuwan ([Fin
|
|||||||
|
|
||||||
* [The Verifiable Credential’s Model](https://trinsic.id/trinsic-basics-the-verifiable-credentials-model/)
|
* [The Verifiable Credential’s Model](https://trinsic.id/trinsic-basics-the-verifiable-credentials-model/)
|
||||||
> At the core of every self-sovereign identity (SSI) use case is what we call the verifiable credentials model. This simple yet effective model helps conceptualize how verifiable credentials are exchanged between people and organizations.
|
> At the core of every self-sovereign identity (SSI) use case is what we call the verifiable credentials model. This simple yet effective model helps conceptualize how verifiable credentials are exchanged between people and organizations.
|
||||||
* [What Is a Blockchain (SSI) Self-Sovereign Identity?](https://www.youtube.com/watch?v%3Duq0MQH4fAgc%26t%3D3s) Blockchain Africa Conference 2022
|
* [What Is a Blockchain (SSI) Self-Sovereign Identity?](https://www.youtube.com/watch?v=uq0MQH4fAgc&t=3s) Blockchain Africa Conference 2022
|
||||||
|
|
||||||
What is the value of Self-Sovereign Identity (SSI) for organisations and citizens? What are the current initiatives and traction of SSI in South Africa? What are the economic benefits and the hurdles to SSI adoption in South Africa?
|
What is the value of Self-Sovereign Identity (SSI) for organisations and citizens? What are the current initiatives and traction of SSI in South Africa? What are the economic benefits and the hurdles to SSI adoption in South Africa?
|
||||||
|
|
||||||
@ -768,7 +767,7 @@ Similar actions conducted in person do not represent the same amount of risk. Fo
|
|||||||
|
|
||||||
The adoption of verifiable credentials is another fundamental part of the SSI concept. Verifiable credentials use a digital signature for identity claims by combining public-key hashing cryptography and privacy-protection techniques to convert credentials like ID cards to digital versions.
|
The adoption of verifiable credentials is another fundamental part of the SSI concept. Verifiable credentials use a digital signature for identity claims by combining public-key hashing cryptography and privacy-protection techniques to convert credentials like ID cards to digital versions.
|
||||||
|
|
||||||
* [Exploring the Decentralized Web, Episode 4: Digital Identity](https://www.youtube.com/watch?v%3Djm8y56KMkIw) Filecoin Foundation
|
* [Exploring the Decentralized Web, Episode 4: Digital Identity](https://www.youtube.com/watch?v=jm8y56KMkIw) Filecoin Foundation
|
||||||
|
|
||||||
10min Video Montage
|
10min Video Montage
|
||||||
|
|
||||||
@ -786,11 +785,11 @@ There are 4 attack vector categories to self-sovereign identity that map directl
|
|||||||
|
|
||||||
## Identity Proofing
|
## Identity Proofing
|
||||||
|
|
||||||
* [SSI & Proof of Reputation](https://www.youtube.com/watch?v%3DS95BoGgy3x0) Catalyst Swarm
|
* [SSI & Proof of Reputation](https://www.youtube.com/watch?v=S95BoGgy3x0) Catalyst Swarm
|
||||||
|
|
||||||
Join Frank Albanese (Snapbrillia), Lance Byrd (RootsID), Nick Mason (ProofSpace), Niels Kijf (Design Academy), Patrick Suzzi (F8 OSDE), Juan Sierra (HERG), Zoéys Welt, Brian Harper, Ashton Engberg, Ninh Tran (Snapbrillia) and many others as the community discusses the different what is SSI & Proof of Reputation and why it matters.
|
Join Frank Albanese (Snapbrillia), Lance Byrd (RootsID), Nick Mason (ProofSpace), Niels Kijf (Design Academy), Patrick Suzzi (F8 OSDE), Juan Sierra (HERG), Zoéys Welt, Brian Harper, Ashton Engberg, Ninh Tran (Snapbrillia) and many others as the community discusses the different what is SSI & Proof of Reputation and why it matters.
|
||||||
|
|
||||||
Presentation: [https://bit.ly/3OmuIRx](https://www.youtube.com/redirect?event%3Dvideo_description%26redir_token%3DQUFFLUhqbk9pS0dsbzVIVG5RanhSQWVYWkkxOC1Bd0hmZ3xBQ3Jtc0tsSnRwWXhwS0UxUGRTV1VORzBmMzNhcllURHdJdWpOMHo5U0k5dFVaZms5enpMSjN6enhjLVhTYjNscDNRcjMtSFBUa1daN0tzZElDa2g1VHhzaGJ0YjN5R3gtX0tKMFVMZ2FTQWRSVmF3d0hpRmdYNA%26q%3Dhttps%253A%252F%252Fbit.ly%252F3OmuIRx)
|
Presentation: [https://bit.ly/3OmuIRx](https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbk9pS0dsbzVIVG5RanhSQWVYWkkxOC1Bd0hmZ3xBQ3Jtc0tsSnRwWXhwS0UxUGRTV1VORzBmMzNhcllURHdJdWpOMHo5U0k5dFVaZms5enpMSjN6enhjLVhTYjNscDNRcjMtSFBUa1daN0tzZElDa2g1VHhzaGJ0YjN5R3gtX0tKMFVMZ2FTQWRSVmF3d0hpRmdYNA&q=https%3A//bit.ly/3OmuIRx)
|
||||||
|
|
||||||
|
|
||||||
* [Advocating for learner-centric badge systems](https://blog.weareopen.coop/advocating-for-learner-centric-badge-systems-21a65be4a725) We Are Open Coop
|
* [Advocating for learner-centric badge systems](https://blog.weareopen.coop/advocating-for-learner-centric-badge-systems-21a65be4a725) We Are Open Coop
|
||||||
@ -805,21 +804,21 @@ Let’s look at a few pointers that I believe make it hard for the web3 protocol
|
|||||||
|
|
||||||
True decentralization in the digital world means that once verified, your PII is on your phone and under your control. The data doesn’t live anywhere else.
|
True decentralization in the digital world means that once verified, your PII is on your phone and under your control. The data doesn’t live anywhere else.
|
||||||
|
|
||||||
* [Self-Sovereign Identity (SSI) & Atala PRISM with Allison Fromm](https://www.youtube.com/watch?v%3DcSG148jbErs) Cardano Catalyst Women
|
* [Self-Sovereign Identity (SSI) & Atala PRISM with Allison Fromm](https://www.youtube.com/watch?v=cSG148jbErs) Cardano Catalyst Women
|
||||||
|
|
||||||
* [0:02:58](https://www.youtube.com/watch?v%3DcSG148jbErs%26t%3D178s) What is Identity?
|
* [0:02:58](https://www.youtube.com/watch?v=cSG148jbErs&t=178s) What is Identity?
|
||||||
|
|
||||||
* [0:04:14](https://www.youtube.com/watch?v%3DcSG148jbErs%26t%3D254s) Problems with Digital Identity
|
* [0:04:14](https://www.youtube.com/watch?v=cSG148jbErs&t=254s) Problems with Digital Identity
|
||||||
|
|
||||||
* [0:08:38](https://www.youtube.com/watch?v%3DcSG148jbErs%26t%3D518s) Solution: Self-Sovereign Identity (SSI)
|
* [0:08:38](https://www.youtube.com/watch?v=cSG148jbErs&t=518s) Solution: Self-Sovereign Identity (SSI)
|
||||||
|
|
||||||
* [0:15:55](https://www.youtube.com/watch?v%3DcSG148jbErs%26t%3D955s) Getting Started with SSI: A Catalyst Proposal
|
* [0:15:55](https://www.youtube.com/watch?v=cSG148jbErs&t=955s) Getting Started with SSI: A Catalyst Proposal
|
||||||
|
|
||||||
* [0:20:11](https://www.youtube.com/watch?v%3DcSG148jbErs%26t%3D1211s) Conclusion
|
* [0:20:11](https://www.youtube.com/watch?v=cSG148jbErs&t=1211s) Conclusion
|
||||||
|
|
||||||
* [0:22:20](https://www.youtube.com/watch?v%3DcSG148jbErs%26t%3D1340s) Core team
|
* [0:22:20](https://www.youtube.com/watch?v=cSG148jbErs&t=1340s) Core team
|
||||||
|
|
||||||
* [0:24:05](https://www.youtube.com/watch?v%3DcSG148jbErs%26t%3D1445s) Questions
|
* [0:24:05](https://www.youtube.com/watch?v=cSG148jbErs&t=1445s) Questions
|
||||||
|
|
||||||
* [Unwrapping the Decentralised Identity Landscape](https://www.affinidi.com/post/unwrapping-the-decentralised-identity-landscape) Affinidi
|
* [Unwrapping the Decentralised Identity Landscape](https://www.affinidi.com/post/unwrapping-the-decentralised-identity-landscape) Affinidi
|
||||||
Podcast: [Digital Identity and Self Sovereignty](https://www.traceyfollows.com/tag/podcast/) Kaliya Young & Lucy Yang -Future of You
|
Podcast: [Digital Identity and Self Sovereignty](https://www.traceyfollows.com/tag/podcast/) Kaliya Young & Lucy Yang -Future of You
|
||||||
@ -851,7 +850,7 @@ The only ones who will benefit from your digital ID are the Issuer (who gave you
|
|||||||
|
|
||||||
* [What is Self-Sovereign Identity?](https://blog.tanglelabs.io/62782301a9ed0df5ace5be86) Tangle Labs
|
* [What is Self-Sovereign Identity?](https://blog.tanglelabs.io/62782301a9ed0df5ace5be86) Tangle Labs
|
||||||
|
|
||||||
* [Self-sovereign identity system: Blockchain-based tech for identity verification](https://www.youtube.com/watch?v%3DQ7IhaY4eKEc) Economic Times
|
* [Self-sovereign identity system: Blockchain-based tech for identity verification](https://www.youtube.com/watch?v=Q7IhaY4eKEc) Economic Times
|
||||||
|
|
||||||
Relative to the Indian context
|
Relative to the Indian context
|
||||||
|
|
||||||
@ -922,7 +921,7 @@ data security is about system-wide design, where many different elements need to
|
|||||||
* [What are the main contributions of the Self-Sovereign Identity?](https://www.extrimian.com/resources/blog/251-2/)
|
* [What are the main contributions of the Self-Sovereign Identity?](https://www.extrimian.com/resources/blog/251-2/)
|
||||||
|
|
||||||
Identity represents a great asset. But we do not have control of this asset, as it is in the hands of organizations, governments, institutions, etc. These entities know everything about us from all this data.
|
Identity represents a great asset. But we do not have control of this asset, as it is in the hands of organizations, governments, institutions, etc. These entities know everything about us from all this data.
|
||||||
* [The Future of Self-Sovereign Identity (SSI)](https://www.youtube.com/watch?v%3Dmx58bYHFrFk) Evernym
|
* [The Future of Self-Sovereign Identity (SSI)](https://www.youtube.com/watch?v=mx58bYHFrFk) Evernym
|
||||||
|
|
||||||
Drummond Reed and Alex Preukschat, co-authors of Manning Publication's new book 'Self-Sovereign Identity,' for a conversation on the book's development and recent release and what the future holds for SSI as a technology, architecture, and movement.
|
Drummond Reed and Alex Preukschat, co-authors of Manning Publication's new book 'Self-Sovereign Identity,' for a conversation on the book's development and recent release and what the future holds for SSI as a technology, architecture, and movement.
|
||||||
|
|
||||||
@ -939,7 +938,7 @@ How is it possible that the Internet has spread and developed to such an extent,
|
|||||||
- Which of my competitors is probably already doing this?
|
- Which of my competitors is probably already doing this?
|
||||||
|
|
||||||
|
|
||||||
* [Simple Definitions for Complex Terms in Decentralized Identity](https://anonyome.com/2022/06/simple-definitions-for-complex-terms-in-decentralized-identity%25ef%25bf%25bc/)
|
* [Simple Definitions for Complex Terms in Decentralized Identity](https://anonyome.com/2022/06/simple-definitions-for-complex-terms-in-decentralized-identity%ef%bf%bc/)
|
||||||
|
|
||||||
* [What is Self-Sovereign Identity?](https://blog.tanglelabs.io/what-is-self-sovereign-identity/) TangleLabs
|
* [What is Self-Sovereign Identity?](https://blog.tanglelabs.io/what-is-self-sovereign-identity/) TangleLabs
|
||||||
|
|
||||||
@ -1070,11 +1069,11 @@ recently-released ‘[Crypto in KYC – Growth through trust’](https://www.idn
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
* [Identity Insights - Basics of Verifiable Credentials](https://www.youtube.com/watch?v%3DRCCatllgNv4) Indicio, Youtube
|
* [Identity Insights - Basics of Verifiable Credentials](https://www.youtube.com/watch?v=RCCatllgNv4) Indicio, Youtube
|
||||||
|
|
||||||
What are verifiable credentials? In this episode we are joined by Indicio software engineer Char Howland for an introduction to what this technology is and what it can do.
|
What are verifiable credentials? In this episode we are joined by Indicio software engineer Char Howland for an introduction to what this technology is and what it can do.
|
||||||
|
|
||||||
* [Get involved in the open source community](https://wiki.hyperledger.org/display/IWG/Identity%2BImplementers%2BWG%2BCall)
|
* [Get involved in the open source community](https://wiki.hyperledger.org/display/IWG/Identity+Implementers+WG+Call)
|
||||||
|
|
||||||
* [What is Decentralized Identity?](https://indicio.tech/what-is-decentralized-identity/)
|
* [What is Decentralized Identity?](https://indicio.tech/what-is-decentralized-identity/)
|
||||||
|
|
||||||
@ -1148,7 +1147,7 @@ There is a real opportunity to combine technology that is being developed with t
|
|||||||
|
|
||||||
* [10 Resources for beginners in Decentralized Identity (DID)](https://medium.com/veramo/top-10-resources-for-beginners-in-decentralized-identity-di-2924e8571159) Veramo
|
* [10 Resources for beginners in Decentralized Identity (DID)](https://medium.com/veramo/top-10-resources-for-beginners-in-decentralized-identity-di-2924e8571159) Veramo
|
||||||
|
|
||||||
* [Self-Sovereign Identity: Taking Control Over Your Digital Identity](https://www.forbes.com/sites/forbestechcouncil/2022/09/26/self-sovereign-identity-taking-control-over-your-digital-identity/?sh%3D797222d64e0c) Forbes
|
* [Self-Sovereign Identity: Taking Control Over Your Digital Identity](https://www.forbes.com/sites/forbestechcouncil/2022/09/26/self-sovereign-identity-taking-control-over-your-digital-identity/?sh=797222d64e0c) Forbes
|
||||||
|
|
||||||
The two main ingredients of SSI are verifiable credentials (VCs) and decentralized identifiers (DIDs).
|
The two main ingredients of SSI are verifiable credentials (VCs) and decentralized identifiers (DIDs).
|
||||||
|
|
||||||
@ -1186,7 +1185,7 @@ Technically, Verifiable Claims are claims made about a “subject” (identified
|
|||||||
|
|
||||||
* [Decentralized Systems of Identity and Owning Your Own Data](https://www.coindesk.com/podcasts/coindesks-money-reimagined/decentralized-systems-of-identity-and-owning-your-own-data/) Coindesk
|
* [Decentralized Systems of Identity and Owning Your Own Data](https://www.coindesk.com/podcasts/coindesks-money-reimagined/decentralized-systems-of-identity-and-owning-your-own-data/) Coindesk
|
||||||
|
|
||||||
On this episode of “Money Reimagined,” hosts [Michael Casey](https://twitter.com/mikejcasey) and [Sheila Warren](https://twitter.com/sheila_warren) are together again but this time, at Converge22 by Circle. They discuss the challenges of identity and verification in the U.S. and in other countries with [Daniel Buchner](https://www.linkedin.com/in/dbuchner/), head of decentralized identity at [Block](https://block.xyz/); and [Chi Nnadi](https://www.linkedin.com/in/chinnadi/?originalSubdomain%3Dke), the co-founder and CEO at [Mara](https://mara.xyz/).
|
On this episode of “Money Reimagined,” hosts [Michael Casey](https://twitter.com/mikejcasey) and [Sheila Warren](https://twitter.com/sheila_warren) are together again but this time, at Converge22 by Circle. They discuss the challenges of identity and verification in the U.S. and in other countries with [Daniel Buchner](https://www.linkedin.com/in/dbuchner/), head of decentralized identity at [Block](https://block.xyz/); and [Chi Nnadi](https://www.linkedin.com/in/chinnadi/?originalSubdomain=ke), the co-founder and CEO at [Mara](https://mara.xyz/).
|
||||||
|
|
||||||
* [Introduction to Decentralized Identity](https://wiki.iota.org/identity.rs/decentralized_identity) IOTA Wiki
|
* [Introduction to Decentralized Identity](https://wiki.iota.org/identity.rs/decentralized_identity) IOTA Wiki
|
||||||
|
|
||||||
|
@ -15,7 +15,7 @@ There are more good pictures
|
|||||||
> This post features three fantastic books from three great, but quite different, authors on the subject of Big Tech, surveillance capitalism, and what's to be done about it.
|
> This post features three fantastic books from three great, but quite different, authors on the subject of Big Tech, surveillance capitalism, and what's to be done about it.
|
||||||
* [Authentic Digital Relationships](https://www.windley.com/archives/2020/08/authentic_digital_relationships.shtml) Windley
|
* [Authentic Digital Relationships](https://www.windley.com/archives/2020/08/authentic_digital_relationships.shtml) Windley
|
||||||
> Self-sovereign identity, supported by a heterarchical identity metasystem, creates a firm foundation for rich digital relationships that allow people to be digitally embodied so they can act online as autonomous
|
> Self-sovereign identity, supported by a heterarchical identity metasystem, creates a firm foundation for rich digital relationships that allow people to be digitally embodied so they can act online as autonomous
|
||||||
* [The Future of Self-Sovereign Identity (SSI)](https://www.youtube.com/watch?v%3Dmx58bYHFrFk)
|
* [The Future of Self-Sovereign Identity (SSI)](https://www.youtube.com/watch?v=mx58bYHFrFk)
|
||||||
> We were joined by Drummond Reed and Alex Preukschat, co-authors of Manning Publication's new book 'Self-Sovereign Identity,' for a conversation on the book's development and recent release and what the future holds for SSI as a technology, architecture, and movement.
|
> We were joined by Drummond Reed and Alex Preukschat, co-authors of Manning Publication's new book 'Self-Sovereign Identity,' for a conversation on the book's development and recent release and what the future holds for SSI as a technology, architecture, and movement.
|
||||||
* [Personal Identity and the Future of Digital Interactions](https://www.pingidentity.com/en/company/blog/posts/2021/personal-identity-future-digital-interactions.html) Ping Identity
|
* [Personal Identity and the Future of Digital Interactions](https://www.pingidentity.com/en/company/blog/posts/2021/personal-identity-future-digital-interactions.html) Ping Identity
|
||||||
> What if individuals could determine how to share data and with whom? What if that data was always up to date? And what if instead of merely having a unified customer profile in a single company, each person could have one identity experience for all the companies and people they interact with?
|
> What if individuals could determine how to share data and with whom? What if that data was always up to date? And what if instead of merely having a unified customer profile in a single company, each person could have one identity experience for all the companies and people they interact with?
|
||||||
@ -51,7 +51,7 @@ A comprehensive Article on CoinDesk about the future and what SSI looks like in
|
|||||||
> The hardest part ahead is not the technology, it’s the wholesale re-conceptualization of what is required for a global verification network that puts the power of the network back into the endpoints that is you and me.
|
> The hardest part ahead is not the technology, it’s the wholesale re-conceptualization of what is required for a global verification network that puts the power of the network back into the endpoints that is you and me.
|
||||||
* [Four Future Scenarios about Identity & Access in 2040](https://esatus.com/wp-content/uploads/Broschuere_eng_final.html). We talk about Total Surveillance, Mega Corporations, Identity Chaos & Self-Sovereign Identity 2.0.
|
* [Four Future Scenarios about Identity & Access in 2040](https://esatus.com/wp-content/uploads/Broschuere_eng_final.html). We talk about Total Surveillance, Mega Corporations, Identity Chaos & Self-Sovereign Identity 2.0.
|
||||||
> After a look into the past and present, we now fast-forward to the year 2040, where we meet Julia and accompany her through her everyday life. In four different IAM future scenarios, which can be viewed separately, we will understand how life under total surveillance feels for Julia. In times where identity chaos prevails, we can see what it means when Julia can no longer be sure about her digital identity, with only her physical identity being certain. In a world dominated by mega corporations Julia‘s experiences with her employer show us the far-reaching significance and influence such corporations have gained in relation to IAM. Finally, we experience how Julia is able to regain her informational self-determination thanks to her identity wallet - Self-Sovereign Identity 2.0.
|
> After a look into the past and present, we now fast-forward to the year 2040, where we meet Julia and accompany her through her everyday life. In four different IAM future scenarios, which can be viewed separately, we will understand how life under total surveillance feels for Julia. In times where identity chaos prevails, we can see what it means when Julia can no longer be sure about her digital identity, with only her physical identity being certain. In a world dominated by mega corporations Julia‘s experiences with her employer show us the far-reaching significance and influence such corporations have gained in relation to IAM. Finally, we experience how Julia is able to regain her informational self-determination thanks to her identity wallet - Self-Sovereign Identity 2.0.
|
||||||
* [What does it take to develop human-centric solutions for the built environment?](https://mydata.org/2022/05/13/built-for-people/) MyData ([Video](https://www.youtube.com/watch?v%3DVCjW0_NAPmQ)
|
* [What does it take to develop human-centric solutions for the built environment?](https://mydata.org/2022/05/13/built-for-people/) MyData ([Video](https://www.youtube.com/watch?v=VCjW0_NAPmQ)
|
||||||
> Building better, more human-centric solutions in smart cities starts by realising that citizens and their digital footprints are not merely aspects to monitor and evaluate. They are active participants in the cities we live and work together and need to be engaged in designing better cities and managing the data about themselves. This is not important only for respecting citizens’ rights, but it is crucial to building sustainable services and humane cities.
|
> Building better, more human-centric solutions in smart cities starts by realising that citizens and their digital footprints are not merely aspects to monitor and evaluate. They are active participants in the cities we live and work together and need to be engaged in designing better cities and managing the data about themselves. This is not important only for respecting citizens’ rights, but it is crucial to building sustainable services and humane cities.
|
||||||
* [On Abortion and Data](https://www.mydata.org/2022/06/30/on-abortion-and-data/) MyData
|
* [On Abortion and Data](https://www.mydata.org/2022/06/30/on-abortion-and-data/) MyData
|
||||||
> A basic insight of MyData is that the current systems of data are asymmetrical, imbalanced, and unfair. A basic motivation of MyData is to fix this by addressing business, legal, technical, and societal aspects of those systems.
|
> A basic insight of MyData is that the current systems of data are asymmetrical, imbalanced, and unfair. A basic motivation of MyData is to fix this by addressing business, legal, technical, and societal aspects of those systems.
|
||||||
|
@ -4,7 +4,7 @@ published: false
|
|||||||
|
|
||||||
# Governance
|
# Governance
|
||||||
|
|
||||||
* [Data Unions, Banks, Coops, Fiduciaries etc – has their time come?](https://iiw.idcommons.net/3D/_Data_Unions,_Banks,_Coops,_Fiduciaries_etc_--_has_their_time_come%253F) by Johannes Ernst
|
* [Data Unions, Banks, Coops, Fiduciaries etc – has their time come?](https://iiw.idcommons.net/3D/_Data_Unions,_Banks,_Coops,_Fiduciaries_etc_--_has_their_time_come%3F) by Johannes Ernst
|
||||||
|
|
||||||
Historical analogies: rural electrification, telecommunications, insurance
|
Historical analogies: rural electrification, telecommunications, insurance
|
||||||
|
|
||||||
@ -32,7 +32,7 @@ My use case is I want to operate [https://twitter.com/permanentcpu](https://twit
|
|||||||
|
|
||||||
* [https://en.wikipedia.org/wiki/Rochdale_Principles](https://en.wikipedia.org/wiki/Rochdale_Principles)
|
* [https://en.wikipedia.org/wiki/Rochdale_Principles](https://en.wikipedia.org/wiki/Rochdale_Principles)
|
||||||
|
|
||||||
“The earliest mutual organization established in the British North American colonies was created in 1735 in Charleston, SC” [https://en.wikipedia.org/wiki/History_of_cooperatives_in_the_United_States#18th_century](https://en.wikipedia.org/wiki/History_of_cooperatives_in_the_United_States%2318th_century)
|
“The earliest mutual organization established in the British North American colonies was created in 1735 in Charleston, SC” [https://en.wikipedia.org/wiki/History_of_cooperatives_in_the_United_States#18th_century](https://en.wikipedia.org/wiki/History_of_cooperatives_in_the_United_States#18th_century)
|
||||||
|
|
||||||
“The Philadelphia Contributionship mutual insurance company, founded by Benjamin Franklin in 1752, is the oldest continuing mutual insurance company in the continental United States. “
|
“The Philadelphia Contributionship mutual insurance company, founded by Benjamin Franklin in 1752, is the oldest continuing mutual insurance company in the continental United States. “
|
||||||
|
|
||||||
@ -70,9 +70,9 @@ Then run [https://github.com/solid/community-server](https://github.com/solid/co
|
|||||||
|
|
||||||
* [https://www.sitra.fi/en/topics/fair-data-economy/](https://www.sitra.fi/en/topics/fair-data-economy/)
|
* [https://www.sitra.fi/en/topics/fair-data-economy/](https://www.sitra.fi/en/topics/fair-data-economy/)
|
||||||
|
|
||||||
* [https://d1muf25xaso8hp.cloudfront.net/https%3A%2F%2Fs3.amazonaws.com%2Fappforest_uf%2Ff1587410240363x746891124614691500%2Fmartech_2020_final-1600x900-web.jpg?w=1024&h=576&auto=compress&dpr=2&fit=max](https://d1muf25xaso8hp.cloudfront.net/https%253A%252F%252Fs3.amazonaws.com%252Fappforest_uf%252Ff1587410240363x746891124614691500%252Fmartech_2020_final-1600x900-web.jpg?w%3D1024%26h%3D576%26auto%3Dcompress%26dpr%3D2%26fit%3Dmax)
|
* [https://d1muf25xaso8hp.cloudfront.net/https%3A//s3.amazonaws.com/appforest_uf/f1587410240363x746891124614691500/martech_2020_final-1600x900-web.jpg?w=1024&h=576&auto=compress&dpr=2&fit=max](https://d1muf25xaso8hp.cloudfront.net/https%3A//s3.amazonaws.com/appforest_uf/f1587410240363x746891124614691500/martech_2020_final-1600x900-web.jpg?w=1024&h=576&auto=compress&dpr=2&fit=max)
|
||||||
|
|
||||||
* [SSI for Organizations: Who’s behind this DID?](https://iiw.idcommons.net/14G/_SSI_for_Organizations:_Who%2527s_behind_this_DID%253F) by Dominic Wörner, Christian Bormann, Michael Schäfer ([video](https://eu01web.zoom.us/rec/play/hh2Uribpcy71pc7u0D_-7XCVoBmmC6feq22r4rgbnYBwnBnCd3Zib8l6WvhpOT0Esu5eFdhk00F38vaX.Z23dGksHI22vsdde?continueMode%3Dtrue)
|
* [SSI for Organizations: Who’s behind this DID?](https://iiw.idcommons.net/14G/_SSI_for_Organizations:_Who%27s_behind_this_DID%3F) by Dominic Wörner, Christian Bormann, Michael Schäfer ([video](https://eu01web.zoom.us/rec/play/hh2Uribpcy71pc7u0D_-7XCVoBmmC6feq22r4rgbnYBwnBnCd3Zib8l6WvhpOT0Esu5eFdhk00F38vaX.Z23dGksHI22vsdde?continueMode=true)
|
||||||
|
|
||||||
* [Public profile - Machine-readable, cryptographially-verifiable imprint linked to a DID](https://hackmd.io/4oZOgwFOQDSFUuu3ruN-_g)
|
* [Public profile - Machine-readable, cryptographially-verifiable imprint linked to a DID](https://hackmd.io/4oZOgwFOQDSFUuu3ruN-_g)
|
||||||
|
|
||||||
@ -88,7 +88,7 @@ a simple mechanism to provide public information concerning an entity by adverti
|
|||||||
* [3 Stages of a Pan-African Identity Framework for Establishing Self-Sovereign Identity With Blockchain](https://www.frontiersin.org/articles/10.3389/fbloc.2021.631640/full) Solomon Darnell, Joseph Sevilla
|
* [3 Stages of a Pan-African Identity Framework for Establishing Self-Sovereign Identity With Blockchain](https://www.frontiersin.org/articles/10.3389/fbloc.2021.631640/full) Solomon Darnell, Joseph Sevilla
|
||||||
|
|
||||||
Three stages have been identified as necessities to accomplish the development of this system before opening it further beyond the pan-African worldwide community. The three stages are defined by systems that allow for biometric/demographic registration (stage 1), interoperability and security hardening (stage 2), and biometric modality data analysis/organization/association (stage 3).
|
Three stages have been identified as necessities to accomplish the development of this system before opening it further beyond the pan-African worldwide community. The three stages are defined by systems that allow for biometric/demographic registration (stage 1), interoperability and security hardening (stage 2), and biometric modality data analysis/organization/association (stage 3).
|
||||||
* [Governance: Clarifying or confusing the marketplace?](https://iiw.idcommons.net/19A/_Governance:_Clarifying_or_confusing_the_marketplace%253F)
|
* [Governance: Clarifying or confusing the marketplace?](https://iiw.idcommons.net/19A/_Governance:_Clarifying_or_confusing_the_marketplace%3F)
|
||||||
|
|
||||||
Governance in decentralized identity is more akin to “technical rules and instructions.” This is highly disfluent in part because it is so extensive and in part because it relies on a new vocab that uses familiar words in unfamiliar ways. All of this creates disfluency to such a degree that it is unpleasant to contemplate and that unpleasantness is transferred onto the product.
|
Governance in decentralized identity is more akin to “technical rules and instructions.” This is highly disfluent in part because it is so extensive and in part because it relies on a new vocab that uses familiar words in unfamiliar ways. All of this creates disfluency to such a degree that it is unpleasant to contemplate and that unpleasantness is transferred onto the product.
|
||||||
|
|
||||||
@ -112,7 +112,7 @@ As we have presented these affirmations at prior IIW and since then to others -
|
|||||||
|
|
||||||
This is a Call to Action for IIW to support our role as a convenor in this important area of human rights in cyberspace.
|
This is a Call to Action for IIW to support our role as a convenor in this important area of human rights in cyberspace.
|
||||||
|
|
||||||
* [UDDI & UDDR - Common language once and for all?](https://iiw.idcommons.net/20D/_UDDI_%2526_UDDR_-_Common_language_once_and_for_all%253F)
|
* [UDDI & UDDR - Common language once and for all?](https://iiw.idcommons.net/20D/_UDDI_%26_UDDR_-_Common_language_once_and_for_all%3F)
|
||||||
|
|
||||||
Query of nature of governance and role of programmers.
|
Query of nature of governance and role of programmers.
|
||||||
|
|
||||||
@ -254,7 +254,7 @@ Links from chat: [http://emoglen.law.columbia.edu/LIS/archive/privacy-legis/IST
|
|||||||
|
|
||||||
* [https://github.com/Open-Notice/OPN-Workshop-05-04-21](https://github.com/Open-Notice/OPN-Workshop-05-04-21)
|
* [https://github.com/Open-Notice/OPN-Workshop-05-04-21](https://github.com/Open-Notice/OPN-Workshop-05-04-21)
|
||||||
|
|
||||||
* [Practical Perspectives on the collapse of zero-sum civilizations and the emergence of computational sovereigns and a pattern approach to digital equity governance: The source of the problems is the source of the solutions](https://iiw.idcommons.net/index.php?title%3D22I/_Practical_Perspectives_on_the_collapse_of_zero-sum_civilizations_and_the_emergence_of_computational_sovereigns_and_a_pattern_approach_to_digital_equity_governance:_The_source_of_the_problems_is_the_source_of_the_solutions.%26action%3Dedit%26redlink%3D1).
|
* [Practical Perspectives on the collapse of zero-sum civilizations and the emergence of computational sovereigns and a pattern approach to digital equity governance: The source of the problems is the source of the solutions](https://iiw.idcommons.net/index.php?title=22I/_Practical_Perspectives_on_the_collapse_of_zero-sum_civilizations_and_the_emergence_of_computational_sovereigns_and_a_pattern_approach_to_digital_equity_governance:_The_source_of_the_problems_is_the_source_of_the_solutions.&action=edit&redlink=1).
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@ -279,8 +279,8 @@ Questions started at about [46:30] – though some questions came earlier. We
|
|||||||
|
|
||||||
* [LAYER 1 UTILITIES: AN UNDERGROUND NETWORK CONNECTING ALL SSI ECOSYSTEMS](https://trustoverip.org/blog/2022/03/04/layer-1-utilities-an-underground-network-connecting-all-ssi-ecosystems/) Trust Over IP
|
* [LAYER 1 UTILITIES: AN UNDERGROUND NETWORK CONNECTING ALL SSI ECOSYSTEMS](https://trustoverip.org/blog/2022/03/04/layer-1-utilities-an-underground-network-connecting-all-ssi-ecosystems/) Trust Over IP
|
||||||
|
|
||||||
- Understand: [A general framework for choosing which Layer 1 Utility and did method to utilise](https://docs.google.com/document/d/10NGAtlov49dbaDX96C0F4MdRrr20eHiE4RSZfJu0oXU/edit%23heading%3Dh.3e0mwiwnhg9n)
|
- Understand: [A general framework for choosing which Layer 1 Utility and did method to utilise](https://docs.google.com/document/d/10NGAtlov49dbaDX96C0F4MdRrr20eHiE4RSZfJu0oXU/edit#heading=h.3e0mwiwnhg9n)
|
||||||
- Compare: [A comparison chart of all Layer 1 Utilities and identity overlay networks](https://docs.google.com/spreadsheets/d/18MpvpFPLjL2I7RSFI44heWrrvf3l9pAArzhznAPFVAQ/edit%23gid%3D0)
|
- Compare: [A comparison chart of all Layer 1 Utilities and identity overlay networks](https://docs.google.com/spreadsheets/d/18MpvpFPLjL2I7RSFI44heWrrvf3l9pAArzhznAPFVAQ/edit#gid=0)
|
||||||
- Comply: [A guidance document for data protection and GDPR compliance](https://docs.google.com/document/d/11KkdraiY9oASjU-H91MGxJ7-mNyhnCsfNSG4MFq8Qec/edit)
|
- Comply: [A guidance document for data protection and GDPR compliance](https://docs.google.com/document/d/11KkdraiY9oASjU-H91MGxJ7-mNyhnCsfNSG4MFq8Qec/edit)
|
||||||
- Innovate: DeFi compliance on top of Layer 1 Utilities ([Shyft](https://www.shyft.network/), [Notabene](https://notabene.id/), [Centre](https://www.centre.io/)), payments for Verifiable Credentials ([cheqd](https://www.cheqd.io/), [Kilt](https://www.kilt.io/), [Velocity](https://www.velocitynetwork.foundation/self-sovereign-identity-ssi-and-the-velocity-network/)), overlay networks ([did:ion](https://identity.foundation/ion/), [did:tz](https://did-tezos-draft.spruceid.com/), [did:orb](https://securekey.com/securekeys-new-ledger-agnostic-solution-orb-helps-solve-decentralized-identifier-challenges/)), [KERI](https://keri.one/) and self-certifying identifiers, self-executable governance (to name a few!) are all Layer 1 Utility innovations on the horizon. Let us know what you’d like to see going forward and how we can build guidance and documentation around it!
|
- Innovate: DeFi compliance on top of Layer 1 Utilities ([Shyft](https://www.shyft.network/), [Notabene](https://notabene.id/), [Centre](https://www.centre.io/)), payments for Verifiable Credentials ([cheqd](https://www.cheqd.io/), [Kilt](https://www.kilt.io/), [Velocity](https://www.velocitynetwork.foundation/self-sovereign-identity-ssi-and-the-velocity-network/)), overlay networks ([did:ion](https://identity.foundation/ion/), [did:tz](https://did-tezos-draft.spruceid.com/), [did:orb](https://securekey.com/securekeys-new-ledger-agnostic-solution-orb-helps-solve-decentralized-identifier-challenges/)), [KERI](https://keri.one/) and self-certifying identifiers, self-executable governance (to name a few!) are all Layer 1 Utility innovations on the horizon. Let us know what you’d like to see going forward and how we can build guidance and documentation around it!
|
||||||
|
|
||||||
@ -330,7 +330,7 @@ Because DAOs do not have a sovereign above them, and are often explicitly in the
|
|||||||
- Does placing too much Governance at the Verifiable Data Registry layer cause scaling issues?
|
- Does placing too much Governance at the Verifiable Data Registry layer cause scaling issues?
|
||||||
- Why DNS can become an elegant Root of Trust solution to validate the authenticity of Credential Issuers.
|
- Why DNS can become an elegant Root of Trust solution to validate the authenticity of Credential Issuers.
|
||||||
- Who in the Trust Triangle benefits the most from Trust Registries
|
- Who in the Trust Triangle benefits the most from Trust Registries
|
||||||
* [Solving Governance in SSI Ecosystems with Trust Registries.](https://www.youtube.com/watch?v%3D5zZKIwesSl8) Trust over IP Foundation
|
* [Solving Governance in SSI Ecosystems with Trust Registries.](https://www.youtube.com/watch?v=5zZKIwesSl8) Trust over IP Foundation
|
||||||
|
|
||||||
Learn the what and the why behind trust registries. In addition to discussing how trust registries solve governance in verifiable credential ecosystems, Tomislav demos the very first implementation of ToIP’s trust registry specification.
|
Learn the what and the why behind trust registries. In addition to discussing how trust registries solve governance in verifiable credential ecosystems, Tomislav demos the very first implementation of ToIP’s trust registry specification.
|
||||||
|
|
||||||
@ -340,10 +340,10 @@ Learn the what and the why behind trust registries. In addition to discussing
|
|||||||
> Given the audience of 8-10 people, we polled the reasons for attending a topic on Trust Assurance and discussed a few gnarly challenges in the space:
|
> Given the audience of 8-10 people, we polled the reasons for attending a topic on Trust Assurance and discussed a few gnarly challenges in the space:
|
||||||
>
|
>
|
||||||
> 1. An owner of a background check company conveyed challenges with complying with a myriad of governance authority frameworks audited by a myriad of qualified/unqualified auditors looking at a myriad of evidence to render a judgement
|
> 1. An owner of a background check company conveyed challenges with complying with a myriad of governance authority frameworks audited by a myriad of qualified/unqualified auditors looking at a myriad of evidence to render a judgement
|
||||||
> 2. The addition of privacy controls (notice and consent) to augment existing marketplace controls due to the specific need in SSI networks: [https://kantarainitiative.org/confluence/display/WA/Privacy+as+Expected%3A+UI+Signalling+a+Consent+Gateway+For+Human+Consent](https://kantarainitiative.org/confluence/display/WA/Privacy%2Bas%2BExpected%253A%2BUI%2BSignalling%2Ba%2BConsent%2BGateway%2BFor%2BHuman%2BConsent)
|
> 2. The addition of privacy controls (notice and consent) to augment existing marketplace controls due to the specific need in SSI networks: [https://kantarainitiative.org/confluence/display/WA/Privacy+as+Expected%3A+UI+Signalling+a+Consent+Gateway+For+Human+Consent](https://kantarainitiative.org/confluence/display/WA/Privacy+as+Expected%3A+UI+Signalling+a+Consent+Gateway+For+Human+Consent)
|
||||||
> 3. A discussion of the China Civil Code: [https://www.dlapiper.com/en/uk/insights/publications/2020/06/new-chinese-civil-code-introduces-greater-protection-of-privacy-rights-and-personal-information/](https://www.dlapiper.com/en/uk/insights/publications/2020/06/new-chinese-civil-code-introduces-greater-protection-of-privacy-rights-and-personal-information/)
|
> 3. A discussion of the China Civil Code: [https://www.dlapiper.com/en/uk/insights/publications/2020/06/new-chinese-civil-code-introduces-greater-protection-of-privacy-rights-and-personal-information/](https://www.dlapiper.com/en/uk/insights/publications/2020/06/new-chinese-civil-code-introduces-greater-protection-of-privacy-rights-and-personal-information/)
|
||||||
> 4. A need for a civilian clearance credential.
|
> 4. A need for a civilian clearance credential.
|
||||||
* [Is the verifiable credential trust triangle incomplete?](https://iiw.idcommons.net/3M/_Is_the_verifiable_credential_trust_triangle_incomplete%253F) by Riley Hughes
|
* [Is the verifiable credential trust triangle incomplete?](https://iiw.idcommons.net/3M/_Is_the_verifiable_credential_trust_triangle_incomplete%3F) by Riley Hughes
|
||||||
> VC marketplace project at DIF is talking about a reputation system for issuers, using VCs
|
> VC marketplace project at DIF is talking about a reputation system for issuers, using VCs
|
||||||
>
|
>
|
||||||
> We need to agree on:
|
> We need to agree on:
|
||||||
|
@ -14,47 +14,47 @@ As you know, we had our first Interop plug-fest last year in May 2020, which was
|
|||||||
This presentation on the DHS/SVIP Interop Plug-Fest is epic!
|
This presentation on the DHS/SVIP Interop Plug-Fest is epic!
|
||||||
|
|
||||||
* [DHS/SVIP Interoperability Plug-Fest 2 // VC/DID/Blockchain Multi-Platform & Multi-Vendor Interoperability Showcase](https://lists.w3.org/Archives/Public/public-credentials/2021Mar/0101.html) Anil John
|
* [DHS/SVIP Interoperability Plug-Fest 2 // VC/DID/Blockchain Multi-Platform & Multi-Vendor Interoperability Showcase](https://lists.w3.org/Archives/Public/public-credentials/2021Mar/0101.html) Anil John
|
||||||
> ([slides](https://docs.google.com/presentation/d/1MeeP7vDXb9CpSBfjTybYbo8qJfrrbrXCSJa0DklNe2k/edit%23slide%3Did.p1) Through the presentations and demos, we hope that you are able to gain an appreciation of the engineering depth, openness, inclusiveness and the multi-vendor, multi-platform interoperability that we demonstrated that is needed for these type of solutions to internet scale without locking anyone into a particular vendor or technology stack.
|
> ([slides](https://docs.google.com/presentation/d/1MeeP7vDXb9CpSBfjTybYbo8qJfrrbrXCSJa0DklNe2k/edit#slide=id.p1) Through the presentations and demos, we hope that you are able to gain an appreciation of the engineering depth, openness, inclusiveness and the multi-vendor, multi-platform interoperability that we demonstrated that is needed for these type of solutions to internet scale without locking anyone into a particular vendor or technology stack.
|
||||||
|
|
||||||
* [Interoperability is Not a Choice](https://medium.com/transmute-techtalk/interoperability-is-not-a-choice-387d57c6dc32) Transmute
|
* [Interoperability is Not a Choice](https://medium.com/transmute-techtalk/interoperability-is-not-a-choice-387d57c6dc32) Transmute
|
||||||
> [Interoperability](https://medium.com/transmute-techtalk/the-business-case-for-interoperability-a1a2b884297d) moves from theory to reality when companies have meaningful ability to choose. It is predicated on open standards foundations that enable easy movement of data and vendors.
|
> [Interoperability](https://medium.com/transmute-techtalk/the-business-case-for-interoperability-a1a2b884297d) moves from theory to reality when companies have meaningful ability to choose. It is predicated on open standards foundations that enable easy movement of data and vendors.
|
||||||
>
|
>
|
||||||
> Our team was proud to participate in the [US Department of Homeland Security Silicon Valley Innovation Program](https://www.dhs.gov/science-and-technology/svip) Interoperability Plug-fest this month. DHS SVIP has been leading the charge on interoperability for years now, putting their funding and networks on the table to lead the charge.
|
> Our team was proud to participate in the [US Department of Homeland Security Silicon Valley Innovation Program](https://www.dhs.gov/science-and-technology/svip) Interoperability Plug-fest this month. DHS SVIP has been leading the charge on interoperability for years now, putting their funding and networks on the table to lead the charge.
|
||||||
|
|
||||||
* [Transmute: Interoperability & Selective Disclosure in an Audit Authorization Scenario](https://www.youtube.com/watch?v%3DPodtjhO3vJo)
|
* [Transmute: Interoperability & Selective Disclosure in an Audit Authorization Scenario](https://www.youtube.com/watch?v=PodtjhO3vJo)
|
||||||
|
|
||||||
Proof of COVID Vaccination Credential
|
Proof of COVID Vaccination Credential
|
||||||
|
|
||||||
* [Transmute + DHS SVIP: Showing Interoperability in a Supply Chain Scenario](https://www.youtube.com/watch?v%3DfngwogLRUGk)
|
* [Transmute + DHS SVIP: Showing Interoperability in a Supply Chain Scenario](https://www.youtube.com/watch?v=fngwogLRUGk)
|
||||||
|
|
||||||
* [DHS SVIP PlugFest 2021 – Interop Testing Demo](https://www.youtube.com/watch?v%3DmXLy2Rof_iA) Mattr
|
* [DHS SVIP PlugFest 2021 – Interop Testing Demo](https://www.youtube.com/watch?v=mXLy2Rof_iA) Mattr
|
||||||
> As part of our deliverables for the U.S. Department of Homeland Security's Silicon Valley Innovation Program, we developed capabilities including a MATTR web wallet, CHAPI credential interactions, and direct interoperability with issuance and verification infrastructure built by other vendors. The results of this work are documented in our publicly available open-source test suite: [https://w3c-ccg.github.io/vc-http-api/test-suite/mattr/](https://w3c-ccg.github.io/vc-http-api/test-suite/mattr/)
|
> As part of our deliverables for the U.S. Department of Homeland Security's Silicon Valley Innovation Program, we developed capabilities including a MATTR web wallet, CHAPI credential interactions, and direct interoperability with issuance and verification infrastructure built by other vendors. The results of this work are documented in our publicly available open-source test suite: [https://w3c-ccg.github.io/vc-http-api/test-suite/mattr/](https://w3c-ccg.github.io/vc-http-api/test-suite/mattr/)
|
||||||
|
|
||||||
* [DHS SVIP PlugFest 2021 – USCIS Appointment Demo](https://www.youtube.com/watch?v%3DdgcKYam4MiQ) Mattr
|
* [DHS SVIP PlugFest 2021 – USCIS Appointment Demo](https://www.youtube.com/watch?v=dgcKYam4MiQ) Mattr
|
||||||
> We showcase our Mobile Wallet and OIDC Bridge Platform Extension in action, demonstrating how BBS+ signatures and selective disclosure can allow users to manage which data they are sharing with relying parties in a privacy-preserving way. This work leverages a newly created [Appointment vocabulary for JSON-LD](https://mattrglobal.github.io/appointment-vocab/)
|
> We showcase our Mobile Wallet and OIDC Bridge Platform Extension in action, demonstrating how BBS+ signatures and selective disclosure can allow users to manage which data they are sharing with relying parties in a privacy-preserving way. This work leverages a newly created [Appointment vocabulary for JSON-LD](https://mattrglobal.github.io/appointment-vocab/)
|
||||||
|
|
||||||
* [DHS SVIP PlugFest 2021 – Paper & Digital Vaccination Credentials](https://www.youtube.com/watch?v%3DfEBNGj377Vc) Mattr
|
* [DHS SVIP PlugFest 2021 – Paper & Digital Vaccination Credentials](https://www.youtube.com/watch?v=fEBNGj377Vc) Mattr
|
||||||
> We showcase how both paper and digital credentials can be verified using the same infrastructure, allowing for easier relying-party integration. This work leverages CBOR-LD and a newly created [Vaccination Certificate vocabulary](https://w3c-ccg.github.io/vaccination-vocab/)
|
> We showcase how both paper and digital credentials can be verified using the same infrastructure, allowing for easier relying-party integration. This work leverages CBOR-LD and a newly created [Vaccination Certificate vocabulary](https://w3c-ccg.github.io/vaccination-vocab/)
|
||||||
|
|
||||||
* [Three-Vendor Interop - DHS SVIP Showcase Day](https://www.youtube.com/watch?v%3DdreJIx0_esE) Danube Tech
|
* [Three-Vendor Interop - DHS SVIP Showcase Day](https://www.youtube.com/watch?v=dreJIx0_esE) Danube Tech
|
||||||
|
|
||||||
* [Full Walkthrough DHS SVIP Showcase](https://www.youtube.com/watch?v%3D87B_OyqWzVE) Danube Tech
|
* [Full Walkthrough DHS SVIP Showcase](https://www.youtube.com/watch?v=87B_OyqWzVE) Danube Tech
|
||||||
|
|
||||||
* [Virtual Credentials Journey 2](https://www.youtube.com/watch?v%3DAtCoavCFN1o) Danube Tech
|
* [Virtual Credentials Journey 2](https://www.youtube.com/watch?v=AtCoavCFN1o) Danube Tech
|
||||||
|
|
||||||
* [Virtual Credentials Journey 3](https://www.youtube.com/watch?v%3DXYiqkMqCUnY) Danube Tech
|
* [Virtual Credentials Journey 3](https://www.youtube.com/watch?v=XYiqkMqCUnY) Danube Tech
|
||||||
|
|
||||||
* [Interoperability Fest – Oil & Gas](https://www.youtube.com/watch?v%3DKx49PklrHIY) Mavenet
|
* [Interoperability Fest – Oil & Gas](https://www.youtube.com/watch?v=Kx49PklrHIY) Mavenet
|
||||||
* [Sphereon wins an EU eSSIF-Lab grant](https://sphereon.com/news-and-insights/sphereon-wins-an-eu-essif-lab-grant/)
|
* [Sphereon wins an EU eSSIF-Lab grant](https://sphereon.com/news-and-insights/sphereon-wins-an-eu-essif-lab-grant/)
|
||||||
|
|
||||||
We’re very pleased to announce that our proposal “Presentation Exchange – Credential Query Infra” has been selected as 1 of 7 out of 299 proposals to join the second Infrastructure-oriented program of the EU’s eSSIF-Lab.
|
We’re very pleased to announce that our proposal “Presentation Exchange – Credential Query Infra” has been selected as 1 of 7 out of 299 proposals to join the second Infrastructure-oriented program of the EU’s eSSIF-Lab.
|
||||||
|
|
||||||
We’ll be providing a Presentation Exchange that creates interoperability between W3C DIF-compliant Verifiable Credentials and Hyperledger Aries-based Verifiable Credentials for the European Blockchain Services Infrastructure (EBSI).
|
We’ll be providing a Presentation Exchange that creates interoperability between W3C DIF-compliant Verifiable Credentials and Hyperledger Aries-based Verifiable Credentials for the European Blockchain Services Infrastructure (EBSI).
|
||||||
- [Digital Bazaar Interop 1B](https://www.youtube.com/watch?v%3D-sr-7E7q79E)
|
- [Digital Bazaar Interop 1B](https://www.youtube.com/watch?v=-sr-7E7q79E)
|
||||||
- [Digital Bazaar Interop 1A](https://www.youtube.com/watch?v%3Demu301gvMJE)
|
- [Digital Bazaar Interop 1A](https://www.youtube.com/watch?v=emu301gvMJE)
|
||||||
|
|
||||||
|
|
||||||
* [SSI Interoperability Demo – NB Orbit Mobile Wallet, PwC, Copper Mountain & BC Mines](https://northernblock.io/ssi-interoperability-demo-nb-orbit-mobile-wallet-pwc-copper-mountain-bc-mines/) NorthernBlock ([Video](https://www.youtube.com/watch?v%3DWkPuEuf9K3Y)
|
* [SSI Interoperability Demo – NB Orbit Mobile Wallet, PwC, Copper Mountain & BC Mines](https://northernblock.io/ssi-interoperability-demo-nb-orbit-mobile-wallet-pwc-copper-mountain-bc-mines/) NorthernBlock ([Video](https://www.youtube.com/watch?v=WkPuEuf9K3Y)
|
||||||
|
|
||||||
In collaboration with the BC Mines Trust Ecosystem, we demonstrate interoperability between organizations using the BC Gov Business Partner Agent and the NB Orbit Mobile Wallet for managing sustainable mining practices.
|
In collaboration with the BC Mines Trust Ecosystem, we demonstrate interoperability between organizations using the BC Gov Business Partner Agent and the NB Orbit Mobile Wallet for managing sustainable mining practices.
|
||||||
|
|
||||||
@ -66,7 +66,7 @@ In collaboration with the BC Mines Trust Ecosystem, we demonstrate interoperabil
|
|||||||
* [Transatlantic SSI Interop](https://medium.com/@markus.sabadello/transatlantic-ssi-interop-52bac6be8dfe) Markus Sabadello
|
* [Transatlantic SSI Interop](https://medium.com/@markus.sabadello/transatlantic-ssi-interop-52bac6be8dfe) Markus Sabadello
|
||||||
|
|
||||||
The "Transatlantic SSI Interop" experiment was successfully conducted to demonstrate interoperability between the EU EBSI Diploma use case, and the US SVIP Permanent Resident Card use case. This was jointly planned and executed by EU partner Danube Tech and US partner Digital Bazaar.
|
The "Transatlantic SSI Interop" experiment was successfully conducted to demonstrate interoperability between the EU EBSI Diploma use case, and the US SVIP Permanent Resident Card use case. This was jointly planned and executed by EU partner Danube Tech and US partner Digital Bazaar.
|
||||||
* [Bob Blakely shared his reflections on SAML interop work](https://us02web.zoom.us/rec/play/xnxk16ksNsA9CP4UgR9BqylnH6qT1WZlSpFc9LOweFI7HZNcn8KR3A-0OsUDbPuNM6o0tt1JrSMqGV4Z.dnAMXXLE5-62VAfX?continueMode%3Dtrue%26_x_zm_rtaid%3DQs7tORTgRhmEiSBbcDzQLg.1645215091973.9fac74d22719638c1d1b641c83b0f5c7%26_x_zm_rhtaid%3D448) DIF Interop WG
|
* [Bob Blakely shared his reflections on SAML interop work](https://us02web.zoom.us/rec/play/xnxk16ksNsA9CP4UgR9BqylnH6qT1WZlSpFc9LOweFI7HZNcn8KR3A-0OsUDbPuNM6o0tt1JrSMqGV4Z.dnAMXXLE5-62VAfX?continueMode=true&_x_zm_rtaid=Qs7tORTgRhmEiSBbcDzQLg.1645215091973.9fac74d22719638c1d1b641c83b0f5c7&_x_zm_rhtaid=448) DIF Interop WG
|
||||||
|
|
||||||
* [Trust, Verifiable Credentials, and Interoperability](https://indicio.tech/trust-verifiable-credentials-and-interoperability/) Helen Garneau, Indicio
|
* [Trust, Verifiable Credentials, and Interoperability](https://indicio.tech/trust-verifiable-credentials-and-interoperability/) Helen Garneau, Indicio
|
||||||
|
|
||||||
@ -97,7 +97,7 @@ Many implementers won’t realize the potential of SSI until it’s deployed at
|
|||||||
|
|
||||||
Resources
|
Resources
|
||||||
|
|
||||||
- [Kick-off Meeting Deck](https://docs.google.com/presentation/d/1YoS3est-YnWO1tI7JjJDjSPSnIXJNon_TFosKyneaJg/edit?usp%3Dsharing)
|
- [Kick-off Meeting Deck](https://docs.google.com/presentation/d/1YoS3est-YnWO1tI7JjJDjSPSnIXJNon_TFosKyneaJg/edit?usp=sharing)
|
||||||
- [VC Implementation Guide](https://www.w3.org/TR/vc-imp-guide/)
|
- [VC Implementation Guide](https://www.w3.org/TR/vc-imp-guide/)
|
||||||
- [Plugfest Open Badges v3 context](https://w3c-ccg.github.io/vc-ed/plugfest-1-2022/jff-vc-edu-plugfest-1-context.json)
|
- [Plugfest Open Badges v3 context](https://w3c-ccg.github.io/vc-ed/plugfest-1-2022/jff-vc-edu-plugfest-1-context.json)
|
||||||
- [Open Badges 3.0](https://imsglobal.github.io/openbadges-specification/ob_v3p0.html)
|
- [Open Badges 3.0](https://imsglobal.github.io/openbadges-specification/ob_v3p0.html)
|
||||||
@ -123,15 +123,15 @@ EU-Interop
|
|||||||
|
|
||||||
The European Commission and the European Blockchain Partnership are laying the foundations to implement it in the different EU member states, both in the public and private sectors, launching the European Blockchain Services Infrastructure (EBSI) network, with the aim of 'leveraging blockchain to accelerate the creation of cross-border services for public administrations and their ecosystems
|
The European Commission and the European Blockchain Partnership are laying the foundations to implement it in the different EU member states, both in the public and private sectors, launching the European Blockchain Services Infrastructure (EBSI) network, with the aim of 'leveraging blockchain to accelerate the creation of cross-border services for public administrations and their ecosystems
|
||||||
|
|
||||||
* [EBSI Demo Day May 31, 2022 - The Multi University Pilot and Demos 1 - 2 - 3](https://www.youtube.com/watch?v%3D54WrOZ2IEZE)
|
* [EBSI Demo Day May 31, 2022 - The Multi University Pilot and Demos 1 - 2 - 3](https://www.youtube.com/watch?v=54WrOZ2IEZE)
|
||||||
|
|
||||||
* [00:00](https://www.youtube.com/watch?v%3D54WrOZ2IEZE%26t%3D0s) The Early Adopters programmme and the Multi-University pilot
|
* [00:00](https://www.youtube.com/watch?v=54WrOZ2IEZE&t=0s) The Early Adopters programmme and the Multi-University pilot
|
||||||
|
|
||||||
* [11:01](https://www.youtube.com/watch?v%3D54WrOZ2IEZE%26t%3D661s) Demo 1: A student gets a diploma with a list of course units validated from Erasmus
|
* [11:01](https://www.youtube.com/watch?v=54WrOZ2IEZE&t=661s) Demo 1: A student gets a diploma with a list of course units validated from Erasmus
|
||||||
|
|
||||||
* [42:22](https://www.youtube.com/watch?v%3D54WrOZ2IEZE%26t%3D2542s) Demo 2: A student applies for a PhD with a Bachelor/Master degree from a foreign country
|
* [42:22](https://www.youtube.com/watch?v=54WrOZ2IEZE&t=2542s) Demo 2: A student applies for a PhD with a Bachelor/Master degree from a foreign country
|
||||||
|
|
||||||
* [01:04:16](https://www.youtube.com/watch?v%3D54WrOZ2IEZE%26t%3D3856s) Demo 3: A student gets access to local discounts using municipality credential based on a European student card
|
* [01:04:16](https://www.youtube.com/watch?v=54WrOZ2IEZE&t=3856s) Demo 3: A student gets access to local discounts using municipality credential based on a European student card
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@ -139,7 +139,7 @@ The European Commission and the European Blockchain Partnership are laying the f
|
|||||||
|
|
||||||
The "Data Governance and Semantics" project featured three webinars introducing DDE as a decentralised trust infrastructure acutely aligned with the current movement toward data exchange models in the Economic domain where actors regain transactional sovereignty to share accurate information bilaterally.
|
The "Data Governance and Semantics" project featured three webinars introducing DDE as a decentralised trust infrastructure acutely aligned with the current movement toward data exchange models in the Economic domain where actors regain transactional sovereignty to share accurate information bilaterally.
|
||||||
|
|
||||||
* [SSI Report - Interoperability](https://www.youtube.com/watch?v%3DezInITzb9p4) RootsID
|
* [SSI Report - Interoperability](https://www.youtube.com/watch?v=ezInITzb9p4) RootsID
|
||||||
|
|
||||||
Interoperability is the ultimate challenge of a Decentralized Self-Sovereign Identity. Hyperledger Aries is hosting an Interopathon to showcase all the work their community has done to promote Interoperability. We have also started discussions about a standard import/export format that would further improve interop across identity agents.
|
Interoperability is the ultimate challenge of a Decentralized Self-Sovereign Identity. Hyperledger Aries is hosting an Interopathon to showcase all the work their community has done to promote Interoperability. We have also started discussions about a standard import/export format that would further improve interop across identity agents.
|
||||||
|
|
||||||
|
@ -73,28 +73,28 @@ DIACC is seeking a highly motivated English and French bilingual Project Coordin
|
|||||||
|
|
||||||
* [Daon](https://www.daon.com/job-openings/)
|
* [Daon](https://www.daon.com/job-openings/)
|
||||||
|
|
||||||
- [Customer Support Services Engineer](https://daoninc.bamboohr.com/jobs/view.php?id%3D206)
|
- [Customer Support Services Engineer](https://daoninc.bamboohr.com/jobs/view.php?id=206)
|
||||||
- [Remote - Database Engineer/Administrator](https://daoninc.bamboohr.com/jobs/view.php?id%3D204)
|
- [Remote - Database Engineer/Administrator](https://daoninc.bamboohr.com/jobs/view.php?id=204)
|
||||||
- [Frontend Developer](https://daoninc.bamboohr.com/jobs/view.php?id%3D201)
|
- [Frontend Developer](https://daoninc.bamboohr.com/jobs/view.php?id=201)
|
||||||
- [Product Marketing Manager](https://daoninc.bamboohr.com/jobs/view.php?id%3D200)
|
- [Product Marketing Manager](https://daoninc.bamboohr.com/jobs/view.php?id=200)
|
||||||
- [Application Support Engineer](https://daoninc.bamboohr.com/jobs/view.php?id%3D196)
|
- [Application Support Engineer](https://daoninc.bamboohr.com/jobs/view.php?id=196)
|
||||||
- [C/C++ Developer](https://daoninc.bamboohr.com/jobs/view.php?id%3D195)
|
- [C/C++ Developer](https://daoninc.bamboohr.com/jobs/view.php?id=195)
|
||||||
- [IOS Engineer](https://daoninc.bamboohr.com/jobs/view.php?id%3D194)
|
- [IOS Engineer](https://daoninc.bamboohr.com/jobs/view.php?id=194)
|
||||||
- [Android Engineer](https://daoninc.bamboohr.com/jobs/view.php?id%3D193)
|
- [Android Engineer](https://daoninc.bamboohr.com/jobs/view.php?id=193)
|
||||||
- [Developer](https://daoninc.bamboohr.com/jobs/view.php?id%3D192)
|
- [Developer](https://daoninc.bamboohr.com/jobs/view.php?id=192)
|
||||||
- [Senior DevOps Engineer](https://daoninc.bamboohr.com/jobs/view.php?id%3D188)
|
- [Senior DevOps Engineer](https://daoninc.bamboohr.com/jobs/view.php?id=188)
|
||||||
- [Sales Development Representative](https://daoninc.bamboohr.com/jobs/view.php?id%3D183)
|
- [Sales Development Representative](https://daoninc.bamboohr.com/jobs/view.php?id=183)
|
||||||
- [Customer Support Services Engineer](https://daoninc.bamboohr.com/jobs/view.php?id%3D179)
|
- [Customer Support Services Engineer](https://daoninc.bamboohr.com/jobs/view.php?id=179)
|
||||||
- [Senior Technical Consultant](https://daoninc.bamboohr.com/jobs/view.php?id%3D173)
|
- [Senior Technical Consultant](https://daoninc.bamboohr.com/jobs/view.php?id=173)
|
||||||
- [Pre–Sales Solution Consultant](https://daoninc.bamboohr.com/jobs/view.php?id%3D172)
|
- [Pre–Sales Solution Consultant](https://daoninc.bamboohr.com/jobs/view.php?id=172)
|
||||||
- [Customer Support Services Engineer](https://daoninc.bamboohr.com/jobs/view.php?id%3D170)
|
- [Customer Support Services Engineer](https://daoninc.bamboohr.com/jobs/view.php?id=170)
|
||||||
- [Database Engineer/Administrator](https://daoninc.bamboohr.com/jobs/view.php?id%3D158)
|
- [Database Engineer/Administrator](https://daoninc.bamboohr.com/jobs/view.php?id=158)
|
||||||
- [Automation Test Engineer](https://daoninc.bamboohr.com/jobs/view.php?id%3D151)
|
- [Automation Test Engineer](https://daoninc.bamboohr.com/jobs/view.php?id=151)
|
||||||
- [DevOps Engineer](https://daoninc.bamboohr.com/jobs/view.php?id%3D144)
|
- [DevOps Engineer](https://daoninc.bamboohr.com/jobs/view.php?id=144)
|
||||||
- [Senior Java Engineer- VeriFLY](https://daoninc.bamboohr.com/jobs/view.php?id%3D140)
|
- [Senior Java Engineer- VeriFLY](https://daoninc.bamboohr.com/jobs/view.php?id=140)
|
||||||
- [Data Collection Associate](https://daoninc.bamboohr.com/jobs/view.php?id%3D133)
|
- [Data Collection Associate](https://daoninc.bamboohr.com/jobs/view.php?id=133)
|
||||||
- [Java Engineer](https://daoninc.bamboohr.com/jobs/view.php?id%3D21)
|
- [Java Engineer](https://daoninc.bamboohr.com/jobs/view.php?id=21)
|
||||||
- [Senior Java Engineer](https://daoninc.bamboohr.com/jobs/view.php?id%3D19)
|
- [Senior Java Engineer](https://daoninc.bamboohr.com/jobs/view.php?id=19)
|
||||||
|
|
||||||
* [Deloitte](https://apply.deloitte.com/careers/SearchJobs/identity)
|
* [Deloitte](https://apply.deloitte.com/careers/SearchJobs/identity)
|
||||||
|
|
||||||
@ -103,22 +103,22 @@ DIACC is seeking a highly motivated English and French bilingual Project Coordin
|
|||||||
- [Principal Identity Engineer](https://boards.greenhouse.io/forgerock/jobs/6131407002)
|
- [Principal Identity Engineer](https://boards.greenhouse.io/forgerock/jobs/6131407002)
|
||||||
- [Senior Sales Specialist, Autonomous Identity](https://boards.greenhouse.io/forgerock/jobs/5756065002)
|
- [Senior Sales Specialist, Autonomous Identity](https://boards.greenhouse.io/forgerock/jobs/5756065002)
|
||||||
|
|
||||||
* [IDEMIA](https://uscareers-idemia.icims.com/jobs/search?ss%3D1%26searchKeyword%3Didentity%26searchCategory%3D8730)
|
* [IDEMIA](https://uscareers-idemia.icims.com/jobs/search?ss=1&searchKeyword=identity&searchCategory=8730)
|
||||||
|
|
||||||
- [Cloud Engineer II](https://uscareers-idemia.icims.com/jobs/4912/cloud-engineer-ii/job?in_iframe%3D1) - Participate cloud adoption efforts that span multiple disciplines
|
- [Cloud Engineer II](https://uscareers-idemia.icims.com/jobs/4912/cloud-engineer-ii/job?in_iframe=1) - Participate cloud adoption efforts that span multiple disciplines
|
||||||
- [Help Desk Technician II](https://uscareers-idemia.icims.com/jobs/4897/help-desk-technician-ii/job?in_iframe%3D1) - Record, troubleshoot, escalate and follow-up with end-users regarding IT support matters
|
- [Help Desk Technician II](https://uscareers-idemia.icims.com/jobs/4897/help-desk-technician-ii/job?in_iframe=1) - Record, troubleshoot, escalate and follow-up with end-users regarding IT support matters
|
||||||
- [Senior Cloud Security Engineer](https://uscareers-idemia.icims.com/jobs/4890/senior-cloud-security-engineer/job?in_iframe%3D1) - Implementing the systems aiding in real-time monitoring and analysis of security events from multiple sources including, but not limited to: Antivirus, EDR, SIEM, HIDS, IDS, WAF, firewall logs, system logs (Windows & Linux), applications, databases etc
|
- [Senior Cloud Security Engineer](https://uscareers-idemia.icims.com/jobs/4890/senior-cloud-security-engineer/job?in_iframe=1) - Implementing the systems aiding in real-time monitoring and analysis of security events from multiple sources including, but not limited to: Antivirus, EDR, SIEM, HIDS, IDS, WAF, firewall logs, system logs (Windows & Linux), applications, databases etc
|
||||||
- [Senior Software Engineer](https://uscareers-idemia.icims.com/jobs/4860/senior-software-engineer/job?in_iframe%3D1) - Work on a team of developers and QA engineers - Provide analysis, design, software changes/enhancements and bug fixes as needed
|
- [Senior Software Engineer](https://uscareers-idemia.icims.com/jobs/4860/senior-software-engineer/job?in_iframe=1) - Work on a team of developers and QA engineers - Provide analysis, design, software changes/enhancements and bug fixes as needed
|
||||||
- [HSM Key Administrator Level 1](https://uscareers-idemia.icims.com/jobs/4853/hsm-key-administrator-level-1/job?in_iframe%3D1) - Configure, maintain and ensure that all HSM (Hardware Security Module) servers are operational and will meet the capacity demand
|
- [HSM Key Administrator Level 1](https://uscareers-idemia.icims.com/jobs/4853/hsm-key-administrator-level-1/job?in_iframe=1) - Configure, maintain and ensure that all HSM (Hardware Security Module) servers are operational and will meet the capacity demand
|
||||||
- [Software Engineer III](https://uscareers-idemia.icims.com/jobs/4844/software-engineer-iii/job?in_iframe%3D1) - Analyze and document user requirements - Design, test and develop software solutions to meet requirements
|
- [Software Engineer III](https://uscareers-idemia.icims.com/jobs/4844/software-engineer-iii/job?in_iframe=1) - Analyze and document user requirements - Design, test and develop software solutions to meet requirements
|
||||||
- [Programmer I](https://uscareers-idemia.icims.com/jobs/4573/programmer-i/job?in_iframe%3D1) - Demonstrates expert knowledge of the company’s technical capabilities and processes appropriate to customer’s needs
|
- [Programmer I](https://uscareers-idemia.icims.com/jobs/4573/programmer-i/job?in_iframe=1) - Demonstrates expert knowledge of the company’s technical capabilities and processes appropriate to customer’s needs
|
||||||
- [Digitalization Project Engineer I - VIE](https://uscareers-idemia.icims.com/jobs/4529/digitalization-project-engineer-i---vie/job?in_iframe%3D1) - Gather technical and functional requirements for the Go-Live through workshops with the supplier (MPDV). - Analyze MES data needs for the plant to align development, implementation and configuration of the application
|
- [Digitalization Project Engineer I - VIE](https://uscareers-idemia.icims.com/jobs/4529/digitalization-project-engineer-i---vie/job?in_iframe=1) - Gather technical and functional requirements for the Go-Live through workshops with the supplier (MPDV). - Analyze MES data needs for the plant to align development, implementation and configuration of the application
|
||||||
- [Technical Project Leader](https://uscareers-idemia.icims.com/jobs/4437/technical-project-leader/job?in_iframe%3D1) - Drive the delivery and adoption of Mobile ID by citizens in every state and province
|
- [Technical Project Leader](https://uscareers-idemia.icims.com/jobs/4437/technical-project-leader/job?in_iframe=1) - Drive the delivery and adoption of Mobile ID by citizens in every state and province
|
||||||
- [Technical Consultant II](https://uscareers-idemia.icims.com/jobs/4372/technical-consultant-ii/job?in_iframe%3D1) - Provide technical support related to banking project such as card personalization, card development cycle, and key management.
|
- [Technical Consultant II](https://uscareers-idemia.icims.com/jobs/4372/technical-consultant-ii/job?in_iframe=1) - Provide technical support related to banking project such as card personalization, card development cycle, and key management.
|
||||||
- [Manager Project / Program](https://uscareers-idemia.icims.com/jobs/4346/manager-project---program/job?in_iframe%3D1) - As part of the US ERP implementation team you will be leading the manufacturing part of the project, ensuring the Business needs are fulfilled in line with the Core Model already defined and the adopt (and not adapt) project philosophy
|
- [Manager Project / Program](https://uscareers-idemia.icims.com/jobs/4346/manager-project---program/job?in_iframe=1) - As part of the US ERP implementation team you will be leading the manufacturing part of the project, ensuring the Business needs are fulfilled in line with the Core Model already defined and the adopt (and not adapt) project philosophy
|
||||||
- [Network Engineer (Open to Reston OR Billerica OR Brentwood)](https://uscareers-idemia.icims.com/jobs/4340/network-engineer-%2528open-to-reston-or-billerica-or-brentwood%2529/job?in_iframe%3D1) - Configure, install and troubleshoot network technologies, such as routers, switches, and firewalls, including: configuring and troubleshooting routing (BGP), MPLS and QOS
|
- [Network Engineer (Open to Reston OR Billerica OR Brentwood)](https://uscareers-idemia.icims.com/jobs/4340/network-engineer-%28open-to-reston-or-billerica-or-brentwood%29/job?in_iframe=1) - Configure, install and troubleshoot network technologies, such as routers, switches, and firewalls, including: configuring and troubleshooting routing (BGP), MPLS and QOS
|
||||||
- [Technical Consultant I (Smart Card)](https://uscareers-idemia.icims.com/jobs/4183/technical-consultant-i-%2528smart-card%2529/job?in_iframe%3D1) - Provide technical support related to banking project such as card personalization, card development cycle, and key management.
|
- [Technical Consultant I (Smart Card)](https://uscareers-idemia.icims.com/jobs/4183/technical-consultant-i-%28smart-card%29/job?in_iframe=1) - Provide technical support related to banking project such as card personalization, card development cycle, and key management.
|
||||||
- [Network Administrator](https://uscareers-idemia.icims.com/jobs/3997/network-administrator/job?in_iframe%3D1) - Work on-site as part of Local IT team to support production.
|
- [Network Administrator](https://uscareers-idemia.icims.com/jobs/3997/network-administrator/job?in_iframe=1) - Work on-site as part of Local IT team to support production.
|
||||||
|
|
||||||
### iProov
|
### iProov
|
||||||
|
|
||||||
@ -126,16 +126,16 @@ DIACC is seeking a highly motivated English and French bilingual Project Coordin
|
|||||||
- [Head of Product Innovation](https://jobs.gohire.io/iproov-fzoa1liw/head-of-product-innovation-86015/)
|
- [Head of Product Innovation](https://jobs.gohire.io/iproov-fzoa1liw/head-of-product-innovation-86015/)
|
||||||
- [VP of Artificial Intelligence](https://jobs.gohire.io/iproov-fzoa1liw/vp-of-ai-artificial-intelligence-52039)
|
- [VP of Artificial Intelligence](https://jobs.gohire.io/iproov-fzoa1liw/vp-of-ai-artificial-intelligence-52039)
|
||||||
|
|
||||||
* [Microsoft](https://careers.microsoft.com/us/en/search-results?keywords%3Didentity) (10913 jobs in Identity)
|
* [Microsoft](https://careers.microsoft.com/us/en/search-results?keywords=identity) (10913 jobs in Identity)
|
||||||
|
|
||||||
- [Senior Program Manager](https://careers.microsoft.com/us/en/login?qpage%3D%252Fus%252Fen%252Fjob%252F1180440%252F)
|
- [Senior Program Manager](https://careers.microsoft.com/us/en/login?qpage=/us/en/job/1180440/)
|
||||||
- [Senior Program Manager](https://careers.microsoft.com/us/en/login?qpage%3D%252Fus%252Fen%252Fjob%252F1180437)
|
- [Senior Program Manager](https://careers.microsoft.com/us/en/login?qpage=/us/en/job/1180437)
|
||||||
- [Program Manager 2](https://careers.microsoft.com/us/en/login?qpage%3D%252Fus%252Fen%252Fjob%252F1160056%252FProgram-Manager-2)
|
- [Program Manager 2](https://careers.microsoft.com/us/en/login?qpage=/us/en/job/1160056/Program-Manager-2)
|
||||||
- SDE for OAuth SDK, Javascript - janutter@microsoft
|
- SDE for OAuth SDK, Javascript - janutter@microsoft
|
||||||
- Decentralized ID Standards - Dublin
|
- Decentralized ID Standards - Dublin
|
||||||
- Identity Standards Architect - Dublin
|
- Identity Standards Architect - Dublin
|
||||||
|
|
||||||
* [Mastercard](https://mastercard.wd1.myworkdayjobs.com/CorporateCareers?q%3Didentity) (lots more inside)
|
* [Mastercard](https://mastercard.wd1.myworkdayjobs.com/CorporateCareers?q=identity) (lots more inside)
|
||||||
|
|
||||||
- [Manager, Product Experience Design](https://mastercard.wd1.myworkdayjobs.com/en-US/CorporateCareers/job/Dublin-Ireland/Manager--Product-Experience-Design_R-161479) Dublin, Ireland
|
- [Manager, Product Experience Design](https://mastercard.wd1.myworkdayjobs.com/en-US/CorporateCareers/job/Dublin-Ireland/Manager--Product-Experience-Design_R-161479) Dublin, Ireland
|
||||||
- [Manager, Identity Solutions Strategy](https://mastercard.wd1.myworkdayjobs.com/en-US/CorporateCareers/job/Vancouver-Canada/Manager--Identity-Solutions-IoT-Strategy_R-133754) Vancouver, Canada
|
- [Manager, Identity Solutions Strategy](https://mastercard.wd1.myworkdayjobs.com/en-US/CorporateCareers/job/Vancouver-Canada/Manager--Identity-Solutions-IoT-Strategy_R-133754) Vancouver, Canada
|
||||||
@ -145,10 +145,10 @@ DIACC is seeking a highly motivated English and French bilingual Project Coordin
|
|||||||
|
|
||||||
* [Ping Identity](https://www.pingidentity.com/de/company/careers/careers-listings.html) (lots more inside)
|
* [Ping Identity](https://www.pingidentity.com/de/company/careers/careers-listings.html) (lots more inside)
|
||||||
|
|
||||||
- [Strategic Account Executive](https://cmzd204.na1.hubspotlinksstarter.com/Ctc/W1%2B113/cMzd204/VVw-Pb7W3L0MW4VDsrX96v12SW3S9mTt4JsxJPN22w0-S5knJ3V3Zsc37CgZDLW9hMFYp89RvL_W4LrGGj4TjN26W1yQWZn8mQ463W55vn6S6b5zrMW6hd0yc76qj94W5bZ4Xn4GjZcWN1ScDbtHZ0ddN25cCXKtnHnXW55w80s5nG-jWW9fbQpb7YfF3wW5bDK782gl0B9VzXqpZ3yWM5QW3mqcF034pWDzVGn9xK4PT--XN9k1p0grxvPGW1MWQxx2rQBnRW4XFhqK61MKPPW5_J5HN4vb8tnW2DyKnp2h-C7rW5Rl06q4bTNyKN8yCD_wXTcFmW7HrDJW6-3syxW5LvlDx3KcCVmW3RzyvQ9lqmjYW1WnXmJ1lsbQZW3sDCVr49512sW7vHwpZ7DDfbhW5ncS0w8H8hRpW5KqQqH9k6lB4W789WKk45f01GW9jX44v4BH3k0Vk2VT-1n28lq3j_q1)
|
- [Strategic Account Executive](https://cmzd204.na1.hubspotlinksstarter.com/Ctc/W1+113/cMzd204/VVw-Pb7W3L0MW4VDsrX96v12SW3S9mTt4JsxJPN22w0-S5knJ3V3Zsc37CgZDLW9hMFYp89RvL_W4LrGGj4TjN26W1yQWZn8mQ463W55vn6S6b5zrMW6hd0yc76qj94W5bZ4Xn4GjZcWN1ScDbtHZ0ddN25cCXKtnHnXW55w80s5nG-jWW9fbQpb7YfF3wW5bDK782gl0B9VzXqpZ3yWM5QW3mqcF034pWDzVGn9xK4PT--XN9k1p0grxvPGW1MWQxx2rQBnRW4XFhqK61MKPPW5_J5HN4vb8tnW2DyKnp2h-C7rW5Rl06q4bTNyKN8yCD_wXTcFmW7HrDJW6-3syxW5LvlDx3KcCVmW3RzyvQ9lqmjYW1WnXmJ1lsbQZW3sDCVr49512sW7vHwpZ7DDfbhW5ncS0w8H8hRpW5KqQqH9k6lB4W789WKk45f01GW9jX44v4BH3k0Vk2VT-1n28lq3j_q1)
|
||||||
- [FP&A Team Lead](https://cmzd204.na1.hubspotlinksstarter.com/Ctc/W1%2B113/cMzd204/VVw-Pb7W3L0MW4VDsrX96v12SW3S9mTt4JsxJPN22w0-S5knJ3V3Zsc37CgZq5N9lC2RzhD7qkW74VZ2v3MKKKVW7qlPyD4wHHvtW78FzXQ7h3DS9W1mTJbp1YMJMCW5Kb96j7pQ8Z_W7RBPZj88JqV1W24Lg-S6z-qXwW7sFsHZ5xJx6QW7qTF_c9dfNxlW90HXS84R4Jj3VlmQXh3BY8FXW9jpbpc6mrvsvW6QbD586smPFlW53PsMD4CMXLZW7ckfLH68TsbfN2thwqjf0YFHW38JXb88yGKCtW7wTJw479_4FmW289N6r3Cc1jQW3_JWDq1KF9XHW3-T-f85zPvp7W7_jNmx3kCKV2W6cV79X7gWC4MW484xKf2G6sG6VdZnTY2Vj7MGW1f7X5w6Pdl-RW8XlSyt3rTb6PW8D813F7gcVf1VZ2Ndh7XW2nVW8hJsxD7x9MQCW4h7NS8392fCc3fjy1)
|
- [FP&A Team Lead](https://cmzd204.na1.hubspotlinksstarter.com/Ctc/W1+113/cMzd204/VVw-Pb7W3L0MW4VDsrX96v12SW3S9mTt4JsxJPN22w0-S5knJ3V3Zsc37CgZq5N9lC2RzhD7qkW74VZ2v3MKKKVW7qlPyD4wHHvtW78FzXQ7h3DS9W1mTJbp1YMJMCW5Kb96j7pQ8Z_W7RBPZj88JqV1W24Lg-S6z-qXwW7sFsHZ5xJx6QW7qTF_c9dfNxlW90HXS84R4Jj3VlmQXh3BY8FXW9jpbpc6mrvsvW6QbD586smPFlW53PsMD4CMXLZW7ckfLH68TsbfN2thwqjf0YFHW38JXb88yGKCtW7wTJw479_4FmW289N6r3Cc1jQW3_JWDq1KF9XHW3-T-f85zPvp7W7_jNmx3kCKV2W6cV79X7gWC4MW484xKf2G6sG6VdZnTY2Vj7MGW1f7X5w6Pdl-RW8XlSyt3rTb6PW8D813F7gcVf1VZ2Ndh7XW2nVW8hJsxD7x9MQCW4h7NS8392fCc3fjy1)
|
||||||
- [Cloud Operations Engineer](https://cmzd204.na1.hubspotlinksstarter.com/Ctc/W1%2B113/cMzd204/VVw-Pb7W3L0MW4VDsrX96v12SW3S9mTt4JsxJPN22w0-S5knJ3V3Zsc37CgGs-W4MPRp45kg85XN1SQvD53W-mwW638nLP93FNlCW305zFc2BGDLpW6qvN8j94rghtW4Hgl7S1q_2vZW6GJMDm1WKy9xW3Zbm3k2lrnJQW35tY7b7YlFV0W8yvM-x80Km9fW4FBStl7nB9t4F7JR_b3KYy7W4Bsbkt45hH1qW5-3rlh3-8Pv6V58jK-4TCxknW44TDmp4gQ7s7W2GKTCt1jPKH7W8MkTKw4pg7RpW5GJQRf16HrklW7nfH1m4ndY76W5PpFK13njGz2W2btBjC7KVZX_W6jCSsX3X6mT3W8sBWN-5sNqC3VGCKV04BKtq_W74vbFQ5r1ZKhW8Cccc21G0HzlN2LYQmJK79dcN1_Z9S5LdxplN5BqC0vDJhXxW57sxhm7mS5dTW64DyzP5BbB1v3g431)
|
- [Cloud Operations Engineer](https://cmzd204.na1.hubspotlinksstarter.com/Ctc/W1+113/cMzd204/VVw-Pb7W3L0MW4VDsrX96v12SW3S9mTt4JsxJPN22w0-S5knJ3V3Zsc37CgGs-W4MPRp45kg85XN1SQvD53W-mwW638nLP93FNlCW305zFc2BGDLpW6qvN8j94rghtW4Hgl7S1q_2vZW6GJMDm1WKy9xW3Zbm3k2lrnJQW35tY7b7YlFV0W8yvM-x80Km9fW4FBStl7nB9t4F7JR_b3KYy7W4Bsbkt45hH1qW5-3rlh3-8Pv6V58jK-4TCxknW44TDmp4gQ7s7W2GKTCt1jPKH7W8MkTKw4pg7RpW5GJQRf16HrklW7nfH1m4ndY76W5PpFK13njGz2W2btBjC7KVZX_W6jCSsX3X6mT3W8sBWN-5sNqC3VGCKV04BKtq_W74vbFQ5r1ZKhW8Cccc21G0HzlN2LYQmJK79dcN1_Z9S5LdxplN5BqC0vDJhXxW57sxhm7mS5dTW64DyzP5BbB1v3g431)
|
||||||
- [Site Reliability Engineer](https://cmzd204.na1.hubspotlinksstarter.com/Ctc/W1%2B113/cMzd204/VVw-Pb7W3L0MW4VDsrX96v12SW3S9mTt4JsxJPN22w0-S5knJ3V3Zsc37CgQMnW8QTZCB2lXgSGW1cvKgC2WDsC3W8Vy9DH8BZlS8W44Jpgs5prYBsW4dsvCr5mH82ZN3cd5wjY61xTN6Dvt-VLFZtkW7wcTrs2zpkdMW120nyx1dM4KtVKkZTh3DbGP1W9822TT28PDrTW2w-PTc3kXQN7W3K20Nd8xgvKwW22z7d46Kfd66W3h399t38KFMdN592Td8sk2dSW4Rr9SK7813DqW4_5hc29kldbkW22kQ0b1FxS21W2vc3Jq5xFCwDW4XNpFT1rYXwsN7XKRrZdvLLsW3M58TT2X-qKXW8zjcK05SnH2gW4RxcSJ3KZ50gW8SckVT7nfNn9W5v4CVh7Sj-9TW9kscWx4pZBXmW3GHksf7HyC8YW48xNQw8GN56XW4HBMny5RnRhlW99PvWz3CSCwq3bp71)
|
- [Site Reliability Engineer](https://cmzd204.na1.hubspotlinksstarter.com/Ctc/W1+113/cMzd204/VVw-Pb7W3L0MW4VDsrX96v12SW3S9mTt4JsxJPN22w0-S5knJ3V3Zsc37CgQMnW8QTZCB2lXgSGW1cvKgC2WDsC3W8Vy9DH8BZlS8W44Jpgs5prYBsW4dsvCr5mH82ZN3cd5wjY61xTN6Dvt-VLFZtkW7wcTrs2zpkdMW120nyx1dM4KtVKkZTh3DbGP1W9822TT28PDrTW2w-PTc3kXQN7W3K20Nd8xgvKwW22z7d46Kfd66W3h399t38KFMdN592Td8sk2dSW4Rr9SK7813DqW4_5hc29kldbkW22kQ0b1FxS21W2vc3Jq5xFCwDW4XNpFT1rYXwsN7XKRrZdvLLsW3M58TT2X-qKXW8zjcK05SnH2gW4RxcSJ3KZ50gW8SckVT7nfNn9W5v4CVh7Sj-9TW9kscWx4pZBXmW3GHksf7HyC8YW48xNQw8GN56XW4HBMny5RnRhlW99PvWz3CSCwq3bp71)
|
||||||
|
|
||||||
* [Royal Bank of Canada](https://jobs.rbc.com/ca/en/) (lots more inside)
|
* [Royal Bank of Canada](https://jobs.rbc.com/ca/en/) (lots more inside)
|
||||||
|
|
||||||
@ -169,10 +169,10 @@ DIACC is seeking a highly motivated English and French bilingual Project Coordin
|
|||||||
- [Senior Manager, EIAM Strategy](https://jobs.rbc.com/ca/en/job/R-0000002751/Senior-Manager-EIAM-Strategy)
|
- [Senior Manager, EIAM Strategy](https://jobs.rbc.com/ca/en/job/R-0000002751/Senior-Manager-EIAM-Strategy)
|
||||||
- [Senior IAM Solution Architect](https://jobs.rbc.com/ca/en/job/R-0000002113/Senior-Solution-Architect-IAM-GCS)
|
- [Senior IAM Solution Architect](https://jobs.rbc.com/ca/en/job/R-0000002113/Senior-Solution-Architect-IAM-GCS)
|
||||||
|
|
||||||
* [Simeio](https://hdip.fa.ap4.oraclecloud.com/hcmUI/CandidateExperience/en/sites/CX_1/requisitions?keyword%3Didentity)
|
* [Simeio](https://hdip.fa.ap4.oraclecloud.com/hcmUI/CandidateExperience/en/sites/CX_1/requisitions?keyword=identity)
|
||||||
|
|
||||||
- [VP of Identity and Access Management Delivery](https://hdip.fa.ap4.oraclecloud.com/hcmUI/CandidateExperience/en/sites/CX_1/requisitions/preview/23/?keyword%3Didentity)
|
- [VP of Identity and Access Management Delivery](https://hdip.fa.ap4.oraclecloud.com/hcmUI/CandidateExperience/en/sites/CX_1/requisitions/preview/23/?keyword=identity)
|
||||||
- [Sr. IAM Systems Engineer](https://hdip.fa.ap4.oraclecloud.com/hcmUI/CandidateExperience/en/sites/CX_1/requisitions/preview/33/?keyword%3Didentity)
|
- [Sr. IAM Systems Engineer](https://hdip.fa.ap4.oraclecloud.com/hcmUI/CandidateExperience/en/sites/CX_1/requisitions/preview/33/?keyword=identity)
|
||||||
|
|
||||||
* [Sphere](https://www.sphereco.com/company-overview/careers)
|
* [Sphere](https://www.sphereco.com/company-overview/careers)
|
||||||
|
|
||||||
@ -188,31 +188,31 @@ DIACC is seeking a highly motivated English and French bilingual Project Coordin
|
|||||||
|
|
||||||
* [Trulioo](https://www.trulioo.com/company/careers)
|
* [Trulioo](https://www.trulioo.com/company/careers)
|
||||||
|
|
||||||
- [Data Engineer](https://www.trulioo.com/apply?gh_jid%3D4337667004)
|
- [Data Engineer](https://www.trulioo.com/apply?gh_jid=4337667004)
|
||||||
- [Front End Engineer](https://www.trulioo.com/apply?gh_jid%3D4442248004)
|
- [Front End Engineer](https://www.trulioo.com/apply?gh_jid=4442248004)
|
||||||
- [Front End Engineer](https://www.trulioo.com/apply?gh_jid%3D4442195004)
|
- [Front End Engineer](https://www.trulioo.com/apply?gh_jid=4442195004)
|
||||||
- [Manager, Data Analytics](https://www.trulioo.com/apply?gh_jid%3D4457646004)
|
- [Manager, Data Analytics](https://www.trulioo.com/apply?gh_jid=4457646004)
|
||||||
- [Senior Software Engineer](https://www.trulioo.com/apply?gh_jid%3D4332833004)
|
- [Senior Software Engineer](https://www.trulioo.com/apply?gh_jid=4332833004)
|
||||||
- [Senior Software Engineer- Remote](https://www.trulioo.com/apply?gh_jid%3D4327675004)
|
- [Senior Software Engineer- Remote](https://www.trulioo.com/apply?gh_jid=4327675004)
|
||||||
- [Senior Software Engineer- Remote](https://www.trulioo.com/apply?gh_jid%3D4358360004)
|
- [Senior Software Engineer- Remote](https://www.trulioo.com/apply?gh_jid=4358360004)
|
||||||
- [Software Engineer](https://www.trulioo.com/apply?gh_jid%3D4489240004)
|
- [Software Engineer](https://www.trulioo.com/apply?gh_jid=4489240004)
|
||||||
|
|
||||||
* [Ubisecure](https://www.ubisecure.com/about/careers/)
|
* [Ubisecure](https://www.ubisecure.com/about/careers/)
|
||||||
|
|
||||||
- [Lead Architect](https://cmzd204.na1.hubspotlinksstarter.com/Ctc/W1%2B113/cMzd204/VVw-Pb7W3L0MW4VDsrX96v12SW3S9mTt4JsxJPN22w1013lSc3V1-WJV7CgLcxW5Kbjr94xJZn7VMzmtY6rGV8JW7MQQT24qSWXRW7W3_CX5RsMQxW4dwBzF5r_L-kW7Cdn3y1mCz_QW5NHQ_X7cJNj9W7bcC4Q7FFQ6jW7CqR_39bynyFW6smRdT2TmVtvM3qFb43dgQzW31J0_V1tb1RfW5yck2F6bzcNHW5XlH3y1fMvBJW8NXQMW2w7ZXNN5s5YDrFvYzbW67VjRK57-_BWVHRtjK7ZswrDW7WX4JB3Cyb87W6RDl-K66lyGzW7n_P2W4Y90LTVHqPW67nC3fCW7dRJrB18t_ctW2_v74v2K8Rb43cdj1)
|
- [Lead Architect](https://cmzd204.na1.hubspotlinksstarter.com/Ctc/W1+113/cMzd204/VVw-Pb7W3L0MW4VDsrX96v12SW3S9mTt4JsxJPN22w1013lSc3V1-WJV7CgLcxW5Kbjr94xJZn7VMzmtY6rGV8JW7MQQT24qSWXRW7W3_CX5RsMQxW4dwBzF5r_L-kW7Cdn3y1mCz_QW5NHQ_X7cJNj9W7bcC4Q7FFQ6jW7CqR_39bynyFW6smRdT2TmVtvM3qFb43dgQzW31J0_V1tb1RfW5yck2F6bzcNHW5XlH3y1fMvBJW8NXQMW2w7ZXNN5s5YDrFvYzbW67VjRK57-_BWVHRtjK7ZswrDW7WX4JB3Cyb87W6RDl-K66lyGzW7n_P2W4Y90LTVHqPW67nC3fCW7dRJrB18t_ctW2_v74v2K8Rb43cdj1)
|
||||||
- [Partner Marketing Manager](https://cmzd204.na1.hubspotlinksstarter.com/Ctc/W1%2B113/cMzd204/VVw-Pb7W3L0MW4VDsrX96v12SW3S9mTt4JsxJPN22w10k3lScmV1-WJV7CgGwkVNx4HH8v7G3cW8Nnk7n6vBs1MW23wQMs5DL57DW9j6NDY8NF37HW8wpH3Z7BJmdNW3Y2j5q8pKYMqW4Hk_Vz6gqsrZW9hyHPp4jCNC7W4McHgh3KSkV-W3N2m5g3NNZhQW1ht7sM6Rxvm9W6cLFDC7QH0gSW58vqBD9dsPT3W310YrH1v1F4HW8BWJQR8ZKbqTW5q1NyD2WVZkCW66Zxq82Sl29vW9cgM4F2nbkqrW4Qz3bM1Lljs2W1Rts_F2dGY61W7-RqXm3Bt_hQW8WZ6_j3sf0HCW4YlH6w2xX4nTW7xvBdz4lZskjF2-Xsyr_2HGW7QHqsr3wWf3S3jp11)
|
- [Partner Marketing Manager](https://cmzd204.na1.hubspotlinksstarter.com/Ctc/W1+113/cMzd204/VVw-Pb7W3L0MW4VDsrX96v12SW3S9mTt4JsxJPN22w10k3lScmV1-WJV7CgGwkVNx4HH8v7G3cW8Nnk7n6vBs1MW23wQMs5DL57DW9j6NDY8NF37HW8wpH3Z7BJmdNW3Y2j5q8pKYMqW4Hk_Vz6gqsrZW9hyHPp4jCNC7W4McHgh3KSkV-W3N2m5g3NNZhQW1ht7sM6Rxvm9W6cLFDC7QH0gSW58vqBD9dsPT3W310YrH1v1F4HW8BWJQR8ZKbqTW5q1NyD2WVZkCW66Zxq82Sl29vW9cgM4F2nbkqrW4Qz3bM1Lljs2W1Rts_F2dGY61W7-RqXm3Bt_hQW8WZ6_j3sf0HCW4YlH6w2xX4nTW7xvBdz4lZskjF2-Xsyr_2HGW7QHqsr3wWf3S3jp11)
|
||||||
- [Sales Development Representative](https://cmzd204.na1.hubspotlinksstarter.com/Ctc/W1%2B113/cMzd204/VVw-Pb7W3L0MW4VDsrX96v12SW3S9mTt4JsxJPN22w10D3lScGV1-WJV7CgJVZW73tMvD8gBjYbW1Jqt807xLTQkW2yBqRl1y_3jvVmfyFy5z2XY7W11XZq95dZ9hLW8kSTF_78S8qnW8H2gDK1pl1qYW21zkC22MWmpvN510NGB7j_csW8glkJL590LyzW3g0QyR8fht2kN2RfmSz22jfYW2hc61v1qDKSsW1vzl0-28J_DdW901C_-58HKLgW2t6lz11B4cvlW8fKqL_6Fvm2FVbZKDP5yzr6LVxWyBh2zcfQ2W33pnyF4My4fpW2XhVz38bXcs9MNpL8tFf_byW6SlZPb5lbwx_W5MGv3D50bLJHW74jBwQ7sPwVnW3rTCFx3gY3HTW4-wm6t34jtcPW3P47ZM4h6h-X3nY41)
|
- [Sales Development Representative](https://cmzd204.na1.hubspotlinksstarter.com/Ctc/W1+113/cMzd204/VVw-Pb7W3L0MW4VDsrX96v12SW3S9mTt4JsxJPN22w10D3lScGV1-WJV7CgJVZW73tMvD8gBjYbW1Jqt807xLTQkW2yBqRl1y_3jvVmfyFy5z2XY7W11XZq95dZ9hLW8kSTF_78S8qnW8H2gDK1pl1qYW21zkC22MWmpvN510NGB7j_csW8glkJL590LyzW3g0QyR8fht2kN2RfmSz22jfYW2hc61v1qDKSsW1vzl0-28J_DdW901C_-58HKLgW2t6lz11B4cvlW8fKqL_6Fvm2FVbZKDP5yzr6LVxWyBh2zcfQ2W33pnyF4My4fpW2XhVz38bXcs9MNpL8tFf_byW6SlZPb5lbwx_W5MGv3D50bLJHW74jBwQ7sPwVnW3rTCFx3gY3HTW4-wm6t34jtcPW3P47ZM4h6h-X3nY41)
|
||||||
- [Customer Success Manager](https://cmzd204.na1.hubspotlinksstarter.com/Ctc/W1%2B113/cMzd204/VVw-Pb7W3L0MW4VDsrX96v12SW3S9mTt4JsxJPN22w10k3lScmV1-WJV7CgCrPW7LF4PS2_d19qMBdfD0vPkkTN2VrTNB1D06TW7PDCKS5PrjvHW3P-2Mg7Gg8Y7W6F8wL_6yt6mCW64Kzzf566TFSW2byQG38D9cHHW5Vs14w76JzJRW6b3vCM28vMK_N5qPzYmPZZjTW4hCxwJ3cysxJW4HPQpX7BHzQgW8Q5n861GX2S6W8BsG_99cLbP-W93j8_c2yh3dPW11Ypyj2vMWg9W4ZRNgc7hJ_k4W3GM1f55dSGmwW5JdvrV3yQgCGW2Sjz1d7Fdc4PN5H6kH76xJdTVlcqWD367lxMW967s2p2DN-L8V2ByW45M9JBpW2Yxrh31fWh6g3fVK1)
|
- [Customer Success Manager](https://cmzd204.na1.hubspotlinksstarter.com/Ctc/W1+113/cMzd204/VVw-Pb7W3L0MW4VDsrX96v12SW3S9mTt4JsxJPN22w10k3lScmV1-WJV7CgCrPW7LF4PS2_d19qMBdfD0vPkkTN2VrTNB1D06TW7PDCKS5PrjvHW3P-2Mg7Gg8Y7W6F8wL_6yt6mCW64Kzzf566TFSW2byQG38D9cHHW5Vs14w76JzJRW6b3vCM28vMK_N5qPzYmPZZjTW4hCxwJ3cysxJW4HPQpX7BHzQgW8Q5n861GX2S6W8BsG_99cLbP-W93j8_c2yh3dPW11Ypyj2vMWg9W4ZRNgc7hJ_k4W3GM1f55dSGmwW5JdvrV3yQgCGW2Sjz1d7Fdc4PN5H6kH76xJdTVlcqWD367lxMW967s2p2DN-L8V2ByW45M9JBpW2Yxrh31fWh6g3fVK1)
|
||||||
- [Sales Executive](https://cmzd204.na1.hubspotlinksstarter.com/Ctc/W1%2B113/cMzd204/VVw-Pb7W3L0MW4VDsrX96v12SW3S9mTt4JsxJPN22w1013lSc3V1-WJV7CgNsvW4HDsXz56fLSyW7qHCLs6rQT4qW3CtyKc3nxlfjN28wmnW3_fT2W46dG_B5GGp_GW2mvlPs8jVn2mW51Wmb783k6m0W4dq55v7L0w7nW1kHSdP20BxmTW6TjC_71fWvKqW1657Nj33Zd7KW8R2Ky56LPK-gW54mz133rcMf_W5hFrR_1P077WW60q5X82cdVsBW900Mnm4Klz8gW8mSLKH6k0GmRW7rb8R_5Vv7VXW2gNMZ98W4VjvW8Xm1vY5bJlwHVT40lb6GQbLrW3yHzlz2ybxR5W1ScpqQ3srywsW7rwdM_8ysyNK38Yh1)
|
- [Sales Executive](https://cmzd204.na1.hubspotlinksstarter.com/Ctc/W1+113/cMzd204/VVw-Pb7W3L0MW4VDsrX96v12SW3S9mTt4JsxJPN22w1013lSc3V1-WJV7CgNsvW4HDsXz56fLSyW7qHCLs6rQT4qW3CtyKc3nxlfjN28wmnW3_fT2W46dG_B5GGp_GW2mvlPs8jVn2mW51Wmb783k6m0W4dq55v7L0w7nW1kHSdP20BxmTW6TjC_71fWvKqW1657Nj33Zd7KW8R2Ky56LPK-gW54mz133rcMf_W5hFrR_1P077WW60q5X82cdVsBW900Mnm4Klz8gW8mSLKH6k0GmRW7rb8R_5Vv7VXW2gNMZ98W4VjvW8Xm1vY5bJlwHVT40lb6GQbLrW3yHzlz2ybxR5W1ScpqQ3srywsW7rwdM_8ysyNK38Yh1)
|
||||||
|
|
||||||
* [Software Developer in Decentralised Identity](https://jobs.surrey.ac.uk/Vacancy.aspx?id%3D9454%26forced%3D1) Surrey AC UK
|
* [Software Developer in Decentralised Identity](https://jobs.surrey.ac.uk/Vacancy.aspx?id=9454&forced=1) Surrey AC UK
|
||||||
|
|
||||||
The project is to apply a Self-Sovereign Identity framework to the development of technology for privacy-preserving management of authorship of digital assets. This is an exciting opportunity to work with emerging technologies and develop novel solutions.
|
The project is to apply a Self-Sovereign Identity framework to the development of technology for privacy-preserving management of authorship of digital assets. This is an exciting opportunity to work with emerging technologies and develop novel solutions.
|
||||||
|
|
||||||
### Worldcoin
|
### Worldcoin
|
||||||
|
|
||||||
- Solidity, Fullstack, Mobile, Rust, Product - [tiago@worldcoin.org](mailto:tiago@worldcoin.org)
|
- Solidity, Fullstack, Mobile, Rust, Product - [tiago@worldcoin.org](mailto:tiago@worldcoin.org)
|
||||||
* [Bloom Protocol jobs](https://www.linkedin.com/jobs/bloom-protocol-jobs-worldwide?f_C%3D18241636%26trk%3Dtop-card_top-card-primary-button-top-card-primary-cta%26position%3D1%26pageNum%3D0)
|
* [Bloom Protocol jobs](https://www.linkedin.com/jobs/bloom-protocol-jobs-worldwide?f_C=18241636&trk=top-card_top-card-primary-button-top-card-primary-cta&position=1&pageNum=0)
|
||||||
|
|
||||||
Bloom Protocol has immediate opportunities for experienced frontend engineers who have a desire to work for an innovative company in the self-sovereign identity space. Bloom offers a collaborative, respectful environment with a flat management structure.
|
Bloom Protocol has immediate opportunities for experienced frontend engineers who have a desire to work for an innovative company in the self-sovereign identity space. Bloom offers a collaborative, respectful environment with a flat management structure.
|
||||||
[Senior React Native Mobile Software Engineer](https://indicio.tech/senior-react-native-mobile-software-engineer/) Indicio
|
[Senior React Native Mobile Software Engineer](https://indicio.tech/senior-react-native-mobile-software-engineer/) Indicio
|
||||||
@ -317,14 +317,14 @@ Come and make the world a better place by writing software for creating, managin
|
|||||||
|
|
||||||
In this role, you will work with our engineering teams and with external engineers from companies all over the world to create and adopt decentralized identity specifications that meet our guiding principles for decentralized technology and that forward secure and innovative identity practices.
|
In this role, you will work with our engineering teams and with external engineers from companies all over the world to create and adopt decentralized identity specifications that meet our guiding principles for decentralized technology and that forward secure and innovative identity practices.
|
||||||
|
|
||||||
- [Senior Backend Engineer, Blockchain](https://boards.greenhouse.io/kivaorg/jobs/3714927?gh_jid%3D3714927) Kiva
|
- [Senior Backend Engineer, Blockchain](https://boards.greenhouse.io/kivaorg/jobs/3714927?gh_jid=3714927) Kiva
|
||||||
- [Principal Backend Engineer, Blockchain](https://boards.greenhouse.io/kivaorg/jobs/3871955?gh_jid%3D3871955) Kiva
|
- [Principal Backend Engineer, Blockchain](https://boards.greenhouse.io/kivaorg/jobs/3871955?gh_jid=3871955) Kiva
|
||||||
|
|
||||||
* [Senior Backend Engineer, Blockchain Technologies](https://boards.greenhouse.io/kivaorg/jobs/3714927?gh_jid%3D3714927) Kiva
|
* [Senior Backend Engineer, Blockchain Technologies](https://boards.greenhouse.io/kivaorg/jobs/3714927?gh_jid=3714927) Kiva
|
||||||
|
|
||||||
* [Principal Backend Engineer, Blockchain Technologies](https://boards.greenhouse.io/kivaorg/jobs/3871955?gh_jid%3D3871955) Kiva
|
* [Principal Backend Engineer, Blockchain Technologies](https://boards.greenhouse.io/kivaorg/jobs/3871955?gh_jid=3871955) Kiva
|
||||||
|
|
||||||
- Disco - [Technical Product Manager](https://www.disco.xyz/job?gh_jid%3D4032492005)
|
- Disco - [Technical Product Manager](https://www.disco.xyz/job?gh_jid=4032492005)
|
||||||
- Spokeo - [https://www.spokeo.com/careers](https://www.spokeo.com/careers) - Their CEO just became the co-chair of the CCG group.
|
- Spokeo - [https://www.spokeo.com/careers](https://www.spokeo.com/careers) - Their CEO just became the co-chair of the CCG group.
|
||||||
|
|
||||||
- [Full Stack Integration Developer (Remote)](https://indicio.tech/full-stack-integration-developer-remote/)
|
- [Full Stack Integration Developer (Remote)](https://indicio.tech/full-stack-integration-developer-remote/)
|
||||||
@ -341,7 +341,7 @@ there’s no middleman involved. Without a middleman, communication is one-on-on
|
|||||||
|
|
||||||
For over 30 years, Consult Hyperion have been dedicated to providing advisory and technical consulting services and have grown to be globally recognised as thought leaders and experts in the areas of Digital Identity, Payments and Smart Ticketing.
|
For over 30 years, Consult Hyperion have been dedicated to providing advisory and technical consulting services and have grown to be globally recognised as thought leaders and experts in the areas of Digital Identity, Payments and Smart Ticketing.
|
||||||
|
|
||||||
* [Blockchain Developer (f/d/m)](https://litentry.com/careers/blockchain-developer-(f-d-m)-%25E2%2580%2593-remote/7909) Litentry
|
* [Blockchain Developer (f/d/m)](https://litentry.com/careers/blockchain-developer-(f-d-m)-%E2%80%93-remote/7909) Litentry
|
||||||
|
|
||||||
Implement the pallets based on Substrate
|
Implement the pallets based on Substrate
|
||||||
|
|
||||||
|
@ -16,7 +16,7 @@ Such are the capabilities of Pegasus, the spyware manufactured by NSO Group, the
|
|||||||
|
|
||||||
I was quoted in the article in MIT Technology Review on April 6, 2022, “Deception, exploited workers, and cash handouts: How Worldcoin recruited its first half a million test users.”
|
I was quoted in the article in MIT Technology Review on April 6, 2022, “Deception, exploited workers, and cash handouts: How Worldcoin recruited its first half a million test users.”
|
||||||
|
|
||||||
* [Using Digital Identity To Prevent The Sale Of Age-Restricted Products](https://www.forbes.com/sites/forbesbusinesscouncil/2021/12/02/using-digital-identity-to-prevent-the-sale-of-age-restricted-products/?sh%3D5de510a97f9d) Forbes
|
* [Using Digital Identity To Prevent The Sale Of Age-Restricted Products](https://www.forbes.com/sites/forbesbusinesscouncil/2021/12/02/using-digital-identity-to-prevent-the-sale-of-age-restricted-products/?sh=5de510a97f9d) Forbes
|
||||||
|
|
||||||
This is not limited to alcohol, however. It also includes other age-restricted products such as tobacco, cannabis (where legal of course), vaping products, gambling, some movie tickets and even lottery tickets.
|
This is not limited to alcohol, however. It also includes other age-restricted products such as tobacco, cannabis (where legal of course), vaping products, gambling, some movie tickets and even lottery tickets.
|
||||||
|
|
||||||
|
@ -5,9 +5,6 @@ published: false
|
|||||||
# Infographic
|
# Infographic
|
||||||
|
|
||||||
* [Interesting diagram.](https://twitter.com/i3market_eu/status/1397474556839874563)
|
* [Interesting diagram.](https://twitter.com/i3market_eu/status/1397474556839874563)
|
||||||
* [@erwin tweets](https://twitter.com/Erwin_Schroedy/status/1405887429983223809):
|
|
||||||
|
|
||||||
Self Sovereign Identity is an integral part of WEB3.0 Be free, own your identity! #KILT #YourWildestMemes #WEB3
|
|
||||||
|
|
||||||
* [SSI Meme of the week](https://twitter.com/SSI_by_memes/status/1483519684465016833) SSI By Memes
|
* [SSI Meme of the week](https://twitter.com/SSI_by_memes/status/1483519684465016833) SSI By Memes
|
||||||
* [SSI Memes](https://twitter.com/SSI_by_memes/status/1486979269754601472)
|
* [SSI Memes](https://twitter.com/SSI_by_memes/status/1486979269754601472)
|
||||||
|
@ -17,7 +17,7 @@ DIF has launched a massive Decentralized Identity [Knowledgebase](https://ident
|
|||||||
🔥 This is a community resource for tracking the adoption of verifiable credentials around the world. Please have a look around and join 10+ others who have contributed!
|
🔥 This is a community resource for tracking the adoption of verifiable credentials around the world. Please have a look around and join 10+ others who have contributed!
|
||||||
|
|
||||||
## Course
|
## Course
|
||||||
* [New Badged Open Course: Decentralising Education Using Blockchain Technology](https://www.open.edu/openlearncreate/course/view.php?id%3D7981) Alexander.Mikroyannidis ([from CCG](https://lists.w3.org/Archives/Public/public-credentials/2021Oct/0044.html)
|
* [New Badged Open Course: Decentralising Education Using Blockchain Technology](https://www.open.edu/openlearncreate/course/view.php?id=7981) Alexander.Mikroyannidis ([from CCG](https://lists.w3.org/Archives/Public/public-credentials/2021Oct/0044.html)
|
||||||
|
|
||||||
Available on the Open University’s OpenLearn Create platform and is licensed under CC BY-NC-SA 4.0. Upon completion of the course, learners earn a free statement of participation.
|
Available on the Open University’s OpenLearn Create platform and is licensed under CC BY-NC-SA 4.0. Upon completion of the course, learners earn a free statement of participation.
|
||||||
|
|
||||||
@ -29,7 +29,7 @@ Gain a solid foundation on self-sovereign identity (SSI) with a 360 degree overv
|
|||||||
|
|
||||||
The course is available on the Open University’s OpenLearn Create platform and is licensed under CC BY-NC-SA 4.0. Upon completion of the course, learners earn a free statement of participation.
|
The course is available on the Open University’s OpenLearn Create platform and is licensed under CC BY-NC-SA 4.0. Upon completion of the course, learners earn a free statement of participation.
|
||||||
|
|
||||||
* [You can view the course here](https://www.open.edu/openlearncreate/course/view.php?id%3D7981). Your feedback is very welcome.
|
* [You can view the course here](https://www.open.edu/openlearncreate/course/view.php?id=7981). Your feedback is very welcome.
|
||||||
|
|
||||||
* [Becoming a Hyperledger Aries Developer](https://training.linuxfoundation.org/training/becoming-a-hyperledger-aries-developer-lfs173/) Linux Foundation
|
* [Becoming a Hyperledger Aries Developer](https://training.linuxfoundation.org/training/becoming-a-hyperledger-aries-developer-lfs173/) Linux Foundation
|
||||||
> Learn how to develop blockchain-based production-ready identity applications with Hyperledger Aries in this free course.
|
> Learn how to develop blockchain-based production-ready identity applications with Hyperledger Aries in this free course.
|
||||||
|
@ -21,7 +21,7 @@ For me, the most relevant new topic and trend was to finally see the convergence
|
|||||||
|
|
||||||
it could provide definitive proof of a person’s Covid test status without airlines having to integrate with centralized databases of health data, a path mired in complexity and legal liability. It could allow passengers to use this proof in a way that protected their privacy.
|
it could provide definitive proof of a person’s Covid test status without airlines having to integrate with centralized databases of health data, a path mired in complexity and legal liability. It could allow passengers to use this proof in a way that protected their privacy.
|
||||||
|
|
||||||
* [EIC Keynote 2022 — The Value Paradox: The 3 Inflections of IGA](https://www.youtube.com/watch?v%3DejA_YoyhrBg) Jackson Shaw
|
* [EIC Keynote 2022 — The Value Paradox: The 3 Inflections of IGA](https://www.youtube.com/watch?v=ejA_YoyhrBg) Jackson Shaw
|
||||||
|
|
||||||
Explore the inflection points of identity governance and administration (IGA) through modern history with Jackson Shaw at the 2022 European Identity & Cloud Conference (EIC) hosted by KuppingerCole.
|
Explore the inflection points of identity governance and administration (IGA) through modern history with Jackson Shaw at the 2022 European Identity & Cloud Conference (EIC) hosted by KuppingerCole.
|
||||||
|
|
||||||
|
@ -5,7 +5,7 @@ published: false
|
|||||||
# Events Calendar
|
# Events Calendar
|
||||||
## Identiverse
|
## Identiverse
|
||||||
* [Reflections from Identiverse: Identity Security Threats & Trends](https://www.secureauth.com/blog/reflections-from-identiverse-identity-security-threats-and-trends/) SecureAuth
|
* [Reflections from Identiverse: Identity Security Threats & Trends](https://www.secureauth.com/blog/reflections-from-identiverse-identity-security-threats-and-trends/) SecureAuth
|
||||||
> talks like [“Simplify Your Least-Privilege Journey with Access Analysis”](https://identiverse.com/idv2021/session/SESCI5F77RW8COIGZ/) and [“Managing and governing workload identities”](https://identiverse.com/idv2021/session/SESTZ5WNB1OMKD9EV/) definitively provide greater insight. [...] UberEther showed in [“User Behavior Analytics: Marrying Identity and the SOC Like Peanut Butter and Jelly”](https://pheedloop.com/identiverse2021/virtual/?page%3Dsessions%26section%3DSESKWZML7NBJX42P3) how UBA (User Behavior Analytics) and UEBA (User Events Behavior Analysis) deliver additional value to help avoid threats in real-time and provide visibility to analysts.
|
> talks like [“Simplify Your Least-Privilege Journey with Access Analysis”](https://identiverse.com/idv2021/session/SESCI5F77RW8COIGZ/) and [“Managing and governing workload identities”](https://identiverse.com/idv2021/session/SESTZ5WNB1OMKD9EV/) definitively provide greater insight. [...] UberEther showed in [“User Behavior Analytics: Marrying Identity and the SOC Like Peanut Butter and Jelly”](https://pheedloop.com/identiverse2021/virtual/?page=sessions§ion=SESKWZML7NBJX42P3) how UBA (User Behavior Analytics) and UEBA (User Events Behavior Analysis) deliver additional value to help avoid threats in real-time and provide visibility to analysts.
|
||||||
|
|
||||||
* [2 special topics IIWs](https://lists.w3.org/Archives/Public/public-credentials/2021Jun/0293.html) Kaliya IDwoman
|
* [2 special topics IIWs](https://lists.w3.org/Archives/Public/public-credentials/2021Jun/0293.html) Kaliya IDwoman
|
||||||
|
|
||||||
@ -13,7 +13,7 @@ we are pulling together these as an experiment based on feedback from the commun
|
|||||||
|
|
||||||
1) User-Experience and SSI on July 22nd. 8am - 2pm pacific time.
|
1) User-Experience and SSI on July 22nd. 8am - 2pm pacific time.
|
||||||
|
|
||||||
* [www.eventbrite.com/e/159946001797/?discount=CCG_25](http://www.eventbrite.com/e/159946001797/?discount%3DCCG_25)
|
* [www.eventbrite.com/e/159946001797/?discount=CCG_25](http://www.eventbrite.com/e/159946001797/?discount=CCG_25)
|
||||||
|
|
||||||
2) The Business of SSI on August 4th 8am-2pm pacific time.
|
2) The Business of SSI on August 4th 8am-2pm pacific time.
|
||||||
|
|
||||||
@ -30,7 +30,7 @@ We also have [IIW33 set now as a virtual event October 12-14](https://www.event
|
|||||||
* [Thoughtful Biometrics Workshop](http://thoughtfulbiometrics.org/) is creating a space to dialogue about critical emerging issues surrounding biometric and digital identity technologies.
|
* [Thoughtful Biometrics Workshop](http://thoughtfulbiometrics.org/) is creating a space to dialogue about critical emerging issues surrounding biometric and digital identity technologies.
|
||||||
|
|
||||||
* [FIDO alliance](https://fidoalliance.org/events/)
|
* [FIDO alliance](https://fidoalliance.org/events/)
|
||||||
- [Google Calendar](https://www.google.com/calendar/render?cid=webcal%3A%2F%2Ffidoalliance.org%2F%3Fpost_type%3Dtribe_events%26tribe-bar-date%3D2022-10-15%26ical%3D1%26eventDisplay%3Dlist)
|
- [Google Calendar](https://www.google.com/calendar/render?cid=webcal%3A//fidoalliance.org/%3Fpost_type=tribe_events&tribe-bar-date=2022-10-15&ical=1&eventDisplay=list)
|
||||||
- [Export .ics file](https://fidoalliance.org/events/list/?ical=1)
|
- [Export .ics file](https://fidoalliance.org/events/list/?ical=1)
|
||||||
- [Export Outlook .ics file](https://fidoalliance.org/events/list/?outlook-ical=1)
|
- [Export Outlook .ics file](https://fidoalliance.org/events/list/?outlook-ical=1)
|
||||||
|
|
||||||
@ -307,7 +307,7 @@ Inspiring keynotes. Hands-on training with experts. Oktane21 is the place to lea
|
|||||||
|
|
||||||
- [The EOSIO Identity Working Group - Kickoff](https://www.gimly.io/blog/the-eosio-identity-working-group) • April 12th
|
- [The EOSIO Identity Working Group - Kickoff](https://www.gimly.io/blog/the-eosio-identity-working-group) • April 12th
|
||||||
|
|
||||||
Gimly is excited to start the EOSIO identity working group WG (Twitter [#eosio_id](https://twitter.com/search?q%3Deosio_id))! This open working group (WG) will create and foster identity solutions using [EOSIO](https://eos.io/) technology, by creating open W3C compliant self-sovereign identity standards, interoperability, and ecosystem development for eosio based identities.
|
Gimly is excited to start the EOSIO identity working group WG (Twitter [#eosio_id](https://twitter.com/search?q=eosio_id))! This open working group (WG) will create and foster identity solutions using [EOSIO](https://eos.io/) technology, by creating open W3C compliant self-sovereign identity standards, interoperability, and ecosystem development for eosio based identities.
|
||||||
|
|
||||||
- [Covid-19 Technology Innovations](https://summit.digitalscot.live/talks/covid-19-technology-innovations/) • April 14
|
- [Covid-19 Technology Innovations](https://summit.digitalscot.live/talks/covid-19-technology-innovations/) • April 14
|
||||||
|
|
||||||
@ -321,7 +321,7 @@ Gimly is excited to start the EOSIO identity working group WG (Twitter [#eosio_i
|
|||||||
We invite developers across the world to come and build applications that generate secure, portable and privacy-preserving credentials enabling trust across entities using Affinidi’s APIs
|
We invite developers across the world to come and build applications that generate secure, portable and privacy-preserving credentials enabling trust across entities using Affinidi’s APIs
|
||||||
- [The EOSIO Identity Working Group - Kickoff](https://www.gimly.io/blog/the-eosio-identity-working-group) • April 12th
|
- [The EOSIO Identity Working Group - Kickoff](https://www.gimly.io/blog/the-eosio-identity-working-group) • April 12th
|
||||||
Gimly is excited to start the EOSIO identity working group WG (Twitter #eosio_id)! This open working group (WG) will create and foster identity solutions using [EOSIO](https://eos.io/) technology, by creating open W3C compliant self-sovereign identity standards, interoperability, and ecosystem development for eosio based identities.
|
Gimly is excited to start the EOSIO identity working group WG (Twitter #eosio_id)! This open working group (WG) will create and foster identity solutions using [EOSIO](https://eos.io/) technology, by creating open W3C compliant self-sovereign identity standards, interoperability, and ecosystem development for eosio based identities.
|
||||||
- [Covid-19 Credentials Initiative: Use Case Implementation](https://covidcreds.groups.io/g/usecaseCCI/viewevent?repeatid%3D35300%26eventid%3D1068111%26calstart%3D2021-04-13) • April 13
|
- [Covid-19 Credentials Initiative: Use Case Implementation](https://covidcreds.groups.io/g/usecaseCCI/viewevent?repeatid=35300&eventid=1068111&calstart=2021-04-13) • April 13
|
||||||
- [Digital Wellness Passes: The Missing Links](https://plugandplay.zoom.us/webinar/register/WN_uVaRI5wgS2Wi8wCMur0hCg) Plug and Play Travel • April 14
|
- [Digital Wellness Passes: The Missing Links](https://plugandplay.zoom.us/webinar/register/WN_uVaRI5wgS2Wi8wCMur0hCg) Plug and Play Travel • April 14
|
||||||
|
|
||||||
- [Covid-19 Technology Innovations](https://summit.digitalscot.live/talks/covid-19-technology-innovations/) • April 14
|
- [Covid-19 Technology Innovations](https://summit.digitalscot.live/talks/covid-19-technology-innovations/) • April 14
|
||||||
@ -330,7 +330,7 @@ Gimly is excited to start the EOSIO identity working group WG (Twitter #eosio_i
|
|||||||
|
|
||||||
With Dr. Ann Cavoukian, Executive Director of the Global Privacy & Security by Design Centre.
|
With Dr. Ann Cavoukian, Executive Director of the Global Privacy & Security by Design Centre.
|
||||||
|
|
||||||
- [Series on self-sovereign identity (SSI)](https://www.eventbrite.co.uk/e/getting-started-with-self-sovereign-identity-ssi-tickets-117363323861?aff%3Derelpanelorg) Conditis • April 14
|
- [Series on self-sovereign identity (SSI)](https://www.eventbrite.co.uk/e/getting-started-with-self-sovereign-identity-ssi-tickets-117363323861?aff=erelpanelorg) Conditis • April 14
|
||||||
|
|
||||||
This monthly webinar series is an opportunity to hear from UK experts in distributed identity and learn the mechanics of decentralized identity systems.
|
This monthly webinar series is an opportunity to hear from UK experts in distributed identity and learn the mechanics of decentralized identity systems.
|
||||||
|
|
||||||
@ -346,7 +346,7 @@ We invite developers across the world to come and build applications that genera
|
|||||||
- [Redefining the Student Journey and Beyond Through Verifiable Credentials](https://www.eventbrite.co.uk/e/redefining-the-student-journey-and-beyond-through-verifiable-credentials-tickets-150060812931) Condatis • May 11
|
- [Redefining the Student Journey and Beyond Through Verifiable Credentials](https://www.eventbrite.co.uk/e/redefining-the-student-journey-and-beyond-through-verifiable-credentials-tickets-150060812931) Condatis • May 11
|
||||||
|
|
||||||
- [Credentials, COVID-19, and Digital Staff Passports Innovating and lessons from the NHS frontline](https://www.evernym.com/healthcare-webinar/) • Apr 28
|
- [Credentials, COVID-19, and Digital Staff Passports Innovating and lessons from the NHS frontline](https://www.evernym.com/healthcare-webinar/) • Apr 28
|
||||||
- [NGI Forward Salon Foundationals: Blockchain Ecologies with Primavera De Filippi](https://www.ngi.eu/event/ngi-forward-salon-foundationals-blockchain-ecologies/?instance_id%3D465) • April 28, 2021
|
- [NGI Forward Salon Foundationals: Blockchain Ecologies with Primavera De Filippi](https://www.ngi.eu/event/ngi-forward-salon-foundationals-blockchain-ecologies/?instance_id=465) • April 28, 2021
|
||||||
- [Credentials, COVID-19, and Digital Staff Passports](https://www.evernym.com/healthcare-webinar/) • Apr 28
|
- [Credentials, COVID-19, and Digital Staff Passports](https://www.evernym.com/healthcare-webinar/) • Apr 28
|
||||||
- [OpenID Foundation Virtual Workshop](https://openid.net/2021/03/01/registration-open-for-openid-foundation-virtual-workshop-april-29-2021/) • April 29
|
- [OpenID Foundation Virtual Workshop](https://openid.net/2021/03/01/registration-open-for-openid-foundation-virtual-workshop-april-29-2021/) • April 29
|
||||||
- [Redefining the Student Journey and Beyond Through Verifiable Credentials](https://www.eventbrite.co.uk/e/redefining-the-student-journey-and-beyond-through-verifiable-credentials-tickets-150060812931) Condatis • May 11
|
- [Redefining the Student Journey and Beyond Through Verifiable Credentials](https://www.eventbrite.co.uk/e/redefining-the-student-journey-and-beyond-through-verifiable-credentials-tickets-150060812931) Condatis • May 11
|
||||||
@ -366,11 +366,11 @@ Hosted by [Data Sovereignty Now](https://datasovereigntynow.org), in partnership
|
|||||||
|
|
||||||
CCI is having a call focused on the current EU Digital Green Development. We have invited Gaby Whitehead, from Dutch Ministry of Public Health, Welfare and Sport (Ministerie VWS) and lead for Digital Green Certificate payload, EU eHealth Network, to provide the community an overview and answer our questions.
|
CCI is having a call focused on the current EU Digital Green Development. We have invited Gaby Whitehead, from Dutch Ministry of Public Health, Welfare and Sport (Ministerie VWS) and lead for Digital Green Certificate payload, EU eHealth Network, to provide the community an overview and answer our questions.
|
||||||
|
|
||||||
- [(New Link) CCI Use Case Implementation Workstream Bi-weekly Calls](https://covidcreds.groups.io/g/usecaseCCI/viewevent?repeatid%3D35300%26eventid%3D1068113%26calstart%3D2021-05-11) • May 11th
|
- [(New Link) CCI Use Case Implementation Workstream Bi-weekly Calls](https://covidcreds.groups.io/g/usecaseCCI/viewevent?repeatid=35300&eventid=1068113&calstart=2021-05-11) • May 11th
|
||||||
|
|
||||||
(Every 2 weeks on Tuesday, through Wednesday, 30 June 2021)
|
(Every 2 weeks on Tuesday, through Wednesday, 30 June 2021)
|
||||||
|
|
||||||
* [https://zoom.us/j/91386972813?pwd=WmhaWjU5aHlDTWwwRTdIek02aWkwUT09](https://zoom.us/j/91386972813?pwd%3DWmhaWjU5aHlDTWwwRTdIek02aWkwUT09)
|
* [https://zoom.us/j/91386972813?pwd=WmhaWjU5aHlDTWwwRTdIek02aWkwUT09](https://zoom.us/j/91386972813?pwd=WmhaWjU5aHlDTWwwRTdIek02aWkwUT09)
|
||||||
|
|
||||||
- [https://ec.europa.eu/health/ehealth/covid-19_en](https://ec.europa.eu/health/ehealth/covid-19_en)
|
- [https://ec.europa.eu/health/ehealth/covid-19_en](https://ec.europa.eu/health/ehealth/covid-19_en)
|
||||||
- [https://github.com/ehn-digital-green-development](https://github.com/ehn-digital-green-development).
|
- [https://github.com/ehn-digital-green-development](https://github.com/ehn-digital-green-development).
|
||||||
@ -383,11 +383,11 @@ With the rise of [Non-fungible Tokens](https://en.wikipedia.org/wiki/Non-fungibl
|
|||||||
|
|
||||||
- [Self-Sovereign Identity. Trust in NGI](https://www.ngi.eu/event/self-sovereign-identity-trust-in-ngi/) May 17
|
- [Self-Sovereign Identity. Trust in NGI](https://www.ngi.eu/event/self-sovereign-identity-trust-in-ngi/) May 17
|
||||||
- [Slides on the European Data Governance Act from a data sovereignty perspective](https://blog.meeco.me/moonshot-thinking-for-data/). ([Register](https://register.gotowebinar.com/register/3358630205283402511)) May 25 – [INNOPAY](https://www.innopay.com/en)
|
- [Slides on the European Data Governance Act from a data sovereignty perspective](https://blog.meeco.me/moonshot-thinking-for-data/). ([Register](https://register.gotowebinar.com/register/3358630205283402511)) May 25 – [INNOPAY](https://www.innopay.com/en)
|
||||||
- [Deadline for submitting DID Method implementations](https://github.com/w3c/did-test-suite/%23adding-your-did-implementation) May 25th
|
- [Deadline for submitting DID Method implementations](https://github.com/w3c/did-test-suite/#adding-your-did-implementation) May 25th
|
||||||
|
|
||||||
The W3C DID Working Group achieved another milestone last week; all tests for the specifications are now complete.
|
The W3C DID Working Group achieved another milestone last week; all tests for the specifications are now complete.
|
||||||
|
|
||||||
- [Hyperledger Global Forum 2021](https://hgf2021.sched.com/%23) • June 8-10
|
- [Hyperledger Global Forum 2021](https://hgf2021.sched.com/#) • June 8-10
|
||||||
- [Identiverse 2021](https://identiverse.com/)
|
- [Identiverse 2021](https://identiverse.com/)
|
||||||
* [https://identity.foundation/arewewaciyet/](https://identity.foundation/arewewaciyet/)
|
* [https://identity.foundation/arewewaciyet/](https://identity.foundation/arewewaciyet/)
|
||||||
|
|
||||||
@ -400,7 +400,7 @@ On Thrusday, 27th of May 2021 at 14:00 (Brussels Local Time), technical coordina
|
|||||||
- [The Dutch Government´s Strategy for Digital Identity](https://worldbankgroup.zoom.us/webinar/register/WN_jSxLCb3-QFSjqraA5i1rNQ) May 13 • ID4D Webinar Series
|
- [The Dutch Government´s Strategy for Digital Identity](https://worldbankgroup.zoom.us/webinar/register/WN_jSxLCb3-QFSjqraA5i1rNQ) May 13 • ID4D Webinar Series
|
||||||
- [Paving the Way to a Safer Travel Experience - Heather Dahl, & Scott Harris, Indicio.tech; Adrien Sanglier, SITA](https://hgf2021.sched.com/event/j3e9) • June 8
|
- [Paving the Way to a Safer Travel Experience - Heather Dahl, & Scott Harris, Indicio.tech; Adrien Sanglier, SITA](https://hgf2021.sched.com/event/j3e9) • June 8
|
||||||
- [Hyperledger Global Forum](https://hgf2021.sched.com) • June 8-10
|
- [Hyperledger Global Forum](https://hgf2021.sched.com) • June 8-10
|
||||||
- [Building a Hyperledger Indy Network – A Technical Overview](https://hgf2021.sched.com/event/j3cG/building-a-hyperledger-indy-network-a-technical-overview-lynn-bendixsen-indicio-pbc?iframe%3Dno%23) • Lynn Bendixsen
|
- [Building a Hyperledger Indy Network – A Technical Overview](https://hgf2021.sched.com/event/j3cG/building-a-hyperledger-indy-network-a-technical-overview-lynn-bendixsen-indicio-pbc?iframe=no#) • Lynn Bendixsen
|
||||||
- [Panel: Paving the Way to a Safer Travel Experience](https://sched.co/j3e9) • Heather Dahl, & Scott Harris, Adrien Sanglier, SITA
|
- [Panel: Paving the Way to a Safer Travel Experience](https://sched.co/j3e9) • Heather Dahl, & Scott Harris, Adrien Sanglier, SITA
|
||||||
- [Panel: Start Simple to Scale Decentralized Identity](https://sched.co/j3ej) • Heather Dahl & Kenneth Ebert, R. J. Reiser, Liquid Avatar Technologies
|
- [Panel: Start Simple to Scale Decentralized Identity](https://sched.co/j3ej) • Heather Dahl & Kenneth Ebert, R. J. Reiser, Liquid Avatar Technologies
|
||||||
- [Panel: Self-Sovereign Identity for Economic Empowerment: Lessons from Africa](https://hgf2021.sched.com/event/j3d5/panel-self-sovereign-identity-for-economic-empowerment-lessons-from-africa) • Anna Johnson, Trinsic; Thea Sommerseth Myhren, Diwala; Lohan Spies, DIDx; Fabian Portmann, Farmer Connect; Bryan Pon, Kiva
|
- [Panel: Self-Sovereign Identity for Economic Empowerment: Lessons from Africa](https://hgf2021.sched.com/event/j3d5/panel-self-sovereign-identity-for-economic-empowerment-lessons-from-africa) • Anna Johnson, Trinsic; Thea Sommerseth Myhren, Diwala; Lohan Spies, DIDx; Fabian Portmann, Farmer Connect; Bryan Pon, Kiva
|
||||||
@ -450,7 +450,7 @@ The 34th The European Association for e-Identity and Security Annual Conference
|
|||||||
- [Identihack | DIDI](https://didi.org.ar/identihack/) (LatAm Hackathon) • 6/28-7/16
|
- [Identihack | DIDI](https://didi.org.ar/identihack/) (LatAm Hackathon) • 6/28-7/16
|
||||||
- [34th The European Association for e-Identity and Security Annual Conference](https://annualconference.eema.org/) • 6/29-7/1
|
- [34th The European Association for e-Identity and Security Annual Conference](https://annualconference.eema.org/) • 6/29-7/1
|
||||||
‘Securing Trust in the New Digital Reality’ (Kaliya is speaking)
|
‘Securing Trust in the New Digital Reality’ (Kaliya is speaking)
|
||||||
- [Liz Tanner: Rhode Island digital government on track with identity blockchain](https://www.meetup.com/Hyperledger-Boston/events/279065887/?isFirstPublish%3Dtrue) July 2
|
- [Liz Tanner: Rhode Island digital government on track with identity blockchain](https://www.meetup.com/Hyperledger-Boston/events/279065887/?isFirstPublish=true) July 2
|
||||||
- [Iowa .NET User Group with IdRamp](https://www.meetup.com/iadnug/) Moving Beyond the Password • 7/8
|
- [Iowa .NET User Group with IdRamp](https://www.meetup.com/iadnug/) Moving Beyond the Password • 7/8
|
||||||
- Special Topics IIW
|
- Special Topics IIW
|
||||||
- [User-Experience](https://www.eventbrite.com/e/user-experience-in-ssi-an-iiw-special-topic-12-day-virtual-event-tickets-159946001797) 7/22
|
- [User-Experience](https://www.eventbrite.com/e/user-experience-in-ssi-an-iiw-special-topic-12-day-virtual-event-tickets-159946001797) 7/22
|
||||||
@ -461,7 +461,7 @@ The 34th The European Association for e-Identity and Security Annual Conference
|
|||||||
- [Identihack | DIDI](https://didi.org.ar/identihack/) (LatAm Hackathon) • 6/28-7/16
|
- [Identihack | DIDI](https://didi.org.ar/identihack/) (LatAm Hackathon) • 6/28-7/16
|
||||||
- [34th The European Association for e-Identity and Security Annual Conference](https://annualconference.eema.org/)6/29-7/1
|
- [34th The European Association for e-Identity and Security Annual Conference](https://annualconference.eema.org/)6/29-7/1
|
||||||
‘Securing Trust in the New Digital Reality’ (Kaliya is speaking)
|
‘Securing Trust in the New Digital Reality’ (Kaliya is speaking)
|
||||||
- [Liz Tanner: Rhode Island digital government on track with identity blockchain](https://www.meetup.com/Hyperledger-Boston/events/279065887/?isFirstPublish%3Dtrue) July 2
|
- [Liz Tanner: Rhode Island digital government on track with identity blockchain](https://www.meetup.com/Hyperledger-Boston/events/279065887/?isFirstPublish=true) July 2
|
||||||
- [Iowa .NET User Group with IdRamp](https://www.meetup.com/iadnug/) Moving Beyond the Password • 7/8
|
- [Iowa .NET User Group with IdRamp](https://www.meetup.com/iadnug/) Moving Beyond the Password • 7/8
|
||||||
- [A European Framework for Decentralized Digital Identity Wallets](https://worldbankgroup.zoom.us/webinar/register/WN_omGLfQeiSCeOmjFILwOASQ) 7/15
|
- [A European Framework for Decentralized Digital Identity Wallets](https://worldbankgroup.zoom.us/webinar/register/WN_omGLfQeiSCeOmjFILwOASQ) 7/15
|
||||||
- Special Topics IIW
|
- Special Topics IIW
|
||||||
@ -469,9 +469,9 @@ The 34th The European Association for e-Identity and Security Annual Conference
|
|||||||
- [Business of SSI](https://www.eventbrite.com/e/the-business-of-ssi-an-iiw-special-topic-12-day-virtual-event-tickets-161249943923) 8/4
|
- [Business of SSI](https://www.eventbrite.com/e/the-business-of-ssi-an-iiw-special-topic-12-day-virtual-event-tickets-161249943923) 8/4
|
||||||
- [IIW 33](https://www.eventbrite.com/e/internet-identity-workshop-iiwxxxiii-33-2021b-tickets-160257990965) October 12-14th Virtual
|
- [IIW 33](https://www.eventbrite.com/e/internet-identity-workshop-iiwxxxiii-33-2021b-tickets-160257990965) October 12-14th Virtual
|
||||||
- [Identihack | DIDI](https://didi.org.ar/identihack/) (LatAm Hackathon) • 6/28-7/16
|
- [Identihack | DIDI](https://didi.org.ar/identihack/) (LatAm Hackathon) • 6/28-7/16
|
||||||
- [I Am Who I Say I Am: Verifying Identity while Preserving Privacy in the Digital Age](https://www.youtube.com/watch?v%3DuXOSAdCSCWY) Congressional Hearing • 6/16
|
- [I Am Who I Say I Am: Verifying Identity while Preserving Privacy in the Digital Age](https://www.youtube.com/watch?v=uXOSAdCSCWY) Congressional Hearing • 6/16
|
||||||
- [A European Framework for Decentralized Digital Identity Wallets](https://worldbankgroup.zoom.us/webinar/register/WN_omGLfQeiSCeOmjFILwOASQ) 7/15
|
- [A European Framework for Decentralized Digital Identity Wallets](https://worldbankgroup.zoom.us/webinar/register/WN_omGLfQeiSCeOmjFILwOASQ) 7/15
|
||||||
- [Turing trustworthy digital identity conference](https://www.eventsforce.net/turingevents/frontend/reg/thome.csp?pageID%3D29872%26eventID%3D93%26traceRedir%3D2) 9/13
|
- [Turing trustworthy digital identity conference](https://www.eventsforce.net/turingevents/frontend/reg/thome.csp?pageID=29872&eventID=93&traceRedir=2) 9/13
|
||||||
- [IIW 33](https://www.eventbrite.com/e/internet-identity-workshop-iiwxxxiii-33-2021b-tickets-160257990965) 10/12-14th
|
- [IIW 33](https://www.eventbrite.com/e/internet-identity-workshop-iiwxxxiii-33-2021b-tickets-160257990965) 10/12-14th
|
||||||
|
|
||||||
* [1/2 Day IIW Virtual Events – UX July 22nd and Business Aug 4th](https://identitywoman.net/special-topic-iiw-1-2-day-virtual-events-ux-july-22nd-and-business-aug-4th/)
|
* [1/2 Day IIW Virtual Events – UX July 22nd and Business Aug 4th](https://identitywoman.net/special-topic-iiw-1-2-day-virtual-events-ux-july-22nd-and-business-aug-4th/)
|
||||||
@ -482,37 +482,37 @@ The 34th The European Association for e-Identity and Security Annual Conference
|
|||||||
- [Introduction to Hyperledger Sovereign Identity Blockchain Solutions: Indy, Aries & Ursa](https://www.edx.org/course/identity-in-hyperledger-aries-indy-and-ursa) • ♾️
|
- [Introduction to Hyperledger Sovereign Identity Blockchain Solutions: Indy, Aries & Ursa](https://www.edx.org/course/identity-in-hyperledger-aries-indy-and-ursa) • ♾️
|
||||||
- [1/2 Day IIW Virtual Event](https://identitywoman.net/special-topic-iiw-1-2-day-virtual-events-ux-july-22nd-and-business-aug-4th/) • [The Business of SSI](https://www.eventbrite.com/e/the-business-of-ssi-an-iiw-special-topic-12-day-virtual-event-tickets-161249943923) • 8/4
|
- [1/2 Day IIW Virtual Event](https://identitywoman.net/special-topic-iiw-1-2-day-virtual-events-ux-july-22nd-and-business-aug-4th/) • [The Business of SSI](https://www.eventbrite.com/e/the-business-of-ssi-an-iiw-special-topic-12-day-virtual-event-tickets-161249943923) • 8/4
|
||||||
- [Pravici- Verifiable Credentials — Bring students and employees back to school and work while respecting privacy](https://www.hyperledger.org/event/hyperledger-in-depth-verifiable-credentials-with-pravici) • 8/18
|
- [Pravici- Verifiable Credentials — Bring students and employees back to school and work while respecting privacy](https://www.hyperledger.org/event/hyperledger-in-depth-verifiable-credentials-with-pravici) • 8/18
|
||||||
- [Turing trustworthy digital identity conference](https://www.eventsforce.net/turingevents/frontend/reg/thome.csp?pageID%3D29872%26eventID%3D93%26traceRedir%3D2) • 9/13
|
- [Turing trustworthy digital identity conference](https://www.eventsforce.net/turingevents/frontend/reg/thome.csp?pageID=29872&eventID=93&traceRedir=2) • 9/13
|
||||||
- [IIW 33](https://www.eventbrite.com/e/internet-identity-workshop-iiwxxxiii-33-2021b-tickets-160257990965) • 10/12-14
|
- [IIW 33](https://www.eventbrite.com/e/internet-identity-workshop-iiwxxxiii-33-2021b-tickets-160257990965) • 10/12-14
|
||||||
|
|
||||||
- [Introduction to Hyperledger Sovereign Identity Blockchain Solutions: Indy, Aries & Ursa](https://www.edx.org/course/identity-in-hyperledger-aries-indy-and-ursa) • ♾️
|
- [Introduction to Hyperledger Sovereign Identity Blockchain Solutions: Indy, Aries & Ursa](https://www.edx.org/course/identity-in-hyperledger-aries-indy-and-ursa) • ♾️
|
||||||
- [Pravici- Verifiable Credentials — Bring students and employees back to school and work while respecting privacy](https://www.hyperledger.org/event/hyperledger-in-depth-verifiable-credentials-with-pravici) • 8/18
|
- [Pravici- Verifiable Credentials — Bring students and employees back to school and work while respecting privacy](https://www.hyperledger.org/event/hyperledger-in-depth-verifiable-credentials-with-pravici) • 8/18
|
||||||
- [Turing trustworthy digital identity conference](https://www.eventsforce.net/turingevents/frontend/reg/thome.csp?pageID%3D29872%26eventID%3D93%26traceRedir%3D2) • 9/13
|
- [Turing trustworthy digital identity conference](https://www.eventsforce.net/turingevents/frontend/reg/thome.csp?pageID=29872&eventID=93&traceRedir=2) • 9/13
|
||||||
- [IIW 33](https://www.eventbrite.com/e/internet-identity-workshop-iiwxxxiii-33-2021b-tickets-160257990965) • 10/12-14
|
- [IIW 33](https://www.eventbrite.com/e/internet-identity-workshop-iiwxxxiii-33-2021b-tickets-160257990965) • 10/12-14
|
||||||
- [Digital Trust World 2021](https://events.eventzilla.net/e/digital-trust-world-2021-2138805589) 10/4-7 ‘the Conference for Authentication, Biometrics, Fraud & Security and Identity,’
|
- [Digital Trust World 2021](https://events.eventzilla.net/e/digital-trust-world-2021-2138805589) 10/4-7 ‘the Conference for Authentication, Biometrics, Fraud & Security and Identity,’
|
||||||
- [Pravici- Verifiable Credentials — Bring students and employees back to school and work while respecting privacy](https://www.hyperledger.org/event/hyperledger-in-depth-verifiable-credentials-with-pravici) • 8/18
|
- [Pravici- Verifiable Credentials — Bring students and employees back to school and work while respecting privacy](https://www.hyperledger.org/event/hyperledger-in-depth-verifiable-credentials-with-pravici) • 8/18
|
||||||
- [Self Sovereign Identity/Decentralised Identity and Financial Services](https://lemmatree.zoom.us/webinar/register/WN_8xoH-oTYQOumigQ4uMHOjw) 9/2 in Amsterdam, Berlin, Rome, Stockholm, Vienna
|
- [Self Sovereign Identity/Decentralised Identity and Financial Services](https://lemmatree.zoom.us/webinar/register/WN_8xoH-oTYQOumigQ4uMHOjw) 9/2 in Amsterdam, Berlin, Rome, Stockholm, Vienna
|
||||||
- [Turing trustworthy digital identity conference](https://www.eventsforce.net/turingevents/frontend/reg/thome.csp?pageID%3D29872%26eventID%3D93%26traceRedir%3D2) • 9/13
|
- [Turing trustworthy digital identity conference](https://www.eventsforce.net/turingevents/frontend/reg/thome.csp?pageID=29872&eventID=93&traceRedir=2) • 9/13
|
||||||
- [EIC Speaker Spotlight: Vittorio Bertocci on Browser Changes Affecting Identity](https://www.kuppingercole.com/blog/beskers/eic-speaker-spotlight-vittorio-bertocci-browser-changes-identity) 9/14
|
- [EIC Speaker Spotlight: Vittorio Bertocci on Browser Changes Affecting Identity](https://www.kuppingercole.com/blog/beskers/eic-speaker-spotlight-vittorio-bertocci-browser-changes-identity) 9/14
|
||||||
- [IIW 33](https://www.eventbrite.com/e/internet-identity-workshop-iiwxxxiii-33-2021b-tickets-160257990965) • 10/12-14
|
- [IIW 33](https://www.eventbrite.com/e/internet-identity-workshop-iiwxxxiii-33-2021b-tickets-160257990965) • 10/12-14
|
||||||
- [Digital Trust World 2021](https://events.eventzilla.net/e/digital-trust-world-2021-2138805589) 10/4-7 ‘the Conference for Authentication, Biometrics, Fraud & Security and Identity,’
|
- [Digital Trust World 2021](https://events.eventzilla.net/e/digital-trust-world-2021-2138805589) 10/4-7 ‘the Conference for Authentication, Biometrics, Fraud & Security and Identity,’
|
||||||
|
|
||||||
- [Self Sovereign Identity/Decentralised Identity and Financial Services](https://lemmatree.zoom.us/webinar/register/WN_8xoH-oTYQOumigQ4uMHOjw) • 9/2 in Amsterdam, Berlin, Rome, Stockholm, Vienna
|
- [Self Sovereign Identity/Decentralised Identity and Financial Services](https://lemmatree.zoom.us/webinar/register/WN_8xoH-oTYQOumigQ4uMHOjw) • 9/2 in Amsterdam, Berlin, Rome, Stockholm, Vienna
|
||||||
- [Turing trustworthy digital identity conference](https://www.eventsforce.net/turingevents/frontend/reg/thome.csp?pageID%3D29872%26eventID%3D93%26traceRedir%3D2) • 9/13
|
- [Turing trustworthy digital identity conference](https://www.eventsforce.net/turingevents/frontend/reg/thome.csp?pageID=29872&eventID=93&traceRedir=2) • 9/13
|
||||||
- [EIC Speaker Spotlight: Vittorio Bertocci on Browser Changes Affecting Identity](https://www.kuppingercole.com/blog/beskers/eic-speaker-spotlight-vittorio-bertocci-browser-changes-identity) • 9/14
|
- [EIC Speaker Spotlight: Vittorio Bertocci on Browser Changes Affecting Identity](https://www.kuppingercole.com/blog/beskers/eic-speaker-spotlight-vittorio-bertocci-browser-changes-identity) • 9/14
|
||||||
- [IIW 33](https://www.eventbrite.com/e/internet-identity-workshop-iiwxxxiii-33-2021b-tickets-160257990965) • 10/12-14
|
- [IIW 33](https://www.eventbrite.com/e/internet-identity-workshop-iiwxxxiii-33-2021b-tickets-160257990965) • 10/12-14
|
||||||
- [Digital Trust World 2021](https://events.eventzilla.net/e/digital-trust-world-2021-2138805589) • 10/4-7 ‘the Conference for Authentication, Biometrics, Fraud & Security and Identity,’
|
- [Digital Trust World 2021](https://events.eventzilla.net/e/digital-trust-world-2021-2138805589) • 10/4-7 ‘the Conference for Authentication, Biometrics, Fraud & Security and Identity,’
|
||||||
- [Verifiable credentials for travel and hospitality](https://www.evernym.com/travel-webinar/) • 9/2
|
- [Verifiable credentials for travel and hospitality](https://www.evernym.com/travel-webinar/) • 9/2
|
||||||
- [Self Sovereign Identity/Decentralised Identity and Financial Services](https://lemmatree.zoom.us/webinar/register/WN_8xoH-oTYQOumigQ4uMHOjw) • 9/2 in Amsterdam, Berlin, Rome, Stockholm, Vienna
|
- [Self Sovereign Identity/Decentralised Identity and Financial Services](https://lemmatree.zoom.us/webinar/register/WN_8xoH-oTYQOumigQ4uMHOjw) • 9/2 in Amsterdam, Berlin, Rome, Stockholm, Vienna
|
||||||
- [Cardea Interop-athon](http://cardea.app) • 9/9[@IndicioID](https://twitter.com/IndicioID/status/1430620408739340292) shares: It's exciting to see new faces signing up for the @CardeaProject Interop-athon! With roughly a dozen signed up already from around the world be sure to [register](https://docs.google.com/forms/d/1yIalp9ZPL9_nMUcP31OiLuko3aNryw4SzBaSjmJhs0A/viewform?edit_requested%3Dtrue) soon to make sure you get a spot!
|
- [Cardea Interop-athon](http://cardea.app) • 9/9[@IndicioID](https://twitter.com/IndicioID/status/1430620408739340292) shares: It's exciting to see new faces signing up for the @CardeaProject Interop-athon! With roughly a dozen signed up already from around the world be sure to [register](https://docs.google.com/forms/d/1yIalp9ZPL9_nMUcP31OiLuko3aNryw4SzBaSjmJhs0A/viewform?edit_requested=true) soon to make sure you get a spot!
|
||||||
- [Turing trustworthy digital identity conference](https://www.eventsforce.net/turingevents/frontend/reg/thome.csp?pageID%3D29872%26eventID%3D93%26traceRedir%3D2) • 9/13
|
- [Turing trustworthy digital identity conference](https://www.eventsforce.net/turingevents/frontend/reg/thome.csp?pageID=29872&eventID=93&traceRedir=2) • 9/13
|
||||||
- [EIC Speaker Spotlight: Vittorio Bertocci on Browser Changes Affecting Identity](https://www.kuppingercole.com/blog/beskers/eic-speaker-spotlight-vittorio-bertocci-browser-changes-identity) • 9/14
|
- [EIC Speaker Spotlight: Vittorio Bertocci on Browser Changes Affecting Identity](https://www.kuppingercole.com/blog/beskers/eic-speaker-spotlight-vittorio-bertocci-browser-changes-identity) • 9/14
|
||||||
- [Internet Identity Workshop 33](https://www.eventbrite.com/e/internet-identity-workshop-iiwxxxiii-33-2021b-tickets-160257990965) • 10/12-14
|
- [Internet Identity Workshop 33](https://www.eventbrite.com/e/internet-identity-workshop-iiwxxxiii-33-2021b-tickets-160257990965) • 10/12-14
|
||||||
- [Digital Trust World 2021](https://events.eventzilla.net/e/digital-trust-world-2021-2138805589) • 10/4-7 ‘the Conference for Authentication, Biometrics, Fraud & Security and Identity,’
|
- [Digital Trust World 2021](https://events.eventzilla.net/e/digital-trust-world-2021-2138805589) • 10/4-7 ‘the Conference for Authentication, Biometrics, Fraud & Security and Identity,’
|
||||||
|
|
||||||
* [ANNOUNCING THE MYDATA OPERATOR AWARDS 2021](https://mydata.org/2021/08/24/announcing-the-mydata-operator-awards-2021/)
|
* [ANNOUNCING THE MYDATA OPERATOR AWARDS 2021](https://mydata.org/2021/08/24/announcing-the-mydata-operator-awards-2021/)
|
||||||
- [Cardea Interop-athon](http://cardea.app) • 9/9 ([registration](https://docs.google.com/forms/d/1yIalp9ZPL9_nMUcP31OiLuko3aNryw4SzBaSjmJhs0A/viewform?edit_requested%3Dtrue))
|
- [Cardea Interop-athon](http://cardea.app) • 9/9 ([registration](https://docs.google.com/forms/d/1yIalp9ZPL9_nMUcP31OiLuko3aNryw4SzBaSjmJhs0A/viewform?edit_requested=true))
|
||||||
- [Turing trustworthy digital identity conference](https://www.eventsforce.net/turingevents/frontend/reg/thome.csp?pageID%3D29872%26eventID%3D93%26traceRedir%3D2) • 9/13
|
- [Turing trustworthy digital identity conference](https://www.eventsforce.net/turingevents/frontend/reg/thome.csp?pageID=29872&eventID=93&traceRedir=2) • 9/13
|
||||||
- [GS1 Industry & Standards Event 2021](https://standards-event.gs1.org/) • 9/13-16
|
- [GS1 Industry & Standards Event 2021](https://standards-event.gs1.org/) • 9/13-16
|
||||||
- [ICET'21- International Colloquium on Emerging Technologies](https://twitter.com/ieeebvm/status/1433663103565111296) • 9/18-22 • [@ieeebvm](https://twitter.com/ieeebvm) Empowering Technophiles, Envisioning Tomorrow ([Registration](https://forms.gle/VapanFkryzaMBQKSA)
|
- [ICET'21- International Colloquium on Emerging Technologies](https://twitter.com/ieeebvm/status/1433663103565111296) • 9/18-22 • [@ieeebvm](https://twitter.com/ieeebvm) Empowering Technophiles, Envisioning Tomorrow ([Registration](https://forms.gle/VapanFkryzaMBQKSA)
|
||||||
* [EIC Speaker Spotlight: Maarten Stultjens on the European Perspective of Identity](https://www.kuppingercole.com/blog/beskers/eic-speaker-spotlight-maarten-stultjens-european-perspective-of-identity) 9/23
|
* [EIC Speaker Spotlight: Maarten Stultjens on the European Perspective of Identity](https://www.kuppingercole.com/blog/beskers/eic-speaker-spotlight-maarten-stultjens-european-perspective-of-identity) 9/23
|
||||||
@ -556,7 +556,7 @@ The objective of these sessions is to gather input for shaping the Community Gro
|
|||||||
|
|
||||||
All are welcome and you can participate in any of the following upcoming forums:
|
All are welcome and you can participate in any of the following upcoming forums:
|
||||||
|
|
||||||
1. [OIX Trust Identity Conference](https://openidentityexchange.org/networks/87/events.html?id%3D3407%23) 10/14 - on site/remote GAIN POC focused event on the 15th from 10am-12pm.
|
1. [OIX Trust Identity Conference](https://openidentityexchange.org/networks/87/events.html?id=3407#) 10/14 - on site/remote GAIN POC focused event on the 15th from 10am-12pm.
|
||||||
|
|
||||||
2. [FIDO Authenticate Conference](https://fidoalliance.org/event/authenticate-2021-conference/) the following week. The hybrid GAIN POC session is in the planning stages for 21st of October.
|
2. [FIDO Authenticate Conference](https://fidoalliance.org/event/authenticate-2021-conference/) the following week. The hybrid GAIN POC session is in the planning stages for 21st of October.
|
||||||
- [Ceramic's Sovereign Data Hackathon](https://blog.ceramic.network/announcing-sovereign-data-hackathon/) • 10/7-21
|
- [Ceramic's Sovereign Data Hackathon](https://blog.ceramic.network/announcing-sovereign-data-hackathon/) • 10/7-21
|
||||||
@ -578,7 +578,7 @@ Could blockchain enabled self-sovereign identification be a game changer in ever
|
|||||||
|
|
||||||
- [Engineering Successful IAM Projects to Support Digital Business](https://www.kuppingercole.com/events/support-digital-business) 11/23 KuppingerCole
|
- [Engineering Successful IAM Projects to Support Digital Business](https://www.kuppingercole.com/events/support-digital-business) 11/23 KuppingerCole
|
||||||
|
|
||||||
- [Does the W3C Still Believe in Tim Berners-Lee’s Vision of Decentralization?](https://www.evernym.com/blog/w3c-vision-of-decentralization/) Evernym 11/3 ([register](https://www.evernym.com/blog/w3c-vision-of-decentralization/%23webinar)
|
- [Does the W3C Still Believe in Tim Berners-Lee’s Vision of Decentralization?](https://www.evernym.com/blog/w3c-vision-of-decentralization/) Evernym 11/3 ([register](https://www.evernym.com/blog/w3c-vision-of-decentralization/#webinar)
|
||||||
- Last month, Google, Apple, and Mozilla lodged formal objections to W3C approval of the W3C Decentralized Identifiers (DIDs) 1.0 specification.
|
- Last month, Google, Apple, and Mozilla lodged formal objections to W3C approval of the W3C Decentralized Identifiers (DIDs) 1.0 specification.
|
||||||
- [Engineering Successful IAM Projects to Support Digital Business](https://www.kuppingercole.com/events/support-digital-business) 11/23 KuppingerCole
|
- [Engineering Successful IAM Projects to Support Digital Business](https://www.kuppingercole.com/events/support-digital-business) 11/23 KuppingerCole
|
||||||
- [Registration Open for OpenID Foundation Virtual Workshop](https://www.eventbrite.com/e/openid-foundation-virtual-workshop-tickets-194712519387) 12/9
|
- [Registration Open for OpenID Foundation Virtual Workshop](https://www.eventbrite.com/e/openid-foundation-virtual-workshop-tickets-194712519387) 12/9
|
||||||
@ -597,12 +597,12 @@ THE MODERN DILEMMA - HOW TO TAKE BACK CONTROL OF YOUR DIGITAL SOUL • 11/16
|
|||||||
|
|
||||||
* [JAN CHRISTOPH EBERSBACH • IDENTINET](https://www.wacom.com/en-de/events/connected-ink/speakers/jan-christoph-ebersbach)
|
* [JAN CHRISTOPH EBERSBACH • IDENTINET](https://www.wacom.com/en-de/events/connected-ink/speakers/jan-christoph-ebersbach)
|
||||||
|
|
||||||
* [CREATIVE RIGHTS](https://www.wacom.com/en-de/events/connected-ink/sessions?tags%3Dcreative-rights) • [ID AND SIGNATURE](https://www.wacom.com/en-de/events/connected-ink/sessions?tags%3Did-and-signature) • [TECHNOLOGY](https://www.wacom.com/en-de/events/connected-ink/sessions?tags%3Dtechnology)
|
* [CREATIVE RIGHTS](https://www.wacom.com/en-de/events/connected-ink/sessions?tags=creative-rights) • [ID AND SIGNATURE](https://www.wacom.com/en-de/events/connected-ink/sessions?tags=id-and-signature) • [TECHNOLOGY](https://www.wacom.com/en-de/events/connected-ink/sessions?tags=technology)
|
||||||
|
|
||||||
- [Don’t miss our next speech at the ISSE Conference 2021 by EEMA](https://infocert.digital/dont-miss-our-next-speech-at-the-isse-conference-2021-by-eema/) 11/16-18 Infocert
|
- [Don’t miss our next speech at the ISSE Conference 2021 by EEMA](https://infocert.digital/dont-miss-our-next-speech-at-the-isse-conference-2021-by-eema/) 11/16-18 Infocert
|
||||||
- [Unlocking Safe Travels Beyond COVID with Digital Credentials](https://academy.affinidi.com/unlocking-safe-travels-beyond-covid-with-digital-credentials-6544eb10b091) 11/25 Affinidi
|
- [Unlocking Safe Travels Beyond COVID with Digital Credentials](https://academy.affinidi.com/unlocking-safe-travels-beyond-covid-with-digital-credentials-6544eb10b091) 11/25 Affinidi
|
||||||
- [Driving Inclusion with Trusted Digital Ecosystems](https://www.meetup.com/indicio-identity-community/events/281513984/) 11/30
|
- [Driving Inclusion with Trusted Digital Ecosystems](https://www.meetup.com/indicio-identity-community/events/281513984/) 11/30
|
||||||
- [COVID Health Credentials for International Travel Summits](https://us10.campaign-archive.com/?u%3D1e21ad08ed0422a5dac0b8eed%26id%3D8cee5814c5) (by LFPH and Affinidi) 12/1-2 CCI Newsletter
|
- [COVID Health Credentials for International Travel Summits](https://us10.campaign-archive.com/?u=1e21ad08ed0422a5dac0b8eed&id=8cee5814c5) (by LFPH and Affinidi) 12/1-2 CCI Newsletter
|
||||||
- [European Blockchain Convention Virtual](https://www.tickettailor.com/events/europeanblockchainconvention/577837) 12/13
|
- [European Blockchain Convention Virtual](https://www.tickettailor.com/events/europeanblockchainconvention/577837) 12/13
|
||||||
- [Self-Sovereign Identities in Productive Systems - A Reality Check](https://allevents.in/online/self-sovereign-identities-in-productive-systems-a-reality-check/10000205035355267) (11\25)
|
- [Self-Sovereign Identities in Productive Systems - A Reality Check](https://allevents.in/online/self-sovereign-identities-in-productive-systems-a-reality-check/10000205035355267) (11\25)
|
||||||
|
|
||||||
@ -612,24 +612,24 @@ The Frankfurt School Blockchain Center will host a panel discussion together wit
|
|||||||
|
|
||||||
As part of the [Digital Europe Programme](https://digital-strategy.ec.europa.eu/en/digital-europe-programmes-multiannual-work-programme-2021-2022) the European Commission will invest EUR 143 million in common European data spaces in different domains. [...] consortia building is taking place as we speak. Come to make connections and get access to the library of resources.
|
As part of the [Digital Europe Programme](https://digital-strategy.ec.europa.eu/en/digital-europe-programmes-multiannual-work-programme-2021-2022) the European Commission will invest EUR 143 million in common European data spaces in different domains. [...] consortia building is taking place as we speak. Come to make connections and get access to the library of resources.
|
||||||
|
|
||||||
- [Customer Service / Service NSW EOI - Digital Identity and Verifiable Credentials - DICT/8027](https://www.tenders.nsw.gov.au//index.cfm?dept%3Ddcs%26event%3Dpublic.rft.show%26RFTUUID%3DB5AEC5F5-F55A-5377-53C3487DD5BE443A) Tenders (Closes 12/14)
|
- [Customer Service / Service NSW EOI - Digital Identity and Verifiable Credentials - DICT/8027](https://www.tenders.nsw.gov.au//index.cfm?dept=dcs&event=public.rft.show&RFTUUID=B5AEC5F5-F55A-5377-53C3487DD5BE443A) Tenders (Closes 12/14)
|
||||||
|
|
||||||
This EOI invite’s expressions of interest for the provision of customer digital identity and verifiable credential capabilities to the Principal, for the purposes of credential validation and securely sharing identity across a variety of services, as described in the Statement of Requirements (Attachment 1) in this Part A: Conditions and Statement of Requirements
|
This EOI invite’s expressions of interest for the provision of customer digital identity and verifiable credential capabilities to the Principal, for the purposes of credential validation and securely sharing identity across a variety of services, as described in the Statement of Requirements (Attachment 1) in this Part A: Conditions and Statement of Requirements
|
||||||
- [European Blockchain Convention Virtual](https://www.tickettailor.com/events/europeanblockchainconvention/577837) • 12/13
|
- [European Blockchain Convention Virtual](https://www.tickettailor.com/events/europeanblockchainconvention/577837) • 12/13
|
||||||
- [Customer Service / Service NSW EOI - Digital Identity and Verifiable Credentials - DICT/8027](https://www.tenders.nsw.gov.au//index.cfm?dept%3Ddcs%26event%3Dpublic.rft.show%26RFTUUID%3DB5AEC5F5-F55A-5377-53C3487DD5BE443A) • Tenders (Closes 12/14)
|
- [Customer Service / Service NSW EOI - Digital Identity and Verifiable Credentials - DICT/8027](https://www.tenders.nsw.gov.au//index.cfm?dept=dcs&event=public.rft.show&RFTUUID=B5AEC5F5-F55A-5377-53C3487DD5BE443A) • Tenders (Closes 12/14)
|
||||||
- [Build Your Identity Solution Using Hyperledger Aries](https://wiki.hyperledger.org/display/events/Build%2BYour%2BIdentity%2BSolution%2BUsing%2BHyperledger%2BAries) • 1/20
|
- [Build Your Identity Solution Using Hyperledger Aries](https://wiki.hyperledger.org/display/events/Build+Your+Identity+Solution+Using+Hyperledger+Aries) • 1/20
|
||||||
- [Hyperledger Indy Technical Deep Dive](https://wiki.hyperledger.org/display/events/Hyperledger%2BIndy%2BTechnical%2BDeep%2BDive) • 2/3
|
- [Hyperledger Indy Technical Deep Dive](https://wiki.hyperledger.org/display/events/Hyperledger+Indy+Technical+Deep+Dive) • 2/3
|
||||||
- [Data Space Launchpad](https://mydata.org/2021/11/18/event-data-space/) MyData • Until 2/22
|
- [Data Space Launchpad](https://mydata.org/2021/11/18/event-data-space/) MyData • Until 2/22
|
||||||
|
|
||||||
* [Hyperledger Foundation Community Training: Accelerate your decentralized identity skills with two free Hyperledger Indy and Hyperledger Aries workshops](https://www.hyperledger.org/blog/2021/11/22/hyperledger-foundation-community-training-accelerate-your-decentralized-identity-skills-with-two-free-hyperledger-indy-and-hyperledger-aries-workshops)
|
* [Hyperledger Foundation Community Training: Accelerate your decentralized identity skills with two free Hyperledger Indy and Hyperledger Aries workshops](https://www.hyperledger.org/blog/2021/11/22/hyperledger-foundation-community-training-accelerate-your-decentralized-identity-skills-with-two-free-hyperledger-indy-and-hyperledger-aries-workshops)
|
||||||
|
|
||||||
* [Build Your Identity Solution Using Hyperledger Aries](https://wiki.hyperledger.org/display/events/Build%2BYour%2BIdentity%2BSolution%2BUsing%2BHyperledger%2BAries) 1/20
|
* [Build Your Identity Solution Using Hyperledger Aries](https://wiki.hyperledger.org/display/events/Build+Your+Identity+Solution+Using+Hyperledger+Aries) 1/20
|
||||||
|
|
||||||
* [Hyperledger Indy Technical Deep Dive](https://wiki.hyperledger.org/display/events/Hyperledger%2BIndy%2BTechnical%2BDeep%2BDive) 2/3
|
* [Hyperledger Indy Technical Deep Dive](https://wiki.hyperledger.org/display/events/Hyperledger+Indy+Technical+Deep+Dive) 2/3
|
||||||
|
|
||||||
- [The "Completing the Framework" Open Call](https://essif-lab-framework-call.fundingbox.com/) eSSIF-Lab (until 1/15/22)
|
- [The "Completing the Framework" Open Call](https://essif-lab-framework-call.fundingbox.com/) eSSIF-Lab (until 1/15/22)
|
||||||
- [Build Your Identity Solution Using Hyperledger Aries](https://wiki.hyperledger.org/display/events/Build%2BYour%2BIdentity%2BSolution%2BUsing%2BHyperledger%2BAries) 1/20
|
- [Build Your Identity Solution Using Hyperledger Aries](https://wiki.hyperledger.org/display/events/Build+Your+Identity+Solution+Using+Hyperledger+Aries) 1/20
|
||||||
- [Hyperledger Indy Technical Deep Dive](https://wiki.hyperledger.org/display/events/Hyperledger%2BIndy%2BTechnical%2BDeep%2BDive) 2/3
|
- [Hyperledger Indy Technical Deep Dive](https://wiki.hyperledger.org/display/events/Hyperledger+Indy+Technical+Deep+Dive) 2/3
|
||||||
- [Data Space Launchpad](https://mydata.org/2021/11/18/event-data-space/) MyData • Until 2/22
|
- [Data Space Launchpad](https://mydata.org/2021/11/18/event-data-space/) MyData • Until 2/22
|
||||||
|
|
||||||
* [Join us to build solutions using Decentralized Identities](https://techcommunity.microsoft.com/t5/azure-active-directory-identity/join-us-to-build-solutions-using-decentralized-identities/ba-p/2810649) Microsoft
|
* [Join us to build solutions using Decentralized Identities](https://techcommunity.microsoft.com/t5/azure-active-directory-identity/join-us-to-build-solutions-using-decentralized-identities/ba-p/2810649) Microsoft
|
||||||
@ -642,7 +642,7 @@ This EOI invite’s expressions of interest for the provision of customer digita
|
|||||||
|
|
||||||
01/24 - [Twitter Spaces – Introduction to Decentralized Identity](https://425.show/did-space)
|
01/24 - [Twitter Spaces – Introduction to Decentralized Identity](https://425.show/did-space)
|
||||||
|
|
||||||
01/25 - [Twitch Stream – Build an app that uses Verifiable Credentials](https://nam10.safelinks.protection.outlook.com/?url%3Dhttps%253A%252F%252F425.show%252Ftwitch%26data%3D04%257C01%257Csdriggers%2540affirma.com%257C5761489ebcc84c1c8c7308d9d6067c24%257C65265dd04b2044a4aca4b7ecbb143664%257C0%257C0%257C637776145956457766%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C3000%26sdata%3DJh%252BadXwKLqcR%252BefNjaRGmiAVmhXbSCCtPbek5JEioqs%253D%26reserved%3D0)
|
01/25 - [Twitch Stream – Build an app that uses Verifiable Credentials](https://nam10.safelinks.protection.outlook.com/?url=https%3A//425.show/twitch&data=04%7C01%7Csdriggers%40affirma.com%7C5761489ebcc84c1c8c7308d9d6067c24%7C65265dd04b2044a4aca4b7ecbb143664%7C0%7C0%7C637776145956457766%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=Jh+adXwKLqcR+efNjaRGmiAVmhXbSCCtPbek5JEioqs%3D&reserved=0)
|
||||||
|
|
||||||
01/25 - [Twitch Stream – Setting up your DID infrastructure](https://425.show/twitch)
|
01/25 - [Twitch Stream – Setting up your DID infrastructure](https://425.show/twitch)
|
||||||
|
|
||||||
@ -655,18 +655,18 @@ Speaking: Markus Sabadello, Michael Shae, Tim Brückmann, Tim Heidfeld
|
|||||||
We are excited to go live with [IAMX](https://iamx.id) and cannot wait to talk about one of the most important fields of the internet: Identity.
|
We are excited to go live with [IAMX](https://iamx.id) and cannot wait to talk about one of the most important fields of the internet: Identity.
|
||||||
- [How To: Own Your Identity](https://www.crowdcast.io/e/iamx/register) 1/25 UFOstart ([IAMX](https://iamx.id/)
|
- [How To: Own Your Identity](https://www.crowdcast.io/e/iamx/register) 1/25 UFOstart ([IAMX](https://iamx.id/)
|
||||||
Speaking: Markus Sabadello, Michael Shae, Tim Brückmann, Tim Heidfeld
|
Speaking: Markus Sabadello, Michael Shae, Tim Brückmann, Tim Heidfeld
|
||||||
- [Identity and Security Meetup Sydney (video)](https://www.youtube.com/watch?v%3Di0VwCV-Y6VQ) Next meeting 1/25
|
- [Identity and Security Meetup Sydney (video)](https://www.youtube.com/watch?v=i0VwCV-Y6VQ) Next meeting 1/25
|
||||||
|
|
||||||
Ally Haire talks about identity using blockchain, and Vandana Verma tells us how to stay secure with third-party dependencies!
|
Ally Haire talks about identity using blockchain, and Vandana Verma tells us how to stay secure with third-party dependencies!
|
||||||
|
|
||||||
- [Hyperledger Indy Technical Deep Dive](https://wiki.hyperledger.org/display/events/Hyperledger%2BIndy%2BTechnical%2BDeep%2BDive) 2/3
|
- [Hyperledger Indy Technical Deep Dive](https://wiki.hyperledger.org/display/events/Hyperledger+Indy+Technical+Deep+Dive) 2/3
|
||||||
- [Data Space Launchpad](https://mydata.org/2021/11/18/event-data-space/) MyData • Until 2/22
|
- [Data Space Launchpad](https://mydata.org/2021/11/18/event-data-space/) MyData • Until 2/22
|
||||||
- [Decentralized Autonomous Organizations to revolutionize the way we work?](https://itsavirus.com/updates/webinar-decentralized-autonomous-organizations-to-revolutionize-the-way-we-work) Alex Puig Caelum Labs 2/24
|
- [Decentralized Autonomous Organizations to revolutionize the way we work?](https://itsavirus.com/updates/webinar-decentralized-autonomous-organizations-to-revolutionize-the-way-we-work) Alex Puig Caelum Labs 2/24
|
||||||
|
|
||||||
* [Build using Decentralized Identities with Microsoft](https://techcommunity.microsoft.com/t5/azure-active-directory-identity/join-us-to-build-solutions-using-decentralized-identities/ba-p/2810649)
|
* [Build using Decentralized Identities with Microsoft](https://techcommunity.microsoft.com/t5/azure-active-directory-identity/join-us-to-build-solutions-using-decentralized-identities/ba-p/2810649)
|
||||||
|
|
||||||
- [Introduction to Decentralized Identity](https://425.show/did-space) 01/24
|
- [Introduction to Decentralized Identity](https://425.show/did-space) 01/24
|
||||||
- [Build an app that uses Verifiable Credentials](https://nam10.safelinks.protection.outlook.com/?url%3Dhttps%253A%252F%252F425.show%252Ftwitch%26data%3D04%257C01%257Csdriggers%2540affirma.com%257C5761489ebcc84c1c8c7308d9d6067c24%257C65265dd04b2044a4aca4b7ecbb143664%257C0%257C0%257C637776145956457766%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C3000%26sdata%3DJh%252BadXwKLqcR%252BefNjaRGmiAVmhXbSCCtPbek5JEioqs%253D%26reserved%3D0) 01/25
|
- [Build an app that uses Verifiable Credentials](https://nam10.safelinks.protection.outlook.com/?url=https%3A//425.show/twitch&data=04%7C01%7Csdriggers%40affirma.com%7C5761489ebcc84c1c8c7308d9d6067c24%7C65265dd04b2044a4aca4b7ecbb143664%7C0%7C0%7C637776145956457766%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=Jh+adXwKLqcR+efNjaRGmiAVmhXbSCCtPbek5JEioqs%3D&reserved=0) 01/25
|
||||||
- [Setting up your DID infrastructure](https://425.show/twitch) 01/25
|
- [Setting up your DID infrastructure](https://425.show/twitch) 01/25
|
||||||
- [Hackathon: Let’s build something cool with DID](https://425.show/did-hackathon) 01/27
|
- [Hackathon: Let’s build something cool with DID](https://425.show/did-hackathon) 01/27
|
||||||
* [Identity in the 21st Century India : Where are we?](https://www.linkedin.com/feed/update/urn:li:share:6894694078353698816/)
|
* [Identity in the 21st Century India : Where are we?](https://www.linkedin.com/feed/update/urn:li:share:6894694078353698816/)
|
||||||
@ -694,13 +694,13 @@ The webinar will be held virtually on the 17th of February 2022 and is open for
|
|||||||
|
|
||||||
* [Naming the Harms of Web 1 & 2.0](https://allevents.in/events/naming-the-harms-of-web-1-and-20/10000260672868567) 3/4 Planetwork
|
* [Naming the Harms of Web 1 & 2.0](https://allevents.in/events/naming-the-harms-of-web-1-and-20/10000260672868567) 3/4 Planetwork
|
||||||
|
|
||||||
* [Mitigating Harms in Web3](https://allevents.in/events/mitigating-harms-in-web3/10000260675526517%23) 4/1 Planetwork
|
* [Mitigating Harms in Web3](https://allevents.in/events/mitigating-harms-in-web3/10000260675526517#) 4/1 Planetwork
|
||||||
|
|
||||||
- [DIDcomm Users Group](https://discord.gg/Sdw8swxpDJhttps://discord.gg/Sdw8swxpDJ) every 2 weeks on Wednesday
|
- [DIDcomm Users Group](https://discord.gg/Sdw8swxpDJhttps://discord.gg/Sdw8swxpDJ) every 2 weeks on Wednesday
|
||||||
|
|
||||||
* [DIDcomm Users Group Time Poll](http://whenisgood.net/d8dkhgi) - are the proposed time slots for this event. Paint over all that are good for you.
|
* [DIDcomm Users Group Time Poll](http://whenisgood.net/d8dkhgi) - are the proposed time slots for this event. Paint over all that are good for you.
|
||||||
|
|
||||||
- [SSI Harms Task Force](https://wiki.trustoverip.org/display/HOME/SSI%2BHarms%2BTask%2BForce%2BMeeting%2BPage) 02-28
|
- [SSI Harms Task Force](https://wiki.trustoverip.org/display/HOME/SSI+Harms+Task+Force+Meeting+Page) 02-28
|
||||||
|
|
||||||
* [BNI Champions chapter meeting](https://bnionline.zoom.us/meeting/register/tJcoceGrrT8rG9ZJt5TcEqHTS6XhKLFWbO2_) Thursdays
|
* [BNI Champions chapter meeting](https://bnionline.zoom.us/meeting/register/tJcoceGrrT8rG9ZJt5TcEqHTS6XhKLFWbO2_) Thursdays
|
||||||
|
|
||||||
@ -712,7 +712,7 @@ The webinar will be held virtually on the 17th of February 2022 and is open for
|
|||||||
|
|
||||||
Kaliya created a channel on YouTube.
|
Kaliya created a channel on YouTube.
|
||||||
|
|
||||||
* [DID Conference Korea - SSIfluencer](https://www.youtube.com/playlist?list%3DPLmfNukbH87utZgqzIoLCYxG5ArhVCYvBh)
|
* [DID Conference Korea - SSIfluencer](https://www.youtube.com/playlist?list=PLmfNukbH87utZgqzIoLCYxG5ArhVCYvBh)
|
||||||
|
|
||||||
All these videos were recorded at the DID Conference Korea 2022on Feb 22.
|
All these videos were recorded at the DID Conference Korea 2022on Feb 22.
|
||||||
|
|
||||||
@ -724,12 +724,12 @@ identity isn't about who you are. it's about what others might want or need to k
|
|||||||
|
|
||||||
* [Registration](https://www.eventbrite.com/e/openid-foundation-workshop-monday-april-25-2022-tickets-304150210467) must be completed by Monday, April 18, 2022:
|
* [Registration](https://www.eventbrite.com/e/openid-foundation-workshop-monday-april-25-2022-tickets-304150210467) must be completed by Monday, April 18, 2022:
|
||||||
|
|
||||||
- [Global Internet Governance and International Human Rights - Whose Rights, Whose Interpretations?](https://www-npa.lip6.fr/gig-arts/conference/) April 13-14, Nicosia ([Program](https://pbs.twimg.com/media/FOhpFlaXsAUADnq?format%3Djpg%26name%3Dlarge)
|
- [Global Internet Governance and International Human Rights - Whose Rights, Whose Interpretations?](https://www-npa.lip6.fr/gig-arts/conference/) April 13-14, Nicosia ([Program](https://pbs.twimg.com/media/FOhpFlaXsAUADnq?format=jpg&name=large)
|
||||||
* [Build Your Identity Solution Using Hyperledger Aries](https://wiki.hyperledger.org/display/events/Build%2BYour%2BIdentity%2BSolution%2BUsing%2BHyperledger%2BAries) 1/20/22
|
* [Build Your Identity Solution Using Hyperledger Aries](https://wiki.hyperledger.org/display/events/Build+Your+Identity+Solution+Using+Hyperledger+Aries) 1/20/22
|
||||||
|
|
||||||
As you progress, you’ll learn how to use a Hyperledger Indy-based network, be introduced to the Indy CLI, and install and run the Aries toolbox to create, issue, and verify a verifiable credential.
|
As you progress, you’ll learn how to use a Hyperledger Indy-based network, be introduced to the Indy CLI, and install and run the Aries toolbox to create, issue, and verify a verifiable credential.
|
||||||
|
|
||||||
* [Hyperledger Indy Technical Deep Dive](https://wiki.hyperledger.org/display/events/Hyperledger%2BIndy%2BTechnical%2BDeep%2BDive) 2/3/22
|
* [Hyperledger Indy Technical Deep Dive](https://wiki.hyperledger.org/display/events/Hyperledger+Indy+Technical+Deep+Dive) 2/3/22
|
||||||
|
|
||||||
Hyperledger Indy node code and the Indy SDK. It also covers the commonly used cryptography libraries contained in Hyperledger Ursa, the Plenum ledger and how to interact with and change the repositories and code.
|
Hyperledger Indy node code and the Indy SDK. It also covers the commonly used cryptography libraries contained in Hyperledger Ursa, the Plenum ledger and how to interact with and change the repositories and code.
|
||||||
|
|
||||||
@ -748,7 +748,7 @@ Students examine identity in a digital world. Topics covered include identifying
|
|||||||
|
|
||||||
Over the course of two days from Jan. 24 – 25, the [Better Identity Coalition](https://www.betteridentity.org/), the FIDO Alliance, and the [ID Theft Resource Center](https://www.idtheftcenter.org/) co-hosted the Identity, Authentication, and the Road Ahead Cybersecurity Policy Forum with representatives from government and industry providing insight into the policies, challenges and opportunities for identity and authentication in 2022 and beyond.
|
Over the course of two days from Jan. 24 – 25, the [Better Identity Coalition](https://www.betteridentity.org/), the FIDO Alliance, and the [ID Theft Resource Center](https://www.idtheftcenter.org/) co-hosted the Identity, Authentication, and the Road Ahead Cybersecurity Policy Forum with representatives from government and industry providing insight into the policies, challenges and opportunities for identity and authentication in 2022 and beyond.
|
||||||
|
|
||||||
- [Global Internet Governance and International Human Rights - Whose Rights, Whose Interpretations?](https://www-npa.lip6.fr/gig-arts/conference/) 4/13-14, Nicosia ([Program](https://pbs.twimg.com/media/FOhpFlaXsAUADnq?format%3Djpg%26name%3Dlarge))
|
- [Global Internet Governance and International Human Rights - Whose Rights, Whose Interpretations?](https://www-npa.lip6.fr/gig-arts/conference/) 4/13-14, Nicosia ([Program](https://pbs.twimg.com/media/FOhpFlaXsAUADnq?format=jpg&name=large))
|
||||||
- [Techno-legal Challenges in Digital Identity Infrastructures: the Example of Self Sovereign Identities](https://www-npa.lip6.fr/gig-arts/conference/gig-arts-2022/abstracts/) Alexandra Giannopoulou, University of Amsterdam, Netherlands and Ioannis Krontiris, Homo Digitalis, Greece
|
- [Techno-legal Challenges in Digital Identity Infrastructures: the Example of Self Sovereign Identities](https://www-npa.lip6.fr/gig-arts/conference/gig-arts-2022/abstracts/) Alexandra Giannopoulou, University of Amsterdam, Netherlands and Ioannis Krontiris, Homo Digitalis, Greece
|
||||||
The question this article will try to answer is: are self sovereign digital identity solutions suitable for ensuring data sovereignty and individual empowerment? To answer this question, we will address challenges emerging from both the technological architectures and the applicable institutional and normative frameworks
|
The question this article will try to answer is: are self sovereign digital identity solutions suitable for ensuring data sovereignty and individual empowerment? To answer this question, we will address challenges emerging from both the technological architectures and the applicable institutional and normative frameworks
|
||||||
- [Registration Open for OpenID Foundation Workshop at Google](https://openid.net/2022/03/22/registration-open-for-openid-foundation-workshop-at-google-monday-april-25-2022/) April 25 ([Registration](https://www.eventbrite.com/e/openid-foundation-workshop-monday-april-25-2022-tickets-304150210467)
|
- [Registration Open for OpenID Foundation Workshop at Google](https://openid.net/2022/03/22/registration-open-for-openid-foundation-workshop-at-google-monday-april-25-2022/) April 25 ([Registration](https://www.eventbrite.com/e/openid-foundation-workshop-monday-april-25-2022-tickets-304150210467)
|
||||||
@ -776,15 +776,15 @@ Mike Vesey, CEO of IdRamp, has been selected to speak about “Verifiable Cred
|
|||||||
- [ID4Africa](https://id4africa.com/) Marrakesh, Morocco 6/15-16
|
- [ID4Africa](https://id4africa.com/) Marrakesh, Morocco 6/15-16
|
||||||
- Kaliya and other community members will be there.
|
- Kaliya and other community members will be there.
|
||||||
|
|
||||||
* [Travel & Hospitality Biometrics Online Summit](https://web.cvent.com/event/20454161-8e78-4ae6-bc85-df7aa59a037b/summary?RefId%3Dpr) 5/28 FindBiometrics ([register](https://www.cvent.com/d/nmqy8c)
|
* [Travel & Hospitality Biometrics Online Summit](https://web.cvent.com/event/20454161-8e78-4ae6-bc85-df7aa59a037b/summary?RefId=pr) 5/28 FindBiometrics ([register](https://www.cvent.com/d/nmqy8c)
|
||||||
|
|
||||||
- [MEF CONNECTS Personal Data & Identity](https://mobileecosystemforum.com/events_/mef-connects-personal-data-identity/) 5/10-11 Mobile Ecosystem Forum ([Kaliya](http://www.identitywoman.net/) will be there both days)
|
- [MEF CONNECTS Personal Data & Identity](https://mobileecosystemforum.com/events_/mef-connects-personal-data-identity/) 5/10-11 Mobile Ecosystem Forum ([Kaliya](http://www.identitywoman.net/) will be there both days)
|
||||||
- [European Identity & Cloud Conference celebrates its 15th edition](https://www.kuppingercole.com/events/eic2022/blog/european-identity-cloud-conference-celebrates-15th-edition&) Berlin - 5/10-13 ([Kaliya](http://www.identitywoman.net/) will be there 12-13)
|
- [European Identity & Cloud Conference celebrates its 15th edition](https://www.kuppingercole.com/events/eic2022/blog/european-identity-cloud-conference-celebrates-15th-edition&) Berlin - 5/10-13 ([Kaliya](http://www.identitywoman.net/) will be there 12-13)
|
||||||
- Kaliya thinking of hosting a social conversation in London likely on May 17th at NewsSpeak House - you can register on [eventbrite](https://www.eventbrite.com/e/conversation-with-kaliya-identity-woman-newspeak-house-tickets-334038557317).
|
- Kaliya thinking of hosting a social conversation in London likely on May 17th at NewsSpeak House - you can register on [eventbrite](https://www.eventbrite.com/e/conversation-with-kaliya-identity-woman-newspeak-house-tickets-334038557317).
|
||||||
- [Complex harms reduction through co-design of socio-technical systems in FinTech](https://wiki.trustoverip.org/display/HOME/Calendar%2Bof%2BToIP%2BMeetings) HXWG May 18th TOIP
|
- [Complex harms reduction through co-design of socio-technical systems in FinTech](https://wiki.trustoverip.org/display/HOME/Calendar+of+ToIP+Meetings) HXWG May 18th TOIP
|
||||||
- [Travel & Hospitality Biometrics Online Summit](https://web.cvent.com/event/20454161-8e78-4ae6-bc85-df7aa59a037b/summary?RefId%3Dpr) FindBiometrics 5/28 ([register](https://www.cvent.com/d/nmqy8c)
|
- [Travel & Hospitality Biometrics Online Summit](https://web.cvent.com/event/20454161-8e78-4ae6-bc85-df7aa59a037b/summary?RefId=pr) FindBiometrics 5/28 ([register](https://www.cvent.com/d/nmqy8c)
|
||||||
- [ID4Africa](https://id4africa.com/) Marrakesh, Morocco 6/15-16 (Kaliya will be there in advance of the conference starting June 11 through the 17th)
|
- [ID4Africa](https://id4africa.com/) Marrakesh, Morocco 6/15-16 (Kaliya will be there in advance of the conference starting June 11 through the 17th)
|
||||||
- [IAM and SSI: A Combined Approach to Digital Identity](https://wiki.trustoverip.org/display/HOME/Calendar%2Bof%2BToIP%2BMeetings) June 15th, 2022 TOIP
|
- [IAM and SSI: A Combined Approach to Digital Identity](https://wiki.trustoverip.org/display/HOME/Calendar+of+ToIP+Meetings) June 15th, 2022 TOIP
|
||||||
- Kaliya hosting a meetup in the Netherlands on June 18th details TBD - [reach out](https://identitywoman.net/contact/) if you want to help her organize it.
|
- Kaliya hosting a meetup in the Netherlands on June 18th details TBD - [reach out](https://identitywoman.net/contact/) if you want to help her organize it.
|
||||||
- [Identiverse](https://identiverse.com/) in Denver June 21-24, 2022 (Kaliya is talking there)
|
- [Identiverse](https://identiverse.com/) in Denver June 21-24, 2022 (Kaliya is talking there)
|
||||||
- [Thoughtful Biometrics Workshop](http://www.thoughtfulbiometrics.org/) - Mid July virtual several days over 2 weeks.
|
- [Thoughtful Biometrics Workshop](http://www.thoughtfulbiometrics.org/) - Mid July virtual several days over 2 weeks.
|
||||||
@ -792,20 +792,20 @@ Mike Vesey, CEO of IdRamp, has been selected to speak about “Verifiable Cred
|
|||||||
- [Internet Identity Workshop](http://www.internetidentityworkshop.com/) #35 November 14-16, Mountain View California
|
- [Internet Identity Workshop](http://www.internetidentityworkshop.com/) #35 November 14-16, Mountain View California
|
||||||
|
|
||||||
- [Conversation with Kaliya Young "Identity Woman" at Newspeak House](https://www.eventbrite.com/e/conversation-with-kaliya-identity-woman-at-newspeak-house-tickets-334038557317) 5/17 (with Kaliya Tonight in London!)
|
- [Conversation with Kaliya Young "Identity Woman" at Newspeak House](https://www.eventbrite.com/e/conversation-with-kaliya-identity-woman-at-newspeak-house-tickets-334038557317) 5/17 (with Kaliya Tonight in London!)
|
||||||
- [Complex harms reduction through co-design of socio-technical systems in FinTech](https://wiki.trustoverip.org/display/HOME/Calendar%2Bof%2BToIP%2BMeetings) HXWG 5/18 TOIP
|
- [Complex harms reduction through co-design of socio-technical systems in FinTech](https://wiki.trustoverip.org/display/HOME/Calendar+of+ToIP+Meetings) HXWG 5/18 TOIP
|
||||||
- [AGENCY - Complex harms reduction through co-design of socio-technical systems](https://www.linkedin.com/events/agency-complexharmsreductionthr6928095786891128832/) 5/19
|
- [AGENCY - Complex harms reduction through co-design of socio-technical systems](https://www.linkedin.com/events/agency-complexharmsreductionthr6928095786891128832/) 5/19
|
||||||
- [Travel & Hospitality Biometrics Online Summit](https://web.cvent.com/event/20454161-8e78-4ae6-bc85-df7aa59a037b/summary?RefId%3Dpr) FindBiometrics 5/28 ([register](https://www.cvent.com/d/nmqy8c)
|
- [Travel & Hospitality Biometrics Online Summit](https://web.cvent.com/event/20454161-8e78-4ae6-bc85-df7aa59a037b/summary?RefId=pr) FindBiometrics 5/28 ([register](https://www.cvent.com/d/nmqy8c)
|
||||||
- [ID4Africa](https://id4africa.com/) Marrakesh 6/15-16 (Kaliya will be there in advance)
|
- [ID4Africa](https://id4africa.com/) Marrakesh 6/15-16 (Kaliya will be there in advance)
|
||||||
- [IAM and SSI: A Combined Approach to Digital Identity](https://wiki.trustoverip.org/display/HOME/Calendar%2Bof%2BToIP%2BMeetings) 6/15 TOIP
|
- [IAM and SSI: A Combined Approach to Digital Identity](https://wiki.trustoverip.org/display/HOME/Calendar+of+ToIP+Meetings) 6/15 TOIP
|
||||||
- Kaliya hosting a meetup in the Netherlands on 6/18 (details TBD) [reach out if interested](https://identitywoman.net/contact/)
|
- Kaliya hosting a meetup in the Netherlands on 6/18 (details TBD) [reach out if interested](https://identitywoman.net/contact/)
|
||||||
- [Identiverse](https://identiverse.com/) in Denver 6/21-24 (Kaliya is talking there)
|
- [Identiverse](https://identiverse.com/) in Denver 6/21-24 (Kaliya is talking there)
|
||||||
- [Thoughtful Biometrics Workshop](http://www.thoughtfulbiometrics.org/) - Mid July virtual
|
- [Thoughtful Biometrics Workshop](http://www.thoughtfulbiometrics.org/) - Mid July virtual
|
||||||
- [Decentralized Web Camp](https://dwebcamp.org/) 8/24-28 in Northern California (Kaliya’s attending & encouraging SSI folks to participate)
|
- [Decentralized Web Camp](https://dwebcamp.org/) 8/24-28 in Northern California (Kaliya’s attending & encouraging SSI folks to participate)
|
||||||
- [Internet Identity Workshop #35](http://www.internetidentityworkshop.com/) 11/14-16, Mountain View California
|
- [Internet Identity Workshop #35](http://www.internetidentityworkshop.com/) 11/14-16, Mountain View California
|
||||||
|
|
||||||
- [Travel & Hospitality Biometrics Online Summit](https://web.cvent.com/event/20454161-8e78-4ae6-bc85-df7aa59a037b/summary?RefId%3Dpr) FindBiometrics 5/28 ([register](https://www.cvent.com/d/nmqy8c))
|
- [Travel & Hospitality Biometrics Online Summit](https://web.cvent.com/event/20454161-8e78-4ae6-bc85-df7aa59a037b/summary?RefId=pr) FindBiometrics 5/28 ([register](https://www.cvent.com/d/nmqy8c))
|
||||||
- [ID4Africa](https://id4africa.com/) Marrakesh 6/15-16 (Kaliya will be there in advance)
|
- [ID4Africa](https://id4africa.com/) Marrakesh 6/15-16 (Kaliya will be there in advance)
|
||||||
- [IAM and SSI: A Combined Approach to Digital Identity](https://wiki.trustoverip.org/display/HOME/Calendar%2Bof%2BToIP%2BMeetings) 6/15 TOIP
|
- [IAM and SSI: A Combined Approach to Digital Identity](https://wiki.trustoverip.org/display/HOME/Calendar+of+ToIP+Meetings) 6/15 TOIP
|
||||||
- Kaliya hosting a meetup in the Netherlands on 6/18 (details TBD) [reach out if interested](https://identitywoman.net/contact/)
|
- Kaliya hosting a meetup in the Netherlands on 6/18 (details TBD) [reach out if interested](https://identitywoman.net/contact/)
|
||||||
- [Identiverse](https://identiverse.com/) in Denver 6/21-24 (Kaliya is talking there)
|
- [Identiverse](https://identiverse.com/) in Denver 6/21-24 (Kaliya is talking there)
|
||||||
- [Thoughtful Biometrics Workshop](http://www.thoughtfulbiometrics.org/) - Mid July virtual
|
- [Thoughtful Biometrics Workshop](http://www.thoughtfulbiometrics.org/) - Mid July virtual
|
||||||
@ -816,7 +816,7 @@ Mike Vesey, CEO of IdRamp, has been selected to speak about “Verifiable Cred
|
|||||||
* [Velocity Network is hosting a Membership Assembly July 13-14 in NYC](https://www.velocitynetwork.foundation/membership-general-assembly/) Velocity Network
|
* [Velocity Network is hosting a Membership Assembly July 13-14 in NYC](https://www.velocitynetwork.foundation/membership-general-assembly/) Velocity Network
|
||||||
|
|
||||||
- [ID4Africa](https://id4africa.com/) Marrakesh 6/15-16 (Kaliya will be there in advance)
|
- [ID4Africa](https://id4africa.com/) Marrakesh 6/15-16 (Kaliya will be there in advance)
|
||||||
- [IAM and SSI: A Combined Approach to Digital Identity](https://wiki.trustoverip.org/display/HOME/Calendar%2Bof%2BToIP%2BMeetings) 6/15 TOIP
|
- [IAM and SSI: A Combined Approach to Digital Identity](https://wiki.trustoverip.org/display/HOME/Calendar+of+ToIP+Meetings) 6/15 TOIP
|
||||||
- Kaliya hosting a meetup in the Netherlands on 6/18 (details TBD) [reach out if interested](https://identitywoman.net/contact/)
|
- Kaliya hosting a meetup in the Netherlands on 6/18 (details TBD) [reach out if interested](https://identitywoman.net/contact/)
|
||||||
- [Identiverse](https://identiverse.com/) in Denver 6/21-24 (Kaliya is talking there)
|
- [Identiverse](https://identiverse.com/) in Denver 6/21-24 (Kaliya is talking there)
|
||||||
- [Velocity Network is hosting a Membership Assembly July 13-14 in NYC](https://www.velocitynetwork.foundation/membership-general-assembly/)
|
- [Velocity Network is hosting a Membership Assembly July 13-14 in NYC](https://www.velocitynetwork.foundation/membership-general-assembly/)
|
||||||
@ -895,7 +895,7 @@ The AddOn for this Co-Located event is free. The highlight of this Mini-Summit
|
|||||||
|
|
||||||
Last week we had +35 of the leading and most innovative workforce tech vendors come together to discuss the trailblazing solutions for tomorrow’s workforce they develop on top of Velocity Network™, the Internet of Careers®.
|
Last week we had +35 of the leading and most innovative workforce tech vendors come together to discuss the trailblazing solutions for tomorrow’s workforce they develop on top of Velocity Network™, the Internet of Careers®.
|
||||||
|
|
||||||
* [Viky Manaila 💯• 3rd+ Digital Identity, Digital Signatures and PKI expert](https://www.linkedin.com/posts/viky-manaila-%25F0%259F%2592%25AF-0690aa1_webinar-eidas-20-latest-news-progress-activity-6953362351144275968-nQpC/) Linkedin
|
* [Viky Manaila 💯• 3rd+ Digital Identity, Digital Signatures and PKI expert](https://www.linkedin.com/posts/viky-manaila-%F0%9F%92%AF-0690aa1_webinar-eidas-20-latest-news-progress-activity-6953362351144275968-nQpC/) Linkedin
|
||||||
|
|
||||||
38 countries, 6 continents, more than 250 participants to the #webinar co-hosted by Intesi Group S.p.A. and Avast yesterday. THANK YOU to each and everyone!
|
38 countries, 6 continents, more than 250 participants to the #webinar co-hosted by Intesi Group S.p.A. and Avast yesterday. THANK YOU to each and everyone!
|
||||||
|
|
||||||
@ -915,7 +915,7 @@ The Summit is about real business – not about the next hype. The event is cent
|
|||||||
- [Trust Over IP Summit (co-located with Linux Foundation’s Open Source Summit Europe)](https://trustoverip.org/summit/) Dublin, Ireland 9/14
|
- [Trust Over IP Summit (co-located with Linux Foundation’s Open Source Summit Europe)](https://trustoverip.org/summit/) Dublin, Ireland 9/14
|
||||||
|
|
||||||
- [Intro to Web3 with Misha da Vinci](https://lu.ma/q7rw3f4q) 8/26
|
- [Intro to Web3 with Misha da Vinci](https://lu.ma/q7rw3f4q) 8/26
|
||||||
- [Exploring digital identity for a Decentralized Society — a RadicalxChange Open Space (virtual) unConference](https://www.eventbrite.com/e/exploring-digital-identity-for-decentralized-societies-tickets-385643188157?mc_cid%3D2321939e22%26mc_eid%3DUNIQID) 8/16+18 Kaliya & Heidi are helping
|
- [Exploring digital identity for a Decentralized Society — a RadicalxChange Open Space (virtual) unConference](https://www.eventbrite.com/e/exploring-digital-identity-for-decentralized-societies-tickets-385643188157?mc_cid=2321939e22&mc_eid=UNIQID) 8/16+18 Kaliya & Heidi are helping
|
||||||
- [Decentralized Web Camp](https://dwebcamp.org/) 8/24-28 in Northern California (Kaliya’s attending & encouraging SSI folks to participate)
|
- [Decentralized Web Camp](https://dwebcamp.org/) 8/24-28 in Northern California (Kaliya’s attending & encouraging SSI folks to participate)
|
||||||
- [The Next Era of Trust and Data Exchange](http://blackseachain.com) 9/1-2 Martin Donevski, Tim Schlagenhaufer (DIF member Bosch discusses their SSI implementation)
|
- [The Next Era of Trust and Data Exchange](http://blackseachain.com) 9/1-2 Martin Donevski, Tim Schlagenhaufer (DIF member Bosch discusses their SSI implementation)
|
||||||
- [Hyperledger Global Forum](https://events.linuxfoundation.org/hyperledger-global-forum/) 9/12-14 Kaliya is attending.
|
- [Hyperledger Global Forum](https://events.linuxfoundation.org/hyperledger-global-forum/) 9/12-14 Kaliya is attending.
|
||||||
@ -930,7 +930,7 @@ The Summit is about real business – not about the next hype. The event is cent
|
|||||||
|
|
||||||
Co-located at the Conventions Center Dublin the same week is the Linux Foundation [Open Source Summit Europe](https://events.linuxfoundation.org/open-source-summit-europe/) September 13th to 16th. ToIP will be having a co-located [Trust Over IP Summit 2022](https://trustoverip.org/summit/), during the OSS. So when you [register for OSS](https://events.linuxfoundation.org/open-source-summit-europe/register/), don’t forget to add on the free registration for ToIP Summit 2022.
|
Co-located at the Conventions Center Dublin the same week is the Linux Foundation [Open Source Summit Europe](https://events.linuxfoundation.org/open-source-summit-europe/) September 13th to 16th. ToIP will be having a co-located [Trust Over IP Summit 2022](https://trustoverip.org/summit/), during the OSS. So when you [register for OSS](https://events.linuxfoundation.org/open-source-summit-europe/register/), don’t forget to add on the free registration for ToIP Summit 2022.
|
||||||
|
|
||||||
* [DIDComm V 2: Implications on the future of the internet](https://www.meetup.com/indicio-identity-community/events/287904731/?_xtd%3DgatlbWFpbF9jbGlja9oAJGMwMTA3M2Q3LTExZDAtNGE1NC1iYjg0LTg1ZjBiMDM2YzRlZg) 8/30
|
* [DIDComm V 2: Implications on the future of the internet](https://www.meetup.com/indicio-identity-community/events/287904731/?_xtd=gatlbWFpbF9jbGlja9oAJGMwMTA3M2Q3LTExZDAtNGE1NC1iYjg0LTg1ZjBiMDM2YzRlZg) 8/30
|
||||||
|
|
||||||
|
|
||||||
* [North Capital Forum](https://www.northcapitalforum.com/) by [@USMexicoFound](https://twitter.com/USMexicoFound), Sep 28-30 in Mexico City! Transmute’s Thursday afternoon panel will be "Trust and Transparency in #Trade: A Verifiably Digital Disruption"
|
* [North Capital Forum](https://www.northcapitalforum.com/) by [@USMexicoFound](https://twitter.com/USMexicoFound), Sep 28-30 in Mexico City! Transmute’s Thursday afternoon panel will be "Trust and Transparency in #Trade: A Verifiably Digital Disruption"
|
||||||
@ -988,26 +988,26 @@ The Sandbox, Level 39., One Canada Square, Canary Wharf, London E14 5AB
|
|||||||
* [Velocity NYC Assembly ’22 - Full Program](https://www.velocitynetwork.foundation/wp-content/uploads/2022/07/Velocity-July-2022-General-Assembly-NYC-Program-Ver-4.pdf)
|
* [Velocity NYC Assembly ’22 - Full Program](https://www.velocitynetwork.foundation/wp-content/uploads/2022/07/Velocity-July-2022-General-Assembly-NYC-Program-Ver-4.pdf)
|
||||||
|
|
||||||
- [NYC Assembly ’22: Global Data Interoperability – Making the Future of Work, Work](https://www.velocitynetwork.foundation/nyc-assembly-22-global-data-interoperability-making-the-future-of-work-work) ([Slide Deck](https://www.velocitynetwork.foundation/wp-content/uploads/2022/08/VNF-General-Assembly-Global-Data-Interoperability-Ver-1.pdf)
|
- [NYC Assembly ’22: Global Data Interoperability – Making the Future of Work, Work](https://www.velocitynetwork.foundation/nyc-assembly-22-global-data-interoperability-making-the-future-of-work-work) ([Slide Deck](https://www.velocitynetwork.foundation/wp-content/uploads/2022/08/VNF-General-Assembly-Global-Data-Interoperability-Ver-1.pdf)
|
||||||
- [NYC Assembly ’22: Types of Credentials Portable via Velocity Network](https://www.velocitynetwork.foundation/nyc-assembly-22-types-of-credentials-portable-via-velocity-network) - Rick Barfoot, Chief Operating Officer at Joynd; Standards Committee Chair, Velocity Network Foundation. ([Slide Deck](https://www.velocitynetwork.foundation/wp-content/uploads/2022/08/NYC-General-Assembly-Standards-Committee-20220710.pdf)) ([youtube](https://www.youtube.com/watch?v%3DSmCmvK2J0rY)
|
- [NYC Assembly ’22: Types of Credentials Portable via Velocity Network](https://www.velocitynetwork.foundation/nyc-assembly-22-types-of-credentials-portable-via-velocity-network) - Rick Barfoot, Chief Operating Officer at Joynd; Standards Committee Chair, Velocity Network Foundation. ([Slide Deck](https://www.velocitynetwork.foundation/wp-content/uploads/2022/08/NYC-General-Assembly-Standards-Committee-20220710.pdf)) ([youtube](https://www.youtube.com/watch?v=SmCmvK2J0rY)
|
||||||
- [NYC Assembly ’22: De-mystify Verifications – Product design decisions and considerations](https://www.velocitynetwork.foundation/nyc-assembly-22-de-mystify-verifications-product-design-decisions-and-considerations) - Etan Bernstein, Head of Ecosystem, Velocity Network Foundation ([Slide Deck](https://www.velocitynetwork.foundation/wp-content/uploads/2022/08/Demistifying-Inspection-v3.pdf)
|
- [NYC Assembly ’22: De-mystify Verifications – Product design decisions and considerations](https://www.velocitynetwork.foundation/nyc-assembly-22-de-mystify-verifications-product-design-decisions-and-considerations) - Etan Bernstein, Head of Ecosystem, Velocity Network Foundation ([Slide Deck](https://www.velocitynetwork.foundation/wp-content/uploads/2022/08/Demistifying-Inspection-v3.pdf)
|
||||||
- [NYC Assembly ’22: Understanding Compliance (Privacy, FCRA)](https://www.velocitynetwork.foundation/nyc-assembly-22-understanding-compliance-privacy-fcra) - Dror Gurevich, Founder and CEO, Velocity Network Foundation ([Slide Deck](https://www.velocitynetwork.foundation/wp-content/uploads/2022/08/VNF-General-Assembly-Understanding-Compliance-Draft-Ver-1.pdf)
|
- [NYC Assembly ’22: Understanding Compliance (Privacy, FCRA)](https://www.velocitynetwork.foundation/nyc-assembly-22-understanding-compliance-privacy-fcra) - Dror Gurevich, Founder and CEO, Velocity Network Foundation ([Slide Deck](https://www.velocitynetwork.foundation/wp-content/uploads/2022/08/VNF-General-Assembly-Understanding-Compliance-Draft-Ver-1.pdf)
|
||||||
- [NYC Assembly ’22: Velocity Network™ adoption by US Healthcare & EU Banking Clusters](https://www.velocitynetwork.foundation/nyc-assembly-22-velocity-network-adoption-by-us-healthcare-eu-banking-clusters) - Etan Bernstein, Head of Ecosystem, Velocity Network Foundation ([Slide Deck](https://www.velocitynetwork.foundation/wp-content/uploads/2022/08/Cluster-Panel-v1.pdf)
|
- [NYC Assembly ’22: Velocity Network™ adoption by US Healthcare & EU Banking Clusters](https://www.velocitynetwork.foundation/nyc-assembly-22-velocity-network-adoption-by-us-healthcare-eu-banking-clusters) - Etan Bernstein, Head of Ecosystem, Velocity Network Foundation ([Slide Deck](https://www.velocitynetwork.foundation/wp-content/uploads/2022/08/Cluster-Panel-v1.pdf)
|
||||||
- [NYC Assembly ’22: Building a Wallet? Start Here](https://www.velocitynetwork.foundation/nyc-assembly-22-building-a-wallet-start-here) - Wallet developers presenting their work on top of Velocity Network™. Trailblazers Stage, hosted by Dror Gurevich, Founder and CEO, Velocity Network Foundation. ([youtube](https://www.youtube.com/watch?v%3D_0Wf5ZsFFTs))
|
- [NYC Assembly ’22: Building a Wallet? Start Here](https://www.velocitynetwork.foundation/nyc-assembly-22-building-a-wallet-start-here) - Wallet developers presenting their work on top of Velocity Network™. Trailblazers Stage, hosted by Dror Gurevich, Founder and CEO, Velocity Network Foundation. ([youtube](https://www.youtube.com/watch?v=_0Wf5ZsFFTs))
|
||||||
- [NYC Assembly ’22: Becoming a Node Operator on Mainnet](https://www.velocitynetwork.foundation/nyc-assembly-22-becoming-a-node-operator-on-mainnet) - Andres Olave, Head of Tech, Velocity Network Foundation ([Slide Deck](https://www.velocitynetwork.foundation/wp-content/uploads/2022/08/VNF-General-Assembly-NodeOperators.pdf)) ([youtube](https://www.youtube.com/watch?v%3DM2sTR7lD-7U)
|
- [NYC Assembly ’22: Becoming a Node Operator on Mainnet](https://www.velocitynetwork.foundation/nyc-assembly-22-becoming-a-node-operator-on-mainnet) - Andres Olave, Head of Tech, Velocity Network Foundation ([Slide Deck](https://www.velocitynetwork.foundation/wp-content/uploads/2022/08/VNF-General-Assembly-NodeOperators.pdf)) ([youtube](https://www.youtube.com/watch?v=M2sTR7lD-7U)
|
||||||
- [NYC Assembly ’22: Network Integrity – Can We Trust Verifiable Career Credentials?](https://www.velocitynetwork.foundation/nyc-assembly-22-network-integrity-can-we-trust-verifiable-career-credentials) - Thought leaders panel hosted by Dror Gurevich, Founder and CEO, Velocity Network Foundation. ([youtube](https://www.youtube.com/watch?v%3DPsC54_1q4dc)
|
- [NYC Assembly ’22: Network Integrity – Can We Trust Verifiable Career Credentials?](https://www.velocitynetwork.foundation/nyc-assembly-22-network-integrity-can-we-trust-verifiable-career-credentials) - Thought leaders panel hosted by Dror Gurevich, Founder and CEO, Velocity Network Foundation. ([youtube](https://www.youtube.com/watch?v=PsC54_1q4dc)
|
||||||
- [NYC Assembly ’22: Trailblazers Stage – Members Showcasing (Part 2)](https://www.velocitynetwork.foundation/nyc-assembly-22-trailblazers-stage-members-showcasing-2) - Trailblazers Stage, hosted by Etan Bernstein, Head of Ecosystem, Velocity Network Foundation. Vendors presenting: YOTI, SAP, Greenlight Credentials, Domain-U, Cisive. ([youtube](https://www.youtube.com/watch?v%3Dl9bYRs_ILGc)
|
- [NYC Assembly ’22: Trailblazers Stage – Members Showcasing (Part 2)](https://www.velocitynetwork.foundation/nyc-assembly-22-trailblazers-stage-members-showcasing-2) - Trailblazers Stage, hosted by Etan Bernstein, Head of Ecosystem, Velocity Network Foundation. Vendors presenting: YOTI, SAP, Greenlight Credentials, Domain-U, Cisive. ([youtube](https://www.youtube.com/watch?v=l9bYRs_ILGc)
|
||||||
- [NYC Assembly ’22: Monetizing on Velocity Network](https://www.velocitynetwork.foundation/nyc-assembly-22-monetizing-on-velocity-network) ([Slide Deck](https://www.velocitynetwork.foundation/wp-content/uploads/2022/08/VNF-General-Assembly-Monetizing-on-Velocity-Network-Draft-Ver-1.pdf)) - James Owens, CEO and President, Cisive; Payment and Rewards Committee Chair, Velocity Network Foundation. ([youtube](https://www.youtube.com/watch?v%3Dn9CzF9BCAQ0))
|
- [NYC Assembly ’22: Monetizing on Velocity Network](https://www.velocitynetwork.foundation/nyc-assembly-22-monetizing-on-velocity-network) ([Slide Deck](https://www.velocitynetwork.foundation/wp-content/uploads/2022/08/VNF-General-Assembly-Monetizing-on-Velocity-Network-Draft-Ver-1.pdf)) - James Owens, CEO and President, Cisive; Payment and Rewards Committee Chair, Velocity Network Foundation. ([youtube](https://www.youtube.com/watch?v=n9CzF9BCAQ0))
|
||||||
- [NYC Assembly ’22: De-mystify Issuing – Product design decisions and considerations](https://www.velocitynetwork.foundation/nyc-assembly-22-de-mystify-issuing-product-design-decisions-and-considerations) - Etan Bernstein, Head of Ecosystem, Velocity Network Foundation. ([Slide Deck](https://www.velocitynetwork.foundation/wp-content/uploads/2022/08/Demistifying-Issuing-v3.pdf)) ([youtube](https://www.youtube.com/watch?v%3DPTqbX6-opGo)
|
- [NYC Assembly ’22: De-mystify Issuing – Product design decisions and considerations](https://www.velocitynetwork.foundation/nyc-assembly-22-de-mystify-issuing-product-design-decisions-and-considerations) - Etan Bernstein, Head of Ecosystem, Velocity Network Foundation. ([Slide Deck](https://www.velocitynetwork.foundation/wp-content/uploads/2022/08/Demistifying-Issuing-v3.pdf)) ([youtube](https://www.youtube.com/watch?v=PTqbX6-opGo)
|
||||||
- [NYC Assembly ’22: The Future of Learning Think Tank – Rethinking the Ways We Learn and Recognize Talent with Verifiable Career Credentials](https://www.velocitynetwork.foundation/nyc-assembly-22-the-future-of-learning-think-tank-rethinking-the-ways-we-learn-and-recognize-talent-with-verifiable-career-credentials) - Panel hosted by Rob Nail, formerly CEO and Co-founder of Singularity University. Currently advisor, Board Member and angel investor. ([youtube](https://www.youtube.com/watch?v%3DrNHkV_LeWAM)
|
- [NYC Assembly ’22: The Future of Learning Think Tank – Rethinking the Ways We Learn and Recognize Talent with Verifiable Career Credentials](https://www.velocitynetwork.foundation/nyc-assembly-22-the-future-of-learning-think-tank-rethinking-the-ways-we-learn-and-recognize-talent-with-verifiable-career-credentials) - Panel hosted by Rob Nail, formerly CEO and Co-founder of Singularity University. Currently advisor, Board Member and angel investor. ([youtube](https://www.youtube.com/watch?v=rNHkV_LeWAM)
|
||||||
- [NYC Assembly ’22: Future Thinkers – Creating a More Equitable World of Work with Verifiable Career Credentials](https://www.velocitynetwork.foundation/nyc-assembly-22-future-thinkers-creating-a-more-equitable-world-of-work-with-verifiable-career-credentials) - Thought leaders panel hosted by Jean-Marc Laouchez, Velocity Network Foundation, Board Member; Korn Ferry Institute President, Leadership U for Humanity. ([youtube](https://www.youtube.com/watch?v%3DTVueol15QrQ))
|
- [NYC Assembly ’22: Future Thinkers – Creating a More Equitable World of Work with Verifiable Career Credentials](https://www.velocitynetwork.foundation/nyc-assembly-22-future-thinkers-creating-a-more-equitable-world-of-work-with-verifiable-career-credentials) - Thought leaders panel hosted by Jean-Marc Laouchez, Velocity Network Foundation, Board Member; Korn Ferry Institute President, Leadership U for Humanity. ([youtube](https://www.youtube.com/watch?v=TVueol15QrQ))
|
||||||
Elizebeth Varghese: Global Leader – HR Transformation, IBM; Global Top 100 Influencer. Author: [Block]Chain Reaction: The Future of How We Live and Work. Dror Gurevich: Founder and CEO, Velocity Network Foundation. Kelly Cure: Co-Founder & Head of Growth at Skillful.ly
|
Elizebeth Varghese: Global Leader – HR Transformation, IBM; Global Top 100 Influencer. Author: [Block]Chain Reaction: The Future of How We Live and Work. Dror Gurevich: Founder and CEO, Velocity Network Foundation. Kelly Cure: Co-Founder & Head of Growth at Skillful.ly
|
||||||
- [NYC Assembly ’22: Future Thinkers – Decentralizing credentialing is probably the best thing that can happen to regulated industries](https://www.velocitynetwork.foundation/future-thinkers-decentralizing-credentialing-is-probably-the-best-thing-that-can-happen-to-regulated-industries) - Thought leaders panel hosted by John White, Co-founder and Chairman of the Board, Propel America. ([youtube](https://www.youtube.com/watch?v%3DjHJFf6oKfaA)
|
- [NYC Assembly ’22: Future Thinkers – Decentralizing credentialing is probably the best thing that can happen to regulated industries](https://www.velocitynetwork.foundation/future-thinkers-decentralizing-credentialing-is-probably-the-best-thing-that-can-happen-to-regulated-industries) - Thought leaders panel hosted by John White, Co-founder and Chairman of the Board, Propel America. ([youtube](https://www.youtube.com/watch?v=jHJFf6oKfaA)
|
||||||
Panelists: Veronica Conforme, Formerly COO, NYC Department of Education. Currently CEO at UP Education Network. David Levin, former CEO and President at McGraw-Hill Education. Currently entrepreneur and chairman of multiple companies.
|
Panelists: Veronica Conforme, Formerly COO, NYC Department of Education. Currently CEO at UP Education Network. David Levin, former CEO and President at McGraw-Hill Education. Currently entrepreneur and chairman of multiple companies.
|
||||||
- [NYC Assembly ’22: Trailblazers Stage – Members Showcasing](https://www.velocitynetwork.foundation/nyc-assembly-22-trailblazers-stage-members-showcasing) - Trailblazers Stage, hosted by Justin Pozmanter, Ecosystem Development and Community Management, Velocity Network Foundation. Vendors presenting: AON, Jobvite, Randstad, Randa Solutions, Walt.ID ([youtube](https://www.youtube.com/watch?v%3Dc-mfQ2FZ_h4)
|
- [NYC Assembly ’22: Trailblazers Stage – Members Showcasing](https://www.velocitynetwork.foundation/nyc-assembly-22-trailblazers-stage-members-showcasing) - Trailblazers Stage, hosted by Justin Pozmanter, Ecosystem Development and Community Management, Velocity Network Foundation. Vendors presenting: AON, Jobvite, Randstad, Randa Solutions, Walt.ID ([youtube](https://www.youtube.com/watch?v=c-mfQ2FZ_h4)
|
||||||
- [NYC Assembly ’22: Future Thinkers – Unleashing the Full Potential of the Job Market With Verifiable Career Credentials](https://www.velocitynetwork.foundation/nyc-assembly-22-future-thinkers-unleashing-the-full-potential-of-the-job-market-with-verifiable-career-credentials) Thought leaders panel led by John Healy, VP, World Employment Confederation. ([youtube](https://www.youtube.com/watch?v%3DGHx8QlHnI4A)
|
- [NYC Assembly ’22: Future Thinkers – Unleashing the Full Potential of the Job Market With Verifiable Career Credentials](https://www.velocitynetwork.foundation/nyc-assembly-22-future-thinkers-unleashing-the-full-potential-of-the-job-market-with-verifiable-career-credentials) Thought leaders panel led by John Healy, VP, World Employment Confederation. ([youtube](https://www.youtube.com/watch?v=GHx8QlHnI4A)
|
||||||
Elizebeth Varghese: Global Leader – HR Transformation, IBM; Global Top 100 Influencer. Author: [Block]Chain Reaction: The Future of How We Live and Work Jeff Schwartz: Senior Advisor Future of Work, Deloitte; Adjunct Professor Columbia Business School. Author: Work Disrupted Dan Beck: Co-Founder, COO, Utmost
|
Elizebeth Varghese: Global Leader – HR Transformation, IBM; Global Top 100 Influencer. Author: [Block]Chain Reaction: The Future of How We Live and Work Jeff Schwartz: Senior Advisor Future of Work, Deloitte; Adjunct Professor Columbia Business School. Author: Work Disrupted Dan Beck: Co-Founder, COO, Utmost
|
||||||
- [NYC Assembly ’22: Velocity Network™ Mainnet Is Live!](https://www.velocitynetwork.foundation/nyc-assembly-22-velocity-network-mainet-is-live) - Andres Olave, Head of Tech, Velocity Network Foundation ([youtube](https://www.youtube.com/watch?v%3D4wtcQhHeL4M)
|
- [NYC Assembly ’22: Velocity Network™ Mainnet Is Live!](https://www.velocitynetwork.foundation/nyc-assembly-22-velocity-network-mainet-is-live) - Andres Olave, Head of Tech, Velocity Network Foundation ([youtube](https://www.youtube.com/watch?v=4wtcQhHeL4M)
|
||||||
- [NYC Assembly ’22: Labor Market’s Defining Moment Is Now!](https://www.velocitynetwork.foundation/nyc-assembly-22-labor-markets-defining-moment-is-now) - Dror Gurevich, Founder and CEO, Velocity Network Foundation. ([Slide Deck](https://www.velocitynetwork.foundation/wp-content/uploads/2022/08/VNF-General-Assembly-Labor-Market-Defining-Moment-Ver-1.pdf)) ([youtube](https://www.youtube.com/watch?v%3DW9nAWPcMGbc)
|
- [NYC Assembly ’22: Labor Market’s Defining Moment Is Now!](https://www.velocitynetwork.foundation/nyc-assembly-22-labor-markets-defining-moment-is-now) - Dror Gurevich, Founder and CEO, Velocity Network Foundation. ([Slide Deck](https://www.velocitynetwork.foundation/wp-content/uploads/2022/08/VNF-General-Assembly-Labor-Market-Defining-Moment-Ver-1.pdf)) ([youtube](https://www.youtube.com/watch?v=W9nAWPcMGbc)
|
||||||
|
|
||||||
IIW Prices go up October 10th - and we will likely sell out again - get your tickets.
|
IIW Prices go up October 10th - and we will likely sell out again - get your tickets.
|
||||||
|
|
||||||
|
@ -99,7 +99,7 @@ Credential Exchange Infrastructures based on open standards are emerging with wo
|
|||||||
* [A Consortium Blockchain-Based Secure and Trusted Electronic Portfolio Management Scheme](https://www.mdpi.com/1424-8220/22/3/1271) Mpyana Mwamba Merlec, Mainul Islam,Youn Kyu Lee, Hoh Peter
|
* [A Consortium Blockchain-Based Secure and Trusted Electronic Portfolio Management Scheme](https://www.mdpi.com/1424-8220/22/3/1271) Mpyana Mwamba Merlec, Mainul Islam,Youn Kyu Lee, Hoh Peter
|
||||||
|
|
||||||
This system guarantees the authenticity and integrity of user credentials and e-portfolio data. Decentralized identifiers and verifiable credentials are used for user profile identification, authentication, and authorization, whereas verifiable claims are used for e-portfolio credential proof authentication and verification. We have designed and implemented a prototype of the proposed scheme using a Quorum consortium blockchain network. Based on the evaluations, our solution is feasible, secure, and privacy-preserving. It offers excellent performance.
|
This system guarantees the authenticity and integrity of user credentials and e-portfolio data. Decentralized identifiers and verifiable credentials are used for user profile identification, authentication, and authorization, whereas verifiable claims are used for e-portfolio credential proof authentication and verification. We have designed and implemented a prototype of the proposed scheme using a Quorum consortium blockchain network. Based on the evaluations, our solution is feasible, secure, and privacy-preserving. It offers excellent performance.
|
||||||
* [How to protect privacy in a datafied society? A presentation of multiple legal and conceptual approaches](https://link.springer.com/article/10.1007%252Fs13347-022-00497-4) Oskar J. Gstrein & Anne Beaulieu
|
* [How to protect privacy in a datafied society? A presentation of multiple legal and conceptual approaches](https://link.springer.com/article/10.1007/s13347-022-00497-4) Oskar J. Gstrein & Anne Beaulieu
|
||||||
|
|
||||||
serves as a key resource to analyse the usefulness of the approaches in the context of the increasing datafication of both private and public spheres.
|
serves as a key resource to analyse the usefulness of the approaches in the context of the increasing datafication of both private and public spheres.
|
||||||
|
|
||||||
@ -120,7 +120,7 @@ The paper provides an overview of the SSI properties, focusing on an in-depth an
|
|||||||
|
|
||||||
We follow a rigorous design science research approach to create a framework that utilizes SSI in the KYC process, deriving nascent design principles that theorize on blockchain’s role for SSI.
|
We follow a rigorous design science research approach to create a framework that utilizes SSI in the KYC process, deriving nascent design principles that theorize on blockchain’s role for SSI.
|
||||||
|
|
||||||
* [Decentralized and Self-Sovereign Identity: Systematic Mapping Study](https://ieeexplore.ieee.org/document/9558805?cmid%3D296e8b0d-a3de-4224-a628-b90d777ae944) Špela Čučko Muhamed Turkanović
|
* [Decentralized and Self-Sovereign Identity: Systematic Mapping Study](https://ieeexplore.ieee.org/document/9558805?cmid=296e8b0d-a3de-4224-a628-b90d777ae944) Špela Čučko Muhamed Turkanović
|
||||||
|
|
||||||
The results suggest that validation research and solution proposals prevail, addressing decentralized identity in a general matter. Papers mainly propose systems/solutions, architectures, and frameworks, focusing on authentication, security, privacy, and trust, while there are hardly any studies researching usability, user experience, patterns, and good practices.
|
The results suggest that validation research and solution proposals prevail, addressing decentralized identity in a general matter. Papers mainly propose systems/solutions, architectures, and frameworks, focusing on authentication, security, privacy, and trust, while there are hardly any studies researching usability, user experience, patterns, and good practices.
|
||||||
|
|
||||||
@ -135,7 +135,7 @@ The results suggest that validation research and solution proposals prevail, add
|
|||||||
|
|
||||||
The unified theory of acceptance and use of technology was extended to examine the potential influence of the self sovereign identity principles and trustworthyness, along with other factors such as percieved usefulness and perceived ease of use, on the adoption of this new approach to online identity
|
The unified theory of acceptance and use of technology was extended to examine the potential influence of the self sovereign identity principles and trustworthyness, along with other factors such as percieved usefulness and perceived ease of use, on the adoption of this new approach to online identity
|
||||||
|
|
||||||
* [Industry-Grade Self-Sovereign Identity](https://repository.tudelft.nl/islandora/object/uuid%253A32711378-2f6f-452e-b65c-1866c471e934) Pouwelse, De Kok, Kuipers, F.A.
|
* [Industry-Grade Self-Sovereign Identity](https://repository.tudelft.nl/islandora/object/uuid%3A32711378-2f6f-452e-b65c-1866c471e934) Pouwelse, De Kok, Kuipers, F.A.
|
||||||
|
|
||||||
This research has been performed in pursuit of the MSc Computer Science at Delft University of Technology in collaboration with the Dutch National Office for Identity Data (RvIG), part of the Dutch Ministry of the Interior and Kingdom Relations. Self-Sovereign Identity (SSI) is a relatively new concept part of a movement aspiring to create a universal identity layer for the Internet. SSI aims to put the citizen at the centre of their data, making them the sovereign over their digital presence.
|
This research has been performed in pursuit of the MSc Computer Science at Delft University of Technology in collaboration with the Dutch National Office for Identity Data (RvIG), part of the Dutch Ministry of the Interior and Kingdom Relations. Self-Sovereign Identity (SSI) is a relatively new concept part of a movement aspiring to create a universal identity layer for the Internet. SSI aims to put the citizen at the centre of their data, making them the sovereign over their digital presence.
|
||||||
|
|
||||||
@ -152,7 +152,7 @@ This article is primarily interested in the affordances of the technology as a p
|
|||||||
|
|
||||||
* [Case Study: Gravity digital ID solution propels Dignified Identities in Cash Programing (DIGID) Project in Kenya](https://medium.com/gravity-earth/case-study-gravity-digital-id-solution-propels-dignified-identities-in-cash-programing-digid-e527bc55ae43)
|
* [Case Study: Gravity digital ID solution propels Dignified Identities in Cash Programing (DIGID) Project in Kenya](https://medium.com/gravity-earth/case-study-gravity-digital-id-solution-propels-dignified-identities-in-cash-programing-digid-e527bc55ae43)
|
||||||
|
|
||||||
The Gravity Platform was developed through direct inputs from all types of end-users through [user consultations](https://static1.squarespace.com/static/5b75620445776e4b290c0d96/t/603d14c5775eed6fbde2883b/1614615753940/%255BFinal%255D%2BDIGID%2BKenya%2BUser%2BConsultation%2BReport.pdf) with local communities and NGO staff.
|
The Gravity Platform was developed through direct inputs from all types of end-users through [user consultations](https://static1.squarespace.com/static/5b75620445776e4b290c0d96/t/603d14c5775eed6fbde2883b/1614615753940/%5BFinal%5D+DIGID+Kenya+User+Consultation+Report.pdf) with local communities and NGO staff.
|
||||||
|
|
||||||
* [Sovrin: An Identity Metasystem for Self-Sovereign Identity](https://www.frontiersin.org/articles/10.3389/fbloc.2021.626726/full) Phillip J. Windley
|
* [Sovrin: An Identity Metasystem for Self-Sovereign Identity](https://www.frontiersin.org/articles/10.3389/fbloc.2021.626726/full) Phillip J. Windley
|
||||||
|
|
||||||
@ -220,7 +220,7 @@ Goal: In a country where 60% of the vulnerable citizens, not having an identity
|
|||||||
|
|
||||||
The present project is aimed to deliberate upon the feasibility, benefits and privacy concerns associated with different identity models. All possible decentralized identity models shall be audited in light of data protection, immutability, revocation, accountability, auditability, speed and users control over the personally identifiable information...... and the one that promises self-sovereign identity, shall be worked out with associated bare-bone framework.
|
The present project is aimed to deliberate upon the feasibility, benefits and privacy concerns associated with different identity models. All possible decentralized identity models shall be audited in light of data protection, immutability, revocation, accountability, auditability, speed and users control over the personally identifiable information...... and the one that promises self-sovereign identity, shall be worked out with associated bare-bone framework.
|
||||||
|
|
||||||
* [Self-sovereign Identity: A Conceptual Framework & Ecosystem Design](http://liu.diva-portal.org/smash/record.jsf?pid%3Ddiva2%253A1668615%26dswid%3D816) Tripi, Gabriele, Department of Science and Technology. Linköping University.
|
* [Self-sovereign Identity: A Conceptual Framework & Ecosystem Design](http://liu.diva-portal.org/smash/record.jsf?pid=diva2%3A1668615&dswid=816) Tripi, Gabriele, Department of Science and Technology. Linköping University.
|
||||||
|
|
||||||
the findings are presented as two parts of a whole, the first being the conceptual framework that describes a set of essential factors that an ecosystem requires in order to fulfill the goals of self-sovereign identity and interoperability. The second is a set of visualizations of how the framework can be used to design systems and interactions, inside and between the systems, to create an ecosystem.
|
the findings are presented as two parts of a whole, the first being the conceptual framework that describes a set of essential factors that an ecosystem requires in order to fulfill the goals of self-sovereign identity and interoperability. The second is a set of visualizations of how the framework can be used to design systems and interactions, inside and between the systems, to create an ecosystem.
|
||||||
|
|
||||||
@ -332,7 +332,7 @@ The proposed holistic framework aims to ignite new ideas and discussions related
|
|||||||
|
|
||||||
To address trust and privacy issues in IOBP, this paper presents a Blockchain-based Self-Sovereign Identity (SSI) approach. The SSI concept is combined with a registry proof smart contract to provide an efficient privacy-preserving solution. The proposed approach is applied to the pharmaceutical supply chain case study and implemented on the Ethereum Blockchain
|
To address trust and privacy issues in IOBP, this paper presents a Blockchain-based Self-Sovereign Identity (SSI) approach. The SSI concept is combined with a registry proof smart contract to provide an efficient privacy-preserving solution. The proposed approach is applied to the pharmaceutical supply chain case study and implemented on the Ethereum Blockchain
|
||||||
|
|
||||||
* [Towards the Classification of Self-Sovereign Identity Properties](https://zenodo.org/record/7034818%23.Yy5ndOzMJ_R) Zenodo
|
* [Towards the Classification of Self-Sovereign Identity Properties](https://zenodo.org/record/7034818#.Yy5ndOzMJ_R) Zenodo
|
||||||
|
|
||||||
focusing on an in-depth analysis, furthermore, presenting a comprehensive collection of SSI properties that are important for the implementation of the SSI system. In addition, it explores the general SSI process flow, and highlights the steps in which individual properties are important. After the initial purification and classification phase, we then validated properties among experts in the field of Decentralized and Self-Sovereign Identity Management using an online questionnaire, which resulted in a final set of classified and verified SSI properties.
|
focusing on an in-depth analysis, furthermore, presenting a comprehensive collection of SSI properties that are important for the implementation of the SSI system. In addition, it explores the general SSI process flow, and highlights the steps in which individual properties are important. After the initial purification and classification phase, we then validated properties among experts in the field of Decentralized and Self-Sovereign Identity Management using an online questionnaire, which resulted in a final set of classified and verified SSI properties.
|
||||||
|
|
||||||
@ -350,7 +350,7 @@ We describe the two main ZKP VCs schemes based on classical cryptographic assump
|
|||||||
|
|
||||||
In this paper, we describe the SSI framework architecture as well as possible use cases across domains like healthcare, finance, retail, and government. The paper also contrasts SSI and its decentralized architecture with the current widely adopted model of Public Key Infrastructure (PKI).
|
In this paper, we describe the SSI framework architecture as well as possible use cases across domains like healthcare, finance, retail, and government. The paper also contrasts SSI and its decentralized architecture with the current widely adopted model of Public Key Infrastructure (PKI).
|
||||||
|
|
||||||
* [Legal Identity, Development and Democracy in Northern Europe](https://papers.ssrn.com/sol3/papers.cfm?abstract_id%3D4110873) Jaap van der Straaten :: SSRN
|
* [Legal Identity, Development and Democracy in Northern Europe](https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4110873) Jaap van der Straaten :: SSRN
|
||||||
|
|
||||||
In circles of identity management scholars and practitioners, the general consensus is that the region of northern Europe provides a good practice example [...] Out of the eighteen countries included in northern Europe in this paper, one has no national ID; another denies it has, and seven countries only have a voluntary ID. The extent of national ID coverage is hardly known. Also in the European Union, only six in ten countries have a mandatory ID. It does not matter.
|
In circles of identity management scholars and practitioners, the general consensus is that the region of northern Europe provides a good practice example [...] Out of the eighteen countries included in northern Europe in this paper, one has no national ID; another denies it has, and seven countries only have a voluntary ID. The extent of national ID coverage is hardly known. Also in the European Union, only six in ten countries have a mandatory ID. It does not matter.
|
||||||
|
|
||||||
|
@ -1,8 +1,5 @@
|
|||||||
# Anoncreds
|
# Anoncreds
|
||||||
|
|
||||||
* [AnonCreds Indy-Pendence](https://blog.cheqd.io/anoncreds-indy-pendence-4946367469d4) Cheqd
|
|
||||||
|
|
||||||
Part 1: Decoupling the reliance on Hyperledger Indy and creating more extensible AnonCreds Objects with cheqd.
|
|
||||||
- [Anonymous Credential Part 1: Brief Overview and History](https://medium.com/finema/anonymous-credential-part-1-brief-overview-and-history-c6679034c914)
|
- [Anonymous Credential Part 1: Brief Overview and History](https://medium.com/finema/anonymous-credential-part-1-brief-overview-and-history-c6679034c914)
|
||||||
> An anonymous credential (Anoncred), which is also known as an attribute-based credential (ABC), is a concept for a digital credential that provides a credential holder maximal privacy and an ability to selectively disclose their personal information.
|
> An anonymous credential (Anoncred), which is also known as an attribute-based credential (ABC), is a concept for a digital credential that provides a credential holder maximal privacy and an ability to selectively disclose their personal information.
|
||||||
- [Anonymous Credential Part 2: Selective Disclosure and CL Signature](https://medium.com/finema/anonymous-credential-part-2-selective-disclosure-and-cl-signature-b904a93a1565)
|
- [Anonymous Credential Part 2: Selective Disclosure and CL Signature](https://medium.com/finema/anonymous-credential-part-2-selective-disclosure-and-cl-signature-b904a93a1565)
|
||||||
|
@ -50,11 +50,11 @@ The Hyperledger Mentorship Program is a structured hands-on learning opportunity
|
|||||||
|
|
||||||
Hyperledger Aries – Aries Bifold – Aries-Framework-Javascript – React Native
|
Hyperledger Aries – Aries Bifold – Aries-Framework-Javascript – React Native
|
||||||
|
|
||||||
Slides: [https://docs.google.com/presentation/d/1XKrgnUUF7nZI-bOqWMKijKZHWThsIjFkVkfPIVy3gkY/edit?usp=sharing](https://docs.google.com/presentation/d/1XKrgnUUF7nZI-bOqWMKijKZHWThsIjFkVkfPIVy3gkY/edit?usp%3Dsharing)
|
Slides: [https://docs.google.com/presentation/d/1XKrgnUUF7nZI-bOqWMKijKZHWThsIjFkVkfPIVy3gkY/edit?usp=sharing](https://docs.google.com/presentation/d/1XKrgnUUF7nZI-bOqWMKijKZHWThsIjFkVkfPIVy3gkY/edit?usp=sharing)
|
||||||
|
|
||||||
Repo: [https://github.com/hyperledger/aries-mobile-agent-react-native](https://github.com/hyperledger/aries-mobile-agent-react-native)
|
Repo: [https://github.com/hyperledger/aries-mobile-agent-react-native](https://github.com/hyperledger/aries-mobile-agent-react-native)
|
||||||
|
|
||||||
User Group Meetings: [https://wiki.hyperledger.org/display/ARIES/Aries+Bifold+User+Group+Meetings](https://wiki.hyperledger.org/display/ARIES/Aries%2BBifold%2BUser%2BGroup%2BMeetings)
|
User Group Meetings: [https://wiki.hyperledger.org/display/ARIES/Aries+Bifold+User+Group+Meetings](https://wiki.hyperledger.org/display/ARIES/Aries+Bifold+User+Group+Meetings)
|
||||||
|
|
||||||
Rocketchat: [https://chat.hyperledger.org/channel/aries-bifold](https://chat.hyperledger.org/channel/aries-bifold)
|
Rocketchat: [https://chat.hyperledger.org/channel/aries-bifold](https://chat.hyperledger.org/channel/aries-bifold)
|
||||||
|
|
||||||
@ -105,7 +105,3 @@ Using the [self-sovereign identity](https://www.ledgerinsights.com/tag/self-sove
|
|||||||
> The Indicio Mediator Agent is the company’s latest contribution to Aries Cloud Agent Python (ACA-Py) and the Aries Toolbox. Following RFC 0211: Mediator Coordination, Indicio built on the work of the open-source community to make mediation interoperable and vendor agnostic. This expands the opportunities for mobile wallet implementations.
|
> The Indicio Mediator Agent is the company’s latest contribution to Aries Cloud Agent Python (ACA-Py) and the Aries Toolbox. Following RFC 0211: Mediator Coordination, Indicio built on the work of the open-source community to make mediation interoperable and vendor agnostic. This expands the opportunities for mobile wallet implementations.
|
||||||
> *[...]*
|
> *[...]*
|
||||||
> Indicio.tech is committed to becoming a resource-hub for decentralized identity, providing enterprise-grade open source tools to its clients and to the community. This includes the [Private Networks](https://indicio.tech/private-networks/) build service, the [Indicio TestNet](https://indicio.tech/indicio-testnet/), and a variety of customizable [training programs](https://indicio.tech/training-packages/).
|
> Indicio.tech is committed to becoming a resource-hub for decentralized identity, providing enterprise-grade open source tools to its clients and to the community. This includes the [Private Networks](https://indicio.tech/private-networks/) build service, the [Indicio TestNet](https://indicio.tech/indicio-testnet/), and a variety of customizable [training programs](https://indicio.tech/training-packages/).
|
||||||
* [Aries Mobile Agent SDK for Google Flutter](https://ayanworks.medium.com/announcing-arnima-fl-open-source-aries-flutter-mobile-agent-sdk-d3483744ffc8)
|
|
||||||
> Exactly a year ago in Jan 2020, we announced ARNIMA — first ever Aries React Native Mobile Agent SDK that we made open source for the Self-Sovereign Identity ecosystem.
|
|
||||||
>
|
|
||||||
> [...] We are very excited to announce [one more small open-source contribution](https://github.com/ayanworks/ARNIMA-flutter-sdk) from AyanWorks to the Aries community.
|
|
||||||
|
@ -33,7 +33,7 @@ The current credential verification process relies on transaction processing by
|
|||||||
|
|
||||||
* [Building a Hyperledger Indy Network](https://iiw.idcommons.net/1H/_Building_a_Hyperledger_Indy_Network_-_Questions,_discussion,_etc.) - Questions, discussion, etc. by Lynn Bendixsen
|
* [Building a Hyperledger Indy Network](https://iiw.idcommons.net/1H/_Building_a_Hyperledger_Indy_Network_-_Questions,_discussion,_etc.) - Questions, discussion, etc. by Lynn Bendixsen
|
||||||
|
|
||||||
Slides link: [https://docs.google.com/presentation/d/1sUG4297GiRcUdu4aqQnc0Op0LMhbwiqy9LIAINHfSFQ/edit#slide=id.p1](https://docs.google.com/presentation/d/1sUG4297GiRcUdu4aqQnc0Op0LMhbwiqy9LIAINHfSFQ/edit%23slide%3Did.p1)
|
Slides link: [https://docs.google.com/presentation/d/1sUG4297GiRcUdu4aqQnc0Op0LMhbwiqy9LIAINHfSFQ/edit#slide=id.p1](https://docs.google.com/presentation/d/1sUG4297GiRcUdu4aqQnc0Op0LMhbwiqy9LIAINHfSFQ/edit#slide=id.p1)
|
||||||
|
|
||||||
Links to guides for creating your own Indy network:
|
Links to guides for creating your own Indy network:
|
||||||
|
|
||||||
@ -46,7 +46,7 @@ Technical details (implementation):
|
|||||||
* [https://docs.google.com/document/d/1Tg4dAEtC78TxG9AsIby_CfpbeOicK_YMKznSQOvtIVU/edit](https://docs.google.com/document/d/1Tg4dAEtC78TxG9AsIby_CfpbeOicK_YMKznSQOvtIVU/edit)
|
* [https://docs.google.com/document/d/1Tg4dAEtC78TxG9AsIby_CfpbeOicK_YMKznSQOvtIVU/edit](https://docs.google.com/document/d/1Tg4dAEtC78TxG9AsIby_CfpbeOicK_YMKznSQOvtIVU/edit)
|
||||||
* [https://northernblock.io/products/ssi-enterprise-cloud/](https://northernblock.io/products/ssi-enterprise-cloud/). In this video, we will demonstrate how to create new Verifiable Credentials with custom schemas using the NB Orbit enterprise app. Once the credential schema is created and the attribute fields specified, the enterprise user can then publish a credential definition to whatever root of trust they are using, in our case a Hyperledger Indy network.
|
* [https://northernblock.io/products/ssi-enterprise-cloud/](https://northernblock.io/products/ssi-enterprise-cloud/). In this video, we will demonstrate how to create new Verifiable Credentials with custom schemas using the NB Orbit enterprise app. Once the credential schema is created and the attribute fields specified, the enterprise user can then publish a credential definition to whatever root of trust they are using, in our case a Hyperledger Indy network.
|
||||||
|
|
||||||
* [How to Create New Verifiable Credentials with Customizable Schemas](https://www.youtube.com/watch?v%3D3JR6_tQYhgk)
|
* [How to Create New Verifiable Credentials with Customizable Schemas](https://www.youtube.com/watch?v=3JR6_tQYhgk)
|
||||||
> In this video, we will demonstrate how to create new Verifiable Credentials with custom schemas using the NB Orbit enterprise app.
|
> In this video, we will demonstrate how to create new Verifiable Credentials with custom schemas using the NB Orbit enterprise app.
|
||||||
>
|
>
|
||||||
> Once the credential schema is created and the attribute fields specified, the enterprise user can then publish a credential definition to whatever root of trust they are using, in our case a Hyperledger Indy network.
|
> Once the credential schema is created and the attribute fields specified, the enterprise user can then publish a credential definition to whatever root of trust they are using, in our case a Hyperledger Indy network.
|
||||||
@ -80,7 +80,7 @@ As our approach evolves, we also remain keen to support open source solutions th
|
|||||||
|
|
||||||
* [IDunion Introduction and AMA (there will be another one tomorrow!)](https://iiw.idcommons.net/12D/_IDunion_Introduction_and_AMA_(there_will_be_another_one_tomorrow!)) by Andre Kudra + available IDunion crew!
|
* [IDunion Introduction and AMA (there will be another one tomorrow!)](https://iiw.idcommons.net/12D/_IDunion_Introduction_and_AMA_(there_will_be_another_one_tomorrow!)) by Andre Kudra + available IDunion crew!
|
||||||
|
|
||||||
* [IDunion](https://idunion.org/?lang%3Den) enables self-determined identities based on Self-Sovereign Identity (SSI) technologies Hyperledger Indy and Hyperledger Aries. The aim of the IDunion organisation is to create an open ecosystem for decentralised identity management, which can be used worldwide and is based on European values and regulations. IDunion is also a [project](https://www.digitale-technologien.de/DT/Redaktion/DE/Standardartikel/SchaufensterSichereDigIdentProjekte/Schaufensterprojekte/sdi-projekt_idunion.html) co-funded by the [German Federal Ministry of Economic Affairs (BMWi)](https://www.bmwi.de/Navigation/EN/Home/home.html) as part of the [Showcases Secure Digital Identities program](https://www.digitale-technologien.de/DT/Navigation/DE/ProgrammeProjekte/AktuelleTechnologieprogramme/Sichere_Digitale_Identitaeten/sichere_digitale_ident.html). We gave an introduction covering
|
* [IDunion](https://idunion.org/?lang=en) enables self-determined identities based on Self-Sovereign Identity (SSI) technologies Hyperledger Indy and Hyperledger Aries. The aim of the IDunion organisation is to create an open ecosystem for decentralised identity management, which can be used worldwide and is based on European values and regulations. IDunion is also a [project](https://www.digitale-technologien.de/DT/Redaktion/DE/Standardartikel/SchaufensterSichereDigIdentProjekte/Schaufensterprojekte/sdi-projekt_idunion.html) co-funded by the [German Federal Ministry of Economic Affairs (BMWi)](https://www.bmwi.de/Navigation/EN/Home/home.html) as part of the [Showcases Secure Digital Identities program](https://www.digitale-technologien.de/DT/Navigation/DE/ProgrammeProjekte/AktuelleTechnologieprogramme/Sichere_Digitale_Identitaeten/sichere_digitale_ident.html). We gave an introduction covering
|
||||||
|
|
||||||
- The IDunion consortium consists of 37 partners - other major partners have already signaled interest in participating
|
- The IDunion consortium consists of 37 partners - other major partners have already signaled interest in participating
|
||||||
- Our solution is enabled by the distributed ledger technology (DLT) and the concept of self-sovereign identities (SSI)
|
- Our solution is enabled by the distributed ledger technology (DLT) and the concept of self-sovereign identities (SSI)
|
||||||
@ -111,7 +111,7 @@ Some interesting points
|
|||||||
|
|
||||||
Links:
|
Links:
|
||||||
|
|
||||||
DEMO: [https://www.youtube.com/watch?v=09-LOHPTHWs](https://www.youtube.com/watch?v%3D09-LOHPTHWs)
|
DEMO: [https://www.youtube.com/watch?v=09-LOHPTHWs](https://www.youtube.com/watch?v=09-LOHPTHWs)
|
||||||
|
|
||||||
Connect with Us: [https://chat.hyperledger.org/channel/business-partner-agent](https://chat.hyperledger.org/channel/business-partner-agent)
|
Connect with Us: [https://chat.hyperledger.org/channel/business-partner-agent](https://chat.hyperledger.org/channel/business-partner-agent)
|
||||||
|
|
||||||
@ -144,10 +144,10 @@ With the groundwork complete, networks and agent frameworks now need to incorpor
|
|||||||
|
|
||||||
* [An automatized Identity and Access Management system for IoT combining SSI and smart contracts](https://arxiv.org/pdf/2201.00231.pdf) Montassar Naghmouchi, Hella Kaffel, and Maryline Laurent
|
* [An automatized Identity and Access Management system for IoT combining SSI and smart contracts](https://arxiv.org/pdf/2201.00231.pdf) Montassar Naghmouchi, Hella Kaffel, and Maryline Laurent
|
||||||
|
|
||||||
This paper proposes a blockchain-based identity and access management system for IoT – specifically smart vehicles- as an example of use-case, showing two interoperable blockchains, Ethereum and Hyperledger Indy, and a self-sovereign * [Hyperledger Identity Screencast: Social Recovery for Passwords and Secrets](https://www.youtube.com/watch?v%3D1c05mFuEQ5s)
|
This paper proposes a blockchain-based identity and access management system for IoT – specifically smart vehicles- as an example of use-case, showing two interoperable blockchains, Ethereum and Hyperledger Indy, and a self-sovereign * [Hyperledger Identity Screencast: Social Recovery for Passwords and Secrets](https://www.youtube.com/watch?v=1c05mFuEQ5s)
|
||||||
|
|
||||||
A demonstration of using social recovery for things like recovery passwords of self-sovereign identity digital wallets. The website [http://passguardian.com](https://www.youtube.com/redirect?event%3Dvideo_description%26redir_token%3DQUFFLUhqbnFXWC1vZEVSZS11Ynl1ZGpBRk1uMUN6VnhnUXxBQ3Jtc0tuRjRPbmFSOEVqU1FNSEJDMml0WXYzUjlmRUdyZk5lVWJSc2p1QnFHV0pMZzNfVlBpNVJ0UGZvY2pEVUlzTFA1LWJlQUU0Q190akpyQndJWmU3bDZranNJVUZxZi1JX2pJb2I1SEtpRXB0cjhCQWNNdw%26q%3Dhttp%253A%252F%252Fpassguardian.com) is used to show how a secret can be encoded and distributed as shards, and then later some of the shards combined to restore the secret. This video is part of a [Linux Foundation course on Hyperledger Identity](https://training.linuxfoundation.org/training/introduction-to-hyperledger-sovereign-identity-blockchain-solutions-indy-aries-and-ursa/), published on edX.
|
A demonstration of using social recovery for things like recovery passwords of self-sovereign identity digital wallets. The website [http://passguardian.com](https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbnFXWC1vZEVSZS11Ynl1ZGpBRk1uMUN6VnhnUXxBQ3Jtc0tuRjRPbmFSOEVqU1FNSEJDMml0WXYzUjlmRUdyZk5lVWJSc2p1QnFHV0pMZzNfVlBpNVJ0UGZvY2pEVUlzTFA1LWJlQUU0Q190akpyQndJWmU3bDZranNJVUZxZi1JX2pJb2I1SEtpRXB0cjhCQWNNdw&q=http%3A//passguardian.com) is used to show how a secret can be encoded and distributed as shards, and then later some of the shards combined to restore the secret. This video is part of a [Linux Foundation course on Hyperledger Identity](https://training.linuxfoundation.org/training/introduction-to-hyperledger-sovereign-identity-blockchain-solutions-indy-aries-and-ursa/), published on edX.
|
||||||
identity model.
|
identity model.
|
||||||
* [Technical Design and Development of a Self-Sovereign Identity Management Platform for Patient-Centric Healthcare Using Blockchain Technology](https://blockchainhealthcaretoday.com/index.php/journal/article/view/196%23.Yjkahet3YEM.twitter) Blockchain Healthcare Today
|
* [Technical Design and Development of a Self-Sovereign Identity Management Platform for Patient-Centric Healthcare Using Blockchain Technology](https://blockchainhealthcaretoday.com/index.php/journal/article/view/196#.Yjkahet3YEM.twitter) Blockchain Healthcare Today
|
||||||
|
|
||||||
To manage patient’s self-sovereign identity, we leveraged the Hyperledger Indy blockchain framework to store patient’s decentralized identifiers (DIDs) and the schemas or format for each credential type. In contrast, the credentials containing patient data are stored “off-ledger” in each person’s wallet and accessible via a computer or smartphone. We used Hyperledger Aries as a middleware layer (API) to connect Hyperledger Indy with the front-end, which was developed using a JavaScript framework, ReactJS (Web Application) and React Native (iOS Application).
|
To manage patient’s self-sovereign identity, we leveraged the Hyperledger Indy blockchain framework to store patient’s decentralized identifiers (DIDs) and the schemas or format for each credential type. In contrast, the credentials containing patient data are stored “off-ledger” in each person’s wallet and accessible via a computer or smartphone. We used Hyperledger Aries as a middleware layer (API) to connect Hyperledger Indy with the front-end, which was developed using a JavaScript framework, ReactJS (Web Application) and React Native (iOS Application).
|
||||||
|
@ -23,7 +23,7 @@ SDTT is a tool from Google which began life as the [Rich Snippets Testing Tool](
|
|||||||
> Some possible architectural issues arise from using QR codes for confidential data, such as the fact that you’re actually transmitting the data (not a proof of the data), that the QRs tend to contain all of the data (not just a selection), and that there’s no way to rescind a QR or expire it. Those issues will have to be dealt with at a foundational level as we figure out what can safely be encoded as a QR — and more importantly how to offer restricted proofs rather than complete information.
|
> Some possible architectural issues arise from using QR codes for confidential data, such as the fact that you’re actually transmitting the data (not a proof of the data), that the QRs tend to contain all of the data (not just a selection), and that there’s no way to rescind a QR or expire it. Those issues will have to be dealt with at a foundational level as we figure out what can safely be encoded as a QR — and more importantly how to offer restricted proofs rather than complete information.
|
||||||
|
|
||||||
## Mobile Agent Dev
|
## Mobile Agent Dev
|
||||||
* [App Framework for Mobile Agent Dev - “No more forking”](https://iiw.idcommons.net/22A/_App_Framework_for_Mobile_Agent_Dev_-_%2522No_more_forking%2522) by Horacio Nunez
|
* [App Framework for Mobile Agent Dev - “No more forking”](https://iiw.idcommons.net/22A/_App_Framework_for_Mobile_Agent_Dev_-_%22No_more_forking%22) by Horacio Nunez
|
||||||
|
|
||||||
This session had the objective to present a solution to the problem of forking when developing new mobile agents. With the current starting kits available in the community it is very easy to start a path where it is almost impossible to retrofit updates to the kit back into our custom agent.
|
This session had the objective to present a solution to the problem of forking when developing new mobile agents. With the current starting kits available in the community it is very easy to start a path where it is almost impossible to retrofit updates to the kit back into our custom agent.
|
||||||
|
|
||||||
@ -120,7 +120,7 @@ We have documented the [functionality of SOyA](https://ownyourdata.github.io/soy
|
|||||||
|
|
||||||
|
|
||||||
### T-Systems
|
### T-Systems
|
||||||
* [Self Sovereign Identity (SSI) at T-Systems MMS: Interview mit Mujtaba Idrees, T-Systems MMS](https://www.youtube.com/watch?v%3DA311QHASy5Y) 7min video on YouTube
|
* [Self Sovereign Identity (SSI) at T-Systems MMS: Interview mit Mujtaba Idrees, T-Systems MMS](https://www.youtube.com/watch?v=A311QHASy5Y) 7min video on YouTube
|
||||||
|
|
||||||
► Dr. Ivan Gudymenko, Subject Matter Lead SSI and Confidential Computing, T-Systems MMS
|
► Dr. Ivan Gudymenko, Subject Matter Lead SSI and Confidential Computing, T-Systems MMS
|
||||||
|
|
||||||
|
@ -60,13 +60,13 @@ JSON-LD
|
|||||||
|
|
||||||
|
|
||||||
### Data Privacy Vocab
|
### Data Privacy Vocab
|
||||||
* [https://kantarainitiative.org/confluence/collector/pages.action?key=WA&src=sidebar-pages](https://kantarainitiative.org/confluence/collector/pages.action?key%3DWA%26src%3Dsidebar-pages)
|
* [https://kantarainitiative.org/confluence/collector/pages.action?key=WA&src=sidebar-pages](https://kantarainitiative.org/confluence/collector/pages.action?key=WA&src=sidebar-pages)
|
||||||
|
|
||||||
W3C Data Privacy Vocabulary Control
|
W3C Data Privacy Vocabulary Control
|
||||||
|
|
||||||
* [https://dpvcg.github.io/dpv/#Representative](https://dpvcg.github.io/dpv/%23Representative)
|
* [https://dpvcg.github.io/dpv/#Representative](https://dpvcg.github.io/dpv/#Representative)
|
||||||
|
|
||||||
* [Primer] [Data Privacy Vocabulary (DPV)](https://w3c.github.io/dpv/primer/%23core-taxonomy) w3c
|
* [Primer] [Data Privacy Vocabulary (DPV)](https://w3c.github.io/dpv/primer/#core-taxonomy) w3c
|
||||||
|
|
||||||
Call for Comments/Feedbacks for DPV v1.0 release
|
Call for Comments/Feedbacks for DPV v1.0 release
|
||||||
|
|
||||||
|
@ -4,7 +4,7 @@
|
|||||||
|
|
||||||
The diversity of our community is a plus. To begin a conversation on VC access controls, I suggest this short intro to the differences between OAuth 2.0 and GNAP:
|
The diversity of our community is a plus. To begin a conversation on VC access controls, I suggest this short intro to the differences between OAuth 2.0 and GNAP:
|
||||||
|
|
||||||
* [https://www.ietf.org/archive/id/draft-ietf-gnap-core-protocol-05.html#name-compared-to-oauth-20](https://www.ietf.org/archive/id/draft-ietf-gnap-core-protocol-05.html%23name-compared-to-oauth-20)
|
* [https://www.ietf.org/archive/id/draft-ietf-gnap-core-protocol-05.html#name-compared-to-oauth-20](https://www.ietf.org/archive/id/draft-ietf-gnap-core-protocol-05.html#name-compared-to-oauth-20)
|
||||||
|
|
||||||
My goal is to arrive at a shared understanding of what would be minimum needed to support both OAuth2 and GNAP for securing access to a VC.
|
My goal is to arrive at a shared understanding of what would be minimum needed to support both OAuth2 and GNAP for securing access to a VC.
|
||||||
|
|
||||||
@ -33,7 +33,7 @@ featuring folks from MSFT, GSM, and Michael Becker. The video looks at the range
|
|||||||
|
|
||||||
I was reading zcaps draft, as well as related work, mostly macaroons ([https://research.google/pubs/pub41892/](https://research.google/pubs/pub41892/).
|
I was reading zcaps draft, as well as related work, mostly macaroons ([https://research.google/pubs/pub41892/](https://research.google/pubs/pub41892/).
|
||||||
|
|
||||||
Something that I found confusing about capability documents is that they do not make clear the actions they concern. For example from this [](https://w3c-ccg.github.io/zcap-ld/%23example-1)[https://w3c-ccg.github.io/zcap-ld/#example-1](https://w3c-ccg.github.io/zcap-ld/%23example-1) it is not clear that this is a capability for "driving a car".
|
Something that I found confusing about capability documents is that they do not make clear the actions they concern. For example from this [](https://w3c-ccg.github.io/zcap-ld/#example-1)[https://w3c-ccg.github.io/zcap-ld/#example-1](https://w3c-ccg.github.io/zcap-ld/#example-1) it is not clear that this is a capability for "driving a car".
|
||||||
|
|
||||||
* [Manu Responds:](https://lists.w3.org/Archives/Public/public-credentials/2021Apr/0037.html)
|
* [Manu Responds:](https://lists.w3.org/Archives/Public/public-credentials/2021Apr/0037.html)
|
||||||
|
|
||||||
@ -49,7 +49,7 @@ The Encrypted Data Vault work uses zcaps, and it's there that we're trying
|
|||||||
|
|
||||||
hard to explain to developers how to use it:
|
hard to explain to developers how to use it:
|
||||||
|
|
||||||
* [https://identity.foundation/confidential-storage/#introduction](https://identity.foundation/confidential-storage/%23introduction)
|
* [https://identity.foundation/confidential-storage/#introduction](https://identity.foundation/confidential-storage/#introduction)
|
||||||
|
|
||||||
* [The "Verifiable" Economy [was RE: a few thoughts about zcaps]](https://lists.w3.org/Archives/Public/public-credentials/2021Apr/0047.html) Michael Herman (Trusted Digital Web) (Monday, 5 April)
|
* [The "Verifiable" Economy [was RE: a few thoughts about zcaps]](https://lists.w3.org/Archives/Public/public-credentials/2021Apr/0047.html) Michael Herman (Trusted Digital Web) (Monday, 5 April)
|
||||||
|
|
||||||
@ -78,4 +78,4 @@ these are the types of use cases that we think can be created and enabled across
|
|||||||
|
|
||||||
- [User Controlled Authorization Network](https://github.com/ucan-wg/spec/) model and how it contrasts with decentralized approaches
|
- [User Controlled Authorization Network](https://github.com/ucan-wg/spec/) model and how it contrasts with decentralized approaches
|
||||||
- APAC/ASEAN Community Call now a colloaborative initative between DIF and ToIP, launched Thursday 26th May 2022, kicking off with an IIW34 recap. ([Recording](https://us02web.zoom.us/rec/share/5FW6hVoZc1kVJiFL4NNCRZg7625h-1UsC1xCY8Mb7cLXQpO2yDW566woLoA5IZA.MUVPrrNr_k3PXxDl)
|
- APAC/ASEAN Community Call now a colloaborative initative between DIF and ToIP, launched Thursday 26th May 2022, kicking off with an IIW34 recap. ([Recording](https://us02web.zoom.us/rec/share/5FW6hVoZc1kVJiFL4NNCRZg7625h-1UsC1xCY8Mb7cLXQpO2yDW566woLoA5IZA.MUVPrrNr_k3PXxDl)
|
||||||
A couple weeks ago Amber Case came and spoke about “[Calm Technology](https://www.youtube.com/watch?v%3DNgyfa4_NuPI)” at the TOIP Human Experience Working Group ([HXWG](https://wiki.trustoverip.org/display/HOME/Human%2BExperience%2BWorking%2BGroup)
|
A couple weeks ago Amber Case came and spoke about “[Calm Technology](https://www.youtube.com/watch?v=Ngyfa4_NuPI)” at the TOIP Human Experience Working Group ([HXWG](https://wiki.trustoverip.org/display/HOME/Human+Experience+Working+Group)
|
||||||
|
@ -11,7 +11,7 @@
|
|||||||
|
|
||||||
* [https://speakerdeck.com/aaronpk/oauth-101-internet-identity-workshop-xxxi](https://speakerdeck.com/aaronpk/oauth-101-internet-identity-workshop-xxxi)
|
* [https://speakerdeck.com/aaronpk/oauth-101-internet-identity-workshop-xxxi](https://speakerdeck.com/aaronpk/oauth-101-internet-identity-workshop-xxxi)
|
||||||
|
|
||||||
* [How OAuth Works](https://www.youtube.com/watch?v%3Dg_aVPdwBTfw%26list%3DPLRyLn6THA5wN05b3qJ6N0OpL3YbritKI-) 12 videos
|
* [How OAuth Works](https://www.youtube.com/watch?v=g_aVPdwBTfw&list=PLRyLn6THA5wN05b3qJ6N0OpL3YbritKI-) 12 videos
|
||||||
|
|
||||||
* [TMI BFF: OAuth Token Mediating and session Information Backend For Frontend](https://iiw.idcommons.net/23B/_TMI_BFF:_OAuth_Token_Mediating_and_session_Information_Backend_For_Frontend) by Vittorio Bertocci & Brian Campbell (but mostly Vittorio)
|
* [TMI BFF: OAuth Token Mediating and session Information Backend For Frontend](https://iiw.idcommons.net/23B/_TMI_BFF:_OAuth_Token_Mediating_and_session_Information_Backend_For_Frontend) by Vittorio Bertocci & Brian Campbell (but mostly Vittorio)
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
# BBS
|
# BBS
|
||||||
|
|
||||||
* [What’s next for BBS+ LD-Proofs?](https://iiw.idcommons.net/13B/_What%2527s_next_for_BBS%252B_LD-Proofs%253F) by Brent Zundel
|
* [What’s next for BBS+ LD-Proofs?](https://iiw.idcommons.net/13B/_What%27s_next_for_BBS+_LD-Proofs%3F) by Brent Zundel
|
||||||
|
|
||||||
* [BBS+ Signatures 2020](https://w3c-ccg.github.io/ldp-bbs2020/)
|
* [BBS+ Signatures 2020](https://w3c-ccg.github.io/ldp-bbs2020/)
|
||||||
|
|
||||||
@ -51,9 +51,17 @@ Currently, everyone waiting for [#AIP2](https://twitter.com/hashtag/AIP2), whic
|
|||||||
|
|
||||||
The BBS+ signature will also soon be available in [Finema](https://finema.co/)’s Identity Wallet! We are excited to see how this technology will make an impact to the society in the coming years.
|
The BBS+ signature will also soon be available in [Finema](https://finema.co/)’s Identity Wallet! We are excited to see how this technology will make an impact to the society in the coming years.
|
||||||
|
|
||||||
- [aries-rfcs/0646-bbs-credentials#drawbacks](https://github.com/hyperledger/aries-rfcs/tree/main/features/0646-bbs-credentials%23drawbacks)
|
- [aries-rfcs/0646-bbs-credentials#drawbacks](https://github.com/hyperledger/aries-rfcs/tree/main/features/0646-bbs-credentials#drawbacks)
|
||||||
* [What BBS+ Means For Verifiable Credentials](https://www.youtube.com/watch?v%3DdXlRIrrb9f4) Evernym
|
* [What BBS+ Means For Verifiable Credentials](https://www.youtube.com/watch?v=dXlRIrrb9f4) Evernym
|
||||||
> In a recent Evernym blog post, [we discussed why BBS+ LD-Proofs](https://www.evernym.com/blog/bbs-verifiable-credentials/) are the privacy-preserving VC format that everyone should implement. In this webinar….
|
> In a recent Evernym blog post, [we discussed why BBS+ LD-Proofs](https://www.evernym.com/blog/bbs-verifiable-credentials/) are the privacy-preserving VC format that everyone should implement. In this webinar….
|
||||||
> - A brief history of verifiable credential formats, and how a lack of convergence makes scale and interoperability an ongoing challenge
|
> - A brief history of verifiable credential formats, and how a lack of convergence makes scale and interoperability an ongoing challenge
|
||||||
> - How BBS+ Signatures are the breakthrough that combine the best of the JSON-LD and ZKP formats, while still allowing for selective disclosure and non-trackability
|
> - How BBS+ Signatures are the breakthrough that combine the best of the JSON-LD and ZKP formats, while still allowing for selective disclosure and non-trackability
|
||||||
> - The path forward: What remains to be done to fully converge on the BBS+ format
|
> - The path forward: What remains to be done to fully converge on the BBS+ format
|
||||||
|
|
||||||
|
* [BBS+ Credential Exchange in Hyperledger Aries](https://iiw.idcommons.net/11E/_BBS+_Credential_Exchange_in_Hyperledger_Aries) [[presentation](https://iiw.animo.id)]
|
||||||
|
* [Advanced DIDComm Messaging](https://github.com/WebOfTrustInfo/rwot11-the-hague/blob/master/advance-readings/advanced-didcomm-messaging.md) By: Karim Stekelenburg (Animo Solutions) -- karim@animo.id Date: 18-07-2022 Version: 0.1
|
||||||
|
> in order for DIDComm to provide a potential replacement for commonly used chat protocols like WhatsApp (Extensible Messaging and Presence Protocol (XMPP)), Telegram (MTProto), or Signal (Signal Protocol), it needs to support modern chat features we use everyday
|
||||||
|
* [BBS+ Signatures 2020](https://w3c-ccg.github.io/ldp-bbs2020/)
|
||||||
|
|
||||||
|
- What’s next for BBS+ LD-Proofs?
|
||||||
|
- Implementation in Aries ([https://iiw.animo.id/](https://iiw.animo.id/), Used in SVIP Plugfest
|
||||||
|
@ -22,7 +22,7 @@
|
|||||||
* [Mike Jones shares](https://self-issued.info/?p=2136) that CBOR (Concise Binary Object Representation) is officially a [specification at IETF](https://www.rfc-editor.org/rfc/rfc8943) - woohoo! and it is a key part of [ISO’s mDL standard](https://www.iso.org/committee/45144.html) (date fields must use it).
|
* [Mike Jones shares](https://self-issued.info/?p=2136) that CBOR (Concise Binary Object Representation) is officially a [specification at IETF](https://www.rfc-editor.org/rfc/rfc8943) - woohoo! and it is a key part of [ISO’s mDL standard](https://www.iso.org/committee/45144.html) (date fields must use it).
|
||||||
> The Concise Binary Object Representation (CBOR), as specified in RFC 7049, is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation.
|
> The Concise Binary Object Representation (CBOR), as specified in RFC 7049, is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation.
|
||||||
* [https://youtu.be/fEBNGj377Vc](https://youtu.be/fEBNGj377Vc)
|
* [https://youtu.be/fEBNGj377Vc](https://youtu.be/fEBNGj377Vc)
|
||||||
Second demo video using a different potential flow: [https://www.youtube.com/watch?v=fEBNGj377Vc](https://www.youtube.com/watch?v%3DfEBNGj377Vc)
|
Second demo video using a different potential flow: [https://www.youtube.com/watch?v=fEBNGj377Vc](https://www.youtube.com/watch?v=fEBNGj377Vc)
|
||||||
|
|
||||||
Paper VC’s are hard to bring to parity with “digital VC’s”. The biggest issue is binding subject to holder and verifying that. There were also callouts on how do you prevent replication.
|
Paper VC’s are hard to bring to parity with “digital VC’s”. The biggest issue is binding subject to holder and verifying that. There were also callouts on how do you prevent replication.
|
||||||
|
|
||||||
|
@ -3,6 +3,6 @@
|
|||||||
* [JSON-LD Playground](https://json-ld.org/playground/)
|
* [JSON-LD Playground](https://json-ld.org/playground/)
|
||||||
> Play around with JSON-LD markup by typing out some JSON below and seeing what gets generated from it at the bottom of the page. Pick any of the examples below to get started.
|
> Play around with JSON-LD markup by typing out some JSON below and seeing what gets generated from it at the bottom of the page. Pick any of the examples below to get started.
|
||||||
>
|
>
|
||||||
> NOTE: The playground uses [jsonld.js](https://github.com/digitalbazaar/jsonld.js) which [conforms](https://github.com/digitalbazaar/jsonld.js%23conformance) to JSON-LD 1.1 [syntax](https://www.w3.org/TR/json-ld11/) ([errata](https://w3c.github.io/json-ld-syntax/errata/)), [API](https://www.w3.org/TR/json-ld11-api/) ([errata](https://w3c.github.io/json-ld-api/errata/)), and [framing](https://www.w3.org/TR/json-ld11-framing/) ([errata](https://w3c.github.io/json-ld-framing/errata/)). Also see the classic [JSON-LD 1.0 playground](https://json-ld.org/playground/1.0/) and the [RDF Distiller](http://rdf.greggkellogg.net/distiller).
|
> NOTE: The playground uses [jsonld.js](https://github.com/digitalbazaar/jsonld.js) which [conforms](https://github.com/digitalbazaar/jsonld.js#conformance) to JSON-LD 1.1 [syntax](https://www.w3.org/TR/json-ld11/) ([errata](https://w3c.github.io/json-ld-syntax/errata/)), [API](https://www.w3.org/TR/json-ld11-api/) ([errata](https://w3c.github.io/json-ld-api/errata/)), and [framing](https://www.w3.org/TR/json-ld11-framing/) ([errata](https://w3c.github.io/json-ld-framing/errata/)). Also see the classic [JSON-LD 1.0 playground](https://json-ld.org/playground/1.0/) and the [RDF Distiller](http://rdf.greggkellogg.net/distiller).
|
||||||
* [Mental Models of JSON-LD and what a "Document Loader" really does](https://www.youtube.com/watch?v=-yUbMDft5O0) Orie Steel
|
* [Mental Models of JSON-LD and what a "Document Loader" really does](https://www.youtube.com/watch?v=-yUbMDft5O0) Orie Steel
|
||||||
> and terms like "dereferencing" that trip up even highly experienced senior developers that show up late to the Linked-Data party and its open-world model (complete with its own security model based on different availability assumptions).
|
> and terms like "dereferencing" that trip up even highly experienced senior developers that show up late to the Linked-Data party and its open-world model (complete with its own security model based on different availability assumptions).
|
||||||
|
@ -4,7 +4,7 @@ published: false
|
|||||||
|
|
||||||
# KERI
|
# KERI
|
||||||
|
|
||||||
* [KERI Q&A basic introduction](https://iiw.idcommons.net/3K/_KERI_Q%2526A_basic_introduction) by Henk van Cann
|
* [KERI Q&A basic introduction](https://iiw.idcommons.net/3K/_KERI_Q%26A_basic_introduction) by Henk van Cann
|
||||||
|
|
||||||
This the link to the 20 minute introductory presentation in pdf:
|
This the link to the 20 minute introductory presentation in pdf:
|
||||||
- [decentralized-identity/keriox](https://github.com/decentralized-identity/keriox) github - Rust Implementation of the KERI Core Library
|
- [decentralized-identity/keriox](https://github.com/decentralized-identity/keriox) github - Rust Implementation of the KERI Core Library
|
||||||
@ -35,7 +35,7 @@ With my notes:
|
|||||||
|
|
||||||
* [https://blockchainbird.org/downloads/KERI-QA-introduction_notes.pdf](https://blockchainbird.org/downloads/KERI-QA-introduction_notes.pdf)
|
* [https://blockchainbird.org/downloads/KERI-QA-introduction_notes.pdf](https://blockchainbird.org/downloads/KERI-QA-introduction_notes.pdf)
|
||||||
|
|
||||||
* [GLEIF and KERI (Global Legal Entity Identifier Foundation)](https://iiw.idcommons.net/1K/_GLEIF_and_KERI_(Global_Legal_Entity_Identifier_Foundation)) by Karla McKenna ([notes](https://docs.google.com/document/d/1oX7FonXfw8vofgLCHEghJwbxb4Xbf9dCkhHg50W___I/edit?usp%3Dsharing)) ([recording](https://eu01web.zoom.us/rec/play/xHLkyi5GSKHsU2frR8JX9oXXS5X_rxwTi9TcFpKtveYI3UZjOaVszW5X-Ie8_n6kJkrsAa7S0SW9zhBx.LM3S0YgffGYhm7uc?continueMode%3Dtrue)
|
* [GLEIF and KERI (Global Legal Entity Identifier Foundation)](https://iiw.idcommons.net/1K/_GLEIF_and_KERI_(Global_Legal_Entity_Identifier_Foundation)) by Karla McKenna ([notes](https://docs.google.com/document/d/1oX7FonXfw8vofgLCHEghJwbxb4Xbf9dCkhHg50W___I/edit?usp=sharing)) ([recording](https://eu01web.zoom.us/rec/play/xHLkyi5GSKHsU2frR8JX9oXXS5X_rxwTi9TcFpKtveYI3UZjOaVszW5X-Ie8_n6kJkrsAa7S0SW9zhBx.LM3S0YgffGYhm7uc?continueMode=true)
|
||||||
|
|
||||||
* [LEI Digital Strategy](https://www.gleif.org/content/3-lei-solutions/6-gleifs-digital-strategy-for-the-lei/2021-02-09_lei-digital-strategy_v1.0-final.pdf)
|
* [LEI Digital Strategy](https://www.gleif.org/content/3-lei-solutions/6-gleifs-digital-strategy-for-the-lei/2021-02-09_lei-digital-strategy_v1.0-final.pdf)
|
||||||
|
|
||||||
@ -45,7 +45,7 @@ The Three KERI Security Sessions have the same set of Slides it just 3 hours to
|
|||||||
|
|
||||||
* [https://github.com/SmithSamuelM/Papers/blob/master/presentations/KERI_Overview.web.pdf](https://github.com/SmithSamuelM/Papers/blob/master/presentations/KERI_Overview.web.pdf)
|
* [https://github.com/SmithSamuelM/Papers/blob/master/presentations/KERI_Overview.web.pdf](https://github.com/SmithSamuelM/Papers/blob/master/presentations/KERI_Overview.web.pdf)
|
||||||
|
|
||||||
* [https://identity.foundation/keri/docs/Q-and-A-Security.html#part-two-security](https://identity.foundation/keri/docs/Q-and-A-Security.html%23part-two-security)
|
* [https://identity.foundation/keri/docs/Q-and-A-Security.html#part-two-security](https://identity.foundation/keri/docs/Q-and-A-Security.html#part-two-security)
|
||||||
|
|
||||||
### *Q: What are the security risks of KERI with regard to the identity protocol?
|
### *Q: What are the security risks of KERI with regard to the identity protocol?
|
||||||
|
|
||||||
@ -67,7 +67,7 @@ So private key management and protection is the root of your security in KERI.
|
|||||||
|
|
||||||
…you would be fundamentally arguing that you can record a singular, immutable linear event history more securely than Bitcoin, and I see nothing in KERI that would indicate that.
|
…you would be fundamentally arguing that you can record a singular, immutable linear event history more securely than Bitcoin, and I see nothing in KERI that would indicate that.
|
||||||
|
|
||||||
Read the answer to [this](https://identity.foundation/keri/docs/Q-and-A-Security.html%23keri-is-basically-a-series-of-pay2publickeyhash-transactions) first.
|
Read the answer to [this](https://identity.foundation/keri/docs/Q-and-A-Security.html#keri-is-basically-a-series-of-pay2publickeyhash-transactions) first.
|
||||||
|
|
||||||
If you read Szabo’s paper on threshold structures, you get security of the same type when ever you use a threshold structure, be it MFA, Multi-Sig, or Distributed consensus. They all are using a combination of multiple relatively weak attack surfaces that must be simulatenously compromised for a successful attack. So multiplying simulatneous weak surfaces = functional equivalent of a stronger attack surface. So when you look at KERI you see that the security is primarily due to cryptographic strength and the witnesses are not the primary source of security but merely secure one thing, that is the availability of the KEL for an identifier. Not the KEL itself. The KEL iteself is secured by signatures.
|
If you read Szabo’s paper on threshold structures, you get security of the same type when ever you use a threshold structure, be it MFA, Multi-Sig, or Distributed consensus. They all are using a combination of multiple relatively weak attack surfaces that must be simulatenously compromised for a successful attack. So multiplying simulatneous weak surfaces = functional equivalent of a stronger attack surface. So when you look at KERI you see that the security is primarily due to cryptographic strength and the witnesses are not the primary source of security but merely secure one thing, that is the availability of the KEL for an identifier. Not the KEL itself. The KEL iteself is secured by signatures.
|
||||||
|
|
||||||
@ -84,7 +84,7 @@ This was a meeting of the minds between myself and Sam Smith and Adrian Gropper
|
|||||||
|
|
||||||
The result is that there is grand convergence on the encoding and file format for key event provenance logs that will be supported by both KERI networks and the broader authentic data economy.
|
The result is that there is grand convergence on the encoding and file format for key event provenance logs that will be supported by both KERI networks and the broader authentic data economy.
|
||||||
|
|
||||||
* [KERI: Centralized registry with decentralized control (KEL & TEL ) + DEMO](https://iiw.idcommons.net/11K/_KERI:_Centralized_registry_with_decentralized_control_(KEL_%2526_TEL_)_%252B_DEMO) by Robert Mitwicki, Charles Cunningham, Phil Feairheller , Michał Pietrus
|
* [KERI: Centralized registry with decentralized control (KEL & TEL ) + DEMO](https://iiw.idcommons.net/11K/_KERI:_Centralized_registry_with_decentralized_control_(KEL_%26_TEL_)_+_DEMO) by Robert Mitwicki, Charles Cunningham, Phil Feairheller , Michał Pietrus
|
||||||
|
|
||||||
* [GLEIF vLEI with KERI](https://iiw.idcommons.net/20K/_GLEIF_vLEI_with_KERI)
|
* [GLEIF vLEI with KERI](https://iiw.idcommons.net/20K/_GLEIF_vLEI_with_KERI)
|
||||||
|
|
||||||
@ -94,7 +94,7 @@ In this session, GLEIF shares plans and progress regarding its development progr
|
|||||||
|
|
||||||
Link to presentation available until April 2022:
|
Link to presentation available until April 2022:
|
||||||
|
|
||||||
* [https://td2ec2in3mv1euwest.teamdrive.net/bgvkygms/public/I39DS3Tn?k=MMiiLXItHvmxOtB0kFROQGXMTDFgjCngWTiQFed43Ak](https://td2ec2in3mv1euwest.teamdrive.net/bgvkygms/public/I39DS3Tn?k%3DMMiiLXItHvmxOtB0kFROQGXMTDFgjCngWTiQFed43Ak)
|
* [https://td2ec2in3mv1euwest.teamdrive.net/bgvkygms/public/I39DS3Tn?k=MMiiLXItHvmxOtB0kFROQGXMTDFgjCngWTiQFed43Ak](https://td2ec2in3mv1euwest.teamdrive.net/bgvkygms/public/I39DS3Tn?k=MMiiLXItHvmxOtB0kFROQGXMTDFgjCngWTiQFed43Ak)
|
||||||
|
|
||||||
Agnostic to any network
|
Agnostic to any network
|
||||||
|
|
||||||
@ -107,13 +107,13 @@ Interoperability
|
|||||||
- This would allow GLEIF to connect to any blockchain or distributed ledger technology SSI network without the need for custom implementation, cost and overhead of operation.
|
- This would allow GLEIF to connect to any blockchain or distributed ledger technology SSI network without the need for custom implementation, cost and overhead of operation.
|
||||||
- KERI is Quantum Safe. It is resistant to attacks by both classical and quantum computers.
|
- KERI is Quantum Safe. It is resistant to attacks by both classical and quantum computers.
|
||||||
|
|
||||||
* [Supply chain – ACDC and KERI + DEMO](https://iiw.idcommons.net/14K/_Supply_chain_%25E2%2580%2593_ACDC_and_KERI_%252B_DEMO) by Robert Mitwicki ([video](https://eu01web.zoom.us/rec/play/GKGhv1QJ0BSoQZ9Dg-IKeyXKb0Nw0GZUry8qgvM58NS6YcZIz-u8xYMaeKn6-HpP6SMxNJvHebrvdw.NNWuKPuVGekv7zyU?continueMode%3Dtrue)
|
* [Supply chain – ACDC and KERI + DEMO](https://iiw.idcommons.net/14K/_Supply_chain_%E2%80%93_ACDC_and_KERI_+_DEMO) by Robert Mitwicki ([video](https://eu01web.zoom.us/rec/play/GKGhv1QJ0BSoQZ9Dg-IKeyXKb0Nw0GZUry8qgvM58NS6YcZIz-u8xYMaeKn6-HpP6SMxNJvHebrvdw.NNWuKPuVGekv7zyU?continueMode=true)
|
||||||
|
|
||||||
* [https://docs.google.com/presentation/d/1tF_OFGAKUz9RKCLTdwDYDu7hJuEbFz-LQ6PAih7HBK8/edit#slide=id.p](https://docs.google.com/presentation/d/1tF_OFGAKUz9RKCLTdwDYDu7hJuEbFz-LQ6PAih7HBK8/edit%23slide%3Did.p)
|
* [https://docs.google.com/presentation/d/1tF_OFGAKUz9RKCLTdwDYDu7hJuEbFz-LQ6PAih7HBK8/edit#slide=id.p](https://docs.google.com/presentation/d/1tF_OFGAKUz9RKCLTdwDYDu7hJuEbFz-LQ6PAih7HBK8/edit#slide=id.p)
|
||||||
|
|
||||||
* [https://en.wikipedia.org/wiki/Spime](https://en.wikipedia.org/wiki/Spime)
|
* [https://en.wikipedia.org/wiki/Spime](https://en.wikipedia.org/wiki/Spime)
|
||||||
|
|
||||||
* [https://wiki.trustoverip.org/display/HOME/ACDC+%28Authentic+Chained+Data+Container%29+Task+Force](https://wiki.trustoverip.org/display/HOME/ACDC%2B%2528Authentic%2BChained%2BData%2BContainer%2529%2BTask%2BForce)
|
* [https://wiki.trustoverip.org/display/HOME/ACDC+%28Authentic+Chained+Data+Container%29+Task+Force](https://wiki.trustoverip.org/display/HOME/ACDC+%28Authentic+Chained+Data+Container%29+Task+Force)
|
||||||
|
|
||||||
* [https://hackmd.io/RX8ZAycxQhSpGZgBfRzqbg?view](https://hackmd.io/RX8ZAycxQhSpGZgBfRzqbg?view)
|
* [https://hackmd.io/RX8ZAycxQhSpGZgBfRzqbg?view](https://hackmd.io/RX8ZAycxQhSpGZgBfRzqbg?view)
|
||||||
|
|
||||||
|
@ -47,9 +47,9 @@ It suggests updates to the [SafeCurves website](https://safecurves.cr.yp.to/)
|
|||||||
|
|
||||||
We are happy to announce today that we have our first demonstration of cross-vendor interoperability between Danube Tech and Digital Bazaar for verification regarding the Data Integrity and Ed25519Signature2020 work items:
|
We are happy to announce today that we have our first demonstration of cross-vendor interoperability between Danube Tech and Digital Bazaar for verification regarding the Data Integrity and Ed25519Signature2020 work items:
|
||||||
|
|
||||||
* [https://w3c-ccg.github.io/di-ed25519-test-suite/#Data%20Integrity%20(verifier](https://w3c-ccg.github.io/di-ed25519-test-suite/%23Data%2520Integrity%2520(verifier)
|
* [https://w3c-ccg.github.io/di-ed25519-test-suite/#Data%20Integrity%20(verifier](https://w3c-ccg.github.io/di-ed25519-test-suite/#Data%20Integrity%20(verifier)
|
||||||
|
|
||||||
* [https://w3c-ccg.github.io/di-ed25519-test-suite/#Ed25519Signature2020%20(verifier](https://w3c-ccg.github.io/di-ed25519-test-suite/%23Ed25519Signature2020%2520(verifier)
|
* [https://w3c-ccg.github.io/di-ed25519-test-suite/#Ed25519Signature2020%20(verifier](https://w3c-ccg.github.io/di-ed25519-test-suite/#Ed25519Signature2020%20(verifier)
|
||||||
|
|
||||||
* [Streamlining Data Integrity Cryptosuites](https://lists.w3.org/Archives/Public/public-credentials/2022Jul/0115.html) Manu Sporny (Sunday, 31 July)
|
* [Streamlining Data Integrity Cryptosuites](https://lists.w3.org/Archives/Public/public-credentials/2022Jul/0115.html) Manu Sporny (Sunday, 31 July)
|
||||||
|
|
||||||
@ -78,7 +78,7 @@ Final Reports. Namely:
|
|||||||
|
|
||||||
## Jose-Cose
|
## Jose-Cose
|
||||||
|
|
||||||
* [Two new COSE- and JOSE-related Internet Drafts with Tobias Looker](https://self-issued.info/?p%3D2260) Mike Jones
|
* [Two new COSE- and JOSE-related Internet Drafts with Tobias Looker](https://self-issued.info/?p=2260) Mike Jones
|
||||||
> This week, [Tobias Looker](https://twitter.com/tplooker) and I submitted two individual Internet Drafts for consideration by the [COSE working group](https://datatracker.ietf.org/wg/cose/about/).
|
> This week, [Tobias Looker](https://twitter.com/tplooker) and I submitted two individual Internet Drafts for consideration by the [COSE working group](https://datatracker.ietf.org/wg/cose/about/).
|
||||||
* [XMSS: Generating usable test vectors for JOSE and COSE](https://lists.w3.org/Archives/Public/public-credentials/2022Apr/0007.html) Orie Steele (Sunday, 3 April)
|
* [XMSS: Generating usable test vectors for JOSE and COSE](https://lists.w3.org/Archives/Public/public-credentials/2022Apr/0007.html) Orie Steele (Sunday, 3 April)
|
||||||
|
|
||||||
@ -111,7 +111,7 @@ The TLDR is to assume that we need hard answers as a community, and at the stand
|
|||||||
|
|
||||||
* [[CEIP] Draft paper on Cryptographically Enforceable Issuer Policies](https://lists.w3.org/Archives/Public/public-credentials/2021May/0170.html) Joosten, H.J.M. (Rieks) May 30
|
* [[CEIP] Draft paper on Cryptographically Enforceable Issuer Policies](https://lists.w3.org/Archives/Public/public-credentials/2021May/0170.html) Joosten, H.J.M. (Rieks) May 30
|
||||||
|
|
||||||
my colleague Sterre and I drafted [a paper that we provisionally called Cryptographically Enforceable Issuer Policies](https://docs.google.com/document/d/1c8kIUqB2BBzM3usfD0_s5wu_z6K2KndzJ4uK_oZcPOs/edit?usp%3Dsharing), which describes our current thinking on this topic.
|
my colleague Sterre and I drafted [a paper that we provisionally called Cryptographically Enforceable Issuer Policies](https://docs.google.com/document/d/1c8kIUqB2BBzM3usfD0_s5wu_z6K2KndzJ4uK_oZcPOs/edit?usp=sharing), which describes our current thinking on this topic.
|
||||||
|
|
||||||
The paper isn’t finished. We need more text in the ‘discussions’ section, and hope that by making the draft available we’ll get the discussions that we (or you?) can describe in there. Also, we might have missed stuff that you as a reader need for a proper understanding of what this is all about, and to start pondering for what (other) purposes all this might be used. Or why this proposal is a very bad idea that we should not spend any more time on.
|
The paper isn’t finished. We need more text in the ‘discussions’ section, and hope that by making the draft available we’ll get the discussions that we (or you?) can describe in there. Also, we might have missed stuff that you as a reader need for a proper understanding of what this is all about, and to start pondering for what (other) purposes all this might be used. Or why this proposal is a very bad idea that we should not spend any more time on.
|
||||||
|
|
||||||
|
@ -6,6 +6,6 @@ published: false
|
|||||||
|
|
||||||
* [Dynamic Data Sharing Hub: A target component for criteria searches on distributed structured data](https://iiw.idcommons.net/10L/_Dynamic_Data_Economy:_Digital_Identity,_Authentic_Data_Flows,_Data_Mesh_and_other_dragons) by Paul Knowles
|
* [Dynamic Data Sharing Hub: A target component for criteria searches on distributed structured data](https://iiw.idcommons.net/10L/_Dynamic_Data_Economy:_Digital_Identity,_Authentic_Data_Flows,_Data_Mesh_and_other_dragons) by Paul Knowles
|
||||||
|
|
||||||
* [Dynamic Data Sharing Hub - DDSH - Patient Recruitment Use Case](https://drive.google.com/file/d/1TSfpysHy-UN9GnAiNPB81ZgGQaFCFcjo/view?usp%3Dsharing)
|
* [Dynamic Data Sharing Hub - DDSH - Patient Recruitment Use Case](https://drive.google.com/file/d/1TSfpysHy-UN9GnAiNPB81ZgGQaFCFcjo/view?usp=sharing)
|
||||||
|
|
||||||
* [Identity Hub data storage and relay: unlocking the 99.99% of decentralized identity use cases](https://iiw.idcommons.net/index.php?title%3D14A/_Identity_Hub_data_storage_and_relay:_unlocking_the_99.99%2525_of_decentralized_identity_use_cases%26action%3Dedit%26redlink%3D1) by Daniel Buchner
|
* [Identity Hub data storage and relay: unlocking the 99.99% of decentralized identity use cases](https://iiw.idcommons.net/index.php?title=14A/_Identity_Hub_data_storage_and_relay:_unlocking_the_99.99%25_of_decentralized_identity_use_cases&action=edit&redlink=1) by Daniel Buchner
|
||||||
|
@ -5,7 +5,7 @@ published: false
|
|||||||
|
|
||||||
* [announcement: DIDComm user group](https://lists.w3.org/Archives/Public/public-credentials/2022Jan/0168.html) Hardman, Daniel (Thursday, 20 January)
|
* [announcement: DIDComm user group](https://lists.w3.org/Archives/Public/public-credentials/2022Jan/0168.html) Hardman, Daniel (Thursday, 20 January)
|
||||||
|
|
||||||
Now that the [DIDComm v2 spec](https://identity.foundation/didcomm-messaging/spec/) is nearing completion, and there are [robust libraries in multiple programming languages](https://github.com/decentralized-identity/didcomm-messaging%23implementations), we are starting a user group to share learnings as we put DIDComm into production. We will organize community resources, produce a handbook, foster application-level protocol creation, maintain the [didcomm.org website](https://didcomm.org) and [repo](https://github.com/decentralized-identity/didcomm.org), and recommend best practices.
|
Now that the [DIDComm v2 spec](https://identity.foundation/didcomm-messaging/spec/) is nearing completion, and there are [robust libraries in multiple programming languages](https://github.com/decentralized-identity/didcomm-messaging#implementations), we are starting a user group to share learnings as we put DIDComm into production. We will organize community resources, produce a handbook, foster application-level protocol creation, maintain the [didcomm.org website](https://didcomm.org) and [repo](https://github.com/decentralized-identity/didcomm.org), and recommend best practices.
|
||||||
|
|
||||||
* [slides for DIDComm discussion on Tuesday's CCG call](https://lists.w3.org/Archives/Public/public-credentials/2022Apr/0032.html) Daniel Hardman (Tuesday, 5 April)
|
* [slides for DIDComm discussion on Tuesday's CCG call](https://lists.w3.org/Archives/Public/public-credentials/2022Apr/0032.html) Daniel Hardman (Tuesday, 5 April)
|
||||||
|
|
||||||
@ -28,7 +28,7 @@ application/pdf attachment: [DIDComm_v2_Primer.pdf](https://lists.w3.org/Archive
|
|||||||
|
|
||||||
|
|
||||||
## Explainer
|
## Explainer
|
||||||
* [Why the Internet Needs DIDComm](https://iiw.idcommons.net/2D/_Why_the_Internet_Needs_DIDComm) by Sam Curren [presentation](https://docs.google.com/presentation/d/16HTPyZV_-BtM6EifQpxjivRHKYUeVtOAReUD1eGUA9M/edit?usp%3Dsharing)
|
* [Why the Internet Needs DIDComm](https://iiw.idcommons.net/2D/_Why_the_Internet_Needs_DIDComm) by Sam Curren [presentation](https://docs.google.com/presentation/d/16HTPyZV_-BtM6EifQpxjivRHKYUeVtOAReUD1eGUA9M/edit?usp=sharing)
|
||||||
> - Enables Verifiable Communication
|
> - Enables Verifiable Communication
|
||||||
> - Intelligence at the edge (like email)
|
> - Intelligence at the edge (like email)
|
||||||
> - Protocol Based (like email)
|
> - Protocol Based (like email)
|
||||||
@ -38,7 +38,7 @@ application/pdf attachment: [DIDComm_v2_Primer.pdf](https://lists.w3.org/Archive
|
|||||||
> - Supports rotating from one DID to another
|
> - Supports rotating from one DID to another
|
||||||
> - Security independent of transport
|
> - Security independent of transport
|
||||||
> - Protocol development becomes easier and more robust (unlike email)
|
> - Protocol development becomes easier and more robust (unlike email)
|
||||||
* [Decentralized Semantics 101](https://iiw.idcommons.net/2E/_Decentralized_Semantics_101) by Paul Knowles [Presentation](https://drive.google.com/file/d/1Og1LVND8RrHbZ8mBobBehRzN46YI4SXt/view?usp%3Dsharing)
|
* [Decentralized Semantics 101](https://iiw.idcommons.net/2E/_Decentralized_Semantics_101) by Paul Knowles [Presentation](https://drive.google.com/file/d/1Og1LVND8RrHbZ8mBobBehRzN46YI4SXt/view?usp=sharing)
|
||||||
> A digital network must contain authenticable data entry and immutable data
|
> A digital network must contain authenticable data entry and immutable data
|
||||||
>
|
>
|
||||||
> capture elements in order to maintain balance and integrity.
|
> capture elements in order to maintain balance and integrity.
|
||||||
@ -48,7 +48,7 @@ application/pdf attachment: [DIDComm_v2_Primer.pdf](https://lists.w3.org/Archive
|
|||||||
> (1) data inputs can be trusted as having come from an assured source under the control of a governing entity; and
|
> (1) data inputs can be trusted as having come from an assured source under the control of a governing entity; and
|
||||||
>
|
>
|
||||||
> (2) semantic items ensure that the meaning and use of inputted data remains unaltered for all interacting actors.
|
> (2) semantic items ensure that the meaning and use of inputted data remains unaltered for all interacting actors.
|
||||||
* [DIDComm and the Self-Sovereign Internet](https://iiw.idcommons.net/21A/_DIDComm_and_the_Self-Sovereign_Internet) by Phil Windley [presentation](https://docs.google.com/presentation/d/1h0qi2qyGwM30DHpRAXW_Y0bBneo9xMEFZh1rIAeRa-E/edit?usp%3Dsharing)
|
* [DIDComm and the Self-Sovereign Internet](https://iiw.idcommons.net/21A/_DIDComm_and_the_Self-Sovereign_Internet) by Phil Windley [presentation](https://docs.google.com/presentation/d/1h0qi2qyGwM30DHpRAXW_Y0bBneo9xMEFZh1rIAeRa-E/edit?usp=sharing)
|
||||||
> DID-based relationships are the foundation of self-sovereign identity (SSI). The exchange of DIDs to form a connection with another party gives both parties a relationship that is self-certifying and mutually authenticated. Further, the connection forms a secure messaging channel called DID Communication or DIDComm. DIDComm messaging is more important than most understand, providing a secure, interoperable, and flexible general messaging overlay for the entire internet.
|
> DID-based relationships are the foundation of self-sovereign identity (SSI). The exchange of DIDs to form a connection with another party gives both parties a relationship that is self-certifying and mutually authenticated. Further, the connection forms a secure messaging channel called DID Communication or DIDComm. DIDComm messaging is more important than most understand, providing a secure, interoperable, and flexible general messaging overlay for the entire internet.
|
||||||
* [DIDComm and the Self-Sovereign Internet - Phillip J. Windley, Ph.D., Brigham Young University](https://www.windley.com/archives/2020/11/didcomm_and_the_self-sovereign_internet.shtml)
|
* [DIDComm and the Self-Sovereign Internet - Phillip J. Windley, Ph.D., Brigham Young University](https://www.windley.com/archives/2020/11/didcomm_and_the_self-sovereign_internet.shtml)
|
||||||
> DIDComm is a protocol layer capable of supporting specialized application protocols for specific workflows. Because of its general nature and inherent support for self-sovereign relationships, DIDComm provides a basis for a self-sovereign internet much more private, enabling, and flexible than the one we've built using Web 2.0 technologies. This talk introduces DIDComm, discusses its protocological nature, and presents use cases in the Internet of Things. Demonstrations of DIDComm protocol interactions will be shown on the Pico platform, which implements the Aries Cloud Agent (ACA) specification.
|
> DIDComm is a protocol layer capable of supporting specialized application protocols for specific workflows. Because of its general nature and inherent support for self-sovereign relationships, DIDComm provides a basis for a self-sovereign internet much more private, enabling, and flexible than the one we've built using Web 2.0 technologies. This talk introduces DIDComm, discusses its protocological nature, and presents use cases in the Internet of Things. Demonstrations of DIDComm protocol interactions will be shown on the Pico platform, which implements the Aries Cloud Agent (ACA) specification.
|
||||||
@ -57,15 +57,15 @@ application/pdf attachment: [DIDComm_v2_Primer.pdf](https://lists.w3.org/Archive
|
|||||||
|
|
||||||
|
|
||||||
## Development
|
## Development
|
||||||
* [DIDComm v2: Implementation and integration](https://iiw.idcommons.net/11D/_DIDComm_V2:_Implementation_and_integration_%2527technical%2527_-_did:key_and_did:keri_resolvers,_seamless_and_partial_integrations-)
|
* [DIDComm v2: Implementation and integration](https://iiw.idcommons.net/11D/_DIDComm_V2:_Implementation_and_integration_%27technical%27_-_did:key_and_did:keri_resolvers,_seamless_and_partial_integrations-)
|
||||||
* [didcomm-rs implementation](https://drive.google.com/file/d/1dn5f2SqnCeQocOy5quJD9gpMPipKRmdC/view?usp%3Dsharing) presentation
|
* [didcomm-rs implementation](https://drive.google.com/file/d/1dn5f2SqnCeQocOy5quJD9gpMPipKRmdC/view?usp=sharing) presentation
|
||||||
- [decentralized-identity/didcomm-rs](https://github.com/decentralized-identity/didcomm-rs) github
|
- [decentralized-identity/didcomm-rs](https://github.com/decentralized-identity/didcomm-rs) github
|
||||||
|
|
||||||
* [Trusted P2P Messaging with DIDs, DIDComm and VCs](https://medium.com/uport/trusted-p2p-messaging-with-dids-didcomm-and-vcs-398f4c3f3cda) uPort
|
* [Trusted P2P Messaging with DIDs, DIDComm and VCs](https://medium.com/uport/trusted-p2p-messaging-with-dids-didcomm-and-vcs-398f4c3f3cda) uPort
|
||||||
> about their path towards trusted P2P messaging and announces the [DIDAgent Framework (DAF)](https://github.com/uport-project/daf)
|
> about their path towards trusted P2P messaging and announces the [DIDAgent Framework (DAF)](https://github.com/uport-project/daf)
|
||||||
>
|
>
|
||||||
> when we speak about a DID, then we need to be more precise and also speak about the particular DID method of that DID which defines the CRUD operations on a target system such as Ethereum.
|
> when we speak about a DID, then we need to be more precise and also speak about the particular DID method of that DID which defines the CRUD operations on a target system such as Ethereum.
|
||||||
* [DIDComm Mythconceptions](https://www.youtube.com/watch?v%3DrwvQdRyMeY4) Daniel Hardman
|
* [DIDComm Mythconceptions](https://www.youtube.com/watch?v=rwvQdRyMeY4) Daniel Hardman
|
||||||
> DIDComm is a peer-to-peer communication technology for SSI (self-sovereign identity) with security and privacy properties rooted in DIDs (decentralized identifiers). Its core value proposition is often misunderstood or oversimplified. This webinar provides a proper mental model.
|
> DIDComm is a peer-to-peer communication technology for SSI (self-sovereign identity) with security and privacy properties rooted in DIDs (decentralized identifiers). Its core value proposition is often misunderstood or oversimplified. This webinar provides a proper mental model.
|
||||||
* [FLOSS WEEKLY 685: DIDS AND DIDCOMM](https://twit.tv/shows/floss-weekly/episodes/685) Featuring Sam Curren
|
* [FLOSS WEEKLY 685: DIDS AND DIDCOMM](https://twit.tv/shows/floss-weekly/episodes/685) Featuring Sam Curren
|
||||||
> Sam Curren unpacks for Doc Searls and Dan Lynch why DIDs and DIDcomm are the best approach to identity—and to making people first-class citizens on the Internet. Curren also discusses the origin story of picos and the advantages of nomadic living and hacking.
|
> Sam Curren unpacks for Doc Searls and Dan Lynch why DIDs and DIDcomm are the best approach to identity—and to making people first-class citizens on the Internet. Curren also discusses the origin story of picos and the advantages of nomadic living and hacking.
|
||||||
@ -78,7 +78,7 @@ application/pdf attachment: [DIDComm_v2_Primer.pdf](https://lists.w3.org/Archive
|
|||||||
> in order for DIDComm to provide a potential replacement for commonly used chat protocols like WhatsApp (Extensible Messaging and Presence Protocol (XMPP)), Telegram (MTProto), or Signal (Signal Protocol), it needs to support modern chat features we use everyday
|
> in order for DIDComm to provide a potential replacement for commonly used chat protocols like WhatsApp (Extensible Messaging and Presence Protocol (XMPP)), Telegram (MTProto), or Signal (Signal Protocol), it needs to support modern chat features we use everyday
|
||||||
* [DIDComm & DIDComm Messaging](https://medium.com/datev-techblog/didcomm-didcomm-messaging-3e10fbf12bb8) Tim Vorgs, DATEV eG
|
* [DIDComm & DIDComm Messaging](https://medium.com/datev-techblog/didcomm-didcomm-messaging-3e10fbf12bb8) Tim Vorgs, DATEV eG
|
||||||
|
|
||||||
* [Blockchain and Self-Sovereign Identity Empowered Cyber Threat Information Sharing Platform](https://www.youtube.com/watch?v%3DlzS49R52PwA) Siddhi
|
* [Blockchain and Self-Sovereign Identity Empowered Cyber Threat Information Sharing Platform](https://www.youtube.com/watch?v=lzS49R52PwA) Siddhi
|
||||||
> looks interesting and different - uses DIDComm
|
> looks interesting and different - uses DIDComm
|
||||||
>
|
>
|
||||||
> Presented in 7th IEEE International Conference on Smart Computing(IEEE SmartComp 2021)
|
> Presented in 7th IEEE International Conference on Smart Computing(IEEE SmartComp 2021)
|
||||||
@ -87,7 +87,7 @@ application/pdf attachment: [DIDComm_v2_Primer.pdf](https://lists.w3.org/Archive
|
|||||||
|
|
||||||
* DIDComm: [ECDH-1PU Implementation](https://blog.identity.foundation/ecdh-1pu-implementation/) Identity Foundation
|
* DIDComm: [ECDH-1PU Implementation](https://blog.identity.foundation/ecdh-1pu-implementation/) Identity Foundation
|
||||||
|
|
||||||
In short, ECDH-1PU is a key derivation process that allows for sender authenticity and enables a “[Perfect Forward Secrecy](https://www.wired.com/2016/11/what-is-perfect-forward-secrecy/%23:~:text%3DPerfect%2520forward%2520secrecy%2520means%2520that,of%2520the%2520user%27s%2520sensitive%2520data.)” mechanism, in addition to significant performance gains over JWS message nested in a JWE envelope, as used by existign ECDH-ES aproaches.
|
In short, ECDH-1PU is a key derivation process that allows for sender authenticity and enables a “[Perfect Forward Secrecy](https://www.wired.com/2016/11/what-is-perfect-forward-secrecy/#:~:text=Perfect%20forward%20secrecy%20means%20that,of%20the%20user%27s%20sensitive%20data.)” mechanism, in addition to significant performance gains over JWS message nested in a JWE envelope, as used by existign ECDH-ES aproaches.
|
||||||
|
|
||||||
- We at Jolocom strongly believe that DIDComm is a crucial infrastructure element for the broader and future-proof SSI stack, and [current work on DIDComm v2 includes Jolocom’s implementation of the specification](http://github.com/jolocom/didcomm-rs) with authcrypt (authenticated encrypted) and most of the low level of the protocol.
|
- We at Jolocom strongly believe that DIDComm is a crucial infrastructure element for the broader and future-proof SSI stack, and [current work on DIDComm v2 includes Jolocom’s implementation of the specification](http://github.com/jolocom/didcomm-rs) with authcrypt (authenticated encrypted) and most of the low level of the protocol.
|
||||||
* [trustbloc/hub-router](https://github.com/trustbloc/hub-router) DIDComm mediator and router with mailbox features.
|
* [trustbloc/hub-router](https://github.com/trustbloc/hub-router) DIDComm mediator and router with mailbox features.
|
||||||
|
@ -10,7 +10,7 @@ published: false
|
|||||||
|
|
||||||
This document describes a mechanism to transfer digital credentials securely between two devices. Secure credentials may represent a digital key to a hotel room, a digital key to a door lock in a house or a digital key to a car. Devices that share credentials may belong to the same or two different platforms (e.g. iOS and Android). Secure transfer may include one or more write and read operations. Credential transfer needs to be performed securely due to the sensitive nature of the information.
|
This document describes a mechanism to transfer digital credentials securely between two devices. Secure credentials may represent a digital key to a hotel room, a digital key to a door lock in a house or a digital key to a car. Devices that share credentials may belong to the same or two different platforms (e.g. iOS and Android). Secure transfer may include one or more write and read operations. Credential transfer needs to be performed securely due to the sensitive nature of the information.
|
||||||
|
|
||||||
* [Figuring out Verifiable Credentials Exchange - combining Bloom, Aires Protocols, Presentation Exchange into a unified - Killer Whale Jello Salad](https://iiw.idcommons.net/22H/_Figuring_out_Verifiable_Credentials_Exchange_-_combining_Bloom,_Aires_Protocols,_Presentation_Exchange_into_a_unified_-_Killer_Whale_Jello_Salad) by Kaliya Young, Orie Steele, Drummond , Kyle et al [ [presentation](https://docs.google.com/presentation/d/1t4o6AXclqR7SqhGCbIJKVtYxh4fm_5mGT11MBx9K95c/edit%23slide%3Did.p)]
|
* [Figuring out Verifiable Credentials Exchange - combining Bloom, Aires Protocols, Presentation Exchange into a unified - Killer Whale Jello Salad](https://iiw.idcommons.net/22H/_Figuring_out_Verifiable_Credentials_Exchange_-_combining_Bloom,_Aires_Protocols,_Presentation_Exchange_into_a_unified_-_Killer_Whale_Jello_Salad) by Kaliya Young, Orie Steele, Drummond , Kyle et al [ [presentation](https://docs.google.com/presentation/d/1t4o6AXclqR7SqhGCbIJKVtYxh4fm_5mGT11MBx9K95c/edit#slide=id.p)]
|
||||||
> - Because what we need is interoperable - issuance - issue-> holder || holder -> verifier some conversation about SIOP - has not been the focus of the discussion.
|
> - Because what we need is interoperable - issuance - issue-> holder || holder -> verifier some conversation about SIOP - has not been the focus of the discussion.
|
||||||
> - Goal to create a bridge between
|
> - Goal to create a bridge between
|
||||||
> - the W3C CCG / DHS SVIP - VCI-HTTP-API (VHA) in combination with CHAPI protocol and the (VC Request) for issuing credentials.
|
> - the W3C CCG / DHS SVIP - VCI-HTTP-API (VHA) in combination with CHAPI protocol and the (VC Request) for issuing credentials.
|
||||||
@ -24,9 +24,9 @@ This document describes a mechanism to transfer digital credentials securely bet
|
|||||||
> Result: [https://identity.foundation/arewewaciyet/](https://identity.foundation/arewewaciyet/)
|
> Result: [https://identity.foundation/arewewaciyet/](https://identity.foundation/arewewaciyet/)
|
||||||
|
|
||||||
|
|
||||||
* [BBS+ Credential Exchange in Hyperledger Aries](https://iiw.idcommons.net/11E/_BBS%252B_Credential_Exchange_in_Hyperledger_Aries) [[presentation](https://iiw.animo.id)]
|
* [BBS+ Credential Exchange in Hyperledger Aries](https://iiw.idcommons.net/11E/_BBS+_Credential_Exchange_in_Hyperledger_Aries) [[presentation](https://iiw.animo.id)]
|
||||||
|
|
||||||
* [Credentials Exchange - figuring it out - (Jello Bowl Death Match?)](https://iiw.idcommons.net/12F/_Credentials_Exchange_-_figuring_it_out_-_(Jello_Bowl_Death_Match%253F)_%25E2%2580%2593) [[Slides](https://docs.google.com/presentation/d/1t4o6AXclqR7SqhGCbIJKVtYxh4fm_5mGT11MBx9K95c/edit%23slide%3Did.p)]
|
* [Credentials Exchange - figuring it out - (Jello Bowl Death Match?)](https://iiw.idcommons.net/12F/_Credentials_Exchange_-_figuring_it_out_-_(Jello_Bowl_Death_Match%3F)_%E2%80%93) [[Slides](https://docs.google.com/presentation/d/1t4o6AXclqR7SqhGCbIJKVtYxh4fm_5mGT11MBx9K95c/edit#slide=id.p)]
|
||||||
DIDComm, Verifiable Credential Exchange, Aries Protocol, Bloom Protocol, Presentation Exchange
|
DIDComm, Verifiable Credential Exchange, Aries Protocol, Bloom Protocol, Presentation Exchange
|
||||||
|
|
||||||
The ultimate goal is to get to a clear exchange protocols.
|
The ultimate goal is to get to a clear exchange protocols.
|
||||||
@ -58,7 +58,7 @@ The Credential Handler API or CHAPI is currently a draft community group report
|
|||||||
|
|
||||||
TL;DR: chapi.io is a site that helps developers integrate Verifiable Credential issuance, holding, and presentation into their applications. It includes a playground that can issue arbitrary VCs to digital wallets (web and native). It also includes tutorials on how Web Developers can add CHAPI integration to their websites. All you need to try it out is a web browser.
|
TL;DR: chapi.io is a site that helps developers integrate Verifiable Credential issuance, holding, and presentation into their applications. It includes a playground that can issue arbitrary VCs to digital wallets (web and native). It also includes tutorials on how Web Developers can add CHAPI integration to their websites. All you need to try it out is a web browser.
|
||||||
|
|
||||||
* [TrustBloc - Duty Free Shop use case (CHAPI Save + WACI Share)](https://www.youtube.com/watch?v%3DaagFJBI1fBE)
|
* [TrustBloc - Duty Free Shop use case (CHAPI Save + WACI Share)](https://www.youtube.com/watch?v=aagFJBI1fBE)
|
||||||
|
|
||||||
This video demonstrates the TrustBloc platform to Issue a W3C Verifiable Credential through CHAPI and Share the Verifiable Credential/Presentation through WACI.
|
This video demonstrates the TrustBloc platform to Issue a W3C Verifiable Credential through CHAPI and Share the Verifiable Credential/Presentation through WACI.
|
||||||
|
|
||||||
@ -103,7 +103,7 @@ This slide, from a slide deck presentation by Manu Sporny to the W3C Credentials
|
|||||||
|
|
||||||
There are interactions between a wallet and relying party that require passing information between the two. WACI provides a standard for these interactions.
|
There are interactions between a wallet and relying party that require passing information between the two. WACI provides a standard for these interactions.
|
||||||
|
|
||||||
* [https://specs.bloom.co/wallet-and-credential-interactions/versions/v0.1.0/#status-of-this-document](https://specs.bloom.co/wallet-and-credential-interactions/versions/v0.1.0/%23status-of-this-document)
|
* [https://specs.bloom.co/wallet-and-credential-interactions/versions/v0.1.0/#status-of-this-document](https://specs.bloom.co/wallet-and-credential-interactions/versions/v0.1.0/#status-of-this-document)
|
||||||
|
|
||||||
WACI bound to JWT - signed. Could be JWE technically (would have to know the other parties DID and Keys - only optionally required here).
|
WACI bound to JWT - signed. Could be JWE technically (would have to know the other parties DID and Keys - only optionally required here).
|
||||||
|
|
||||||
@ -117,7 +117,7 @@ Could be bound to DIDComm
|
|||||||
* [https://specs.bloom.co/wallet-and-credential-interactions/versions/v0.1.0](https://specs.bloom.co/wallet-and-credential-interactions/versions/v0.1.0)
|
* [https://specs.bloom.co/wallet-and-credential-interactions/versions/v0.1.0](https://specs.bloom.co/wallet-and-credential-interactions/versions/v0.1.0)
|
||||||
|
|
||||||
Orie linked this related github issue and discussion:[https://github.com/w3c-ccg/universal-wallet-interop-spec/issues/84](https://github.com/w3c-ccg/universal-wallet-interop-spec/issues/84)
|
Orie linked this related github issue and discussion:[https://github.com/w3c-ccg/universal-wallet-interop-spec/issues/84](https://github.com/w3c-ccg/universal-wallet-interop-spec/issues/84)
|
||||||
Also related: [https://w3c-ccg.github.io/vp-request-spec/#format](https://w3c-ccg.github.io/vp-request-spec/%23format)
|
Also related: [https://w3c-ccg.github.io/vp-request-spec/#format](https://w3c-ccg.github.io/vp-request-spec/#format)
|
||||||
|
|
||||||
Use cases support mobile wallets, backend services and web apps.
|
Use cases support mobile wallets, backend services and web apps.
|
||||||
Supports chaining of requests…. Relies on credential manifest and presentation exchange
|
Supports chaining of requests…. Relies on credential manifest and presentation exchange
|
||||||
@ -164,7 +164,7 @@ Where does it go?
|
|||||||
|
|
||||||
### Assorted
|
### Assorted
|
||||||
- Work within DIF
|
- Work within DIF
|
||||||
- [Credentials and Claims](https://github.com/decentralized-identity/org/blob/master/Org%2520documents/WG%2520documents/DIF_CC_WG_charter_v1.pdf) working group (explicitly mentions something like "unifying existing formats and protocols" in its charter) <- fast time
|
- [Credentials and Claims](https://github.com/decentralized-identity/org/blob/master/Org%20documents/WG%20documents/DIF_CC_WG_charter_v1.pdf) working group (explicitly mentions something like "unifying existing formats and protocols" in its charter) <- fast time
|
||||||
- Or new WG, draft charter by Balazs: [https://docs.google.com/document/d/18L2-t4_2yrO_xZkwPjMCRcKIDiRGCziNs2X4k093pvo/](https://docs.google.com/document/d/18L2-t4_2yrO_xZkwPjMCRcKIDiRGCziNs2X4k093pvo/)
|
- Or new WG, draft charter by Balazs: [https://docs.google.com/document/d/18L2-t4_2yrO_xZkwPjMCRcKIDiRGCziNs2X4k093pvo/](https://docs.google.com/document/d/18L2-t4_2yrO_xZkwPjMCRcKIDiRGCziNs2X4k093pvo/)
|
||||||
- DIF - presentation exchange?
|
- DIF - presentation exchange?
|
||||||
|
|
||||||
|
@ -16,7 +16,7 @@ Unless issues are identified during the review that the working group believes m
|
|||||||
> - So can be tested with next SVIP - testing.
|
> - So can be tested with next SVIP - testing.
|
||||||
> - Presentation Exchange and use of DIDComm and for sake of interop testing pave a narrow path - and expand in future interoperability efforts.
|
> - Presentation Exchange and use of DIDComm and for sake of interop testing pave a narrow path - and expand in future interoperability efforts.
|
||||||
> - Summary: DIDComm, Presentation request, presentation exchange, present proof format using JSON-LD ZKP with BBS+
|
> - Summary: DIDComm, Presentation request, presentation exchange, present proof format using JSON-LD ZKP with BBS+
|
||||||
* [OpenID Connect Presentation at IIW XXXII](https://self-issued.info/?p%3D2167)
|
* [OpenID Connect Presentation at IIW XXXII](https://self-issued.info/?p=2167)
|
||||||
- [OpenID Connect](https://openid.net/connect/)
|
- [OpenID Connect](https://openid.net/connect/)
|
||||||
- [Frequently Asked Questions](https://openid.net/connect/faq/)
|
- [Frequently Asked Questions](https://openid.net/connect/faq/)
|
||||||
- [Working Group Mailing List](https://lists.openid.net/mailman/listinfo/openid-specs-ab)
|
- [Working Group Mailing List](https://lists.openid.net/mailman/listinfo/openid-specs-ab)
|
||||||
@ -28,7 +28,7 @@ The Self-Sovereign Identity System of CodeB does not only support W3C DID’s bu
|
|||||||
* [Spruce Developer Update #20](https://blog.spruceid.com/spruce-developer-update-20/)
|
* [Spruce Developer Update #20](https://blog.spruceid.com/spruce-developer-update-20/)
|
||||||
|
|
||||||
We've set up a [release pipeline](https://github.com/spruceid/ens-oidc/) and had our first witnessed deployment for the ENS Community-Maintained OIDC IdP ([more info here](https://blog.spruceid.com/sign-in-with-ethereum-decentralizing-an-identity-provider-server/)
|
We've set up a [release pipeline](https://github.com/spruceid/ens-oidc/) and had our first witnessed deployment for the ENS Community-Maintained OIDC IdP ([more info here](https://blog.spruceid.com/sign-in-with-ethereum-decentralizing-an-identity-provider-server/)
|
||||||
* [Use-cases: OIDC for Verifiable Credentials - How do you want to use Identity Provider you control?](https://iiw.idcommons.net/12G/_Use-cases:_OIDC_for_Verifiable_Credentials_-_How_do_you_want_to_use_Identity_Provider_you_control%253F) by Oliver Terbu, Torsten Lodderstedt, Kristina Yasuda, Adam Lemmon, Tobias Looker
|
* [Use-cases: OIDC for Verifiable Credentials - How do you want to use Identity Provider you control?](https://iiw.idcommons.net/12G/_Use-cases:_OIDC_for_Verifiable_Credentials_-_How_do_you_want_to_use_Identity_Provider_you_control%3F) by Oliver Terbu, Torsten Lodderstedt, Kristina Yasuda, Adam Lemmon, Tobias Looker
|
||||||
* [Browser APIs to enable OpenID Session Management and Privacy](https://iiw.idcommons.net/13L/_Browser_APIs_to_enable_OpenID_Session_Management_and_Privacy) by Sam Goto
|
* [Browser APIs to enable OpenID Session Management and Privacy](https://iiw.idcommons.net/13L/_Browser_APIs_to_enable_OpenID_Session_Management_and_Privacy) by Sam Goto
|
||||||
|
|
||||||
How does logout in OIDC happen?
|
How does logout in OIDC happen?
|
||||||
@ -64,14 +64,14 @@ How does logout in OIDC happen?
|
|||||||
- You call it, browser logs it, and tell where the user left of
|
- You call it, browser logs it, and tell where the user left of
|
||||||
- Browser observes the login - passively. Heuristics - what if the browser has not seen it..
|
- Browser observes the login - passively. Heuristics - what if the browser has not seen it..
|
||||||
- some of this is already starting to show up in chrome canarie
|
- some of this is already starting to show up in chrome canarie
|
||||||
- [https://chromium-review.googlesource.com/c/chromium/src/+/2837551](https://chromium-review.googlesource.com/c/chromium/src/%2B/2837551)
|
- [https://chromium-review.googlesource.com/c/chromium/src/+/2837551](https://chromium-review.googlesource.com/c/chromium/src/+/2837551)
|
||||||
- If domain name ETLD of the issuer is the same as IdP, automatically logs out
|
- If domain name ETLD of the issuer is the same as IdP, automatically logs out
|
||||||
|
|
||||||
* […]
|
* […]
|
||||||
|
|
||||||
- Looks like we can preserve session management if we figure out logout
|
- Looks like we can preserve session management if we figure out logout
|
||||||
- Next would be good to see pseudo code with concrete scenario and sequence diagrams
|
- Next would be good to see pseudo code with concrete scenario and sequence diagrams
|
||||||
- Pseudo text: [https://github.com/WICG/WebID/blob/main/cookies.md#logout](https://github.com/WICG/WebID/blob/main/cookies.md%23logout)
|
- Pseudo text: [https://github.com/WICG/WebID/blob/main/cookies.md#logout](https://github.com/WICG/WebID/blob/main/cookies.md#logout)
|
||||||
- Prototype is being built
|
- Prototype is being built
|
||||||
- AOB? At IIW?
|
- AOB? At IIW?
|
||||||
- Understand what third party cookies actually mean - no cookies at all? Partition cookies going away. The way firefox is doing it?
|
- Understand what third party cookies actually mean - no cookies at all? Partition cookies going away. The way firefox is doing it?
|
||||||
@ -101,7 +101,7 @@ The official voting period will be between Tuesday, February 1, 2022 and Tuesday
|
|||||||
> OAuth 2.0 - Web Authorization Protocol
|
> OAuth 2.0 - Web Authorization Protocol
|
||||||
> OpenID Connect 1.0 (OIDC) - Simple identity layer on top of OAuth 2.0
|
> OpenID Connect 1.0 (OIDC) - Simple identity layer on top of OAuth 2.0
|
||||||
|
|
||||||
* [OpenID Presentations at December 2021 OpenID Virtual Workshop](https://self-issued.info/?p%3D2214)
|
* [OpenID Presentations at December 2021 OpenID Virtual Workshop](https://self-issued.info/?p=2214)
|
||||||
|
|
||||||
- OpenID Connect Working Group [(PowerPoint)](http://self-issued.info/presentations/OpenID_Connect_Working_Group_9-Dec-21.pptx) [(PDF)](http://self-issued.info/presentations/OpenID_Connect_Working_Group_9-Dec-21.pdf)
|
- OpenID Connect Working Group [(PowerPoint)](http://self-issued.info/presentations/OpenID_Connect_Working_Group_9-Dec-21.pptx) [(PDF)](http://self-issued.info/presentations/OpenID_Connect_Working_Group_9-Dec-21.pdf)
|
||||||
- OpenID Enhanced Authentication Profile (EAP) Working Group [(PowerPoint)](http://self-issued.info/presentations/OpenID_EAP_Working_Group_9-Dec-21.pptx) [(PDF)](http://self-issued.info/presentations/OpenID_EAP_Working_Group_9-Dec-21.pdf)
|
- OpenID Enhanced Authentication Profile (EAP) Working Group [(PowerPoint)](http://self-issued.info/presentations/OpenID_EAP_Working_Group_9-Dec-21.pptx) [(PDF)](http://self-issued.info/presentations/OpenID_EAP_Working_Group_9-Dec-21.pdf)
|
||||||
@ -113,7 +113,7 @@ use of IETF Token Binding specifications with OpenID Connect and integration wit
|
|||||||
* [OpenID Connect Client-Initiated Backchannel Authentication (CIBA) Core is now a Final Specification](https://openid.net/2021/09/01/openid-connect-client-initiated-backchannel-authentication-ciba-core-is-now-a-final-specification/)
|
* [OpenID Connect Client-Initiated Backchannel Authentication (CIBA) Core is now a Final Specification](https://openid.net/2021/09/01/openid-connect-client-initiated-backchannel-authentication-ciba-core-is-now-a-final-specification/)
|
||||||
|
|
||||||
The OpenID Foundation membership has approved the following [MODRNA](https://openid.net/wg/mobile/) specification as an OpenID Final Specification:
|
The OpenID Foundation membership has approved the following [MODRNA](https://openid.net/wg/mobile/) specification as an OpenID Final Specification:
|
||||||
* [OpenID Connect Presentation at 2021 European Identity and Cloud (EIC) Conference](https://self-issued.info/?p%3D2187)
|
* [OpenID Connect Presentation at 2021 European Identity and Cloud (EIC) Conference](https://self-issued.info/?p=2187)
|
||||||
|
|
||||||
I gave the following presentation on the [OpenID Connect Working Group](https://openid.net/wg/connect/) during the [September 13, 2021 OpenID Workshop](https://openid.net/oidf-workshop-at-eic-2021-monday-september-13-2021/) at the [2021 European Identity and Cloud (EIC) conference](https://www.kuppingercole.com/events/eic2021/). As I noted during the talk, this is an exciting time for OpenID Connect; there’s more happening now than at any time since the original OpenID Connect specs were created!
|
I gave the following presentation on the [OpenID Connect Working Group](https://openid.net/wg/connect/) during the [September 13, 2021 OpenID Workshop](https://openid.net/oidf-workshop-at-eic-2021-monday-september-13-2021/) at the [2021 European Identity and Cloud (EIC) conference](https://www.kuppingercole.com/events/eic2021/). As I noted during the talk, this is an exciting time for OpenID Connect; there’s more happening now than at any time since the original OpenID Connect specs were created!
|
||||||
|
|
||||||
@ -122,7 +122,7 @@ I gave the following presentation on the [OpenID Connect Working Group](https:/
|
|||||||
|
|
||||||
* [OIDC with SIOPv2 and DIF Presentation Exchange](https://vimeo.com/630104529) Sphereon
|
* [OIDC with SIOPv2 and DIF Presentation Exchange](https://vimeo.com/630104529) Sphereon
|
||||||
|
|
||||||
* [OpenID Connect Presentation at IIW XXXIII](https://self-issued.info/?p%3D2196) Mike Jones
|
* [OpenID Connect Presentation at IIW XXXIII](https://self-issued.info/?p=2196) Mike Jones
|
||||||
|
|
||||||
- Introduction to OpenID Connect [(PowerPoint)](https://self-issued.info/presentations/OpenID_Connect_Introduction_12-Oct-21.pptx) [(PDF)](https://self-issued.info/presentations/OpenID_Connect_Introduction_12-Oct-21.pdf)
|
- Introduction to OpenID Connect [(PowerPoint)](https://self-issued.info/presentations/OpenID_Connect_Introduction_12-Oct-21.pptx) [(PDF)](https://self-issued.info/presentations/OpenID_Connect_Introduction_12-Oct-21.pdf)
|
||||||
|
|
||||||
@ -155,7 +155,7 @@ the history of OpenID Connect and how it became so prevalent, with special guest
|
|||||||
|
|
||||||
Described at: [https://openid.net/connect/](https://openid.net/connect/)
|
Described at: [https://openid.net/connect/](https://openid.net/connect/)
|
||||||
* [OpenID Connect Claims Aggregation](https://iiw.idcommons.net/5B/_OpenID_Connect_Claims_Aggregation) by Nat Sakimura, Edmund Jay, Kristina Yasuda
|
* [OpenID Connect Claims Aggregation](https://iiw.idcommons.net/5B/_OpenID_Connect_Claims_Aggregation) by Nat Sakimura, Edmund Jay, Kristina Yasuda
|
||||||
[2021-04-21_OpenID Connect Claims Aggregation](https://docs.google.com/presentation/d/1w-rmwZoLiFWczJ4chXuxhY0OsgHQmlIimS2TNlce4UU/edit?usp%3Dsharing)
|
[2021-04-21_OpenID Connect Claims Aggregation](https://docs.google.com/presentation/d/1w-rmwZoLiFWczJ4chXuxhY0OsgHQmlIimS2TNlce4UU/edit?usp=sharing)
|
||||||
|
|
||||||
* [OpenID Connect 4 Identity Assurance](https://iiw.idcommons.net/10J/_OpenID_Connect_4_Identity_Assurance) by Torsten Lodderstedt
|
* [OpenID Connect 4 Identity Assurance](https://iiw.idcommons.net/10J/_OpenID_Connect_4_Identity_Assurance) by Torsten Lodderstedt
|
||||||
> [https://www.slideshare.net/TorstenLodderstedt/openid-connect-4-identity-assurance-at-iiw-32](https://www.slideshare.net/TorstenLodderstedt/openid-connect-4-identity-assurance-at-iiw-32)
|
> [https://www.slideshare.net/TorstenLodderstedt/openid-connect-4-identity-assurance-at-iiw-32](https://www.slideshare.net/TorstenLodderstedt/openid-connect-4-identity-assurance-at-iiw-32)
|
||||||
@ -175,7 +175,7 @@ To recap:
|
|||||||
|
|
||||||
On their own independent schedules, all browsers have either broken or have plans to break state sharing via cross-site iframes to limit user tracking - arguably making the Session Management approach unusable.
|
On their own independent schedules, all browsers have either broken or have plans to break state sharing via cross-site iframes to limit user tracking - arguably making the Session Management approach unusable.
|
||||||
|
|
||||||
* [The OpenID Connect Logout specifications are now Final Specifications](https://self-issued.info/?p%3D2298)
|
* [The OpenID Connect Logout specifications are now Final Specifications](https://self-issued.info/?p=2298)
|
||||||
|
|
||||||
The OpenID Connect Logout specifications are now Final Specifications
|
The OpenID Connect Logout specifications are now Final Specifications
|
||||||
|
|
||||||
@ -201,11 +201,11 @@ Slides: [https://www.slideshare.net/TorstenLodderstedt/openid-connect-for-w3c-ve
|
|||||||
* OpenID: [Public Review Period for Proposed Final OpenID Connect Client-Initiated Backchannel Authentication (CIBA) Core Specification](https://openid.net/2021/06/07/public-review-period-for-proposed-final-openid-connect-client-initiated-backchannel-authentication-ciba-core-specification/)
|
* OpenID: [Public Review Period for Proposed Final OpenID Connect Client-Initiated Backchannel Authentication (CIBA) Core Specification](https://openid.net/2021/06/07/public-review-period-for-proposed-final-openid-connect-client-initiated-backchannel-authentication-ciba-core-specification/)
|
||||||
* [Distributed Open Identity: Self-Sovereign OpenID: A Status Report](https://identiverse.gallery.video/detail/videos/standards/video/6184823227001/distributed-open-identity:-self-sovereign-openid:-a-status-report?autoStart=true)
|
* [Distributed Open Identity: Self-Sovereign OpenID: A Status Report](https://identiverse.gallery.video/detail/videos/standards/video/6184823227001/distributed-open-identity:-self-sovereign-openid:-a-status-report?autoStart=true)
|
||||||
> follow up of the Identiverse 2019 session “SSO: Self-sovereign OpenID Connect – a ToDo list”. (Decentralized Identity, Mobile, Verified Claims & Credentials, Standards, Preeti Rastogi, Nat Sakimura)
|
> follow up of the Identiverse 2019 session “SSO: Self-sovereign OpenID Connect – a ToDo list”. (Decentralized Identity, Mobile, Verified Claims & Credentials, Standards, Preeti Rastogi, Nat Sakimura)
|
||||||
* [Personal Digital Transformation and Holistic Digital Identity](https://www.youtube.com/watch?v%3D9DExNTY3QAk) OpenID Japan ← His last public talk
|
* [Personal Digital Transformation and Holistic Digital Identity](https://www.youtube.com/watch?v=9DExNTY3QAk) OpenID Japan ← His last public talk
|
||||||
|
|
||||||
from the OpenID Summit Tokyo 2020 Keynote […] about Claims, Identity, Self-ness, Who-ness, and OpenID Connect and Decentralized Identity.
|
from the OpenID Summit Tokyo 2020 Keynote […] about Claims, Identity, Self-ness, Who-ness, and OpenID Connect and Decentralized Identity.
|
||||||
|
|
||||||
* [SIOP Use-cases - IIW Spring 2021](https://docs.google.com/presentation/d/1a0C4HvVYwwwDqSw3tgPNhy9Iqyufy9oZdnMgl7rQ9Vc/edit%23slide%3Did.p)
|
* [SIOP Use-cases - IIW Spring 2021](https://docs.google.com/presentation/d/1a0C4HvVYwwwDqSw3tgPNhy9Iqyufy9oZdnMgl7rQ9Vc/edit#slide=id.p)
|
||||||
|
|
||||||
- Continuity of a service
|
- Continuity of a service
|
||||||
- Offline Authentication
|
- Offline Authentication
|
||||||
@ -214,7 +214,7 @@ from the OpenID Summit Tokyo 2020 Keynote […] about Claims, Identity, Self-nes
|
|||||||
- Privacy
|
- Privacy
|
||||||
* [DID chooser for SIOP](https://iiw.idcommons.net/20A/_DID_chooser_for_SIOP) by tom jones & friends
|
* [DID chooser for SIOP](https://iiw.idcommons.net/20A/_DID_chooser_for_SIOP) by tom jones & friends
|
||||||
|
|
||||||
* [https://docs.google.com/presentation/d/1OaMecHecTUexv1skJZoYzJoHKYH8H03REFpFstLRjPg/edit?ts=607b7e5d#slide=id.gd2c45a9dcd_7_21](https://docs.google.com/presentation/d/1OaMecHecTUexv1skJZoYzJoHKYH8H03REFpFstLRjPg/edit?ts%3D607b7e5d%23slide%3Did.gd2c45a9dcd_7_21)
|
* [https://docs.google.com/presentation/d/1OaMecHecTUexv1skJZoYzJoHKYH8H03REFpFstLRjPg/edit?ts=607b7e5d#slide=id.gd2c45a9dcd_7_21](https://docs.google.com/presentation/d/1OaMecHecTUexv1skJZoYzJoHKYH8H03REFpFstLRjPg/edit?ts=607b7e5d#slide=id.gd2c45a9dcd_7_21)
|
||||||
|
|
||||||
Goal is to allow folks to pick their DID they want to use for a website.
|
Goal is to allow folks to pick their DID they want to use for a website.
|
||||||
“Subject choosing which DID to present”.
|
“Subject choosing which DID to present”.
|
||||||
@ -237,10 +237,10 @@ RP should disclose their ID and why they are asking the user for what data.
|
|||||||
Options we consider:
|
Options we consider:
|
||||||
|
|
||||||
- [https://w3c-ccg.github.io/credential-handler-api/](https://w3c-ccg.github.io/credential-handler-api/)
|
- [https://w3c-ccg.github.io/credential-handler-api/](https://w3c-ccg.github.io/credential-handler-api/)
|
||||||
- [https://w3c-ccg.github.io/vp-request-spec/#format](https://w3c-ccg.github.io/vp-request-spec/%23format)
|
- [https://w3c-ccg.github.io/vp-request-spec/#format](https://w3c-ccg.github.io/vp-request-spec/#format)
|
||||||
- [https://specs.bloom.co/wallet-and-credential-interactions/](https://specs.bloom.co/wallet-and-credential-interactions/)
|
- [https://specs.bloom.co/wallet-and-credential-interactions/](https://specs.bloom.co/wallet-and-credential-interactions/)
|
||||||
- [https://github.com/w3c-ccg/universal-wallet-interop-spec/issues/84](https://github.com/w3c-ccg/universal-wallet-interop-spec/issues/84)
|
- [https://github.com/w3c-ccg/universal-wallet-interop-spec/issues/84](https://github.com/w3c-ccg/universal-wallet-interop-spec/issues/84)
|
||||||
* [Using OpenID4VC for Credential Exchange; Technometria - Issue #62](http://news.windley.com/issues/using-openid4vc-for-credential-exchange-technometria-issue-62-1374264?via%3Dtwitter-card%26client%3DDesktopWeb%26element%3Dissue-card)
|
* [Using OpenID4VC for Credential Exchange; Technometria - Issue #62](http://news.windley.com/issues/using-openid4vc-for-credential-exchange-technometria-issue-62-1374264?via=twitter-card&client=DesktopWeb&element=issue-card)
|
||||||
|
|
||||||
Extending OAuth and OIDC to support the issuance and presentation of verifiable credentials provides for richer interactions than merely supporting authentication. All the use cases we’ve identified for verifiable credentials are available in OpenID4VC as well.
|
Extending OAuth and OIDC to support the issuance and presentation of verifiable credentials provides for richer interactions than merely supporting authentication. All the use cases we’ve identified for verifiable credentials are available in OpenID4VC as well.
|
||||||
|
|
||||||
|
@ -50,7 +50,7 @@ GAIN is marked by a cross sector, crowd sourced, open, global due diligence. GAI
|
|||||||
> In a matter of a few days, I heard many inspiring presentations, had many interesting conversations, and met many wonderful people in this field at the Conference. It has already led to multiple conversations of working together regarding future stakeholder research that will hopefully be useful and support the identity community.
|
> In a matter of a few days, I heard many inspiring presentations, had many interesting conversations, and met many wonderful people in this field at the Conference. It has already led to multiple conversations of working together regarding future stakeholder research that will hopefully be useful and support the identity community.
|
||||||
* [OpenID Foundation Publishes “Open Banking and Open Data: Ready to Cross Borders?”](https://openid.net/2022/07/29/whitepaper-open-banking-and-open-data/) OpenID
|
* [OpenID Foundation Publishes “Open Banking and Open Data: Ready to Cross Borders?”](https://openid.net/2022/07/29/whitepaper-open-banking-and-open-data/) OpenID
|
||||||
* [OpenID Foundation Publishes “The Global Open Health Movement: Empowering People and Saving Lives by Unlocking Data” Whitepaper](https://openid.net/2022/07/22/the-global-open-health-movement-empowering-people-and-saving-lives-by-unlocking-data-whitepaper/) OpenID
|
* [OpenID Foundation Publishes “The Global Open Health Movement: Empowering People and Saving Lives by Unlocking Data” Whitepaper](https://openid.net/2022/07/22/the-global-open-health-movement-empowering-people-and-saving-lives-by-unlocking-data-whitepaper/) OpenID
|
||||||
* [Passing the Torch at the OpenID Foundation](https://self-issued.info/?p%3D2170) Mike Jones
|
* [Passing the Torch at the OpenID Foundation](https://self-issued.info/?p=2170) Mike Jones
|
||||||
> Today marks an important milestone in the life of the OpenID Foundation and the worldwide digital identity community. Following [Don Thibeau’s decade of exemplary service to the OpenID Foundation as its Executive Director](https://openid.net/2021/02/19/resolution-thanking-don-thibeau-for-his-service/), today we [welcomed Gail Hodges as our new Executive Director](https://openid.net/2021/04/28/welcoming-gail-hodges-as-our-new-executive-director/).
|
> Today marks an important milestone in the life of the OpenID Foundation and the worldwide digital identity community. Following [Don Thibeau’s decade of exemplary service to the OpenID Foundation as its Executive Director](https://openid.net/2021/02/19/resolution-thanking-don-thibeau-for-his-service/), today we [welcomed Gail Hodges as our new Executive Director](https://openid.net/2021/04/28/welcoming-gail-hodges-as-our-new-executive-director/).
|
||||||
* [Announcing the 2022 OpenID Foundation Individual Community Board Member Election](https://openid.net/2021/12/30/announcing-the-2022-openid-foundation-individual-community-board-member-election/)
|
* [Announcing the 2022 OpenID Foundation Individual Community Board Member Election](https://openid.net/2021/12/30/announcing-the-2022-openid-foundation-individual-community-board-member-election/)
|
||||||
|
|
||||||
@ -64,7 +64,7 @@ Board participation requires a substantial investment of time and energy. It is
|
|||||||
|
|
||||||
* [Public Review Period for Second Proposed RISC Profile Implementer’s Draft](https://openid.net/2022/07/05/public-review-period-for-second-proposed-risc-profile-implementers-draft/)
|
* [Public Review Period for Second Proposed RISC Profile Implementer’s Draft](https://openid.net/2022/07/05/public-review-period-for-second-proposed-risc-profile-implementers-draft/)
|
||||||
|
|
||||||
This specification defines event types and their contents based on the [SSE Framework](https://openid.net/specs/openid-risc-profile-specification-1_0-02.html%23SSE-FRAMEWORK) that are required to implement Risk Incident Sharing and Coordination.
|
This specification defines event types and their contents based on the [SSE Framework](https://openid.net/specs/openid-risc-profile-specification-1_0-02.html#SSE-FRAMEWORK) that are required to implement Risk Incident Sharing and Coordination.
|
||||||
* [Global Assured Identity Network White Paper](https://openid.net/2021/09/20/global-assured-identity-network-white-paper/)
|
* [Global Assured Identity Network White Paper](https://openid.net/2021/09/20/global-assured-identity-network-white-paper/)
|
||||||
|
|
||||||
* [Announcing the 2022 OpenID Foundation Kim Cameron Scholarship](https://openid.net/2022/04/08/announcing-the-2022-openid-foundation-kim-cameron-scholarship/) OpenID
|
* [Announcing the 2022 OpenID Foundation Kim Cameron Scholarship](https://openid.net/2022/04/08/announcing-the-2022-openid-foundation-kim-cameron-scholarship/) OpenID
|
||||||
@ -144,7 +144,7 @@ just like trade unions helped the working class during the industrial revolution
|
|||||||
* [Shared Signals: An Open Standard for Webhooks](https://openid.net/2021/08/24/shared-signals-an-open-standard-for-webhooks/) OpenID
|
* [Shared Signals: An Open Standard for Webhooks](https://openid.net/2021/08/24/shared-signals-an-open-standard-for-webhooks/) OpenID
|
||||||
|
|
||||||
The OpenID Foundation formed the “[Shared Signals and Events](https://openid.net/wg/sse/)” (SSE) Working Group as a combination of the previous OpenID RISC working group and an informal industry group that was focused on standardizing [Google’s CAEP proposal](https://cloud.google.com/blog/products/identity-security/re-thinking-federated-identity-with-the-continuous-access-evaluation-protocol). These represented two distinct applications of the same underlying mechanism of managing asynchronous streams of events. Therefore the [SSE Framework](https://openid.net/specs/openid-sse-framework-1_0-01.html) is now proposed to be a standard for managing such streams of events for any application, not just CAEP and RISC. In effect, it is a standard for generalized Webhooks.
|
The OpenID Foundation formed the “[Shared Signals and Events](https://openid.net/wg/sse/)” (SSE) Working Group as a combination of the previous OpenID RISC working group and an informal industry group that was focused on standardizing [Google’s CAEP proposal](https://cloud.google.com/blog/products/identity-security/re-thinking-federated-identity-with-the-continuous-access-evaluation-protocol). These represented two distinct applications of the same underlying mechanism of managing asynchronous streams of events. Therefore the [SSE Framework](https://openid.net/specs/openid-sse-framework-1_0-01.html) is now proposed to be a standard for managing such streams of events for any application, not just CAEP and RISC. In effect, it is a standard for generalized Webhooks.
|
||||||
* [Proof-of-possession (pop) AMR method added to OpenID Enhanced Authentication Profile spec](https://self-issued.info/?p%3D2198) Mike Jones
|
* [Proof-of-possession (pop) AMR method added to OpenID Enhanced Authentication Profile spec](https://self-issued.info/?p=2198) Mike Jones
|
||||||
|
|
||||||
I’ve defined an Authentication Method Reference (AMR) value called “pop” to indicate that Proof-of-possession of a key was performed. Unlike the existing “hwk” (hardware key) and “swk” (software key) methods [...] Among other use cases, this AMR method is applicable whenever a [WebAuthn](https://www.w3.org/TR/2021/REC-webauthn-2-20210408/) or [FIDO](https://fidoalliance.org/specs/fido-v2.1-ps-20210615/fido-client-to-authenticator-protocol-v2.1-ps-20210615.html) authenticator are used.
|
I’ve defined an Authentication Method Reference (AMR) value called “pop” to indicate that Proof-of-possession of a key was performed. Unlike the existing “hwk” (hardware key) and “swk” (software key) methods [...] Among other use cases, this AMR method is applicable whenever a [WebAuthn](https://www.w3.org/TR/2021/REC-webauthn-2-20210408/) or [FIDO](https://fidoalliance.org/specs/fido-v2.1-ps-20210615/fido-client-to-authenticator-protocol-v2.1-ps-20210615.html) authenticator are used.
|
||||||
|
|
||||||
|
@ -13,7 +13,7 @@
|
|||||||
This year’s FIDO Developer Challenge reached a successful conclusion, with a ceremonial event during [Authenticate 2021](https://authenticatecon.com/event/authenticate-2021-conference/) of the ceremony is available now, and we’re pleased to share more detailed stories of the three finalists as well as the rest of the teams that made it to the final stage.
|
This year’s FIDO Developer Challenge reached a successful conclusion, with a ceremonial event during [Authenticate 2021](https://authenticatecon.com/event/authenticate-2021-conference/) of the ceremony is available now, and we’re pleased to share more detailed stories of the three finalists as well as the rest of the teams that made it to the final stage.
|
||||||
* [Integrating FIDO with Verifiable Credentials (8.30 am start)](https://iiw.idcommons.net/10E/_Integrating_FIDO_with_Verifiable_Credentials_(8.30_am_start)) by David Chadwick
|
* [Integrating FIDO with Verifiable Credentials (8.30 am start)](https://iiw.idcommons.net/10E/_Integrating_FIDO_with_Verifiable_Credentials_(8.30_am_start)) by David Chadwick
|
||||||
|
|
||||||
* [The Use of FIDO2 and Verifiable Credentials (David Chadwick)](https://youtube.com/watch?v%3Dl3taGxBdrRU)
|
* [The Use of FIDO2 and Verifiable Credentials (David Chadwick)](https://youtube.com/watch?v=l3taGxBdrRU)
|
||||||
|
|
||||||
W3C Web Authentication (FIDO2) provides a mechanism for strong authentication whilst W3C Verifiable Credentials provide a mechanism for strong identification and authorisation. Together they make an unbeatable pair for identity management.
|
W3C Web Authentication (FIDO2) provides a mechanism for strong authentication whilst W3C Verifiable Credentials provide a mechanism for strong identification and authorisation. Together they make an unbeatable pair for identity management.
|
||||||
|
|
||||||
|
@ -69,7 +69,7 @@ Women’s Rights and Technology Intersection feel very poinient this week
|
|||||||
|
|
||||||
* [Section 230 Is a Last Line of Defense for Abortion Speech Online](https://www.wired.com/story/section-230-is-a-last-line-of-defense-for-abortion-speech-online/) Wired
|
* [Section 230 Is a Last Line of Defense for Abortion Speech Online](https://www.wired.com/story/section-230-is-a-last-line-of-defense-for-abortion-speech-online/) Wired
|
||||||
|
|
||||||
Democrats who have been misguidedly attacking Section 230 of the Communications Decency Act need to wake up now. If they don’t [start listening](https://www.thedailybeast.com/want-to-fix-big-tech-stop-ignoring-sex-workers) to the warnings of human rights experts, [sex workers](https://papers.ssrn.com/sol3/papers.cfm?abstract_id%3D4095115), LGBTQ+ folks, and [reproductive rights](https://freedomnetworkusa.org/app/uploads/2020/09/FNUSA-Joins-EARN-IT-Act-Coalition-letter-9.09.2020.pdf) groups, Democrats could help right-wing zealots achieve their goal: mass censorship of online content about abortion.
|
Democrats who have been misguidedly attacking Section 230 of the Communications Decency Act need to wake up now. If they don’t [start listening](https://www.thedailybeast.com/want-to-fix-big-tech-stop-ignoring-sex-workers) to the warnings of human rights experts, [sex workers](https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4095115), LGBTQ+ folks, and [reproductive rights](https://freedomnetworkusa.org/app/uploads/2020/09/FNUSA-Joins-EARN-IT-Act-Coalition-letter-9.09.2020.pdf) groups, Democrats could help right-wing zealots achieve their goal: mass censorship of online content about abortion.
|
||||||
|
|
||||||
|
|
||||||
## Identity not SSI
|
## Identity not SSI
|
||||||
@ -121,6 +121,6 @@ Under [federal rules](https://www.healthit.gov/buzz-blog/information-blocking/in
|
|||||||
## Known
|
## Known
|
||||||
* [Known](https://withknown.com/) has supported [Indieweb](https://indieweb.org/) standards since the beginning, but Fediverse has been notably missing. I think that’s a big omission, but also not something I’ve had bandwidth to fix.
|
* [Known](https://withknown.com/) has supported [Indieweb](https://indieweb.org/) standards since the beginning, but Fediverse has been notably missing. I think that’s a big omission, but also not something I’ve had bandwidth to fix.
|
||||||
* [Building ActivityPub into Known](https://werd.io/2021/building-activitypub-into-known) Ben Werdmüller
|
* [Building ActivityPub into Known](https://werd.io/2021/building-activitypub-into-known) Ben Werdmüller
|
||||||
* [ActivityPub support · Issue #2615 · idno/known · GitHub](https://github.com/idno/known/issues/2615%23issuecomment-991335313)
|
* [ActivityPub support · Issue #2615 · idno/known · GitHub](https://github.com/idno/known/issues/2615#issuecomment-991335313)
|
||||||
|
|
||||||
This issue now has a funding of 3004.5068 USD (3000.0 USD @ $1.0/USD) attached to it.
|
This issue now has a funding of 3004.5068 USD (3000.0 USD @ $1.0/USD) attached to it.
|
||||||
|
@ -85,7 +85,7 @@ JSON has its place. But I think we're overusing it in places where a good notati
|
|||||||
>
|
>
|
||||||
> Regarding the standard itself metadata and display are entering the default standard. metadata comes in replacement of metadataJson and remains a stringified JSON that will allow consumers to register specific data which are too unique for issuances to be defined in the context.
|
> Regarding the standard itself metadata and display are entering the default standard. metadata comes in replacement of metadataJson and remains a stringified JSON that will allow consumers to register specific data which are too unique for issuances to be defined in the context.
|
||||||
>
|
>
|
||||||
> display brings in [a little bit of novelty 2](https://github.com/blockchain-certificates/cert-schema/blob/master/cert_schema/3.0/displaySchema.json%23L6) images or pdfs, in addition to the more classic HTML.
|
> display brings in [a little bit of novelty 2](https://github.com/blockchain-certificates/cert-schema/blob/master/cert_schema/3.0/displaySchema.json#L6) images or pdfs, in addition to the more classic HTML.
|
||||||
* [Blockcerts v3 release, a Verifiable Credentials implementation](https://lists.w3.org/Archives/Public/public-credentials/2021Dec/0051.html) Julien Fraichot (Monday, 13 December)
|
* [Blockcerts v3 release, a Verifiable Credentials implementation](https://lists.w3.org/Archives/Public/public-credentials/2021Dec/0051.html) Julien Fraichot (Monday, 13 December)
|
||||||
> I am excited to share with you today the release of [Blockcerts](https://www.blockcerts.org/) V3. As you may already know the earlier versions of Blockcerts were architected by Kim H. Duffy through Learning Machine and leveraged the Open Badge standard.
|
> I am excited to share with you today the release of [Blockcerts](https://www.blockcerts.org/) V3. As you may already know the earlier versions of Blockcerts were architected by Kim H. Duffy through Learning Machine and leveraged the Open Badge standard.
|
||||||
>
|
>
|
||||||
@ -125,7 +125,7 @@ Family of standards related to timestamping
|
|||||||
|
|
||||||
## JWP
|
## JWP
|
||||||
|
|
||||||
* [JSON Web Proofs BoF at IETF 114 in Philadelphia](https://self-issued.info/?p%3D2286)
|
* [JSON Web Proofs BoF at IETF 114 in Philadelphia](https://self-issued.info/?p=2286)
|
||||||
- [Chair Slides](https://datatracker.ietf.org/meeting/114/materials/slides-114-jwp-json-web-proofs-chair-drafts-00) – [Karen O’Donoghue](https://twitter.com/kodonog) and [John Bradley](https://twitter.com/ve7jtb)
|
- [Chair Slides](https://datatracker.ietf.org/meeting/114/materials/slides-114-jwp-json-web-proofs-chair-drafts-00) – [Karen O’Donoghue](https://twitter.com/kodonog) and [John Bradley](https://twitter.com/ve7jtb)
|
||||||
- [The need: Standards for selective disclosure and zero-knowledge proofs](https://datatracker.ietf.org/meeting/114/materials/slides-114-jwp-the-need-standards-for-selective-disclosure-and-zero-knowledge-proofs-00) – [Mike Jones](https://twitter.com/selfissued)
|
- [The need: Standards for selective disclosure and zero-knowledge proofs](https://datatracker.ietf.org/meeting/114/materials/slides-114-jwp-the-need-standards-for-selective-disclosure-and-zero-knowledge-proofs-00) – [Mike Jones](https://twitter.com/selfissued)
|
||||||
- [What Would JOSE Do? Why re-form the JOSE working group to meet the need?](https://datatracker.ietf.org/meeting/114/materials/slides-114-jwp-the-need-standards-for-selective-disclosure-and-zero-knowledge-proofs-00) – [Mike Jones](https://twitter.com/selfissued)
|
- [What Would JOSE Do? Why re-form the JOSE working group to meet the need?](https://datatracker.ietf.org/meeting/114/materials/slides-114-jwp-the-need-standards-for-selective-disclosure-and-zero-knowledge-proofs-00) – [Mike Jones](https://twitter.com/selfissued)
|
||||||
@ -139,7 +139,7 @@ Family of standards related to timestamping
|
|||||||
|
|
||||||
|
|
||||||
### BBS Creds
|
### BBS Creds
|
||||||
- [aries-rfcs/0646-bbs-credentials#drawbacks](https://github.com/hyperledger/aries-rfcs/tree/main/features/0646-bbs-credentials%23drawbacks)
|
- [aries-rfcs/0646-bbs-credentials#drawbacks](https://github.com/hyperledger/aries-rfcs/tree/main/features/0646-bbs-credentials#drawbacks)
|
||||||
- [Zero-Knowledge Proofs Do Not Solve the Privacy-Trust Problem of Attribute-Based Credentials: What if Alice Is Evil?](https://ieeexplore.ieee.org/document/9031545) IEEE
|
- [Zero-Knowledge Proofs Do Not Solve the Privacy-Trust Problem of Attribute-Based Credentials: What if Alice Is Evil?](https://ieeexplore.ieee.org/document/9031545) IEEE
|
||||||
|
|
||||||
|
|
||||||
|
@ -35,7 +35,7 @@ PKI has created a global trust framework for the web. But the war in Ukraine has
|
|||||||
|
|
||||||
Governance, Trust Registry, Ecosystem, Transitive Trust, Architecture
|
Governance, Trust Registry, Ecosystem, Transitive Trust, Architecture
|
||||||
|
|
||||||
Presentation Deck: [GHP Ecosystem Trust Architecture PDF](https://drive.google.com/file/d/1Hgh5JvrM7aUCmg5q6KIXzvpVIcgfhTjr/view?usp%3Dsharing)
|
Presentation Deck: [GHP Ecosystem Trust Architecture PDF](https://drive.google.com/file/d/1Hgh5JvrM7aUCmg5q6KIXzvpVIcgfhTjr/view?usp=sharing)
|
||||||
|
|
||||||
- Proposed Trust Interoperability (Global) for the Good Health Pass (GHP) Ecosystem
|
- Proposed Trust Interoperability (Global) for the Good Health Pass (GHP) Ecosystem
|
||||||
- Kaliya Young & Rebecca Distler - Working Group Co-Leads
|
- Kaliya Young & Rebecca Distler - Working Group Co-Leads
|
||||||
@ -84,7 +84,7 @@ Links from chat:
|
|||||||
- Sterre den Breeijen to Everyone : [https://blockchain.tno.nl/blog/verify-the-verifier-anti-coercion-by-design/](https://blockchain.tno.nl/blog/verify-the-verifier-anti-coercion-by-design/) Blog on anti-coercion by my colleague Oskar van Deventer
|
- Sterre den Breeijen to Everyone : [https://blockchain.tno.nl/blog/verify-the-verifier-anti-coercion-by-design/](https://blockchain.tno.nl/blog/verify-the-verifier-anti-coercion-by-design/) Blog on anti-coercion by my colleague Oskar van Deventer
|
||||||
- Bart Suichies to Everyone : @judith: [https://gitlab.grnet.gr/essif-lab/infrastructure/fraunhofer/train_project_summary](https://gitlab.grnet.gr/essif-lab/infrastructure/fraunhofer/train_project_summary)
|
- Bart Suichies to Everyone : @judith: [https://gitlab.grnet.gr/essif-lab/infrastructure/fraunhofer/train_project_summary](https://gitlab.grnet.gr/essif-lab/infrastructure/fraunhofer/train_project_summary)
|
||||||
- Darrell O'Donnell to Everyone : TRAIN - [https://essif-lab.eu/essif-train-by-fraunhofer-gesellschaft/](https://essif-lab.eu/essif-train-by-fraunhofer-gesellschaft/)
|
- Darrell O'Donnell to Everyone : TRAIN - [https://essif-lab.eu/essif-train-by-fraunhofer-gesellschaft/](https://essif-lab.eu/essif-train-by-fraunhofer-gesellschaft/)
|
||||||
- Drummond Reed to Everyone : Bart, I am totally on board with the human-readable element for GHP. Happy to chat more with you about that. There is a lot of focus on that in the [Consistent User Experience drafting group](https://wiki.trustoverip.org/display/HOME/Consistent%2BUser%2BExperience%2BDrafting%2BGroup)
|
- Drummond Reed to Everyone : Bart, I am totally on board with the human-readable element for GHP. Happy to chat more with you about that. There is a lot of focus on that in the [Consistent User Experience drafting group](https://wiki.trustoverip.org/display/HOME/Consistent+User+Experience+Drafting+Group)
|
||||||
[Pan-Canadian Trust Framework](https://diacc.ca/wp-content/uploads/2016/08/PCTF-Overview-FINAL.pdf)
|
[Pan-Canadian Trust Framework](https://diacc.ca/wp-content/uploads/2016/08/PCTF-Overview-FINAL.pdf)
|
||||||
* [Towards a Better Digital Identity Trust Framework in Aotearoa](https://digitalidentity.nz/2022/09/21/towards-a-better-digital-identity-trust-framework-in-aotearoa/) Digital Identity NZ
|
* [Towards a Better Digital Identity Trust Framework in Aotearoa](https://digitalidentity.nz/2022/09/21/towards-a-better-digital-identity-trust-framework-in-aotearoa/) Digital Identity NZ
|
||||||
|
|
||||||
|
@ -63,7 +63,7 @@ published: false
|
|||||||
## Varieties
|
## Varieties
|
||||||
|
|
||||||
* [Verifiable Credentials Specifications Relationship Diagram](https://github.com/manicprogrammer/vc-spec-rel/) "Good for anyone but especially useful when trying to jump in on the deep end. If you walk even this limited tree of specs you know a lot" - [@michaelruminer](https://twitter.com/michaelruminer/status/1328827452886540296)
|
* [Verifiable Credentials Specifications Relationship Diagram](https://github.com/manicprogrammer/vc-spec-rel/) "Good for anyone but especially useful when trying to jump in on the deep end. If you walk even this limited tree of specs you know a lot" - [@michaelruminer](https://twitter.com/michaelruminer/status/1328827452886540296)
|
||||||
* [Paper based Verifiable Credentials](https://www.youtube.com/watch?v%3DEXvWxFjHvdY) Mattr
|
* [Paper based Verifiable Credentials](https://www.youtube.com/watch?v=EXvWxFjHvdY) Mattr
|
||||||
> Paper-based Verifiable Credentials allow us to have a low-tech solution for adopting VC's in situations where access to a phone cannot be guaranteed. This presentation looks at how this solution can be used to aid with the distribution of Vaccine Credentials.
|
> Paper-based Verifiable Credentials allow us to have a low-tech solution for adopting VC's in situations where access to a phone cannot be guaranteed. This presentation looks at how this solution can be used to aid with the distribution of Vaccine Credentials.
|
||||||
* [The Flavors of Verifiable Credentials](https://www.lfph.io/2021/02/11/cci-verifiable-credentials-flavors-and-interoperability-paper/) Linux Foundation Public Health Blog [pdf]((https://www.lfph.io/wp-content/uploads/2021/02/Verifiable-Credentials-Flavors-Explained.pdf))
|
* [The Flavors of Verifiable Credentials](https://www.lfph.io/2021/02/11/cci-verifiable-credentials-flavors-and-interoperability-paper/) Linux Foundation Public Health Blog [pdf]((https://www.lfph.io/wp-content/uploads/2021/02/Verifiable-Credentials-Flavors-Explained.pdf))
|
||||||
> The differences between the different flavors of VCs for technically inclined readers. It elaborated on the differences between JSON and JSON-LD and articulated differences between the two different implementations of ZKP style credentials. The ‘Journey of a VC’ section articulated all steps where VCs are active and highlighted the differences in how different VC flavors ’behave’.
|
> The differences between the different flavors of VCs for technically inclined readers. It elaborated on the differences between JSON and JSON-LD and articulated differences between the two different implementations of ZKP style credentials. The ‘Journey of a VC’ section articulated all steps where VCs are active and highlighted the differences in how different VC flavors ’behave’.
|
||||||
@ -102,15 +102,15 @@ We design, implement, and evaluate a solution for achieving continuous authoriza
|
|||||||
> * [The Data Integrity test suite for Ed25519Signature2020 interop is here](https://w3c-ccg.github.io/di-ed25519-test-suite/)
|
> * [The Data Integrity test suite for Ed25519Signature2020 interop is here](https://w3c-ccg.github.io/di-ed25519-test-suite/)
|
||||||
* [Cross-industry VC API test suite achieves first multi-vendor interop for issue/verify](https://lists.w3.org/Archives/Public/public-credentials/2022May/0041.html) Manu Sporny (Wednesday, 18 May)
|
* [Cross-industry VC API test suite achieves first multi-vendor interop for issue/verify](https://lists.w3.org/Archives/Public/public-credentials/2022May/0041.html) Manu Sporny (Wednesday, 18 May)
|
||||||
> We are happy to announce today that we have our first demonstration of cross-vendor interoperability between Danube Tech and Digital Bazaar for the VC Issuer API and VC Verifier API. The test suites test the OAS definition files (which are used to generate the specification):
|
> We are happy to announce today that we have our first demonstration of cross-vendor interoperability between Danube Tech and Digital Bazaar for the VC Issuer API and VC Verifier API. The test suites test the OAS definition files (which are used to generate the specification):
|
||||||
> * [2.1 Verify Credential - Data Integrity](https://w3c-ccg.github.io/vc-api-verifier-test-suite/%23Verify%2520Credential%2520-%2520Data%2520Integrity)
|
> * [2.1 Verify Credential - Data Integrity](https://w3c-ccg.github.io/vc-api-verifier-test-suite/#Verify%20Credential%20-%20Data%20Integrity)
|
||||||
> * [2.1 Issue Credential - Data Integrity](https://w3c-ccg.github.io/vc-api-issuer-test-suite/%23Issue%2520Credential%2520-%2520Data%2520Integrity)
|
> * [2.1 Issue Credential - Data Integrity](https://w3c-ccg.github.io/vc-api-issuer-test-suite/#Issue%20Credential%20-%20Data%20Integrity)
|
||||||
|
|
||||||
* [Diagrams for VC HTTP API work [was Re: [AGENDA] VC HTTP API Work Item - August 17th 2021]](https://lists.w3.org/Archives/Public/public-credentials/2021Aug/0231.html) Joe Andrieu (Monday, 16 August)
|
* [Diagrams for VC HTTP API work [was Re: [AGENDA] VC HTTP API Work Item - August 17th 2021]](https://lists.w3.org/Archives/Public/public-credentials/2021Aug/0231.html) Joe Andrieu (Monday, 16 August)
|
||||||
> ![](https://i.imgur.com/4hCNLVA.png)
|
> ![](https://i.imgur.com/4hCNLVA.png)
|
||||||
* [Issuer API Cross Trust Boundary Scoping - VC-HAPI (f.k.a. VC-HTTP-API)](https://lists.w3.org/Archives/Public/public-credentials/2021Jul/0263.html) Brian Richter (Saturday, 24 July)
|
* [Issuer API Cross Trust Boundary Scoping - VC-HAPI (f.k.a. VC-HTTP-API)](https://lists.w3.org/Archives/Public/public-credentials/2021Jul/0263.html) Brian Richter (Saturday, 24 July)
|
||||||
> I think I'm starting to understand how RAR fits into this picture. This decision can be made for us by punting the question to the authorization process entirely. With RAR we can force the user to authorize for the actual subject they are issuing the credential about. Is Alice authorized to issue VCs with claims about did:example:12345? To answer that question Alice asks for a token with the following RAR request
|
> I think I'm starting to understand how RAR fits into this picture. This decision can be made for us by punting the question to the authorization process entirely. With RAR we can force the user to authorize for the actual subject they are issuing the credential about. Is Alice authorized to issue VCs with claims about did:example:12345? To answer that question Alice asks for a token with the following RAR request
|
||||||
* [RAR Structures for VC HTTP API](https://lists.w3.org/Archives/Public/public-credentials/2021Jul/0208.html) Justin Richer (Wednesday, 21 July)
|
* [RAR Structures for VC HTTP API](https://lists.w3.org/Archives/Public/public-credentials/2021Jul/0208.html) Justin Richer (Wednesday, 21 July)
|
||||||
> It seemed like a good idea when I first invented it a decade ago: [](https://blue-button.github.io/blue-button-plus-pull/%23scopes)[https://blue-button.github.io/blue-button-plus-pull/#scopes](https://blue-button.github.io/blue-button-plus-pull/%23scopes) or when it got pulled into other efforts like [https://openid.net/specs/openid-heart-fhir-oauth2-1_0-2017-05-31.html](https://openid.net/specs/openid-heart-fhir-oauth2-1_0-2017-05-31.html)… and Orie even suggested the following set of parameterized scopes for this API:
|
> It seemed like a good idea when I first invented it a decade ago: [](https://blue-button.github.io/blue-button-plus-pull/#scopes)[https://blue-button.github.io/blue-button-plus-pull/#scopes](https://blue-button.github.io/blue-button-plus-pull/#scopes) or when it got pulled into other efforts like [https://openid.net/specs/openid-heart-fhir-oauth2-1_0-2017-05-31.html](https://openid.net/specs/openid-heart-fhir-oauth2-1_0-2017-05-31.html)… and Orie even suggested the following set of parameterized scopes for this API:
|
||||||
> 'create:credentials': Grants permission to create credentials\
|
> 'create:credentials': Grants permission to create credentials\
|
||||||
> 'derive:credentials': Grants permission to derive credentials\
|
> 'derive:credentials': Grants permission to derive credentials\
|
||||||
> 'create:presentations': Grants permission to create presentations\
|
> 'create:presentations': Grants permission to create presentations\
|
||||||
|
@ -10,7 +10,7 @@ SC Election results: DIF welcomes new SC members Sam Curren, Daniel Buchner, Kar
|
|||||||
|
|
||||||
DIF announces its first community microgrant, sponsored by Microsoft and rewarding the timely creation of a comprehensive test suite for detached-JWS signatures on Verifiable Credentials
|
DIF announces its first community microgrant, sponsored by Microsoft and rewarding the timely creation of a comprehensive test suite for detached-JWS signatures on Verifiable Credentials
|
||||||
|
|
||||||
* [IIW32 - A wave of DIF donations and debuts](https://blog.identity.foundation/dif-monthly-18-may-2021/%23iiw32a-wave-of-dif-donations-and-debuts) DIF Newsletter
|
* [IIW32 - A wave of DIF donations and debuts](https://blog.identity.foundation/dif-monthly-18-may-2021/#iiw32a-wave-of-dif-donations-and-debuts) DIF Newsletter
|
||||||
- [Finding the Bell Curve of Meaning](https://medium.com/decentralized-identity/finding-the-bell-curve-of-meaning-61a1d22b7bdd) - A process for supporting the emergence of shared language in broad collaborative communities
|
- [Finding the Bell Curve of Meaning](https://medium.com/decentralized-identity/finding-the-bell-curve-of-meaning-61a1d22b7bdd) - A process for supporting the emergence of shared language in broad collaborative communities
|
||||||
* [DIF has a Discord](https://twitter.com/DecentralizedID/status/1517083722729738241)
|
* [DIF has a Discord](https://twitter.com/DecentralizedID/status/1517083722729738241)
|
||||||
|
|
||||||
@ -69,8 +69,8 @@ The Interoperability working group will be tracking them and providing guidance
|
|||||||
* [Setting Interoperability Targets Part 2 of 2](https://medium.com/decentralized-identity/setting-interoperability-targets-part-2-of-2-671f8faa8ecb) DIF
|
* [Setting Interoperability Targets Part 2 of 2](https://medium.com/decentralized-identity/setting-interoperability-targets-part-2-of-2-671f8faa8ecb) DIF
|
||||||
|
|
||||||
Having shown in our last piece how interoperability “profiles” are designed, we now tackle some key technical problem areas ripe for this kind of profile-first interoperability work across stacks.
|
Having shown in our last piece how interoperability “profiles” are designed, we now tackle some key technical problem areas ripe for this kind of profile-first interoperability work across stacks.
|
||||||
- [TBD’s test results of JWS Test Suite](https://identity.foundation/JWS-Test-Suite/%23tbd)
|
- [TBD’s test results of JWS Test Suite](https://identity.foundation/JWS-Test-Suite/#tbd)
|
||||||
- [Spruce’s test results of JWS Test Suite](https://identity.foundation/JWS-Test-Suite/%23spruce)
|
- [Spruce’s test results of JWS Test Suite](https://identity.foundation/JWS-Test-Suite/#spruce)
|
||||||
|
|
||||||
* [DIF Interoperability Survey](https://docs.google.com/forms/d/e/1FAIpQLSfbFh4DQeyI0msXsWvfpbrtYEfgQrGRD7tw4d2Rg0NEyhvcKQ/viewform)
|
* [DIF Interoperability Survey](https://docs.google.com/forms/d/e/1FAIpQLSfbFh4DQeyI0msXsWvfpbrtYEfgQrGRD7tw4d2Rg0NEyhvcKQ/viewform)
|
||||||
|
|
||||||
@ -90,4 +90,4 @@ At its core, WACI can be thought of as a handshake using classic, industry-stand
|
|||||||
|
|
||||||
* [DIF Monthly #28](https://blog.identity.foundation/dif-monthly-28/)
|
* [DIF Monthly #28](https://blog.identity.foundation/dif-monthly-28/)
|
||||||
|
|
||||||
Table of contents: 1. [Foundation News](https://blog.identity.foundation/dif-monthly-28/%23foundation); 2. [Group Updates](https://blog.identity.foundation/dif-monthly-28/%23groups); 3. [Member Updates](https://blog.identity.foundation/dif-monthly-28/%23members); 4. [Digital Identity Community](https://blog.identity.foundation/dif-monthly-28/%23Community); .5. [Funding](https://blog.identity.foundation/dif-monthly-28/%23funding); 6. [Events](https://blog.identity.foundation/dif-monthly-28/%23community); 7. [Hackathons](https://blog.identity.foundation/dif-monthly-28/%23hackathons); 8. [Jobs](https://blog.identity.foundation/dif-monthly-28/%23jobs); 9. [Metrics](https://blog.identity.foundation/dif-monthly-28/%23metrics); 10. [Get involved! Join DIF](https://blog.identity.foundation/dif-monthly-28/%23join)
|
Table of contents: 1. [Foundation News](https://blog.identity.foundation/dif-monthly-28/#foundation); 2. [Group Updates](https://blog.identity.foundation/dif-monthly-28/#groups); 3. [Member Updates](https://blog.identity.foundation/dif-monthly-28/#members); 4. [Digital Identity Community](https://blog.identity.foundation/dif-monthly-28/#Community); .5. [Funding](https://blog.identity.foundation/dif-monthly-28/#funding); 6. [Events](https://blog.identity.foundation/dif-monthly-28/#community); 7. [Hackathons](https://blog.identity.foundation/dif-monthly-28/#hackathons); 8. [Jobs](https://blog.identity.foundation/dif-monthly-28/#jobs); 9. [Metrics](https://blog.identity.foundation/dif-monthly-28/#metrics); 10. [Get involved! Join DIF](https://blog.identity.foundation/dif-monthly-28/#join)
|
||||||
|
@ -6,7 +6,7 @@ Three new TOIP Task Forces
|
|||||||
|
|
||||||
The ToIP Technology Stack Working group is starting an - [Artificial Intelligence and the Metaverse (AIM) Task Force](https://trustoverip.org/blog/2022/07/20/announcing-artificial-intelligence-metaverse-technology-task-force/)
|
The ToIP Technology Stack Working group is starting an - [Artificial Intelligence and the Metaverse (AIM) Task Force](https://trustoverip.org/blog/2022/07/20/announcing-artificial-intelligence-metaverse-technology-task-force/)
|
||||||
|
|
||||||
More details are available at [AI & Metaverse Technology Task Force – Home – Confluence (trustoverip.org)](https://wiki.trustoverip.org/pages/viewpage.action?pageId%3D19657312) (next meeting [8/4](https://wiki.trustoverip.org/display/HOME/Calendar%2Bof%2BToIP%2BMeetings))
|
More details are available at [AI & Metaverse Technology Task Force – Home – Confluence (trustoverip.org)](https://wiki.trustoverip.org/pages/viewpage.action?pageId=19657312) (next meeting [8/4](https://wiki.trustoverip.org/display/HOME/Calendar+of+ToIP+Meetings))
|
||||||
|
|
||||||
The ToIP Governance Stack Working group is starting a - Governance Architecture Task Force
|
The ToIP Governance Stack Working group is starting a - Governance Architecture Task Force
|
||||||
|
|
||||||
@ -22,7 +22,7 @@ The ToIP Concepts and Terminology Working group is proposing starting a - Mental
|
|||||||
If you are interested Ping the ToIP Slack channel: #concepts-terminology-wg or email Judith@trustoverip.org
|
If you are interested Ping the ToIP Slack channel: #concepts-terminology-wg or email Judith@trustoverip.org
|
||||||
|
|
||||||
|
|
||||||
* [View From The Field, Riley Hughes](https://www.youtube.com/watch?v%3Dz3H40QAEJnw%26t%3D2s) Trust Over IP Foundation
|
* [View From The Field, Riley Hughes](https://www.youtube.com/watch?v=z3H40QAEJnw&t=2s) Trust Over IP Foundation
|
||||||
|
|
||||||
Perspectives on the business problems being addressed by ToIP-aligned solutions. Primary research performed by Trinsic to get to the core issues getting in the way of scaling adoption of trust solutions. Riley presents his results and offers perspectives on how to overcome the various challenges.
|
Perspectives on the business problems being addressed by ToIP-aligned solutions. Primary research performed by Trinsic to get to the core issues getting in the way of scaling adoption of trust solutions. Riley presents his results and offers perspectives on how to overcome the various challenges.
|
||||||
* [TrustOverIP Model](https://trustoverip.org/wp-content/toip-model/)
|
* [TrustOverIP Model](https://trustoverip.org/wp-content/toip-model/)
|
||||||
@ -46,13 +46,13 @@ We discussed these projects and have some links
|
|||||||
|
|
||||||
For more info
|
For more info
|
||||||
|
|
||||||
Goto Kantara ANCR WG [https://kantarainitiative.org/confluence/pages/viewpage.action?pageId=140804260](https://kantarainitiative.org/confluence/pages/viewpage.action?pageId%3D140804260)
|
Goto Kantara ANCR WG [https://kantarainitiative.org/confluence/pages/viewpage.action?pageId=140804260](https://kantarainitiative.org/confluence/pages/viewpage.action?pageId=140804260)
|
||||||
|
|
||||||
W3C DPV CG - [https://dpvcg.github.io/dpv/](https://dpvcg.github.io/dpv/)
|
W3C DPV CG - [https://dpvcg.github.io/dpv/](https://dpvcg.github.io/dpv/)
|
||||||
|
|
||||||
ToiP - ISWG - Notice & Consent Task force for a Privacy Controller Credential
|
ToiP - ISWG - Notice & Consent Task force for a Privacy Controller Credential
|
||||||
|
|
||||||
* [https://wiki.trustoverip.org/pages/resumedraft.action?draftId=72226&draftShareId=8b665919-3b23-4a4d-be90-26947c7ae82c&](https://wiki.trustoverip.org/pages/resumedraft.action?draftId%3D72226%26draftShareId%3D8b665919-3b23-4a4d-be90-26947c7ae82c%26)
|
* [https://wiki.trustoverip.org/pages/resumedraft.action?draftId=72226&draftShareId=8b665919-3b23-4a4d-be90-26947c7ae82c&](https://wiki.trustoverip.org/pages/resumedraft.action?draftId=72226&draftShareId=8b665919-3b23-4a4d-be90-26947c7ae82c&)
|
||||||
|
|
||||||
ToiP Privacy Risk -
|
ToiP Privacy Risk -
|
||||||
|
|
||||||
@ -124,7 +124,7 @@ as we move into decentralized identity management, where individuals manage cred
|
|||||||
|
|
||||||
* [The Trust Over IP Stack: Achieving Global Interoperability with SSI](https://techzone.scot/trust-over-ip-stack/)TechZone Scot
|
* [The Trust Over IP Stack: Achieving Global Interoperability with SSI](https://techzone.scot/trust-over-ip-stack/)TechZone Scot
|
||||||
|
|
||||||
* [In this video](https://www.youtube.com/watch?v%3DYzKfb-udavY), Drummond Reed, Chief Trust Officer at Evernym Inc and co-author of the book ‘[Self-Sovereign Identity](https://www.evernym.com/ssi-book/)’ provides a deep discussion of SSI and the ‘The Trust over IP Stack’.
|
* [In this video](https://www.youtube.com/watch?v=YzKfb-udavY), Drummond Reed, Chief Trust Officer at Evernym Inc and co-author of the book ‘[Self-Sovereign Identity](https://www.evernym.com/ssi-book/)’ provides a deep discussion of SSI and the ‘The Trust over IP Stack’.
|
||||||
|
|
||||||
|
|
||||||
- Survey was a collaborative efforts by [University of Jyväskylä](http://jyu.fi), [Blockster.global](http://blockster.global) and [Trust over IP foundation](https://trustoverip.org/)
|
- Survey was a collaborative efforts by [University of Jyväskylä](http://jyu.fi), [Blockster.global](http://blockster.global) and [Trust over IP foundation](https://trustoverip.org/)
|
||||||
@ -152,7 +152,7 @@ I have been lucky enough to witness many of its milestones — the finalization
|
|||||||
* [SCHELLMAN JOINS TRUST OVER IP FOUNDATION AS STEERING COMMITTEE MEMBER](https://trustoverip.org/news/2022/03/25/schellman-joins-trust-over-ip-foundation-as-steering-committee-member/)
|
* [SCHELLMAN JOINS TRUST OVER IP FOUNDATION AS STEERING COMMITTEE MEMBER](https://trustoverip.org/news/2022/03/25/schellman-joins-trust-over-ip-foundation-as-steering-committee-member/)
|
||||||
> Tampa-based Schellman, a leading provider of attestation and compliance services, announced today that it is joining the Trust over IP Foundation (ToIP) as a Steering Committee member. As the first IT audit firm to join the leadership of ToIP, this move represents Schellman’s belief in the growing suite of digital governance specifications and tools being developed by ToIP Working Groups.
|
> Tampa-based Schellman, a leading provider of attestation and compliance services, announced today that it is joining the Trust over IP Foundation (ToIP) as a Steering Committee member. As the first IT audit firm to join the leadership of ToIP, this move represents Schellman’s belief in the growing suite of digital governance specifications and tools being developed by ToIP Working Groups.
|
||||||
### TOIP Trust over IP
|
### TOIP Trust over IP
|
||||||
* [AMA: Sovrin + ToIP Core Purposes and Cooperation](https://iiw.idcommons.net/23M/_AMA:_Sovrin_%252B_ToIP_Core_Purposes_and_Cooperation) by John Jordan, Drummond Reed, Chris Raczkowski
|
* [AMA: Sovrin + ToIP Core Purposes and Cooperation](https://iiw.idcommons.net/23M/_AMA:_Sovrin_+_ToIP_Core_Purposes_and_Cooperation) by John Jordan, Drummond Reed, Chris Raczkowski
|
||||||
> 1. Mutual recognition and support for the distinct, but interrelated, mandate of each organization.
|
> 1. Mutual recognition and support for the distinct, but interrelated, mandate of each organization.
|
||||||
> 2. Commitment to name a member from each organization as a liaison to act as a point of contact and maintain lines of open communication.
|
> 2. Commitment to name a member from each organization as a liaison to act as a point of contact and maintain lines of open communication.
|
||||||
> 3. Proactively seek opportunities to collaborate in areas of shared interest, including communications products.
|
> 3. Proactively seek opportunities to collaborate in areas of shared interest, including communications products.
|
||||||
@ -180,6 +180,6 @@ NO this isn’t going to work it is going to create lockin to particular wallets
|
|||||||
> *[...]*
|
> *[...]*
|
||||||
> featured speakers from Evernym, Mastercard, LG CNS, Accenture, GLEIF, and other[s]
|
> featured speakers from Evernym, Mastercard, LG CNS, Accenture, GLEIF, and other[s]
|
||||||
|
|
||||||
* [Human Experience Working Group](https://wiki.trustoverip.org/display/HOME/Human%2BExperience%2BWorking%2BGroup) TOIP
|
* [Human Experience Working Group](https://wiki.trustoverip.org/display/HOME/Human+Experience+Working+Group) TOIP
|
||||||
|
|
||||||
The purpose of the HXWG is to examine the design features of digital systems, their governance and the business processes that support them, which make interactions or actors trustable, in the contextual and subjective experience of those using them.
|
The purpose of the HXWG is to examine the design features of digital systems, their governance and the business processes that support them, which make interactions or actors trustable, in the contextual and subjective experience of those using them.
|
||||||
|
@ -30,7 +30,7 @@ This [Directory](https://diacc.ca/2020/05/21/directory-products-assess-identifi
|
|||||||
|
|
||||||
Built on standards: OAuth 2.0 and JWT
|
Built on standards: OAuth 2.0 and JWT
|
||||||
|
|
||||||
See the presentation at [https://self-issued.info/?p=2167](https://self-issued.info/?p%3D2167).
|
See the presentation at [https://self-issued.info/?p=2167](https://self-issued.info/?p=2167).
|
||||||
* [Request for Comment and IPR Review: PCTF Assurance Maturity Model Draft Recommendation V1.0](https://diacc.ca/2021/06/27/comment-ipr-review-assurance-maturity-model-draft-recommendation-v1-0/) DIACC
|
* [Request for Comment and IPR Review: PCTF Assurance Maturity Model Draft Recommendation V1.0](https://diacc.ca/2021/06/27/comment-ipr-review-assurance-maturity-model-draft-recommendation-v1-0/) DIACC
|
||||||
|
|
||||||
It is essential that Participants in a digital ecosystem have a way to evaluate the robustness and trustworthiness of transactions within that ecosystem. In order to do so, Participants must share a common vocabulary that describes the level of confidence they can associate with an Entity or transaction, as well as a common way in which to determine that level of confidence.
|
It is essential that Participants in a digital ecosystem have a way to evaluate the robustness and trustworthiness of transactions within that ecosystem. In order to do so, Participants must share a common vocabulary that describes the level of confidence they can associate with an Entity or transaction, as well as a common way in which to determine that level of confidence.
|
||||||
@ -41,7 +41,7 @@ The [Authentication](https://diacc.ca/wp-content/uploads/2020/09/PCTF-Authentica
|
|||||||
* [2022 Pre-Budget Submission](https://diacc.ca/2021/08/03/2022-pre-budget-submission/) DIACC
|
* [2022 Pre-Budget Submission](https://diacc.ca/2021/08/03/2022-pre-budget-submission/) DIACC
|
||||||
|
|
||||||
1. That the government secure adoption of the [Pan-Canadian Trust Framework](https://diacc.ca/wp-content/uploads/2016/08/PCTF-Overview-FINAL.pdf) by businesses and governments.
|
1. That the government secure adoption of the [Pan-Canadian Trust Framework](https://diacc.ca/wp-content/uploads/2016/08/PCTF-Overview-FINAL.pdf) by businesses and governments.
|
||||||
2. That the government act on the [Finance Committee’s 2021 Pre-Budget Consultation](https://www.ourcommons.ca/Committees/en/FINA/StudyActivity?studyActivityId%3D11021772) Recommendations 128, Implement a digital identity system that empowers Canadians to control their data that is held by the federal government, and 129, Create a national data strategy.
|
2. That the government act on the [Finance Committee’s 2021 Pre-Budget Consultation](https://www.ourcommons.ca/Committees/en/FINA/StudyActivity?studyActivityId=11021772) Recommendations 128, Implement a digital identity system that empowers Canadians to control their data that is held by the federal government, and 129, Create a national data strategy.
|
||||||
3. That the government work with provincial and territorial partners and Immigration, Refugees and Citizenship Canada to ensure that all Canadians have access to an ISO-compliant government-issued digital ID credential with economy-wide utility by December 2022.
|
3. That the government work with provincial and territorial partners and Immigration, Refugees and Citizenship Canada to ensure that all Canadians have access to an ISO-compliant government-issued digital ID credential with economy-wide utility by December 2022.
|
||||||
4. That the government make digital identity-enabled services available to all Canadians by December 2022.
|
4. That the government make digital identity-enabled services available to all Canadians by December 2022.
|
||||||
5. That the government prioritizes funding and integration of digital ID as part of the [Digital Technology Supercluster](https://www.digitalsupercluster.ca/) Initiative.
|
5. That the government prioritizes funding and integration of digital ID as part of the [Digital Technology Supercluster](https://www.digitalsupercluster.ca/) Initiative.
|
||||||
|
@ -47,7 +47,7 @@ Taking the LEI one step further from entity identification to individuals is a h
|
|||||||
|
|
||||||
Throughout the financial inclusion interview series, we caught up with key partners to discuss the launch of GLEIF’s digital business identity initiative in Africa and how it is bringing about greater financial inclusion for African SMEs. Stephan Wolf, CEO of GLEIF, concludes the series by accentuating the immeasurable opportunities and transparency this initiative will bring to the global supply chain
|
Throughout the financial inclusion interview series, we caught up with key partners to discuss the launch of GLEIF’s digital business identity initiative in Africa and how it is bringing about greater financial inclusion for African SMEs. Stephan Wolf, CEO of GLEIF, concludes the series by accentuating the immeasurable opportunities and transparency this initiative will bring to the global supply chain
|
||||||
Liquid Avatar Technologies’
|
Liquid Avatar Technologies’
|
||||||
* [Digital Identity: It’s All About Authenticity](https://www.youtube.com/watch?v%3DUR0J-Vuxnuc) video from GLEIF
|
* [Digital Identity: It’s All About Authenticity](https://www.youtube.com/watch?v=UR0J-Vuxnuc) video from GLEIF
|
||||||
|
|
||||||
Through the creation of the verifiable Legal Entity Identifier (vLEI), GLEIF has created a universal system of organizational identity that answers this need. The vLEI enables instant and automated business verification for all legal entities and their official representatives
|
Through the creation of the verifiable Legal Entity Identifier (vLEI), GLEIF has created a universal system of organizational identity that answers this need. The vLEI enables instant and automated business verification for all legal entities and their official representatives
|
||||||
* [The Value of Transparency in Digital Trade Finance, with Aaron Seabrook, COO, Contour](http://gleif.org/en/newsroom/blog/the-value-of-transparency-in-digital-trade-finance-with-aaron-seabrook-coo-contour) GLEIF
|
* [The Value of Transparency in Digital Trade Finance, with Aaron Seabrook, COO, Contour](http://gleif.org/en/newsroom/blog/the-value-of-transparency-in-digital-trade-finance-with-aaron-seabrook-coo-contour) GLEIF
|
||||||
@ -68,4 +68,4 @@ We do not have to look back further than the global economic collapse of 2008 to
|
|||||||
|
|
||||||
Following the launch of GLEIF’s digital business identity initiative designed to bridge the trade finance gap in Africa, we’re catching up with our key partners to hear their thoughts on how the project will bring about greater financial inclusion for SMEs on the continent and beyond.
|
Following the launch of GLEIF’s digital business identity initiative designed to bridge the trade finance gap in Africa, we’re catching up with our key partners to hear their thoughts on how the project will bring about greater financial inclusion for SMEs on the continent and beyond.
|
||||||
- [Read full vLEI press release](https://www.gleif.org/en/newsroom/press-releases/gleif-showcases-one-digital-id-for-every-business-globally-with-first-verifiable-lei-deployment)
|
- [Read full vLEI press release](https://www.gleif.org/en/newsroom/press-releases/gleif-showcases-one-digital-id-for-every-business-globally-with-first-verifiable-lei-deployment)
|
||||||
- [View vLEI role-based signatures in the 2021 GLEIF Annual Report](https://weboftrust.github.io/vLEI/ixbrl-report-2021-viewer.html%23)
|
- [View vLEI role-based signatures in the 2021 GLEIF Annual Report](https://weboftrust.github.io/vLEI/ixbrl-report-2021-viewer.html#)
|
||||||
|
@ -4,11 +4,11 @@
|
|||||||
> Spherity announces that it has become a partner of the [IDunion](https://idunion.org/) project. The project is funded within the innovation framework “Showcase secure digital identities” of the German government (Federal Ministry for Economic Affairs and Energy). Spherity is entrusted on the application of cloud identity technology in the healthcare industry.
|
> Spherity announces that it has become a partner of the [IDunion](https://idunion.org/) project. The project is funded within the innovation framework “Showcase secure digital identities” of the German government (Federal Ministry for Economic Affairs and Energy). Spherity is entrusted on the application of cloud identity technology in the healthcare industry.
|
||||||
* [The Digital Identity Card](https://blog.ti8m.com/en/SSI.html) TI8M
|
* [The Digital Identity Card](https://blog.ti8m.com/en/SSI.html) TI8M
|
||||||
> Currently, over 40 applications have been implemented in the IDunion project. These are used in a wide variety of sectors, such as public administration, the financial sector, IoT and industry, the healthcare sector, mobility sector and e-commerce. The technology has now exited the research phase and will appear in the first productive applications in 2021.
|
> Currently, over 40 applications have been implemented in the IDunion project. These are used in a wide variety of sectors, such as public administration, the financial sector, IoT and industry, the healthcare sector, mobility sector and e-commerce. The technology has now exited the research phase and will appear in the first productive applications in 2021.
|
||||||
* [IDunion enters the second project phase initiated by the Federal Ministry of Economic Affairs and Energy of Germany](https://idunion.org/2021/04/06/idunion-startet-in-die-zweite-vom-bmwi-gefoerderte-projektphase/?lang%3Den)
|
* [IDunion enters the second project phase initiated by the Federal Ministry of Economic Affairs and Energy of Germany](https://idunion.org/2021/04/06/idunion-startet-in-die-zweite-vom-bmwi-gefoerderte-projektphase/?lang=en)
|
||||||
> - The Federal Ministry for Economic Affairs and Energy (BMWi) has selected IDunion for the second phase of the innovation competition “Showcase Secure Digital Identities”.
|
> - The Federal Ministry for Economic Affairs and Energy (BMWi) has selected IDunion for the second phase of the innovation competition “Showcase Secure Digital Identities”.
|
||||||
> - The three-year implementation phase began on April 1, 2021.
|
> - The three-year implementation phase began on April 1, 2021.
|
||||||
> - The goals of this new project phase includes the establishment of a European cooperative, the launch of a production network and the implementation of 40+ different pilot applications from several areas.
|
> - The goals of this new project phase includes the establishment of a European cooperative, the launch of a production network and the implementation of 40+ different pilot applications from several areas.
|
||||||
* [IDunion announces successful establishment of European cooperative](https://idunion.org/2022/08/16/idunion-announces-successful-establishment-of-european-cooperative/?lang%3Den)
|
* [IDunion announces successful establishment of European cooperative](https://idunion.org/2022/08/16/idunion-announces-successful-establishment-of-european-cooperative/?lang=en)
|
||||||
* [IDnow supports European digital identity ecosystem](https://www.idnow.io/press/idnow-supports-european-digital-identity-ecosystem/)
|
* [IDnow supports European digital identity ecosystem](https://www.idnow.io/press/idnow-supports-european-digital-identity-ecosystem/)
|
||||||
> IDnow joins IDunion, the network initiative for digital identities funded by the Federal Ministry for Economic Affairs and Energy (BMWi)
|
> IDnow joins IDunion, the network initiative for digital identities funded by the Federal Ministry for Economic Affairs and Energy (BMWi)
|
||||||
* [IDunion: Germany’s Bold SSI Strategy with Hakan Yildiz](https://northernblock.io/idunion-germany-bold-ssi-strategy/)
|
* [IDunion: Germany’s Bold SSI Strategy with Hakan Yildiz](https://northernblock.io/idunion-germany-bold-ssi-strategy/)
|
||||||
@ -25,7 +25,7 @@ What use cases should a National Digital Identity program prioritize in collabor
|
|||||||
* I summarized our [goals and visions in this presentation](https://nextcloud.idunion.org/s/D2cbMi6w8t3nPYj), for more information check out [the Github page](https://github.com/decentralized-identity/wallet-security)
|
* I summarized our [goals and visions in this presentation](https://nextcloud.idunion.org/s/D2cbMi6w8t3nPYj), for more information check out [the Github page](https://github.com/decentralized-identity/wallet-security)
|
||||||
|
|
||||||
|
|
||||||
* [Innovative concepts and software for managing digital master data and certificates](https://idunion.org/2021/06/14/innovative-konzepte-und-software-fuer-das-digitale-stammdaten-und-zertifikatsmanagement/?lang%3Den) IDUnion
|
* [Innovative concepts and software for managing digital master data and certificates](https://idunion.org/2021/06/14/innovative-konzepte-und-software-fuer-das-digitale-stammdaten-und-zertifikatsmanagement/?lang=en) IDUnion
|
||||||
|
|
||||||
* [Testing self-sovereign identity with the Lissi demo](https://lissi-id.medium.com/testing-self-sovereign-identity-with-the-lissi-demo-854e73d05aad)
|
* [Testing self-sovereign identity with the Lissi demo](https://lissi-id.medium.com/testing-self-sovereign-identity-with-the-lissi-demo-854e73d05aad)
|
||||||
> We are convinced this demonstrated user flow can help to better understand the interactions in a digital identity ecosystem such as [IDunion](https://idunion.org/). [...] The Lissi team is in discussion with trust service providers, authorities, municipalities, agencies, associations and other relevant stakeholders to meet all the necessary requirements and provide you with the best user experience.
|
> We are convinced this demonstrated user flow can help to better understand the interactions in a digital identity ecosystem such as [IDunion](https://idunion.org/). [...] The Lissi team is in discussion with trust service providers, authorities, municipalities, agencies, associations and other relevant stakeholders to meet all the necessary requirements and provide you with the best user experience.
|
||||||
|
@ -18,7 +18,7 @@ This language can be used to auto generate receipts to process rights and negoti
|
|||||||
The mission of Kantara is to grow and fulfill the market for trustworthy use of identity and personal data. And that's a very broad mission. But to do that, some of the things you see in our mission are words like trust, grow, fulfilling what the market needs.
|
The mission of Kantara is to grow and fulfill the market for trustworthy use of identity and personal data. And that's a very broad mission. But to do that, some of the things you see in our mission are words like trust, grow, fulfilling what the market needs.
|
||||||
* [Exostar Receives Kantara Initiative’s Identity Assurance Trust Framework Certification](https://www.exostar.com/press/exostar-receives-kantara-initiatives-identity-assurance-trust-framework-certification-achieves-healthcare-and-life-science-community-milestones/) - Latest Recognition Further Demonstrates Company Protects Customers’ Identity and Personal Data by Complying with NIST 800-63 Standard
|
* [Exostar Receives Kantara Initiative’s Identity Assurance Trust Framework Certification](https://www.exostar.com/press/exostar-receives-kantara-initiatives-identity-assurance-trust-framework-certification-achieves-healthcare-and-life-science-community-milestones/) - Latest Recognition Further Demonstrates Company Protects Customers’ Identity and Personal Data by Complying with NIST 800-63 Standard
|
||||||
> “This is a significant achievement and market differentiator for Exostar. The Kantara assessment and review process is rigorous and approval demonstrates a company’s care and respect for its customers.”
|
> “This is a significant achievement and market differentiator for Exostar. The Kantara assessment and review process is rigorous and approval demonstrates a company’s care and respect for its customers.”
|
||||||
* [User-Managed Access (UMA) 101 George Fletcher, Kantara Initiative UMA Work Group](https://kantarainitiative.org/confluence/download/attachments/17760302/2020-10-20%2520IIW%2520UMA%2520101.pdf)
|
* [User-Managed Access (UMA) 101 George Fletcher, Kantara Initiative UMA Work Group](https://kantarainitiative.org/confluence/download/attachments/17760302/2020-10-20%20IIW%20UMA%20101.pdf)
|
||||||
> The UMA extension grant adds… [docs.kantarainitiative.org/uma/wg/rec-oauth-uma-grant-2.0.html](https://docs.kantarainitiative.org/uma/wg/rec-oauth-uma-grant-2.0.html)
|
> The UMA extension grant adds… [docs.kantarainitiative.org/uma/wg/rec-oauth-uma-grant-2.0.html](https://docs.kantarainitiative.org/uma/wg/rec-oauth-uma-grant-2.0.html)
|
||||||
> - Party-to-party: Resource owner authorizes protected-resource access to clients used by requesting parties
|
> - Party-to-party: Resource owner authorizes protected-resource access to clients used by requesting parties
|
||||||
> - Asynchronous: Resource owner interactions are asynchronous with respect to the authorization grant
|
> - Asynchronous: Resource owner interactions are asynchronous with respect to the authorization grant
|
||||||
@ -40,21 +40,21 @@ We discussed these projects and have some links
|
|||||||
|
|
||||||
For more info
|
For more info
|
||||||
|
|
||||||
Goto Kantara ANCR WG [https://kantarainitiative.org/confluence/pages/viewpage.action?pageId=140804260](https://kantarainitiative.org/confluence/pages/viewpage.action?pageId%3D140804260)
|
Goto Kantara ANCR WG [https://kantarainitiative.org/confluence/pages/viewpage.action?pageId=140804260](https://kantarainitiative.org/confluence/pages/viewpage.action?pageId=140804260)
|
||||||
|
|
||||||
W3C DPV CG - [https://dpvcg.github.io/dpv/](https://dpvcg.github.io/dpv/)
|
W3C DPV CG - [https://dpvcg.github.io/dpv/](https://dpvcg.github.io/dpv/)
|
||||||
|
|
||||||
ToiP - ISWG - Notice & Consent Task force for a Privacy Controller Credential
|
ToiP - ISWG - Notice & Consent Task force for a Privacy Controller Credential
|
||||||
|
|
||||||
[https://kantarainitiative.org/confluence/display/WA/Privacy+as+Expected%3A+UI+Signalling+a+Consent+Gateway+For+Human+Consent](https://kantarainitiative.org/confluence/display/WA/Privacy%2Bas%2BExpected%253A%2BUI%2BSignalling%2Ba%2BConsent%2BGateway%2BFor%2BHuman%2BConsent)
|
[https://kantarainitiative.org/confluence/display/WA/Privacy+as+Expected%3A+UI+Signalling+a+Consent+Gateway+For+Human+Consent](https://kantarainitiative.org/confluence/display/WA/Privacy+as+Expected%3A+UI+Signalling+a+Consent+Gateway+For+Human+Consent)
|
||||||
|
|
||||||
[https://kantarainitiative.org/confluence/display/WA/Privacy+as+Expected%3A+UI+Signalling+a+Consent+Gateway+For+Human+Consent](https://kantarainitiative.org/confluence/display/WA/Privacy%2Bas%2BExpected%253A%2BUI%2BSignalling%2Ba%2BConsent%2BGateway%2BFor%2BHuman%2BConsent)
|
[https://kantarainitiative.org/confluence/display/WA/Privacy+as+Expected%3A+UI+Signalling+a+Consent+Gateway+For+Human+Consent](https://kantarainitiative.org/confluence/display/WA/Privacy+as+Expected%3A+UI+Signalling+a+Consent+Gateway+For+Human+Consent)
|
||||||
|
|
||||||
* [Kantara’s Kay Chopard Talks Digital Security, Diversity, and Business Advice](https://kantarainitiative.org/kantaras-kay-chopard-talks-digital-security-diversity-and-business-advice-on-lets-talk-about-digital-identity/) Kantara - DigitalID NZ
|
* [Kantara’s Kay Chopard Talks Digital Security, Diversity, and Business Advice](https://kantarainitiative.org/kantaras-kay-chopard-talks-digital-security-diversity-and-business-advice-on-lets-talk-about-digital-identity/) Kantara - DigitalID NZ
|
||||||
|
|
||||||
In August, Kantara Executive Director Kay Chopard spoke with Oscar Santolalla on Let’s Talk About Digital Identity, a Ubisecure-produced podcast. Chopard and Santolalla discussed a wide range of topics, including Chopard’s vision for Kantara and the digital security world, her role in supporting diversity and inclusion, and other topics.
|
In August, Kantara Executive Director Kay Chopard spoke with Oscar Santolalla on Let’s Talk About Digital Identity, a Ubisecure-produced podcast. Chopard and Santolalla discussed a wide range of topics, including Chopard’s vision for Kantara and the digital security world, her role in supporting diversity and inclusion, and other topics.
|
||||||
|
|
||||||
* [https://kantarainitiative.org/confluence/display/WA/Privacy+as+Expected%3A+UI+Signalling+a+Consent+Gateway+For+Human+Consent](https://kantarainitiative.org/confluence/display/WA/Privacy%2Bas%2BExpected%253A%2BUI%2BSignalling%2Ba%2BConsent%2BGateway%2BFor%2BHuman%2BConsent)
|
* [https://kantarainitiative.org/confluence/display/WA/Privacy+as+Expected%3A+UI+Signalling+a+Consent+Gateway+For+Human+Consent](https://kantarainitiative.org/confluence/display/WA/Privacy+as+Expected%3A+UI+Signalling+a+Consent+Gateway+For+Human+Consent)
|
||||||
|
|
||||||
|
|
||||||
* [Meet Kantara’s new Executive Director, Kay Chopard](https://www.ubisecure.com/podcast/kay-chopard-kantara/) Lets Talk about Digital Identity
|
* [Meet Kantara’s new Executive Director, Kay Chopard](https://www.ubisecure.com/podcast/kay-chopard-kantara/) Lets Talk about Digital Identity
|
||||||
|
@ -4,7 +4,7 @@
|
|||||||
> The Cardea and GCCN projects are both excellent examples of breakthrough innovations that can take shape when companies and projects come together to solve real-world problems, using open source tools available to everyone
|
> The Cardea and GCCN projects are both excellent examples of breakthrough innovations that can take shape when companies and projects come together to solve real-world problems, using open source tools available to everyone
|
||||||
* [GlobaliD joins the Linux Foundation’s Cardea Project](https://medium.com/global-id/globalid-joins-the-linux-foundations-cardea-project-22f298032240)
|
* [GlobaliD joins the Linux Foundation’s Cardea Project](https://medium.com/global-id/globalid-joins-the-linux-foundations-cardea-project-22f298032240)
|
||||||
* [Public-private partnerships in health: The journey ahead for open source](https://www.lfph.io/2022/07/29/public-private-partnerships-in-health-the-journey-ahead-for-open-source/) Linux Foundation Public Health
|
* [Public-private partnerships in health: The journey ahead for open source](https://www.lfph.io/2022/07/29/public-private-partnerships-in-health-the-journey-ahead-for-open-source/) Linux Foundation Public Health
|
||||||
* [Webinar: The Future of Self Sovereign Identity](https://www.youtube.com/watch?v%3DgimrMbcj91A)
|
* [Webinar: The Future of Self Sovereign Identity](https://www.youtube.com/watch?v=gimrMbcj91A)
|
||||||
|
|
||||||
Presented by Patientory includes Jim St. Claire of LFPH
|
Presented by Patientory includes Jim St. Claire of LFPH
|
||||||
|
|
||||||
@ -14,7 +14,7 @@ Self-sovereign identity (SSI) is a movement that claims digital identity should
|
|||||||
* [The Cardea Interop-a-thon Returns—and Here’s Why You Should Participate!](https://indicio.tech/the-cardea-interop-a-thon-returns-and-heres-why-you-should-participate/) Indicio
|
* [The Cardea Interop-a-thon Returns—and Here’s Why You Should Participate!](https://indicio.tech/the-cardea-interop-a-thon-returns-and-heres-why-you-should-participate/) Indicio
|
||||||
|
|
||||||
The [Cardea Community](https://cardea.app/) at Linux Foundation Public Health is pleased to announce the third Interop-a-thon on June 16, between 8:00am and 12:00pm MST (UTC-7:00). Anyone building a Hyperledger Aries compatible product or system can sign up [here](https://forms.gle/CQLRFRr4NexLoCf36).
|
The [Cardea Community](https://cardea.app/) at Linux Foundation Public Health is pleased to announce the third Interop-a-thon on June 16, between 8:00am and 12:00pm MST (UTC-7:00). Anyone building a Hyperledger Aries compatible product or system can sign up [here](https://forms.gle/CQLRFRr4NexLoCf36).
|
||||||
* [Cardea Project Video](https://www.youtube.com/watch?v%3DocomqbTb5ZY%26list%3DPL3LvHy3eIPslC7YhQGXKPN4LvS3ekqfqE)
|
* [Cardea Project Video](https://www.youtube.com/watch?v=ocomqbTb5ZY&list=PL3LvHy3eIPslC7YhQGXKPN4LvS3ekqfqE)
|
||||||
|
|
||||||
There are five agents main agents in the cardia ecosystem. The health enterprise agent, which is a cloud agent that allows for a health organization a hospital lab clinic pharmacy. Whoever is going to be issuing the credentials to participate in hie would be a a government health organization all of those would be represented by a health enterprise agent issuing credentials there's a government agent that's represented in the ecosystem right now that verifies credentials presented to it and then issues trusted travelers a mobile verifier agent
|
There are five agents main agents in the cardia ecosystem. The health enterprise agent, which is a cloud agent that allows for a health organization a hospital lab clinic pharmacy. Whoever is going to be issuing the credentials to participate in hie would be a a government health organization all of those would be represented by a health enterprise agent issuing credentials there's a government agent that's represented in the ecosystem right now that verifies credentials presented to it and then issues trusted travelers a mobile verifier agent
|
||||||
|
|
||||||
|
@ -32,7 +32,7 @@ published: false
|
|||||||
|
|
||||||
5. What’s missing is as important as what’s there.
|
5. What’s missing is as important as what’s there.
|
||||||
|
|
||||||
* [MyData Digital ethics](https://docs.google.com/presentation/d/1CWxzYLbE5kupgQLKySMGmLhs86LBgd3qfL_eBkfGkGc/edit%23slide%3Did.g7a4a7ea3ab_1_837) Antti 'Jogi' Poikola, Board Chair, MyData Global
|
* [MyData Digital ethics](https://docs.google.com/presentation/d/1CWxzYLbE5kupgQLKySMGmLhs86LBgd3qfL_eBkfGkGc/edit#slide=id.g7a4a7ea3ab_1_837) Antti 'Jogi' Poikola, Board Chair, MyData Global
|
||||||
|
|
||||||
* [Why storytelling is key to advancing the ethical use of personal data](https://blog.digi.me/2021/05/13/why-storytelling-is-key-to-advancing-the-ethical-use-of-personal-data/)
|
* [Why storytelling is key to advancing the ethical use of personal data](https://blog.digi.me/2021/05/13/why-storytelling-is-key-to-advancing-the-ethical-use-of-personal-data/)
|
||||||
|
|
||||||
@ -42,7 +42,7 @@ Johannes Ernst, CEO of Indie Computing and co-founder of MyData Silicon Valley,
|
|||||||
|
|
||||||
Yorz has partnerships with leading European payment processors and uses patented technology to automatically capture and make available till receipt data for users to share and monetise. They can also gather other valuable data from across their lives, including finance, health and social media, using digi.me’s personal data exchange platform. The Yorz marketplace enables consumers to choose to receive cash, discounts or tailored offers based on the data access they offer brands, leaving them firmly in control.
|
Yorz has partnerships with leading European payment processors and uses patented technology to automatically capture and make available till receipt data for users to share and monetise. They can also gather other valuable data from across their lives, including finance, health and social media, using digi.me’s personal data exchange platform. The Yorz marketplace enables consumers to choose to receive cash, discounts or tailored offers based on the data access they offer brands, leaving them firmly in control.
|
||||||
* [Shedding Light on Dark Patterns](https://me2ba.org/shedding-light-on-dark-patterns/)
|
* [Shedding Light on Dark Patterns](https://me2ba.org/shedding-light-on-dark-patterns/)
|
||||||
* [The Me2B Alliance announces: Digital Harms Dictionary 2.0](https://me2ba.sharepoint.com/:x:/s/Marketing/EeYWAV1wqqNNj77iE86ijZUBBPtlpg2uHQwQ22vzDfXSgA?rtime%3DRewrj0Qu2Ug)
|
* [The Me2B Alliance announces: Digital Harms Dictionary 2.0](https://me2ba.sharepoint.com/:x:/s/Marketing/EeYWAV1wqqNNj77iE86ijZUBBPtlpg2uHQwQ22vzDfXSgA?rtime=Rewrj0Qu2Ug)
|
||||||
## MyData 2020 Online good sessions continued…
|
## MyData 2020 Online good sessions continued…
|
||||||
|
|
||||||
* [MyData4Children-OpenSpace2020](https://bit.ly/MyData4Children-OpenSpace2020-Memo)
|
* [MyData4Children-OpenSpace2020](https://bit.ly/MyData4Children-OpenSpace2020-Memo)
|
||||||
@ -143,7 +143,7 @@ Against the widespread assumption that data are the oil of the 21st century, [th
|
|||||||
|
|
||||||
* [Why all data governance needs to consider children’s rights](https://medium.com/berkman-klein-center/why-all-data-governance-needs-to-consider-childrens-rights-8b218a825a08) Emmaday
|
* [Why all data governance needs to consider children’s rights](https://medium.com/berkman-klein-center/why-all-data-governance-needs-to-consider-childrens-rights-8b218a825a08) Emmaday
|
||||||
|
|
||||||
Last month, UNICEF published a [Manifesto on Good Data Governance for Children](https://www.unicef.org/globalinsight/media/1741/file/UNICEF%2520Global%2520Insight%2520Data%2520Governance%2520Manifesto.pdf), an initiative that was the result of a year of collaboration between a working group of 17 experts, many of them affiliated with the Berkman Klein Center for Internet & Society and UNICEF.
|
Last month, UNICEF published a [Manifesto on Good Data Governance for Children](https://www.unicef.org/globalinsight/media/1741/file/UNICEF%20Global%20Insight%20Data%20Governance%20Manifesto.pdf), an initiative that was the result of a year of collaboration between a working group of 17 experts, many of them affiliated with the Berkman Klein Center for Internet & Society and UNICEF.
|
||||||
|
|
||||||
* [MyData Global Joins “Team Data Spaces” to Support the EU’s Plan to Create “Data Spaces”](https://mydata.org/2021/06/23/mydata-global-joins-team-data-spaces-to-support-the-eus-plan-to-create-data-spaces/)
|
* [MyData Global Joins “Team Data Spaces” to Support the EU’s Plan to Create “Data Spaces”](https://mydata.org/2021/06/23/mydata-global-joins-team-data-spaces-to-support-the-eus-plan-to-create-data-spaces/)
|
||||||
|
|
||||||
@ -152,7 +152,7 @@ MyData Global announces to have joined forces with ‘Team Data Spaces’ – a
|
|||||||
> As MyData Global saw in our [reflection on 2021](https://mydata.org/2021/12/17/2021-in-review-the-events-and-activities-shaping-the-personal-data-landscape/), the transformation towards a human-centric personal data economy is underway. This transformation is driven by two forces: first, the dominant unethical approaches to personal data are starting to show how unsustainable they really are.
|
> As MyData Global saw in our [reflection on 2021](https://mydata.org/2021/12/17/2021-in-review-the-events-and-activities-shaping-the-personal-data-landscape/), the transformation towards a human-centric personal data economy is underway. This transformation is driven by two forces: first, the dominant unethical approaches to personal data are starting to show how unsustainable they really are.
|
||||||
* [2021 in review: The events and activities shaping the personal data Landscape](https://mydata.org/2021/12/17/2021-in-review-the-events-and-activities-shaping-the-personal-data-landscape/) MyData
|
* [2021 in review: The events and activities shaping the personal data Landscape](https://mydata.org/2021/12/17/2021-in-review-the-events-and-activities-shaping-the-personal-data-landscape/) MyData
|
||||||
|
|
||||||
2021 has been a productive year for MyData Global, and a significant one for the wider personal data world. The [Facebook Files](https://twitter.com/mydataorg/status/1446435772857524224?s%3D20) helped raise the issue of personal data and ethics to the general public, and the EU’s Data Governance Act has helped put into practice many of the changes [MyData Global has been advocating for](https://mydata.org/2021/10/28/mydata-and-the-european-unions-latest-data-developments/).
|
2021 has been a productive year for MyData Global, and a significant one for the wider personal data world. The [Facebook Files](https://twitter.com/mydataorg/status/1446435772857524224?s=20) helped raise the issue of personal data and ethics to the general public, and the EU’s Data Governance Act has helped put into practice many of the changes [MyData Global has been advocating for](https://mydata.org/2021/10/28/mydata-and-the-european-unions-latest-data-developments/).
|
||||||
|
|
||||||
|
|
||||||
* [Rulebook overcomes the lack of trust in data sharing](https://www.mydata.org/2022/08/30/rulebook-overcomes-the-lack-of-trust-in-data-sharing/) MyData
|
* [Rulebook overcomes the lack of trust in data sharing](https://www.mydata.org/2022/08/30/rulebook-overcomes-the-lack-of-trust-in-data-sharing/) MyData
|
||||||
|
@ -12,11 +12,11 @@ published: false
|
|||||||
> How do you determine if your new company is addressing the underlying issues that hold back data from being what they imagine it can be?
|
> How do you determine if your new company is addressing the underlying issues that hold back data from being what they imagine it can be?
|
||||||
* [Global Survey Findings: Current state of SSI](https://iiw.idcommons.net/12O/_Global_Survey_Findings:_Current_state_of_SSI) by Gabriella Laatikainen, Ravikant Agrawal
|
* [Global Survey Findings: Current state of SSI](https://iiw.idcommons.net/12O/_Global_Survey_Findings:_Current_state_of_SSI) by Gabriella Laatikainen, Ravikant Agrawal
|
||||||
|
|
||||||
* [https://www.youtube.com/watch?v=lYb9bUyIPEw](https://www.youtube.com/watch?v%3DlYb9bUyIPEw)
|
* [https://www.youtube.com/watch?v=lYb9bUyIPEw](https://www.youtube.com/watch?v=lYb9bUyIPEw)
|
||||||
|
|
||||||
## iiw
|
## iiw
|
||||||
|
|
||||||
* [@IDWorkshop (IIW) tweeting from the Flickr Archives](https://twitter.com/idworkshop/status/1471905005556822017?s%3D20)
|
* [@IDWorkshop (IIW) tweeting from the Flickr Archives](https://twitter.com/idworkshop/status/1471905005556822017?s=20)
|
||||||
|
|
||||||
Check out these [photos from IIW 1 in 2005](https://www.flickr.com/photos/tags/iiw2005/page1/)
|
Check out these [photos from IIW 1 in 2005](https://www.flickr.com/photos/tags/iiw2005/page1/)
|
||||||
|
|
||||||
@ -32,7 +32,7 @@ Check out these [photos from IIW 1 in 2005](https://www.flickr.com/photos/tags/i
|
|||||||
### BedRock Consortium (Linux Found)
|
### BedRock Consortium (Linux Found)
|
||||||
* [BedRock Consortium has a home page](https://bedrockconsortium.org/)
|
* [BedRock Consortium has a home page](https://bedrockconsortium.org/)
|
||||||
> The Bedrock Consortium is a Linux Foundation project that supports the operation of the Bedrock Business Utility, an independent self-governed and self-sustainable public identity utility.
|
> The Bedrock Consortium is a Linux Foundation project that supports the operation of the Bedrock Business Utility, an independent self-governed and self-sustainable public identity utility.
|
||||||
* [Reflections in my rear view mirror](https://www.linkedin.com/pulse/reflections-my-rear-view-mirror-dan-gisolfi/?trackingId%3DEkY%252BnAILQayoP80%252BReHY3g%253D%253D) Dan Gisolfi
|
* [Reflections in my rear view mirror](https://www.linkedin.com/pulse/reflections-my-rear-view-mirror-dan-gisolfi/?trackingId=EkY+nAILQayoP80+ReHY3g%3D%3D) Dan Gisolfi
|
||||||
> as the founder/convener of the [Bedrock Project](https://bedrockconsortium.org) I must now hand over the baton. Bedrock is positioned to be an important public identity utility for the maturation of a digital trust marketplace. I will always be here to help when/where I can. Hint: Maybe my new road ahead will help bring additional members to the table.
|
> as the founder/convener of the [Bedrock Project](https://bedrockconsortium.org) I must now hand over the baton. Bedrock is positioned to be an important public identity utility for the maturation of a digital trust marketplace. I will always be here to help when/where I can. Hint: Maybe my new road ahead will help bring additional members to the table.
|
||||||
|
|
||||||
## Accountable Digital Identity
|
## Accountable Digital Identity
|
||||||
@ -41,15 +41,15 @@ Check out these [photos from IIW 1 in 2005](https://www.flickr.com/photos/tags/i
|
|||||||
> Informed by standards bodies including [the FIDO Alliance](https://findbiometrics.com/year-review-fido-alliance-gains-more-ground-2021-122205/), the World Wide Web Consortium, and the Decentralized Identity Foundation, the ADI Specification was designed to help companies detect fraud using verified identity solutions while ensuring that informed consent is collected and user privacy is protected. - [quote from this article](https://findbiometrics.com/idemia-joins-accountable-digital-identity-association-board-503101/)
|
> Informed by standards bodies including [the FIDO Alliance](https://findbiometrics.com/year-review-fido-alliance-gains-more-ground-2021-122205/), the World Wide Web Consortium, and the Decentralized Identity Foundation, the ADI Specification was designed to help companies detect fraud using verified identity solutions while ensuring that informed consent is collected and user privacy is protected. - [quote from this article](https://findbiometrics.com/idemia-joins-accountable-digital-identity-association-board-503101/)
|
||||||
|
|
||||||
### Sovrin
|
### Sovrin
|
||||||
* [Sovrin Update: Supporting Commercial Development of SSI](https://iiw.idcommons.net/index.php?title%3D12M/_Sovrin_Update:_Supporting_Commercial_Development_of_SSI%26action%3Dedit%26redlink%3D1) by Sumiran Garg, Chris Raczkowski
|
* [Sovrin Update: Supporting Commercial Development of SSI](https://iiw.idcommons.net/index.php?title=12M/_Sovrin_Update:_Supporting_Commercial_Development_of_SSI&action=edit&redlink=1) by Sumiran Garg, Chris Raczkowski
|
||||||
* [Compliance & Inclusive Finance Working Group (CIFWG)](https://medium.com/@sovrinid/promoting-banking-for-all-announcing-the-compliance-inclusive-finance-working-group-cifwg-340633ef3e6c) Sovrin
|
* [Compliance & Inclusive Finance Working Group (CIFWG)](https://medium.com/@sovrinid/promoting-banking-for-all-announcing-the-compliance-inclusive-finance-working-group-cifwg-340633ef3e6c) Sovrin
|
||||||
> Since 2019, Sovrin has hosted the Compliance and Payments Task Force (CPTF), an open group of traditional bank and non-bank financial institutions, regulators, policymakers, technologists, ethicists, and legal experts. The CPTF has developed and promoted the Rulebook, an innovative best practices framework that extends traditional banking compliance and payments guidance to emerging fintech and VASP processes.
|
> Since 2019, Sovrin has hosted the Compliance and Payments Task Force (CPTF), an open group of traditional bank and non-bank financial institutions, regulators, policymakers, technologists, ethicists, and legal experts. The CPTF has developed and promoted the Rulebook, an innovative best practices framework that extends traditional banking compliance and payments guidance to emerging fintech and VASP processes.
|
||||||
|
|
||||||
### WHISSPR
|
### WHISSPR
|
||||||
* [WHiSSPr Risk for People](https://iiw.idcommons.net/index.php?title%3D20E/_WHiSSPRr_Risk_for_People%26action%3Dedit%26redlink%3D1) by Sal D’Agostino
|
* [WHiSSPr Risk for People](https://iiw.idcommons.net/index.php?title=20E/_WHiSSPRr_Risk_for_People&action=edit&redlink=1) by Sal D’Agostino
|
||||||
|
|
||||||
## GS1
|
## GS1
|
||||||
* [GS1 2021 VC/DID Prototype Review: The Hero’s Journey](https://iiw.idcommons.net/index.php?title%3D13H/_GS1_2021_VC/DID_Prototype_Review:_The_Hero%25E2%2580%2599s_Journey%26action%3Dedit%26redlink%3D1)
|
* [GS1 2021 VC/DID Prototype Review: The Hero’s Journey](https://iiw.idcommons.net/index.php?title=13H/_GS1_2021_VC/DID_Prototype_Review:_The_Hero%E2%80%99s_Journey&action=edit&redlink=1)
|
||||||
|
|
||||||
## aNewGovernance
|
## aNewGovernance
|
||||||
|
|
||||||
@ -69,7 +69,7 @@ Foundations receive the financial and legal services they need to operate succes
|
|||||||
conversations about digital identity innovation were mostly treated as a developing country issue, with ardent advocates in the West unwilling to acknowledge that digital identity could add value to developed economies. Now, as the world [emerges from the pandemic](https://omidyar.com/a-decade-of-digital-public-goods-holding-up-the-digital-economy-preventing-monopolies-and-safeguarding-freedoms-for-all/), attitudes seem to have taken a 180-degree turn.
|
conversations about digital identity innovation were mostly treated as a developing country issue, with ardent advocates in the West unwilling to acknowledge that digital identity could add value to developed economies. Now, as the world [emerges from the pandemic](https://omidyar.com/a-decade-of-digital-public-goods-holding-up-the-digital-economy-preventing-monopolies-and-safeguarding-freedoms-for-all/), attitudes seem to have taken a 180-degree turn.
|
||||||
|
|
||||||
### DHS
|
### DHS
|
||||||
* [DHS SVIP - Program Overview + AMA](https://iiw.idcommons.net/index.php?title%3D21O/_DHS_SVIP_-_Program_Overview_%252B_AMA%26action%3Dedit%26redlink%3D1) by Anil John
|
* [DHS SVIP - Program Overview + AMA](https://iiw.idcommons.net/index.php?title=21O/_DHS_SVIP_-_Program_Overview_+_AMA&action=edit&redlink=1) by Anil John
|
||||||
|
|
||||||
|
|
||||||
### ISSE - EEMA
|
### ISSE - EEMA
|
||||||
@ -116,7 +116,7 @@ https://www.idcommons.org/working-groups/vendor-relationship-management/
|
|||||||
|
|
||||||
These may seem off-topic but Bill Wendell has been engaged with the VRM and IIW community for well over a decade - He has some great ideas on how to reform/transform the real-estate industry with ideas/models our community has been discussing. If you are looking for an opportunity to collaborate and build something transformative I would reach out to him.
|
These may seem off-topic but Bill Wendell has been engaged with the VRM and IIW community for well over a decade - He has some great ideas on how to reform/transform the real-estate industry with ideas/models our community has been discussing. If you are looking for an opportunity to collaborate and build something transformative I would reach out to him.
|
||||||
|
|
||||||
* [GAIN – Global Assured Identity Network](https://translate.google.com/translate?hl%3D%26sl%3Dauto%26tl%3Den%26u%3Dhttps%253A%252F%252Fwww.sakimura.org%252F2021%252F09%252F4853%252F)
|
* [GAIN – Global Assured Identity Network](https://translate.google.com/translate?hl=&sl=auto&tl=en&u=https%3A//www.sakimura.org/2021/09/4853/)
|
||||||
|
|
||||||
Individuals can access with the peace of mind that all relying parties within the ecosystem are present and accountable. Sure, there will still be malicious vendors, but the scope will be more limited. The ecosystem will be much more secure than the current Internet. It will be enough for the participants to take action. Trust is reestablished.
|
Individuals can access with the peace of mind that all relying parties within the ecosystem are present and accountable. Sure, there will still be malicious vendors, but the scope will be more limited. The ecosystem will be much more secure than the current Internet. It will be enough for the participants to take action. Trust is reestablished.
|
||||||
|
|
||||||
|
@ -48,12 +48,12 @@ I spoke with the editor of the draft to propose that we add a “did” format i
|
|||||||
## Other
|
## Other
|
||||||
|
|
||||||
### OpenSSF
|
### OpenSSF
|
||||||
* [Digital Identity Attestation Roundup - Open Source Security Foundation](https://openssf.org/blog/2021/01/27/digital-identity-attestation-roundup/%23)
|
* [Digital Identity Attestation Roundup - Open Source Security Foundation](https://openssf.org/blog/2021/01/27/digital-identity-attestation-roundup/#)
|
||||||
|
|
||||||
We kicked off the first Digital Identity Attestation Working Group meeting under the OpenSSF in August, 2020. The objective of this working group is to enable open source maintainers, contributors and end-users to understand and make decisions on the provenance or origin of the code they maintain, produce and use.
|
We kicked off the first Digital Identity Attestation Working Group meeting under the OpenSSF in August, 2020. The objective of this working group is to enable open source maintainers, contributors and end-users to understand and make decisions on the provenance or origin of the code they maintain, produce and use.
|
||||||
|
|
||||||
|
|
||||||
* [Digital Identity WG (September 30, 2020)](https://www.youtube.com/watch?t%3D648%26v%3D6Ym5bXRuzZ8%26feature%3Dyoutu.be)
|
* [Digital Identity WG (September 30, 2020)](https://www.youtube.com/watch?t=648&v=6Ym5bXRuzZ8&feature=youtu.be)
|
||||||
|
|
||||||
### CASA
|
### CASA
|
||||||
|
|
||||||
|
@ -6,7 +6,7 @@ Digital Bazaar founder, Manu Sporney, proposed the [W3C Credentials Community Gr
|
|||||||
|
|
||||||
* [@BartHanssens shares](https://twitter.com/BartHanssens/status/1319604882068787200):
|
* [@BartHanssens shares](https://twitter.com/BartHanssens/status/1319604882068787200):
|
||||||
> proofs: https://w3c-ccg.github.io/ld-proofs, cryptosuite: https://w3c-ccg.github.io/ld-cryptosuite-registry, #GnuPG: signatures https://gpg.jsld.org/contexts
|
> proofs: https://w3c-ccg.github.io/ld-proofs, cryptosuite: https://w3c-ccg.github.io/ld-cryptosuite-registry, #GnuPG: signatures https://gpg.jsld.org/contexts
|
||||||
* [Open API for Interoperable Traceability](https://w3c-ccg.github.io/traceability-interop/openapi/%23overview) CCG
|
* [Open API for Interoperable Traceability](https://w3c-ccg.github.io/traceability-interop/openapi/#overview) CCG
|
||||||
> `resolve:dids - Grants permission to resolve DIDsissue:credentials - Grants permission issue Verifiable Credentialsverify:credentials - Grants permission verify Verifiable Credentialsread:credentials - Grants permission to get Verifiable Credentialsupdate:credentials - Grants permission to update the status of Verifiable Credentialsprove:presentations - Grants permission to prove Verifiable Presentationsverify:presentations - Grants permission verify Verifiable Presentationssubmit:presentations - Grants permission to submit Verifiable Presentations`
|
> `resolve:dids - Grants permission to resolve DIDsissue:credentials - Grants permission issue Verifiable Credentialsverify:credentials - Grants permission verify Verifiable Credentialsread:credentials - Grants permission to get Verifiable Credentialsupdate:credentials - Grants permission to update the status of Verifiable Credentialsprove:presentations - Grants permission to prove Verifiable Presentationsverify:presentations - Grants permission verify Verifiable Presentationssubmit:presentations - Grants permission to submit Verifiable Presentations`
|
||||||
|
|
||||||
* [We're not the only community with problems (Fwd: Open Letter to Debian election candidates about Debian vendettas)](https://lists.w3.org/Archives/Public/public-credentials/2022Mar/0127.html) Manu Sporny (Saturday, 19 March)
|
* [We're not the only community with problems (Fwd: Open Letter to Debian election candidates about Debian vendettas)](https://lists.w3.org/Archives/Public/public-credentials/2022Mar/0127.html) Manu Sporny (Saturday, 19 March)
|
||||||
@ -46,7 +46,7 @@ CCG 101 - Help us know what’s needed!
|
|||||||
|
|
||||||
To fill it out, visit:
|
To fill it out, visit:
|
||||||
|
|
||||||
* [https://docs.google.com/forms/d/e/1FAIpQLSe3OakcEg8IfWXYALg10eiii2hiLKq2vXC-yazpPk0QVzIMzQ/viewform?vc=0&c=0&w=1&flr=0&usp=mail_form_link](https://docs.google.com/forms/d/e/1FAIpQLSe3OakcEg8IfWXYALg10eiii2hiLKq2vXC-yazpPk0QVzIMzQ/viewform?vc%3D0%26amp;c%3D0%26amp;w%3D1%26amp;flr%3D0%26amp;usp%3Dmail_form_link)
|
* [https://docs.google.com/forms/d/e/1FAIpQLSe3OakcEg8IfWXYALg10eiii2hiLKq2vXC-yazpPk0QVzIMzQ/viewform?vc=0&c=0&w=1&flr=0&usp=mail_form_link](https://docs.google.com/forms/d/e/1FAIpQLSe3OakcEg8IfWXYALg10eiii2hiLKq2vXC-yazpPk0QVzIMzQ/viewform?vc=0&c=0&w=1&flr=0&usp=mail_form_link)
|
||||||
|
|
||||||
* [CCG updates to cgbot and scribe-tool](https://lists.w3.org/Archives/Public/public-credentials/2021May/0169.html) Manu Sporny (Sunday, 30 May)
|
* [CCG updates to cgbot and scribe-tool](https://lists.w3.org/Archives/Public/public-credentials/2021May/0169.html) Manu Sporny (Sunday, 30 May)
|
||||||
|
|
||||||
@ -72,7 +72,7 @@ Notifications of messages to this mailing list (public-credentials) are now sent
|
|||||||
|
|
||||||
* [The CCG Work Item process is outlined here](https://docs.google.com/document/d/1vj811aUbs8GwZUNo-LIFBHafsz4rZTSnRtPv7RQaqNc/):
|
* [The CCG Work Item process is outlined here](https://docs.google.com/document/d/1vj811aUbs8GwZUNo-LIFBHafsz4rZTSnRtPv7RQaqNc/):
|
||||||
|
|
||||||
* [Here's how you get started:](https://docs.google.com/document/d/1vj811aUbs8GwZUNo-LIFBHafsz4rZTSnRtPv7RQaqNc/edit%23heading%3Dh.f28tyzjvad8g)
|
* [Here's how you get started:](https://docs.google.com/document/d/1vj811aUbs8GwZUNo-LIFBHafsz4rZTSnRtPv7RQaqNc/edit#heading=h.f28tyzjvad8g)
|
||||||
|
|
||||||
This process is open to anyone -- no W3C Membership dues, fees, etc. required to participate.
|
This process is open to anyone -- no W3C Membership dues, fees, etc. required to participate.
|
||||||
|
|
||||||
|
@ -21,10 +21,10 @@ This week, we hit 5k followers on [Twitter](https://twitter.com/DecentralizedID)
|
|||||||
|
|
||||||
### WebAuthn
|
### WebAuthn
|
||||||
|
|
||||||
* [W3C WebAuthn V2 Now a Standard](https://self-issued.info/?p%3D2160) Mike Jones
|
* [W3C WebAuthn V2 Now a Standard](https://self-issued.info/?p=2160) Mike Jones
|
||||||
> While remaining compatible with the original standard, this second version adds additional features, among them for user verification enhancements, manageability, enterprise features, and an Apple attestation format. ([Recommendation](https://www.w3.org/TR/2021/REC-webauthn-2-20210408/)) ([CTAP also approaching standardization](https://self-issued.info/?p%3D2155).
|
> While remaining compatible with the original standard, this second version adds additional features, among them for user verification enhancements, manageability, enterprise features, and an Apple attestation format. ([Recommendation](https://www.w3.org/TR/2021/REC-webauthn-2-20210408/)) ([CTAP also approaching standardization](https://self-issued.info/?p=2155).
|
||||||
* [Web Authentication: An API for accessing Public Key Credentials Level 2](https://www.w3.org/TR/2021/PR-webauthn-2-20210225/). This specification defines an API enabling the creation and use of strong, attested, scoped, public key-based credentials by web applications, for the purpose of strongly authenticating users.
|
* [Web Authentication: An API for accessing Public Key Credentials Level 2](https://www.w3.org/TR/2021/PR-webauthn-2-20210225/). This specification defines an API enabling the creation and use of strong, attested, scoped, public key-based credentials by web applications, for the purpose of strongly authenticating users.
|
||||||
* [Second Version of W3C Web Authentication (WebAuthn) advances to Proposed Recommendation (PR)](https://self-issued.info/?p%3D2149)
|
* [Second Version of W3C Web Authentication (WebAuthn) advances to Proposed Recommendation (PR)](https://self-issued.info/?p=2149)
|
||||||
> The World Wide Web Consortium (W3C) has published this [Proposed Recommendation (PR)](https://www.w3.org/TR/2021/PR-webauthn-2-20210225/) Level 2 specification, bringing the second version of WebAuthn one step closer to becoming a completed standard. While remaining compatible with the original standard, this second version adds additional features, among them for user verification enhancements, manageability, enterprise features, and an Apple attestation format.
|
> The World Wide Web Consortium (W3C) has published this [Proposed Recommendation (PR)](https://www.w3.org/TR/2021/PR-webauthn-2-20210225/) Level 2 specification, bringing the second version of WebAuthn one step closer to becoming a completed standard. While remaining compatible with the original standard, this second version adds additional features, among them for user verification enhancements, manageability, enterprise features, and an Apple attestation format.
|
||||||
* [Near-Final Second W3C WebAuthn and FIDO2 CTAP Specifications](https://self-issued.info/?p=2143)
|
* [Near-Final Second W3C WebAuthn and FIDO2 CTAP Specifications](https://self-issued.info/?p=2143)
|
||||||
> The [W3C WebAuthn](https://www.w3.org/blog/webauthn/) and [FIDO2](https://fidoalliance.org/fido2/) working groups have been busy this year preparing to finish second versions of the W3C Web Authentication (WebAuthn) and FIDO2 Client to Authenticator Protocol (CTAP) specifications
|
> The [W3C WebAuthn](https://www.w3.org/blog/webauthn/) and [FIDO2](https://fidoalliance.org/fido2/) working groups have been busy this year preparing to finish second versions of the W3C Web Authentication (WebAuthn) and FIDO2 Client to Authenticator Protocol (CTAP) specifications
|
||||||
|
@ -40,7 +40,7 @@ This post shows how being intentional about community building can help people f
|
|||||||
* [Creating a culture of recognition](https://blog.weareopen.coop/creating-a-culture-of-recognition-39ffdb6cf943)
|
* [Creating a culture of recognition](https://blog.weareopen.coop/creating-a-culture-of-recognition-39ffdb6cf943)
|
||||||
* [How badges can change the world](https://blog.weareopen.coop/how-badges-can-change-the-world-73529560caa3) WeareOpen
|
* [How badges can change the world](https://blog.weareopen.coop/how-badges-can-change-the-world-73529560caa3) WeareOpen
|
||||||
|
|
||||||
* [This model](https://www.youtube.com/watch?v%3DZcyHKKc2LVg) […] shows how systems have a lifespan and what happens as that lifespan peaks.
|
* [This model](https://www.youtube.com/watch?v=ZcyHKKc2LVg) […] shows how systems have a lifespan and what happens as that lifespan peaks.
|
||||||
|
|
||||||
As one system begins to deteriorate, a new system begins to emerge. This got us thinking about how this model applies to the world of [Open Recognition](https://blog.weareopen.coop/what-is-open-recognition-anyway-9f38ec1f8629).
|
As one system begins to deteriorate, a new system begins to emerge. This got us thinking about how this model applies to the world of [Open Recognition](https://blog.weareopen.coop/what-is-open-recognition-anyway-9f38ec1f8629).
|
||||||
|
|
||||||
@ -60,7 +60,7 @@ KBW helps people understand the badge landscape. The community is there to provi
|
|||||||
> We have a new suite of badges to encourage participation, create value for others, and reflect on that experience. Participants will be able to both earn AND award badges, so they’ll have a chance to prove that they’ve understood the theory surrounding CoPs and badges as well as put those theories into practice.
|
> We have a new suite of badges to encourage participation, create value for others, and reflect on that experience. Participants will be able to both earn AND award badges, so they’ll have a chance to prove that they’ve understood the theory surrounding CoPs and badges as well as put those theories into practice.
|
||||||
* [Discover Open Badges 3.0!](https://app.participate.com/communities/keep-badges-weird/62003f3f-a7ba-4f6a-990a-64d6f893016d/announcements/0bc15852-0f91-48c8-a7ca-478b246b553c) Keep Badges Weird
|
* [Discover Open Badges 3.0!](https://app.participate.com/communities/keep-badges-weird/62003f3f-a7ba-4f6a-990a-64d6f893016d/announcements/0bc15852-0f91-48c8-a7ca-478b246b553c) Keep Badges Weird
|
||||||
> 1. Check out the (accepted) [Open Badges 3.0 proposal](https://github.com/IMSGlobal/openbadges-specification/files/6977048/Proposal-Open-Badges-3.0-update-08-11-2021.pdf)
|
> 1. Check out the (accepted) [Open Badges 3.0 proposal](https://github.com/IMSGlobal/openbadges-specification/files/6977048/Proposal-Open-Badges-3.0-update-08-11-2021.pdf)
|
||||||
> 2. [Watch a video](https://www.youtube.com/watch?v%3DQDGPwR1F3FY%26t%3D1357s) from the ePIC conference giving an overview of what Open Badges 3.0 will enable (or view the [slide deck](https://docs.google.com/presentation/d/1NEJoQaI9b6KC1EFDDhR3MGybGVoa0R3bQh0xuKtUKkY)
|
> 2. [Watch a video](https://www.youtube.com/watch?v=QDGPwR1F3FY&t=1357s) from the ePIC conference giving an overview of what Open Badges 3.0 will enable (or view the [slide deck](https://docs.google.com/presentation/d/1NEJoQaI9b6KC1EFDDhR3MGybGVoa0R3bQh0xuKtUKkY)
|
||||||
> 3. Discuss what this means for you, your organisation, or your community in [this thread](https://app.participate.com/discussions/open-badges-3-0/68917656-db8f-4932-88fd-153fdb54e285)
|
> 3. Discuss what this means for you, your organisation, or your community in [this thread](https://app.participate.com/discussions/open-badges-3-0/68917656-db8f-4932-88fd-153fdb54e285)
|
||||||
* [Reflecting on the Evolving Badges and Credentials Ecosystem](https://blog.weareopen.coop/reflecting-on-the-evolving-badges-and-credentials-ecosystem-6efac4d673d3)
|
* [Reflecting on the Evolving Badges and Credentials Ecosystem](https://blog.weareopen.coop/reflecting-on-the-evolving-badges-and-credentials-ecosystem-6efac4d673d3)
|
||||||
> Recently, the WAO team took the opportunity to update the badge platforms page on Badge Wiki, a knowledgebase for the Open Badge community. As the ecosystem continues to evolve we’re seeing some early platforms fall by the wayside and new platforms emerge.
|
> Recently, the WAO team took the opportunity to update the badge platforms page on Badge Wiki, a knowledgebase for the Open Badge community. As the ecosystem continues to evolve we’re seeing some early platforms fall by the wayside and new platforms emerge.
|
||||||
|
@ -66,18 +66,18 @@ On May 4th, California Governor Gavin Newsom signed into effect a [“Blockchain
|
|||||||
We have monitored and involved ourselves in this new agency since its inception, and Lisa LeVasseur (our Executive Director) and Noreen Whysel (Director of Validation Research) shared their expertise on product audits and dark patterns, respectively, in a recent pre-rulemaking CPPA Stakeholder Session (May 5-6).
|
We have monitored and involved ourselves in this new agency since its inception, and Lisa LeVasseur (our Executive Director) and Noreen Whysel (Director of Validation Research) shared their expertise on product audits and dark patterns, respectively, in a recent pre-rulemaking CPPA Stakeholder Session (May 5-6).
|
||||||
* [Soulbound Tokens, Trust Networks, and California's Big Test](https://wrenchinthegears.com/2022/05/28/soulbound-tokens-trust-networks-and-californias-big-test/) Wrenchinthegears
|
* [Soulbound Tokens, Trust Networks, and California's Big Test](https://wrenchinthegears.com/2022/05/28/soulbound-tokens-trust-networks-and-californias-big-test/) Wrenchinthegears
|
||||||
|
|
||||||
California [SB1190](https://sd18.senate.ca.gov/news/342022-hertzberg-announces-new-blockchain-legislation-creating-%25E2%2580%259Ccalifornia-trust-framework%25E2%2580%259D) that would establish a “Trust Framework” at the state level. This bill was introduced to the state senate in early March by Robert Hertzberg, close friend of Los Angeles billionaire investor Nicholas Berggruen
|
California [SB1190](https://sd18.senate.ca.gov/news/342022-hertzberg-announces-new-blockchain-legislation-creating-%E2%80%9Ccalifornia-trust-framework%E2%80%9D) that would establish a “Trust Framework” at the state level. This bill was introduced to the state senate in early March by Robert Hertzberg, close friend of Los Angeles billionaire investor Nicholas Berggruen
|
||||||
|
|
||||||
The Verifiable Credential’s Policy Committee, (that Kaliya Chairs) in California had a big win this week
|
The Verifiable Credential’s Policy Committee, (that Kaliya Chairs) in California had a big win this week
|
||||||
|
|
||||||
* [California Moves Forward to Allow Vital Records to be Issued on Blockchain](https://www.coindesk.com/policy/2022/09/29/california-moves-forward-to-allow-vital-records-to-be-issued-on-blockchain/) Coindesk
|
* [California Moves Forward to Allow Vital Records to be Issued on Blockchain](https://www.coindesk.com/policy/2022/09/29/california-moves-forward-to-allow-vital-records-to-be-issued-on-blockchain/) Coindesk
|
||||||
|
|
||||||
* [approved another on Wednesday](https://www.gov.ca.gov/2022/09/28/governor-newsom-issues-legislative-update-9-28-22/) that instructs county records offices to [allow for the use of blockchain technology](https://leginfo.legislature.ca.gov/faces/billTextClient.xhtml?bill_id%3D202120220SB786) and verifiable credentials. The technology would be established in the distribution of birth, death and marriage records, allowing PDFs to be sent immediately rather than using a typical 10-day postal delivery.
|
* [approved another on Wednesday](https://www.gov.ca.gov/2022/09/28/governor-newsom-issues-legislative-update-9-28-22/) that instructs county records offices to [allow for the use of blockchain technology](https://leginfo.legislature.ca.gov/faces/billTextClient.xhtml?bill_id=202120220SB786) and verifiable credentials. The technology would be established in the distribution of birth, death and marriage records, allowing PDFs to be sent immediately rather than using a typical 10-day postal delivery.
|
||||||
* [California Legalizes Blockchain-based Vital Records](https://mobileidworld.com/california-legalizes-blockchain-based-vital-records-410031/) MobileDataWorld
|
* [California Legalizes Blockchain-based Vital Records](https://mobileidworld.com/california-legalizes-blockchain-based-vital-records-410031/) MobileDataWorld
|
||||||
|
|
||||||
As [an abstract of the bill](https://trackbill.com/bill/california-senate-bill-786-county-birth-death-and-marriage-records-blockchain/2043852/) explains, while existing law requires such records “to contain certain information and to be printed on chemically sensitized security paper, as specified,” the new legislation enables a county recorder to, upon request, issue a birth, death, or marriage record “by means of verifiable credential, as defined, using blockchain technology, defined as a decentralized data system, in which the data stored is mathematically verifiable, that uses distributed ledgers or databases to store specialized data in the permanent order of transactions recorded.”
|
As [an abstract of the bill](https://trackbill.com/bill/california-senate-bill-786-county-birth-death-and-marriage-records-blockchain/2043852/) explains, while existing law requires such records “to contain certain information and to be printed on chemically sensitized security paper, as specified,” the new legislation enables a county recorder to, upon request, issue a birth, death, or marriage record “by means of verifiable credential, as defined, using blockchain technology, defined as a decentralized data system, in which the data stored is mathematically verifiable, that uses distributed ledgers or databases to store specialized data in the permanent order of transactions recorded.”
|
||||||
* [VCs Policy Committeee (California) – Participate in passing legislation to create a California Trust Framework!](https://iiw.idcommons.net/21B/_(California)_Verifiable_Credentials_Policy_Committeee_-_Come_learn_about_how_participate_in_passing_legislation_to_crete_a_California_Trust_Framework!) by Kaliya Young, Ally Medina [Slides](https://docs.google.com/presentation/d/1VyxmWan3qbxynxhKvw1CHhWZINiPRF9gjeqSCSDh1MY/edit?usp%3Dsharing)
|
* [VCs Policy Committeee (California) – Participate in passing legislation to create a California Trust Framework!](https://iiw.idcommons.net/21B/_(California)_Verifiable_Credentials_Policy_Committeee_-_Come_learn_about_how_participate_in_passing_legislation_to_crete_a_California_Trust_Framework!) by Kaliya Young, Ally Medina [Slides](https://docs.google.com/presentation/d/1VyxmWan3qbxynxhKvw1CHhWZINiPRF9gjeqSCSDh1MY/edit?usp=sharing)
|
||||||
> discussed how the Blockchain Advocacy Coalition’s sponsorship of [AB 2004](https://leginfo.legislature.ca.gov/faces/billTextClient.xhtml?bill_id%3D201920200AB2004) pushed verifiable credentials into mainstream political discourse and how companies can help us shape public policy and government pilot programs of Verifiable Credential technology.
|
> discussed how the Blockchain Advocacy Coalition’s sponsorship of [AB 2004](https://leginfo.legislature.ca.gov/faces/billTextClient.xhtml?bill_id=201920200AB2004) pushed verifiable credentials into mainstream political discourse and how companies can help us shape public policy and government pilot programs of Verifiable Credential technology.
|
||||||
>
|
>
|
||||||
> We are planning on working with legislators to introduce a bill that creates a California Trust Framework and lays the groundwork for use of the technology in the public and private sector.
|
> We are planning on working with legislators to introduce a bill that creates a California Trust Framework and lays the groundwork for use of the technology in the public and private sector.
|
||||||
|
|
||||||
@ -88,7 +88,7 @@ The California Privacy Rights Act of 2020 (“CPRA”) established the Californi
|
|||||||
|
|
||||||
May be of interest: [https://www.latimes.com/california/story/2021-06-18/california-unveils-system-to-provide-digital-covid-19-vaccine-records](https://www.latimes.com/california/story/2021-06-18/california-unveils-system-to-provide-digital-covid-19-vaccine-records)
|
May be of interest: [https://www.latimes.com/california/story/2021-06-18/california-unveils-system-to-provide-digital-covid-19-vaccine-records](https://www.latimes.com/california/story/2021-06-18/california-unveils-system-to-provide-digital-covid-19-vaccine-records)
|
||||||
|
|
||||||
SMART Health Card Framework: [https://vci.org/about#smart-health](https://vci.org/about%23smart-health)
|
SMART Health Card Framework: [https://vci.org/about#smart-health](https://vci.org/about#smart-health)
|
||||||
|
|
||||||
To achieve this purpose, the founding members of VCI™ have collaborated to develop (1) the SMART Health Cards Framework Implementation Guide based on the World Wide Web Consortium (W3C) Verifiable Credential and Health Level 7 (HL7) SMART on FHIR standards, and (2) the SMART Health Cards: Vaccination & Testing Implementation Guide.
|
To achieve this purpose, the founding members of VCI™ have collaborated to develop (1) the SMART Health Cards Framework Implementation Guide based on the World Wide Web Consortium (W3C) Verifiable Credential and Health Level 7 (HL7) SMART on FHIR standards, and (2) the SMART Health Cards: Vaccination & Testing Implementation Guide.
|
||||||
|
|
||||||
|
@ -118,7 +118,7 @@ I’m not an expert on the election process, and this is just my opinion. I’ve
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
* [Decentralized Identity & Government](https://www.youtube.com/watch?v%3Dl8pHUdjKfes) Evernym
|
* [Decentralized Identity & Government](https://www.youtube.com/watch?v=l8pHUdjKfes) Evernym
|
||||||
|
|
||||||
The key differences between federated and decentralized identity systems - An analysis of a few notable government-led projects, such as Aadhaar (India), Verify (UK), eIDAS (EU), and the Ontario Digital Identity Program (Canada) - What decentralization means for portability, scalability, flexibility, and privacy - How governments and commercial organizations can enhance existing federated identity systems with verifiable credentials
|
The key differences between federated and decentralized identity systems - An analysis of a few notable government-led projects, such as Aadhaar (India), Verify (UK), eIDAS (EU), and the Ontario Digital Identity Program (Canada) - What decentralization means for portability, scalability, flexibility, and privacy - How governments and commercial organizations can enhance existing federated identity systems with verifiable credentials
|
||||||
* [Participate in Alberta's First Verifiable Digital Credentials Pilot](https://pilot.atbventures.com/) ATB Ventures and Govt Alberta
|
* [Participate in Alberta's First Verifiable Digital Credentials Pilot](https://pilot.atbventures.com/) ATB Ventures and Govt Alberta
|
||||||
@ -130,6 +130,6 @@ The proof of concept stage is where the Canadian government tests digital creden
|
|||||||
* [The Future of Digital Identity in Canada: Self-Sovereign Identity (SSI) and Verified.Me](https://securekey.com/the-future-of-digital-identity-in-canada-self-sovereign-identity-ssi-and-verified-me/)
|
* [The Future of Digital Identity in Canada: Self-Sovereign Identity (SSI) and Verified.Me](https://securekey.com/the-future-of-digital-identity-in-canada-self-sovereign-identity-ssi-and-verified-me/)
|
||||||
|
|
||||||
We are thrilled that the academic journal [Frontiers in Blockchain](https://www.frontiersin.org/journals/blockchain) accepted our community case study, “[Decentralized, Self-Sovereign, Consortium: The Future of Digital Identity in Canada](https://www.frontiersin.org/articles/10.3389/fbloc.2021.624258/full).” This peer-reviewed article focuses on the benefits of self-sovereign identity (SSI) with blockchain and Verified.Me as an example of these concepts being effectively implemented to create a cohesive, secure service and digital identity network.
|
We are thrilled that the academic journal [Frontiers in Blockchain](https://www.frontiersin.org/journals/blockchain) accepted our community case study, “[Decentralized, Self-Sovereign, Consortium: The Future of Digital Identity in Canada](https://www.frontiersin.org/articles/10.3389/fbloc.2021.624258/full).” This peer-reviewed article focuses on the benefits of self-sovereign identity (SSI) with blockchain and Verified.Me as an example of these concepts being effectively implemented to create a cohesive, secure service and digital identity network.
|
||||||
* [Liquid Avatar and Ontario Convenience Stores Association (OSCA) Successful Pilot of Digital Age-Verification Solutions to Reach over 8,000 Retail Locations](https://www.accesswire.com/684666/Liquid-Avatar-Technologies-and-Ontario-Convenience-Stores-Association-OSCA-Deliver-Successful-Pilot-of-Digital-Age-Verification-Solutions-to-Reach-over-8000-Retail-Locations%23new_tab)
|
* [Liquid Avatar and Ontario Convenience Stores Association (OSCA) Successful Pilot of Digital Age-Verification Solutions to Reach over 8,000 Retail Locations](https://www.accesswire.com/684666/Liquid-Avatar-Technologies-and-Ontario-Convenience-Stores-Association-OSCA-Deliver-Successful-Pilot-of-Digital-Age-Verification-Solutions-to-Reach-over-8000-Retail-Locations#new_tab)
|
||||||
|
|
||||||
The Smart Age program provides digital age verification, supported with biometric authentication for restricted product sales like lottery tickets, tobacco, alcohol and other goods and services through a mobile device using verifiable digital credentials and biometrics without a user divulging any personally identifiable information to the store clerk.
|
The Smart Age program provides digital age verification, supported with biometric authentication for restricted product sales like lottery tickets, tobacco, alcohol and other goods and services through a mobile device using verifiable digital credentials and biometrics without a user divulging any personally identifiable information to the store clerk.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
published: false
|
published: false
|
||||||
---
|
---
|
||||||
|
|
||||||
* [EBSI Demo Day](https://ec.europa.eu/digital-building-blocks/wikis/display/EBSI/EBSI%2BDemo%2BDay) ([presentation](https://ec.europa.eu/digital-building-blocks/wikis/download/attachments/464979566/EBSI_Demo_Day.pdf)) ([video playlist](https://www.youtube.com/playlist?list%3DPLPMb0otsCuFLpE4UYiAZ_y3HhP2VX6q8O)
|
* [EBSI Demo Day](https://ec.europa.eu/digital-building-blocks/wikis/display/EBSI/EBSI+Demo+Day) ([presentation](https://ec.europa.eu/digital-building-blocks/wikis/download/attachments/464979566/EBSI_Demo_Day.pdf)) ([video playlist](https://www.youtube.com/playlist?list=PLPMb0otsCuFLpE4UYiAZ_y3HhP2VX6q8O)
|
||||||
|
|
||||||
first time since the launch of [the Early Adopters Programme](https://ec.europa.eu/digital-building-blocks/wikis/x/DABXGw) in 2021, we are ready to showcase, in real-time and with real data, the outcomes of the EBSI multi-university pilot.
|
first time since the launch of [the Early Adopters Programme](https://ec.europa.eu/digital-building-blocks/wikis/x/DABXGw) in 2021, we are ready to showcase, in real-time and with real data, the outcomes of the EBSI multi-university pilot.
|
||||||
|
|
||||||
@ -37,7 +37,7 @@ Oskar van Deventer, a rockstar from TNO, presents:
|
|||||||
|
|
||||||
What are the Pros and Cons? - ISSE 2020 Webinar 3 ([Tim Bouma says to watch this](https://twitter.com/trbouma/status/1337373169993256962))
|
What are the Pros and Cons? - ISSE 2020 Webinar 3 ([Tim Bouma says to watch this](https://twitter.com/trbouma/status/1337373169993256962))
|
||||||
|
|
||||||
* [NGI Forward SALON ON DIGITAL SOVERIGNTY IN eID-Solutions2: Self-sovereign, Centralised or Privatised?](https://www.youtube.com/watch?v%3D1RxB7KK2x8Y)
|
* [NGI Forward SALON ON DIGITAL SOVERIGNTY IN eID-Solutions2: Self-sovereign, Centralised or Privatised?](https://www.youtube.com/watch?v=1RxB7KK2x8Y)
|
||||||
|
|
||||||
Without a clear vision on identity, society will have no agency since the capability to produce future value (data) is not under regional, nor national, nor international regulated control.
|
Without a clear vision on identity, society will have no agency since the capability to produce future value (data) is not under regional, nor national, nor international regulated control.
|
||||||
|
|
||||||
@ -87,15 +87,15 @@ Therefore it is important to have a good overview of what is happening in differ
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
* [Where Stands the Sovereign Self?](https://www.kuppingercole.com/blog/hegde/eic-speaker-spotlight-doc-searls-on-decentralized-identity?ref%3Dsmspotlightdoc) Kuppinger Cole
|
* [Where Stands the Sovereign Self?](https://www.kuppingercole.com/blog/hegde/eic-speaker-spotlight-doc-searls-on-decentralized-identity?ref=smspotlightdoc) Kuppinger Cole
|
||||||
|
|
||||||
Doc Searls, Co-founder and board member of Customer Commons, and Director of ProjectVRM, is to deliver a keynote entitled [Where Stands the Sovereign Self?](https://www.kuppingercole.com/sessions/4918) at the [European Identity and Cloud Conference 2021](https://www.kuppingercole.com/events/eic2021). [...] we asked Doc some questions about his planned presentation.
|
Doc Searls, Co-founder and board member of Customer Commons, and Director of ProjectVRM, is to deliver a keynote entitled [Where Stands the Sovereign Self?](https://www.kuppingercole.com/sessions/4918) at the [European Identity and Cloud Conference 2021](https://www.kuppingercole.com/events/eic2021). [...] we asked Doc some questions about his planned presentation.
|
||||||
* [European Digital Identity: Talao Announces Professional Credential Solution](https://medium.com/@talao_io/european-digital-identity-talao-announces-professional-credential-solution-1d322e32be2c) Talao
|
* [European Digital Identity: Talao Announces Professional Credential Solution](https://medium.com/@talao_io/european-digital-identity-talao-announces-professional-credential-solution-1d322e32be2c) Talao
|
||||||
|
|
||||||
Talao’s team is excited to announce the development of the first Decentralized Self-Sovereign Identity (SSI) solution built on the Tezos blockchain for the Human Resources industry. The digital wallet created by Talao will enable companies to issue verifiable professional credentials and for employees to store work history and other personal data.
|
Talao’s team is excited to announce the development of the first Decentralized Self-Sovereign Identity (SSI) solution built on the Tezos blockchain for the Human Resources industry. The digital wallet created by Talao will enable companies to issue verifiable professional credentials and for employees to store work history and other personal data.
|
||||||
* [Experience the future with the European Blockchain Services Infrastructure (EBSI)](https://www.youtube.com/watch?v%3Dm2uj7fgb2JI)
|
* [Experience the future with the European Blockchain Services Infrastructure (EBSI)](https://www.youtube.com/watch?v=m2uj7fgb2JI)
|
||||||
|
|
||||||
Discover Eva’s journey using the blockchain solution developed by the European Commission and the European Blockchain Partnership members: the European Blockchain Services Infrastructure (EBSI) - [http://ec.europa.eu/cefdigital/ebsi](https://www.youtube.com/redirect?event%3Dvideo_description%26redir_token%3DQUFFLUhqa2JrRVM0dGRJMDd1WkUxX284enZ3YjN3bUV2UXxBQ3Jtc0ttbE9Fd0NWMm1iNVYyRlpKRmttSTJlZE85VXNOQkozSkR1VkdaUm52bWM5eFIyUUtnUGF6b2FNTExVbXB3d0RoYzk2b0ZOYVR6VjR6VU5nTGdlalhqQ2RXU095MmJUR1RadTVBT082NXRYWE5OSElTMA%26q%3Dhttp%253A%252F%252Fec.europa.eu%252Fcefdigital%252Febsi)
|
Discover Eva’s journey using the blockchain solution developed by the European Commission and the European Blockchain Partnership members: the European Blockchain Services Infrastructure (EBSI) - [http://ec.europa.eu/cefdigital/ebsi](https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqa2JrRVM0dGRJMDd1WkUxX284enZ3YjN3bUV2UXxBQ3Jtc0ttbE9Fd0NWMm1iNVYyRlpKRmttSTJlZE85VXNOQkozSkR1VkdaUm52bWM5eFIyUUtnUGF6b2FNTExVbXB3d0RoYzk2b0ZOYVR6VjR6VU5nTGdlalhqQ2RXU095MmJUR1RadTVBT082NXRYWE5OSElTMA&q=http%3A//ec.europa.eu/cefdigital/ebsi)
|
||||||
|
|
||||||
* [DIGITAL SERVICES ACT: A GAME CHANGER FOR OUR FUNDAMENTAL RIGHTS? [+ LIVE STREAM]](https://www.patrick-breyer.de/event/digital-services-act-a-game-changer-for-our-fundamental-rights/)
|
* [DIGITAL SERVICES ACT: A GAME CHANGER FOR OUR FUNDAMENTAL RIGHTS? [+ LIVE STREAM]](https://www.patrick-breyer.de/event/digital-services-act-a-game-changer-for-our-fundamental-rights/)
|
||||||
|
|
||||||
@ -142,7 +142,7 @@ The legal instrument aims to provide, for cross-border use:
|
|||||||
> It’s currently possible to be eIDAS compliant with SSI, leveraging one out of five scenarios described in the SSI eIDAS legal report by Dr. Ignacio Alamillo Domingo. Especially interesting is the SSI eIDAS bridge, which adds legal value to verified credentials with the use of electronic certificates and electronic seals. However, it’s also possible to derive national eIDs notified in eIDAS, which are eIDAS linked by issuing a verifiable credential with a qualified certificate according to the technical specification.
|
> It’s currently possible to be eIDAS compliant with SSI, leveraging one out of five scenarios described in the SSI eIDAS legal report by Dr. Ignacio Alamillo Domingo. Especially interesting is the SSI eIDAS bridge, which adds legal value to verified credentials with the use of electronic certificates and electronic seals. However, it’s also possible to derive national eIDs notified in eIDAS, which are eIDAS linked by issuing a verifiable credential with a qualified certificate according to the technical specification.
|
||||||
|
|
||||||
## eSSIF Lab
|
## eSSIF Lab
|
||||||
|
* [Infrastructure Development Winners](https://essif-lab.eu/meet-the-essif-labs-ecosystem-the-infrastructure-development-instrument-first-winners/) including SICPA, Jolocom, Evernym, ValidatedID
|
||||||
* [Meet the eSSIF-Lab ecosystem: the 2nd Business-oriented Programme participants](https://essif-lab.eu/meet-the-essif-lab-ecosystem-the-2nd-business-oriented-programme-participants/)
|
* [Meet the eSSIF-Lab ecosystem: the 2nd Business-oriented Programme participants](https://essif-lab.eu/meet-the-essif-lab-ecosystem-the-2nd-business-oriented-programme-participants/)
|
||||||
|
|
||||||
Blockchain Certified Data Academic Verifiable Credentials (Academic VCs) – [https://www.bcdiploma.com/](https://www.bcdiploma.com/)
|
Blockchain Certified Data Academic Verifiable Credentials (Academic VCs) – [https://www.bcdiploma.com/](https://www.bcdiploma.com/)
|
||||||
@ -169,12 +169,9 @@ yes.com AG European Bank Identity Credentials (Eubic) – [https:
|
|||||||
* [Gimly in eSSIf-lab: self-sovereign identity and NFC smartcards](https://www.gimly.io/blog/gimly-in-essif-ssi-and-nfc-smartcards)
|
* [Gimly in eSSIf-lab: self-sovereign identity and NFC smartcards](https://www.gimly.io/blog/gimly-in-essif-ssi-and-nfc-smartcards)
|
||||||
> Gimly is participating in the European SSI infrastructure programme (eSSIf-lab), building a bridge for the implementation of NFC smartcards with secure elements as physical SSI identifiers. Our aim is to enable self-sovereign identity for both online and offline identification, authorization and access management, with a decreased dependency on the use of personal smartphones.
|
> Gimly is participating in the European SSI infrastructure programme (eSSIf-lab), building a bridge for the implementation of NFC smartcards with secure elements as physical SSI identifiers. Our aim is to enable self-sovereign identity for both online and offline identification, authorization and access management, with a decreased dependency on the use of personal smartphones.
|
||||||
|
|
||||||
* [Alex Norta | NGI Explorers Third Expedition: meet the Explorers](https://www.youtube.com/watch?v%3D_HCEwQLpr10)
|
* [Alex Norta | NGI Explorers Third Expedition: meet the Explorers](https://www.youtube.com/watch?v=_HCEwQLpr10)
|
||||||
|
|
||||||
Meet [Alex Norta](http://alexnortaphd.yolasite.com/), associate professor at TalTech who talks about his project “Self-sovereign multi-factor identity authentication using smart-contract blockchain technology”, that will be carried out in collaboration with the University of Central Florida
|
Meet [Alex Norta](http://alexnortaphd.yolasite.com/), associate professor at TalTech who talks about his project “Self-sovereign multi-factor identity authentication using smart-contract blockchain technology”, that will be carried out in collaboration with the University of Central Florida
|
||||||
* [Adding SSI to internet communications using Sylk Suite by Bloqzone B.V.](https://essif-lab.eu/adding-ssi-to-internet-communications-using-sylk-suite-by-bloqzone-b-v/) ESSIF LAB
|
|
||||||
|
|
||||||
The project SSIComms adds SSI to internet communications by adding SSI wallets to the renowned SYLK Suite, an award winning ensemble of communications solutions with the SIP protocol at its core.
|
|
||||||
|
|
||||||
* [SSI Mandate Service by Visma Connect B.V.](https://essif-lab.eu/ssi-mandate-service-by-visma-connect-b-v/) ESSIF LAB
|
* [SSI Mandate Service by Visma Connect B.V.](https://essif-lab.eu/ssi-mandate-service-by-visma-connect-b-v/) ESSIF LAB
|
||||||
|
|
||||||
@ -191,12 +188,12 @@ The concept of SSI was designed with the citizen and privacy in mind. However, e
|
|||||||
> another 7 proposals selected, out of 29 that were submitted before the second deadline of the Infrastructure-oriented Open Call
|
> another 7 proposals selected, out of 29 that were submitted before the second deadline of the Infrastructure-oriented Open Call
|
||||||
* [eSSIF-Lab Vision and Purpose](https://essif-lab.pages.grnet.gr/framework/docs/vision-and-purpose)
|
* [eSSIF-Lab Vision and Purpose](https://essif-lab.pages.grnet.gr/framework/docs/vision-and-purpose)
|
||||||
|
|
||||||
The context of the eSSIF-Lab vision can be found in articles 8-10 of the [European Convention on Human Rights (ECHR)](https://www.echr.coe.int/Pages/home.aspx?p%3Dbasictexts/convention), that state the rights of individuals regarding their privacy, and their freedoms to collect, process, store, and express information in a self-sovereign fashion, i.e. in a way that they can decide for themselves.
|
The context of the eSSIF-Lab vision can be found in articles 8-10 of the [European Convention on Human Rights (ECHR)](https://www.echr.coe.int/Pages/home.aspx?p=basictexts/convention), that state the rights of individuals regarding their privacy, and their freedoms to collect, process, store, and express information in a self-sovereign fashion, i.e. in a way that they can decide for themselves.
|
||||||
|
|
||||||
* [eSSIF-Lab Principles](https://essif-lab.pages.grnet.gr/framework/docs/essifLab-principles)
|
* [eSSIF-Lab Principles](https://essif-lab.pages.grnet.gr/framework/docs/essifLab-principles)
|
||||||
> [Trust](https://essif-lab.pages.grnet.gr/framework/docs/terms/trust) is not something that is given, but something that [parties](https://essif-lab.pages.grnet.gr/framework/docs/terms/party) (un)consciously assess, and decide about, and changes over time. Since parties are autonomous, their trust is highly subjective. As a consequence, the idea of having 'trusted registries', 'trusted issuers' that do not take this subjectivity into account basically act as [(centralized) authorities](https://essif-lab.pages.grnet.gr/framework/docs/terms/authority), denying that parties are autonomous. While we acknowledge that such ideas (have a right to) exist, we do not follow them.
|
> [Trust](https://essif-lab.pages.grnet.gr/framework/docs/terms/trust) is not something that is given, but something that [parties](https://essif-lab.pages.grnet.gr/framework/docs/terms/party) (un)consciously assess, and decide about, and changes over time. Since parties are autonomous, their trust is highly subjective. As a consequence, the idea of having 'trusted registries', 'trusted issuers' that do not take this subjectivity into account basically act as [(centralized) authorities](https://essif-lab.pages.grnet.gr/framework/docs/terms/authority), denying that parties are autonomous. While we acknowledge that such ideas (have a right to) exist, we do not follow them.
|
||||||
* [eSSIF-Lab Glossary](https://essif-lab.pages.grnet.gr/framework/docs/essifLab-glossary)
|
* [eSSIF-Lab Glossary](https://essif-lab.pages.grnet.gr/framework/docs/essifLab-glossary)
|
||||||
* [NGI Forward SALON ON DIGITAL SOVEREIGNTY IN eID-Solutions2:Self-sovereign, Centralised or Privatised](https://www.youtube.com/watch?v%3D1RxB7KK2x8Y)
|
* [NGI Forward SALON ON DIGITAL SOVEREIGNTY IN eID-Solutions2:Self-sovereign, Centralised or Privatised](https://www.youtube.com/watch?v=1RxB7KK2x8Y)
|
||||||
> We are in a very interesting historical moment where forces (and solid arguments) for centralization and forces (and solid arguments) for decentralization seem to hold each other in check. Without a clear vision on identity, society will have no agency since the capability to produce future value (data) is not under regional, nor national, nor international regulated control
|
> We are in a very interesting historical moment where forces (and solid arguments) for centralization and forces (and solid arguments) for decentralization seem to hold each other in check. Without a clear vision on identity, society will have no agency since the capability to produce future value (data) is not under regional, nor national, nor international regulated control
|
||||||
|
|
||||||
* [Meet the eSSIF-Lab’s ecosystem: The Infrastructure Development Instrument second tranche winners](https://spaces.fundingbox.com/spaces/ngi-next-generation-internet-ngi-news-events/6059f89a9bbc1905d0abf0a9) NGI Community
|
* [Meet the eSSIF-Lab’s ecosystem: The Infrastructure Development Instrument second tranche winners](https://spaces.fundingbox.com/spaces/ngi-next-generation-internet-ngi-news-events/6059f89a9bbc1905d0abf0a9) NGI Community
|
||||||
@ -214,13 +211,13 @@ The context of the eSSIF-Lab vision can be found in articles 8-10 of the [Europ
|
|||||||
- [Infrastructure Development Winners](https://essif-lab.eu/meet-the-essif-labs-ecosystem-the-infrastructure-development-instrument-first-winners/) including SICPA, Jolocom, Evernym, ValidatedID
|
- [Infrastructure Development Winners](https://essif-lab.eu/meet-the-essif-labs-ecosystem-the-infrastructure-development-instrument-first-winners/) including SICPA, Jolocom, Evernym, ValidatedID
|
||||||
- [Business-Oriented Programme](https://essif-lab.eu/meet-the-essif-labs-ecosystem-the-1st-business-oriented-programme-participants/) including Danube Tech, Domi, Jolocom
|
- [Business-Oriented Programme](https://essif-lab.eu/meet-the-essif-labs-ecosystem-the-1st-business-oriented-programme-participants/) including Danube Tech, Domi, Jolocom
|
||||||
|
|
||||||
* [Verifiable Credentials Lifecycle - EBSI Documentation - CEF Digital](https://ec.europa.eu/digital-building-blocks/wikis/display/EBSIDOC/Verifiable%2BCredentials%2BLifecycle) European Commission
|
* [Verifiable Credentials Lifecycle - EBSI Documentation - CEF Digital](https://ec.europa.eu/digital-building-blocks/wikis/display/EBSIDOC/Verifiable+Credentials+Lifecycle) European Commission
|
||||||
|
|
||||||
* [Why and how to make your digital wallet conformant with EBSI?](https://ec.europa.eu/digital-building-blocks/wikis/display/EBSI/Become%2Bconformant) European Commission
|
* [Why and how to make your digital wallet conformant with EBSI?](https://ec.europa.eu/digital-building-blocks/wikis/display/EBSI/Become+conformant) European Commission
|
||||||
|
|
||||||
Creating EBSI's Verifiable Credentials Profile containing all the EBSI specifications.
|
Creating EBSI's Verifiable Credentials Profile containing all the EBSI specifications.
|
||||||
|
|
||||||
* [On-boarding legal entities flows clarifications - EBSI Documentation - CEF Digital](https://ec.europa.eu/digital-building-blocks/wikis/pages/viewpage.action?pageId%3D489652740) European Commission
|
* [On-boarding legal entities flows clarifications - EBSI Documentation - CEF Digital](https://ec.europa.eu/digital-building-blocks/wikis/pages/viewpage.action?pageId=489652740) European Commission
|
||||||
|
|
||||||
In this document, you can learn how to onboard and accredit the following legal entities
|
In this document, you can learn how to onboard and accredit the following legal entities
|
||||||
|
|
||||||
@ -244,7 +241,7 @@ The uptake of eIDAS (facilitating cross-border acceptance of eIDs) is low relati
|
|||||||
|
|
||||||
The EU Commission did reflect on the effectiveness of the regulation in its [Impact Assessment](https://op.europa.eu/en/publication-detail/-/publication/35274ac3-cd1b-11ea-adf7-01aa75ed71a1), and is developing a revision of it. There are multiple revision options being discussed, but thus far, the preferred option would establish a framework that provides citizens with optional use of a personal digital wallet
|
The EU Commission did reflect on the effectiveness of the regulation in its [Impact Assessment](https://op.europa.eu/en/publication-detail/-/publication/35274ac3-cd1b-11ea-adf7-01aa75ed71a1), and is developing a revision of it. There are multiple revision options being discussed, but thus far, the preferred option would establish a framework that provides citizens with optional use of a personal digital wallet
|
||||||
|
|
||||||
* [EBSI Documentation](https://ec.europa.eu/digital-building-blocks/wikis/display/EBSIDOC/EBSI%2BDocumentation%2BHome)
|
* [EBSI Documentation](https://ec.europa.eu/digital-building-blocks/wikis/display/EBSIDOC/EBSI+Documentation+Home)
|
||||||
|
|
||||||
Governmental entities act as important intermediaries for many transactions occurring in today´s society.
|
Governmental entities act as important intermediaries for many transactions occurring in today´s society.
|
||||||
|
|
||||||
@ -279,7 +276,7 @@ We are glad to be among the first few along with [@ValidatedID](https://mobile.
|
|||||||
- [eIDAS 2.0: How Europe can define the digital identity blueprint for the world](https://blog.avast.com/eidas-2.0-avast)
|
- [eIDAS 2.0: How Europe can define the digital identity blueprint for the world](https://blog.avast.com/eidas-2.0-avast)
|
||||||
|
|
||||||
|
|
||||||
* [EIDAS 2.0 Turns To Self-Sovereign Identification To Bring Users Ownership And Control](https://www.forbes.com/sites/alastairjohnson/2022/07/05/eidas-20-turns-to-self-sovereign-identification-to-bring-users-ownership-and-control/?sh%3Da9eefcc7f07e) Forbes
|
* [EIDAS 2.0 Turns To Self-Sovereign Identification To Bring Users Ownership And Control](https://www.forbes.com/sites/alastairjohnson/2022/07/05/eidas-20-turns-to-self-sovereign-identification-to-bring-users-ownership-and-control/?sh=a9eefcc7f07e) Forbes
|
||||||
|
|
||||||
The new proposal will pivot on some of the more key issues that held back the original framework. For example, instead of enforcing a single, rigid ID that openly reveals everything about an individual indefinitely, the eIDAS 2.0 structure can now potentially employ a flexible, self-sovereign identity (SSI) that puts control of all identifying information entirely into the hands of the end-users they pertain to, in both public and private partnership frameworks.
|
The new proposal will pivot on some of the more key issues that held back the original framework. For example, instead of enforcing a single, rigid ID that openly reveals everything about an individual indefinitely, the eIDAS 2.0 structure can now potentially employ a flexible, self-sovereign identity (SSI) that puts control of all identifying information entirely into the hands of the end-users they pertain to, in both public and private partnership frameworks.
|
||||||
|
|
||||||
@ -289,11 +286,11 @@ The information on Horizon Europe, EU Health, Digital Europe, Creative Europe, D
|
|||||||
|
|
||||||
* [...]
|
* [...]
|
||||||
|
|
||||||
Watch all the presentations from the event: [11 May 2022](https://www.youtube.com/watch?v%3DGKlgfRSCeXI), [12 May 2022](https://www.youtube.com/watch?v%3DDQIgwVJvFuE%26t%3D28020s)
|
Watch all the presentations from the event: [11 May 2022](https://www.youtube.com/watch?v=GKlgfRSCeXI), [12 May 2022](https://www.youtube.com/watch?v=DQIgwVJvFuE&t=28020s)
|
||||||
|
|
||||||
EBSI
|
EBSI
|
||||||
|
|
||||||
* [5 reasons why professionals and enthusiasts of Self-Sovereign Information Sharing should look into EBSI this summer](https://ec.europa.eu/digital-building-blocks/wikis/display/EBSI/5%2Breasons%2Bwhy%2Bprofessionals%2Band%2Benthusiasts%2Bof%2BSelf-Sovereign%2BInformation%2BSharing%2Bshould%2Blook%2Binto%2BEBSI%2Bthis%2Bsummer)
|
* [5 reasons why professionals and enthusiasts of Self-Sovereign Information Sharing should look into EBSI this summer](https://ec.europa.eu/digital-building-blocks/wikis/display/EBSI/5+reasons+why+professionals+and+enthusiasts+of+Self-Sovereign+Information+Sharing+should+look+into+EBSI+this+summer)
|
||||||
|
|
||||||
#1 EBSI combines W3C standards, Verifiable Credentials and DIDs, with blockchain technology for the purpose of information sharing between Citizens and Governments (C2G) or Businesses (C2B)
|
#1 EBSI combines W3C standards, Verifiable Credentials and DIDs, with blockchain technology for the purpose of information sharing between Citizens and Governments (C2G) or Businesses (C2B)
|
||||||
|
|
||||||
@ -305,7 +302,7 @@ EBSI
|
|||||||
|
|
||||||
#5 EBSI successfully piloted Self-Sovereign Information Sharing in the education domain
|
#5 EBSI successfully piloted Self-Sovereign Information Sharing in the education domain
|
||||||
|
|
||||||
* [EBSI Explained](https://ec.europa.eu/digital-building-blocks/wikis/display/EBSI/What%2Bis%2Bebsi/) European Commission
|
* [EBSI Explained](https://ec.europa.eu/digital-building-blocks/wikis/display/EBSI/What+is+ebsi/) European Commission
|
||||||
|
|
||||||
EBSI is a blockchain network of distributed nodes across Europe to support important applications. [...] Below you will find a series of publications that will walk you through the technologies that make it possible for Public Administrations and Businesses to easily verify and trust information received directly from Citizens (or Businesses). There are PDFs of each one:
|
EBSI is a blockchain network of distributed nodes across Europe to support important applications. [...] Below you will find a series of publications that will walk you through the technologies that make it possible for Public Administrations and Businesses to easily verify and trust information received directly from Citizens (or Businesses). There are PDFs of each one:
|
||||||
|
|
||||||
@ -320,7 +317,7 @@ EBSI is a blockchain network of distributed nodes across Europe to support impor
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
EBSI: [Innovation that respects our privacy is a joint effort](https://ec.europa.eu/digital-building-blocks/wikis/display/EBSI/Innovation%2Bthat%2Brespects%2Bour%2Bprivacy%2Bis%2Ba%2Bjoint%2Beffort)
|
EBSI: [Innovation that respects our privacy is a joint effort](https://ec.europa.eu/digital-building-blocks/wikis/display/EBSI/Innovation+that+respects+our+privacy+is+a+joint+effort)
|
||||||
|
|
||||||
O’Neill’s [Weapons of Math destruction](https://www.goodreads.com/book/show/28186015-weapons-of-math-destruction), Zuboff’s [Surveillance Capitalism](https://www.goodreads.com/book/show/26195941-the-age-of-surveillance-capitalism), and Véliz’ recent [Privacy is Power](https://www.goodreads.com/en/book/show/51781479-privacy-is-power): these may have made it onto your summer reading list. And for good reason: wherever there is new technology, there is also concern for the respect of our European values.
|
O’Neill’s [Weapons of Math destruction](https://www.goodreads.com/book/show/28186015-weapons-of-math-destruction), Zuboff’s [Surveillance Capitalism](https://www.goodreads.com/book/show/26195941-the-age-of-surveillance-capitalism), and Véliz’ recent [Privacy is Power](https://www.goodreads.com/en/book/show/51781479-privacy-is-power): these may have made it onto your summer reading list. And for good reason: wherever there is new technology, there is also concern for the respect of our European values.
|
||||||
|
|
||||||
@ -348,7 +345,7 @@ EU [DATA GOVERNANCE ACT MEETS TOIP FRAMEWORK](https://trustoverip.org/blog/2022/
|
|||||||
The DGA defines an “intermediary” that facilitates processing and sharing of data for individuals and organizations to “…increase trust in data intermediation services and foster data altruism across the EU”. In the [MyData](https://mydata.org/declaration/) framework for user-controlled data sharing, intermediaries are called [MyData Operators](https://mydata.org/mydata-operators/) and there is a certification program in place.
|
The DGA defines an “intermediary” that facilitates processing and sharing of data for individuals and organizations to “…increase trust in data intermediation services and foster data altruism across the EU”. In the [MyData](https://mydata.org/declaration/) framework for user-controlled data sharing, intermediaries are called [MyData Operators](https://mydata.org/mydata-operators/) and there is a certification program in place.
|
||||||
|
|
||||||
|
|
||||||
* [Overview of Member States' eID strategies](https://ec.europa.eu/cefdigital/wiki/display/EIDCOMMUNITY/National%2BStrategies)
|
* [Overview of Member States' eID strategies](https://ec.europa.eu/cefdigital/wiki/display/EIDCOMMUNITY/National+Strategies)
|
||||||
> The report focusses on the approaches towards eID outlined in national strategy documents, together with other supporting documentation and web resources, with the aim of offering a thorough understanding of the eID state of play across Europe.
|
> The report focusses on the approaches towards eID outlined in national strategy documents, together with other supporting documentation and web resources, with the aim of offering a thorough understanding of the eID state of play across Europe.
|
||||||
* [Understanding the MiCA and Pilot Regime crypto regulation](https://medium.com/adaneu/relax-take-it-easy-understanding-the-mica-and-pilot-regime-crypto-regulation-db21e537ec58)
|
* [Understanding the MiCA and Pilot Regime crypto regulation](https://medium.com/adaneu/relax-take-it-easy-understanding-the-mica-and-pilot-regime-crypto-regulation-db21e537ec58)
|
||||||
> The European Commission’s proposal for the regulation of crypto-assets markets is based on two draft texts :
|
> The European Commission’s proposal for the regulation of crypto-assets markets is based on two draft texts :
|
||||||
@ -364,7 +361,7 @@ One of MyDex CIC’s founders, [Alan Mitchell shares a feeling of Vindication](h
|
|||||||
* [Data Exchange Board to Improve the EU Data Governance Act](https://mydata.org/2020/12/09/why-we-need-a-data-exchange-board-to-improve-the-eu-data-governance-act/)
|
* [Data Exchange Board to Improve the EU Data Governance Act](https://mydata.org/2020/12/09/why-we-need-a-data-exchange-board-to-improve-the-eu-data-governance-act/)
|
||||||
|
|
||||||
|
|
||||||
* [How Can Europe Lead Innovation And Win Web3? Ledger’s 4 Recommendations For EU Policymakers](https://acrobat.adobe.com/link/review?uri%3Durn:aaid:scds:US:fa00c64a-5f6d-38c6-baf7-0bcfa06e6a28%23pageNum%3D25)
|
* [How Can Europe Lead Innovation And Win Web3? Ledger’s 4 Recommendations For EU Policymakers](https://acrobat.adobe.com/link/review?uri=urn:aaid:scds:US:fa00c64a-5f6d-38c6-baf7-0bcfa06e6a28#pageNum=25)
|
||||||
|
|
||||||
1. Invest in a public/private partnership to co-develop a self-sovereign identity solution for Europe.
|
1. Invest in a public/private partnership to co-develop a self-sovereign identity solution for Europe.
|
||||||
|
|
||||||
@ -389,7 +386,7 @@ Let’s examine how SSI meets each of the articles from #13 to #22.
|
|||||||
> The European Commission developed the [SSI (Self-Sovereign Identity) eIDAS bridge](https://joinup.ec.europa.eu/collection/ssi-eidas-bridge), an ISA2 funded initiative, to promote eIDAS as a trust framework for the SSI ecosystem. It assists a VC (Verifiable Credential) issuer in the signing process, and helps the verifier to automate the identification of the organization behind the issuer’s DID (Decentralized Identifier)
|
> The European Commission developed the [SSI (Self-Sovereign Identity) eIDAS bridge](https://joinup.ec.europa.eu/collection/ssi-eidas-bridge), an ISA2 funded initiative, to promote eIDAS as a trust framework for the SSI ecosystem. It assists a VC (Verifiable Credential) issuer in the signing process, and helps the verifier to automate the identification of the organization behind the issuer’s DID (Decentralized Identifier)
|
||||||
* [Validated ID's journey to becoming EBSI compliant](https://www.validatedid.com/post-en/validated-ids-journey-to-becoming-ebsi-compliant)
|
* [Validated ID's journey to becoming EBSI compliant](https://www.validatedid.com/post-en/validated-ids-journey-to-becoming-ebsi-compliant)
|
||||||
|
|
||||||
We at Validated ID have been betting on EBSI since the beginning. We started working to become conformant wallet providers since the very first version of [Wallet Conformance Tests (WCT)](https://ec.europa.eu/digital-building-blocks/wikis/display/EBSI/EBSI%2Bwallets) was published. The process of preparing our solution to become conformant has allowed us to appreciate how remarkable EBSI's work has been.
|
We at Validated ID have been betting on EBSI since the beginning. We started working to become conformant wallet providers since the very first version of [Wallet Conformance Tests (WCT)](https://ec.europa.eu/digital-building-blocks/wikis/display/EBSI/EBSI+wallets) was published. The process of preparing our solution to become conformant has allowed us to appreciate how remarkable EBSI's work has been.
|
||||||
|
|
||||||
|
|
||||||
* [The time for the eIDAS Bridge](http://validatedid.com/post-en/the-time-for-the-eidas-bridge) ValidatedID
|
* [The time for the eIDAS Bridge](http://validatedid.com/post-en/the-time-for-the-eidas-bridge) ValidatedID
|
||||||
@ -434,7 +431,7 @@ Opportunity 4: Secure messaging.
|
|||||||
* [Emerging approaches for data-driven innovation in Europe](https://publications.jrc.ec.europa.eu/repository/handle/JRC127730) JRC Publications
|
* [Emerging approaches for data-driven innovation in Europe](https://publications.jrc.ec.europa.eu/repository/handle/JRC127730) JRC Publications
|
||||||
> Europe’s digital transformation of the economy and society is framed by the European strategy for data through the establishment of a common European data space based on domain-specific data spaces in strategic sectors such as environment, agriculture, industry, health and transportation.
|
> Europe’s digital transformation of the economy and society is framed by the European strategy for data through the establishment of a common European data space based on domain-specific data spaces in strategic sectors such as environment, agriculture, industry, health and transportation.
|
||||||
|
|
||||||
* [Joining forces towards European digital credentials](https://onedrive.live.com/?authkey%3D%2521ADoEGcIwiKDydcg%26cid%3DF7FF746DED29F767%26id%3DF7FF746DED29F767%252183805%26parId%3DF7FF746DED29F767%252183804%26o%3DOneUp) European Commission
|
* [Joining forces towards European digital credentials](https://onedrive.live.com/?authkey=%21ADoEGcIwiKDydcg&cid=F7FF746DED29F767&id=F7FF746DED29F767%2183805&parId=F7FF746DED29F767%2183804&o=OneUp) European Commission
|
||||||
|
|
||||||
### IDNOW
|
### IDNOW
|
||||||
|
|
||||||
@ -445,7 +442,7 @@ The goal of IATA One ID is to set industry standards that further streamline the
|
|||||||
> Last week, the EU Commission published a draft for the so-called digital identity wallet “EUid”. According to it, within 12 months of the law coming into force, every EU state must provide its citizens with a digital wallet.
|
> Last week, the EU Commission published a draft for the so-called digital identity wallet “EUid”. According to it, within 12 months of the law coming into force, every EU state must provide its citizens with a digital wallet.
|
||||||
* [How the Digital Markets Act (DMA) will shape the future of digital identity in Europe](https://www.idnow.io/blog/digital-markets-act-dma-future-digital-identity/) IDNow
|
* [How the Digital Markets Act (DMA) will shape the future of digital identity in Europe](https://www.idnow.io/blog/digital-markets-act-dma-future-digital-identity/) IDNow
|
||||||
|
|
||||||
On March 24th, 2022, [the European Parliament and Council reached an agreement on the final version of the Digital Markets Act (DMA)](https://eur-lex.europa.eu/legal-content/de/TXT/?qid%3D1608116887159%26uri%3DCOM%253A2020%253A842%253AFIN). According to the European Commission, the DMA regulation is expected to be reviewed and enacted by October 2022.
|
On March 24th, 2022, [the European Parliament and Council reached an agreement on the final version of the Digital Markets Act (DMA)](https://eur-lex.europa.eu/legal-content/de/TXT/?qid=1608116887159&uri=COM%3A2020%3A842%3AFIN). According to the European Commission, the DMA regulation is expected to be reviewed and enacted by October 2022.
|
||||||
* [the-time-for-the-eidas-bridge](http://validatedid.com/post-en/the-time-for-the-eidas-bridge) ValidatedID
|
* [the-time-for-the-eidas-bridge](http://validatedid.com/post-en/the-time-for-the-eidas-bridge) ValidatedID
|
||||||
> There’s an outstanding question, for us, around how this community explores and thinks about the theoretical underpinnings of a Community of Practice (CoP), but one thing is for sure, Keep Badges Weird is a CoP.
|
> There’s an outstanding question, for us, around how this community explores and thinks about the theoretical underpinnings of a Community of Practice (CoP), but one thing is for sure, Keep Badges Weird is a CoP.
|
||||||
|
|
||||||
@ -477,7 +474,7 @@ The Government of Catalonia has presented IdentiCAT, the new decentralized and s
|
|||||||
|
|
||||||
IEEE SA co-organized a discussion panel at the Pan-European dialogue on Internet Governance (EuroDIG) conference, an event known for its frank and interactive discussions of public policy issues surrounding internet governance. Messages coming out of the discussions will be presented at the Internet Governance Forum (IGF) later this year.
|
IEEE SA co-organized a discussion panel at the Pan-European dialogue on Internet Governance (EuroDIG) conference, an event known for its frank and interactive discussions of public policy issues surrounding internet governance. Messages coming out of the discussions will be presented at the Internet Governance Forum (IGF) later this year.
|
||||||
|
|
||||||
* [Where do we stand on Self-Sovereign Identity?](https://www.youtube.com/watch?v%3DL156YjEyOdo) EBSI
|
* [Where do we stand on Self-Sovereign Identity?](https://www.youtube.com/watch?v=L156YjEyOdo) EBSI
|
||||||
|
|
||||||
On December 14th, Joao Rodrigues, Head of sector (Digital) Building Blocks at @European Commission participated in an [#ebcTALKS](https://www.youtube.com/hashtag/ebctalks) of the European Blockchain Convention about "Where do we stand on Self-Sovereign Identity"?
|
On December 14th, Joao Rodrigues, Head of sector (Digital) Building Blocks at @European Commission participated in an [#ebcTALKS](https://www.youtube.com/hashtag/ebctalks) of the European Blockchain Convention about "Where do we stand on Self-Sovereign Identity"?
|
||||||
|
|
||||||
@ -508,11 +505,11 @@ Kaliya is working on a commentary about it
|
|||||||
|
|
||||||
Vedran L. Head of Office at European Parliament [has released a draft report with tracking of amendments](https://www.europarl.europa.eu/doceo/document/ITRE-PR-732707_EN.pdf) on the proposal for a regulation of the European Parliament and of the Council amending Regulation (EU) No 910/2014 as regards establishing a framework for a European Digital Identity
|
Vedran L. Head of Office at European Parliament [has released a draft report with tracking of amendments](https://www.europarl.europa.eu/doceo/document/ITRE-PR-732707_EN.pdf) on the proposal for a regulation of the European Parliament and of the Council amending Regulation (EU) No 910/2014 as regards establishing a framework for a European Digital Identity
|
||||||
|
|
||||||
* [European Commission adopts decision to license European Blockchain Services Infrastructure software as open-source](https://ec.europa.eu/digital-building-blocks/wikis/display/EBSI/European%2BCommission%2Badopts%2Bdecision%2Bto%2Blicense%2BEuropean%2BBlockchain%2BServices%2BInfrastructure%2Bsoftware%2Bas%2Bopen%2Bsource)
|
* [European Commission adopts decision to license European Blockchain Services Infrastructure software as open-source](https://ec.europa.eu/digital-building-blocks/wikis/display/EBSI/European+Commission+adopts+decision+to+license+European+Blockchain+Services+Infrastructure+software+as+open+source)
|
||||||
|
|
||||||
The Decision to make EBSI software available for licencing under the [European Union Public Licence](https://secure-web.cisco.com/1HQ5AQijOEcsuKHH5VY-lAjONv1Pa-wUY7mpfsymIkIy1G_g9CZh6vK5g0lpjxgIm0oaik042EN-5tL8xLpeesMtxZ0ENcH239uYTSSmPTbu1YtBJ5xHMWZMksOeS6X71soiQSQpoQF8fyzOr1I4atICut-sSt9Wqyou4vpS5myXfHf3S6AMMuyvAxla1etuiJbNKx4gfAlzozwPMe7yC7GNXIsZeCiNuAYA5io7f3CIwdvldsHFBtuGNYI4Z86EMXdfyQXEsR7zidw-7WNQeJpBVDCUVFJymXSb-SXsqJH8jfAf6-U9vC1ilrqATHFaZXXLWlOCOCmlS3nS9kev41tys8SvSKYuGX1FLyFgPgufe__oJ7pmihT7ABqB4AzLy7VMeHBSQfOgbkj11ZEltw4e-kd3XI7KmlREgqfYQ45T7r_VGJo3uCTUG1FlIcAkq8MON0W9AZCAMQyT5UAReSZ7LslcOaF38g6bgAGO0N_C39g6T63pWI-caAZ2h-1_m/https%253A%252F%252Fec.europa.eu%252Finfo%252Feuropean-union-public-licence_en) is an example of how the European Commission is not only using, but also contributing to the open-source community and thereby growing the ecosystem around EBSI.
|
The Decision to make EBSI software available for licencing under the [European Union Public Licence](https://secure-web.cisco.com/1HQ5AQijOEcsuKHH5VY-lAjONv1Pa-wUY7mpfsymIkIy1G_g9CZh6vK5g0lpjxgIm0oaik042EN-5tL8xLpeesMtxZ0ENcH239uYTSSmPTbu1YtBJ5xHMWZMksOeS6X71soiQSQpoQF8fyzOr1I4atICut-sSt9Wqyou4vpS5myXfHf3S6AMMuyvAxla1etuiJbNKx4gfAlzozwPMe7yC7GNXIsZeCiNuAYA5io7f3CIwdvldsHFBtuGNYI4Z86EMXdfyQXEsR7zidw-7WNQeJpBVDCUVFJymXSb-SXsqJH8jfAf6-U9vC1ilrqATHFaZXXLWlOCOCmlS3nS9kev41tys8SvSKYuGX1FLyFgPgufe__oJ7pmihT7ABqB4AzLy7VMeHBSQfOgbkj11ZEltw4e-kd3XI7KmlREgqfYQ45T7r_VGJo3uCTUG1FlIcAkq8MON0W9AZCAMQyT5UAReSZ7LslcOaF38g6bgAGO0N_C39g6T63pWI-caAZ2h-1_m/https%3A//ec.europa.eu/info/european-union-public-licence_en) is an example of how the European Commission is not only using, but also contributing to the open-source community and thereby growing the ecosystem around EBSI.
|
||||||
|
|
||||||
* [EIDAS 2.0 Turns To Self-Sovereign Identification To Bring Users Ownership And Control](https://www.forbes.com/sites/alastairjohnson/2022/07/05/eidas-20-turns-to-self-sovereign-identification-to-bring-users-ownership-and-control/?sh%3D853aa7f7f07e) Forbes
|
* [EIDAS 2.0 Turns To Self-Sovereign Identification To Bring Users Ownership And Control](https://www.forbes.com/sites/alastairjohnson/2022/07/05/eidas-20-turns-to-self-sovereign-identification-to-bring-users-ownership-and-control/?sh=853aa7f7f07e) Forbes
|
||||||
|
|
||||||
* [Meet the eSSIF-Lab ecosystem: “Completing the Framework” Programme participants](https://essif-lab.eu/meet-the-essif-lab-ecosystem-meet-the-essif-lab-ecosystem-completing-the-framework-programme-participants-amme-participants-2/)
|
* [Meet the eSSIF-Lab ecosystem: “Completing the Framework” Programme participants](https://essif-lab.eu/meet-the-essif-lab-ecosystem-meet-the-essif-lab-ecosystem-completing-the-framework-programme-participants-amme-participants-2/)
|
||||||
> * [PCDS-DP](https://compell.io/) - Product Circularity Data Sheets Digital Passport
|
> * [PCDS-DP](https://compell.io/) - Product Circularity Data Sheets Digital Passport
|
||||||
@ -528,7 +525,7 @@ As the details and technical architecture of the EU Digital Identity Wallet at t
|
|||||||
The SSI principles of existence, access, interoperability, consent, minimalization, and protection will likely be fulfilled by the EU Digital Identity Wallet. It will allow citizens to have an independent existence.
|
The SSI principles of existence, access, interoperability, consent, minimalization, and protection will likely be fulfilled by the EU Digital Identity Wallet. It will allow citizens to have an independent existence.
|
||||||
|
|
||||||
|
|
||||||
* [What is EBSI? EBSI making information easy to verify and almost impossible to fake](https://ec.europa.eu/digital-building-blocks/wikis/display/EBSI/What%2Bis%2Bebsi/)
|
* [What is EBSI? EBSI making information easy to verify and almost impossible to fake](https://ec.europa.eu/digital-building-blocks/wikis/display/EBSI/What+is+ebsi/)
|
||||||
|
|
||||||
Below you will find a series of publications that will walk you through the technologies that make it possible for Public Administrations and Businesses to easily verify and trust information received directly from Citizens (or Businesses).
|
Below you will find a series of publications that will walk you through the technologies that make it possible for Public Administrations and Businesses to easily verify and trust information received directly from Citizens (or Businesses).
|
||||||
|
|
||||||
@ -538,9 +535,9 @@ TR Ministry of Foreign Affairs Directorate for EU Affairs organized an EU Progra
|
|||||||
|
|
||||||
You can click to watch all the presentations from the event:
|
You can click to watch all the presentations from the event:
|
||||||
|
|
||||||
11 May 2022: [https://www.youtube.com/watch?v=GKlgfRSCeXI](https://www.youtube.com/watch?v%3DGKlgfRSCeXI)
|
11 May 2022: [https://www.youtube.com/watch?v=GKlgfRSCeXI](https://www.youtube.com/watch?v=GKlgfRSCeXI)
|
||||||
|
|
||||||
12 May 2022: [https://www.youtube.com/watch?v=DQIgwVJvFuE&t=28020s](https://www.youtube.com/watch?v%3DDQIgwVJvFuE%26t%3D28020s)
|
12 May 2022: [https://www.youtube.com/watch?v=DQIgwVJvFuE&t=28020s](https://www.youtube.com/watch?v=DQIgwVJvFuE&t=28020s)
|
||||||
* [Germany and Spain and join forces on the development of a cross-border, decentralised digital identity ecosystem](https://www.bundesregierung.de/breg-de/aktuelles/germany-and-spain-and-join-forces-on-the-development-of-a-cross-border-decentralised-digital-identity-ecosystem-1947302)
|
* [Germany and Spain and join forces on the development of a cross-border, decentralised digital identity ecosystem](https://www.bundesregierung.de/breg-de/aktuelles/germany-and-spain-and-join-forces-on-the-development-of-a-cross-border-decentralised-digital-identity-ecosystem-1947302)
|
||||||
|
|
||||||
The cooperation agreement envisages the design and conceptualisation of a cross-border pilot to be implemented in the near future, with a view to contributing to the development of the European Union’s Digital Identity Framework, recently announced as part of the eIDAS Commission proposal.
|
The cooperation agreement envisages the design and conceptualisation of a cross-border pilot to be implemented in the near future, with a view to contributing to the development of the European Union’s Digital Identity Framework, recently announced as part of the eIDAS Commission proposal.
|
||||||
@ -554,7 +551,7 @@ Jolocom is currently working on the project “ONCE – Online einfach anmelden
|
|||||||
|
|
||||||
The project is part of the competitive innovation programme “Showcase Secure Digital Identities” (SSDI) funded by Germany’s Federal Ministry for Economic Affairs and Energy (BMWi) and one of four projects that qualified for the implementation phase.
|
The project is part of the competitive innovation programme “Showcase Secure Digital Identities” (SSDI) funded by Germany’s Federal Ministry for Economic Affairs and Energy (BMWi) and one of four projects that qualified for the implementation phase.
|
||||||
|
|
||||||
* [Early Adopters Programme | Imagining what EBSI can do for European citizens](https://ec.europa.eu/cefdigital/wiki/display/CEFDIGITAL/Early%2520Adopters%2520Programme%23become-ebsi-compliant)
|
* [Early Adopters Programme | Imagining what EBSI can do for European citizens](https://ec.europa.eu/cefdigital/wiki/display/CEFDIGITAL/Early%20Adopters%20Programme#become-ebsi-compliant)
|
||||||
|
|
||||||
In 2021, 22 projects were selected to become part of our incubator programme to help tap into the potential of the EBSI infrastructure. Each project's private and public sector partners was given early access to the pre-production environment of EBSI, and was invited to develop their own pilot project to address a specific business or government use case involving the exchange of verifiable credentials.
|
In 2021, 22 projects were selected to become part of our incubator programme to help tap into the potential of the EBSI infrastructure. Each project's private and public sector partners was given early access to the pre-production environment of EBSI, and was invited to develop their own pilot project to address a specific business or government use case involving the exchange of verifiable credentials.
|
||||||
|
|
||||||
@ -564,7 +561,7 @@ With the help with the EBSI team, Early Adopters can identify how to connect the
|
|||||||
On September 15, 2021, I moderated a panel with representatives from the United States Government, the Canadian Government, and the European Commission. Below is an edited excerpt from the panel
|
On September 15, 2021, I moderated a panel with representatives from the United States Government, the Canadian Government, and the European Commission. Below is an edited excerpt from the panel
|
||||||
|
|
||||||
|
|
||||||
* [Early Adopters Programme | Imagining what EBSI can do for European citizens](https://ec.europa.eu/cefdigital/wiki/display/CEFDIGITAL/Early%2520Adopters%2520Programme%23become-ebsi-compliant)
|
* [Early Adopters Programme | Imagining what EBSI can do for European citizens](https://ec.europa.eu/cefdigital/wiki/display/CEFDIGITAL/Early%20Adopters%20Programme#become-ebsi-compliant)
|
||||||
|
|
||||||
An incubator to help Early Adopters and their partners imagine, build and launch their EBSI pilot project(s)
|
An incubator to help Early Adopters and their partners imagine, build and launch their EBSI pilot project(s)
|
||||||
* [Declaration for Cooperation and Exchange of Best Practices in the Field of Self-Sovereign Identity Between the Federal Republic of Germany and the Republic of Finland](https://www.theinternetofthings.eu/declaration-cooperation-and-exchange-best-practices-field-self-sovereign-identity-between-federal) theinternetofthings.eu
|
* [Declaration for Cooperation and Exchange of Best Practices in the Field of Self-Sovereign Identity Between the Federal Republic of Germany and the Republic of Finland](https://www.theinternetofthings.eu/declaration-cooperation-and-exchange-best-practices-field-self-sovereign-identity-between-federal) theinternetofthings.eu
|
||||||
@ -592,7 +589,7 @@ When it comes to identity management the involvement of the government can be a
|
|||||||
* [Digital identities: German-Finnish cooperation agreed](https://www.bundesregierung.de/breg-de/suche/digitale-identitaeten-deutsch-finnische-zusammenarbeit-vereinbart-1962298) Bundesregierung
|
* [Digital identities: German-Finnish cooperation agreed](https://www.bundesregierung.de/breg-de/suche/digitale-identitaeten-deutsch-finnische-zusammenarbeit-vereinbart-1962298) Bundesregierung
|
||||||
|
|
||||||
The content of the joint declaration is close bilateral cooperation in the development of a cross-border ecosystem of digital identities based on the principles of Self-Sovereign Identity (SSI).
|
The content of the joint declaration is close bilateral cooperation in the development of a cross-border ecosystem of digital identities based on the principles of Self-Sovereign Identity (SSI).
|
||||||
* [Control over data still a long way off according to research into Self-Sovereign Identity](https://ibestuur-nl.translate.goog/podium/controle-over-data-nog-ver-weg-volgens-onderzoek-naar-self-sovereign-identity?_x_tr_sl%3Dauto%26_x_tr_tl%3Den%26_x_tr_hl%3Dnl%26_x_tr_pto%3Dnui) iBestuur
|
* [Control over data still a long way off according to research into Self-Sovereign Identity](https://ibestuur-nl.translate.goog/podium/controle-over-data-nog-ver-weg-volgens-onderzoek-naar-self-sovereign-identity?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=nl&_x_tr_pto=nui) iBestuur
|
||||||
|
|
||||||
In their final recommendations, the researchers from INNOPAY and TNO argue that in view of the social value of digital data exchange, the government would do well to play a driving role in the further consolidation of the SSI playing field. That starts with creating clarity about the relationship between the Digital Government Act and the EU Digital Identity Wallet.
|
In their final recommendations, the researchers from INNOPAY and TNO argue that in view of the social value of digital data exchange, the government would do well to play a driving role in the further consolidation of the SSI playing field. That starts with creating clarity about the relationship between the Digital Government Act and the EU Digital Identity Wallet.
|
||||||
|
|
||||||
|
@ -5,13 +5,13 @@
|
|||||||
|
|
||||||
* [Potential Impacts of Draft India Personal Data Protection Bill (PDPB)](https://www2.deloitte.com/in/en/pages/risk/articles/privacy-data.html) (Deloitte)
|
* [Potential Impacts of Draft India Personal Data Protection Bill (PDPB)](https://www2.deloitte.com/in/en/pages/risk/articles/privacy-data.html) (Deloitte)
|
||||||
- [Practising data stewardship in India, early questions](https://www.adalovelaceinstitute.org/blog/practising-data-stewardship-in-india/) - could data stewardship help to rebalance power towards individuals and communities? ALI
|
- [Practising data stewardship in India, early questions](https://www.adalovelaceinstitute.org/blog/practising-data-stewardship-in-india/) - could data stewardship help to rebalance power towards individuals and communities? ALI
|
||||||
* [Pramod Varma's message as India touches the 1 BN COVID Vaccination Certificates Milestone](https://www.youtube.com/watch?v%3DPFo7YlxUaJk) eGovernments Foundation
|
* [Pramod Varma's message as India touches the 1 BN COVID Vaccination Certificates Milestone](https://www.youtube.com/watch?v=PFo7YlxUaJk) eGovernments Foundation
|
||||||
|
|
||||||
On the occasion of the [#100CroreVaccinationCertificates](https://twitter.com/hashtag/100CroreVaccinationCertificates) milestone, [@pramodkvarma](https://twitter.com/pramodkvarma) CTO, [@eksteporg](https://twitter.com/eksteporg) shares the journey of #DigitalPublicGood - DIVOC (Digital Infrastructure for Vaccination Open Credentialing) for vaccination credentialing
|
On the occasion of the [#100CroreVaccinationCertificates](https://twitter.com/hashtag/100CroreVaccinationCertificates) milestone, [@pramodkvarma](https://twitter.com/pramodkvarma) CTO, [@eksteporg](https://twitter.com/eksteporg) shares the journey of #DigitalPublicGood - DIVOC (Digital Infrastructure for Vaccination Open Credentialing) for vaccination credentialing
|
||||||
|
|
||||||
* [Identity in the 21st Century India: Where are we?](https://www.crubn.com/_files/ugd/3e90e2_82e2de11e1194f1c93ed68c411d78564.pdf?index%3Dtrue) Crubn
|
* [Identity in the 21st Century India: Where are we?](https://www.crubn.com/_files/ugd/3e90e2_82e2de11e1194f1c93ed68c411d78564.pdf?index=true) Crubn
|
||||||
|
|
||||||
This whitepaper is an attempt to understand identity from a governance perspective and the various methods of identification used. In particular, it'll analyse India's digital identity infrastructure – its motivations, the benefits it has yielded, and the dangers that might adversely impact it.
|
This whitepaper is an attempt to understand identity from a governance perspective and the various methods of identification used. In particular, it'll analyse India's digital identity infrastructure – its motivations, the benefits it has yielded, and the dangers that might adversely impact it.
|
||||||
* [India-stack and self-sovereign identity | EUBS 2022](https://www.youtube.com/watch?v%3Dof-iuDZpWuA)
|
* [India-stack and self-sovereign identity | EUBS 2022](https://www.youtube.com/watch?v=of-iuDZpWuA)
|
||||||
|
|
||||||
a panel discussion with Akhilesh Srivastava (IT Advisor at Government of Uttarakhand), Mallikarjun Karra (Director of Research And Partnerships at Timechain Labs), Prof. Sandeep Shukla (Computer Science & Engineering at Indian Institute of Technology Kanpur), Swapnil Pawar (Founder of Newrl) and Ishan Roy (Head of Blockchain at Tamil Nadu E-Governance Agency)
|
a panel discussion with Akhilesh Srivastava (IT Advisor at Government of Uttarakhand), Mallikarjun Karra (Director of Research And Partnerships at Timechain Labs), Prof. Sandeep Shukla (Computer Science & Engineering at Indian Institute of Technology Kanpur), Swapnil Pawar (Founder of Newrl) and Ishan Roy (Head of Blockchain at Tamil Nadu E-Governance Agency)
|
||||||
|
@ -3,7 +3,7 @@
|
|||||||
* [DINZ held the first Aotearoa Digital Identity Hui Taumata](https://digitalidentity.nz/2020/12/07/aotearoa-digital-identity-hui-taumata-2/)
|
* [DINZ held the first Aotearoa Digital Identity Hui Taumata](https://digitalidentity.nz/2020/12/07/aotearoa-digital-identity-hui-taumata-2/)
|
||||||
> Bianca Lopes and David Birch shared with us their International perspectives and insights, including a whirlwind Identity world tour hosted by Bianca and her team at Talle.
|
> Bianca Lopes and David Birch shared with us their International perspectives and insights, including a whirlwind Identity world tour hosted by Bianca and her team at Talle.
|
||||||
* [The Trust Economy in a Future New Zealand](https://digitalidentity.nz/2021/06/16/the-trust-economy-in-a-future-new-zealand/)
|
* [The Trust Economy in a Future New Zealand](https://digitalidentity.nz/2021/06/16/the-trust-economy-in-a-future-new-zealand/)
|
||||||
> My interest was first piqued when I came across three videos on YouTube from [Rachel Botsman](https://www.youtube.com/watch?v%3D-vbPXbm8eTw), [Jordan Perterson](https://www.youtube.com/watch?v%3DpFXdsD-8SKk) and [Philipp Kristian Diekhöner.](https://www.youtube.com/watch?v%3DXNog-xrc_YA)
|
> My interest was first piqued when I came across three videos on YouTube from [Rachel Botsman](https://www.youtube.com/watch?v=-vbPXbm8eTw), [Jordan Perterson](https://www.youtube.com/watch?v=pFXdsD-8SKk) and [Philipp Kristian Diekhöner.](https://www.youtube.com/watch?v=XNog-xrc_YA)
|
||||||
>
|
>
|
||||||
> Trust has always been at the centre of society overall and commerce in particular. There’s a reason why during the first industrial revolution banks always built the most impressive, secure looking buildings in town – so you trusted them to deposit you money there!
|
> Trust has always been at the centre of society overall and commerce in particular. There’s a reason why during the first industrial revolution banks always built the most impressive, secure looking buildings in town – so you trusted them to deposit you money there!
|
||||||
* [Towards a Better Digital Identity Trust Framework in Aotearoa](https://digitalidentity.nz/2022/09/21/towards-a-better-digital-identity-trust-framework-in-aotearoa/) Digital Identity NZ
|
* [Towards a Better Digital Identity Trust Framework in Aotearoa](https://digitalidentity.nz/2022/09/21/towards-a-better-digital-identity-trust-framework-in-aotearoa/) Digital Identity NZ
|
||||||
|
@ -3,10 +3,21 @@ published: false
|
|||||||
---
|
---
|
||||||
# Policy
|
# Policy
|
||||||
|
|
||||||
|
* [The New Draft Law on eID Switzerland](https://www.procivis.ch/post/the-new-draft-law-on-eid-switzerland-en)
|
||||||
|
Yesterday's [media conference](https://www.youtube.com/watch?v=epW4xEqr3mw) and published [media release](https://www.bj.admin.ch/bj/de/home/aktuell/mm.msg-id-89515.html) opened the consultation process for the new E-ID law, which will last until October 20, 2022.
|
||||||
|
|
||||||
|
The preliminary [draft of the federal law](https://www.bj.admin.ch/dam/bj/de/data/staat/gesetzgebung/staatliche-e-id/vorentw.pdf) declared the purpose of the E-ID to be to ensure "secure identification by means of E-ID among private individuals and with authorities". The protection of the personality and fundamental rights of individuals is to be provided by the following principles defined in the law:
|
||||||
|
|
||||||
|
- Data protection through technology
|
||||||
|
- Data security
|
||||||
|
- Data economy
|
||||||
|
- Decentralized data storage
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
* [Common Digital Identification Project Anonymous authentication system using Absolute Identifier & Decentralized OTP](https://www.sec.gov/comments/s7-07-22/s70722-20117318-268533.pdf)
|
* [Common Digital Identification Project Anonymous authentication system using Absolute Identifier & Decentralized OTP](https://www.sec.gov/comments/s7-07-22/s70722-20117318-268533.pdf)
|
||||||
|
|
||||||
* [IPR - what is it? why does it matter?](https://identitywoman.net/ipr%25e2%2580%258a-%25e2%2580%258awhat-is-it-why-does-it-matter/)
|
* [IPR - what is it? why does it matter?](https://identitywoman.net/ipr%e2%80%8a-%e2%80%8awhat-is-it-why-does-it-matter/)
|
||||||
> There is a lot of diversity in the category of future patent problems. Someone who was contributing without declaring that they hold a patent related to the work can claim they had a patent later (years after the specification is finished) and seek payment from everyone using/implementing the standard, claiming licensing rights or even lost revenue on ideas they legally own.
|
> There is a lot of diversity in the category of future patent problems. Someone who was contributing without declaring that they hold a patent related to the work can claim they had a patent later (years after the specification is finished) and seek payment from everyone using/implementing the standard, claiming licensing rights or even lost revenue on ideas they legally own.
|
||||||
* [Self-sovereign identity in the context of data protection and privacy](https://yourstory.com/2020/11/self-sovereign-identity-context-data-protection-privacy/amp) YourStory
|
* [Self-sovereign identity in the context of data protection and privacy](https://yourstory.com/2020/11/self-sovereign-identity-context-data-protection-privacy/amp) YourStory
|
||||||
|
|
||||||
@ -55,7 +66,7 @@ Bedoya’s research has shined a light on digital surveillance and its impact on
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
* [2022 GDF Report CRYPTOASSETS AND SANCTIONS COMPLIANCE A PRIMER](https://www.gdf.io/wp-content/uploads/2022/07/Cryptoassets-and-Sanctions-Compliance-Report-Final-1.pdf?mc_cid%3D5d688e0647%26mc_eid%3Dbebf526fc7) GDF
|
* [2022 GDF Report CRYPTOASSETS AND SANCTIONS COMPLIANCE A PRIMER](https://www.gdf.io/wp-content/uploads/2022/07/Cryptoassets-and-Sanctions-Compliance-Report-Final-1.pdf?mc_cid=5d688e0647&mc_eid=bebf526fc7) GDF
|
||||||
|
|
||||||
There is a common misconception that cryptoassets provide a ready-made avenue for sanctions evasion because they sit outside the regulatory and legal perimeter. In fact, sanctions authorities in many jurisdictions have ensured that relevant legal and regulatory requirements apply comprehensively to activity conducted in cryptoassets.
|
There is a common misconception that cryptoassets provide a ready-made avenue for sanctions evasion because they sit outside the regulatory and legal perimeter. In fact, sanctions authorities in many jurisdictions have ensured that relevant legal and regulatory requirements apply comprehensively to activity conducted in cryptoassets.
|
||||||
|
|
||||||
|
@ -31,7 +31,7 @@ The aim of this public-private cooperation is to strengthen Finland’s leading
|
|||||||
|
|
||||||
## German
|
## German
|
||||||
|
|
||||||
* [Reinventing Government with Technology - Sebastian Manhart](https://www.youtube.com/watch?v%3D1fTJA0r_XFg) KuppingerCole
|
* [Reinventing Government with Technology - Sebastian Manhart](https://www.youtube.com/watch?v=1fTJA0r_XFg) KuppingerCole
|
||||||
|
|
||||||
Raj Hegde is joined by Sebastian Manhart - Technical Advisor on Digital Identity for the German Chancellery to explore governmental reform and understand stakeholder expectations behind the rollout of digital identity projects in the post-COVID era.
|
Raj Hegde is joined by Sebastian Manhart - Technical Advisor on Digital Identity for the German Chancellery to explore governmental reform and understand stakeholder expectations behind the rollout of digital identity projects in the post-COVID era.
|
||||||
|
|
||||||
@ -42,7 +42,7 @@ The BSI expresses the problem as follows: “The authentication of the user requ
|
|||||||
## Spanish
|
## Spanish
|
||||||
* [Verifiable Credentials for Digital Identity Projects](https://knowledge.wealize.digital/en/blog/verifiable-credentials-for-digital-identity-projects)
|
* [Verifiable Credentials for Digital Identity Projects](https://knowledge.wealize.digital/en/blog/verifiable-credentials-for-digital-identity-projects)
|
||||||
|
|
||||||
The Spanish Association for Standardization (UNE) has recently published the [UNE 71307-1](https://www.une.org/encuentra-tu-norma/busca-tu-norma/norma?c%3DN0064986) Digital Enabling Technologies Standard. This is the first global standard on decentralized identity management, based on Blockchain and Distributed Ledger Technologies (DLT).
|
The Spanish Association for Standardization (UNE) has recently published the [UNE 71307-1](https://www.une.org/encuentra-tu-norma/busca-tu-norma/norma?c=N0064986) Digital Enabling Technologies Standard. This is the first global standard on decentralized identity management, based on Blockchain and Distributed Ledger Technologies (DLT).
|
||||||
|
|
||||||
## Yidindji \ Australia
|
## Yidindji \ Australia
|
||||||
* [MetaMUI and Sovereign Yidindji Government launched 1st self-sovereign identity-based National ID system](https://cointelegraph.com/press-releases/metamui-and-sovereign-yidindji-government-launched-1st-self-sovereign-identity-based-national-id-system) Cointelegraph
|
* [MetaMUI and Sovereign Yidindji Government launched 1st self-sovereign identity-based National ID system](https://cointelegraph.com/press-releases/metamui-and-sovereign-yidindji-government-launched-1st-self-sovereign-identity-based-national-id-system) Cointelegraph
|
||||||
@ -55,7 +55,7 @@ We are delighted to announce that our first E-Government pilot program with the
|
|||||||
## Jolocom
|
## Jolocom
|
||||||
|
|
||||||
* [ID-Ideal as an integrated solution](https://jolocom.io/blog/id-ideal-as-an-integrated-solution/) Jolocom
|
* [ID-Ideal as an integrated solution](https://jolocom.io/blog/id-ideal-as-an-integrated-solution/) Jolocom
|
||||||
The idea behind [ID-Ideal](https://1-id--ideal-de.translate.goog/?_x_tr_enc%3D1%26_x_tr_sl%3Dauto%26_x_tr_tl%3Den%26_x_tr_hl%3Den-US%26_x_tr_pto%3Dwapp) is to create a basis for existing and future identity services. To achieve this, interoperability between the individual ecosystems is necessary. For this reason, the project mainly focuses on key aspects:
|
The idea behind [ID-Ideal](https://1-id--ideal-de.translate.goog/?_x_tr_enc=1&_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp) is to create a basis for existing and future identity services. To achieve this, interoperability between the individual ecosystems is necessary. For this reason, the project mainly focuses on key aspects:
|
||||||
>
|
>
|
||||||
> A) Trust Framework: harmonize various ID services and create standards for secure digital identities
|
> A) Trust Framework: harmonize various ID services and create standards for secure digital identities
|
||||||
>
|
>
|
||||||
@ -93,7 +93,7 @@ China passed its Personal Information Protection Law (PIPL) on 20 August 2021.
|
|||||||
* [Three Key Takeaways from the FATF’s Latest 12-Month Review on Virtual assets](https://www.elliptic.co/blog/3-key-takeaways-from-the-fatfs-latest-12-month-review-on-virtual-assets) Elliptic
|
* [Three Key Takeaways from the FATF’s Latest 12-Month Review on Virtual assets](https://www.elliptic.co/blog/3-key-takeaways-from-the-fatfs-latest-12-month-review-on-virtual-assets) Elliptic
|
||||||
> Financial Action Task Force (FATF), the global standard-setter for anti-money laundering and countering the financing of terrorism (AML/CFT), released its second 12-month review on virtual assets (You can read our summary of its first report from July 2020 report here).
|
> Financial Action Task Force (FATF), the global standard-setter for anti-money laundering and countering the financing of terrorism (AML/CFT), released its second 12-month review on virtual assets (You can read our summary of its first report from July 2020 report here).
|
||||||
* [What Are the Six Key Areas of the FATF Consultation?](https://www.elliptic.co/blog/six-key-areas-of-the-fatf-consultation) Elliptic
|
* [What Are the Six Key Areas of the FATF Consultation?](https://www.elliptic.co/blog/six-key-areas-of-the-fatf-consultation) Elliptic
|
||||||
> On March 19th, Paris-based Financial Action Task Force (FATF), the global standard-setting body for anti-money laundering and counter-terrorism finance (AML/CFT), released its [Draft Updated Guidance for a Risk-Based Approach to Virtual Assets and Virtual Asset Service Providers](https://www.fatf-gafi.org/media/fatf/documents/recommendations/March%25202021%2520-%2520VA%2520Guidance%2520update%2520-%2520Sixth%2520draft%2520-%2520Public%2520consultation.pdf). Or, in compliance acronym speak the FATF's draft guidance for its RBA to VAs and VASPs.
|
> On March 19th, Paris-based Financial Action Task Force (FATF), the global standard-setting body for anti-money laundering and counter-terrorism finance (AML/CFT), released its [Draft Updated Guidance for a Risk-Based Approach to Virtual Assets and Virtual Asset Service Providers](https://www.fatf-gafi.org/media/fatf/documents/recommendations/March%202021%20-%20VA%20Guidance%20update%20-%20Sixth%20draft%20-%20Public%20consultation.pdf). Or, in compliance acronym speak the FATF's draft guidance for its RBA to VAs and VASPs.
|
||||||
* [FATF and Global Crytpto Regulatory News](https://www.elliptic.co/blog/fatf-concludes-its-annual-plenary-session)
|
* [FATF and Global Crytpto Regulatory News](https://www.elliptic.co/blog/fatf-concludes-its-annual-plenary-session)
|
||||||
> The Financial Action Task Force (FATF) [held](https://www.fatf-gafi.org/publications/fatfgeneral/documents/outcomes-fatf-plenary-february-2021.html) its winter Plenary session on 22nd, 24th, and 25th February and welcomed over 205 delegates to its third virtual conference since the start of the pandemic.
|
> The Financial Action Task Force (FATF) [held](https://www.fatf-gafi.org/publications/fatfgeneral/documents/outcomes-fatf-plenary-february-2021.html) its winter Plenary session on 22nd, 24th, and 25th February and welcomed over 205 delegates to its third virtual conference since the start of the pandemic.
|
||||||
* [DeFi regulation must not kill the values behind decentralization](https://cointelegraph.com/news/defi-regulation-must-not-kill-the-values-behind-decentralization) Cointelegraph
|
* [DeFi regulation must not kill the values behind decentralization](https://cointelegraph.com/news/defi-regulation-must-not-kill-the-values-behind-decentralization) Cointelegraph
|
||||||
@ -124,7 +124,7 @@ MetaMUI SSID is the world’s first true Self-Sovereign Identity Application tha
|
|||||||
Many folks within the identity space see VC infrastructure as the future of identification. If much of our online identity is reputation based, then VCs represent a formal method for linking reputations and vouching for others to form a web of trust within which individuals are able to conduct identity transactions in a less centralized way.
|
Many folks within the identity space see VC infrastructure as the future of identification. If much of our online identity is reputation based, then VCs represent a formal method for linking reputations and vouching for others to form a web of trust within which individuals are able to conduct identity transactions in a less centralized way.
|
||||||
|
|
||||||
## Delloite
|
## Delloite
|
||||||
* [It’s time for governments to get serious about digital identities](https://www2.deloitte.com/global/en/pages/risk/articles/solving-the-public-sector-identity-crisis.html?id%3Dglobal:2sm:3tw:4dcom_share:5awa:6dcom:risk) by Deloitte
|
* [It’s time for governments to get serious about digital identities](https://www2.deloitte.com/global/en/pages/risk/articles/solving-the-public-sector-identity-crisis.html?id=global:2sm:3tw:4dcom_share:5awa:6dcom:risk) by Deloitte
|
||||||
|
|
||||||
While the tools may already exist to solve the government’s identity crisis, real progress will only be made if governments significantly evolve their legacy approaches to digital identity.
|
While the tools may already exist to solve the government’s identity crisis, real progress will only be made if governments significantly evolve their legacy approaches to digital identity.
|
||||||
|
|
||||||
|
@ -16,7 +16,7 @@
|
|||||||
> The transition to an ecosystem of digital credentials, initiated by the [federal government’s directional decision](https://www.admin.ch/gov/de/start/dokumentation/medienmitteilungen.msg-id-86465.html), is a generational project that requires input from – and collaboration between – government, the private sector, academia, and civil society. This document is intended to serve as an initial contribution to the ongoing meta-level debate about the development of the e-ID ecosystem in Switzerland
|
> The transition to an ecosystem of digital credentials, initiated by the [federal government’s directional decision](https://www.admin.ch/gov/de/start/dokumentation/medienmitteilungen.msg-id-86465.html), is a generational project that requires input from – and collaboration between – government, the private sector, academia, and civil society. This document is intended to serve as an initial contribution to the ongoing meta-level debate about the development of the e-ID ecosystem in Switzerland
|
||||||
* [The New Draft Law on eID Switzerland](https://www.procivis.ch/post/the-new-draft-law-on-eid-switzerland-en) Procivis
|
* [The New Draft Law on eID Switzerland](https://www.procivis.ch/post/the-new-draft-law-on-eid-switzerland-en) Procivis
|
||||||
|
|
||||||
Yesterday's [media conference](https://www.youtube.com/watch?v%3DepW4xEqr3mw) and published [media release](https://www.bj.admin.ch/bj/de/home/aktuell/mm.msg-id-89515.html) opened the consultation process for the new E-ID law, which will last until October 20, 2022.
|
Yesterday's [media conference](https://www.youtube.com/watch?v=epW4xEqr3mw) and published [media release](https://www.bj.admin.ch/bj/de/home/aktuell/mm.msg-id-89515.html) opened the consultation process for the new E-ID law, which will last until October 20, 2022.
|
||||||
|
|
||||||
The preliminary [draft of the federal law](https://www.bj.admin.ch/dam/bj/de/data/staat/gesetzgebung/staatliche-e-id/vorentw.pdf) declared the purpose of the E-ID to be to ensure "secure identification by means of E-ID among private individuals and with authorities". The protection of the personality and fundamental rights of individuals is to be provided by the following principles defined in the law:
|
The preliminary [draft of the federal law](https://www.bj.admin.ch/dam/bj/de/data/staat/gesetzgebung/staatliche-e-id/vorentw.pdf) declared the purpose of the E-ID to be to ensure "secure identification by means of E-ID among private individuals and with authorities". The protection of the personality and fundamental rights of individuals is to be provided by the following principles defined in the law:
|
||||||
|
|
||||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue
Block a user