From 72f6cc132cf1a512dd80979ecb3cb826ee803d03 Mon Sep 17 00:00:00 2001 From: Infominer Date: Sat, 4 Jan 2020 13:19:22 -0500 Subject: [PATCH] update history --- _1970thru90s/chaum.html | 44 -- _1970thru90s/dataviellance.html | 51 -- .../internet-identifier-assignment.html | 79 --- _1970thru90s/pgp.html | 90 --- _1970thru90s/planetwork-asn.html | 118 ---- _2000s/2000s.html | 317 --------- _2000s/abc4trust.html | 43 -- _2000s/attention-economy.html | 51 -- _2000s/fido.html | 611 ------------------ _2000s/idcommons.html | 257 -------- _2000s/identity-gang.html | 25 - _2000s/iiw.html | 205 ------ _2000s/laws-of-identity.html | 144 ----- _2000s/moxytongue.html | 121 ---- _2000s/oauth.html | 69 -- _2000s/xdi-xri.html | 139 ---- _2000s/yadis-openid.html | 353 ---------- _2010s/2010s.html | 191 ------ _2010s/bitcoin.html | 149 ----- _2010s/danube.html | 61 -- _2010s/digital-bazaar.html | 124 ---- _2010s/gdpr.html | 25 - _2010s/ibm-zurich.html | 300 --------- _2010s/life-management.html | 100 --- _2010s/mecco.html | 108 ---- _2010s/namecoin.html | 76 --- _2010s/oauth2.html | 110 ---- _2010s/rebooting-wot.html | 171 ----- _2010s/respect-network.html | 460 ------------- _2010s/sovereign-source-authority.html | 197 ------ _2010s/un-agenda-sustainable-development.html | 126 ---- _2010s/verifiable-credentials.html | 82 --- _2010s/w3c-credentials-community-group.html | 60 -- _2010s/windhover-principles.html | 133 ---- _2016class/consensys-id.html | 153 ----- _2016class/did-history.html | 103 --- _2016class/evernym.html | 115 ---- _2016class/id2020.html | 296 --------- _2016class/identity-foundation-dif.html | 145 ----- _2016class/learning-machine.html | 66 -- _2016class/microsoft.html | 42 -- _2016class/mydata.html | 66 -- _2016class/pan-canadian-trust.html | 145 ----- _2016class/self-sovereign-identity.html | 172 ----- _2016class/sovrin.html | 171 ----- _2016class/uport.html | 66 -- _2017present/2018.html | 72 --- _2017present/did-auth.html | 48 -- _2017present/dkms.html | 96 --- _2017present/erc725.html | 97 --- _2017present/jolocom.html | 65 -- _2017present/veresone.html | 65 -- _2017present/von-bcgov.html | 65 -- _assorted/cryptography.html | 171 ----- _assorted/id-history.html | 74 --- _assorted/open-standards.html | 145 ----- _assorted/sovereignty.html | 161 ----- _pages/archive/1970s-90s.md | 11 - _pages/archive/2000s.md | 11 - _pages/archive/2010s.md | 11 - _pages/archive/2016.md | 12 - _pages/archive/2017-present.md | 12 - _pages/archive/assorted.md | 12 - _pages/archive/history-archive.html | 51 -- _pages/redirects/1970s-90s.md | 5 + _pages/redirects/2000s.md | 5 + _pages/redirects/2010s.md | 5 + _pages/redirects/2016.md | 5 + _pages/redirects/2017-present.md | 6 + _pages/redirects/assorted.md | 5 + _pages/redirects/history-archive.html | 6 + _posts/drafts/people-of-identity.md | 158 +++++ _posts/history/2019-03-04-history.md | 309 --------- .../2019-03-04-pre-history-and-resources.md | 114 ++++ ...9-09-15-history-self-sovereign-identity.md | 13 - .../history/2020-01-01-user-centric-2000s.md | 226 +++++++ .../2020-01-02-personal-data-2010-15.md | 214 ++++++ .../history/2020-01-03-blockchain-2015-19.md | 299 +++++++++ bookmark-donations/README.md | 21 - 79 files changed, 1048 insertions(+), 8252 deletions(-) delete mode 100644 _1970thru90s/chaum.html delete mode 100644 _1970thru90s/dataviellance.html delete mode 100644 _1970thru90s/internet-identifier-assignment.html delete mode 100644 _1970thru90s/pgp.html delete mode 100644 _1970thru90s/planetwork-asn.html delete mode 100644 _2000s/2000s.html delete mode 100644 _2000s/abc4trust.html delete mode 100644 _2000s/attention-economy.html delete mode 100644 _2000s/fido.html delete mode 100644 _2000s/idcommons.html delete mode 100644 _2000s/identity-gang.html delete mode 100644 _2000s/iiw.html delete mode 100644 _2000s/laws-of-identity.html delete mode 100644 _2000s/moxytongue.html delete mode 100644 _2000s/oauth.html delete mode 100644 _2000s/xdi-xri.html delete mode 100644 _2000s/yadis-openid.html delete mode 100644 _2010s/2010s.html delete mode 100644 _2010s/bitcoin.html delete mode 100644 _2010s/danube.html delete mode 100644 _2010s/digital-bazaar.html delete mode 100644 _2010s/gdpr.html delete mode 100644 _2010s/ibm-zurich.html delete mode 100644 _2010s/life-management.html delete mode 100644 _2010s/mecco.html delete mode 100644 _2010s/namecoin.html delete mode 100644 _2010s/oauth2.html delete mode 100644 _2010s/rebooting-wot.html delete mode 100644 _2010s/respect-network.html delete mode 100644 _2010s/sovereign-source-authority.html delete mode 100644 _2010s/un-agenda-sustainable-development.html delete mode 100644 _2010s/verifiable-credentials.html delete mode 100644 _2010s/w3c-credentials-community-group.html delete mode 100644 _2010s/windhover-principles.html delete mode 100644 _2016class/consensys-id.html delete mode 100644 _2016class/did-history.html delete mode 100644 _2016class/evernym.html delete mode 100644 _2016class/id2020.html delete mode 100644 _2016class/identity-foundation-dif.html delete mode 100644 _2016class/learning-machine.html delete mode 100644 _2016class/microsoft.html delete mode 100644 _2016class/mydata.html delete mode 100644 _2016class/pan-canadian-trust.html delete mode 100644 _2016class/self-sovereign-identity.html delete mode 100644 _2016class/sovrin.html delete mode 100644 _2016class/uport.html delete mode 100644 _2017present/2018.html delete mode 100644 _2017present/did-auth.html delete mode 100644 _2017present/dkms.html delete mode 100644 _2017present/erc725.html delete mode 100644 _2017present/jolocom.html delete mode 100644 _2017present/veresone.html delete mode 100644 _2017present/von-bcgov.html delete mode 100644 _assorted/cryptography.html delete mode 100644 _assorted/id-history.html delete mode 100644 _assorted/open-standards.html delete mode 100644 _assorted/sovereignty.html delete mode 100644 _pages/archive/1970s-90s.md delete mode 100644 _pages/archive/2000s.md delete mode 100644 _pages/archive/2010s.md delete mode 100644 _pages/archive/2016.md delete mode 100644 _pages/archive/2017-present.md delete mode 100644 _pages/archive/assorted.md delete mode 100644 _pages/archive/history-archive.html create mode 100644 _pages/redirects/1970s-90s.md create mode 100644 _pages/redirects/2000s.md create mode 100644 _pages/redirects/2010s.md create mode 100644 _pages/redirects/2016.md create mode 100644 _pages/redirects/2017-present.md create mode 100644 _pages/redirects/assorted.md create mode 100644 _pages/redirects/history-archive.html create mode 100644 _posts/drafts/people-of-identity.md delete mode 100644 _posts/history/2019-03-04-history.md create mode 100644 _posts/history/2019-03-04-pre-history-and-resources.md delete mode 100644 _posts/history/2019-09-15-history-self-sovereign-identity.md create mode 100644 _posts/history/2020-01-01-user-centric-2000s.md create mode 100644 _posts/history/2020-01-02-personal-data-2010-15.md create mode 100644 _posts/history/2020-01-03-blockchain-2015-19.md delete mode 100644 bookmark-donations/README.md diff --git a/_1970thru90s/chaum.html b/_1970thru90s/chaum.html deleted file mode 100644 index 79a9dcf0..00000000 --- a/_1970thru90s/chaum.html +++ /dev/null @@ -1,44 +0,0 @@ ---- -title: "⏲-chaum" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 07-Sep-19 05:25 PM - -
- https://www.cs.ru.nl/~jhh/pub/secsem/chaum1985bigbrother.pdf - David Chaum, 1985. - - The large-scale automated transaction systems of the near future can be designed to protect the privacy and maintain the security of both individuals and organizations. - > Computerization is robbing individuals of the ability to monitor and control the ways information about them is used. As organizations in both the private and the public sectors routinely exchange such informa- tion, individ.uals have no way of knowing if the information is inaccurate, obsolete, or otherwise inap- propriate. The foundation is being laid for a dossier society, in which computers could be used to infer individuals’ life-styles, habits, whereabouts, and asso- ciations from data collected in ordinary consumer transactions. Uncertainty about whether data will re- main secure against abuse by those maintaining or tapping it can have a “chilling effect,” causing people to alter their observable activities. As computerization becomes mclre pervasive, the potential for these prob- lems will grow dramatically. - -
- - - -
-
-
- diff --git a/_1970thru90s/dataviellance.html b/_1970thru90s/dataviellance.html deleted file mode 100644 index f1aa4217..00000000 --- a/_1970thru90s/dataviellance.html +++ /dev/null @@ -1,51 +0,0 @@ ---- -title: "⏲-dataviellance" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 05-Sep-19 05:47 PM - - - - - -
- The concept of 'dataveillance' is introduced, and defined as the systematic monitoring of people's actions or communications through the application of information technology. Dataveillance's origins are traced, and an explanation provided as to why it is becoming the dominant means of monitoring individuals and populations. - -The paper identifies, classifies and describes the various dataveillance techniques. It then examines the benefits, and especially the dangers, arising from dataveillance. It considers the intrinsic and extrinsic controls that act to keep the application of dataveillance under control, and suggests some appropriate policy measures. - -
- - - -
-
-
- diff --git a/_1970thru90s/internet-identifier-assignment.html b/_1970thru90s/internet-identifier-assignment.html deleted file mode 100644 index a320f347..00000000 --- a/_1970thru90s/internet-identifier-assignment.html +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "⏲-internet-identifier-assignment" ---- - - - - -
-
- -
- -
- -
- -
- diff --git a/_1970thru90s/pgp.html b/_1970thru90s/pgp.html deleted file mode 100644 index b425040c..00000000 --- a/_1970thru90s/pgp.html +++ /dev/null @@ -1,90 +0,0 @@ ---- -title: "⏲-pgp" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 05-Sep-19 05:48 PM - - - - -
-
-
-
-
-
- - - Linux.com - -
- - - -
Public Key Cryptography infrastructure (PKI) has two main implementations. One is done using certificates and certificate authorities (CAs), and is described in the X.509 standard. It is best suited for structured organizational hierarchies with an implicitly trusted authorit...
- -
- -
- - - -
-
- - -
-
- -
-
- -
- diff --git a/_1970thru90s/planetwork-asn.html b/_1970thru90s/planetwork-asn.html deleted file mode 100644 index 01df6812..00000000 --- a/_1970thru90s/planetwork-asn.html +++ /dev/null @@ -1,118 +0,0 @@ ---- -title: "⏲-planetwork-asn" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 05-Sep-19 05:49 PM - - - - - -
- http://asn.planetwork.net/ -> The Augmented Social Network: Building identity and trust into the next-generation Internet by Ken Jordan, Jan Hauser, and Steven Foster -http://www.uic.edu/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/1068/988 -> Could the next generation of online communications strengthen civil society by better connecting people to others with whom they share affinities, so they can more effectively exchange information and self-organize? Could such a system help to revitalize democracy in the 21st century? When networked personal computing was first developed, engineers concentrated on extending creativity among individuals and enhancing collaboration between a few. They did not much consider what social interaction among millions of Internet users would actually entail. It was thought that the Net’s technical architecture need not address the issues of "personal identity" and "trust," since those matters tended to take care of themselves. -http://asn.planetwork.net/asn-archive/AugmentedSocialNetwork.pdf - - (edited) -
- - -
-
-
-
-
- - - -
The Augmented Social Network: Building identity and trust into the next-generation Internet
- -
- -
- - -
-
- -
-
-
-
- -
-
- ⧉infominer - 07-Sep-19 05:39 PM - - - - - - - - -
-
-
-
-
- - - -
The Augmented Social Network: Building identity and trust into the next-generation Internet
- -
- -
- - -
-
- -
-
-
- diff --git a/_2000s/2000s.html b/_2000s/2000s.html deleted file mode 100644 index 86786a1b..00000000 --- a/_2000s/2000s.html +++ /dev/null @@ -1,317 +0,0 @@ ---- -title: "🌱-2000s" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 04-Sep-19 12:10 PM - - - - -
-
-
-
-
- -
- Reference -
- - -
- -
- - -
-
- -
-
-
-
- -
-
- ⧉infominer - 04-Sep-19 12:57 PM - - - - -
-
-
-
-
- - - - -
- -
- - -
-
- -
-
-
-
- -
-
- ⧉infominer - 04-Sep-19 01:10 PM - - - - - - - - -
-
-
-
-
- - - -
Updated: November 12 2006 I am trying to come up with the list of vendors and associated products in the Identity and Access Management ar...
- -
- -
- - -
-
- -
-
- -
-
- -
-
- ⧉infominer - 05-Sep-19 06:16 PM - - - - -
-
-
-
-
- - - -
The term "user-centric" identity is getting bandied about a lot these days. It's generally understood to be a different way of expressing the entire identity transaction as opposed to what might be called the "enterprise-centric" approach traditionally used within provisionin...
- -
- -
- - - -
-
- - -
-
- - - - -
-
-
-
-
- - - -
My recent post on Google's identity silo was part of a hailstorm (pun intended) of comments that occurred on the email list over at the Identity Gang. All of those fast-flying emails unveiled what I'm now calling the "identity silo paradox."
- -
- -
- - - -
-
- - -
-
- -
-
-
-
- -
-
- ⧉infominer - 07-Sep-19 05:40 PM - - - - -
-
-
-
-
- - - -
OneName™ software enables businesses to authorize and control the use of sensitive data - within the enterprise and across the Internet.
- -
- -
- - -
-
- -
-
-
-
- -
-
- ⧉infominer - 08-Sep-19 01:44 PM - - - - - -
- Jøsang, Audun and Simon Pope. 2005. “User Centric Identity Management”. AusCERT Conference 2005. - -
- - - -
-
-
- diff --git a/_2000s/abc4trust.html b/_2000s/abc4trust.html deleted file mode 100644 index 5468206c..00000000 --- a/_2000s/abc4trust.html +++ /dev/null @@ -1,43 +0,0 @@ ---- -title: "🌱-abc4trust" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 07-Sep-19 05:32 PM - -
- https://abc4trust.eu/ - - (edited) -
- - - -
-
-
- diff --git a/_2000s/attention-economy.html b/_2000s/attention-economy.html deleted file mode 100644 index 73217da8..00000000 --- a/_2000s/attention-economy.html +++ /dev/null @@ -1,51 +0,0 @@ ---- -title: "🌱-attention-economy" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 08-Sep-19 11:38 AM - - - - - -
- > I've been looking forward to what Steve Gillmor would say about Attention here, since Steve got this meme rolling two years ago with attention.xml, and later helped launch the Attention Trust., with Seth Goldstein and some other folks. Search for "Steve Gillmor" and Attention on Google, and 113,000 results come up. -> -> Steve is a good friend. I'm a member of his weekly Gillmor Gang podcast. He's talked about attention many times on many shows, and even has a radio show on Sirius called Attention Tech. And yet, I've got to admit, I've never understood more than a fraction of what he's talking about — even when I've given him my full attention. (Which isn't easy for a techie typically given to "continuous partial attention", as Linda Stone pointed out in one of eTech's best talks.) - -
- - - -
-
-
- diff --git a/_2000s/fido.html b/_2000s/fido.html deleted file mode 100644 index 31e9c85b..00000000 --- a/_2000s/fido.html +++ /dev/null @@ -1,611 +0,0 @@ ---- -title: "🌱-fido" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 07-Sep-19 03:46 PM - - - - -
-
-
-
-
- - - -
2009 – Validity Sensors and PayPal discuss using biometrics for identification of online users instead of passwords. The meeting inspired the idea to work on an industry standard designed around public key cryptography, enabling a passwordless log-in backed purely by local ...
- -
- -
- - -
-
- -
- - -
- - - - - - - -
-
-
-
-
- - - -
The FIDO Alliance (Fast IDentity Online) Standards Will Allow Users the Option to Replace Passwords with Authentication Methods that are More Secure and Easier to Use Palo Alto, California – February 12, 2013 – Leading Internet companies, system integrators and security p...
- -
- -
- - -
-
- - - - -
-
-
-
-
- - - -
FIDO Members are Multiplying Rapidly since Launch, as Critical Needs and New Market Opportunities Become Increasingly Compelling Palo Alto, California – April 23, 2013 – The FIDO Alliance, an industry consortium revolutionizing online authentication with the first standar...
- -
- -
- - -
-
- - - - -
-
-
-
-
- - - -
Associate Members Diamond Fortress and Crocus Technology Align with (FIDO) Fast IDentity Online – the First and Only Industry Standard for Strong Authentication RSA Conference, San Francisco, California – February 27, 2013 – The FIDO Alliance (Fast IDentity Online), an ...
- -
- -
- - -
-
- - - - -
-
-
-
-
- - - -
Mountain View, Calif. and Barcelona, Spain – Mobile World Congress (MWC) – February 24, 2014…The FIDO (Fast IDentity Online) Alliance (http://fidoalliance.org/), an industry consortium delivering standards for simpler, stronger authentication, today announced the first ...
- -
- -
- - -
-
- - - - -
-
-
-
-
- - - -
Mountain View, CA – December 9, 2014 The FIDO (Fast IDentity Online) Alliance (http://fidoalliance.org/), an open industry consortium delivering standards for simpler, stronger authentication, today published final 1.0 drafts of its two specifications – Universal Authenti...
- -
- -
- - -
-
- - - - -
-
-
-
-
- - - -
Mountain View, Calif. – Feb. 13, 2015 – The FIDO (Fast IDentity Online) Alliance (http://fidoalliance.org/), an industry consortium launched in 2013 to revolutionize online authentication with open standards for simpler, stronger methods, today announced that Microsoft wi...
- -
- -
- - -
-
- - - - -
-
-
-
-
- - - -
In Only Four Months, NTT DOCOMO Announces Intentions to Expand FIDO Authentication to 10 Devices, More NTT DOCOMO Services, and Mobile Commerce Partners Mountain View, Calif., – September 29, 2015… The FIDO® (Fast IDentity Online) Alliance (http://fidoalliance.org/), an ...
- -
- -
- - -
-
- - - - -
-
-
-
-
- - - -
FIDO Alliance engages in meaningful discussion with government officials & policymakers on how FIDO specifications offer better options for authentication.
- -
- -
- - -
-
- - - - - - - - -
-
-
-
-
- - - -
FIDO U2F 1.0 Specifications Add Support for NFC and Bluetooth® Technology Mountain View, Calif., – June 30 2015… The FIDO (Fast IDentity Online) Alliance (http://fidoalliance.org/), an industry consortium launched in 2013 to revolutionize online security with open standa...
- -
- -
- - -
-
- - - - - - - - -
-
-
-
-
-
- - - shadmin - -
- - - -
Lenovo's official site for press materials and original stories about the vision and passion behind the technology.
- -
- -
- - - -
-
- - -
-
- - - - -
-
-
-
-
- - - -
People ask all the time what they can do to make their online accounts more secure. Like most security professionals, I recommend setting up two-factor aut
- -
- -
- - -
-
- - - - -
-
-
-
-
- - - -
The Authenticator Certification Levels introduce Authenticator Security Requirements to the FIDO Certification Program. Authenticators must be certified to at least Authenticator Certification Level 1 (L1) for UAF, U2F, and FIDO2 certification. Currently, the supported Cert...
- -
- -
- - - -
-
- - -
-
- - - - -
-
-
-
-
- - - -
FIDO India Working Group Launched to Further Drive Local Market Engagement New Delhi, India and Mountain View Calif, May 9, 2017 – The FIDO Alliance today announced a partnership with the Data Security Council of India (DSCI) and the launch of the FIDO India Working Group t...
- -
- -
- - -
-
- - - - -
-
-
-
-
- - - -
Organization to help companies meet emerging regulations and growing requirements for simpler, stronger user authentication LONDON, November 14, 2017 – The FIDO Alliance today announced the launch of a FIDO Europe Working Group to accelerate the use of FIDO authentication s...
- -
- -
- - -
-
- - - - -
-
-
-
-
- - - -
SEOUL, DECEMBER 6, 2017 – The FIDO Alliance announced today the launch of the FIDO Korea Working Group to further accelerate awareness and adoption of the FIDO Authentication standards in the Korean marketplace. FIDO Authentication reduces industry reliance on passwords in ...
- -
- -
- - -
-
- - - - -
-
-
-
-
- - - -
With support from Google Chrome, Microsoft Edge and Mozilla Firefox, FIDO2 Project opens new era of ubiquitous, phishing-resistant, strong authentication to protect web users worldwide  MOUNTAIN VIEW, Calif., and https://www.w3.org/ — April 10, 2018 – The FIDO Alliance a...
- -
- -
- - - -
-
- - -
-
- - - - -
-
-
-
-
- - - -
Sony Mobile Xperia™ smartphones from NTT DOCOMO are first devices to market TOKYO, DECEMBER 8, 2017 – The FIDO Alliance, an industry consortium with 250+ member and partner organizations developing open standards for simpler, stronger authentication, announced today that ...
- -
- -
- - -
-
- - - - -
-
-
-
-
- - - -
FIDO2 leverages devices to authenticate to online services via both mobile and desktop. FIDO2 specs are the W3C WebAuthn spec & FIDO Alliance’s CTAP.
- -
- -
- - -
-
- - - - -
-
-
-
-
- - - -
The latest versions of the FIDO Alliance specifications are available below. If you are new to FIDO, we recommend you first review the Specifications Overview before proceeding further. Older versions of the specifications can be found in the specification archive along with...
- -
- -
- - -
-
- -
- (left of around) September 2018-https://fidoalliance.org/overview/history/ - -
- - - -
-
-
- diff --git a/_2000s/idcommons.html b/_2000s/idcommons.html deleted file mode 100644 index 34ca6b7b..00000000 --- a/_2000s/idcommons.html +++ /dev/null @@ -1,257 +0,0 @@ ---- -title: "🌱-idcommons" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 04-Sep-19 06:12 AM - -
- http://web.archive.org/web/20070210000624/http://wiki.idcommons.net/Moin.cgi/IdentityCommonsTwoPurposeAndPrinciples -Historical - Archive of Earlier Proposals for the Purpose Statement -
First Proposal (May 2006 - Drummond Reed and Eugene Kim).... -
- - (edited) -
- - - -
-
-
-
- -
-
- ⧉infominer - 04-Sep-19 11:51 AM - - - - -
-
-
-
-
- - - - -
- -
- - -
-
- -
- http://wiki.idcommons.org/History -http://wiki.idcommons.net/History -(just noticing that the .net and .org links are the same content) - - (edited) -
- - -
-
-
-
-
- -
- History -
- - -
- -
- - -
-
- - - - -
-
-
-
-
- -
- IC Logo -
- - -
- -
- - -
-
- -
-
-
-
- -
-
- ⧉infominer - 05-Sep-19 05:56 PM - - - - -
-
-
-
-
-
- - - kaliya - -
- - - -
I vividly remember the first time the identity gang met - it was in at Digital Identity World in October of 2004.  I had met Doc Searls in August at Linux world and shared about the work that Owen Davis, Drummond Reed, Bill Washburn and others were doing trying open standard...
- -
- -
- - -
-
- - - - - -
-
-
-
- -
-
- ⧉infominer - 07-Sep-19 05:44 PM - - - - - - - - -
-
-
-
-
-
- - - kaliya - -
- - - -
Founded in 2011, the Personal Data Ecosystem Consortium advocates a user-centric approach to managing personal data. We believe that, in order for the Internet economy to continue delivering on its promise, the needs of individuals, companies, and governments must all be resp...
- -
- -
- - -
-
- - - - -
-
-
-
- - -
- - -
-
- -
-
-
- diff --git a/_2000s/identity-gang.html b/_2000s/identity-gang.html deleted file mode 100644 index d5f98874..00000000 --- a/_2000s/identity-gang.html +++ /dev/null @@ -1,25 +0,0 @@ ---- -title: "🌱-identity-gang" ---- - - - - -
-
- -
- -
- -
-
- diff --git a/_2000s/iiw.html b/_2000s/iiw.html deleted file mode 100644 index b2f931b0..00000000 --- a/_2000s/iiw.html +++ /dev/null @@ -1,205 +0,0 @@ ---- -title: "🌱-iiw" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 05-Sep-19 06:04 PM - - - - -
-
-
-
-
- - - -
There’s been considerable conversation around identity on the Internet, or what some would call grassroots identity. Providing identity services between people, websites, and organizations that may or may not have any kind of formalized relationship is a different problem t...
- -
- -
- - -
-
- -
-
-
-
- -
-
- ⧉infominer - 05-Sep-19 06:27 PM - - - - - - - - - -
-
-
-
- -
-
- ⧉infominer - 07-Sep-19 04:03 PM - - - - -
-
-
-
-
- - - -
The term "user-centric" identity is getting bandied about a lot these days. It's generally understood to be a different way of expressing the entire identity transaction as opposed to what might be called the "enterprise-centric" approach traditionally used within provisionin...
- -
- -
- - - -
-
- - -
-
- - - - -
-
-
-
-
- - - -
My recent post on Google's identity silo was part of a hailstorm (pun intended) of comments that occurred on the email list over at the Identity Gang. All of those fast-flying emails unveiled what I'm now calling the "identity silo paradox."
- -
- -
- - - -
-
- - -
-
- -
-
-
-
- -
-
- ⧉infominer - 07-Sep-19 05:45 PM - - - - - - - - -
-
-
-
-
- - - -
Visit the post for more.
- -
- -
- - - -
-
- - -
-
- -
-
-
- diff --git a/_2000s/laws-of-identity.html b/_2000s/laws-of-identity.html deleted file mode 100644 index 6a1d0312..00000000 --- a/_2000s/laws-of-identity.html +++ /dev/null @@ -1,144 +0,0 @@ ---- -title: "🌱-laws-of-identity" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 05-Sep-19 04:37 PM - - - - -
-
-
-
-
- - - -
Kim Cameron has caused quite a stir with his -Identity Blog. He came out with -a whitepaper called "the Laws of Identity" which has caused quite a bit of conversation.So, we went over and
- -
- -
- - - -
-
- - -
-
- - - - - -
-
-
-
- -
-
- ⧉infominer - 05-Sep-19 06:02 PM - - - - - -
-
-
-
- -
-
- ⧉infominer - 07-Sep-19 05:43 PM - - - - - -
-
-
-
- -
-
- ⧉infominer - 08-Sep-19 01:40 PM - - - - -
-
-
-
-
- - - - -
- -
- - -
-
- -
-
-
- diff --git a/_2000s/moxytongue.html b/_2000s/moxytongue.html deleted file mode 100644 index 3badc266..00000000 --- a/_2000s/moxytongue.html +++ /dev/null @@ -1,121 +0,0 @@ ---- -title: "🌱-moxytongue" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 05-Sep-19 01:52 PM - - - - -
-
-
-
-
- - - -
http://bit.ly/j80T3 Senator Kerry, Your IDENTITY is at the root of your relationship with any service providing company, including the ...
- -
- -
- - -
-
- -
-
-
-
- -
-
- ⧉infominer - 05-Sep-19 07:00 PM - - - - -
-
-
-
-
- - - -
#indie Creator: Self-Sovereign $ID entities.. structure yields results. #OwnRoot #SovereignSourceAuthority $OYO Standing up civil Society, personally. 🇺🇸
- -
-
-
Tweets
-
10696
-
-
-
Followers
-
675
-
-
-
- -
- - - -
-
- - - -
-
- -
-
-
- diff --git a/_2000s/oauth.html b/_2000s/oauth.html deleted file mode 100644 index 7a9ac343..00000000 --- a/_2000s/oauth.html +++ /dev/null @@ -1,69 +0,0 @@ ---- -title: "🌱-oauth" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 06-Sep-19 08:21 PM - -
- https://en.wikipedia.org/wiki/OAuth#History -> OAuth began in November 2006 when Blaine Cook was developing the Twitter OpenID implementation. Meanwhile, Ma.gnolia needed a solution to allow its members with OpenIDs to authorize Dashboard Widgets to access their service. Cook, Chris Messina and Larry Halff from Magnolia met with David Recordon to discuss using OpenID with the Twitter and Ma.gnolia APIs to delegate authentication. They concluded that there were no open standards for API access delegation[4]. -> -> The OAuth discussion group was created in April 2007, for the small group of implementers to write the draft proposal for an open protocol. DeWitt Clinton from Google learned of the OAuth project, and expressed his interest in supporting the effort. In July 2007, the team drafted an initial specification. Eran Hammer joined and coordinated the many OAuth contributions creating a more formal specification. On 4 December 2007, the OAuth Core 1.0 final draft was released.[5] - -
- - -
-
-
-
-
- -
- OAuth -
- -
OAuth is an open standard for access delegation, commonly used as a way for Internet users to grant websites or applications access to their information on other websites but without giving them the passwords. This mechanism is used by companies such as Amazon, Google, Facebo...
- -
- -
- - - -
-
- - -
-
- -
-
-
- diff --git a/_2000s/xdi-xri.html b/_2000s/xdi-xri.html deleted file mode 100644 index 45493909..00000000 --- a/_2000s/xdi-xri.html +++ /dev/null @@ -1,139 +0,0 @@ ---- -title: "🌱-xdi-xri" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 05-Sep-19 05:51 PM - - - - -
-
-
-
-
-
- - - Markus Sabadello - -
- -
- History -
- - -
- -
- - -
-
- -
-
-
-
- -
-
- ⧉infominer - 07-Sep-19 05:40 PM - -
- https://web.archive.org/web/20120117204002/http://www.cordance.net/ -Cordance created the technology under the development of XRI and XDI Oasis Technical Committees. - -
- - - -
- https://www.home.neustar/ -Neustar is a telecommunications company originally charged with maintaining the system of directories and databases for telephone area codes and prefixes in North America - -
- - -
-
-
-
-
- - - -
Neustar Enables Trusted Connections Between Companies and People at the Moments That Matter the Most.
- -
- -
- - - -
-
- - -
-
- - - - -
-
-
-
-
- -
- XDI.org -
- - -
- -
- - -
-
- -
-
-
- diff --git a/_2000s/yadis-openid.html b/_2000s/yadis-openid.html deleted file mode 100644 index d52e5c34..00000000 --- a/_2000s/yadis-openid.html +++ /dev/null @@ -1,353 +0,0 @@ ---- -title: "🌱-yadis-openid" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 06-Sep-19 08:06 PM - -
- https://en.wikipedia.org/wiki/OpenID#History -> The original OpenID authentication protocol was developed in May 2005[43] by Brad Fitzpatrick, creator of popular community website LiveJournal, while working at Six Apart.[44] Initially referred to as Yadis (an acronym for "Yet another distributed identity system"),[45] it was named OpenID after the openid.net domain name was given to Six Apart to use for the project.[46] OpenID support was soon implemented on LiveJournal and fellow LiveJournal engine community DeadJournal for blog post comments and quickly gained attention in the digital identity community.[47][48] Web developer JanRain was an early supporter of OpenID, providing OpenID software libraries and expanding its business around OpenID-based services. - - (edited) -
- - - - - - - - - - - - - - - - - - - - - - - - - - - -
- http://lists.danga.com/pipermail/yadis/2005-October/001511.html -Reed, Dummond (2005-12-31). "Implementing YADIS with no new software". Danga Interactive. Retrieved 2008-03-20. - - (edited) -
- - - - - - -
-
-
-
-
-
- - - Drummond Reed - -
- - - -
For most people, watching the evolution of technical specifications is like watching a glacier move. To those of us living the process, though, there can be a great deal of drama to it — in f…
- -
- -
- - - -
-
- - -
-
- -
- Graves, Michael (2007-02-06). "VeriSign, Microsoft & Partners to Work together on OpenID + Cardspace". VeriSign. Archived from the original on 2008-05-03. Retrieved 2008-03-20. -https://web.archive.org/web/20080511162600/http://dev.aol.com/aol-and-63-million-openids - Panzer, John (2007-02-16). "AOL and 63 Million OpenIDs". AOL Developer Network. Archived from the original on 2008-05-11. Retrieved 2008-03-20. - -
- - -
-
-
-
-
- - - -
AOL's status regarding OpenID implementation; and, 63 million OpenIDs. Plus reactions to the blogosphere.
- -
- -
- - -
-
- - - - - -
- https://en.wikipedia.org/wiki/OpenID#cite_ref-66 -> In mid-January 2008, Yahoo! announced initial OpenID 2.0 support, both as a provider and as a relying party, releasing the provider service by the end of the month.[66] In early February, Google, IBM, Microsoft, VeriSign and Yahoo! joined the OpenID Foundation as corporate board members.[67] Around early May, SourceForge, Inc. introduced OpenID provider and relying party support to leading open source software development website SourceForge.net.[68] In late July, popular social network service MySpace announced support for OpenID as a provider.[69] In late October, Google launched support as an OpenID provider and Microsoft announced that Windows Live ID would support OpenID.[70] In November, JanRain announced a free hosted service, RPX Basic, that allows websites to begin accepting OpenIDs for registration and login without having to install, integrate and configure the OpenID open source libraries.[71] -> -> In January 2009, PayPal joined the OpenID Foundation as a corporate member, followed shortly by Facebook in February. The OpenID Foundation formed an executive committee and appointed Don Thibeau as executive director. In March, MySpace launched their previously announced OpenID provider service, enabling all MySpace users to use their MySpace URL as an OpenID. In May, Facebook launched their relying party functionality,[72][73] letting users use an automatic login-enabled OpenID account (e.g. Google) to log into Facebook.[74] -> -> In September 2013, Janrain announced that MyOpenID.com would be shut down on February 1, 2014; a pie chart showed Facebook and Google dominate the social login space as of Q2 2013.[75] Facebook has since left OpenID; it is no longer a sponsor, represented on the board, or permitting OpenID logins.[15][76] - - (edited) -
- - -
-
-
-
-
- -
- OpenID -
- -
OpenID is an open standard and decentralized authentication protocol. -Promoted by the non-profit OpenID Foundation, it allows users to be authenticated by co-operating sites (known as relying parties, or RP) using a third-party service, eliminating the need for webmasters to ...
- -
- -
- - - -
-
- - -
-
- -
- http://wiki.openid.net/w/page/12995215/OpenID%20Authentication%202-1 -> Most of the related work for moving OpenID infrastructure forward is occurring outside of the immediate OpenID specifications community: -> -> Projects like XRDS-Simple (http://xrds-simple.net/) are evolving the Yadis discovery protocol. -> EAUT (http://eaut.org/) among others are looking at email address-style identifiers. -> The OpenID Foundation is investigating security considerations and improvements. -> Various groups are working on projects that start to integrate OpenID with the browser (Sxipper, VeriSign's OpenID Seatbelt, Higins, OpenID for Flock). -> In addition, since the release of OpenID 2.0, OAuth (http://oauth.net/) is now a finalized specification that is gaining adoption and has a workflow similar to OpenID Authentication. - -
- - -
-
-
-
-
- - - -
The leading source for trustworthy and timely health and medical news and information. Providing credible health information, supportive community, and educational services by blending award-winning expertise in content, community services, expert commentary, and medical review.
- -
- -
- - - -
-
- - -
-
- -
-
- -
-
- -
-
- ⧉infominer - 08-Sep-19 01:46 PM - - - - -
-
-
-
-
- - - -
First 37Signals announced it would drop support for OpenID. Then Microsoft’s Dare Obasanjo called OpenID a failure (along with XML and AtomPub). Former Facebooker Yishan Wong’s scathing (and sometimes wrong) rant calling OpenID a failure is one of the more popular answers...
- -
- -
- - - -
-
- - -
-
- -
-
-
- diff --git a/_2010s/2010s.html b/_2010s/2010s.html deleted file mode 100644 index 356abccb..00000000 --- a/_2010s/2010s.html +++ /dev/null @@ -1,191 +0,0 @@ ---- -title: "🖇-2010s" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 05-Sep-19 06:11 PM - - - - -
-
-
-
-
-
- - - kaliya - -
- - - -
Founded in 2011, the Personal Data Ecosystem Consortium advocates a user-centric approach to managing personal data. We believe that, in order for the Internet economy to continue delivering on its promise, the needs of individuals, companies, and governments must all be resp...
- -
- -
- - -
-
- -
-
-
-
- -
-
- ⧉infominer - 05-Sep-19 06:48 PM - - - - - -
- - -
- - - - -
-
-
-
- -
-
- ⧉infominer - 08-Sep-19 11:34 AM - - - - -
-
-
-
-
- - - -
The Essential Guide for Any Company Affected by Personal Data
- -
- -
- - -
-
- - - - -
-
-
-
-
- - - -
PDEC, the Personal Data Ecosystem Consortium, is a Small Data NGO. We connect companies building personal control over personal data into their products.
- -
- -
- - -
-
- - - - -
-
-
-
-
- - - -
Rethinking Personal Data: Strengthening Trust examines how the appropriate use of personal data can create enormous value for governments, organizations and individuals. Produced in collaboration with The Boston Consulting Group, the report provides a multistakeholder perspe...
- -
- -
- - - -
-
- - -
-
- -
-
-
- diff --git a/_2010s/bitcoin.html b/_2010s/bitcoin.html deleted file mode 100644 index e8490a09..00000000 --- a/_2010s/bitcoin.html +++ /dev/null @@ -1,149 +0,0 @@ ---- -title: "🖇-bitcoin" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 05-Sep-19 06:56 PM - - - - -
-
-
-
-
- - - -
Your Blockchain Jurisdiction
- -
- -
- - - -
-
- - -
-
- -
-
-
-
- -
-
- ⧉infominer - 07-Sep-19 05:54 PM - - - - -
-
-
-
-
- - - -
Andreas Antonopoulos thinks that the key is to hedge against default risk with the blockchain instead of creating reputation systems.
- -
- -
- - - -
-
- - -
-
- -
-
-
-
- -
-
- ⧉infominer - 08-Sep-19 01:38 PM - - - - -
-
-
-
-
- - - -
ID3, founded out of the MIT Media Lab, has teamed up with nearly two dozen leading digital currency firms to announce the Windhover Principles. ID3 is a research and educational nonprofit with a mission to develop a new social ecosystem of trusted digital institutions. The Wi...
- -
- -
- - - -
-
- - -
-
- -
-
-
- diff --git a/_2010s/danube.html b/_2010s/danube.html deleted file mode 100644 index 9e309b67..00000000 --- a/_2010s/danube.html +++ /dev/null @@ -1,61 +0,0 @@ ---- -title: "🖇-danube" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 07-Sep-19 05:48 PM - - - - -
-
-
-
-
- - - -
Open-Source Sofware for Identity & Personal Data Services
- -
- -
- - -
-
- -
-
-
- diff --git a/_2010s/digital-bazaar.html b/_2010s/digital-bazaar.html deleted file mode 100644 index e71a3f73..00000000 --- a/_2010s/digital-bazaar.html +++ /dev/null @@ -1,124 +0,0 @@ ---- -title: "🖇-digital-bazaar" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 07-Sep-19 04:05 PM - - - - -
-
-
-
-
-
- - - Adam Lake - -
- -
- Home -
- - -
- -
- - -
-
- -
-
-
-
- -
-
- ⧉infominer - 08-Sep-19 01:47 PM - - - - - -
-
-
-
- -
-
- ⧉infominer - 08-Sep-19 04:55 PM - - - - -
-
-
-
-
- - - -
DHS S&T has awarded a $749,241 Small Business Innovation Program (SBIR) contract to Digital Bazaar, Inc. to develop fit-for-purpose blockhains for identity and access management.
- -
- -
- - - -
-
- - -
-
- -
-
-
- diff --git a/_2010s/gdpr.html b/_2010s/gdpr.html deleted file mode 100644 index 3064e7a6..00000000 --- a/_2010s/gdpr.html +++ /dev/null @@ -1,25 +0,0 @@ ---- -title: "🖇-gdpr" ---- - - - - -
-
- -
- -
- -
-
- diff --git a/_2010s/ibm-zurich.html b/_2010s/ibm-zurich.html deleted file mode 100644 index 09d0918e..00000000 --- a/_2010s/ibm-zurich.html +++ /dev/null @@ -1,300 +0,0 @@ ---- -title: "🖇-ibm-zurich" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 07-Sep-19 05:36 PM - - - - -
-
-
-
-
- - - -
privacy-preserving attribute-based credentials engine - p2abcengine/p2abcengine
- -
- -
- - - -
-
- - -
-
- -
- http://web.archive.org/web/20180521081750/https://www.zurich.ibm.com/identity_mixer/ -IBM Identity Mixer is a cryptographic protocol suite for privacy-preserving authentication and transfer of certified attributes. -https://github.com/p2abcengine/p2abcengine/wiki/Concepts-and-features - -
- - -
-
-
-
-
- - - -
IBM Research - Zurich, Identity Mixer
- -
- -
- - -
-
-
-
-
-
-
- - - -
privacy-preserving attribute-based credentials engine - p2abcengine/p2abcengine
- -
- -
- - - -
-
- - -
-
- -
-
-
-
- -
-
- ⧉infominer - 07-Sep-19 07:59 PM - - - - -
-
-
- - - -
-
- - - - -
-
-
- - - -
-
- - - - -
-
-
- - - -
-
- - - - -
-
-
-
-
- - - -
RWOT2 for the ID2020 UN Summit (May 2016). Contribute to WebOfTrustInfo/rwot2-id2020 development by creating an account on GitHub.
- -
- -
- - - -
-
- - -
-
- - - - -
-
-
-
-
- - - -
One of the most common questions I get when talking to customers and analysts about the self-sovereign identity (SSI) movement is, “Why blockchain?”
- -
- -
- - - -
-
- - -
-
- -
-
-
- diff --git a/_2010s/life-management.html b/_2010s/life-management.html deleted file mode 100644 index 54a07226..00000000 --- a/_2010s/life-management.html +++ /dev/null @@ -1,100 +0,0 @@ ---- -title: "🖇-life-management" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 31-Aug-19 07:17 AM - -
- KuppingerCole Advisory Note: by Martin Kuppinger | March 2012 - - (edited) -
- - - -
- - -
- - - - -
- Life Management Platforms: Control and Privacy for Personal Data - -
Turning the Internet upside down and making privacy a fundamental layer of any -networked interaction in the post Google & Facebook era. How the individuals -will gain control. How social networks will have to adapt their business models. -How privacy will return. -
- -
- - - - - - -
-
-
-
-
- - - -
KuppingerCole, an international, independent Analyst organization headquartered in Europe, specializes in offering technology research, neutral advice and events in Information Security, IAM, GRC as well as all areas concerning the Digital Transformation
- -
- -
- - - -
-
- - -
-
- -
-
-
- diff --git a/_2010s/mecco.html b/_2010s/mecco.html deleted file mode 100644 index 50a9d06e..00000000 --- a/_2010s/mecco.html +++ /dev/null @@ -1,108 +0,0 @@ ---- -title: "🖇-mecco" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 31-Aug-19 07:26 AM - - - - -
-
-
-
-
-
- - - 11FS - -
- - - -
Sam sits down with Katryna Dow from Meeco to discuss data and taking control. ● Catch us on twitter: https://twitter.com/FinTechInsiders ● Website: 11fs.com ...
- -
- -
- - - -
-
- - -
-
- -
-
-
-
- -
-
- ⧉infominer - 31-Aug-19 08:33 AM - - - - -
-
-
-
-
- - - -
The Voices & View from FemTech Leaders
- -
- -
- - -
-
- -
-
-
- diff --git a/_2010s/namecoin.html b/_2010s/namecoin.html deleted file mode 100644 index 282eeb61..00000000 --- a/_2010s/namecoin.html +++ /dev/null @@ -1,76 +0,0 @@ ---- -title: "🖇-namecoin" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 04-Sep-19 02:06 PM - - - - -
-
-
-
-
-
- - - mediocregopher - -
- - - - -
- -
- - - -
-
- -
-
-
- diff --git a/_2010s/oauth2.html b/_2010s/oauth2.html deleted file mode 100644 index b82dddc4..00000000 --- a/_2010s/oauth2.html +++ /dev/null @@ -1,110 +0,0 @@ ---- -title: "🖇-oauth2" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 06-Sep-19 08:23 PM - -
- https://en.wikipedia.org/wiki/OAuth#OAuth_2.0 -> OAuth 2.0 is not backwards compatible with OAuth 1.0. OAuth 2.0 provides specific authorization flows for web applications, desktop applications, mobile phones, and smart devices. The specification and associated RFCs are developed by the IETF OAuth WG;[7] the main framework was published in October 2012. -> -> Facebook's Graph API only supports OAuth 2.0.[8] Google supports OAuth 2.0 as the recommended authorization mechanism for all of its APIs.[9] Microsoft[10] also supports OAuth 2.0 for various APIs and its Azure Active Directory service, which is used to secure many Microsoft and third party APIs. -> -> The OAuth 2.0 Framework[11] and Bearer Token Usage[12] were published in October 2012. - -
- - - -
-
-
-
- -
-
- ⧉infominer - 07-Sep-19 04:01 PM - - - - -
-
-
-
-
- - - -
OpenID Connect (OIDC) is an authentication layer on top of OAuth 2.0, an authorization framework. The standard is controlled by the OpenID Foundation.
- -
- -
- - -
-
- - - - -
-
-
-
-
- -
- IndieAuth -
- -
IndieAuth is a standard decentralized authentication protocol that uses OAuth 2.0 and enables services to verify the identity of a user represented by a URL as well as to obtain an access token that can be used to access resources under the control of the user.. -IndieAuth is ...
- -
- -
- - -
-
- -
-
-
- diff --git a/_2010s/rebooting-wot.html b/_2010s/rebooting-wot.html deleted file mode 100644 index a1f5deff..00000000 --- a/_2010s/rebooting-wot.html +++ /dev/null @@ -1,171 +0,0 @@ ---- -title: "🖇-rebooting-wot" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 07-Sep-19 05:55 PM - - - - -
-
-
-
-
- - - -
Andreas Antonopoulos thinks that the key is to hedge against default risk with the blockchain instead of creating reputation systems.
- -
- -
- - - -
-
- - -
-
- - - - - -
- > Decentralized systems that are engineered to prevent concentrating power as they grow avoid this. They can in fact increase their credibility as more users provide their assessments as input. Protocols and structures that are distributed and self-sovereign also offer significantly improved robustness, portability, and versatility than conventional centralized or escrowed processes — especially when combined with secure cryptography. -> -> One of the first technologies to offer the advantages of decentralization emerged 25 years ago when the advent of PGP realized a Web of Trust that contained decentralized, cryptographically verified attestations of its users. Unfortunately, failures of UX design confined the spread of PGP to highly technical communities. -> -> Today, decentralized Webs of Trust remain as important as ever. Now is the time to extend them to be usable by everyone who has access to digital networks, in particular to marginalized populations that can benefit from the technology. It is a fortunate tragedy that there is no shortage of real-life examples of the need for decentralized Webs of Trust in the world today. A large spectrum of individuals — from marginalized persons like stateless refugees and victims of human trafficking to members of the informal or unregulated economy — urgently need to participate in otherwise privileged economic and political fora, but they face technical, economic, and political barriers to entry. -> -> The essential problem is to connect burgeoning new technological developments with unmet consumer needs, and vice-versa. In this paper, we present five use cases: from two relatively simple cases of managing selective disclosure to the most extreme case of establishing government-verifiable credentials from nothing for a stateless refugee. - -
- - - - - - - - - - - - - - -
-
-
-
-
- - - -
RWOT1 in San Francisco, California (November 2015) - WebOfTrustInfo/rwot1-sf
- -
- -
- - - -
-
- - -
-
- -
- https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust/blob/master/final-documents/rebranding-web-of-trust.pdf -> The Web of Trust is a buzzword for a new model of decentralized self-sovereign identity. It’s a phrase that dates back almost twenty-five years, the classic definition derives from PGP […] the vibrant blockchain community is also drawing new attention to the concept we aim to reboot it. - -
- - - -
-
-
-
- -
-
- ⧉infominer - 07-Sep-19 08:10 PM - - - - - -
- - -
- - - - -
-
-
- diff --git a/_2010s/respect-network.html b/_2010s/respect-network.html deleted file mode 100644 index 990f04b8..00000000 --- a/_2010s/respect-network.html +++ /dev/null @@ -1,460 +0,0 @@ ---- -title: "🖇-respect-network" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 08-Sep-19 11:29 AM - - - - -
-
-
-
-
-
- - - Drummond Reed - -
- - - -
Yesterday the World Economic Forum (WEF) Rethinking Personal Data initiative published a new report, Rethinking Personal Data: Strengthening Trust (PDF). The second report from the project (the fir…
- -
- -
- - - -
-
- - -
-
- - - - -
-
-
-
-
-
- - - Drummond Reed - -
- - - -
14 June 2012, London: At the World Economic Forum Rethinking Personal Data expert meeting today, Respect Network and Kynetx released a new paper, The Personal Channel: The Extraordinary Benefits of…
- -
- -
- - - -
-
- - -
-
- - - - - - - - -
-
-
-
-
- - - -
Founding Partners are companies who are joining with Respect Network Corporation to develop and deploy the Respect Network. Currently our Founding Partners fall into four categories: Commercial Par...
- -
- -
- - -
-
- - - - -
-
-
-
-
-
- - - Drummond Reed - -
- - - -
With the emergence of personal clouds comes the newest form of communications link: the personal channel. Personal channels combine many of the best features of email and social networks without th…
- -
- -
- - - -
-
- - -
-
- - - - -
-
-
-
-
-
- - - Drummond Reed - -
- - - -
In a new paper titled Privacy by Design and the Emerging Personal Data Ecosystem, renowned Ontario Information and Privacy Commissioner Ann Cavoukian together with co-authors from the United States…
- -
- -
- - - -
-
- - -
-
- - - - -
-
-
-
-
-
- - - Drummond Reed - -
- - - -
Think “cloud computing” is only for big companies and big data? In fact one of the next big steps in cloud computing is also the next big step in personal, social, and mobile computing:…
- -
- -
- - - -
-
- - -
-
- - - - -
-
-
-
-
- - - -
We connect companies that build personal control over personal data
- -
- -
- - -
-
- - - - -
-
-
-
-
- - - -
The foundation of the Respect Network is the Respect Trust Framework, which was listed with the Open Identity Exchange in May 2011 and honored with the Privacy Award at the 2011 European Identity C...
- -
- -
- - -
-
- - - - -
-
-
-
-
-
- - - Drummond Reed - -
- - - -
The foundation of the Respect Network is the Respect Trust Framework, which was listed with the Open Identity Exchange in May 2011 and honored with the Privacy Award at the 2011 European Identity C…
- -
- -
- - - -
-
- - -
-
- -
-
-
-
- -
-
- ⧉infominer - 08-Sep-19 11:42 AM - - - - -
-
-
-
-
- - - -
The world's first global private cloud network with over 50 Founding Partners
- -
-
-
Tweets
-
601
-
-
-
Followers
-
533
-
-
-
- -
- - - -
-
- - - -
-
- -
-
-
-
- -
-
- ⧉infominer - 08-Sep-19 01:37 PM - - - - - -
-
-
-
- -
-
- ⧉infominer - 08-Sep-19 03:29 PM - - - - -
-
-
-
-
- - - -
Information on acquisition, funding, cap tables, investors, and executives for Respect Network. Use the PitchBook Platform to explore the full profile.
- -
- -
- - - -
-
- - -
-
- -
-
-
- diff --git a/_2010s/sovereign-source-authority.html b/_2010s/sovereign-source-authority.html deleted file mode 100644 index 9ace264d..00000000 --- a/_2010s/sovereign-source-authority.html +++ /dev/null @@ -1,197 +0,0 @@ ---- -title: "🖇-sovereign-source-authority" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 07-Sep-19 05:16 PM - - - - -
-
-
-
-
- - - -
What is an Individual Human Being prior to "identity registration" in Society? What is the data administration framework of default partic...
- -
- -
- - - -
-
- - -
-
- -
-
-
-
- -
-
- ⧉infominer - 08-Sep-19 01:27 PM - - - - - - - - - - - - -
-
-
-
-
- - - -
ID3 is a Boston, Massachusetts, research and educational nonprofit whose mission is to develop a new social ecosystem of trusted, self-healing digital institutions.
- -
- -
- - -
-
- - - - -
-
-
-
-
-
- - - Doc Searls - -
- - - -
You know who you are. So does the IRS, the DMV, and every website and service online where you have a login and a password for. But none of those entities really knows you. What they know is what t…
- -
- -
- - - -
-
- - -
-
- - - - -
-
-
-
-
-
- - - Doc Searls - -
- - - -
We are all different. We look different, we sound different, we think and act different. Even soldiers marching lock-step in uniform are all different. Emperor Qui Shi Huang recognized this fact by…
- -
- -
- - - -
-
- - -
-
- - - - - -
-
-
- diff --git a/_2010s/un-agenda-sustainable-development.html b/_2010s/un-agenda-sustainable-development.html deleted file mode 100644 index d90251e8..00000000 --- a/_2010s/un-agenda-sustainable-development.html +++ /dev/null @@ -1,126 +0,0 @@ ---- -title: "🖇-un-agenda-sustainable-development" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 05-Sep-19 06:58 PM - - - - - -
-
-
-
- -
-
- ⧉infominer - 07-Sep-19 04:07 PM - - - - - -
-
-
-
- -
-
- ⧉infominer - 08-Sep-19 11:23 AM - - - - -
-
-
-
-
- - - -
This two-hour session will go over the key elements of the Digital IDs for Development program and acknowledge the support of the government of France to this agenda.
- -
- -
- - - -
-
- - -
-
- - - - -
-
-
-
-
- - - -
The Global ID4D Dataset, compiled by the World Bank Group’s Identification for Development (ID4D) initiative, provides a global estimate for the number of
- -
- -
- - -
-
- -
-
-
- diff --git a/_2010s/verifiable-credentials.html b/_2010s/verifiable-credentials.html deleted file mode 100644 index bdc28781..00000000 --- a/_2010s/verifiable-credentials.html +++ /dev/null @@ -1,82 +0,0 @@ ---- -title: "📜-verifiable-credentials" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 31-Aug-19 03:46 AM - -
- - -
- - - - -
-
-
-
- -
-
- ⧉infominer - 08-Sep-19 01:06 PM - - - - - -
-
-
-
- -
-
- ⧉infominer - 08-Sep-19 03:43 PM - - - - - -
-
-
- diff --git a/_2010s/w3c-credentials-community-group.html b/_2010s/w3c-credentials-community-group.html deleted file mode 100644 index dabd49a7..00000000 --- a/_2010s/w3c-credentials-community-group.html +++ /dev/null @@ -1,60 +0,0 @@ ---- -title: "🖇-w3c-credentials-community-group" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 05-Sep-19 06:52 PM - - - - - - -
-
-
- diff --git a/_2010s/windhover-principles.html b/_2010s/windhover-principles.html deleted file mode 100644 index f8e2a790..00000000 --- a/_2010s/windhover-principles.html +++ /dev/null @@ -1,133 +0,0 @@ ---- -title: "🖇-windhover-principles" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 05-Sep-19 04:39 PM - - - - -
-
-
-
-
- - - -
Today we communicate, share and transact digitally over the Internet. Individuals who make use of the Internet for these purposes should have control over their digital
- -
- -
- - -
-
- - - - -
-
-
-
-
- - - -
HubID, (the self-sovereign digital identity system at the core of Hub Culture and the Ven currency) is the first consumer application to deploy the Windhover Principles and features new frameworks for digital identity, trust and open data. The core technology has been in deve...
- -
- -
- - - -
-
- - -
-
- -
-
-
-
- -
-
- ⧉infominer - 08-Sep-19 01:38 PM - - - - -
-
-
-
-
- - - -
ID3, founded out of the MIT Media Lab, has teamed up with nearly two dozen leading digital currency firms to announce the Windhover Principles. ID3 is a research and educational nonprofit with a mission to develop a new social ecosystem of trusted digital institutions. The Wi...
- -
- -
- - - -
-
- - -
-
- -
-
-
- diff --git a/_2016class/consensys-id.html b/_2016class/consensys-id.html deleted file mode 100644 index 2fb148b3..00000000 --- a/_2016class/consensys-id.html +++ /dev/null @@ -1,153 +0,0 @@ ---- -title: "📡-consensys-id" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 05-Sep-19 06:55 PM - - - - -
-
-
-
-
- - - -
Self-sovereign identity on the blockchain
- -
- -
- - - -
-
- - -
-
- -
-
-
-
- -
-
- ⧉infominer - 07-Sep-19 07:55 PM - - - - -
-
-
- - - -
-
- -
-
-
-
- -
-
- ⧉infominer - 08-Sep-19 03:43 PM - - - - -
-
-
-
-
- - - -
The Decentralized Identity Foundation will collaborate across industries to research personal identity solutions.
- -
- -
- - - -
-
- - -
-
- -
-
-
- diff --git a/_2016class/did-history.html b/_2016class/did-history.html deleted file mode 100644 index fae2127d..00000000 --- a/_2016class/did-history.html +++ /dev/null @@ -1,103 +0,0 @@ ---- -title: "📜-did-history" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 31-Aug-19 03:42 AM - - - - - -
- - -
- - - - -
-
-
-
- -
-
- ⧉infominer - 08-Sep-19 01:46 PM - - - - -
-
-
-
-
- - - -
RWOT2 for the ID2020 UN Summit (May 2016). Contribute to WebOfTrustInfo/rwot2-id2020 development by creating an account on GitHub.
- -
- -
- - - -
-
- - -
-
- - - - - -
-
-
- diff --git a/_2016class/evernym.html b/_2016class/evernym.html deleted file mode 100644 index 125bccf8..00000000 --- a/_2016class/evernym.html +++ /dev/null @@ -1,115 +0,0 @@ ---- -title: "📡-evernym" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 05-Sep-19 01:51 PM - - - - -
-
-
-
-
- - - -
Out of stealth mode at last: https://t.co/wUdo8Iemer #identity #privacy #fintech #me2b #FOSS @dgwbirch @Steve_Lockstep @EmLindley @ACTobin
- -
- -
- - - -
-
- - - - - -
-
-
-
- -
-
- ⧉infominer - 07-Sep-19 07:50 PM - - - - - -
-
-
-
- -
-
- ⧉infominer - 07-Sep-19 08:04 PM - - - - - -
-
-
- diff --git a/_2016class/id2020.html b/_2016class/id2020.html deleted file mode 100644 index 2d0901f8..00000000 --- a/_2016class/id2020.html +++ /dev/null @@ -1,296 +0,0 @@ ---- -title: "📡-id2020" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 07-Sep-19 07:52 PM - - - - - - - - -
-
-
-
-
- - - -
ID 2020 DESIGN WORKSHOP -MAY 21ST AND 22ND  -  -Our second #RebootingWebOfTrust Design Workshop on decentralized identity technologies will be held the weekend of May 21st and 22nd in New York City. This date was selected to follow an important digital identity policy event a...
- -
- -
- - - -
-
- - -
-
- -
- https://github.com/WebOfTrustInfo/ID2020DesignWorkshop/blob/master/topics-and-advance-readings/README.md -> 1.1 Billion people live without an officially recognized identity — This lack of recognized identification deprives them of protection, access to services, and basic rights. ID2020 is a public-private partnership dedicated to solving the challenges of identity for these people through technology. - -
- - -
-
-
-
-
- - - -
RWOT2 for the ID2020 UN Summit (May 2016). Contribute to WebOfTrustInfo/rwot2-id2020 development by creating an account on GitHub.
- -
- -
- - - -
-
- - -
-
- - - - -
-
-
-
-
- - - -
The ID2020 Alliance is a global partnership maximizing the potential of digital ID to improve lives.
- -
- -
- - - -
-
- - -
-
- - - - -
-
-
-
-
- - - -
RWOT2 for the ID2020 UN Summit (May 2016). Contribute to WebOfTrustInfo/rwot2-id2020 development by creating an account on GitHub.
- -
- -
- - - -
-
- - -
-
- - - - -
-
-
-
-
- - - -
Accenture has joined the ID2020 alliance and leverages its unique identity service platform. Learn about our digital identity with blockchain solutions.
- -
- -
- - - -
-
- - -
-
- - - - -
-
-
-
-
- - - -
PURCHASE, N.Y. and REDMOND, Wash. – December 3, 2018 – Mastercard (NYSE: MA) and Microsoft (Nasdaq “MSFT” @microsoft) today announced a strategic collaboration to improve how people manage and use their digital identity. Currently, verifying your identity online is s...
- -
- -
- - - -
-
- - -
-
- -
-
-
-
- -
-
- ⧉infominer - 08-Sep-19 11:23 AM - - - - -
-
-
-
-
-
- - - Gina Jordan - -
- - - -
Legal identity is important, without it individuals can't get access to basic services and can be put at risk. Two groups are working to bring it to all.
- -
- -
- - - -
-
- - -
-
- -
-
-
-
- -
-
- ⧉infominer - 08-Sep-19 01:39 PM - - - - - -
-
-
- diff --git a/_2016class/identity-foundation-dif.html b/_2016class/identity-foundation-dif.html deleted file mode 100644 index b244c2d0..00000000 --- a/_2016class/identity-foundation-dif.html +++ /dev/null @@ -1,145 +0,0 @@ ---- -title: "📡-identity-foundation-dif" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 07-Sep-19 08:01 PM - - - - -
-
-
-
-
- - - -
The Decentralized Identity Foundation will collaborate across industries to research personal identity solutions.
- -
- -
- - - -
-
- - -
-
- - - - -
-
-
-
-
- - - -
On any blockchain or other decentralized system
- -
- -
- - - -
-
- - -
-
- - - - - -
-
-
-
- -
-
- ⧉infominer - 08-Sep-19 03:44 PM - - - - -
-
-
-
-
- - - -
The Decentralized Identity Foundation will collaborate across industries to research personal identity solutions.
- -
- -
- - - -
-
- - -
-
- -
-
-
- diff --git a/_2016class/learning-machine.html b/_2016class/learning-machine.html deleted file mode 100644 index b1c98ebc..00000000 --- a/_2016class/learning-machine.html +++ /dev/null @@ -1,66 +0,0 @@ ---- -title: "📡-learning-machine" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 08-Sep-19 03:30 PM - - - - -
-
-
-
-
- - - -
The world needs a new system to record, house, curate, secure, and distribute evidence of learning. That new system is the global…
- -
- -
- - - -
-
- - -
-
- -
-
-
- diff --git a/_2016class/microsoft.html b/_2016class/microsoft.html deleted file mode 100644 index de12abe1..00000000 --- a/_2016class/microsoft.html +++ /dev/null @@ -1,42 +0,0 @@ ---- -title: "📡-microsoft" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 07-Sep-19 08:02 PM - - - - - -
-
-
- diff --git a/_2016class/mydata.html b/_2016class/mydata.html deleted file mode 100644 index 055ef51b..00000000 --- a/_2016class/mydata.html +++ /dev/null @@ -1,66 +0,0 @@ ---- -title: "📡-mydata" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 08-Sep-19 03:28 PM - - - - -
-
-
-
-
-
- - - Semi - -
- -
- Homepage -
- - -
- -
- - -
-
- -
-
-
- diff --git a/_2016class/pan-canadian-trust.html b/_2016class/pan-canadian-trust.html deleted file mode 100644 index 0238109f..00000000 --- a/_2016class/pan-canadian-trust.html +++ /dev/null @@ -1,145 +0,0 @@ ---- -title: "📡-pan-canadian-trust" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 08-Sep-19 03:27 PM - - - - -
-
-
-
- - -
- - -
-
- -
-
-
-
- -
-
- ⧉infominer - 08-Sep-19 04:56 PM - - - - -
-
-
-
-
- - - -
Treasury Board Identity Management Policy  and Pan-Canadian Trust FrameworkIdentity Management Policy WorkshopIncluding the History of the Pan-Canadian Trust...
- -
- -
- - - -
-
- - -
-
- - - - - - - - -
-
-
-
-
- - - -
Treasury Board Identity Management Policy  and Pan-Canadian Trust FrameworkIdentity Management Policy WorkshopIncluding the History of the Pan-Canadian Trust...
- -
- -
- - - -
-
- - -
-
- -
-
-
- diff --git a/_2016class/self-sovereign-identity.html b/_2016class/self-sovereign-identity.html deleted file mode 100644 index d39b7a6c..00000000 --- a/_2016class/self-sovereign-identity.html +++ /dev/null @@ -1,172 +0,0 @@ ---- -title: "📡-self-sovereign-identity" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 08-Sep-19 01:33 PM - - - - -
-
-
-
-
- - - -
Articles and documents associated with designing and implementing identity technology using self-sovereign identity principles - WebOfTrustInfo/self-sovereign-identity
- -
- -
- - - -
-
- - -
-
- - - - -
-
-
-
-
- - - -
Literature associated with the Fundamentals of Self-Sovereign Identity.
- -
- -
- - - -
-
- - -
-
- - - - -
-
-
-
-
- - - -
Self-Sovereign Identity  must emit directly from an individual human life, and not from within an administrative mechanism created by, for,...
- -
- -
- - -
-
- -
-
-
-
- -
-
- ⧉infominer - 08-Sep-19 03:42 PM - -
- v - -
- - - - - - -
-
-
-
-
- - - -
RWOT3 in San Francisco, California (October 2016). Contribute to WebOfTrustInfo/rwot3-sf development by creating an account on GitHub.
- -
- -
- - - -
-
- - -
-
- -
-
-
- diff --git a/_2016class/sovrin.html b/_2016class/sovrin.html deleted file mode 100644 index d4717898..00000000 --- a/_2016class/sovrin.html +++ /dev/null @@ -1,171 +0,0 @@ ---- -title: "📡-sovrin" ---- - - - - -
-
- -
- -
- -
- -
-
- -
-
- ⧉infominer - 06-Sep-19 07:55 PM - - - - -
-
-
-
-
- - - -
Guest post: Phillip J. Windley, Ph.D., Chair, Sovrin Foundation We’re excited to announce Indy, a new Hyperledger project for supporting independent identity on distributed ledgers. Indy provides tools, libraries, and reusable...
- -
- -
- - - -
-
- - -
-
- -
-
-
-
- -
-
- ⧉infominer - 07-Sep-19 08:01 PM - - - - -
-
-
-
- - -
- - - -
-
- - -
-
- -
-
-
-
- -
-
- ⧉infominer - 08-Sep-19 03:28 PM - - - - -
-
-
-
-
- - - -
Information on acquisition, funding, cap tables, investors, and executives for Respect Network. Use the PitchBook Platform to explore the full profile.
- -
- -
- - - -
-
- - -
-
- -
- Sovrin Aquired Respect Network - -
- - - -
-
-
- diff --git a/_2016class/uport.html b/_2016class/uport.html deleted file mode 100644 index 7972b39c..00000000 --- a/_2016class/uport.html +++ /dev/null @@ -1,66 +0,0 @@ ---- -title: "📡-uport" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 08-Sep-19 01:35 PM - - - - -
-
-
-
-
- - - -
Many people feel user-owned identity and data will be crucial for realizing the compelling vision of Web 3.0. uPort will act as a unique…
- -
- -
- - - -
-
- - -
-
- -
-
-
- diff --git a/_2017present/2018.html b/_2017present/2018.html deleted file mode 100644 index 8a14d1a7..00000000 --- a/_2017present/2018.html +++ /dev/null @@ -1,72 +0,0 @@ ---- -title: "2018" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 08-Sep-19 04:59 PM - - - - - - - - -
-
-
-
-
- - - -
All over the world, a growing number of organizations –from the public and private sectors –are advancing systems that establish and verify digital identities for people, devices and other entities. Yet we are still learning what “identity in a digital world”means. We...
- -
- -
- - - -
-
- - -
-
- -
-
-
- diff --git a/_2017present/did-auth.html b/_2017present/did-auth.html deleted file mode 100644 index 9690348b..00000000 --- a/_2017present/did-auth.html +++ /dev/null @@ -1,48 +0,0 @@ ---- -title: "📜-did-auth" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 31-Aug-19 03:45 AM - -
- - -
- - - - -
-
-
- diff --git a/_2017present/dkms.html b/_2017present/dkms.html deleted file mode 100644 index 1f2598f9..00000000 --- a/_2017present/dkms.html +++ /dev/null @@ -1,96 +0,0 @@ ---- -title: "📜-dkms" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 31-Aug-19 03:45 AM - -
- - -
- - - - -
-
-
-
- -
-
- ⧉infominer - 08-Sep-19 04:55 PM - - - - - - - - -
-
-
-
-
- - - -
The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has awarded Salt Lake City-based startup Evernym a $749,000 Small Business Innovation Program (SBIR) award to develop an easy-to-use, decentralized mechanism for managing public and private key...
- -
- -
- - - -
-
- - -
-
- -
-
-
- diff --git a/_2017present/erc725.html b/_2017present/erc725.html deleted file mode 100644 index 54caa569..00000000 --- a/_2017present/erc725.html +++ /dev/null @@ -1,97 +0,0 @@ ---- -title: "erc-725" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 08-Sep-19 04:58 PM - - - - -
-
-
-
-
- - - -
eip: <to be assigned> title: ERC-725 Proxy Account author: Fabian Vogelsteller (@frozeman) <fabian@ethereum.org>, Tyler Yasaka (@tyleryasaka) discussions-to: https://git...
- -
- -
- - - -
-
- - -
-
- - - - -
-
-
-
-
- - - -
The ERC-725 Alliance proposes a standard for blockchain-based identity. What is ERC-725 and why is it valuable?
- -
- -
- - - -
-
- - -
-
- -
-
-
- diff --git a/_2017present/jolocom.html b/_2017present/jolocom.html deleted file mode 100644 index 7b38f35b..00000000 --- a/_2017present/jolocom.html +++ /dev/null @@ -1,65 +0,0 @@ ---- -title: "jolocom" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 08-Sep-19 04:57 PM - - - - -
-
-
-
-
- - - -
I always believed that I should be in control of my own data and share it accordingly. Therefore in 2002 I started Jolocom in San…
- -
- -
- - - -
-
- - -
-
- -
-
-
- diff --git a/_2017present/veresone.html b/_2017present/veresone.html deleted file mode 100644 index eaef4012..00000000 --- a/_2017present/veresone.html +++ /dev/null @@ -1,65 +0,0 @@ ---- -title: "veres-one" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 08-Sep-19 04:51 PM - - - - -
-
-
-
-
- - - -
A ledger for acquiring and managing decentralized identifiers - veres-one/veres-one
- -
- -
- - - -
-
- - -
-
- -
-
-
- diff --git a/_2017present/von-bcgov.html b/_2017present/von-bcgov.html deleted file mode 100644 index 40949a06..00000000 --- a/_2017present/von-bcgov.html +++ /dev/null @@ -1,65 +0,0 @@ ---- -title: "von-bcgov" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 08-Sep-19 05:01 PM - - - - -
-
-
-
-
- - - -
Transcript of Presentation by John Jordan and Stephen Curran at HGF 2018
- -
- -
- - - -
-
- - -
-
- -
-
-
- diff --git a/_assorted/cryptography.html b/_assorted/cryptography.html deleted file mode 100644 index a216f97a..00000000 --- a/_assorted/cryptography.html +++ /dev/null @@ -1,171 +0,0 @@ ---- -title: "🔣-cryptography" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 05-Sep-19 04:53 PM - - - - -
-
-
-
-
- - - -
privacy-preserving attribute-based credentials engine - p2abcengine/p2abcengine
- -
- -
- - - -
-
- - -
-
- -
-
-
-
- -
-
- ⧉infominer - 05-Sep-19 05:43 PM - -
- http://web.archive.org/web/20180521081750/https://www.zurich.ibm.com/identity_mixer/ -IBM Identity Mixer is a cryptographic protocol suite for privacy-preserving authentication and transfer of certified attributes. -https://github.com/p2abcengine/p2abcengine/wiki/Concepts-and-features - - (edited) -
- - -
-
-
-
-
- - - -
IBM Research - Zurich, Identity Mixer
- -
- -
- - -
-
-
-
-
-
-
- - - -
privacy-preserving attribute-based credentials engine - p2abcengine/p2abcengine
- -
- -
- - - -
-
- - -
-
- -
-
-
-
- -
-
- ⧉infominer - 08-Sep-19 01:42 PM - - - - - -
- Establishing Identity WithoutCertification AuthoritiesCarl M. EllisonCyberCash, Inc - -
- - - - - - - - - - - -
-
-
- diff --git a/_assorted/id-history.html b/_assorted/id-history.html deleted file mode 100644 index b7f54f00..00000000 --- a/_assorted/id-history.html +++ /dev/null @@ -1,74 +0,0 @@ ---- -title: "🔣-id-history" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 05-Sep-19 01:55 PM - - - - -
-
-
-
-
- - - -
Indy isn’t just another blockchain identity application, but is born of a richly interwoven fabric stretching across the identity standards, cryptographic, blockchain, humanitarian, and enterprise ecosystems — similar to the network it was built to enable.
- -
- -
- - - -
-
- - -
-
- -
- an article I wrote when first learning about decentralized id - - (edited) -
- - - -
-
-
- diff --git a/_assorted/open-standards.html b/_assorted/open-standards.html deleted file mode 100644 index fd698390..00000000 --- a/_assorted/open-standards.html +++ /dev/null @@ -1,145 +0,0 @@ ---- -title: "📜-open-standards" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 31-Aug-19 03:36 AM - - - - -
-
-
-
-
-
- - - Alex - -
- - - -
Drummond Reed, Chief Trust Officer at Evernym and Sovrin Foundation Trustee, features in our first Webinar "The Story of SSI Open Standards" by giving us the background on the foundation of Self Sovereign Identity.
- -
- -
- - - -
-
- - -
-
- - - - -
-
-
-
-
-
- - - SSI Meetup - -
- - - -
Drummond Reed, Chief Trust Officer at Evernym and Sovrin Foundation Trustee, features in our first http://ssimeetup.org/ Webinar "The Story of SSI Open Stand...
- -
- -
- - - -
-
- - -
-
- - - - -
-
- -
- -
-
-
- diff --git a/_assorted/sovereignty.html b/_assorted/sovereignty.html deleted file mode 100644 index aa28831e..00000000 --- a/_assorted/sovereignty.html +++ /dev/null @@ -1,161 +0,0 @@ ---- -title: "⏲-sovereignty" ---- - - - - -
-
- -
- -
- -
-
-
- -
-
- ⧉infominer - 31-Aug-19 01:59 AM - - - - -
-
-
-
-
-
- - - Alex - -
- - - -
This presentation reflects the first installment of a wider project examining the origins and potential of self-sovereign identity. While the term "self-sovereign identity" has become commonplace within digital identity circles and in the media, what it means in theory and in...
- -
- -
- - - -
-
- - -
-
- -
- - -
- - - - -
- - -
- - - - -
- - -
- - - - -
- - -
- - - - - - - - - -
-
-
- diff --git a/_pages/archive/1970s-90s.md b/_pages/archive/1970s-90s.md deleted file mode 100644 index aaaa13c8..00000000 --- a/_pages/archive/1970s-90s.md +++ /dev/null @@ -1,11 +0,0 @@ ---- -title: "Historical Archive - 1970s-1990s" -layout: collection -permalink: "/history/archive/1970s-90s/" -collection: 1970thru90s -entries_layout: grid -classes: wide -sidebar: - nav: didhistory -share: true ---- \ No newline at end of file diff --git a/_pages/archive/2000s.md b/_pages/archive/2000s.md deleted file mode 100644 index 09b58517..00000000 --- a/_pages/archive/2000s.md +++ /dev/null @@ -1,11 +0,0 @@ ---- -title: "Historical Archive - 2000s" -layout: collection -permalink: "/history/archive/2000s/" -collection: 2000s -entries_layout: grid -classes: wide -sidebar: - nav: didhistory -share: true ---- \ No newline at end of file diff --git a/_pages/archive/2010s.md b/_pages/archive/2010s.md deleted file mode 100644 index 3105adb4..00000000 --- a/_pages/archive/2010s.md +++ /dev/null @@ -1,11 +0,0 @@ ---- -title: "Historical Archive - 2010s" -layout: collection -permalink: "/history/archive/2010s/" -collection: 2010s -entries_layout: grid -classes: wide -sidebar: - nav: didnav -share: true ---- \ No newline at end of file diff --git a/_pages/archive/2016.md b/_pages/archive/2016.md deleted file mode 100644 index 613baa70..00000000 --- a/_pages/archive/2016.md +++ /dev/null @@ -1,12 +0,0 @@ ---- -title: "Historical Archive - Class of 2016" -layout: collection -permalink: "/history/archive/2016/" -collection: 2016class -entries_layout: grid -classes: wide -sidebar: - nav: didhistory - -share: true ---- \ No newline at end of file diff --git a/_pages/archive/2017-present.md b/_pages/archive/2017-present.md deleted file mode 100644 index 2dbd12ac..00000000 --- a/_pages/archive/2017-present.md +++ /dev/null @@ -1,12 +0,0 @@ ---- -title: "Historical Archive - 2017 thru Present" -layout: collection -permalink: "/history/archive/2017-present/" -collection: 2017present -entries_layout: grid -classes: wide -sidebar: - nav: didhistory - -share: true ---- \ No newline at end of file diff --git a/_pages/archive/assorted.md b/_pages/archive/assorted.md deleted file mode 100644 index 6674f7d7..00000000 --- a/_pages/archive/assorted.md +++ /dev/null @@ -1,12 +0,0 @@ ---- -title: "Historical Archive - Assorted" -layout: collection -permalink: "/history/archive/assorted/" -collection: assorted -entries_layout: grid -classes: wide -sidebar: - nav: didhistory - -share: true ---- \ No newline at end of file diff --git a/_pages/archive/history-archive.html b/_pages/archive/history-archive.html deleted file mode 100644 index 77e7da83..00000000 --- a/_pages/archive/history-archive.html +++ /dev/null @@ -1,51 +0,0 @@ ---- -layout: archive -title: "ID History -Collaborative Curation- Archive" -description: Curators organizing information on the history of decentralized identity in the channels of a new discord server, the contents of which is periodically exported, and published, here. -permalink: /history/archive/ -author_profile: false -header: - image: /images/did-header1.png - og_image: /images/evolution.png - caption: "[DID History - Curators Collaborative](https://discord.gg/YdGEh2t)" -sidebar: - title: DID History - nav: didhistory -classes: wide -author: DIDecentral -author_profile: true -share: true ---- - - - - -If you don't feel like exploring the wonders of discordapp, the contents of that server will be periodically published on this page. - -

I've now been organizing information on the history of decentralized identity in the channels of a new discord server. I've been searching through all the places this research has been collected, from the ID Commons Wiki. to the four corners of the internet.

- -


If you don't feel like exploring the wonders of discordapp, the contents of that server will be periodically published on this page.

- -

Ultimately, the idea is to funnel this information into the identity-commons historical repository: ⇉⇉ identitywoman/identity-commons ⇇⇇

- -

Curators Archive

- -

The Evolution of Internet Identity from Prabath Siriwardena

- -{% capture written_label %}'None'{% endcapture %} - -{% for collection in site.collections %} - {% unless collection.output == false or collection.label == "posts" %} - {% capture label %}{{ collection.label }}{% endcapture %} - {% if label != written_label %} -

{{ label }}

- {% capture written_label %}{{ label }}{% endcapture %} - {% endif %} - {% endunless %} - {% for post in collection.docs %} - {% unless collection.output == false or collection.label == "posts" %} - {% include archive-single.html %} - {% endunless %} - {% endfor %} -{% endfor %} - diff --git a/_pages/redirects/1970s-90s.md b/_pages/redirects/1970s-90s.md new file mode 100644 index 00000000..a99cf1e4 --- /dev/null +++ b/_pages/redirects/1970s-90s.md @@ -0,0 +1,5 @@ +--- +title: "Historical Archive - 1970s-1990s" +permalink: "/history/archive/1970s-90s/" +redirect_to: /history/ +--- \ No newline at end of file diff --git a/_pages/redirects/2000s.md b/_pages/redirects/2000s.md new file mode 100644 index 00000000..dd8bc668 --- /dev/null +++ b/_pages/redirects/2000s.md @@ -0,0 +1,5 @@ +--- +title: "Historical Archive - 2000s" +permalink: "/history/archive/2000s/" +redirect_to: /history/2000-2009/ +--- \ No newline at end of file diff --git a/_pages/redirects/2010s.md b/_pages/redirects/2010s.md new file mode 100644 index 00000000..ab2744a3 --- /dev/null +++ b/_pages/redirects/2010s.md @@ -0,0 +1,5 @@ +--- +title: "Historical Archive - 2010s" +permalink: "/history/archive/2010s/" +redirect_to: /history/2010-2014/ +--- \ No newline at end of file diff --git a/_pages/redirects/2016.md b/_pages/redirects/2016.md new file mode 100644 index 00000000..9d1690da --- /dev/null +++ b/_pages/redirects/2016.md @@ -0,0 +1,5 @@ +--- +title: "Historical Archive - Class of 2016" +permalink: "/history/archive/2016/" +redirect_to: /history/2015-2019/ +--- \ No newline at end of file diff --git a/_pages/redirects/2017-present.md b/_pages/redirects/2017-present.md new file mode 100644 index 00000000..fecd227a --- /dev/null +++ b/_pages/redirects/2017-present.md @@ -0,0 +1,6 @@ +--- +title: "Historical Archive - 2017 thru Present" +permalink: "/history/archive/2017-present/" +redirect_to: /history/2015-2019/ + +--- \ No newline at end of file diff --git a/_pages/redirects/assorted.md b/_pages/redirects/assorted.md new file mode 100644 index 00000000..2a641925 --- /dev/null +++ b/_pages/redirects/assorted.md @@ -0,0 +1,5 @@ +--- +title: "Historical Archive - Assorted" +permalink: "/history/archive/assorted/" +redirect_to: /history/ +--- \ No newline at end of file diff --git a/_pages/redirects/history-archive.html b/_pages/redirects/history-archive.html new file mode 100644 index 00000000..6ba36764 --- /dev/null +++ b/_pages/redirects/history-archive.html @@ -0,0 +1,6 @@ +--- +title: "ID History -Collaborative Curation- Archive" +permalink: /history/archive/ +redirect_to: /history/ +--- + diff --git a/_posts/drafts/people-of-identity.md b/_posts/drafts/people-of-identity.md new file mode 100644 index 00000000..917a7c8c --- /dev/null +++ b/_posts/drafts/people-of-identity.md @@ -0,0 +1,158 @@ +--- +published: false +--- + +# people-id + +## kim-cameron + +* [Kaliya-Identity Woman (@IdentityWoman)](https://twitter.com/identitywoman/status/1135367999903473664?s=12) + > Hanging with @kim_cameron in Toronto before @IdentityNorth +![](https://pbs.twimg.com/media/D8GjKszX4AAg36e?format=jpg&name=small) + +* [Kim Cameron - Identity Laws](https://channel9.msdn.com/Blogs/scobleizer/Kim-Cameron-Identity-Laws) - video + > Kim Cameron has caused quite a stir with his Identity Blog. He came out with a whitepaper called "the Laws of Identity" which has caused quite a bit of conversation. + +* [https://identityblog.com/](https://identityblog.com/) + +## doc-searls + +* [Doc Searls (@dsearls)](https://twitter.com/dsearls) + > Free-range journalist; wrote [The Intention Economy](https://www.amazon.com/Intention-Economy-When-Customers-Charge/dp/1422158527), co-wrote @Cluetrain; blogs at [doc.searls.com](http://doc.searls.com/), [doc.blog](http://doc.blog/); runs @VRM; fellow, @ucsbcits +* [The Intention Economy: When Customers Take Charge](https://cyber.harvard.edu/events/2012/05/searls) + > Whether your interest is in preserving Internet freedom and opportunity, changing the economic power structure, new challenges for cyberlaw, or just turning the tables on privacy-violating business models and practices, there will be plenty to hear and discuss at Doc Searls' ... + +## mary-ruddy + +* [maryruddy (@maryruddy)](https://twitter.com/maryruddy/status/8000292905?s=20) + > Re @identiywoman to @davemcclure, I'm @maryruddy working on the adoption and implementation of open identity standards. + +* [Mary Ruddy | Gartner](https://www.gartner.com/analyst/44158/Mary-Ruddy) + +View Mary Ruddy's Gartner analyst profile. Gartner is the world's leading information technology research and advisory company. + +* [Mary Ruddy Archives - Identity Woman](https://identitywoman.net/tag/mary-ruddy/) + +## phil-windley + +* [Phil Windley's Technometria](http://windley.com/) +Building the Internet of My Things + +* [The Live Web](http://web.archive.org/web/20130120050943/http:/theliveweb.org/) - web.archive.org + > Putting Cloud Computing to Work for People | A Book by Phillip J. Windley + +* [http://www.windley.com/tags/identity.shtml](http://www.windley.com/tags/identity.shtml) + +## kaliya-identitywoman-young + +* [TEDxConstitutionDrive 2012 - Kaliya Hamlin - "The Need for Limited Liability Personas"](https://www.youtube.com/watch?v=Lazg31TN8FE) + > Our 2012 theme was "Identity" This year we explored Identity in a way that went beyond the standard gender/race/age lines. We see Identity as the non-genetic... + +* [The Domains of Identity & Self-Sovereign Identity](https://www.youtube.com/watch?v=U8bZ4GYFwKY) - 2018 +Kaliya Young (“The Identity Woman”) explains 16 domains of identity --variously related to government, civil society, commerce, employment, and the data brok... + +![https://cdn.discordapp.com/attachments/619682299134345229/622965172843184128/unknown.png](https://cdn.discordapp.com/attachments/619682299134345229/622965172843184128/unknown.png) + +* [Tykn.tech (@Tykn_tech)](https://twitter.com/tykn_tech/status/1187387536185942016?s=12) + > "Right now the questions need to be about what do the customers who will be early adopters of this technology really need. How do we really make this stuff interoperable?" - @IdentityWoman +* [Interview with Kaliya Young (co-founder of the Internet Identity Workshop and author of the Domains of Identity)](https://tykn.tech/interview-with-kaliya-young/) + +## natalie-smolenski + +* [Natalie Smolenski | Author, Speaker](https://www.nataliesmolenski.com/) + > Natalie Smolenski is an anthropologist leading business development for blockchain technology firm Learning Machine. She writes and speaks about identity, tech, and government. + +* [Natalie Smolenski | University of Michigan - Academia.edu](http://umich.academia.edu/NatalieSmolenski) + > Natalie Smolenski, University of Michigan, Anthropology and History Department, Graduate Student. Studies Phenomenological Psychology, Self psychology, and Anthropology of Religion. Natalie Smolenski is a psychological anthropologist and historian + +* [Truth of Your Life - About](https://www.truthofyourlife.com/about.html) + > I am a counselor specializing in individual adult psychoanalysis. My practice is currently conducted only through online correspondence. In other words, my patients and I write to each other. This... + +* [Identity and Digital Self-Sovereignty](https://medium.com/learning-machine-blog/identity-and-digital-self-sovereignty-1f3faab7d9e3) + +A New Paradigm for Sovereignty on the High Seas + + +## elizabeth-renieris + +* [https://hackylawyer.com/about](https://hackylawyer.com/about) + > Elizabeth M. Renieris (@hackylawyER) is the founder of the hackylawyER consultancy focused on law and policy engineering. She is also an incoming fellow at the Berkman Klein Center for Internet & Society at Harvard. An entrepreneurial attorney, policy advisor, and strategic consultant who is passionate about the impact of emerging technologies on privacy, identity, civil society, and collective consciousness, Elizabeth frequently advises on the same. Her core areas of expertise include cross-border data protection and privacy (CIPP/E, CIPP/US), digital and self-sovereign identity, blockchain and distributed ledger technologies, and artificial intelligence and machine learning systems. + +* [MIT Legal Forum Elizabeth Renieris Preview of Data Protection Session](https://www.youtube.com/watch?v=6UDZR_V6_vE) + +## marta-piekarska + +* [Meet Hyperledger’s New Director of Ecosystem Development – Hyp...](https://www.hyperledger.org/blog/2017/05/18/meet-hyperledgers-new-director-of-ecosystems) + > We’re thrilled to announce that we’ve recently hired Marta Piekarska as our Director of Ecosystems. Please join us in welcoming her to the team. Previously, Marta worked for Blockstream as... + +* [Blockchain Workshop Position Statement - Marta Piekarska](https://www.w3.org/2016/04/blockchain-workshop/interest/geater-piekarska.html) + > I am a Bachelor of Electrical and Computer Engineering from Warsaw University of Technology and a double Master from Computer Science and Informatics at Technical University of Berlin and Warsaw University of Technology. I did my thesis on Voice Encryption on Android Platform and GPU-aided Payload Delivery on Linux Kernel. Currently finishing my PhD thesis on User-Centric Privacy on Mobile Devices, while working for one of the hottest Silicon Valley startups, Blockstream as their Security Architect. Previously, I was the Lead Architect at Deutsche Telekom on the Future of Mobile Privacy, a collaboration with Mozilla and Deutsche Telekom improving Firefox OS. + +* [Marta Piekarska (@mpiekarska8)](https://twitter.com/mpiekarska8) +Blockchain enthusiasts, Hyperledger evangelist, Security and Privacy gal. + +* [marta piekarska - YouTube](https://www.youtube.com/results?search_query=marta+piekarska) + +## manu-sporny + + +* [https://www.sbir.gov/sbirsearch/detail/1241085](https://www.sbir.gov/sbirsearch/detail/1241085) + +* [http://manu.sporny.org/](http://manu.sporny.org/) + +* [https://digitalbazaar.com](https://digitalbazaar.com/) + +* [Manu Sporny (@manusporny)](https://twitter.com/manusporny) + > Founder/CEO Digital Bazaar; payments, identity & blockchain. Kickstarted Web Payments, Verifiable Credentials, Decentralized Identifiers, and JSON-LD at W3C. + +## katryna-dow + +* [Katryna Dow - About](https://katrynadow.me/about/) + > Katryna Dow is the CEO and founder of Meeco, the global tech company that launched a world leading data independence platform for people. Meeco guarantees individuals choice and data sovereignty ri… + +* [Katryna Dow (@katrynadow)](https://twitter.com/katrynadow) + > Founder+CEO @meeco_me #APIofMe #Data #Privacy #SharedValue #Distributed #Blockchain #DigitalRights #Identity #SSID #HODL #Coffee What's next? + +* [http://www.linkedin.com/in/katrynadow](http://www.linkedin.com/in/katrynadow) + + +## pamela-dingle + +* [Pamela Dingle (@pamelarosiedee)](https://twitter.com/pamelarosiedee) + > All your $5 wrenches are belong to me. Director of Identity Standards @ MSFT. Paranoid Optimist. (she/)Her opinions. See #ViewFromtheWindowSeat + +* [Eternally Optimistic](http://eternallyoptimistic.com/) +Adventures of an Eternal Optimist + +* [Pamela Dingle - Identiverse 2019](https://identiverse.com/speaker/pamela-dingle/) + +* [Pamela Dingle](https://www.kuppingercole.com/speakers/587) - Kuppinger Cole + > Pamela Dingle has 15 years of experience in implementation and architecture of identity standards for web access management, provisioning, and federation. As Director of Identity Standards at Microsoft, Pamela leads a team of experts dedicated to collaboration within the indu... + +## Katryna Dow + +* [FinTech Insider on Tour @ Money20/20 Europe 2018: Katryna Dow, CEO Meeco](https://www.youtube.com/watch?v=q3yzXgesKJY) + > Sam sits down with Katryna Dow from Meeco to discuss data and taking control. + +* [Katryna Dow | FemTech Leaders](http://web.archive.org/web/20151122105350/http:/www.femtechleaders.com/oceania/katryna-dow-2/) - 2015 + +The Voices & View from FemTech Leaders + +## Drummond Reed + +* [XRD Begins](http://www.equalsdrummond.name/?p=172) - Drummond Reed + > For most people, watching the evolution of technical specifications is like watching a glacier move. To those of us living the process, though, there can be a great deal of drama to it — in f… + +* [Drummond Reed (@drummondreed)](https://twitter.com/drummondreed) + + +## Christopher Allen + +![](https://cdn.discordapp.com/attachments/620045023496503299/620045043255869451/unknown.png) + +* [The Four Kinds of Privacy](http://www.lifewithalacrity.com/2015/04/the-four-kinds-of-privacy.html) - April 20 2015 + +* [The Path to Self Sovereign Identity](http://www.lifewithalacrity.com/2016/04/the-path-to-self-soverereign-identity.html) + +* [ChristopherA/info](https://christophera.info/) + > Simple Identity Website for Christopher Allen. diff --git a/_posts/history/2019-03-04-history.md b/_posts/history/2019-03-04-history.md deleted file mode 100644 index 4c3be59d..00000000 --- a/_posts/history/2019-03-04-history.md +++ /dev/null @@ -1,309 +0,0 @@ ---- -layout: single -title: "History Surrounding Self-Sovereign, Decentralized, Identity." -description: "Starting with David Chaum in the 80s, PGP, the International Planetwork Conference, Agenda for Sustainable Development, GDPR, and Bitcoin to the Present." -header: - image: "/images/history-user-centric-data-identity.png" - caption: "2011 - [napsterization.org - Who Stewards the Personal Data Question? Org Chart](http://napsterization.org/stories/archives/000769.html)" -canonical_url: '/history/' -redirect_from: /history -permalink: /history/ -cannonical_url: https://decentralized-id.com/history/ -categories: ["History"] -tags: ["Index"] -author: Infominer -author_profile: true -sidebar: - nav: didhistory -classes: wide -published: true ---- - -## Update - -I've been studying DID history over the course of a year, for a few different projects. During the course of that time, I had the opportunity to learn quite a lot from Kaliya @IdentityWoman, who helped fill in some of the gaps (because she was actually there). - -### [ID History Discord Chat](https://discord.gg/jp3zMgX) - -[![](/images/idcommons-history-icon.jpg)](https://discord.gg/jp3zMgX){: .align-left} -I've now been organizing information on the history of decentralized identity in the channels of a new discord server. I've been searching through all the places this research has been collected, from the [ID Commons Wiki](http://wiki.idcommons.net/History), to the four corners of the internet. - -If you don't feel like exploring the wonders of [discordapp](https://discord.gg/jp3zMgX), the contents of that server will be periodically published here: - -⇉⇉ [**Collab-Curation Historical Archive**](/history/archive/) ⇇⇇ -{: .text-center} - -### Identity Commons - -Ultimately, the idea is to funnel this information into the identity-commons historical repository: - ->Here is a community timeline that was created at IIW in 2011 & renewed at IIW 28 in 2019 ->You are welcome to add more to the timeline and links to the things referenced. - -⇉⇉ **identitywoman/identity-commons** ⇇⇇ -{: .text-center} - -## Losing Control Over our Personal Information - -![](/images/chaum-security-without-identification-big-brother.png) - -* [Security without Identification: Transaction Systems to Make Big Brother Obsolete](https://www.cs.ru.nl/~jhh/pub/secsem/chaum1985bigbrother.pdf) - David Chaum, 1985. - * The large-scale automated transaction systems of the near future can be designed to protect the privacy and maintain the security of both individuals and organizations. - > Computerization is robbing individuals of the ability to monitor and control the ways information about them is used. As organizations in both the private and the public sectors routinely exchange such informa- tion, individ.uals have no way of knowing if the information is inaccurate, obsolete, or otherwise inap- propriate. The foundation is being laid for a dossier society, in which computers could be used to infer individuals’ life-styles, habits, whereabouts, and asso- ciations from data collected in ordinary consumer transactions. Uncertainty about whether data will re- main secure against abuse by those maintaining or tapping it can have a “chilling effect,” causing people to alter their observable activities. As computerization becomes mclre pervasive, the potential for these prob- lems will grow dramatically. - -* [Information Technology and Dataveillance](http://www.rogerclarke.com/DV/CACM88.html) - Roger Clarke, 1988. - > The concept of 'dataveillance' is introduced, and defined as the systematic monitoring of people's actions or communications through the application of information technology. Dataveillance's origins are traced, and an explanation provided as to why it is becoming the dominant means of monitoring individuals and populations. - > - > The paper identifies, classifies and describes the various dataveillance techniques. It then examines the benefits, and especially the dangers, arising from dataveillance. It considers the intrinsic and extrinsic controls that act to keep the application of dataveillance under control, and suggests some appropriate policy measures. - -## PGP - Web of Trust - -[![](https://i.imgur.com/sMV9PE4.png)](https://www.philzimmermann.com/EN/essays/WhyIWrotePGP.html) - -Phil [Zimmerman creates PGP](https://www.philzimmermann.com/EN/essays/WhyIWrotePGP.html), 1991. - * First time strong encryption widely available to general public. - * PGP’s web-of-trust provide early foundation for SSI. However, PGP is known as difficult to use and failed to reach wide adoption for personal communication\identification. - -* [PGP -Web of Trust -linux.com](https://www.linux.com/learn/pgp-web-trust-core-concepts-behind-trusted-communication) - -## Evolution of Identity -[wso2](https://wso2.com) - -
The Evolution of Internet Identity from Prabath Siriwardena
- -## International Planetwork Conference - -![](https://i.imgur.com/RfKqBP9.png) - -The first International [Planetwork](https://planetwork.net/about.html) Conference - Global Ecology and Information Technology, San Francisco, May 2000. - -The community that developed around the Planetwork conferences, including [Linktank](https://planetwork.net/linktank.html), form an intellectual foundation for what became Self Sovereign Identity. - -## XNS Public Trust Organization - -![](https://i.imgur.com/BNpzEkE.png) - -XNS Public Trust Organization. Founded in July 2000, shortly after Planetwork Conference. -[xdi.org - History](http://xdi.org/?page_id=13) - -> to promote the concept of individuals owning their own digital identity and data based on a nascent technology being produced by two Technical Committees at OASIS: XRI (Extensible Resource Identifier) and XDI (Extensible Data Interchange). - -## Augmented Social Network - -![](https://i.imgur.com/B5Bja7O.png) - -* *[The Augmented Social Network](http://asn.planetwork.net/): Building Identity and Trust into the Next-Generation Internet,* presented at the June 2003 Planetwork conference and published in [First Monday](http://www.uic.edu/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/1068/988) the Peer-Reviewed Journal on the Internet 8/4/03. - >"[This paper](http://asn.planetwork.net/asn-archive/AugmentedSocialNetwork.pdf) proposes the creation of an Augmented Social Network (ASN) that would build identity and trust into the architecture of the Internet" - -## IDCommons - -![](https://i.imgur.com/AOw2oXx.png) - -The [Identity Commons](http://wiki.idcommons.net/History) (2001-Present) was originally created by Owen Davis and Andrew Nelson in 2001 to evangelize the creation of a decentralized user-centric identity infrastructure and to address the resulting social trust issues. - -* Kaliya Young began working with Identity Commons following June 2004 Planetwork Conference. Working with Social Physics team, led by Paul Trevithick and Mary Ruddy, and included Doc Searls and Phil Windley, they wove a community around user-centric id that came together at the Digital Identity World conference, of 2004. - -Resuling in a mailing list: -* [community@lists.idcommons.net](https://lists.idcommons.net/lists/info/community) - > The general community mailing list for Identity Commons. The list is also called the Identity Gang mailing list and was formerly idworkshop at googlegroups. - -## Identity Gang - -![](https://i.imgur.com/xbfK3EF.png) - -* [The original identity gang](https://www.idcommons.org/the-original-identity-gang/) - Doc Searls invited identity leaders to appear on the Gilmore Gang podcast, where the name "Identity Gang" was coined. - - At the encouragement of Doc Searls, a number of people began blogging about user-centric identity. - - * [The Gillmor Gang - December 31, 2004](http://web.archive.org/web/20130729213722id_/https://itc.conversationsnetwork.org/shows/detail394.html) Featuring: - > * Steve Gillmor, contributing editor, ZDNet - > * Doc Searls, senior editor, Linux Journal - > * Craig Burton, founding member, Novell; co-founder, The Burton Group - > * Kim Cameron, Microsoft's Architect of Identity and Access Systems - > * Dave Winer, father of RSS and more - > * Marc Canter, Broadband Mechanics - > * Bryan Field-Elliot, CTO, Ping Identity Corporation - > * Phil Windley, Brigham Young University - > * Drummond Reed, CTO, Cordance - - - - "Their most important contribution may have been the creation, in association with the Identity Gang, of the Internet Identity Workshop (2005-Present) working group." -[*Path to Self Sovereign Identity*](http://www.lifewithalacrity.com/2016/04/the-path-to-self-soverereign-identity.html) - -* Paul Trevithick created the [Identity Gang Lexicon](https://web.archive.org/web/20080916112039/wiki.idcommons.net/Lexicon) -2005. - - -### Kim Cameron - Laws of Identity - -[![](https://i.imgur.com/570mUhZ.png)](https://identityblog.com) - -* [Kim Cameron Identity Laws](https://channel9.msdn.com/Blogs/scobleizer/Kim-Cameron-Identity-Laws) [[**x**](https://www.identityblog.com/?m=200412)] - * [Laws of Identity - Whitepaper](https://web.archive.org/web/20080814163727/http://www.identityblog.com/stories/2004/12/09/thelaws.html) - - - -## Internet Identity Workshop -![](https://www.yubico.com/wp-content/uploads/2013/10/IIW-blog.jpg) - - -In 2005, [Kaliya Young](https://identitywoman.net/)[[**T**](https://twitter.com/IdentityWoman)], [Phil Windley](https://windley.com)[[**T**](https://twitter.com/windley)][[**V**](https://vimeo.com/windley)][[**G**](https://github.com/windley)], [Drummond Reed](https://www.evernym.com/)[[**T**](https://twitter.com/drummondreed)][[**B**](https://equalsdrummond.name/)], and [Doc Searls](http://blogs.harvard.edu/doc/)[[**T**](https://twitter.com/dsearls)][[**B**](https://blogs.harvard.edu/doc)] hosted the first [Internet Identity Workshop](http://www.internetidentityworkshop.com/)(IIW)[[**T**](https://twitter.com/idworkshop)] in Berkeley to discuss "architectural and governance proposals for Internet-wide identity services and their underlying philosophies." -[Announcing IIW 2005](https://identitywoman.net/announcing-the-internet-identity-workshop-iiw2005/) - -* [unconference.net](http://unconference.net/) - -Since then, the IIW has met bi-anually, actively supporting the development of the identity software-ecosystem, including [OpenID](http://wiki.openid.net)('05), OpenID [2.0](http://wiki.openid.net/w/page/12995215/OpenID%20Authentication%202-1)('06), [OAuth](https://en.wikipedia.org/wiki/OAuth)('10), [FIDO](https://fidoalliance.org/)('13) and OpenID [Connect](https://en.wikipedia.org/wiki/OpenID_Connect)('14). - ---- - -* Markus Sabadello began work on [Project Danube](https://web.archive.org/web/20101221105543/http://projectdanube.org/), on the creation of an XDI based personal data store, always under the control of its users, as early as 2010. - ---- - -> Founded in 2011, the [Personal Data Ecosystem](https://www.idcommons.org/working-groups/personal-data-ecosystem-consortium/) Consortium advocates a user-centric approach to managing personal data - -![](https://i.imgur.com/wuvo5BG.png) - -IIW participants began the effort towards creating a truly [user centric identity](https://www.networkworld.com/article/2304596/access-control/what-is--user-centric--identity-.html), in contrast to identity solutions whos focus has been fulfilling the needs of the enterprise. The pioneers of decentralized identity have long struggled against the "[identity silo paradox](https://www.zdnet.com/article/the-identity-silo-paradox/)," that while the *identerati* continually work on solutions to break up these silos, the enterprise has had a strong financial incentive to retain them. - -* [What is IIW?](https://vimeo.com/173562225) [[**ϟ**](https://vimeo.com/207961532)][[**ϟ**](https://www.prweb.com/releases/identitymovie/iiw2017/prweb14161721.htm)] short film about the [identirati](https://www.zdnet.com/article/the-identity-silo-paradox/)[[**ϟ**](https://www.forgerock.com/blog/who-are-the-identerati)] (a term for those working on identity standards for the purpose of breaking up id data silos, dating back to at least 2006). -* [*What is Sovereign Source Authority?*](https://www.moxytongue.com/2012/02/what-is-sovereign-source-authority.html) leads to the term Self Sovereign Identity. -* [Windhover Principles for Digital Identity](https://www.tokencommons.org/Windhover-Principles-for-Digital-Identity-Trust-Data.html) - * [HubID First to Deploy Windhover Principles and Framework for Digital Identity, Trust and Open Data](https://hubculture.com/hubs/47/news/689/) -* [WEForum - Personal Data: The Emergence of a New Asset Class](http://www3.weforum.org/docs/WEF_ITTC_PersonalDataNewAsset_Report_2011.pdf) - -## Respect Network - -[Around 2011](https://web.archive.org/web/20121004035433/http://respectnetwork.com/respect-trust-framework), Respect Network began working to promote the idea of personal data clouds for the protection of personal information: - -* Respect Network is the world's first trusted personal data network that will let customers and companies connect over direct, personal channels that are always under the customer's control. Every member of the Respect Network agrees to the award-winning Respect Trust Framework so customers can be sure that the privacy and security of their personal data will always be respected. - -> The foundation of the Respect Network is the Respect Trust Framework, which was listed with the Open Identity Exchange in May 2011 and honored with the Privacy Award at the 2011 European Identity Conference. This is the umbrella legal contract to which every member (person or business) of the Respect Network agrees when they join the network - > - > * The Respect Trust Framework establishes a set of five simple yet universal principles governing the control and protection of identity and personal data­­—principles that operate at a higher level than conventional privacy policies. These five principles can be summed up by “the 5 p’s” in one sentence: A promise of permission, protection, portability, and proof. - - -## W3C Credentials Community Group -[8/14](https://www.w3.org/community/credentials/charter-20140808/) The [Credentials Community Group](https://www.w3.org/community/credentials/)[[**ϟ**](https://w3c-ccg.github.io/)] forms, hosted by [World Wide Web Consortium(W3C)](https://www.w3.org/)[[**T**](https://twitter.com/w3c)] [[**G**](https://github.com/w3c)] : "to forge a path for a secure, decentralized system of credentials that would empower both individual people and organizations on the Web to store, transmit, and receive digitally verifiable proof of qualifications and achievements." —proposed by [Manu Sporney](http://manu.sporny.org/)[[**T**](https://twitter.com/manusporny)] (of [digitalbazaar.com](https://digitalbazaar.com/)) - -* [Consensys begins work on uPort](https://medium.com/@ConsenSys/identity-is-defined-in-merriam-s-dictionary-as-who-someone-is-a3d6a69f5fa4) -2015 - -## Bitnation - -9\15 [Bitnation](https://bitnation.co/) "seeks to establish the concept of '*world citizenship*' via a bitcoin based identity, offering '[*Blockchain Emergency IDs*](https://refugees.bitnation.co/)' to refugees. [[**>**](#Bitcoin)] - -## United Nations Sustainable Development Goals - - - -The same month, the UN unveiled it's *[Agenda for Sustainable Development](https://sustainabledevelopment.un.org/post2015/transformingourworld)*: - >* Promote peaceful and inclusive societies for sustainable development, provide access to justice for all and build effective, accountable and inclusive institutions at all levels - >* Substantially reduce corruption and bribery in all their forms -Develop effective, accountable and transparent institutions at all levels - >* **By 2030, [provide legal identity for all](https://sustainabledevelopment.un.org/sdg16), including birth registration** - >* Ensure public access to information and protect fundamental freedoms, in accordance with national legislation and international agreements—(*emphasis mine*) -* [DIGITAL IDENTITY AS A BASIC HUMAN RIGHT](https://impakter.com/digital-identity-basic-human-right/) -* [AID:Tech](https://aid.technology) [[**T**]](https://twitter.com/aidtechnology) — "is a voucher and digital identity solution for refugees. A digital record of a person's identity is stored on a smart card, along with various additional information. Blockchain technology is used to distribute all resources in a highly traceable manner." (another early example of blockchain for humanitarian aide) -* [World Bank - Digital IDs for Development](http://www.worldbank.org/en/events/2015/06/23/digital-ids-for-development) -* [Additional Info on Blockchain and the United Nations](https://infominer.id/research/UnitedNations.html) - - -## Rebooting the Web Of Trust - -In relation to SSI, '[Web of Trust](https://en.wikipedia.org/wiki/Web_of_trust)' is a network of relationships that attest to our identity claims. *Each party attesting to your identity information becomes a strand in your web of trust.* - -The first [Rebooting Web of Trust](http://www.WebOfTrust.info)(RWoT) workshop was held during [November 2015](https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust); attracting the likes of Vitalik Buterin, Peter Todd, Gregory Maxwell, Joel Dietz, Christopher Allen, and Jon Callas, [according to Andreas Antonopolis](https://news.bitcoin.com/andreas-antonopoulos-case-reputation-identity-systems/). - -[That workshop](https://github.com/WebOfTrustInfo/), produced 5 technical white papers:\ - [5 WoT-usecases](https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust/blob/master/final-documents/satisfying-real-world-use-cases.pdf) • [Decentralized PKI](https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust/blob/master/final-documents/dpki.pdf) • [Smart Signatures](https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust/blob/master/final-documents/smart-signatures.pdf) • [Creating a New World of Trust](https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust/blob/master/final-documents/whats-the-next-step.pdf) - -* [Opportunities Created by the Web of Trust for Controlling and Leveraging Personal Data](https://github.com/WebOfTrustInfo/rwot1-sf/blob/master/final-documents/satisfying-real-world-use-cases.pdf) - > "Decentralized systems that are engineered to prevent concentrating power as they grow avoid this. They can in fact increase their credibility as more users provide their assessments as input. Protocols and structures that are distributed and self-sovereign also offer significantly improved robustness, portability, and versatility than conventional centralized or escrowed processes — especially when combined with secure cryptography." - -* [Rebranding the Web of Trust](https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust/blob/master/final-documents/rebranding-web-of-trust.pdf) - >The Web of Trust is a buzzword for a new model of decentralized self-sovereign identity. It’s a phrase that dates back almost twenty-five years, the classic definition derives from PGP [...] the vibrant blockchain community is also drawing new attention to the concept we aim to reboot it. - - -At the end of 2015, the Department of Homeland Security announced that it had funds available for the development of [Blockchain Security and Identity Verification Technologies](https://blog.aniljohn.com/2015/12/federal-gov-funds-for-identity-r-and-d.html). - -## Evernym - -![](https://untangled.world/wp-content/uploads/2017/08/everynym-logo-1400x357.png) - -* [Evernym](https://www.evernym.com/)[[**T**](https://twitter.com/evernym)] originally created the Sovrin codebase, founded in 2013. -* [Identity System Essentials](https://www.evernym.com/wp-content/uploads/2017/02/Identity-System-Essentials.pdf) 3/16 (Original Evernym Identity WP submitted to ID2020\RWoT workshop) -* [Outlier Ventures invests in, becomes strategic partner of Evernym](https://coinreport.net/outlier-ventures-invests-becomes-strategic-partner-evernym/)[[**ϟ**](https://outlierventures.io/portfolio/evernym/)] -* [The Three Models of Digital Identity Relationships — How self-sovereign identity (SSI) is different, and why it’s better](https://medium.com/evernym/the-three-models-of-digital-identity-relationships-ca0727cb5186) - - -## ID2020 and the GDPR - -![](https://imgur.com/ymviAssl.png) - -* [4/16](https://edps.europa.eu/data-protection/data-protection/legislation/history-general-data-protection-regulation_en) the EU adopted the GDPR to be enacted as law May 2018. -* [Projects aim for legal identity for everyone - ID2020, ID4D aim to bring legal, binding, digital IDs to all world's citizens](https://www.secureidnews.com/news-item/projects-aims-for-legal-identity-for-everyone/) -* The second RWoT workshop ran in conjunction with the UN's [ID2020](https://id2020.org/) Summit in New York that [May](https://press.pwc.com/News-releases/id2020-to-kick-start-digital-identity-summit-at-un-with-pwc-support./s/9fe11be5-cbd8-486b-b4d2-d798f486d0f2); clearly a significant time for decentralized identity: - >1.1 Billion people live without an officially recognized identity — This lack of recognized identification deprives them of protection, access to services, and basic rights. ID2020 is a public-private partnership dedicated to solving the challenges of identity for these people through technology. - id2020.org -* [Identity Crisis: Clear Identity through Correlation](https://github.com/WebOfTrustInfo/ID2020DesignWorkshop/blob/master/final-documents/identity-crisis.pdf) -* [Christopher Allen](http://www.lifewithalacrity.com/)[[**info**](https://christophera.info/)] details the overarching history of internet idenitity standards in his seminal work (submitted to ID2020\RWoT workshop): - * **[The Path to Self-Soverereign Identity](http://www.lifewithalacrity.com/2016/04/the-path-to-self-soverereign-identity.html)**[[**ϟ**](https://www.coindesk.com/path-self-sovereign-identity/amp/)] details the history of identity standards leading up to self-sovereign and details the 10 principles of self-sovereign identity. - > I am part of the team putting together the first ID2020 Summit on Digital Identity at the United Nations -* [Identity System Essentials](https://www.evernym.com/wp-content/uploads/2017/02/Identity-System-Essentials.pdf) 3/16 (Original Evernym Identity WP also submitted to ID2020\RWoT workshop) - - -Evident from the other [whitepapers](https://github.com/WebOfTrustInfo/ID2020DesignWorkshop/blob/master/topics-and-advance-readings/README.md) submitted to the second RWoT Workshop, the DID identifier had begun to emerge: -* [Decentralized Identifiers (DIDs) and Decentralized Identity Management (DIDM)](https://github.com/WebOfTrustInfo/ID2020DesignWorkshop/blob/master/topics-and-advance-readings/DID-Whitepaper.md) - >"Decentralized Identifiers (DID) stored in a permissioned blockchain enable principals to directly control their own identities with cryptographic proofs and secure, addressable network endpoints. DIDs further enable a Decentralized Identity Management (DIDM) infrastructure that will empower people and organizations to securely and confidentially manage and assert their identities." -* [Requirements for DIDs](https://github.com/WebOfTrustInfo/ID2020DesignWorkshop/blob/master/final-documents/requirements-for-dids.pdf) - >"Respect Network is conducting a research project for the [U.S. Department of Homeland Security](https://bravenewcoin.com/insights/u-s-department-of-homeland-security-funds-four-blockchain-companies-developing-new-cyber-security-technology), HSHQDC-16-C-00061, to analyze the applicability of blockchain technologies to a decentralized identifier system. Our thesis is that blockchains, or more generically distributed ledgers, are a potentially powerful new tool for “identity roots” — the starting points for an Internet identity. However “blockchain identity” may not fully address the core security and privacy principles needed in a complete identity system. In this case DIDs — Decentralized Identifiers rooted on a distributed ledger — may end up being a foundational building block for higher level identity management solutions. - - -## Late 2016 - -* [News Release: DHS S&T Awards $1.3 Million to Small Businesses for Cyber Security Research and Development](https://www.dhs.gov/science-and-technology/news/2016/08/12/news-release-dhs-st-awards-13-million-small-businesses-cyber) -2016 - * [Applying Blockchain to Decentralized Identity](https://www.sbir.gov/sbirsearch/detail/1241097) - > Respect Network will research and develop a decentralized registry and discovery service for Decentralized Identifiers (DIDs) to integrate with the public blockchain. DIDs will allow principals to directly control their own identities with cryptographic proofs and secure, addressable network endpoints. DIDs will enable a Decentralized Identity Management (DIDM) infrastructure that will empower people and organizations to securely and confidentially manage and assert their identities. Open standards and established industry protocols will permit principals to selectively disclose identity claims, and to manage their privacy and digital relationships. Respect Network's thesis is that the combination of DIDs and DIDM architecture, using public and/or private blockchains as "identity backbones", can meet traditional information security principles of confidentiality, integrity, availability, non-repudiation and provenance. Further, our approach applies privacy-by-design principles, including user control, selective disclosure of information and pseudonymity. - * [Credentials on Public/Private Linked Ledgers](https://www.sbir.gov/sbirsearch/detail/1241085) - > A wide variety of applications could benefit from combining identity management technology with decentralized ledgers (aka blockchains). However, not every application uses the same data or requires the same consensus or authorization models. While a single solution is unlikely, we assert each application could benefit from a standard, configurable, decentralized ledger with flexible semantics. We will study the feasibility of this concept by building a proof-of-concept Linked Data ledger format and architecture. - - -* [Pan Canadian Trust Framework](https://diacc.ca/pan-canadian-trust-framework/) - 2016 - >The Pan-Canadian Trust Framework (PCTF) enables Canada’s full and secure participation in the global digital economy through economic sector innovation and the enablement of modernized digital service delivery. The PCTF supports open government principles. - -* Phil Windley [announces formation of the Sovrin Foundation](http://www.windley.com/archives/2016/09/announcing_the_sovrin_foundation.shtml) charged with maintaining its, public-permissioned, distributed ledger for identity, donated by Evernym -September 2016. - >Sovrin Foundation is a private-sector, international non-profit established to govern a global public utility for self-sovereign identity. - -* MyData founded to give structure to an international movement, promoting the rights of individuals to have control over our personal information - [August, 2016](http://mydata2016.org/) - -* Learning Machine working with MIT on an [open standard](https://medium.com/learning-machine-blog/blockchain-credentials-b4cf5d02bbb7) for blockchain credentials for the past year. Led by Chris Jagers, Kim Hamilton Duffy, and John Papinchak their Blockcerts prototype was released in October 2016. - - -## Identity Foundation - -On May 22 at Consensus 2017 the formation of the Decentralized Identity Foundation (DIF) [was announced](https://www.ethnews.com/DecentralizedIDentity-foundation-announces-formation-at-consensus-2017): -* [Conensus 2017 - Building an Foundation for Decentralized Identity](https://www.youtube.com/watch?v=l5laRZfn8AI) (video) -* [Decentralized Identity Foundation Grows To 56 Members In Our First Year](https://medium.com/DecentralizedIDentity/DecentralizedIDentity-foundation-grows-to-56-members-in-our-first-year-3ec117e811d8) - - -## Standards History -![](https://i.imgur.com/XtZQg0j.png) - -![](https://i.imgur.com/FBe3S0w.png) - -![](https://i.imgur.com/5R51G4Y.png) - -![](https://i.imgur.com/xmWkc4l.png) - - -The Story of Open SSI Standards - Drummond Reed/Evernym SSIMeetup.org [**ϟ**] - - -## Resources - -* [ID History Discord Chat](https://discord.gg/jp3zMgX) -* [identitywoman/identity-commons](https://github.com/Identitywoman/identity-commons/blob/master/ID-History.md) -* [A Brief History of Digital Identity](https://medium.com/humanizing-the-singularity/a-brief-history-of-digital-identity-9d6a773bf9f5) -* [A Step Back in Time: The History and Evolution of Digital Identity](https://www.iotevolutionworld.com/iot/articles/410328-step-back-time-history-evolution-digital-identity.htm) -* [Identity Commons-History](http://wiki.idcommons.net/History) -* [IIW-Wiki](https://iiw.idcommons.net/Main_Page) -* [IIW - Past Workshops](https://internetidentityworkshop.com/past-workshops/) -* [identitywoman.net](https://identitywoman.net/) -* [windley.com/tags/identity](http://www.windley.com/tags/identity.shtml) -* [WoTinfo](https://github.com/WebOfTrustInfo/) -* [The Path to Self Sovereign Identity](http://www.lifewithalacrity.com/2016/04/the-path-to-self-soverereign-identity.html) diff --git a/_posts/history/2019-03-04-pre-history-and-resources.md b/_posts/history/2019-03-04-pre-history-and-resources.md new file mode 100644 index 00000000..48627a1a --- /dev/null +++ b/_posts/history/2019-03-04-pre-history-and-resources.md @@ -0,0 +1,114 @@ +--- +layout: single +title: "Resources & Pre-History - Decentralized Self-Sovereign Identity." +description: "Starting with David Chaum in the 80s, PGP, the International Planetwork Conference, Agenda for Sustainable Development, GDPR, and Bitcoin to the Present." +permalink: /history/ +cannonical_url: https://decentralized-id.com/history/ +categories: ["History"] +tags: ["Index"] +author: Infominer +author_profile: true +last_modified_at: 2020-01-04T13:22:33-23:00 +sidebar: + nav: didhistory +classes: wide +--- + +**Ultimately, the idea is to put this all into some data-structure, and funnel this information into the identity-commons historical repository:** + +[*Here is a community timeline that was created at IIW in 2011 & renewed at IIW 28 in 2019*](https://github.com/Identitywoman/identity-commons/blob/master/ID-History.md) + +For now, this is a reasonable solution. + +## Category Index + +These pages are loosely categorized by year and era. The date ranges, are somewhat arbitrary and not perfectly adhered to, and the headings are not perfect descriptors of those date ranges. Rather those are some major themes occuring within that time period. + +* [User Centric Identity - 2000-2009](/history/2000-2009/) +* [Personal Data Ecosystem - 2010-2014](/history/2010-2014) +* [Blockchain Identity - 2015-2019](/history/2015-2019/) + +## Pre-History + +* [Sovereignty in Historical Context for Self-Sovereign Identity](https://ssimeetup.org/sovereignty-historical-context-self-sovereign-identity-natalie-smolenski-webinar-18/) - [video](https://www.youtube.com/watch?v=eVDE_svZJD0) + > This presentation reflects the first installment of a wider project examining the origins and potential of self-sovereign identity. While the term "self-sovereign identity" has become commonplace within digital identity circles and in the media, what it means in theory and in... +* [A short history of PKI](https://www.telekom.hu/static-tr/sw/file/PKI_tortenete_en.pdf) + > The history of the research-development activity of PKI dates back to the renewal of postal and telegraph services at the end of the last century. The modernization was initiated by G·bor Baross, Minister of Commerce. In 1891 PKI was founded by a decree issued by the minister and was the second Post Office Research Station to open in Europe with the task of testing materials used in telegraph and telephone networks to introduce advanced equipment and provide high level services. Its staff included dr. Gyˆrgy BÈkÈsy, a physicist who worked for twenty years for the institute to earn undying merits in acoustics and ultimately to deserve the Nobel prize. In appreciation of its past the Institute, now the development centre of Magyar Telekom, Hungaryís leading telecommunications company, uses the abbreviation of its original name. + > + > The Institute in 1891 was operating in the Main Office Building of the Hungarian Royal Post Office in P·rizsi Street, then in 1903 moved to the building of a telephone exchange in Nagymező utca. The Institute in 1912 moved in the building in Zombori utca where it operated for 88 years. Network planning activities from 1994 to 2000 were however carried out at a different place, in the former building of the Postal Network Planning Directorate, in RÛna utca. +* [Some Experience with File Transfer](https://tools.ietf.org/html/rfc269) - ?? +* ["VERY DISTANT" HOST INTERFACE](https://tools.ietf.org/html/rfc263) - ?? +* [IAB Recommended Policy on Distributing Internet Identifier Assignment](https://tools.ietf.org/html/rfc1174) and IAB Recommended Policy Change to Internet "Connected" Status +* [Oral History of Elizabeth (Jake) Feinler](https://web.archive.org/web/20110811175249/http://archive.computerhistory.org/resources/access/text/Oral_History/102702199.05.01.acc.pdf) +* [Establishing Identity Without Certification Authorities (1996)](http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.31.7263) - Carl M. Ellison - CyberCash, Inc + +## Losing Control Over our Personal Information + +![](/images/chaum-security-without-identification-big-brother.png) + +* [Security without Identification Transactions Systems to Make Big Brother Obsolete](https://www.cs.ru.nl/~jhh/pub/secsem/chaum1985bigbrother.pdf) - David Chaum, 1985. + > The large-scale automated transaction systems of the near future can be designed to protect the privacy and maintain the security of both individuals and organizations. Computerization is robbing individuals of the ability to monitor and control the ways information about them is used. As organizations in both the private and the public sectors routinely exchange such information, individuals have no way of knowing if the information is inaccurate, obsolete, or otherwise inappropriate. The foundation is being laid for a dossier society, in which computers could be used to infer individuals’ life-styles, habits, whereabouts, and associations from data collected in ordinary consumer transactions. Uncertainty about whether data will remain secure against abuse by those maintaining or tapping it can have a “chilling effect,” causing people to alter their observable activities. As computerization becomes mclre pervasive, the potential for these problems will grow dramatically. + +... + +> The solution is based on an individual’s ability to take a specially coded credential issued under one pseudonym and to transform it into a similarly coded form of the same credential that can be shown under the individual’s other pseudonyms. -[*Security without Identification*](https://www.chaum.com/publications/Security_Wthout_Identification.html) + + +### Roger Clarke - Dataveillance + +* [Information Technology and Dataveillance](http://www.rogerclarke.com/DV/CACM88.html) + > The concept of 'dataveillance' is introduced, and defined as the systematic monitoring of people's actions or communications through the application of information technology. Dataveillance's origins are traced, and an explanation provided as to why it is becoming the dominant means of monitoring individuals and populations. The paper identifies, classifies and describes the various dataveillance techniques. It then examines the benefits, and especially the dangers, arising from dataveillance. It considers the intrinsic and extrinsic controls that act to keep the application of dataveillance under control, and suggests some appropriate policy measures. + +## PGP - Web of Trust + +[![](https://i.imgur.com/sMV9PE4.png)](https://www.philzimmermann.com/EN/essays/WhyIWrotePGP.html) + +Phil [Zimmerman creates PGP](https://www.philzimmermann.com/EN/essays/WhyIWrotePGP.html), 1991. + * First time strong encryption widely available to general public. + * PGP’s web-of-trust provide early foundation for SSI. However, PGP is known as difficult to use and failed to reach wide adoption for personal communication\identification. + +* [Why I wrote PGP](https://www.philzimmermann.com/EN/essays/WhyIWrotePGP.html) +* [PGP -Web of Trust -linux.com](https://www.linux.com/learn/pgp-web-trust-core-concepts-behind-trusted-communication) +* [PGP Web of Trust: Core Concepts Behind Trusted Communication - Lin...](https://www.linux.com/learn/pgp-web-trust-core-concepts-behind-trusted-communication) + > Public Key Cryptography infrastructure (PKI) has two main implementations. One is done using certificates and certificate authorities (CAs), and is described in the X.509 standard. It is best suited for structured organizational hierarchies with an implicitly trusted authorit... +* [The PGP Paradigm](https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust/blob/master/topics-and-advance-readings/PGP-Paradigm.pdf). by Jon Callas and Philip Zimmermann + > This chapter describes the mechanisms that PGP® software uses for its public key infrastructure. Much has written about PGP and practical public key cryptography. Much of this is to our opinion only mostly accurate. It is our goal in this chapter to describe the PGP models, as well as their implementation, standardization, and use. We also will put this in its historic and political context. + +## resources + +* [Identity Blog](http://www.identityblog.com) +* [History](http://wiki.idcommons.net/History) - wiki.idcommons.net +* [Identity Commons-History](http://wiki.idcommons.net/History) -wiki.idcommons.net +* [Identity Woman](https://identitywoman.net/) +* [IIW - Past Workshops](https://internetidentityworkshop.com/past-workshops/) +* [windley.com/tags/identity](http://www.windley.com/tags/identity.shtml) +* [Path to Self Sovereign Identity](http://www.lifewithalacrity.com/2016/04/the-path-to-self-soverereign-identity.html) +* [Web of Trust Info](https://github.com/WebOfTrustInfo/) - github + > Shared repositories for #RebootingWebOfTrust Design Workshops - Web of Trust Info +* [The Evolution of Internet Identity](https://www.slideshare.net/prabathsiriwardena/the-evolution-of-internet-identity) +* [A Brief History of Digital Identity](https://medium.com/humanizing-the-singularity/a-brief-history-of-digital-identity-9d6a773bf9f5) + > On April 10th, Mattereum hosted the third Internet of Agreements® (IoA) conference at the Google Campus in London, dedicated to the topic… +* [Identity Management OSS Map](http://web.archive.org/web/20110207095948/docs.safehaus.org/display/HAUS/Id+OSS+Map) - web.archive.org +* [Vendor List](http://identityaccessmanagement.blogspot.com/2005/05/vendor-list.html) - identityaccessmanagement.blogspot.com + > Updated: November 12 2006 I am trying to come up with the list of vendors and associated products in the Identity and Access Management ar... +* [Rebooting digital identity: how the social web is transforming citizen behaviours and expectations](https://www.slideshare.net/solutist/rebooting-digital-identity-how-the-social-web-is-transforming-citizen-behaviours-and-expectations) - Slideshare - 2012 +* [A Step Back in Time: The History and Evolution of Digital Identity](https://www.iotevolutionworld.com/iot/articles/410328-step-back-time-history-evolution-digital-identity.htm) + > As Identity 3.0 continues to evolve, fascinating implementations and use cases are on the rise with the most talked-about frontier of the technological landscape: the Internet of Things (IoT). + +
The Evolution of Internet Identity from Prabath Siriwardena
+ +### open-standards + +* [The Story of Open SSI Standards - Drummond Reed/Evernym - Webinar 1](https://ssimeetup.org/story-open-ssi-standards-drummond-reed-evernym-webinar-1/) - [video](https://www.youtube.com/watch?v=RllH91rcFdE) - [Self Sovereign Identity (SSI) Open standards with Drummond Reed](slideshare.net) + > Drummond Reed, Chief Trust Officer at Evernym and Sovrin Foundation Trustee, features in our first Webinar "The Story of SSI Open Standards" by giving us the background on the foundation of Self Sovereign Identity. +* [Identity_Standards:_The_Soap*Opera*(catch_up_on_previous*episodes*...](https://iiw.idcommons.net/Identity_Standards:_The_Soap_Opera_(catch_up_on_previous_episodes_%2B_review_major_plot_points) + +![](https://i.imgur.com/XtZQg0j.png) + +![](https://i.imgur.com/FBe3S0w.png) + +![](https://i.imgur.com/5R51G4Y.png) + +![](https://i.imgur.com/xmWkc4l.png) + + diff --git a/_posts/history/2019-09-15-history-self-sovereign-identity.md b/_posts/history/2019-09-15-history-self-sovereign-identity.md deleted file mode 100644 index 26423354..00000000 --- a/_posts/history/2019-09-15-history-self-sovereign-identity.md +++ /dev/null @@ -1,13 +0,0 @@ ---- -title: A History of Self Sovereign Identity -layout: single -permalink: history/self-sovereign-identity/ -canonical_url: 'https://decentralized-id.com/history/self-sovereign-identity/' -redirect_from: history/self-sovereign-identity/ -categories: ["Posts","History"] -tags: ["Self-Sovereign-Identity"] -published: false ---- - - -There are a number of ways to begin a history of self-sovereign identity, depending upon your background and areas of interest. I will begin with a brief history of cryptography, \ No newline at end of file diff --git a/_posts/history/2020-01-01-user-centric-2000s.md b/_posts/history/2020-01-01-user-centric-2000s.md new file mode 100644 index 00000000..081bb372 --- /dev/null +++ b/_posts/history/2020-01-01-user-centric-2000s.md @@ -0,0 +1,226 @@ +--- +title: "History - User Centric Identity - 2000-2009" +layout: single +permalink: /history/2000-2009/ +categories: ["History"] +last_modified_at: 2020-01-04T13:22:33-23:00 + +--- + +## International Planetwork Conference + +![](https://i.imgur.com/RfKqBP9.png) + +The first International [Planetwork](https://planetwork.net/about.html) Conference - Global Ecology and Information Technology, San Francisco, May 2000. + +The community that developed around the Planetwork conferences, including [Linktank](https://planetwork.net/linktank.html), form an intellectual foundation for what became Self Sovereign Identity. + +* [About Planetwork](https://planetwork.net/about.html) + > Planetwork is a San Francisco based network using information technology to address the pressing issues of our time - climate change, loss of biodiversity, social & economic justice, and true democracy. + > + > Planetwork convened the first international conference on global ecology and information technology in 2000, beginning a conversation about creating a distributed online social network to empower individuals and civil society, publishing the ASN White Paper in 2003. + > Planetwork was founded in 1998 with the recognition that the only phenomenon growing as fast as the global ecological crisis was the global communications system and that with it, we could address the biggest threats facing humanity and the planet. +* [LINK TANK](https://planetwork.net/linktank.html) + > The first International Planetwork Conference was held at the Presidio in San Francisco in May 2000. Soon after that conference an informal group calling itself the Webcabal started meeting to discuss various possibilities and potential implementation strategies. + > + > In 2001 this process became LinkTank, operating as a fiscal project of Planetwork. LinkTank was officially a network of twenty three voting participants, from a variety of professional backgrounds, largely in the Bay Area and New York, with a nine member board. However, the conversation expanded to include participation by more than fifty people spanning many organizations in several counties. The Link Tank process distilled the following statement of purpose: +* [The Planetwork Interactive](https://web.archive.org/web/20060714223112/http://www.planetwork.net/2004conf/) + > At the San Francisco Presidio + > June 5 - 6, 2004 + > Planetwork's next large scale annual event will bring Ben Cohen from True Majority, Joan Blades from MoveOn, and other leaders of online activism together with a multidisciplinary community of social change agents and technologists who are using the Internet to organize for positive change in this election year. Themes will include: + > + > - Internet Activism: Online Organizing Strategies + > - Opportunities and Lessons for 2004 + > - Electronic Voting: Vote Early, Vote Often + > - New Technological Challenges for Democracy + > - Social Networking for Social Good: Linking Social + > - Network Software as a New Global Commons +* [The Augmented Social Network: Building identity and trust into the...](https://firstmonday.org/ojs/index.php/fm/article/view/1068) +The Augmented Social Network: Building identity and trust into the next-generation Internet + > Could the next generation of online communications strengthen civil society by better connecting people to others with whom they share affinities, so they can more effectively exchange information and self-organize? Could such a system help to revitalize democracy in the 21st century? When networked personal computing was first developed, engineers concentrated on extending creativity among individuals and enhancing collaboration between a few. They did not much consider what social interaction among millions of Internet users would actually entail. It was thought that the Netos technical architecture need not address the issues of "personal identity" and "trust," since those matters tended to take care of themselves. + > + > This paper proposes the creation of an Augmented Social Network (ASN) that would build identity and trust into the architecture of the Internet, in the public interest, in order to facilitate introductions between people who share affinities or complementary capabilities across social networks. The ASN has three main objectives: 1) To create an Internet-wide system that enables more efficient and effective knowledge sharing between people across institutional, geographic, and social boundaries; 2) To establish a form of persistent online identity that supports the public commons and the values of civil society; and, 3) To enhance the ability of citizens to form relationships and self-organize around shared interests in communities of practice in order to better engage in the process of democratic governance. In effect, the ASN proposes a form of "online citizenship" for the Information Age. +* [AUGMENTED SOCIAL NETWORK](http://asn.planetwork.net/) + > The ASN white paper was presented at the June 2003 Planetwork conference and published in First Monday the Peer-Reviewed Journal on the Internet on August 4, 2003. There are also 1,000 word and 5,600 word excerpts from the original 34,000 word white paper. + > + > The ideas behind the ASN came out of a two year process from 2000 through 2002 facilitated by the Link Tank, a group of two dozen professionals in the fields of digital communications, environmental activism, independent media, and socially responsible investment, who met regularly to discuss how a "next generation" Internet could support appropriate responses to the environmental crisis. The group commissioned three of its members, Ken Jordan, Jan Hauser and Steven Foster, to write a white paper that demonstrated the feasibility of the ASN's vision of online community by describing a technical architecture that could achieve that vision. + +## XNS Public Trust Organization - XDI + +![](https://i.imgur.com/BNpzEkE.png) + +XNS Public Trust Organization. Founded in July 2000, shortly after Planetwork Conference. -[xdi.org - History](http://xdi.org/?page_id=13) + +> to promote the concept of individuals owning their own digital identity and data based on a nascent technology being produced by two Technical Committees at OASIS: XRI (Extensible Resource Identifier) and XDI (Extensible Data Interchange). + +* [XDI - History](http://xdi.org/?page_id=13) by Markus Sabadello + > XDI.ORG was originally founded as the XNS Public Trust Organization (XNSORG) in July, 2000, to promote the concept of individuals owning their own digital identity and data based on a nascent technology being produced by two Technical Committees at OASIS: XRI (Extensible Resource Identifier) and XDI (Extensible Data Interchange). Its charter was to serve as the public steward for a body of intellectual property contributed by OneName Corporation. These patents covered what became semantic data web technology, a new way to form persistent links and long-term, trusted data sharing relationships over electronic networks. +* [The Main Address for Digital Addressing](https://web.archive.org/web/20120117204002/http://www.cordance.net/) - Cordance created the technology under the development of XRI and XDI Oasis Technical Committees. +* [Neustar](https://www.home.neustar/) -Neustar is a telecommunications company originally charged with maintaining the system of directories and databases for telephone area codes and prefixes in North America +* [Trusted Connections at the Moments that Matter the Most | Neustar](https://www.home.neustar/) + > Neustar Enables Trusted Connections Between Companies and People at the Moments That Matter the Most. +* [XDI.org](https://icannwiki.org/XDI.org) - icannwiki.org + +## Identity Commons + +![](https://i.imgur.com/AOw2oXx.png) + +The [Identity Commons](http://wiki.idcommons.net/History) (2001-Present) was originally created by Owen Davis and Andrew Nelson in 2001 to evangelize the creation of a decentralized user-centric identity infrastructure and to address the resulting social trust issues. + +Kaliya IdentityWoman Young began working with Identity Commons following June 2004 Planetwork Conference. Working with Social Physics team, led by Paul Trevithick and Mary Ruddy, and included Doc Searls and Phil Windley, they wove a community around user-centric id that came together at the Digital Identity World conference, of 2004. + +![](https://i.imgur.com/xbfK3EF.png) + +[The original identity gang](https://www.idcommons.org/the-original-identity-gang/) - Doc Searls invited identity leaders to appear on the Gilmore Gang podcast, where the name "Identity Gang" was coined. + +At Doc's encouragement, a number of people began blogging about user-centric identity. + +[The Gillmor Gang - December 31, 2004](http://web.archive.org/web/20130729213722id_/https://itc.conversationsnetwork.org/shows/detail394.html) Featuring: + > * Steve Gillmor, contributing editor, ZDNet + > * Doc Searls, senior editor, Linux Journal + > * Craig Burton, founding member, Novell; co-founder, The Burton Group + > * Kim Cameron, Microsoft's Architect of Identity and Access Systems + > * Dave Winer, father of RSS and more + > * Marc Canter, Broadband Mechanics + > * Bryan Field-Elliot, CTO, Ping Identity Corporation + > * Phil Windley, Brigham Young University + > * Drummond Reed, CTO, Cordance + +"Their most important contribution may have been the creation, in association with the Identity Gang, of the Internet Identity Workshop (2005-Present) working group." -[*Path to Self Sovereign Identity*](http://www.lifewithalacrity.com/2016/04/the-path-to-self-soverereign-identity.html) + +* [community@lists.idcommons.net](https://lists.idcommons.net/lists/info/community) + > The general community mailing list for Identity Commons. The list is also called the Identity Gang mailing list and was formerly idworkshop at googlegroups. +* [The Gillmor Gang](http://web.archive.org/web/20130729213722id_/https://itc.conversationsnetwork.org/shows/detail394.html) + > This week The Gang digs deeper into digital identity with a panel of experts. It begins as a Kumbaya of identity vendors and technologies, but by the second half the gloves come off. Craig points out that everyone has built silos so far because there have been no alternatives. Is the idea of a Microsoft silo "old fashioned thinking," as Kim suggests, defending the company he joined not all that long ago? He then presents the first five of his seven Laws of Identity -- clearly well thought out and vendor independent as all agree. Everyone also agrees that no identity solution can succeed without the cooperation and participation of Microsoft, but Dave is skeptical given the company's history in identity management. Phil points out that PKI hasn't succeded, and Kim suggests it's because PKI violated his 4th Law of Identity. And Doc suggests that digital identity needs a 'key personality' in the same way as Dave has played a lead role in RSS and blogging. Make sure you listen to this one all the way through. +* [Reference](http://wiki.idcommons.org/Reference) - wiki.idcommons.org +* [Identity Landscape](http://wiki.idcommons.org/Identity_Landscape) - wiki.idcommons.org +* [Historical - Archive of Earlier Proposals for the Purpose Statement](http://web.archive.org/web/20070210000624/http://wiki.idcommons.net/Moin.cgi/IdentityCommonsTwoPurposeAndPrinciples) - web.archive.org - wiki.idcommons.org + > First Proposal (May 2006 - Drummond Reed and Eugene Kim).... +* [Background](http://wiki.idcommons.org/Background) - wiki.idcommons.org + > Identity Commons (IC) was originally formed in 2001 to evangelize the creation of a decentralized user-centric identity infrastructure and to address the resulting social trust issues. At the time, these ideas were revolutionary. Very few people were thinking about these issues, much less doing anything about them. + > + > IC helped change this. It not only raised awareness about the complex issues surrounding this topic, but it played an active role in helping create the necessary infrastructure. +* [History](http://wiki.idcommons.net/History) - wiki.idcommons.net +* [IC Logo](http://wiki.idcommons.org/IC_Logo) + > The Identity Commons logo is a mashup of the letters "i" and "c", and it represents two ideas. The first is the notion of an upside-down umbrella. Identity Commons was founded on the notion that it would empower bottoms-up work, rather than organize itself from the top-down. The upside-down umbrella metaphor reflects that. +* [The original identity gang | Identity Commons](https://www.idcommons.org/the-original-identity-gang/) + > I vividly remember the first time the identity gang met - it was in at Digital Identity World in October of 2004. I had met Doc Searls in August at Linux world and shared about the work that Owen Davis, Drummond Reed, Bill Washburn and others were doing trying open standard... +* [wiki.idcommons.net/Lexicon](https://web.archive.org/web/20080916112039/wiki.idcommons.net/Lexicon) - web.archive.org +* [The identity silo paradox | ZDNet](https://www.zdnet.com/article/the-identity-silo-paradox/) + > My recent post on Google's identity silo was part of a hailstorm (pun intended) of comments that occurred on the email list over at the Identity Gang. All of those fast-flying emails unveiled what I'm now calling the "identity silo paradox." + +## Intention Economy + +* [The Intention Economy](https://www.linuxjournal.com/content/intention-economy) by Doc Searls on March 8, 2006 + > Is "The Attention Economy" just another way for advertisers to skewer eyeballs? And why build an economy around Attention, when Intention is where the money comes from? + > + > That's the question at the front of my mind as I hear one speaker after another struggle to cast light on "The Attention Economy", which is the theme of this year's eTech conference, where I am sitting in an audience, writing this, right now. + +## YADIS + +* [Implementing YADIS with no new software](http://lists.danga.com/pipermail/yadis/2005-October/001511.html) Reed, Dummond (2005-12-31) +* [Yet Another Decentralized Identity Interoperability System](http://www.windley.com/archives/2005/10/yet_another_dec.shtml) +* [Distributed Identity: Yadis](https://web.archive.org/web/20060504054201/http://community.livejournal.com/lj_dev/683939.html) - web.archive.org +* [The Better Markup Language - Glossary](http://www.livejournal.com/doc/server/appx.glossary.html) +* [Implementing YADIS with no new software](http://lists.danga.com/pipermail/yadis/2005-October/001511.html) Reed, Dummond (2005-12-31). Danga Interactive. + +## oauth + +* [OAuth - History](https://en.wikipedia.org/wiki/OAuth#History) + > OAuth began in November 2006 when Blaine Cook was developing the Twitter OpenID implementation. Meanwhile, Ma.gnolia needed a solution to allow its members with OpenIDs to authorize Dashboard Widgets to access their service. Cook, Chris Messina and Larry Halff from Magnolia met with David Recordon to discuss using OpenID with the Twitter and Ma.gnolia APIs to delegate authentication. They concluded that there were no open standards for API access delegation[4]. + > + > The OAuth discussion group was created in April 2007, for the small group of implementers to write the draft proposal for an open protocol. DeWitt Clinton from Google learned of the OAuth project, and expressed his interest in supporting the effort. In July 2007, the team drafted an initial specification. Eran Hammer joined and coordinated the many OAuth contributions creating a more formal specification. On 4 December 2007, the OAuth Core 1.0 final draft was released.[5] + +## The Laws of Identity + +* [The Laws](https://web.archive.org/web/20080814163727/http://www.identityblog.com/stories/2004/12/09/thelaws.html) - 12/04 + > Summary: Understand the dynamics causing digital identity systems to succeed or fail in various contexts, expressed as the Laws of Identity. Together these laws define a unifying identity metasystem that can offer the Internet the identity layer it needs. (14 printed pages) +* [The Laws of Identity](https://www.identityblog.com/stories/2005/05/13/TheLawsOfIdentity.pdf) - 2005 + > The Internet was built without a way to know who and what you are connecting to. This limits what we can do with it and exposes us to growing dangers. If we do nothing, we will face rapidly proliferating episodes of theft and deception which will cumulatively erode public trust in the Internet. + > + > This paper is about how we can prevent that loss of trust and go forward to give Internet users a deep sense of safety, privacy and certainty about who they are relating to in cyberspace. Nothing could be more essential if new Web-based services and applications are to continue to move beyond “cyber publication” and encompass all kinds of interaction and services. Our approach has been to develop a formal understanding of the dynamics causing digital identity systems to succeed or fail in various contexts, expressed as the Laws of Identity. Taken together, these laws define a unifying identity metasystem that can offer the Internet the identity layer it so obviously requires. + > + > The ideas presented here were extensively refined through the Blogosphere in a wide-ranging conversation documented at www.identityblog.com that crossed many of the conventional faultlines of the computer industry, and in various private communications. In particular I would like to thank Arun Nanda, Andre Durand, Bill Barnes, Carl Ellison, Caspar Bowden, Craig Burton, Dan Blum, Dave Kearns, Dave Winer, Dick Hardt, Doc Searls, Drummond Reed, Ellen McDermott, Eric Norlin, Esther Dyson, Fen Labalme, Identity Woman Kaliya, JC Cannon, James Kobielus, James Governor, Jamie Lewis, John Shewchuk, Luke Razzell, Marc Canter, Mark Wahl, Martin Taylor, Mike Jones, Phil Becker, Radovan Janocek, Ravi Pandya, Robert Scoble, Scott C. Lemon, Simon Davies, Stefan Brands, Stuart Kwan and William Heath. +* [The Laws of Identity](https://msdn.microsoft.com/en-us/library/ms996456.aspx) + > Understand the dynamics causing digital identity systems to succeed or fail in various contexts, expressed as the Laws of Identity. Together these laws define a unifying identity metasystem that can offer the Internet the identity layer it needs. (14 printed pages) + +## iiw + +![](https://www.yubico.com/wp-content/uploads/2013/10/IIW-blog.jpg) + +In 2005, [Kaliya Young](https://identitywoman.net/)[[**T**](https://twitter.com/IdentityWoman)], [Phil Windley](https://windley.com)[[**T**](https://twitter.com/windley)][[**V**](https://vimeo.com/windley)][[**G**](https://github.com/windley)], [Drummond Reed](https://www.evernym.com/)[[**T**](https://twitter.com/drummondreed)][[**B**](https://equalsdrummond.name/)], and [Doc Searls](http://blogs.harvard.edu/doc/)[[**T**](https://twitter.com/dsearls)][[**B**](https://blogs.harvard.edu/doc)] hosted the first [Internet Identity Workshop](http://www.internetidentityworkshop.com/)(IIW)[[**T**](https://twitter.com/idworkshop)] in Berkeley to discuss "architectural and governance proposals for Internet-wide identity services and their underlying philosophies." -[Announcing IIW 2005](https://identitywoman.net/announcing-the-internet-identity-workshop-iiw2005/) + +Since then, the IIW has met bi-anually, actively supporting the development of the identity software-ecosystem, including [OpenID](http://wiki.openid.net)('05), OpenID [2.0](http://wiki.openid.net/w/page/12995215/OpenID%20Authentication%202-1)('06), [OAuth](https://en.wikipedia.org/wiki/OAuth)('10), [FIDO](https://fidoalliance.org/)('13) and OpenID [Connect](https://en.wikipedia.org/wiki/OpenID_Connect)('14). + +* [Announcing the Internet Identity Workshop (IIW2005) - Identity Woman](https://identitywoman.net/announcing-the-internet-identity-workshop-iiw2005/) + > There’s been considerable conversation around identity on the Internet, or what some would call grassroots identity. Providing identity services between people, websites, and organizations that may or may not have any kind of formalized relationship is a different problem than providing authentication and authorization services within a single organization. Many have argued that the lack of a credible identity infrastructure will eventually result in the Internet being so overrun with fraud as to make it useless for many interesting uses. +* [Not Just Who They Say We Are](https://vimeo.com/207961532) - Vimeo - Phil Windley + * [Internet Identity Workshop Releases Film Exploring the Work of Identity Innovators Who Protect Billions of Internet Users](https://www.prweb.com/releases/identitymovie/iiw2017/prweb14161721.htm) +* [What is IIW?](https://vimeo.com/173562225) +* [Who are the Identerati](https://www.forgerock.com/blog/who-are-the-identerati)] (a term for those working on identity standards for the purpose of breaking up id data silos, dating back to at least 2006) +* [What is 'user-centric' identity?](https://www.networkworld.com/article/2304596/access-control/what-is--user-centric--identity-.html) + > The term "user-centric" identity is getting bandied about a lot these days. It's generally understood to be a different way of expressing the entire identity transaction as opposed to what might be called the "enterprise-centric" approach traditionally used within provisionin... +* [Internet Identity Workshop 2005](https://web.archive.org/web/20060720180524/http://www.socialtext.net:80/iiw2005/index.cgi?internet_identity_workshop_2005) + > Day One October 26th - Abstracts of the formal paper presentations about identity systems and philosophies + > Day Two October 27th - Structured Open Space to discuss all topics related to digital identity, identity meta systems, common protocols, new business models etc.... Click on this page and put forth your ideas about the topics you want to discuss, and ideas you want to put forward. +* [unconference.net](http://unconference.net/) + > We believe the most effective events involve story, conversation, problem posing and problem solving. Our UnConferences are crafted with the right mix of methods that will meet the requirements of the event. + > + > Our process works in five simple steps: + > + > 1. Contact us for an initial assessment of the values of the organization and goals for an event. + > 2. We create a preliminary event design for you. + > 3. After initial approval, we move to detailed planning and implementation. + > 4. We facilitate the event. + > 5. We help implement cost effective online and print documentation from the event. +* [ALL Book of Proceedings PDFs](https://iiw.idcommons.net/ALL_Book_of_Proceedings_PDFs) + +[![https://upload.wikimedia.org/wikipedia/commons/c/ce/JakeFeinlerAtIIW2006.jpg](https://upload.wikimedia.org/wikipedia/commons/c/ce/JakeFeinlerAtIIW2006.jpg)](https://en.wikipedia.org/wiki/File:JakeFeinlerAtIIW2006.jpg) + +## Openid + +* [OpenID - History](https://en.wikipedia.org/wiki/OpenID#History) - wikipedia + > The original OpenID authentication protocol was developed in May 2005[43] by Brad Fitzpatrick, creator of popular community website LiveJournal, while working at Six Apart.[44] Initially referred to as Yadis (an acronym for "Yet another distributed identity system"),[45] it was named OpenID after the openid.net domain name was given to Six Apart to use for the project.[46] OpenID support was soon implemented on LiveJournal and fellow LiveJournal engine community DeadJournal for blog post comments and quickly gained attention in the digital identity community.[47][48] Web developer JanRain was an early supporter of OpenID, providing OpenID software libraries and expanding its business around OpenID-based services. +* [Status: stabilized. consumer/server both live on LiveJournal.com -- Jul 2005.](https://web.archive.org/web/20050924033518/http://www.danga.com/openid/) +* [VeriSign, Microsoft & Partners to Work together on OpenID + Cardspace](https://web.archive.org/web/20080503001116/http://blogs.verisign.com/infrablog/2007/02/verisign_microsoft_partners_to_1.php) +* [OpenID Updates Identity Spec](https://web.archive.org/web/20080208155322/http://reddevnews.com/news/devnews/article.aspx?editorialsid=913) - web.archive.org +* [OpenID and SixApart](https://web.archive.org/web/20070425033329/http://brad.livejournal.com/2226738.html) +* [XRD Begins](http://www.equalsdrummond.name/?p=172) + > For most people, watching the evolution of technical specifications is like watching a glacier move. To those of us living the process, though, there can be a great deal of drama to it — in f… +* [VeriSign, Microsoft & Partners to Work together on OpenID + Cardspace](https://www.symantec.com/connect/blogs/verisign-microsoft-partners-work-together-openid-cardspace) - Graves, Michael (2007-02-06) +* [AOL and 63 Million OpenIDs | dev.aol.com | The AOL Developer Network](https://web.archive.org/web/20080511162600/http:/dev.aol.com/aol-and-63-million-openids) +AOL's status regarding OpenID implementation; and, 63 million OpenIDs. Plus reactions to the blogosphere. +* [Proposal for an XRI (i-name) profile for OpenID](http://lists.danga.com/pipermail/yadis/2006-April/002388.html) Grey, Victor (2006-04-02). +* [Moving OpenID Forward](http://lists.danga.com/pipermail/yadis/2006-June/002631.html) + > As Brad mentioned a few weeks ago (http://brad.livejournal.com/2226738.html), I've been working a lot on moving OpenID forward along with the guys up at JanRain. With Brad and their feedback, I've taken the existing spec (http://www.openid.net/specs.bml) and cleaned it up into something that looks much more like what people would expect. Right now you can find it at http://www.openid.net/specs/ and I'll be making that the home for all of the OpenID specs in the future. +* [https://en.wikipedia.org/wiki/OpenID#cite_ref-66](https://en.wikipedia.org/wiki/OpenID#cite_ref-66) + > In mid-January 2008, Yahoo! announced initial OpenID 2.0 support, both as a provider and as a relying party, releasing the provider service by the end of the month.[66] In early February, Google, IBM, Microsoft, VeriSign and Yahoo! joined the OpenID Foundation as corporate board members.[67] Around early May, SourceForge, Inc. introduced OpenID provider and relying party support to leading open source software development website SourceForge.net.[68] In late July, popular social network service MySpace announced support for OpenID as a provider.[69] In late October, Google launched support as an OpenID provider and Microsoft announced that Windows Live ID would support OpenID.[70] In November, JanRain announced a free hosted service, RPX Basic, that allows websites to begin accepting OpenIDs for registration and login without having to install, integrate and configure the OpenID open source libraries.[71] + > + > In January 2009, PayPal joined the OpenID Foundation as a corporate member, followed shortly by Facebook in February. The OpenID Foundation formed an executive committee and appointed Don Thibeau as executive director. In March, MySpace launched their previously announced OpenID provider service, enabling all MySpace users to use their MySpace URL as an OpenID. In May, Facebook launched their relying party functionality,[72][73] letting users use an automatic login-enabled OpenID account (e.g. Google) to log into Facebook.[74] + > + > In September 2013, Janrain announced that MyOpenID.com would be shut down on February 1, 2014; a pie chart showed Facebook and Google dominate the social login space as of Q2 2013.[75] Facebook has since left OpenID; it is no longer a sponsor, represented on the board, or permitting OpenID logins.[15][76] +* [OpenID Authentication 2-1](http://wiki.openid.net/w/page/12995215/OpenID%2520Authentication%25202-1) + > Most of the related work for moving OpenID infrastructure forward is occurring outside of the immediate OpenID specifications community: + > + > * Projects like XRDS-Simple (http://xrds-simple.net/) are evolving the Yadis discovery protocol. + > * EAUT (http://eaut.org/) among others are looking at email address-style identifiers. + > * The OpenID Foundation is investigating security considerations and improvements. + > * Various groups are working on projects that start to integrate OpenID with the browser (Sxipper, VeriSign's OpenID Seatbelt, Higins, OpenID for Flock). + > + > In addition, since the release of OpenID 2.0, OAuth ([http://oauth.net/)](http://oauth.net/)) is now a finalized specification that is gaining adoption and has a workflow similar to OpenID Authentication. +* [WebMD - Better information. Better health.](http://xrds-simple.net/) - ?? + > The leading source for trustworthy and timely health and medical news and information. Providing credible health information, supportive community, and educational services by blending award-winning expertise in content, community services, expert commentary, and medical review. +* [From 1 to a billion in 5 years. What a little URL can do.](https://upon2020.com/blog/2009/12/from-1-to-a-billion-in-5-years-what-a-little-url-can-do/) +* [OpenID: The Web's Most Successful Failure](http://www.webmonkey.com/2011/01/openid-the-webs-most-successful-failure) + > First 37Signals announced it would drop support for OpenID. Then Microsoft’s Dare Obasanjo called OpenID a failure (along with XML and AtomPub). Former Facebooker Yishan Wong’s scathing (and sometimes wrong) rant calling OpenID a failure is one of the more popular answers... + +## digital-bazaar + +* [Digital Bazaar](https://digitalbazaar.com/) - Semantic Web by 2009 + + +## User Centric Identity + +* [What is 'user-centric' identity?](https://www.networkworld.com/article/2304596/what-is--user-centric--identity-.html) + > The term "user-centric" identity is getting bandied about a lot these days. It's generally understood to be a different way of expressing the entire identity transaction as opposed to what might be called the "enterprise-centric" approach traditionally used within provisionin... +* [User Centric Identity Management](http://folk.uio.no/josang/papers/JP2005-AusCERT.pdf) - Jøsang, Audun and Simon Pope. AusCERT Conference 2005. diff --git a/_posts/history/2020-01-02-personal-data-2010-15.md b/_posts/history/2020-01-02-personal-data-2010-15.md new file mode 100644 index 00000000..c767fd7b --- /dev/null +++ b/_posts/history/2020-01-02-personal-data-2010-15.md @@ -0,0 +1,214 @@ +--- +title: "History - Personal Data - 2010-2014" +layout: single +header: + image: "/images/history-user-centric-data-identity.png" + caption: "2011 - [napsterization.org - Who Stewards the Personal Data Question? Org Chart](http://napsterization.org/stories/archives/000769.html)" +permalink: /history/2010-2014/ +categories: ["History"] +last_modified_at: 2020-01-04T13:22:33-23:00 + +--- + +## Personal Data: The Emergence of a New Asset Class + +[WEForum - Personal Data: The Emergence of a New Asset Class](http://www3.weforum.org/docs/WEF_ITTC_PersonalDataNewAsset_Report_2011.pdf) + + +![](https://i.imgur.com/wuvo5BG.png) + +* [Personal Data Ecosystem Charter](http://wiki.idcommons.net/Personal_Data_Ecosystem_Charter) +* [Personal Data Ecosystem Consortium | Identity Commons](https://www.idcommons.org/working-groups/personal-data-ecosystem-consortium/) + > Founded in 2011, the Personal Data Ecosystem Consortium advocates a user-centric approach to managing personal data. We believe that, in order for the Internet economy to continue delivering on its promise, the needs of individuals, companies, and governments must all be resp... +* [Personal Data Journal](http://web.archive.org/web/20121204030857/http:/pde.cc/journal/) - web.archive.org + > The Essential Guide for Any Company Affected by Personal Data +* [Personal Data Ecosystem Consortium — Empowering People with Their Personal Data](http://pde.cc/) + > PDEC (Personal Data Ecosystem Consortium) is a not-for-profit trade association with members around the world. We exist to activate and broaden the Personal Data Ecosystem. An Ecosystem that centers on people and their data, that enables organisations to make person-centered data logistics a reality. +* [Rethinking Personal Data: Strengthening Trust](https://www.weforum.org/reports/rethinking-personal-data-strengthening-trust) + > Rethinking Personal Data: Strengthening Trust examines how the appropriate use of personal data can create enormous value for governments, organizations and individuals. Produced in collaboration with The Boston Consulting Group, the report provides a multistakeholder perspe... +* [Personal Data Ecosystem Consortium](http://web.archive.org/web/20130116102431/http:/personaldataecosystem.org/) - web.archive.org - personaldataecosystem.org + +## Danube + +Markus Sabadello began work on Project Danube, on the creation of an XDI based personal data store, always under the control of its users, as early as 2010. +* [Open-Source Sofware for Identity & Personal Data Services](https://web.archive.org/web/20101221105543/http:/projectdanube.org/) - web.archive.org snapshot 2010 + +## FIDO + +* [History of FIDO Alliance](https://fidoalliance.org/overview/history/) + > 2009 – Validity Sensors and PayPal discuss using biometrics for identification of online users instead of passwords. The meeting inspired the idea to work on an industry standard designed around public key cryptography, enabling a passwordless log-in backed purely by local ... +* [Lenovo, Nok Nok Labs, PayPal, and Validity Lead an Open Industry Alliance](https://fidoalliance.org/lenovo-nok-nok-labs-paypal-and-validity-lead-an-open-industry-alliance-to-revolutionize-online-authentication/) + > The FIDO Alliance (Fast IDentity Online) Standards Will Allow Users the Option to Replace Passwords with Authentication Methods that are More Secure and Easier to Use Palo Alto, California – February 12, 2013 – Leading Internet companies, system integrators and security p... +* [Global Industry Leaders Join the FIDO Alliance, Accelerating the Open Technology to Supplant Passwords with Universal Strong Authentication](https://fidoalliance.org/global-industry-leaders-join-the-fido-alliance-accelerating-the-open-technology-to-supplant-passwords-with-universal-strong-aut/) + > FIDO Members are Multiplying Rapidly since Launch, as Critical Needs and New Market Opportunities Become Increasingly Compelling Palo Alto, California – April 23, 2013 – The FIDO Alliance, an industry consortium revolutionizing online authentication with the first standar... +* [The FIDO Alliance Announces NXP Semiconductors as Newest Board Member and Names New Associates](https://fidoalliance.org/the-fido-alliance-announces-nxp-semiconductors-as-newest-board-member-and-names-new-associates/) + > Associate Members Diamond Fortress and Crocus Technology Align with (FIDO) Fast IDentity Online – the First and Only Industry Standard for Strong Authentication RSA Conference, San Francisco, California – February 27, 2013 – The FIDO Alliance (Fast IDentity Online), an ... +* [The FIDO Alliance Announces First FIDO Authentication Deployment on Samsung Galaxy S5](https://fidoalliance.org/the-fido-alliance-announces-first-fido-authentication-deployment-%E2%88%92-paypal-and-samsung-enable-consumer-payments-with-fingerprint-authentication-on-new-samsung-galaxy-s5/) + > Mountain View, Calif. and Barcelona, Spain – Mobile World Congress (MWC) – February 24, 2014…The FIDO (Fast IDentity Online) Alliance ([http://fidoalliance.org/)](http://fidoalliance.org/)), an industry consortium delivering standards for simpler, stronger authentication, today announced the first ... +* [FIDO 1.0 Specifications are Published and Final Preparing for Broad Industry Adoption of Strong Authentication in 2015](https://fidoalliance.org/fido-1-0-specifications-published-and-final/) + > Mountain View, CA – December 9, 2014 The FIDO (Fast IDentity Online) Alliance ([http://fidoalliance.org/)](http://fidoalliance.org/)), an open industry consortium delivering standards for simpler, stronger authentication, today published final 1.0 drafts of its two specifications – Universal Authenti... +* [Microsoft Announces FIDO Authentication Support Planned for Window...](https://fidoalliance.org/microsoft-announces-fido-authentication-support-planned-for-windows-10/) + > Mountain View, Calif. – Feb. 13, 2015 – The FIDO (Fast IDentity Online) Alliance ([http://fidoalliance.org/)](http://fidoalliance.org/)), an industry consortium launched in 2013 to revolutionize online authentication with open standards for simpler, stronger methods, today announced that Microsoft wi... +* [World’s First Mobile Network Operator to Deploy FIDO Authenticat...](https://fidoalliance.org/worlds-first-mobile-network-operator-to-deploy-fido-authentication-ntt-docomo-extends-its-mobile-innovation-lead-with-new-fido-certified-devices-and-services/) + > In Only Four Months, NTT DOCOMO Announces Intentions to Expand FIDO Authentication to 10 Devices, More NTT DOCOMO Services, and Mobile Commerce Partners Mountain View, Calif., – September 29, 2015… The FIDO® (Fast IDentity Online) Alliance ([http://fidoalliance.org/)](http://fidoalliance.org/)), an ... +* [FIDO Solutions for Government & Public Policy - FIDO Alliance](https://fidoalliance.org/adoption/policy-government/) + > FIDO Alliance engages in meaningful discussion with government officials & policymakers on how FIDO specifications offer better options for authentication. +* [FIDO Alliance Liaison Organizations](http://web.archive.org/web/20160412221111/https://fidoalliance.org/fido-alliance-liaison-organizations/) +* [FIDO Alliance Equips U2F Protocol for Mobile and Wireless Applicat...](https://fidoalliance.org/fido-alliance-equips-u2f-for-mobile-and-wireless-applications/) + > FIDO U2F 1.0 Specifications Add Support for NFC and Bluetooth® Technology Mountain View, Calif., – June 30 2015… The FIDO (Fast IDentity Online) Alliance ([http://fidoalliance.org/)](http://fidoalliance.org/)), an industry consortium launched in 2013 to revolutionize online security with open standa... +* [W3C Accelerates Efforts To Build a More Secure Web](https://www.w3.org/2016/02/securewebauthwg.html.en) + > Launches Web Authentication work based on FIDO Alliance specifications for more secure and flexible alternative to password log-ins on the Web +* [Lenovo™, Intel®, PayPal® and Synaptics® announce collaboratio...](https://news.lenovo.com/pressroom/press-releases/lenovo-intel-paypal-and-synaptics-announce-collaboration-to-bring-fido-authentication-to-laptops/) +* [Security Key for safer logins with a touch | Facebook](https://www.facebook.com/notes/facebook-security/security-key-for-safer-logins-with-a-touch/10154125089265766/) + > People ask all the time what they can do to make their online accounts more secure. Like most security professionals, I recommend setting up two-factor aut +* [Certified Authenticator Levels - FIDO Alliance](https://fidoalliance.org/certification/authenticator-certification-levels/) + > The Authenticator Certification Levels introduce Authenticator Security Requirements to the FIDO Certification Program. Authenticators must be certified to at least Authenticator Certification Level 1 (L1) for UAF, U2F, and FIDO2 certification. Currently, the supported Cert... +* [FIDO Alliance and Data Security Council of India Join Forces to Pr...](https://fidoalliance.org/fido-alliance-and-data-security-council-of-india-join-forces-to-promote-stronger-authentication-standards-in-india/) + > FIDO India Working Group Launched to Further Drive Local Market Engagement New Delhi, India and Mountain View Calif, May 9, 2017 – The FIDO Alliance today announced a partnership with the Data Security Council of India (DSCI) and the launch of the FIDO India Working Group t... +* [FIDO Alliance Launches European Working Group to Expand Use of Aut...](https://fidoalliance.org/fido-alliance-launches-european-working-group-expand-use-authentication-standards/) + > Organization to help companies meet emerging regulations and growing requirements for simpler, stronger user authentication LONDON, November 14, 2017 – The FIDO Alliance today announced the launch of a FIDO Europe Working Group to accelerate the use of FIDO authentication s... +* [FIDO Alliance Launches Working Group to Expand the Use of FIDO Aut...](https://fidoalliance.org/fido-alliance-launches-fido-korea-working-group/) + > SEOUL, DECEMBER 6, 2017 – The FIDO Alliance announced today the launch of the FIDO Korea Working Group to further accelerate awareness and adoption of the FIDO Authentication standards in the Korean marketplace. FIDO Authentication reduces industry reliance on passwords in ... +* [FIDO Alliance and W3C Achieve Major Standards Milestone in Global ...](https://fidoalliance.org/fido-alliance-and-w3c-achieve-major-standards-milestone-in-global-effort-towards-simpler-stronger-authentication-on-the-web/) + > With support from Google Chrome, Microsoft Edge and Mozilla Firefox, FIDO2 Project opens new era of ubiquitous, phishing-resistant, strong authentication to protect web users worldwide MOUNTAIN VIEW, Calif., and [https://www.w3.org/](https://www.w3.org/) — April 10, 2018 – The FIDO Alliance a... +* [First FIDO UAF 1.1 Implementations Ease Deployment of Advanced Bio...](https://fidoalliance.org/first-fido-uaf-1-1-implementations-ease-deployment-advanced-biometric-authentication-android-devices/) + > Sony Mobile Xperia™ smartphones from NTT DOCOMO are first devices to market TOKYO, DECEMBER 8, 2017 – The FIDO Alliance, an industry consortium with 250+ member and partner organizations developing open standards for simpler, stronger authentication, announced today that ... +* [FIDO2: Moving the World Beyond Passwords using WebAuthn & CTAP](https://fidoalliance.org/fido2/) + > FIDO2 leverages devices to authenticate to online services via both mobile and desktop. FIDO2 specs are the W3C WebAuthn spec & FIDO Alliance’s CTAP. +* [Download Specifications - FIDO Alliance](https://fidoalliance.org/download/) + > The latest versions of the FIDO Alliance specifications are available below. If you are new to FIDO, we recommend you first review the Specifications Overview before proceeding further. Older versions of the specifications can be found in the specification archive along with... + +(left off around) September 2018-[https://fidoalliance.org/overview/history/](https://fidoalliance.org/overview/history/) + + +## Sovereign Source Authority + +* [The Power of Self-Control](https://www.moxytongue.com/2009/06/power-of-self-control.html) + > Your IDENTITY is at the root of your relationship with any service providing company, including the telecom companies. Honestly sir, the proper structure of the global network that emanates out of US agencies, laboratories, universities, offices, homes and increasingly pockets, is one based on universal ownership. Individuals must own the data attributes relating to their identities on the digital network. I am concerned that America has not figured out how to create administrative owners of the identity attributes that are implied by the governing structure of our nation. How can we structure the data processing relationships between producers-service providers-consumers when the structure of citizenship has not even been defined adequately enough to translate appropriately into our digital reality. +* [What is "Sovereign Source Authority"?](https://www.moxytongue.com/2012/02/what-is-sovereign-source-authority.html) - Devon Lofretto + > What is an Individual Human Being prior to "identity registration" in Society? What is the data administration framework of default participation in Society today? + > + > Society is an Agreement. It is made by and between Individuals. Within any Society, Individuals have an established Right to an "identity", and to all of the benefits and responsibilities of some form of "Nationally Sovereign Structure" of governance and administration. Sovereign Source Authority (SSA) refers to the actual default design parameter of Human identity, prior to the "registration" process used to inaugurate participation in Society. +* [1Man/ManyMachines (@NZN)](https://twitter.com/NZN) + > #indie Creator: Self-Sovereign $ID entities.. structure yields results. #OwnRoot #SovereignSourceAuthority $OYO Standing up civil Society, personally. +* [Open Mustard Seed](https://vimeo.com/84324609) - vimeo +* [ID3 - idcubed.org - Open Mustard Seed (OMS) Framework](http://web.archive.org/web/20170928100139/https:/idcubed.org/open-platform/platform/) - web.archive.org - idcubed.org + > ID3 is a Boston, Massachusetts, research and educational nonprofit whose mission is to develop a new social ecosystem of trusted, self-healing digital institutions. +* [Self-sovereign vs. administrative identity](http://blogs.harvard.edu/vrm/2012/03/25/sovereign-source-vs-administrative-identity/) + > You know who you are. So does the IRS, the DMV, and every website and service online where you have a login and a password for. But none of those entities really knows you. What they know is what t… +* [Personal = Sovereign](http://blogs.harvard.edu/vrm/2014/02/06/personal-sovereign/) + > We are all different. We look different, we sound different, we think and act different. Even soldiers marching lock-step in uniform are all different. Emperor Qui Shi Huang recognized this fact by… +* [Sovereign Source Identity in a University Environment #dooo](http://web.archive.org/web/20160611000854/http://links.windley.com/2014/sovereign-source-identity-in-a-university-environment-dooo) + +## Life-management Platforms + +* [Life Management Platforms: Control and Privacy for Personal Data](https://decentralized-id.com/_posts/history/70608PersonalDataLifeManagementPlatforms.pdf) by Martin Kuppinger | March 2012 + > Turning the Internet upside down and making privacy a fundamental layer of any networked interaction in the post Google & Facebook era. How the individuals will gain control. How social networks will have to adapt their business models. How privacy will return. +* [Life Management Platforms](https://www.kuppingercole.com/topic/learnmore/lifemanagement/2012) + > KuppingerCole, an international, independent Analyst organization headquartered in Europe, specializes in offering technology research, neutral advice and events in Information Security, IAM, GRC as well as all areas concerning the Digital Transformation + +## ABC4Trust \ IBM Zurich + +* [abc4trust.eu](http://web.archive.org/web/20190325050314/https://abc4trust.eu/) + > ABC4Trust is an EU-funded research and development project advancing the federation and interchangeability of technologies supporting trustworthy and at the same time privacy-preserving Attribute-based Credentials (Privacy-ABCs). In order to learn more about the project and Privacy-ABC technologies, click on the 'About ABC4Trust' tab on the left-hand side. +* [Concepts and Features of Privacy-Preserving Attribute-Based Credentials](https://github.com/p2abcengine/p2abcengine/wiki/Concepts-and-features) + > privacy-preserving attribute-based credentials engine +* [IBM Identity Mixer](http://web.archive.org/web/20180521081750/https://www.zurich.ibm.com/identity_mixer/) + > IBM Identity Mixer is a cryptographic protocol suite for privacy-preserving authentication and transfer of certified attributes. +* [IBM Research - Zurich, Identity Mixer](http://web.archive.org/web/20180521081750/https:/www.zurich.ibm.com/identity_mixer/) +* [Concepts and Languages for Privacy-Preserving Attribute-Based Authentication](http://dl.ifip.org/db/conf/idman/idman2013/CamenischDLNPP13.pdf) - Jan Camenisch, Maria Dubovitskaya, Anja Lehmann, Gregory Neven, Christian Paquin, and Franz-Stefan Preiss - IBM Research – Zurich \ ABC4Trust - 2013 + > Abstract. Existing cryptographic realizations of privacy-friendly authentication mechanisms such as anonymous credentials, minimal disclosure tokens, selfblindable credentials, and group signatures vary largely in the features they offer and in how these features are realized. Some features such as revocation or de-anonymization even require the combination of several cryptographic protocols. These differences and the complexity of the cryptographic protocols hinder the deployment of these mechanisms for practical applications and also make it almost impossible to switch the underlying cryptographic algorithms once the application has been designed. In this paper, we aim to overcome this issue and simplify both the design and deployment of privacy-friendly authentication mechanisms. We define and unify the concepts and features of privacy-preserving attribute-based credentials (Privacy-ABCs) and provide a language framework in XML schema. Our language framework enables application developers to use Privacy-ABCs with all their features without having to consider the specifics of the underlying cryptographic algorithms—similar to as they do today for digital signatures, where they do not need to worry about the particulars of the RSA and DSA algorithms either. + +## OAuth2 + +* [OAuth #OAuth_2.0](https://en.wikipedia.org/wiki/OAuth#OAuth_2.0) -wikipedia.org + > OAuth 2.0 is not backwards compatible with OAuth 1.0. OAuth 2.0 provides specific authorization flows for web applications, desktop applications, mobile phones, and smart devices. The specification and associated RFCs are developed by the IETF OAuth WG;[7] the main framework was published in October 2012. + > + > Facebook's Graph API only supports OAuth 2.0.[8] Google supports OAuth 2.0 as the recommended authorization mechanism for all of its APIs.[9] Microsoft[10] also supports OAuth 2.0 for various APIs and its Azure Active Directory service, which is used to secure many Microsoft and third party APIs. + > + > The OAuth 2.0 Framework[11] and Bearer Token Usage[12] were published in October 2012. +* [OpenID Connect](https://en.wikipedia.org/wiki/OpenID_Connect) - wikipedia + > OpenID Connect (OIDC) is an authentication layer on top of OAuth 2.0, an authorization framework. The standard is controlled by the OpenID Foundation. + +## IndieAuth \ IndieWeb + +* [IndieAuth](https://en.wikipedia.org/wiki/IndieAuth) - wikipedia + > IndieAuth is a standard decentralized authentication protocol that uses OAuth 2.0 and enables services to verify the identity of a user represented by a URL as well as to obtain an access token that can be used to access resources under the control of the user.. IndieAuth is ... +* [indieweb.org - timeline #2010](https://indieweb.org/timeline#2010) + +## Respect Network + +[Around 2011](https://web.archive.org/web/20121004035433/http://respectnetwork.com/respect-trust-framework), Respect Network began working to promote the idea of personal data clouds for the protection of personal information. + > Respect Network is the world's first trusted personal data network that will let customers and companies connect over direct, personal channels that are always under the customer's control. Every member of the Respect Network agrees to the award-winning Respect Trust Framework so customers can be sure that the privacy and security of their personal data will always be respected. + > + > The foundation of the Respect Network is the Respect Trust Framework, which was listed with the Open Identity Exchange in May 2011 and honored with the Privacy Award at the 2011 European Identity Conference. This is the umbrella legal contract to which every member (person or business) of the Respect Network agrees when they join the network + +* [Respect Network (@respectnet)](https://twitter.com/respectnet) +* [WEF Publishes “Rethinking Personal Data: Strengthening Trust”](https://respectnetwork.wordpress.com/2012/05/17/wef-publishes-rethinking-personal-data-strengthening-trust/) + > Yesterday the World Economic Forum (WEF) Rethinking Personal Data initiative published a new report, Rethinking Personal Data: Strengthening Trust (PDF). The second report from the project (the fir… +* [Respect Network and Kynetx Release “The Personal Channel”](https://respectnetwork.wordpress.com/2012/06/21/the-personal-channel/) + > 14 June 2012, London: At the World Economic Forum Rethinking Personal Data expert meeting today, Respect Network and Kynetx released a new paper, The Personal Channel: The Extraordinary Benefits of… +* [Respect Network Brings Together Neustar and Swisscom as Founding Partners](https://respectnetwork.wordpress.com/2012/07/16/respect-network-brings-together-neustar-and-swisscom-as-founding-partners/) + > Vail, Colorado — July 16, 2012—Respect Network Corporation, a San Francisco based technology company, today announced it is forming a global network for the trusted exchange of personal data and has secured Neustar (NSR) and Swisscom (SCMN.VX) as founding partners. The announcement was made during the Open Identity Exchange meeting taking place here during the 2012 Cloud Identity Summit this week. +* [Founding Partners](http://web.archive.org/web/20120721014759/http:/respectnetwork.com/founding-partners/) - web.archive.org - respectnetwork.com + > Founding Partners are companies who are joining with Respect Network Corporation to develop and deploy the Respect Network. Currently our Founding Partners fall into four categories: Commercial Par... +* [The Personal Channel: The Extraordinary Benefits of Communicating ...](https://respectnetwork.wordpress.com/the-personal-channel/) + > With the emergence of personal clouds comes the newest form of communications link: the personal channel. Personal channels combine many of the best features of email and social networks without th… +* [Privacy by Design and the Emerging Personal Data Ecosystem](https://respectnetwork.wordpress.com/privacy-by-design-and-the-personal-data-ecosystem/) + > In a new paper titled Privacy by Design and the Emerging Personal Data Ecosystem, renowned Ontario Information and Privacy Commissioner Ann Cavoukian together with co-authors from the United States… +* [From Personal Computers to Personal Clouds: The Birth of the Cloud OS](https://respectnetwork.wordpress.com/personal-clouds/) + > Think “cloud computing” is only for big companies and big data? In fact one of the next big steps in cloud computing is also the next big step in personal, social, and mobile computing:… + > We connect companies that build personal control over personal data +* [The Respect Trust Framework](https://web.archive.org/web/20121004035433/http:/respectnetwork.com/respect-trust-framework) + > The foundation of the Respect Network is the Respect Trust Framework, which was listed with the Open Identity Exchange in May 2011 and honored with the Privacy Award at the 2011 European Identity C... +* [The Respect Trust Framework](https://respectnetwork.wordpress.com/respect-trust-framework/) + > The foundation of the Respect Network is the Respect Trust Framework, which was listed with the Open Identity Exchange in May 2011 and honored with the Privacy Award at the 2011 European Identity C… +* [Respect Trust Framework - OIXNet.org](http://oixnet.org/wp-content/uploads/2016/02/respect-trust-framework-v2-1.pdf) +* [Respect Network Company Profile: Acquisition & Investors | PitchBook](https://pitchbook.com/profiles/company/53867-44) + > Information on acquisition, funding, cap tables, investors, and executives for Respect Network. Use the PitchBook Platform to explore the full profile. + +## Windhover Principles + +* [Top Bitcoin Companies Propose the Windhover Principles - A New Dig...](https://www.ccn.com/top-bitcoin-companies-propose-windhover-principles-new-digital-framework-digital-identity-trust-open-data/) + > ID3, founded out of the MIT Media Lab, has teamed up with nearly two dozen leading digital currency firms to announce the Windhover Principles. ID3 is a research and educational nonprofit with a mission to develop a new social ecosystem of trusted digital institutions. The Wi... +* [The Windhover Principles for Digital Identity, Trust, and Data](https://www.tokencommons.org/Windhover-Principles-for-Digital-Identity-Trust-Data.html) + > Today we communicate, share and transact digitally over the Internet. Individuals who make use of the Internet for these purposes should have control over their digital +* [HubID First to Deploy Windhover Principles and Framework for Digit...](https://hubculture.com/hubs/47/news/689/) + > HubID, (the self-sovereign digital identity system at the core of Hub Culture and the Ven currency) is the first consumer application to deploy the Windhover Principles and features new frameworks for digital identity, trust and open data. The core technology has been in deve... + +## Namecoin + +* [Namecoin, A Replacement For SSL](http://blog.mediocregopher.com/namecoind-ssl.html) - [news.ycombinator.com](https://news.ycombinator.com/item?id=6786239) + +## W3C Credentials Community Group + +[8/14](https://www.w3.org/community/credentials/charter-20140808/) The [Credentials Community Group](https://www.w3.org/community/credentials/)[[**ϟ**](https://w3c-ccg.github.io/)] forms, hosted by [World Wide Web Consortium(W3C)](https://www.w3.org/) + +* [W3C Credentials Community Group Charter | Credentials Community Group](https://www.w3.org/community/credentials/charter-20140808/) - 2014 + > "to forge a path for a secure, decentralized system of credentials that would empower both individual people and organizations on the Web to store, transmit, and receive digitally verifiable proof of qualifications and achievements." —proposed by [Manu Sporney](http://manu.sporny.org/)[[**T**](https://twitter.com/manusporny)] (of [digitalbazaar.com](https://digitalbazaar.com/)) + +## Pan Canadian Trust + +* [Pan-Canadian Trust Framework ™ Work Program](https://diacc.ca/pan-canadian-trust-framework/) +* [TBS Identity Policy Workshop](https://archive.org/details/TBSIdentityPolicyWorkshop/page/n2) by Treasury Board of Canada Secretariat + > Treasury Board Identity Management Policy and Pan-Canadian Trust Framework + > + > Identity Management Policy Workshop + > + > Including the History of the Pan-Canadian Trust Framework +* [TBS Identity Policy Workshop](https://archive.org/stream/TBSIdentityPolicyWorkshop/TBS_Identity-Policy-Workshop_djvu.txt) + > Issued under Policy on Government Security (PGS) + > + > - 2009: Directive on Identity Management (applies to employees, external clients, organizations, and devices) + > - 2011: Federating Identity Management in the GC + > - 2012: Guideline on Defining Authentication Requirements + > - 2013: Standard on Identity and Credential Assurance + > - 2015: Guideline on Identity Assurance + > - 2016: CSE User Authentication Guidance for IT Systems +* [TBS Identity Policy Workshop : Treasury Board of Canada Secretariat](https://archive.org/details/TBSIdentityPolicyWorkshop) + > Treasury Board Identity Management Policy and Pan-Canadian Trust FrameworkIdentity Management Policy WorkshopIncluding the History of the Pan-Canadian Trust... + +## Jolocom '02 \ '14 + +* [Jolocom: Who owns and controls your data?](https://stories.jolocom.com/jolocom-who-owns-and-controls-your-data-effc7bc02ee8) + > I always believed that I should be in control of my own data and share it accordingly. Therefore in 2002 I started Jolocom in San Francisco. But back then the resistance to open networks and communication was very strong, and the technological barrier to enter the market quite high. In the meantime at first social media and later blockchain changed the rules of the game. This is what lead us to start with Jolocom 3 years ago and ever since we won various grants, build a great team and a functional prototype. \ No newline at end of file diff --git a/_posts/history/2020-01-03-blockchain-2015-19.md b/_posts/history/2020-01-03-blockchain-2015-19.md new file mode 100644 index 00000000..eeedf235 --- /dev/null +++ b/_posts/history/2020-01-03-blockchain-2015-19.md @@ -0,0 +1,299 @@ +--- +title: "History - Blockchain Identity - 2015-2019" +layout: single +permalink: /history/2015-2019/ +categories: ["History"] +last_modified_at: 2020-01-04T13:22:33-23:00 +--- + +## UN Agenda for Sustainable Development + + + +The same month, the UN unveiled it's *[Agenda for Sustainable Development](https://sustainabledevelopment.un.org/post2015/transformingourworld)*: + >* Promote peaceful and inclusive societies for sustainable development, provide access to justice for all and build effective, accountable and inclusive institutions at all levels + >* Substantially reduce corruption and bribery in all their forms +Develop effective, accountable and transparent institutions at all levels + >* **By 2030, [provide legal identity for all](https://sustainabledevelopment.un.org/sdg16), including birth registration** + >* Ensure public access to information and protect fundamental freedoms, in accordance with national legislation and international agreements—(*emphasis mine*) +* [DIGITAL IDENTITY AS A BASIC HUMAN RIGHT](https://impakter.com/digital-identity-basic-human-right/) +* [AID:Tech](https://aid.technology) [[**T**]](https://twitter.com/aidtechnology) — "is a voucher and digital identity solution for refugees. A digital record of a person's identity is stored on a smart card, along with various additional information. Blockchain technology is used to distribute all resources in a highly traceable manner." (another early example of blockchain for humanitarian aide) +* [World Bank - Digital IDs for Development](http://www.worldbank.org/en/events/2015/06/23/digital-ids-for-development) +* [Additional Info on Blockchain and the United Nations](https://infominer.id/research/UnitedNations.html) +* [Transforming our world: the 2030 Agenda for Sustainable Development](https://sustainabledevelopment.un.org/post2015/transformingourworld) + > The High-level Political Forum on Sustainable Development is the central UN platform for the follow-up and review of the 2030 Agenda for Sustainable Development adopted at the United Nations Sustainable Development Summit on 25 September 2015. + > + > This Agenda is a plan of action for people, planet and prosperity. It also seeks to strengthen universal peace in larger freedom. We recognise that eradicating poverty in all its forms and dimensions, including extreme poverty, is the greatest global challenge and an indispensable requirement for sustainable development. All countries and all stakeholders, acting in collaborative partnership, will implement this plan. We are resolved to free the human race from the tyranny of poverty and want and to heal and secure our planet. We are determined to take the bold and transformative steps which are urgently needed to shift the world onto a sustainable and resilient path. As we embark on this collective journey, we pledge that no one will be left behind. The 17 Sustainable Development Goals and 169 targets which we are announcing today demonstrate the scale and ambition of this new universal Agenda. They seek to build on the Millennium Development Goals and complete what these did not achieve. They seek to realize the human rights of all and to achieve gender equality and the empowerment of all women and girls. They are integrated and indivisible and balance the three dimensions of sustainable development: the economic, social and environmental. + +## bitcoin + +9\15 [Bitnation](https://bitnation.co/) "seeks to establish the concept of '*world citizenship*' via a bitcoin based identity, offering '[*Blockchain Emergency IDs*](https://refugees.bitnation.co/)' to refugees. [[**>**](#Bitcoin)] + +* [Bitnation Pangea](https://bitnation.co/) +* [refugees.bitnation.co/](https://refugees.bitnation.co/) +* [Andreas Antonopoulos: The Case Against Reputation and Identity Systems](https://news.bitcoin.com/andreas-antonopoulos-case-reputation-identity-systems/) + > Andreas Antonopoulos thinks that the key is to hedge against default risk with the blockchain instead of creating reputation systems. +* [XDI Blockstore BIP32](https://github.com/WebOfTrustInfo/rwot1-sf/blob/master/topics-and-advance-readings/cool-hack-xdi-blockstore-bip32.md) + > Historically, XDI infrastructure began by using a centralized registry model. Since this was independent of DNS and had its own commercial component, this infrastructure has been subject to criticism by various communities. After this model collapsed in late 2014, the non-profit XDI.org formed a group called the XDI Registry Working Group to begin developing a distributed blockchain-based solution. Initially, we built a PoC based on simple OP_RETURN Bitcoin transactions, where given an XDI name, its corresponding XDI number and XDI endpoint can be looked up. + +## Rebooting the Web of Trust + +The first [Rebooting Web of Trust](http://www.WebOfTrust.info)(RWoT) workshop was held during [November 2015](https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust); attracting the likes of Vitalik Buterin, Peter Todd, Gregory Maxwell, Joel Dietz, Christopher Allen, and Jon Callas, [according to Andreas Antonopolis](https://news.bitcoin.com/andreas-antonopoulos-case-reputation-identity-systems/). + +[That workshop](https://github.com/WebOfTrustInfo/), produced 5 technical white papers:\ + [5 WoT-usecases](https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust/blob/master/final-documents/satisfying-real-world-use-cases.pdf) • [Decentralized PKI](https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust/blob/master/final-documents/dpki.pdf) • [Smart Signatures](https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust/blob/master/final-documents/smart-signatures.pdf) • [Creating a New World of Trust](https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust/blob/master/final-documents/whats-the-next-step.pdf) + +* [Rebranding Web of Trust](https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust/blob/master/final-documents/rebranding-web-of-trust.pdf) by Shannon Appelcline, Dave Crocker, Randall Farmer, and Justin Newton + > The Web of Trust. It’s the buzzword for a new model of decentralized identity. However, it’s also a phrase that dates back almost twenty-five years and has been heavily overloaded with meaning during that time. The classic definition of Web of Trust derives from PGP, but the top Google results refer to a website reputation rating system created by a Finnish internet company. Meanwhile, some use it as a big tent that includes identity authentication & verification, certificate validation, and reputation assessment, while the vibrant blockchain community is also drawing new attention to the classic concept. + > + > To build a contemporary Web of Trust, we need to better define it. To do so, we must both understand what the classic Web of Trust was and create a model for the elements of trust that are contained within a more modern definition. +* [Andreas Antonopoulos: The Case Against Reputation and Identity Systems](https://news.bitcoin.com/andreas-antonopoulos-case-reputation-identity-systems/) + > Andreas Antonopoulos thinks that the key is to hedge against default risk with the blockchain instead of creating reputation systems. +* [Initial Rebooting the Web of Trust Design Workshop](http://www.weboftrust.info/event-2015-sf) - San Francisco, CA — November 3rd to 4th, 2015 +* [Satisfying Real World Use Cases](https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust/blob/master/final-documents/satisfying-real-world-use-cases.pdf) + > Decentralized systems that are engineered to prevent concentrating power as they grow avoid this. They can in fact increase their credibility as more users provide their assessments as input. Protocols and structures that are distributed and self-sovereign also offer significantly improved robustness, portability, and versatility than conventional centralized or escrowed processes — especially when combined with secure cryptography. + > + > One of the first technologies to offer the advantages of decentralization emerged 25 years ago when the advent of PGP realized a Web of Trust that contained decentralized, cryptographically verified attestations of its users. Unfortunately, failures of UX design confined the spread of PGP to highly technical communities. + > + > Today, decentralized Webs of Trust remain as important as ever. Now is the time to extend them to be usable by everyone who has access to digital networks, in particular to marginalized populations that can benefit from the technology. It is a fortunate tragedy that there is no shortage of real-life examples of the need for decentralized Webs of Trust in the world today. A large spectrum of individuals — from marginalized persons like stateless refugees and victims of human trafficking to members of the informal or unregulated economy — urgently need to participate in otherwise privileged economic and political fora, but they face technical, economic, and political barriers to entry. + > + > The essential problem is to connect burgeoning new technological developments with unmet consumer needs, and vice-versa. In this paper, we present five use cases: from two relatively simple cases of managing selective disclosure to the most extreme case of establishing government-verifiable credentials from nothing for a stateless refugee. +* [Decentralized Web Summit 2016-06-09 Lightning Talks](http://www.kevinmarks.com/decentralweb2016-06-09.html) + > *Rebooting the Web of Trust - Christopher Allen* + > -Monday was the 25th anniversary of PGP. Nobody celebrated this on twitterdom + > -PGP didn't succeed. It is barely used except for code signing. + > -I started #RebootingTheWebOfTrust to change this - it's like a hackathon for white papers + > -to join #RebootingTheWebOfTrust the entry fee is posting a reading list + > -we wrote white papers on "what is the web of trust", "use cases", "creating a distributed registry" + > -this led to Self-Sovereign Identity - you are the source of your own identity + > -identity is not an administrative mechanism for others to control + > -this inspired a UN identity conference #ID2020 + > -we have a lot of white papers in progress, and a 3rd conference in Sept 2016 go to weboftrust.info +* [Decentralized Public Key Infrastructure](https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust/blob/master/final-documents/dpki.pdf) by (alphabetical by last name) Christopher Allen, Arthur Brock, Vitalik Buterin, Jon Callas, Duke Dorje, Christian Lundkvist, Pavel Kravchenko, Jude Nelson, Drummond Reed, Markus Sabadello, Greg Slepak, Noah Thorp, and Harlan T Wood + > Today’s Internet places control of online identities into the hands of third-parties. Email addresses, usernames, and website domains are borrowed or "rented" through DNS, X.509, and social networks. This results in severe usability and security challenges Internet-wide. This paper describes a possible alternate approach called decentralized public key infrastructure (DPKI), which returns control of online identities to the entities they belong to. By doing so, DPKI addresses many usability and security challenges that plague traditional public key infrastructure(PKI). DPKI has advantages at each stage of the PKI life cycle. It makes permissionless bootstrapping of online identities possible and provides for the simple creation of stronger SSL certificates. In usage, it can help “Johnny” to finally encrypt thanks to its relegation of public key management to secure decentralized datastores. Finally, it includes mechanisms to recover lost or compromised identifiers. + +## SSI + +* [Self Sovereign Identity Principles](https://github.com/WebOfTrustInfo/self-sovereign-identity/blob/master/self-sovereign-identity-principles.md) +* [Self Sovereign Identity (SSI)](https://decentralized-id.com/literature/self-sovereign-identity/) - decentralized-id.com + > Literature associated with the Fundamentals of Self-Sovereign Identity. +* [Self-Sovereign Identity](http://www.moxytongue.com/2016/02/self-sovereign-identity.html) - moxytongue.com + > Self-Sovereign Identity must emit directly from an individual human life, and not from within an administrative mechanism created by, for,... +* [A technology free definition of Self Sovereign Identity](https://github.com/WebOfTrustInfo/rwot3-sf/blob/master/topics-and-advance-readings/a-technology-free-definition-of-self-sovereign-identity.pdf) + +## ID4D \ Worldbank + +* [Identification for Development (ID4D) Global Dataset (Global ID4D...](https://datacatalog.worldbank.org/dataset/identification-development-global-dataset) + > The Global ID4D Dataset, compiled by the World Bank Group’s Identification for Development (ID4D) initiative, provides a global estimate for the number of +* [Digital IDs for Development](https://www.worldbank.org/en/events/2015/06/23/digital-ids-for-development) + > This two-hour session will go over the key elements of the Digital IDs for Development program and acknowledge the support of the government of France to this agenda. +* [The World Citizen: Transforming Statelessness into Global Citizenship](http://blogs.worldbank.org/digital-development/world-citizen-transforming-statelessness-global-citizenship) MARIANA DAHAN, JOHN EDGE - NOVEMBER 25, 2015 +* [blogs.worldbank.org/team/john-edge](https://blogs.worldbank.org/team/john-edge) + > Social entrepreneur specializing in financial technology and digital identity, working with international organizations to develop collaborative financial and identity inclusion strategies that enable investment from the private sector, through: (i) establishing sustainable social innovation business models, (ii) enabling interaction between regulators, government and innovators, and (iii) forwarding the agenda for SDG targets 1.4 (Ensure that all men and women, in particular the poor and the vulnerable, have appropriate new technology and financial services, including microfinance) and 16.9 (By 2030, provide legal identity for all, including birth registration). + > + > Technical interests include trusted computing, blockchain and artificial intelligence technologies, allied with the proliferation of mobile devices, which are enabling self-sovereign identity and the emergence of commons money systems. + +## id2020 + +* [ID2020, ID4D aim to bring legal, binding, digital IDs to all world's citizens](https://www.secureidnews.com/news-item/projects-aims-for-legal-identity-for-everyone/) + > It was late June of 2014 when businessman John Edge was invited to a screening of a short film directed by actress Lucy Liu. “Meena” is about an 8-year-old girl sold to a brothel and forced into sex slavery for more than a decade. It’s based on a true story. “It’s horrific,” Edge says. + > + > A panel of experts took questions afterward, including Susan Bissell, chief of child protection at international humanitarian group UNICEF. “Susan articulated that one of the biggest problems in protecting children who are at risk of sexual violence is a lack of birth certificates or identity,” Edge says. +* [ID2020 | Digital Identity Alliance](http://id2020.org/) + > The ID2020 Alliance is a global partnership maximizing the potential of digital ID to improve lives. +* [ID2020 to kick start digital identity summit at UN with PwC support.](https://preview.thenewsmarket.com/Previews/PWC/DocumentAssets/434561.pdf) +* [ID2020: Digital Identity with Blockchain | Accenture](https://www.accenture.com/us-en/insight-blockchain-id2020) + > Accenture has joined the ID2020 alliance and leverages its unique identity service platform. Learn about our digital identity with blockchain solutions. +* [Mastercard, Microsoft Join Forces to Advance Digital Identity Inno...](https://newsroom.mastercard.com/press-releases/mastercard-microsoft-join-forces-to-advance-digital-identity-innovations/) + > PURCHASE, N.Y. and REDMOND, Wash. – December 3, 2018 – Mastercard (NYSE: MA) and Microsoft (Nasdaq “MSFT” @microsoft) today announced a strategic collaboration to improve how people manage and use their digital identity. Currently, verifying your identity online is s... +![](https://imgur.com/ymviAssl.png) + +* [4/16](https://edps.europa.eu/data-protection/data-protection/legislation/history-general-data-protection-regulation_en) the EU adopted the GDPR to be enacted as law May 2018. +* [Projects aim for legal identity for everyone - ID2020, ID4D aim to bring legal, binding, digital IDs to all world's citizens](https://www.secureidnews.com/news-item/projects-aims-for-legal-identity-for-everyone/) + +### ID2020 Design Workshop + +The second RWoT workshop ran in conjunction with the UN's [ID2020](https://id2020.org/) Summit in New York that [May](https://press.pwc.com/News-releases/id2020-to-kick-start-digital-identity-summit-at-un-with-pwc-support./s/9fe11be5-cbd8-486b-b4d2-d798f486d0f2); clearly a significant time for decentralized identity: + >1.1 Billion people live without an officially recognized identity — This lack of recognized identification deprives them of protection, access to services, and basic rights. ID2020 is a public-private partnership dedicated to solving the challenges of identity for these people through technology. - id2020.org + +* [ID 2020 Design Workshop](https://www.eventbrite.com/e/id-2020-design-workshop-tickets-24611080404?ref=estw) - eventbright.com + > Our second #RebootingWebOfTrust Design Workshop on decentralized identity technologies will be held the weekend of May 21st and 22nd in New York City. This date was selected to follow an important digital identity policy event at the United Nations. + > + > The day before, on the 20th of May, the non-profit ID 2020 is organizing a conference on digital identity, inclusion and human rights in the Trusteeship Council Room of the United Nations. The ID 2020 Summit will bring together industry leaders, NGOs, governments, and emerging technology experts to establish a global conversation resulting in working coalitions to address the problems around digital identity and suggest solutions. The two main goals of the UN summit are: + > + > by 2020, be able to create a legally valid digital identity for every last person without an identity + > by 2030 to have rolled this capability out to at least 1 billion at-risk people to make them visible and restore them into society both personally and economically +* [WebOfTrustInfo/rwot2-id2020](https://github.com/WebOfTrustInfo/rwot2-id2020/) - RWOT2 for the ID2020 UN Summit (May 2016). + * [RWoT2 - Topics & Advance Readings](https://github.com/WebOfTrustInfo/rwot2-id2020/blob/master/topics-and-advance-readings/README.md) + > 1.1 Billion people live without an officially recognized identity — This lack of recognized identification deprives them of protection, access to services, and basic rights. ID2020 is a public-private partnership dedicated to solving the challenges of identity for these people through technology. +* [Identity Crisis: Clear Identity through Correlation](https://github.com/WebOfTrustInfo/ID2020DesignWorkshop/blob/master/final-documents/identity-crisis.pdf) +* [Christopher Allen](http://www.lifewithalacrity.com/)[[**info**](https://christophera.info/)] details the overarching history of internet idenitity standards in his germinal work (submitted to ID2020\RWoT workshop): + * **[The Path to Self-Soverereign Identity](http://www.lifewithalacrity.com/2016/04/the-path-to-self-soverereign-identity.html)**[[**ϟ**](https://www.coindesk.com/path-self-sovereign-identity/amp/)] details the history of identity standards leading up to self-sovereign and details the 10 principles of self-sovereign identity. + > I am part of the team putting together the first ID2020 Summit on Digital Identity at the United Nations + +Evident from the other [whitepapers](https://github.com/WebOfTrustInfo/ID2020DesignWorkshop/blob/master/topics-and-advance-readings/README.md) submitted to the second RWoT Workshop, the DID identifier had begun to emerge: +* [Decentralized Identifiers (DIDs) and Decentralized Identity Management (DIDM)](https://github.com/WebOfTrustInfo/ID2020DesignWorkshop/blob/master/topics-and-advance-readings/DID-Whitepaper.md) + >"Decentralized Identifiers (DID) stored in a permissioned blockchain enable principals to directly control their own identities with cryptographic proofs and secure, addressable network endpoints. DIDs further enable a Decentralized Identity Management (DIDM) infrastructure that will empower people and organizations to securely and confidentially manage and assert their identities." +* [Requirements for DIDs](https://github.com/WebOfTrustInfo/ID2020DesignWorkshop/blob/master/final-documents/requirements-for-dids.pdf) + >"Respect Network is conducting a research project for the [U.S. Department of Homeland Security](https://bravenewcoin.com/insights/u-s-department-of-homeland-security-funds-four-blockchain-companies-developing-new-cyber-security-technology), HSHQDC-16-C-00061, to analyze the applicability of blockchain technologies to a decentralized identifier system. Our thesis is that blockchains, or more generically distributed ledgers, are a potentially powerful new tool for “identity roots” — the starting points for an Internet identity. However “blockchain identity” may not fully address the core security and privacy principles needed in a complete identity system. In this case DIDs — Decentralized Identifiers rooted on a distributed ledger — may end up being a foundational building block for higher level identity management solutions. - +* [Identity System Essentials](https://www.evernym.com/wp-content/uploads/2017/02/Identity-System-Essentials.pdf) 3/16 (Original Evernym Identity WP also submitted to ID2020\RWoT workshop) + +## Evernym + +![](https://untangled.world/wp-content/uploads/2017/08/everynym-logo-1400x357.png) + +[Evernym](https://www.evernym.com/)[[**T**](https://twitter.com/evernym)] originally created the Sovrin codebase, founded in 2013. +* [Timothy Ruff (@RuffTimo)](https://twitter.com/RuffTimo/status/705029170527514624) + > Out of stealth mode at last: http://evernym.com #identity #privacy #fintech #me2b #FOSS +* [Evernym: Life's Username](https://web.archive.org/web/20150506234028/http://evernym.com:80/life-username) + > *Privacy so strong, we patented it* + > + > Evernym literally means "forever name." We give the control of your digital communication back to you—the receiver—not any anonymous sender who happens to have your address. +* [Identity System Essentials](https://www.evernym.com/wp-content/uploads/2017/02/Identity-System-Essentials.pdf) - Samuel M. Smith Ph.D. and Dmitry Khovratovich Ph.D. - 29 March 2016 +* [Outlier Ventures invests in, becomes strategic partner of Evernym](https://coinreport.net/outlier-ventures-invests-becomes-strategic-partner-evernym/)[[**ϟ**](https://outlierventures.io/portfolio/evernym/)] +* [The Three Models of Digital Identity Relationships — How self-sovereign identity (SSI) is different, and why it’s better](https://medium.com/evernym/the-three-models-of-digital-identity-relationships-ca0727cb5186) +* [Applying Blockchain to Decentralized Identity](https://www.sbir.gov/sbirsearch/detail/1241097) - SBIR - Drummond Reed + +## sovrin + +* [Sovrin Foundation Launches First Dedicated Self-Sovereign Identity Network](https://www.prnewswire.com/news-releases/sovrin-foundation-launches-first-dedicated-self-sovereign-identity-network-300336702.html) +* [Hyperledger Welcomes Project Indy – Hyperledger](https://www.hyperledger.org/blog/2017/05/02/hyperledger-welcomes-project-indy) + > Guest post: Phillip J. Windley, Ph.D., Chair, Sovrin Foundation We’re excited to announce Indy, a new Hyperledger project for supporting independent identity on distributed ledgers. Indy provides tools, libraries, and reusable... +* [Announcing the Sovrin Foundation](http://www.windley.com/archives/2016/09/announcing_the_sovrin_foundation.shtml) +* [Respect Network Company Profile: Acquisition & Investors | PitchBook](https://pitchbook.com/profiles/company/53867-44) (Sovrin Aquisition - Respect Network) + > Information on acquisition, funding, cap tables, investors, and executives for Respect Network. Use the PitchBook Platform to explore the full profile. + +## Learning Machine \ Blockcerts + +* [Verifiable Credentials on the Blockchain](https://medium.com/learning-machine-blog/blockchain-credentials-b4cf5d02bbb7) + > The MIT Media Lab and Learning Machine have been working on a collaborative project for issuing official records to recipients, and anchoring them onto the Bitcoin blockchain. We’ve just open-sourced the first version of that project and named it Blockcerts. It allows education providers, employers, and others to issue official certificates that supply proof of membership, completion, or achievement. These certificates can be collected by individuals and shared directly with anyone who requires official documents. The Bitcoin blockchain is currently being used as the secure anchor of trust to ensure that each certificate is authentic, unchanged, and still valid. +* [Blockcerts on Github](https://github.com/blockchain-certificates) + > Blockcerts is an open standard for creating, issuing, viewing, and verifying blockchain-based certificates. + +## mydata + +* [My Data 2016](http://mydata2016.org/) + +## Consensys + +* [The Identity Crsis](https://medium.com/@ConsenSys/identity-is-defined-in-merriam-s-dictionary-as-who-someone-is-a3d6a69f5fa4) + > Identity is defined in Merriam’s dictionary as “who someone is”. As the world and technology evolves one can’t help but notice the changes to the notion of who someone is and how this affects their relation to the world. We’ll focus on the problems that affect humans in regards to their identities, dividing the conversation into developed and developing economies. +* [Identity of the Blockchain: Perils and Promise](https://www.slideshare.net/ChristopherA/identity-of-the-blockchain-perils-and-promise) - slideshare - Christopher Allen +* [Decentralized Identity Foundation Announces Formation At Consensus 2017](https://www.ethnews.com/decentralized-identity-foundation-announces-formation-at-consensus-2017) + > The Decentralized Identity Foundation will collaborate across industries to research personal identity solutions. +* [uPort: The Wallet is the New Browser](https://medium.com/@ConsenSys/uport-the-wallet-is-the-new-browser-b133a83fe73) + > Many people feel user-owned identity and data will be crucial for realizing the compelling vision of Web 3.0. uPort will act as a unique and user-controlled perspective on the blockchain based upon the persona(s) of the user. + +## Decentralized Identity Foundation - DIF + +On May 22 at Consensus 2017 the formation of the Decentralized Identity Foundation (DIF) [was announced](https://www.ethnews.com/DecentralizedIDentity-foundation-announces-formation-at-consensus-2017): + > The Decentralized Identity Foundation will collaborate across industries to research personal identity solutions. +* [Conensus 2017 - Building an Foundation for Decentralized Identity](https://www.youtube.com/watch?v=l5laRZfn8AI) (video) +* [Decentralized Identity Foundation Grows To 56 Members In Our First Year](https://medium.com/DecentralizedIDentity/DecentralizedIDentity-foundation-grows-to-56-members-in-our-first-year-3ec117e811d8) +* [A Universal Resolver for self-sovereign identifiers](https://medium.com/decentralized-identity/a-universal-resolver-for-self-sovereign-identifiers-48e6b4a5cc3c) - [uniresolver.io](https://uniresolver.io/) + > On any blockchain or other decentralized system + +## Verifiable Credentials + +![https://cdn.discordapp.com/attachments/617264019031719946/617264032465944579/unknown.png](https://cdn.discordapp.com/attachments/617264019031719946/617264032465944579/unknown.png) + +* [[EDITOR'S DRAFT] Verifiable Claims Working Group Frequently Asked Questions](http://w3c.github.io/webpayments-ig/VCTF/charter/faq.html) +* [Verifiable Claims Working Group Charter Approved; join the Verifiable Claims Working Group (Call for Participation](https://lists.w3.org/Archives/Public/public-vc-wg/2017Apr/0000.html) +* [W3C Verifiable Claims Working Group](https://www.w3.org/2017/vc/WG/) + > The mission of the Verifiable Claims Working Group is to make expressing and exchanging claims that have been verified by a third party easier and more secure on the Web. +* [OpenCreds](https://opencreds.org) - [source](https://github.com/opencreds/website) + > COMMUNITY: The W3C Credentials Community Group website. - opencreds/website + +## DID + +![https://imgur.com/9nC6e9Gl.png](https://imgur.com/9nC6e9Gl.png) + +* [Requirements for DID](https://github.com/WebOfTrustInfo/rwot2-id2020/blob/master/final-documents/requirements-for-dids.pdf) - RWOT2 for the ID2020 UN Summit (May 2016). +* [Applying Blockchain to Decentralized Identity](https://www.sbir.gov/sbirsearch/detail/1241097) - sbir.gov + +## DID Auth + +![https://cdn.discordapp.com/attachments/617263775359303680/617263797706555392/unknown.png](https://cdn.discordapp.com/attachments/617263775359303680/617263797706555392/unknown.png) + +## IBM Blockchain + +* [Blockchain for Identity Management IBM part 3 of 3](https://www.slideshare.net/eburon/blockchain-for-identity-management-ibm-part-3-of-3) +* [Blockchain for Identity Management IBM part 1 of 3](https://www.slideshare.net/eburon/blockchain-for-identity-management-ibm-part-1-of-3) +* [Blockchain for Identity Management IBM part 2 of 3](https://www.slideshare.net/eburon/blockchain-for-identity-management-ibm-part-2-of-3) +* [Self-sovereign identity: Why blockchain? - Blockchain Pulse: IBM Blockchain](https://www.ibm.com/blogs/blockchain/2018/06/self-sovereign-identity-why-blockchain/) + > One of the most common questions I get when talking to customers and analysts about the self-sovereign identity (SSI) movement is, “Why blockchain?” + +## BTCR + +* [BTCR DIDs and DDOs](https://github.com/WebOfTrustInfo/rwot5-boston/blob/master/topics-and-advance-readings/btcr-dids-ddos.md) By Kim Hamilton Duffy (Learning Machine), Ryan Grant, and Christopher Allen + > BTCR is a DID method that is based on the Bitcoin blockchain. The BTCR DID scheme uses a TX Ref-encoded (described below) transaction on the Bitcoin blockchain. The DID Description is constructed from a combination of the transaction details and an optional "continuation" DID Description, the address of which is stored in the OP_RETURN field. This could be a link to an IPFS address of a DID Description with additional entities. +* [BTCR DID Resolver Specification](https://github.com/WebOfTrustInfo/rwot6-santabarbara/blob/master/final-documents/btcr-resolver.md) By: Kim Hamilton Duffy, Christopher Allen, Ryan Grant, Dan Pape + > This describes the process of resolving a BTCR DID into a DID Document. The draft reference implementation is available at https://github.com/WebOfTrustInfo/btcr-did-tools-js (see didFormatter.js). Note that not all steps described in this document are implemented yet. +* [BTCR TX Conversion Playground](https://weboftrustinfo.github.io/btcr-tx-playground.github.io/) + > This is the BTCR DID Method playground. + +## World Economic Forum - 2018 + +* [The Known Traveller Unlocking the potential of digital identity for secure and seamless travel](http://www3.weforum.org/docs/WEF_The_Known_Traveller_Digital_Identity_Concept.pdf) - weforum.org +* [Identity in a Digital World: A new chapter in the social contract](https://www.weforum.org/reports/identity-in-a-digital-world-a-new-chapter-in-the-social-contract) - weforum.org + > All over the world, a growing number of organizations –from the public and private sectors –are advancing systems that establish and verify digital identities for people, devices and other entities. Yet we are still learning what “identity in a digital world”means. We... + +## DHS-SBIR + +[News Release: DHS S&T Awards $1.3 Million to Small Businesses for Cyber Security Research and Development](https://www.dhs.gov/science-and-technology/news/2016/08/12/news-release-dhs-st-awards-13-million-small-businesses-cyber) -2016 + * [Applying Blockchain to Decentralized Identity](https://www.sbir.gov/sbirsearch/detail/1241097) + > Respect Network will research and develop a decentralized registry and discovery service for Decentralized Identifiers (DIDs) to integrate with the public blockchain. DIDs will allow principals to directly control their own identities with cryptographic proofs and secure, addressable network endpoints. DIDs will enable a Decentralized Identity Management (DIDM) infrastructure that will empower people and organizations to securely and confidentially manage and assert their identities. Open standards and established industry protocols will permit principals to selectively disclose identity claims, and to manage their privacy and digital relationships. Respect Network's thesis is that the combination of DIDs and DIDM architecture, using public and/or private blockchains as "identity backbones", can meet traditional information security principles of confidentiality, integrity, availability, non-repudiation and provenance. Further, our approach applies privacy-by-design principles, including user control, selective disclosure of information and pseudonymity. + * [Credentials on Public/Private Linked Ledgers](https://www.sbir.gov/sbirsearch/detail/1241085) + > A wide variety of applications could benefit from combining identity management technology with decentralized ledgers (aka blockchains). However, not every application uses the same data or requires the same consensus or authorization models. While a single solution is unlikely, we assert each application could benefit from a standard, configurable, decentralized ledger with flexible semantics. We will study the feasibility of this concept by building a proof-of-concept Linked Data ledger format and architecture. + * [News Release: DHS S&T Awards $750K to Virginia Tech Company for Blockchain Identity Management Research and Development](https://www.dhs.gov/science-and-technology/news/2017/09/25/news-release-dhs-st-awards-750k-virginia-tech-company) + > DHS S&T has awarded a $749,241 Small Business Innovation Program (SBIR) contract to Digital Bazaar, Inc. to develop fit-for-purpose blockhains for identity and access management. + * [News Release: DHS S&T Awards $749K to Evernym for Decentralized Ke...](https://www.dhs.gov/science-and-technology/news/2017/07/20/news-release-dhs-st-awards-749k-evernym-decentralized-key) + > The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has awarded Salt Lake City-based startup Evernym a $749,000 Small Business Innovation Program (SBIR) award to develop an easy-to-use, decentralized mechanism for managing public and private key... + +## DKMS - Decentralized Key Management + +![https://cdn.discordapp.com/attachments/617263560644624394/617263594643390480/unknown.png](https://cdn.discordapp.com/attachments/617263560644624394/617263594643390480/unknown.png) + +* [A Framework for Designing Cryptographic Key Management Systems - NIST Special Publication 800-130](https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-130.pdf) - 2013 + +## Veres One + +* [veres-one/veres-one](https://github.com/veres-one/veres-one/graphs/contributors) - began on GitHub Jul 16, 2017 + > A ledger for acquiring and managing decentralized identifiers - veres-one/veres-one + +* [Recent happenings with Linked Data Capabilities](https://github.com/WebOfTrustInfo/rwot6-santabarbara/blob/master/topics-and-advance-readings/ld-ocap-recent-happenings.md) + > Veres One's architecture has been adjusted to take full advantage of Linked Data Capabilities as its primary mechanism for granting authority to perform operations on the ledger as well as on DID Documents. permission to update key materials can be conditionally handed out to an entity (or entities) and later revoked if deemed appropriate using Linked Data Capabilities' design. + > + > As for ledger updates, Accelerators also make use of Linked Data Capabilities. To prevent spamming the ledger, the costs of an update must somehow be accounted for. The traditional way to do this on a blockchain is to use proof of work, and this is also an option in Veres One, but for those use cases where expending time and energy on proof of work is less desirable users can use an "accelerator". + > + > An accelerator is an entity that has been granted a capability to perform updates on the ledger more quickly. Accelerators may likewise take advantage of Linked Data Capabilities' support for delegation, with or without caveats. + + +## ERC 725 + +* [ERC: Proxy Account · Issue #725 · ethereum/EIPs](https://github.com/ethereum/eips/issues/725) + > eip: <to be assigned> title: ERC-725 Proxy Account author: Fabian Vogelsteller (@frozeman) <fabian@ethereum.org>, Tyler Yasaka (@tyleryasaka) +* [Introducing the ERC-725 Alliance](https://medium.com/erc725alliance/introducing-the-erc725-alliance-2fe0682e3515) + > The ERC-725 Alliance proposes a standard for blockchain-based identity. What is ERC-725 and why is it valuable? + +## Microsoft + +* [Decentralized Identity - Own and control your identity](https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE2DjfY) - Microsoft Identity Whitepaper - 2018 + +## von-bcgov + +* [Verifiable Organizations Network - A Production Government Deployment of Hyperledger Indy](https://sourcecrypto.pub/posts/transcripts/VON-Presentation-Jordan-Curran-HGF/#production-networklive-9-10-18) (live 9-10-18) + +## Digital Bazaar Global Standards for Organizational Identity + +* [Digital Bazaar Collaborates with GS1 US, SecureKey and TradeLens on Global Standards for Organizational Identity](https://www.prnewswire.com/news-releases/digital-bazaar-collaborates-with-gs1-us-securekey-and-tradelens-on-global-standards-for-organizational-identity-300910050.html) +* [Blockchain - A U.S. Customs and Border Protection Perspective](https://blockchain.enterprisesecuritymag.com/cxoinsight/blockchain-a-us-customs-and-border-protection-perspective-nid-1055-cid-56.html) + > CBP and DHS built a system using Digital Bazaar’s Veres Delta, a software that is able to translate between entities and software regardless of the blockchain software used. The software platform enabled the government to exchange information between several different blockchain systems seamlessly. The specifications championed by DHS S&T, and now CBP, focus on Decentralized Identifiers, Verifiable Credentials, and Decentralized Key Management System. CBP has adopted these specifications as the standard for the industry to do business with our agency. It is important to note that each of these specifications have been vetted through GS1 (Global Language of Business) and W3C (Worldwide Web Consortium). Utilizing existing protocols, this system allows for an open market and true interoperability between blockchain software. This is something that has not been fully achieved by anyone else that this author is aware of. +* [NAFTA/CAFTA Proof of Concept - Overview & Results](https://www.cbp.gov/sites/default/files/assets/documents/2019-Oct/Final-NAFTA-CAFTA-Report.pdf) + > The North American Free Trade Agreement/Central America Free Trade Agreement (NAFTA/CAFTA) proof of concept (POC) tested the application of Blockchain technology for the entry summary submission process for NAFTA/CAFTA entries. A joint effort was spearheaded by Customs and Border Protection (CBP), Department of Homeland Security (DHS) and private sector organizations. The POC specifically tested the feasibility of the technology for receiving certificate of origin (CO) data and conducting free trade agreement (FTA) origin verifications. Via the test, CBP could request information through the Blockchain to substantiate a claim in lieu of CBP Forms 28 and 29. As a result, the POC achieved almost instantaneous communications between CBP and trade, improved documentation of receipt, and expedited processing for CBP. +* [Digital Bazaar Welcomes TradeLens as Key Organizational Identity Blockchain Technology Participant: Improved Business Efficiency and Identity Security](https://markets.businessinsider.com/news/stocks/digital-bazaar-welcomes-tradelens-as-key-organizational-identity-blockchain-technology-participant-improved-business-efficiency-and-identity-security-1028512559) + > BLACKSBURG, Va., Sept. 10, 2019 /PRNewswire/ -- Digital Bazaar (https://digitalbazaar.com/) and TradeLens (https://www.tradelens.com/) recently announced a strategic collaboration to help facilitate and implement an array of digital ID solutions intended for wide use across the supply chain industry. TradeLens is a digital platform jointly developed by Maersk and IBM that empowers businesses and authorities along the supply chain with a single, secure source of shipping data. Utilizing Organizational Identity automation pioneered by Digital Bazaar, both TradeLens and Digital Bazaar are poised to improve collaboration via the use of blockchain-based secure identity proofing and data sharing technology. +* [Digital Bazaar and SecureKey Join Forces to Develop Global Standards for Organizational Identity](https://www.prnewswire.com/news-releases/digital-bazaar-and-securekey-join-forces-to-develop-global-standards-for-organizational-identity-300919434.html) - Secure Key and DB join forces w Verified.me in canada (toronto based, formerly DID agnostic) + > BLACKSBURG, Va., Sept. 17, 2019 /PRNewswire/ -- Digital Bazaar (https://digitalbazaar.com/) and SecureKey Technologies (https://securekey.com/) recently announced a strategic collaboration to leverage new digital identity standards intended to enhance existing paper-based identity verification processes. Both companies join a growing web of technology providers – including GS1 US and TradeLens – that are working together to improve data sharing and collaboration through blockchain-based approaches and innovative authorization technologies. With combined industry expertise, this project will help set the foundation for more robust global standards for interoperable organizational identity. It will also demonstrate the value of the World Wide Web Consortium (W3C) emerging standards around digital identity for interoperable use in business-to-business (B2B) and business-to-government (B2G) interactions. +* [Digital Bazaar and GS1 US® Collaborate on a New Proof of Concept Exploring the Intersection of Organizational Identity and Blockchain Technology](https://www.prnewswire.com/news-releases/digital-bazaar-and-gs1-us-collaborate-on-a-new-proof-of-concept-exploring-the-intersection-of-organizational-identity-and-blockchain-technology-300923178.html) + > BLACKSBURG, Va., Sept. 24, 2019 /PRNewswire/ -- Digital Bazaar (https://digitalbazaar.com/) and GS1 US (https://www.gs1us.org/) are collaborating on a new proof of concept that explores standards-based, cryptographically secure digital identity across the digital retail and commerce supply chain. The purpose is to leverage GS1 Standards, the most widely used supply chain standards in the world, as an existing infrastructure for data consistency and unique identification to verify the security of contents shipped internationally and track products more efficiently as they move across borders. \ No newline at end of file diff --git a/bookmark-donations/README.md b/bookmark-donations/README.md deleted file mode 100644 index 7dbd6bde..00000000 --- a/bookmark-donations/README.md +++ /dev/null @@ -1,21 +0,0 @@ -# Bookmark Donations - -You are welcome to open an issue or submit a pull-request, to share info, ask questions, or discuss any of this content. - -I made this folder thinking of people who have nice bookmarks, but would have never thought to simply send me an HTML copy of them :D - -I know some of you got bookmarks folders for specific subjects. - -You are welcome to leave a copy here, for posterity. :bow: - ---- - -Likewise, you may simply click edit on this or any page and let GitHub take care of the technical stuff (you won't break anything, I promise :) - -## More information on Contributing - -* [Contributors Intro: InfoHub](https://infominer.id/contributors-intro/) - -## LICENSING - -Everything I publish on this website a contribution to the Public Domain. If you contribute anything you'd like to be licensed otherwise, please provide a link to the full-text of the license.