mirror of
https://github.com/Decentralized-ID/decentralized-id.github.io.git
synced 2024-12-26 23:59:36 -05:00
fix links
This commit is contained in:
parent
302b67d822
commit
93bea4e027
@ -3,7 +3,7 @@ main:
|
||||
- title: "Our Aim"
|
||||
url: "/aim/"
|
||||
- title: Getting Started
|
||||
url: /101/
|
||||
url: /getting-started/
|
||||
- title: "Posts by Tag"
|
||||
url: "/tags/"
|
||||
- title: "Recent Posts"
|
||||
|
@ -44,12 +44,12 @@ It's impossible to have a conversation about decentralized-id without discussing
|
||||
* [Difference Between Authentication and Authorization](https://techdifferences.com/difference-between-authentication-and-authorization.html)
|
||||
> The identity of a person is assured by authentication. On the other hand, authorization checks the access list that the authenticated person has. In other words, the authorization includes the permissions that a person has given.
|
||||
* [IDPro Member Presentations - Identiverse 2019](https://idpro.org/member-present) - [playlist](https://www.youtube.com/playlist?list=PLpKq7xRiIHaTDwAqpIU1UYpKZY03tfTMf)
|
||||
* [2019 | Introduction to Identity Part 1 | Identiverse](https://www.youtube.com/watch?v=T5w1EXqMqR0&list=PLpKq7xRiIHaTDwAqpIU1UYpKZY03tfTMf&index=5&t=0s) - [slideshare](https://www.slideshare.net/Identiverse/2019-introduction-to-identity-part-1-identiverse-day-1-june-25)
|
||||
* [2019 | Introduction to Identity Part 1 - Identiverse](https://www.youtube.com/watch?v=T5w1EXqMqR0&list=PLpKq7xRiIHaTDwAqpIU1UYpKZY03tfTMf&index=5&t=0s) - [slideshare](https://www.slideshare.net/Identiverse/2019-introduction-to-identity-part-1-identiverse-day-1-june-25)
|
||||
> This workshop — provided by IDPro — will provide a comprehensive (and fun) introductory view of the identity world that will give participants a solid understanding of IAM’s foundations. Part 1 of this 2-part class begins with the basics like directories, identity proofing, provisioning, authentication (including multi-factor), authorization, as well as federation technologies like SAML, OAuth, and OpenID Connect. In Part 2, we build on those foundational technologies to explain PKI & digital certificates, privileged access management, identity for IoT, identity assurance, privacy issues, identity standards organizations, and even known attack vectors.
|
||||
* [Introduction to Identity Part 2 - June 25 | Identiverse 2019](https://www.youtube.com/watch?v=zxKRUXmTLJs)
|
||||
* [Modern Identity for Developers 101 - June 25 | Identiverse 2019](https://www.youtube.com/watch?v=kWpqFWz_9II)
|
||||
* [Introduction to Identity Part 2 - June 25 - Identiverse 2019](https://www.youtube.com/watch?v=zxKRUXmTLJs)
|
||||
* [Modern Identity for Developers 101 - June 25 - Identiverse 2019](https://www.youtube.com/watch?v=kWpqFWz_9II)
|
||||
> Modern identity promises to solve some of the thorniest problems that historically plagued handling authentication and access control in applications. That sounds great in theory, but how do thinks really look like when the rubber hits the road – what does it take to incorporate modern identity in your applications development practice? Come to this session to learn the basis of modern identity development and be better equipped to understand and participate to the session in this year’s Identiverse development track.
|
||||
* [An Introduction to Mobile Identity - June 25 | Identiverse 2019](https://www.youtube.com/watch?v=25qiVyZEZOg&list=PLpKq7xRiIHaTDwAqpIU1UYpKZY03tfTMf&index=18)
|
||||
* [An Introduction to Mobile Identity - June 25 - Identiverse 2019](https://www.youtube.com/watch?v=25qiVyZEZOg&list=PLpKq7xRiIHaTDwAqpIU1UYpKZY03tfTMf&index=18)
|
||||
|
||||
|
||||
## Glossaries
|
||||
|
@ -34,10 +34,10 @@ JULY 9, 2019
|
||||
<iframe src="https://channel9.msdn.com/Shows/Blocktalk/Decentralized-Identity-and-Blockchain/player" width="640" height="360" allowFullScreen frameBorder="0" title="Decentralized Identity and Blockchain - Microsoft Channel 9 Video"></iframe>
|
||||
|
||||
* [Towards Self-Sovereign Identity using Blockchain Technology](https://essay.utwente.nl/71274/1/Baars_MA_BMS.pdf)
|
||||
* [Identity and Distributed Ledger - Today and Tomorrow - June 26 | Identiverse 2019](https://www.youtube.com/watch?v=l04AHP7kPPw)
|
||||
* [Identity and Distributed Ledger - Today and Tomorrow - June 26 - Identiverse 2019](https://www.youtube.com/watch?v=l04AHP7kPPw)
|
||||
* [Self-Sovereign Identity and the Legitimacy of Permissioned Ledgers](http://www.windley.com/archives/2016/09/self-sovereign_identity_and_the_legitimacy_of_permissioned_ledgers.shtml)
|
||||
* [Distributed Ledger Technologies, IAM, and the Truth in Things - June 27 | Identiverse 2019](https://www.youtube.com/watch?v=VV2rLgH9TUE) - Robert Brown
|
||||
* [Decentralized Identity: Intersection of Identity and Distributed Ledger - June 25 | Identiverse 2019](https://www.youtube.com/watch?v=bjlnZyMTf1M) - Preeti Rastogi
|
||||
* [Distributed Ledger Technologies, IAM, and the Truth in Things - June 27 - Identiverse 2019](https://www.youtube.com/watch?v=VV2rLgH9TUE) - Robert Brown
|
||||
* [Decentralized Identity: Intersection of Identity and Distributed Ledger - June 25 - Identiverse 2019](https://www.youtube.com/watch?v=bjlnZyMTf1M) - Preeti Rastogi
|
||||
* [Blockchain for Identity - Myth or Potential](https://www.kuppingercole.com/blog/kuppinger/blockchain-for-identity-myth-or-potential)
|
||||
![](http://i.imgur.com/YSyv11h.png)
|
||||
|
||||
|
@ -27,7 +27,7 @@ published: false
|
||||
* [maryruddy (@maryruddy)](https://twitter.com/maryruddy/status/8000292905?s=20)
|
||||
> Re @identiywoman to @davemcclure, I'm @maryruddy working on the adoption and implementation of open identity standards.
|
||||
|
||||
* [Mary Ruddy | Gartner](https://www.gartner.com/analyst/44158/Mary-Ruddy)
|
||||
* [Mary Ruddy - Gartner](https://www.gartner.com/analyst/44158/Mary-Ruddy)
|
||||
|
||||
View Mary Ruddy's Gartner analyst profile. Gartner is the world's leading information technology research and advisory company.
|
||||
|
||||
@ -59,10 +59,10 @@ Kaliya Young (“The Identity Woman”) explains 16 domains of identity --variou
|
||||
|
||||
## natalie-smolenski
|
||||
|
||||
* [Natalie Smolenski | Author, Speaker](https://www.nataliesmolenski.com/)
|
||||
* [Natalie Smolenski - Author, Speaker](https://www.nataliesmolenski.com/)
|
||||
> Natalie Smolenski is an anthropologist leading business development for blockchain technology firm Learning Machine. She writes and speaks about identity, tech, and government.
|
||||
|
||||
* [Natalie Smolenski | University of Michigan - Academia.edu](http://umich.academia.edu/NatalieSmolenski)
|
||||
* [Natalie Smolenski - University of Michigan - Academia.edu](http://umich.academia.edu/NatalieSmolenski)
|
||||
> Natalie Smolenski, University of Michigan, Anthropology and History Department, Graduate Student. Studies Phenomenological Psychology, Self psychology, and Anthropology of Religion. Natalie Smolenski is a psychological anthropologist and historian
|
||||
|
||||
* [Truth of Your Life - About](https://www.truthofyourlife.com/about.html)
|
||||
@ -134,7 +134,7 @@ Adventures of an Eternal Optimist
|
||||
* [FinTech Insider on Tour @ Money20/20 Europe 2018: Katryna Dow, CEO Meeco](https://www.youtube.com/watch?v=q3yzXgesKJY)
|
||||
> Sam sits down with Katryna Dow from Meeco to discuss data and taking control.
|
||||
|
||||
* [Katryna Dow | FemTech Leaders](http://web.archive.org/web/20151122105350/http:/www.femtechleaders.com/oceania/katryna-dow-2/) - 2015
|
||||
* [Katryna Dow - FemTech Leaders](http://web.archive.org/web/20151122105350/http:/www.femtechleaders.com/oceania/katryna-dow-2/) - 2015
|
||||
|
||||
The Voices & View from FemTech Leaders
|
||||
|
||||
|
@ -63,7 +63,7 @@ XNS Public Trust Organization. Founded in July 2000, shortly after Planetwork Co
|
||||
> XDI.ORG was originally founded as the XNS Public Trust Organization (XNSORG) in July, 2000, to promote the concept of individuals owning their own digital identity and data based on a nascent technology being produced by two Technical Committees at OASIS: XRI (Extensible Resource Identifier) and XDI (Extensible Data Interchange). Its charter was to serve as the public steward for a body of intellectual property contributed by OneName Corporation. These patents covered what became semantic data web technology, a new way to form persistent links and long-term, trusted data sharing relationships over electronic networks.
|
||||
* [The Main Address for Digital Addressing](https://web.archive.org/web/20120117204002/http://www.cordance.net/) - Cordance created the technology under the development of XRI and XDI Oasis Technical Committees.
|
||||
* [Neustar](https://www.home.neustar/) -Neustar is a telecommunications company originally charged with maintaining the system of directories and databases for telephone area codes and prefixes in North America
|
||||
* [Trusted Connections at the Moments that Matter the Most | Neustar](https://www.home.neustar/)
|
||||
* [Trusted Connections at the Moments that Matter the Most - Neustar](https://www.home.neustar/)
|
||||
> Neustar Enables Trusted Connections Between Companies and People at the Moments That Matter the Most.
|
||||
* [XDI.org](https://icannwiki.org/XDI.org) - icannwiki.org
|
||||
|
||||
@ -109,10 +109,10 @@ At Doc's encouragement, a number of people began blogging about user-centric ide
|
||||
* [History](http://wiki.idcommons.net/History) - wiki.idcommons.net
|
||||
* [IC Logo](http://wiki.idcommons.org/IC_Logo)
|
||||
> The Identity Commons logo is a mashup of the letters "i" and "c", and it represents two ideas. The first is the notion of an upside-down umbrella. Identity Commons was founded on the notion that it would empower bottoms-up work, rather than organize itself from the top-down. The upside-down umbrella metaphor reflects that.
|
||||
* [The original identity gang | Identity Commons](https://www.idcommons.org/the-original-identity-gang/)
|
||||
* [The original identity gang - Identity Commons](https://www.idcommons.org/the-original-identity-gang/)
|
||||
> I vividly remember the first time the identity gang met - it was in at Digital Identity World in October of 2004. I had met Doc Searls in August at Linux world and shared about the work that Owen Davis, Drummond Reed, Bill Washburn and others were doing trying open standard...
|
||||
* [wiki.idcommons.net/Lexicon](https://web.archive.org/web/20080916112039/wiki.idcommons.net/Lexicon) - web.archive.org
|
||||
* [The identity silo paradox | ZDNet](https://www.zdnet.com/article/the-identity-silo-paradox/)
|
||||
* [The identity silo paradox - ZDNet](https://www.zdnet.com/article/the-identity-silo-paradox/)
|
||||
> My recent post on Google's identity silo was part of a hailstorm (pun intended) of comments that occurred on the email list over at the Identity Gang. All of those fast-flying emails unveiled what I'm now calling the "identity silo paradox."
|
||||
|
||||
## Intention Economy
|
||||
@ -194,7 +194,7 @@ Since then, the IIW has met bi-anually, actively supporting the development of t
|
||||
* [XRD Begins](http://www.equalsdrummond.name/?p=172)
|
||||
> For most people, watching the evolution of technical specifications is like watching a glacier move. To those of us living the process, though, there can be a great deal of drama to it — in f…
|
||||
* [VeriSign, Microsoft & Partners to Work together on OpenID + Cardspace](https://www.symantec.com/connect/blogs/verisign-microsoft-partners-work-together-openid-cardspace) - Graves, Michael (2007-02-06)
|
||||
* [AOL and 63 Million OpenIDs | dev.aol.com | The AOL Developer Network](https://web.archive.org/web/20080511162600/http:/dev.aol.com/aol-and-63-million-openids)
|
||||
* [AOL and 63 Million OpenIDs | dev.aol.com - The AOL Developer Network](https://web.archive.org/web/20080511162600/http:/dev.aol.com/aol-and-63-million-openids)
|
||||
AOL's status regarding OpenID implementation; and, 63 million OpenIDs. Plus reactions to the blogosphere.
|
||||
* [Proposal for an XRI (i-name) profile for OpenID](http://lists.danga.com/pipermail/yadis/2006-April/002388.html) Grey, Victor (2006-04-02).
|
||||
* [Moving OpenID Forward](http://lists.danga.com/pipermail/yadis/2006-June/002631.html)
|
||||
|
@ -19,7 +19,7 @@ last_modified_at: 2020-01-04
|
||||
![](https://i.imgur.com/wuvo5BG.png)
|
||||
|
||||
* [Personal Data Ecosystem Charter](http://wiki.idcommons.net/Personal_Data_Ecosystem_Charter)
|
||||
* [Personal Data Ecosystem Consortium | Identity Commons](https://www.idcommons.org/working-groups/personal-data-ecosystem-consortium/)
|
||||
* [Personal Data Ecosystem Consortium - Identity Commons](https://www.idcommons.org/working-groups/personal-data-ecosystem-consortium/)
|
||||
> Founded in 2011, the Personal Data Ecosystem Consortium advocates a user-centric approach to managing personal data. We believe that, in order for the Internet economy to continue delivering on its promise, the needs of individuals, companies, and governments must all be resp...
|
||||
* [Personal Data Journal](http://web.archive.org/web/20121204030857/http:/pde.cc/journal/) - web.archive.org
|
||||
> The Essential Guide for Any Company Affected by Personal Data
|
||||
@ -62,7 +62,7 @@ Markus Sabadello began work on Project Danube, on the creation of an XDI based p
|
||||
* [W3C Accelerates Efforts To Build a More Secure Web](https://www.w3.org/2016/02/securewebauthwg.html.en)
|
||||
> Launches Web Authentication work based on FIDO Alliance specifications for more secure and flexible alternative to password log-ins on the Web
|
||||
* [Lenovo™, Intel®, PayPal® and Synaptics® announce collaboratio...](https://news.lenovo.com/pressroom/press-releases/lenovo-intel-paypal-and-synaptics-announce-collaboration-to-bring-fido-authentication-to-laptops/)
|
||||
* [Security Key for safer logins with a touch | Facebook](https://www.facebook.com/notes/facebook-security/security-key-for-safer-logins-with-a-touch/10154125089265766/)
|
||||
* [Security Key for safer logins with a touch - Facebook](https://www.facebook.com/notes/facebook-security/security-key-for-safer-logins-with-a-touch/10154125089265766/)
|
||||
> People ask all the time what they can do to make their online accounts more secure. Like most security professionals, I recommend setting up two-factor aut
|
||||
* [Certified Authenticator Levels - FIDO Alliance](https://fidoalliance.org/certification/authenticator-certification-levels/)
|
||||
> The Authenticator Certification Levels introduce Authenticator Security Requirements to the FIDO Certification Program. Authenticators must be certified to at least Authenticator Certification Level 1 (L1) for UAF, U2F, and FIDO2 certification. Currently, the supported Cert...
|
||||
@ -180,7 +180,7 @@ Markus Sabadello began work on Project Danube, on the creation of an XDI based p
|
||||
* [The Respect Trust Framework](https://respectnetwork.wordpress.com/respect-trust-framework/)
|
||||
> The foundation of the Respect Network is the Respect Trust Framework, which was listed with the Open Identity Exchange in May 2011 and honored with the Privacy Award at the 2011 European Identity C…
|
||||
* [Respect Trust Framework - OIXNet.org](http://oixnet.org/wp-content/uploads/2016/02/respect-trust-framework-v2-1.pdf)
|
||||
* [Respect Network Company Profile: Acquisition & Investors | PitchBook](https://pitchbook.com/profiles/company/53867-44)
|
||||
* [Respect Network Company Profile: Acquisition & Investors - PitchBook](https://pitchbook.com/profiles/company/53867-44)
|
||||
> Information on acquisition, funding, cap tables, investors, and executives for Respect Network. Use the PitchBook Platform to explore the full profile.
|
||||
|
||||
## Windhover Principles
|
||||
@ -200,7 +200,7 @@ Markus Sabadello began work on Project Danube, on the creation of an XDI based p
|
||||
|
||||
[8/14](https://www.w3.org/community/credentials/charter-20140808/) The [Credentials Community Group](https://www.w3.org/community/credentials/)[[**ϟ**](https://w3c-ccg.github.io/)] forms, hosted by [World Wide Web Consortium(W3C)](https://www.w3.org/)
|
||||
|
||||
* [W3C Credentials Community Group Charter | Credentials Community Group](https://www.w3.org/community/credentials/charter-20140808/) - 2014
|
||||
* [W3C Credentials Community Group Charter - Credentials Community Group](https://www.w3.org/community/credentials/charter-20140808/) - 2014
|
||||
> "to forge a path for a secure, decentralized system of credentials that would empower both individual people and organizations on the Web to store, transmit, and receive digitally verifiable proof of qualifications and achievements." —proposed by [Manu Sporney](http://manu.sporny.org/)[[**T**](https://twitter.com/manusporny)] (of [digitalbazaar.com](https://digitalbazaar.com/))
|
||||
|
||||
## Pan Canadian Trust
|
||||
|
@ -109,10 +109,10 @@ The first [Rebooting Web of Trust](http://www.WebOfTrust.info)(RWoT) workshop w
|
||||
> It was late June of 2014 when businessman John Edge was invited to a screening of a short film directed by actress Lucy Liu. “Meena” is about an 8-year-old girl sold to a brothel and forced into sex slavery for more than a decade. It’s based on a true story. “It’s horrific,” Edge says.
|
||||
>
|
||||
> A panel of experts took questions afterward, including Susan Bissell, chief of child protection at international humanitarian group UNICEF. “Susan articulated that one of the biggest problems in protecting children who are at risk of sexual violence is a lack of birth certificates or identity,” Edge says.
|
||||
* [ID2020 | Digital Identity Alliance](http://id2020.org/)
|
||||
* [ID2020 - Digital Identity Alliance](http://id2020.org/)
|
||||
> The ID2020 Alliance is a global partnership maximizing the potential of digital ID to improve lives.
|
||||
* [ID2020 to kick start digital identity summit at UN with PwC support.](https://preview.thenewsmarket.com/Previews/PWC/DocumentAssets/434561.pdf)
|
||||
* [ID2020: Digital Identity with Blockchain | Accenture](https://www.accenture.com/us-en/insight-blockchain-id2020)
|
||||
* [ID2020: Digital Identity with Blockchain - Accenture](https://www.accenture.com/us-en/insight-blockchain-id2020)
|
||||
> Accenture has joined the ID2020 alliance and leverages its unique identity service platform. Learn about our digital identity with blockchain solutions.
|
||||
* [Mastercard, Microsoft Join Forces to Advance Digital Identity Inno...](https://newsroom.mastercard.com/press-releases/mastercard-microsoft-join-forces-to-advance-digital-identity-innovations/)
|
||||
> PURCHASE, N.Y. and REDMOND, Wash. – December 3, 2018 – Mastercard (NYSE: MA) and Microsoft (Nasdaq “MSFT” @microsoft) today announced a strategic collaboration to improve how people manage and use their digital identity. Currently, verifying your identity online is s...
|
||||
@ -170,7 +170,7 @@ Evident from the other [whitepapers](https://github.com/WebOfTrustInfo/ID2020Des
|
||||
* [Hyperledger Welcomes Project Indy – Hyperledger](https://www.hyperledger.org/blog/2017/05/02/hyperledger-welcomes-project-indy)
|
||||
> Guest post: Phillip J. Windley, Ph.D., Chair, Sovrin Foundation We’re excited to announce Indy, a new Hyperledger project for supporting independent identity on distributed ledgers. Indy provides tools, libraries, and reusable...
|
||||
* [Announcing the Sovrin Foundation](http://www.windley.com/archives/2016/09/announcing_the_sovrin_foundation.shtml)
|
||||
* [Respect Network Company Profile: Acquisition & Investors | PitchBook](https://pitchbook.com/profiles/company/53867-44) (Sovrin Aquisition - Respect Network)
|
||||
* [Respect Network Company Profile: Acquisition & Investors - PitchBook](https://pitchbook.com/profiles/company/53867-44) (Sovrin Aquisition - Respect Network)
|
||||
> Information on acquisition, funding, cap tables, investors, and executives for Respect Network. Use the PitchBook Platform to explore the full profile.
|
||||
|
||||
## MyData
|
||||
|
@ -49,7 +49,7 @@ I will begin with a listing of standards bodies, organizations and open processe
|
||||
>
|
||||
> If you’re willing to put up with a lot of work for incremental improvements then step up and join a standard. Whether that is a (relatively) fast moving standard group like OASIS (www.oasis-open.org) or a slower but more international group like ISO you will learn. You’ll also benefit from working with experts. These experts donate their time and are more than happy to provide ideas, guidance, and leadership.
|
||||
|
||||
[Who Are the Identerati? | ForgeRock](https://www.forgerock.com/blog/who-are-the-identerati)
|
||||
[Who Are the Identerati? - ForgeRock](https://www.forgerock.com/blog/who-are-the-identerati)
|
||||
> You’re familiar with digital identity standards like OpenID Connect, OAuth, and User-Managed Access, fundamental elements of privacy and security on the internet. But have you ever wondered how they came to be? A lot of work on these protocols went on (and goes on) behind t...
|
||||
|
||||
[Building Blocks for a New Architecture](https://medium.com/@trbouma/building-blocks-for-a-new-architecture-fda2238ac005)
|
||||
|
@ -19,7 +19,7 @@ last_modified_at: 2020-01-07
|
||||
[The Digital Identity Problem Space](https://www.learningmachine.com/digital-identity/)
|
||||
> A framework for organizing the categories of digital identity and an analysis of where disruptive innovation is most likely to succeed.
|
||||
* [Learning Machine](https://www.learningmachine.com/)
|
||||
* [Natalie Smolenski | Author, Speaker](https://www.nataliesmolenski.com/)
|
||||
* [Natalie Smolenski - Author, Speaker](https://www.nataliesmolenski.com/)
|
||||
> Natalie Smolenski is an anthropologist leading business development for blockchain technology firm Learning Machine. She writes and speaks about identity, tech, and government.
|
||||
|
||||
## Blockcerts
|
||||
|
@ -12,7 +12,7 @@ last_modified_at: 2020-01-09
|
||||
> We live in a world where the best parts of our individual local hardware and software collection are rarely leveraged to make cloud security decisions. This is because there has never been a vendor-agnostic and privacy-preserving way for cloud resources to interact with individual hardware configurations in any generic way. Until now!
|
||||
>
|
||||
> With WebAuthn, any web entity can call a simple Javascript API and ask for a cryptographically secure credential. What happens next is pretty cool – the world’s browsers have worked with the world’s operating system makers and the world’s hardware manufacturers, so that when a website asks for a credential, the browsers work with the underlying platform to securely locate compliant local hardware and talk to it!
|
||||
* [W3C finalizes Web Authentication (WebAuthn) standard | ZDNet](https://www.zdnet.com/article/w3c-finalizes-web-authentication-webauthn-standard/)
|
||||
* [W3C finalizes Web Authentication (WebAuthn) standard - ZDNet](https://www.zdnet.com/article/w3c-finalizes-web-authentication-webauthn-standard/)
|
||||
> WebAuthn allows users to register and authenticate on websites or mobile apps using an "authenticator" instead of a password.
|
||||
>
|
||||
> The "authenticator" can be a hardware security key that the user has connected to his computer or a biometric ID that can be acquired from the PC or smartphone's sensors --such as fingerprints, face scans, iris scans, and others.
|
||||
|
Loading…
Reference in New Issue
Block a user