mirror of
https://github.com/Decentralized-ID/decentralized-id.github.io.git
synced 2024-12-17 03:24:37 -05:00
add info
This commit is contained in:
parent
f1f878a055
commit
cbf25fff15
@ -8,7 +8,7 @@ header:
|
|||||||
canonical_url: 'https://decentralized-id.com/history/'
|
canonical_url: 'https://decentralized-id.com/history/'
|
||||||
redirect_from: /history
|
redirect_from: /history
|
||||||
permalink: /history/
|
permalink: /history/
|
||||||
categories: ["history"]
|
categories: ["History"]
|
||||||
published: true
|
published: true
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -18,7 +18,7 @@ last_modified_at: 2019-07-11T11:22:33-23:00
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
* [uPort](https://www.uport.me/) [[**G**](https://github.com/uport-project/)] [[**T**](https://twitter.com/uport_me)]
|
* [uPort](https://www.uport.me/) [[**T**](https://twitter.com/uport_me)]
|
||||||
* [Ethereum studio ConsenSys launches digital IDs and assets secured on Ubuntu phones](http://www.ibtimes.co.uk/ethereum-studio-consensys-launches-internet-people-digital-ids-assets-secured-unbuntu-phones-1542620)
|
* [Ethereum studio ConsenSys launches digital IDs and assets secured on Ubuntu phones](http://www.ibtimes.co.uk/ethereum-studio-consensys-launches-internet-people-digital-ids-assets-secured-unbuntu-phones-1542620)
|
||||||
* [Year in Review. What's to come in 2018](https://medium.com/uport/uport-year-in-review-whats-to-come-in-2018-15ccb9214439)
|
* [Year in Review. What's to come in 2018](https://medium.com/uport/uport-year-in-review-whats-to-come-in-2018-15ccb9214439)
|
||||||
* [Different Approaches to Ethereum Identity Standards](https://medium.com/uport/different-approaches-to-ethereum-identity-standards-a09488347c87)
|
* [Different Approaches to Ethereum Identity Standards](https://medium.com/uport/different-approaches-to-ethereum-identity-standards-a09488347c87)
|
||||||
|
@ -1,22 +1,89 @@
|
|||||||
---
|
---
|
||||||
title: Microsoft Identity
|
title: Microsoft Identity
|
||||||
layout: single
|
layout: single
|
||||||
classes: wide
|
|
||||||
toc: false
|
|
||||||
permalink: id-initiatives/microsoft/
|
permalink: id-initiatives/microsoft/
|
||||||
canonical_url: 'https://decentralized-id.com/id-initiatives/microsoft/'
|
canonical_url: 'https://decentralized-id.com/id-initiatives/microsoft/'
|
||||||
redirect_from: id-initiatives/microsoft
|
redirect_from: id-initiatives/microsoft
|
||||||
categories: ["Private-sector"]
|
categories: ["Private-sector"]
|
||||||
tags: ["Microsoft"]
|
tags: ["Microsoft"]
|
||||||
|
last_modified_at: 2019-07-11T11:22:33-23:00
|
||||||
---
|
---
|
||||||
|
|
||||||
![](https://i.imgur.com/MEN8iSn.png)
|
![](https://i.imgur.com/MEN8iSn.png)
|
||||||
|
|
||||||
* [Microsoft Azure Own your identity](https://azure.microsoft.com/en-us/overview/decentralized-identity/) [[**ϟ**](https://www.coindesk.com/microsoft-is-pushing-new-blockchain-id-products-but-theres-pushback-too)]
|
|
||||||
Discover decentralized identity—a new way to take ownership of your personal data.
|
[![](https://imgur.com/l0NEfjrl.png)](https://www.microsoft.com/en-us/security/technology/own-your-identity)
|
||||||
* [didproject.azurewebsites.net](https://didproject.azurewebsites.net/) [[**D**](https://didproject.azurewebsites.net/docs/overview.html)]ocs [[**wp**](https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE2DjfY)]
|
* [microsoft.com/en-us/security/technology/own-your-identity](https://www.microsoft.com/en-us/security/technology/own-your-identity)
|
||||||
* [DID Registration](https://didproject.azurewebsites.net/docs/registration.html)
|
|
||||||
|
|
||||||
|
[![](https://imgur.com/K7sw9qp.png)](https://twitter.com/csuwildcat/status/1069890896504606720)
|
||||||
|
|
||||||
|
>[Just had an excellent convo](https://twitter.com/csuwildcat/status/1073690535838117889) with Dr. @BobMcElrath about the Layer 2 decentralized identifier protocol we're building (among other topics). Dude is smart and fun to talk with, check him out.
|
||||||
|
|
||||||
|
<blockquote class="twitter-tweet"><p lang="en" dir="ltr">Good for Microsoft. Hopefully they can solve the daunting UX issues for personal data management at scale. <a href="https://t.co/jmMqz9fAfY">https://t.co/jmMqz9fAfY</a></p>— Evernym, Inc. (@evernym) <a href="https://twitter.com/evernym/status/1081019896207560704?ref_src=twsrc%5Etfw">January 4, 2019</a></blockquote> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
|
||||||
|
|
||||||
* [Mastercard, Microsoft Join Forces to Advance Digital Identity Innovations](https://newsroom.mastercard.com/press-releases/mastercard-microsoft-join-forces-to-advance-digital-identity-innovations/)
|
* [Mastercard, Microsoft Join Forces to Advance Digital Identity Innovations](https://newsroom.mastercard.com/press-releases/mastercard-microsoft-join-forces-to-advance-digital-identity-innovations/)
|
||||||
* [Decentralized digital identities and blockchain: The future as we see it](https://www.microsoft.com/en-us/microsoft-365/blog/2018/02/12/decentralized-digital-identities-and-blockchain-the-future-as-we-see-it/)
|
* [Decentralized digital identities and blockchain: The future as we see it](https://www.microsoft.com/en-us/microsoft-365/blog/2018/02/12/decentralized-digital-identities-and-blockchain-the-future-as-we-see-it/)
|
||||||
* [Microsoft Identity Standards Blog](https://techcommunity.microsoft.com/t5/Identity-Standards-Blog/bg-p/IdentityStandards)
|
* [Microsoft is quietly testing a project that aims to hand people complete control over their online data](http://www.businessinsider.fr/us/microsoft-working-on-project-bali-to-give-people-control-over-data-2019-1)
|
||||||
* [Microsoft working on Project Bali to Give People Control over their data](https://amp.businessinsider.com/microsoft-working-on-project-bali-to-give-people-control-over-data-2019-1)
|
|
||||||
|
|
||||||
|
## didproject.azurewebsites.net
|
||||||
|
|
||||||
|
* [didproject.azurewebsites.net](https://didproject.azurewebsites.net/)
|
||||||
|
* [Microsoft Azure Own your identity](https://azure.microsoft.com/en-us/overview/decentralized-identity/)
|
||||||
|
* [didproject.azurewebsites.net/docs](https://didproject.azurewebsites.net/docs/overview.html)
|
||||||
|
>We plan to add new technologies and features to this website over time. Here are some investments we currently have planned:
|
||||||
|
|
||||||
|
* DID standards & test methods - The W3C CCG has a draft spec for representing decentralized identities, allowing identities to be registered on different distributed ledgers while maintaining compatibility. To provide a reference implementation, a test DID method is built that allows temporary creation and usage of decentralized identities. This allows additional development to continue while progress is made on real DID methods.
|
||||||
|
* Authentication & initial APIs - Protocols for authenticating decentralized identities using public key credentials are proposed. A reference implementation with javascript APIs is built that allows a website to authenticate a decentralized identity. A sample user agent application is open sourced that demonstrates proper usage of the proposed protocols using a test DID method.
|
||||||
|
Standardization continues
|
||||||
|
* Ongoing - Work continues between members of the decentralized identity foundation and other standards bodies to revise, refine, and formalize standards for decentralized identities. Topics include identifiers names & discovery, authentication protocols, storage and compute, claims and credentials, and more.
|
||||||
|
* Data storage in identity hubs - Identity hubs provide secure data storage for any information associated with an identity. Profile information, personal files, government issued documents, and more. Identity hubs offer users tools for controlling and reviewing access to their data, so that information can be confidently and privately shared with other parties. Data storage and retreival is based on industry standards to ensure that users have their choice of how and where to run their identity hub. Information in identity hubs can also be replicated to multiple instances of hubs to maintain the advantages of decentralization.
|
||||||
|
* Scaling registration of identities -Registration of identities on a distributed ledger typically requires a transaction to be submitted to the ledger's network. To offer decentralized identities to users at scale, a solution is needed to increase the throughput and or latency of an identity registration. SideTree is a proposed layer two protocol that can help address these problems and enable identity registration that works at real world scale.
|
||||||
|
* Key recovery mechanisms - To use decentralized identities, users must be able to secure private keys while using them to perform daily tasks and operations. Should a private key be lost or compromise, users run the risk of losing access to all of their online assests and personal data. Mechanisms are needed to help users avoid problems with their private keys and to recover from problems when they do happen.
|
||||||
|
* Mobile user agents - Easy to use and secure user agents are a critical component to decentralized identity. Mobile applications can help users secure their identity's private keys, respond to incoming requests, and manage access to their personal data.
|
||||||
|
|
||||||
|
* [DID Registration](https://didproject.azurewebsites.net/docs/registration.html)
|
||||||
|
>The way you claim a DID and publish your public keys depends on which distributed ledger you use to register your DID. Each ledger has its own rules, formats, and quirks. Thankfully, the DID standard defines common ways to deal with DIDs, and our services expose the standard to you in a simple web API. Currently, we're developing support for the following ledgers:
|
||||||
|
>
|
||||||
|
>* Bitcoin
|
||||||
|
>* Ethereum, via uPort
|
||||||
|
>* Sovrin
|
||||||
|
>
|
||||||
|
>Our intention is to be chain agnostic, enabling users to choose a DID variant that runs on their preferred ledger. Each ledger that is compliant with DID standards has an associated DID "method" - a set of rules that govern how DIDs are anchored onto a the ledger.
|
||||||
|
|
||||||
|
## Whitepaper
|
||||||
|
* [Microsoft’s strategy for Decentralized Identity](https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE2DjfY)] **to empower every person on the planet to achieve more.**
|
||||||
|
>Microsoft cloud identity systems already empower developers, organizations, and billions of people to work, play, and achieve more, but there’s so much more we can do to create a world where each of us, even in displaced populations, can pursue our life goals, including educating our children, improving our quality of life, and starting a business.To achieve this vision, we need to augment existing cloud identity systems with one that individuals, organizations, and devices can own so they can control their digital identity and data. This self-owned identity must seamlessly integrate into our daily lives, providing complete control over what we share and with whom we share it, and—when necessary—provide the ability to take it back. Instead of granting broad consent to countless apps and services and spreading their identity data across numerous providers, individuals need a secure, encrypted digital hub where they can store their identity data and easily control access to it.
|
||||||
|
|
||||||
|
## [Microsoft Identity Standards Blog](https://techcommunity.microsoft.com/t5/Identity-Standards-Blog/bg-p/IdentityStandards)
|
||||||
|
|
||||||
|
* [All about FIDO2, CTAP2 and WebAuthn](https://techcommunity.microsoft.com/t5/Identity-Standards-Blog/All-about-FIDO2-CTAP2-and-WebAuthn/ba-p/288910)
|
||||||
|
>This is a great week to be working in Identity Standards, as we at Microsoft celebrate the release of our first ever WebAuthn Relying Party. This one relying party enables standards-based passwordless authentication at Xbox, Skype, Outlook.com and more. But what are the actual pieces of the puzzle and how do they fit? Read on for the big picture of how the W3C WebAuthn and FIDO2 CTAP2 specifications interact. We will start with the industry standards perspective, and then at the end we will summarize how Microsoft implements the various roles.
|
||||||
|
>
|
||||||
|
>To understand how FIDO2 authenticators work, you need knowledge of two specifications in two different standards bodies. The WebAuthentication (aka WebAuthn) spec lives at W3C (where the browser makers meet) while the Client-to-Authenticator (aka CTAP2) spec lives at the FIDO Alliance (where hardware and platform folks have joined to solve the problem of Fast IDentity Online).
|
||||||
|
|
||||||
|
* [Why does standards certification matter?](https://techcommunity.microsoft.com/t5/Identity-Standards-Blog/Why-does-standards-certification-matter/ba-p/638937)
|
||||||
|
>It’s a good month for identity certification at Microsoft! We are excited to have achieved two important goals: OpenID Certification for Azure Active Directory and also FIDO Certification for Windows 10. You may or may not know what these particular protocols do, but even if you don’t, it’s worth talking about what these certification programs accomplish.
|
||||||
|
>
|
||||||
|
> The goal of certification in the standards world is to ensure conformance to protocols. In FIDO Certification, the tests are both physical and digital; for example, authenticators must prove that they are storing keys and secrets in a secure environment, such as a trusted platform module (TPM), and that the secure environment can only be used when a user gesture is performed. Resistance to physical attacks, such as side-channel attacks, must be demonstrated, as well as protocol conformance. A third party performs this certification, with the goal that anyone who uses a certified product can have reasonable confidence that the solution hasn’t cut any corners.
|
||||||
|
>
|
||||||
|
>The OpenID Certification is a different beast from FIDO Certification. Because OpenID Connect is a web protocol, there are fewer hidden parts; it’s easier for anyone to inspect and validate the protocol messages exchanged. The OpenID Certification process is therefore lighter weight and uses self-certification. With self-certification, those seeking certification run their own tests. The results of those tests are then published for scrutiny by all. In this case, the certifying organization is putting their reputation on the line. It isn’t a third party that claims adherence, it’s the owner of the implementation themselves. While those organizations could lie, most prioritize their reputation over any short-term gain that could come from misrepresentation.
|
||||||
|
|
||||||
|
|
||||||
|
* [Why WebAuthn will change the world](https://techcommunity.microsoft.com/t5/Identity-Standards-Blog/Why-WebAuthn-will-change-the-world/ba-p/482286)
|
||||||
|
>A little over a month ago, W3C WebAuthn became a real internet specification. Most of you don’t know what WebAuthn is yet, but many of you will feel the impact in short order. In fact, I will go so far as to say that WebAuthn may change how we all authenticate to the resources we use every day.
|
||||||
|
>
|
||||||
|
>We live in a world where the best parts of our individual local hardware and software collection are rarely leveraged to make cloud security decisions. This is because there has never been a vendor-agnostic and privacy-preserving way for cloud resources to interact with individual hardware configurations in any generic way. Until now!
|
||||||
|
>
|
||||||
|
>With WebAuthn, any web entity can call a simple Javascript API and ask for a cryptographically secure credential. What happens next is pretty cool – the world’s browsers have worked with the world’s operating system makers and the world’s hardware manufacturers, so that when a website asks for a credential, the browsers work with the underlying platform to securely locate compliant local hardware and talk to it!
|
||||||
|
|
||||||
|
* [To Understand WebAuthn, Read CredMan](https://techcommunity.microsoft.com/t5/Identity-Standards-Blog/To-Understand-WebAuthn-Read-CredMan/ba-p/339652)
|
||||||
|
>The holidays are well and truly over, time to get serious - now is the perfect time to read specifications! If you are planning to read the WebAuthn specification, you can ease into the terminology in a simple way - take a cruise through the [W3C Credential Management (aka CredMan) specification](https://www.w3.org/TR/credential-management-1/) first. CredMan sets up the object model for the Credential object model that WebAuthn's PublicKeyCredential extends. This post will be an overview of the CredMan spec, geared for folks who want to call the API as clients, not for those few and proud who are tasked with implementation of the API within a user agent.
|
||||||
|
>
|
||||||
|
>**CredMan Base Definitions**
|
||||||
|
>
|
||||||
|
>CredMan unsurprisingly centers on the concept of a Credential. Actions on Credentials are requested by a relying party using JavaScript and fulfilled by a user agent (generally a browser). Credentials can be created stored, retrieved for validation by a relying party and so on. In addition to actions, CredMan defines standardized dictionaries that communicate context. Note that the CredMan API itself does not use the term ‘relying party’ but instead refers to a developer that would write code using the navigator.credentials JavaScript control. Since we are identity architects, we will assume that developed code is deployed and running as a service at a specific origin and that the developed code will call the CredMan API as part of user registration and authentication activities.
|
||||||
|
|
||||||
|
|
||||||
|
|
@ -1,41 +1,23 @@
|
|||||||
---
|
---
|
||||||
title: Project Danube
|
title: Project Danube
|
||||||
layout: single
|
layout: single
|
||||||
permalink:
|
permalink: /private-sector/danube-tech/
|
||||||
canonical_url: 'https://decentralized-id.com/id-initiatives/danube/'
|
canonical_url: 'https://decentralized-id.com/private-sector/danube-tech/'
|
||||||
redirect_from:
|
redirect_from:
|
||||||
- id-initiatives/danube
|
- id-initiatives/danube
|
||||||
- id-initiatives/danube/
|
- id-initiatives/danube/
|
||||||
categories: ["Private-sector"]
|
categories: ["Private-sector"]
|
||||||
tags: ["Danube","XDI"]
|
tags: ["Danube","XDI","Literature"]
|
||||||
|
toc_sticky: false
|
||||||
|
last_modified_at: 2019-07-11T11:22:33-23:00
|
||||||
---
|
---
|
||||||
|
|
||||||
Danube Tech must be the longest running firm working towards user-owned and controlled internet identity.
|
Danube Tech must be the longest running firm working towards user-owned and controlled internet identity.
|
||||||
|
|
||||||
* [Danube Tech](http://danubetech.com/) — digital identity and personal data, including personal agents, semantic graphs, and blockchain ([**xdi**](https://xdi2.org)) ([**navigator**](https://github.com/projectdanube/xdi2))
|
* [Danube Tech](http://danubetech.com/) — digital identity and personal data, including personal agents, semantic graphs, and blockchain ([**xdi**](https://xdi2.org)) ([**navigator**](https://github.com/projectdanube/xdi2)) - [Markus Sabadello (Peacekeeper)](http://mydata2016.org/speaker/markus-sabadello/) [[**T**](https://twitter.com/peacekeeper)] [[**G**](https://github.com/peacekeeper)] [[**B**](https://medium.com/@markus.sabadello)] has been working on XDI personal data stores since as early as 2010.
|
||||||
|
|
||||||
|
|
||||||
## Contents
|
|
||||||
|
|
||||||
* [Danube](#danube)
|
|
||||||
* [Project Danube on Github](#project-danube-github)
|
|
||||||
* [Danube XDI](#xdi)
|
|
||||||
* [Danube XDI Libraries](#xdi-libraries)
|
|
||||||
* [Danube XDI - Various Integrations](#xdi---various-integrations)
|
|
||||||
* [Danube XDI Configurations](#xdi-configurations)
|
|
||||||
* [Danube XDI Examples](#xdi-examples)
|
|
||||||
* [Danube XDI Plugins](#xdi-plugins)
|
|
||||||
* [Danube Aeternam](#aeternam)
|
|
||||||
* [Danube XDI Cloud](#xdi-cloud)
|
|
||||||
* [Danube XDI Server Deployed Via](#xdi-server-deployed-via)
|
|
||||||
* [Danube Services](#services)
|
|
||||||
* [**See also: XDI**](standards/xdi.html) >>
|
|
||||||
|
|
||||||
## Danube
|
## Danube
|
||||||
|
|
||||||
* *member of Sovrin and Decentralized Identity foundations*
|
|
||||||
|
|
||||||
[Markus Sabadello (Peacekeeper)](http://mydata2016.org/speaker/markus-sabadello/) [[**T**](https://twitter.com/peacekeeper)] [[**G**](https://github.com/peacekeeper)] [[**B**](https://medium.com/@markus.sabadello)] has been working on XDI personal data stores since as early as 2010.
|
|
||||||
|
|
||||||
>This is an open-source project offering software for identity and personal data services on the Internet. The core of this project is an XDI-based Personal Data Store - a semantic database for your personal data, which always remains under your control. Applications on top of this database include the Federated Social Web, the selective sharing of personal data with organizations, and much more.
|
>This is an open-source project offering software for identity and personal data services on the Internet. The core of this project is an XDI-based Personal Data Store - a semantic database for your personal data, which always remains under your control. Applications on top of this database include the Federated Social Web, the selective sharing of personal data with organizations, and much more.
|
||||||
>[![](https://i.imgur.com/dpKldXI.png)](https://web.archive.org/web/20101103064516/http://projectdanube.org/)
|
>[![](https://i.imgur.com/dpKldXI.png)](https://web.archive.org/web/20101103064516/http://projectdanube.org/)
|
||||||
@ -153,3 +135,112 @@ A configuration profile of the XDI2 server for hosting a registry of XDI names a
|
|||||||
* <a href="https://github.com/projectdanube/xdi2-connect-auth-service" target="_blank">/projectdanube/xdi2-connect-auth-service</a> - This is a "Connect Auth Service" component for the XDI Browser binding.
|
* <a href="https://github.com/projectdanube/xdi2-connect-auth-service" target="_blank">/projectdanube/xdi2-connect-auth-service</a> - This is a "Connect Auth Service" component for the XDI Browser binding.
|
||||||
|
|
||||||
|
|
||||||
|
## [Publications](https://danubetech.com/download.html)
|
||||||
|
|
||||||
|
### 2010
|
||||||
|
|
||||||
|
* [Potential of ICTs for Peace](https://danubetech.com/download/Potential-of-ICTs-for-Peace.pdf)
|
||||||
|
>Information and Communication Technologies (ICTs) have greatly transformed societies, cultures and economies as well as created both new opportunities and threats for humankind. The academic field of Peace and Conflict Studies with its inherent character of being based on concrete values rather than striving to always be objective on all accounts is especially suited and challenged to explore how ICTs should be judged and used when it comes to working toward an ideal – the ideal of peace. This paper provides a short motivation for working in this area as well a summary of work that has already been done, then moves on to giving a quick overview over ICTs and especially the Internet as an electronic medium, and finally explores several concrete ways in which ICTs can be used for peace: As a tool by international organizations, as a weapon in nonviolent struggle, and as a pillar for building and maintaining peaceful societies.
|
||||||
|
* [Potential of ICTs for Conflict](https://danubetech.com/download/Potential-of-ICTs-for-Conflict.pdf)
|
||||||
|
>Information and Communication Technologies (ICTs) have greatly transformed societies, cultures and economies as well as created both new opportunities and threats for humankind. Since at least Manuel Castells’ widely cited book trilogy “The Information Age”1, we have a good scientific understanding of the causes, nature and consequences of today’s interconnected society that is the result of the spreading of ICTs and the globalization processes accompanying them. And since at least the World Summit on the Information Society2, which culminated in its second phase in 2005 in Tunis, the United Nations as well as a large amount of other stakeholders have been working on evaluating the potential of ICTs for the values of peace and democracy, as well as the risks of conflict and abuse caused by such technologies.
|
||||||
|
* [Comparing terrorist and Internet networks](https://danubetech.com/download/Comparing-terrorist-and-Internet-networks.pdf)
|
||||||
|
>The network, stronger than the node, Can circumvent a failing part, Security and control code keep alive the network’s heart. But what if every spark goes dark, abandons network, node and core, what if they cease to light the night, because the people send no more?
|
||||||
|
|
||||||
|
### 2011
|
||||||
|
|
||||||
|
* [A Federated Social Web for Peace](https://danubetech.com/download/A-Federated-Social-Web-for-Peace.pdf)
|
||||||
|
>Closely linked to the ideal of peace, the concept of civil society has a long history as a third actor besides the state and the economy. It is a nonviolent “zone of civility” that can debate and address war and other problems. In today’s interconnected world we see the emergence of a “global civil society”, which transcends national borders and attempts to solve global challenges that established institutions fail to address. This global civil society is organized like a network, just like the global communication networks that produced it are also organized like a network. However, while popular social network services such as Facebook, Twitter and Youtube are often said to be powerful tools for peace and democracy, they are in fact highly centralized services operated by for-profit companies. For a global civil society to truly work, both the architectural structure and the governance mechanisms of its communication channels must be based on civil society principles itself. This paper argues that the main promise of the Federated Social Web – in addition to the obvious advantages of improved privacy, control and resistance to manipulation – will be a network structure that deep at its core resembles civil society and is therefore a powerful instrument for a more peaceful world.
|
||||||
|
* [Human Rights in the Information Society](https://danubetech.com/download/Human-Rights-in-the-Information-Society.pdf)
|
||||||
|
>In today’s globalized Information Society – enabled to a large part through the widespread availability of Information and Communication Technologies (ICTs) such as mobile phones and the Internet – we are experiencing a multitude of fast and transformative developments within societies, cultures and economies, enabled by new ways in which individuals interact with each other. And whenever there is interaction between individuals, Human Rights should provide the framework and the supreme set of guiding ideas, always affirming the equal dignity and value of all human beings, and telling us what should be done and what should not be done. In an environment as dynamic and interconnected as the Internet, such guiding ideas are especially important. Much has been said about the potential threats and opportunities of modern communication technologies, and about whether they provide a liberating potential at the human level, or whether they constitute yet another mechanism for reinforcing old structures and for transferring wealth from the poor to the rich. In light of such discourses and in the best tradition of the “Golden Rule” of Human Rights, we must lay out a system of freedoms and obligations for a prosperous and just Information Society, in which we all do (not) to others what we (do not) want others to do to us.
|
||||||
|
* [ICTs for a Global Civil Society](https://danubetech.com/download/ICTs-for-a-Global-Civil-Society.pdf)
|
||||||
|
>Having always been closely linked to the ideal of peace, the concept of civil society has a long history as a third actor besides the state and the economy. It is a nonviolent “zone of civility” that can debate and address war and other problems. In today’s interconnected world we see the emergence of a “global civil society”, which transcends national borders and attempts to solve global challenges that established political and economic structures fail to address. This global civil society is organized like a network, just like the global communication systems that produced it are also organized like a network. However, while popular social network services such as Facebook, Twitter and Youtube are often said to be powerful tools for peace and democracy, they are in fact highly centralized services operated by for-profit companies. For a global civil society to truly work, both the architectural structure and the governance mechanisms of its communication channels must themselves be based on civil society principles.
|
||||||
|
* [ICTs for a Global Culture of Peace](https://danubetech.com/download/ICTs-for-a-Global-Culture-of-Peace.pdf)
|
||||||
|
>The widespread availability of Information and Communication Technologies (ICTs) has led to the globalization process and continues to have a large influence on social, economic, political and cultural structures around the world. Much work has been done in the academia to get to a good scientific understanding of the causes, nature and consequences of today’s interconnected world1, and to analyze both opportunities and threats that ICTs pose to humankind. In the context of Peace and Conflict Studies, ICTs can play an important role in many ways. On the positive side, communication technologies such as the Internet can support nonviolent, democratic movements, promote education, capacity building, intercultural dialogue and the establishment of a beneficial global civil society. They can also play a liberating role in processes to overcome authoritarian regimes, as has been demonstrated by the 2011 revolutions in the Arab world2. On the negative side, ICTs can be used for cybercrime, cyberwarfare, surveillance, the spreading of extremist propaganda, the suppression of democratic processes and other destructive purposes.
|
||||||
|
* [ICTs for Citizen and Peace Journalism](https://danubetech.com/download/ICTs-for-Citizen-and-Peace-Journalism.pdf)
|
||||||
|
>The profession of journalism has traditionally often been described as playing an important role for maintaining a strong civil society and therefore contributing to democracy and peace. Today, modern Information and Communication Technologies (ICTs) such as the Internet, cell phones and other “new media” have decisively contributed to the globalization process and had numerous impacts on social and political structures and the ways in which we interact with each other world-wide1. These technologies have greatly transformed the way in which information is being generated, processed, transmitted, interlinked and received. As a medium, they are cheaper, faster and more interactive than more traditional media such as radio or television. It is therefore obvious that the introduction and widespread availability of modern ICTs have also in multiple ways affected the field of journalism, a field in which the creation, handling and publishing of information lie at the very core of activities.
|
||||||
|
* [ICTs and Democratic Processes](https://danubetech.com/download/Democratic-Processes-and-ICTs.pdf)
|
||||||
|
>Since the early days of mainstream availability of the Internet and other modern Information and Communication Technologies (ICTs), the rapid advancement of these technologies has given rise to utopist ideas that they would greatly empower democratic societies around the world. Such aspirations are directly based on some of the obvious fundamental properties of the technologies which are commonly referred to as new media: Their relative high speed, low cost and interactivity have the potential to connect people across spatial, social and cultural barriers in ways that have not been possible with more traditional media such as the telephone, television or postal mail. These possibilities around information and communication have significantly contributed to the ongoing globalization process and generated well-known expressions such as “death of distance” and “global village”. In addition, they are also often regarded as supporting democratic and peaceful processes by leading to better informed citizens through the dissemination of knowledge, and by enabling the free exchange of ideas and opinions in a network where everybody can act both as a producer and consumer. At some point in time, the virtual worlds and communication platforms of the early times of the Internet and related technologies were even viewed as a democratic utopia, which would constitute its own society in “cyberspace”, independent from any state’s national borders and sovereignty1.
|
||||||
|
* [Scenarios: ICTs for Peace and Conflict in 2020](https://danubetech.com/download/Scenarios_-ICTs-for-Peace-and-Conflict-in-2020.pdf)
|
||||||
|
>The widespread availability of Information and Communication Technologies (ICTs) has led to the globalization process and continues to have a large influence on social, economic, political and cultural structures around the world. Much work has been done in the academia to get to a good scientific understanding of the causes, nature and consequences of today’s interconnected world1, and to analyze both opportunities and threats that ICTs pose to humankind. In the context of Peace and Conflict Studies, ICTs can play an important role in many ways. On the positive side, communication technologies such as the Internet can support nonviolent, democratic movements, promote education, capacity building, intercultural dialogue and the establishment of a beneficial global civil society. They can also play a liberating role in processes to overcome authoritarian regimes, as has been demonstrated by the recent revolutions in the Arab world2. On the negative side, ICTs can be used for cybercrime, cyberwarfare, surveillance, the spreading of extremist propaganda, the suppression of democratic processes and other destructive purposes.
|
||||||
|
* [Oppression and Liberation with Social Networks](https://danubetech.com/download/Oppression-and-Liberation-with-Social-Networks.pdf)
|
||||||
|
>**"Slacktivism" or NewTool forPolitical Change?**
|
||||||
|
>Web-based activism platforms like Avaaz.org claim to herald a new era of global citizen empowerment for political change. Critics object that theymight do moreharm thangood. Whatare their arguments?
|
||||||
|
>
|
||||||
|
>In today’s "global village", the Internet has made it possible to distribute more information to a larger number of people in less time than ever before. This development has not spared social and political movements: web-based activ-ism platforms have emerged which aim at turning large-scale public attention towards a causein order to transform it into pressure on decision makers. The impact of these communities, how-ever,is controversial: While proponents hail them as a powerful new tool of bringing about change,critics hold that they not only lack effectiveness, but may even be harmful to citizen engagement
|
||||||
|
* [Rationale and Design for the Peace Box](https://danubetech.com/download/Rationale-and-Design-for-the-Peace-Box.pdf)
|
||||||
|
>Rationale and Design for the Peace BoxAn Electronic Device for your Home or Office A thesis submitted by Markus Sabadello, Austria, markus.sabadello@gmail.com to the European Peace University (EPU) – Private University Stadtschlaining/Burg, Austria in partial fulfillment of the requirements for a Master of Arts Degree in Peace and Conflict Studies 1/23/2012 This thesis offers a summary of different lines of thought on how Information and Communication Technologies (ICTs) can be used for promoting the ideal of peace, for example by helping to manage a crisis, by supporting development and education, by overcoming authoritaran regimes, or by promoting a global civil society and global culture of peace. After introducing these ideas, the concept of a „Peace Box“ is presented, which is a small computer-like device that can be set up in any home or office to provide applications and services for actively supporting the various visions of using ICTs for peace.
|
||||||
|
* [The Role of New Media for the Democratization Processes in the Arab World (Article)](https://danubetech.com/download/The-Role-of-New-Media-for-the-Democratization-Processes-in-the-Arab-World-Article.pdf)
|
||||||
|
>Reflections on the Role of Civil Society, Human Rights and New Media in the Transformation Processes
|
||||||
|
* [The Role of New Media for the Democratization Processes in the Arab World (Presentation)](https://danubetech.com/download/The-Role-of-New-Media-for-the-Democratization-Processes-in-the-Arab-World-Presentation.pdf)
|
||||||
|
|
||||||
|
![](https://imgur.com/ZlNPmJbl.png)
|
||||||
|
|
||||||
|
|
||||||
|
### 2012
|
||||||
|
|
||||||
|
* [Personal Data Journal: Decentralized Architectures](https://danubetech.com/download/PDEC-Decentralized-Architectures.pdf)
|
||||||
|
>One of the most fundamental challenges for the PDE to consider will be the design and deployment of suitable underlying architectures for realizing emerging visions around the management and use of personal data. The basic organizational structures, according to which participants of an ecosystem exchange information with each other, influence many of its fundamental properties, such as privacy, security, flexibility, discovery, or the dependencies between different actors. The possible types of architectural patterns that can be implemented are highly diverse, with centralized structures on one end of the spectrum, and fully distributed systems on the other end. On the Internet, very different forms have always existed, depending on the infrastructural layer and the concrete applications and services one looks at.
|
||||||
|
* [Personal Data Journal: Understanding OAuth](https://danubetech.com/download/PDEC-OAuth.pdf)
|
||||||
|
>Selecting the OAuth (“Open Authorization”) protocol as the topic for the second feature article of our Personal Data Journal is a logical choice for two reasons. Firstly, the vision of establishing an ecosystem around personal data is intrinsically linked to the topics of authorization and access control. Whether we are talking about giving individuals more privacy and more control over their personal data, or whether we are exploring new economic models to be built around it, the question of who can access what under which permissions and obligations is central to achieving them.
|
||||||
|
* [Personal Data Journal: Privacy By Design](https://danubetech.com/download/PDEC-Privacy-By-Design.pdf)
|
||||||
|
>The idea of an emerging Personal Data Ecosystem (PDE) is based on several different lines of thought. Ultimately the purpose of the PDE is to help us all make sense of the unprecedented amount of online personal data we observe today. It is about creating new business models and economic opportunities based on this personal data, which has been called a new currency, or asset. It will give individuals the means to control how this asset is used. In doing so, an awareness of the importance of privacy will develop on one hand and on the other privacy by design will become one of the key principles of the concrete solutions that ecosystem members are developing. In this article, we will offer a quick introduction to privacy and then move on to describe concrete resources and approaches to Privacy-By-Design, which is the idea of “baking in” privacy up front into the design of software architectures, rather than considering it a secondary or 3rd-party aspect of classic software engineering or deployment.
|
||||||
|
* [Personal Data Journal: Startup Technology Report](https://danubetech.com/download/PDEC-Tech-Research-Phase-One-Report.pdf)
|
||||||
|
>The Internet Society thorough our Trust and Identity Initiatives have followed with great interest the work of the user-centric developers and deployers within the Identity EcoSystem. The recent work on Personal Data offers a number of interesting choices for individual users and we are pleased to support this initial survey of some of the leading solutions currently under way. It is our hope this information will encourage additional dialogue within the community and will lead to greater interoperability and better engagement with end-users.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
### 2015
|
||||||
|
|
||||||
|
* [RWoT#1: XDI, Blockstore, and BIP32](https://github.com/WebOfTrustInfo/rwot1-sf/blob/master/topics-and-advance-readings/cool-hack-xdi-blockstore-bip32.md)
|
||||||
|
>XDI (eXtensible Data Interchange) is a semantic graph technology for modeling, accessing, and linking any data online. It is similar to RDF insofar as it is also based on triples describing a graph of nodes that represent resources (called "contexts" in XDI), properties that connect resources (called "relations" in XDI), and literals. Unlike RDF which uses opaque URIs (mostly HTTP) as identifiers and which constructs all semantics purely from the graph structure, XDI identifiers use an abstract syntax where semantics are established not only from graph structure, but also from the identifiers themselves. For example, in RDF an identifier for a person may be http://danubetech.com#markus, whereas in XDI, an identifier for a person would be =markus. XDI often assigns two or more identifiers to a resource, e.g. while =markus is considered a "reassignable XDI name", a corresponding "permanent XDI number" such as =!:uuid:91f28153-f600-ae24-91f2-8153f600ae24 may also be assigned. Simply by parsing the identifiers, some limited semantics can already be extracted ("=" stands for person, "!" stands for permanent).
|
||||||
|
* [Decentralized Public Key Infrastructure](https://danubetech.com/download/dpki.pdf)
|
||||||
|
>Today’s Internet places control of online identities into the hands of third-parties. Email addresses, usernames, and website domains are borrowed or "rented" through DNS, X.509, and social networks. This results in severe usability and security challenges Internet-wide. This paper describes a possible alternate approach called decentralized public key infrastructure (DPKI), which returns control of online identities to the entities they belong to. By doing so, DPKI addresses many usability and security challenges that plague traditional public key infrastructure (PKI). DPKI has advantages at each stage of the PKI life cycle. It makes permissionless bootstrapping of online identities possible and provides for the simple creation of stronger SSL certificates. In usage, it can help “Johnny” to finally encrypt thanks to its relegation of public key management to secure decentralized datastores. Finally, it includes mechanisms to recover lost or compromised identifiers.
|
||||||
|
|
||||||
|
### 2016
|
||||||
|
|
||||||
|
* [RWoT#2: XDI Graphs in IPFS](https://github.com/WebOfTrustInfo/rwot2-id2020/blob/master/topics-and-advance-readings/XDI-Graphs-in-IPFS.md)
|
||||||
|
>XDI (eXtensible Data Interchange) is a technology for modeling, storing and connecting any kind of personal and organizational data. Its underlying data model is a graph consisting of nodes and directed arcs. XDI is well-suited for digital identity that is distributed and heterogeneous. Through the use of mappings and connectors, XDI can be used to model even data that is not itself natively in XDI format (e.g. a Facebook profile, a government ID, or a record in a corporate database). Traditionally, XDI assumes a network topology that involves service providers and endpoints, e.g. a connection can be established between an individual and an organization through their respective endpoints.
|
||||||
|
* [RWoT#3: JXD Examples](https://github.com/WebOfTrustInfo/rwot3-sf/blob/master/topics-and-advance-readings/JXD-Examples.md)
|
||||||
|
>JXD is a JSON-based serialization format for the XDI graph model, designed to combine the simplicity of JSON with the semantic richness of XDI.
|
||||||
|
>
|
||||||
|
>An XDI graph can sometimes be serialized to JXD in different ways (some more verbose, some more compact), but deserializing a JXD back to XDI always results in the same original XDI graph. Every XDI graph can be serialized to JXD, and every JXD document can be deserialized to a valid XDI graph.
|
||||||
|
>
|
||||||
|
>An XDI graph is built from XDI context nodes, which form a semantic tree. In JXD, an XDI context node is represented as a JSON object, with an @id JSON object key set to the XDI context node’s address.
|
||||||
|
|
||||||
|
|
||||||
|
### 2017
|
||||||
|
|
||||||
|
* [RWoT#4: XDI Verifiable Claims and Link Contracts](https://github.com/WebOfTrustInfo/rwot4-paris/blob/master/topics-and-advance-readings/xdi-verifiable-claims-link-contracts.md)
|
||||||
|
>There is a high level of interest in the Rebooting-the-Web-of-Trust community and beyond in "verifiable claims", i.e. "a cryptographically non-repudiable set of statements made by an entity about another entity" (see [1]). This work foresees that "the next generation of web applications will authorize entities to perform actions based on rich sets of credentials issued by trusted parties" (see [2]).
|
||||||
|
>
|
||||||
|
>XDI (eXtensible Data Interchange) is a technology for modeling, storing and sharing personal and organizational identity data. One key component of this technology is the "link contract", i.e. a "data sharing agreement between the publisher of the data, called the authorizing authority, and a party who wants to access the data, called the requesting authority" (see [3]).
|
||||||
|
>
|
||||||
|
>XDI link contracts contain a policy tree which is used to decide if the permissions granted by the link contract can be invoked by a requesting authority. This policy evaluates conditions based on input elements such as the authorizing authority, requesting authority, and an incoming request message. Simple conditions of the policy could e.g. require the presentation of a valid password or signature.
|
||||||
|
* [A Universal Resolver for Self-Sovereign Identifiers](https://medium.com/decentralized-identity/a-universal-resolver-for-self-sovereign-identifiers-48e6b4a5cc3c)
|
||||||
|
>This tool fulfills a similar purpose as Bind does in the DNS system: resolution of identifiers. However, instead of working with domain names, we work with self-sovereign identifiers that can be created and registered directly by the entities they refer to. This is important, because identifiers are the basis for any identity and communications system — without identifiers, we cannot have relationships, transactions, data sharing or messaging between entities. Historically identifiers have always been assigned to us by some kind of corporate or state authority. The Universal Resolver lets us build architectures and protocols on top of identifiers that are completely self-sovereign. There is no longer a need for a central authority to issue, maintain and revoke identifiers.
|
||||||
|
>
|
||||||
|
>However, just having an identifier is not enough. We need some further information in order to know how to communicate with the entity represented by the identifier. The job of a “Resolver” is to discover and retrieve this further information. At a minimum, this information includes elements such as service endpoints for communicating with the entity, as well as the cryptographic keys associated with it. The Universal Resolver performs this task to enable the basic building blocks of a self-sovereign identity world.
|
||||||
|
* [RWoT#5: First XDI Link Contract between "btcr" DID and "sov" DID](https://github.com/WebOfTrustInfo/rwot5-boston/blob/master/topics-and-advance-readings/first-xdi-link-contract-between-btcr-did-and-sov-did.md)
|
||||||
|
>We describe an XDI link contract established between two XDI peers, one of which is identified by a btcr DID, and one by a sov DID. We believe this is the first working example of cross-DID-method data sharing and messaging.
|
||||||
|
|
||||||
|
### 2018
|
||||||
|
|
||||||
|
* [RWoT#6: Introduction to DID Auth](https://github.com/WebOfTrustInfo/rwot6-santabarbara/blob/master/final-documents/did-auth.md)
|
||||||
|
>The term DID Auth has been used in different ways and is currently not well-defined. We define DID Auth as a ceremony where an identity owner, with the help of various components such as web browsers, mobile devices, and other agents, proves to a relying party that they are in control of a DID. This means demonstrating control of the DID using the mechanism specified in the DID Document's "authentication" object. This could take place using a number of different data formats, protocols, and flows. DID Auth includes the ability to establish mutually authenticated communication channels and to authenticate to web sites and applications. Authorization, Verifiable Credentials, and Capabilities are built on top of DID Auth and are out of scope for this document. This paper gives on overview of the scope of DID Auth, supported protocols and flows, and the use of components of the DID Documents that are relevant to authentication, as well as formats for challenges and responses.
|
||||||
|
* [RWoT#6: did:erc725 method](https://github.com/WebOfTrustInfo/rwot6-santabarbara/blob/master/topics-and-advance-readings/DID-Method-erc725.md)
|
||||||
|
>Decentralized Identifiers (DIDs, see [1]) are designed to be compatible with any distributed ledger or network (called the target system). In the Ethereum community, a pattern known as ERC725 (see [2]) utilizes smart contracts for standard key management functions. We propose a new DID method that allows ERC725 identities to be treated as valid DIDs. One advantage of this DID method over others appears to be the ability to use the full flexibility of Ethereum smart contracts for key management purposes.
|
||||||
|
* [RWoT#7: DID Resolution Topics](https://github.com/WebOfTrustInfo/rwot7-toronto/blob/master/topics-and-advance-readings/did-resolution-topics.md)
|
||||||
|
>We know that DID Resolution is the process of obtaining the DID Document associated with a DID. Sounds simple, but what are some of the deeper questions and topics to be considered here?
|
||||||
|
|
||||||
|
### 2019
|
||||||
|
|
||||||
|
* [RWoT#8: Universal DID Operations](https://github.com/WebOfTrustInfo/rwot8-barcelona/blob/master/topics-and-advance-readings/Universal-DID-Operations.md)
|
||||||
|
>Decentralized Identifiers (DIDs) have seen increasing adoption across a wide number of distributed ledger ecosystems and blockchains. This is in large part due to our ability to effectively communicate by resolving these DIDs. The process of obtaining a DID Document associated with a particular DID is outlined in the DID Resolution spec.
|
||||||
|
>
|
||||||
|
>A blockchain-agnostic implementation of the spec is hosted at the Decentralized Identity Foundation and is fully open-sourced. The Universal Resolver can be found at its website and also runs locally or remotely through an API. It currently supports DIDs on Sovrin, BTCR, uPort, Jolocom, Veres One, ERC-725, Blockstack, IPFS, and DNS via a number of community-contributed drivers built on top of the Universal Resolver.
|
||||||
|
* [Markus Sabadello and Infominer33 on Identity Landscape](https://kumu.io/vijarn/markus-sabadello-and-infominer33-on-identity-landscape)
|
||||||
|
>Combination of Markus Sabadello and Infominer33 githubs
|
||||||
|
>
|
||||||
|
>about Self Sovereign Identity and Identity Landscape.
|
||||||
|
>
|
||||||
|
>This may take longer time to load and longer time to response to commands such as showcasing control since there are a lot of elements and codes.
|
||||||
|
Loading…
Reference in New Issue
Block a user