> - deepfake attacks make use of leveraging software capable to create a synthetic video or image realistically representing someone else. Attackers are suspected to have access to a wide dataset containing images or a video of their target.
* [Beware of Digital ID attacks: your face can be spoofed!](https://www.enisa.europa.eu/news/enisa-news/beware-of-digital-id-attacks-your-face-can-be-spoofed)2022-01-20 ENISA
> Digital identification is the focus of two new reports by the European Union Agency for Cybersecurity (ENISA): [an analysis of self-sovereign identity](https://www.enisa.europa.eu/publications/digital-identity-leveraging-the-ssi-concept-to-build-trust/@@download/fullReport)(SSI) and a study of major [face presentation attacks](https://www.enisa.europa.eu/publications/remote-identity-proofing-attacks-countermeasures).
* [A Tour Through the OWASP Top 10](https://auth0.com/blog/a-tour-through-the-owasp-top-10/) 2021-10-21Auth0\
*Market issues that we should make sure SSI addresses*
> A quick look at the refreshed OWASP Top 10 to celebrate Cybersecurity Awareness Month
> - Broken access control
> - Cryptographic Failure
> - Injection
> - Insecure Design
> - Security Misconfiguration
> - Outdated Components
> - ID-Auth Failure
> - Software\Data Integrity Failure
> - Logging\Monitoring Failure
> - Server Side Request Forgery
### Workplace
* [Blockchains in HR: Prosoon and Talao go together on SSI and HR credentials](https://medium.com/@talao_io/blockchains-in-hr-prosoon-and-talao-go-together-on-ssi-and-hr-credentials-3b92968011fe) 2022-01-31Talao
> This partnership will enable the use of Blockchain and Self-Sovereign Identity technologies such as verifiable credentials to enable the support of diplomas and professional certifications in compliance with personal data in a decentralized environment (#web3).
@ -161,6 +174,8 @@ last_modified_at: 2023-06-18
### Property Management
* [A Decentralised Real Estate Transfer Verification Based on Self-Sovereign Identity and Smart Contracts](https://arxiv.org/pdf/2207.04459.pdf) 2022-07-10 Abubakar-Sadiq Shehu, Anto ́nio Pinto, Manuel E. Correia1
> SSI technology enable methods for acquiring verified credential (VC) that are verifiable on a decentralised blockchain registry to identify both real estate owner(s) and real estate property. Second, the smart contracts are used to negotiate the secure transfer of real estate property deeds on the marketplace. To assess the viability of our proposal we define an application scenario and compare our work with other approaches.
* [Apartment rentals and fraud: Discover technology that will ensure trusted content](https://medium.com/@michelplante/apartment-rentals-and-fraud-cf2ebc572890) 2022-01-27 Michel Plante
> At the root of the problem is the fact that uniquely identifying a person is hard to do and that people can create fake IDs for themselves quite easily.
* [A brighter future for tenant/landlord relationships](https://domilabs.io/tenant-landlord-relationships/) 2021-05-26Domi Labs
> it’s hard to keep track since some call, some… email, and still others send you a message on WhatsApp.” Going through all of these disparate messages is its own fulltime job!
> An identity framework will need to work within such GDPR principles as data minimisation, purpose limitation and storage limitation. It will also have to deal with many of the rights that data subjects have under the GDPR, among them the well-known right to erasure (right to be forgotten), right of access and rights related to the automated processing of data. The GDPR also lays down clear responsibilities for data controllers and processors that will certainly need to be taken into account as well.
* EIDAS: A PAN-EUROPEAN NATIONAL IDENTITY STANDARD
> Perhaps the most important regulation dealing with identity in the EU is eIDAS, an EU regulation and a set of standards for electronic identification and trust services for electronic transactions in the European Single Market. This regulation will have a deep impact on the decentralised identity framework, above all as it pertains to government-issued/recognised identity credentials, and so is worth a closer look.
* [The impact of the GDPR on Blockchain & SSI](https://www.slideshare.net/SSIMeetup/the-impact-of-the-gdpr-on-blockchain-ssi-silvan-jongerius) 2019-05-15 Silvan Jongerius
> After this introduction, we will explore the particularities of this regulation relating to decentralized technology, blockchain, immutable ledgers and in particular self-sovereign identity solutions. Naturally, there are many challenges, but there are also opportunities, perhaps even to over-comply on the GDPR and setting a new standard for meeting its principles.
* [Blockchain and the GDPR](https://www.eublockchainforum.eu/sites/default/files/reports/20181016_report_gdpr.pdf) 2018-10-16 EU Blockchain Forum
> as this paper will explain, GDPR compliance is not about the technology, it is about how the technology is used. Just like there is no Gdpr-compliant Internet, or GDPR-compliant artificial intelligence algorithm, there is no such thing as a GDPR-compliant blockchain technology. There are only GDPR-compliant use cases and applications.
* [Liability under GDPR and the Self Sovereign Identity Model](https://www.slideshare.net/SSIMeetup/liability-under-gdpr-and-the-self-sovereign-identity-model-elizabeth-m-renierisi) 2018-05-22 Elizabeth M. Renieris SSI Meetup
> One of the myths about GDPR and the right to be forgotten is that blockchain is inherently at odds with the right to be forgotten because of its immutability. But it depends what you’re writing to the ledger, and there are a lot of solutions we’ve seen that make both inherently compatible, because they’re not exactly that, they’re not putting credentials on the ledger. It depends on the chain, it depends on whether you consider forking and other technical measures to actually introduce changes to the record so to speak.
* [GDPR - A reflection on the 'self-sovereign identity' and the Blockchain](https://www.linkedin.com/pulse/gdpr-reflection-self-sovereign-identity-blockchain-nicolas-ameye/) 2018-02-11 Nicolas Ameye
> The GDPR is taking for granted a centralized identity model, meaning a centralized model of digital data storage and transmission. Those centralized models of digital data storage are relying on the principles that the data custodians are trustworthy and are mandated to steward personal data. The GDPR, while being technology-neutral by nature, is articulated around the idea that personal data are being stewarded by centralized authorities.
* [When GDPR Becomes Real, and Blockchain is no longer fairydust](https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust-fall2017/blob/master/final-documents/gdpr.md) by Marta Piekarska (Linux Foundation), Michael Lodder (Evernym), Zachary Larson (Economic Space Agency), Kaliya Young (Identity Woman)
> You might think that I have lost my mind. We have just reported that our Indy SDK based DID agency is [AIP 1.0](https://github.com/hyperledger/aries-rfcs/blob/main/concepts/0302-aries-interop-profile/README.md)compatible, and everything is wonderful. What’s going on?
### Spain
![](https://i.imgur.com/JKDcTOK.png)
* [Alastria](https://alastria.io/)
> a non-profit consortium building a national blockchain ecosystem for Spain. The security and veracity of information will be ensured through the identification of natural and legal persons, while at the same time allowing citizens to have control over their personal information in a transparent way following the guidelines set by the European Union.
> At this moment, this solution has been developed and tested for Quorum (Geth) on the Alastria Red-T network. More information about its nodes and the network can be found in the alastria-node repository. In the future, the objetive is that this works with other Alastria networks such as Besu Red-B or Hyperledger Fabric Red-H.
* [Verifiable Credentials for Digital Identity Projects](https://knowledge.wealize.digital/en/blog/verifiable-credentials-for-digital-identity-projects) 2021-08-26
> The Spanish Association for Standardization (UNE) has recently published the [UNE 71307-1](https://www.une.org/encuentra-tu-norma/busca-tu-norma/norma?c=N0064986)Digital Enabling Technologies Standard. This is the first global standard on decentralized identity management, based on Blockchain and Distributed Ledger Technologies (DLT).
* [Alastria Digital Identity: the Spanish Blockchain solution for SSI - Carlos Pastor](https://www.slideshare.net/SSIMeetup/alastria-digital-identity-the-spanish-blockchain-solution-for-ssi-carlos-pastor) 2018-06-28 SSI Meetup
> Alastria is an association to foster the implementation of a Spanish national blockchain whose nodes are run by Alastria members. Alastria gathers over 250 cross-industry members and was initiated by the some of the biggest corporations in Spain. Alastria ID proposes an implementation of the Self Sovereign Identity paradigm over a public-permissioned Blockchain and will be presented by Carlos Pastor, Alastria’s Digital Identity Commission Leader
* [Catalonia Announces Decentralized ID System the Govt Won’t Control](https://cointelegraph.com/news/catalonia-announces-a-decentralized-id-system-the-govt-wont-control) 2019-09-09
> President Quim Torra and Minister of Digital Policies and Administration Jordi Puigneró announced the project on Sept. 7, local media outlet VilaWeb reported. Notably, the government says it will not have access to citizens' data.
### Spain
![](https://i.imgur.com/JKDcTOK.png)
* [Alastria](https://alastria.io/)
> a non-profit consortium building a national blockchain ecosystem for Spain. The security and veracity of information will be ensured through the identification of natural and legal persons, while at the same time allowing citizens to have control over their personal information in a transparent way following the guidelines set by the European Union.
> At this moment, this solution has been developed and tested for Quorum (Geth) on the Alastria Red-T network. More information about its nodes and the network can be found in the alastria-node repository. In the future, the objetive is that this works with other Alastria networks such as Besu Red-B or Hyperledger Fabric Red-H.
## Interop
* [Validated ID is set to complete the S4EDI20 interoperability tests](https://www.validatedid.com/post-en/validated-id-is-set-to-complete-the-as4edi20-interoperability-tests) 2022-09-18 ValidatedID
* [Will users and organizations have trust in keys roaming via the cloud?](https://www.kuppingercole.com/events/eic2022/blog/will-users-and-organizations-have-trust-in-keys-roaming-via-the-cloud) 2022-05-12 Kuppinger Cole EIC2022
> the FIDO Alliance, a set of open, scalable, and interoperable specifications has been developed to replace passwords as a secure authentication method for online services. The alliance has also worked with companies such as [Microsoft](https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-authentication-passwordless), [Google](https://cloud.google.com/blog/products/identity-security/protect-gce-vms-with-managed-fido-security-keys), and [Apple](https://fidoalliance.org/expanded-support-for-fido-authentication-in-ios-and-macos/) to integrate and adopt FIDO standards across their operating systems.
## Consumer Research
* [People Don’t Understand the Purpose of Privacy Policies and Terms of Service –New Research Published](https://me2ba.org/people-dont-understand-the-purpose-of-privacy-policies-and-terms-of-service-new-research-published/)Me2B Alliance ([Report](https://me2ba.org/spotlight-report-5-me2b-alliance-validation-testing-report-consumer-perception-of-legal-policies-in-digital-technology/)
## Users Needs
* [People Don’t Understand the Purpose of Privacy Policies and Terms of Service –New Research Published](https://me2ba.org/people-dont-understand-the-purpose-of-privacy-policies-and-terms-of-service-new-research-published/) 2022-01-24Me2B Alliance ([Report](https://me2ba.org/spotlight-report-5-me2b-alliance-validation-testing-report-consumer-perception-of-legal-policies-in-digital-technology/)
> - Consumers are aware that legal policies exist on connected technologies and that they should read them, but they continue to choose to largely ignore them.
> - 55% of survey participants did not understand that a TOS/TOU agreement is a legal contract. This has significant implications because a key requirement for legally binding contracts is mutual assent, which means that both parties have a “meeting of the minds” and must understand they’re entering into a contract.
> - None of the interview participants were aware of tools that explain or rate privacy policies and TOS/TOU documents, and half said that a score would not change their behavior.
> - 66% of survey respondents believe that privacy policies protect the business, while 50% say they protect the consumer. It’s questionable that privacy policies protect either the individual or the business, as they are primarily legal notices, disclosures of how data is used by the technology and the companies behind it. Moreover, 39% of respondents erroneously thought that the privacy policy was a contract [between them and the company].
* [What Your Customers Really Want From Your Login Box](https://auth0.com/blog/what-your-customers-really-want-from-your-login-box/) 2021-10-06Auth0
> customers want convenience and control: they want to choose which authentication method to use – whether it’s MFA or SSO or biometrics. They want a brand experience that resembles a concierge desk: a 24/7 service where no demand is too big. To top it off, they don’t want to see any technical glitches
### Location Tracking
* [Most People Feel Negatively About Location Tracking in Websites and Apps](https://me2ba.org/most-people-feel-negatively-about-location-tracking/) 2021-11-16Me2Ba
> they offer a few advantages that we don’t get with paper records. Whereas a physical document (let’s say, a[vaccine card](https://www.helpnetsecurity.com/2021/06/15/vaccine-passports/)) can be forged and[passed off as authentic](https://www.npr.org/2021/06/08/1004264531/fake-covid-vaccine-cards-keep-getting-sold-online-using-one-is-a-crime?t=1626423870877), the[security mechanisms](https://www.evernym.com/blog/the-three-pillars-of-self-sovereign-identity/)behind a verifiable credential means that it can never be tampered with and that anyone shown the credential will be able to immediately verify who issued it and to whom it was issued. 2021-06-08
* [Self Sovereign e-ID Schemes & Privacy Challenges](https://www.youtube.com/watch?v=1vgNzSDn554) 2021-12-13Crypto Valley Conference 2021
> Kurt Nielsen & Nagib Aouini from Partisia Blockchain
* [Identity and Privacy: Past, Present, and Digital](https://www.slideshare.net/SSIMeetup/identity-and-privacy-past-present-and-digital-brenda-k-leong) 2018-09-21 Brenda K. Leong SSI Meetup
> Underlying this conversation is the concept of privacy. Is it a fundamental right? What does it mean? Who gets to decide which conveniences are worth the tradeoffs they require? Are the protections for personal data offered by policy and law sufficient, or should technical and security protections be required? Are some systems simply too high-risk to implement regardless of perceived benefits? To answer those questions, it’s important to understand the technologies at work – biometrics such as fingerprints and facial recognition offer greater reliability, security and certainty, but raise fears of “permanent” breach if the personal data is compromised. These systems offer accessibility at scale that can be updated throughout a lifetime in a way that password-based accounts cannot equal. But fair access to all, protections of personal data, and most importantly, legal, policy, and technical protections against discrimination and abuse are critical to ensuring these and related technologies are not simply used to restrict personal freedom, or target groups and other populations. Brenda covers how these and other aspects of the modern concept of “digital identity” are being approached in different ways, and what some of the benefits and risks are for the future.
* [Zero-Knowledge Proofs: Privacy-Preserving Digital Identity](https://www.slideshare.net/SSIMeetup/zeroknowledge-proofs-privacypreserving-digital-identity-with-clare-nelson) 2018-10-12 Clare Nelson SSI Meetup
> Clare will explain why ZKPs are so powerful, and why they are building blocks for a range of applications including privacy-preserving cryptocurrency such as Zcash, Ethereum, Artificial Intelligence, and older versions of Trusted Platform Modules (TPMs). The presentation includes many backup slides for future learning and researching, including four slides of references.
## Policy
* [UNDP LEGAL IDENTITY AGENDA ONLINE FORUM: PRIVATE SECTOR ENGAGEMENT ROUNDTABLES: DATA PROTECTION AND PRIVACY](https://unstats.un.org/LEGAL-IDENTITY-AGENDA/MEETINGS/2021/UNLIA-FUTURETECH/DOCS/REPORT2.PDF) 2022-07-13 UNStats
@ -105,6 +109,13 @@ last_modified_at: 2023-06-29
> From the we can’t talk about ourselves without ®’s camp
## Privacy Violations
* [Businesses need to ‘mind the trust gap’ so users don’t need to sacrifice privacy, MEF Global Consumer Trust Survey finds](https://blog.digi.me/2021/05/20/businesses-need-to-mind-the-trust-gap-so-users-dont-need-to-sacrifice-privacy-mef-global-consumer-trust-survey-finds/) 2021-05-20Digi.me
> - Users sacrifice privacy and security for access to valued services
> - Smartphone users begin to sense improvement in the mobile environment
> - More and more users take protective steps, but remain exposed to harm
> - Protective actions do not necessarily drive confidence
> - Cost, knowledge and perceived complexity are key barriers
> - Transparency and control are key values for users
* [Privacy Harms](https://teachprivacy.com/privacy-harms/)2021-02-09 Daniel Solove Teach Privacy
> This article makes two central contributions. The first is the construction of a road map for courts to understand harm so that privacy violations can be tackled and remedied in a meaningful way.
* [John Oliver on Surveillance Capitalism](https://www.windley.com/archives/2022/04/john_oliver_on_surveillance_capitalism.shtml) 2022-04Phil Windley
@ -156,18 +156,6 @@ Gimly ID is leading self-sovereign identity innovation, with the implementation
Julian describes digi.me’s mission of empowering people with their personal data, as individuals know where all their data is, while they also have “a right for that data”. By having that knowledge and ownership, only individuals have “unlimited usage rights” to unlock the potential data has to be a force for good.
* [Businesses need to ‘mind the trust gap’ so users don’t need to sacrifice privacy, MEF Global Consumer Trust Survey finds](https://blog.digi.me/2021/05/20/businesses-need-to-mind-the-trust-gap-so-users-dont-need-to-sacrifice-privacy-mef-global-consumer-trust-survey-finds/)DigiMe 2021-05-20
Key findings from the report are:
- Users sacrifice privacy and security for access to valued services
- Smartphone users begin to sense improvement in the mobile environment
- More and more users take protective steps, but remain exposed to harm
- Protective actions do not necessarily drive confidence
- Cost, knowledge and perceived complexity are key barriers
- Transparency and control are key values for users
### Entrustient
* [The First No Code Solution for Trusted Decentralized Digital Identity SSI on Redundant Blockchains](https://www.prnewswire.com/news-releases/entrustient-launches-the-first-no-code-solution-for-trusted-decentralized-digital-identity-using-self-sovereign-identity-on-redundant-blockchains-301436112.html)Entrustient
@ -22,3 +22,9 @@ One of the biggest problems in open source software development today is that it
- As part of the EU eSSIF Lab and the result of many months of work, Sphereon released an implementation of the DIF Presentation Exchange, an interoperable exchange of VC/VPs between Wallets and Verifiers.
- [The library is Open Source and Sphereon is donating all code and rights to the DIF](https://github.com/Sphereon-Opensource/pex).
[Self-Sovereign Identity (SSI) and Open Source - Richard Esplin](https://www.slideshare.net/SSIMeetup/selfsovereign-identity-ssi-and-open-source-richard-esplin)
@ -92,3 +92,15 @@ Questions started at about [46:30] – though some questions came earlier. We
> Decentralized Ecosystem Governance makes verifying data an easy-to-play game of red light/green light. And, importantly, it decentralizes governance to the appropriate authorities.
* [Trust Registry or Machine-Readable Governance?](https://indicio.tech/trust-registry-or-machine-readable-governance/)Indicio
> Machine-readable governance is composed of elements that help to establish trust and enable interoperability: trusted participants, schemas (templates for structuring information in a credential), and rules and flows for presenting credentials and verifying them. Machine-readable governance can be hierarchical. Once a governance system is published, other organizations can adopt and then amend or extend the provided system.
[Overview of the Proposed PanCanadian Trust Framework for SSI - Tim Bouma](https://www.slideshare.net/SSIMeetup/overview-of-the-proposed-pancanadian-trust-framework-for-ssi-tim-bouma)
[Trust Frameworks and SSI: An Interview with CULedger on the Credit Union MyCUID Trust Framework](https://www.slideshare.net/SSIMeetup/trust-frameworks-and-ssi-an-interview-with-culedger-on-the-credit-union-mycuid-trust-framework)
* [Is the Self-Sovereign digital identity the future digital business registry?](https://blogs.worldbank.org/psd/self-sovereign-digital-identity-future-digital-business-registry)GORAN VRANIC, ANDREJA MARUSIC; WorldBank
## General
* [Is the Self-Sovereign digital identity the future digital business registry?](https://blogs.worldbank.org/psd/self-sovereign-digital-identity-future-digital-business-registry) 2021-12-17GORAN VRANIC, ANDREJA MARUSIC; WorldBank
> This rapid digitalization of the private sector exposed a challenge in the business registration paradigm. To use private digital platforms for e-Logistics or e-Commerce, SMEs have to register and confirm their identity with these platforms, despite already being identified in the government business registry.
* [Apartment rentals and fraud: Discover technology that will ensure trusted content](https://medium.com/@michelplante/apartment-rentals-and-fraud-cf2ebc572890)
> At the root of the problem is the fact that uniquely identifying a person is hard to do and that people can create fake IDs for themselves quite easily.
* [Choice, decision making and judgment; is your relationship constructive or destructive?](https://www.mydigitalfootprint.com/2021/07/choice-decision-making-and-judgment-is.html)MyDigitalFootprint
> My proposal to help support better governance is that we request companies publish the questions asked in a board meeting. Not the answers, but definitely the questions.
* [The Document Culture of Amazon](https://www.justingarrison.com/blog/2021-03-15-the-document-culture-of-amazon/)Justin Garrison
> The interesting part to me isn’t in the format of the document, but how it is used. Meetings start with reading. Depending on the length of the document, we’ll read anywhere from ten minutes to half an hour. If the meeting has a long document (six-pagers are the longest) and many attendees, the meeting will be scheduled for enough time to read and discuss.
* [Decentralized Business Model](https://sgershuni.medium.com/decentralized-business-model-4c540ea5b769)Stepan Gershuni
* [Decentralized Business Model](https://sgershuni.medium.com/decentralized-business-model-4c540ea5b769) 2021-04-28Stepan Gershuni
> How reduction in transaction costs influence evolution in digital business models
* [Businesses need to ‘mind the trust gap’ so users don’t need to sacrifice privacy, MEF Global Consumer Trust Survey finds](https://blog.digi.me/2021/05/20/businesses-need-to-mind-the-trust-gap-so-users-dont-need-to-sacrifice-privacy-mef-global-consumer-trust-survey-finds/)DigiMe 2021-05-20
Key findings from the report are:
- Users sacrifice privacy and security for access to valued services
- Smartphone users begin to sense improvement in the mobile environment
- More and more users take protective steps, but remain exposed to harm
- Protective actions do not necessarily drive confidence
- Cost, knowledge and perceived complexity are key barriers
- Transparency and control are key values for users
* [Decentralized ID Management Business Value of SSI](https://www.inforisktoday.com/self-sovereign-identity-more-use-cases-a-16448)Heather Dahl and Ken Ebert of Indicio
The decentralized workforce is also fueling demand for self-sovereign identity, Dahl says. "When you physically decentralize your workforce in society, the need for identity becomes more important." She says increasing concerns about protecting privacy are "pushing organizations to consider identity solutions that don't involve correlation and don't involve third-party tracking but also provide the security.”
* [Making Money with SSI](https://trinsic.id/webinar-recap-making-money-with-ssi/).Trinsic hosted a webinar where four different folks articulated how you make money with SSI. You can see each of the presentations separately if you like.
* [SSI Business Models and Go-to-Market](https://sgershuni.medium.com/ssi-business-models-and-go-to-market-663813eea3b4)
In the second part I’m focusing on the business model and go-to-market aspects.
What are some limitations and opportunities for making profitable business in self-sovereign identity?
- [Economics of Self-Sovereign Identity and the Future of Cryptoeconomics with Stepan Gershuni](https://anchor.fm/ssi-orbit-podcast/episodes/9---Economics-of-Self-Sovereign-Identity-and-the-Future-of-Cryptoeconomics-with-Stepan-Gershuni-euvf32/a-a58m81q)Podcast •SSIOrbit
- Biz models of web1, web2, web3
- SSI Adoption Strategy
- Verifiability = Economic Efficiencies
- Cryptoeconomics x SSI (h/t [@mathieu_glaude](https://twitter.com/mathieu_glaude)
* [On Self-Sovereign Identity: What's the Business Value of SSI?](https://hackernoon.com/self-sovereign-identity-what-is-the-business-value-uq6l36wh)Hackernoon
> To businesses, immediate value comes from removal of the costly and challenging GDPR compliance.[Forbes reports](https://www.forbes.com/sites/oliversmith/2018/05/02/the-gdpr-racket-whos-making-money-from-this-9bn-business-shakedown/?ref=hackernoon.com#5dd0efa234a2)that in 2018 in the UK alone $1,1 billion was spent by companies on GDPR preparation, while US companies allocated over $7.8 billion on protecting customers’ personal information. 2018-05-02
* [Career Advice for New Professionals in Identity](https://iiw.idcommons.net/22D/_Career_Advice_for_New_Professionals_in_Identity)by Megan Olsen
Simon: worked with Megan Olsen for 6(?) months as intern. Do not have job offer yet. Think this is the future. Hard to get from corporations taking advantage, bring freedom back as it was back in the day. Advise: do some research on your own, educate yourself, do development as much as you can.
Join some communities on the Internet. Be part of an open source and contribute.I will be contributing to open source Indivcio while whiling for job offer.
Patrick Kenyon. Indicio. Mobile development layer. 2 months. Mobile development itself. Wanted to learn a bit more about identity aspect that I’ve been working on. To learn better.
Ian Kulp. Not currently working yet. Finished bachelors degree same time last year. After 2 year SDE intensive. 2nd years ML. passionate about all things decentralized. See as evolution of internet. Heavily invested in cryptos pace. Mining. 24 GPU miners going. First IIW. Soaking in as much knowledge as I can. By time … graduate from this software engineering intensive. Hope to enter the workforce ideally with a company or org triny got move the decentralized revolution for
Patrick Kenyon To Everyone
1:51:27 PM
Megan: biggest advice: go in chat and ask for everyone’s LinkedIn. I applied for a lot of jobs and … heard back. Got job through networking. Then got Patrick hired. I don’t remember if I filled out application or not.
Megan: learning different things, even though don’t sound important to what you are doing, can be helpful.
Phil: looking through this advice, notes. Is any of it Identity-specific? Or just, this is our community? The rest is just IT and cybersecurity-oriented guidance?
Megan: still extremely new. Only 6 months next week. Think the advise is about the same. #1 thing to remember about identity: there is always going to be news stuff coming up that surprises you. Never would have thought of it that way because it’s always been the same way for a long time.
PhilWolff: I’m a researcher for digital identity in the Internet of Things.
I’ve been coming to IIW for about 10(?) years. Everything Megan tells you, do that. But there is a huge leap between world of identity access management - world of well-known well-understood problems, pretty proven toolkit for managing them; and folks like at IIW trying to imagine what’s trh proven ne stuff for 5 years down the road, start designing it now. Bleeding edge of digital identity in some respects. Other pockets of the internet where you can find where the innovators are doing stuff. Most 95% of companies in Identity trying to get some enterprise(s) properly connected, wired up. Industry, IAM. Consider as two separate fields. Identity research, science - vs. Identity Operations. Most work in Identity is Identity Operations and Business practice.
* [What Your Customers Really Want From Your Login Box](https://auth0.com/blog/what-your-customers-really-want-from-your-login-box/)Auth0
customers want convenience and control: they want to choose which authentication method to use – whether it’s MFA or SSO or biometrics. They want a brand experience that resembles a concierge desk: a 24/7 service where no demand is too big. To top it off, they don’t want to see any technical glitches
* [How SSI Can Make Any Platform a 'Super App'](https://bloom.co/blog/how-ssi-can-make-any-platform-a-super-app/)
> Companies that support a Verifiable Credential Issuance standard can provide audited and truthful information to any third party on behalf of and with specific permission from their customers. For example, a bank could provide proof-of-funds in the form of a digitally verified credential document, that can then be used as a source of truth to instantly initiate a mortgage application, or a real estate purchase offer.
* [When it Comes to Decentralized Identity, Sell Solutions Not Rules](https://indicio.tech/when-it-comes-to-decentralized-identity-sell-solutions-not-rules/)
we advocate “machine-readable governance” as an architectural solution.
- First, machine-readable governance simplifies how decentralized identity works: The user software handles the rules for information flows and authentication, which are established and published by the entities with authority for governing the use case.
- Second, this architecture makes these rules transparent.
- Third, and critically, it enables these rules to function offline through caching, which, when you think about it, is an essential feature in any digital identity verification system; trust can’t be dependent on a Wi-Fi signal.
* [Building a Relationship Economy](https://blogs.harvard.edu/doc/2022/02/11/building-a-relationship-economy/)Doc Searls 2022-02-11
Is there something new that open source development methods and values can bring to the economy? How about something old?
* [4 Keys to Self-sovereign Identity Adoption](https://medium.com/trinsic/4-keys-to-self-sovereign-identity-adoption-ad269b208569), Riley Hughes
> I decided to interview close to 50 business leaders who are seeking to deploy SSI in production to glean their learnings. The interviewees included our “competitors” (at this stage we’re more collaborative than competitive), a few of Trinsic’s customers, and industry leaders. I have summarized and consolidated their insights and my own thoughts into 4 keys for SSI adoption.
* [The Identity Imperative: Risk Management, Value Creation, and Balance of Power Shifts](https://identitypraxis.com/2021/12/10/the-identity-imperative-risk-management-value-creation-and-balance-of-power-shifts/)IdentityPraxis Michael Becker 2021-12-10
Brands need to prepare for fundamental shifts in people’s attitudes and expectations. The implications of these shifts will be profound, as they will force a change in competition, business models, product offerings, and business practices.
* [A Tour Through the OWASP Top 10](https://auth0.com/blog/a-tour-through-the-owasp-top-10/)Auth0
*Market issues that we should make sure SSI addresses*
> A quick look at the refreshed OWASP Top 10 to celebrate Cybersecurity Awareness Month
* [Decentralized ID Management Business Value of SSI](https://www.inforisktoday.com/self-sovereign-identity-more-use-cases-a-16448) 2021-04-22Heather Dahl, Ken Ebert Indicio
> The decentralized workforce is also fueling demand for self-sovereign identity, Dahl says. "When you physically decentralize your workforce in society, the need for identity becomes more important." She says increasing concerns about protecting privacy are "pushing organizations to consider identity solutions that don't involve correlation and don't involve third-party tracking but also provide the security.”
* [Making Money with SSI](https://trinsic.id/webinar-recap-making-money-with-ssi/) 2020-10-20 Trinsic
> - How to go from a use case to a business case
> - Overcoming common adoption challenges
> - How Trinsic can help you build a successful SSI business
* [SSI Business Models and Go-to-Market](https://sgershuni.medium.com/ssi-business-models-and-go-to-market-663813eea3b4) 2021-03-01
> I’m focusing on the business model and go-to-market aspects.
>
> - Broken access control
> - Cryptographic Failure
> - Injection
> - Insecure Design
> - Security Misconfiguration
> - Outdated Components
> - ID-Auth Failure
> - Software\Data Integrity Failure
> - Logging\Monitoring Failure
> - Server Side Request Forgery
> What are some limitations and opportunities for making profitable business in self-sovereign identity?
* [Podcast] [Economics of Self-Sovereign Identity and the Future of Cryptoeconomics with Stepan Gershuni](https://anchor.fm/ssi-orbit-podcast/episodes/9---Economics-of-Self-Sovereign-Identity-and-the-Future-of-Cryptoeconomics-with-Stepan-Gershuni-euvf32/a-a58m81q) SSIOrbit
> - Biz models of web1, web2, web3
> - SSI Adoption Strategy
> - Verifiability = Economic Efficiencies
> - Cryptoeconomics x SSI (h/t [@mathieu_glaude](https://twitter.com/mathieu_glaude)
* [Where the Intention Economy Beats the Attention Economy](https://blogs.harvard.edu/doc/2021/10/04/where-intention/) 2021-10-04
There’s an economic theory here: Free customers are more valuable than captive ones—to themselves, to the companies they deal with, and to the marketplace. If that’s true, [the intention economy](https://www.amazon.com/Intention-Economy-When-Customers-Charge/dp/1422158527)will prove it. If not, we’ll stay stuck in the attention economy, where the belief that captive customers are more valuable than free ones prevails.
* [Just ask](https://werd.io/2021/just-ask)Werd
We’d get the startup founders to figure out the biggest assumptions they were making across user risk (do people want this?), business risk (can this be the center of a viable business?), and feasibility risk (can we build this in a scalable way with the time, team, and resources potentially at our disposal?). And then we’d ask them to go out and figure out how to de-risk those assumptions in the real world, usually by talking to experts and asking smart questions.
* [Working Spaces Are Ecosystems Too!](https://www.youtube.com/watch?v=MfBoUDNcyW4)Autumn Watkinson - Trust over IP Foundation
An ecosystem is a community of living organisms interacting with each other and their physical environment. When you hear that definition, you might priture a pristine nature landscape, but that definition can also apply to how businesses, individual or organization interact with one and other. This talk is about natural ecosystem and how we can adapt nature's lessons to our industry ecosystems.
* [How my team won FinCEN/FDIC’s Digital Identity Tech Sprint](https://medium.com/global-id/how-my-team-won-fincen-fdics-digital-identity-tech-sprint-3af744b818a5)Vadim SlavinGlobalID
“What is a scalable, cost-efficient, risk-based solution to measure the effectiveness of digital identity proofing to ensure that individuals who remotely (i.e., not in person) present themselves for financial activities are who they claim to be?”
* [Catalyzing your Digital Transformation Journey](https://www.kuppingercole.com/events/eic2022/blog/catalyzing-your-digital-transformation-journey-in-providing-a-seamless-access-experience-to-your-customers-partners-and-employees)Kuppinger Cole
The KuppingerCole Identity Fabric, an indispensable component in modeling future-proof IAM concepts has just been extended and updated in some details. As a framework and guideline describing a modern, future proof and adaptable IAM, it demands and promotes seamless and secure access for every actor to all required resources.
* [Can Self-Sovereign Identity Deliver Business Value?](https://walton.uark.edu/insights/posts/can-self-sovereign-identity-deliver-business-value-lessons-learned-from-the-nhs.php)Walton College
As [Mary Lacity](https://walton.uark.edu/departments/information-systems/directory/uid/mclacity/name/Mary+Lacity/)and [Erran Carmel](https://www.american.edu/kogod/faculty/carmel.cfm)explore in their whitepaper, [“Implementing Self-Sovereign Identity (SSI) for a digital staff passport at UK NHS,”](https://cpb-us-e1.wpmucdn.com/wordpressua.uark.edu/dist/5/444/files/2018/01/BCoE2022SS1FINAL.pdf)the lessons learned by the NHS may point towards ways of unlocking new business value.
* [Identity Proofing – Definition, Importance, and Solutions](https://imageware.io/identity-proofing/)Imageware
The global market for identity and access management was $9.53 billion USD in 2018 and is expected to reach $24.76 billion USD by the end of 2026, showing a CAGR of 13.2% during the forecast year.
* [New Indicio Executive Workshop Provides Essential Grounding in Digital Identity: The Business and Investor’s Guide to Self-Sovereign Identity](https://indicio.tech/new-indicio-executive-workshop-provides-essential-grounding-in-digital-identity-the-business-and-investors-guide-to-self-sovereign-identity/)2021-12-14 Scott Harris
* [On Self-Sovereign Identity: What's the Business Value of SSI?](https://hackernoon.com/self-sovereign-identity-what-is-the-business-value-uq6l36wh) 2019-11-29Hackernoon
> To businesses, immediate value comes from removal of the costly and challenging GDPR compliance.[Forbes reports](https://www.forbes.com/sites/oliversmith/2018/05/02/the-gdpr-racket-whos-making-money-from-this-9bn-business-shakedown/)that in 2018 in the UK alone $1,1 billion was spent by companies on GDPR preparation, while US companies allocated over $7.8 billion on protecting customers’ personal information.
* [Career Advice for New Professionals in Identity](https://iiw.idcommons.net/22D/_Career_Advice_for_New_Professionals_in_Identity)2021-05-06 Megan Olsen
> IIW trying to imagine what’s the proven stuff for 5 years down the road, start designing it now. Bleeding edge of digital identity in some respects. Other pockets of the internet where you can find where the innovators are doing stuff. Most 95% of companies in Identity trying to get some enterprise(s) properly connected, wired up. Industry, IAM. Consider as two separate fields. Identity research, science - vs. Identity Operations. Most work in Identity is Identity Operations and Business practice.
* [How SSI Can Make Any Platform a 'Super App'](https://bloom.co/blog/how-ssi-can-make-any-platform-a-super-app/) 2021-01-20 Bloom
> Companies that support a Verifiable Credential Issuance standard can provide audited and truthful information to any third party on behalf of and with specific permission from their customers. For example, a bank could provide proof-of-funds in the form of a digitally verified credential document, that can then be used as a source of truth to instantly initiate a mortgage application, or a real estate purchase offer.
* [Building a Relationship Economy](https://blogs.harvard.edu/doc/2022/02/11/building-a-relationship-economy/) 2022-02-11Doc Searls
> Is there something new that open source development methods and values can bring to the economy? How about something old?
* [The Identity Imperative: Risk Management, Value Creation, and Balance of Power Shifts](https://identitypraxis.com/2021/12/10/the-identity-imperative-risk-management-value-creation-and-balance-of-power-shifts/) 2021-12-10 Michael BeckerIdentityPraxis
> Brands need to prepare for fundamental shifts in people’s attitudes and expectations. The implications of these shifts will be profound, as they will force a change in competition, business models, product offerings, and business practices.
* [Where the Intention Economy Beats the Attention Economy](https://blogs.harvard.edu/doc/2021/10/04/where-intention/) 2021-10-04 Doc Searls
> There’s an economic theory here: Free customers are more valuable than captive ones—to themselves, to the companies they deal with, and to the marketplace. If that’s true, [the intention economy](https://www.amazon.com/Intention-Economy-When-Customers-Charge/dp/1422158527)will prove it. If not, we’ll stay stuck in the attention economy, where the belief that captive customers are more valuable than free ones prevails.
* [Just ask](https://werd.io/2021/just-ask)2021 Werd
> We’d get the startup founders to figure out the biggest assumptions they were making across user risk (do people want this?), business risk (can this be the center of a viable business?), and feasibility risk (can we build this in a scalable way with the time, team, and resources potentially at our disposal?). And then we’d ask them to go out and figure out how to de-risk those assumptions in the real world, usually by talking to experts and asking smart questions.
* [Working Spaces Are Ecosystems Too!](https://www.youtube.com/watch?v=MfBoUDNcyW4)Autumn Watkinson 2022-03-23 Trust over IP Foundation
> An ecosystem is a community of living organisms interacting with each other and their physical environment. When you hear that definition, you might priture a pristine nature landscape, but that definition can also apply to how businesses, individual or organization interact with one and other. This talk is about natural ecosystem and how we can adapt nature's lessons to our industry ecosystems.
* [How my team won FinCEN/FDIC’s Digital Identity Tech Sprint](https://medium.com/global-id/how-my-team-won-fincen-fdics-digital-identity-tech-sprint-3af744b818a5) 2022-04-13Vadim SlavinGlobalID
> “What is a scalable, cost-efficient, risk-based solution to measure the effectiveness of digital identity proofing to ensure that individuals who remotely (i.e., not in person) present themselves for financial activities are who they claim to be?”
* [Can Self-Sovereign Identity Deliver Business Value?](https://walton.uark.edu/insights/posts/can-self-sovereign-identity-deliver-business-value-lessons-learned-from-the-nhs.php) 2022-04-19Walton College
> As [Mary Lacity](https://walton.uark.edu/departments/information-systems/directory/uid/mclacity/name/Mary+Lacity/)and [Erran Carmel](https://www.american.edu/kogod/faculty/carmel.cfm)explore in their whitepaper, [“Implementing Self-Sovereign Identity (SSI) for a digital staff passport at UK NHS,”](https://cpb-us-e1.wpmucdn.com/wordpressua.uark.edu/dist/5/444/files/2018/01/BCoE2022SS1FINAL.pdf)the lessons learned by the NHS may point towards ways of unlocking new business value.
* [Identity Proofing – Definition, Importance, and Solutions](https://imageware.io/identity-proofing/) 2022-04-21Imageware
> The global market for identity and access management was $9.53 billion USD in 2018 and is expected to reach $24.76 billion USD by the end of 2026, showing a CAGR of 13.2% during the forecast year.
* [Indicio Executive Workshop: The Business and Investor’s Guide to Self-Sovereign Identity](https://indicio.tech/new-indicio-executive-workshop-provides-essential-grounding-in-digital-identity-the-business-and-investors-guide-to-self-sovereign-identity/)2021-12-14 Scott Harris Indicio
> Participants will [walk away with an essential understanding](https://indicio.tech/product/executive-education-ssi-workshop/)of how SSI works, the pain points it solves for, the risks it mitigates, the use cases currently in deployment, and the opportunities that are created by being able to build Trusted Data Ecosystems (TDEs).
* [Who Controls Your Digital Identity?](https://blogs.sap.com/2021/02/18/who-controls-your-digital-identity/) SAP 2021-02-18
* [Who Controls Your Digital Identity?](https://blogs.sap.com/2021/02/18/who-controls-your-digital-identity/) 2021-02-18 SAP
> SSI will have to be integrated with large existing business processes – and therefore enterprise systems such as ERPs, HCMs, or SCMs to name a few. If this integration results in SSI being as easy to use as clicking a button or selecting a menu item, it will lead to rapid uptake and acceptance.
* [Part 0:The 7 Deadly Sins of Digital Customer Relationships](https://www.evernym.com/blog/7-deadly-sins-customer-relationships/)
* [Part 1: Decentralized Identifiers: Building Smarter, More Sustainable Customer Relationships](https://www.evernym.com/blog/decentralized-identifiers-customer-relationships/)
* [The 7 Deadly Sins of Digital Customer Relationships](https://www.evernym.com/blog/7-deadly-sins-customer-relationships/) 2021-03-02 Evernym
> It’s not just about measuring customers, it’s about keeping them. Yet the more I look at how businesses design and manage their relationships with customers, the more I see dysfunction, waste and a collapse of consumer trust. In fact, I see a number of core business behaviours that are causing this waste, this dysfunction. Seven to be precise.
* [Decentralized Identifiers: Building Smarter, More Sustainable Customer Relationships](https://www.evernym.com/blog/decentralized-identifiers-customer-relationships/) 2021-03-02 Evernym
> DIDs are about building lasting private and secure digital relationships with customers, and as we’ll see with each of the Deadly Sins, about reducing costs, increasing compliance and enabling truly personalized products and services – without being creepy.
* [What Does Self-Sovereign Identity Mean For My Business?](https://www.continuumloop.com/what-does-self-sovereign-identity-mean-for-my-business/)Continuum Loop
* [What Does Self-Sovereign Identity Mean For My Business?](https://www.continuumloop.com/what-does-self-sovereign-identity-mean-for-my-business/) 2017-09-22Continuum Loop
> - What will happen if I don’t jump on this train?
> - What would it mean if I didn’t have to own my customer’s digital identity but establish a deep digital relationship with them instead?
> - Do I have the capacity to learn about this? If not, who do you trust to figure it out – both on the business and technical sides.
> - What changes when digital identity becomes a revenue driver and asset for your business? (hint: top and bottom line)
> - Which of my competitors is probably already doing this?
* [Seven Ways Self-Sovereign Identity Can Enable True Digital Transformation](https://www.evernym.com/blog/self-sovereign-identity-digital-transformation/): A CODA
* [Seven Ways Self-Sovereign Identity Can Enable True Digital Transformation](https://www.evernym.com/blog/self-sovereign-identity-digital-transformation/) 2021-03-12 Evernym
> “Self-Sovereign Identity not only presents an opportunity for businesses to build smarter, more secure, and more scalable relationships with customers; but it will enable them to completely rethink how they build trusted digital relationships from the ground up.”
>
> We expect Digital Transformationto be a more prevalent talking point around digital identity. FOMO can go a long way, to sell SII, for Goverments and Corporations striving to not be left behind in the digital age.
Decentralized Identity has gone international! In this week’s GIMS, we’ll talk about some of the most exciting projects and some of the lessons learned from around the globe.
* [Decentralized Identity Market See Huge Growth for New Normal - Microsoft, Accenture, Persistent](https://www.digitaljournal.com/pr/decentralized-identity-market-see-huge-growth-for-new-normal-microsoft-accenture-persistent)Digital Journal
Chapter 2 Global Economic Impact on Industry
Chapter 3 Global Market Competition by Manufacturers
Chapter 4 Global Production, Revenue (Value) by Region
Chapter 5 Global Supply (Production), Consumption, Export, Import by Regions
Chapter 6 Global Production, Revenue (Value), Price Trend by Type
Chapter 7 Global Market Analysis by Application
Chapter 8 Manufacturing Cost Analysis
Chapter 9 Industrial Chain, Sourcing Strategy and Downstream Buyers
design and engineer reusable building blocks for the Next Generation Internet as part of a complete, strong chain of assurances for all stakeholders regarding the source and integrity of identities, identifiers, data, cyber-physical systems, service components and processes.
ONTOCHAIN: Closing 7/25
a new software ecosystem for trusted, traceable and transparent ontological knowledge management. The specific objective of the ONTOCHAIN Open Call 3 is to complete the missing blocks of the ONTOCHAIN infrastructure, as well as to exploit the ONTOCHAIN infrastructure
* [What will we learn from the Market Failure of Digital Identity?](https://lockstep.com.au/wp-content/uploads/2022/07/Steve-Wilson-Identiverse-2022-Market-Failure-0.6-HANDOUTS.pdf)Stephen Wilson
Identiverse follow-up
The common law system countries (AU, CA, NZ, UK & US) left the market to work out identity, and the market “decided” that there’s no need for IdPs. Let us respect that decision. The market has been trying to tell us for over a decade: IDENTITY IS NOT FOR SALE!
For decades, all TV signals were “over the air,” and free to be watched by anyone with a TV and an antenna.
* [Entrepreneurship, Innovation & Leadership with Andre Durand](https://www.nonconformistinnovation.com/andre-durand/)Nonconformist Innovation
Andre talks about what motivated him to start a company, how his best ideas came about, his thoughts about building teams, questions he asks of new hires, the legacy he hopes will endure, and how he fights entropy. Steve also asks Andre about his favorite music and the next concert he is planning to attend.
* [Multi-Cloud orchestration makes identity work](https://idramp.com/multi-cloud-orchestration-makes-identity-work/)IDRamp
It’s called decentralized identity orchestration and brings with it uniform security controls and functionality to your applications, services, and clouds. And built using open source and open standards, it establishes vendor neutrality, provides superior agility for continuous digital transformation, and propels digital business forward.
* [Top 8 Identity Challenges After an Merger and Acquisition](https://www.radiantlogic.com/blog/top-8-identity-challenges-after-an-ma/)RadiantLogic
* [Think the martech landscape is big? Here’s the size of the software industry overall](https://customerthink.com/think-the-martech-landscape-is-big-heres-the-size-of-the-software-industry-overall/)
- [Digital ID bill sees action in the House and Senate](https://fcw.com/congress/2022/07/digital-id-bill-sees-action-house-and-senate/374552/%C2%A0)
- [Will EU digital identity drop the unique identifier?](https://www.biometricupdate.com/202207/will-eu-digital-identity-drop-the-unique-identifier%C2%A0)
- [Why digital identity will make or break the Metaverse](https://eandt.theiet.org/content/articles/2022/07/why-digital-identity-will-make-or-break-the-metaverse/%C2%A0)
- [Young people at greater risk of falling victim to identity fraud](https://www.digit.fyi/young-people-at-greater-risk-of-falling-victim-to-identity-fraud/%C2%A0)
* [Why plastic cards are a model for verifiable credentials as a service](https://lockstep.com.au/magnetic-stripe-cards-and-verifiable-credentials/)Lockstep
The plastic card paradigm has some powerful features which are instructive for the emerging VCs-as-a-service industry.
- A competitive market of card personalisation bureaus, providing custom production, magnetic stripe encoding, and card distribution and activation, all in commercial bundles which can be purchased by government agencies, banks, professional associations, universities, driver licence bureaus, and so on. On the rear of many plastic cards, the card manufacturer is indicated in fine print. It may well be that the same manufacturer produced your credit cards and government cards.
* [How to rewrite a press release: a step-by-step guide](https://blog.jonudell.net/2022/08/13/how-to-rewrite-a-press-release-a-step-by-step-guide/)Jonudell 2022-08-13
Lead with key benefits.The release features two: support for diplex-matched antennas and faster workflow. The original headline mentions only the first, I added the second.
Clarify modifiers. A phrase like “diplex matched antennas” is ambiguous. Does “matched” modify “diplex” or “antennas”? The domain is unfamiliar to me, but I suspected it should be “diplex-matched” and a web search confirmed that hunch.
Omit needless words.The idea of faster workflow appears in the original first paragraph as “new efficiencies aimed at streamlining antenna design workflows and shortening design cycles.” That’s a long, complicated, yet vague way of saying “enables designers to work faster.”
* [McK Insights: Why digital trust truly matters, and what it means for your bottom line](https://www.linkedin.com/posts/dr-carsten-st%C3%B6cker-1145871_mck-why-digital-trust-truly-matters-activity-6976042326783619072-uSIz/)Dr. Carsten Stöcker
The results of our survey of more than 1,300 business leaders and 3,000 consumers globally suggest that establishing trust in products and experiences that leverage AI, digital technologies, and data not only meets consumer expectations but also could promote growth.
* [Instagram “slide show” about SSI Market Potential](https://www.instagram.com/p/CikfpR3PmbO/?igshid=NmNmNjAwNzg%3D)mehdicherifm
> Decentralized Identity has gone international! In this week’s GIMS, we’ll talk about some of the most exciting projects and some of the lessons learned from around the globe.
* [Decentralized Identity Market See Huge Growth for New Normal - Microsoft, Accenture, Persistent](https://www.digitaljournal.com/pr/decentralized-identity-market-see-huge-growth-for-new-normal-microsoft-accenture-persistent) 2022-06-10Digital Journal
> - Global Economic Impact on Industry
> - Global Market Competition by Manufacturers
> - Global Production, Revenue (Value) by Region
> - Global Supply (Production), Consumption, Export, Import by Regions
> - Global Production, Revenue (Value), Price Trend by Type
> - Global Market Analysis by Application
> - Manufacturing Cost Analysis
> - Industrial Chain, Sourcing Strategy and Downstream Buyers
* [What will we learn from the Market Failure of Digital Identity?](https://lockstep.com.au/wp-content/uploads/2022/07/Steve-Wilson-Identiverse-2022-Market-Failure-0.6-HANDOUTS.pdf) 2022-07Stephen Wilson
> The common law system countries (AU, CA, NZ, UK & US) left the market to work out identity, and the market “decided” that there’s no need for IdPs. Let us respect that decision. The market has been trying to tell us for over a decade: IDENTITY IS NOT FOR SALE!
> For decades, all TV signals were “over the air,” and free to be watched by anyone with a TV and an antenna.
* [Multi-Cloud orchestration makes identity work](https://idramp.com/multi-cloud-orchestration-makes-identity-work/) 2022-07-19IDRamp
> It’s called decentralized identity orchestration and brings with it uniform security controls and functionality to your applications, services, and clouds. And built using open source and open standards, it establishes vendor neutrality, provides superior agility for continuous digital transformation, and propels digital business forward.
* [Top 8 Identity Challenges After an Merger and Acquisition](https://www.radiantlogic.com/blog/top-8-identity-challenges-after-an-ma/) 2022-06-20RadiantLogic
> If you’re on the IT team, your headaches are just beginning as you’ll be responsible for integrating the new employees into your current tech and identity stack. You’ll be faced with multiple identity sources, a new identity governance and administration (IGA) solution to look at, various LDAP and Active Directory (AD) data sources to deal with, and several cloud applications that use various single sign-on (SSO) solutions to federate identity.
> Big things are happening in the digital identity space, here we outline just a few recent articles we think everyone should hear about.
- [Digital ID bill sees action in the House and Senate](https://fcw.com/congress/2022/07/digital-id-bill-sees-action-house-and-senate/374552/%C2%A0)
- [Will EU digital identity drop the unique identifier?](https://www.biometricupdate.com/202207/will-eu-digital-identity-drop-the-unique-identifier%C2%A0)
- [Why digital identity will make or break the Metaverse](https://eandt.theiet.org/content/articles/2022/07/why-digital-identity-will-make-or-break-the-metaverse/%C2%A0)
- [Young people at greater risk of falling victim to identity fraud](https://www.digit.fyi/young-people-at-greater-risk-of-falling-victim-to-identity-fraud/%C2%A0)
* [Why plastic cards are a model for verifiable credentials as a service](https://lockstep.com.au/magnetic-stripe-cards-and-verifiable-credentials/) 2022-08-16Lockstep
> The plastic card paradigm has some powerful features which are instructive for the emerging VCs-as-a-service industry.
> - A competitive market of card personalisation bureaus, providing custom production, magnetic stripe encoding, and card distribution and activation, all in commercial bundles which can be purchased by government agencies, banks, professional associations, universities, driver licence bureaus, and so on. On the rear of many plastic cards, the card manufacturer is indicated in fine print. It may well be that the same manufacturer produced your credit cards and government cards.
* [How to rewrite a press release: a step-by-step guide](https://blog.jonudell.net/2022/08/13/how-to-rewrite-a-press-release-a-step-by-step-guide/) 2022-08-13Jon Udell
> Lead with key benefits.The release features two: support for diplex-matched antennas and faster workflow. The original headline mentions only the first, I added the second.
>
> Clarify modifiers. A phrase like “diplex matched antennas” is ambiguous. Does “matched” modify “diplex” or “antennas”? The domain is unfamiliar to me, but I suspected it should be “diplex-matched” and a web search confirmed that hunch.
>
> Omit needless words.The idea of faster workflow appears in the original first paragraph as “new efficiencies aimed at streamlining antenna design workflows and shortening design cycles.” That’s a long, complicated, yet vague way of saying “enables designers to work faster.”
* [McK Insights: Why digital trust truly matters, and what it means for your bottom line](https://www.linkedin.com/posts/dr-carsten-st%C3%B6cker-1145871_mck-why-digital-trust-truly-matters-activity-6976042326783619072-uSIz/)2022-09-15 Dr. Carsten Stöcker
> The results of our survey of more than 1,300 business leaders and 3,000 consumers globally suggest that establishing trust in products and experiences that leverage AI, digital technologies, and data not only meets consumer expectations but also could promote growth.
* [Writing for Verifiable Credentials Marketing Workshop](https://indicio.tech/product/writing-for-verifiable-credentials-marketing-workshop/)Indicio
An Interactive workshop designed to uncover the winning strategies, and pitfalls to avoid, when communicating decentralized identity to customers, internal stakeholders, and the world.
## Enterprise
* [Decentralized identity: The key to the digital era?](https://venturebeat.com/2020/10/28/decentralized-identity-the-key-to-the-digital-era/) 2020-10-28
> An Interactive workshop designed to uncover the winning strategies, and pitfalls to avoid, when communicating decentralized identity to customers, internal stakeholders, and the world.
* [Decentralized identity: The key to the digital era?](https://venturebeat.com/2020/10/28/decentralized-identity-the-key-to-the-digital-era/) 2020-10-28 Venture Beat
> They quote [Forrester](https://www.forrester.com/report/New+Tech+Decentralized+Digital+Identity+DDID+Q1+2020/-/E-RES147115) “*Today’s digital identity frameworks are centralized, suffer from a lack of trust, aren’t portable, and don’t give consumers control.*”
>
> They touch on a new acronym saying : enterprise-level thinking around next-generation authentication is focused on initiatives such as [SPIFFE](https://spiffe.io/), the Secure Production Identity Framework For Everyone
* Ontology Officially a [Technical Provider for Enterprise Solutions](https://medium.com/ontologynetwork/ontology-is-now-officially-a-technical-provider-for-enterprise-solutions-through-cointelegraph-80db38c45489) through Cointelegraph Consulting
* [Officially a Technical Provider for Enterprise Solutions through Cointelegraph Consulting](https://medium.com/ontologynetwork/ontology-is-now-officially-a-technical-provider-for-enterprise-solutions-through-cointelegraph-80db38c45489) 2020-11-04 Ontology
> Cointelegraph has quietly established itself as a legitimate mediator between established enterprises and blockchain technology providers.
## Funding
* [FYI on National Science Foundation (NSF) Funding Opportunity: Pathways to Enable Open-Source Ecosystems program](https://lists.w3.org/Archives/Public/public-credentials/2022Feb/0142.html)
NSF is introducing a new program called "Pathways to Enable Open-Source Ecosystems" (POSE). The purpose of the program is to harness the power of open-source development for the creation of new technology solutions to problems of national and societal importance. Many NSF-funded research projects result in publicly accessible, modifiable, and distributable open-sourced software, hardware or data platforms that catalyze further innovation.
* [FYI on National Science Foundation (NSF) Funding Opportunity: Pathways to Enable Open-Source Ecosystems program](https://lists.w3.org/Archives/Public/public-credentials/2022Feb/0142.html) 2022-02
> NSF is introducing a new program called "Pathways to Enable Open-Source Ecosystems" (POSE). The purpose of the program is to harness the power of open-source development for the creation of new technology solutions to problems of national and societal importance. Many NSF-funded research projects result in publicly accessible, modifiable, and distributable open-sourced software, hardware or data platforms that catalyze further innovation.
* [Deadline 2023-09-07] [Pathways to Enable Open-Source Ecosystems (POSE)](https://beta.nsf.gov/funding/opportunities/pathways-enable-open-source-ecosystems-pose) National Science Foundation
> Supports the facilitation, creation and growth of open-source ecosystems for the creation of new technology solutions.
* [Comparing X.509 Certificates with SSI](https://www.windley.com/archives/2021/05/comparing_x509_certificates_with_ssi.shtml)Windley
* [Comparing X.509 Certificates with SSI](https://www.windley.com/archives/2021/05/comparing_x509_certificates_with_ssi.shtml) 2021-05 PhilWindley
> X.509 certificates have been around for 40 years and have proven to be a trustworthy means of exchanging data. So, what are the differences between X.509 ceritificates and SSI? And what are the advantages of each?
* [resources] [Getting Started with Self Sovereign Identity SSI](https://damienbod.com/2021/03/29/getting-started-with-self-sovereign-identity-ssi/) 2021-03-29
> The blog is my getting started with Self Sovereign identity. I plan to explore developing solutions using Self Sovereign Identities, the different services and evaluate some of the user cases in the next couple of blogs.
@ -254,3 +254,10 @@ Spruce’s continued mission is to let users control their data across the web,
* [Global ID: Introducing our new ID Wallet](https://medium.com/global-id/future-proof-ep-22-introducing-our-new-id-wallet-5d190fd984b2)FUTURE PROOF
Our biggest product release in some time, our new ID Wallet is a core pillar of our mission to enable anyone to create and own their digital identity. We spoke with GlobaliD’s Trey Steinhoff to discuss the launch.
[The State of Digital Identity Wallets – Darrell O’Donnell](https://www.slideshare.net/SSIMeetup/the-state-of-digital-identity-wallets-darrell-odonnell)
>[SSI Meetup](https://ssimeetup.org) is an open, collaborative community to help SSI evangelists around the world, independent of company interests or standards. Our main mission is to help you connect with other SSI enthusiasts and create a dynamic, local, yet globally connected community.
...[Monthly webinars](https://ssimeetup.org/blog/), the [presentations](https://www.slideshare.net/SSIMeetup) and [video](https://www.youtube.com/channel/UCSqSTlKdbbCM1muGOhDa3Og) of which are invaluable resources.
## Other SSI Meetup Pages on Decentralize-id.com
It's not sustainable to keep them all listed on one page, so I've split off all the presentations on Specs and Open Standards. This process will continue as each presentation is given more individual attention.
* [**SSI-Meetup on Open Standards and Implementations**]({{ site.baseurl }}/organizations/ssi-meetup/open-standards/)
- Verifiable Claims, DIDs, DID Auth, DID Resolution, various DID Methods, etc.
* [**SSI-Meetup - Use Cases**]({{ site.baseurl }}/organizations/ssi-meetup/use-cases/) - IOT, Healthcare, Banking, etc.
## Slideshare Presentations
It would be nice to create a page breaking down each of these presentations with supporting links.
[Highlights of Internet Identity Workshop #28 with Drummond Reed](https://www.slideshare.net/SSIMeetup/highlights-of-internet-identity-workshop-28-with-drummond-reed)
[Interpersonal data, identity, and relationships – in pursuit of collective minds – Philip Sheldrake](https://www.slideshare.net/SSIMeetup/interpersonal-data-identity-and-relationships-in-pursuit-of-collective-minds-philip-sheldrake)
[The State of Digital Identity Wallets – Darrell O’Donnell](https://www.slideshare.net/SSIMeetup/the-state-of-digital-identity-wallets-darrell-odonnell)
## Sovereignty in Historical Context - Natalie Smolenski
[Sovereignty in Historical Context for Self-Sovereign Identity - Natalie Smolenski](https://www.slideshare.net/SSIMeetup/sovereignty-in-historical-context-for-selfsovereign-identity-natalie-smolenski)
[Self-Sovereign Identity (SSI) and Open Source - Richard Esplin](https://www.slideshare.net/SSIMeetup/selfsovereign-identity-ssi-and-open-source-richard-esplin)
[Alastria Digital Identity: the Spanish Blockchain solution for SSI - Carlos Pastor](https://www.slideshare.net/SSIMeetup/alastria-digital-identity-the-spanish-blockchain-solution-for-ssi-carlos-pastor)
[Identity and the quest for Self-Sovereign Identity - Daniel Hardman](https://www.slideshare.net/SSIMeetup/identity-and-the-quest-for-selfsovereign-identity-daniel-hardman)
## MyData model from Finland - Antti 'Jogi' Poikola
[Self-Sovereign Identity and the MyData model from Finland - Antti 'Jogi' Poikola](https://www.slideshare.net/SSIMeetup/selfsovereign-identity-and-the-mydata-model-from-finland-antti-jogi-poikola)
[Identity and Privacy: Past, Present, and Digital - Brenda K. Leong](https://www.slideshare.net/SSIMeetup/identity-and-privacy-past-present-and-digital-brenda-k-leong)
[Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare Nelson](https://www.slideshare.net/SSIMeetup/zeroknowledge-proofs-privacypreserving-digital-identity-with-clare-nelson)
## Governance - Trust Frameworks
### Decentralized Governance for SSI - Lawrence Lundy-Bryan
[Decentralized governance for SSI and Blockchains with Lawrence Lundy-Bryan](https://www.slideshare.net/SSIMeetup/decentralized-governance-for-ssi-and-blockchains-with-lawrence-lundybryan)
### PanCanadian Trust Framework for SSI - Tim Bouma
[Overview of the Proposed PanCanadian Trust Framework for SSI - Tim Bouma](https://www.slideshare.net/SSIMeetup/overview-of-the-proposed-pancanadian-trust-framework-for-ssi-tim-bouma)
[Trust Frameworks and SSI: An Interview with CULedger on the Credit Union MyCUID Trust Framework](https://www.slideshare.net/SSIMeetup/trust-frameworks-and-ssi-an-interview-with-culedger-on-the-credit-union-mycuid-trust-framework)
[The impact of the GDPR on Blockchain & SSI – Silvan Jongerius](https://www.slideshare.net/SSIMeetup/the-impact-of-the-gdpr-on-blockchain-ssi-silvan-jongerius)
[Liability under GDPR and the Self Sovereign Identity Model - Elizabeth M. Renieris](https://www.slideshare.net/SSIMeetup/liability-under-gdpr-and-the-self-sovereign-identity-model-elizabeth-m-renierisi)
Blocking a user prevents them from interacting with repositories, such as opening or commenting on pull requests or issues. Learn more about blocking a user.