This commit is contained in:
⧉ infominer 2023-06-18 02:46:11 +05:30
parent 8023d4c51a
commit d9eb398b8a
22 changed files with 91 additions and 528 deletions

View File

@ -47,6 +47,8 @@ published: true
> For this research, PILPG conducted interviews with 15 transitional justice experts and held three focus groups.
* [TAKEAWAYS FROM OUR COMMUNITY CALL ON INTERSECTIONS BETWEEN DATA & DIGITAL RIGHTS AND SOCIAL JUSTICE](https://www.theengineroom.org/takeaways-from-our-community-call-on-intersections-between-data-digital-rights-and-social-justice/) 2022-03-21 The Engine Room
> On February 15, we held a community call to discuss our newly-published [research findings](https://www.theengineroom.org/new-research-community-call-intersectional-approaches-to-data-and-digital-rights-advocacy/) on intersectional collaboration between social justice communities and data and digital rights (DDR) communities. We were joined by speakers Temi Lasade-Anderson from Alaase Lab, Luã Cruz from IDEC, Patronella Nqaba from Atlantic Fellows for Racial Equity and Paromita Shah from Just Futures Law.
* [Universal Declaration of Digital Rights](https://docs.google.com/document/d/1y9C-5TPYmRruRQqJq39-HePk3ypWLDpSAEVzuonOH2Q/edit) 2020-10-21 Johannes Ernst
> all states should recognise and promote universal respect for and observance of both fundamental human and digital rights in physical domain and the digital spaces environment and ensure that these rights are upheld as core elements of a free, open and representative society
## Inclusion
* [Disrupting the Gospel of Tech Solutionism to Build Tech Justice](https://ssir.org/articles/entry/disrupting_the_gospel_of_tech_solutionism_to_build_tech_justice#) 2022-06-16 SSIR
@ -109,6 +111,8 @@ published: true
> The primary objective of the report is to inform humanitarian organizations working with migrants of the opportunities and risks in the use of digital identities in providing services throughout the migrants journeys.
* [Gravitys work with refugees in Turkey featured in latest report from Oxford Centre for Technology and Development, “Digital Identity: An Analysis for the Humanitarian Sector”](https://medium.com/gravity-earth/case-study-gravitys-work-with-refugees-in-turkey-featured-in-latest-oxford-centre-for-technology-ecb515a18464) 2021-05-25 Gravity Earth
> “Gravitys work is selected as a case study here because their solution included close collaboration with four other organizations from the start. It thus offered a rife example of interoperability challenges associated with digital ID systems, as well as how the same systems may be used to overcome existing coordination challenges. Moreover, Gravity has made more documentation of this project publicly available.”
* [Report launch: Identity at the Marginsidentification systems for refugees”](https://medium.com/caribou-digital/report-launch-identity-at-the-margins-identification-systems-for-refugees-69466244fa62) 2018-11-29 Caribou Digital
> For refugees, the current state of humanitarian identity systems presents challenges. Most described having very limited visibility into and agency around the data collected about them by organizations. They were rarely offered the opportunity to exercise control over what data is collected, despite having the capacity and interest to do so. At the same time, many refugees described making active efforts to negotiate the various identities available to them, consciously weighing the benefits and constraints associated with different statuses in order to access services, employment, and to preserve their spatial mobility.
* [Self-Sovereignty for Refugees? The Contested Horizons of Digital Identity](https://www.tandfonline.com/doi/full/10.1080/14650045.2020.1823836) 2020-10-04 Margie Cheesman
> I identify a series of competing logics in the debates around SSIs emancipatory potential, which relate to four issues: (i) the neutrality of the technology, (ii) the capacities of refugees, (iii) global governance and the nation state, and (iv) new economic models for digital identity. SSI is simultaneously the potential enabler of new modes of empowerment, autonomy and data security for refugees and a means of maintaining and extending bureaucratic and commercial power. I situate SSI in a genealogy of systems of identity control and argue that, in practice, it is likely to feed into the powers of corporations and states over refugee populations.

View File

@ -23,6 +23,8 @@ last_modified_at: 2023-06-16
> - The top use cases for healthcare, including “staff passports” and portable health records
* [Accessing Medical Records Anywhere](https://academy.affinidi.com/accessing-medical-records-anywhere-a-use-case-for-verifiable-credentials-81a248f9b746) 2021-04-02 Affinidi
> this workflow doesnt involve any third-party to store your medical data and this also means no worry about medical data storage policies and the laws associated with it. The holder completely owns his or her medical data and stores it exclusively in his or her digital wallet, thereby making it secure and hassle-free.
* [Literature] [Distributed Ledger Technology for eHealth Identity Privacy: State of The Art and Future Perspective](https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7013398/) 2020-01 NLM
> In the decentralized trusted identity model, the identity provider still centralized and performs the users identity proofing based on trusted credentials like passports or driver licenses while uses the DLT to store the identity attestation for later validation by third parties services and trusted organizations as is shown in Figure 1b [46]. The decentralized trusted identity doesnt use the concept of identity repository which is the slight difference from the SSI model, and the identity provider will provide the receiving entity a testimony on the validity of the data while all the credentials are encrypted and stored locally in the user phone.
## Project
* [A Digital Staff Passport for hospital facilities, DIZME voted best solution at SHACK22 hackathon](https://infocert.digital/a-digital-staff-passport-for-the-safe-mobility-of-staff-in-hospital-facilities-dizme-has-been-voted-as-the-best-solution-at-shack22-hackathon/) 2022-07-08 Infocert

View File

@ -10,8 +10,7 @@ tags: ["Travel","IATA","TOIP","TSA","Apple"]
last_modified_at: 2023-06-16
---
## Explainer
## Main
* [Making travelling more seamless and relaxed](https://www.idnow.io/blog/how-digital-identity-improves-passenger-journey/) 2022-09-29 IDNow
> Until now, we relied on physical id document such as ID cards [driving licenses to identify](https://www.idnow.io/mobility/driver-license-verification/) ourselves in the real world as well as online. Digital attributes and credentials were solely used online. Digital identity wallets, like the [IDnow Wallet](https://www.idnow.io/products/identity-wallet/), are about to change that, as they are simultaneously addressing our digital and real-world requirements by bringing physical and digital credentials together.
* [WHY THE TRAVEL INDUSTRY SHOULD CARE ABOUT SSI AND DID](https://www.phocuswire.com/why-travel-should-care-about-self-sovereign-decentralized-id) 2022-09-02 PhocusWire
@ -39,7 +38,9 @@ last_modified_at: 2023-06-16
> TravelScrum Co-founder and Chairman Gene Quinn described self-sovereign ID (SSI) as “a big wave of change thats coming,” and advised that organizations can “ride this wave by swimming at it, greeting it, and rolling gently over it as it heads to shore, or you can be caught in the shore-break and have it consume you later.”
* [Q&A: The Potential of Decentralized ID in Travel](https://www.webintravel.com/qa-the-potential-of-decentralized-digital-id-in-travel/) 2021-08-09 WebInTravel
> Since February he has also been the informal chair of the [Hospitality and Travel Special Interest Group](https://www.notion.so/dif/HOSPITALITY-TRAVEL-SIG-242105321e1747f8bce776bf634a55b3), a subset within the Decentralized Identity Foundation, an organization creating technical specifications and reference implementations for decentralized identity and working with industries for commercial applications of such technologies.
* [WEF The Known Traveller Digital Identity Concept](http://www3.weforum.org/docs/WEF_The_Known_Traveller_Digital_Identity_Concept.pdf) 2018-01
> A paradigm shift towards a Known Traveller Digital Identity concept will radically transform the way in which legitimate travellers are securely and seamlessly facilitated across borders and bring to life the ideas discussed in Digital Borders. The concept focuses on the use of traveller-managed digital identities, which will enable governments, in partnership with industry leaders and passengers, to conduct pre-vetting risk assessment and security procedures to enhance the seamless flow of travellers through borders. Security officials will redirect attention and resources to identifying threats, thus contributing to improved geopolitical security worldwide. The Known Traveller Digital Identity concept provides multiple applications for government and industry, across and beyond the travel and tourism sector, to provide more personalized and value-added services to travellers
## Projects
* [Traveller ID Ecosystem | ProofSpace x RateTiger Integration](https://www.youtube.com/watch?v=ExHEUpl9lKo) 2022-08-31 ProofSpace
> Guests can reclaim, re-use and protect their personal data, the "Traveller ID", within the ecosystem of participating hotels.

View File

@ -47,6 +47,8 @@ last_modified_at: 2023-06-16
> Andy Slavitt, a White House senior adviser for COVID response, specified at a [March 29](https://www.whitehouse.gov/briefing-room/press-briefings/2021/03/29/press-briefing-by-white-house-covid-19-response-team-and-public-health-officials-21/) briefing that “unlike other parts of the world, the government here is not viewing its role as the place to create a passport, nor a place to hold the data of citizens.”
* [Getting Privacy Right with Verifiable Health Credentials](https://www.evernym.com/health-credentials-webinar/) 2021-03-16 Evernym
> Verifiable health credentials have never been more important or more urgently needed. Yet, as an industry, we have a responsibility to ensure that the solutions we deploy today are held to the highest bar and set the right precedent for personal data privacy.
* [Why 2021 is the year for decentralized identity](https://indicio.tech/blog/why-2021-is-the-year-for-decentralized-identity/) 2021-03-09 Indicio
> When it became apparent that Covid-19 would scale to a problem of world historical proportions, speculation immediately turned to its legacy. Pandemics are agents of change, and in our mass adaptation to new challenges, we would quickly discard practices and processes whose rationale for existing conflicted with immediate needs; we would adapt new technologies to wider use; we would innovate.
* [Freedom, Privacy and the Covid Pandemic](https://blokbioscience.com/video/freedom-privacy-covid/) 2021-03-09 BLOK
> Its quite important to outline the difference between #selfsovereignidentity and centralised solutions in the development of #covid #vaccinepassports.
>
@ -108,9 +110,14 @@ last_modified_at: 2023-06-16
* [The evolution of Covid testing peaks with at-home rapid antigen test-and-show capability](https://blog.digi.me/2021/08/20/the-evolution-of-covid-testing-peaks-with-at-home-rapid-antigen-test-and-show-capability/) 2021-08-20 DigiMe
> fixes the pain points of other testing processes especially as infectious and asymptomatic people can test without travelling is cheap, eminently scalable, and can be used as secure proof of Covid health status where needed.
## Report
## Literature
* [Digital Identity in response to COVID-19: DGX Digital Identity Working Group](https://www.tech.gov.sg/files/media/corporate-publications/FY2021/dgx_2021_digital_identity_in_response_to_covid-19.pdf) 2022-01-24
> DIWG member countries each have relevant policies and/or legislation which cover their respective approaches towards digital identity, captured through policy, legislative and trust frameworks governing the digital identity systems. For most, trust frameworks and digital identity systems were implemented using existing government policies and legislation as a foundation, for example existing privacy legislation, and broadly align to ISO standards (as defined by the International Organisation for Standardisation), European Union (EU) standards (as defined through the eIDAS regulation) or industry best practice. A similar model was found for technical settings across digital identity systems
* [Blockchain Identity Management Market by End-user, Application, and Geography - Forecast and Analysis 2021-2025](https://www.technavio.com/report/blockchain-identity-management-market-industry-analysis) 2021-07
> This blockchain identity management market research report provides valuable insights on the post COVID-19 impact on the market, which will help companies evaluate their business approaches. Furthermore, this report extensively covers blockchain identity management market segmentations by end-user (BFSI, government, healthcare, and others), application (end-point, network, and infrastructure), and geography (North America, Europe, APAC, South America, and MEA). The blockchain identity management market report also offers information on several market vendors, including Accenture Plc, Amazon.com Inc., Bitfury Group Ltd., BLOCKCHAINS LLC, Broadcom Inc., Civic Technologies Inc., International Business Machines Corp., Oracle Corp., SAP SE, and SecureKey Technologies Inc. among others.
* [Disposable Yet Official Identities (DYOI)](https://zenodo.org/record/4016977#.X4NIjy2ZMWq) 2020-09-06 Petros Kavassalis, Nikos Triantafyllou, Panagiotis Georgakopoulos, Antonis Stasis, Rob van Kranenburg
> for Privacy-Preserving System Design - The case of COVID-19 digital document verification and credential-based access control in ad hoc outdoor and indoor settings (and beyond)
> In this paper we report on the design of a service system to endow next-generation COVID-19 mobile applications with the capacity: a) to instantly manage and verify a wide range of possible COVID-19 digital documents (circulation attestations, work or travel permits based on approved COVID-19 tests, vaccination certificates, etc.) and, b) to provide credential-based access control, especially in cases where the Verifier is not a web entity but a human agent with a smartphone, or an IoT device -- mainly in ad hoc outdoor and indoor settings. The system has been designed as a response to the specific needs of a health emergency situation, but it may have a broader application in different cased and areas of control (such as airport and train stations checking points and board controls), where the verification process must exclude the possibility of a physical interaction between the controller and the subject of control, by maintaining a “safe distance” between them and while preserving a certain privacy for the subject of control. Our approach levers the potential of Disposable Identities, Self-Sovereign Identities technologies and Verifiable Credentials (VCs) to enable digital document verification and credential-based access control in ad hoc outdoor and indoor settings (and beyond). Towards this, we specifically introduce the concept of “Derivative” (i.e., transcoded/contextual) Verifiable Credentials. A Derivative VC is a derived bond contract guaranteeing the validity and ownership over the underlying contracts (VCs) whose: a) usability is restricted in a very specific context (that of the “local” and time-limited interaction between a Subject and a Service Provider) and, b) linking table points only to a specific “Pairwise DID”.
## User Experience

View File

@ -31,6 +31,10 @@ toc: false
* [Blockchain Identity Success Factors and Challenges](https://www.kuppingercole.com/blog/kuppinger/blockchain-identity-success-factors-and-challenges) 2018-05-16 Martin Kuppinger
> When new things arrive, which are still in the pioneering stage and far from reaching maturity, there is always a lot of discussion. This is even more true for Blockchain Identity, where the massive hype around Blockchains, a long history of clever ideas failing, and a few interesting technical and security challenges come together. During my keynote at this years EIC, I addressed the challenges and success factors for Blockchain ID as well. That led to a discussion on Twitter about whether some of these success factors are contradictory.
![](https://i.imgur.com/bMbh6N7.png)
* [Is putting hashed PII on any immutable ledger(blockchain) is a bad Idea](https://identitywoman.net/putting-hashed-pii-immutable-ledgerblockchain-bad-idea/) 2018-02-03 Identity Woman
> I decided to open a thread On Twitter for ID & security professionals to share why (/if) putting hashed PII on any immutable ledger(blockchain) is a bad Idea.\
> Not everyone agreed that it was bad if certain things were done right.\
> There were 15 direct responses and then a whole lot of subthreads.
* [Blockchain-Anchored Identity A Gateway to Decentralized Apps and Services](https://www.youtube.com/watch?v=hUYpvI43bHA) 2017-05-10 Daniel Buchner
> Blockchains possess unique properties that can be used to build systems that significantly impact our world. Perhaps no area of utilization, besides raw value exchange, is as intriguing as decentralized identity. In this talk we will discuss how blockchain-anchored decentralized identity can be used as a substrate for secure, user-centric apps and services.
* [Towards Self-Sovereign Identity using Blockchain Technology](https://essay.utwente.nl/71274/1/Baars_MA_BMS.pdf) 2016-10-26

View File

@ -29,7 +29,8 @@ last_modified_at: 2023-06-10
> Some 70 percent of Canadians would adopt digital identity and think the government should join forces with the private sector to implement a Digital ID framework for better access to government benefits, healthcare, e-commerce, and financial services, [found](https://diacc.ca/2019/10/15/canadians-are-ready-to-embrace-digital-identity/) a survey conducted by non-profit Digital ID and Authentication Council of Canada (DIACC).
* [Directive on Identity Management — 10 Years Later](https://medium.com/@trbouma/directive-on-identity-management-10-years-later-9463fbb835f3) 2019-06-04
> On July 1st, 2019 the new [Treasury Board Directive on Identity Management](https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=16577) (DIDM) went into effect, 10 years to the day when it was first issued under the revised Policy on Government Security back on July 1, 2009. The directive is issued under the new [Policy on Government Security](https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=16578) (PGS) and the [Directive on Security Management](https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=32611) (DSM).
* [White Paper: Canadas Digital ID Future - A Federated Approach](https://www.cba.ca/embracing-digital-id-in-canada) 2018-05-20 CBA
> Countries around the world are crossing the electronic frontier and exploring the benefits of integrating digital identity systems. With the growing number of Canadians accessing services and businesses online and the increased usage of mobile phones, Canada is in a position to move forward with a more robust digital identity system. In this brief, we highlight why Canada needs a digital identity system, how other countries have made progress in this area and the lessons we can learn from those experiences to build a system in Canada.
## Regional

View File

@ -40,11 +40,12 @@ last_modified_at: 2023-06-08
> The EU Commission did reflect on the effectiveness of the regulation in its [Impact Assessment](https://op.europa.eu/en/publication-detail/-/publication/35274ac3-cd1b-11ea-adf7-01aa75ed71a1), and is developing a revision of it. There are multiple revision options being discussed, but thus far, the preferred option would establish a framework that provides citizens with optional use of a personal digital wallet
* [Analyst Chat #134: How Self-Sovereign Identities Will Influence Public Services](https://www.kuppingercole.com/watch/self-sovereign-identities-public-services) 2022-07-25 KuppingerCole
> Europe is on a "Path to a Digital Decade", which envisions 80% of EU citizens using a digital ID card by 2030. A part of that journey will be self-sovereign identities. Research Analyst Alejandro Leal joins Matthias to continue their discussion on the digital transformation in public services. Self-sovereign identities, the new eIDAS regulation, and the impact of both on how interactions between citizens and the state will change, are a controversial topic in the public discussion as well.
* [Digital Identity: Leveraging the SSI Concept to Build Trust](https://www.enisa.europa.eu/publications/digital-identity-leveraging-the-ssi-concept-to-build-trust) 2022-01-20 ENISA
> This report explores the potential of self-sovereign identity (SSI) technologies to ensure secure electronic identification and authentication to access cross-border online services offered by Member States under the eIDAS Regulation. It critically assesses the current literature and reports on the current technological landscape of SSI and existing eID solutions, as well as the standards, communities, and pilot projects that are presently developing in support of these solutions.
* [eIDAS and Self-Sovereign Identity](https://www.thedinglegroup.com/blog/2021/3/11/eidas-and-self-sovereign-identity) 2021-03-11 ([Video](https://vimeo.com/522501200) Dingle Group
> Why then is eIDAS v1 not seen as a success? There are many reasons; from parts of the regulation that focused or constrained its use into the public sphere only, to the lack of total coverage across all of the EU. Likely the key missing piece was that the cultural climate was not yet ripe and the state of digital identity was really not ready. Too many technical problems were yet to be solved. Without these elements the realized state of eIDAS should not be unexpected. All this said, eIDAS v1 laid very important groundwork and created an environment to gather important learnings to allow eIDAS v2 to realize the hoped for levels of success and adoption.
## eIDAS Bridge
* [About SSI eIDAS Bridge](https://joinup.ec.europa.eu/collection/ssi-eidas-bridge/about) 2022-02-22
> By sharing Verifiable Credentials, users can prove claims about themselves, but how can the credentials verifier trust them, if the only thing it knows about the issuer is its DID? This is indeed the goal of this project and where the eIDAS regulation can help. eIDAS stands for electronic identification and trust services for electronic transactions in the internal market. It ensures legal validity of electronic documents and cross border trust services, such as electronic signatures and seals. To make eIDAS available as a trust framework in the SSI ecosystem, the European Commission developed under this project, the eIDAS bridge.
* [Time for the eIDAS bridge](http://validatedid.com/post-en/the-time-for-the-eidas-bridge) 2022-02-18 ValidatedID
@ -54,9 +55,7 @@ last_modified_at: 2023-06-08
* [Introducing the SSI eIDAS Legal Report](https://ssimeetup.org/introducing-ssi-eidas-legal-report-ignacio-alamillo-webinar-55/) 2020-05-01 Ignacio Alamillo, SSIMeetup
> The European Commission developed the [SSI (Self-Sovereign Identity) eIDAS bridge](https://joinup.ec.europa.eu/collection/ssi-eidas-bridge), an ISA2 funded initiative, to promote eIDAS as a trust framework for the SSI ecosystem. It assists a VC (Verifiable Credential) issuer in the signing process, and helps the verifier to automate the identification of the organization behind the issuers DID (Decentralized Identifier)
## eIDAS 2.0
- [eIDAS 2.0 - Introduction to The European Digital Identity Wallet & The Evolution of Self-Sovereign Identity](https://utimaco.com/current-topics/blog/eidas-2-the-european-digital-identity-wallet) 2022-08-18
> Until now, the [eIDAS regulation](https://www.legislation.gov.uk/eur/2014/910/contents) has only focused on online identification. However, the new proposal eIDAS 2.0 aims to extend identity to the world of physical services which can be accessed from anywhere around the globe.
* [EIDAS 2.0 Turns To Self-Sovereign Identification To Bring Users Ownership And Control](https://www.forbes.com/sites/alastairjohnson/2022/07/05/eidas-20-turns-to-self-sovereign-identification-to-bring-users-ownership-and-control/?sh=853aa7f7f07e) 2022-07-05 Forbes

View File

@ -25,7 +25,7 @@ toc: false
> The initial offer from the city of Zug, which is expected to be available on eZug from autumn 2020, is based on today's demand on the city's website and in a first phase includes services of the residents' registration office and the debt collection office. Paid offers can be paid for directly in the eZug app. Encrypted documents such as a debt collection extract, a confirmation of residence or a home ID are sent directly to the app and can only be viewed by the addressee. All online services that are offered via the eZug app are still offline, i.e. available on paper or at the counters of the city of Zug.
>
> The pilot project with the digital, blockchain-based ID is now complete. However, blockchain technology still has great potential. Future applications, for example in connection with voting, should remain possible. Therefore, the blockchain verification also exists in the product backlog of the eZug solution so that such applications can also be implemented with the new solution.
* [Pilot, Ethereum] [Zug Digital ID: Blockchain Case Study for Government Issued Identity](https://consensys.net/blockchain-use-cases/government-and-the-public-sector/zug/) 2020-01-10
* [Ethereum] [Zug Digital ID: Blockchain Case Study for Government Issued Identity](https://consensys.net/blockchain-use-cases/government-and-the-public-sector/zug/) 2020-01-10
> Zug leveraged uPort, a decentralized identity platform to create the worlds first live implementation of a self-sovereign government-issued identity project on the Ethereum blockchain, along with the city of Zug, the Institute for Financial Services Zug (IFZ) of the Lucerne University, along with integrator TI&M for the platform and Luxoft to implement voting. In the summer of 2017, they launched a pilot program to register resident IDs on the public Ethereum blockchain. After the pilot program, Zug officially launched the program in November 2017.
* [AirBie “Crypto-E-Bikes” have been used more than 1500 times so far.](http://web.archive.org/web/20230403154136/https://airbie.io/en/2019/07/15/airbie-crypto-e-bikes-have-been-used-more-than-1500-times-so-far/) 2019-07-15
> The city of Zug has issued about 300 electronic IDs so far. Anyone who has such a blockchain-based E-ID has been able to borrow e-bikes since last November. The basis for this is a platform launched by the city of Zug in collaboration with the Zurich start-up AirBie. “Crypto-Bike-Sharing” is the name of the pilot project. According to Martin Gabriel, Project Manager IT of the City of Zug, the aim is to offer a service for the E-ID.

View File

@ -76,7 +76,7 @@ last_modified_at: 2023-06-09
> This section contains the documents generated as technical specification for the ESSIF Use Case. These documents act as the base for the architecture definition for ESSIF V1.
>
> The content of this documents should be taken as high-level technical documents, and conceptual technical documents. The content of these documents will be updated as long as the use case implementation evolves.
* [ESSIF: The European self-sovereign identity framework](https://medium.com/@SSI_Ambassador/essif-the-european-self-sovereign-identity-framework-4572f6875e12) 2020-02-03
* [ESSIF: The European self-sovereign identity framework](https://medium.com/@SSI_Ambassador/essif-the-european-self-sovereign-identity-framework-4572f6875e12) 2020-02-03 SSI Ambassador
> The European self-sovereign identity framework (ESSIF) is part of the European blockchain service infrastructure (EBSI). The EBSI is a joint initiative from the European Commission and the European Blockchain Partnership (EBP) to deliver EU-wide cross-border public services using blockchain technology.
>
> The EBSI aims to become a “gold standard” digital infrastructure to support the launch and operation of EU-wide cross-border public services. It is a multi-blockchain network with multiple use-cases such as notarization of documents, ESSIF, certification of diplomas and trusted data sharing. While there is an EBSI wallet, its for test purposes only and not for the public. The consensus of the permissioned network will be achieved via proof of authority (POA) with one note per member state.

View File

@ -7,69 +7,45 @@ excerpt: A selection of DID related literature and top level resources for disco
header:
image: /images/literature-christian-wiediger-unsplash.webp
categories: ["Literature"]
tags: ["DPKI","Literature","RWoT","Self Sovereign Identity","WEF","ID2020","Verifiable Credentials","XDI","uPort","Zug","Accenture","DKMS","Danube Tech"]
tags: ["Literature"]
redirect_from: literature
permalink: literature/
canonical_url: 'https://decentralized-id.com/literature'
last_modified_at: 2019-07-11
last_modified_at: 2023-06-18
---
* [Security without Identification: Transaction Systems to make Big Brother Obsolete](https://www.cs.ru.nl/~jhh/pub/secsem/chaum1985bigbrother.pdf) - David Chaum 1985
* [Establishing Identity Without Certification Authorities](https://irl.cs.ucla.edu/~yingdi/pub/papers/Ellison-OldFriend-USENIX-Security-1996.pdf)
* [A First Look at Identity Management Schemes on the Blockchain](https://arxiv.org/pdf/1801.03294.pdf)
* [ChainAnchor — Anonymous Identities for Permissioned Blokchains](https://web.archive.org/web/20160505115341/http://connection.mit.edu/wp-content/uploads/sites/29/2014/12/Anonymous-Identities-for-Permissioned-Blockchains2.pdf)
* [Decentralizing Privacy: Using Blockchain to Protect Personal Data](http://web.media.mit.edu/~guyzys/data/ZNP15.pdf)
* [Towards Self-Sovereign Identity using Blockchain Technology](https://essay.utwente.nl/71274/1/Baars_MA_BMS.pdf)
* [Self-sovereign Identity Opportunities and Challenges for the Digital Revolution](https://arxiv.org/pdf/1712.01767.pdf)
* [The Knowledge Complexity Of Interactive Proofs](http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.419.8132&)
* [A Conceptual Analysis on Sovrin](https://www.researchgate.net/publication/323144927_A_Conceptual_Analysis_on_Sovrin)
* [Blockchain for Identity Management](https://www.cs.bgu.ac.il/~frankel/TechnicalReports/2016/16-02.pdf) - Details early efforts towards Blockchain-ID
* [Matching Identity Management Solutions to Self Sovereign Identity Solutions](https://www.slideshare.net/TommyKoens/matching-identity-management-solutions-to-selfsovereign-identity-principles)
* [OIX White Paper: Trust Frameworks for Identity Systems](https://www.oixnet.org/news-whitepaper/)
* [WEF The Known Traveller Digital Identity Concept](http://www3.weforum.org/docs/WEF_The_Known_Traveller_Digital_Identity_Concept.pdf)
* [Analysis and Evaluation of Blockchain-based Self-Sovereign Identity Systems](https://wwwmatthes.in.tum.de/pages/hhh5oin2o5sw/Master-s-Thesis-Martin-Schaeffner)
## Papers
* [Analysis and Evaluation of Blockchain-based Self-Sovereign Identity Systems](https://wwwmatthes.in.tum.de/pages/hhh5oin2o5sw/Master-s-Thesis-Martin-Schaeffner) 2019-11-19 Martin Schaeffner
> The components of SSI will be described in detail, evaluated, and visualized in a components architecture. These include standards like decentralized identifiers (DIDs), verifiable credentials (VCs), and verifiable presentations (VPs). Further, the concepts of a decentralized public key infrastructure (DPKI) and a decentralized key management system (DKMS) are introduced. Additionally, this thesis deals in detail with the trust infrastructure of SSI.
>
> Additionally, this thesis focuses on SSI systems and their underlying DID methods. To provide an overview of existing identity systems, the SSI ecosystem is analyzed on its currently existing DID methods. Based on the presented DID methods, representative DID methods are selected and examined for further analysis and evaluation of the system. To analyze the DID methods and their systems, criteria are defined to emphasize the differences of each DID method. The results from the analysis are then used for evaluating the DID methods.
* [Distributed Ledger Technology for eHealth Identity Privacy: State of The Art and Future Perspective](https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7013398/)
> In the decentralized trusted identity model, the identity provider still centralized and performs the users identity proofing based on trusted credentials like passports or driver licenses while uses the DLT to store the identity attestation for later validation by third parties services and trusted organizations as is shown in Figure 1b [46]. The decentralized trusted identity doesnt use the concept of identity repository which is the slight difference from the SSI model, and the identity provider will provide the receiving entity a testimony on the validity of the data while all the credentials are encrypted and stored locally in the user phone.
* [A Decentralized Digital Identity Architecture](https://www.frontiersin.org/articles/10.3389/fbloc.2019.00017/full) 2019-11-05 Geoff Goodell, Tomaso Aste
> Although this article shall focus on challenges related to identity systems for adult persons in the developed world, we argue that the considerations around data protection and personal data that are applicable in the humanitarian context, such as those elaborated by the International Committee of the Red Cross (Kuner and Marelli, 2017; Stevens et al., 2018), also apply to the general case. We specifically consider the increasingly commonplace application of identity systems “to facilitate targeting, profiling and surveillance” by “binding us to our recorded characteristics and behaviors” (Privacy International, 2019). Although we focus primarily upon the application of systems for digital credentials to citizens of relatively wealthy societies, we hope that our proposed architecture might contribute to the identity zeitgeist in contexts such as humanitarian aid, disaster relief, refugee migration, and the special interests of children as well.
* [Matching Identity Management Solutions to Self Sovereign Identity Solutions](https://www.linkedin.com/pulse/matching-identity-management-solutions-self-sovereign-tommy-koens) 2018-05-01 Tommy Koens
> We created an analysis of nearly 50 (blockchain based) digital identity management solutions, and matched these against Self Sovereign Identity (SSI) management principles and additional requirements. The document can be found here: [https://www.slideshare.net/secret/uafcwzQQWH86SW](https://www.slideshare.net/TommyKoens/matching-identity-management-solutions-to-selfsovereign-identity-principles)
* [A First Look at Identity Management Schemes on the Blockchain](https://arxiv.org/pdf/1801.03294.pdf) 2018-01-10 Paul Dunphy, Fabien A. P. Petitcolas
> The emergence of distributed ledger technology (DLT) based upon a blockchain data structure, has given rise to new approaches to identity management that aim to upend dominant approaches to providing and consuming digital identities. These new approaches to identity management (IdM) propose to enhance decentralisation, transparency and user control in transactions that involve identity information; but, given the historical challenge to design IdM, can these new DLTbased schemes deliver on their lofty goals? We introduce the emerging landscape of DLT-based IdM, and evaluate three representative proposals uPort, ShoCard and Sovrin using the analytic lens of a seminal framework that characterises the nature of successful IdM schemes
* [Self-sovereign Identity Opportunities and Challenges for the Digital Revolution](https://arxiv.org/pdf/1712.01767.pdf) 2017-12-05 Uwe Der, Stefan Jähnichen, Jan Sürmeli
> The interconnectedness of people, services and devices is a defining aspect of the digital revolution, and, secure digital identities are an important prerequisite for secure and legally compliant information exchange. Existing approaches to realize a secure identity management focus on central providers of identities such as national authorities or online service providers. Hence, changing residence or service provider often means to start over and creating new identities, because procedures for data portability are missing. Self-sovereign digital identities are instead created and managed by individuals, and enable them to maintain their digital identities independent from residence, national eID infrastructure and market-dominating service providers.
* [IDENTITY MATTERS - A primer paper on the rise and relevance of Self-Sovereign Identity.](https://cboxxtest.files.wordpress.com/2017/09/cboxxidentitymatters04.pdf) 2017-09
> This list of 13 interesting projects / startups in the Self Sovereign Identity field should be treated as a starting point as of September 2017; it will be out of date when you read it ...
* [Blockchain for Identity Management](https://www.cs.bgu.ac.il/~frankel/TechnicalReports/2016/16-02.pdf) 2016-12-11 Ori Jacobovitz
> In this paper, I discusses the state of the art in Blockchain technology and its applications, focusing on applications and solutions in identity management
* [Towards Self-Sovereign Identity using Blockchain Technology](https://essay.utwente.nl/71274/1/Baars_MA_BMS.pdf) 2016-10-26 Djuri Baars, Rabobank
> A case study has been performed on a solution which allows the exchange of KYC attributes, resulting from thorough Customer Due Diligence (CDD) as is often performed when opening a bank account. These attributes can be used by other entities, like insurance companies and mortgage lenders to make their on-boarding process easier for customers, since they dont need to supply copies of the same documentation all over again. Also, the companies themselves could outsource their Customer Due Diligence (CDD) this way to lower costs and make fewer errors. Although the idea is very interesting, the studied solution did not meet the expectations. At the time the company behind the solution was very small and the process to improve very complex. The solution was also proprietary, creating dependence on the vendor, which heightens the adoption barrier
* [Decentralizing Privacy: Using Blockchain to Protect Personal Data](http://web.media.mit.edu/~guyzys/data/ZNP15.pdf) 2015-03-02
> Personal data, and sensitive data in general, should not be trusted in the hands of third-parties, where they are susceptible to attacks and misuse. Instead, users should own and control their data without compromising security or limiting companies and authorities ability to provide personalized services. Our platform enables this by combining a blockchain, re-purposed as an access-control moderator, with an off-blockchain storage solution. Users are not required to trust any third-party and are always aware of the data that is being collected about them and how it is used. In addition, the blockchain recognizes the users as the owners of their personal data. Companies, in turn, can focus on utilizing data without being overly concerned about properly securing and compartmentalizing them.
* [Establishing Identity Without Certification Authorities](https://www.usenix.org/conference/6th-usenix-security-symposium/establishing-identity-without-certification-authorities) 1996
> There are many methods for establishing identity without using certificates from trusted certification authorities. The relationship between verifier and subject guides the choice of method. Many of these relationships have easy, straight-forward methods for binding a public key to an identity, using a broadcast channel or 1:1 meetings, but one relationship makes it especially difficult. That relationship is one with an old friend with whom you had lost touch but who appears now to be available on the net. You make contact and share a few exchanges which suggest to you that this is, indeed, your old friend. Then you want to form a secure channel in order to carry on a more extensive conversation in private. This case is subject to the man-in-the-middle attack. For this case, a protocol is presented which binds a pair of identities to a pair of public keys without using any certificates issued by a trusted CA.
* [Security without Identification: Transaction Systems to make Big Brother Obsolete](https://www.cs.ru.nl/~jhh/pub/secsem/chaum1985bigbrother.pdf) 1985 David Chaum
> With the new approach, an individual uses a different account number or “digital pseudonym” with each organization. Individuals will create all such pseudonyms by a special random process. Information further identifying the individual is not used. A purchase at a shop, for example, might be made under a one-time-use pseudonym; for a series of transactions comprising an ongoing relationship, such as a bank account, a single pseudonym could be used repeatedly. Although the pseudonyms cannot be linked, organizations will be able to ensure that the pseudonyms are not used improperly by such measures as limiting individuals to one pseudonym per organization and ensuring that individuals are held accountable for abuses created under any of their pseudonyms. Individuals will be able to authenticate ownership of their pseudonyms and use them while ensuring that they are not improperly used by others.
* [The Knowledge Complexity Of Interactive Proofs](https://dl.acm.org/doi/10.1145/22145.22178) 1985 Shafi Goldwasser, Silvio Micali, and Charles Rackoff
> In this paper a computational complexity theory of the “knowledge” contained in a proof is developed. Zero-knowledge proofs are defined as those proofs that convey no additional knowledge other than the correctness of the proposition in question. Examples of zero-knowledge proof systems are given for the languages of quadratic residuosity and 'quadratic nonresiduosity. These are the first examples of zero-knowledge proofs for languages not known to be efficiently recognizable.
## Reports
* [EU BLOCKCHAIN OBSERVATORY AND FORUM — Workshop Report — e-Identity, Brussels, November 7, 2018](https://www.eublockchainforum.eu/sites/default/files/reports/workshop_5_report_-_e-identity.pdf)
* [A Comprehensive Evaluation of the Identity Management Utility Sovrin](https://dutchblockchaincoalition.org/uploads/pdf/Blockchain-Sovrin-rapport.pdf)
* [How Blockchain Revolutionizes Identity Management](https://www.accenture-insights.nl/en-us/articles/how-blockchain-will-revolutionize-identity-management)
* [Digital Identity: the current state of affairs](https://www.bbvaresearch.com/wp-content/uploads/2018/02/Digital-Identity_the-current-state-of-affairs.pdf)
* [Blockchain: Evolving Decentralized Identity Design](https://www.gartner.com/doc/3834863/blockchain-evolving-decentralized-identity-design)
* [IDENTITY MATTERS](https://cboxxtest.files.wordpress.com/2017/09/cboxxidentitymatters04.pdf)
* [Accenture: ID2020: DIGITAL IDENTITY with Blockchain and Biometrics](https://www.accenture.com/us-en/insight-blockchain-id2020)
* [Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledge Proofs —slideshare](https://www.slideshare.net/eralcnoslen/privacypreserving-authentication-another-reason-to-care-about-zeroknowledge-proofs)
* [r3- Identity in Depth](https://www.r3.com/wp-content/uploads/2017/06/Identity_indepth_r3.pdf)
* [Global Blockchain Identity Management Market 2018-2022](https://www.technavio.com/report/global-blockchain-identity-management-market-analysis-share-2018)
* [A Comprehensive Guide to Self Sovereign Identity](https://ssiscoop.com/) - by Kaliya ['Identity Woman'](https://twitter.com/IdentityWoman) Young and [Heather Vescent](https://twitter.com/heathervescent) [[**ϟ**](https://www.thepaypers.com/expert-opinion/10-things-you-need-to-know-about-self-sovereign-identity-part-1/774556)]
* [Report launch: Identity at the Marginsidentification systems for refugees”](https://medium.com/caribou-digital/report-launch-identity-at-the-margins-identification-systems-for-refugees-69466244fa62)
* [WEF: Identity in a Digital World A new chapter in the social contract](http://www3.weforum.org/docs/WEF_INSIGHT_REPORT_Digital%20Identity.pdf)
* [The Credential Highway](https://www.newamerica.org/future-property-rights/reports/ssi-credential-highway/) - How Self-Sovereign Identity Unlocks Property Rights for the Bottom Billion
> Why? Because the pieces of evidence that administrative agencies require to register property — things like a survey plan, a notarized will, or a state-issued identity card — may be inaccessible, or may not represent the reality of rights on the ground. As a result, land administration systems end up excluding billions of people.
## Decentralized Public Key Infrastructure DPKI
* RWoT—[Decentralized Public Key Infrastructure](https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust/blob/master/final-documents/dpki.pdf)
* [SCPKI: A Smart Contract-based PKI and Identity System](http://www0.cs.ucl.ac.uk/staff/M.AlBassam/publications/scpki-bcc17.pdf)
* [KeyChains: A Decentralized Public-Key Infrastructure](https://drum.lib.umd.edu/bitstream/handle/1903/3332/0.pdf?sequence=1&isAllowed=y)
* [ClaimChain: Decentralized Public Key Infrastructure](https://www.researchgate.net/publication/318584251_ClaimChain_Decentralized_Public_Key_Infrastructure)
* [A Decentralized Public Key Infrastructure with Identity Retention](https://eprint.iacr.org/2014/803.pdf)
* [Privacy based decentralized Public Key Infrastructure
(PKI) implementation using Smart contract in
Blockchain](https://isrdc.iitb.ac.in/blockchain/workshops/2017-iitb/papers/paper-11%20-%20Decentralized%20PKI%20in%20blockchain%20and%20Smart%20contract.pdf)
## Additional Thought around Identity
* [Is putting hashed PII on any immutable ledger(blockchain) is a bad Idea](https://identitywoman.net/putting-hashed-pii-immutable-ledgerblockchain-bad-idea/)
* [Decentralized Identity Trilemma](http://maciek.blog/decentralized-identity-trilemma/)
>There seems to exist a trilemma in decentralized identity analogous to @Zooko's triangle. None of the existing solutions are at the same time: 1) privacy-preserving, 2) Sybil-resistant 3) self-sovereign -[[**T**](https://twitter.com/MaciekLaskus/status/1031859093072424960)]
* [Maciek Laskus - BLOCKWALKS](https://www.youtube.com/watch?v=KAgJpQfQXxs) (video)
* "I designed an algorithm that mapped out people [working on identity](https://twitter.com/MaciekLaskus/status/1066780557906976768) using Twitter data:" [Identity list](https://docs.google.com/spreadsheets/d/1hBBVA0-jqmRRZ_JFQ8HEck9tFub7crsqRzlBZWf01xg/edit?usp=sharing)
* [Proof of Thought (PoT)](https://bitcointalk.org/index.php?topic=4459113.0)
* [Queer Privacy](https://leanpub.com/queerprivacy)
>Stories about using the Internet as a tool to find out more about yourself, and as a tool to express and empower; about the dangers of Internet censorship and about the practical realities of maintaining multiple distinct digital identities.
* [@SarahJamieLewis Twitter thread on Identity](https://twitter.com/SarahJamieLewis/status/1041043532654542848)
>Any technology which relies on the existence of, or attempts to create a, global, unique identity is oppressive by design. Stop" innovating" oppressive structures.
* [Digital Identity: the current state of affairs](https://www.bbvaresearch.com/wp-content/uploads/2018/02/Digital-Identity_the-current-state-of-affairs.pdf) 2018-02 BBVA Research
> As public identities have been created by different authorities, and since a global public or private identity is not a realistic option in the short term, interoperability and the collaboration between different entities to offer complete solutions is decisive. In the long run, to become a trusted identity provider across different industries could represent a big business opportunity for financial institutions
* [Blockchain: Evolving Decentralized Identity Design](https://www.gartner.com/doc/3834863/blockchain-evolving-decentralized-identity-design) 2017-12-01
> Decentralized identity is evolving into self-sovereign identity networks and verification services. While efforts are underway to establish standards for these ecosystems, technical professionals should identify processes that will be affected and plan for integration scenarios in coming years.
* [A Comprehensive Guide to Self Sovereign Identity](https://www.amazon.com/Comprehensive-Guide-Self-Sovereign-Identity-ebook/dp/B07Q3TXLDP) 2019-04-06 Kaliya Identity Woman Young and Heather Vescent [[Related](https://www.thepaypers.com/expert-opinion/10-things-you-need-to-know-about-self-sovereign-identity-part-1/774556)]
> Self Sovereign Identity technologies give individuals and companies the ability to control and manage their own digital identifiers. This technology is gaining momentum as it solves previously unsolvable challenges. With the emergence of SSI open standards, a new layer of the internet emerges for the identity of people and organizations. SSI represents a new paradigm -- it changes the identity game completely.

View File

@ -89,17 +89,14 @@ Disambiguating between Evernym, Sovrin, and Indy
* [Sovrin and Trust over IP Signed Mutual Agreement to Strengthen Their SSI Collaboration](https://blog.sovrin.org/sovrin-and-trust-over-ip-signed-mutual-agreement-to-strengthen-their-ssi-collaboration-55d7775efdc2)
> “By signing this Letter Agreement, Sovrin and ToIP are excited to take a step further to support the need and importance of our separate but interrelated mandates to benefit people and organizations across all social and economic sectors through secure digital identity ecosystems based on verifiable credentials and SSI,” said Chris Raczkowski, Chairman of Board of Trustees, Sovrin Foundation.
### Research Papers
* [A Conceptual Analysis on Sovrin](https://www.researchgate.net/publication/323144927_A_Conceptual_Analysis_on_Sovrin)
* [Matching Identity Management Solutions to Self Sovereign Identity Solutions](https://www.slideshare.net/TommyKoens/matching-identity-management-solutions-to-selfsovereign-identity-principles)
* [A First Look at Identity Management Schemes on the Blockchain](https://arxiv.org/pdf/1801.03294.pdf)
### Literature
### Reports
* [A Comprehensive Evaluation of the Identity Management Utility Sovrin](https://dutchblockchaincoalition.org/uploads/pdf/Blockchain-Sovrin-rapport.pdf)
* [White Paper: Canadas Digital ID Future - A Federated Approach](https://www.cba.ca/embracing-digital-id-in-canada)
* [IDENTITY MATTERS](https://cboxxtest.files.wordpress.com/2017/09/cboxxidentitymatters04.pdf)
* [A position paper on blockchain enabled identity and the road ahead—Identity Working Group of the German Blockchain Association](https://www.bundesblock.de/wp-content/uploads/2018/10/ssi-paper.pdf)
* [A Comprehensive Evaluation of the Identity Management Utility Sovrin](https://dutchblockchaincoalition.org/assets/images/default/Blockchain-Sovrin-rapport.pdf) 2018-10-16 Dutch Blockchain Coalition
> The Dutch Blockchain Coalition (DBC) considers that reliable identification and authentication are basic conditions for virtually all applications of blockchain[1]. However, currently most identity management solutions are under central governance. Examples can be found in most social media platforms such as Facebook and Google accounts. Additionally, this extends to real world examples, such as a passport or a drivers license provided by government. Although these solutions seem to work in practice, there is an essential issue. Namely, the owner of the identity is not in control of his/her identity. For example, a social media platform may decide to remove an account based on its own policy, leaving the identity owner with a virtual gap in its existence. Additionally, identifiers (such as a passport) provide a lot of -arguably too much- information about the identity holder, even though only a single attribute (e.g. the date of birth) needs to be known. Indeed, identity owners are no longer in control of their identity when using centralized identity management solutions
* [A Conceptual Analysis on Sovrin](https://www.researchgate.net/publication/323144927_A_Conceptual_Analysis_on_Sovrin) 2018-01 Rieks Joosten, TNO
> 'Sovrin' (aka Hyperledger INDY) is a global, decentralized identity network that claims to deliver the Internets missing identity layer, using (public permissioned) distributed ledger technology. In order to find out to what extent the thinking within TNO about a Self-Sovereign Identity Framework aligns with that of Sovrin, a limited conceptual analysis has been performed on the Sovrin documentation that was available in September 2017. The report has findings on terminology and definitions, the legal taxonomy used by Sovrin entities, agents/clients, subject identifiers, guardianship and consent receipts.
* [A First Look at Identity Management Schemes on the Blockchain](https://arxiv.org/pdf/1801.03294.pdf) 2018-01-10 Paul Dunphy, Fabien A. P. Petitcolas
> The emergence of distributed ledger technology (DLT) based upon a blockchain data structure, has given rise to new approaches to identity management that aim to upend dominant approaches to providing and consuming digital identities. These new approaches to identity management (IdM) propose to enhance decentralisation, transparency and user control in transactions that involve identity information; but, given the historical challenge to design IdM, can these new DLTbased schemes deliver on their lofty goals? We introduce the emerging landscape of DLT-based IdM, and evaluate three representative proposals uPort, ShoCard and Sovrin using the analytic lens of a seminal framework that characterises the nature of successful IdM schemes
## [Sovrin Stewards](https://sovrin.org/stewards/)

View File

@ -11,8 +11,17 @@ published: false
> fintechs and regtechs looking for opportunities in the digital identity space should cast their ideas net pretty wide. Digital identities are not only for people and the future desperately needs digital identities for pretty much everything to underpin recognition, relationships and reputation (the 3Rs of the online economy).
* [Impacts from a new reality drive the need for an enhanced digital identity framework](https://bankautomationnews.com/allposts/risk-security/impacts-from-a-new-reality-drive-the-need-for-an-enhanced-digital-identity-framework/) 2022-02-28 Bank Automation News
> While US-based entities are adhering to an enhanced regulatory framework, these mandates are particularly applicable in Europe, where there is necessary compliance with enacted standards (such as the General Data Protection Regulation—commonly known as GDPR—and the Payment Service Providers Directive 2—referred to as PSD2. A clear need for a true and persistent digital identity as a solution to the ancillary—and sometimes unforeseen—challenges that have arisen.
* [The Shape of your Identity](https://stateofidentity.libsyn.com/the-shape-of-your-identity) 2022-03-17 State of Identity Podcast
> How are personal data and digital identity reshaping society? [...] Cameron D'Ambrosi is joined by Michael Becker, CEO of Identity Praxis, to discuss the evolution of the identity industry, the latest trends to follow (or flee), and predictions for the future of both consumer and enterprise digital identity.
* [Is Self-Sovereign Identity Going Exponential?](https://www.youtube.com/watch?v=xWy0rP8uTiU&t=2406s) 2021-10-27 Sybrin [Recap](https://corporate.sybrin.com/webinar-SSI)
> with [Andrew Baker](https://www.linkedin.com/in/andrew-baker-b1357939/), Head of EC2 Engineering at AWS, and [Lohan Spies](https://www.linkedin.com/in/lohanspies/), Chair of the [Sovrin Steward Council](https://sovrin.org/join-the-new-sovrin-steward-council/), they explore the concept of Self-Sovereign Identity (SSI) in detail, discussing what profound implications SSI will have and whether it is indeed the next game changer?
* [Kaliya Young on Identikit with Michelle Dennedy](https://identitywoman.net/podcast-identikit-with-michelle-dennedy/) IdentityWoman
> our latest series examining the evolution of digital identity, and how self-sovereign identity, specifically, can advance a consent-based economy.
* [Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledge Proofs —slideshare](https://www.slideshare.net/eralcnoslen/privacypreserving-authentication-another-reason-to-care-about-zeroknowledge-proofs) 2017-08-14 Clare Nelson
> In the near future, privacy-preserving authentication methods will flood the market, and they will be based on Zero-Knowledge Proofs. IBM and Microsoft invested in these solutions many years ago.
* [Decentralized Identity Trilemma](http://maciek.blog/decentralized-identity-trilemma/)
>There seems to exist a trilemma in decentralized identity analogous to @Zooko's triangle. None of the existing solutions are at the same time: 1) privacy-preserving, 2) Sybil-resistant 3) self-sovereign -[[**T**](https://twitter.com/MaciekLaskus/status/1031859093072424960)]
* [The Architecture of Identity Systems](https://www.windley.com/archives/2020/09/the_architecture_of_identity_systems.shtml) by Phil Windley
> I recently read a paper from Sam Smith, [Key Event Receipt Infrastructure](https://arxiv.org/abs/1907.02143), that provided inspiration for a way to think about and classify identity systems. In particular his terminology was helpful to me. This blog post uses terminology and ideas from Sam's paper to classify and analyze three different identity system architectures. I hope it provides a useful model for thinking about identity online.
* [The SSO Practitioners Introduction to Decentralized Identity](https://www.pingidentity.com/en/resources/blog/post/sso-practitioners-introduction-decentralized-identity.html)

View File

@ -26,6 +26,15 @@ There are more good pictures
> We were joined by Drummond Reed and Alex Preukschat, co-authors of Manning Publication's new book 'Self-Sovereign Identity,' for a conversation on the book's development and recent release and what the future holds for SSI as a technology, architecture, and movement.
* [Personal Identity and the Future of Digital Interactions](https://www.pingidentity.com/en/company/blog/posts/2021/personal-identity-future-digital-interactions.html) Ping Identity
> What if individuals could determine how to share data and with whom? What if that data was always up to date? And what if instead of merely having a unified customer profile in a single company, each person could have one identity experience for all the companies and people they interact with?
* [Why Should You Care about Digital Identity?](https://indicio.tech/market-signals-why-should-you-care-about-digital-identity/) 2022-09-02 Indicio
> We take a look at a few of the best articles on why strong digital identity will be critical as we continue to build on the internet.
* [A Solution Looking for a Problem? Digital ID Solves a Million of  Them](https://www.forbes.com/sites/davidbirch/2022/08/09/solution-looking-for-a-problem-digital-id-solves-a-million-of-them/?sh=4d1d6bb4fd7f) David G.W. Birch, Forbes
> on the importance of verifying specific aspects or traits that people can claim to have, saying that for most people its “not about proving who you are but about proving what you are”
* [Goodbye, physical identities: How organizations can prepare for digital identity challenges](https://www.biometricupdate.com/202208/goodbye-physical-identities-how-organizations-can-prepare-for-digital-identity-challenges) Philipp Pointner, Biometrics Update
> He raises some interesting points about the [increasing number of digital identity wallets](https://www.gartner.com/en/newsroom/press-releases/2022-02-21-govt-tech-trends-2022-press-release) being offered by states and national governments, and how, with the rise in digitalization, there are more opportunities for bad actors to acquire and misuse your information. He leaves us with a few key attributes to look for in a secure digital identity system.
* [Digital Identities Will Change The Nature Of Online Reputation](https://www.forbes.com/sites/alastairjohnson/2022/08/30/digital-identities-will-change-the-nature-of-online-reputation/?sh=bd1f30b584a3) Alastair Johnson, Forbes
> This article highlights how these centralized repositories will become redundant as verifiable credentials put control of data into the hands of the person or entity it belongs to.. Examples cited include medical information or your credit score, both of which are difficult to access, and require validation from a third party.
* [the most important questions](https://werd.io/2021/one-of-the-most-important-questions-turns) Ben Werdmuller
what is the future you want to build?
@ -40,6 +49,8 @@ Just as the World Wide Web empowered people to connect and share knowledge and i
* [The Future Now Problem](https://www.continuumloop.com/the-future-now-problem/) Continuum Loop
When the idea of what is available right NOW is blurred among the ideas of the FUTURE, you cant differentiate between what is feasible TODAY from what is not ready for prime time.
* [On the Trust and Trust Modelling for the Future Fully-Connected Digital World: A Comprehensive Study](https://arxiv.org/pdf/2106.07528.pdf) 2021-06-14 HANNAH LIM JING TING, XIN KANG IEEE
> Under our analysis of trust and the digital world, we define different types of trust relationships and find out the factors that are needed to ensure a fully representative model.Next, to meet the challenges of digital trust modelling, comprehensive trust model evaluation criteria areproposed, and potential securities and privacy issues of trust modelling are analyzed. Finally, we provide awide-ranging analysis of different methodologies, mathematical theories, and how they can be applied totrust modelling
* [The Future: Proving your Identity](https://gdprnow.fireside.fm/30) GDPR Now
> we talk about the future of credential management Self Sovereign Identity (SSI) also known as decentralised identity. SSI is an efficient, secure and privacy enhancing solution for identity verification. It puts individuals at the centre of the verification process and is the future of identity management.

View File

@ -147,3 +147,5 @@ Trust registries also need to be interoperable. The [Trust Over IP Foundation](h
Continuum Loop
The concept behind a Trust Registry is that a Wallet needs to know which decentralized identifiers (DIDs) to “trust” as a source of truth. At many levels, this “trust” translates to “authority” knowing that somebody, centralized or decentralized, is responsible for maintaining a list of trusted DIDs.
* [OIX White Paper: Trust Frameworks for Identity Systems](https://www.oixnet.org/news-whitepaper/)

View File

@ -1,37 +0,0 @@
---
published: false
---
* [Self-Sovereign Identity as a Service: Architecture in Practice](https://arxiv.org/pdf/2205.08314.pdf) Yepeng Ding, Hiroyuki Sato, University of Tokyo
> We propose a practical architecture by elaborating the service concept, SSI, and DLT to implement SSIaaS platforms and SSI services. Besides, we present an architecture for constructing and customizing SSI services with a set of architectural patterns and provide corresponding evaluations. Furthermore, we demonstrate the feasibility of our proposed architecture in practice with Selfid, an SSIaaS platform based on our proposed architecture.
# Literature
* [A Decentralized Digital Identity Architecture](https://www.frontiersin.org/articles/10.3389/fbloc.2019.00017/full) 2019-11-05 Geoff Goodell, Tomaso Aste
> Although this article shall focus on challenges related to identity systems for adult persons in the developed world, we argue that the considerations around data protection and personal data that are applicable in the humanitarian context, such as those elaborated by the International Committee of the Red Cross (Kuner and Marelli, 2017; Stevens et al., 2018), also apply to the general case. We specifically consider the increasingly commonplace application of identity systems “to facilitate targeting, profiling and surveillance” by “binding us to our recorded characteristics and behaviors” (Privacy International, 2019). Although we focus primarily upon the application of systems for digital credentials to citizens of relatively wealthy societies, we hope that our proposed architecture might contribute to the identity zeitgeist in contexts such as humanitarian aid, disaster relief, refugee migration, and the special interests of children as well.
* [Credentials as a Service Providing Self Sovereign Identity as a Cloud Service Using Trusted Execution Environments](https://ieeexplore.ieee.org/document/9610297)
* [Universal Declaration of Digital Rights](https://docs.google.com/document/d/1y9C-5TPYmRruRQqJq39-HePk3ypWLDpSAEVzuonOH2Q/edit) Johannes Ernst
> all states should recognise and promote universal respect for and observance of both fundamental human and digital rights in physical domain and the digital spaces environment and ensure that these rights are upheld as core elements of a free, open and representative society
* [Dave Birch](https://anchor.fm/psatoday/episodes/PSA-Today-21-Kaliya-and-Seth-welcome-Dave-Birch-on-Digital-Financial-Services-and-Smart-Money-el2hp7/a-a57pl5)
> In todays episode, we talk about his new book “Currency Cold War” and relationship, and lack thereof, between digital currency and identity.
* [On the Trust and Trust Modelling for the Future Fully-Connected Digital World: A Comprehensive Study](https://arxiv.org/pdf/2106.07528.pdf)
Under our analysis of trust and the digital world, we define differenttypes of trust relationships and find out the factors that are needed to ensure a fully representative model.Next, to meet the challenges of digital trust modelling, comprehensive trust model evaluation criteria areproposed, and potential securities and privacy issues of trust modelling are analyzed. Finally, we provide awide-ranging analysis of different methodologies, mathematical theories, and how they can be applied totrust modelling
* [Beware of Digital ID attacks: your face can be spoofed!](https://www.enisa.europa.eu/news/enisa-news/beware-of-digital-id-attacks-your-face-can-be-spoofed) ENISA
Digital identification is the focus of two new reports by the European Union Agency for Cybersecurity (ENISA): [an analysis of self-sovereign identity](https://www.enisa.europa.eu/publications/digital-identity-leveraging-the-ssi-concept-to-build-trust/@@download/fullReport) (SSI) and a study of major [face presentation attacks](https://www.enisa.europa.eu/publications/remote-identity-proofing-attacks-countermeasures).
* [Digital Identity: Leveraging the SSI Concept to Build Trust](https://www.enisa.europa.eu/publications/digital-identity-leveraging-the-ssi-concept-to-build-trust)
> This report explores the potential of self-sovereign identity (SSI) technologies to ensure secure electronic identification and authentication to access cross-border online services offered by Member States under the eIDAS Regulation. It critically assesses the current literature and reports on the current technological landscape of SSI and existing eID solutions, as well as the standards, communities, and pilot projects that are presently developing in support of these solutions.
* [Self-Sovereign Identity as a Service: Architecture in Practice](https://arxiv.org/pdf/2205.08314.pdf) Yepeng Ding, Hiroyuki Sato, University of Tokyo
We propose a practical architecture by elaborating the service concept, SSI, and DLT to implement SSIaaS platforms and SSI services. Besides, we present an architecture for constructing and customizing SSI services with a set of architectural patterns and provide corresponding evaluations. Furthermore, we demonstrate the feasibility of our proposed architecture in practice with Selfid, an SSIaaS platform based on our proposed architecture.
## Research Papers
### Disposable Yet Official Identities
* [Disposable Yet Official Identities (DYOI)](https://zenodo.org/record/4016977#.X4NIjy2ZMWq) for Privacy-Preserving System Design - The case of COVID-19 digital document verification and credential-based access control in ad hoc outdoor and indoor settings (and beyond)
> In this paper we report on the design of a service system to endow next-generation COVID-19 mobile applications with the capacity: a) to instantly manage and verify a wide range of possible COVID-19 digital documents (circulation attestations, work or travel permits based on approved COVID-19 tests, vaccination certificates, etc.) and, b) to provide credential-based access control, especially in cases where the Verifier is not a web entity but a human agent with a smartphone, or an IoT device -- mainly in ad hoc outdoor and indoor settings. The system has been designed as a response to the specific needs of a health emergency situation, but it may have a broader application in different cased and areas of control (such as airport and train stations checking points and board controls), where the verification process must exclude the possibility of a physical interaction between the controller and the subject of control, by maintaining a “safe distance” between them and while preserving a certain privacy for the subject of control. Our approach levers the potential of Disposable Identities, Self-Sovereign Identities technologies and Verifiable Credentials (VCs) to enable digital document verification and credential-based access control in ad hoc outdoor and indoor settings (and beyond). Towards this, we specifically introduce the concept of “Derivative” (i.e., transcoded/contextual) Verifiable Credentials. A Derivative VC is a derived bond contract guaranteeing the validity and ownership over the underlying contracts (VCs) whose: a) usability is restricted in a very specific context (that of the “local” and time-limited interaction between a Subject and a Service Provider) and, b) linking table points only to a specific “Pairwise DID”.

View File

@ -3,6 +3,8 @@ published: false
---
# Meta
* [Kaliya and Seth welcome Dave Birch on Digital Financial Services and Smart Money](https://anchor.fm/psatoday/episodes/PSA-Today-21-Kaliya-and-Seth-welcome-Dave-Birch-on-Digital-Financial-Services-and-Smart-Money-el2hp7/a-a57pl5) 2020-10-15 PSAToday
> In todays episode, we talk about his new book “Currency Cold War” and relationship, and lack thereof, between digital currency and identity.
* [IPR - what is it? why does it matter?](https://identitywoman.net/ipr%e2%80%8a-%e2%80%8awhat-is-it-why-does-it-matter/)
> At the time they kept worrying about how they could collaborate and they sensed that they needed to have IPR dealt with, but I couldnt understand what they were going on about. This small thing delayed them working together for a long time. They literally had to spin up a new organization, get new bylaws developed and get everyone to join and sign off on the IPR regime before they could formally talk together about how to get all work to align and come up with one protocol.
* [Why do you care about identity?](https://wider.team/2022/01/18/phil-cares-about-identity/) Phil Wolff 2022-01-18

View File

@ -1,51 +0,0 @@
---
published: false
---
* [Controlling Our ID with Self-Sovereign Identities](https://fromknowhowtowow.podigee.io/19-ssi) KnowHowToWow
> Bosch researcher Christian Borman explains how SSI will not only increase privacy but also have a positive impact on B2B interactions and supply chain management. Meanwhile, Geoff meets mentalist Thorsten Havener. Will he reveal Geoffs true identity?
* [Vincent Annunziato,](https://www.spreaker.com/user/13158652/ep8-cbp-vincent-annunziato) talks about his work with The Silicon Valley Innovation Program. He is the Director of Transformation & Innovation Division of the Customs and Border Patrol Office of Trade, talks about shaping blockchain technologies to make imports safer and more secure. CBP's current projects include tracking steel, oil, and natural gas imports from Canada.
* [Trusted Supply Chain: end-to-end compliance in multi-tier supply chain](https://evan.network/use-cases/trusted-supply-chain/) Evan Network
> In the real estate industry, TRUST&TRACE can be used by companies to obtain required compliance information from a network of participating companies. In this way, all property data is collected step by step: from building construction and leasing to sale and demolition.
* [SAP Completes Pharmaceutical Industry Pilot to Improve Supply Chain Authenticity](https://news.sap.com/2021/03/pharmaceutical-supply-chain-industry-pilot/) 2021-03 SAP
> today announced the completion of an industry-wide pilot utilizing self-sovereign identity (SSI) credentials to establish trust in the pharmaceutical supply chain for indirect trade relationships.
* [The missing link: digitizing supply chains with portable data](https://medium.com/mavennet/the-missing-link-digitizing-supply-chains-with-portable-data-583b66acc9bc) Mavnet
> The traceability vocabulary bridges the gap between existing record-keeping systems and the verifiable exchange of supply chain information across organizations envisioned by proponents of these data portability technologies.
* [The Phygital Future of the Supply Chain](https://nextlevelsupplychainpodwithgs1us.libsyn.com/the-phygital-future-of-the-supply-chain) Next Level Supply Chain Podcast with GS1
> The digital and physical world are merging more than ever before. As the supply chain becomes more phygital, innovative ways of sharing data like using verifiable credentials are helping to build more trust with data along the supply chain. Join us as we chat with Senior VP of Innovation & Partnerships at GS1 US, Melanie Nuce, as we explore whats around the corner and how standards play
* [How to Prevent Supply Chain Fraud With Blockchain](https://www.dock.io/post/supply-chain-fraud-blockchain) Dock
> The global [supply chain management market size](https://www.prnewswire.com/news-releases/supply-chain-management-scm-market-size-worth--19-3-billion-globally-by-2028-at-9-02--cagr-verified-market-research-301540702.html) was valued at USD 10.1 Billion in 2020 and is projected to reach USD 19.3 Billion by 2028. Supply chain is the path for any product such as food, clothes, or appliances to go from where it was a produced, to distributors, procurement officers (quality inspections), and the market.
* [SAP Pharma Solution Supports Supply Chain Compliance](https://insidesap.com.au/sap-pharma-solution-supports-supply-chain-compliance/) SAP
> SAP has chosen an open, interoperable technology to validate all stakeholders in the pharma supply chain in order to provide customers with the best solution for compliance under the U.S. Drug Supply Chain Security Act (DSCSA) requirements. The DSCSA also limits stakeholders interactions to ATPs.
* [The Digital Supply Chain of the Future](https://medium.com/transmute-techtalk/the-digital-supply-chain-of-the-future-79e9431aaa0d) Nis Jespersen Transmute
There is no limit to what a DID can identify. The obvious examples are organizations and people, as explained above. They can also represent assets such as shipping containers, seals, boxes, vessels, or locations, and intangible concepts like bookings, agreements, transactions, or documents.
* [Identity Terms Provide Value along the Supply Chain: How We Know When to Buy the Farm](https://medium.com/@Transmute/identity-terms-provide-value-along-the-supply-chain-how-we-know-when-to-buy-the-farm-738701967e3d) 2022-06-10 Jessica Tacka, Transmute
> Supply chain credentialing in the form of bills of lading, certificates of origin, or letters of credit is used to protect honest parties and their merchandise from being confused with dishonest parties or entities that are engaged in unethical practices, such as environmental destruction, or forced labor.
* [Visibility 2.0: Creating Digital Consistency in an International Supply Chain](https://nextlevelsupplychainpodwithgs1us.libsyn.com/visibility-20-creating-digital-consistency-in-an-international-supply-chain) 2022-08-10 Next Level Supply
> how can something as complicated as the international supply chain take fundamental trade practices and marry them with innovation so we can move at the speed of digitization? Join us for a mind-blowing discussion with Karyl Fowler, CEO at Transmute
* [Identity in the Supply Chain](https://vimeo.com/669713750) 2022-01-25 Vienna Digital Identity #30
> GS1 is the global association for supply chain identifiers with members across all industry sectors and interacting (unbeknownst) with general consumer on a daily basis. Transmute a foundational member of the DID/VC community and a participant in the US DHS Silicon Valley Innovation Programs cross-border shipping use case.
>
> - Transmute Deck: [thedinglegroup.com/s/Transmute_Vienna-Digital-ID-Forum-Jan-2022.pdf](https://www.thedinglegroup.com/s/Transmute_Vienna-Digital-ID-Forum-Jan-2022.pdf)
> - GS1 Deck: [thedinglegroup.com/s/2022-01-24_ViennaDigitalIdentityPhilA.pdf](https://www.thedinglegroup.com/s/2022-01-24_ViennaDigitalIdentityPhilA.pdf)
* [eDATA Verifiable Credentials for Cross Border Trade](https://unece.org/sites/default/files/2022-07/WhitePaper_VerifiableCredentials-CBT.pdf) 2022-07 UNECE UN/CEFACT White Paper
* [Transmute @TransmuteNews](https://twitter.com/TransmuteNews/status/1572692362148847619) via Twitter
> The "[[Fake] 30TB hard drive](https://www.vice.com/en/article/akek8e/walmart-30tb-ssd-hard-drive-scam-sd-cards)" investigation shows the real impact verification could have on #eCommerce. #verifiablecredentials
## Literature
* [Providing Assurance and Scrutability on Shared Data and Machine Learning Models with Verifiable Credentials](https://www.researchgate.net/publication/351575047_Providing_Assurance_and_Scrutability_on_Shared_Data_and_Machine_Learning_Models_with_Verifiable_Credentials)
This paper introduces a software architecture and implementation of a system based on design patterns from the field of self-sovereign identity. Scientists can issue signed credentials attesting to qualities of their data resources. Data contributions to ML models are recorded in a bill of materials (BOM), which is stored with the model as a verifiable credential. The BOM provides a traceable record of the supply chain for an AI system, which facilitates on-going scrutiny of the qualities of the contributing components. The verified BOM, and its linkage to certified data qualities, is used in the AI Scrutineer, a web-based tool designed to offer practitioners insight into ML model constituents and highlight any problems with adopted datasets, should they be found to have biased data or be otherwise discredited.
* [Blockchain and SSI Support Quality in Food Supply Chain](https://www.researchgate.net/publication/356608292_Blockchain_and_Self_Sovereign_Identity_to_Support_Quality_in_the_Food_Supply_Chain) Luisanna Cocco, Roberto Tonelli, Michele Marchesi - Università degli studi di Cagliari
using standards that are WWW Consortium-compatible and the Ethereum Blockchain, ensures eligibility, transparency, and traceability of the certifications along a food supply chain, and could be an innovation model/idea that the companies that adopt the Open Innovation paradigm might want to pursue.
* [Blockchain-Based Self-Sovereign Identity Approach for Inter-Organizational Business Processes](https://annals-csis.org/proceedings/2022/pliks/194.pdf) Annals
To address trust and privacy issues in IOBP, this paper presents a Blockchain-based Self-Sovereign Identity (SSI) approach. The SSI concept is combined with a registry proof smart contract to provide an efficient privacy-preserving solution. The proposed approach is applied to the pharmaceutical supply chain case study and implemented on the Ethereum Blockchain

View File

@ -1,151 +0,0 @@
---
published: false
---
* [@Steve_Lockstep · Apr 23](https://twitter.com/Steve_Lockstep/status/1517861150129795072)
> I had a stab at why Cardspace failed, in “[Identities Evolve: Why Federated Identity is Easier Said than Done](https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2163241)
>
> Why does digital identity turn out to be such a hard problem? People are social animals with deep seated intuitions and conventions around identity, but exercising our identities online has been hugely problematic.
* [OWI Digital Forum Recap: The Rise & Adoption of Verifiable Credentials](https://trinsic.id/owi-digital-forum-recap-the-rise-adoption-of-verifiable-credentials/) 2021-05-21 Trinsic
> Trinsic CEO Riley Hughes sat down with [One World Identity](https://oneworldidentity.com/) (OWI) CEO Travis Jarae to have a one-on-one conversation about [“The Rise & Adoption of Verifiable Credentials”](https://oneworldidentity.com/session/trinsic/). Below is a short summary
* [Why self-sovereign identity will get adopted (and its not the reason you probably want)](https://www.tuesdaynight.org/2018/06/15/why-self-sovereign-identity-will-get-adopted-and-its-not-the-reason-you-probably-want/) 2018-06-15 Tuesday Night
> In the payment card world, there are clear guidelines on personal liability. $50 if you use credit and up to $500 for debit depending on when you report the issue. Based on that, different people choose to use different “systems.”
>
> However, no such guidelines exist for the use of identity information (e.g. attributes.)
* [4 Keys to Self-sovereign Identity Adoption](https://medium.com/trinsic/4-keys-to-self-sovereign-identity-adoption-ad269b208569) 2021-01-19 Trinsic
> Many implementers wont realize the potential of SSI until its deployed at scale, but in order to get to scale, we need implementers to realize value. Its the classic chicken & egg problem.
# SSI Trending
* [Self Sovereign Identity - A glossary of distributed technologies](https://policyreview.info/open-abstracts/self-sovereign-identity)
Released by the Internet Policy Review Journal on Internet Regulations received an entry on Self-Sovereign Identity By Alexandra Giannopoulou & Fennie Wang
* [Why 2021 is the year for decentralized identity](https://indicio.tech/blog/why-2021-is-the-year-for-decentralized-identity/)
Decentralized identity will make our increasingly decentralized lives easier. Or maybe our decentralized lives will make decentralized identity easier. Or both. Either way, this big idea is happening now.
* [Darrell O'Donnell tweets](https://twitter.com/darrello)
> Some early thinking about where #SSI is under [@swardley](https://twitter.com/swardley) model of Genesis -> Custom -> Product -> Utility. We've come a long way, but we are still in the earliest of stages.
* [Institutions digitising credentials, but blockchain use remains low](https://thepienews.com/news/digitising-credentials-blockchain-use/)
> [Research](https://www.aacrao.org/research-publications/aacrao-research/meeting-the-moment-transforming-the-digital-credentials-space) from the American Association of Collegiate Registrars and Admissions Officers has revealed that 89% of US and Canadian institutions report using at least one type of digital credential including digitally signed PDFs with one third planning to devote more resources to the digitisation of credentials.
* [@UbikomProject tweets](https://twitter.com/UbikomProject/status/1405945396208209932): “Nice overview, somewhat questionable assumptions”
* [To Succeed In Decentralizing Digital Identity, Focus On Relationships First](https://www.forbes.com/sites/forbestechcouncil/2021/06/16/to-succeed-in-decentralizing-digital-identity-focus-on-relationships-first/?sh=6f133ef11824) 2021-06-16
> 2020 forced the world of identity to step up, and it has. There's much more innovation on the horizon to look forward to.
* [Is Self-Sovereign Identity Going Exponential?](https://corporate.sybrin.com/webinar-SSI) Sybrin
Watch the [first episode](https://www.youtube.com/watch?v=xWy0rP8uTiU) of #GameChangers, hosted by [Colin Iles](https://www.linkedin.com/in/coliniles/), sponsored by Sybrin. He asks the question: "Is self-sovereign identity going exponential?" Together with [Andrew Baker](https://www.linkedin.com/in/andrew-baker-b1357939/), Head of EC2 Engineering at AWS, and [Lohan Spies](https://www.linkedin.com/in/lohanspies/), Chair of the [Sovrin Steward Council](https://sovrin.org/join-the-new-sovrin-steward-council/), they explore the concept of Self-Sovereign Identity (SSI) in detail, discussing what profound implications SSI will have and whether it is indeed the next game changer?
* [Top 5 digital identity trends injecting trust back into governance](https://www.openaccessgovernment.org/digital-identity-trends/125013/)
* [Webinar Recording 2021 Redux/2022 Trends To Watch](https://www.continuumloop.com/webinar-recording-2021-redux-2022-trends-to-watch/) Continuum Loop
For the attendees, and those folks that couldnt make it, weve put together a breakdown and some key items for you.
[...]
[Link to the recording](https://youtu.be/L-sdGA8h5-g)
[Link to PDF of the presentation](http://www.continuumloop.com/wp-content/uploads/2021/12/webinar-13JAN2021-2021Review-2022Trends.png)
Darrell started off the webinar talking about his top 5 stories from 2021.
* [Digital identity market revenues to reach US$53bn in 2026](https://www.nfcw.com/2022/01/31/375825/digital-identity-market-revenues-to-reach-us53bn-in-2026/) 2022-01-31
Junipers Digital Identity: Key Opportunities, Regulatory Landscape & Market Forecasts 2022-2026 report also identifies multimodal biometric authentication, digital onboarding — including single sign-on solutions and self-sovereign identity — as “growing trends” across the digital identity market.
* [Digital Identity Trends and Predictions for 2022](https://www.signicat.com/blog/2022-trends-and-predictions) Signicat
What will be the buzzwords of 2022?
- Identity wallet
- Decentralized identity
- Web 3.0
- Passwordless
* [Robert Zapfel,](https://iov42.com/about/#team) [iov42](https://iov42.com/) Founder, outlines the top 5 digital identity trends that are injecting trust back into governance and enterprise [...]
From health records to product authenticity, a monumental shift in the way that individuals, governments and businesses interact with each other is underway, and shows no sign of slowing down.
* [IIW33 Session: Crossing the chasm ➔ Mass market adoption of SSI and VC](https://www.youtube.com/watch?v=AhXB9Kzzklg)
* [Verifiable Credentials are Coming to Card Payment Rails](https://indicio.tech/verifiable-credentials-are-coming-to-card-payment-rails/) Indicio
* [One Size Doesnt Fit All Authentication Journeys to Digital Transformation](https://www.veridiumid.com/one-size-doesnt-fit-all-authentication-journeys-to-digital-transformation/) Veridium
The IAM (Identity & Access Management) landscape may seem to be getting more complex, but only because were trying to fit a square peg in a round hole. Old methods tied strictly to AD and LDAP registries with groups and their associated roles are only a narrow keyhole from the past into which we can view a broader IAM future. These systems will continue to be used in many enterprises but form only part of the many journeys available to users within the new IAM landscape.
* [Decentralized Identity](https://www.thoughtworks.com/radar/techniques?blipid=202005083) Thoughtworks Technology Radar
> Adopting and implementing decentralized identity is gaining momentum and becoming attainable. We see its adoption in privacy-respecting customer health applications, government healthcare infrastructure and corporate legal identity.
* [Thoughtworks has put Verifiable Credentials into the “Assess” category of their technology radar map](https://www.thoughtworks.com/radar/techniques?blipid=202010098)
* [Verifiable Credentials featured on Forbes](https://www.forbes.com/sites/forbestechcouncil/2020/12/18/how-verifiable-credentials-can-rebuild-trust-on-the-internet/) 2020-12-18
> Berners-Lee recently suggested that the web needs a midcourse correction. Part of that change involves making systems accountable and making it easy for users to find where information comes from. Verifiable credentials promise major strides in that direction.
* [2020 - How SSI went mainstream](https://medium.com/@sovrinid/2020-how-ssi-went-mainstream-30449003142a) Sovrin Foundation
The Sovrin Foundation (Chris Raczkowski and Drummond Reed) explains some recent history in SSI, how the foundation layed in 2020 prepared us for a global crisis, and how we got to this point where mass adoption seems immanent.
> implementations that were launched in 2020 or are pending launch in early 2021 include:
> - [IATA Travel Pass](https://www.iata.org/en/publications/travel-pass/) will be the first verifiable credential capable of providing proof of COVID-19 test and vaccination status at airports around the world,
> - [NHS Staff Passport](https://www.digitalhealth.net/2020/03/covid-19-nhs-to-trial-digital-passports-to-free-up-staff-movement/) is the first portable digital identity credential for doctors and nurses in one of the largest public healthcare networks in the world,
> - [GLEIF](https://www.gleif.org/en/about/this-is-gleif) (the Global Legal Entity Identifier Foundation), based in Switzerland and the only global online source that provides open, standardized and high quality legal entity reference data, is [committed to following the SSI model](https://www.ledgerinsights.com/lei-corporate-digital-identity-verifiable-credentials-did/) for digital identity credentials for companies.
> - [SSI4DE](https://www.digitale-technologien.de/DT/Redaktion/DE/Standardartikel/SchaufensterSichereDigIdentProjekte/sdi-projekt_ssi.html), co-funded by the German Federal Ministry of Economic Affairs, supports showcases for secure digital identities in Germany, and [Chancellor Angela Merkel declared digital identity as a priority](https://www.handelsblatt.com/politik/deutschland/e-personalausweis-alternative-zu-google-und-facebook-merkel-macht-digitale-identitaet-zur-chefsache/26684942.html?ticket=ST-22324660-c75hUhsrgC4moLTe3uGj-ap3) matter during December 2020.
> - [MemberPass](https://www.memberpass.com/) brings SSI to financial services with Credit Union customer identity verification,
> - [Farmer Connect](https://www.farmerconnect.com/) is realizing is vision to “Humanize consumption through technology” by enabling and empowering individual coffee farmers to more easily work with global enterprises, and reducing costs and inefficiencies for large companies to work directly with small and often remote farmers.
> - [Lumedic Exchange](https://www.lumedic.io/perspectives/introducing-lumedic-connect) is the first network designed exclusively for patient-centric exchange of healthcare data using SSI-based verifiable credentials.
* [The Shape of your Identity](https://stateofidentity.libsyn.com/the-shape-of-your-identity) State of Identity Podcast
How are personal data and digital identity reshaping society? [...] Cameron D'Ambrosi is joined by Michael Becker, CEO of Identity Praxis, to discuss the evolution of the identity industry, the latest trends to follow (or flee), and predictions for the future of both consumer and enterprise digital identity.
* [The Market Opportunity for Reusable Identity and How to Get There](https://liminal.co/reports/market-opportunity-for-reusable-identity/)
New term for SSI: Reusable Identity
The Total Addressable Market is $32.8B in 2022, to reach $266.5B by 2027, with a CAGR of 68.9%. Today, the market is still nascent but is posed for strong growth.
* [Decentralized Identity Market Signals](https://indicio.tech/decentralized-identity-market-signals/) Tim Spring Indicio
In this rapid fire review we will take a look at, and break down, the biggest recent stories in digital identity and what they could mean for business and the average person using the internet.
* [EIC2022 Centralized & Decentralized Identity converging](https://www.linkedin.com/pulse/eic2022-centralized-decentralized-identity-converging-kuppinger/)
* [Educate + Engage = Activate!](https://blog.weareopen.coop/educate-engage-activate-6c6325e962d2) Laura Hilliger
* [Decentralized Identity: Keys to Mainstream Adoption](https://trustoverip.org/blog/2022/05/27/decentralized-identity-keys-to-mainstream-adoption/) Trust Over IP 2022-05-27
When it comes to decentralized identity solutions, many business sponsors do not yet understand how DCI can provide practical answers to immediate frontline business problems. This climate creates the impression that decentralized identity is interesting but not ready for prime time adoption.
* [IAM and SSI: A Combined Approach to Digital Identity](https://www.youtube.com/watch?v=tzzg4cbj3mI)
Gabe Albert, Managing Director - Security/Digital Identity, Accenture
and Lexi Ashpole, Manager - Tech Innovation/Digital Identity, Accenture
speak at the June 15, 2022 All Members meeting at the Trust Over IP Foundation.
* [Self-Sovereign Identity](https://explodingtopics.com/topic/self-sovereign-identity) is up 114% on Exploding Topics over 5 years.
* [Why Should You Care about Digital Identity?](https://indicio.tech/market-signals-why-should-you-care-about-digital-identity/) Indicio
We take a look at a few of the best articles on why strong digital identity will be critical as we continue to build on the internet.
* [A Solution Looking for a Problem? Digital ID Solves a Million of  Them](https://www.forbes.com/sites/davidbirch/2022/08/09/solution-looking-for-a-problem-digital-id-solves-a-million-of-them/?sh=4d1d6bb4fd7f%C2%A0) 2022-08-09
* [Goodbye, physical identities: How organizations can prepare for digital identity challenges](https://www.biometricupdate.com/202208/goodbye-physical-identities-how-organizations-can-prepare-for-digital-identity-challenges%C2%A0)
* [Digital Identities Will Change The Nature Of Online Reputation](https://www.forbes.com/sites/alastairjohnson/2022/08/30/digital-identities-will-change-the-nature-of-online-reputation/?sh=bd1f30b584a3) 2022-08-30
* [Decentralized Identifiers](https://explodingtopics.com/) ExplodingTopics
* [Digital Notarization Can Kickstart Digital ID Ecosystems (with Dan Gisolfi)](https://northernblock.io/digital-notarization-can-kickstart-digital-id-ecosystems-with-dan-gisolfi/) Northern Block
After leaving IBM he is talking publicly in his new role at Discover for the first time
What is transitive trust? And how does it differ from how trust gets established otherwise (e.g., through backend API calls)?
The missing role in the trust triangle: The Examiner.
using attestations from multiple issuers helps to create more trust.
How Issuance can become a business model for many trusted service providers.
Some challenges with the mDL (ISO/IEC 18013) standard.
The benefits of using a Microcredentials approach.
* [New McKinsey Digital Trend](https://www.mckinsey.com/capabilities/mckinsey-digital/our-insights/the-top-trends-in-tech)
We went through the paywall so you dont have to - SSI only mentioned once. From page 99>>

View File

@ -1,213 +0,0 @@
---
published: false
---
# Guardianship
* [Guardianship In Self-Sovereign Identity](http://thedinglegroup.com/blog/2020/11/30/guardianship-in-self-sovereign-identity) 2020-11-30
* [Video] [Vienna Digital Identity Meetup #17](https://vimeo.com/482803989)
> Guardianship is a complex topic, with many subtleties and layers [...]  In this first event on this topic, Philippe has provided an overview of how SSI and Guardianship fit together and how SSI meets the lifecycle stages (Inception, Creation, Usage and Termination) of guardianship.
* [The Sovrin Working Group Tech Requirements and Implementation Guidelines](https://docs.google.com/presentation/d/1aGTPmlno3WScpSYMs1HLhWsrVRx9B-I0yhOQsRgmqRw/edit?usp=sharing) John Phillips, Jo Spenser
> Sovrin is looking to promote the governance process and where guardianship fits in.  The IdRamp wallet is an example of how the wallet could provide helpful features.
* [A Deeper Understanding of Implementing Guardianship](https://sovrinid.medium.com/a-deeper-understanding-of-implementing-guardianship-9a8ab749db90)
* [A Deeper Understanding of Implementing Guardianship](https://sovrinid.medium.com/a-deeper-understanding-of-implementing-guardianship-9a8ab749db90): Two new Guardianship papers from Sovrin at IIW #32
> The first paper is called the [Guardianship Credentials Implementation Guidelines](https://drive.google.com/file/d/1vBePVx8n3MRDWcePkwVDya9ab4BHEyU_/view?usp=sharing) and its purpose is to provide readers with the background they need to implement IT systems that support various kinds of guardianship. The second paper is called [Guardianship Credentials Technical Requirements](https://drive.google.com/file/d/1M21PznPAd0H6z1t4ODl-jiEoXZjEhwcb/view?usp=sharing) which was developed by the technical requirements working group within the SGWG. The purpose of this document is twofold: i) provide principles under which guardianship scenario designs and requirements are considered and defined; and ii) provide technical requirements for SSI solutions that offer the capability of guardianship.
* [Internet Governance - UDDI - Universal Declaration of Digital Identity](https://iiw.idcommons.net/10I/_Internet_Governance_-_UDDI_-_Universal_Declaration_of_Digital_Identity) by Jeff Aresty, Kristina Yasuda
Internet governance, human rights, digital identity, Identity for All, Guardianship
* [Guardianship Showcase - The Sovrin Working Group Tech Requirements and Implementation Guidelines](https://iiw.idcommons.net/4G/_Guardianship_Showcase_-_The_Sovrin_Working_Group_Tech_Requirements_and_Implementation_Guidelines) by John Phillips, Jo Spenser
* [Guardianship, SSI, and the Sovrin Guardianship WG - Update for IIW #32](https://docs.google.com/presentation/d/1aGTPmlno3WScpSYMs1HLhWsrVRx9B-I0yhOQsRgmqRw/edit?usp=sharing)
1. Jurisdictions are essential [to Guardianship]
2. Work with existing laws
3. Build Guardianship on Verifiable Credentials
4. Build a mental model
5. Dont build Guardianship [solely] on wallets
Sovrin is looking to promote the governance process and where guardianship fits in.  The IdRamp wallet is an example of how the wallet could provide helpful features.
- Universal Wallet: [https://w3c-ccg.github.io/universal-wallet-interop-spec/](https://w3c-ccg.github.io/universal-wallet-interop-spec/)
- Review/contribute to the draft spec (or portions youre interested in): [https://docs.google.com/document/d/1vPqb4bJ6pfuAPYF_fMW_Lb-7GZugasWKfrSCotpuv6o/edit#](https://docs.google.com/document/d/1vPqb4bJ6pfuAPYF_fMW_Lb-7GZugasWKfrSCotpuv6o/edit#)
- Verifiable Credentials for Education Task Force: [https://w3c-ccg.github.io/vc-ed/](https://w3c-ccg.github.io/vc-ed/)
* [Agency By Design (Privacy is not Enough)](https://iiw.idcommons.net/20B/_Agency_By_Design_(Privacy_is_not_Enough)) by Adrian Gropper
Agency vs. Delegation
Learning Stack:
- Me
- My Agent / Fiduciary / semi-autonomous
- Community
- Vendors and Institutions
Relationship with companies
- Dashboard for our lives
- Portable shopping cart
CAPCHAS
- Browser is not enough
- Force APIs
- GNAP
- API in healthcare
How would an API World function
- Intelligence
- Choice
The GNAP at  the IETF: [https://tools.ietf.org/html/draft-ietf-gnap-core-protocol-04](https://tools.ietf.org/html/draft-ietf-gnap-core-protocol-04)
Is server a bad concept
- Ethereum as the ultimate server
Clear application? Needed a model how a real human uses / not the tech / highly motivated
Social Context is important to the average user
The back end is most important
Real estate “agents” vs. DSIY - Zillow - the GNAP RFC at the IETF: [https://tools.ietf.org/html/draft-ietf-gnap-core-protocol-04](https://tools.ietf.org/html/draft-ietf-gnap-core-protocol-04)
* [...]
HTML and JSON / OAuth 2.0 Token Exchange - support for delegation semantics ( [https://tools.ietf.org/html/rfc8693](https://tools.ietf.org/html/rfc8693)  )
A password manager that puts the user in full control.  [https://sitepassword.alanhkarp.com/](https://sitepassword.alanhkarp.com/)
* [...]
Agency by Design (Privacy is not Enough)
Adrian Gropper:
Im not a fan of Privacy by Design.
In the industry are only concerned about compliance, very rarely talk about Human Agency
Privacy by Default is the opposite in some sense to privacy by design
The problem is that It conflict with community in many cases. (e.g. social credit score)
Cultural differences (EU accepts better centralization than US)
Delegation and agency are one the same thing
Agency is a much bigger thing and delegation is a mechanism that supports it
I want my fiduciaries to know as much as possible of me (e.g. my doctor, my lawyer)
Model Agency as hierarchy and delegation is the mean to have it.
* [...]
* [Why you know less about Guardianship than you think (because we ALL know less about Guardianship than we think)](https://iiw.idcommons.net/20L/_Why_you_know_less_about_Guardianship_than_you_think_(because_we_ALL_know_less_about_Guardianship_than_we_think)) by Jo Spencer, John Phillips, Sterre den Breeijen
Link to the deck well use to start the conversation: [https://docs.google.com/presentation/d/1aGTPmlno3WScpSYMs1HLhWsrVRx9B-I0yhOQsRgmqRw/edit?usp=sharing](https://docs.google.com/presentation/d/1aGTPmlno3WScpSYMs1HLhWsrVRx9B-I0yhOQsRgmqRw/edit?usp=sharing)
Do we need to get more people interested in the “real life” application of
Four groups of people at IIW conferences?
- Technologists
- Idealists
- Pragmatists
- Entrepreneurs
1. In 2019 the Sovrin Foundation published a whitepaper on Guardianship; transitioned into the Working Group
2. APAC and NA/EMEA WG meetings
3. 2 key documents from the WG are going to be published by Sovrin Foundation - [https://sovrin.org/a-deeper-understanding-of-implementing-guardianship/](https://sovrin.org/a-deeper-understanding-of-implementing-guardianship/)
4. Implementation guidelines
5. Technical requirements
6. Why are we looking at Guardianship and SSI?
7. Guardianship is a part of life - we are rarely fully self-sovereign or independent
8. Guardianship is not a part of SSI at this moment - is a missing ingredient in our digital lives
9. The group thought guardianship was a simple concept
10. Small set of SSI building blocks …
11. Gap between use cases and requirements was too broad (see slides)
12. A mental model for guardianship was required (see IIW30 and IIW31 for further context)
13. Squiggle - the journey
14. 5 things the team worked out
15. Jurisdictions are essential (gives meaning to the guardianship relation)
16. Should work with existing laws
17. Guardianship can be built on verifiable credentials
18. Build a mental model (and test it) - 15 functional requirements, 6 technical requirements, 3 validator requirements
19. Dont build guardianship solely on wallets (mitigate the risk of wallet takeover and impersonation)
20. Transparent vs Opaque guardianship scenario
21. 5 things to consider
22. Should discovery be enabled
23. Ensuring appropriate representation
24. Receiving parties are key
25. Balancing agency, dignity and care
26. Transitions : recovery, expiry and ends
27. Alignment with SSI and ToIP
28. Guardianship creates a tension between independence and dependence
29. An obvious relationship with the ToIP (the ToIP model/diagram)
30. Mapping concepts of Guardianship with the Trust Triangle diagram
---
31. Parties, Actors and Action pattern
32. [https://essif-lab.pages.grnet.gr/framework/docs/notations-and-conventions](https://essif-lab.pages.grnet.gr/framework/docs/notations-and-conventions)
33. [https://www.researchgate.net/publication/348325716_Decentralized_SSI_Governance_the_missing_link_in_automating_business_decisions](https://www.researchgate.net/publication/348325716_Decentralized_SSI_Governance_the_missing_link_in_automating_business_decisions)
* [What if the Credential Subject cannot be the Holder?](https://iiw.idcommons.net/20H/_What_if_the_Credential_Subject_cannot_be_the_Holder%3F) by Sam Curren
Quick intro outline: [https://hackmd.io/HhLGtxBPSeGpxtp30S5tOg](https://hackmd.io/HhLGtxBPSeGpxtp30S5tOg)
Where is the line at the limits of what a holder can hold?
How is user consent managed?
What are the protocols like?
How does this tie into OAuth, GNAP, etc?
How does this relate to DIDComm Credential Exchange Protocols and Secure Data Stores?
Its possible that the intent of the law is not being met, if a provider refuses to share data on behalf of a user.
OpenID has a function for distributed claims that provide a URI and an access token for retrieval.
JWTs have AZP - The authorized presenter of a credential. The issuer may be the authorized presenter.
If the issuer wants to use existing protocols, a credential can be issued which functions as a shadow of the main credential. Presenting the shadow credential provides consent for the verifier to ask for a presentation of the main credential from the issuer.
* [Identity Escrow - Accountability AND Privacy](https://iiw.idcommons.net/11I/_Identity_Escrow_-_Accountability_AND_Privacy) by Sam Curren, Ken Ebert, Suresh Batchu, Kiran Addepalli
1. Can the escrow hold the "Proof of the information" as opposed to the information itself.
2. Mortgage Service - might seem to be an authorization to access the data directly or the issuer present directly.
3. What gets put into escrow is flexible.
4. Trigger event or a lockbox kind of capability. How is the claim released to relying parties? How does it eliminate mischief and false claims.
5. There needs to be some accountability on the service provider to claim false releases. Automation may not be able to completely eliminate false triggers, some level of human intervention for complex cases.
6. Contractual wrapper for
7. Technical and legal framework for accountability.
8. Dont have data but key to unlock the escrow. So that no insider can unlock the data. Separating the data release from the encryption release would be better.
9. It is better to hold proof of data. Because of the risk and liability, it can create incentives to escrow providers.
10. We should chat about the CDDE (Community Distributed Data Escrow) that we have developed with UN, WEF, NYU Gov lab for data handling in disaster settings. Very related to this. Blind trust, etc. for self shielding.
* [...]
Links that came up during the call:
- [https://onlinelibrary.wiley.com/doi/abs/10.1111/j.1430-9134.2001.00173.x](https://onlinelibrary.wiley.com/doi/abs/10.1111/j.1430-9134.2001.00173.x)
- [https://dhh1128.github.io/zkpcreds/trust-paradox-rebuttal.html](https://dhh1128.github.io/zkpcreds/trust-paradox-rebuttal.html)
- Feedback loop into privacy law: [https://kantarainitiative.org/confluence/display/WA/Privacy+as+Expected%3A+UI+Signalling+a+Consent+Gateway+For+Human+Consent](https://kantarainitiative.org/confluence/display/WA/Privacy+as+Expected%3A+UI+Signalling+a+Consent+Gateway+For+Human+Consent)
* [https://link.springer.com/chapter/10.1007/978-3-540-45146-4_8](https://link.springer.com/chapter/10.1007/978-3-540-45146-4_8)
* [Lets Go - Together!: Does international travel only ever involve independent adults?](https://trustoverip.org/blog/2021/11/24/lets-go-together/) ToIP 2021-11-24
Applying the developed models of guardianship, using the flexibility of Verifiable Credentials and the trusted mechanisms of sharing VCs, can provide the ability to add guardianship credentials into the travel process (or not) without breaking the existing approach and complicating the technical details defined in the Blueprint.
* [Delegatable Credentials Now Available](https://blog.dock.io/delegatable-credentials-now-available/)
> An issuer may [grant delegation authority to another issuer](https://docknetwork.github.io/sdk/tutorials/concepts_private_delegation.html) simply by issuing them a vcdm credential. Let's say did:ex:a wants to grant delegation authority to did:ex:b. did:ex:a simply issues the credential saying that did:ex:b may make any claim.
* [Common Delegation Patterns in the Verifiable Credential Ecosystem](https://kyledenhartog.com/delegation-in-verifiable-credentials/) Kyle Den Hartog
did you know that there are three ways in which you can utilize VCs and DIDs to enable delegation [...] look to the [ZCAP-LD data model](https://w3c-ccg.github.io/zcap-ld/) which is designed especially for these concepts. And if youre still confused and would like some help please reach out and I can see how I can help.