mirror of
https://github.com/Decentralized-ID/decentralized-id.github.io.git
synced 2025-08-04 20:34:40 -04:00
re-unorganize
This commit is contained in:
parent
5d8383c896
commit
ebe12af46a
16 changed files with 208 additions and 284 deletions
23
unsorted/next/blockchain-standards.md
Normal file
23
unsorted/next/blockchain-standards.md
Normal file
|
@ -0,0 +1,23 @@
|
|||
---
|
||||
published: false
|
||||
---
|
||||
|
||||
# Blockchain Standards
|
||||
|
||||
- Blockchain Standards
|
||||
- ISO/TC 307
|
||||
- CEN/CENTLIC
|
||||
- ERC 725
|
||||
|
||||
+++- ISO/TC 307 “Blockchain and distributed ledger technologies” https://www.iso.org/committee/6266604.html
|
||||
|
||||
+++- CEN/CENELEC JTC 19 “Blockchain and Distributed Ledger Technologies” https://standards.iteh.ai/catalog/tc/cen/d96ab6b7-aac8-49e9-9ac5-b391bbd2abdc/cen-clc-jtc-19
|
||||
|
||||
|
||||
https://github.com/ChainAgnostic/CASA
|
||||
|
||||
https://www.gov.ca.gov/2022/05/04/governor-newsom-signs-blockchain-executive-order-to-spur-responsible-web3-innovation-grow-jobs-and-protect-consumers/
|
||||
|
||||
Global Standards Mapping Initiative (GSMI) Comprehensive resources and recommendations for the blockchain ecosystem to navigate the complexities of the global digital asset landscape, across 6 key areas:<br>- Legislation and Regulatory Development<br>- <br>- Taxonom<br>- <br>- Technical Standard<br>- <br>- Blockchain and Digital Assets Landscap<br>- <br>- University Courses and Degree Program<br>- <br>- Fact Cards on Key Themes https://gbbcouncil.org/gsmi/
|
||||
|
||||
GLOBAL STANDARDS MAPPING INITIATIVE 2.0 The Global Standards Mapping Initiative (GSMI) is an industry-led effort to map and assess the blockchain and digital asset landscape across five key areas:<br>1) legislation and regulatory guidance<br>2) technical standards<br>3) industry standards and recommendations<br>4) university courses and degree programs<br>5) industry consortia https://gbbcouncil.org/wp-content/uploads/2021/11/GBBC-GSMI-2.0-Report-1.pdf NOVEMBER 2021
|
16
unsorted/next/cbdc.md
Normal file
16
unsorted/next/cbdc.md
Normal file
|
@ -0,0 +1,16 @@
|
|||
---
|
||||
published: false
|
||||
---
|
||||
|
||||
### CBDC
|
||||
|
||||
* [A Brief Introduction to How SSI Infrastructure Can Integrate Digital Fiat Currency (DFC)](https://www.itu.int/en/ITU-T/Workshops-and-Seminars/20180718/Documents/D_Reed.pdf)
|
||||
* [](https://twitter.com/VitalikButerin/status/1072160446180810752)
|
||||
* [Why CBDCs will likely be ID-based](https://www.ft.com/content/88f47c48-97fe-4df3-854e-0d404a3a5f9a)
|
||||
|
||||
Central banks are realising CBDCs will have to be intimately linked to identity to deal with illicit finance and bank disintermediation risk
|
||||
* [New Video: MetaMUI SSID](https://sovereignwallet.medium.com/new-video-metamui-ssid-8bcef6281cf3) Sovereign Wallet
|
||||
|
||||
MetaMUI SSID is the world’s first true Self-Sovereign Identity Application that enables running Blockchain-Based E-Government System, and CBDC payments on top of MetaMUI Blockchain.
|
||||
* [Video] [Dividing the Movement w. Alison McDowell (Separating Signal from Noise)](https://www.youtube.com/watch?v=awCcnstfhLY) 2022-03-08 Doom&GloomHQ
|
||||
> Something that i found on some of the research that we were doing on the international bank of settlements (BIS). I don't like them, but I like the way that they present information sometimes. But CBDC 2.0 since we're moving toward that direction um they kind of called it a like a money flower. It has like four different sections which is: your accessibility, what kind of money, who issues that money, and then the technology that it
|
106
unsorted/next/history.md
Normal file
106
unsorted/next/history.md
Normal file
|
@ -0,0 +1,106 @@
|
|||
---
|
||||
published: false
|
||||
---
|
||||
# History
|
||||
* [Privacy Preserving Authentication—Another reason to care about ZKP](https://www.slideshare.net/eralcnoslen/privacypreserving-authentication-another-reason-to-care-about-zeroknowledge-proofs) 2017-08-14 Clare Nelson
|
||||
* [Seeing Self-Sovereign Identity in Historical Context](https://identitywoman.net/wp-content/uploads/Seeing-Self-Sovereign-Identity-in-Historical-Context.pdf) 2022-06 Kaliya 'Identity Woman' Young
|
||||
> The first follows the ways in which identities were designed and managed in computer systems. [...] The second history examines the evolution of paper-based identity systems that emerged in Europe. [...] The last section of the paper brings these two histories together and explains why the underlying technological design of SSI aligns with Western liberal democratic values in a way that the earlier digital identity systems designs do not.
|
||||
* [Legal identity of a person in a digital world](https://medium.com/@vvsm_50580/legal-identity-of-a-person-in-a-digital-world-38f444dc8996) 2022-09-17 Vikas Malhotra
|
||||
> Today, Sep 16th is the International Identity Day, a commemoration of the [UN Sustainable Development Goal 16.9](https://unstats.un.org/legal-identity-agenda/documents/UN-Strategy-for-LIA.pdf) which calls for the provision of legal identity for all by 2030.
|
||||
* [The World’s First Verifiable Credentials](https://www.constellationr.com/blog-news/world-s-first-verifiable-credentials) Steve Wilson
|
||||
> Commonly associated with blockchain and the Self-Sovereign Identity movement, Verifiable Credentials are in fact an old idea. It is instructive to break down their essential properties and examine the pioneering examples.
|
||||
|
||||
[](https://twitter.com/ChristopherA/status/989120215702261761?ref_src=twsrc%5Etfw)
|
||||
|
||||
* Christopher Allen: [Not Moxie Marlinspike](https://www.moxytongue.com/2021/09/not-moxie-marlinspike.html), Oft confused, no more.
|
||||
* [Link to a corrected attribution Devon Lofretto is not Moxie Marlinspike](https://github.com/lifewithalacrity/lifewithalacrity.github.io/commit/52c30ec1d649494066c3e9c9fa1bbaf95cd6386f)
|
||||
> Self-Sovereign Identity has deep roots. It did not just emerge in 2016 after a blog post was written. It did not fail to exist when wikipedia editors denied it subject integrity with the stated message: "good luck with that".
|
||||
|
||||
* [An Identity Through Time](https://iiw.idcommons.net/23D/_An_Identity_Through_Time) by David Schmudde
|
||||
|
||||
The history of identity online. Finger, CompuServe, DNS/WWW, Facebook
|
||||
|
||||
The slides are based on this blog post: [https://schmud.de/posts/2021-04-22-id-through-time.html](https://schmud.de/posts/2021-04-22-id-through-time.html)
|
||||
|
||||
---
|
||||
|
||||
Nothing to prevent players to take advantage of SSI. They may add something small and useful aspects to the protocols.
|
||||
|
||||
The hope is that our stuff is super interoperable. So you can actually really leave.
|
||||
|
||||
Facebook is interesting because it was based on the .edu domain. Small network. Solving for the endstate that we see now is different than starting back then.
|
||||
|
||||
Zero-knowledge proofs and trustless networks may require high-trust environments for adoptions.
|
||||
|
||||
|
||||
* [State of Identity with IDRamp](https://oneworldidentity.com/podcast/idramp-2/) (Enterprise SSI company)
|
||||
> As someone who has uniquely spent their full career immersed in identity, Mike Vesey (CEO of IdRamp) shares an insider perspective of how the industry has evolved during his tenure. This episode dives into the impacts of rapid digitalization worldwide, where identity is heading due to digital transformation, and the benefits that come with it.
|
||||
|
||||
SSI vs Santa
|
||||
|
||||
* [Phil Wolff shares](https://twitter.com/evanwolf/status/1339128612650291203):
|
||||
> In 2021 Santa decentralizes his list, no longer relying on children’s Real Names in compliance with kid privacy laws. Self-sovereign identity lets kids ask Santa, confident their identities are authenticated (right toys to the right kid) & that he uses verified naughty/nice data.
|
||||
|
||||
|
||||
## Remembering Kim Cameron
|
||||
|
||||
I (Kaliya) will be working on a blog post for next week. For those of you who didn’t know Kim I’m very sad you will not get to meet him. He contributed greatly to our field. He was a good friend to many and a mentor and ally for women working in the field. His [Laws of Identity](https://www.identityblog.com/stories/2005/05/13/TheLawsOfIdentity.pdf) shape and continue to shape our industry - in invite you to read people’s reflections to get a small sense of who he was. 2005-05-13
|
||||
* [Kim Cameron remembered via his 7 Laws for Identity](https://www.biometricupdate.com/202205/kim-cameron-remembered-via-his-7-laws-for-identity) Biometric Update
|
||||
|
||||
Friends of the late computer scientist Kim Cameron took the opportunity of gathering at the KuppingerCole European Identity & Cloud Conference ([EIC 2022](https://www.kuppingercole.com/events/eic2022), to remember Cameron, his life and contribution to digital identity and beyond via his 7 Laws of Identity.
|
||||
|
||||
|
||||
* [Remembering an Identity Leader](https://www.pingidentity.com/en/lp/remembering-kim-cameron.html) Ping Identity
|
||||
|
||||
Kim stood for all that is right in the intersection of technology and humanity.
|
||||
|
||||
* [Remembering Kim Cameron](https://blogs.harvard.edu/doc/2021/12/03/remembering-kim-cameron/) Doc Searls 2021-12-03
|
||||
|
||||
Kim pushed constantly toward openness, inclusivity, compatibility, cooperation, and the need for individual agency and scale.
|
||||
|
||||
* [Remembering Kim Cameron](https://www.cloudidentity.com/blog/2022/01/11/remembering-kim-cameron/) Vittorio Bertocci 2022-01-11
|
||||
|
||||
Kim might no longer update his blog, nudge identity products toward his vision or give inspiring, generous talks to audiences large and small, but his influence looms large in the identity industry – an industry Kim changed forever.
|
||||
|
||||
* [Memories of Kim Cameron](https://www.tuesdaynight.org/2022/01/12/memories-of-kim-cameron/) Ian Glazer 2022-01-12
|
||||
|
||||
Reification. I learned that word from Kim. In the immediate next breath he said from the stage that he was told not everyone knew what reify meant and that he would use a more approachable word: “thingify.” And therein I learned another lesson from Kim about how to present to an audience.
|
||||
|
||||
* [My heart is heavy over the loss of @Kim_Cameron](https://twitter.com/pamelarosiedee/status/1466776672443666432) Pamela Dingle
|
||||
|
||||
He always made sure that everyone was welcome, he brought people in and inspired them and suggested ways for them to be stars. He was kind, in a way that few people ever are.
|
||||
|
||||
* [Kim Cameron: A leader in the digital identity space](https://www.identitynorth.ca/2021/12/02/kim-cameron-a-leader-in-the-digital-identity-space/) Aran Hamilton, Identity North 2021-12-02
|
||||
|
||||
He spoke to us twice in 2016, first as the Keynote for our Annual Summit “[Beyond the Laws of Identity](https://www.youtube.com/watch?v=uqUXYl90XHM)” referring to his ground-breaking work and taking us through what he felt he missed when he published his Laws. Kim spoke later on the importance of the community when he received recognition as a [Founder of Canada’s Digital Economy](https://www.youtube.com/watch?v=xdlBg0Ai9aQ&feature=youtu.be).
|
||||
|
||||
Kim joined us again in 2020, after he retired from Microsoft and gave a different sort of talk. His [keynote](https://www.youtube.com/watch?v=nLSYCxw6I8c) at the IdentityNORTH Annual Summit was a sort of career retrospective
|
||||
|
||||
* [Rest in Peace, Kim Cameron](https://www.kuppingercole.com/blog/resch/rest-in-peace-kim-cameron) Joerg Resch, Kuppinger Cole
|
||||
|
||||
Kim attended nearly all the European Identity Conferences (EIC), from the very first one back in 2007, to 2019 and inspired us with his visionary, content-rich yet entertaining keynote talks and panel sessions. Have a look at his 2019 talk about privacy in the platform economy (“[Turning the Web Right Side Up](https://www.kuppingercole.com/watch/eic2019_14_09_cameron)”, his visionary “[Identity Services 2020](https://www.kuppingercole.com/watch/eic15_keynote_cameron)” talk at EIC 2015, where he also reflected on 15 years
|
||||
|
||||
|
||||
* [There are no words, really, but I will try](https://www.linkedin.com/feed/update/urn:li:activity:6872285572124221440/) Jamie Lewis
|
||||
|
||||
If there was ever a person one could describe as being “full of life,” it was [Kim Cameron](https://www.linkedin.com/in/ACoAAAAiG7UBqRTVbfo5tvZGPKQY9pWuFZkqneY). It was impossible to be around him without laughing and learning—usually at the same time.
|
||||
|
||||
* [Kim Cameron: Identity's god](https://www.networkworld.com/article/2316750/kim-cameron--identity-s-god.html) Network World
|
||||
|
||||
Kim Cameron isn't on a mission from God, but he once played guitar with some guys who were.
|
||||
## Kim Cameron Memorials
|
||||
* [Stories of Kim Cameron](https://self-issued.info/?p=2218)
|
||||
|
||||
I once asked Kim why there were so many Canadians working in digital identity. He replied: “Every day as a Canadian, you think ‘What is it that makes me uniquely Canadian, as opposed to being American? Whereas Americans never give it a thought. Canadians are always thinking about identity.'”
|
||||
|
||||
* [In Memory of Kim Cameron](https://www.windley.com/archives/2021/12/in_memory_of_kim_cameron.shtml) Phil Windley
|
||||
|
||||
Kim's technical excellence got him a seat at the table. His position at Microsoft gave him a big voice. But what made Kim effective was his gentle approach to technical discussions, especially those he thought might be contentious.
|
||||
|
||||
* [The gentle lawgiver](https://blogs.harvard.edu/doc/2021/12/06/the-gentle-lawgiver/) Doc Searls 2021-12-06
|
||||
|
||||
What I want to celebrate, however, isn’t just Kim’s thoughts and works, but his example: of how an open and generous person in a giant company can use its power for good, and not play the heavy doing it. That’s what Kim did for the two decades he was the top architect of Microsoft’s approach to digital identity and meta systems
|
||||
* [In Praise of Kim Cameron](https://openid.net/2021/12/04/in-praise-of-kim-cameron/) OpenID Foundation 2021-12-04
|
||||
> Not only did Kim “inject his 7 laws of identity into Microsoft’s DNA”, but did so throughout today’s growing global digital identity ecosystem.
|
||||
>
|
||||
> Kim was crafty. He not only injected his thinking into Microsoft; as a champion of the Identity Standards Community, Kim embedded his thinking into the standards that inform many of the identity systems operating at scale today.
|
125
unsorted/next/standards.md
Normal file
125
unsorted/next/standards.md
Normal file
|
@ -0,0 +1,125 @@
|
|||
---
|
||||
published: false
|
||||
---
|
||||
|
||||
# Web Standards
|
||||
|
||||
### IBC
|
||||
|
||||
https://github.com/cosmos/ibc/
|
||||
|
||||
## List
|
||||
- aggregate well-known-did-1-of-a 1 of a (intermediate)
|
||||
- aggregate did-spec-registries-1-of-a Signature Implementations 1 of many (intermediate)
|
||||
- aggregate did-spec-registries-1-of-b did-method 1 of many (intermediate)
|
||||
|
||||
|
||||
### W3C
|
||||
|
||||
Decentralized Identifier ✓
|
||||
- Explainer ✓
|
||||
- Literature +
|
||||
- Methods ✓
|
||||
- Tools \ Services
|
||||
- Critique ✓
|
||||
|
||||
Verifiable Credential
|
||||
- Explainer ✓
|
||||
- Comparisons ✓
|
||||
- Varieties
|
||||
- JSON-LD
|
||||
- JSON-LD ZKP BBS+
|
||||
- JSON-JWT
|
||||
- ZKP-CL - [IIA] Indy Aries AnnonCreds
|
||||
- JWP
|
||||
|
||||
JSON-LD
|
||||
- [Complementary] JSON-LD ✓ (W3C)
|
||||
|
||||
### Credentials Community Group
|
||||
|
||||
- [Exchange] CHAPI ✓ (CCG)
|
||||
- [Complementary] Cryptography > BBS ✓ (CCG)
|
||||
- [Authorization] oCap/zCap ✓ (CCG)
|
||||
|
||||
### IETF
|
||||
|
||||
- [Complementary] (IETF)
|
||||
- [Authorization] GNAP ✓ (IETF)
|
||||
- [Authorization] OAuth ✓ (IETF)
|
||||
- [ID-Non-SSI] OAuth (IETF)
|
||||
- [ID-Non-SSI] SCIM (IETF)
|
||||
|
||||
### OASIS
|
||||
|
||||
- [ID-Non-SSI] SAML (OASIS)
|
||||
- [ID-Non-SSI] KMIP (OASIS)
|
||||
- [ID-Non-SSI] Secure QR Code (OASIS)
|
||||
|
||||
### ISO/IEC
|
||||
- mDL 18013-5 ✓ (ISO)
|
||||
- 22030 ?
|
||||
- Working Group 3 - Travel Documents
|
||||
|
||||
### OpenID Foundation
|
||||
- [Exchange] OIDC ✓ (OpenID)
|
||||
- [ID-Non-SSI] OpenID (OpenID)
|
||||
|
||||
### ISO
|
||||
- [Exchange] mDL ✓ (ISO)
|
||||
- [Blockchain] ISOTC 307 ✓ (ISO)
|
||||
|
||||
### CEN/CENTLIC
|
||||
- [Blockchain] CEN/CENTLIC ✓ (CEN)
|
||||
- [Blockchain] ERC 725 (ERC-EIP)
|
||||
|
||||
### FIDO
|
||||
- [ID-Non-SSI] FIDO (FIDO)
|
||||
|
||||
## VC
|
||||
|
||||
* [New search engine, mobile wallet, verifiable credentials and delivery technologies.](https://twitter.com/HUMBLPay/status/1574454647384813568) via Twitter ([ANN](https://www.globenewswire.com/en/news-release/2022/04/13/2421969/0/en/HUMBL-Selected-To-Pilot-Digital-Wallet-Program-On-Behalf-of-The-County-of-Santa-Cruz-California.html) 2022-04-13 HUMBL @HUMBLPay
|
||||
*using verifiable credentials in their wallet.*
|
||||
> #HUMBL x GF2GO - San Diego, CA - [Pilot Program](https://www.youtube.com/watch?v=H_HAFEzmkWU)
|
||||
|
||||
## DIDs
|
||||
W3C Press Release - [Decentralized Identifiers (DIDs) v1.0 becomes a W3C Recommendation](https://www.w3.org/2022/07/pressrelease-did-rec) worth reading to see who contributed comments (and notice who didn’t)
|
||||
|
||||
For individuals in particular, DIDs can put them back in control of their personal data and consent, and also enable more respectful bi-directional trust relationships where forgery is prevented, privacy is honored, and usability is enhanced.
|
||||
|
||||
## DID Auth
|
||||
|
||||
* [SSI Interaction Patterns](https://www.windley.com/archives/2021/06/ssi_interaction_patterns.shtml)
|
||||
> While the DID Authn pattern is simple, it is not as flexible as we need in some situations. For more complicated scenarios, we can use verifiable credentials. The first scenario we’ll consider is where the same organization is issuing and verifying the credential.
|
||||
> 
|
||||
|
||||
* [The Time for Self-Sovereign Identity is Now](https://medium.com/learning-machine-blog/the-time-for-self-sovereign-identity-is-now-222aab97041b) Kim Hamilton Duffy, Learning Machine (Now Hyland Credentials)
|
||||
Oldie but Goodie by Kim Hamilton Duffy from when she worked at Learning Machines
|
||||
> Technically, Verifiable Claims are claims made about a “subject” (identified by a digital identifier such as a DID) that are rendered tamper proof through digital signatures. The authenticity of digital signatures may, in turn, be established through issuer identifiers, which may also be expressed as DIDs.
|
||||
* [The Verifiable Credential’s Model](https://trinsic.id/trinsic-basics-the-verifiable-credentials-model/)
|
||||
> At the core of every self-sovereign identity (SSI) use case is what we call the verifiable credentials model. This simple yet effective model helps conceptualize how verifiable credentials are exchanged between people and organizations.
|
||||
* [According to](https://www.w3.org/TR/vc-data-model/) W3: "Verifiable credentials represent statements made by an issuer in a tamper-evident and privacy-respecting manner."
|
||||
* [DID, in short for Decentralized Identifier, is basically a unique string of random numbers and letters](https://twitter.com/fennykyun/status/1564249472053514240) fennykyun
|
||||
> tldr\
|
||||
> :: DID is just an URI\
|
||||
> :: VC is a cryptographically verifiable credential using DID\
|
||||
> :: SSI is a self-sovereign and privacy-preserving identity
|
||||
> :: Non-human (Machines, Bots, Goods, anything) also able to have DID, VC, and SSIs
|
||||
* [Understanding Verifiable Credentials](https://www.credivera.com/blog/understanding-verifiable-credentials) Credivera
|
||||
> The value of verifiable credentials and the critical role they will play to our future digital identities is undeniable. As we enter a new era of online representation, trust in the internet will need to be vigorously robust.
|
||||
* [Decentralized identifiers - Self-Sovereign Identity livebook](https://livebook.manning.com/book/self-sovereign-identity/chapter-8/) Manning
|
||||
* [Video] [Identity Insights - Basics of Verifiable Credentials](https://www.youtube.com/watch?v=RCCatllgNv4) Indicio, Youtube
|
||||
> What are verifiable credentials? In this episode we are joined by Indicio software engineer Char Howland for an introduction to what this technology is and what it can do.
|
||||
* [Decentralized identity: What it is, why it matters](https://www.scmagazine.com/resource/identity-and-access/infographic-key-stats-on-the-passwordless-future) 2022-09-15 SC Magazine
|
||||
> 
|
||||
* [The Journey of Decentralized Identity: Where It’s Been and Where It’s Going](https://trinsic.id/the-journey-of-decentralized-identity-where-its-been-and-where-its-going/) 2022-07-14 Trinsic
|
||||
> Our goal has been to completely abstract away the complexity of the ever-changing landscape so organizations can focus on the important stuff—what product to build, and how to take it to market. Teams shouldn’t have to “pick winners” and wager what to build on. Their products should be interoperable with multiple ecosystems. That’s what Trinsic is providing, out-of-the-box.
|
||||
* [What Are Verifiable Credentials? And How Can They Build Digital Trust?](https://www.salesforce.com/blog/verifiable-credentials/) 2022-02-01 Salesforce
|
||||
> Verifiable credentials and verifiable credential management technology offer a direct and secure channel between an organization and its stakeholders. Learn how they bring control over digital identity and build trust with organizations – from health credentials to college degrees.
|
||||
* [What are Verifiable Credentials? Why do they matter?](https://flur.ee/2022/01/10/what-are-verifiable-credentials-why-do-they-matter/) 2022-01-10 Fluree
|
||||
> Authority Does Not Require Centralized Power
|
||||
>
|
||||
> As mentioned in my previous article, the trouble with centralization is that data is stored in a database. Once breached, a database can yield a treasure chest of information to be sold on the dark web.
|
||||
|
||||
* [Public profile - Machine-readable, cryptographially-verifiable imprint linked to a DID](https://hackmd.io/4oZOgwFOQDSFUuu3ruN-_g)
|
||||
> a simple mechanism to provide public information concerning an entity by advertising a public profile service in the DID document of a public DID. A good analogy for this public identity information would be a machine-readable and cryptographically-verifiable imprint.
|
41
unsorted/next/unsorted.md
Normal file
41
unsorted/next/unsorted.md
Normal file
|
@ -0,0 +1,41 @@
|
|||
---
|
||||
published: false
|
||||
---
|
||||
|
||||
# Infographic
|
||||
https://twitter.com/DecentralizeID/timelines/1322735918386733057?ref_src=twsrc%5Etfw
|
||||
|
||||
* [Interesting diagram.](https://twitter.com/i3market_eu/status/1397474556839874563)
|
||||
|
||||
* [SSI Meme of the week](https://twitter.com/SSI_by_memes/status/1483519684465016833) SSI By Memes
|
||||
* [SSI Memes](https://twitter.com/SSI_by_memes/status/1486979269754601472)
|
||||
* [We need more awerness, that the acceptance of users is crucial for SSI @SSI_by_memes](https://mobile.twitter.com/SSI_by_memes/status/1538819851950628865)
|
||||
|
||||
* [SSI Architectural Stack and Community Efforts Overview](https://github.com/decentralized-identity/decentralized-identity.github.io/blob/master/assets/ssi-architectural-stack--and--community-efforts-overview.pdf) Rouven Heck
|
||||
* [TDW Decentralized Glossary Management and Collaboration Platform (TDW Glossary): Digital Identity Neighborhood](https://hyperonomy.com/2021/03/15/tdw-glossary-management-and-collaboration-platform-tdw-gmcp-digital-identity-neighborhood/) 2021-03-15
|
||||
|
||||
* [Human Authority](https://www.moxytongue.com/2022/01/human-authority.html) Moxy Marlinspike
|
||||
|
||||
* [SelfSovereignIdentity_memes @SSI_by_memes](https://twitter.com/SSI_by_memes)
|
||||
|
||||
Is anonymity good? - lets ask this wife
|
||||
|
||||
|
||||
* [Steph oceans404.eth @0ceans404](https://twitter.com/0ceans404/status/1557149888646746113) twitter
|
||||
|
||||
Self-Sovereign Identity
|
||||
|
||||
* [Fun fact](https://twitter.com/rileyphughes/status/1563195173055897602) Riley Hughes
|
||||
|
||||
The 'indy' name was originally short for "independent identity" which was a naming candidate before "self-sovereign" was settled on
|
||||
|
||||
Harrison Tang on a roll with these short videos.
|
||||
|
||||
- [#selfsovereignidentity, or #SSI, is the ultimate form of #decentralizedidentity because the power and control lie in tens of billions of person entities like you and me, not just hundreds of thousands of computer network nodes](https://twitter.com/TheCEODad/status/1562157365327118336) TheCEODad
|
||||
- [In my earlier Identity in Web3 talk, I also shared that verifiablecredentials is my favorite identity tech](https://twitter.com/TheCEODad/status/1562986842357526528) TheCEODad
|
||||
|
||||
## Infographics
|
||||
|
||||
* [Cross Community Architecture Survey](https://drive.google.com/file/d/1Cx7px2z9YslvQV1oUuumiHlpnWcsVhIl/view) implemented DID Methods and list cryptographic key types that they support
|
||||
|
||||
This next graphic comes from [Verifiable Credentials Use Cases](https://www.w3.org/TR/vc-use-cases/)
|
93
unsorted/next/w3c-ccg.md
Normal file
93
unsorted/next/w3c-ccg.md
Normal file
|
@ -0,0 +1,93 @@
|
|||
---
|
||||
published: false
|
||||
---
|
||||
# W3C - CCG
|
||||
|
||||
Digital Bazaar founder, Manu Sporney, proposed the [W3C Credentials Community Group](http://web.archive.org/web/20181206060143/https://www.w3.org/community/credentials/charter-20140808/) in 2014.
|
||||
"to forge a path for a secure, decentralized system of credentials that would empower both individual people and organizations on the Web to store, transmit, and receive digitally verifiable proof of qualifications and achievements."
|
||||
|
||||
|
||||
* [@BartHanssens shares](https://twitter.com/BartHanssens/status/1319604882068787200):
|
||||
> proofs: https://w3c-ccg.github.io/ld-proofs, cryptosuite: https://w3c-ccg.github.io/ld-cryptosuite-registry, #GnuPG: signatures https://gpg.jsld.org/contexts
|
||||
* [Open API for Interoperable Traceability](https://w3c-ccg.github.io/traceability-interop/openapi/#overview) CCG
|
||||
> `resolve:dids - Grants permission to resolve DIDsissue:credentials - Grants permission issue Verifiable Credentialsverify:credentials - Grants permission verify Verifiable Credentialsread:credentials - Grants permission to get Verifiable Credentialsupdate:credentials - Grants permission to update the status of Verifiable Credentialsprove:presentations - Grants permission to prove Verifiable Presentationsverify:presentations - Grants permission verify Verifiable Presentationssubmit:presentations - Grants permission to submit Verifiable Presentations`
|
||||
|
||||
* [We're not the only community with problems (Fwd: Open Letter to Debian election candidates about Debian vendettas)](https://lists.w3.org/Archives/Public/public-credentials/2022Mar/0127.html) Manu Sporny (Saturday, 19 March)
|
||||
> Just a reminder that these "politics" and "other-ing" isn't some weird by product of the "identity community", or DIF, or CCG, or OpenID... it's endemic in any long-lived community composed of human beings.
|
||||
>
|
||||
> It's not something you're ever rid of... it's something you manage over time;
|
||||
* [CCG Highlights](https://lists.w3.org/Archives/Public/public-credentials/)
|
||||
|
||||
|
||||
Harrison Tang, CEO of Spokeo, [is the new co-chair of the CCG](https://twitter.com/TheCEODad/status/1544884282316845057)
|
||||
|
||||
W3C CCG (World Wide Web Consortium’s Credentials Community Group) aims to explore the creation, storage, presentation, verification, and user control of credentials (i.e. a set of claims made about someone, or a person record).
|
||||
|
||||
### VC-EDU
|
||||
|
||||
* [VC-Educational Task Force](https://w3c-ccg.github.io/meetings/2022-04-18-vc-education/) VCEdu Mailing List
|
||||
> Dmitri Zagidulin: “with invisi edu here we've got two pressing problems [...] verifiable credentials that are going to be displayed in wallets but we also would like to bind them to more traditional display artifacts such as PDFs and that's what James is going to be talking about and the second one is [..] we want issuers to [...] at least advise to wallets, verifiers, and other software how to display the credential”
|
||||
|
||||
### CCG - Credentials community group
|
||||
|
||||
* [Harrison new Co-Chair of the CCG and CEO of Spokeo explaining SSI](https://twitter.com/TheCEODad/status/1545907309435428864) Harrison Tang @TheCEODad
|
||||
|
||||
Self-sovereign identity, or SSI, is basically an identity owned by you - the user. In self-sovereign identity, you control and manage the access to your information
|
||||
* [https://github.com/w3c-ccg/](https://github.com/w3c-ccg/meetings) - GitHub
|
||||
|
||||
* [https://www.w3.org/community/credentials/](https://www.w3.org/community/credentials/) - W3C Community Page
|
||||
|
||||
* [https://lists.w3.org/Archives/Public/public-credentials/](https://lists.w3.org/Archives/Public/public-credentials/) - Mailing List Arcives
|
||||
|
||||
* [https://w3c-ccg.github.io/](https://w3c-ccg.github.io/) - GItHub Pages Site
|
||||
|
||||
* [CCG 101 - Help us know what is needed!](https://lists.w3.org/Archives/Public/public-credentials/2021May/0150.html) Victor Syntez (Tuesday, 25 May)
|
||||
|
||||
I've invited you to fill out the following form:
|
||||
|
||||
CCG 101 - Help us know what’s needed!
|
||||
|
||||
To fill it out, visit:
|
||||
|
||||
* [https://docs.google.com/forms/d/e/1FAIpQLSe3OakcEg8IfWXYALg10eiii2hiLKq2vXC-yazpPk0QVzIMzQ/viewform?vc=0&c=0&w=1&flr=0&usp=mail_form_link](https://docs.google.com/forms/d/e/1FAIpQLSe3OakcEg8IfWXYALg10eiii2hiLKq2vXC-yazpPk0QVzIMzQ/viewform?vc=0&c=0&w=1&flr=0&usp=mail_form_link)
|
||||
|
||||
* [CCG updates to cgbot and scribe-tool](https://lists.w3.org/Archives/Public/public-credentials/2021May/0169.html) Manu Sporny (Sunday, 30 May)
|
||||
|
||||
New CCG infrastructure features:
|
||||
|
||||
- Auto-presence - No one is required to present+ themselves any more. The cgbot does it for us now, saving our feeble sausage fingers from being over exerted.
|
||||
- The Ryan Grant, Who We All Know And Love, Would Like To Know Where The Raw Transcripts Are Feature - When the cgbot closes out the meeting, it will let everyone in IRC know where the raw transcripts, audio, and video files are so anyone can download them and/or remix them to spread CCG propaganda. This will hopefully also save Heather from having to document yet another piece of tribal CCG knowledge.
|
||||
- The You Exist Even Though You're Not in people.json Feature - When someone is present+'d, which is anyone that joins the call now thanks to auto-presence, that person will show up in the attendees list. This achieves two things 1) the poor minutes publisher can update the people.json at their leisure instead of being blocked by it whenever a new person shows up to a call, and 2) we get a more accurate record of attendees.
|
||||
- The Fellow Jitser Invisibility Decloaker Feature - If you join the meeting with a new browser, or in Incognito mode, and you change your name from "Fellow Jister" to your preferred name, you never show up in the attendee list. People that change their names now show up in the attendee list. If you want to stay pseudonymous just give yourself an unrecognizable name... like "Robot Overlord".
|
||||
|
||||
* [...]
|
||||
|
||||
These are baby steps towards an attempt at auto-transcription and auto-publication of minutes. There are a few things that aren't automated yet (like auto-detecting the meeting name)... ETA on those upgrades is unknown since all these upgrades are on a best effort basis.
|
||||
* [https://www.w3.org/community/credentials/](https://www.w3.org/community/credentials/)
|
||||
|
||||
* [https://lists.w3.org/Archives/Public/public-credentials/](https://lists.w3.org/Archives/Public/public-credentials/)
|
||||
|
||||
* [IRC mailing list bridge](https://lists.w3.org/Archives/Public/public-credentials/2022Apr/0117.html) Charles E. Lehner (Saturday, 23 April)
|
||||
|
||||
Notifications of messages to this mailing list (public-credentials) are now sent to our IRC channel (#ccg).
|
||||
|
||||
* [re: How to contribute to new standards work? (was:Re: RDF Dataset Canonicalization - Formal Proof)](https://lists.w3.org/Archives/Public/public-credentials/2021Aug/0172.html) Manu Sporny (Tuesday, 10 August)
|
||||
|
||||
* [The CCG Work Item process is outlined here](https://docs.google.com/document/d/1vj811aUbs8GwZUNo-LIFBHafsz4rZTSnRtPv7RQaqNc/):
|
||||
|
||||
* [Here's how you get started:](https://docs.google.com/document/d/1vj811aUbs8GwZUNo-LIFBHafsz4rZTSnRtPv7RQaqNc/edit#heading=h.f28tyzjvad8g)
|
||||
|
||||
This process is open to anyone -- no W3C Membership dues, fees, etc. required to participate.
|
||||
|
||||
* [Reminder: You can present to the CCG](https://lists.w3.org/Archives/Public/public-credentials/2022Mar/0151.html)
|
||||
|
||||
This is a friendly reminder that anyone in the community that is doing something interesting that you think the community should know about whether that work is done here in the CCG or elsewhere, can email the chairs with what you want to share and we can get you on the calendar. It's best if you email all 3 chairs.
|
||||
|
||||
* [Clarity about the group charter](https://lists.w3.org/Archives/Public/public-credentials/2022Jun/0044.html) Manu Sporny (Wednesday, 22 June)
|
||||
|
||||
there are statements like: "Buy our products! We're the best!" (with nothing else that we can learn from) that is frowned upon... but, in general, even if it is a feature in one of your products, chances are that we want to hear about it if it has relevance to how we might interoperate on that feature (or use it to meet a goal of the community).
|
||||
|
||||
* [2022-2026 Verifiable Data Standards Roadmap [DRAFT]](https://lists.w3.org/Archives/Public/public-credentials/2022Mar/0068.html) Manu Sporny (Saturday, 12 March)
|
||||
|
||||

|
||||
|
65
unsorted/next/w3c.md
Normal file
65
unsorted/next/w3c.md
Normal file
|
@ -0,0 +1,65 @@
|
|||
---
|
||||
published: false
|
||||
---
|
||||
# W3C
|
||||
|
||||
### Organization
|
||||
* [W3C to become a public-interest non-profit organization](https://www.w3.org/2022/06/pressrelease-w3c-le.html.en) W3C - [Public-Credentials](https://lists.w3.org/Archives/Public/public-credentials/2022Jun/0063.html)
|
||||
> As W3C was created to address the needs of the early web, our evolution to a public-interest non-profit is not just to continue our community effort, but to mature and grow to meet the needs of the web of the future.
|
||||
* [does the CCG have any thoughts about possible changes to W3C itself?](https://lists.w3.org/Archives/Public/public-credentials/2022Apr/0067.html) Daniel Hardman (Saturday, 9 April)
|
||||
> This major organizational overhaul to the W3C is also happening at a time of unprecedented activity and change for the internet. Will the web support crypto and Web3 industry proposals? How will the web support advertising? What should be the baseline web browser security standards?
|
||||
|
||||
## Membership
|
||||
|
||||
* [Hedera Hashgraph Joins World Wide Web Consortium (W3C)](https://hedera.com/blog/hedera-hashgraph-joins-world-wide-web-consortium-w3c-new-did-method-published-by-w3c-credentials-community-group)
|
||||
> We welcome Hedera as a contributing member to the W3C DID Working Group and congratulate their team for reaching this milestone of a published implementation of the latest W3C DID Identifiers v1.0 draft,” said Ivan Herman
|
||||
* [Block Joins W3C](https://twitter.com/brockm/status/1526723285102120960) [@brockm](https://twitter.com/brockm)
|
||||
> Today, we became a member of the [@W3C](https://twitter.com/w3c), as part of our commitment to building open standards for an open web. We are committed to advancing and adopting decentralized and privacy-preserving standards for self-sovereign digital identity that benefits all. Not centralized platforms.
|
||||
|
||||
### WebAuthn
|
||||
|
||||
* [W3C WebAuthn V2 Now a Standard](https://self-issued.info/?p=2160) Mike Jones
|
||||
> While remaining compatible with the original standard, this second version adds additional features, among them for user verification enhancements, manageability, enterprise features, and an Apple attestation format. ([Recommendation](https://www.w3.org/TR/2021/REC-webauthn-2-20210408/)) ([CTAP also approaching standardization](https://self-issued.info/?p=2155).
|
||||
* [Web Authentication: An API for accessing Public Key Credentials Level 2](https://www.w3.org/TR/2021/PR-webauthn-2-20210225/). This specification defines an API enabling the creation and use of strong, attested, scoped, public key-based credentials by web applications, for the purpose of strongly authenticating users.
|
||||
* [Second Version of W3C Web Authentication (WebAuthn) advances to Proposed Recommendation (PR)](https://self-issued.info/?p=2149)
|
||||
> The World Wide Web Consortium (W3C) has published this [Proposed Recommendation (PR)](https://www.w3.org/TR/2021/PR-webauthn-2-20210225/) Level 2 specification, bringing the second version of WebAuthn one step closer to becoming a completed standard. While remaining compatible with the original standard, this second version adds additional features, among them for user verification enhancements, manageability, enterprise features, and an Apple attestation format.
|
||||
* [Near-Final Second W3C WebAuthn and FIDO2 CTAP Specifications](https://self-issued.info/?p=2143)
|
||||
> The [W3C WebAuthn](https://www.w3.org/blog/webauthn/) and [FIDO2](https://fidoalliance.org/fido2/) working groups have been busy this year preparing to finish second versions of the W3C Web Authentication (WebAuthn) and FIDO2 Client to Authenticator Protocol (CTAP) specifications
|
||||
|
||||
## DID Working Group
|
||||
|
||||
* [https://www.w3.org/2019/did-wg/](https://www.w3.org/2019/did-wg/) - Website
|
||||
* [https://lists.w3.org/Archives/Public/public-did-wg/](https://lists.w3.org/Archives/Public/public-did-wg/) - LIst Archives
|
||||
|
||||
### DID
|
||||
|
||||
* <a href="https://github.com/decentralized-identity/did-common-typescript" />/decentralized-identity/did-common-typescript</a> - A common bundle of shared code and modules for working with DIDs, DID Documents, and other DID-related activities
|
||||
|
||||
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sovereign Identity (SSI) Drummond Reed, Chief Trust Officer at Evernym, will explain in our second Webinar "Decentralized Identifiers (DIDs) - Building Block of Self-Sovereign Identity (SSI)" giving us the background on how DIDs work, where they come from and why they are important for Blockchain based Digital Identity. https://www.slideshare.net/SSIMeetup/decentralized-identifiers-dids-the-fundamental-building-block-of-selfsovereign-identity-ssi 2018-05-09
|
||||
|
||||
|
||||
* [decentralized-identity/did-common-typescript](https://github.com/decentralized-identity/did-common-typescript) 2019-05-20 - A common bundle of shared code and modules for working with DIDs, DID Documents, and other DID-related activities
|
||||
* [decentralized-identity/did-security-csharp](https://github.com/decentralized-identity/did-security-csharp) 2020-07-31 - C# implementation of DID security and privacy controls
|
||||
* [decentralized-identity/did-common-java](https://github.com/decentralized-identity/did-common-java) 2023-05-13 - Shared DID Java library.
|
||||
* [decentralized-identity/ua-web-extension](https://github.com/decentralized-identity/ua-web-extension) 2018-10-23 - Basic web extension version of a DID User Agent
|
||||
* [decentralized-identity/did-recovery](https://github.com/decentralized-identity/did-recovery) - Various methods for DID recovery
|
||||
* [decentralized-identity/web-polyfills](https://github.com/decentralized-identity/web-polyfills) - Polyfills for proposed or emerging DID-centric Web APIs
|
||||
* [decentralized-identity/http-did-auth-proxy](https://github.com/decentralized-identity/http-did-auth-proxy) - Forked from bcgov/http-did-auth-proxy
|
||||
DID Auth HTTP proxy.
|
||||
|
||||
|
||||
|
||||
### Verifiable Credentials
|
||||
|
||||
* [Essential Services Delivery coordination using Digitally Verifiable Credentials](https://github.com/bcgov/essential-services-delivery)
|
||||
> This repository contains the build, deployment, and application configurations needed to pull a number of separate applications into a single environment and deploy them as a group of interrelated services.
|
||||
* [bcgov/vc-visual-verifier](https://github.com/bcgov/vc-visual-verifier) - Verifiable Credential Visual Verifier
|
||||
* [Verifiable Credential Authentication with OpenID Connect (VC-AuthN OIDC)](https://github.com/bcgov/vc-authn-oidc)
|
||||
> The integration this document defines is how holders of verifiable credentials can leverage these to authenticate with parties. Note, how the holder became in possession of supported verifiable credentials is out of scope for this integration.
|
||||
>
|
||||
> Like any new technology there is adoption required of new concepts, this particular integration aims to provide an easy integration path that allows parties to start leveraging the power of verifiable credentials for user authentication in a non-disruptive fashion. This is achieved by extending the vastly popular OpenID Connect family of specifications.
|
||||
|
||||
<iframe src="//www.slideshare.net/slideshow/embed_code/key/2FQiXCaqgTJvrQ" width="595" height="485" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" style="border:1px solid #CCC; border-width:1px; margin-bottom:5px; max-width: 100%;" allowfullscreen> </iframe>
|
||||
|
||||
[Verifiable Credentials 101 for SSI and Decentralized Digital Identity - Tyler Ruff](https://www.slideshare.net/SSIMeetup/verifiable-credentials-101-for-ssi-and-decentralized-digital-identity-tyler-ruff)
|
||||
|
67
unsorted/next/web5.md
Normal file
67
unsorted/next/web5.md
Normal file
|
@ -0,0 +1,67 @@
|
|||
---
|
||||
published: false
|
||||
---
|
||||
# Web5 (new marketing)
|
||||
|
||||
* [JACK DORSEY’S TBD PRESENTS BITCOIN-BASED DECENTRALIZED WEB5](https://bitcoinmagazine.com/business/jack-dorseys-tbd-presents-bitcoin-based-decentralized-web5) Bitcoin Magazine
|
||||
|
||||
Fairly decentralized developments in the internet over the past couple of decades such as [BitTorrent](https://www.howtogeek.com/141257/htg-explains-how-does-bittorrent-work/) and [Tor](https://www.techradar.com/vpn/what-is-tor-and-how-does-it-work) have shown that blockchain technology is not a necessary component for decentralization.
|
||||
|
||||
* [Namcios · Jun 10](https://twitter.com/namcios/status/1535302090360250368)
|
||||
|
||||
1/ Jack Dorsey’s [@TBD54566975](https://twitter.com/TBD54566975) unit has just announced it is building “Web5”. [...] Here’s a thread with all you need to know
|
||||
|
||||
* [...]
|
||||
|
||||
6/ Self-Sovereign Identity Service (SSIS). The SSIS interacts with Verifiable Credentials by creating, signing, issuing, curating, requesting, revoking, exchanging, validating and verifying them. It wraps the next component on the list, the self-sovereign identity SDK…
|
||||
|
||||
* […]
|
||||
|
||||
7/ The ssi-sdk encapsulates self-sovereign identity standards.
|
||||
|
||||
* [What Even Is Web5?](https://www.forbes.com/sites/traceyfollows/2022/06/11/what-even-is-web5/?sh=10900ec05ad2) Forbes 2022-06-11
|
||||
|
||||
The actual definition given in the TBD [presentation pack](https://docs.google.com/presentation/d/1SaHGyY9TjPg4a0VNLCsfchoVG1yU3ffTDsPRcU99H1E/edit#slide=id.g11b904107df_0_1) is as follows: “Web5 is a Decentralized Web Platform that enables developers to leverage Decentralized Identifiers, Verifiable Credentials, and Decentralized Web Nodes to write Decentralized Web Apps, returning ownership and control over identity and data to individuals”
|
||||
|
||||
* [introducing tbDEX](https://tbd54566975.ghost.io/introducing-tbdex/) TBD (featured in Identosphere #61)
|
||||
|
||||
We propose a solution that does not rely on a federation to control permission or access to the network; nor does it dictate the level of trust required between counterparties.
|
||||
|
||||
* [Web5 — The Niche Tech Solves The Niche Problem](https://medium.com/umbalametaverse/web5-the-niche-tech-solves-the-niche-problem-f9135d98f0c1) Umbala Wolves
|
||||
|
||||
Web 5 is based on four primary technological pillars in order to realize the goal of building a genuinely decentralized web platform, including:
|
||||
|
||||
- Decentralized Identifiers (DIDs)
|
||||
- Verifiable credentials (VCs)
|
||||
- Decentralized Web Nodes (DWNs)
|
||||
- Self-Sovereign Identity Service (SSIS)
|
||||
|
||||
|
||||
* [What is Web5? - TBD](https://developer.tbd.website/blog/what-is-web5/)
|
||||
|
||||
|
||||
* [How to get started learning web5](https://www.nathangould.com/posts/how-to-get-started-learning-web5/) Nathan Gould
|
||||
|
||||
Web3 has already shown us one potential solution to web2's data portability problem. By using the public blockchain as a sort of global storage layer, web3 applications allow users to bring their data with them from one application to the next. No more onboarding forms -- just "Connect with Metamask" and you're done.
|
||||
|
||||
* [Web5 Roadmap](https://developer.tbd.website/blog/web5-roadmap) TBD
|
||||
|
||||
Our major deliverables include:
|
||||
|
||||
- Decentralized Identifier network node on production and publicly available
|
||||
- Decentralized Web Node on production and publicly available
|
||||
- Verifiable Credential service on production and available to partners
|
||||
- Decentralized Web Platform client/server SDK with all components bundled in a single package
|
||||
- Wallet in publicly usable state across Web, desktop and mobile
|
||||
- Decentralized Web Application runtime ready for developer reliance
|
||||
|
||||
* [Web3, Web5 & SSI](https://rufftimo.medium.com/web3-web5-ssi-3870c298c7b4) Timothy Ruff
|
||||
|
||||
Why the SSI community should escape Web3 and follow Jack Dorsey and Block into a Web5 big tent, with a common singular goal: the autonomous control of authentic data and relationships.
|
||||
|
||||
- [What is Web5?](https://rufftimo.medium.com/what-is-web5-fb34f48d0b1b) Timothy Ruff
|
||||
|
||||
|
||||
* [Zero Trust, Web5, and GLEIF’s vLEI](https://rufftimo.medium.com/zero-trust-web5-and-gleifs-vlei-63ffcb800028) Timothy Ruff
|
||||
|
||||
In an email exchange during the last 72 hours, Sam opined about the [McKinsey Technology Trends Report for 2022](https://www.mckinsey.com/capabilities/mckinsey-digital/our-insights/the-top-trends-in-tech) (the full report), which strongly touts both self-sovereign identity (SSI) — which I now believe should be considered as part of [Web5](https://rufftimo.medium.com/what-is-web5-fb34f48d0b1b) — and [zero trust architecture](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207.pdf) (ZTA). As happens often, I found Sam’s private comments insightful, but this time so much so that I’m making them immediately public, with his permission.
|
Loading…
Add table
Add a link
Reference in a new issue