mirror of
https://github.com/Decentralized-ID/decentralized-id.github.io.git
synced 2024-12-24 06:39:31 -05:00
sort \ add dates where in url
This commit is contained in:
parent
0ee721274a
commit
f058e7a746
@ -43,12 +43,13 @@ last_modified_at: 2023-06-08
|
||||
* [Blockchain and the GDPR](https://www.eublockchainforum.eu/sites/default/files/reports/20181016_report_gdpr.pdf) 2018-10-16 EU Blockchain Forum
|
||||
> as this paper will explain, GDPR compliance is not about the technology, it is about how the technology is used. Just like there is no Gdpr-compliant Internet, or GDPR-compliant artificial intelligence algorithm, there is no such thing as a GDPR-compliant blockchain technology. There are only GDPR-compliant use cases and applications.
|
||||
* [GDPR - A reflection on the 'self-sovereign identity' and the Blockchain](https://www.linkedin.com/pulse/gdpr-reflection-self-sovereign-identity-blockchain-nicolas-ameye/) 2018-02-11 Nicolas Ameye
|
||||
> The GDPR, while being technology-neutral by nature, is articulated around the idea that personal data are being stewarded by centralized authorities.
|
||||
> The GDPR is taking for granted a centralized identity model, meaning a centralized model of digital data storage and transmission. Those centralized models of digital data storage are relying on the principles that the data custodians are trustworthy and are mandated to steward personal data. The GDPR, while being technology-neutral by nature, is articulated around the idea that personal data are being stewarded by centralized authorities.
|
||||
* [When GDPR Becomes Real, and Blockchain is no longer fairydust](https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust-fall2017/blob/master/final-documents/gdpr.md) by Marta Piekarska (Linux Foundation), Michael Lodder (Evernym), Zachary Larson (Economic Space Agency), Kaliya Young (Identity Woman)
|
||||
> Following the implementation date of May 25, 2018, managing data will be both toxic and expensive. Many precious resources will be required for improving and maintaining the security, privacy, and governance of personal data. Methods for storing less personal data will ease the burden of GDPR compliance. This document describes the GDPR requirements and the different approaches to digital identity solutions and finally explains why distributed ledger technology may offer an opportunity for enterprises to simplify data management solutions that are GDPR compliant.
|
||||
|
||||
[![](https://i.imgur.com/HADdi6N.jpg)](https://www.eublockchainforum.eu/sites/default/files/reports/20181016_report_gdpr.pdf)
|
||||
|
||||
|
||||
### Privacy by Design
|
||||
|
||||
Privacy by Design means that privacy should be considered from the very beginning, when designing a product. [Article 25](https://iapp.org/resources/article/the-eu-general-data-protection-regulation/#A25) of the GDPR requires “data protection by design; data controllers must put technical and organisational measures such as pseudonymisation in place — to minimise personal data processing.”
|
||||
|
@ -37,6 +37,8 @@ last_modified_at: 2023-06-08
|
||||
> The uptake of eIDAS (facilitating cross-border acceptance of eIDs) is low relative to the technical capacity of states; [only 15 of the 27 Member States](https://op.europa.eu/en/publication-detail/-/publication/35274ac3-cd1b-11ea-adf7-01aa75ed71a1) able to fulfil the regulation’s requirements of accepting the eIDs of other Member States for public services.
|
||||
>
|
||||
> The EU Commission did reflect on the effectiveness of the regulation in its [Impact Assessment](https://op.europa.eu/en/publication-detail/-/publication/35274ac3-cd1b-11ea-adf7-01aa75ed71a1), and is developing a revision of it. There are multiple revision options being discussed, but thus far, the preferred option would establish a framework that provides citizens with optional use of a personal digital wallet
|
||||
* [Analyst Chat #134: How Self-Sovereign Identities Will Influence Public Services](https://www.kuppingercole.com/watch/self-sovereign-identities-public-services) 2022-07-25 KuppingerCole
|
||||
> Europe is on a "Path to a Digital Decade", which envisions 80% of EU citizens using a digital ID card by 2030. A part of that journey will be self-sovereign identities. Research Analyst Alejandro Leal joins Matthias to continue their discussion on the digital transformation in public services. Self-sovereign identities, the new eIDAS regulation, and the impact of both on how interactions between citizens and the state will change, are a controversial topic in the public discussion as well.
|
||||
* [eIDAS and Self-Sovereign Identity](https://www.thedinglegroup.com/blog/2021/3/11/eidas-and-self-sovereign-identity) 2021-03-11 ([Video](https://vimeo.com/522501200) Dingle Group
|
||||
> Why then is eIDAS v1 not seen as a success? There are many reasons; from parts of the regulation that focused or constrained its use into the public sphere only, to the lack of total coverage across all of the EU. Likely the key missing piece was that the cultural climate was not yet ripe and the state of digital identity was really not ready. Too many technical problems were yet to be solved. Without these elements the realized state of eIDAS should not be unexpected. All this said, eIDAS v1 laid very important groundwork and created an environment to gather important learnings to allow eIDAS v2 to realize the hoped for levels of success and adoption.
|
||||
|
||||
@ -52,8 +54,10 @@ last_modified_at: 2023-06-08
|
||||
> The European Commission developed the [SSI (Self-Sovereign Identity) eIDAS bridge](https://joinup.ec.europa.eu/collection/ssi-eidas-bridge), an ISA2 funded initiative, to promote eIDAS as a trust framework for the SSI ecosystem. It assists a VC (Verifiable Credential) issuer in the signing process, and helps the verifier to automate the identification of the organization behind the issuer’s DID (Decentralized Identifier)
|
||||
|
||||
|
||||
#### eIDAS 2.0
|
||||
## eIDAS 2.0
|
||||
|
||||
- [eIDAS 2.0 - Introduction to The European Digital Identity Wallet & The Evolution of Self-Sovereign Identity](https://utimaco.com/current-topics/blog/eidas-2-the-european-digital-identity-wallet) 2022-08-18
|
||||
> Until now, the [eIDAS regulation](https://www.legislation.gov.uk/eur/2014/910/contents) has only focused on online identification. However, the new proposal – eIDAS 2.0 – aims to extend identity to the world of physical services which can be accessed from anywhere around the globe.
|
||||
* [EIDAS 2.0 Turns To Self-Sovereign Identification To Bring Users Ownership And Control](https://www.forbes.com/sites/alastairjohnson/2022/07/05/eidas-20-turns-to-self-sovereign-identification-to-bring-users-ownership-and-control/?sh=853aa7f7f07e) 2022-07-05 Forbes
|
||||
> The new proposal will pivot on some of the more key issues that held back the original framework. For example, instead of enforcing a single, rigid ID that openly reveals everything about an individual indefinitely, the eIDAS 2.0 structure can now potentially employ a flexible, self-sovereign identity (SSI) that puts control of all identifying information entirely into the hands of the end-users they pertain to, in both public and private partnership frameworks.
|
||||
* [Avast’s views on the proposed amendments to the eIDAS 2.0 regulation](https://blog.avast.com/eidas-2.0-amendments-analysis) 2022-06-17 Avast
|
||||
@ -64,7 +68,7 @@ last_modified_at: 2023-06-08
|
||||
> on the proposal for a regulation of the European Parliament and of the Council
|
||||
amending Regulation (EU) No 910/2014 as regards establishing a framework for a European Digital Identity
|
||||
|
||||
#### EU Digital Identity Framework
|
||||
## EU Digital Identity Framework
|
||||
|
||||
* [European Digital Identity Architecture and Reference Framework – Outline](https://digital-strategy.ec.europa.eu/en/library/european-digital-identity-architecture-and-reference-framework-outline) 2022-02-22
|
||||
> The present [outline](https://futurium.ec.europa.eu/en/digital-identity/toolbox) provides a summary description of the eIDAS expert group’s understanding of the EUDI Wallet concept including:
|
||||
@ -82,7 +86,7 @@ amending Regulation (EU) No 910/2014 as regards establishing a framework for a E
|
||||
* [Germany and Spain and join forces on the development of a cross-border, decentralised digital identity ecosystem](https://www.bundesregierung.de/breg-de/aktuelles/germany-and-spain-and-join-forces-on-the-development-of-a-cross-border-decentralised-digital-identity-ecosystem-1947302) 2021-07-29
|
||||
> The cooperation agreement envisages the design and conceptualisation of a cross-border pilot to be implemented in the near future, with a view to contributing to the development of the European Union’s Digital Identity Framework, recently announced as part of the eIDAS Commission proposal.
|
||||
|
||||
#### EU Digital Identity Wallet
|
||||
## EU Digital Identity Wallet
|
||||
|
||||
* [Two in three Europeans intend to use the EU's Digital Identity Wallet](https://www.nfcw.com/2022/06/08/377379/two-in-three-europeans-intend-to-use-the-eus-digital-identity-wallet/) 2022-06-08 NFCW
|
||||
> “The results of the survey certainly underline the need for this pioneering European initiative aiming at offering the most convenient user experience (UX) at the highest level of security,” the company adds
|
||||
|
@ -24,6 +24,8 @@ toc: FALSE
|
||||
> The Global Legal Entity Identifier Foundation (GLEIF) is the umbrella body that delegates responsibility for issuing LEIs to local organizations. It’s such a pressing issue that it was raised by the OECD and B20 (G20 business) just three months ago when they suggested a Global Value Chain (GVC) Passport.
|
||||
- [NEWS: GLEIF and Evernym Demo ‘Organization Wallets’ to Deliver Trust and Transparency in Digital Business](https://id-bulletin.com/2020/06/04/news-gleif-and-evernym-demo-organization-wallets-to-deliver-trust-and-transparency-in-digital-business/)
|
||||
> These credentials can be used to securely identify authorised representatives when they execute an increasing number of digital business activities, such as approving business transactions and contracts, including client onboarding, transacting within import/export and supply chain business networks and submitting regulatory filings and reports.
|
||||
* [The LEI: A Swiss Army Knife for the World’s Digital Economy](https://www.gleif.org/en/newsroom/blog/the-lei-a-swiss-army-knife-for-the-worlds-digital-economy) 2021-06-18 GLEIF
|
||||
> The LEI’s legacy is proudly rooted in financial services and regulation. Its future, however, undeniably points beyond to broader, digitized adoption and utilization across public and private sectors around the world. The Global LEI System is the only open, commercially neutral, and regulatory endorsed system capable of establishing digitized trust between all legal entities everywhere. It was established as a public good, and GLEIF remains committed to ensuring that every last drop of value is wrung from the system, and used to the benefit of all.
|
||||
|
||||
## Organization
|
||||
|
||||
|
11
unsorted/assorted/cbdc.md
Normal file
11
unsorted/assorted/cbdc.md
Normal file
@ -0,0 +1,11 @@
|
||||
---
|
||||
published: false
|
||||
---
|
||||
|
||||
### CBDC
|
||||
* [Why CBDCs will likely be ID-based](https://www.ft.com/content/88f47c48-97fe-4df3-854e-0d404a3a5f9a)
|
||||
|
||||
Central banks are realising CBDCs will have to be intimately linked to identity to deal with illicit finance and bank disintermediation risk
|
||||
* [New Video: MetaMUI SSID](https://sovereignwallet.medium.com/new-video-metamui-ssid-8bcef6281cf3) Sovereign Wallet
|
||||
|
||||
MetaMUI SSID is the world’s first true Self-Sovereign Identity Application that enables running Blockchain-Based E-Government System, and CBDC payments on top of MetaMUI Blockchain.
|
@ -87,7 +87,7 @@ Short promo User Journey videos
|
||||
sideos is a simple data ecosystem backed by a new web standard: self-sovereign identity, or SSI.
|
||||
|
||||
### Wider Team
|
||||
* [Wider’s High Assurance Digital Identity Maturity Model](https://wider.team/2021/06/20/widers-high-assurance-digital-identity-maturity-model/) Wider Team
|
||||
* [Wider’s High Assurance Digital Identity Maturity Model](https://wider.team/2021/06/20/widers-high-assurance-digital-identity-maturity-model/) Wider Team 2021-06-20
|
||||
|
||||
It starts with IdentityOps embracing high assurance for connected devices. You’re bringing together internal stakeholders from your network management, security, procurement, legal, and device care teams. You’re bringing in clinical outcome quality professionals concerned with data provenance, from clinicians who touch your devices and authenticate through them and authorize them to provide services.
|
||||
|
||||
@ -117,14 +117,14 @@ Gimly ID is leading self-sovereign identity innovation, with the implementation
|
||||
### Mobix
|
||||
|
||||
|
||||
* [The Role of SSI in MOBIX’ Deep Parking](https://mobix.ai/2021/09/02/ssi-for-mobix-deep-parking/)
|
||||
* [The Role of SSI in MOBIX’ Deep Parking](https://mobix.ai/2021/09/02/ssi-for-mobix-deep-parking/) 2021-09-02
|
||||
*
|
||||
### Digime
|
||||
* [Talking tech and discussing data on the ‘Tech-Entrepreneur-on-a-Mission’ Podcast](https://blog.digi.me/2021/10/06/talking-tech-and-discussing-data-on-the-tech-entrepreneur-on-a-mission-podcast/) Digi.Me
|
||||
* [Talking tech and discussing data on the ‘Tech-Entrepreneur-on-a-Mission’ Podcast](https://blog.digi.me/2021/10/06/talking-tech-and-discussing-data-on-the-tech-entrepreneur-on-a-mission-podcast/) Digi.Me 2021-10-06
|
||||
|
||||
Julian describes digi.me’s mission of empowering people with their personal data, as individuals know where all their data is, while they also have “a right for that data”. By having that knowledge and ownership, only individuals have “unlimited usage rights” to unlock the potential data has to be a force for good.
|
||||
|
||||
* [Businesses need to ‘mind the trust gap’ so users don’t need to sacrifice privacy, MEF Global Consumer Trust Survey finds](https://blog.digi.me/2021/05/20/businesses-need-to-mind-the-trust-gap-so-users-dont-need-to-sacrifice-privacy-mef-global-consumer-trust-survey-finds/) DigiMe
|
||||
* [Businesses need to ‘mind the trust gap’ so users don’t need to sacrifice privacy, MEF Global Consumer Trust Survey finds](https://blog.digi.me/2021/05/20/businesses-need-to-mind-the-trust-gap-so-users-dont-need-to-sacrifice-privacy-mef-global-consumer-trust-survey-finds/) DigiMe 2021-05-20
|
||||
|
||||
Key findings from the report are:
|
||||
|
||||
@ -148,7 +148,7 @@ Key findings from the report are:
|
||||
This isn’t Swisscom Blockchain’s first identity partnership. It also has a relationship with [Adresta](https://www.ledgerinsights.com/swiss-watch-identity-startup-adresta-partners-with-swisscom-blockchain/), which developed a digital identity solution for watches.
|
||||
|
||||
### Merit
|
||||
* [Merit grabs $50M Series B to expand digital credentials platform](https://techcrunch.com/2022/01/12/merit-grabs-50m-series-b-to-expand-digital-credentials-platform/) TechCrunch
|
||||
* [Merit grabs $50M Series B to expand digital credentials platform](https://techcrunch.com/2022/01/12/merit-grabs-50m-series-b-to-expand-digital-credentials-platform/) TechCrunch 2022-01-12
|
||||
|
||||
The company spent the last five years working with various governments to build connectors to these licensing databases to allow third parties to access the data and have it update automatically. So if you are a plumbing company, you can display your employees’ plumbing credentials on the company website and have them update automatically when the license is renewed (or show that it wasn’t).
|
||||
|
||||
|
@ -17,7 +17,7 @@ Our #IAM #VendorManagement database just exceeded the 100 entries threshold!
|
||||
* [Identos builds Verifiable Credentials into updated federated digital ID API](https://www.biometricupdate.com/202209/identos-builds-verifiable-credentials-into-updated-federated-digital-id-api) Biometric Update
|
||||
|
||||
The new FPX Junction cloud software suite is designed for fine-grained API authorization and user-centric digital identity management. The digital wallet and user-managed access 2.0 authorization server work together to enable single-sign on federation. An optional user interface SDK for the digital wallet provides native mobile and web support.
|
||||
* [IDENTOS puts developers first in its latest product release](https://www.identos.com/2022/09/07/identos-puts-developers-first-in-its-latest-product-release/)
|
||||
* [IDENTOS puts developers first in its latest product release](https://www.identos.com/2022/09/07/identos-puts-developers-first-in-its-latest-product-release/) 2022-09-07
|
||||
|
||||
FPX Junction is a cloud-based set of software products which provide fine-grained API authorization and user centric identity management capabilities.
|
||||
|
||||
@ -25,7 +25,7 @@ Verifiable Credentials Support – Evolving to support Verifiable Credentials, F
|
||||
|
||||
### Forgerock
|
||||
|
||||
* [ForgeRock goes public](https://ludopoitou.com/2021/09/16/we-did-it/)
|
||||
* [ForgeRock goes public](https://ludopoitou.com/2021/09/16/we-did-it/) 2021-09-16
|
||||
Today is an huge milestone for ForgeRock. We are becoming a public company, with our stock publicly traded under the “FORG” symbol, at the New York Stock Exchange.
|
||||
* [IAM 101 Series: What Are Directory Services?](https://www.forgerock.com/blog/iam-101-series-what-are-directory-services) Forgerock
|
||||
|
||||
@ -72,7 +72,7 @@ The way many businesses have traditionally implemented KYC is by taking a manual
|
||||
|
||||
### FLexID
|
||||
|
||||
* [FlexID gets Algorand funding to offer self-sovereign IDs to Africa’s unbanked](https://techcrunch.com/2022/05/26/zimbabwe-flexid-algorand-funding-decentralized-identity/) TechCrunch
|
||||
* [FlexID gets Algorand funding to offer self-sovereign IDs to Africa’s unbanked](https://techcrunch.com/2022/05/26/zimbabwe-flexid-algorand-funding-decentralized-identity/) TechCrunch 2022-05-26
|
||||
|
||||
FlexID is giving users a blockchain wallet that stores their verificable credentials. Verification is done on-chain through Algorand, which bills itself as a solution to the [blockchain trilemma](https://www.google.com/search?q=algorand+trilemma&oq=algorand+trilem&aqs=chrome.0.0i512j69i57j0i390.2391j0j9&sourceid=chrome&ie=UTF-8) of security, scalability and decentralization. FlexID will also be integrating with other Algorand decentralized apps (dApps).
|
||||
|
||||
|
@ -5,7 +5,7 @@ published: false
|
||||
# Winners
|
||||
* [NGIatlantic.eu third Open Call: applications and winning proposals!](https://ngiatlantic.eu/news/ngiatlanticeu-third-open-call-applications-and-winning-proposals)
|
||||
|
||||
* [Digi.me is a Health Tech Challengers finalist!](https://blog.digi.me/2021/10/05/digi-me-is-a-health-tech-challengers-finalist/)
|
||||
* [Digi.me is a Health Tech Challengers finalist!](https://blog.digi.me/2021/10/05/digi-me-is-a-health-tech-challengers-finalist/) 2021-10-05
|
||||
|
||||
Digi.me has been specifically designed to solve the current complexities and challenges around data mobility, which include difficulty of sourcing, variable quality, multiple incompatible formats and the need to apply complex and extensive data analytics to gain insights.
|
||||
|
||||
|
19
unsorted/assorted/democracy-earth.md
Normal file
19
unsorted/assorted/democracy-earth.md
Normal file
@ -0,0 +1,19 @@
|
||||
---
|
||||
published: false
|
||||
---
|
||||
# Democracy Earth
|
||||
|
||||
|
||||
## Democracy Earth
|
||||
|
||||
![](https://i.imgur.com/KxbXb1t.png)
|
||||
|
||||
* [Democracy Earth Foundation](http://democracy.earth/) [[**G**](https://github.com/DemocracyEarth/)][[**B**](https://words.democracy.earth/)][[**T**](https://twitter.com/DemocracyEarth)][[**C**](http://chat.democracy.earth/)] - Crypto Governance
|
||||
* [Sovereign](http://sovereign.software/)[[**G**](https://github.com/DemocracyEarth/sovereign)], a blockchain direct democracy tool using "vote" tokens to grant democratic participation rights to every human. A proof-of-individuality (POI) process based on peer-to-peer validation establishes that a self-sovereign identity is uniquely tied to a single person. Cooperation is happening with other decentralized identity initiatives such as Blockstack and uPort.
|
||||
* [The Social Smart Contract](https://github.com/DemocracyEarth/paper#The_Social_Smart_Contract)[[**ϟ**](https://www.dropbox.com/s/sifogl4zimwkkei/Democracy%20Earth%20-%20Social%20Smart%20Contract%20-%20Paper%20v0.2.pdf?dl=0)] An Initial Rights Offering from Democracy Earth Foundation.
|
||||
* [December App-Mining Results](https://words.democracy.earth/decembers-app-mining-results-are-live-7bd2b4f2390)
|
||||
* [Yellow Jackets on the Sovereign Platform](https://words.democracy.earth/yellow-jackets-on-the-sovereign-platform-bdebe6d62ae1)
|
||||
* [Meet the Dad Who Registered His Daughter’s Birth on the Blockchain](https://www.coindesk.com/meet-the-dad-who-registered-his-daughters-birth-on-the-blockchain) [[**ϟ**](https://www.coindesk.com/humans-on-the-blockchain-why-crypto-is-the-best-defense-against-ai-overlords)]
|
||||
* Token: [Sale](https://token.democracy.earth/) • [Economics](https://www.dropbox.com/s/8q35dvht2hkfvqa/Democracy%20Earth%20-%20Token%20Economics.pdf?dl=0) • [testnet](https://votest.democracy.earth/)
|
||||
>we worked with councils, senates, non profits, student centers, political parties, corporations.. but implementing real digital governance at scale really took off with crypto networks. our partnership with @blockstack is our biggest milestone of 2018. -[Santi](https://twitter.com/santisiri/status/1076259390154592256)
|
||||
|
@ -1,65 +0,0 @@
|
||||
---
|
||||
published: false
|
||||
---
|
||||
|
||||
# Identosphere Special | European Identity and Cloud Conference 2022 5/10-13
|
||||
|
||||
Go to Kuppinger Cole for [ON-DEMAND ACCESS](https://www.kuppingercole.com/book/eic2022)
|
||||
|
||||
![https://www.notion.soimages/image3.png](https://www.notion.soimages/image3.png)
|
||||
|
||||
## Blog Posts
|
||||
|
||||
* [Impressions from the EIC Conference 2022](https://www.kuppingercole.com/watch/eic2022-impressions) Kuppinger Cole (EIC Trailer)
|
||||
|
||||
* [@EIC2022 Centralized & Decentralized Identity converging](https://www.linkedin.com/pulse/eic2022-centralized-decentralized-identity-converging-kuppinger/) Martin Kuppinger
|
||||
|
||||
For me, the most relevant new topic and trend was to finally see the convergence of decentralized identities (DID) and traditional approaches on IAM starting. DID, also referred to as SSI (Self Sovereign Identity) or verifiable credentials, is a concept where the user has a wallet that holds proofs of identities and attributes.
|
||||
|
||||
|
||||
* [What the EIC Decentralized Identity Award Means For Indicio](https://indicio.tech/what-the-eic-decentralized-identity-award-means-for-indicio/) Indico
|
||||
|
||||
it could provide definitive proof of a person’s Covid test status without airlines having to integrate with centralized databases of health data, a path mired in complexity and legal liability. It could allow passengers to use this proof in a way that protected their privacy.
|
||||
|
||||
* [EIC Keynote 2022 — The Value Paradox: The 3 Inflections of IGA](https://www.youtube.com/watch?v=ejA_YoyhrBg) Jackson Shaw
|
||||
|
||||
Explore the inflection points of identity governance and administration (IGA) through modern history with Jackson Shaw at the 2022 European Identity & Cloud Conference (EIC) hosted by KuppingerCole.
|
||||
|
||||
* [ABB Honored with an EIC Award for Excellence in Enterprise IAM](https://blog.clearskye.com/abb-honored-with-an-eic-award-for-excellence-in-enterprise-iam) Clearskye
|
||||
|
||||
ABB is being honored for its Global IAM initiative, established to improve security, compliance, and operations, and ensure access management is properly overseen. But with operations in over 100 countries,180,000 employees,13,000 servers, 6,500 applications, hundreds of HR systems, and a complex Active Directory implementation, this is not an easy undertaking.
|
||||
|
||||
|
||||
|
||||
|
||||
## Tweeters
|
||||
|
||||
Tweet from EIC By [Tatsuo Kudo](https://twitter.com/tkudos/status/1525039878911713282)
|
||||
|
||||
![https://www.notion.soimages/image1.png](https://www.notion.soimages/image1.png)
|
||||
|
||||
* [Vittorio @vibronet](https://twitter.com/vibronet/status/1523948063697551362)
|
||||
|
||||
The
|
||||
|
||||
* [@kuppingercole](https://twitter.com/kuppingercole)
|
||||
|
||||
* EiC2022
|
||||
|
||||
keynote room - in “David, I can’t let you do that” style visualization
|
||||
|
||||
![https://www.notion.soimages/image2.png](https://www.notion.soimages/image2.png)
|
||||
|
||||
* [Atul Tulshibagwale](https://twitter.com/zirotrust/status/1523944752516845573)
|
||||
|
||||
Answering the #privacy question asked in [@timcappalli](https://twitter.com/timcappalli)'s #sse token revocation talk at the #EiC2022 - read this OpenID blog post to know how privacy can be protected in SSE
|
||||
|
||||
* [Shared Signals: An Open Standard for Webhooks](https://openid.net/2021/08/24/shared-signals-an-open-standard-for-webhooks/)
|
||||
|
||||
defines stream-based communication mechanisms between Transmitters that generate events and Receivers that consume them. It defines an Event Stream Management API for obtaining the Transmitter configuration: Which events it supports, how they can be verified, and where it sends them to the receiver.
|
||||
|
||||
* [@styrainc 12:02 PM · May 11, 2022](https://twitter.com/styrainc/status/1524419573096800257)
|
||||
|
||||
“[@OpenPolicyAgent](https://twitter.com/OpenPolicyAgent) has become the standard for policy-based access and externalized #Authorization”. A great takeaway from the intro to #OPA for multi-cloud policy and process portability session at #EIC2022.
|
||||
|
||||
## 🎉Thanks for Supporting Identosphere’s Weekly🎉
|
@ -39,7 +39,7 @@ We also have [IIW33 set now as a virtual event October 12-14](https://www.event
|
||||
* [Vienna Digital Identity Meetup](https://www.meetup.com/Vienna-Digital-Identity-Meetup/)
|
||||
|
||||
Recap
|
||||
* [Bridging to Self-Sovereign Identity](https://www.thedinglegroup.com/blog/2020/10/28/bridging-to-self-sovereign-identity)
|
||||
* [Bridging to Self-Sovereign Identity](https://www.thedinglegroup.com/blog/2020/10/28/bridging-to-self-sovereign-identity) 2020-10-28
|
||||
|
||||
* [two presenters](https://vimeo.com/472937478). One showing a Korean effort associated with the DID:Alliance/GADI *(problematic but worth understanding)*. The 2nd presentation was by Mike Vesey from IdRamp talking about their work integrating DIDs & VC with the enterprise systems.
|
||||
|
||||
@ -259,14 +259,14 @@ Xavier Vale of Validated ID and Dr. Ignacio Alamillo of Astrea covered the tech
|
||||
|
||||
* [Data Ownership and Self-Sovereign Identity by Cryptonics](https://www.crowdcast.io/e/cryptonicsmeetup/register) March 10th
|
||||
* [Consumer Identity Management Evolution](https://www.kuppingercole.com/events/ciam-evolution) April 20, 2021
|
||||
* [Registration - OpenID Foundation Virtual Workshop](https://openid.net/2021/03/01/registration-open-for-openid-foundation-virtual-workshop-april-29-2021/) April 29, 2021
|
||||
* [Registration - OpenID Foundation Virtual Workshop](https://openid.net/2021/03/01/registration-open-for-openid-foundation-virtual-workshop-april-29-2021/) April 29, 2021 2021-03-01
|
||||
* [Aries Mobile Agent & Demonstration by GlobaliD Demo](https://www.meetup.com/en-AU/indicio-identity-community/events/276745615/) • March 24
|
||||
* [GS1 US Innovation Summit](https://web.cvent.com/event/5c5e5d0e-08b5-49f9-8f5e-c115c031b729/summary) • March 30
|
||||
* [Lifelong Learner Project, Powered by Teachers](https://www.eventbrite.com/e/the-lifelong-learner-project-powered-by-teachers-tickets-144712082735) • March 31
|
||||
* [PoCATHON](https://affinidipocathon.devpost.com/) by Affiniti • Mar 26 – May 9, 2021
|
||||
* [Covid-19 Technology Innovations • April 14](https://summit.digitalscot.live/talks/covid-19-technology-innovations/)
|
||||
* [Internet Identity Workshop XXXII (#32)](https://www.eventbrite.com/e/internet-identity-workshop-iiwxxxii-32-2021a-tickets-131551119941) • April 20-22
|
||||
* [OpenID Foundation Virtual Workshop](https://openid.net/2021/03/01/registration-open-for-openid-foundation-virtual-workshop-april-29-2021/) • April 29, 2021
|
||||
* [OpenID Foundation Virtual Workshop](https://openid.net/2021/03/01/registration-open-for-openid-foundation-virtual-workshop-april-29-2021/) • April 29, 2021 2021-03-01
|
||||
* [Identiverse 2021](https://identiverse.com/) June 21-23 • Denver, co
|
||||
* [Meetup with Indicio to explore decentralized identity](https://indicio.tech/blog/meetup-with-indicio-to-explore-decentralized-identity/)
|
||||
|
||||
@ -294,7 +294,7 @@ Inspiring keynotes. Hands-on training with experts. Oktane21 is the place to lea
|
||||
|
||||
* [Internet Identity Workshop XXXII (#32)](https://www.eventbrite.com/e/internet-identity-workshop-iiwxxxii-32-2021a-tickets-131551119941) • April 20-22
|
||||
|
||||
* [OpenID Foundation Virtual Workshop](https://openid.net/2021/03/01/registration-open-for-openid-foundation-virtual-workshop-april-29-2021/) • April 29, 2021
|
||||
* [OpenID Foundation Virtual Workshop](https://openid.net/2021/03/01/registration-open-for-openid-foundation-virtual-workshop-april-29-2021/) • April 29, 2021 2021-03-01
|
||||
|
||||
* [Identiverse 2021](https://identiverse.com/) • June 21-23 (Denver)
|
||||
- [PoCATHON](https://affinidipocathon.devpost.com/) by Affiniti • Mar 26 – May 9, 2021
|
||||
@ -314,7 +314,7 @@ Gimly is excited to start the EOSIO identity working group WG (Twitter [#eosio_i
|
||||
“explore [the technology innovations](https://digitalscot.net/covid-19-vaccine-passports/) being pioneered in response to the Covid-19 pandemic, and what potential for Scottish ventures this presents.” by [Peter Ferry](https://summit.digitalscot.live/speakers/peter-ferry/), [Gary McKay](https://summit.digitalscot.live/speakers/gary-mckay/) and [Julian Ranger](https://summit.digitalscot.live/speakers/julian-ranger/) (Siccar, APPII and digi.me)
|
||||
|
||||
- [Internet Identity Workshop XXXII (#32)](https://www.eventbrite.com/e/internet-identity-workshop-iiwxxxii-32-2021a-tickets-131551119941) • April 20-22
|
||||
- [OpenID Foundation Virtual Workshop](https://openid.net/2021/03/01/registration-open-for-openid-foundation-virtual-workshop-april-29-2021/) • April 29, 2021
|
||||
- [OpenID Foundation Virtual Workshop](https://openid.net/2021/03/01/registration-open-for-openid-foundation-virtual-workshop-april-29-2021/) • April 29, 2021 2021-03-01
|
||||
- [Identiverse 2021](https://identiverse.com/)
|
||||
|
||||
- [PoCATHON](https://affinidipocathon.devpost.com/) by Affiniti • Mar 26 – May 9, 2021
|
||||
@ -335,12 +335,12 @@ With Dr. Ann Cavoukian, Executive Director of the Global Privacy & Security by D
|
||||
This monthly webinar series is an opportunity to hear from UK experts in distributed identity and learn the mechanics of decentralized identity systems.
|
||||
|
||||
- [Internet Identity Workshop XXXII (#32)](https://www.eventbrite.com/e/internet-identity-workshop-iiwxxxii-32-2021a-tickets-131551119941) • April 20-22
|
||||
- [OpenID Foundation Virtual Workshop](https://openid.net/2021/03/01/registration-open-for-openid-foundation-virtual-workshop-april-29-2021/) • April 29, 2021
|
||||
- [OpenID Foundation Virtual Workshop](https://openid.net/2021/03/01/registration-open-for-openid-foundation-virtual-workshop-april-29-2021/) • April 29, 2021 2021-03-01
|
||||
- [Identiverse 2021](https://identiverse.com/) • June 21-23 (Denver)
|
||||
|
||||
- [Internet Identity Workshop XXXII (#32)](https://www.eventbrite.com/e/internet-identity-workshop-iiwxxxii-32-2021a-tickets-131551119941) • April 20-22 <—Register NOW. This is the main event for the whole community. The best place to dive in and get connected. 20% discount code: Identosphere_IIWXXXII_20
|
||||
- [Credentials, COVID-19, and Digital Staff Passports Innovating and lessons from the NHS frontline](https://www.evernym.com/healthcare-webinar/) • Wednesday, Apr 28
|
||||
- [OpenID Foundation Virtual Workshop](https://openid.net/2021/03/01/registration-open-for-openid-foundation-virtual-workshop-april-29-2021/) • April 29
|
||||
- [OpenID Foundation Virtual Workshop](https://openid.net/2021/03/01/registration-open-for-openid-foundation-virtual-workshop-april-29-2021/) • April 29 2021-03-01
|
||||
- [PoCathon](https://affinidipocathon.devpost.com/) by Affinidi • 3\26–5\09
|
||||
We invite developers across the world to come and build applications that generate secure, portable and privacy-preserving credentials enabling trust across entities using Affinidi’s APIs
|
||||
- [Redefining the Student Journey and Beyond Through Verifiable Credentials](https://www.eventbrite.co.uk/e/redefining-the-student-journey-and-beyond-through-verifiable-credentials-tickets-150060812931) Condatis • May 11
|
||||
@ -348,7 +348,7 @@ We invite developers across the world to come and build applications that genera
|
||||
- [Credentials, COVID-19, and Digital Staff Passports Innovating and lessons from the NHS frontline](https://www.evernym.com/healthcare-webinar/) • Apr 28
|
||||
- [NGI Forward Salon Foundationals: Blockchain Ecologies with Primavera De Filippi](https://www.ngi.eu/event/ngi-forward-salon-foundationals-blockchain-ecologies/?instance_id=465) • April 28, 2021
|
||||
- [Credentials, COVID-19, and Digital Staff Passports](https://www.evernym.com/healthcare-webinar/) • Apr 28
|
||||
- [OpenID Foundation Virtual Workshop](https://openid.net/2021/03/01/registration-open-for-openid-foundation-virtual-workshop-april-29-2021/) • April 29
|
||||
- [OpenID Foundation Virtual Workshop](https://openid.net/2021/03/01/registration-open-for-openid-foundation-virtual-workshop-april-29-2021/) • April 29 2021-03-01
|
||||
- [Redefining the Student Journey and Beyond Through Verifiable Credentials](https://www.eventbrite.co.uk/e/redefining-the-student-journey-and-beyond-through-verifiable-credentials-tickets-150060812931) Condatis • May 11
|
||||
- [Self-Sovereign Identity. Trust in NGI](https://www.ngi.eu/event/self-sovereign-identity-trust-in-ngi/) May 17
|
||||
- [Identiverse 2021](https://identiverse.com/) • June 21-23 (Denver)
|
||||
@ -510,7 +510,7 @@ The 34th The European Association for e-Identity and Security Annual Conference
|
||||
- [Internet Identity Workshop 33](https://www.eventbrite.com/e/internet-identity-workshop-iiwxxxiii-33-2021b-tickets-160257990965) • 10/12-14
|
||||
- [Digital Trust World 2021](https://events.eventzilla.net/e/digital-trust-world-2021-2138805589) • 10/4-7 ‘the Conference for Authentication, Biometrics, Fraud & Security and Identity,’
|
||||
|
||||
* [ANNOUNCING THE MYDATA OPERATOR AWARDS 2021](https://mydata.org/2021/08/24/announcing-the-mydata-operator-awards-2021/)
|
||||
* [ANNOUNCING THE MYDATA OPERATOR AWARDS 2021](https://mydata.org/2021/08/24/announcing-the-mydata-operator-awards-2021/) 2021-08-24
|
||||
- [Cardea Interop-athon](http://cardea.app) • 9/9 ([registration](https://docs.google.com/forms/d/1yIalp9ZPL9_nMUcP31OiLuko3aNryw4SzBaSjmJhs0A/viewform?edit_requested=true))
|
||||
- [Turing trustworthy digital identity conference](https://www.eventsforce.net/turingevents/frontend/reg/thome.csp?pageID=29872&eventID=93&traceRedir=2) • 9/13
|
||||
- [GS1 Industry & Standards Event 2021](https://standards-event.gs1.org/) • 9/13-16
|
||||
@ -527,7 +527,7 @@ A chance for Interopathon participants to demo their results!
|
||||
you can still join the Dev Camp. It’s free, the curriculum sounds really fun, and it’s got a great crew of leaders, facilitators, teachers, and mentors.
|
||||
- [Meeco at Money 20/20 Europe](https://blog.meeco.me/meeco-at-money-20-20-europe/) 9/21-23
|
||||
- [EIC Speaker Spotlight: Vittorio Bertocci on Browser Changes Affecting Identity](https://www.kuppingercole.com/blog/beskers/eic-speaker-spotlight-vittorio-bertocci-browser-changes-identity) • 9/14
|
||||
- [OpenID Foundation Hosting Workshop at EIC 2021](https://openid.net/2021/09/01/openid-foundation-hosting-workshop-at-eic-2021/)
|
||||
- [OpenID Foundation Hosting Workshop at EIC 2021](https://openid.net/2021/09/01/openid-foundation-hosting-workshop-at-eic-2021/) 2021-09-01
|
||||
|
||||
will include a panel discussion on the ongoing global adoption of the Financial-grade API (FAPI) security profile while reviewing global open banking initiatives
|
||||
|
||||
@ -550,7 +550,7 @@ Ceramic is [live on mainnet](https://blog.ceramic.network/ceramic-mainnet-is-li
|
||||
- [Internet Identity Workshop 33](https://www.eventbrite.com/e/internet-identity-workshop-iiwxxxiii-33-2021b-tickets-160257990965) • 10/12-14
|
||||
- [Authenticate Virtual Summit Recap and looking forward Authenticate 2021](https://fidoalliance.org/authenticate-virtual-summit-the-imperative-for-strong-authentication-for-government-services/) Fido Alliance 10/18-20
|
||||
|
||||
* [Announcing the GAIN POC Pre-launch “Listening Tour”](https://openid.net/2021/09/29/announcing-the-gain-poc-pre-launch-listening-tour/) OpenID
|
||||
* [Announcing the GAIN POC Pre-launch “Listening Tour”](https://openid.net/2021/09/29/announcing-the-gain-poc-pre-launch-listening-tour/) OpenID 2021-09-29
|
||||
|
||||
The objective of these sessions is to gather input for shaping the Community Group program targeted to launch in December of this year.
|
||||
|
||||
@ -571,7 +571,7 @@ Ceramic is [live on mainnet](https://blog.ceramic.network/ceramic-mainnet-is-li
|
||||
- [Self-Sovereign-Identity & eIDAS a contradiction? Challenges and chances of eIDAS 2.0](https://www.msg.group/en/event/self-sovereign-identity-eidas-a-contradiction-challenges-and-chances-of-eidas-2-0) University of Murcia/Alastria 10/19
|
||||
- [The Business Models Made Possible By Economic Incentives](https://www.evernym.com/cheqd-webinar/) 10/19
|
||||
- [Authenticate Virtual Summit Recap and looking forward Authenticate 2021](https://fidoalliance.org/authenticate-virtual-summit-the-imperative-for-strong-authentication-for-government-services/) • 10/18-20 • Fido Alliance
|
||||
- [OpenID Foundation Sessions at the FIDO Member Plenary](https://openid.net/2021/10/11/announcing-openid-foundation-sessions-at-the-fido-member-plenary-on-thursday-october-21-2021/) 10/21
|
||||
- [OpenID Foundation Sessions at the FIDO Member Plenary](https://openid.net/2021/10/11/announcing-openid-foundation-sessions-at-the-fido-member-plenary-on-thursday-october-21-2021/) 10/21 2021-10-11
|
||||
- [Game Changers - Is Self-Sovereign Identity Going Exponential?](https://www.linkedin.com/events/gamechangers-isself-sovereignid6853237425758703616/) 10/26
|
||||
|
||||
Could blockchain enabled self-sovereign identification be a game changer in everything from how your identity is created, to how it is managed, validated, shared and used?
|
||||
@ -608,7 +608,7 @@ THE MODERN DILEMMA - HOW TO TAKE BACK CONTROL OF YOUR DIGITAL SOUL • 11/16
|
||||
|
||||
The Frankfurt School Blockchain Center will host a panel discussion together with [d-fine](http://www.d-fine.com/) on self-sovereign identity (SSI). As more and more of our interactions take place online, SSI solutions are crucial in order to allow people to do so in a digital world with the same freedom and security as they do offline.
|
||||
|
||||
- [Data Space Launchpad](https://mydata.org/2021/11/18/event-data-space/) MyData (Until 2/22)
|
||||
- [Data Space Launchpad](https://mydata.org/2021/11/18/event-data-space/) MyData (Until 2/22) 2021-11-18
|
||||
|
||||
As part of the [Digital Europe Programme](https://digital-strategy.ec.europa.eu/en/digital-europe-programmes-multiannual-work-programme-2021-2022) the European Commission will invest EUR 143 million in common European data spaces in different domains. [...] consortia building is taking place as we speak. Come to make connections and get access to the library of resources.
|
||||
|
||||
@ -619,9 +619,9 @@ This EOI invite’s expressions of interest for the provision of customer digita
|
||||
- [Customer Service / Service NSW EOI - Digital Identity and Verifiable Credentials - DICT/8027](https://www.tenders.nsw.gov.au//index.cfm?dept=dcs&event=public.rft.show&RFTUUID=B5AEC5F5-F55A-5377-53C3487DD5BE443A) • Tenders (Closes 12/14)
|
||||
- [Build Your Identity Solution Using Hyperledger Aries](https://wiki.hyperledger.org/display/events/Build+Your+Identity+Solution+Using+Hyperledger+Aries) • 1/20
|
||||
- [Hyperledger Indy Technical Deep Dive](https://wiki.hyperledger.org/display/events/Hyperledger+Indy+Technical+Deep+Dive) • 2/3
|
||||
- [Data Space Launchpad](https://mydata.org/2021/11/18/event-data-space/) MyData • Until 2/22
|
||||
- [Data Space Launchpad](https://mydata.org/2021/11/18/event-data-space/) MyData • Until 2/22 2021-11-18
|
||||
|
||||
* [Hyperledger Foundation Community Training: Accelerate your decentralized identity skills with two free Hyperledger Indy and Hyperledger Aries workshops](https://www.hyperledger.org/blog/2021/11/22/hyperledger-foundation-community-training-accelerate-your-decentralized-identity-skills-with-two-free-hyperledger-indy-and-hyperledger-aries-workshops)
|
||||
* [Hyperledger Foundation Community Training: Accelerate your decentralized identity skills with two free Hyperledger Indy and Hyperledger Aries workshops](https://www.hyperledger.org/blog/2021/11/22/hyperledger-foundation-community-training-accelerate-your-decentralized-identity-skills-with-two-free-hyperledger-indy-and-hyperledger-aries-workshops) 2021-11-22
|
||||
|
||||
* [Build Your Identity Solution Using Hyperledger Aries](https://wiki.hyperledger.org/display/events/Build+Your+Identity+Solution+Using+Hyperledger+Aries) 1/20
|
||||
|
||||
@ -630,7 +630,7 @@ This EOI invite’s expressions of interest for the provision of customer digita
|
||||
- [The "Completing the Framework" Open Call](https://essif-lab-framework-call.fundingbox.com/) eSSIF-Lab (until 1/15/22)
|
||||
- [Build Your Identity Solution Using Hyperledger Aries](https://wiki.hyperledger.org/display/events/Build+Your+Identity+Solution+Using+Hyperledger+Aries) 1/20
|
||||
- [Hyperledger Indy Technical Deep Dive](https://wiki.hyperledger.org/display/events/Hyperledger+Indy+Technical+Deep+Dive) 2/3
|
||||
- [Data Space Launchpad](https://mydata.org/2021/11/18/event-data-space/) MyData • Until 2/22
|
||||
- [Data Space Launchpad](https://mydata.org/2021/11/18/event-data-space/) MyData • Until 2/22 2021-11-18
|
||||
|
||||
* [Join us to build solutions using Decentralized Identities](https://techcommunity.microsoft.com/t5/azure-active-directory-identity/join-us-to-build-solutions-using-decentralized-identities/ba-p/2810649) Microsoft
|
||||
|
||||
@ -660,7 +660,7 @@ Speaking: Markus Sabadello, Michael Shae, Tim Brückmann, Tim Heidfeld
|
||||
Ally Haire talks about identity using blockchain, and Vandana Verma tells us how to stay secure with third-party dependencies!
|
||||
|
||||
- [Hyperledger Indy Technical Deep Dive](https://wiki.hyperledger.org/display/events/Hyperledger+Indy+Technical+Deep+Dive) 2/3
|
||||
- [Data Space Launchpad](https://mydata.org/2021/11/18/event-data-space/) MyData • Until 2/22
|
||||
- [Data Space Launchpad](https://mydata.org/2021/11/18/event-data-space/) MyData • Until 2/22 2021-11-18
|
||||
- [Decentralized Autonomous Organizations to revolutionize the way we work?](https://itsavirus.com/updates/webinar-decentralized-autonomous-organizations-to-revolutionize-the-way-we-work) Alex Puig Caelum Labs 2/24
|
||||
|
||||
* [Build using Decentralized Identities with Microsoft](https://techcommunity.microsoft.com/t5/azure-active-directory-identity/join-us-to-build-solutions-using-decentralized-identities/ba-p/2810649)
|
||||
@ -690,7 +690,7 @@ The webinar will be held virtually on the 17th of February 2022 and is open for
|
||||
- Yours truely (Kaliya) is speaking ^^^
|
||||
- [Self-Sovereign Identity: Expectations & Reality](https://www.meetup.com/indicio-identity-community/events/283751416/) 2/22
|
||||
- [What Makes A Successful SSI Strategy?](https://www.evernym.com/ssi-strategy-webinar/) 3/1 Evernym
|
||||
* [MyData and GovStack – Accelerating digital transformations in the public sector globally](https://mydata.org/2022/02/14/event-mydata-govstack) 3/1
|
||||
* [MyData and GovStack – Accelerating digital transformations in the public sector globally](https://mydata.org/2022/02/14/event-mydata-govstack) 3/1 2022-02-14
|
||||
|
||||
* [Naming the Harms of Web 1 & 2.0](https://allevents.in/events/naming-the-harms-of-web-1-and-20/10000260672868567) 3/4 Planetwork
|
||||
|
||||
@ -720,7 +720,7 @@ All these videos were recorded at the DID Conference Korea 2022on Feb 22.
|
||||
|
||||
identity isn't about who you are. it's about what others might want or need to know about you, and how you let them know
|
||||
|
||||
- [Registration Open for OpenID Foundation Workshop at Google](https://openid.net/2022/03/22/registration-open-for-openid-foundation-workshop-at-google-monday-april-25-2022/) April 25
|
||||
- [Registration Open for OpenID Foundation Workshop at Google](https://openid.net/2022/03/22/registration-open-for-openid-foundation-workshop-at-google-monday-april-25-2022/) April 25 2022-03-22
|
||||
|
||||
* [Registration](https://www.eventbrite.com/e/openid-foundation-workshop-monday-april-25-2022-tickets-304150210467) must be completed by Monday, April 18, 2022:
|
||||
|
||||
@ -751,7 +751,7 @@ Over the course of two days from Jan. 24 – 25, the [Better Identity Coalition]
|
||||
- [Global Internet Governance and International Human Rights - Whose Rights, Whose Interpretations?](https://www-npa.lip6.fr/gig-arts/conference/) 4/13-14, Nicosia ([Program](https://pbs.twimg.com/media/FOhpFlaXsAUADnq?format=jpg&name=large))
|
||||
- [Techno-legal Challenges in Digital Identity Infrastructures: the Example of Self Sovereign Identities](https://www-npa.lip6.fr/gig-arts/conference/gig-arts-2022/abstracts/) Alexandra Giannopoulou, University of Amsterdam, Netherlands and Ioannis Krontiris, Homo Digitalis, Greece
|
||||
The question this article will try to answer is: are self sovereign digital identity solutions suitable for ensuring data sovereignty and individual empowerment? To answer this question, we will address challenges emerging from both the technological architectures and the applicable institutional and normative frameworks
|
||||
- [Registration Open for OpenID Foundation Workshop at Google](https://openid.net/2022/03/22/registration-open-for-openid-foundation-workshop-at-google-monday-april-25-2022/) April 25 ([Registration](https://www.eventbrite.com/e/openid-foundation-workshop-monday-april-25-2022-tickets-304150210467)
|
||||
- [Registration Open for OpenID Foundation Workshop at Google](https://openid.net/2022/03/22/registration-open-for-openid-foundation-workshop-at-google-monday-april-25-2022/) April 25 ([Registration](https://www.eventbrite.com/e/openid-foundation-workshop-monday-april-25-2022-tickets-304150210467) 2022-03-22
|
||||
|
||||
This OpenID Foundation Workshop includes a number of presentations focused on 2022 key initiatives for the Foundation as well as updates on active working groups.
|
||||
|
||||
@ -762,7 +762,7 @@ This is a really big deal that after switching to online for 2 years. It will be
|
||||
May 12th is decentralized identity day at the event
|
||||
|
||||
- [Carbon Accounting with OpenClimate and the Government of British Columbia](https://www.linkedin.com/events/6920546292557381632/) Zoom - TOIP - 4/20
|
||||
- [OpenID Foundation Workshop at Google](https://openid.net/2022/03/22/registration-open-for-openid-foundation-workshop-at-google-monday-april-25-2022/) 4/25 ([Registration](https://www.eventbrite.com/e/openid-foundation-workshop-monday-april-25-2022-tickets-304150210467)
|
||||
- [OpenID Foundation Workshop at Google](https://openid.net/2022/03/22/registration-open-for-openid-foundation-workshop-at-google-monday-april-25-2022/) 4/25 ([Registration](https://www.eventbrite.com/e/openid-foundation-workshop-monday-april-25-2022-tickets-304150210467) 2022-03-22
|
||||
- [Internet Identity Workshop #24](http://www.internetidentityworkshop.com/) 4/26-28, [Sold Out] Mountain View, California
|
||||
- [Exploring Digital ID](https://www.continuumloop.com/exploring-digital-id/) Online - Continuum Loop - 4/27
|
||||
- [European Identity & Cloud Conference celebrates its 15th edition](https://www.kuppingercole.com/events/eic2022/blog/european-identity-cloud-conference-celebrates-15th-edition) Berlin - 5/10-13
|
||||
@ -839,9 +839,9 @@ Mike Vesey, CEO of IdRamp, has been selected to speak about “Verifiable Cred
|
||||
|
||||
- [Bootstrapping Trust - Leveraging DIDComm to apply trust to existing technologies](https://www.meetup.com/indicio-identity-community/events/286112624/) 6/21 Online
|
||||
- [Identity in Conflict](https://identiverse.com/idv2022/session/910860/) 6/21
|
||||
- MyData is this week: [Program Highlights](https://www.mydata.org/2022/06/17/mydata-2022-21-6-22-6-programme-highlights/)
|
||||
- MyData is this week: [Program Highlights](https://www.mydata.org/2022/06/17/mydata-2022-21-6-22-6-programme-highlights/) 2022-06-17
|
||||
|
||||
- [National digital trust summit will help NZ](https://digitalidentity.nz/2022/07/04/national-digital-trust-summit-will-help-nz/) 7/27 ([Registration](https://registration.brightstar.co.nz/register/NWUwMGU1OWUtNWVlNy00YzQ2LThmMjUtZjg4ZmIxOTlmNTIz)
|
||||
- [National digital trust summit will help NZ](https://digitalidentity.nz/2022/07/04/national-digital-trust-summit-will-help-nz/) 7/27 ([Registration](https://registration.brightstar.co.nz/register/NWUwMGU1OWUtNWVlNy00YzQ2LThmMjUtZjg4ZmIxOTlmNTIz) 2022-07-04
|
||||
- [The Business of Self-Sovereign Identity](https://www.eventbrite.com/e/the-business-of-self-sovereign-identity-ssi-an-iiw-12-day-workshop-tickets-367890268697) IIW Special Topic 1/2 day event - August 4th
|
||||
- [Digital Identity Across Asia](https://www.eventbrite.com/e/digital-identity-across-asia-an-iiw-12-day-workshop-tickets-374391784907) IIW Special Topic 1/2 day event- 8/9 (in US Evening 8/8)
|
||||
- Exploring digital identity for a Decentralized Society — a RadicalxChange Open Space (virtual) unConference - Save the Date August 16th and 18th.
|
||||
@ -864,15 +864,15 @@ IPEN invites participants from different areas such as regulators, academia, ope
|
||||
|
||||
This ideathon was specially designed as an exciting challenge for the Singapore interns and centered around trusted data. Here are some of the incredible solutions that the five teams came up with.
|
||||
|
||||
* [Identiverse 2022: The Time for Decentralized Identity is Now](https://trustoverip.org/blog/2022/07/12/identiverse-2022-the-time-for-decentralized-identity-is-now/) TrustOverIP
|
||||
* [Identiverse 2022: The Time for Decentralized Identity is Now](https://trustoverip.org/blog/2022/07/12/identiverse-2022-the-time-for-decentralized-identity-is-now/) TrustOverIP 2022-07-12
|
||||
|
||||
Ping CEO Andre Durand ‘s opening keynote set the tone by putting decentralized identity front and center. Stating that our current systems do not scale, Andre took us on a journey through the history of Identity solutions from passwords, to single sign-on, to OAuth, to centralized and federated identity.
|
||||
|
||||
* [Identity Week 2022 ReCap](https://trustoverip.org/blog/2022/07/13/identity-week-2022-recap/) Dan BAchenheimer
|
||||
* [Identity Week 2022 ReCap](https://trustoverip.org/blog/2022/07/13/identity-week-2022-recap/) Dan BAchenheimer 2022-07-13
|
||||
|
||||
The conference had three tracks, Security Documents, Biometrics, and Digital ID with the mission to “… to accelerate the move towards a world where trusted identity solutions enable governments and commercial organizations to provide citizens, employees, customers and consumers with a multitude of opportunities to transact in a seamless, yet secure manner. All the while preventing the efforts of those intent on doing harm.”
|
||||
|
||||
* [Alen Horvat Attends EIC 2022 as Kim Cameron Award Recipient](https://openid.net/2022/07/12/guest-blog-alen-horvat-attends-eic-2022-as-kim-cameron-award-recipient/) OpenID
|
||||
* [Alen Horvat Attends EIC 2022 as Kim Cameron Award Recipient](https://openid.net/2022/07/12/guest-blog-alen-horvat-attends-eic-2022-as-kim-cameron-award-recipient/) OpenID 2022-07-12
|
||||
|
||||
At EIC, we could learn who are the key enablers and drivers of the evolution: the European Digital Identity (EUDI) program that is transforming Europe’s digital identity, mDL that enables driver’s license digitalisation, EBSI that established a framework for trusted verifiable credentials exchange, OpenID Connect’s work on standardisation of Verifiable Credentials exchange, Global Assured Identity Network (GAIN) authentication and identification with highest assurance levels on a global scale, Open Identity Exchange (OIX) for assurance-level and policy matching and mapping, TrustOverIP (ToIP) for the next-generation trusted internet, and others. Global trust, assurance, interoperability and user-centric identity are vital elements that lead to an open digital identity.
|
||||
|
||||
@ -926,7 +926,7 @@ The Summit is about real business – not about the next hype. The event is cent
|
||||
- [Infrachain Summit](https://www.infrachainsummit.com/) 10/4 - The Summit is about real business – not the next hype. The event is centered on operational use cases in the world of 3rd party distributed trust.
|
||||
- [Internet Identity Workshop #35](http://www.internetidentityworkshop.com/) 11/14-16, Mountain View CA
|
||||
|
||||
* [TOIP Steering Committee Members to Speak at two conferences](https://trustoverip.org/blog/2022/08/15/toip-steering-committee-members-to-speak-at-two-conferences-in-dublin-ireland-september-12th-16th/) DUBLIN, IRELAND 9/12-16
|
||||
* [TOIP Steering Committee Members to Speak at two conferences](https://trustoverip.org/blog/2022/08/15/toip-steering-committee-members-to-speak-at-two-conferences-in-dublin-ireland-september-12th-16th/) DUBLIN, IRELAND 9/12-16 2022-08-15
|
||||
|
||||
Co-located at the Conventions Center Dublin the same week is the Linux Foundation [Open Source Summit Europe](https://events.linuxfoundation.org/open-source-summit-europe/) September 13th to 16th. ToIP will be having a co-located [Trust Over IP Summit 2022](https://trustoverip.org/summit/), during the OSS. So when you [register for OSS](https://events.linuxfoundation.org/open-source-summit-europe/register/), don’t forget to add on the free registration for ToIP Summit 2022.
|
||||
|
||||
|
@ -24,7 +24,7 @@ The presentation focused on the keys to mainstream DID adoption:
|
||||
- Trust as strategic brand advantage vs a long walk into new governance operation
|
||||
- Verifiable Credentials to accelerate service delivery and reduce cost of IAM
|
||||
- Optimize existing systems incrementally
|
||||
* [Takeaways from Identiverse 2021: Covid thoughts, FIDO and more](https://fusionauth.io/blog/2021/06/29/identiverse-conference-report/)
|
||||
* [Takeaways from Identiverse 2021: Covid thoughts, FIDO and more](https://fusionauth.io/blog/2021/06/29/identiverse-conference-report/) 2021-06-29
|
||||
|
||||
First, I want to address the elephant in the room. Identiverse was an in-person conference, the first major technology conference that I’ve heard of since the pandemic started. I was a bit spooked when I thought about attending. I reviewed their [Covid-19 FAQ page](https://identiverse.com/faq/) carefully and was impressed by how they were planning to make sure attendees were safe.
|
||||
|
||||
|
@ -3,7 +3,7 @@ published: false
|
||||
---
|
||||
# Remembering Kim Cameron
|
||||
|
||||
I (Kaliya) will be working on a blog post for next week. For those of you who didn’t know Kim I’m very sad you will not get to meet him. He contributed greatly to our field. He was a good friend to many and a mentor and ally for women working in the field. His [Laws of Identity](https://www.identityblog.com/stories/2005/05/13/TheLawsOfIdentity.pdf) shape and continue to shape our industry - in invite you to read people’s reflections to get a small sense of who he was.
|
||||
I (Kaliya) will be working on a blog post for next week. For those of you who didn’t know Kim I’m very sad you will not get to meet him. He contributed greatly to our field. He was a good friend to many and a mentor and ally for women working in the field. His [Laws of Identity](https://www.identityblog.com/stories/2005/05/13/TheLawsOfIdentity.pdf) shape and continue to shape our industry - in invite you to read people’s reflections to get a small sense of who he was. 2005-05-13
|
||||
* [Kim Cameron remembered via his 7 Laws for Identity](https://www.biometricupdate.com/202205/kim-cameron-remembered-via-his-7-laws-for-identity) Biometric Update
|
||||
|
||||
Friends of the late computer scientist Kim Cameron took the opportunity of gathering at the KuppingerCole European Identity & Cloud Conference ([EIC 2022](https://www.kuppingercole.com/events/eic2022), to remember Cameron, his life and contribution to digital identity and beyond via his 7 Laws of Identity.
|
||||
@ -13,15 +13,15 @@ Friends of the late computer scientist Kim Cameron took the opportunity of gathe
|
||||
|
||||
Kim stood for all that is right in the intersection of technology and humanity.
|
||||
|
||||
* [Remembering Kim Cameron](https://blogs.harvard.edu/doc/2021/12/03/remembering-kim-cameron/) Doc Searls
|
||||
* [Remembering Kim Cameron](https://blogs.harvard.edu/doc/2021/12/03/remembering-kim-cameron/) Doc Searls 2021-12-03
|
||||
|
||||
Kim pushed constantly toward openness, inclusivity, compatibility, cooperation, and the need for individual agency and scale.
|
||||
|
||||
* [Remembering Kim Cameron](https://www.cloudidentity.com/blog/2022/01/11/remembering-kim-cameron/) Vittorio Bertocci
|
||||
* [Remembering Kim Cameron](https://www.cloudidentity.com/blog/2022/01/11/remembering-kim-cameron/) Vittorio Bertocci 2022-01-11
|
||||
|
||||
Kim might no longer update his blog, nudge identity products toward his vision or give inspiring, generous talks to audiences large and small, but his influence looms large in the identity industry – an industry Kim changed forever.
|
||||
|
||||
* [Memories of Kim Cameron](https://www.tuesdaynight.org/2022/01/12/memories-of-kim-cameron/) Ian Glazer
|
||||
* [Memories of Kim Cameron](https://www.tuesdaynight.org/2022/01/12/memories-of-kim-cameron/) Ian Glazer 2022-01-12
|
||||
|
||||
Reification. I learned that word from Kim. In the immediate next breath he said from the stage that he was told not everyone knew what reify meant and that he would use a more approachable word: “thingify.” And therein I learned another lesson from Kim about how to present to an audience.
|
||||
|
||||
@ -29,7 +29,7 @@ Reification. I learned that word from Kim. In the immediate next breath he said
|
||||
|
||||
He always made sure that everyone was welcome, he brought people in and inspired them and suggested ways for them to be stars. He was kind, in a way that few people ever are.
|
||||
|
||||
* [Kim Cameron: A leader in the digital identity space](https://www.identitynorth.ca/2021/12/02/kim-cameron-a-leader-in-the-digital-identity-space/) Aran Hamilton, Identity North
|
||||
* [Kim Cameron: A leader in the digital identity space](https://www.identitynorth.ca/2021/12/02/kim-cameron-a-leader-in-the-digital-identity-space/) Aran Hamilton, Identity North 2021-12-02
|
||||
|
||||
He spoke to us twice in 2016, first as the Keynote for our Annual Summit “[Beyond the Laws of Identity](https://www.youtube.com/watch?v=uqUXYl90XHM)” referring to his ground-breaking work and taking us through what he felt he missed when he published his Laws. Kim spoke later on the importance of the community when he received recognition as a [Founder of Canada’s Digital Economy](https://www.youtube.com/watch?v=xdlBg0Ai9aQ&feature=youtu.be).
|
||||
|
||||
@ -56,10 +56,10 @@ I once asked Kim why there were so many Canadians working in digital identity. H
|
||||
|
||||
Kim's technical excellence got him a seat at the table. His position at Microsoft gave him a big voice. But what made Kim effective was his gentle approach to technical discussions, especially those he thought might be contentious.
|
||||
|
||||
* [The gentle lawgiver](https://blogs.harvard.edu/doc/2021/12/06/the-gentle-lawgiver/) Doc Searls
|
||||
* [The gentle lawgiver](https://blogs.harvard.edu/doc/2021/12/06/the-gentle-lawgiver/) Doc Searls 2021-12-06
|
||||
|
||||
What I want to celebrate, however, isn’t just Kim’s thoughts and works, but his example: of how an open and generous person in a giant company can use its power for good, and not play the heavy doing it. That’s what Kim did for the two decades he was the top architect of Microsoft’s approach to digital identity and meta systems
|
||||
* [In Praise of Kim Cameron](https://openid.net/2021/12/04/in-praise-of-kim-cameron/) OpenID Foundation
|
||||
* [In Praise of Kim Cameron](https://openid.net/2021/12/04/in-praise-of-kim-cameron/) OpenID Foundation 2021-12-04
|
||||
> Not only did Kim “inject his 7 laws of identity into Microsoft’s DNA”, but did so throughout today’s growing global digital identity ecosystem.
|
||||
>
|
||||
> Kim was crafty. He not only injected his thinking into Microsoft; as a champion of the Identity Standards Community, Kim embedded his thinking into the standards that inform many of the identity systems operating at scale today.
|
||||
|
@ -4,7 +4,7 @@ published: false
|
||||
|
||||
# Meta
|
||||
|
||||
* [Why do you care about identity?](https://wider.team/2022/01/18/phil-cares-about-identity/) Phil Wolff
|
||||
* [Why do you care about identity?](https://wider.team/2022/01/18/phil-cares-about-identity/) Phil Wolff 2022-01-18
|
||||
|
||||
I love that it’s more than a technical discussion. It’s laws. Sociology. Politics and civics. Commerce. Psychology. Ethics. History. Economy. All the humanities.
|
||||
|
||||
@ -20,7 +20,7 @@ Hank explores different ways of understanding identity – including the Indisce
|
||||
* [Our Language Reflects Our Values](https://auth0.com/blog/our-language-reflects-our-values/) Auth0
|
||||
> At Auth0, we believe that consistent, iterative improvement leads to incredible results. We recognize that addressing our use of biased language is an ongoing process rather than a one-and-done effort. With our guidelines and principles in place, all employees are empowered to address biased language as they find it. We all have an obligation to be intentional with our language and consider how all words we use have the potential to reflect our values and beliefs.
|
||||
* [Removing Anonymity Online Would Risk The Most Vulnerable Users](https://anonyome.com/2021/04/removing-anonymity-online-would-risk-the-most-vulnerable-users/) Anonym
|
||||
> We all know online abuse can be incredibly damaging and [Pew](https://www.pewresearch.org/internet/2017/07/11/online-harassment-2017/) puts it like this: “In its milder forms, [online abuse] creates a layer of negativity that people must sift through as they navigate their daily routines online. At its most severe, it can compromise users’ privacy, force them to choose when and where to participate online, or even pose a threat to their physical safety.”
|
||||
> We all know online abuse can be incredibly damaging and [Pew](https://www.pewresearch.org/internet/2017/07/11/online-harassment-2017/) puts it like this: “In its milder forms, [online abuse] creates a layer of negativity that people must sift through as they navigate their daily routines online. At its most severe, it can compromise users’ privacy, force them to choose when and where to participate online, or even pose a threat to their physical safety.” 2017-07-11
|
||||
Ecosystem
|
||||
|
||||
* [OWI Digital Identity Landscape: 2021](https://oneworldidentity.com/2021-digital-identity-landscape/)
|
||||
|
@ -58,9 +58,9 @@ GAIN is marked by a cross sector, crowd sourced, open, global due diligence. GAI
|
||||
|
||||
++++ OpenID Foundation Publishes “Open Banking and Open Data: Ready to Cross Borders?” https://openid.net/2022/07/29/whitepaper-open-banking-and-open-data/
|
||||
OpenID
|
||||
* [OpenID Foundation Publishes “The Global Open Health Movement: Empowering People and Saving Lives by Unlocking Data” Whitepaper](https://openid.net/2022/07/22/the-global-open-health-movement-empowering-people-and-saving-lives-by-unlocking-data-whitepaper/) OpenID
|
||||
* [OpenID Foundation Publishes “The Global Open Health Movement: Empowering People and Saving Lives by Unlocking Data” Whitepaper](https://openid.net/2022/07/22/the-global-open-health-movement-empowering-people-and-saving-lives-by-unlocking-data-whitepaper/) OpenID 2022-07-22
|
||||
|
||||
++++ Passing the Torch at the OpenID Foundation https://self-issued.info/?p=2170 Today marks an important milestone in the life of the OpenID Foundation and the worldwide digital identity community. Following [Don Thibeau’s decade of exemplary service to the OpenID Foundation as its Executive Director](https://openid.net/2021/02/19/resolution-thanking-don-thibeau-for-his-service/), today we [welcomed Gail Hodges as our new Executive Director](https://openid.net/2021/04/28/welcoming-gail-hodges-as-our-new-executive-director/). Mike Jones
|
||||
++++ Passing the Torch at the OpenID Foundation https://self-issued.info/?p=2170 Today marks an important milestone in the life of the OpenID Foundation and the worldwide digital identity community. Following [Don Thibeau’s decade of exemplary service to the OpenID Foundation as its Executive Director](https://openid.net/2021/02/19/resolution-thanking-don-thibeau-for-his-service/), today we [welcomed Gail Hodges as our new Executive Director](https://openid.net/2021/04/28/welcoming-gail-hodges-as-our-new-executive-director/). Mike Jones 2021-04-28
|
||||
|
||||
++++ Announcing the 2022 OpenID Foundation Individual Community Board Member Election https://openid.net/2021/12/30/announcing-the-2022-openid-foundation-individual-community-board-member-election/
|
||||
|
||||
@ -82,7 +82,7 @@ This specification defines event types and their contents based on the [SSE Fram
|
||||
|
||||
++++ Security Event Tokens, Subject Identifiers, and SSE/CAEP/RISC Java implementation https://iiw.idcommons.net/13A/_Security_Event_Tokens,_Subject_Identifiers,_and_SSE/CAEP/RISC_Java_implementation Matt presented an overview of the OpenID Foundation Shared Signals and Events Working Group, and his implementation of the object model in an open source Java library at [https://github.com/sailpoint-oss/openid-sse-model/](https://github.com/sailpoint-oss/openid-sse-model/)* [Shared Signal and Events (SSE) working group](https://openid.net/wg/sse/) in the OpenID Foundation. Matt Domsch
|
||||
|
||||
* [OpenID Connect for Identity Assurance (eKYC & IDA) Enables More than 30 Million Bank Customers to Identify Themselves with Third Parties](https://openid.net/2021/03/03/openid-connect-for-identity-assurance-ekyc-ida-enables-more-than-30m-bank-customers-to-identify-themselves-with-3rd-parties/)
|
||||
* [OpenID Connect for Identity Assurance (eKYC & IDA) Enables More than 30 Million Bank Customers to Identify Themselves with Third Parties](https://openid.net/2021/03/03/openid-connect-for-identity-assurance-ekyc-ida-enables-more-than-30m-bank-customers-to-identify-themselves-with-3rd-parties/) 2021-03-03
|
||||
* [EIC Speaker Spotlight: Nat Sakimura](https://www.youtube.com/watch?v=QG_gkZkpJwQ) Introducing Gain • OpenID Foundation
|
||||
|
||||
if you look at the the cost structure of the financial industry a lot of cost Is towards anti-money laundering and related activities and that actually is identity problem [...] we should try to solve the use case with a user centricity in mind
|
||||
@ -178,7 +178,7 @@ I’ve defined an Authentication Method Reference (AMR) value called “pop” t
|
||||
++++ Vote for First Implementer’s Drafts of OIDConnect SIOPV2 and OIDC4VP Specifications https://openid.net/2022/01/18/notice-of-vote-for-first-implementers-drafts-of-openid-connect-siopv2-and-oidc4vp-specifications/
|
||||
OpenID
|
||||
|
||||
The official voting period will be between Tuesday, February 1, 2022 and Tuesday, February 8, 2022, following the [45-day review](https://openid.net/2021/12/17/first-public-review-period-for-openid-connect-siopv2-and-oidc4vp-specifications-started/) of the specifications.
|
||||
The official voting period will be between Tuesday, February 1, 2022 and Tuesday, February 8, 2022, following the [45-day review](https://openid.net/2021/12/17/first-public-review-period-for-openid-connect-siopv2-and-oidc4vp-specifications-started/) of the specifications. 2021-12-17
|
||||
|
||||
++++ OpenID for Verifiable Credentials http://openid.net/wordpress-content/uploads/2022/05/OIDF-Whitepaper_OpenID-for-Verifiable-Credentials_FINAL_2022-05-12.pdf
|
||||
[...]
|
||||
|
@ -115,7 +115,7 @@ Bad News
|
||||
APNews
|
||||
|
||||
The platform, Amnesty says, wasn’t merely a passive site with insufficient content moderation. Instead, Meta’s algorithms “proactively amplified and promoted content” on Facebook, which incited violent hatred against the Rohingya beginning as early as 2012.
|
||||
* [Call it data liberation day: Patients can now access all their health records digitally](https://www.statnews.com/2022/10/06/health-data-information-blocking-records/) Statnews
|
||||
* [Call it data liberation day: Patients can now access all their health records digitally](https://www.statnews.com/2022/10/06/health-data-information-blocking-records/) Statnews 2022-10-06
|
||||
|
||||
Under [federal rules](https://www.healthit.gov/buzz-blog/information-blocking/information-blocking-eight-regulatory-reminders-for-october-6th) taking effect Thursday, health care organizations must give patients unfettered access to their full health records in digital format. No more long delays. No more fax machines. No more exorbitant charges for printed pages.
|
||||
|
||||
|
@ -8,31 +8,31 @@ published: false
|
||||
> Spherity announces that it has become a partner of the [IDunion](https://idunion.org/) project. The project is funded within the innovation framework “Showcase secure digital identities” of the German government (Federal Ministry for Economic Affairs and Energy). Spherity is entrusted on the application of cloud identity technology in the healthcare industry.
|
||||
* [The Digital Identity Card](https://blog.ti8m.com/en/SSI.html) TI8M
|
||||
> Currently, over 40 applications have been implemented in the IDunion project. These are used in a wide variety of sectors, such as public administration, the financial sector, IoT and industry, the healthcare sector, mobility sector and e-commerce. The technology has now exited the research phase and will appear in the first productive applications in 2021.
|
||||
* [IDunion enters the second project phase initiated by the Federal Ministry of Economic Affairs and Energy of Germany](https://idunion.org/2021/04/06/idunion-startet-in-die-zweite-vom-bmwi-gefoerderte-projektphase/?lang=en)
|
||||
* [IDunion enters the second project phase initiated by the Federal Ministry of Economic Affairs and Energy of Germany](https://idunion.org/2021/04/06/idunion-startet-in-die-zweite-vom-bmwi-gefoerderte-projektphase/?lang=en) 2021-04-06
|
||||
> - The Federal Ministry for Economic Affairs and Energy (BMWi) has selected IDunion for the second phase of the innovation competition “Showcase Secure Digital Identities”.
|
||||
> - The three-year implementation phase began on April 1, 2021.
|
||||
> - The goals of this new project phase includes the establishment of a European cooperative, the launch of a production network and the implementation of 40+ different pilot applications from several areas.
|
||||
* [IDunion announces successful establishment of European cooperative](https://idunion.org/2022/08/16/idunion-announces-successful-establishment-of-european-cooperative/?lang=en)
|
||||
* [IDunion announces successful establishment of European cooperative](https://idunion.org/2022/08/16/idunion-announces-successful-establishment-of-european-cooperative/?lang=en) 2022-08-16
|
||||
* [IDnow supports European digital identity ecosystem](https://www.idnow.io/press/idnow-supports-european-digital-identity-ecosystem/)
|
||||
> IDnow joins IDunion, the network initiative for digital identities funded by the Federal Ministry for Economic Affairs and Energy (BMWi)
|
||||
* [IDunion: Germany’s Bold SSI Strategy with Hakan Yildiz](https://northernblock.io/idunion-germany-bold-ssi-strategy/)
|
||||
|
||||
What use cases should a National Digital Identity program prioritize in collaboration with the private sector? As use cases become verticals of their own, what are then some of the horizontal considerations that need to be applied to enable all of the use cases to function within their relative ecosystems?
|
||||
* [IDunion: An open ecosystem for trusted identities](https://idunion.org/2021/02/16/idunion-an-open-ecosystem-for-trusted-identities/?lang=en)
|
||||
* [IDunion: An open ecosystem for trusted identities](https://idunion.org/2021/02/16/idunion-an-open-ecosystem-for-trusted-identities/?lang=en) 2021-02-16
|
||||
|
||||
- [IDunion](https://idunion.org/) (formerly SSI for Germany) has completed the competition phase of the innovation competition “Schaufenster Sichere Digitale Identitäten” and is applying to the Federal Ministry of Economics and Energy (BMWi) for the next phase of the innovation competition.
|
||||
- The use of decentralised, self-sovereign identities for natural persons, companies and things is to be tested in over 35 use cases from a wide range of sectors.
|
||||
- The project involves 26 well-known public and private partners.
|
||||
* [An SSI Based System for Incentivized and Self-determined Customer-to-Business Data Sharing in a Local Economy Context](https://idunion.org/2021/05/21/an-ssi-based-system-for-incentivized-and-self-determined-customer-to-business-data-sharing-in-a-local-economy-context/) IdUnion ([paper](https://idunion.org/wp-content/uploads/2021/05/ETEMS_2020___Self_Sovereign_Identitiy_in_a_Smart_City___Full_Paper7.pdf)
|
||||
* [An SSI Based System for Incentivized and Self-determined Customer-to-Business Data Sharing in a Local Economy Context](https://idunion.org/2021/05/21/an-ssi-based-system-for-incentivized-and-self-determined-customer-to-business-data-sharing-in-a-local-economy-context/) IdUnion ([paper](https://idunion.org/wp-content/uploads/2021/05/ETEMS_2020___Self_Sovereign_Identitiy_in_a_Smart_City___Full_Paper7.pdf) 2021-05-21
|
||||
> Self Sovereign Identity (SSI) provides the technical building blocks to create decentralized data-driven systems, which bring data autonomy back to the users. In this paper we propose a system in which the combination of SSI and token economy based incentivisation strategies makes it possible to unlock the potential value of data-pools without compromising the data autonomy of the users.
|
||||
|
||||
* I summarized our [goals and visions in this presentation](https://nextcloud.idunion.org/s/D2cbMi6w8t3nPYj), for more information check out [the Github page](https://github.com/decentralized-identity/wallet-security)
|
||||
|
||||
|
||||
* [Innovative concepts and software for managing digital master data and certificates](https://idunion.org/2021/06/14/innovative-konzepte-und-software-fuer-das-digitale-stammdaten-und-zertifikatsmanagement/?lang=en) IDUnion
|
||||
* [Innovative concepts and software for managing digital master data and certificates](https://idunion.org/2021/06/14/innovative-konzepte-und-software-fuer-das-digitale-stammdaten-und-zertifikatsmanagement/?lang=en) IDUnion 2021-06-14
|
||||
|
||||
* [Testing self-sovereign identity with the Lissi demo](https://lissi-id.medium.com/testing-self-sovereign-identity-with-the-lissi-demo-854e73d05aad)
|
||||
> We are convinced this demonstrated user flow can help to better understand the interactions in a digital identity ecosystem such as [IDunion](https://idunion.org/). [...] The Lissi team is in discussion with trust service providers, authorities, municipalities, agencies, associations and other relevant stakeholders to meet all the necessary requirements and provide you with the best user experience.
|
||||
|
||||
* [Innovative concepts and software for managing digital master data and certificates](https://idunion.org/2021/06/14/innovative-konzepte-und-software-fuer-das-digitale-stammdaten-und-zertifikatsmanagement/) IDUnion
|
||||
* [Innovative concepts and software for managing digital master data and certificates](https://idunion.org/2021/06/14/innovative-konzepte-und-software-fuer-das-digitale-stammdaten-und-zertifikatsmanagement/) IDUnion 2021-06-14
|
||||
|
||||
|
@ -7,13 +7,13 @@ published: false
|
||||
* [IdRamp Joins Linux Foundation Public Health Cardea Project Steering Committee](https://idramp.com/idramp-joins-linux-foundation-public-health-cardea-project-steering-committee/)
|
||||
> The Cardea and GCCN projects are both excellent examples of breakthrough innovations that can take shape when companies and projects come together to solve real-world problems, using open source tools available to everyone
|
||||
* [GlobaliD joins the Linux Foundation’s Cardea Project](https://medium.com/global-id/globalid-joins-the-linux-foundations-cardea-project-22f298032240)
|
||||
* [Public-private partnerships in health: The journey ahead for open source](https://www.lfph.io/2022/07/29/public-private-partnerships-in-health-the-journey-ahead-for-open-source/) Linux Foundation Public Health
|
||||
* [Public-private partnerships in health: The journey ahead for open source](https://www.lfph.io/2022/07/29/public-private-partnerships-in-health-the-journey-ahead-for-open-source/) Linux Foundation Public Health 2022-07-29
|
||||
* [Webinar: The Future of Self Sovereign Identity](https://www.youtube.com/watch?v=gimrMbcj91A)
|
||||
|
||||
Presented by Patientory includes Jim St. Claire of LFPH
|
||||
|
||||
Self-sovereign identity (SSI) is a movement that claims digital identity should be just as legitimate and nuanced as a person’s human identity, while being accessible to all, privacy-preserving, and not reliant on a single government or corporation.
|
||||
* [The Flavors of Verifiable Credentials](https://www.lfph.io/2021/02/11/cci-verifiable-credentials-flavors-and-interoperability-paper/) Linux Foundation Public Health Blog [pdf]((https://www.lfph.io/wp-content/uploads/2021/02/Verifiable-Credentials-Flavors-Explained.pdf))
|
||||
* [The Flavors of Verifiable Credentials](https://www.lfph.io/2021/02/11/cci-verifiable-credentials-flavors-and-interoperability-paper/) Linux Foundation Public Health Blog [pdf]((https://www.lfph.io/wp-content/uploads/2021/02/Verifiable-Credentials-Flavors-Explained.pdf)) 2021-02-11
|
||||
> The differences between the different flavors of VCs for technically inclined readers. It elaborated on the differences between JSON and JSON-LD and articulated differences between the two different implementations of ZKP style credentials. The ‘Journey of a VC’ section articulated all steps where VCs are active and highlighted the differences in how different VC flavors ’behave’.
|
||||
* [The Cardea Interop-a-thon Returns—and Here’s Why You Should Participate!](https://indicio.tech/the-cardea-interop-a-thon-returns-and-heres-why-you-should-participate/) Indicio
|
||||
|
||||
|
@ -66,4 +66,4 @@ TLDR: The Me2B Alliance believes apps including the AskingPoint SDK should be sa
|
||||
* [The Me2B Alliance is now Internet Safety Labs](https://me2ba.org/introducing-internet-safety-labs/) Internet Safety Labs
|
||||
> We are excited to announce the Me2B Alliance is now Internet Safety Labs. We’ve changed our name but not our core mission.
|
||||
* [Me2BA supports ending all surveillance advertising on children](https://me2ba.org/me2ba-supports-ending-all-surveillance-advertising-on-children/)
|
||||
> We think that focusing on Facebook’s surveillance advertising is a good step in the right direction. However, there are several other significant threats to kids out there. In particular, Google’s YouTube [is used by 69% of kids in the United States today, who reportedly spend approximately 1.5 hours a day on the app](https://techcrunch.com/2020/06/04/kids-now-spend-nearly-as-much-time-watching-tiktok-as-youtube-in-u-s-u-k-and-spain/)
|
||||
> We think that focusing on Facebook’s surveillance advertising is a good step in the right direction. However, there are several other significant threats to kids out there. In particular, Google’s YouTube [is used by 69% of kids in the United States today, who reportedly spend approximately 1.5 hours a day on the app](https://techcrunch.com/2020/06/04/kids-now-spend-nearly-as-much-time-watching-tiktok-as-youtube-in-u-s-u-k-and-spain/) 2020-06-04
|
||||
|
@ -4,14 +4,14 @@ published: false
|
||||
|
||||
# OASIS
|
||||
|
||||
* [Secure QR Code Authentication v1.0 from ESAT TC approved as a Committee Specification](https://www.oasis-open.org/2022/07/12/secure-qr-code-authentication-v1-0-from-esat-tc-approved-as-a-committee-specification/)
|
||||
* [Secure QR Code Authentication v1.0 from ESAT TC approved as a Committee Specification](https://www.oasis-open.org/2022/07/12/secure-qr-code-authentication-v1-0-from-esat-tc-approved-as-a-committee-specification/) 2022-07-12
|
||||
|
||||
An alternative to passwords that includes QR Codes is described, and typical use cases are described. This document also provides an overview and context for using QR Codes for security purposes.
|
||||
## Oasis
|
||||
* [Managed Open Projects: A New Way For Open Source and Open Standards To Collaborate](https://www.oasis-open.org/2021/09/08/managed-open-projects/)
|
||||
* [Managed Open Projects: A New Way For Open Source and Open Standards To Collaborate](https://www.oasis-open.org/2021/09/08/managed-open-projects/) 2021-09-08
|
||||
|
||||
I recently pointed out in a [TechCrunch contribution](https://techcrunch.com/2021/06/09/a-revival-at-the-intersection-of-open-source-and-open-standards/) that the open source and open standards communities need to find ways to team up if they are to continue driving innovation and development of transformative technologies to push our society forward.
|
||||
I recently pointed out in a [TechCrunch contribution](https://techcrunch.com/2021/06/09/a-revival-at-the-intersection-of-open-source-and-open-standards/) that the open source and open standards communities need to find ways to team up if they are to continue driving innovation and development of transformative technologies to push our society forward. 2021-06-09
|
||||
### KMIP
|
||||
|
||||
* [OASIS releases KMIP 2.1](https://www.oasis-open.org/2020/12/18/key-management-interoperability-protocol-specification-and-key-management-interoperability-protocol-profiles-oasis-standards-published/)
|
||||
* [OASIS releases KMIP 2.1](https://www.oasis-open.org/2020/12/18/key-management-interoperability-protocol-specification-and-key-management-interoperability-protocol-profiles-oasis-standards-published/) 2020-12-18
|
||||
> The Key Management Interoperability Protocol (KMIP) is a single, comprehensive protocol for communication between clients that request any of a wide range of encryption keys and servers that store and manage those keys. By replacing redundant, incompatible key management protocols, KMIP provides better data security while at the same time reducing expenditures on multiple products.
|
||||
|
@ -48,7 +48,7 @@ Check out these [photos from IIW 1 in 2005](https://www.flickr.com/photos/tags/i
|
||||
|
||||
## aNewGovernance
|
||||
|
||||
* [AfroLeadership NGO to join the Board of aNewGovernance AISBL](https://www.anewgovernance.org/2021/07/02/2391/) NewGovernance
|
||||
* [AfroLeadership NGO to join the Board of aNewGovernance AISBL](https://www.anewgovernance.org/2021/07/02/2391/) NewGovernance 2021-07-02
|
||||
> As the Data Strategy and the Data Spaces are being put in place in Europe, as the
|
||||
>
|
||||
> new US Administration is questioning the operating practices of global platforms, it is critical our approach over Personal Data Sharing is Global.
|
||||
|
@ -19,7 +19,7 @@ published: false
|
||||
|
||||
|
||||
## OASIS
|
||||
* [OASIS Open Establishes European Foundation to Advance Open Collaboration Opportunities](https://www.oasis-open.org/2021/01/20/oasis-open-establishes-european-foundation-to-advance-open-collaboration-opportunities/)
|
||||
* [OASIS Open Establishes European Foundation to Advance Open Collaboration Opportunities](https://www.oasis-open.org/2021/01/20/oasis-open-establishes-european-foundation-to-advance-open-collaboration-opportunities/) 2021-01-20
|
||||
> “The OASIS Open Europe Foundation gives us a unique opportunity to work with the European Union and EU Member States to advance open source and standards projects,”
|
||||
|
||||
|
||||
@ -48,7 +48,7 @@ I spoke with the editor of the draft to propose that we add a “did” format i
|
||||
## Other
|
||||
|
||||
### OpenSSF
|
||||
* [Digital Identity Attestation Roundup - Open Source Security Foundation](https://openssf.org/blog/2021/01/27/digital-identity-attestation-roundup/#)
|
||||
* [Digital Identity Attestation Roundup - Open Source Security Foundation](https://openssf.org/blog/2021/01/27/digital-identity-attestation-roundup/#) 2021-01-27
|
||||
|
||||
We kicked off the first Digital Identity Attestation Working Group meeting under the OpenSSF in August, 2020. The objective of this working group is to enable open source maintainers, contributors and end-users to understand and make decisions on the provenance or origin of the code they maintain, produce and use.
|
||||
|
||||
|
@ -2,23 +2,19 @@
|
||||
published: false
|
||||
---
|
||||
# Scotland
|
||||
|
||||
* [Digital Education – Transforming Scottish Education for the 21st Century](https://digitalscot.net/transforming-scottish-education-21/)
|
||||
|
||||
As the [Herald reports](https://www.heraldscotland.com/politics/20078582.scottish-government-unveils-45m-plan-build-tech-nation/) Kate Forbes has announced £45m in funding to “transform Scotland into one of Europe’s leading economies to start or grow a technology business.”
|
||||
* [Architecture for Covid-19 Vaccine Passports](https://digitalscot.net/covid-19-vaccine-passports/)
|
||||
> As they explain [here](https://nds.nhs.scot/blog/the-national-clinical-data-store/), their National Clinical Data Store (NCDS) is storing vaccinations data and being made accessible to healthcare staff, via their [VMT app](https://learn.nes.nhs.scot/42708/turas-vaccination-management-tool).
|
||||
|
||||
“Under the bonnet, the VMT sends copies of the records of immunisations to the NCDS. For those that may be interested, this is achieved using a “FHIR API” based on the [UK FHIR Core](https://digital.nhs.uk/services/fhir-uk-core) Immunisation Profile. A FHIR API is essentially an industry standard way of sharing digital health data. The NCDS can then securely share citizens’ immunisation history records to other services, again using a FHIR API.”
|
||||
>
|
||||
> “Under the bonnet, the VMT sends copies of the records of immunisations to the NCDS. For those that may be interested, this is achieved using a “FHIR API” based on the [UK FHIR Core](https://digital.nhs.uk/services/fhir-uk-core) Immunisation Profile. A FHIR API is essentially an industry standard way of sharing digital health data. The NCDS can then securely share citizens’ immunisation history records to other services, again using a FHIR API.”
|
||||
|
||||
As we’ll explore in the upcoming and future webinars, Scotland’s opportunity is to build upon this core innovation through a collaborating community, a Digital Healthcare Ecosystem, to flesh it out in multiple directions including ways to expand user uptake and to enable new scenarios for how users interact with and update data.
|
||||
* [Public Spending: One Way to Solve Many Problems](https://medium.com/mydex/public-spending-one-way-to-solve-many-problems-3ac394e46a9e) Digital Scot
|
||||
“We will identify where there may be shared interest, duplication or overlap in intended policy outcomes over multiple portfolios. Where there is, we will look to develop a more effective and efficient cross-government solution.”
|
||||
* [MyDex is working with the Scotish Government](https://blogs.gov.scot/digital/2020/05/13/digital-identity-scotland-prototype-draws-to-a-close/)
|
||||
* [MyDex is working with the Scotish Government](https://blogs.gov.scot/digital/2020/05/13/digital-identity-scotland-prototype-draws-to-a-close/) 2020-05-13
|
||||
> MyDex is a community interest corporation that has been working on building *real products in the real world*. They [wrote about the ongoing work](https://medium.com/mydex/proving-verified-attributes-work-3f9ca813d43f) enabling public sector organizations to give citizens verifiable attributes they keep in their own data stores and can prove to other parties without the issuing organization in the middle.
|
||||
* [MyDex CCI on working with the Scottish Government](https://medium.com/mydex/a-way-forward-for-personal-data-6251d1503bdd)
|
||||
> Over the past months Mydex CIC has been [working for the Scottish Government](https://blogs.gov.scot/digital/2020/10/01/digital-identity-scotland-a-beta-industry-event/) on a strategy for implementing and scaling a system of ‘smart entitlements’ for the citizens of Scotland.
|
||||
* [Digital Identity Scotland – A beta industry event](https://blogs.gov.scot/digital/2020/10/01/digital-identity-scotland-a-beta-industry-event/).
|
||||
> Over the past months Mydex CIC has been [working for the Scottish Government](https://blogs.gov.scot/digital/2020/10/01/digital-identity-scotland-a-beta-industry-event/) on a strategy for implementing and scaling a system of ‘smart entitlements’ for the citizens of Scotland. 2020-10-01
|
||||
* [Digital Identity Scotland – A beta industry event](https://blogs.gov.scot/digital/2020/10/01/digital-identity-scotland-a-beta-industry-event/). 2020-10-01
|
||||
> The [Smart Entitlements](https://blogs.gov.scot/digital/wp-content/uploads/sites/5/2020/10/Smart-Entitlements-Research-Recommendations-and-Report-for-the-Scottish-Government-FINAL.pdf) concept is very simple. Its goal is to create a common, easy approach for citizens to access public services that is consistent across multiple service providers. To achieve this, it provides citizens with the ability to store their personal information in an Attribute (or personal data) Store which they own and control.
|
||||
* [‘Personal Data Ecosystem’ key foundation for Scotland’s Digital Economy](https://digitalscot.net/personal-data-ecosystem/)
|
||||
> Patient records won’t be held centrally in a monolith EHR, but will instead be distributed to and owned/controlled by the users themselves.
|
||||
@ -31,7 +27,3 @@ From the Blockchain through AI and the ‘Metaverse’, Scotland is presented wi
|
||||
* [The keystone foundation companion to the Blockchain is Digital Identity](https://scottishblockchain.net/transforming-education-blockchain-ssi/) DigitalScot
|
||||
> The building block of digital identity ecosystems are ‘[verifiable credentials](https://www.slideshare.net/SSIMeetup/verifiable-credentials-101-for-ssi-and-decentralized-digital-identity-tyler-ruff)‘, the core mechanics for forming these ecosystems through sharing Identity data between collaborating partners, exemplified by initiatives such as the [EU’s recent announcement](https://apnews.com/article/europe-health-coronavirus-pandemic-lifestyle-travel-73f90d18909c595da463994e16e17348) and explained here by the OIX Identity forum.
|
||||
|
||||
* [Transforming Scottish Education for the 21st Century](https://digitalscot.net/transforming-scottish-education/) Digital Scot
|
||||
|
||||
This of course is the backbone of the education system, how grades are assessed and rewarded, and it is here therefore where the biggest levers for change are possible, and in this article we’ll explain the role new technologies can play in underpinning and enabling such a transformation.
|
||||
* [Transforming Scottish Education on the Blockchain](https://digitalscot.net/education-blockchain/) DigitalScot
|
@ -14,7 +14,7 @@ Decentralized identity will make our increasingly decentralized lives easier. Or
|
||||
* [Institutions digitising credentials, but blockchain use remains low](https://thepienews.com/news/digitising-credentials-blockchain-use/)
|
||||
> [Research](https://www.aacrao.org/research-publications/aacrao-research/meeting-the-moment-transforming-the-digital-credentials-space) from the American Association of Collegiate Registrars and Admissions Officers has revealed that 89% of US and Canadian institutions report using at least one type of digital credential – including digitally signed PDFs – with one third planning to devote more resources to the digitisation of credentials.
|
||||
* [@UbikomProject tweets](https://twitter.com/UbikomProject/status/1405945396208209932): “Nice overview, somewhat questionable assumptions”
|
||||
* [To Succeed In Decentralizing Digital Identity, Focus On Relationships First](https://www.forbes.com/sites/forbestechcouncil/2021/06/16/to-succeed-in-decentralizing-digital-identity-focus-on-relationships-first/?sh=6f133ef11824)
|
||||
* [To Succeed In Decentralizing Digital Identity, Focus On Relationships First](https://www.forbes.com/sites/forbestechcouncil/2021/06/16/to-succeed-in-decentralizing-digital-identity-focus-on-relationships-first/?sh=6f133ef11824) 2021-06-16
|
||||
> 2020 forced the world of identity to step up, and it has. There's much more innovation on the horizon to look forward to.
|
||||
* [Is Self-Sovereign Identity Going Exponential?](https://corporate.sybrin.com/webinar-SSI) Sybrin
|
||||
|
||||
@ -28,7 +28,7 @@ For the attendees, and those folks that couldn’t make it, we’ve put together
|
||||
[Link to PDF of the presentation](http://www.continuumloop.com/wp-content/uploads/2021/12/webinar-13JAN2021-2021Review-2022Trends.png)
|
||||
|
||||
Darrell started off the webinar talking about his top 5 stories from 2021.
|
||||
* [Digital identity market revenues to reach US$53bn in 2026](https://www.nfcw.com/2022/01/31/375825/digital-identity-market-revenues-to-reach-us53bn-in-2026/)
|
||||
* [Digital identity market revenues to reach US$53bn in 2026](https://www.nfcw.com/2022/01/31/375825/digital-identity-market-revenues-to-reach-us53bn-in-2026/) 2022-01-31
|
||||
|
||||
Juniper’s Digital Identity: Key Opportunities, Regulatory Landscape & Market Forecasts 2022-2026 report also identifies multimodal biometric authentication, digital onboarding — including single sign-on solutions and self-sovereign identity — as “growing trends” across the digital identity market.
|
||||
|
||||
@ -55,7 +55,7 @@ The IAM (Identity & Access Management) landscape may seem to be getting more com
|
||||
* [Decentralized Identity](https://www.thoughtworks.com/radar/techniques?blipid=202005083) Thoughtworks Technology Radar
|
||||
> Adopting and implementing decentralized identity is gaining momentum and becoming attainable. We see its adoption in privacy-respecting customer health applications, government healthcare infrastructure and corporate legal identity.
|
||||
* [Thoughtworks has put Verifiable Credentials into the “Assess” category of their technology radar map](https://www.thoughtworks.com/radar/techniques?blipid=202010098)
|
||||
* [Verifiable Credentials featured on Forbes](https://www.forbes.com/sites/forbestechcouncil/2020/12/18/how-verifiable-credentials-can-rebuild-trust-on-the-internet/)
|
||||
* [Verifiable Credentials featured on Forbes](https://www.forbes.com/sites/forbestechcouncil/2020/12/18/how-verifiable-credentials-can-rebuild-trust-on-the-internet/) 2020-12-18
|
||||
> Berners-Lee recently suggested that the web needs a midcourse correction. Part of that change involves making systems accountable and making it easy for users to find where information comes from. Verifiable credentials promise major strides in that direction.
|
||||
* [2020 - How SSI went mainstream](https://medium.com/@sovrinid/2020-how-ssi-went-mainstream-30449003142a) Sovrin Foundation
|
||||
|
||||
@ -87,7 +87,7 @@ In this rapid fire review we will take a look at, and break down, the biggest re
|
||||
* [EIC2022 Centralized & Decentralized Identity converging](https://www.linkedin.com/pulse/eic2022-centralized-decentralized-identity-converging-kuppinger/)
|
||||
* [Educate + Engage = Activate!](https://blog.weareopen.coop/educate-engage-activate-6c6325e962d2) Laura Hilliger
|
||||
|
||||
* [Decentralized Identity: Keys to Mainstream Adoption](https://trustoverip.org/blog/2022/05/27/decentralized-identity-keys-to-mainstream-adoption/) Trust Over IP
|
||||
* [Decentralized Identity: Keys to Mainstream Adoption](https://trustoverip.org/blog/2022/05/27/decentralized-identity-keys-to-mainstream-adoption/) Trust Over IP 2022-05-27
|
||||
|
||||
When it comes to decentralized identity solutions, many business sponsors do not yet understand how DCI can provide practical answers to immediate frontline business problems. This climate creates the impression that decentralized identity is interesting but not ready for prime time adoption.
|
||||
|
||||
@ -107,11 +107,11 @@ speak at the June 15, 2022 All Members meeting at the Trust Over IP Foundation.
|
||||
|
||||
We take a look at a few of the best articles on why strong digital identity will be critical as we continue to build on the internet.
|
||||
|
||||
* [A Solution Looking for a Problem? Digital ID Solves a Million of Them](https://www.forbes.com/sites/davidbirch/2022/08/09/solution-looking-for-a-problem-digital-id-solves-a-million-of-them/?sh=4d1d6bb4fd7f%C2%A0)
|
||||
* [A Solution Looking for a Problem? Digital ID Solves a Million of Them](https://www.forbes.com/sites/davidbirch/2022/08/09/solution-looking-for-a-problem-digital-id-solves-a-million-of-them/?sh=4d1d6bb4fd7f%C2%A0) 2022-08-09
|
||||
|
||||
* [Goodbye, physical identities: How organizations can prepare for digital identity challenges](https://www.biometricupdate.com/202208/goodbye-physical-identities-how-organizations-can-prepare-for-digital-identity-challenges%C2%A0)
|
||||
|
||||
* [Digital Identities Will Change The Nature Of Online Reputation](https://www.forbes.com/sites/alastairjohnson/2022/08/30/digital-identities-will-change-the-nature-of-online-reputation/?sh=bd1f30b584a3)
|
||||
* [Digital Identities Will Change The Nature Of Online Reputation](https://www.forbes.com/sites/alastairjohnson/2022/08/30/digital-identities-will-change-the-nature-of-online-reputation/?sh=bd1f30b584a3) 2022-08-30
|
||||
|
||||
* [Decentralized Identifiers](https://explodingtopics.com/) ExplodingTopics
|
||||
|
||||
|
@ -24,12 +24,12 @@ Veridium is encouraging more organizations to embrace contactless fingerprint te
|
||||
# Biometrics
|
||||
* [the link between biometrics and PII needs careful management](https://lists.w3.org/Archives/Public/public-credentials/2021Sep/0000.html) Daniel Hardman (Wednesday, 1 September)
|
||||
|
||||
* [This is the real story of the Afghan biometric databases abandoned to the Taliban | MIT Technology Review](https://www.technologyreview.com/2021/08/30/1033941/afghanistan-biometric-databases-us-military-40-data-points/)
|
||||
* [This is the real story of the Afghan biometric databases abandoned to the Taliban | MIT Technology Review](https://www.technologyreview.com/2021/08/30/1033941/afghanistan-biometric-databases-us-military-40-data-points/) 2021-08-30
|
||||
|
||||
* [Biometric and digital identity](https://iiw.idcommons.net/3H/_Biometric_and_digital_identity) by Robert Mitwicki / Adrian Gropper
|
||||
|
||||
Background document from session 1A [http://bit.ly/biometricVC](http://bit.ly/biometricVC)
|
||||
* [Exploring Facial Biometrics](https://diacc.ca/2020/12/16/exploring-facial-biometrics-what-is-it/)
|
||||
* [Exploring Facial Biometrics](https://diacc.ca/2020/12/16/exploring-facial-biometrics-what-is-it/) 2020-12-16
|
||||
> for the purposes of allowing a user to positively identify themselves from their own device, only face verification and face authentication are employed. Face verification creates trust, while face authentication maintains it. Both functions are covered in the Pan-Canadian Trust Framework™ that is intended to support a robust digital identity, trust ecosystem that will allow all Canadians to do more online, in a safer, more secure, and confident way.
|
||||
|
||||
* [China’s Supreme Court Bars Use of Facial Recognition Without Consent](https://findbiometrics.com/chinese-supreme-court-bars-use-facial-recognition-without-consent-073007/)
|
||||
@ -49,11 +49,11 @@ In a move that is likely to please privacy advocates across the country, the Bid
|
||||
* [US Lawmakers Ask Government to Deliver Better Digital Identity Framework](https://findbiometrics.com/us-lawmakers-ask-government-deliver-better-digital-identity-framework-070706/)
|
||||
|
||||
witnesses should weigh any risks of voice and facial recognition software, which has historically exhibited bias against women and people of color, versus the potential benefits. This hearing will also discuss the future of digital identity frameworks, interoperability requirements and standards, and how the emerging technologies such as AI and distributed ledger technology could contribute to building a secure and effective digital ID.
|
||||
* [Guidance on the Acceptable Use of Biometrics – DIACC Special Interest Group Insights](https://diacc.ca/2022/01/13/guidance-on-the-acceptable-use-of-biometrics/) DIACC
|
||||
* [Guidance on the Acceptable Use of Biometrics – DIACC Special Interest Group Insights](https://diacc.ca/2022/01/13/guidance-on-the-acceptable-use-of-biometrics/) DIACC 2022-01-13
|
||||
|
||||
With input from public and private sector DIACC members and liaisons, the following guidance was created as a recommendation that the DIACC’s Trust Framework Expert Committee (TFEC) agreed to consider. Specified business, legal, and technical process requirements will be identified and considered by the TFEC for inclusion in future versions of the PCTF.
|
||||
|
||||
* [What is Web3 and Why It Matters](https://dionhinchcliffe.com/2022/01/11/what-is-web3-and-why-it-matters/) Dion Hinchcliffe
|
||||
* [What is Web3 and Why It Matters](https://dionhinchcliffe.com/2022/01/11/what-is-web3-and-why-it-matters/) Dion Hinchcliffe 2022-01-11
|
||||
|
||||
* [OpenSea, Web3, and Aggregation Theory](https://stratechery.com/2022/opensea-raises-money-bans-nfts-openseas-value-cryptos-aggregators/) Stratechery
|
||||
|
||||
@ -83,13 +83,13 @@ Web3Auth aggregates OAuth (Google, Twitter, Discord) logins, different wallets,
|
||||
|
||||
Metaverse
|
||||
|
||||
* [A Digital Identity Fit For The Metaverse](https://www.forbes.com/sites/alastairjohnson/2022/01/07/a-digital-identity-fit-for-the-metaverse/?sh=70980509184b) Forbes
|
||||
* [A Digital Identity Fit For The Metaverse](https://www.forbes.com/sites/alastairjohnson/2022/01/07/a-digital-identity-fit-for-the-metaverse/?sh=70980509184b) Forbes 2022-01-07
|
||||
|
||||
The SSI model has an individual’s value — be it crypto, in-game items, or other NFTs — directly tied to their identity. It will be accessible with a simple click for physical services, like an Uber, as well as digital ones, like using a digital asset exchange.
|
||||
|
||||
* [Avatars May Use SSI In Metaverse To Prove Identity](https://labs.hypersign.id/posts/metaverse-and-did/) Hypersign ID
|
||||
|
||||
Metaverse has been in the news for quite some time now. Seems like the next “buzzword” after “blockchain” in the tech space. The tech got a surge especially after [Facebook decided to change its name to Meta](https://www.cnbc.com/2021/10/28/facebook-changes-company-name-to-meta.html). In this blog, we will understand what is Metaverse (a very basic intro) and its relationship with digital identities. The focus will be on explaining why decentralized digital identities are an important tool for Metaverse to replicate the real world.
|
||||
Metaverse has been in the news for quite some time now. Seems like the next “buzzword” after “blockchain” in the tech space. The tech got a surge especially after [Facebook decided to change its name to Meta](https://www.cnbc.com/2021/10/28/facebook-changes-company-name-to-meta.html). In this blog, we will understand what is Metaverse (a very basic intro) and its relationship with digital identities. The focus will be on explaining why decentralized digital identities are an important tool for Metaverse to replicate the real world. 2021-10-28
|
||||
|
||||
* [Self Sovereign Identity and Web3: From the metaverse to real life](https://medium.com/@talao_io/self-sovereign-identity-and-web3-from-the-metaverse-to-real-life-8f9ef4daae56) Talao
|
||||
|
||||
|
@ -13,7 +13,7 @@ published: false
|
||||
> How reduction in transaction costs influence evolution in digital business models
|
||||
|
||||
|
||||
* [Businesses need to ‘mind the trust gap’ so users don’t need to sacrifice privacy, MEF Global Consumer Trust Survey finds](https://blog.digi.me/2021/05/20/businesses-need-to-mind-the-trust-gap-so-users-dont-need-to-sacrifice-privacy-mef-global-consumer-trust-survey-finds/) DigiMe
|
||||
* [Businesses need to ‘mind the trust gap’ so users don’t need to sacrifice privacy, MEF Global Consumer Trust Survey finds](https://blog.digi.me/2021/05/20/businesses-need-to-mind-the-trust-gap-so-users-dont-need-to-sacrifice-privacy-mef-global-consumer-trust-survey-finds/) DigiMe 2021-05-20
|
||||
|
||||
Key findings from the report are:
|
||||
|
||||
@ -40,7 +40,7 @@ What are some limitations and opportunities for making profitable business in se
|
||||
- Cryptoeconomics x SSI (h/t [@mathieu_glaude](https://twitter.com/mathieu_glaude)
|
||||
|
||||
* [On Self-Sovereign Identity: What's the Business Value of SSI?](https://hackernoon.com/self-sovereign-identity-what-is-the-business-value-uq6l36wh) Hackernoon
|
||||
> To businesses, immediate value comes from removal of the costly and challenging GDPR compliance. [Forbes reports](https://www.forbes.com/sites/oliversmith/2018/05/02/the-gdpr-racket-whos-making-money-from-this-9bn-business-shakedown/?ref=hackernoon.com#5dd0efa234a2) that in 2018 in the UK alone $1,1 billion was spent by companies on GDPR preparation, while US companies allocated over $7.8 billion on protecting customers’ personal information.
|
||||
> To businesses, immediate value comes from removal of the costly and challenging GDPR compliance. [Forbes reports](https://www.forbes.com/sites/oliversmith/2018/05/02/the-gdpr-racket-whos-making-money-from-this-9bn-business-shakedown/?ref=hackernoon.com#5dd0efa234a2) that in 2018 in the UK alone $1,1 billion was spent by companies on GDPR preparation, while US companies allocated over $7.8 billion on protecting customers’ personal information. 2018-05-02
|
||||
* [Career Advice for New Professionals in Identity](https://iiw.idcommons.net/22D/_Career_Advice_for_New_Professionals_in_Identity) by Megan Olsen
|
||||
|
||||
Simon: worked with Megan Olsen for 6(?) months as intern. Do not have job offer yet. Think this is the future. Hard to get from corporations taking advantage, bring freedom back as it was back in the day. Advise: do some research on your own, educate yourself, do development as much as you can.
|
||||
@ -86,7 +86,7 @@ we advocate “machine-readable governance” as an architectural solution.
|
||||
- Second, this architecture makes these rules transparent.
|
||||
- Third, and critically, it enables these rules to function offline through caching, which, when you think about it, is an essential feature in any digital identity verification system; trust can’t be dependent on a Wi-Fi signal.
|
||||
|
||||
* [Building a Relationship Economy](https://blogs.harvard.edu/doc/2022/02/11/building-a-relationship-economy/) Doc Searls
|
||||
* [Building a Relationship Economy](https://blogs.harvard.edu/doc/2022/02/11/building-a-relationship-economy/) Doc Searls 2022-02-11
|
||||
|
||||
Is there something new that open source development methods and values can bring to the economy? How about something old?
|
||||
|
||||
@ -94,7 +94,7 @@ Is there something new that open source development methods and values can bring
|
||||
* [4 Keys to Self-sovereign Identity Adoption](https://medium.com/trinsic/4-keys-to-self-sovereign-identity-adoption-ad269b208569), Riley Hughes
|
||||
> I decided to interview close to 50 business leaders who are seeking to deploy SSI in production to glean their learnings. The interviewees included our “competitors” (at this stage we’re more collaborative than competitive), a few of Trinsic’s customers, and industry leaders. I have summarized and consolidated their insights and my own thoughts into 4 keys for SSI adoption.
|
||||
|
||||
* [The Identity Imperative: Risk Management, Value Creation, and Balance of Power Shifts](https://identitypraxis.com/2021/12/10/the-identity-imperative-risk-management-value-creation-and-balance-of-power-shifts/) IdentityPraxis Michael Becker
|
||||
* [The Identity Imperative: Risk Management, Value Creation, and Balance of Power Shifts](https://identitypraxis.com/2021/12/10/the-identity-imperative-risk-management-value-creation-and-balance-of-power-shifts/) IdentityPraxis Michael Becker 2021-12-10
|
||||
|
||||
Brands need to prepare for fundamental shifts in people’s attitudes and expectations. The implications of these shifts will be profound, as they will force a change in competition, business models, product offerings, and business practices.
|
||||
|
||||
@ -113,7 +113,7 @@ Brands need to prepare for fundamental shifts in people’s attitudes and expect
|
||||
> - Logging\Monitoring Failure
|
||||
> - Server Side Request Forgery
|
||||
|
||||
* [Where the Intention Economy Beats the Attention Economy](https://blogs.harvard.edu/doc/2021/10/04/where-intention/)
|
||||
* [Where the Intention Economy Beats the Attention Economy](https://blogs.harvard.edu/doc/2021/10/04/where-intention/) 2021-10-04
|
||||
|
||||
There’s an economic theory here: Free customers are more valuable than captive ones—to themselves, to the companies they deal with, and to the marketplace. If that’s true, [the intention economy](https://www.amazon.com/Intention-Economy-When-Customers-Charge/dp/1422158527) will prove it. If not, we’ll stay stuck in the attention economy, where the belief that captive customers are more valuable than free ones prevails.
|
||||
|
||||
@ -188,7 +188,7 @@ The common law system countries (AU, CA, NZ, UK & US) left the market to work ou
|
||||
|
||||
|
||||
|
||||
* [Subscriptification](https://blogs.harvard.edu/doc/2022/07/15/subscriptification/) Doc Searls
|
||||
* [Subscriptification](https://blogs.harvard.edu/doc/2022/07/15/subscriptification/) Doc Searls 2022-07-15
|
||||
|
||||
Let’s start with what happened to TV.
|
||||
|
||||
@ -220,7 +220,7 @@ The plastic card paradigm has some powerful features which are instructive for t
|
||||
|
||||
- A competitive market of card personalisation bureaus, providing custom production, magnetic stripe encoding, and card distribution and activation, all in commercial bundles which can be purchased by government agencies, banks, professional associations, universities, driver licence bureaus, and so on. On the rear of many plastic cards, the card manufacturer is indicated in fine print. It may well be that the same manufacturer produced your credit cards and government cards.
|
||||
|
||||
* [How to rewrite a press release: a step-by-step guide](https://blog.jonudell.net/2022/08/13/how-to-rewrite-a-press-release-a-step-by-step-guide/) Jonudell
|
||||
* [How to rewrite a press release: a step-by-step guide](https://blog.jonudell.net/2022/08/13/how-to-rewrite-a-press-release-a-step-by-step-guide/) Jonudell 2022-08-13
|
||||
|
||||
Lead with key benefits. The release features two: support for diplex-matched antennas and faster workflow. The original headline mentions only the first, I added the second.
|
||||
|
||||
@ -246,7 +246,7 @@ GROWTH
|
||||
An Interactive workshop designed to uncover the winning strategies, and pitfalls to avoid, when communicating decentralized identity to customers, internal stakeholders, and the world.
|
||||
|
||||
## Enterprise
|
||||
* [Decentralized identity: The key to the digital era?](https://venturebeat.com/2020/10/28/decentralized-identity-the-key-to-the-digital-era/)
|
||||
* [Decentralized identity: The key to the digital era?](https://venturebeat.com/2020/10/28/decentralized-identity-the-key-to-the-digital-era/) 2020-10-28
|
||||
> They quote [Forrester](https://www.forrester.com/report/New+Tech+Decentralized+Digital+Identity+DDID+Q1+2020/-/E-RES147115) “*Today’s digital identity frameworks are centralized, suffer from a lack of trust, aren’t portable, and don’t give consumers control.*”
|
||||
>
|
||||
> They touch on a new acronym saying : enterprise-level thinking around next-generation authentication is focused on initiatives such as [SPIFFE](https://spiffe.io/), the Secure Production Identity Framework For Everyone
|
||||
|
@ -22,7 +22,7 @@ there is a push by corporations and international institutions such as the World
|
||||
Public institutions in India will soon be resuming their use of contact-based biometric sensors. Biometric authentication had been mandatory for all government employees prior to the pandemic, but the Indian central government was [one of several institutions](https://findbiometrics.com/biometrics-news-hyderabad-punjab-join-governments-banning-fingerprint-based-biometrics-amid-fears-covid-19-030602/) that [suspended the practice](https://findbiometrics.com/authorities-in-pakistan-india-suspend-biometric-attendance-systems-over-covid-19-concerns-902281/) due to health concerns following the outbreak of COVID-19.
|
||||
* [Why a Little-Known Blockchain-Based Identity Project in Ethiopia Should Concern Us All](https://www.cigionline.org/articles/why-a-little-known-blockchain-based-identity-project-in-ethiopia-should-concern-us-all/) Cigi Online
|
||||
|
||||
Hoskinson [says](https://iohk.io/en/blog/posts/2021/04/28/decentralized-identity-on-the-blockchain-is-the-key-to-iohks-vision-for-africa/) his mission is to give people in Africa control over their own lives. But in reality, his plans for Ethiopia appear crypto-colonial. As researcher Pete Howson [explains](https://www.coindesk.com/markets/2021/07/14/the-headache-of-crypto-colonialism/), “Innovators are not drawn to fragile states because they want to fix these things. Poverty and corruption are the ideal conditions for entrepreneurs exploring opportunities to extract resources from vulnerable communities.”
|
||||
Hoskinson [says](https://iohk.io/en/blog/posts/2021/04/28/decentralized-identity-on-the-blockchain-is-the-key-to-iohks-vision-for-africa/) his mission is to give people in Africa control over their own lives. But in reality, his plans for Ethiopia appear crypto-colonial. As researcher Pete Howson [explains](https://www.coindesk.com/markets/2021/07/14/the-headache-of-crypto-colonialism/), “Innovators are not drawn to fragile states because they want to fix these things. Poverty and corruption are the ideal conditions for entrepreneurs exploring opportunities to extract resources from vulnerable communities.” 2021-07-14
|
||||
* [Singapore’s tech-utopia dream is turning into a surveillance state nightmare](https://restofworld.org/2021/singapores-tech-utopia-dream-is-turning-into-a-surveillance-state-nightmare/) RestofWorld
|
||||
|
||||
“What [technology] will do for people is make our lives a hell of a lot easier, more convenient, more easily able to plug into the good life,” said Monamie Bhadra Haines, an assistant professor at the Technical University of Denmark, who studies the intersection between technology and society. “But … the surveillance is what is here, now.”
|
||||
@ -36,7 +36,7 @@ The fderal privacy commissioner also said it has not yet received a report, and
|
||||
* [FIDO & DIDs](https://fidoalliance.org/2020-fido-hackathon-in-korea-introducing-the-top-5-winners/)?
|
||||
> This presentation from Day 1 of 2020 FIDO from Team Dr. Who (consisting of a project manager, 2 developers, and a public healthcare specialist from the World Health Organization 9 (WHO). Their Proof of Concept introduces smart health insurance card services that link Distributed IDentity technology and FIDO Authentication. The team aims to solve the problem of existing physical cards, which are an inferior way of identifying someone’s actual identity.
|
||||
Here is a link to the [video presentation](https://www.youtube.com/watch?v=Zj44RIwgidY&feature=youtu.be) (in Korean)
|
||||
* [GADI presented](https://www.thedinglegroup.com/blog/2020/12/15/gadi-and-the-did-alliance) at the [Vienna Digital Identity Meetup](https://www.meetup.com/Vienna-Digital-Identity-Meetup/) (now virtual, very good, much recommend). The GADI architecture is a federated identity ecosystem where Digital Address Platforms (DAPs) issue unique individual identifiers controlled by the GADI ecosystem. This is the fundamental difference in identity philosophy between GADI and SSI based systems. The Digital Address is a lifetime connected identifier and under the control of the DAP. The [video is here](https://vimeo.com/491079655).
|
||||
* [GADI presented](https://www.thedinglegroup.com/blog/2020/12/15/gadi-and-the-did-alliance) at the [Vienna Digital Identity Meetup](https://www.meetup.com/Vienna-Digital-Identity-Meetup/) (now virtual, very good, much recommend). The GADI architecture is a federated identity ecosystem where Digital Address Platforms (DAPs) issue unique individual identifiers controlled by the GADI ecosystem. This is the fundamental difference in identity philosophy between GADI and SSI based systems. The Digital Address is a lifetime connected identifier and under the control of the DAP. The [video is here](https://vimeo.com/491079655). 2020-12-15
|
||||
|
||||
## Business
|
||||
* [The business models of identity](https://blog.verim.id/the-business-models-of-identity-bb3336773727)
|
||||
|
@ -72,13 +72,13 @@ Takeaway #4: The technology exists to be able to create accountability models as
|
||||
> The Generative Self-Sovereign Internet explored the generative properties of the self-sovereign internet, a secure overlay network created by DID connections. [...]
|
||||
>
|
||||
> In this article, I explore the generativity of self-sovereign identity—specifically the exchange of verifiable credentials. One of the key features of the self-sovereign internet is that it is protocological—the messaging layer supports the implementation of protocol-mediated interchanges on top of it. This extensibility underpins its generativity.
|
||||
* [Blockchain, Self-Sovereign Identity, and Selling Off Humanity](https://wrenchinthegears.com/2018/07/15/blockchain-self-sovereign-identity-and-selling-off-humanity/) Wrench in the Gears
|
||||
* [Blockchain, Self-Sovereign Identity, and Selling Off Humanity](https://wrenchinthegears.com/2018/07/15/blockchain-self-sovereign-identity-and-selling-off-humanity/) Wrench in the Gears 2018-07-15
|
||||
|
||||
I think this piece is full of inaccuracies - it is also put together by someone really trying to understand a whole bunch of different things that some how get merged into being “all that bad blockchain technology that deprives people of dignity and rights” (Kaliya)
|
||||
|
||||
It’s time activists began to develop a working knowledge of Blockchain and self-sovereign digital identity, because these are the mechanisms that will drive the transition to IoT monitoring for the purposes of Pay for Success deal evaluation
|
||||
|
||||
* [The European Declaration on Digital Rights puts people in the firing line of the digital transformation](https://blog.xot.nl/2022/03/06/the-european-declaration-on-digital-rights-puts-people-in-the-firing-line-of-the-digital-transformation/index.html) Jaap-Henk Hoepman
|
||||
* [The European Declaration on Digital Rights puts people in the firing line of the digital transformation](https://blog.xot.nl/2022/03/06/the-european-declaration-on-digital-rights-puts-people-in-the-firing-line-of-the-digital-transformation/index.html) Jaap-Henk Hoepman 2022-03-06
|
||||
|
||||
By focusing on the risk to individual citizens, the Declaration complete ignores the systemic risks introduced by the digital transformation (and in general the reliance on so called [programmable infrastructures](https://www.tudelft.nl/tbm/programmable-infrastructures), as expressed by Seda Gürses and Martha Poon among others).
|
||||
|
||||
|
@ -1,11 +1,13 @@
|
||||
---
|
||||
published: false
|
||||
---
|
||||
* [Katryna Dow - Data minimisation: value, trust and obligation](https://www.ubisecure.com/podcast/data-minimisation-meeco-katryna-dow/)
|
||||
> Katryna talks to Oscar about her career (including inspiration from Minority Report), Meeco’s personal data & distributed ledger platform, the importance of data minimisation to inspire trust in organisations, and cultural differences in attitudes towards digital identity.
|
||||
|
||||
# Data Governance
|
||||
* [Radical Exchange Talk: Data Agency. Individual or Shared?](https://identitywoman.net/radical-exchange-talk-data-agency-individual-or-shared/)
|
||||
|
||||
* [Marissa Mayer wants to fix your address book](https://www.cnbc.com/2020/11/18/marissa-mayer-is-back-and-she-wants-to-fix-your-address-book.html) CNBC
|
||||
* [Marissa Mayer wants to fix your address book](https://www.cnbc.com/2020/11/18/marissa-mayer-is-back-and-she-wants-to-fix-your-address-book.html) CNBC 2020-11-18
|
||||
> At launch, Mayer’s start-up is rolling out Sunshine Contacts, an address book app that relies on artificial intelligence to find and merge duplicate contacts, fill out incomplete information and continually keep that data up to date. The app integrates with the iOS Contacts app as well as Gmail and will be free to all iOS users with an invitation.
|
||||
* [You are not your Data but Your Data is still You](https://deepdives.in/you-are-not-your-data-but-your-data-is-still-you-b41d2478ece2).
|
||||
> In the digital age, individual privacy in the broadest sense is about control over protecting one’s personally identifiable information (PII), such as information about health, credit, shopping, or communication. But the types of information deemed ‘personally identifiable’ and the amount of control one has over them varies around the world.
|
||||
@ -42,7 +44,7 @@ If you are in accounting, audit or finance shoes, how would you play the game to
|
||||
* [If your strategic plan is based on data, have you considered the consequences?](https://www.mydigitalfootprint.com/2021/04/if-your-strategic-plan-is-based-on-data.html) MyDigitalFootprint
|
||||
> How do you know your data set has the views of everyone who is critical to your business today and in the future? How do you know the tools you use provide equal weight to everyone to make our business thrive? How do you know if the recommendation was written before the analysis? How do your incentives create a new bias?
|
||||
|
||||
* [Data for good: powering our way to a better world](https://blog.digi.me/2021/04/29/data-for-good-powering-our-way-to-a-better-world/)
|
||||
* [Data for good: powering our way to a better world](https://blog.digi.me/2021/04/29/data-for-good-powering-our-way-to-a-better-world/) 2021-04-29
|
||||
> We should absolutely all be taking care of the data that belongs to us, our data that we create, that we have a right to be able to control and share exactly as we choose. But we should also bear in mind the power of that data to help each of us, every day, benefit from the good that can come when it is shared and used to create a better world for us all.
|
||||
* [Everybody has our data ... except us](https://reb00ted.org/personaldata/20210620-who-has-my-personal-data/) reb00ted
|
||||
|
||||
@ -67,11 +69,11 @@ I re-read [Zhamak Dehghani](https://twitter.com/zhamakd) ’s [original](http
|
||||
> In recent years, personal data has been an increasingly popular topic of conversation for marketers, data analysts, regulators, and privacy warriors. Individuals have learnt that recent regulatory updates have given them more rights over how that data is used. Are these two forces aligned?
|
||||
>
|
||||
> We distributed a survey and received over 400 responses from both individuals and organisations answering questions about the management of personal data. How aligned are the two points of view? This infographic shows a summary of key questions and responses.
|
||||
* [What Does It Actually Mean When a Company Says, “We Do Not Sell Your Data?”](https://john.philpin.com/2021/09/03/what-does-it.html) John Philipin
|
||||
* [What Does It Actually Mean When a Company Says, “We Do Not Sell Your Data?”](https://john.philpin.com/2021/09/03/what-does-it.html) John Philipin 2021-09-03
|
||||
|
||||
Probably because the alternatives produce even more income.
|
||||
|
||||
* [Japan-based Dixon Siu to join the Board of aNewGovernance AISBL](https://www.anewgovernance.org/2021/09/15/japan-based-dixon-siu-to-join-the-board-of-anewgovernance-aisbl/)
|
||||
* [Japan-based Dixon Siu to join the Board of aNewGovernance AISBL](https://www.anewgovernance.org/2021/09/15/japan-based-dixon-siu-to-join-the-board-of-anewgovernance-aisbl/) 2021-09-15
|
||||
|
||||
Given his breadth of experience and alignment with a number of strategic sectors where aNewGovernance is currently developing ecosystems, I am sure, he will bring incredible contribution.
|
||||
|
||||
@ -81,13 +83,13 @@ The compelling data and research suggest that my original question now needs to
|
||||
|
||||
* [Data Sovereignty International Forum 2021(English)](https://www.youtube.com/watch?v=2Q2DL0ojauA)
|
||||
|
||||
* [FTC’s Shot Across the Bow: Purpose and Use Restrictions Could Frame The Future of Personal Data Management](https://identitypraxis.com/2021/11/03/ftcs-shot-across-the-bow-purpose-and-use-restrictions-could-frame-the-future-of-personal-data-management/) Identity Praxis
|
||||
* [FTC’s Shot Across the Bow: Purpose and Use Restrictions Could Frame The Future of Personal Data Management](https://identitypraxis.com/2021/11/03/ftcs-shot-across-the-bow-purpose-and-use-restrictions-could-frame-the-future-of-personal-data-management/) Identity Praxis 2021-11-03
|
||||
|
||||
So that there is no uncertainty or doubt, however, Duball[4](https://identitypraxis.com/2021/11/03/ftcs-shot-across-the-bow-purpose-and-use-restrictions-could-frame-the-future-of-personal-data-management/#fn4) reports that, while consumer privacy is a chief concern for the commission, it is not the primary concern to the exclusion of other concerns. The commission is also worried about algorithmic bias and “dark patterns” practices.
|
||||
So that there is no uncertainty or doubt, however, Duball[4](https://identitypraxis.com/2021/11/03/ftcs-shot-across-the-bow-purpose-and-use-restrictions-could-frame-the-future-of-personal-data-management/#fn4) reports that, while consumer privacy is a chief concern for the commission, it is not the primary concern to the exclusion of other concerns. The commission is also worried about algorithmic bias and “dark patterns” practices. 2021-11-03
|
||||
* [Self-Sovereign Identity Personal Data Usage Licensing (SSI-PDUL) Model: Whitepaper](https://hyperonomy.files.wordpress.com/2019/11/hyperonomy-ssi-personal-data-usage-licensing-model-ssi-pdul-model-2021-0.27rd.pdf) Hyperonomy
|
||||
|
||||
The scope of the Self-Sovereign Identity Personal Data Usage Licensing (SSI-PDUL) Model is personal digital identifiers and any associated identity data presented by Alice to the App. It does not include the permissioning of data internal to the App (although the natural extension of the solution to internal data is an obvious one)
|
||||
* [Self-Sovereign Identity Personal Data Usage Licensing (SSI-PDUL) Model](https://hyperonomy.com/2021/01/27/self-sovereign-identity-personal-data-usage-licensing-ssi-pdul-model-solution-concept/) Michael Herman
|
||||
* [Self-Sovereign Identity Personal Data Usage Licensing (SSI-PDUL) Model](https://hyperonomy.com/2021/01/27/self-sovereign-identity-personal-data-usage-licensing-ssi-pdul-model-solution-concept/) Michael Herman 2021-01-27
|
||||
|
||||
How Alice User, an App User and Identity Owner, and Bob Developer, an App Developer and App Controller, might negotiate the use of Alice’s personal digital identifiers and any associated personal identity data by Bob’s app, based on Self-Sovereign Identity Model Usage Principles
|
||||
|
||||
@ -224,7 +226,7 @@ Discussion moved to this Miro board:
|
||||
17:52:46 From Orie Steele to Everyone : Shameless plug for our work with GS1 on VCs
|
||||
|
||||
* [https://www.youtube.com/watch?v=iDkANArgdKI&t=15s](https://www.youtube.com/watch?v=iDkANArgdKI&t=15s)
|
||||
* [The Anatomy Of Personal Data Sovereignty](https://www.forbes.com/sites/forbesbusinesscouncil/2021/05/04/the-anatomy-of-personal-data-sovereignty/?sh=69dbea5761e1) in Forbes
|
||||
* [The Anatomy Of Personal Data Sovereignty](https://www.forbes.com/sites/forbesbusinesscouncil/2021/05/04/the-anatomy-of-personal-data-sovereignty/?sh=69dbea5761e1) in Forbes 2021-05-04
|
||||
|
||||
The data privacy/control issue isn’t new, but the attitude shift is. People care more, demand more, and the scale of change that has occurred due to the Covid-19 pandemic is major. As we live through times exposing such injustice and inequality, it's becoming evident that this personal data ecosystem needs to undergo a major revamp.
|
||||
* [BIS Annual Report](https://www.bis.org/publ/arpdf/ar2022e3.pdf) section III. The future monetary system on page 41 in the chart
|
||||
|
@ -26,7 +26,7 @@ our latest series examining the evolution of digital identity, and how self-sove
|
||||
> Hackers value personal information the most. 96% of hacking groups’ primary motive is intelligence gathering. Researchers at privacy website PrivacyAffairs.com found that you can obtain a person's full identity for the low price of $1,275.
|
||||
* [Self Sovereign Identity — explained](https://micha-roon.medium.com/self-sovereign-identity-explained-f5380c08e446) Micha Roon
|
||||
> It would be great indeed if digital interactions became even more trustworthy without the need to present our data on a silver platter to large Internet corporations
|
||||
* [Self-Sovereign vs Administrative Identity](http://blogs.harvard.edu/vrm/2012/03/25/ssi/) Doc Searls 2012
|
||||
* [Self-Sovereign vs Administrative Identity](http://blogs.harvard.edu/vrm/2012/03/25/ssi/) Doc Searls 2012 2012-03-25
|
||||
> The problem I’m trying to surface here is that we need full respect for self-sovereign identities, and identifiers, before we can solve the problem of highly fractured and incompatible administrative identifiers — a problem that has only become worse with the growth of the Web, where by design we are always the submissive and dependent party: calves to administrative cows.
|
||||
* [@lissi_id and the three-sided credentials market](https://twitter.com/lissi_id/status/1334834875896004608)
|
||||
> When a user holds his:her own credentials locally on the phone, it creates a three-sided market, which puts the holder of the credential in the position of a carrier between issuer and verifiers.
|
||||
@ -42,11 +42,11 @@ what’s cool about DIDs (besides their self-service creation) is that their met
|
||||
The Models: Space Time • Presentation • Attribute • Relationship • Capability
|
||||
* [Adrian Doerk writes](https://medium.com/@SSI_Ambassador/the-growth-factors-of-self-sovereign-identity-33aa3cc17ce7)
|
||||
> The post details 5 components necessary for the advance of SSI: Business, Technology, User Experience, Compliance, and Governance.
|
||||
* [Why is SSI becoming a necessity and what potential it holds?](https://www.aceblock.com/2020/11/12/news-lecture-why-is-ssi-becoming-a-necessity-and-what-potential-it-holds/)
|
||||
* [Why is SSI becoming a necessity and what potential it holds?](https://www.aceblock.com/2020/11/12/news-lecture-why-is-ssi-becoming-a-necessity-and-what-potential-it-holds/) 2020-11-12
|
||||
> Problem 1: CENTRAL AUTHORITY CONTROLS ALL DATA\
|
||||
> Problem 2: NUMEROUS SIGNUPS WITH SAME DATA\
|
||||
> Problem 3: INCONVENIENCE OF ONLINE FORMS
|
||||
* [The Implications of Bring Your Own Identity](https://www.idsalliance.org/blog/2020/12/03/the-implications-of-bring-your-own-identity/) Identity Defined Security Alliance
|
||||
* [The Implications of Bring Your Own Identity](https://www.idsalliance.org/blog/2020/12/03/the-implications-of-bring-your-own-identity/) Identity Defined Security Alliance 2020-12-03
|
||||
> My short stint as “Mark Jannell" taught me a lot of about trust and ease of use in a bring your own identity model. Trust, as always in security, is essential to this new class of relationships and must be established and then protected from abuse. Ease of use, it turns out, is a key factor in protecting that trust and promoting the adoption of good identity patterns. I’m sure that I could have learned these lessons in some other way, but I’ll never forget my half year answering to a pseudonym.
|
||||
* [Blockchain is the Least Interesting Thing About Self-sovereign Identity](https://medium.com/trinsic/blockchain-is-the-least-interesting-thing-about-self-sovereign-identity-75c1b56ce497) Riley Huges
|
||||
> as useful as blockchain is for SSI, it’s nowhere near as interesting as:
|
||||
@ -61,7 +61,7 @@ We pointed to this before it happened. It was great. Here is a round up from Jol
|
||||
> 1. Ideal – full convergence of SSI technology with interoperability by default.
|
||||
> 2. Functional – partial convergence resulting in detached ecosystems.
|
||||
> 3. Dysfunctional – no convergence and isolated, locked-in ecosystems.
|
||||
* [Who Controls Your Digital Identity?](https://blogs.sap.com/2021/02/18/who-controls-your-digital-identity/) SAP
|
||||
* [Who Controls Your Digital Identity?](https://blogs.sap.com/2021/02/18/who-controls-your-digital-identity/) SAP 2021-02-18
|
||||
> SSI will have to be integrated with large existing business processes – and therefore enterprise systems such as ERPs, HCMs, or SCMs to name a few. If this integration results in SSI being as easy to use as clicking a button or selecting a menu item, it will lead to rapid uptake and acceptance.
|
||||
* [The 5P’s of a Self-Sovereign Identity](https://markvanrijmenam.medium.com/the-5ps-of-a-self-sovereign-identity-e6f6eb802d75)
|
||||
> A self-sovereign identity can be defined by the 5P’s as it is personal (it is about you), portable (meaning you can take your identity and data from one platform to another), private (you control your identity and data), persistent (it does not change without your consent) and protected (they cannot steal your identity).
|
||||
@ -77,7 +77,7 @@ We pointed to this before it happened. It was great. Here is a round up from Jol
|
||||
|
||||
An answer to these challenges is an ecosystem in which digital identity data can be exchanged in a way that is secure, reliable, scalable and convenient. This will have a positive impact on the economic future of Germany and Europe while at the same time enhancing the private sphere of the individual.
|
||||
|
||||
* [Getting Started with Self Sovereign Identity SSI](https://damienbod.com/2021/03/29/getting-started-with-self-sovereign-identity-ssi/)
|
||||
* [Getting Started with Self Sovereign Identity SSI](https://damienbod.com/2021/03/29/getting-started-with-self-sovereign-identity-ssi/) 2021-03-29
|
||||
> The blog is my getting started with Self Sovereign identity. I plan to explore developing solutions using Self Sovereign Identities, the different services and evaluate some of the user cases in the next couple of blogs.
|
||||
* [Introduction to Self-Sovereign Identity](https://dev.to/jakubkoci/introduction-to-self-sovereign-identity-3kkm) Jakubkoci
|
||||
> In this article, I will do my best to explain self-sovereign identity from the end-user perspective, without any technicalities.
|
||||
@ -85,7 +85,7 @@ An answer to these challenges is an ecosystem in which digital identity data can
|
||||
> We should have the right to manage our identity, free of any country or the place where we live. By giving this right to the government or any central authority, we give them much more power. Separating data rights from the actual data is important. User should have the right to decide who should have the access to his/her data.
|
||||
* [The Principles of User Sovereignty](https://uxdesign.cc/the-principles-of-user-sovereignty-515ac83401f6) and
|
||||
|
||||
* [Why Distributed Ledger Technology (DLT) for Identity?](https://www.hyperledger.org/blog/2021/04/21/why-distributed-ledger-technology-dlt-for-identity)
|
||||
* [Why Distributed Ledger Technology (DLT) for Identity?](https://www.hyperledger.org/blog/2021/04/21/why-distributed-ledger-technology-dlt-for-identity) 2021-04-21
|
||||
> So why DLT? First, we can get the good parts of paper credentials—private transactions between holders and verifiers and no callback to the issuer. Second, the issuer gets a trusted, open and transparent way to publish the cryptographic material needed for those private holder-verifier transactions. Third, there is no need to have a “Trusted Third Party” participating in the interactions.
|
||||
>
|
||||
> And did I mention, no private data goes on the DLT!!!
|
||||
@ -185,8 +185,8 @@ Identification: Who are you?
|
||||
Authentication: Is it you again?
|
||||
|
||||
Authorization: What rights do I want to grant you?
|
||||
* [Beyond basics: Expert Q&A about SSI with Dr. Milly Perry and Martin Schäffner](https://europeanblockchainassociation.org/2021/06/01/ssi-beyond-basics-with-dr-milly-perry-and-martin-schaffner/)
|
||||
> In May, [Dr. Milly Perry](https://www.linkedin.com/in/milly-perry-1b4682/), blockchain expert and former research director at the Open University of Israel, had invited [Martin Schäffner](https://www.linkedin.com/in/martinschaeffner/), the initiator of the SSI Working Group at the European Blockchain Association, to speak at a webinar of the Israeli Chamber of Information Technology (You can find the recording [here](https://europeanblockchainassociation.org/2021/05/06/eussi-israeli-chamber-of-information-technology/)). His introduction to Self-Sovereign Identity (SSI) was met with great interest and sparked many questions from the audience. But why only take questions from the audience? We asked both experts, which questions they would like to know their peers’ thoughts about. Here is their exchange about Verifiable Credentials, biometrics, pitfalls and barriers, NFTs, the role of governments and the thing that could make SSI obsolete.
|
||||
* [Beyond basics: Expert Q&A about SSI with Dr. Milly Perry and Martin Schäffner](https://europeanblockchainassociation.org/2021/06/01/ssi-beyond-basics-with-dr-milly-perry-and-martin-schaffner/) 2021-06-01
|
||||
> In May, [Dr. Milly Perry](https://www.linkedin.com/in/milly-perry-1b4682/), blockchain expert and former research director at the Open University of Israel, had invited [Martin Schäffner](https://www.linkedin.com/in/martinschaeffner/), the initiator of the SSI Working Group at the European Blockchain Association, to speak at a webinar of the Israeli Chamber of Information Technology (You can find the recording [here](https://europeanblockchainassociation.org/2021/05/06/eussi-israeli-chamber-of-information-technology/)). His introduction to Self-Sovereign Identity (SSI) was met with great interest and sparked many questions from the audience. But why only take questions from the audience? We asked both experts, which questions they would like to know their peers’ thoughts about. Here is their exchange about Verifiable Credentials, biometrics, pitfalls and barriers, NFTs, the role of governments and the thing that could make SSI obsolete. 2021-05-06
|
||||
* [What Is Zero Trust?](https://www.pingidentity.com/en/company/blog/posts/2021/what-is-zero-trust.html) Ping
|
||||
|
||||
1. The network is always assumed to be hostile.
|
||||
@ -223,7 +223,7 @@ Finally, we give examples of the harmful side (The ugly); how SSI technology can
|
||||
The reason why we have seen less uptake in SSI solutions is because the people behind these solutions fail to recognise the design principles that will be most important to its success. Instead, we see people focusing on technological nirvanas like blockchain or an over-emphasis on governance.
|
||||
* [Beginners Guide to SSI](https://domilabs.io/beginners-guide-ssi/) Domi
|
||||
|
||||
* [Bootstrapping a VDR-based Fully Decentralized Object (FDO)/Credential Platform: VON Example](https://hyperonomy.com/2021/07/26/bootstrapping-a-vdr-based-decentralized-credential-object-platform-von-example/)
|
||||
* [Bootstrapping a VDR-based Fully Decentralized Object (FDO)/Credential Platform: VON Example](https://hyperonomy.com/2021/07/26/bootstrapping-a-vdr-based-decentralized-credential-object-platform-von-example/) 2021-07-26
|
||||
|
||||
What are the common/known strategies for bootstrapping a VDR-based decentralized credential/object platform? …asked naively on purpose. Strategies for placing the first/initial DIDs in the VDR? …presumably purposed to be the initial Issuer(s) of verifiable
|
||||
|
||||
@ -321,7 +321,7 @@ In a nutshell, Self-Sovereign Identity allows individuals to manage their own id
|
||||
* [The Sovereignty Stack: Re-thinking Digital Identity for Web3.0 w/ Greg KIDD [METACO TALKS #23]](https://www.youtube.com/watch?v=CyGggZ2pT1I)
|
||||
|
||||
Greg is a serial entrepreneur who is probably best known for founding and taking public Dispatch Management Services Corp, the world’s largest on demand dispatch network for urgent deliveries. In a highly interesting career so far, Greg was also Chief Risk Officer at Ripple Labs and a senior analyst for the Board of Governors of the Federal Reserve in Washington. In his latest venture Global ID, Greg is acting on his long-held belief that people’s identity should be truly portable and owned by individuals themselves rather than corporations or governments.
|
||||
* [Challenges to Self-Sovereign Identity](https://damienbod.com/2021/10/11/challenges-to-self-sovereign-identity/)
|
||||
* [Challenges to Self-Sovereign Identity](https://damienbod.com/2021/10/11/challenges-to-self-sovereign-identity/) 2021-10-11
|
||||
|
||||
I based my findings after implementing and testing solutions and wallets with the following SSI solution providers:
|
||||
|
||||
@ -349,7 +349,7 @@ despite the technological revolution we are living through, identity management
|
||||
|
||||
In this discussion I ask Andrew Baker, AWS's Head of EC2 Engineering and a surprise guest, to share their views on whether Self Sovereign Identity management could be the solution and how likely it is
|
||||
|
||||
* [Digital Identity: The Trending Tech Concept Changing How We Live](https://www.forbes.com/sites/johnhall/2021/10/15/digital-identity-the-trending-tech-concept-changing-how-we-live/?sh=3e004c6c2c4c) Forbes
|
||||
* [Digital Identity: The Trending Tech Concept Changing How We Live](https://www.forbes.com/sites/johnhall/2021/10/15/digital-identity-the-trending-tech-concept-changing-how-we-live/?sh=3e004c6c2c4c) Forbes 2021-10-15
|
||||
|
||||
Identification is key to our success. It determines the jobs we get, the money we make, how we can manage our health, and more. The fact of the matter is that 3.4 billion people have access to legally recognized identification but still [have difficulty using that identification online](https://www.mckinsey.com/business-functions/mckinsey-digital/our-insights/digital-identification-a-key-to-inclusive-growth).
|
||||
|
||||
@ -396,7 +396,7 @@ Listen to this episode for an entertaining deep dive into the topic of badges an
|
||||
|
||||
The public keys of the user and the third-party organization for verifying the digital signature are recorded in a distributed ledger, and the user of the identity information verifies the provided information using them. In this way, users can control their own identity information without relying on a specific central administrator.
|
||||
|
||||
* [Beyond The Device With Self-Sovereign Identities](https://www.forbes.com/sites/alastairjohnson/2021/11/15/beyond-the-device-with-self-sovereign-identities/) Forbes
|
||||
* [Beyond The Device With Self-Sovereign Identities](https://www.forbes.com/sites/alastairjohnson/2021/11/15/beyond-the-device-with-self-sovereign-identities/) Forbes 2021-11-15
|
||||
|
||||
In 2021, the average cost of a data breach reached an all-time high of [$4.24 million](https://www.upguard.com/blog/cost-of-data-breach), even though businesses are already spending millions more to combat financial crime and meet their regulatory and compliance responsibilities.
|
||||
|
||||
@ -417,7 +417,7 @@ Through deceptive marketing practices the first-movers in the Digital ID market
|
||||
|
||||
Solving the identity paradox: the tradeoff between privacy, security, & user experience
|
||||
|
||||
* [Beyond The Device With Self-Sovereign Identities](https://www.forbes.com/sites/alastairjohnson/2021/11/15/beyond-the-device-with-self-sovereign-identities/) Forbes
|
||||
* [Beyond The Device With Self-Sovereign Identities](https://www.forbes.com/sites/alastairjohnson/2021/11/15/beyond-the-device-with-self-sovereign-identities/) Forbes 2021-11-15
|
||||
|
||||
As we’ve moved more and more online, digital platforms and processes have failed to keep up. We can’t trust them to collect, store or share our personal information safely. In fact, consumers’ information is frequently abused and misused without our knowledge or consent.
|
||||
|
||||
@ -446,7 +446,7 @@ SSI has the power to change the world for the better by flipping the power dynam
|
||||
|
||||
the digital representation of the identification process we know from the physical world. Things like showing our driver’s license to prove we are allowed to drive, or sending a bank statement to a real estate agent to prove our income and account balance.
|
||||
|
||||
* [Self Sovereign Identity Explainer](https://www.didas.swiss/2021/12/17/self-sovereign-identity-explainer-introduction-to-the-world-of-ssi/) DIDAS ([PDF](https://www.didas.swiss/wp-content/uploads/2021/12/SSI-Explainer-Introduction-final.pdf)
|
||||
* [Self Sovereign Identity Explainer](https://www.didas.swiss/2021/12/17/self-sovereign-identity-explainer-introduction-to-the-world-of-ssi/) DIDAS ([PDF](https://www.didas.swiss/wp-content/uploads/2021/12/SSI-Explainer-Introduction-final.pdf) 2021-12-17
|
||||
|
||||
* [New Indicio Executive Workshop Provides Essential Grounding in Digital Identity: The Business and Investor’s Guide to Self-Sovereign Identity](https://indicio.tech/new-indicio-executive-workshop-provides-essential-grounding-in-digital-identity-the-business-and-investors-guide-to-self-sovereign-identity/) by [Scott Harris](https://indicio.tech/author/scott-harris/)
|
||||
|
||||
@ -464,7 +464,7 @@ Decentralized identity is an emerging concept becoming more popular for online c
|
||||
|
||||
Self-sovereign identity (SSI) is a movement that claims digital identity should be just as legitimate and nuanced as a person’s human identity, while being accessible to all, privacy-preserving, and not reliant on a single government or corporation.
|
||||
|
||||
* [Identity management is key to increasing security, reducing fraud and developing a seamless customer experience](https://identitypraxis.com/2022/01/07/identity-management-is-key-to-increasing-security-reducing-fraud-and-developing-a-seamless-customer-experience/) Identity Praxis
|
||||
* [Identity management is key to increasing security, reducing fraud and developing a seamless customer experience](https://identitypraxis.com/2022/01/07/identity-management-is-key-to-increasing-security-reducing-fraud-and-developing-a-seamless-customer-experience/) Identity Praxis 2022-01-07
|
||||
|
||||
- Identity management is an iterative process with three core elements – initial identification, authentication (re-identifying the individual) and verification (ensuring the individual is who they claim to be)
|
||||
- Enterprises employ a vast array of technologies to execute these processes which are growing in scope and complexity
|
||||
@ -496,7 +496,7 @@ Web 3 has brought a new way to engage with websites, and dare I say, it is almos
|
||||
|
||||
We are freeing ourselves from the management of “data hash” which leads to a centralization or complexification of verification procedures. This makes our solution new compared to traditional blockchain applications on the market.
|
||||
|
||||
* [What are Verifiable Credentials? Why do they matter?](https://flur.ee/2022/01/10/what-are-verifiable-credentials-why-do-they-matter/)
|
||||
* [What are Verifiable Credentials? Why do they matter?](https://flur.ee/2022/01/10/what-are-verifiable-credentials-why-do-they-matter/) 2022-01-10
|
||||
|
||||
Authority Does Not Require Centralized Power
|
||||
|
||||
@ -620,7 +620,7 @@ The Zero Trust model is the belief that no one should be trusted from inside or
|
||||
|
||||
Multi-factor authentication takes it step further by requiring users to provide proof from two or more authentication factors (categories) before access is granted.
|
||||
|
||||
* [Challenges to Self Sovereign Identity](https://damienbod.com/2021/10/11/challenges-to-self-sovereign-identity/) Damien Bod
|
||||
* [Challenges to Self Sovereign Identity](https://damienbod.com/2021/10/11/challenges-to-self-sovereign-identity/) Damien Bod 2021-10-11
|
||||
|
||||
The article goes through some of the challenges we face when using or implementing identity, authentication and authorization solutions using self sovereign identity. I based my findings after implementing and testing solutions and wallets with the following SSI solution providers: Trinsic MATTR.global Evernym Azure Active Directory Verifiable Credentials Different Wallets like Lissi SSI
|
||||
|
||||
@ -646,9 +646,9 @@ We hope this will get you thinking about enabling SSI using an option that best
|
||||
|
||||
This paper shows that federated identity is really a radical and deeply problematic departure from the way we do routine business. Federation undoes and complicates long standing business arrangements, exposing customers and service providers alike to new risks that existing contracts are unable to deal with. Identity federations tend to overlook that identities are proxies for relationships we have in different contexts. Business relationships don’t easily “interoperate."
|
||||
|
||||
* [Verifiable credentials are key to the future of online privacy](https://www.helpnetsecurity.com/2021/07/26/verifiable-credentials/) Helpnet
|
||||
* [Verifiable credentials are key to the future of online privacy](https://www.helpnetsecurity.com/2021/07/26/verifiable-credentials/) Helpnet 2021-07-26
|
||||
|
||||
they offer a few advantages that we don’t get with paper records. Whereas a physical document (let’s say, a [vaccine card](https://www.helpnetsecurity.com/2021/06/15/vaccine-passports/)) can be forged and [passed off as authentic](https://www.npr.org/2021/06/08/1004264531/fake-covid-vaccine-cards-keep-getting-sold-online-using-one-is-a-crime?t=1626423870877), the [security mechanisms](https://www.evernym.com/blog/the-three-pillars-of-self-sovereign-identity/) behind a verifiable credential means that it can never be tampered with and that anyone shown the credential will be able to immediately verify who issued it and to whom it was issued.
|
||||
they offer a few advantages that we don’t get with paper records. Whereas a physical document (let’s say, a [vaccine card](https://www.helpnetsecurity.com/2021/06/15/vaccine-passports/)) can be forged and [passed off as authentic](https://www.npr.org/2021/06/08/1004264531/fake-covid-vaccine-cards-keep-getting-sold-online-using-one-is-a-crime?t=1626423870877), the [security mechanisms](https://www.evernym.com/blog/the-three-pillars-of-self-sovereign-identity/) behind a verifiable credential means that it can never be tampered with and that anyone shown the credential will be able to immediately verify who issued it and to whom it was issued. 2021-06-08
|
||||
|
||||
* [Selective Disclosure: Share Just What You Want](https://academy.affinidi.com/selective-disclosure-share-what-you-want-8ae367655b7b) Affinidi
|
||||
|
||||
@ -1025,7 +1025,7 @@ One way to avoid password-related problems is to use decentralized identity mana
|
||||
|
||||
give direct input towards our product improvements and be the first choice for research recruiting opportunities.
|
||||
|
||||
* [Use the Okta CLI to Build Secure Python Apps](https://developer.okta.com/blog/2022/07/27/python-okta) Okta
|
||||
* [Use the Okta CLI to Build Secure Python Apps](https://developer.okta.com/blog/2022/07/27/python-okta) Okta 2022-07-27
|
||||
|
||||
- Teach you how to create your first application
|
||||
- Learn about authentication and authorization credentials
|
||||
@ -1090,7 +1090,7 @@ Even though some questions are still unanswered, self-sovereign identities will
|
||||
|
||||
* [What is decentralized identity in blockchain?](https://cointelegraph.com/explained/what-is-decentralized-identity-in-blockchain) Cointelegraph
|
||||
|
||||
* [Are Self-Sovereign Identities on blockchain technology the future?](https://kookcontent.business.blog/2022/09/01/are-self-sovereign-identities-on-blockchain-technology-the-future/) Kook Content
|
||||
* [Are Self-Sovereign Identities on blockchain technology the future?](https://kookcontent.business.blog/2022/09/01/are-self-sovereign-identities-on-blockchain-technology-the-future/) Kook Content 2022-09-01
|
||||
|
||||
* [Self-sovereign identity: an ecosystem of digital identities](https://www.ergon.ch/en/news/2022/self-sovereign-identity-an-ecosystem-of-digital-identities) Ergon
|
||||
|
||||
@ -1147,7 +1147,7 @@ There is a real opportunity to combine technology that is being developed with t
|
||||
|
||||
* [10 Resources for beginners in Decentralized Identity (DID)](https://medium.com/veramo/top-10-resources-for-beginners-in-decentralized-identity-di-2924e8571159) Veramo
|
||||
|
||||
* [Self-Sovereign Identity: Taking Control Over Your Digital Identity](https://www.forbes.com/sites/forbestechcouncil/2022/09/26/self-sovereign-identity-taking-control-over-your-digital-identity/?sh=797222d64e0c) Forbes
|
||||
* [Self-Sovereign Identity: Taking Control Over Your Digital Identity](https://www.forbes.com/sites/forbestechcouncil/2022/09/26/self-sovereign-identity-taking-control-over-your-digital-identity/?sh=797222d64e0c) Forbes 2022-09-26
|
||||
|
||||
The two main ingredients of SSI are verifiable credentials (VCs) and decentralized identifiers (DIDs).
|
||||
|
||||
@ -1162,9 +1162,9 @@ No other additional information is needed to complete this data exchange. So how
|
||||
The public keys, as the name implies are there to view anytime and are used for exchanging information and can be revoked, however, the private key is for the account holder himself, be that an issuer, a verifier, or a subject. It is only through a private key that one can pass on his credentials using his DID to an issuer who then validates the credentials and sends them to the verifier using his DID.
|
||||
|
||||
|
||||
* [WHAT’S DECENTRALIZED IDENTITY?](https://nftnewstoday.com/2022/10/06/what-is-decentralized-identity/) NFTNewsToday
|
||||
* [WHAT’S DECENTRALIZED IDENTITY?](https://nftnewstoday.com/2022/10/06/what-is-decentralized-identity/) NFTNewsToday 2022-10-06
|
||||
|
||||
issuers or verifiers can only access the information shared by the DID holder. This information exchange can occur through [various technologies, like NFC](https://nftnewstoday.com/2022/10/03/nft-applications-in-the-supply-chain/), QR, or Bluetooth. [Zero-knowledge proofs](https://nftnewstoday.com/2022/09/15/immutable-x-layer-2-scaling-solution-for-nfts/) are applied to restrict full information access.
|
||||
issuers or verifiers can only access the information shared by the DID holder. This information exchange can occur through [various technologies, like NFC](https://nftnewstoday.com/2022/10/03/nft-applications-in-the-supply-chain/), QR, or Bluetooth. [Zero-knowledge proofs](https://nftnewstoday.com/2022/09/15/immutable-x-layer-2-scaling-solution-for-nfts/) are applied to restrict full information access. 2022-09-15
|
||||
|
||||
* [GlobaliD 101: Device-based identity](https://medium.com/global-id/globalid-101-device-based-identity-c6096a5b0890)
|
||||
|
||||
|
@ -55,13 +55,13 @@ A comprehensive Article on CoinDesk about the future and what SSI looks like in
|
||||
> The hardest part ahead is not the technology, it’s the wholesale re-conceptualization of what is required for a global verification network that puts the power of the network back into the endpoints that is you and me.
|
||||
* [Four Future Scenarios about Identity & Access in 2040](https://esatus.com/wp-content/uploads/Broschuere_eng_final.html). We talk about Total Surveillance, Mega Corporations, Identity Chaos & Self-Sovereign Identity 2.0.
|
||||
> After a look into the past and present, we now fast-forward to the year 2040, where we meet Julia and accompany her through her everyday life. In four different IAM future scenarios, which can be viewed separately, we will understand how life under total surveillance feels for Julia. In times where identity chaos prevails, we can see what it means when Julia can no longer be sure about her digital identity, with only her physical identity being certain. In a world dominated by mega corporations Julia‘s experiences with her employer show us the far-reaching significance and influence such corporations have gained in relation to IAM. Finally, we experience how Julia is able to regain her informational self-determination thanks to her identity wallet - Self-Sovereign Identity 2.0.
|
||||
* [What does it take to develop human-centric solutions for the built environment?](https://mydata.org/2022/05/13/built-for-people/) MyData ([Video](https://www.youtube.com/watch?v=VCjW0_NAPmQ)
|
||||
* [What does it take to develop human-centric solutions for the built environment?](https://mydata.org/2022/05/13/built-for-people/) MyData ([Video](https://www.youtube.com/watch?v=VCjW0_NAPmQ) 2022-05-13
|
||||
> Building better, more human-centric solutions in smart cities starts by realising that citizens and their digital footprints are not merely aspects to monitor and evaluate. They are active participants in the cities we live and work together and need to be engaged in designing better cities and managing the data about themselves. This is not important only for respecting citizens’ rights, but it is crucial to building sustainable services and humane cities.
|
||||
* [On Abortion and Data](https://www.mydata.org/2022/06/30/on-abortion-and-data/) MyData
|
||||
* [On Abortion and Data](https://www.mydata.org/2022/06/30/on-abortion-and-data/) MyData 2022-06-30
|
||||
> A basic insight of MyData is that the current systems of data are asymmetrical, imbalanced, and unfair. A basic motivation of MyData is to fix this by addressing business, legal, technical, and societal aspects of those systems.
|
||||
|
||||
|
||||
* [The Past, Present and Future of Identity](https://www.thinkdigitalpartners.com/guest-blog/2021/02/15/the-past-present-and-future-of-identity/)
|
||||
* [The Past, Present and Future of Identity](https://www.thinkdigitalpartners.com/guest-blog/2021/02/15/the-past-present-and-future-of-identity/) 2021-02-15
|
||||
> Susan Morrow, considers the ‘digital identity journey’ to date and the important opportunity for the government to make use of the lessons learned when creating tomorrows digital identity ecosystem.
|
||||
* [The Future of Identity: Self-Sovereignity, Digital Wallets, and Blockchain](https://publications.iadb.org/publications/english/document/Self-Sovereign-Identity-The-Future-of-Identity-Self-Sovereignity-Digital-Wallets-and-Blockchain.html) InterAmerican Development Bank
|
||||
> enables sovereignty for individuals over their digital assets and credentials -such as digital passports, digital diplomas, digital property titles, and tokenized currencies such as dollar, euro, pound, or pesos- using digital wallets that can take the form of a mobile app. Secondly, when the subject of these digital assets and credentials presents them to a third party to prove ownership, the third party does not need to reach out to the issuer to verify them, as they can go against a public, decentralized, and immutable registry, such as a blockchain network, where the cryptographic proofs of the asset or credential were registered and are maintained by the issuer in an standardized and trustable way.
|
||||
|
@ -38,7 +38,7 @@ My use case is I want to operate [https://twitter.com/permanentcpu](https://twit
|
||||
|
||||
Coop says more about the governance (democracy + open membership) than the business model, IMO
|
||||
|
||||
* [https://www.colorado.edu/lab/medlab/2020/08/31/exit-community-community-primer](https://www.colorado.edu/lab/medlab/2020/08/31/exit-community-community-primer)
|
||||
* [https://www.colorado.edu/lab/medlab/2020/08/31/exit-community-community-primer](https://www.colorado.edu/lab/medlab/2020/08/31/exit-community-community-primer) 2020-08-31
|
||||
|
||||
* [https://platform.coop](https://platform.coop)
|
||||
|
||||
@ -100,7 +100,7 @@ When we talk about governance, we should be using the language of values and the
|
||||
|
||||
Internet governance, human rights, digital identity, Identity for All, Guardianship
|
||||
|
||||
* [Universal Declaration of Digital Identity](https://www.techforjustice.org/2020/08/20/universal-declaration-of-digital-identity/)
|
||||
* [Universal Declaration of Digital Identity](https://www.techforjustice.org/2020/08/20/universal-declaration-of-digital-identity/) 2020-08-20
|
||||
|
||||
The UDDI is a call to action to IIW, which we've said before, to adopt a set of universal principles which can be used now to bring Identity for All projects to fruition.
|
||||
|
||||
@ -277,14 +277,14 @@ Questions started at about [46:30] – though some questions came earlier. We
|
||||
- “Can a third party discover who I trust from a trust registry?”
|
||||
- How will interoperability work between trust registries?
|
||||
|
||||
* [LAYER 1 UTILITIES: AN UNDERGROUND NETWORK CONNECTING ALL SSI ECOSYSTEMS](https://trustoverip.org/blog/2022/03/04/layer-1-utilities-an-underground-network-connecting-all-ssi-ecosystems/) Trust Over IP
|
||||
* [LAYER 1 UTILITIES: AN UNDERGROUND NETWORK CONNECTING ALL SSI ECOSYSTEMS](https://trustoverip.org/blog/2022/03/04/layer-1-utilities-an-underground-network-connecting-all-ssi-ecosystems/) Trust Over IP 2022-03-04
|
||||
|
||||
- Understand: [A general framework for choosing which Layer 1 Utility and did method to utilise](https://docs.google.com/document/d/10NGAtlov49dbaDX96C0F4MdRrr20eHiE4RSZfJu0oXU/edit#heading=h.3e0mwiwnhg9n)
|
||||
- Compare: [A comparison chart of all Layer 1 Utilities and identity overlay networks](https://docs.google.com/spreadsheets/d/18MpvpFPLjL2I7RSFI44heWrrvf3l9pAArzhznAPFVAQ/edit#gid=0)
|
||||
- Comply: [A guidance document for data protection and GDPR compliance](https://docs.google.com/document/d/11KkdraiY9oASjU-H91MGxJ7-mNyhnCsfNSG4MFq8Qec/edit)
|
||||
- Innovate: DeFi compliance on top of Layer 1 Utilities ([Shyft](https://www.shyft.network/), [Notabene](https://notabene.id/), [Centre](https://www.centre.io/)), payments for Verifiable Credentials ([cheqd](https://www.cheqd.io/), [Kilt](https://www.kilt.io/), [Velocity](https://www.velocitynetwork.foundation/self-sovereign-identity-ssi-and-the-velocity-network/)), overlay networks ([did:ion](https://identity.foundation/ion/), [did:tz](https://did-tezos-draft.spruceid.com/), [did:orb](https://securekey.com/securekeys-new-ledger-agnostic-solution-orb-helps-solve-decentralized-identifier-challenges/)), [KERI](https://keri.one/) and self-certifying identifiers, self-executable governance (to name a few!) are all Layer 1 Utility innovations on the horizon. Let us know what you’d like to see going forward and how we can build guidance and documentation around it!
|
||||
|
||||
* [The Age of Optionality—and its costs](https://blogs.harvard.edu/doc/2022/04/02/age-of-optionality/) Doc Searls
|
||||
* [The Age of Optionality—and its costs](https://blogs.harvard.edu/doc/2022/04/02/age-of-optionality/) Doc Searls 2022-04-02
|
||||
|
||||
We plan to relieve some of that oblivity by [having Shoshana lead the final salon](https://events.iu.edu/ostromworkshop/event/291452-beyond-the-web-salon-series-shoshana-zuboff) in our [Beyond the Web series](https://ostromworkshop.indiana.edu/events/salon-series/index.html) at Indiana University’s [Ostrom Workshop](https://ostromworkshop.indiana.edu/). To prepare for that, Joyce and I spoke with Shoshana for more than an hour and a half last night, and are excited about her optimism toward restoring the public commons and invigorating democracy in our still-new digital age.
|
||||
|
||||
@ -318,7 +318,7 @@ Decentralized Ecosystem Governance makes verifying data an easy-to-play game of
|
||||
|
||||
We want to start a conversation on Trust Registries and get people thinking about how Trust Registries will help answer the hard questions an ecosystem needs to create a whole experience [[tweetstorm](https://threadreaderapp.com/thread/1569093372920614914.html)]
|
||||
|
||||
* [DAOs are not corporations: where decentralization in autonomous organizations matters](https://vitalik.ca/general/2022/09/20/daos.html) Vitalik Buterin
|
||||
* [DAOs are not corporations: where decentralization in autonomous organizations matters](https://vitalik.ca/general/2022/09/20/daos.html) Vitalik Buterin 2022-09-20
|
||||
|
||||
Because DAOs do not have a sovereign above them, and are often explicitly in the business of providing services (like currency and arbitration) that are typically reserved for sovereigns, it is precisely the design of sovereigns (political science), and not the design of corporate governance, that DAOs have more to learn from.
|
||||
|
||||
|
@ -3,7 +3,7 @@ published: false
|
||||
---
|
||||
|
||||
# jobsspecialedition
|
||||
* [DIACC Project Coordinator (Bilingual)](https://diacc.ca/2021/09/16/diacc-project-coordinator-bilingual/)
|
||||
* [DIACC Project Coordinator (Bilingual)](https://diacc.ca/2021/09/16/diacc-project-coordinator-bilingual/) 2021-09-16
|
||||
|
||||
DIACC is seeking a highly motivated English and French bilingual Project Coordinator to support projects, meetings, events, community engagement, project plans, and action tracking.
|
||||
* [DIF Job Opportunities](https://identity.foundation/jobs/)
|
||||
@ -223,7 +223,7 @@ The ideal candidate is a self-motivated, multi-tasker, and demonstrated team-pla
|
||||
|
||||
The [@Avast](https://twitter.com/Avast) Identity team has several openings in Product Management, Program Management, Engineering, and DevOps.
|
||||
|
||||
* [Women In Identity – new role of Executive Director](https://womeninidentity.org/2021/06/29/job-description-for-role-of-executive-director/)
|
||||
* [Women In Identity – new role of Executive Director](https://womeninidentity.org/2021/06/29/job-description-for-role-of-executive-director/) 2021-06-29
|
||||
|
||||
Reporting to the Board Chair, the Executive Director will have overall strategic and operational responsibility for Women in Identity’s staff, programs, expansion, infrastructure, budget as well as the execution of its mission.
|
||||
|
||||
@ -355,7 +355,7 @@ Implement the pallets based on Substrate
|
||||
|
||||
|
||||
|
||||
* [Technical Writer | Digital ID & Authentication Council of Canada](https://diacc.ca/2022/08/08/diacc-technical-writer/) DIACC
|
||||
* [Technical Writer | Digital ID & Authentication Council of Canada](https://diacc.ca/2022/08/08/diacc-technical-writer/) DIACC 2022-08-08
|
||||
|
||||
The Digital Identification & Authentication Council of Canada (DIACC) is seeking a Technical Writer to support the DIACC [Pan-Canadian Trust Framework](https://diacc.ca/trust-framework/) (PCTF). This is a 20-30 hours per week remote position with the potential to grow into a full-time role and can be performed from anywhere. This position is intended to be ongoing (long-term) in support of the development and maintenance life cycle of the PCTF.
|
||||
|
||||
|
@ -20,7 +20,7 @@ Such are the capabilities of Pegasus, the spyware manufactured by NSO Group, the
|
||||
|
||||
I was quoted in the article in MIT Technology Review on April 6, 2022, “Deception, exploited workers, and cash handouts: How Worldcoin recruited its first half a million test users.”
|
||||
|
||||
* [Using Digital Identity To Prevent The Sale Of Age-Restricted Products](https://www.forbes.com/sites/forbesbusinesscouncil/2021/12/02/using-digital-identity-to-prevent-the-sale-of-age-restricted-products/?sh=5de510a97f9d) Forbes
|
||||
* [Using Digital Identity To Prevent The Sale Of Age-Restricted Products](https://www.forbes.com/sites/forbesbusinesscouncil/2021/12/02/using-digital-identity-to-prevent-the-sale-of-age-restricted-products/?sh=5de510a97f9d) Forbes 2021-12-02
|
||||
|
||||
This is not limited to alcohol, however. It also includes other age-restricted products such as tobacco, cannabis (where legal of course), vaping products, gambling, some movie tickets and even lottery tickets.
|
||||
|
||||
|
@ -11,7 +11,7 @@ published: false
|
||||
* [We need more awerness, that the acceptance of users is crucial for SSI @SSI_by_memes](https://mobile.twitter.com/SSI_by_memes/status/1538819851950628865)
|
||||
|
||||
* [SSI Architectural Stack and Community Efforts Overview](https://github.com/decentralized-identity/decentralized-identity.github.io/blob/master/assets/ssi-architectural-stack--and--community-efforts-overview.pdf) Rouven Heck
|
||||
* [TDW Decentralized Glossary Management and Collaboration Platform (TDW Glossary): Digital Identity Neighborhood](https://hyperonomy.com/2021/03/15/tdw-glossary-management-and-collaboration-platform-tdw-gmcp-digital-identity-neighborhood/)
|
||||
* [TDW Decentralized Glossary Management and Collaboration Platform (TDW Glossary): Digital Identity Neighborhood](https://hyperonomy.com/2021/03/15/tdw-glossary-management-and-collaboration-platform-tdw-gmcp-digital-identity-neighborhood/) 2021-03-15
|
||||
|
||||
* [Human Authority](https://www.moxytongue.com/2022/01/human-authority.html) Moxy Marlinspike
|
||||
|
||||
|
@ -4,7 +4,7 @@ published: false
|
||||
|
||||
# Podcasts
|
||||
|
||||
* [My podcasts of choice](https://blogs.harvard.edu/doc/2021/05/04/podcasts/) Doc Searls
|
||||
* [My podcasts of choice](https://blogs.harvard.edu/doc/2021/05/04/podcasts/) Doc Searls 2021-05-04
|
||||
* [The Digital Identity Transformation – Podcast](https://idramp.com/the-digital-identity-transformation-podcast/)
|
||||
> Mike Vesey, CEO of IdRamp. As someone who has uniquely spent their full career immersed in enterprise identity, Vesey shares an insider perspective of how the industry has evolved during his tenure.
|
||||
* [Listening to identity podcasts is our 2021 new year’s resolution](https://www.ubisecure.com/education/why-listen-to-identity-podcasts/)
|
||||
|
@ -30,4 +30,4 @@ published: false
|
||||
|
||||
* [New article about decentralized protocols to rule the world...](https://lists.w3.org/Archives/Public/public-credentials/2021Dec/0105.html)
|
||||
|
||||
* [Great Protocol Politics](https://foreignpolicy.com/2021/12/11/bitcoin-ethereum-cryptocurrency-web3-great-protocol-politics/) - The 21st century doesn’t belong to China, the United States, or Silicon Valley. It belongs to the internet.
|
||||
* [Great Protocol Politics](https://foreignpolicy.com/2021/12/11/bitcoin-ethereum-cryptocurrency-web3-great-protocol-politics/) - The 21st century doesn’t belong to China, the United States, or Silicon Valley. It belongs to the internet. 2021-12-11
|
||||
|
@ -19,7 +19,7 @@ published: false
|
||||
|
||||
|
||||
## Hub
|
||||
* [Selected Parts of the DIF SDS/CS Hub and EDV Discussion featuring Daniel Buchner’s Description of a Hub](https://hyperonomy.com/2021/03/24/transcription-of-selected-parts-of-the-dif-sds-cs-march-11-2021-zoom-call-hub-and-edv-discussion-featuring-daniel-buchners-description-of-a-hub/) Michael Herman
|
||||
> This is a [transcription of selected parts of the EDV-Hub conversation](https://hyperonomy.com/2021/03/24/transcription-of-selected-parts-of-the-dif-sds-cs-march-11-2021-zoom-call-hub-and-edv-discussion-featuring-daniel-buchners-description-of-a-hub/) during the DIF SDS/CS Thursday weekly Zoom call on March 11, 2021. This is the call where Daniel Buchner described (verbally) several aspects about what is and what is not a Hub.
|
||||
* [Selected Parts of the DIF SDS/CS Hub and EDV Discussion featuring Daniel Buchner’s Description of a Hub](https://hyperonomy.com/2021/03/24/transcription-of-selected-parts-of-the-dif-sds-cs-march-11-2021-zoom-call-hub-and-edv-discussion-featuring-daniel-buchners-description-of-a-hub/) Michael Herman 2021-03-24
|
||||
> This is a [transcription of selected parts of the EDV-Hub conversation](https://hyperonomy.com/2021/03/24/transcription-of-selected-parts-of-the-dif-sds-cs-march-11-2021-zoom-call-hub-and-edv-discussion-featuring-daniel-buchners-description-of-a-hub/) during the DIF SDS/CS Thursday weekly Zoom call on March 11, 2021. This is the call where Daniel Buchner described (verbally) several aspects about what is and what is not a Hub. 2021-03-24
|
||||
* [PROPOSAL: Confidential Storage Specification Refactoring 0.2 – March 24, 2021](https://lists.w3.org/Archives/Public/public-credentials/2021Mar/0245.html)
|
||||
> Based on the March 11 Zoom discussion where we worked hard to discern the differences between Agents, Hubs, and EDVs (and I believe were largely successful IMO), I’ve like to propose to the SDS/CS WG that we refactor the current Confidential Storage specification into 3 separable parts/specifications.
|
||||
|
@ -5,7 +5,7 @@ published: false
|
||||
|
||||
### DIDs Fabric and Decentralized Networking
|
||||
|
||||
* [DEON](https://www.hyperledger.org/blog/2020/11/05/deon-a-hyperledger-based-decentralized-off-grid-network) is a new Hyperledger project focused in off-line communication networks, independent of internet infrastructure. This could be used to enable networks of devices to communicate peer-to-peer (without the need to ‘phone home’ over the internet), inter-enterprise consortia networks, and enabling user-centric data sharing in a more secure and private fashion.
|
||||
* [DEON](https://www.hyperledger.org/blog/2020/11/05/deon-a-hyperledger-based-decentralized-off-grid-network) is a new Hyperledger project focused in off-line communication networks, independent of internet infrastructure. This could be used to enable networks of devices to communicate peer-to-peer (without the need to ‘phone home’ over the internet), inter-enterprise consortia networks, and enabling user-centric data sharing in a more secure and private fashion. 2020-11-05
|
||||
|
||||
* [Add support for "did:indy" to Hyperledger Indy Node and Indy VDR](https://digital.gov.bc.ca/marketplace/opportunities/code-with-us/e3dd1605-cc1d-4c30-a9ee-245940bccd0d) </>Code With Us
|
||||
|
||||
@ -50,8 +50,8 @@ Technical details (implementation):
|
||||
>
|
||||
> Once the credential schema is created and the attribute fields specified, the enterprise user can then publish a credential definition to whatever root of trust they are using, in our case a Hyperledger Indy network.
|
||||
|
||||
* [Forbes “Blockchain 50” Shows Enterprise Blockchain’s Footprint and Impact, with Hyperledger Tech Leading The Pack](https://www.hyperledger.org/blog/2021/02/02/once-again-forbes-blockchain-50-shows-enterprise-blockchains-footprint-and-impact-with-hyperledger-technologies-leading-the-pack)
|
||||
> Declaring that blockchain has “gone mainstream,” Forbes today released its 2021 “Blockchain 50,” featuring companies that have at least $1 billion in revenues or are valued at $1 billion or more and “lead in employing distributed ledger technology.” And, once again, half of the companies on the list are using Hyperledger technology.* [Why Distributed Ledger Technology (DLT) for Identity?](https://www.hyperledger.org/blog/2021/04/21/why-distributed-ledger-technology-dlt-for-identity) Hyperledger
|
||||
* [Forbes “Blockchain 50” Shows Enterprise Blockchain’s Footprint and Impact, with Hyperledger Tech Leading The Pack](https://www.hyperledger.org/blog/2021/02/02/once-again-forbes-blockchain-50-shows-enterprise-blockchains-footprint-and-impact-with-hyperledger-technologies-leading-the-pack) 2021-02-02
|
||||
> Declaring that blockchain has “gone mainstream,” Forbes today released its 2021 “Blockchain 50,” featuring companies that have at least $1 billion in revenues or are valued at $1 billion or more and “lead in employing distributed ledger technology.” And, once again, half of the companies on the list are using Hyperledger technology.* [Why Distributed Ledger Technology (DLT) for Identity?](https://www.hyperledger.org/blog/2021/04/21/why-distributed-ledger-technology-dlt-for-identity) Hyperledger 2021-04-21
|
||||
> To understand why DLT is useful for identity, we need to go back to the basics—paper credentials, how that model has worked for 1000s of years, and how the use of DLTs with verifiable credentials allows us to transition the great parts—security and privacy—of that model to the digital age.
|
||||
|
||||
|
||||
@ -72,7 +72,7 @@ One alternative, to create a DIDcomm-based protocol for public profile was discu
|
||||
|
||||
|
||||
|
||||
* [Investing in Verifiable Credentials, Technical Interoperability and Open Source](https://www.hyperledger.org/blog/2022/08/23/investing-in-verifiable-credentials-technical-interoperability-and-open-source) Hyperledger
|
||||
* [Investing in Verifiable Credentials, Technical Interoperability and Open Source](https://www.hyperledger.org/blog/2022/08/23/investing-in-verifiable-credentials-technical-interoperability-and-open-source) Hyperledger 2022-08-23
|
||||
|
||||
As our approach evolves, we also remain keen to support open source solutions that interoperate with other national and international efforts. There is no dominant design yet, no one network or technology, so we must remain nimble and flexible in our exploration. We also need to coexist with existing identity solutions that millions of British Columbians already rely upon.
|
||||
|
||||
@ -136,7 +136,7 @@ Here, we go through how we went about standing up our Indico node. In brief:
|
||||
|
||||
* [Getting Internet Identity Right 30 Years On](https://podcasts.google.com/feed/aHR0cHM6Ly9yc3MuYXJ0MTkuY29tL2NvaW5kZXNrLXJlcG9ydHM/episode/Z2lkOi8vYXJ0MTktZXBpc29kZS1sb2NhdG9yL1YwL1B2ZTZ1WThCazZjM24zckdUVVdaQ2YyWGJwQnNuWTBra3N0WWlFOFhBNUk?ep=14) Money ReImagined with Brian Behlendorf.
|
||||
> Michael Casey and Sheila Warren talk to Hyperledger Executive Director Brian Behlendorf about self-sovereign identity, the topic of this week's column. A developer whose three-decade career has seen him deeply involved in efforts to foster a more open internet, Brian grasps, like few others, the nuances of how human beings should live within a rapidly changing digital economy.
|
||||
* [Hyperledger completes development of DID:Indy Method and advances toward a network of networks](https://www.hyperledger.org/blog/2022/05/02/hyperledger-identity-community-completes-development-of-didindy-method-and-advances-toward-a-network-of-networks) Howland & Bluhm - Linux Foundation
|
||||
* [Hyperledger completes development of DID:Indy Method and advances toward a network of networks](https://www.hyperledger.org/blog/2022/05/02/hyperledger-identity-community-completes-development-of-didindy-method-and-advances-toward-a-network-of-networks) Howland & Bluhm - Linux Foundation 2022-05-02
|
||||
|
||||
With the groundwork complete, networks and agent frameworks now need to incorporate the Indy:DID Method. This community adoption will increase the viability of the Indy and Aries project stack and position it to be the globally dominant way to issue and share verifiable credentials in a multi-ledger world.
|
||||
|
||||
@ -153,5 +153,5 @@ To manage patient’s self-sovereign identity, we leveraged the Hyperledger Indy
|
||||
|
||||
## Ursa
|
||||
|
||||
* [Hyperledger Ursa code review](https://www.hyperledger.org/hyperledger-ursa/2022/05/31/hyperledger-ursa-code-review) Hyperledger
|
||||
* [Hyperledger Ursa code review](https://www.hyperledger.org/hyperledger-ursa/2022/05/31/hyperledger-ursa-code-review) Hyperledger 2022-05-31
|
||||
> Rooted in a “trust but verify” mindset, several Canadian public sector entities and [Interac](https://www.interac.ca/en/) (Canada’s interbank network) sponsored a project at the [Digital Identity Laboratory of Canada](https://idlab.org/) (IDLab) to perform a security and cryptography code review of Hyperledger Ursa (full report is available [here](https://www.hyperledger.org/wp-content/uploads/2022/05/URSA-IDLab-Code-Review.pdf)).
|
||||
|
@ -13,17 +13,17 @@ At this stage of the AATH Enhancement Project, two factors helped define its bro
|
||||
* [https://github.com/hyperledger/aries-rfcs/blob/master/concepts/0430-machine-readable-governance-frameworks/README.md](https://github.com/hyperledger/aries-rfcs/blob/master/concepts/0430-machine-readable-governance-frameworks/README.md)
|
||||
* [Setting up Mediator Agent in Ubuntu — (.Net Core service in Linux Box)](https://rangesh.medium.com/setting-up-mediator-agent-in-ubuntu-net-core-service-in-linux-box-b874bb409eed) Rangesh
|
||||
> In a Self Sovereign Environment supported by Hyperledger Indy / Aries agent framework, Mediator Agent is one of the essential components that acts as postman service between Issuer /Verifier Aries Agent and Mobile Agent.
|
||||
* [Introducing Hyperledger Aries Framework JavaScript 0.2.0](https://www.hyperledger.org/blog/2022/07/06/introducing-hyperledger-aries-framework-javascript-0-2-0) Hyperledger
|
||||
* [Introducing Hyperledger Aries Framework JavaScript 0.2.0](https://www.hyperledger.org/blog/2022/07/06/introducing-hyperledger-aries-framework-javascript-0-2-0) Hyperledger 2022-07-06
|
||||
|
||||
The new Hyperledger Aries Framework JavaScript release (0.2.0) contains some incredible steps forward. Especially in our goal to make the framework AIP 2.0 compliant. AIP 2.0 compliance will not only ensure the framework supports the latest standards and protocols, but it will also greatly increase interoperability and make it more useful outside of the Hyperledger Indy ecosystem.
|
||||
* [Hyperledger Aries Graduates To Active Status; Joins Indy As “Production Ready”](https://www.hyperledger.org/blog/2021/02/26/hyperledger-aries-graduates-to-active-status-joins-indy-as-production-ready-hyperledger-projects-for-decentralized-identity)
|
||||
* [Hyperledger Aries Graduates To Active Status; Joins Indy As “Production Ready”](https://www.hyperledger.org/blog/2021/02/26/hyperledger-aries-graduates-to-active-status-joins-indy-as-production-ready-hyperledger-projects-for-decentralized-identity) 2021-02-26
|
||||
|
||||
“This approval is further evidence that Hyperledger Aries is a breakout success for the Hyperledger community,” said Brian Behlendorf, General Manager for Blockchain, Healthcare and Identity at the Linux Foundation. “Convergence on common libraries for the exchange of credentials will help speed the development of urgently-needed solutions and systems, ranging from education to finance to the fight against the pandemic. Aries is key to that convergence.”
|
||||
* [Hyperledger Aries Graduates To Active Status](https://www.hyperledger.org/blog/2021/02/26/hyperledger-aries-graduates-to-active-status-joins-indy-as-production-ready-hyperledger-projects-for-decentralized-identity)
|
||||
* [Hyperledger Aries Graduates To Active Status](https://www.hyperledger.org/blog/2021/02/26/hyperledger-aries-graduates-to-active-status-joins-indy-as-production-ready-hyperledger-projects-for-decentralized-identity) 2021-02-26
|
||||
|
||||
The TSC commended the Aries project during the meeting for the project’s highly diverse contributors. Achieving a high number of organizations contributing to a project at Hyperledger is often a challenge. Congratulations are due to those participating in and supporting the Aries Project.
|
||||
|
||||
* [The Pathway to Becoming a Hyperledger Maintainer](https://www.hyperledger.org/blog/2021/11/03/the-pathway-to-becoming-a-hyperledger-maintainer)
|
||||
* [The Pathway to Becoming a Hyperledger Maintainer](https://www.hyperledger.org/blog/2021/11/03/the-pathway-to-becoming-a-hyperledger-maintainer) 2021-11-03
|
||||
> In this blogpost I’m going to share what it’s like to be a maintainer for the Hyperledger Aries project. You’ll learn how you can start contributing and maybe even set yourself on a path to becoming a maintainer.
|
||||
* [Indicio Wins British Columbia Code With Us Challenge to Upgrade Hyperledger Indy](https://indicio.tech/indicio-wins-british-columbia-code-with-us-challenge-to-upgrade-hyperledger-indy/)
|
||||
> Most of Hyperledger Indy’s development occurred prior to the completion of the standard DID Specification by the W3C and, as a result, identifiers written to one network are currently not resolvable on other networks. A new did:indy DID Method will fix that and make it easier for decentralized identity products and services to interoperate across different Indy networks.
|
||||
@ -40,7 +40,7 @@ Standards such as OIDC and mDL are all now in dialogue with W3C, AnonCreds, Arie
|
||||
* [Hyperledger Aries is the Present and the Future of Internet-Scale Trusted Verifiable Credential Ecosystems](https://indicio.tech/hyperledger-aries-is-the-present-and-the-future-of-internet-scale-trusted-verifiable-credential-ecosystems/) Indicio
|
||||
|
||||
While no technology runs perfectly on every device, a signal strength of Aries, AnonCreds, and Indy is that they work on the vast majority of current devices and systems, including $35 smart phones and low powered IOT/embedded devices. They represent the most inclusive way into this technology, which is an important factor in their popularity.
|
||||
* [Hyperledger Mentorship Spotlight: Hyperledger Aries Integration to Support Fabric as Blockchain Ledger](https://www.hyperledger.org/blog/2021/12/06/hyperledger-mentorship-spotlight-hyperledger-aries-integration-to-support-fabric-as-blockchain-ledger)
|
||||
* [Hyperledger Mentorship Spotlight: Hyperledger Aries Integration to Support Fabric as Blockchain Ledger](https://www.hyperledger.org/blog/2021/12/06/hyperledger-mentorship-spotlight-hyperledger-aries-integration-to-support-fabric-as-blockchain-ledger) 2021-12-06
|
||||
|
||||
The Hyperledger Mentorship Program is a structured hands-on learning opportunity for new developers who may otherwise lack the opportunity to gain exposure to Hyperledger open source development and entry to the technical community.
|
||||
|
||||
|
@ -6,7 +6,7 @@ published: false
|
||||
|
||||
### DIDs Fabric and Decentralized Networking
|
||||
|
||||
* [DEON](https://www.hyperledger.org/blog/2020/11/05/deon-a-hyperledger-based-decentralized-off-grid-network) is a new Hyperledger project focused in off-line communication networks, independent of internet infrastructure. This could be used to enable networks of devices to communicate peer-to-peer (without the need to ‘phone home’ over the internet), inter-enterprise consortia networks, and enabling user-centric data sharing in a more secure and private fashion.
|
||||
* [DEON](https://www.hyperledger.org/blog/2020/11/05/deon-a-hyperledger-based-decentralized-off-grid-network) is a new Hyperledger project focused in off-line communication networks, independent of internet infrastructure. This could be used to enable networks of devices to communicate peer-to-peer (without the need to ‘phone home’ over the internet), inter-enterprise consortia networks, and enabling user-centric data sharing in a more secure and private fashion. 2020-11-05
|
||||
|
||||
* [Add support for "did:indy" to Hyperledger Indy Node and Indy VDR](https://digital.gov.bc.ca/marketplace/opportunities/code-with-us/e3dd1605-cc1d-4c30-a9ee-245940bccd0d) </>Code With Us
|
||||
|
||||
@ -51,8 +51,8 @@ Technical details (implementation):
|
||||
>
|
||||
> Once the credential schema is created and the attribute fields specified, the enterprise user can then publish a credential definition to whatever root of trust they are using, in our case a Hyperledger Indy network.
|
||||
|
||||
* [Forbes “Blockchain 50” Shows Enterprise Blockchain’s Footprint and Impact, with Hyperledger Tech Leading The Pack](https://www.hyperledger.org/blog/2021/02/02/once-again-forbes-blockchain-50-shows-enterprise-blockchains-footprint-and-impact-with-hyperledger-technologies-leading-the-pack)
|
||||
> Declaring that blockchain has “gone mainstream,” Forbes today released its 2021 “Blockchain 50,” featuring companies that have at least $1 billion in revenues or are valued at $1 billion or more and “lead in employing distributed ledger technology.” And, once again, half of the companies on the list are using Hyperledger technology.* [Why Distributed Ledger Technology (DLT) for Identity?](https://www.hyperledger.org/blog/2021/04/21/why-distributed-ledger-technology-dlt-for-identity) Hyperledger
|
||||
* [Forbes “Blockchain 50” Shows Enterprise Blockchain’s Footprint and Impact, with Hyperledger Tech Leading The Pack](https://www.hyperledger.org/blog/2021/02/02/once-again-forbes-blockchain-50-shows-enterprise-blockchains-footprint-and-impact-with-hyperledger-technologies-leading-the-pack) 2021-02-02
|
||||
> Declaring that blockchain has “gone mainstream,” Forbes today released its 2021 “Blockchain 50,” featuring companies that have at least $1 billion in revenues or are valued at $1 billion or more and “lead in employing distributed ledger technology.” And, once again, half of the companies on the list are using Hyperledger technology.* [Why Distributed Ledger Technology (DLT) for Identity?](https://www.hyperledger.org/blog/2021/04/21/why-distributed-ledger-technology-dlt-for-identity) Hyperledger 2021-04-21
|
||||
> To understand why DLT is useful for identity, we need to go back to the basics—paper credentials, how that model has worked for 1000s of years, and how the use of DLTs with verifiable credentials allows us to transition the great parts—security and privacy—of that model to the digital age.
|
||||
|
||||
|
||||
@ -73,7 +73,7 @@ One alternative, to create a DIDcomm-based protocol for public profile was discu
|
||||
|
||||
|
||||
|
||||
* [Investing in Verifiable Credentials, Technical Interoperability and Open Source](https://www.hyperledger.org/blog/2022/08/23/investing-in-verifiable-credentials-technical-interoperability-and-open-source) Hyperledger
|
||||
* [Investing in Verifiable Credentials, Technical Interoperability and Open Source](https://www.hyperledger.org/blog/2022/08/23/investing-in-verifiable-credentials-technical-interoperability-and-open-source) Hyperledger 2022-08-23
|
||||
|
||||
As our approach evolves, we also remain keen to support open source solutions that interoperate with other national and international efforts. There is no dominant design yet, no one network or technology, so we must remain nimble and flexible in our exploration. We also need to coexist with existing identity solutions that millions of British Columbians already rely upon.
|
||||
|
||||
@ -137,7 +137,7 @@ Here, we go through how we went about standing up our Indico node. In brief:
|
||||
|
||||
* [Getting Internet Identity Right 30 Years On](https://podcasts.google.com/feed/aHR0cHM6Ly9yc3MuYXJ0MTkuY29tL2NvaW5kZXNrLXJlcG9ydHM/episode/Z2lkOi8vYXJ0MTktZXBpc29kZS1sb2NhdG9yL1YwL1B2ZTZ1WThCazZjM24zckdUVVdaQ2YyWGJwQnNuWTBra3N0WWlFOFhBNUk?ep=14) Money ReImagined with Brian Behlendorf.
|
||||
> Michael Casey and Sheila Warren talk to Hyperledger Executive Director Brian Behlendorf about self-sovereign identity, the topic of this week's column. A developer whose three-decade career has seen him deeply involved in efforts to foster a more open internet, Brian grasps, like few others, the nuances of how human beings should live within a rapidly changing digital economy.
|
||||
* [Hyperledger completes development of DID:Indy Method and advances toward a network of networks](https://www.hyperledger.org/blog/2022/05/02/hyperledger-identity-community-completes-development-of-didindy-method-and-advances-toward-a-network-of-networks) Howland & Bluhm - Linux Foundation
|
||||
* [Hyperledger completes development of DID:Indy Method and advances toward a network of networks](https://www.hyperledger.org/blog/2022/05/02/hyperledger-identity-community-completes-development-of-didindy-method-and-advances-toward-a-network-of-networks) Howland & Bluhm - Linux Foundation 2022-05-02
|
||||
|
||||
With the groundwork complete, networks and agent frameworks now need to incorporate the Indy:DID Method. This community adoption will increase the viability of the Indy and Aries project stack and position it to be the globally dominant way to issue and share verifiable credentials in a multi-ledger world.
|
||||
|
||||
|
@ -49,7 +49,7 @@ Digital Caribou shares their thoughts on [Digital Transformation and inclusion](
|
||||
> - Project Debt
|
||||
> - Why saying NO to those simple things may be the best thing. For some hints on how to do that see [Say No With Grace](https://www.continuumloop.com/say-no-with-grace/).
|
||||
* [The Journey of an SSI Developer](https://academy.affinidi.com/the-journey-of-an-ssi-developer-6ef4f642779c) Affinidi
|
||||
* [Clear is better than clever](https://dave.cheney.net/2019/07/09/clear-is-better-than-clever) Cheney.net
|
||||
* [Clear is better than clever](https://dave.cheney.net/2019/07/09/clear-is-better-than-clever) Cheney.net 2019-07-09
|
||||
|
||||
“why would I read your code?” To be clear, when I say I, I don’t mean me, I mean you. And when I say your code I also mean you, but in the third person. So really what I’m asking is, “why would you read another person’s code?”
|
||||
* [Contributing to Complex Projects](https://mitchellh.com/writing/contributing-to-complex-projects) Mitchell H
|
||||
@ -66,7 +66,7 @@ As a frequent open source maintainer and contributor, I’m often asked: where d
|
||||
Our goal is to make the process of building trust easier and more effective for creators. With that in mind, we’re sharing an overview of our plan to address the pain points of creators and marketplaces in the NFT space using identity tools.
|
||||
|
||||
## Entrustient
|
||||
* [No Code Solution Using Self-Sovereign Identity on Redundant Blockchains](https://www.pressrelease.cc/2021/12/02/entrustient-launches-the-first-no-code-solution-for-trusted-decentralized-digital-identity-using-self-sovereign-identity-on-redundant-blockchains/) Entrustient
|
||||
* [No Code Solution Using Self-Sovereign Identity on Redundant Blockchains](https://www.pressrelease.cc/2021/12/02/entrustient-launches-the-first-no-code-solution-for-trusted-decentralized-digital-identity-using-self-sovereign-identity-on-redundant-blockchains/) Entrustient 2021-12-02
|
||||
|
||||
Our goal was to put the power back into the hands of users who do not have any coding knowledge or experience, to accelerate the time to configure and launch an entire Trusted Decentralized Digital Identity peer-to-peer ecosystem
|
||||
|
||||
|
@ -1,102 +0,0 @@
|
||||
---
|
||||
published: false
|
||||
---
|
||||
# Policy \ Govt Initiative
|
||||
|
||||
- Policies/Regulations (public-sector/policy.md & public-sector/public-sector.md)
|
||||
- Europe
|
||||
- Data Governance Act
|
||||
- GDPR
|
||||
- eIDAS2
|
||||
- Funding for stuff
|
||||
- UK
|
||||
- Global
|
||||
- FATF
|
||||
- Asia
|
||||
- USA
|
||||
- COPPA
|
||||
- Privacy Act
|
||||
- California SB786
|
||||
- India
|
||||
- Canada
|
||||
- Pan Canadian Trust Framework
|
||||
- Cryto Regulation
|
||||
- Competition Issues
|
||||
- Government Initiatives
|
||||
- US
|
||||
- SVIP
|
||||
- Germany
|
||||
- IDUnion
|
||||
- UK
|
||||
- Scotland
|
||||
- EU
|
||||
- EBSI
|
||||
- Catalonia
|
||||
- Switzerland
|
||||
- APAC
|
||||
- New Zealand
|
||||
- Australia
|
||||
- Singapore
|
||||
- South Korea
|
||||
- Global South
|
||||
- Maori
|
||||
- ID2020
|
||||
- Canada
|
||||
- BC
|
||||
- Alberta
|
||||
- Ontario
|
||||
- LatAm
|
||||
- LACCHAIN
|
||||
|
||||
|
||||
## California
|
||||
|
||||
* [Our Input to the California Privacy Protection Agency (CPPA) Pre-Rulemaking Stakeholder Sessions](https://me2ba.org/our-input-to-the-california-privacy-protection-agency-cppa-pre-rulemaking-stakeholder-sessions/) Me2BA
|
||||
|
||||
California is a major center of new privacy law and regulation, creating opportunities for internet safety advocates to help design policies that will ripple out well beyond the state’s borders. Their Privacy Rights Act (CPRA), passed by ballot proposition in 2020, created the California Privacy Protection Agency (CPPA), which seems to be getting closer to initiating its first formal rulemaking process.
|
||||
|
||||
* [Data Broker Registry](https://oag.ca.gov/data-brokers) State of California Department of Justice
|
||||
|
||||
[California law requires a data broker](http://leginfo.legislature.ca.gov/faces/billNavClient.xhtml?bill_id=201920200AB1202), as defined in California Civil Code § 1798.99.80, to register with the Attorney General on its internet website that is accessible to the public, on or before January 31 following each year in which a business meets the [definition of a data broker](https://iapp.org/news/a/california-data-broker-registrations-who-made-the-list-on-jan-31/).
|
||||
* [Crypto Regulatory Affairs: Governor of California Signs Blockchain Executive Order](https://www.elliptic.co/blog/crypto-regulatory-affairs-governor-of-california-signs-blockchain-executive-order) Elliptic
|
||||
|
||||
On May 4th, California Governor Gavin Newsom signed into effect a [“Blockchain Executive Order”](https://www.gov.ca.gov/2022/05/04/governor-newsom-signs-blockchain-executive-order-to-spur-responsible-web3-innovation-grow-jobs-and-protect-consumers/)
|
||||
|
||||
“[to] assess how to deploy blockchain technology for state and public institutions, and build research and workforce development pathways to prepare Californians for success in this industry”.
|
||||
|
||||
* [Our Input to the California Privacy Protection Agency (CPPA) Pre-Rulemaking Stakeholder Sessions](https://me2ba.org/our-input-to-the-california-privacy-protection-agency-cppa-pre-rulemaking-stakeholder-sessions/) Me2Ba
|
||||
|
||||
We have monitored and involved ourselves in this new agency since its inception, and Lisa LeVasseur (our Executive Director) and Noreen Whysel (Director of Validation Research) shared their expertise on product audits and dark patterns, respectively, in a recent pre-rulemaking CPPA Stakeholder Session (May 5-6).
|
||||
* [Soulbound Tokens, Trust Networks, and California's Big Test](https://wrenchinthegears.com/2022/05/28/soulbound-tokens-trust-networks-and-californias-big-test/) Wrenchinthegears
|
||||
|
||||
California [SB1190](https://sd18.senate.ca.gov/news/342022-hertzberg-announces-new-blockchain-legislation-creating-%E2%80%9Ccalifornia-trust-framework%E2%80%9D) that would establish a “Trust Framework” at the state level. This bill was introduced to the state senate in early March by Robert Hertzberg, close friend of Los Angeles billionaire investor Nicholas Berggruen
|
||||
|
||||
The Verifiable Credential’s Policy Committee, (that Kaliya Chairs) in California had a big win this week
|
||||
|
||||
* [California Moves Forward to Allow Vital Records to be Issued on Blockchain](https://www.coindesk.com/policy/2022/09/29/california-moves-forward-to-allow-vital-records-to-be-issued-on-blockchain/) Coindesk
|
||||
|
||||
* [approved another on Wednesday](https://www.gov.ca.gov/2022/09/28/governor-newsom-issues-legislative-update-9-28-22/) that instructs county records offices to [allow for the use of blockchain technology](https://leginfo.legislature.ca.gov/faces/billTextClient.xhtml?bill_id=202120220SB786) and verifiable credentials. The technology would be established in the distribution of birth, death and marriage records, allowing PDFs to be sent immediately rather than using a typical 10-day postal delivery.
|
||||
* [California Legalizes Blockchain-based Vital Records](https://mobileidworld.com/california-legalizes-blockchain-based-vital-records-410031/) MobileDataWorld
|
||||
|
||||
As [an abstract of the bill](https://trackbill.com/bill/california-senate-bill-786-county-birth-death-and-marriage-records-blockchain/2043852/) explains, while existing law requires such records “to contain certain information and to be printed on chemically sensitized security paper, as specified,” the new legislation enables a county recorder to, upon request, issue a birth, death, or marriage record “by means of verifiable credential, as defined, using blockchain technology, defined as a decentralized data system, in which the data stored is mathematically verifiable, that uses distributed ledgers or databases to store specialized data in the permanent order of transactions recorded.”
|
||||
* [VCs Policy Committeee (California) – Participate in passing legislation to create a California Trust Framework!](https://iiw.idcommons.net/21B/_(California)_Verifiable_Credentials_Policy_Committeee_-_Come_learn_about_how_participate_in_passing_legislation_to_crete_a_California_Trust_Framework!) by Kaliya Young, Ally Medina [Slides](https://docs.google.com/presentation/d/1VyxmWan3qbxynxhKvw1CHhWZINiPRF9gjeqSCSDh1MY/edit?usp=sharing)
|
||||
> discussed how the Blockchain Advocacy Coalition’s sponsorship of [AB 2004](https://leginfo.legislature.ca.gov/faces/billTextClient.xhtml?bill_id=201920200AB2004) pushed verifiable credentials into mainstream political discourse and how companies can help us shape public policy and government pilot programs of Verifiable Credential technology.
|
||||
>
|
||||
> We are planning on working with legislators to introduce a bill that creates a California Trust Framework and lays the groundwork for use of the technology in the public and private sector.
|
||||
|
||||
* [Me2BA provides human-centered recommendations to the California Privacy Protection Agency](https://me2ba.org/me2ba-provides-human-centered-recommendations-to-the-california-privacy-protection-agency/)
|
||||
|
||||
The California Privacy Rights Act of 2020 (“CPRA”) established the California Privacy Protection Agency (“CPPA”). The CPPA has full administrative power and authority to implement the CCPA and CPRA, which basically means that the CPPA will be in charge of updating regulations and adopting new regulations, while enforcement of these regulations will be done by both the CPPA and the Attorney General
|
||||
* [California Digital Vaccine Record based on VCs](https://lists.w3.org/Archives/Public/public-credentials/2021Jun/0191.html) Heather Vescent June 18
|
||||
|
||||
May be of interest: [https://www.latimes.com/california/story/2021-06-18/california-unveils-system-to-provide-digital-covid-19-vaccine-records](https://www.latimes.com/california/story/2021-06-18/california-unveils-system-to-provide-digital-covid-19-vaccine-records)
|
||||
|
||||
SMART Health Card Framework: [https://vci.org/about#smart-health](https://vci.org/about#smart-health)
|
||||
|
||||
To achieve this purpose, the founding members of VCI™ have collaborated to develop (1) the SMART Health Cards Framework Implementation Guide based on the World Wide Web Consortium (W3C) Verifiable Credential and Health Level 7 (HL7) SMART on FHIR standards, and (2) the SMART Health Cards: Vaccination & Testing Implementation Guide.
|
||||
|
||||
If you are in California, you can get your vaccine record here: [https://myvaccinerecord.cdph.ca.gov/](https://myvaccinerecord.cdph.ca.gov/)
|
||||
|
||||
* [Participate in Alberta's First Verifiable Digital Credentials Pilot](https://pilot.atbventures.com/)
|
||||
|
||||
You’re invited to participate in an exciting pilot program being launched by ATB Ventures and the Government of Alberta.
|
@ -1,3 +0,0 @@
|
||||
---
|
||||
published: false
|
||||
---
|
@ -1,29 +0,0 @@
|
||||
---
|
||||
published: false
|
||||
---
|
||||
# Australia
|
||||
|
||||
## Programs
|
||||
* [Your digital identity and credentials](https://www.haveyoursay.nsw.gov.au/digital-identity) New South Wales
|
||||
|
||||
Help us make it easier for you to do things like open a bank account, buy a phone, start a new job, prove your age or enrol to study.
|
||||
|
||||
## Policy
|
||||
|
||||
* [Collected submissions on AU Digital Identity system](https://lockstep.com.au/collected-submissions-on-au-digital-identity-system/) Lockstep
|
||||
|
||||
By reframing digital identity as a matter of data protection in more general terms, we would stay out of the risk management ploys and business affairs of others, preserve today’s many ways of credentialling and transacting, and be seen to focus on more objective security outcomes.<br><br>* [Lockstep Submission – AU Digital Identity Legislation (1.0)](https://lockstep.com.au/wp-content/uploads/2021/12/Lockstep-Submission-AU-Digital-Identity-Legislation-1.0.pdf) <br>* [Lockstep Submission – AU Digital Identity Legislation Phase 2 210714](https://lockstep.com.au/wp-content/uploads/2021/12/Lockstep-Submission-AU-Digital-Identity-Legislation-Phase-2-210714.pdf) <br>* [Lockstep Submission – Trusted Digital Identity Legislation Phase 3 211027](https://lockstep.com.au/wp-content/uploads/2021/12/Lockstep-Submission-Trusted-Digital-Identity-Legislation-Phase-3-211027.pdf)
|
||||
|
||||
* [More hurdles to clear as Digital Identity Bill enters [Australian] Parliament](https://fst.net.au/government-news/more-hurdles-to-clear-as-digital-identity-bill-enters-parliament-2/) FST
|
||||
|
||||
Government should adopt a simple, existing standard for its digital ID system, such as the public-key infrastructure (PKI)-based system in use within many [European countries](https://www.enisa.europa.eu/topics/csirts-in-europe/glossary/public-key-infrastructure-pki). PKI offers a number of security and privacy benefits that the TDIF aims to have; however, as no central authority is involved in authentication, no entity can meaningfully track user activity.
|
||||
|
||||
* [New Digital Identity Advisory Council established](https://www.nsw.gov.au/media-releases/new-digital-identity-advisory-council-established)
|
||||
|
||||
The NSW Government has established a Digital Identity Ministerial Advisory Council (DIMAC), that will advise on a strategic direction and roadmap for digital identity in the State.
|
||||
|
||||
## Use Case
|
||||
|
||||
* [“Tough to forge” digital driver’s license is… easy to forge](https://arstechnica.com/information-technology/2022/05/digital-drivers-license-used-by-4m-australians-is-a-snap-to-forge/)
|
||||
|
||||
The technique for overcoming these safeguards is surprisingly simple. The key is the ability to brute-force the PIN that encrypts the data. Since it’s only four digits long, there are only 10,000 possible combinations. Using publicly available scripts and a commodity computer, someone can learn the correct combination in a matter of a few minutes, as this video, showing the process on an iPhone, demonstrates.
|
@ -1,545 +0,0 @@
|
||||
---
|
||||
published: false
|
||||
---
|
||||
|
||||
# Explainer
|
||||
* [Building interoperable self-sovereign identity for Europe](https://www.youtube.com/watch?v=iN6N_aIeHlU)
|
||||
|
||||
Oskar van Deventer, a rockstar from TNO, presents:
|
||||
|
||||
> ways to build an SSI ecosystem and architecture together that is interoperable and technologically mature fit for society and funding opportunities for SSI projects through grants.
|
||||
|
||||
* [Self-Sovereign Identity and Government – Data Exchange](https://cyber.ee/resources/case-studies/self-sovereign-identity-and-government-identity/) Cybernetica
|
||||
|
||||
This is often achieved with ID cards or passports that we have in our possession with a photo to prove that we are the person this card belongs to, and therefore the person that ID number refers to. In digital identity terms, PKI takes the place of ID cards and offers public and private key pairs.
|
||||
|
||||
* [State of SSI in Europe and Necessity for Network-of-Networks (convened by Sovrin)](https://iiw.idcommons.net/11F/_State_of_SSI_in_Europe_and_Necessity_for_Network-of-Networks_(convened_by_Sovrin)) by Andre Kudra
|
||||
|
||||
3. Hyperledger Indy and Aries technology stack <br>4. ‘Network of networks’ which has been a key concept at the Sovrin Foundation <br>5. The topic is meant to be a conversation as an outline based on material information which can be shared publicly <br>6. EBSI is one of the funded projects from the EU <br>7. ESSIF is one of the projects in this portfolio - have issued a request for proposal for consulting (not in the network of networks topic but other areas) <br>8. Findy (Finland) - yet to go live. Has public and private partners. <br>9. Projects underway at [Spain](https://alastria.io/en/id-alastria/) and other member nations in EU <br>10. Substantial funding behind Indy based technology stack deployments are being seen <br>11. Germany has 3 major streams active in the identity space
|
||||
|
||||
* [Blockchain-enabled Self-Sovereign Identity](https://www.e-zigurat.com/innovation-school/blog/self-sovereign-identity/)
|
||||
> Martin Schäffner, the initiator of the [EuSSI Working Group](https://europeanblockchainassociation.org/eba-working-group-self-sovereign-identity-eussi/) of the [European Blockchain Association](https://europeanblockchainassociation.org/) and expert in Self-Sovereign Identity, explains the concept of Self-Sovereign Identity and how it differentiates from conventional digital identities.
|
||||
|
||||
* [Overview of Member States' eID strategies](https://ec.europa.eu/cefdigital/wiki/display/EIDCOMMUNITY/National+Strategies)
|
||||
> The report focusses on the approaches towards eID outlined in national strategy documents, together with other supporting documentation and web resources, with the aim of offering a thorough understanding of the eID state of play across Europe.
|
||||
|
||||
## ESSIF
|
||||
* [Commerc.io srl has concluded the project with Essif on anti-money laundering eKYC](https://commercio.network/commerc-io-srl-concluded-project-self-sovereign-identity-essif-european-union-anti-money-laundering-ekyc/)
|
||||
> [ComKYC] is a protocol on the Commercio Network blockchain that allows you to issue a KYC verifiable credential after performing a simple set of payments through a bank or any regulated money institution. We piggy back on banks kyc requirements [...] it's a verifiable credential that you can share with anyone who trusts the bank to which this VC is anchored. We have created the first portable derivative key kyc credential protocol that will eliminate the endless passport upload for users, reduce customer dropouts for companies, and reduce time and cost for onboarding new customers
|
||||
|
||||
### eSSIF-Lab
|
||||
* [eSSIF-Lab’s ecosystem: 2nd batch of winners: Infrastructure Development Instrument](https://essif-lab.eu/meet-the-essif-labs-ecosystem-the-infrastructure-development-instrument-first-winners-2/)
|
||||
> another 7 proposals selected, out of 29 that were submitted before the second deadline of the Infrastructure-oriented Open Call
|
||||
- [Verifier Universal Interface by Gataca España S.L.](https://www.gataca.io/)
|
||||
- [Automated data agreements to simplify SSI work flows by LCubed AB](https://igrant.io/)
|
||||
- [Presentation Exchange – Credential Query Infra by Sphereon B.V.](https://sphereon.com/)
|
||||
- [Letstrust.org by SSI Fabric GmbH](https://www.letstrust.org/)
|
||||
- [WordPreSSI Login by Associazione Blockchain Italia](https://associazioneblockchain.it/)
|
||||
- [SSI Java Libraries by Danube Tech GmbH](https://danubetech.com/)
|
||||
- [NFC DID VC Bridge by Gimly](https://www.gimly.io/)
|
||||
|
||||
## EBSI
|
||||
* [EBSI Demo Day](https://ec.europa.eu/digital-building-blocks/wikis/display/EBSI/EBSI+Demo+Day) ([presentation](https://ec.europa.eu/digital-building-blocks/wikis/download/attachments/464979566/EBSI_Demo_Day.pdf)) ([video playlist](https://www.youtube.com/playlist?list=PLPMb0otsCuFLpE4UYiAZ_y3HhP2VX6q8O)
|
||||
|
||||
first time since the launch of [the Early Adopters Programme](https://ec.europa.eu/digital-building-blocks/wikis/x/DABXGw) in 2021, we are ready to showcase, in real-time and with real data, the outcomes of the EBSI multi-university pilot.
|
||||
* [Experience the future with the European Blockchain Services Infrastructure (EBSI)](https://www.youtube.com/watch?v=m2uj7fgb2JI)
|
||||
|
||||
The European Blockchain Services Infrastructure aims to deliver EU-wide cross-border digital public services using blockchain technology. The EBSI will materialize as a network of distributed nodes across Europe (the blockchain), leveraging an increasing number of applications focused on specific use cases.
|
||||
|
||||
* [Verifiable Credentials Lifecycle - EBSI Documentation - CEF Digital](https://ec.europa.eu/digital-building-blocks/wikis/display/EBSIDOC/Verifiable+Credentials+Lifecycle) European Commission
|
||||
|
||||
* [Why and how to make your digital wallet conformant with EBSI?](https://ec.europa.eu/digital-building-blocks/wikis/display/EBSI/Become+conformant) European Commission
|
||||
|
||||
Creating EBSI's Verifiable Credentials Profile containing all the EBSI specifications.
|
||||
|
||||
* [On-boarding legal entities flows clarifications - EBSI Documentation - CEF Digital](https://ec.europa.eu/digital-building-blocks/wikis/pages/viewpage.action?pageId=489652740) European Commission
|
||||
|
||||
In this document, you can learn how to onboard and accredit the following legal entities
|
||||
|
||||
- EBSI Onboarding Service (EOS)
|
||||
- Trusted Accreditation Organisation (TAO)
|
||||
- Trusted Issuer (TI)
|
||||
|
||||
* [EBSI Documentation](https://ec.europa.eu/digital-building-blocks/wikis/display/EBSIDOC/EBSI+Documentation+Home)
|
||||
|
||||
Governmental entities act as important intermediaries for many transactions occurring in today´s society.
|
||||
|
||||
In the era of misinformation, digital fraud has become a challenge that is essential to address.
|
||||
|
||||
Governments and the societies they serve need technology capable of verifying the authenticity of the information they handle.
|
||||
|
||||
As we build the European regulatory framework, in the transfer from paper to digital, a key question arises: how to share official documents, called ‘evidences’ or ‘credentials’ in a way that can be trusted?
|
||||
|
||||
* [VIDchain is the first ID wallet to become EBSI compliant](https://www.validatedid.com/post-en/vidchain-is-the-first-id-wallet-to-become-ebsi-compliant)
|
||||
|
||||
* [Validated ID](https://bit.ly/3ipgSzB) participates in a project to build the [European Blockchain Services Infrastructure (EBSI)](https://ec.europa.eu/cefdigital/wiki/display/CEFDIGITAL/EBSI) for the support of cross-border public services, an initiative created by the European Commission. EBSI is developing a strong and mature ecosystem that Validated ID is proud to be part of.
|
||||
|
||||
* [Congrats to the 11 wallet providers for being conformant to @EU_EBSI](https://mobile.twitter.com/IgrantIo/status/1532036324882104321/photo/1) @IgrantIo
|
||||
|
||||
We are glad to be among the first few along with [@ValidatedID](https://mobile.twitter.com/ValidatedID) [@danube](https://mobile.twitter.com/danube) [@GATACA_ID](https://mobile.twitter.com/GATACA_ID) [@walt_id](https://mobile.twitter.com/walt_id) [@DXCTechnology](https://mobile.twitter.com/DXCTechnology) [@CIMEA_Naric](https://mobile.twitter.com/CIMEA_Naric) [@identyum](https://mobile.twitter.com/identyum) [@ThalesDigiSec](https://mobile.twitter.com/ThalesDigiSec) [@posteitaliane](https://mobile.twitter.com/posteitaliane)
|
||||
|
||||
|
||||
* [5 reasons why professionals and enthusiasts of Self-Sovereign Information Sharing should look into EBSI this summer](https://ec.europa.eu/digital-building-blocks/wikis/display/EBSI/5+reasons+why+professionals+and+enthusiasts+of+Self-Sovereign+Information+Sharing+should+look+into+EBSI+this+summer)
|
||||
|
||||
#1 EBSI combines W3C standards, Verifiable Credentials and DIDs, with blockchain technology for the purpose of information sharing between Citizens and Governments (C2G) or Businesses (C2B) <br>#2 Self-Sovereign Information Sharing should help verification, not control <br>#3 EBSI uses blockchain where it makes sense: to support the verification of Verifiable Crede <br>#4 EBSI contributes to an open market of SSI digital technologies and services <br>#5 EBSI successfully piloted Self-Sovereign Information Sharing in the education domain
|
||||
|
||||
* [EBSI Explained](https://ec.europa.eu/digital-building-blocks/wikis/display/EBSI/What+is+ebsi/) European Commission
|
||||
|
||||
EBSI is a blockchain network of distributed nodes across Europe to support important applications. [...] Below you will find a series of publications that will walk you through the technologies that make it possible for Public Administrations and Businesses to easily verify and trust information received directly from Citizens (or Businesses). There are PDFs of each one: <br> <br>- Verifiable Credentials Explained <br>- Verifiable Credentials in Action <br>- Decentralized Identifiers (DID) Methods <br>- Digital Identity <br>- Issuers Trust Model <br>- OpenID Connect for VCs <br>- Digital Wallet
|
||||
|
||||
* [SSI subgrantee’s solutions booklet: download now!](https://essif-lab.eu/meet-the-essif-lab-ecosystem-completing-the-framework-programme-participants/) ESSIF-LAB ←report on all the NGI awardees ([report](https://essif-lab.eu/wp-content/uploads/2022/09/essif-booklet-22a.pdf)
|
||||
|
||||
After a tough competition among overall excellent proposals, eSSIF-LAB selected the 4 most promising proposals out of 42 submitted applications. 161 applications were started altogether, from 22 different countries. This booklet gives an overview of the 4 Open Calls subgrantee projects started within the infrastructure-oriented and the business-oriented track of eSSIF-Lab.
|
||||
|
||||
* [Verifier Universal Interface by Gataca España S.L.](https://essif-lab.eu/verifier-universal-interface-by-gataca-espana-s-l/)
|
||||
> This draft version can be found at [https://gataca-io.github.io/verifier-apis/](https://gataca-io.github.io/verifier-apis/) and has been built using ReSpec.
|
||||
> This draft version for VUI includes today 6 APIs:
|
||||
>
|
||||
> - Presentation Exchange
|
||||
> - Consent Management
|
||||
> - Schema resolution
|
||||
> - Issuer resolution
|
||||
> - ID resolution
|
||||
> - Credential status resolution
|
||||
|
||||
* [Meet the eSSIF-Lab ecosystem: “Completing the Framework” Programme participants](https://essif-lab.eu/meet-the-essif-lab-ecosystem-meet-the-essif-lab-ecosystem-completing-the-framework-programme-participants-amme-participants-2/)
|
||||
> * [PCDS-DP](https://compell.io/) - Product Circularity Data Sheets Digital Passport
|
||||
> * [ESSIF](https://sis.lt/) - 4 Logistics SSI based authorization for cross- border government and business representatives in logistics
|
||||
> * [Symfoni AS](https://www.symfoni.dev/) - Infrastructure to facilitate payments for verifiable credentials
|
||||
> * [Datarella GmbH](https://datarella.com/) - Go Aries – Enabling CL-Support on Aries Framework Go
|
||||
> * [ID.me](https://www.id.me/)’s legal woes are continuing to escalate. The company is now staring down the prospect of its second federal investigation in as many months, after the House of Representatives’ Oversight and Reform Committee [initiated its review in April](https://findbiometrics.com/congress-opens-formal-investigation-into-id-mes-irs-project-041801/).
|
||||
|
||||
EBSI: [Innovation that respects our privacy is a joint effort](https://ec.europa.eu/digital-building-blocks/wikis/display/EBSI/Innovation+that+respects+our+privacy+is+a+joint+effort)
|
||||
|
||||
O’Neill’s [Weapons of Math destruction](https://www.goodreads.com/book/show/28186015-weapons-of-math-destruction), Zuboff’s [Surveillance Capitalism](https://www.goodreads.com/book/show/26195941-the-age-of-surveillance-capitalism), and Véliz’ recent [Privacy is Power](https://www.goodreads.com/en/book/show/51781479-privacy-is-power): these may have made it onto your summer reading list. And for good reason: wherever there is new technology, there is also concern for the respect of our European values.
|
||||
|
||||
* [5 reasons why professionals and enthusiasts of Self-Sovereign Information Sharing should look into EBSI](https://ec.europa.eu/newsroom/cef/newsletter-archives/40411)
|
||||
|
||||
The web is increasingly more distributed, and with it, a new pattern of information sharing is emerging: Self Sovereign Information sharing, where citizens stay in control of their information by choosing what and when to disclose it, and to whom EBSI enables self-sovereign Citizen-to-Government (C2G) and C2B (Citizen-to-Business) privacy-preserving information sharing.
|
||||
|
||||
* [What is EBSI? EBSI making information easy to verify and almost impossible to fake](https://ec.europa.eu/digital-building-blocks/wikis/display/EBSI/What+is+ebsi/)
|
||||
|
||||
Below you will find a series of publications that will walk you through the technologies that make it possible for Public Administrations and Businesses to easily verify and trust information received directly from Citizens (or Businesses).
|
||||
* [Report from EBSI4Austria](https://medium.com/@markus.sabadello/report-from-ebsi4austria-b79c0ed8ab8d) Markus Sabadello
|
||||
|
||||
In 2018, all European member states, together with Norway and Lichtenstein, signed a declaration stating the joint ambition to take advantage of blockchain technology. These 29 countries founded the European Blockchain Partnership (EBP), and within this partnership, they decided to build the so-called European Blockchain Services Infrastructure (EBSI).
|
||||
|
||||
* [Validated ID's journey to becoming EBSI compliant](https://www.validatedid.com/post-en/validated-ids-journey-to-becoming-ebsi-compliant)
|
||||
|
||||
We at Validated ID have been betting on EBSI since the beginning. We started working to become conformant wallet providers since the very first version of [Wallet Conformance Tests (WCT)](https://ec.europa.eu/digital-building-blocks/wikis/display/EBSI/EBSI+wallets) was published. The process of preparing our solution to become conformant has allowed us to appreciate how remarkable EBSI's work has been.
|
||||
|
||||
* [Where do we stand on Self-Sovereign Identity?](https://www.youtube.com/watch?v=L156YjEyOdo) EBSI
|
||||
|
||||
On December 14th, Joao Rodrigues, Head of sector (Digital) Building Blocks at @European Commission participated in an [#ebcTALKS](https://www.youtube.com/hashtag/ebctalks) of the European Blockchain Convention about "Where do we stand on Self-Sovereign Identity"?
|
||||
|
||||
In 2021 the European Commission [announced the European digital identity wallet](https://ec.europa.eu/commission/presscorner/detail/en/IP_21_2663). This article explains the basic concepts, highlights the significance of this development and provides an overview of the status quo.
|
||||
|
||||
* [European Commission adopts decision to license European Blockchain Services Infrastructure software as open-source](https://ec.europa.eu/digital-building-blocks/wikis/display/EBSI/European+Commission+adopts+decision+to+license+European+Blockchain+Services+Infrastructure+software+as+open+source)
|
||||
|
||||
The Decision to make EBSI software available for licencing under the [European Union Public Licence](https://secure-web.cisco.com/1HQ5AQijOEcsuKHH5VY-lAjONv1Pa-wUY7mpfsymIkIy1G_g9CZh6vK5g0lpjxgIm0oaik042EN-5tL8xLpeesMtxZ0ENcH239uYTSSmPTbu1YtBJ5xHMWZMksOeS6X71soiQSQpoQF8fyzOr1I4atICut-sSt9Wqyou4vpS5myXfHf3S6AMMuyvAxla1etuiJbNKx4gfAlzozwPMe7yC7GNXIsZeCiNuAYA5io7f3CIwdvldsHFBtuGNYI4Z86EMXdfyQXEsR7zidw-7WNQeJpBVDCUVFJymXSb-SXsqJH8jfAf6-U9vC1ilrqATHFaZXXLWlOCOCmlS3nS9kev41tys8SvSKYuGX1FLyFgPgufe__oJ7pmihT7ABqB4AzLy7VMeHBSQfOgbkj11ZEltw4e-kd3XI7KmlREgqfYQ45T7r_VGJo3uCTUG1FlIcAkq8MON0W9AZCAMQyT5UAReSZ7LslcOaF38g6bgAGO0N_C39g6T63pWI-caAZ2h-1_m/https%3A//ec.europa.eu/info/european-union-public-licence_en) is an example of how the European Commission is not only using, but also contributing to the open-source community and thereby growing the ecosystem around EBSI.
|
||||
|
||||
* [Early Adopters Programme | Imagining what EBSI can do for European citizens](https://ec.europa.eu/cefdigital/wiki/display/CEFDIGITAL/Early%20Adopters%20Programme#become-ebsi-compliant)
|
||||
|
||||
In 2021, 22 projects were selected to become part of our incubator programme to help tap into the potential of the EBSI infrastructure. Each project's private and public sector partners was given early access to the pre-production environment of EBSI, and was invited to develop their own pilot project to address a specific business or government use case involving the exchange of verifiable credentials.
|
||||
|
||||
With the help with the EBSI team, Early Adopters can identify how to connect their systems, be part of a community and collaborate with other Early Adopters. This will help us improve EBSI's services and ensure it meets the needs of Europe's businesses and public administrations, within and across borders.
|
||||
|
||||
* [Three Governments enabling digital identity interoperability](https://medium.com/in-present-tense/three-governments-enabling-digital-identity-interoperability-bbcfc60c3a80) Heather Vescent
|
||||
|
||||
On September 15, 2021, I moderated a panel with representatives from the United States Government, the Canadian Government, and the European Commission. Below is an edited excerpt from the panel
|
||||
|
||||
* [Early Adopters Programme | Imagining what EBSI can do for European citizens](https://ec.europa.eu/cefdigital/wiki/display/CEFDIGITAL/Early%20Adopters%20Programme#become-ebsi-compliant)
|
||||
|
||||
An incubator to help Early Adopters and their partners imagine, build and launch their EBSI pilot project(s)
|
||||
|
||||
## Policy
|
||||
|
||||
* [Meeco Review of the European Data Strategy](https://www.meeco.me/data) - Whitepaper
|
||||
|
||||
* [The European Single Identity System “Back to the Future”](https://vimeo.com/481408424)
|
||||
|
||||
What are the Pros and Cons? - ISSE 2020 Webinar 3 ([Tim Bouma says to watch this](https://twitter.com/trbouma/status/1337373169993256962))
|
||||
|
||||
* [The Roles of Government & The Private Sector in a Digital ID Program with Sebastian Manhart](https://northernblock.io/roles-of-government-and-private-sector-in-digital-id/) Northern Block
|
||||
|
||||
we dive into what’s happening within the Digital ID landscape within Europe. Sebastian Manhart is very well positioned between policy and technology in the European Union. In this episode of SSI Orbit, he shares his experiences and future projections.
|
||||
|
||||
* [New Coalition Launches Campaign for Data Sovereignty Now](https://datasovereigntynow.org/2021/01/21/new-coalition-launches-campaign-for-data-sovereignty-now/)
|
||||
> a campaign that will press European policy makers at all levels to ensure that control of data remains in the hands of the people and organizations that generate it. The issue becomes ever more urgent as policies around Europe’s digital economy and data architecture start to solidify.
|
||||
|
||||
* [How Can Europe Lead Innovation And Win Web3? Ledger’s 4 Recommendations For EU Policymakers](https://acrobat.adobe.com/link/review?uri=urn:aaid:scds:US:fa00c64a-5f6d-38c6-baf7-0bcfa06e6a28#pageNum=25)
|
||||
|
||||
1. Invest in a public/private partnership to co-develop a self-sovereign identity solution for Europe.
|
||||
|
||||
* [A trusted and secure European e-ID - Regulation](https://digital-strategy.ec.europa.eu/en/library/trusted-and-secure-european-e-id-regulation)
|
||||
|
||||
The legal instrument aims to provide, for cross-border use:
|
||||
– access to highly secure and trustworthy electronic identity solutions,
|
||||
– that public and private services can rely on trusted and secure digital identity solutions,
|
||||
– that natural and legal persons are empowered to use digital identity solutions,
|
||||
– that these solutions are linked to a variety of attributes and allow for the targeted sharing of identity data limited to the needs of the specific service requested,
|
||||
– acceptance of qualified trust services in the EU and equal conditions for their provision.
|
||||
|
||||
* [DIGITAL SERVICES ACT: A GAME CHANGER FOR OUR FUNDAMENTAL RIGHTS? [+ LIVE STREAM]](https://www.patrick-breyer.de/event/digital-services-act-a-game-changer-for-our-fundamental-rights/)
|
||||
|
||||
With the [Digital Services Act (DSA)](https://www.patrick-breyer.de/en/posts/dsa/), the European Union is to adopt landmark legislation that will create a framework to regulate online platforms around the world. The DSA will have an impact on the free expression of opinions online, our choices as consumers, the right to privacy and the basic mechanisms of the global Internet.
|
||||
|
||||
* [Understanding the MiCA and Pilot Regime crypto regulation](https://medium.com/adaneu/relax-take-it-easy-understanding-the-mica-and-pilot-regime-crypto-regulation-db21e537ec58)
|
||||
> The European Commission’s proposal for the regulation of crypto-assets markets is based on two draft texts :
|
||||
> - MiCA (Markets in Crypto-Assets Regulation) whose scope covers cryptocurrencies, utility tokens and stablecoins ;
|
||||
> - the Pilot Regime Regulation for DLT Market Infrastructures (PRR) project.
|
||||
> With these two texts, the Commission’s goal is to regulate crypto-asset players and not the assets as such.
|
||||
|
||||
### Data Governance Act
|
||||
|
||||
* [A critical fork in the data road?](https://medium.com/mydex/a-critical-fork-in-the-data-road-1eb29c5a42a8) MyData
|
||||
|
||||
Is the EU discussion about data portability missing a key point?
|
||||
|
||||
In its discussion of data portability the EU rightly recognises the economic importance of this issue, stressing that “market imbalances arising from the concentration of data restricts competition, increases market entry barriers and diminishes wider data access and use.”
|
||||
|
||||
it is likely that many dApp developers now need an identity solution that preserves privacy but ensures compliance – which is exactly the solution that we are building at SelfKey.
|
||||
EU [DATA GOVERNANCE ACT MEETS TOIP FRAMEWORK](https://trustoverip.org/blog/2022/01/13/data-governance-act-meets-toip-framework/) TOIP
|
||||
|
||||
The DGA defines an “intermediary” that facilitates processing and sharing of data for individuals and organizations to “…increase trust in data intermediation services and foster data altruism across the EU”. In the [MyData](https://mydata.org/declaration/) framework for user-controlled data sharing, intermediaries are called [MyData Operators](https://mydata.org/mydata-operators/) and there is a certification program in place.
|
||||
|
||||
* [EU Data Governance Act officially released](https://ec.europa.eu/digital-single-market/en/news/data-governance-act)
|
||||
>foster the availability of data for use by increasing trust in data intermediaries and by strengthening data-sharing mechanisms across the EU
|
||||
|
||||
One of MyDex CIC’s founders, [Alan Mitchell shares a feeling of Vindication](https://medium.com/mydex/vindicated-cb897fb4e94b) in a post celebrating the companies early articulation of key principles and how the EU’s proposed new Data Governance Act aligns with that.
|
||||
> These providers will have to comply with a number of requirements, in particular the requirement to remain neutral as regards the data exchanged. They cannot use such data for other purposes. In the case of providers of data sharing services offering services for natural persons, the additional criterion of assuming fiduciary duties towards the individuals using them will also have to be met.
|
||||
|
||||
* [Data Exchange Board to Improve the EU Data Governance Act](https://mydata.org/2020/12/09/why-we-need-a-data-exchange-board-to-improve-the-eu-data-governance-act/)
|
||||
|
||||
* [EU Data Governance Act](https://blog.meeco.me/eu-data-governance-act/) (Meeco)
|
||||
|
||||
> We welcome the regulation as a needed common ground for clarifying the role of data intermediaries, building trust in these intermediaries and setting the direction for data governance, including the emergence of digital human rights.
|
||||
>
|
||||
> In this context we offer the following suggestions:
|
||||
> 1. Explicitly include individuals as active participants in the definitions [...]
|
||||
> 2. Clarify the scope of the data sharing services (Art. 9 (2)) and extend it to include services that empower the data subject beyond compliance.
|
||||
> 3. Foster the growth of intermediaries, which offer new technologies and have the greatest likelihood of success in Europe if supported by the Data Governance Act.
|
||||
> 4. Open silos and implement soft infrastructure such as standards & open APIs to accelerate uptake and interoperability between data sharing services.
|
||||
> 5. Foster eco-systems and demonstrate the value through practical use-cases.
|
||||
> 6. Create a level playing field for sustainable data sharing by providing funding to pioneers at the forefront of developing data eco-systems
|
||||
|
||||
The [EU Commission published the long-awaited Data Act](https://ec.europa.eu/commission/presscorner/detail/en/ip_22_1113) on February 23, 2022. This is a progressive legislative proposal to increase access to data for the users of connected products suchs as Iot devices and related services. It is a significant move towards realising the [MyData principle](https://mydata.org/declaration/) of portability, access, and re-use as well as the principle of interoperability. It will potentially also move the needle towards the shift from formal to actionable rights in terms of the right of data portability. With such a progressive agenda, the proposal will certainly also face significant opposition and counter-lobbying from those who stand to benefit from the status quo.
|
||||
|
||||
## NGI
|
||||
|
||||
Next Generation Internet (NGI) The Next Generation Internet (NGI) initiative aims to shape the development of the Internet of tomorrow into an Internet of humans that responds to people’s fundamental needs, including trust, security and inclusion, and reflects the values and the norms that we enjoy in Europe.<br><br>The NGI initiative aims to build the key technology blocks of a human-centric Internet, which gives end-users full control of their personal data. Through advanced technologies, new decentralised business and social models will ensure secure and trustworthy access for all. https://www.ngi.eu/
|
||||
|
||||
* [NGI Forward SALON ON DIGITAL SOVERIGNTY IN eID-Solutions2: Self-sovereign, Centralised or Privatised?](https://www.youtube.com/watch?v=1RxB7KK2x8Y)
|
||||
|
||||
Without a clear vision on identity, society will have no agency since the capability to produce future value (data) is not under regional, nor national, nor international regulated control.
|
||||
|
||||
Therefore it is important to have a good overview of what is happening in different parts of the world to see if we can not combine innovative solutions.
|
||||
|
||||
|
||||
## EICC
|
||||
* [Where Stands the Sovereign Self?](https://www.kuppingercole.com/blog/hegde/eic-speaker-spotlight-doc-searls-on-decentralized-identity?ref=smspotlightdoc) Kuppinger Cole
|
||||
|
||||
Doc Searls, Co-founder and board member of Customer Commons, and Director of ProjectVRM, is to deliver a keynote entitled [Where Stands the Sovereign Self?](https://www.kuppingercole.com/sessions/4918) at the [European Identity and Cloud Conference 2021](https://www.kuppingercole.com/events/eic2021). [...] we asked Doc some questions about his planned presentation.
|
||||
- [How to use the framework of a Trusted Data Ecosystem to simplify building decentralized identity solutions](https://www.kuppingercole.com/sessions/4999/3) on Wednesday, May 11, at the [European Identity and Cloud Conference 2022](https://www.kuppingercole.com/events/eic2022).
|
||||
|
||||
## Company
|
||||
* [European Digital Identity: Talao Announces Professional Credential Solution](https://medium.com/@talao_io/european-digital-identity-talao-announces-professional-credential-solution-1d322e32be2c) Talao
|
||||
|
||||
Talao’s team is excited to announce the development of the first Decentralized Self-Sovereign Identity (SSI) solution built on the Tezos blockchain for the Human Resources industry. The digital wallet created by Talao will enable companies to issue verifiable professional credentials and for employees to store work history and other personal data.
|
||||
|
||||
## Government
|
||||
|
||||
* [Self-Sovereign Digital Identity Wallets for Citizens](https://tages.biz/self-sovereign-digital-identity-wallets-for-citizens/) Tages
|
||||
|
||||
The information on Horizon Europe, EU Health, Digital Europe, Creative Europe, Digital Single Market, Citizens, Equality, Rights, and Values Programme were shared by the experts and also the representatives of the organizations that have project experience within the scope of these EU programs shared the achievements, outputs, challenges, lessons learned and cooperation processes with EU member states in the projects they implemented. <br> [...]<br> Watch all the presentations from the event: [11 May 2022](https://www.youtube.com/watch?v=GKlgfRSCeXI), [12 May 2022](https://www.youtube.com/watch?v=DQIgwVJvFuE&t=28020s)
|
||||
|
||||
* [The “Secure Platform” Concept for Europe - a Trusted and Secure Foundation for a Human-Centric Digital World.](https://mydata.org/2021/06/04/guest-post-the-secure-platform-concept-for-europe/) MyData
|
||||
|
||||
The following article discusses the technical requirements needed to protect our personal data and to ensure a safer digital world. It presents solutions for creating an open and secure IT infrastructure where data privacy can always be guaranteed. The article has been written by esatus, founding member and lead of the “Secure Platform” working group, a thematic group within [the IT Security Association Germany (TeleTrusT)](https://www.teletrust.de/en/startseite/).
|
||||
|
||||
* [Commission proposes a trusted and secure Digital Identity for all Europeans](https://ec.europa.eu/commission/presscorner/detail/en/ip_21_2663)
|
||||
> However, there is no requirement for Member States to develop a national digital ID and to make it interoperable with the ones of other Member States, which leads to high discrepancies between countries. The current proposal will address these shortcomings by improving the effectiveness of the framework and extending its benefits to the private sector and to mobile use.
|
||||
* [Digital Identity for all Europeans](https://ec.europa.eu/info/strategy/priorities-2019-2024/europe-fit-digital-age/european-digital-identity_en)
|
||||
> - Available to any EU citizen, resident, or business in the EU who wants to use it
|
||||
> - Widely useable as a way of identification or to confirm certain personal attributes for the purpose of access to public and private digital services across the EU
|
||||
> - Giving full control to users to choose which aspects of their identity, data and certificates they share with third parties, and keep track of such sharing
|
||||
* [TechCrunch Europe wants to go its own way on digital identity](https://techcrunch.com/2021/06/03/europe-wants-to-go-its-own-way-on-digital-identity/)
|
||||
> Alongside today’s regulatory proposal they’ve put out a recommendation, inviting member states to “establish a common toolbox by September 2022 and to start the necessary preparatory work immediately” — with a goal of publishing the agreed toolbox in October 2022 and starting pilot projects (based on the agreed technical framework) sometime thereafter.
|
||||
>
|
||||
> “This toolbox should include the technical architecture, standards and guidelines for best practices,” the commission adds, eliding the large cans of worms being firmly cracked open.
|
||||
|
||||
|
||||
## eSSIF Lab
|
||||
* [Infrastructure Development Winners](https://essif-lab.eu/meet-the-essif-labs-ecosystem-the-infrastructure-development-instrument-first-winners/) including SICPA, Jolocom, Evernym, ValidatedID
|
||||
* [Meet the eSSIF-Lab ecosystem: the 2nd Business-oriented Programme participants](https://essif-lab.eu/meet-the-essif-lab-ecosystem-the-2nd-business-oriented-programme-participants/)
|
||||
|
||||
Blockchain Certified Data – [Academic Verifiable Credentials](https://www.bcdiploma.com/) (Academic VCs)
|
||||
Upstream Dream AB – [Patient-controlled information flows for learning health systems](https://www.genia.se/) (The LHS project)
|
||||
Mopso Srl – [Amlet](https://www.mopso.eu/) (A.W.)
|
||||
Credenco B.V. – [Digital Certificate of Good Conduct](https://www.credenco.com/) (CoCG)
|
||||
Stichting Cherrytwist – [Decentralized Open Innovation Platform](https://alkem.io/) (DOIP)
|
||||
Truu Ltd – [Healthcare Professionals Digital Staff Passport](https://www.truu.id/) (Health DSP)
|
||||
Fair BnB Network Società Cooperativa – [Stay Fair, Play Fair – a co-operative habitat for music](https://fairbnb.coop/)
|
||||
ZENLIFE SARL-S – [Zenlife eConsent](https://zenlife.lu/) – under construction
|
||||
LearningProof UG – [HonorBox-SSI](https://learningproof.xyz/)
|
||||
WorkPi B.V. – [Work Performance Intelligence](https://workpi.com/) (WorkPi)
|
||||
yes.com AG – [European Bank Identity Credentials](https://www.yes.com/) (Eubic)
|
||||
|
||||
* [Gimly in eSSIf-lab: self-sovereign identity and NFC smartcards](https://www.gimly.io/blog/gimly-in-essif-ssi-and-nfc-smartcards)
|
||||
> Gimly is participating in the European SSI infrastructure programme (eSSIf-lab), building a bridge for the implementation of NFC smartcards with secure elements as physical SSI identifiers. Our aim is to enable self-sovereign identity for both online and offline identification, authorization and access management, with a decreased dependency on the use of personal smartphones.
|
||||
|
||||
* [Alex Norta | NGI Explorers Third Expedition: meet the Explorers](https://www.youtube.com/watch?v=_HCEwQLpr10)
|
||||
|
||||
Meet [Alex Norta](http://alexnortaphd.yolasite.com/), associate professor at TalTech who talks about his project “Self-sovereign multi-factor identity authentication using smart-contract blockchain technology”, that will be carried out in collaboration with the University of Central Florida
|
||||
|
||||
* [SSI Mandate Service by Visma Connect B.V.](https://essif-lab.eu/ssi-mandate-service-by-visma-connect-b-v/) ESSIF LAB
|
||||
|
||||
The SSI mandate service is a generic and holistic approach to provide and request mandates. Mandates are SSI credentials signed by the dependent that can be requested by either the dependent or authorized representative. These credentials can be used to prove to a verifier that the authorized representative is authorized to act for specific actions on behalf of the dependent.
|
||||
|
||||
* [OnboardSSI by Quadible](https://essif-lab.eu/onboardssi-by-quadible/) ESSIF-LAB
|
||||
|
||||
The concept of SSI was designed with the citizen and privacy in mind. However, existing implementations lack user-friendliness (e.g. showing hash codes to users), creating potential barriers in users’ adoption. OnboardSSI focuses on providing a secure and user-friendly wallet solution creating an easier way for citizens to manage their identity.
|
||||
|
||||
* [eSSIF-Lab Vision and Purpose](https://essif-lab.pages.grnet.gr/framework/docs/vision-and-purpose)
|
||||
|
||||
The context of the eSSIF-Lab vision can be found in articles 8-10 of the [European Convention on Human Rights (ECHR)](https://www.echr.coe.int/Pages/home.aspx?p=basictexts/convention), that state the rights of individuals regarding their privacy, and their freedoms to collect, process, store, and express information in a self-sovereign fashion, i.e. in a way that they can decide for themselves.
|
||||
|
||||
* [eSSIF-Lab Principles](https://essif-lab.pages.grnet.gr/framework/docs/essifLab-principles)
|
||||
> [Trust](https://essif-lab.pages.grnet.gr/framework/docs/terms/trust) is not something that is given, but something that [parties](https://essif-lab.pages.grnet.gr/framework/docs/terms/party) (un)consciously assess, and decide about, and changes over time. Since parties are autonomous, their trust is highly subjective. As a consequence, the idea of having 'trusted registries', 'trusted issuers' that do not take this subjectivity into account basically act as [(centralized) authorities](https://essif-lab.pages.grnet.gr/framework/docs/terms/authority), denying that parties are autonomous. While we acknowledge that such ideas (have a right to) exist, we do not follow them.
|
||||
* [eSSIF-Lab Glossary](https://essif-lab.pages.grnet.gr/framework/docs/essifLab-glossary)
|
||||
* [NGI Forward SALON ON DIGITAL SOVEREIGNTY IN eID-Solutions2:Self-sovereign, Centralised or Privatised](https://www.youtube.com/watch?v=1RxB7KK2x8Y)
|
||||
> We are in a very interesting historical moment where forces (and solid arguments) for centralization and forces (and solid arguments) for decentralization seem to hold each other in check. Without a clear vision on identity, society will have no agency since the capability to produce future value (data) is not under regional, nor national, nor international regulated control
|
||||
|
||||
* [Meet the eSSIF-Lab’s ecosystem: The Infrastructure Development Instrument second tranche winners](https://spaces.fundingbox.com/spaces/ngi-next-generation-internet-ngi-news-events/6059f89a9bbc1905d0abf0a9) NGI Community
|
||||
|
||||
2nd tranche winners are the following:
|
||||
|
||||
1. Verifier Universal Interface by [Gataca España S.L.](https://www.gataca.io/) – Building Standard APIs for Verifier components to enable SSI interoperability
|
||||
2. Automated data agreements to simplify SSI work flows by [LCubed AB (operated under the brand iGrant.io)](https://igrant.io/) – Adopt SSI and make it consumable for both organisations and end-users
|
||||
3. Presentation Exchange - Credential Query Infra by [Sphereon B.V.](https://sphereon.com/) – Presentation Exchange Interop and Integration
|
||||
4. Letstrust.org by [SSI Fabric GmbH](https://www.letstrust.org/) – Self-Sovereign Identity for everyone: Enterprise & Consumer Cloud Wallet (OIDC-based), Credentials & SDKs as a basis for applications - free
|
||||
5. SSI Java Libraries by [Danube Tech GmbH](https://danubetech.com/) – Improving and completing a set of generic, open-source Java libraries for working with DIDs and VCs
|
||||
6. WordPreSSI Login by [Associazione Blockchain Italia](https://associazioneblockchain.it/) – SSI Login for every WordPress site
|
||||
7. NFC DID VC Bridge by [Gimly](https://www.gimly.io/) – Enabling the use of NFC secure elements as DID and VC transport for off-line and online identity, authorizations and access management
|
||||
* The eSSIF-Lab (European Self Sovereign Identity Framework) has announced the winners of two of its different calls for funding
|
||||
- [Infrastructure Development Winners](https://essif-lab.eu/meet-the-essif-labs-ecosystem-the-infrastructure-development-instrument-first-winners/) including SICPA, Jolocom, Evernym, ValidatedID
|
||||
- [Business-Oriented Programme](https://essif-lab.eu/meet-the-essif-labs-ecosystem-the-1st-business-oriented-programme-participants/) including Danube Tech, Domi, Jolocom
|
||||
|
||||
* [Announcing selection final phase eSSIF-Lab and maximum funding by the European Commission](https://medium.com/@WorkX/announcing-selection-final-phase-essif-lab-and-maximum-funding-by-the-european-commission-80e4ef8912db) Work X
|
||||
|
||||
we have done extensive research & development into a use-case to let employees regain control over their career-related data. Therefore receiving the maximum development grant of €106.000 (funded by the European Commission) to bring our MVP into production.
|
||||
|
||||
* [Meet the eSSIF-Lab ecosystem: “Completing the Framework” Programme participants](https://essif-lab.eu/meet-the-essif-lab-ecosystem-meet-the-essif-lab-ecosystem-completing-the-framework-programme-participants-amme-participants-2/)
|
||||
|
||||
- [PCDS-DP](https://compell.io) - Product Circularity Data Sheets Digital Passport
|
||||
- [ESSIF 4 Logistics](https://sis.lt) - SSI based authorization for cross- border government and business representatives in logistics
|
||||
- [Symfoni AS](https://www.symfoni.dev/) - Infrastructure to facilitate payments for verifiable credentials
|
||||
- [Datarella GmbH](https://datarella.com) - Go Aries – Enabling CL-Support on Aries Framework Go
|
||||
|
||||
## eIDAS
|
||||
|
||||
* [SSI eIDAS Legal Report – Ignacio Alamillo – Webinar 55](https://ssimeetup.org/introducing-ssi-eidas-legal-report-ignacio-alamillo-webinar-55/)
|
||||
> The European Commission developed the [SSI (Self-Sovereign Identity) eIDAS bridge](https://joinup.ec.europa.eu/collection/ssi-eidas-bridge), an ISA2 funded initiative, to promote eIDAS as a trust framework for the SSI ecosystem. It assists a VC (Verifiable Credential) issuer in the signing process, and helps the verifier to automate the identification of the organization behind the issuer’s DID (Decentralized Identifier). Simply by “crossing” the eIDAS Bridge, a Verifiable Credential can be proven trustworthy in the EU.
|
||||
* [eIDAS and Self-Sovereign Identity](https://www.thedinglegroup.com/blog/2021/3/11/eidas-and-self-sovereign-identity) ([Video](https://vimeo.com/522501200) Dingle Group
|
||||
> Why then is eIDAS v1 not seen as a success? There are many reasons; from parts of the regulation that focused or constrained its use into the public sphere only, to the lack of total coverage across all of the EU. Likely the key missing piece was that the cultural climate was not yet ripe and the state of digital identity was really not ready. Too many technical problems were yet to be solved. Without these elements the realized state of eIDAS should not be unexpected. All this said, eIDAS v1 laid very important groundwork and created an environment to gather important learnings to allow eIDAS v2 to realize the hoped for levels of success and adoption.
|
||||
|
||||
* [Legal compliance and the involvement of governments](https://ssi-ambassador.medium.com/self-sovereign-identity-legal-compliance-and-the-involvement-of-governments-467acdd32e88) SSI Ambassador
|
||||
> It’s currently possible to be eIDAS compliant with SSI, leveraging one out of five scenarios described in the SSI eIDAS legal report by Dr. Ignacio Alamillo Domingo. Especially interesting is the SSI eIDAS bridge, which adds legal value to verified credentials with the use of electronic certificates and electronic seals. However, it’s also possible to derive national eIDs notified in eIDAS, which are eIDAS linked by issuing a verifiable credential with a qualified certificate according to the technical specification.
|
||||
|
||||
* [The time for the eIDAS Bridge](https://www.validatedid.com/post-en/the-time-for-the-eidas-bridge) ValidatedID
|
||||
|
||||
if you wonder how many of us, users, can really take advantage of PKI for identifying ourselves on the internet, the answer is quite deceiving. This mature technology has been available for decades but has never become mainstream among the society for identifying end users.
|
||||
|
||||
* [Support to the implementation of the European Digital Identity Framework and the implementation of the Once Only System under the Single Digital Gateway Regulation](https://ec.europa.eu/info/funding-tenders/opportunities/portal/screen/opportunities/topic-details/digital-2022-deploy-02-electronic-id;callCode=DIGITAL-2022-DEPLOY-02) Until May 17
|
||||
|
||||
The objective of the topic is to develop, implement and scale up the European Digital Identity framework, based on the revised eIDAS regulatory framework as well as the exchange of evidence as set out in article 14 the Single Digital Gateway Regulation. The broader objective of European Digital Identity is to improve citizen’s access to highly trusted and secure electronic identity means and trust services such as digital signatures, improve citizens’ possibilities to use them and improve their ability to control over sharing their personal identity data.
|
||||
|
||||
* [Global Identity Networks: How to Leverage Them for Business Benefit](https://www.kuppingercole.com/events/eic2022/blog/global-identity-networks-to-leverage-business-benefit) Kuppinger Cole
|
||||
|
||||
The uptake of eIDAS (facilitating cross-border acceptance of eIDs) is low relative to the technical capacity of states; [only 15 of the 27 Member States](https://op.europa.eu/en/publication-detail/-/publication/35274ac3-cd1b-11ea-adf7-01aa75ed71a1) able to fulfil the regulation’s requirements of accepting the eIDs of other Member States for public services.
|
||||
|
||||
The EU Commission did reflect on the effectiveness of the regulation in its [Impact Assessment](https://op.europa.eu/en/publication-detail/-/publication/35274ac3-cd1b-11ea-adf7-01aa75ed71a1), and is developing a revision of it. There are multiple revision options being discussed, but thus far, the preferred option would establish a framework that provides citizens with optional use of a personal digital wallet
|
||||
|
||||
- [eIDAS 2.0: How Europe can define the digital identity blueprint for the world](https://blog.avast.com/eidas-2.0-avast)
|
||||
|
||||
* [EIDAS 2.0 Turns To Self-Sovereign Identification To Bring Users Ownership And Control](https://www.forbes.com/sites/alastairjohnson/2022/07/05/eidas-20-turns-to-self-sovereign-identification-to-bring-users-ownership-and-control/?sh=a9eefcc7f07e) Forbes
|
||||
|
||||
The new proposal will pivot on some of the more key issues that held back the original framework. For example, instead of enforcing a single, rigid ID that openly reveals everything about an individual indefinitely, the eIDAS 2.0 structure can now potentially employ a flexible, self-sovereign identity (SSI) that puts control of all identifying information entirely into the hands of the end-users they pertain to, in both public and private partnership frameworks.
|
||||
|
||||
* [Our Analysis of the EU Digital Identity Architecture and Reference Framework](https://www.evernym.com/blog/eu-digital-identity/) Evernym
|
||||
> Broadly, we at Evernym/Avast are impressed with the content and the underlying principles in the Framework. There’s a lot that we like, but there are also some areas of significant concern that need careful attention.
|
||||
|
||||
- [An analysis of EU digital identity architecture and reference framework](https://blog.avast.com/analysis-of-eu-digital-identity-architecture-and-reference-framework-avast)
|
||||
|
||||
* [Avast’s views on the proposed amendments to the eIDAS 2.0 regulation](https://blog.avast.com/eidas-2.0-amendments-analysis)
|
||||
|
||||
* [Introducing the SSI eIDAS Legal Report](https://ssimeetup.org/introducing-ssi-eidas-legal-report-ignacio-alamillo-webinar-55/) – Ignacio Alamillo – Webinar 55
|
||||
> The European Commission developed the [SSI (Self-Sovereign Identity) eIDAS bridge](https://joinup.ec.europa.eu/collection/ssi-eidas-bridge), an ISA2 funded initiative, to promote eIDAS as a trust framework for the SSI ecosystem. It assists a VC (Verifiable Credential) issuer in the signing process, and helps the verifier to automate the identification of the organization behind the issuer’s DID (Decentralized Identifier)
|
||||
|
||||
* [The time for the eIDAS Bridge](http://validatedid.com/post-en/the-time-for-the-eidas-bridge) ValidatedID
|
||||
|
||||
The main goal of this new program was to provide an implementation of eIDAS bridge and to proof the interoperability between different provider implementations. Validated ID was selected to participate in part of the Call 1 of infrastructure. The results of this project are available as open source. If you are interested in digging into the code, you can find it all in the following repositories: [our open source version implementation](https://gitlab.grnet.gr/essif-lab/infrastructure/validated-id/seb) and the [SSI eIDAS Bridge interoperability](https://gitlab.grnet.gr/essif-lab/interoperability/ssi-eidas-bridge) performed with SICPA.
|
||||
|
||||
* [European Digital Identity Architecture and Reference Framework](https://forum.eid.as/t/european-digital-identity-architecture-and-reference-framework/216) ([pdf](https://ec.europa.eu/transparency/expert-groups-register/core/api/front/document/73759/download)
|
||||
|
||||
The document in particular outlines the EUDI Wallet:
|
||||
|
||||
* [EU DATA ACT – MAKING DATA PORTABILITY ACTIONABLE](https://mydata.org/2022/02/25/eu-data-act-making-data-portability-actionable/)
|
||||
|
||||
* [eIDAS 2.0: How Europe Can Define the Digital Identity Blueprint for the World](https://www.evernym.com/blog/eidas/) Evernym
|
||||
|
||||
Problem 1: Unique wallet IDs <br>Problem 2: Remote Wallet Kill Switches <br>Problem 3: Wallet Content Restrictions <br>Problem 4: Private Sector Restrictions <br>Exciting New Opportunities for eIDAS 2.0 <br>Opportunity 1: Basic or Enhanced Wallets <br>Opportunity 2: Turning Regulations Into Revenue <br>Opportunity 3: Person-to-Person Verification <br>Opportunity 4: Secure messaging.
|
||||
|
||||
## Organization
|
||||
|
||||
* [European Union Digital Identity Wallet Consortium](https://eudiwalletconsortium.org/) EUDI
|
||||
|
||||
The funding call is within the Digital Europe Programme (DIGITAL) topic 5.3.1.2 which requests support to implement the European Digital Identity Framework and the implementation of the Once Only System under the Single Digital Gateway Regulation. Up to €37m funding is available.
|
||||
|
||||
* [Self-Sovereign Identity Working Group](https://europeanblockchainassociation.org/eba-working-group-self-sovereign-identity-eussi/) European Blockchain Association in collaboration with the European Commission
|
||||
|
||||
Right now, many enterprises and organisations are building their own SSI solutions by implementing the existing standards and protocols. Since all these parties do similar work and have to face similar problems, it is critical for the community to share these learnings and experiences openly.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
* [Is the EU Digital Identity Wallet an implementation of Self-Sovereign Identity?](https://www.innopay.com/en/publications/eu-digital-identity-wallet-implementation-self-sovereign-identity) Innopay
|
||||
|
||||
The intention of the European Commission is to allow – or even force – acceptance in a wide range of sectors in the public and private domain and thereby ensure that identities are as wisely usable as possible (interoperability). The principle of consent will also be met, as it is already fulfilled with current eID solutions notified under eIDAS and other EU regulations, such as GDPR and PSD2. One of the explicit requirements of the proposal is selective disclosure, in line with GDPR’s rules on data minimalisation.
|
||||
|
||||
* [GDPR: Everything you need to know](https://authenteq.com/general-data-protection-regulation-gdpr-and-all-thats-behind-it/) - is a great post by authentic explaining it at a high level that we thought would be helpful to those trying to orient.
|
||||
|
||||
* [Can a Verifiable Credential-based SSI Implementation meet GDPR Compliance?](https://academy.affinidi.com/can-a-verifiable-credential-based-ssi-implementation-meet-gdpr-compliance-5039d0149ea4)
|
||||
|
||||
Let’s examine how SSI meets each of the articles from #13 to #22.
|
||||
* [SSI](https://academy.affinidi.com/can-a-verifiable-credential-based-ssi-implementation-meet-gdpr-compliance-5039d0149ea4) is a digital movement that aims to enable individuals or organizations to have sole ownership of their identity, and to have control over how their data is shared and used.
|
||||
|
||||
* [Two in three Europeans intend to use the EU's Digital Identity Wallet](https://www.nfcw.com/2022/06/08/377379/two-in-three-europeans-intend-to-use-the-eus-digital-identity-wallet/) NFCW
|
||||
|
||||
“The results of the survey certainly underline the need for this pioneering European initiative aiming at offering the most convenient user experience (UX) at the highest level of security,” the company adds
|
||||
|
||||
|
||||
* [Why is Self-Sovereign Identity compliant with the [GDPR]?](https://en.archipels.io/post/pourquoi-le-self-sovereign-identity-est-compatible-avec-le-rgpd) Archpelis
|
||||
|
||||
With the transition to the web 3.0 ecosystem, the development of distributed registries (blockchain technology) and the regulatory environment that is forcing digital players to favour privacy by design, the ISS approach will become the new standard, whether for entering into customer relations, managing digital identities or ensuring compliance of administrative processes in companies and institutions.
|
||||
|
||||
|
||||
* [Emerging approaches for data-driven innovation in Europe](https://publications.jrc.ec.europa.eu/repository/handle/JRC127730) JRC Publications
|
||||
> Europe’s digital transformation of the economy and society is framed by the European strategy for data through the establishment of a common European data space based on domain-specific data spaces in strategic sectors such as environment, agriculture, industry, health and transportation.
|
||||
|
||||
* [Joining forces towards European digital credentials](https://onedrive.live.com/?authkey=%21ADoEGcIwiKDydcg&cid=F7FF746DED29F767&id=F7FF746DED29F767%2183805&parId=F7FF746DED29F767%2183804&o=OneUp) European Commission
|
||||
|
||||
### IDNOW
|
||||
|
||||
* [IDnow joins Accelerate@IATA to shape the future of seamless air travel](https://www.idnow.io/pr/idnow-joins-accelerateiata/) IDnow
|
||||
|
||||
The goal of IATA One ID is to set industry standards that further streamline the passenger journey with digitalization of admissibility and a contactless process through secure biometric enabled identification.
|
||||
* [EU decision on Identity Wallet: Starting signal for a seamless digital future](https://www.idnow.io/blog/eu-decision-on-identity-wallet-starting-signal-for-a-seamless-digital-future/)
|
||||
> Last week, the EU Commission published a draft for the so-called digital identity wallet “EUid”. According to it, within 12 months of the law coming into force, every EU state must provide its citizens with a digital wallet.
|
||||
* [How the Digital Markets Act (DMA) will shape the future of digital identity in Europe](https://www.idnow.io/blog/digital-markets-act-dma-future-digital-identity/) IDNow
|
||||
|
||||
On March 24th, 2022, [the European Parliament and Council reached an agreement on the final version of the Digital Markets Act (DMA)](https://eur-lex.europa.eu/legal-content/de/TXT/?qid=1608116887159&uri=COM%3A2020%3A842%3AFIN). According to the European Commission, the DMA regulation is expected to be reviewed and enacted by October 2022.
|
||||
* [the-time-for-the-eidas-bridge](http://validatedid.com/post-en/the-time-for-the-eidas-bridge) ValidatedID
|
||||
> There’s an outstanding question, for us, around how this community explores and thinks about the theoretical underpinnings of a Community of Practice (CoP), but one thing is for sure, Keep Badges Weird is a CoP.
|
||||
|
||||
|
||||
|
||||
* [Adopting eID in Europe and Beyond](https://stateofidentity.libsyn.com/adopting-eid-in-europe-and-beyond) State of Identity
|
||||
|
||||
Digital identity is now recognized as a key building block in digitizing public administration; however, it requires interoperability with private sector use cases to drive value for its citizens.
|
||||
## Europe - Catalonia
|
||||
|
||||
* [Catalonia launches a project for Self-Sovereign Identity to empower citizens in the digital world](https://politiquesdigitals.gencat.cat/en/detalls/Noticia/El-Govern-presenta-el-projecte-IdentiCAT-un-nou-model-didentitat-digital-autosobirana-que-converteix-el-ciutada-en-propietari-gestor-i-custodi-exclusiu-de-la-seva-identitat-i-dades) Politiques Digitales
|
||||
|
||||
The Government will only act as a validator, giving the tools and a secure legal framework, but it will not in any case have the custody of the data.
|
||||
|
||||
The Government of Catalonia has presented IdentiCAT, the new decentralized and self-sovereign digital identity model, which aims to become the first public digital identity at a European level and it will be self-managed by the citizen with the absolute legal guarantee and validity to operate with the public administration and the private sector.
|
||||
|
||||
* [Data Sovereignty and Trusted Online Identity](https://beyondstandards.ieee.org/data-sovereignty-and-trusted-online-identity/) IEEE Beyond Standards
|
||||
|
||||
IEEE SA co-organized a discussion panel at the Pan-European dialogue on Internet Governance (EuroDIG) conference, an event known for its frank and interactive discussions of public policy issues surrounding internet governance. Messages coming out of the discussions will be presented at the Internet Governance Forum (IGF) later this year.
|
||||
|
||||
|
||||
|
||||
* [Welcoming the Wallet - What the new European Digtal Identity Framework means for citizens, governments and businesses](https://www.sc.pages05.net/lp/22466/795951/gov-wp-welcoming-the-wallet.pdf) Thales
|
||||
|
||||
The concept of digital identification is already well established, and using a smartphone to board a plane or prove vaccination status is second nature to many millions of people. In the EU however, while many states have made electronic identification available and domestic use is growing, the development of internationally accepted electronic identity (eID) systems has been piecemeal and inconsistent.
|
||||
|
||||
* [EU digital wallet: the race is on for pilot funding, tech supremacy, hearts and minds](https://www.biometricupdate.com/202204/eu-digital-wallet-the-race-is-on-for-pilot-funding-tech-supremacy-hearts-and-minds) Biometric Update
|
||||
|
||||
* [eIDAS](https://www.biometricupdate.com/tag/eidas) 2.0 is fast approaching. By September 2023, European Union citizens will have the right to download and populate a digital identity wallet on a smart device. In less than 18 months, Europeans may no longer need physical credentials to travel, work and live anywhere else in the bloc. But are they ready?
|
||||
|
||||
* [Drafting of the eIDAS 2.0 report with amendment tracking](https://www.europarl.europa.eu/doceo/document/ITRE-PR-732707_EN.pdf) Europa.eu
|
||||
|
||||
Kaliya is working on a commentary about it
|
||||
|
||||
Vedran L. Head of Office at European Parliament [has released a draft report with tracking of amendments](https://www.europarl.europa.eu/doceo/document/ITRE-PR-732707_EN.pdf) on the proposal for a regulation of the European Parliament and of the Council amending Regulation (EU) No 910/2014 as regards establishing a framework for a European Digital Identity
|
||||
|
||||
|
||||
* [EIDAS 2.0 Turns To Self-Sovereign Identification To Bring Users Ownership And Control](https://www.forbes.com/sites/alastairjohnson/2022/07/05/eidas-20-turns-to-self-sovereign-identification-to-bring-users-ownership-and-control/?sh=853aa7f7f07e) Forbes
|
||||
|
||||
|
||||
* [Is the EU Digital Identity Wallet an Implementation of Self-Sovereign Identity?](https://thepaypers.com/expert-opinion/is-the-eu-digital-identity-wallet-an-implementation-of-self-sovereign-identity--1257448) The Paypers
|
||||
|
||||
As the details and technical architecture of the EU Digital Identity Wallet at the time of writing are still unknown, this analysis is based on what is currently known or can be assumed.
|
||||
|
||||
The SSI principles of existence, access, interoperability, consent, minimalization, and protection will likely be fulfilled by the EU Digital Identity Wallet. It will allow citizens to have an independent existence.
|
||||
|
||||
* [Self-Sovereign Digital Identity Wallets for Citizens](https://tages.biz/self-sovereign-digital-identity-wallets-for-citizens/) TAGES
|
||||
|
||||
TR Ministry of Foreign Affairs Directorate for EU Affairs organized an EU Programs and Project Opportunities Hybrid Workshop on May 11-12, 2022 [...]
|
||||
|
||||
You can click to watch all the presentations from the event:
|
||||
|
||||
11 May 2022: [https://www.youtube.com/watch?v=GKlgfRSCeXI](https://www.youtube.com/watch?v=GKlgfRSCeXI)
|
||||
|
||||
12 May 2022: [https://www.youtube.com/watch?v=DQIgwVJvFuE&t=28020s](https://www.youtube.com/watch?v=DQIgwVJvFuE&t=28020s)
|
||||
* [Germany and Spain and join forces on the development of a cross-border, decentralised digital identity ecosystem](https://www.bundesregierung.de/breg-de/aktuelles/germany-and-spain-and-join-forces-on-the-development-of-a-cross-border-decentralised-digital-identity-ecosystem-1947302)
|
||||
|
||||
The cooperation agreement envisages the design and conceptualisation of a cross-border pilot to be implemented in the near future, with a view to contributing to the development of the European Union’s Digital Identity Framework, recently announced as part of the eIDAS Commission proposal.
|
||||
|
||||
* [Working together to create an eIDAS wallet](https://jolocom.io/blog/once-eidas/) Jolocom
|
||||
|
||||
Jolocom is currently working on the project “ONCE – Online einfach anmelden” (simply register online – ONCE) alongside a number of prestigious partners, with the aim to bring the digital identity of any citizen onto their smartphone.
|
||||
|
||||
The project is part of the competitive innovation programme “Showcase Secure Digital Identities” (SSDI) funded by Germany’s Federal Ministry for Economic Affairs and Energy (BMWi) and one of four projects that qualified for the implementation phase.
|
||||
|
||||
* [Declaration for Cooperation and Exchange of Best Practices in the Field of Self-Sovereign Identity Between the Federal Republic of Germany and the Republic of Finland](https://www.theinternetofthings.eu/declaration-cooperation-and-exchange-best-practices-field-self-sovereign-identity-between-federal) theinternetofthings.eu
|
||||
* [Self-Sovereign Identity (SSI) schemes and the public sector](https://www.impulse-h2020.eu/2021/11/05/self-sovereign-identity-ssi-schemes-and-the-public-sector/) Impulse H20
|
||||
|
||||
While the structural difference between SSI approaches and conventional centralised or federated eID schemes is, on one level, profound (full control over data and identity with the user; no third-party intermediary between the user and the service provider), on another level, these differences may also appear highly abstract to ordinary users. What societal and economic consequences they may unfold remains, so far, little understood, also because research on the real social and economic effects of SSI solutions is only beginning.
|
||||
|
||||
|
||||
* [Towards a universal, self-sovereign and privacy preserving digital identity for the public sector](https://www.impulse-h2020.eu/2021/07/08/blog-self-sovereign/) Impulse
|
||||
|
||||
The EU-funded IMPULSE focuses on building a decentralised Self-Sovereign Identity (SSI) model by combining two of the most promising technologies available today, such as Artificial Intelligence and blockchain networks, with the aim of facing the limitation of the existing electronic identification systems in the public sector..
|
||||
|
||||
* [What does the EU Wallet mean for self-sovereign identity?](https://www.fintechtalents.com/what-does-the-eu-wallet-mean-for-self-sovereign-identity/) Fintechtalents.com
|
||||
|
||||
While the EU wallet may not align entirely with every principle of self-sovereign identity, it is certainly a massive leap in that direction.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
* [SELF-SOVEREIGN IDENTITY: LEGAL COMPLIANCE AND THE INVOLVEMENT OF GOVERNMENTS](https://ssi-ambassador.medium.com/self-sovereign-identity-legal-compliance-and-the-involvement-of-governments-467acdd32e88) SSI AMBASSADOR
|
||||
|
||||
When it comes to identity management the involvement of the government can be a tricky topic. It needs to be involved to enable access to public services, adapt legislature and guarantee equal access for its citizens. However, it should not be able to control or monitor all aspects and activities of its citizens. Self-sovereign identity (SSI) might for some imply, that a citizen is suddenly able to issue his own ID-card, which isn’t the case. Governments are still the primary source of foundational identities."
|
||||
|
||||
* [Digital identities: German-Finnish cooperation agreed](https://www.bundesregierung.de/breg-de/suche/digitale-identitaeten-deutsch-finnische-zusammenarbeit-vereinbart-1962298) Bundesregierung
|
||||
|
||||
The content of the joint declaration is close bilateral cooperation in the development of a cross-border ecosystem of digital identities based on the principles of Self-Sovereign Identity (SSI).
|
||||
* [Control over data still a long way off according to research into Self-Sovereign Identity](https://ibestuur-nl.translate.goog/podium/controle-over-data-nog-ver-weg-volgens-onderzoek-naar-self-sovereign-identity?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=nl&_x_tr_pto=nui) iBestuur
|
||||
|
||||
In their final recommendations, the researchers from INNOPAY and TNO argue that in view of the social value of digital data exchange, the government would do well to play a driving role in the further consolidation of the SSI playing field. That starts with creating clarity about the relationship between the Digital Government Act and the EU Digital Identity Wallet.
|
||||
|
||||
* ["Irresponsible and Dangerous"](https://www.spiegel.de/netzwelt/apps/id-wallet-was-nach-dem-fehlstart-mit-dem-digitalen-fuehrerschein-passiert-a-f4bc10bc-08ab-42b4-9325-5de5cdc66e05) Spigel
|
||||
|
||||
The ID wallet for the digital driver's license is not only technically immature. Government data show: the allocation was not transparent, security checks were incomplete - and the possible direction is questionable.
|
@ -1,20 +0,0 @@
|
||||
---
|
||||
published: false
|
||||
---
|
||||
# Indian Data Legislation
|
||||
|
||||
* [Revisiting the non-personal data governance framework](https://www.orfonline.org/expert-speak/data-development-revisiting-non-personal-data-governance-framework/)
|
||||
> In July 2020, an expert committee established by the Ministry of Electronics and Information Technology (MEITY) released a report on the Non-Personal Data (NPD) governance framework for India. The document is well-intentioned in that it recognises the public value of data, and the need to democratise its use.
|
||||
|
||||
* [Potential Impacts of Draft India Personal Data Protection Bill (PDPB)](https://www2.deloitte.com/in/en/pages/risk/articles/privacy-data.html) (Deloitte)
|
||||
- [Practising data stewardship in India, early questions](https://www.adalovelaceinstitute.org/blog/practising-data-stewardship-in-india/) - could data stewardship help to rebalance power towards individuals and communities? ALI
|
||||
* [Pramod Varma's message as India touches the 1 BN COVID Vaccination Certificates Milestone](https://www.youtube.com/watch?v=PFo7YlxUaJk) eGovernments Foundation
|
||||
|
||||
On the occasion of the [#100CroreVaccinationCertificates](https://twitter.com/hashtag/100CroreVaccinationCertificates) milestone, [@pramodkvarma](https://twitter.com/pramodkvarma) CTO, [@eksteporg](https://twitter.com/eksteporg) shares the journey of #DigitalPublicGood - DIVOC (Digital Infrastructure for Vaccination Open Credentialing) for vaccination credentialing
|
||||
|
||||
* [Identity in the 21st Century India: Where are we?](https://www.crubn.com/_files/ugd/3e90e2_82e2de11e1194f1c93ed68c411d78564.pdf?index=true) Crubn
|
||||
|
||||
This whitepaper is an attempt to understand identity from a governance perspective and the various methods of identification used. In particular, it'll analyse India's digital identity infrastructure – its motivations, the benefits it has yielded, and the dangers that might adversely impact it.
|
||||
* [India-stack and self-sovereign identity | EUBS 2022](https://www.youtube.com/watch?v=of-iuDZpWuA)
|
||||
|
||||
a panel discussion with Akhilesh Srivastava (IT Advisor at Government of Uttarakhand), Mallikarjun Karra (Director of Research And Partnerships at Timechain Labs), Prof. Sandeep Shukla (Computer Science & Engineering at Indian Institute of Technology Kanpur), Swapnil Pawar (Founder of Newrl) and Ishan Roy (Head of Blockchain at Tamil Nadu E-Governance Agency)
|
@ -1,15 +0,0 @@
|
||||
---
|
||||
published: false
|
||||
---
|
||||
# korea
|
||||
|
||||
## korea
|
||||
|
||||
* [RaonSecure builds a blockchain-based digital wallet service with a public institution](https://medium.com/raonsecure/raonsecure-builds-a-blockchain-based-digital-wallet-service-with-a-public-institution-9fe2c8028f6c)
|
||||
> Selection of RaonSecure as the final operator of the ‘blockchain-based digital wallet project’ that is part of the ‘2021 Blockchain Pilot Project’ program promoted by the Korean government
|
||||
* [South Korea’s brilliant decentralized approach to citizen identity management](https://techwireasia.com/2021/06/koreas-decentralized-identity-approach-to-identity-management/) TechWire Asia
|
||||
> Adopting blockchain technology is seen as a necessity by the Korean government and multiple institutions are backing its continuous research and development, including the Ministry of Science and Technology (ICT), The Korea Internet Security Agency (KISA), Defense Acquisition Program Administration (DAPA), National IT Industry Promotion Agency (NIPA), and Korea Post among others.
|
||||
* [Can the Korean Mobile Driver’s License Unlock Blockchain’s Potential?](https://medium.com/raonsecure/can-the-korean-mobile-drivers-license-unlock-blockchain-s-potential-461d3295a452) Raon
|
||||
> The Ministry of Public Administration and Security (MOIS) is working on the implementation of a national mobile driver’s license in the form of a blockchain-based Decentralized Identifier-based (DID) System. LG CNS and RaonSecure are in charge of the project and are currently building it.
|
||||
* [LG CNS wins Korean government contract for decentralized identity for driver’s licenses](https://www.ledgerinsights.com/lg-cns-korean-decentralized-identity-did-for-drivers-licenses/) Ledger Insights
|
||||
> Adopting DID technology provides numerous benefits but two stand out. Firstly, it should make it far harder to forge a license because credentials can be verified. Additionally, OmniOne includes FIDO biometric security. The second key benefit is that an individual can choose how much data to share.
|
@ -1,47 +0,0 @@
|
||||
---
|
||||
published: false
|
||||
---
|
||||
# Digital Identity New Zealand
|
||||
|
||||
* [DINZ held the first Aotearoa Digital Identity Hui Taumata](https://digitalidentity.nz/2020/12/07/aotearoa-digital-identity-hui-taumata-2/)
|
||||
> Bianca Lopes and David Birch shared with us their International perspectives and insights, including a whirlwind Identity world tour hosted by Bianca and her team at Talle.
|
||||
* [The Trust Economy in a Future New Zealand](https://digitalidentity.nz/2021/06/16/the-trust-economy-in-a-future-new-zealand/)
|
||||
> My interest was first piqued when I came across three videos on YouTube from [Rachel Botsman](https://www.youtube.com/watch?v=-vbPXbm8eTw), [Jordan Perterson](https://www.youtube.com/watch?v=pFXdsD-8SKk) and [Philipp Kristian Diekhöner.](https://www.youtube.com/watch?v=XNog-xrc_YA)
|
||||
>
|
||||
> Trust has always been at the centre of society overall and commerce in particular. There’s a reason why during the first industrial revolution banks always built the most impressive, secure looking buildings in town – so you trusted them to deposit you money there!
|
||||
* [Towards a Better Digital Identity Trust Framework in Aotearoa](https://digitalidentity.nz/2022/09/21/towards-a-better-digital-identity-trust-framework-in-aotearoa/) Digital Identity NZ
|
||||
> It’s a great pleasure to share with you DINZ Reflections Report, a seminal piece of work that DINZ’s Digital Identity Trust Framework working group has developed over several months.
|
||||
* [Aotearoa’s digital identity journey that leaves no-one behind](https://digitalidentity.nz/2022/05/18/aotearoas-digital-identity-journey-that-leaves-no-one-behind/) DigitalID NZ
|
||||
> IEUDI, together with DINZ’s Te Kāhui Te Tiriti O DINZ and Digital Identity Services Trust Framework (DISTF) [work groups](https://digitalidentity.nz/working-groups/), detail the scope of DINZ’s mahi this year and into 2023 in pursuit of its mission – to create a digital identity ecosystem that enhances privacy, trust and improves access for all people in New Zealand. [...]
|
||||
>
|
||||
> The DISTF WG met last week also, to discuss the [Select Committee’s report](https://www.legislation.govt.nz/bill/government/2021/0078/latest/whole.html) following the [submissions](https://www.parliament.nz/en/pb/bills-and-laws/bills-proposed-laws/document/BILL_116015/tab/submissionsandadvice), containing its recommended changes to [the Bill](https://www.legislation.govt.nz/bill/government/2021/0078/latest/whole.html) prior to its Second Reading.
|
||||
* [2022 Executive Council nominations now open](https://digitalidentity.nz/2022/10/06/executive-council-nominations-now-open/) Digital Identity NZ
|
||||
> In December 2019, members elected the first Digital Identity NZ Executive Council. The Council is the governing group for the association; providing guidance and direction as we navigate the developing world of digital identity in Aotearoa. Each Council member is elected for a two-year term, with elections held annually and results notified at the Annual Meeting in December. So, as we approach the end of the year it is time for us to call for nominations for the Council seats coming up for re-election.
|
||||
* [New Zealand](https://digitalidentity.nz/2020/11/18/get-involved-with-dinz-this-november/) is working with Maori leaders on Identity
|
||||
> Next week we’re celebrating our first Aotearoa Digital Identity Hui Taumata. We’re particularly excited to be bringing you a Kapa Kōrero session with Kaye-Maree Dunne, Jane-Renee Retimana, Belinda Allen and Ben Tairea. The quartet will be exploring perspectives from Te Ao Māori, and the relevance of Te Tiriti in our collective work on digital identity.
|
||||
>
|
||||
> Digital Identity New Zealand is having it’s [Annual Meeting](https://digitalidentity.nz/event/digital-identity-nz-annual-meeting/) Dec 10th
|
||||
* [A key place for Identity in the Digital Strategy for Aotearoa](https://digitalidentity.nz/2021/10/05/a-key-place-for-identity-in-the-digital-strategy-for-aotearoa/) < - Colin Wallis will now head Digital Identity.nz
|
||||
> Our government is embarking on a journey to create [A Digital Strategy for Aotearoa](https://www.cio.com/article/3628718/national-strategy-digital-twin-and-skills-shortages-on-nz-tech-minister-s-mind.html) that seeks to respond to the social, economic, education and cultural opportunities from digital technology, along with the risks that these technologies can bring.
|
||||
* [The Trust Economy in a Future New Zealand](https://digitalidentity.nz/2021/06/16/the-trust-economy-in-a-future-new-zealand/)
|
||||
> Now with the 4th industrial (digital) revolution the old vertical, siloed trust models are breaking down and we are moving to a more horizontal, distributed environment.* [INCLUSIVE AND ETHICAL USES OF DIGITAL IDENTITY](https://digitalidentity.nz/inclusive-and-ethical-uses-of-digital-identity/) DINZ
|
||||
> In April 2022, DINZ launched a broad-scope members’ [Working Group](https://digitalidentity.nz/inclusive-and-ethical-uses-of-digital-identity/) in response to the increasing challenges for some groups in society to participate fully in [Aotearoa’s digital transformation](https://www.digital.govt.nz/digital-government/strategy/towards-a-digital-strategy-for-aotearoa/developing-a-digital-strategy-for-aotearoa/), with the aim of providing baseline supporting guidance to inform policy and service design.
|
||||
* [DINZ’s annual Consumer Research](https://digitalidentity.nz/wp-content/uploads/sites/25/2020/07/DINZ-Scrolling-Infographic-July-2020-FINAL.pdf) Digital Identity NZ
|
||||
|
||||
l Scrolling Infographic! It looks fun and has some good info in it.
|
||||
>
|
||||
> ‘Do the best you can until you know better. Then when you know better, do better.’ These wise words from Maya Angelou encapsulate the key findings from our 2020 trust and identity research.
|
||||
* [Leading the digital trust conversation](https://digitalidentity.nz/2022/07/15/leading-the-digital-trust-conversation/) DI NewZealand
|
||||
> the Digital Identity Services Trust Framework Act has the potential to provide a game-changing regulatory foundation for the identification and authentication components of services delivered through the digital channel. Those services that choose to be independently audited for compliance against the Framework’s security and privacy oriented rules and standards to become accredited, would then be able to differentiate those digital service brands through displaying an accreditation mark.
|
||||
* [Summary of Public Engagement of the Digital Strategy for Aotearoa discussion document](https://www.digital.govt.nz/dmsdocument/229~towards-a-digital-strategy-for-aotearoa-summary-of-public-engagement/html) New Zealand Govt.
|
||||
> The discussion document stated that a Digital Strategy for Aotearoa (the Strategy) would need to respond to the social, economic, education and cultural opportunities from digital technology, along with the risks that these technologies could bring.
|
||||
* [Postcard from the UK](https://digitalidentity.nz/2022/06/20/postcard-from-the-uk/) DIGITAL IDENTITY NEW ZEALAND
|
||||
|
||||
It is on this last point that I do see a slight gap between the UK and Aotearoa. In the UK and in Europe more generally there seems to be more awareness of, and a sense of urgency around, the vulnerability of mobile smartphones, given the expectation that they will be the device of choice for most people to download digital identity related wallet apps.
|
||||
|
||||
* [New Report on Limits of “Consent” in New Zealand's Data Protection Law - Future of Privacy Forum](https://fpf.org/blog/new-report-on-limits-of-consent-in-new-zealands-data-protection-law/) FPF ([report](https://fpf.org/wp-content/uploads/2022/06/ABLI-FPF-Consent-Project-New-Zealand-Jurisdiction-Report-1.pdf)
|
||||
|
||||
- notice and consent requirements for processing personal data in New Zealand’s data protection law;
|
||||
- the status of alternative legal bases for processing personal data which permit processing of personal data without consent if the data controller undertakes a risk impact assessment (e.g., legitimate interests); and
|
||||
- statutory bases for processing personal data without consent and exceptions or derogations from consent requirements in-laws and regulations.
|
||||
|
@ -1,114 +0,0 @@
|
||||
---
|
||||
published: false
|
||||
---
|
||||
# Policy
|
||||
|
||||
* [The New Draft Law on eID Switzerland](https://www.procivis.ch/post/the-new-draft-law-on-eid-switzerland-en)
|
||||
Yesterday's [media conference](https://www.youtube.com/watch?v=epW4xEqr3mw) and published [media release](https://www.bj.admin.ch/bj/de/home/aktuell/mm.msg-id-89515.html) opened the consultation process for the new E-ID law, which will last until October 20, 2022.
|
||||
|
||||
The preliminary [draft of the federal law](https://www.bj.admin.ch/dam/bj/de/data/staat/gesetzgebung/staatliche-e-id/vorentw.pdf) declared the purpose of the E-ID to be to ensure "secure identification by means of E-ID among private individuals and with authorities". The protection of the personality and fundamental rights of individuals is to be provided by the following principles defined in the law:
|
||||
|
||||
- Data protection through technology
|
||||
- Data security
|
||||
- Data economy
|
||||
- Decentralized data storage
|
||||
|
||||
|
||||
|
||||
* [Common Digital Identification Project Anonymous authentication system using Absolute Identifier & Decentralized OTP](https://www.sec.gov/comments/s7-07-22/s70722-20117318-268533.pdf)
|
||||
|
||||
* [IPR - what is it? why does it matter?](https://identitywoman.net/ipr%e2%80%8a-%e2%80%8awhat-is-it-why-does-it-matter/)
|
||||
> There is a lot of diversity in the category of future patent problems. Someone who was contributing without declaring that they hold a patent related to the work can claim they had a patent later (years after the specification is finished) and seek payment from everyone using/implementing the standard, claiming licensing rights or even lost revenue on ideas they legally own.
|
||||
* [Self-sovereign identity in the context of data protection and privacy](https://yourstory.com/2020/11/self-sovereign-identity-context-data-protection-privacy/amp) YourStory
|
||||
|
||||
this article deconstructs the self-sovereign identity model and examines how it stacks up against The Personal Data Protection Bill, 2019.
|
||||
* [Digital Identity Around the World: Why Some Countries are Embracing Self Sovereign Identity Quicker](https://hackernoon.com/digital-identity-around-the-world-why-some-countries-are-embracing-self-sovereign-identity-quicker) Hackernoon
|
||||
|
||||
Each government moves at its own pace for as many reasons as there are countries, and digital identity/SSI will only become a reality once governments voice their support, regulations, and standards are adopted, infrastructure is created or upgraded, and interoperability, inclusion, and education are all addressed.
|
||||
|
||||
* [ICO’s Child Protection Rules Take Effect Sept. 2, 2021. Are You Ready?](https://identitypraxis.com/2021/09/01/icos-child-protection-rules-take-effect-sept-2-2021-are-you-ready/) Identity Praxis
|
||||
|
||||
The UK [Information Commission’s (ICO) Children’s Code](https://ico.org.uk/for-organisations/guide-to-data-protection/ico-codes-of-practice/age-appropriate-design-a-code-of-practice-for-online-services/), officially known as the“Age Appropriate Design Code: a code of practice for online services,” after a year grace period, goes into effect Thursday, Sept. 2, 2021.
|
||||
|
||||
|
||||
|
||||
* [The Policymaker’s Guide to Respectful Technology in Legislation](https://me2ba.org/the-policymakers-guide-to-respectful-technology-in-legislation/)
|
||||
|
||||
What most people want but don’t have the terms to describe is respectful digital relationships. In the same way there is an unspoken code for respectful behavior in physical-realm relationships, this same type of behavior is just as essential when engaging with an online service or website.
|
||||
* [In a digital age, how can we reconnect values, principles and rules?](https://identitywoman.net/in-a-digital-age-how-can-we-reconnect-values-principles-and-rules/) Kaliya Young and Tony Fish
|
||||
> “what do we think is the north star for data and identity and on what principle they are built?” How do these principles help us agree on risks, and will our existing rules help or hinder us?
|
||||
|
||||
|
||||
|
||||
* [USPTO: CIO Jamie Holcombe](https://www.federalblockchainnews.com/podcast/episode/78ad1b6f/uspto-cio-jamie-holcombe)
|
||||
> CIO Jamie Holcombe says identity verification with blockchain might be in the future for USPTO and talks about navigating changes in policy & law when considering a distributed ledger to store patents & trademarks. Among the interesting questions: do we start with patent #1 (applicant: George Washington)?
|
||||
|
||||
* [Katryna Dow - Data minimisation: value, trust and obligation](https://www.ubisecure.com/podcast/data-minimisation-meeco-katryna-dow/)
|
||||
> Katryna talks to Oscar about her career (including inspiration from Minority Report), Meeco’s personal data & distributed ledger platform, the importance of data minimisation to inspire trust in organisations, and cultural differences in attitudes towards digital identity.
|
||||
* [Data: Governance and Geopolitics](https://www.mydigitalfootprint.com/2021/01/data-governance-and-geopolitics.html) Tony Fish
|
||||
> How data is governed can be thought of along several lines of activity: legislating privacy and data use, regulating content, using antitrust laws to dilute data monopolies, self-regulating by the tech giants, regulating digital trade, addressing intellectual property rights (IPR) infringement, assuring cybersecurity, and practicing cyber diplomacy. Of these, antitrust, regulation, and privacy are most immediately in the spotlight, and are the focus of this commentary, but it will also touch briefly on the connections with other issues.
|
||||
* [Ministry of Economy, Trade and Industry and OpenID Foundation in Liaison Agreement on eKYC & IDA for Legal Entities](https://openid.net/2021/02/06/ministry-of-economy-trade-and-industry-and-openid-foundation-in-liaison-agreement-on-ekyc-ida-for-legal-entities/)
|
||||
> The OpenID Foundation (OIDF), the international standards development organization which maintains the OpenID Connect for Identity Assurance (OIDC4IDA) standard, and the Japanese Government’s Ministry of Economy, Trade and Industry (METI) have signed a liaison agreement to work together.
|
||||
>
|
||||
> Under the agreement, METI will lead policy efforts to implement identity assurance frameworks for legal entities in Japanese Government and private sector while the [OIDF’s eKYC & Identity Assurance (eKYC & IDA) Working Group](https://openid.net/wg/ekyc-ida/) continues to advance the technical standards that enable many digital identity solutions. The agreement:
|
||||
> - Provides a mechanism to collaborate “about Authentication and Identity Assurance for Legal Entity”, mutually approved white papers, workshops, podcasts and other outreach activities;
|
||||
> - Allows participation of each party’s staff and members in the other party’s meetings, as mutually agreed;
|
||||
> - Provides for direct communications to communicate (without obligation and only to the extent each party chooses) about new work and upcoming meetings;
|
||||
> - Supports common goals, including where appropriate and mutually agreed, to Specifications of Authentication and Identity Assurance for Legal Entity.
|
||||
|
||||
* [End-To-End Encryption is Too Important to Be Proprietary](https://doctorow.medium.com/end-to-end-encryption-is-too-important-to-be-proprietary-afdf5e97822) Cory Doctorow
|
||||
|
||||
End-to-end messaging encryption is a domain where mistakes matter. The current draft of the DMA imposes a tight deadline for interoperability to begin (on the reasonable assumption that Big Tech monopolists will drag their feet otherwise) and this is not a job you want to rush.
|
||||
* [We Applaud the Confirmation of New FTC Commissioner, Alvaro Bedoya](https://me2ba.org/we-applaud-the-confirmation-of-new-ftc-commissioner-alvaro-bedoya/) Me2Ba
|
||||
|
||||
Bedoya’s research has shined a light on digital surveillance and its impact on people of color, immigrants, and the working class. He founded the [Center on Privacy & Technology](https://www.law.georgetown.edu/privacy-technology-center/) at Georgetown Law to focus on the importance of consumer privacy rights.
|
||||
|
||||
|
||||
|
||||
|
||||
* [2022 GDF Report CRYPTOASSETS AND SANCTIONS COMPLIANCE A PRIMER](https://www.gdf.io/wp-content/uploads/2022/07/Cryptoassets-and-Sanctions-Compliance-Report-Final-1.pdf?mc_cid=5d688e0647&mc_eid=bebf526fc7) GDF
|
||||
|
||||
There is a common misconception that cryptoassets provide a ready-made avenue for sanctions evasion because they sit outside the regulatory and legal perimeter. In fact, sanctions authorities in many jurisdictions have ensured that relevant legal and regulatory requirements apply comprehensively to activity conducted in cryptoassets.
|
||||
|
||||
* [Beijing will regulate ‘digital humans’ in the metaverse and beyond](https://restofworld.org/2022/beijing-digital-humans-metaverse/) Rest of World
|
||||
|
||||
The plan also signals that Beijing will take a more active role in handling the personal data generated by these platforms. Some of the directives outlined in the plan require any user-facing aspect of the digital human industry to be subject to rules that protect information about and generated by platform users, while also treating user data as a resource to be traded on the country’s new data exchanges.
|
||||
|
||||
## Hiring
|
||||
|
||||
* [Vinícius Niche @viniciusniche of Truvity shares](https://twitter.com/viniciusniche/status/1570790061217845248)
|
||||
|
||||
Hey Tech Twitter, [@TruvityHQ](https://twitter.com/TruvityHQ) (where I work) is hiring engineers for the Infrastructure Developer (Go/Kubernetes) role, details are on the thread
|
||||
|
||||
Kaliya met the CEO this week at the Open Source Summit Dublin and was impressed.
|
||||
|
||||
|
||||
|
||||
## Policy
|
||||
|
||||
* [6 months of KI Identity Assurance in the UK](https://kantarainitiative.org/2022/09/29/6-months-of-ki-identity-assurance-in-the-uk/) Kantara Initiative
|
||||
|
||||
We believe it is vital that certification bodies work with DCMS and UKAS in a spirit of partnership – bringing together the cumulative value of dozens of great minds! To this end, we have been encouraged by the proactive approach of DCMS in creating forums where the 5 certification bodies can discuss ideas and feedback on the program in action.
|
||||
|
||||
## Verifiable Credentials
|
||||
* [Verifiable Credentials: Mapping to a Generic Policy Terminology](https://trbouma.medium.com/verifiable-credentials-mapping-to-a-generic-policy-terminology-bce84a039bb)
|
||||
> Why is this useful? When writing policy, you need a succinct model which is clear enough for subsequent interpretation. To do this, you need conceptual buckets to drop things into. Yes, this model is likely to change, but it’s my best and latest crack at it to synthesize the complex world of digital credentials with an abstraction that might be useful to help us align existing solutions while adopting exciting new capabilities.
|
||||
|
||||
* [Zero Trust Architecture in the White House Executive Order on Cybersecurity](https://lists.w3.org/Archives/Public/public-credentials/2021May/0062.html) Adrian Gropper (Friday, 14 May)
|
||||
|
||||
Please read Section 3 in the EO
|
||||
|
||||
* […]
|
||||
|
||||
It may be time for us to explain Zero-Trust Architecture relationship to
|
||||
|
||||
VCs and DIDs. My not-so-hidden agenda includes priority for considering
|
||||
|
||||
authorization and delegation in our protocol work but our diverse community of security experts will surely make this a much broader discussion.
|
||||
|
||||
* [Executive Order on Improving the Nation’s Cybersecurity](https://comms.wiley.law/e/knewjcfglctwt7w/a7406307-5755-44fa-a5c5-22dd04d9e9a7)
|
||||
|
||||
Sec. 3. Modernizing Federal Government Cybersecurity.
|
||||
|
||||
(a) To keep pace with today’s dynamic and increasingly sophisticated cyber threat environment, the Federal Govern>ment must take decisive steps to modernize its approach to cybersecurity, including by increasing the Federal Government’s visibility into threats, while protecting privacy and civil liberties. The Federal Government must adopt security best practices; advance toward Zero Trust Architecture; accelerate movement to secure cloud services, including Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS); centralize and streamline access to cybersecurity data to drive analytics for identifying and managing cybersecurity risks; and invest in both technology and personnel to match these modernization goals.
|
||||
|
@ -1,172 +0,0 @@
|
||||
---
|
||||
published: false
|
||||
---
|
||||
|
||||
# Public Sector
|
||||
|
||||
* [Decentralized Identity & Government](https://www.youtube.com/watch?v=l8pHUdjKfes) Evernym
|
||||
|
||||
The key differences between federated and decentralized identity systems - An analysis of a few notable government-led projects, such as Aadhaar (India), Verify (UK), eIDAS (EU), and the Ontario Digital Identity Program (Canada) - What decentralization means for portability, scalability, flexibility, and privacy - How governments and commercial organizations can enhance existing federated identity systems with verifiable credentials
|
||||
|
||||
|
||||
### Findy - Finnish
|
||||
* [Finnish tech co-op receives government grant to develop a self-sovereign identity network](https://www.thenews.coop/164789/topic/technology/finnish-tech-co-op-receives-government-grant-to-develop-a-self-sovereign-identity-network/) TheNews
|
||||
|
||||
The Finnish Government has awarded a €3m (£2.6m) grant to [Findynet Cooperative](https://findy.fi/en/) for a pilot project aiming to build a self-sovereign identity network.
|
||||
|
||||
* [The Findynet Cooperative receives a government grant to develop a trusted way to share information in electronic interactions](https://findy.fi/en/findy-a-visionary-initiative-by-the-public-and-private-sectors-is-developing-a-new-type-of-verifiable-data-network-that-strengthens-finlands-position-as-a-driving-force-in-building-digital/) Findy.fi
|
||||
|
||||
The aim of this public-private cooperation is to strengthen Finland’s leading position in digitalization and support the emergence of investments in new digital services.
|
||||
|
||||
|
||||
## Global
|
||||
* [OECD Global Blockchain Policy Forum](https://oecd-events.org/blockchainforum/)
|
||||
> The Global Blockchain Policy Forum is the leading international event focused on the policy implications of this technology and its applications, led by the OECD’s Blockchain Policy Centre. Following the second edition of the Forum in 2019, which was attended by more than 1 600 people
|
||||
* [Navigating Digital Identity in Political Economies RxC Panel](https://identitywoman.net/navigating-digital-identity-in-political-economies-rxc-talk/) IdentityWoman.net
|
||||
> the world is fundamentally social and intersectional — we are all part of networks. So how might we formalize digital identity in a way that better reflects this complex reality?
|
||||
|
||||
## Africa
|
||||
|
||||
* [Institutions and Governance in the digital realm of Africa](https://omidyarnetwork.medium.com/institutions-matter-60c819d32e2a) Omidyar Network
|
||||
> - seeking to better understand the existing laws and institutions
|
||||
> - exploring ways to strengthen the capacity of institutions that uphold these laws
|
||||
> - supporting digital rights organizations throughout Africa to act as checks on technological excesses of both governments and corporations
|
||||
|
||||
## German
|
||||
|
||||
* [Reinventing Government with Technology - Sebastian Manhart](https://www.youtube.com/watch?v=1fTJA0r_XFg) KuppingerCole
|
||||
|
||||
Raj Hegde is joined by Sebastian Manhart - Technical Advisor on Digital Identity for the German Chancellery to explore governmental reform and understand stakeholder expectations behind the rollout of digital identity projects in the post-COVID era.
|
||||
|
||||
* [ID Wallet: The German government had long known about IT security vulnerabilities](https://marketresearchtelecast.com/id-wallet-the-german-government-had-long-known-about-it-security-vulnerabilities/190919/) Market Research Telecast
|
||||
|
||||
The BSI expresses the problem as follows: “The authentication of the user required to carry out a hotel check-in on the basis of the factors possession (” link secret “) and knowledge (” PIN “) takes place exclusively on the basis of key material that is stored in the Wallet app is saved. ” No specially secured electronic storage and processing medium such as a “secure element” integrated in smartphones is used.
|
||||
|
||||
## Spanish
|
||||
* [Verifiable Credentials for Digital Identity Projects](https://knowledge.wealize.digital/en/blog/verifiable-credentials-for-digital-identity-projects)
|
||||
|
||||
The Spanish Association for Standardization (UNE) has recently published the [UNE 71307-1](https://www.une.org/encuentra-tu-norma/busca-tu-norma/norma?c=N0064986) Digital Enabling Technologies Standard. This is the first global standard on decentralized identity management, based on Blockchain and Distributed Ledger Technologies (DLT).
|
||||
|
||||
## Yidindji \ Australia
|
||||
* [MetaMUI and Sovereign Yidindji Government launched 1st self-sovereign identity-based National ID system](https://cointelegraph.com/press-releases/metamui-and-sovereign-yidindji-government-launched-1st-self-sovereign-identity-based-national-id-system) Cointelegraph
|
||||
|
||||
We are delighted to announce that our first E-Government pilot program with the Sovereign Yidindji Government has been successfully completed on Jan 7, 2022.
|
||||
|
||||
## Swiss
|
||||
* [SSI initiative open to new players](https://www.adnovum.ch/en/company/blog/exploring_the_potential_of_self-sovereign_identity_with_representative_use_cases.html) adnovum
|
||||
|
||||
## Jolocom
|
||||
|
||||
* [ID-Ideal as an integrated solution](https://jolocom.io/blog/id-ideal-as-an-integrated-solution/) Jolocom
|
||||
The idea behind [ID-Ideal](https://1-id--ideal-de.translate.goog/?_x_tr_enc=1&_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp) is to create a basis for existing and future identity services. To achieve this, interoperability between the individual ecosystems is necessary. For this reason, the project mainly focuses on key aspects:
|
||||
>
|
||||
> A) Trust Framework: harmonize various ID services and create standards for secure digital identities
|
||||
>
|
||||
> B) High relevance to everyday life and very good usability to increase the incentive
|
||||
>
|
||||
> C) Establishing a TrustNest initiative: an open community that promotes certification, exchange, and further development
|
||||
|
||||
## ID.me
|
||||
* [Rough Seas Ahead People](https://www.moxytongue.com/2022/01/rough-seas-ahead-people.html) MoxyTongue
|
||||
> Commentary from the man who invented the term Self-Sovereign Idenitty on the ID.me situation with the IRS.
|
||||
>
|
||||
> Humanity does not come into existence inside a database. The American Government does not come into authority "of, by, for" database entries.
|
||||
>
|
||||
> People prove birth certificates, birth certificates do not prove people.
|
||||
|
||||
|
||||
## Sweden
|
||||
* [Who Do You Trust With Your Wallet?](https://stateofidentity.libsyn.com/who-do-you-trust-with-your-wallet) State of Identity (not ssi)
|
||||
|
||||
Sweden's Freja eID is a pinnacle example of government-approved digital identity, all from the convenience of your mobile wallet. Join host Cameron D'Ambrosi as he kicks off 2022 with Kristofer von Beetzen, Chief Product Officer of Freja eID. They dive into the burning questions for eID including who should control identity, why and when you shouldn't host identity data yourself
|
||||
|
||||
## China
|
||||
|
||||
* [PIPL: A game changer for companies in China](https://www.dataprotectionreport.com/2021/08/pipl-a-game-changer-for-companies-in-china/) DataProtection
|
||||
|
||||
China passed its Personal Information Protection Law (PIPL) on 20 August 2021. This is China’s first omnibus data protection law, and will take effect from 1 November 2021 allowing companies just over two months to prepare themselves.
|
||||
|
||||
## Ping
|
||||
|
||||
* [Recognizing Digital Identity as a National Issue](https://www.pingidentity.com/en/company/blog/posts/2021/digital-identity-national-issue.html)
|
||||
> we dove into creating a centralized and holistic approach to protecting and regulating identity in the United States and the specifics of why digital identity and cybersecurity are national issues that the private sectors simply cannot tackle on their own. Here are some of the key takeaways.
|
||||
|
||||
### FATF
|
||||
|
||||
* [Three Key Takeaways from the FATF’s Latest 12-Month Review on Virtual assets](https://www.elliptic.co/blog/3-key-takeaways-from-the-fatfs-latest-12-month-review-on-virtual-assets) Elliptic
|
||||
> Financial Action Task Force (FATF), the global standard-setter for anti-money laundering and countering the financing of terrorism (AML/CFT), released its second 12-month review on virtual assets (You can read our summary of its first report from July 2020 report here).
|
||||
* [What Are the Six Key Areas of the FATF Consultation?](https://www.elliptic.co/blog/six-key-areas-of-the-fatf-consultation) Elliptic
|
||||
> On March 19th, Paris-based Financial Action Task Force (FATF), the global standard-setting body for anti-money laundering and counter-terrorism finance (AML/CFT), released its [Draft Updated Guidance for a Risk-Based Approach to Virtual Assets and Virtual Asset Service Providers](https://www.fatf-gafi.org/media/fatf/documents/recommendations/March%202021%20-%20VA%20Guidance%20update%20-%20Sixth%20draft%20-%20Public%20consultation.pdf). Or, in compliance acronym speak the FATF's draft guidance for its RBA to VAs and VASPs.
|
||||
* [FATF and Global Crytpto Regulatory News](https://www.elliptic.co/blog/fatf-concludes-its-annual-plenary-session)
|
||||
> The Financial Action Task Force (FATF) [held](https://www.fatf-gafi.org/publications/fatfgeneral/documents/outcomes-fatf-plenary-february-2021.html) its winter Plenary session on 22nd, 24th, and 25th February and welcomed over 205 delegates to its third virtual conference since the start of the pandemic.
|
||||
* [DeFi regulation must not kill the values behind decentralization](https://cointelegraph.com/news/defi-regulation-must-not-kill-the-values-behind-decentralization) Cointelegraph
|
||||
> Financial Action Task Force (FATF) recently [proposed](https://www.fatf-gafi.org/publications/fatfrecommendations/documents/public-consultation-guidance-vasp.html) guidelines making it clear that “The owner/operator(s) of the DApp likely fall under the definition of a VASP [virtual asset service provider] [...] even if other parties play a role in the service or portions of the process are automated.
|
||||
The potential for fraud in the growing NFT market recently attracted the [attention](https://www.coindesk.com/fatfs-new-guidance) of the Financial Action Task Force (FATF)
|
||||
|
||||
### CBDC
|
||||
* [Why CBDCs will likely be ID-based](https://www.ft.com/content/88f47c48-97fe-4df3-854e-0d404a3a5f9a)
|
||||
|
||||
Central banks are realising CBDCs will have to be intimately linked to identity to deal with illicit finance and bank disintermediation risk
|
||||
* [New Video: MetaMUI SSID](https://sovereignwallet.medium.com/new-video-metamui-ssid-8bcef6281cf3) Sovereign Wallet
|
||||
|
||||
MetaMUI SSID is the world’s first true Self-Sovereign Identity Application that enables running Blockchain-Based E-Government System, and CBDC payments on top of MetaMUI Blockchain.
|
||||
|
||||
|
||||
## Governance
|
||||
* [Data: Governance and Geopolitics](https://www.mydigitalfootprint.com/2021/01/data-governance-and-geopolitics.html)
|
||||
> How data is governed can be thought of along several lines of activity: legislating privacy and data use, regulating content, using antitrust laws to dilute data monopolies, self-regulating by the tech giants, regulating digital trade, addressing intellectual property rights (IPR) infringement, assuring cybersecurity, and practicing cyber diplomacy. Of these, antitrust, regulation, and privacy are most immediately in the spotlight, and are the focus of this commentary, but it will also touch briefly on the connections with other issues.
|
||||
|
||||
## Catalan
|
||||
|
||||
* [Catalan government announces self-sovereign identity project](https://www.ledgerinsights.com/catalan-government-self-sovereign-identity/)
|
||||
> The government of Catalonia announced its plans for self-sovereign identities (SSIs) for citizens based on blockchain technology. The project, named IdentiCAT, was revealed by the President of Catalonia Quim Torra and will allow citizens to be the “owner, manager and exclusive custod[ian] of his identity and data”.
|
||||
|
||||
### Austin
|
||||
* [City of Austin dabbling in SSI](https://github.com/cityofaustin/mypass-project/wiki/blockchain-report)
|
||||
|
||||
Many folks within the identity space see VC infrastructure as the future of identification. If much of our online identity is reputation based, then VCs represent a formal method for linking reputations and vouching for others to form a web of trust within which individuals are able to conduct identity transactions in a less centralized way.
|
||||
|
||||
## Delloite
|
||||
* [It’s time for governments to get serious about digital identities](https://www2.deloitte.com/global/en/pages/risk/articles/solving-the-public-sector-identity-crisis.html?id=global:2sm:3tw:4dcom_share:5awa:6dcom:risk) by Deloitte
|
||||
|
||||
While the tools may already exist to solve the government’s identity crisis, real progress will only be made if governments significantly evolve their legacy approaches to digital identity.
|
||||
|
||||
## Germany
|
||||
* [Showcase programme “Secure Digital Identities”](https://www.digitale-technologien.de/DT/Redaktion/EN/Standardartikel/sdi_programm.html) Digitale Technoligen DE
|
||||
|
||||
With this innovation competition, the Federal Ministry for Economic Affairs and Climate Action (BMWK) is directly contributing to Germany’s digital sovereignty and data security on the Internet. The measure aims to strengthen the confidence of citizens and companies in digital transformation. The envisaged proposals should also be aligned with the needs and opportunities of small and medium-sized enterprises and enable them to implement and use Secure Digital Identities.
|
||||
|
||||
### Wyoming
|
||||
|
||||
* [Principal Authority – new article on Wyoming law defining Digital Identity](https://lists.w3.org/Archives/Public/public-credentials/2021Sep/0083.html) Christopher Allen (Thursday, 16 September)
|
||||
|
||||
What we've found as a good framework is the concept of "Principal Authority" which comes from the Laws of Agency, which allows us to leverage fiduciary style Laws of Custom to define requirements for practices when digital identity is delegated to others (whether for authorization or for use of data).
|
||||
|
||||
I've written up a layman's article (as I am not a lawyer) introducing this topic at: [https://www.blockchaincommons.com/articles/Principal-Authority/](https://www.blockchaincommons.com/articles/Principal-Authority/)
|
||||
|
||||
## Blockchain Commons
|
||||
|
||||
* [https://www.blockchaincommons.com/articles/Principal-Authority/](https://www.blockchaincommons.com/articles/Principal-Authority/)
|
||||
|
||||
|
||||
### USA
|
||||
* [The White House’s Future of the Internet is Available Today](https://indicio.tech/the-white-houses-future-of-the-internet-is-available-today/) Indicio Tech
|
||||
|
||||
The Biden administration, in coordination with 60 other countries, on Thursday unveiled a “[Declaration for the Future of the Internet](https://www.whitehouse.gov/briefing-room/statements-releases/2022/04/28/fact-sheet-united-states-and-60-global-partners-launch-declaration-for-the-future-of-the-internet/)” that “reclaims the promise of the Internet in the face of the global opportunities and challenges presented by the 21st century.”
|
||||
|
||||
|
||||
* [Senate Asks FTC to Investigate ID.me for Deceptive Business Practices](https://findbiometrics.com/senate-asks-ftc-investigate-id-me-deceptive-business-practices-052004/) FindBiometrics
|
||||
|
||||
## Latin America \ Carribean
|
||||
|
||||
* [Lacchain ID Framework](https://publications.iadb.org/publications/english/document/LACChain-ID-Framework-A-Set-of-Recommendations-for-Blockchain-Based-Interoperable-Privacy-Preserving-Regulatory-Compliant-Secure-and-Standardized-Digital-Identifiers-Credentials-and-Wallets.pdf)
|
||||
|
||||
A Set of Recommendations for Blockchain-Based Interoperable, Privacy-Preserving, Regulatory Compliant, Secure and Standardized Digital Identifiers, Credentials, and Wallets.
|
||||
|
||||
|
||||
## Explainer
|
||||
* [Analyst Chat #134: How Self-Sovereign Identities Will Influence Public Services](https://www.kuppingercole.com/watch/self-sovereign-identities-public-services) KuppingerCole
|
||||
|
||||
* [What Is GovTech?](https://www.pingidentity.com/en/resources/blog/post/what-Is-govtech.html)
|
||||
|
||||
Based on technology, the GovTech agenda is driven by the GovTech Solutions Group (GSG) and GovTech Global Partnership (GTBP) under Governance Global Practice (GGP). But what does GovTech do? What are its objectives and challenges, and how can it best fulfill them
|
@ -1,10 +0,0 @@
|
||||
---
|
||||
published: false
|
||||
---
|
||||
# Swiss
|
||||
|
||||
* [Self-Sovereign Identity – a game changer regarding privacy](https://www.adnovum.ch/en/company/blog/self_sovereign_identity_a_game_changer_regarding_privacy.html) Adnovum
|
||||
|
||||
Another Swiss company is promoting SSI
|
||||
|
||||
After rejection of the e-ID Act in March 2021, the Swiss Federal government is working at full speed on a new proposal. The first results were published in a [discussion paper](https://www.bj.admin.ch/dam/bj/en/data/staat/gesetzgebung/staatliche-e-id/diskussionspapier-zielbild-e-id.pdf.download.pdf/diskussionspapier-zielbild-e-id.pdf) is one of three possible solutions proposed for the implementation of the future e-ID.
|
@ -1,29 +0,0 @@
|
||||
---
|
||||
published: false
|
||||
---
|
||||
# DIDAS - Swiss
|
||||
|
||||
* [Swiss doing SSI](http://didas.swiss)
|
||||
> Underpinned by our country’s values, DIDAS is the Swiss ecosystem with the goal to enable an inclusive, privacy-first & frictionless future for our society’s Digital & Data needs. We are advocating for global standards with local governance for digital identities and data sovereignty.
|
||||
* [Implementing the Swiss SSI Ecosystem – Two Streams Approach](https://www.didas.swiss/2022/02/18/implementing-the-swiss-ssi-ecosystem-two-streams-approach/) DIDAS Swiss
|
||||
> critical questions of user experience and acceptance can be validated in real life. The findings and results will feedback into further development of the systems and hardening of security and privacy. This is also a great practical way to identify legal aspects that need clarification or even potential changes in the relevant laws
|
||||
* [the potential of Self-Sovereign Identity with representative use cases](https://www.adnovum.ch/en/company/blog/exploring_the_potential_of_self-sovereign_identity_with_representative_use_cases.html)
|
||||
> Our Self-Sovereign Identity initiative with SwissSign, the canton of Aargau and cardossier clearly shows: Even if there are still uncertainties regarding technical maturity and governance – SSI is happening and brings major advantages in data protection and cross-organizational digitization.
|
||||
* [The LEI: A Swiss Army Knife for the World’s Digital Economy](https://www.gleif.org/en/newsroom/blog/the-lei-a-swiss-army-knife-for-the-worlds-digital-economy)
|
||||
> The LEI’s legacy is proudly rooted in financial services and regulation. Its future, however, undeniably points beyond to broader, digitized adoption and utilization across public and private sectors around the world. The Global LEI System is the only open, commercially neutral, and regulatory endorsed system capable of establishing digitized trust between all legal entities everywhere. It was established as a public good, and GLEIF remains committed to ensuring that every last drop of value is wrung from the system, and used to the benefit of all.
|
||||
* [Self-Sovereign Identity – a game changer regarding privacy: The next level of identity management](https://adnovum.ch/en/company/blog/self_sovereign_identity_a_game_changer_regarding_privacy.html)
|
||||
> After rejection of the e-ID Act in March 2021, the Swiss Federal government is working at full speed on a new proposal. The first results were published in a [discussion paper](https://www.bj.admin.ch/dam/bj/en/data/staat/gesetzgebung/staatliche-e-id/diskussionspapier-zielbild-e-id.pdf.download.pdf/diskussionspapier-zielbild-e-id.pdf) on September 2. Self-Sovereign Identity (SSI) is one of three possible solutions proposed for the implementation of the future e-ID. What is SSI is and why does it bring significant added value in terms of data privacy?
|
||||
* [Building a Swiss Digital Trust Ecosystem – Perspectives around an e-ID ecosystem in Switzerland](https://digitalswitzerland.com/building-a-swiss-digital-trust-ecosystem/) DigitalSwitzerland
|
||||
> An initial contribution to the ongoing meta-level debate about the development of the e-ID ecosystem in Switzerland.
|
||||
* [Perspectives around building an e-ID ecosystem in Switzerland](https://digitalswitzerland.com/building-a-swiss-digital-trust-ecosystem/) DigitalSwitzerland
|
||||
> The transition to an ecosystem of digital credentials, initiated by the [federal government’s directional decision](https://www.admin.ch/gov/de/start/dokumentation/medienmitteilungen.msg-id-86465.html), is a generational project that requires input from – and collaboration between – government, the private sector, academia, and civil society. This document is intended to serve as an initial contribution to the ongoing meta-level debate about the development of the e-ID ecosystem in Switzerland
|
||||
* [The New Draft Law on eID Switzerland](https://www.procivis.ch/post/the-new-draft-law-on-eid-switzerland-en) Procivis
|
||||
|
||||
Yesterday's [media conference](https://www.youtube.com/watch?v=epW4xEqr3mw) and published [media release](https://www.bj.admin.ch/bj/de/home/aktuell/mm.msg-id-89515.html) opened the consultation process for the new E-ID law, which will last until October 20, 2022.
|
||||
|
||||
The preliminary [draft of the federal law](https://www.bj.admin.ch/dam/bj/de/data/staat/gesetzgebung/staatliche-e-id/vorentw.pdf) declared the purpose of the E-ID to be to ensure "secure identification by means of E-ID among private individuals and with authorities". The protection of the personality and fundamental rights of individuals is to be provided by the following principles defined in the law:
|
||||
|
||||
- Data protection through technology
|
||||
- Data security
|
||||
- Data economy
|
||||
- Decentralized data storage
|
@ -1,40 +0,0 @@
|
||||
---
|
||||
published: false
|
||||
---
|
||||
@ united kingdom
|
||||
|
||||
* [The consultation](https://www.gov.uk/government/consultations/digital-identity-and-attributes-consultation) is open to any member of the public and closes on 13 September.
|
||||
* [Digital identity in the UK in 2021 with TrueProfile.io’s René Seifert](https://www.ubisecure.com/podcast/digital-identity-uk-2021-ssi-trueprofile-rene-seifert/) (podcast)
|
||||
> In episode 37, René Seifert talks about the current status of identity in the UK; the government’s recent call for evidence and DIU (digital identity unit); the resultant six guiding principles – including privacy and inclusivity; the potential of self-sovereign identity to solve some of these issues; TrueProfile.io and the importance of verified credentials in an HR context; plus the ethical, political and technical challenges of ‘immunity passports’.
|
||||
Explainer: [eIDAS 2.0 - Introduction to The European Digital Identity Wallet & The Evolution of Self-Sovereign Identity](https://utimaco.com/current-topics/blog/eidas-2-the-european-digital-identity-wallet)
|
||||
|
||||
Until now, the [eIDAS regulation](https://www.legislation.gov.uk/eur/2014/910/contents) has only focused on online identification. However, the new proposal – eIDAS 2.0 – aims to extend identity to the world of physical services which can be accessed from anywhere around the globe.
|
||||
* [Data A New Direction](https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/1016395/Data_Reform_Consultation_Document__Accessible_.pdf)
|
||||
|
||||
● secure the UK's status as a global hub for the free and responsible flow of personal data - complementing our ambitious agenda for new trade deals and data partnerships with some of the world’s fastest growing economies
|
||||
|
||||
● reinforce the responsibility of businesses to keep personal information safe, while empowering them to grow and innovate
|
||||
|
||||
● ensure that the ICO remains a world-leading regulator, enabling people to use data responsibly to achieve economic and social goals
|
||||
|
||||
* [Lord Holmes discusses state of digital identity in the UK](https://www.biometricupdate.com/202107/lord-holmes-discusses-state-of-digital-identity-in-the-uk)
|
||||
|
||||
* [“](https://www.biometricupdate.com/202103/uk-government-runs-new-digital-id-system-pilot-for-public-services)[The next iteration of the framework](https://www.biometricupdate.com/202103/uk-government-runs-new-digital-id-system-pilot-for-public-services) mentioned earlier is due to be published this summer and I look forward to that. It will be essential for that work to not only be underpinned by the twelve guiding principles but also to swiftly ‘sandbox’, stand up parallel proofs in specific sectors and proceed with pace.”
|
||||
|
||||
* [UK Draft Digital Identity Framework Published](https://www.research-live.com/article/news/uk-draft-digital-identity-framework-published/id/5087382) Research Live
|
||||
> Updates to the framework include new guidance on creating a consistent approach on user experience, rules on how to manage digital identity accounts, clearer definitions for the framework’s role and details on how organisations will be certified.
|
||||
* [Digital identity and attributes consultation](https://www.gov.uk/government/consultations/digital-identity-and-attributes-consultation/digital-identity-and-attributes-consultation) Gov UK
|
||||
|
||||
Digital access to the attributes these documents contain can solve these issues. It can also have benefits such as improving inclusion. If you do not have a passport, perhaps another government service can validate your age. There are also opportunities for data minimisation by disclosing only that information which is required (for example, that you’re over 18), rather than full disclosure of your data, including your date of birth, name, or address.
|
||||
17:22:31 From Jemima Gibbons to Everyone : [https://sfadigital.blog.gov.uk/2017/03/24/dont-bring-policy-and-delivery-closer-together-make-them-the-same-thing/](https://sfadigital.blog.gov.uk/2017/03/24/dont-bring-policy-and-delivery-closer-together-make-them-the-same-thing/)
|
||||
* [Innovative Startups join forces to create a trusted training record and build a secure and safe waste data tracking system](https://www.digicatapult.org.uk/news-and-insights/press/digital-catapult-and-sellafield-ltd-join-forces-with-two-innovative-startups)
|
||||
* [Digital Catapult](https://www.digicatapult.org.uk/) and [Sellafield Ltd](https://www.gov.uk/government/organisations/sellafield-ltd) have selected two innovative startups, [Condatis](https://condatis.com/), and [Jitsuin](https://jitsuin.com/), to implement advanced digital technology solutions to support the nuclear industry to continue to monitor skills within the sector, and to provide a trusted and secure record for tracking hazardous waste and materials.
|
||||
|
||||
* [https://www.oneteamgov.uk/](https://www.oneteamgov.uk/)
|
||||
|
||||
* [Plans for governing body to make digital identities as trusted as passports](https://www.gov.uk/government/news/plans-for-governing-body-to-make-digital-identities-as-trusted-as-passports) Gov.UK
|
||||
|
||||
The consultation sets out how the government can build confidence in digital IDs so they have a similar status in law as physical proofs of identity that businesses and individuals already trust.
|
||||
|
||||
* [Building an SSI Ecosystem: Digital Staff Passports at the NHS](https://www.windley.com/archives/2021/05/building_an_ssi_ecosystem_digital_staff_passports_at_the_nhs.shtml)
|
||||
> How does a functioning credential ecosystem get started? This post goes deep on Manny Nijjar’s work to create a program for using digital staff passports in the sprawling UK NHS bureaucracy.
|
@ -69,13 +69,13 @@ Questions for discussion:
|
||||
|
||||
https://unece.org/trade/uncefact/guidance-material
|
||||
|
||||
* [Kiva Protocol, Built on Hyperledger Indy, Ursa and Aries, Powers Africa’s First Decentralized National ID system](https://www.hyperledger.org/blog/2021/01/20/kiva-protocol-built-on-hyperledger-indy-ursa-and-aries-powers-africas-first-decentralized-national-id-system) ([CASE STUDY](https://www.hyperledger.org/wp-content/uploads/2021/01/Hyperledger_CaseStudy_Kiva_Printable.pdf))
|
||||
* [Kiva Protocol, Built on Hyperledger Indy, Ursa and Aries, Powers Africa’s First Decentralized National ID system](https://www.hyperledger.org/blog/2021/01/20/kiva-protocol-built-on-hyperledger-indy-ursa-and-aries-powers-africas-first-decentralized-national-id-system) ([CASE STUDY](https://www.hyperledger.org/wp-content/uploads/2021/01/Hyperledger_CaseStudy_Kiva_Printable.pdf)) 2021-01-20
|
||||
> Since the launch of Kiva Protocol, Davie says global regulators have made significant progress in terms of how they are considering digital identity and eKYC verifications. He sees a global movement towards user-owned and -controlled data, better privacy, and more universal access.
|
||||
>
|
||||
> *[...]*
|
||||
> As of today, Kiva is focusing on building additional ecosystem applications and services to make it easier for all stakeholders to access and use Kiva Protocol. Much of this is being contributed upstream into the Hyperledger Indy and Aires projects, with the remaining components hosted in Kiva’s repository.
|
||||
|
||||
* [The Verifiable Economy: Fully Decentralized Object (FDO) Example: Bob’s UDID Document](https://hyperonomy.com/2021/06/15/the-verifiable-economy-fully-decentralized-object-fdo-example-bobs-udid-document/)
|
||||
* [The Verifiable Economy: Fully Decentralized Object (FDO) Example: Bob’s UDID Document](https://hyperonomy.com/2021/06/15/the-verifiable-economy-fully-decentralized-object-fdo-example-bobs-udid-document/) 2021-06-15
|
||||
|
||||
Strongly-typed Code to Generate Bob’s UDID Document
|
||||
|
||||
@ -93,7 +93,7 @@ A pertinent example of how this can be applied in the corporate world is this ex
|
||||
|
||||
|
||||
|
||||
* [The Missing Network Layer Model](https://findy-network.github.io/blog/2022/03/05/the-missing-network-layer-model/) Findy
|
||||
* [The Missing Network Layer Model](https://findy-network.github.io/blog/2022/03/05/the-missing-network-layer-model/) Findy 2022-03-05
|
||||
|
||||
Epic Post
|
||||
|
||||
|
@ -12,7 +12,7 @@ Since the same data is required and utilised by everyone, blockchain-based SSI c
|
||||
|
||||
Both CDD and EDD are part of a complete KYC process. Identity verification (IDV) at the account-opening stage is one of the most critical moments in the process, but it doesn’t end there: read on to identify when your due diligence should kick up a notch.
|
||||
|
||||
* [The Identity, Unlocked “eKYC with Mark Haine” Podcast Now Live](https://openid.net/2021/03/10/the-identity-unlocked-ekyc-with-mark-haine-podcast-now-live/)
|
||||
* [The Identity, Unlocked “eKYC with Mark Haine” Podcast Now Live](https://openid.net/2021/03/10/the-identity-unlocked-ekyc-with-mark-haine-podcast-now-live/) 2021-03-10 2021-03-10
|
||||
|
||||
* [eKYC with Mark Haine” features host Vittorio Bertocci and special guest Mark Haine](https://identityunlocked.auth0.com/public/49/Identity%2C-Unlocked.--bed7fada/ad784008)
|
||||
|
||||
|
@ -10,9 +10,9 @@ COVID-19 vaccination cards are dangerously easy to fake — what you need to kno
|
||||
|
||||
## Standards
|
||||
|
||||
* [Introducing the Global COVID Certificate Network (GCCN)](https://www.lfph.io/2021/06/08/gccn/)
|
||||
* [Introducing the Global COVID Certificate Network (GCCN)](https://www.lfph.io/2021/06/08/gccn/) 2021-06-08
|
||||
|
||||
As more and more governments adopt [major COVID certificate standards](https://www.lfph.io/2021/10/12/global-covid-certificate-landscape/) to reopen borders, the travel industry is working hard to catch up on their technology to meet the evolving travel requirements. However, there is still no shortage of complaints from travelers about their cumbersome international travel experiences.
|
||||
As more and more governments adopt [major COVID certificate standards](https://www.lfph.io/2021/10/12/global-covid-certificate-landscape/) to reopen borders, the travel industry is working hard to catch up on their technology to meet the evolving travel requirements. However, there is still no shortage of complaints from travelers about their cumbersome international travel experiences. 2021-10-12
|
||||
|
||||
* [Vaccination Certificate Vocabulary](https://lists.w3.org/Archives/Public/public-credentials/2021Feb/0069.html) Tobias Looker
|
||||
> I'd like to propose a new work item that formally defines a vocabulary for issuing Vaccination Certificates in the form of Verifiable Credentials.
|
||||
@ -46,7 +46,7 @@ Participating and contributing in this group requires a CCI membership, open and
|
||||
## Explainer
|
||||
|
||||
* [A Goldilocks point for Digitised Vaccination Certificates](https://lockstep.com.au/a-goldilocks-point-for-digitised-vaccination-certificates/)
|
||||
* [Digital identity is critical in the new world since covid](https://digitalidentity.nz/2021/11/17/digital-identity-is-critical-in-the-new-world-since-covid/) DigitalID NZ
|
||||
* [Digital identity is critical in the new world since covid](https://digitalidentity.nz/2021/11/17/digital-identity-is-critical-in-the-new-world-since-covid/) DigitalID NZ 2021-11-17
|
||||
|
||||
The value of verifiable credentials in the evolving digital identity landscape In my recent podcast with [Brad Carr](https://www.iif.com/Staff-and-Authors/uid/46/BradCarr) of the [Institute of International Finance](https://www.iif.com/Publications/ID/4304/FRT-Episode-87-Digital-Identity-with-SecureKey-CEO-Greg-Wolfond), we discussed how digital identity and verified credentials can support a digital-first world, something that’s extremely relevant amid the current pandemic. https://verified.me/blog/the-value-of-verifiable-credentials-in-the-evolving-digital-identity-landscape/ Verified Me
|
||||
|
||||
@ -72,7 +72,7 @@ Until the time digital records for vaccination are as simple and do not require
|
||||
|
||||
Already today, credentials are being used in a wide variety of applications, such as a digital identity card, a work permit or a test certificate. We would like to explain the functionality and potential use cases for credentials by following our protagonist called Sam, who has just completed a Covid-19 rapid test.
|
||||
|
||||
* [Our digital future and economic recovery rests on getting digital ID right](https://diacc.ca/2021/05/31/our-digital-future-and-economic-recovery-rests-on-getting-digital-id-right/)
|
||||
* [Our digital future and economic recovery rests on getting digital ID right](https://diacc.ca/2021/05/31/our-digital-future-and-economic-recovery-rests-on-getting-digital-id-right/) 2021-05-31
|
||||
|
||||
With digital identity done right, a vaccine proof (passport) would allow Canadians to securely prove who they are, verify that they were vaccinated, and have a digital credential to use in any instance that requires it — all in a safe and secure way that does not divulge any other private health record.
|
||||
|
||||
@ -86,10 +86,10 @@ With digital identity done right, a vaccine proof (passport) would allow Canadia
|
||||
|
||||
Binding an identity to a Verifiable Credential remains valid beyond the point of verification by being able to match a real-time biometric data point with one which was logged at the point of verification
|
||||
|
||||
* [Setting up digital ID regime could provide boost to post-pandemic recovery](https://diacc.ca/2021/04/22/setting-up-digital-id-regime-could-provide-boost-to-post-pandemic-recovery/)
|
||||
* [Setting up digital ID regime could provide boost to post-pandemic recovery](https://diacc.ca/2021/04/22/setting-up-digital-id-regime-could-provide-boost-to-post-pandemic-recovery/) 2021-04-22
|
||||
> If the global pandemic has shown us anything, it’s that the need for reliable and secure data is paramount as businesses, governments, and Canadians from Vancouver to Quebec City to Charlottetown and everywhere in between move online.
|
||||
|
||||
* [Working Together on What “Good” Looks Like](https://www.hyperledger.org/blog/2021/02/12/working-together-on-what-good-looks-like) - Hyperledger
|
||||
* [Working Together on What “Good” Looks Like](https://www.hyperledger.org/blog/2021/02/12/working-together-on-what-good-looks-like) - Hyperledger 2021-02-12
|
||||
> This initiative is intended to define, in the context of test results and vaccination records for opening up borders for travel and commerce, a high bar for implementations of identity and credentialing systems to meet with regards to privacy, ethics and portability. They will also work with the implementers of such systems to converge towards common standards and governance.
|
||||
|
||||
Immunity passports' could speed up return to work after Covid-19 https://www.theguardian.com/world/2020/mar/30/immunity-passports-could-speed-up-return-to-work-after-covid-19
|
||||
@ -132,7 +132,7 @@ This article discusses areas of law that are developing rapidly [...] our goal i
|
||||
|
||||
This paper explores the five key challenges facing the industry and the IT investment priorities that have the greatest potential to support governments, airports, and airlines over the next 18 months to rebuild a strong and agile business.
|
||||
|
||||
* [Covid-19 spurs national plans to give citizens digital identities](https://webcache.googleusercontent.com/search?q=cache:KsfPtESFkP4J:https://www.economist.com/international/2020/12/07/covid-19-spurs-national-plans-to-give-citizens-digital-identities)
|
||||
* [Covid-19 spurs national plans to give citizens digital identities](https://webcache.googleusercontent.com/search?q=cache:KsfPtESFkP4J:https://www.economist.com/international/2020/12/07/covid-19-spurs-national-plans-to-give-citizens-digital-identities) 2020-12-07
|
||||
> The MOSIP project, which got going in March 2018, is nested in Bangalore’s International Institute of Information Technology (IIIT-B) and endowed with funding of $16m from the Omidyar Network, the Bill and Melinda Gates Foundation and Tata Trusts.
|
||||
|
||||
* [Digital Health Passports for COVID-19](https://socialsciences.exeter.ac.uk/media/universityofexeter/collegeofsocialsciencesandinternationalstudies/lawimages/research/Policy_brief_-_Digital_Health_Passports_COVID-19_-_Beduschi.pdf)
|
||||
@ -141,7 +141,7 @@ This paper explores the five key challenges facing the industry and the IT inves
|
||||
* [WHO goes there? Vaccination Certificates Technology and Identity](https://www.linkedin.com/pulse/who-goes-vaccination-certificates-technology-identity-stephen-wilson/) Stephen Wilson
|
||||
> Based on experience building a mobile credentials wallet for the Department of Homeland Security, I argue the proper goal of a digital vaccination certificate should be confined to representing nothing more and nothing less than the fact that someone received their jab. Such a Verifiable Credential would include the place, date and time, the type of vaccine, and the medico who administered or witnessed the jab.
|
||||
* [We don’t need immunity passports, we need verifiable credentials](https://cointelegraph.com/news/we-don-t-need-immunity-passports-we-need-verifiable-credentials)
|
||||
> Paper certificates, PDFs, wristbands and mobile apps have all been suggested — and the former director of the Centers for Disease Control, Tom Frieden, and international human rights attorney Aaron Schwid [urged](https://www.washingtonpost.com/opinions/2020/12/21/tom-frieden-covid-immunity-passports/) the adoption of digital “immunity passports” as a way to reopen the world.
|
||||
> Paper certificates, PDFs, wristbands and mobile apps have all been suggested — and the former director of the Centers for Disease Control, Tom Frieden, and international human rights attorney Aaron Schwid [urged](https://www.washingtonpost.com/opinions/2020/12/21/tom-frieden-covid-immunity-passports/) the adoption of digital “immunity passports” as a way to reopen the world. 2020-12-21
|
||||
|
||||
In theory, their idea is great. In practice, it’s terrible. Or, as the Daily Beast [put](https://www.thedailybeast.com/vaccine-passports-are-big-techs-latest-dystopian-nightmare) it: “Vaccine Passports Are Big Tech’s Latest Dystopian Nightmare.”
|
||||
|
||||
@ -172,7 +172,7 @@ The EU previously announced fully vaccinated Americans could travel this summer
|
||||
>
|
||||
> Our solution provides a platform for achieving exactly this, both in terms of equipping Scotland with a powerful integrated data environment and also through a framework where developers can further build on this with other apps for a myriad of other use cases. It could be tied in with the [vaccination scheduling system](https://www.ukauthority.com/articles/nhs-scotland-launches-digital-service-for-covid-19-vaccinations/) as an immediate step for example.
|
||||
|
||||
* [Understanding the Global COVID Certificate Landscape](https://www.lfph.io/2021/10/13/divoc/) DIVOC
|
||||
* [Understanding the Global COVID Certificate Landscape](https://www.lfph.io/2021/10/13/divoc/) DIVOC 2021-10-13
|
||||
|
||||
The DIVOC project is hosted and maintained by [India’s eGov Foundation](https://egov.org.in/) and is available as an MIT-licensed open source software package DIVOC is also supported by various multilateral funding institutions, as well as a community of software contributors and adopters in various geographies. DIVOC’s verifiable COVID credentials have also been tested for interoperability with several consumer-health and locker applications globally; and DIVOC’s certificates from the adopter countries can now be scanned/read/ingested by these domestic and international applications.
|
||||
|
||||
@ -187,18 +187,18 @@ The DIVOC project is hosted and maintained by [India’s eGov Foundation](https:
|
||||
* [Platform Architecture for Covid-19 Digital Passports](https://digitalscot.net/architecture-for-covid-19-passports/)
|
||||
> - Appii – Appii has developed their [Health Passport](https://appii.io/health-passport/), a service that verifies your identify through a selfie photo, is populated through recording your test result at one of their partner sites (eg. Lloyds Pharmacy) and provides a digital certification.
|
||||
> - Digi.me – Digi.me is a specialist in general data sharing services and have developed a number of apps that build on this capability, including a [Covid-19 solution](https://digi.me/covid19/).
|
||||
* [Coming Soon: The ‘Vaccine Passport’](https://www.nytimes.com/2021/02/04/travel/coronavirus-vaccine-passports.html)
|
||||
* [Coming Soon: The ‘Vaccine Passport’](https://www.nytimes.com/2021/02/04/travel/coronavirus-vaccine-passports.html) 2021-02-04
|
||||
> “The global passport system took 50 years to develop,” said Drummond Reed, chief trust officer for Evernym. “Even when they wanted to add biometrics to that to make it stronger, that took over a decade to agree on just how you’re going to add a fingerprint or a facial biometric to be verified on a passport. Now, in a very short period of time, we need to produce a digital credential that can be as universally recognized as a passport and it needs an even greater level of privacy because it’s going to be digital.”
|
||||
|
||||
* [Everything You Need to Know About “Vaccine Passports”](https://identitywoman.net/quoted-in-everything-you-need-to-know-about-vaccine-passports/) IdentityWoman \ [Mother Jones](https://www.motherjones.com/politics/2021/04/everything-you-need-to-know-about-vaccine-passports/)
|
||||
> Andy Slavitt, a White House senior adviser for COVID response, specified at a [March 29](https://www.whitehouse.gov/briefing-room/press-briefings/2021/03/29/press-briefing-by-white-house-covid-19-response-team-and-public-health-officials-21/) briefing that “unlike other parts of the world, the government here is not viewing its role as the place to create a passport, nor a place to hold the data of citizens.”
|
||||
> Andy Slavitt, a White House senior adviser for COVID response, specified at a [March 29](https://www.whitehouse.gov/briefing-room/press-briefings/2021/03/29/press-briefing-by-white-house-covid-19-response-team-and-public-health-officials-21/) briefing that “unlike other parts of the world, the government here is not viewing its role as the place to create a passport, nor a place to hold the data of citizens.” 2021-03-29
|
||||
|
||||
* [Vaccine Passports Must Leverage Decentralized Identity Solutions](https://medium.com/ontologynetwork/vaccine-passports-must-leverage-decentralized-identity-solutions-d454f9907fe9) Ontology
|
||||
|
||||
Decentralized identity solutions offer an ideal solution to the data privacy and identity risks associated with COVID-19 passports and other verification methods.
|
||||
|
||||
### Health Pass
|
||||
* [Why health passes are NOT vaccine passports – and offer greater flexibility and choice](https://blog.digi.me/2021/08/18/why-health-passes-are-not-vaccine-passports-and-offer-greater-flexibility-and-choice/) Digi Me
|
||||
* [Why health passes are NOT vaccine passports – and offer greater flexibility and choice](https://blog.digi.me/2021/08/18/why-health-passes-are-not-vaccine-passports-and-offer-greater-flexibility-and-choice/) Digi Me 2021-08-18
|
||||
|
||||
Health passes, though, are much more flexible as they provide multiple options. They can still be used as proof of vaccination, if the user chooses to share their health information in this way.
|
||||
|
||||
@ -226,18 +226,18 @@ Apple Announces Support for [VCI](https://vci.org/) credentials at WWDC (Almost
|
||||
|
||||
Interoperability is a fundamental property of tech systems that are generative and respect individual privacy and autonomy. And, as a bonus, it makes people's live easier!
|
||||
|
||||
* [Health data must be private and secure by design, always](https://blog.digi.me/2021/06/01/health-data-must-be-private-and-secure-by-design-always/)
|
||||
* [Health data must be private and secure by design, always](https://blog.digi.me/2021/06/01/health-data-must-be-private-and-secure-by-design-always/) 2021-06-01
|
||||
> But there is always time to reflect on privacy and security, and design from the ground up accordingly. At digi.me, we practice what we preach, with privacy and security always core considerations for our health data capability as well as our [Consentry health pass](https://consentry.com/) as they move forwards.
|
||||
|
||||
* [PocketCred Verifiable Credentials](https://www.pocketcred.com/)
|
||||
> Pravici PocketCred (formerly VeriCred) is built on Blockchain technology, specifically to address credential issuance and verification, such as one for COVID-19 vaccines. We at Pravici have been working to build a digital pass that citizens can carry in their mobile device or digital card to prove that they have taken a test or vaccine. Our software application features user-friendly creation of schemas* and proof templates, as well as QR code technology for credential issuance and verification.
|
||||
|
||||
* [Digi.me creates first working UK vaccine passport capability](https://blog.digi.me/2021/03/29/digi-me-creates-first-working-uk-vaccine-passport-capability/)
|
||||
* [Digi.me creates first working UK vaccine passport capability](https://blog.digi.me/2021/03/29/digi-me-creates-first-working-uk-vaccine-passport-capability/) 2021-03-29
|
||||
> Digi.me’s health pass is built on the same principles as our existing secure data exchange platform, and can be displayed on demand on a user’s phone. It is verified fully private, secure and tamper-proof due to multiple robust security measures including encryption.
|
||||
|
||||
This health pass has been designed to be fully interoperable with other international standards, such as the UN Good Health Pass Collaborative, of which [digi.me is a member](https://blog.digi.me/2021/02/25/digi-me-joins-good-health-pass-collaborative-to-help-build-a-safe-travelling-future/).
|
||||
This health pass has been designed to be fully interoperable with other international standards, such as the UN Good Health Pass Collaborative, of which [digi.me is a member](https://blog.digi.me/2021/02/25/digi-me-joins-good-health-pass-collaborative-to-help-build-a-safe-travelling-future/). 2021-02-25
|
||||
|
||||
* [Digi.me partners with Healthmark to enable Covid testing and verified result reporting](https://blog.digi.me/2021/02/16/digi-me-partners-with-healthmark-to-enable-covid-testing-and-verified-result-reporting/)
|
||||
* [Digi.me partners with Healthmark to enable Covid testing and verified result reporting](https://blog.digi.me/2021/02/16/digi-me-partners-with-healthmark-to-enable-covid-testing-and-verified-result-reporting/) 2021-02-16
|
||||
> Consentry healthpass capability is an end-to-end solution which enables users to take a self-administered PCR saliva test, send it in for processing, and then receive an in-app result. Crucially, Consentry also generates a certified and dated travel certificate, together with qualifying details of the test taken, which can be printed, shared securely or displayed as needed.
|
||||
### MedCreds
|
||||
- [Proofmarket](https://docs.google.com/document/d/1hlR_2yp7EJQqYvxm8mNY-KNgwScTsClKDp6W6yw33Ic/edit?usp=sharing) (Medcreds)
|
||||
@ -271,7 +271,7 @@ Together SITA and Indicio.tech utilized Hyperledger Aries, Ursa, and Indy to cre
|
||||
|
||||
## Guidance
|
||||
|
||||
* [how to re-open our economy while protecting privacy](https://diacc.ca/2021/01/05/protecting-privacy-while-reopening-economies/) Joni Brennan of DIACC & IdentityWoman
|
||||
* [how to re-open our economy while protecting privacy](https://diacc.ca/2021/01/05/protecting-privacy-while-reopening-economies/) Joni Brennan of DIACC & IdentityWoman 2021-01-05
|
||||
> Without transparent operational guidance, people’s privacy and personal freedoms may be compromised. By having a set of operational rules, decision makers will have the capacity to make better decisions that will enable the public to trust that the tools being implemented have been designed to respect their best interests.
|
||||
|
||||
* [Getting Privacy Right with Verifiable Health Credentials](https://www.evernym.com/health-credentials-webinar/)
|
||||
@ -279,10 +279,10 @@ Together SITA and Indicio.tech utilized Hyperledger Aries, Ursa, and Indy to cre
|
||||
|
||||
## Demo - Trials
|
||||
|
||||
* [British Airways to trial Verifly digital health passport](https://www.businesstraveller.com/business-travel/2021/01/29/british-airways-to-trial-verifly-digital-health-passport/)
|
||||
* [British Airways to trial Verifly digital health passport](https://www.businesstraveller.com/business-travel/2021/01/29/british-airways-to-trial-verifly-digital-health-passport/) 2021-01-29
|
||||
> The trial begins on February 4 on all of the carrier’s transatlantic routes between London and the US (currently New York JFK, Los Angeles, San Francisco, Boston, Chicago, Dallas, Miami, Washington, Houston and Seattle).
|
||||
>
|
||||
> It will be run in conjunction with joint business and Oneworld partner American Airlines, [which is already using the technology on international routes to the US.](https://www.businesstraveller.com/business-travel/2021/01/17/american-airlines-launches-verifly-health-passport-for-travel-to-the-us/)
|
||||
> It will be run in conjunction with joint business and Oneworld partner American Airlines, [which is already using the technology on international routes to the US.](https://www.businesstraveller.com/business-travel/2021/01/17/american-airlines-launches-verifly-health-passport-for-travel-to-the-us/) 2021-01-17
|
||||
|
||||
|
||||
### Good Health Pass
|
||||
@ -295,7 +295,7 @@ Good Health Pass Blueprint and the Global Covid Credentials Initiative by LFPH p
|
||||
* [The Politics of Vaccination Passports](https://www.windley.com/archives/2021/04/the_politics_of_vaccination_passports.shtml) Windley
|
||||
> For example, I’d prefer a vaccination passport that is built according to principles of the Good Health Pass collaborative than, say, one built by Facebook, Google, Apple, or Amazon. Social convention, and regulation where necessary, can limit where such a passport is used. It’s an imperfect system, but social systems are.
|
||||
|
||||
* [ToIP Foundation Hosts the Interoperability Working Group for Good Health Pass](https://trustoverip.org/blog/2021/04/12/toip-foundation-hosts-the-interoperability-working-group-for-good-health-pass/)
|
||||
* [ToIP Foundation Hosts the Interoperability Working Group for Good Health Pass](https://trustoverip.org/blog/2021/04/12/toip-foundation-hosts-the-interoperability-working-group-for-good-health-pass/) 2021-04-12
|
||||
> The nine drafting groups collaborating within the new Working Group are:
|
||||
|
||||
1. [Paper Based Credentials](https://wiki.trustoverip.org/display/HOME/Paper+Based+Credentials+Drafting+Group) will define how a paper-based alternative can be created for any digital health pass so access will be available to all.
|
||||
@ -398,7 +398,7 @@ This is the Use Case Implementation Workstream of the [COVID Credentials Initia
|
||||
|
||||
## User Experience
|
||||
|
||||
* [Covid has accelerated Canadians’ demand for digital ID](https://diacc.ca/2021/02/16/covid-has-accelerated-canadians-demand-for-digital-id/) DIACC
|
||||
* [Covid has accelerated Canadians’ demand for digital ID](https://diacc.ca/2021/02/16/covid-has-accelerated-canadians-demand-for-digital-id/) DIACC 2021-02-16
|
||||
> three-quarters of the population feels it’s important to have a secure, trusted and privacy-enhancing digital ID to safely and securely make transactions online. The majority of Canadians believe it is important for federal and provincial governments to move quickly on enabling digital ID in a safe and secure manner, according to the survey.
|
||||
|
||||
* [Innovation in Digital Identity and Credentials in the Post-Covid World](https://academy.affinidi.com/innovation-in-digital-identity-and-credentials-in-the-post-covid-world-f182a5743ce8) Affinidy
|
||||
@ -417,7 +417,7 @@ We are starting a new research project — and we’d like you to join us on the
|
||||
|
||||
But who is the “we”? The research asks exactly that — who is the “we” that needs to [make the platform work better for women](https://medium.com/caribou-digital/female-livelihoods-in-the-gig-economy-tensions-and-opportunities-f14982b6aaad)?
|
||||
|
||||
* [The evolution of Covid testing peaks with at-home rapid antigen test-and-show capability](https://blog.digi.me/2021/08/20/the-evolution-of-covid-testing-peaks-with-at-home-rapid-antigen-test-and-show-capability/) Digi Me
|
||||
* [The evolution of Covid testing peaks with at-home rapid antigen test-and-show capability](https://blog.digi.me/2021/08/20/the-evolution-of-covid-testing-peaks-with-at-home-rapid-antigen-test-and-show-capability/) Digi Me 2021-08-20
|
||||
|
||||
fixes the pain points of other testing processes – especially as infectious and asymptomatic people can test without travelling – is cheap, eminently scalable, and can be used as secure proof of Covid health status where needed.
|
||||
|
||||
|
@ -79,7 +79,7 @@ Beyond directly helping children learn in playful ways, this partnership was for
|
||||
* [LEGO & Learning Economy: Gearing up with Super Skills](https://blog.identity.foundation/lego-super-skills/) ID Foundation
|
||||
> The Super Skills app combines a custodial wallet (Torus) and Ceramic VC/storage tooling to give children private, exportable, future-proof achievement records – a self-sovereign educational credentialing system in miniature.
|
||||
|
||||
* [When Job Candidates Lie, New Tech From ZippedScript And LearnCard Will Help You Catch Them](https://www.forbes.com/sites/zengernews/2022/09/16/when-job-candidates-lie-new-tech-from-zippedscript-and-learncard-will-help-you-catch-them/?sh=731b54b63ed4) Forbes
|
||||
* [When Job Candidates Lie, New Tech From ZippedScript And LearnCard Will Help You Catch Them](https://www.forbes.com/sites/zengernews/2022/09/16/when-job-candidates-lie-new-tech-from-zippedscript-and-learncard-will-help-you-catch-them/?sh=731b54b63ed4) Forbes 2022-09-16
|
||||
|
||||
“recently launched [LearnCard](http://www.learncard.com/), a digital wallet for education and employment programmable verifiable credentials”
|
||||
|
||||
|
@ -47,7 +47,7 @@ When a medical accrediting agency provides a digitally signed certificate, the h
|
||||
|
||||
By integrating with Dock and utilizing verifiable credentials, the process of verifying a workers qualifications goes from analysing paper-based certificates and calling each educational body to certify the legitimacy of it, to having the accreditations sitting in a tamper-proof digital wallet, with a digital signature signature from the issuing body certifying the legitimacy.
|
||||
|
||||
* [TheirCharts](https://blogs.harvard.edu/doc/2022/01/15/theircharts/) Doc Searls
|
||||
* [TheirCharts](https://blogs.harvard.edu/doc/2022/01/15/theircharts/) Doc Searls 2022-01-15
|
||||
|
||||
If you’re getting health care in the U.S., chances are your providers are now trying to give you a better [patient experience](https://www.epic.com/software#PatientEngagement) through a website called MyChart.
|
||||
|
||||
@ -61,7 +61,7 @@ Shaw adds: “The vital point to make is this: innovations in health technology
|
||||
|
||||
## Devices
|
||||
|
||||
[In 2021, #RuggedIoMD becomes an #IIoT category](https://wider.team/2020/12/23/2021ruggediomd/)
|
||||
[In 2021, #RuggedIoMD becomes an #IIoT category](https://wider.team/2020/12/23/2021ruggediomd/) 2020-12-23
|
||||
|
||||
So there’s demand for a new category of IoT and #IoMD that survives and thrives despite these challenges. Very low power consumption. Lots of storage and caching to hold on through power outages. Ruggedized for use outside clinics. Easy and cheap to field-repair. Lots of smarts inside so they work without an internet tap. Many flavors of connectivity to exploit opportunities as they knock. Open sourced, the better to adapt to new and unplanned problems.
|
||||
|
||||
@ -96,7 +96,7 @@ The Interoperability and Patient Access final rule (CMS-9115-F) delivers on the
|
||||
|
||||
* [What SMART on FHIR Means for the Future of Healthcare](https://auth0.com/blog/what-smart-on-fhir-means-for-the-future-of-healthcare/) Auth0
|
||||
|
||||
The Substitutable Medical Applications and Reusable Technologies (SMART) platform promises to solve these data fragmentation challenges by standardizing how patient data is accessed and shared. And given SMART’s inclusion in the [21st Century Cures Act](https://www.federalregister.gov/documents/2020/05/01/2020-07419/21st-century-cures-act-interoperability-information-blocking-and-the-onc-health-it-certification), the platform will become the standard protocol for accessing electronic health records (EHRs) in the near future.
|
||||
The Substitutable Medical Applications and Reusable Technologies (SMART) platform promises to solve these data fragmentation challenges by standardizing how patient data is accessed and shared. And given SMART’s inclusion in the [21st Century Cures Act](https://www.federalregister.gov/documents/2020/05/01/2020-07419/21st-century-cures-act-interoperability-information-blocking-and-the-onc-health-it-certification), the platform will become the standard protocol for accessing electronic health records (EHRs) in the near future. 2020-05-01
|
||||
|
||||
## Development
|
||||
|
||||
|
@ -6,7 +6,7 @@ https://www.crowdfundinsider.com/2020/09/166678-global-id-verification-provider-
|
||||
|
||||
# Humanitarian
|
||||
|
||||
* [Fixing Aid | Can blockchain help fix the I.D. problem for a billion people?](https://www.thenewhumanitarian.org/podcast/2022/03/31/Fixing-Aid-can-blockchain-help-fix-the-ID-problem-for-a-billion-people) The New Humanitarian
|
||||
* [Fixing Aid | Can blockchain help fix the I.D. problem for a billion people?](https://www.thenewhumanitarian.org/podcast/2022/03/31/Fixing-Aid-can-blockchain-help-fix-the-ID-problem-for-a-billion-people) The New Humanitarian 2022-03-31
|
||||
|
||||
Ismail looks at the concept of self-sovereign identity, which asserts that individuals must have ownership over their personal digital data and identification, and how that idea influences efforts to create efficient, secure digital identities for people in the midst of humanitarian crises.
|
||||
|
||||
@ -86,7 +86,7 @@ Dilek Genc, a PhD candidate at the University of Edinburgh who studies blockchai
|
||||
* [Why Self-Sovereign Digital Identity Is A Game Changer For Financial Inclusion In Africa](https://www.africa.com/why-self-sovereign-digital-identity-is-a-game-changer-for-financial-inclusion-in-africa/)
|
||||
|
||||
This builds on four years of Absa’s work with BankServ, other banks and multiple local and global forums, to set up an industry-wide governance framework for self-sovereign identity, including collaboration with the South African International Organisation for Standardisation (ISO) to develop documentation that covers the standards for SSDI management.
|
||||
* [Honouring Te Tiriti in our work](https://digitalidentity.nz/2021/11/18/honouring-te-tiriti-in-our-work/) DigitalNZ
|
||||
* [Honouring Te Tiriti in our work](https://digitalidentity.nz/2021/11/18/honouring-te-tiriti-in-our-work/) DigitalNZ 2021-11-18
|
||||
|
||||
We understand that our responsibility to guide conversations and decisions relating to digital identity means that we must acknowledge and understand Māori perspectives of identity. We also seek to engage with the Māori communities we serve to ensure that we are working in partnership and that mana whenua have the agency to inform our future. [Draft Statement of Intent; Te Tiriti o Waitangi at DINZ](https://www.dropbox.com/s/09tfy4m4e6jbq6l/DINZ%20Te%20Tiriti%20o%20Waitangi%20SOI%20%26%20Action%20Plan%20%28V2%29.pdf)
|
||||
|
||||
@ -99,7 +99,7 @@ These rights and principles should accompany people in the EU in their everyday
|
||||
|
||||
* [Amateur open-source researchers went viral unpacking the war in Ukraine](https://restofworld.org/2022/osint-viral-ukraine/)
|
||||
|
||||
* [The frog of war](https://blogs.harvard.edu/doc/2022/03/06/the-frog-of-war/) Doc Searls
|
||||
* [The frog of war](https://blogs.harvard.edu/doc/2022/03/06/the-frog-of-war/) Doc Searls 2022-03-06
|
||||
|
||||
People have changed, because more and more of them are digital now, connected to anybody and anything at any distance, and able to talk, produce “content” and do business—or at least to look and think past national and territorial boundaries. We make our tools and then our tools make us, McLuhan taught. Also, all media work us over completely. We have been remade into digital beings by our wires, waves, and phones. This raises our optionalities in too many ways to list.
|
||||
|
||||
@ -112,7 +112,7 @@ Let's imagine a country that has a modern digital identity infrastructure. Citiz
|
||||
Trinsic is partnering with companies building ID products for underserved populations. Through Identity for Good (ID4G), participating partners will receive access to Trinsic’s state-of-the-art infrastructure, enabling them to build their ID products quickly, safely, and compliantly
|
||||
|
||||
|
||||
* [NO NEED FOR SUPERHUMANS!: A practical guide to ethics in socio-technical systems design](https://trustoverip.org/blog/2022/03/18/no-need-for-superhumans/) TOIP
|
||||
* [NO NEED FOR SUPERHUMANS!: A practical guide to ethics in socio-technical systems design](https://trustoverip.org/blog/2022/03/18/no-need-for-superhumans/) TOIP 2022-03-18
|
||||
|
||||
* [read a summary and watch the video of Lisa’s talk here](https://wiki.trustoverip.org/display/HOME/1.+Dear+Human%2C+The+Future+Needs+You.++Practical+Ethics+with+Digital+Sociologist%2C+Lisa+Talia-Moretti) on our Wiki or on our [YouTube Channel here](https://www.youtube.com/watch?v=Xmnnj82wpTM&t=20s).
|
||||
|
||||
@ -167,7 +167,7 @@ Inclusion is important in all aspects of life, including digital identity produc
|
||||
|
||||
Input from many people from diverse backgrounds is essential to our work on the SSI Harm’s Task Force. I hope you’ll consider [joining us](https://wiki.trustoverip.org/display/HOME/Human+Experience+Working+Group) – whether you want to contribute or just observe, everyone is welcome!
|
||||
|
||||
* [Fixing Aid | Can blockchain help fix the I.D. problem for a billion people?](https://www.thenewhumanitarian.org/podcast/2022/03/31/Fixing-Aid-can-blockchain-help-fix-the-ID-problem-for-a-billion-people) The New Humanitarian
|
||||
* [Fixing Aid | Can blockchain help fix the I.D. problem for a billion people?](https://www.thenewhumanitarian.org/podcast/2022/03/31/Fixing-Aid-can-blockchain-help-fix-the-ID-problem-for-a-billion-people) The New Humanitarian 2022-03-31
|
||||
|
||||
When forced to flee your home from one moment to the next, grabbing birth certificates, school diplomas, and other papers that prove you are who you say you are might not be the first thing that comes to mind. And without those credentials, everything is more difficult when it comes to starting a new life or picking up the pieces of an old one: applying for asylum, applying for a job, or registering to receive aid and other kinds of support.
|
||||
|
||||
|
@ -6,6 +6,8 @@ published: false
|
||||
|
||||
## Explainer
|
||||
|
||||
* [Distributed Ledger Technologies, IAM, and the Truth in Things](https://www.youtube.com/watch?v=VV2rLgH9TUE) 2019-06-27 Identiverse Robert Brown
|
||||
> The Internet of Things has a problem with data silos – it’s difficult for data to move across domains and prove where it came from. Users of IoT data must understand how Things were made and kept up-to-date if they are to know the data received is truthful. Yet keeping Things healthy is not the sole responsibility of a single actor; components of a Thing may be shared amongst hardware and software vendors, system integrators, retailers, system operators, owners, regulators or third parties. Safety and security rests with all involved in authorizing updates, how and when they are applied as well as the right to repair when Things are no longer officially supported. Shared device lifecycle assurance is the basis for verifiable service histories of Things which give data provenance. When data can be proven to originate from reliable sources, its value increases while reducing the risk of using it. Enabling third parties to build value from data would unlock the true value of IoT which in turn could fund its upkeep. This talk will outline how identity and shared ledger technology have key roles to building Truth in Things for a sustainable IoT.
|
||||
* [Alternatives to the CompuServe of Things](https://www.windley.com/archives/2021/07/alternatives_to_the_compuserve_of_things.shtml) Windley
|
||||
|
||||
The current model for connected things puts manufacturers in between people and their things. That model negatively affects personal freedom, privacy, and society. Alternate models can provide the same benefits of connected devices without the societal and personal costs.
|
||||
@ -90,7 +92,7 @@ A Citopia Self-Sovereign Digital Twin™ (SSDT™) is a digital twin whose contr
|
||||
* [Battery Passport and the Battery Self-Sovereign Digital Twin](https://dlt.mobi/battery-passport-the-battery-ssdt/) Mobi
|
||||
> Similarly, a [battery passport](https://dlt.mobi/battery-passport) is nothing but a presentation of data points about a particular battery – who manufactured it, its physical and chemical composition, its current state of health, whether it was refurbished or repurposed from another battery, and so on.
|
||||
|
||||
* [LFPH tackles the next frontier in Open Source Health Technology: The rise of Digital Twins](https://www.lfph.io/2022/08/29/lfph-tackles-the-next-frontier-in-open-source-health-technology-the-rise-of-digital-twins/) Linux Foundation Public Health
|
||||
* [LFPH tackles the next frontier in Open Source Health Technology: The rise of Digital Twins](https://www.lfph.io/2022/08/29/lfph-tackles-the-next-frontier-in-open-source-health-technology-the-rise-of-digital-twins/) Linux Foundation Public Health 2022-08-29
|
||||
|
||||
To create a pairing between the digital world and the real world, a digital twin leverages real time data, such as smart sensor technology, coupled with analytics, and often artificial intelligence (AI) in order to detect and prevent system failures, improve system performance, and explore innovative uses or functional models.
|
||||
|
||||
@ -99,9 +101,9 @@ To create a pairing between the digital world and the real world, a digital twin
|
||||
Digital Twin Consortium drives the awareness, adoption, interoperability, and development of digital twin technology. Through a collaborative partnership with industry, academia, and government expertise, the Consortium is dedicated to the overall development of digital twins. We accelerate the market by propelling innovation and guiding outcomes for technology end-users.
|
||||
|
||||
## User experience
|
||||
* [#ResistIoT: IoT as a medium for surveillance](https://wider.team/2021/04/21/resistiot/) wider team
|
||||
* [#ResistIoT: IoT as a medium for surveillance](https://wider.team/2021/04/21/resistiot/) wider team 2021-04-21
|
||||
- Clinical technology as workplace surveillance. Hospital providers talk about their frustration with connected technologies because it feels like their every motion is being monitored and tracked, used by bosses to evaluate their speed and cost efficiency.
|
||||
- Civic technologies as government surveillance. From [Oakland’s corner traffic cameras](https://www.aclunc.org/blog/how-fight-stop-oaklands-domain-awareness-center-laid-groundwork-oakland-privacy-commission) leading to mass rallies to [Boston Police](https://www.independent.co.uk/life-style/gadgets-and-tech/news/robots-police-dog-spot-boston-dynamics-a9218491.html) [tests](https://reason.com/2019/11/26/massachusetts-police-test-out-robot-dogs-is-dystopia-on-its-way/) and [NYPD robot dogs](https://www.theverge.com/2021/2/24/22299140/nypd-boston-dynamics-spot-robot-dog), IoT is deep in the creepy depths of [the uncanny valley](https://en.wikipedia.org/wiki/Uncanny_valley).
|
||||
- Civic technologies as government surveillance. From [Oakland’s corner traffic cameras](https://www.aclunc.org/blog/how-fight-stop-oaklands-domain-awareness-center-laid-groundwork-oakland-privacy-commission) leading to mass rallies to [Boston Police](https://www.independent.co.uk/life-style/gadgets-and-tech/news/robots-police-dog-spot-boston-dynamics-a9218491.html) [tests](https://reason.com/2019/11/26/massachusetts-police-test-out-robot-dogs-is-dystopia-on-its-way/) and [NYPD robot dogs](https://www.theverge.com/2021/2/24/22299140/nypd-boston-dynamics-spot-robot-dog), IoT is deep in the creepy depths of [the uncanny valley](https://en.wikipedia.org/wiki/Uncanny_valley). 2019-11-26
|
||||
- Consumer technology as commercial surveillance. Alexa, Google, and Apple know too much about you and use it to sell adjacent services.
|
||||
|
||||
## Paper
|
||||
|
@ -4,6 +4,9 @@ published: false
|
||||
|
||||
# Travel
|
||||
|
||||
* [IDnow joins Accelerate@IATA to shape the future of seamless air travel](https://www.idnow.io/pr/idnow-joins-accelerateiata/) IDnow
|
||||
|
||||
The goal of IATA One ID is to set industry standards that further streamline the passenger journey with digitalization of admissibility and a contactless process through secure biometric enabled identification.
|
||||
|
||||
|
||||
* [Is the biggest tech change for travel since the internet and mobile the shift to self-sovereign identity tech?](https://centreforaviation.com/analysis/video/is-the-biggest-tech-change-for-travel-since-the-internet-and-mobile-the-shift-to-self-sovereign-identity-tech-1594) CAPA TV
|
||||
|
@ -72,7 +72,7 @@ This rapid digitalization of the private sector exposed a challenge in the busin
|
||||
At the root of the problem is the fact that uniquely identifying a person is hard to do and that people can create fake IDs for themselves quite easily.
|
||||
|
||||
## Security
|
||||
* [Digital IDs under attack: How to tackle the threat?](https://www.helpnetsecurity.com/2022/01/27/ssi-face-presentation-attacks/)
|
||||
* [Digital IDs under attack: How to tackle the threat?](https://www.helpnetsecurity.com/2022/01/27/ssi-face-presentation-attacks/) 2022-01-27
|
||||
|
||||
- photo attacks based on the presentation of facial evidence of an image of a face printed or displayed via a device’s screen.
|
||||
- video of user replay attack usually consisting of placing the screen of the attacker’s device in front of the camera.
|
||||
@ -89,7 +89,7 @@ Today, even in this digital world that has expanded over the past two years, the
|
||||
|
||||
In 2018, I was trying to open a bank account in my home town of Mutare, Zimbabwe, having just come back from the 1st world, I was under the impression it would take me at most 30 mins to an hour. I immediately realised I couldn’t provide most of the requirements such as my ‘Proof of Residence’ and many more. It turns out it took weeks and months for some to finish the entire process.
|
||||
|
||||
* [Self-sovereign digital identity is a game changer for African financial inclusion](https://it-online.co.za/2021/09/10/self-sovereign-digital-identity-is-a-game-changer-for-african-financial-inclusion/) ITOnline
|
||||
* [Self-sovereign digital identity is a game changer for African financial inclusion](https://it-online.co.za/2021/09/10/self-sovereign-digital-identity-is-a-game-changer-for-african-financial-inclusion/) ITOnline 2021-09-10
|
||||
|
||||
Much like cell phone technology and the internet, the true power of SSDI will only be unleashed when it is embedded across all sectors of society, from education and medical care to telecommunications and retail. And that will require all role players – government bodies, regulators, service providers, public and private agencies – to take up the SSDI baton and become part of the change.
|
||||
|
||||
@ -151,7 +151,7 @@ You can probably use the good news. It’s never been easy to run a credit union
|
||||
|
||||
There is momentum here, and a need to start building out much of what was discussed.
|
||||
|
||||
Doc introduced the session with the slide deck [here](https://www.slideshare.net/dsearls/day3iiw-sesion), wearing his hat as a founding member of [Customer Commons](http://customercommons.org), the .org working on the Intention Byway discussed at earlier IIW sessions and described in [this blog](https://customercommons.org/2021/04/27/a-new-way/), posed later.
|
||||
Doc introduced the session with the slide deck [here](https://www.slideshare.net/dsearls/day3iiw-sesion), wearing his hat as a founding member of [Customer Commons](http://customercommons.org), the .org working on the Intention Byway discussed at earlier IIW sessions and described in [this blog](https://customercommons.org/2021/04/27/a-new-way/), posed later. 2021-04-27
|
||||
|
||||
His case is that the incumbent e-commece system hasn’t progressed past its dependence on the cookie, and perhaps never will; and that there is a need to stand up an alternate model, built on asynchronous pub-sub messaging and compute nodes that run apps that don’t have to come from the stores of Apple and Google.
|
||||
|
||||
@ -197,7 +197,7 @@ That’s why Domi locates all communication about a property in one place, makin
|
||||
>
|
||||
> In fact, several industries are already digging in. Here are some of the most visible and promising use cases.
|
||||
* [Are we doing enough to align our work with Zero Trust Architecture?](https://lists.w3.org/Archives/Public/public-did-wg/2021Jan/0000.html) Adrian Gropper on Public DID-WG mailing list
|
||||
> [https://www.nytimes.com/2021/01/02/us/politics/russian-hacking-government.html](https://www.nytimes.com/2021/01/02/us/politics/russian-hacking-government.html)
|
||||
> [https://www.nytimes.com/2021/01/02/us/politics/russian-hacking-government.html](https://www.nytimes.com/2021/01/02/us/politics/russian-hacking-government.html) 2021-01-02
|
||||
> What would be a good way for our SSI communities to advance zero trust architecture through more effective accountability and audit?
|
||||
|
||||
* [Manu responds](https://lists.w3.org/Archives/Public/public-did-wg/2021Jan/0003.html)
|
||||
@ -222,11 +222,11 @@ That’s why Domi locates all communication about a property in one place, makin
|
||||
> 3. Requesting Party (RQ) and their user agent (mobile wallet)
|
||||
> 4. Requesting Client (RC), by definition has data in the clear
|
||||
|
||||
* [Digital Identity Isn’t Only For People](https://www.forbes.com/sites/davidbirch/2020/12/22/digital-identity-isnt-only-for-people/) David Birch, Forbes
|
||||
* [Digital Identity Isn’t Only For People](https://www.forbes.com/sites/davidbirch/2020/12/22/digital-identity-isnt-only-for-people/) David Birch, Forbes 2020-12-22
|
||||
> fintechs and regtechs looking for opportunities in the digital identity space should cast their ideas net pretty wide. Digital identities are not only for people and the future desperately needs digital identities for pretty much everything to underpin recognition, relationships and reputation (the 3Rs of the online economy).
|
||||
|
||||
|
||||
* [Why self-sovereign identity will get adopted (and it’s not the reason you probably want)](https://www.tuesdaynight.org/2018/06/15/why-self-sovereign-identity-will-get-adopted-and-its-not-the-reason-you-probably-want/) Tuesday Night
|
||||
* [Why self-sovereign identity will get adopted (and it’s not the reason you probably want)](https://www.tuesdaynight.org/2018/06/15/why-self-sovereign-identity-will-get-adopted-and-its-not-the-reason-you-probably-want/) Tuesday Night 2018-06-15
|
||||
|
||||
In the payment card world, there are clear guidelines on personal liability. $50 if you use credit and up to $500 for debit depending on when you report the issue. Based on that, different people choose to use different “systems.”
|
||||
|
||||
@ -385,7 +385,7 @@ We Credivera are Having fun at the #NSCExpo
|
||||
|
||||
This partnership will enable the use of Blockchain and Self-Sovereign Identity technologies such as verifiable credentials to enable the support of diplomas and professional certifications in compliance with personal data in a decentralized environment (#web3).
|
||||
|
||||
* [HUMBL @HUMBLPay](https://twitter.com/HUMBLPay/status/1574454647384813568) via Twitter ([ANN](https://www.globenewswire.com/en/news-release/2022/04/13/2421969/0/en/HUMBL-Selected-To-Pilot-Digital-Wallet-Program-On-Behalf-of-The-County-of-Santa-Cruz-California.html)
|
||||
* [HUMBL @HUMBLPay](https://twitter.com/HUMBLPay/status/1574454647384813568) via Twitter ([ANN](https://www.globenewswire.com/en/news-release/2022/04/13/2421969/0/en/HUMBL-Selected-To-Pilot-Digital-Wallet-Program-On-Behalf-of-The-County-of-Santa-Cruz-California.html) 2022-04-13
|
||||
|
||||
using verifiable credentials in their wallet.
|
||||
|
||||
@ -400,7 +400,7 @@ Self sovereign online identity is going to be a CRITICAL tool for everyone on th
|
||||
|
||||
This one of the most urgent issues in our society today.
|
||||
|
||||
* [Lost and Found: Digital identity Can Be The Difference Between Life And Death For Refugees](https://diacc.ca/2022/09/27/lost-and-found-digital-identity-can-be-the-difference-between-life-and-death-for-refugees/) DIACC
|
||||
* [Lost and Found: Digital identity Can Be The Difference Between Life And Death For Refugees](https://diacc.ca/2022/09/27/lost-and-found-digital-identity-can-be-the-difference-between-life-and-death-for-refugees/) DIACC 2022-09-27
|
||||
|
||||
Most Refugees and IDPs did not have the time to properly prepare by gathering all their important documents such as passports, identity cards, driver’s licenses, and land titles or rental agreements. Fleeing your home may save your life, but fleeing without identity documents can lead to a very long wait – sometimes a decade or more – before your life is stable again.
|
||||
|
||||
|
@ -3,6 +3,8 @@ published: false
|
||||
---
|
||||
|
||||
# Research
|
||||
* [Deployment of a Blockchain-Based Self-Sovereign Identity - Delft](https://arxiv.org/pdf/1806.01926.pdf)
|
||||
> Digital identity is unsolved: after many years of research there is still no trusted communication over the Internet. To provide identity within the context of mutual distrust, this paper presents a blockchain-based digital identity solution. Without depending upon a single trusted third party, the proposed solution achieves passport-level legally valid identity. This solution for making identities Self-Sovereign, builds on a generic provable claim model for which attestations of truth from third parties need to be collected. The claim model is then shown to be both blockchain structure and proof method agnostic. Four different implementations in support of these two claim model properties are shown to offer sub-second performance for claim creation and claim verification. Through the properties of Self-Sovereign Identity, legally valid status and acceptable performance, our solution is considered to be fit for adoption by the general public.
|
||||
* [Leveraging Self-Sovereign Identity, Blockchain, and Zero-Knowledge Proof to Build a Privacy-Preserving Vaccination Pass](https://arxiv.org/pdf/2202.09207.pdf) Maurício Barrosa, Frederico Schardong, Ricardo Felipe Custódio
|
||||
|
||||
This solution allows users to prove that they are vaccinated for different pathogens without revealing their identity. The architecture is loosely coupled, allowing components to be exchanged, which we discuss when we present the implementation of a working prototype.
|
||||
|
@ -3,7 +3,7 @@ published: false
|
||||
---
|
||||
|
||||
# Guardianship
|
||||
* [Guardianship In Self-Sovereign Identity](http://thedinglegroup.com/blog/2020/11/30/guardianship-in-self-sovereign-identity)
|
||||
* [Guardianship In Self-Sovereign Identity](http://thedinglegroup.com/blog/2020/11/30/guardianship-in-self-sovereign-identity) 2020-11-30
|
||||
|
||||
* [Video] [Vienna Digital Identity Meetup #17](https://vimeo.com/482803989)
|
||||
> Guardianship is a complex topic, with many subtleties and layers [...] In this first event on this topic, Philippe has provided an overview of how SSI and Guardianship fit together and how SSI meets the lifecycle stages (Inception, Creation, Usage and Termination) of guardianship.
|
||||
@ -202,7 +202,7 @@ Links that came up during the call:
|
||||
|
||||
* [https://link.springer.com/chapter/10.1007/978-3-540-45146-4_8](https://link.springer.com/chapter/10.1007/978-3-540-45146-4_8)
|
||||
|
||||
* [Let’s Go - Together!: Does international travel only ever involve independent adults?](https://trustoverip.org/blog/2021/11/24/lets-go-together/) ToIP
|
||||
* [Let’s Go - Together!: Does international travel only ever involve independent adults?](https://trustoverip.org/blog/2021/11/24/lets-go-together/) ToIP 2021-11-24
|
||||
|
||||
Applying the developed models of guardianship, using the flexibility of Verifiable Credentials and the trusted mechanisms of sharing VCs, can provide the ability to add guardianship credentials into the travel process (or not) without breaking the existing approach and complicating the technical details defined in the Blueprint.
|
||||
|
||||
|
@ -3,7 +3,7 @@ published: false
|
||||
---
|
||||
|
||||
# Privacy
|
||||
* [Apple vs (or plus) Adtech, Part II](https://blogs.harvard.edu/doc/2021/05/30/apple-vs-or-plus-adtech-part-ii/)
|
||||
* [Apple vs (or plus) Adtech, Part II](https://blogs.harvard.edu/doc/2021/05/30/apple-vs-or-plus-adtech-part-ii/) 2021-05-30
|
||||
|
||||
To review… in Settings—> Privacy—> Tracking, is a single OFF/ON switch for “Allow Ads to Request to Track.” It is by default set to ON.
|
||||
* [Reciprocal Negotiated Accountability](https://www.windley.com/archives/2021/06/reciprocal_negotiated_accountability.shtml) Phil Windley
|
||||
@ -42,7 +42,7 @@ The New York Times recently did a deep dive into the United States’ lack of a
|
||||
|
||||
Automated identification procedures ensure seamless processes without media disruption and increase cost efficiency. By modernizing laws that allow these procedures, many cases can be simplified and modernized in the future.
|
||||
|
||||
* [DIDAS provides extensive commentary to the target vision for e-ID in Switzerland](https://www.didas.swiss/2021/10/13/didas-provides-extensive-commentary-to-the-target-vision-for-e-id-in-switzerland/)
|
||||
* [DIDAS provides extensive commentary to the target vision for e-ID in Switzerland](https://www.didas.swiss/2021/10/13/didas-provides-extensive-commentary-to-the-target-vision-for-e-id-in-switzerland/) 2021-10-13
|
||||
|
||||
It was a great opportunity for DIDAS to provide in-depth commentary to the proposed vision and contribute our collective ideas and expertise to help make a well informed decision. Our submission (in German) is available [here](https://www.didas.swiss/wp-content/uploads/2021/10/Stellungnahme-DIDAS-FINAL-V1.0-website.pdf)
|
||||
* [Kids PRIVCY ACT](https://me2ba.org/we-backed-the-kids-privcy-act-but-we-urge-members-in-congress-to-address-non-profit-carve-outs-in-data-privacy-laws/) Me2BA
|
||||
@ -95,7 +95,7 @@ Revoke allows you to send requests to retrieve and/or delete your data.
|
||||
- Revoke gives you full visibility and control of what to do with that information.
|
||||
- Easy to use app helps you discover who hold yours personal information.
|
||||
|
||||
* [Someone could be tracking you through your headphones](https://nrkbeta.no/2021/09/02/someone-could-be-tracking-you-through-your-headphones/) NRK Beta
|
||||
* [Someone could be tracking you through your headphones](https://nrkbeta.no/2021/09/02/someone-could-be-tracking-you-through-your-headphones/) NRK Beta 2021-09-02
|
||||
|
||||
- At least 9149 products with Bluetooth transmitters were uniquely recognized at least 24 hours apart.
|
||||
- At least 129 headphones could be tracked in the dataset for longer than 24 hours.
|
||||
@ -110,7 +110,7 @@ Consent doesn’t scale well from the consumer’s perspective.
|
||||
|
||||
“The Personalization Privacy Paradox” - new cartoon and post on zero party data versus third party data [https://marketoonist.com/2021/07/zeropartydata.html](https://t.co/6OQq7fAAaP?amp=1)
|
||||
|
||||
* [How the cookie poisoned the Web](https://blogs.harvard.edu/doc/2021/05/14/poison/)
|
||||
* [How the cookie poisoned the Web](https://blogs.harvard.edu/doc/2021/05/14/poison/) 2021-05-14
|
||||
|
||||
Have you wondered why you have no more privacy on the Web than what other parties grant you ([which is none at all](https://www.linuxjournal.com/content/if-your-privacy-hands-others-alone-you-dont-have-any)), and that you can only opt in or out of choices that others provide—while the only controls you have over your privacy are to skulk around like a criminal (thank you, [Edward Snowden and Russell Brand](https://www.youtube.com/watch?v=2jxdwIkFdj8), for that analogy) or to stay offline completely?
|
||||
* [Me2BA Product Testing Spotlight Report Published: Data Sharing in Primary & Secondary School Mobile Apps](https://me2ba.org/me2ba-product-testing-spotlight-report-published-data-sharing-in-primary-secondary-school-mobile-apps-2/)
|
||||
|
@ -5,7 +5,7 @@ published: false
|
||||
# User Experience
|
||||
|
||||
|
||||
* [Falsehoods Programmers Believe About Names - With Examples](https://shinesolutions.com/2018/01/08/falsehoods-programmers-believe-about-names-with-examples/) Shine Solutions Group
|
||||
* [Falsehoods Programmers Believe About Names - With Examples](https://shinesolutions.com/2018/01/08/falsehoods-programmers-believe-about-names-with-examples/) Shine Solutions Group 2018-01-08
|
||||
> In this post I’m going to list all 40 of Patrick’s original falsehoods, but give you an example (or two) drawn from my experiences working in this space. Ready? Let’s go!
|
||||
>
|
||||
> 1. People have exactly one canonical full name.
|
||||
@ -113,7 +113,7 @@ Use case: Wonderland Stage & Screen, interested in developing a platform to supp
|
||||
|
||||
* [The principles of user sovereignty | by 𝔡𝔴𝔥](https://uxdesign.cc/the-principles-of-user-sovereignty-515ac83401f6?sk=d37a69c8efc8a48cdd4a23d0518ba8d0)
|
||||
|
||||
The earliest discussion of the phrase I could find is a [blog post](https://blog.lizardwrangler.com/2011/08/04/extending-our-reach-many-layers-of-user-sovereignty/) from August 4th, 2011 by the “Chief Lizard Wrangler” herself, [Mitchell Baker](https://en.wikipedia.org/wiki/Mitchell_Baker) the CEO of Mozilla. In it she prophetically describes user sovereignty as the consequence of new “engines” that are “…open, open-source, interoperable, public-benefit, standards-based, platforms…” She also makes the critical link between the philosophy of openness and standards-based interoperability with that of identity management and personal data dominion.
|
||||
The earliest discussion of the phrase I could find is a [blog post](https://blog.lizardwrangler.com/2011/08/04/extending-our-reach-many-layers-of-user-sovereignty/) from August 4th, 2011 by the “Chief Lizard Wrangler” herself, [Mitchell Baker](https://en.wikipedia.org/wiki/Mitchell_Baker) the CEO of Mozilla. In it she prophetically describes user sovereignty as the consequence of new “engines” that are “…open, open-source, interoperable, public-benefit, standards-based, platforms…” She also makes the critical link between the philosophy of openness and standards-based interoperability with that of identity management and personal data dominion. 2011-08-04
|
||||
|
||||
* [EPS for SSI (Self-Sovereign Identity)](https://medium.com/@kokumai/eps-for-ssi-self-sovereign-identity-8c742e2b1d02)
|
||||
> you might be interested to hear that the core of EPS is designed to convert images to high-entropy codes, which work as very long passwords and also as the seeds of symmetric or asymmetric cryptographic keys.
|
||||
@ -121,7 +121,7 @@ The earliest discussion of the phrase I could find is a [blog post](https://blo
|
||||
|
||||
* [Sexism in Facial Recognition Technology](https://medium.com/berkman-klein-center/sexism-in-facial-recognition-technology-d5e547a6e7bc) Berkman Klien Center
|
||||
|
||||
The use of facial recognition by law enforcement agencies has become common practice, despite increasing reports of [false arrests](https://www.nytimes.com/2020/06/24/technology/facial-recognition-arrest.html) and [jail time](https://www.nytimes.com/2020/12/29/technology/facial-recognition-misidentify-jail.html). While there are various downsides to facial recognition technology being used at all, including fears of mass surveillance and invasion of privacy, there are flaws within facial recognition technologies themselves that lead to inaccurate results. One such major challenge for this still-burgeoning technology is gender-based inaccuracies.
|
||||
The use of facial recognition by law enforcement agencies has become common practice, despite increasing reports of [false arrests](https://www.nytimes.com/2020/06/24/technology/facial-recognition-arrest.html) and [jail time](https://www.nytimes.com/2020/12/29/technology/facial-recognition-misidentify-jail.html). While there are various downsides to facial recognition technology being used at all, including fears of mass surveillance and invasion of privacy, there are flaws within facial recognition technologies themselves that lead to inaccurate results. One such major challenge for this still-burgeoning technology is gender-based inaccuracies. 2020-12-29
|
||||
* [A Deep-Dive on Digital Self-Determination](https://medium.com/berkman-klein-center/a-deep-dive-on-digital-self-determination-368c48d87705)
|
||||
|
||||
Questions of control over personal data were a cross-cutting theme throughout a [Research Sprint](https://cyber.harvard.edu/story/2021-03/research-sprint-examines-digital-self-determination-increasingly-interconnected-world) co-hosted by the [Berkman Klein Center for Internet & Society](http://cyber.harvard.edu) and [Digital Asia Hub](https://www.digitalasiahub.org/). The Sprint also examined other important dimensions of self-determination in the digitally networked world, for instance, self-expression and participation in civic life and the digital economy, or relationship-building and well-being, to name just a few application areas.
|
||||
|
@ -72,7 +72,7 @@ Oldy- but- Goody - overview of [SSI Wallets](https://www.gimly.io/blog/ssi
|
||||
|
||||
The biggest disadvantage of non-custodial wallets is their inaccessibility when you lose or forget the password. Since you are the sole custodian, there is a huge responsibility on you to always remember the password of your wallet.
|
||||
|
||||
* [Super Apps Or Smart Wallets?](https://www.forbes.com/sites/davidbirch/2022/01/04/super-apps-or-smart-wallet/) David G.W. Birch
|
||||
* [Super Apps Or Smart Wallets?](https://www.forbes.com/sites/davidbirch/2022/01/04/super-apps-or-smart-wallet/) David G.W. Birch 2022-01-04
|
||||
|
||||
There's plenty of talk of super apps around at the moment as a variety of players attempt to become the western equivalent of the Asian app giants such as Alipay, Gojek and Kakao. But how do you get from a digital wallet to a super app?
|
||||
* [Validated ID's journey to becoming EBSI compliant](https://www.validatedid.com/post-en/validated-ids-journey-to-becoming-ebsi-compliant)
|
||||
@ -152,7 +152,7 @@ Kathleen Kenyon & Anil John believe that blockchain-based identity wallets are d
|
||||
* [Universal Wallet 2020](https://w3c-ccg.github.io/universal-wallet-interop-spec/) W3C Editor's Draft
|
||||
> This specification describes a portable, extensible, JSON-LD wallet representation, supporting digital currencies and credentials.
|
||||
* [Indicio contributes UI messaging design for digital wallet to open source](https://indicio.tech/blog/indicio-contributes-novel-ui-messaging-design-for-digital-wallet-to-open-source-community/)
|
||||
> A [finalist](https://www.dhs.gov/science-and-technology/news/2020/11/02/news-release-finalists-announced-digital-wallets-prize-challenge) in the Department of Homeland Security (DHS) Science and Technology ( S&T) Trusted User Interface (UI) Digital Wallets Challenge, the UI digital wallet design is now available in the [Indicio public Github repository](https://github.com/Indicio-tech/indicio-mobile-ux).
|
||||
> A [finalist](https://www.dhs.gov/science-and-technology/news/2020/11/02/news-release-finalists-announced-digital-wallets-prize-challenge) in the Department of Homeland Security (DHS) Science and Technology ( S&T) Trusted User Interface (UI) Digital Wallets Challenge, the UI digital wallet design is now available in the [Indicio public Github repository](https://github.com/Indicio-tech/indicio-mobile-ux). 2020-11-02
|
||||
* [The benefits of Self-Sovereign Identity wallets: Collaborating on Self-Sovereign Identity wallets](https://www.brightlands.com/en/brightlands-smart-services-campus/collaborating-self-sovereign-identity-wallets-12) Rabobank ([Part 2](https://www.brightlands.com/en/brightlands-smart-services-campus/rabobanks-opinion-techruption)
|
||||
> SSI and identity wallets will make it easier for citizens, organizations and governments to manage (digital) identities. It will make registrations and transactions across the internet private and secure. It will also make organizations more efficient and effective. As administration is reduced, costs will decrease. As their user interface becomes easier to use, their customers will perform more registrations with less errors - what in some cases will lead to extra revenue, but in all cases will lead to more satisfied customers
|
||||
* [Self-Sovereign Identity Mobile Wallet 101: Key Features](https://www.youtube.com/watch?v=rl8yt6V3p0U) Northern Block
|
||||
@ -174,7 +174,7 @@ Kathleen Kenyon & Anil John believe that blockchain-based identity wallets are d
|
||||
* [An Introduction to the Trinsic Wallet](https://trinsic.id/an-introduction-to-the-trinsic-wallet/)
|
||||
> When an organization requests information from an end user, the end user can decide whether to accept or reject the request. If the request is accepted, the wallet will find the relevant data from all of their credentials that is needed to fulfill the request.
|
||||
|
||||
* [GlobalID](https://medium.com/global-id/the-gid-report-134-doj-challenges-visa-plaid-ssi-is-hot-stuff-f7811bdda7cd) quoting the [Harvard Blog](https://blogs.harvard.edu/vrm/2020/11/02/ssi-2/): “*The easiest tool to imagine is a wallet or a wallet app (here’s one) with some kind of dashboard.*”
|
||||
* [GlobalID](https://medium.com/global-id/the-gid-report-134-doj-challenges-visa-plaid-ssi-is-hot-stuff-f7811bdda7cd) quoting the [Harvard Blog](https://blogs.harvard.edu/vrm/2020/11/02/ssi-2/): “*The easiest tool to imagine is a wallet or a wallet app (here’s one) with some kind of dashboard.*” 2020-11-02
|
||||
> It’s understandable then why Civic is phasing out it’s identity app and merging it into its wallet. (Which further validates GlobaliD’s current path.)
|
||||
* [Selv identity wallet](https://github.com/iotaledger/selv-mobile)
|
||||
|
||||
@ -210,7 +210,7 @@ In the offline world, we typically store credentials in a physical wallet — it
|
||||
|
||||
“Blockchain Ethics: A Bridge to Abundance” (2018) and “Re-Generation X” (2020) not only discuss the benefits of blockchain technology, but also capture Jamil’s experience on how he has transitioned from being a loyal yet downsized former corporate employee to a self sovereign individual.
|
||||
|
||||
* [Trust In Your Wallet](https://findy-network.github.io/blog/2022/04/27/trust-in-your-wallet/) Findy Agency
|
||||
* [Trust In Your Wallet](https://findy-network.github.io/blog/2022/04/27/trust-in-your-wallet/) Findy Agency 2022-04-27
|
||||
|
||||
* [Finnish Trust Network](https://www.kyberturvallisuuskeskus.fi/en/our-activities/regulation-and-supervision/electronic-identification) consists of “strong electronic identification” providers. The concept means proving one’s identity in electronic services that meets specific requirements laid down by Finnish law. The identity providers are required to implement multi-factor authentication to authenticate the users.
|
||||
|
||||
|
@ -29,13 +29,13 @@ Given the continuous discussions around centralization/de-centralization in our
|
||||
* [Game Governance Domains: a NFT Support Nightmare](http://habitatchronicles.com/2022/04/online-game-governance-domains-avoiding-an-nft-support-nightmare/) Habitat Chronicles
|
||||
|
||||
“I was working on an online trading-card game in the early days that had player-to-player card trades enabled through our servers. The vast majority of our customer support emails dealt with requests to reverse a trade because of some kind of trade scams. When I saw [Hearthstone’s dust system](https://playhearthstone.com/en-us/news/10245930), I realized it was genius; they probably cut their support costs by around 90% with that move alone.”
|
||||
* [Three thoughts about NFTs](https://blogs.harvard.edu/doc/2022/03/03/nft-2/) Doc Searls
|
||||
* [Three thoughts about NFTs](https://blogs.harvard.edu/doc/2022/03/03/nft-2/) Doc Searls 2022-03-03
|
||||
> There’s a thread in a list I’m on titled “NFTs are a Scam.” I know too little about NFTs to do more than dump here three thoughts I shared on the list in response to a post that suggested that owning digital seemed to be a mania of some kind. Here goes…
|
||||
* [What Do NFTs Do Well?](https://indicio.tech/what-do-nfts-do-well/) Indicio
|
||||
|
||||
NFTs are technologically interesting as a way of proving ownership and facilitating value transfer; but they are problematic if applied to proving a person’s identity.
|
||||
|
||||
* [SoulBound](https://vitalik.ca/general/2022/01/26/soulbound.html) NFTs…by Vitalik
|
||||
* [SoulBound](https://vitalik.ca/general/2022/01/26/soulbound.html) NFTs…by Vitalik 2022-01-26
|
||||
|
||||
A soulbound item, once picked up, cannot be transferred or sold to another player.
|
||||
|
||||
|
@ -1,95 +0,0 @@
|
||||
---
|
||||
date: 2019-04-11
|
||||
title: Blockchain Identity
|
||||
description: "Why Blockchain for Identity? + Assorted Blockchain ID Initiatives"
|
||||
excerpt: "Traditional identity systems typically suffer from single points of failure, lack of interoperability, and privacy issues such as encouraging mass data collection and user tracking. Blockchain technology has the potential to support novel data ownership and governance models with built-in control and consent mechanisms, which may benefit both users and businesses by alleviating these concerns; as a result, blockchain-based IDMSs are beginning to proliferate."
|
||||
header:
|
||||
image: /images/blockchain-id-header.webp
|
||||
caption: "[NIST Cybersecurity (DRAFT) Blockchain Identity Management Approaches](https://arxiv.org/pdf/1908.00929.pdf)"
|
||||
teaser: /images/blockchain-Tumisu_3019121.webp
|
||||
layout: single
|
||||
permalink: /blockchain/
|
||||
categories: [Blockchain ID]
|
||||
tags: [uPort,GDPR,Authenteq,Blockstack,Civic,Microsoft,Datum,ProCivis]
|
||||
last_modified_at: 2020-11-10
|
||||
toc: false
|
||||
published: false
|
||||
---
|
||||
|
||||
* [Impact of Blockchain on Digital Identity](https://www.tcs.com/content/dam/tcs-bancs/protected-pdf/Impact%20of%20Blockchain%20on%20Digital%20identity.pdf)
|
||||
> Starting from plain vanilla guidelines of security such as using a complex password to deploying cutting-edge technologies such as Biometrics, Machine Learning and Robotic Process Automation, multiple methods are being evaluated for digital identity protection.
|
||||
>
|
||||
> Effective though they are, when applied on a Centralized Digital Identity Management system, these solutions prove costly and sometimes not as effective. One of the main drawbacks of such a centralized system is that the control of data remains with one entity
|
||||
* [Self-Sovereign Identity: Why Blockchain?](https://www.ibm.com/blogs/blockchain/2018/06/self-sovereign-identity-why-blockchain/)
|
||||
> This question tends to stem from the notion that data associated with a person’s identity is destined to be stored, shared and used for verification on some form of distributed ledger technology. My hope is that this article with help to debunk that notion and provide a basic foundational understanding of how distributed ledger technology is being used to solve our identity infrastructure dilemma and resolve the impacts of the internet lacking an identity layer.
|
||||
* [Deployment of a Blockchain-Based Self-Sovereign Identity - Delft](https://arxiv.org/pdf/1806.01926.pdf)
|
||||
> Digital identity is unsolved: after many years of research there is still no trusted communication over the Internet. To provide identity within the context of mutual distrust, this paper presents a blockchain-based digital identity solution. Without depending upon a single trusted third party, the proposed solution achieves passport-level legally valid identity. This solution for making identities Self-Sovereign, builds on a generic provable claim model for which attestations of truth from third parties need to be collected. The claim model is then shown to be both blockchain structure and proof method agnostic. Four different implementations in support of these two claim model properties are shown to offer sub-second performance for claim creation and claim verification. Through the properties of Self-Sovereign Identity, legally valid status and acceptable performance, our solution is considered to be fit for adoption by the general public.
|
||||
* [**_A Taxonomic Approach to Understanding Emerging Blockchain Identity Management Systems_**](https://arxiv.org/pdf/1908.00929.pdf) NIST CYBERSECURITY WHITE PAPER (DRAFT) BLOCKCHAIN IDENTITY MANAGEMENT APPROACHES
|
||||
JULY 9, 2019
|
||||
> Identity management systems (IDMSs) are widely used to provision user identities while managing authentication, authorization, and data sharing both within organizations as well as on the Internet more broadly. Traditional identity systems typically suffer from single points of failure, lack of interoperability, and privacy issues such as encouraging mass data collection and user tracking. Blockchain technology has the potential to support novel data ownership and governance models with built-in control and consent mechanisms, which may benefit both users and businesses by alleviating these concerns; as a result, blockchain-based IDMSs are beginning to proliferate. This work categorizes these systems into a taxonomy based on differences in architecture, governance models, and other salient features. We provide context for the taxonomy by describing related terms, emerging standards, and use cases, while highlighting relevant security and privacy considerations.
|
||||
* [Identity Management with Blockchain: The Definitive Guide (2019)](https://tykn.tech/identity-management-blockchain/)
|
||||
> In identity management, a distributed ledger (a “blockchain”) enables everyone in the network to have the same source of truth about which credentials are valid and who attested to the validity of the data inside the credential, without revealing the actual data.
|
||||
* [Phil Windley (@windley)](https://twitter.com/windley/status/1071469217650638848)
|
||||
> If ledger isn’t used, then every issuer of a credential has to maintain infrastructure or contract service provider to respond to DID resolution & revocation requests. And, credential issuers would know when the credential was used, impacting privacy.
|
||||
|
||||
{% include video id="hUYpvI43bHA" provider="youtube" %}
|
||||
[Daniel Buchner - Blockchain-Anchored Identity – A Gateway to Decentralized Apps and Services](https://www.youtube.com/watch?v=hUYpvI43bHA)
|
||||
|
||||
![](https://i.imgur.com/bMbh6N7.png)
|
||||
[Blockchain Identity – Success Factors and Challenges](https://www.kuppingercole.com/blog/kuppinger/blockchain-identity-success-factors-and-challenges) by Martin Kuppinger
|
||||
> When new things arrive, which are still in the pioneering stage and far from reaching maturity, there is always a lot of discussion. This is even more true for Blockchain Identity, where the massive hype around Blockchains, a long history of clever ideas failing, and a few interesting technical and security challenges come together. During my keynote at this year’s EIC, I addressed the challenges and success factors for Blockchain ID as well. That led to a discussion on Twitter about whether some of these success factors are contradictory.
|
||||
* [GDPR - A reflection on the 'self-sovereign identity' and the Blockchain](https://www.linkedin.com/pulse/gdpr-reflection-self-sovereign-identity-blockchain-nicolas-ameye/)
|
||||
> The GDPR is taking for granted a centralized identity model, meaning a centralized model of digital data storage and transmission. Those centralized models of digital data storage are relying on the principles that the data custodians are trustworthy and are mandated to steward personal data. The GDPR, while being technology-neutral by nature, is articulated around the idea that personal data are being stewarded by centralized authorities.
|
||||
|
||||
<iframe src="https://channel9.msdn.com/Shows/Blocktalk/Decentralized-Identity-and-Blockchain/player" width="640" height="360" allowFullScreen frameBorder="0" title="Decentralized Identity and Blockchain - Microsoft Channel 9 Video"></iframe>
|
||||
|
||||
* [Towards Self-Sovereign Identity using Blockchain Technology](https://essay.utwente.nl/71274/1/Baars_MA_BMS.pdf)
|
||||
> Blockchain technology could function as the foundation of such system being a network for decentralized trust and exchange. Because everyone can participate as issuer or acquirer (and both), there are low adoption barriers and low costs. This allows new business opportunities for governments, banks and other authorities and more transparency and control for end-users.
|
||||
* [Identity and Distributed Ledger - Today and Tomorrow - June 26 - Identiverse 2019](https://www.youtube.com/watch?v=l04AHP7kPPw)
|
||||
> Join our expert panel, moderated by Paul Madsen, as they discuss and debate the future of distributed identity technology and its applications in solving identity problems.
|
||||
* [Self-Sovereign Identity and the Legitimacy of Permissioned Ledgers](http://www.windley.com/archives/2016/09/self-sovereign_identity_and_the_legitimacy_of_permissioned_ledgers.shtml)
|
||||
> This post justifies the claim that an identity system based on a permissioned distributed ledger is legitimately self-sovereign. The post also examines the claims to legitimacy that social login and distributed ledger identity systems make.
|
||||
* [Distributed Ledger Technologies, IAM, and the Truth in Things - June 27 - Identiverse 2019](https://www.youtube.com/watch?v=VV2rLgH9TUE) - Robert Brown
|
||||
> The Internet of Things has a problem with data silos – it’s difficult for data to move across domains and prove where it came from. Users of IoT data must understand how Things were made and kept up-to-date if they are to know the data received is truthful. Yet keeping Things healthy is not the sole responsibility of a single actor; components of a Thing may be shared amongst hardware and software vendors, system integrators, retailers, system operators, owners, regulators or third parties. Safety and security rests with all involved in authorizing updates, how and when they are applied as well as the right to repair when Things are no longer officially supported. Shared device lifecycle assurance is the basis for verifiable service histories of Things which give data provenance. When data can be proven to originate from reliable sources, its value increases while reducing the risk of using it. Enabling third parties to build value from data would unlock the true value of IoT which in turn could fund its upkeep. This talk will outline how identity and shared ledger technology have key roles to building Truth in Things for a sustainable IoT.
|
||||
* [Decentralized Identity: Intersection of Identity and Distributed Ledger - June 25 - Identiverse 2019](https://www.youtube.com/watch?v=bjlnZyMTf1M) - Preeti Rastogi
|
||||
> Decentralization in Identity is a shiny object, promising amazing benefits – but sometimes it is nice to just see how the protocols work. Join this session for an overview of the distributed ledger landscape and a discussion of the role it plays in the identity world, as well as the new challenges it introduces. We will talk about how public keys stored on a ledger might act as an anchor for digital trust and what architectures are evolving to leverage that trust.
|
||||
* [Blockchain for Identity - Myth or Potential](https://www.kuppingercole.com/blog/kuppinger/blockchain-for-identity-myth-or-potential)
|
||||
> Authentication might definitely become simpler, by having various authenticators and IDs, from eIDs to social logins, associated with a wallet. Just one simple store to get access. Yes, there are challenges in creating secure, easy-to-use wallets, but there is potential as well.
|
||||
|
||||
![](https://i.imgur.com/YSyv11h.png)
|
||||
|
||||
## Assorted Blockchain ID Initiatives
|
||||
|
||||
* [peacekeeper/blockchain-identity](https://github.com/peacekeeper/blockchain-identity) - Blockchain and Identity
|
||||
* [Identity at Coinbase: Welcoming the Distributed Systems team](https://blog.coinbase.com/identity-at-coinbase-welcoming-the-distributed-systems-team-d929dd64de2e) [[**ϟ**](https://www.wired.com/story/coinbase-distributed-systems-acquisition/)]
|
||||
* [Shocard](https://shocard.com/) — "Blockchain-Based Mobile Identity Platform" [[**ϟ**](https://medium.com/shocard/why-shocard-is-the-premier-blockchain-based-mobile-identity-platform-6fad15410106)]
|
||||
* [Authenteq](http://authenteq.com/) [[**T**](https://twitter.com/authenteq)] [[**G**](https://github.com/authenteq)]
|
||||
* enables users to create their own sovereign digital IDs which are stored encrypted on [BigChainDB](http://docs.bigchaindb.com)
|
||||
* [JLinc](https://www.jlinc.com/) — registers cryptographic public keys on the Stellar blockchain.
|
||||
> "The founders have been at the center of a community of developers working on “user-centric digital identity for almost two decades."
|
||||
* [Civic](https://www.civic.com/) launches: [identity.com](https://identity.com)[[**G**](https://github.com/identity-com/)][[**B**](https://www.civic.com/blog/identity-com-first-open-source-update/)][[**wp**](https://tokensale.civic.com/CivicTokenSaleWhitePaper.pdf)]
|
||||
* [Dapp Framework Melo One to use Civic](https://www.cryptoninjas.net/2018/08/30/dapp-framework-menlo-one-to-use-civic-for-blockchain-identity-verification/)
|
||||
* [Brave Civic Partnership](https://brave.com/brave-civic-partnership/)
|
||||
* [I/O Digital Foundation](https://iodigital.io/) [**[**wp**](https://simplebooklet.com/iocoinwhitepaper#page=0)**]
|
||||
* "offers a Proof-of-Stake blockchain called Decentralised Input Output Name Server (DIONS). It will enable applications such as identity and alias registration, storage of legal documents, key exchange, and encrypted messaging."
|
||||
* [Gemalto and R3 pilot blockchain for SSID](https://www.cryptoninjas.net/2018/09/18/gemalto-and-r3-pilot-blockchain-technology-for-self-sovereign-digital-id-network/#.W6drpckvGLU.twitter)
|
||||
* [Datum](https://datum.org) [[**wp**](https://datum.org/assets/Datum-WhitePaper.pdf)]
|
||||
* "network allows anyone to store structured data on a smart contract blockchain. Data can optionally be bought and sold on a marketplace using the DAT token. Datum leverages BigchainDB and IPFS as data storage backends. All data is encrypted and protected using AES256-GCM.
|
||||
* [Pro-civis](https://procivis.ch) — "e-government as a service" platform called "eID+". It enables citizens to get an official, electronic Citizen-ID on a mobile app.
|
||||
* The platform includes the [Vetri](https://vetri.global/) wallet and marketplace. 'Earn extra income and rewards by joining the data economy.'"
|
||||
* [We can do better than selling our data](http://blogs.harvard.edu/doc/2018/09/18/data/)-Doc Searls(*IIW*)
|
||||
|
||||
|
||||
## Democracy Earth
|
||||
|
||||
![](https://i.imgur.com/KxbXb1t.png)
|
||||
|
||||
* [Democracy Earth Foundation](http://democracy.earth/) [[**G**](https://github.com/DemocracyEarth/)][[**B**](https://words.democracy.earth/)][[**T**](https://twitter.com/DemocracyEarth)][[**C**](http://chat.democracy.earth/)] - Crypto Governance
|
||||
* [Sovereign](http://sovereign.software/)[[**G**](https://github.com/DemocracyEarth/sovereign)], a blockchain direct democracy tool using "vote" tokens to grant democratic participation rights to every human. A proof-of-individuality (POI) process based on peer-to-peer validation establishes that a self-sovereign identity is uniquely tied to a single person. Cooperation is happening with other decentralized identity initiatives such as Blockstack and uPort.
|
||||
* [The Social Smart Contract](https://github.com/DemocracyEarth/paper#The_Social_Smart_Contract)[[**ϟ**](https://www.dropbox.com/s/sifogl4zimwkkei/Democracy%20Earth%20-%20Social%20Smart%20Contract%20-%20Paper%20v0.2.pdf?dl=0)] An Initial Rights Offering from Democracy Earth Foundation.
|
||||
* [December App-Mining Results](https://words.democracy.earth/decembers-app-mining-results-are-live-7bd2b4f2390)
|
||||
* [Yellow Jackets on the Sovereign Platform](https://words.democracy.earth/yellow-jackets-on-the-sovereign-platform-bdebe6d62ae1)
|
||||
* [Meet the Dad Who Registered His Daughter’s Birth on the Blockchain](https://www.coindesk.com/meet-the-dad-who-registered-his-daughters-birth-on-the-blockchain) [[**ϟ**](https://www.coindesk.com/humans-on-the-blockchain-why-crypto-is-the-best-defense-against-ai-overlords)]
|
||||
* Token: [Sale](https://token.democracy.earth/) • [Economics](https://www.dropbox.com/s/8q35dvht2hkfvqa/Democracy%20Earth%20-%20Token%20Economics.pdf?dl=0) • [testnet](https://votest.democracy.earth/)
|
||||
>we worked with councils, senates, non profits, student centers, political parties, corporations.. but implementing real digital governance at scale really took off with crypto networks. our partnership with @blockstack is our biggest milestone of 2018. -[Santi](https://twitter.com/santisiri/status/1076259390154592256)
|
||||
|
@ -15,10 +15,10 @@ When we talk about SSI in relationship to the decentralization movement where bi
|
||||
- So why did these particular three vendors object—when over 10 times that number of W3C members voted in favor of approval?
|
||||
- In the end, this may come to a full democratic vote of all 431 W3C member companies—a referendum on how much decentralization really matters to the Web.
|
||||
- To learn more about what’s at stake, [register for our November 3rd webinar](https://www.evernym.com/blog/w3c-vision-of-decentralization/#webinar).
|
||||
* [Decentralization may be key to protecting our digital identities](https://venturebeat.com/2021/11/06/decentralization-may-be-key-to-protecting-our-digital-identities/) VentureBeat
|
||||
* [Decentralization may be key to protecting our digital identities](https://venturebeat.com/2021/11/06/decentralization-may-be-key-to-protecting-our-digital-identities/) VentureBeat 2021-11-06
|
||||
|
||||
By introducing decentralization, there is an opportunity for dApp developers to uphold strong, secure data privacy protections for users across the board. By offering strong privacy defaults and more user-centric options, decentralized data solutions will enable individuals to make informed decisions about their data.
|
||||
* [Why decentralization matters](https://cdixon.org/2018/02/18/why-decentralization-matters) CDixon
|
||||
* [Why decentralization matters](https://cdixon.org/2018/02/18/why-decentralization-matters) CDixon 2018-02-18
|
||||
|
||||
Decentralization is a commonly misunderstood concept. For example, it is sometimes said that the reason cryptonetwork advocates favor decentralization is to resist government censorship, or because of libertarian political views. These are not the main reasons decentralization is important.
|
||||
|
||||
@ -48,7 +48,7 @@ One of the desired outcomes of using standards-driven open source code projects
|
||||
|
||||
Decentralized identity is an incredibly flexible technology that solves fundamental problems in the way we manage digital communication. But this capacity to do more than one thing at once can be a source of confusion.
|
||||
|
||||
* [Juicy Telemetry](https://wider.team/2022/04/04/juicy-telemetry/) Wilder Team
|
||||
* [Juicy Telemetry](https://wider.team/2022/04/04/juicy-telemetry/) Wilder Team 2022-04-04
|
||||
|
||||
I was in a [Sovrin IoT](https://sovrin.org/) call when I heard the phrase “juicy telemetry.” A digital twins product leader was bemoaning all the really good data held back by the manufacturers of equipment. Data they needed to properly model their twins, to keep them current, to validate their assumptions. For good and bad reasons, the makers of wind turbines and cars and ship engines and weather sensors choose to hide data.
|
||||
* [Decentralized Systems Don't Care](https://www.windley.com/archives/2022/07/decentralized_systems_dont_care.shtml) Phil Windley
|
||||
|
@ -35,6 +35,6 @@ Proposal: it’s not Web3 — it’s DeWeb (a la DeFi) as we undo all the mistak
|
||||
|
||||
* [[...](https://twitter.com/InsideTheSim/status/1552637214391156739)] DeWeb is: - Self-sovereign identity with portable accounts and easy sign-on (such as sign-in with Ethereum). - Custody of your own data and the ability to revoke access to it by 3rd parties. - Permission-less commerce rails. - Permission-less domains (ENS) - more?
|
||||
|
||||
* [JPMorgan Wants to Bring Trillions of Dollars of Tokenized Assets to DeFi](https://www.coindesk.com/business/2022/06/11/jpmorgan-wants-to-bring-trillions-of-dollars-of-tokenized-assets-to-defi/) Coindesk
|
||||
* [JPMorgan Wants to Bring Trillions of Dollars of Tokenized Assets to DeFi](https://www.coindesk.com/business/2022/06/11/jpmorgan-wants-to-bring-trillions-of-dollars-of-tokenized-assets-to-defi/) Coindesk 2022-06-11
|
||||
|
||||
“We want to use verifiable credentials as a way of identifying and proving identity, which is different from the current Aave model, for instance,” Lobban said. “Verifiable credentials are interesting because they can introduce the scale that you need to provide access to these pools without necessarily having to maintain a white list of addresses. Since verifiable credentials are not held on-chain, you don’t have the same overhead involved with writing this kind of information to blockchain, paying for [gas fees](https://www.coindesk.com/learn/what-are-ethereum-gas-fees/), etc.”
|
@ -16,7 +16,7 @@ Looking to improve the DWeb? Take a look at our RFP-013: "Cryptonet Network Gran
|
||||
|
||||
* [Social.Network, a decentralized alternative to traditional social media that gives its users ownership of their identity and digital assets, to launch first phase of its protocol on April 22nd](https://financialpost.com/globe-newswire/social-technologies-announces-launch-of-the-social-network-a-decentralized-platform-designed-to-transform-the-future-of-social-media-social-network-a-decentralized-alternative-to-traditional-social)
|
||||
> interested users will be able to create a self-sovereign identity on the platform by following the steps on the [social.network](https://t.co/xRbWzSrZQf) landing page (h/t [@SelfSovID](https://twitter.com/SelfSovID)
|
||||
* [How to Sign Users In with IndieAuth](https://aaronparecki.com/2021/04/13/26/indieauth) Aaron Parecki
|
||||
* [How to Sign Users In with IndieAuth](https://aaronparecki.com/2021/04/13/26/indieauth) Aaron Parecki 2021-04-13
|
||||
> IndieAuth is an extension of OAuth 2.0 that enables an individual website like someone's WordPress, Gitea or OwnCast instance to become its own identity provider. This means you can use your own website to sign in to other websites that support IndieAuth.
|
||||
* [The latest in the DWeb: Jolocom’s breakthrough](https://jolocom.io/blog/sdi-breakthrough/)
|
||||
|
||||
@ -25,7 +25,7 @@ At the last DWeb Meetup, we were invited to share our role in the German Governm
|
||||
* [Credentials and HTTP-Sig authentication for Solid](https://lists.w3.org/Archives/Public/public-credentials/2021Feb/0029.html) Henry Story
|
||||
> Here is an extended version of the HTTP-Signature document I put together today, bringing in ideas that have emerged thinking about this over the past 3 months
|
||||
|
||||
* [IndieAuth Spec Updates 2020 by Aaron Parecki](https://aaronparecki.com/2020/12/03/1/indieauth-2020)
|
||||
* [IndieAuth Spec Updates 2020 by Aaron Parecki](https://aaronparecki.com/2020/12/03/1/indieauth-2020) 2020-12-03
|
||||
> This year, the IndieWeb community has been making progress on iterating and evolving the IndieAuth protocol. IndieAuth is an extension of OAuth 2.0 that enables it to work with personal websites and in a decentralized environment.
|
||||
* [Secure Scuttlebutt Intro](https://iiw.idcommons.net/9A/_Secure_Scuttlebutt_Intro) by Charles E. Lehner
|
||||
|
||||
|
@ -40,9 +40,9 @@ In Stephenson’s “Snowcrash” Hiro Protagonist, the aptly named protagonist
|
||||
|
||||
When you create your metaverse avatar, who owns it? Is it yours, or does the platform own it? This question is very fundamental for the future of digital services and human rights. It’s also a very practical and technical question in terms of how we build these platforms and databases.
|
||||
|
||||
* [Why Microsoft may beat Zuckerberg to the metaverse](https://venturebeat.com/2021/11/12/why-microsoft-may-beat-zuckerberg-to-the-metaverse/) VentureBeat
|
||||
* [Why Microsoft may beat Zuckerberg to the metaverse](https://venturebeat.com/2021/11/12/why-microsoft-may-beat-zuckerberg-to-the-metaverse/) VentureBeat 2021-11-12
|
||||
|
||||
When comparing Meta — [formerly Facebook](https://venturebeat.com/2021/10/28/facebook-stops-just-short-of-rebranding-to-the-web/) — and Microsoft’s approaches to the metaverse, it’s clear Microsoft has a much more grounded and realistic vision. Although Meta currently leads in the provision of virtual reality (VR) devices (through its ownership of what was previously called Oculus), Microsoft is adapting technologies that are currently more widely used.
|
||||
When comparing Meta — [formerly Facebook](https://venturebeat.com/2021/10/28/facebook-stops-just-short-of-rebranding-to-the-web/) — and Microsoft’s approaches to the metaverse, it’s clear Microsoft has a much more grounded and realistic vision. Although Meta currently leads in the provision of virtual reality (VR) devices (through its ownership of what was previously called Oculus), Microsoft is adapting technologies that are currently more widely used. 2021-10-28
|
||||
* [Self Sovereign e-ID Schemes & Privacy Challenges](https://www.youtube.com/watch?v=1vgNzSDn554) Crypto Valley Conference 2021
|
||||
|
||||
Kurt Nielsen & Nagib Aouini from Partisia Blockchain
|
||||
@ -56,7 +56,7 @@ Broadly speaking, ENS domain names also belong to a kind of decentralized identi
|
||||
Web 3.0 encourages users participation and restore the control over their digital identity and assets
|
||||
|
||||
|
||||
* [My first impressions of web3](https://moxie.org/2022/01/07/web3-first-impressions.html) Moxie Marlinspike
|
||||
* [My first impressions of web3](https://moxie.org/2022/01/07/web3-first-impressions.html) Moxie Marlinspike 2022-01-07
|
||||
|
||||
This guy gets it ^^^^^
|
||||
|
||||
@ -85,7 +85,7 @@ Passwordless authentication is a fundamental shift in how people will access the
|
||||
In [The crypto-communists behind the Web3 revolution](https://www.protocol.com/fintech/crypto-communists), Benjamin Pimentel argues that "The future of decentralized finance echoes a decidedly Marxist vision of the future." He references various Silicon Valley icons like Jack Dorsey, Marc Andreessen, Elon Musk, and others, comparing their statements on Web3 and crypto with the ideology of communism.
|
||||
|
||||
|
||||
* [My first impressions of web3](https://moxie.org/2022/01/07/web3-first-impressions.html)
|
||||
* [My first impressions of web3](https://moxie.org/2022/01/07/web3-first-impressions.html) 2022-01-07
|
||||
|
||||
… to have aspects that have relevance to the DID/VC work.
|
||||
|
||||
@ -113,7 +113,7 @@ Tweets with Annoucements:
|
||||
|
||||
Moxie argues that protocols evolve slowly, while platforms evolve quickly. That’s because a platform can make decisions without waiting for a whole crowd of others to reach consensus. But here’s the thing — some protocols don’t need to evolve quickly. As long as a ‘base protocol’ is versatile enough to let people create and express things in an unlimited range of fit-for-purpose application protocols, it can be as stale and boring as it likes. And it’s precisely the decentralisation, versatility, and stability of these base protocols — HTTP, email, and yes, Bitcoin and Ethereum — that allow platforms to innovate so quickly on top of them.
|
||||
|
||||
* [The Third Web](https://tante.cc/2021/12/17/the-third-web/)
|
||||
* [The Third Web](https://tante.cc/2021/12/17/the-third-web/) 2021-12-17
|
||||
|
||||
A good explanation and good critique of Web3
|
||||
|
||||
@ -166,7 +166,7 @@ When we dine at a restaurant in the physical world, we do not do so within some
|
||||
|
||||
In sum, SSI saves time, enhances security, and returns personal data ownership to individuals, thereby lessening the power of GAFA [Google, Apple, Facebook, and Amazon].
|
||||
|
||||
* [The Decentralized Web: An Introduction](https://blog.archive.org/2022/02/15/the-decentralized-web-an-introduction/) Archive.org
|
||||
* [The Decentralized Web: An Introduction](https://blog.archive.org/2022/02/15/the-decentralized-web-an-introduction/) Archive.org 2022-02-15
|
||||
|
||||
Providing that baseline of knowledge is the goal of a series of six workshops called [“Imagining a Better Online World: Exploring the Decentralized Web](https://metro.org/decentralizedweb).”
|
||||
|
||||
@ -265,7 +265,7 @@ Ontology is bringing Ont ID to Polkadot users, as part of an initiative to bring
|
||||
|
||||
### Solid - Inrupt
|
||||
|
||||
* [TBL: Out to Remake the Digital World](https://www.nytimes.com/2021/01/10/technology/tim-berners-lee-privacy-internet.html).
|
||||
* [TBL: Out to Remake the Digital World](https://www.nytimes.com/2021/01/10/technology/tim-berners-lee-privacy-internet.html). 2021-01-10
|
||||
|
||||
A story appeared in the NY Times about Tim Berners-Lee’s vision for the web and Solid-Inrupt that are working towards fulfilling it. The article included a quote from Kaliya, and has stirred up an active thread on the CCG mailing list.
|
||||
|
||||
@ -329,7 +329,7 @@ On March 11, 2022, I was a panelist on The Metaverse: The Emperor’s New Clothe
|
||||
|
||||
DAOs are, I think, one of the best illustrations of the problem with a lot of these Web3 projects: They are trying to find technological solutions that will somehow codify very complex social structures. A lot of them also seem to operate under the assumption that everyone is acting in good faith, and that project members’ interests will generally align—a baffling assumption given the amount of bad actors in the crypto space.
|
||||
|
||||
* [What you need to know about the state of the metaverse today](https://venturebeat.com/2022/03/19/what-you-need-to-know-about-the-state-of-the-metaverse-today/) Venture Beat
|
||||
* [What you need to know about the state of the metaverse today](https://venturebeat.com/2022/03/19/what-you-need-to-know-about-the-state-of-the-metaverse-today/) Venture Beat 2022-03-19
|
||||
|
||||
Many people are still struggling to comprehend exactly what the metaverse is and what promise it will deliver. On a conceptual level, the metaverse has been positioned as the next generation internet that provides a way for us to make our physical lives seamlessly integrate with our virtual lives, creating real-time immersive experiences
|
||||
|
||||
@ -342,7 +342,7 @@ I spoke with White via email about her views on Web3 fixtures such as DAOs (dist
|
||||
Although metaverse initiatives are still in their infancy, they are rapidly scaling up leveraging technologies such as blockchain, augmented reality, virtual reality, Internet of Things, artificial intelligence and digital twins to redefine our digital capabilities.
|
||||
|
||||
|
||||
* [12 Ways Crypto and Blockchain Tech Will Change the World (and Boost Your Bottom Line)](https://moneymorning.com/2022/04/08/12-ways-crypto-and-blockchain-tech-will-change-the-world-and-boost-your-bottom-line/)
|
||||
* [12 Ways Crypto and Blockchain Tech Will Change the World (and Boost Your Bottom Line)](https://moneymorning.com/2022/04/08/12-ways-crypto-and-blockchain-tech-will-change-the-world-and-boost-your-bottom-line/) 2022-04-08
|
||||
|
||||
No. 7: Protecting Our Personal Data
|
||||
|
||||
@ -412,7 +412,7 @@ Blockchain analytics solutions have been a critical part of enabling the crypto
|
||||
|
||||
In MetaMUI, users can create their own DID by submitting their personal information(KYC) to one of the Sidechain Operators, and the operator will decide whether approving or denying the request depending on the status of the submitted data. Once the request is approved, the user’s personal data get hashed, and the hashed data is safely stored in the user’s device.
|
||||
|
||||
* [Identity and authentication in the metaverse](https://venturebeat.com/2022/01/26/identity-and-authentication-in-the-metaverse/) VentureBeat
|
||||
* [Identity and authentication in the metaverse](https://venturebeat.com/2022/01/26/identity-and-authentication-in-the-metaverse/) VentureBeat 2022-01-26
|
||||
|
||||
“The interest of the individual in privacy may not be aligned with their interest in the metaverse provider,” Casey explained. “We have plenty of history of this through current social media. It’s not obvious how these misaligned, structural interests will yield much different results in the metaverse.”
|
||||
|
||||
@ -482,7 +482,7 @@ web3 — which combines the decentralized, communitygoverned ethos of the first
|
||||
|
||||
Building a better internet won't happen by chance or simply maximizing freedom. We have to build systems that support justice. How can we do that?
|
||||
|
||||
* [Who Are We in the Metaverse, and How Do We Prove It?](https://www.coindesk.com/layer2/metaverseweek/2022/05/27/who-are-we-in-the-metaverse-and-how-do-we-prove-it/) Coindesk
|
||||
* [Who Are We in the Metaverse, and How Do We Prove It?](https://www.coindesk.com/layer2/metaverseweek/2022/05/27/who-are-we-in-the-metaverse-and-how-do-we-prove-it/) Coindesk 2022-05-27
|
||||
|
||||
Humans are tribal, we want to belong and integrate ourselves in like-minded communities that are focused on the things we are passionate about. And, just as we have since the dawn of humanity, we submit to our innate urges to form tribes, develop communication standards and protect one another.
|
||||
|
||||
@ -509,7 +509,7 @@ people think a token is an easy way to raise money, which it is, relative to man
|
||||
|
||||
Let’s transition our knowledge from Web2 to Web3 and know which technologies support what.
|
||||
|
||||
* [Who Are We in the Metaverse, and How Do We Prove It?](https://www.coindesk.com/layer2/metaverseweek/2022/05/27/who-are-we-in-the-metaverse-and-how-do-we-prove-it/) Coindesk
|
||||
* [Who Are We in the Metaverse, and How Do We Prove It?](https://www.coindesk.com/layer2/metaverseweek/2022/05/27/who-are-we-in-the-metaverse-and-how-do-we-prove-it/) Coindesk 2022-05-27
|
||||
|
||||
we must work to preserve the freedom of individuals to self-identify by building those technical capabilities into the DNA of Web 3.
|
||||
|
||||
@ -622,11 +622,11 @@ Critique of the SoulBound Tokeh Paper
|
||||
Even little bits of what might be considered ‘mostly harmless’ private information when correlated can present unexpected privacy problems. What this means is that the only information safely applicable for use in a Soul Bound Token is so impersonal as to be of little practical use.
|
||||
|
||||
|
||||
* [Tether, Bitfinex, Hypercore Launch Encrypted Communications Protocol Holepunch](https://www.coindesk.com/tech/2022/07/25/tether-bitfinex-hypercore-launch-encrypted-communications-protocol-holepunch/) Coindesk
|
||||
* [Tether, Bitfinex, Hypercore Launch Encrypted Communications Protocol Holepunch](https://www.coindesk.com/tech/2022/07/25/tether-bitfinex-hypercore-launch-encrypted-communications-protocol-holepunch/) Coindesk 2022-07-25
|
||||
|
||||
Video-calling app Keet, the first app built on Holepunch, will integrate built-in payments powered by Bitcoin's Lightning Network.
|
||||
|
||||
* [Surprise! The metaverse is going to suck for privacy](https://www-theregister-com.cdn.ampproject.org/c/s/www.theregister.com/AMP/2022/07/29/metaverse_privacy_study/) The A Register
|
||||
* [Surprise! The metaverse is going to suck for privacy](https://www-theregister-com.cdn.ampproject.org/c/s/www.theregister.com/AMP/2022/07/29/metaverse_privacy_study/) The A Register 2022-07-29
|
||||
|
||||
“[Exploring the Unprecedented Privacy Risks of the Metaverse](https://arxiv.org/abs/2207.13176)," boffins at UC Berkeley in the US and the Technical University of Munich in Germany play-tested an "escape room" virtual reality (VR) game
|
||||
|
||||
@ -802,13 +802,13 @@ Featuring Verifiable Credentials :)
|
||||
|
||||
Because it’s visual and experiential, the metaverse is “a little bit easier to grasp from a leadership perspective,” said Cutlan. “I don’t know anyone who saw early days blockchain demos and said, ‘I need to show 20 of my friends’.”
|
||||
|
||||
* [IEEE Blockchain Chair Urges Speedy, Collaborative Open Metaverse Deployment](https://wrenchinthegears.com/2022/09/27/ieee-blockchain-chair-urges-speedy-collaborative-open-metaverse-deployment-before-mass-dissent-erupts/) Wrench in the Gears
|
||||
* [IEEE Blockchain Chair Urges Speedy, Collaborative Open Metaverse Deployment](https://wrenchinthegears.com/2022/09/27/ieee-blockchain-chair-urges-speedy-collaborative-open-metaverse-deployment-before-mass-dissent-erupts/) Wrench in the Gears 2022-09-27
|
||||
|
||||
Warning of dystopian nightmares
|
||||
|
||||
DAO
|
||||
|
||||
* [DAOs are not corporations: where decentralization in autonomous organizations matters](https://vitalik.ca/general/2022/09/20/daos.html) Vitalik Buterin
|
||||
* [DAOs are not corporations: where decentralization in autonomous organizations matters](https://vitalik.ca/general/2022/09/20/daos.html) Vitalik Buterin 2022-09-20
|
||||
|
||||
* [A Prehistory of DAOs: Cooperatives, gaming guilds, and the networks to come](https://gnosisguild.mirror.xyz/t4F5rItMw4-mlpLZf5JQhElbDfQ2JRVKAzEpanyxW1Q) GnosisGuild
|
||||
|
||||
|
@ -19,7 +19,7 @@ Fairly decentralized developments in the internet over the past couple of decade
|
||||
|
||||
7/ The ssi-sdk encapsulates self-sovereign identity standards.
|
||||
|
||||
* [What Even Is Web5?](https://www.forbes.com/sites/traceyfollows/2022/06/11/what-even-is-web5/?sh=10900ec05ad2) Forbes
|
||||
* [What Even Is Web5?](https://www.forbes.com/sites/traceyfollows/2022/06/11/what-even-is-web5/?sh=10900ec05ad2) Forbes 2022-06-11
|
||||
|
||||
The actual definition given in the TBD [presentation pack](https://docs.google.com/presentation/d/1SaHGyY9TjPg4a0VNLCsfchoVG1yU3ffTDsPRcU99H1E/edit#slide=id.g11b904107df_0_1) is as follows: “Web5 is a Decentralized Web Platform that enables developers to leverage Decentralized Identifiers, Verifiable Credentials, and Decentralized Web Nodes to write Decentralized Web Apps, returning ownership and control over identity and data to individuals”
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user