--- published: false --- # Infographic * [Interesting diagram.](https://twitter.com/i3market_eu/status/1397474556839874563) * [SSI Meme of the week](https://twitter.com/SSI_by_memes/status/1483519684465016833) SSI By Memes * [SSI Memes](https://twitter.com/SSI_by_memes/status/1486979269754601472) * [We need more awerness, that the acceptance of users is crucial for SSI @SSI_by_memes](https://mobile.twitter.com/SSI_by_memes/status/1538819851950628865) * [SSI Architectural Stack and Community Efforts Overview](https://github.com/decentralized-identity/decentralized-identity.github.io/blob/master/assets/ssi-architectural-stack--and--community-efforts-overview.pdf) Rouven Heck * [TDW Decentralized Glossary Management and Collaboration Platform (TDW Glossary): Digital Identity Neighborhood](https://hyperonomy.com/2021/03/15/tdw-glossary-management-and-collaboration-platform-tdw-gmcp-digital-identity-neighborhood/) * [Human Authority](https://www.moxytongue.com/2022/01/human-authority.html) Moxy Marlinspike * [SelfSovereignIdentity_memes @SSI_by_memes](https://twitter.com/SSI_by_memes) Is anonymity good? - lets ask this wife * [Steph oceans404.eth @0ceans404](https://twitter.com/0ceans404/status/1557149888646746113) twitter Self-Sovereign Identity * [Fun fact](https://twitter.com/rileyphughes/status/1563195173055897602) Riley Hughes The 'indy' name was originally short for "independent identity" which was a naming candidate before "self-sovereign" was settled on Harrison Tang on a roll with these short videos. - [#selfsovereignidentity, or #SSI, is the ultimate form of #decentralizedidentity because the power and control lie in tens of billions of person entities like you and me, not just hundreds of thousands of computer network nodes](https://twitter.com/TheCEODad/status/1562157365327118336) TheCEODad - [In my earlier Identity in Web3 talk, I also shared that verifiablecredentials is my favorite identity tech](https://twitter.com/TheCEODad/status/1562986842357526528) TheCEODad ## Infographics * [Cross Community Architecture Survey](https://drive.google.com/file/d/1Cx7px2z9YslvQV1oUuumiHlpnWcsVhIl/view) implemented DID Methods and list cryptographic key types that they support This next graphic comes from [Verifiable Credentials Use Cases](https://www.w3.org/TR/vc-use-cases/)