30 KiB
title | excerpt | description | image | permalink | canonical_url | redirect_from | categories | tags | last_modified_at | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Self Sovereign Identity (SSI) | In a nutshell, Self-Sovereign Identity allows individuals to manage their own identities by moving physical credentials to digital devices. An individual will receive a credential from an issuer which will be stored in their digital wallet. | Self-sovereign identity is the marriage of real identity with the digital world that will ultimately make people’s lives better. | /images/sovereign-identity.webp | /topic/self-sovereign-identity/ | https://decentralized-id.com/topic/self-sovereign-identity/ |
|
|
|
2023-06-22 |
About Self Sovereign Identity
- The Off Chain Internet: Decentralized Identity & Verifiable Credentials - Evin McMullen 2022-02-19 ETH Denver
FANTASTIC NEW TALK!!!!
i'm excited to share with you a little bit more about the web 3 beyond the chain. Public ledgers are where we hang out most of the time, but the best of web 3 is yet to be because it hasn't yet been built and embraced fully by all of us.
- [Video] Exploring the Decentralized Web, Episode 4: Digital Identity 2022-01-05 Filecoin Foundation
Episode 4 explores the relationship between authentication and authorization, the rise of single sign-on platforms, and the advantages of and use cases for self-sovereign identity. Guests include Brian Behlendorf, Rainey Reitman, Danny O'Brien, Sarah Friend, Wendy Hanamura, Andrew Hill, and Brad Kam.
- #SSI gives its owner control over some aspects of identity, but not all 2021-12-14 Jolocom
Connections, relationships, and third-party issued credentials are not entirely self-sovereign, nor should they be. #JolocomAdvent #AdventCalendar
- A Future Built on Decentralized Identity 2021-12-22 Bloom
Decentralized identity is an emerging concept becoming more popular for online consumers by eliminating the need to pass personal identifiable information (PII) to an ever-increasing number of companies. However, in practice, decentralized identity has only existed for a handful of years, and its potential is still being discovered. So how did we get here?
- SSI Essentials: Everything you need to know about Decentralized Identity 2021-11-29 Gataca
Solving the identity paradox: the tradeoff between privacy, security, & user experience
- Self-Sovereign Identity Crisis 2021-11-23 Lionsgate
Through deceptive marketing practices the first-movers in the Digital ID market have done-away with the sovereignty. As a result a burgeoning new industry is experiencing a Self-Sovereign Identity Crisis.
- [Video] Understanding the SSI Identity Model with Verifiable Credentials 2021-11-13 Manning
Drummond Reed, an expert in Internet identity, security, privacy, and trust frameworks, explains the basic building blocks of SSI and how this new identity model fundamentally works.
- What is Self Sovereign Identity 2021-10-13 Florian Strauf
the digital representation of the identification process we know from the physical world. Things like showing our driver’s license to prove we are allowed to drive, or sending a bank statement to a real estate agent to prove our income and account balance.
- [Video] Is Self Sovereign Identity Going Exponential - With Andrew Baker and A Suprise Guest 2021-10-27 Colin Iles
despite the technological revolution we are living through, identity management is still as objectionable as ever, which is allowing criminals and companies (particularly the social media giants) to know more about you than can ever be justifiable.
In this discussion I ask Andrew Baker, AWS's Head of EC2 Engineering and a surprise guest, to share their views on whether Self Sovereign Identity management could be the solution and how likely it is
- Decentralizing Identity - Taking Back Control 2021-10-13 Madigan Solutions
In a nutshell, Self-Sovereign Identity allows individuals to manage their own identities by moving physical credentials to digital devices. An individual will receive a credential from an issuer which will be stored in their digital wallet.
- What is Self Sovereign Identity 2021-10-13 Florian Strauf
The important thing in SSI is that instead of a stamp on the plastic card, the credential is signed cryptographically by the issuer, enabling anyone to verify who issued the credentials. This makes verification much easier than in the physical world.
- [Video] Self-Sovereign Identity (SSI) Explained 2021-09-13 Animo
In this video, we explain how third parties get to see a lot of personal information about you that they don't really need. Whether it is your local supermarket or your new job, you're often sharing a lot of data when all they really need is a very simple yes or no answer
- Self-Sovereign Identity: a Primer 2021-08-03 Hartmut Obendorf
Digital trust is often centralised, with select, well-known entities providing an anchor of trust that is propagated to everyone else; you are using this mechanism as you read this paragraph, having accessed a https: URL to find this article on your trusted platform, Medium.
- Self-Sovereign Identity: What’s the Big Deal? 2021-07-06 Affinidi, Hackernoon
Do you know where your digital credentials like your full name, date of birth, phone number, government ID, and other Personally Identifiable Information (PII) are stored online, and how they are used?
- A beginner’s guide to self-sovereign identity (SSI) 2021-06-02 Domilabs
An issuer makes claims or assertions about a user. These claims are bundled together into verifiable credentials and given to the user, who stores them in their digital wallet. From there, they can decide which verifiers they want to present these credentials to.
- Distributed, Decentralized, Self-Sovereign Identity 2021-04-22 Condatis
With DID already being implemented, this new and exciting technology is due to shake up the digital identity space. We expect decentralized identity to continue making headway, with more and more sectors and businesses adopting the technology.
- [Video] Karyl Fowler (Transmute) and Juan Caballero (DIF) present Intro to SSI at #IIW31 2020-10 Keryl Fowler, Juan Caballero Slides
Karyl and Juan revisited their slide deck from #IIW30 to give an overview of decentralized identity first as a "philosophy" at the confluence of ideological currents (Juan), and then as a set of specific emerging technologies which unlocks new mental models and business models that are still coming into focus sector by sector (Karyl). There follows a brief overview of educational resources, including some products of DIF's recent educational "content sprint," and a wide-ranging Q&A including podcast recommendations and how to navigate open standards for the first time. The slides are here, in downloadable and hyperlinked PDF form:
- What Is Self-Sovereign Identity? 2020-04-28 Trinsic
Self-sovereign identity is the marriage of real identity with the digital world that will ultimately make people’s lives better.² It’s still in its infancy, and there is a long road ahead to truly make digital identity as legitimate and nuanced as a real-world identity.
- Explaining SSI to C-suite executives, and anyone else for that matter – John Phillips 2020-02-18 SSIMeetup
John Phillips from 460degrees in Australia has been exploring with his team for more than two years for a way to describe Self-Sovereign Identity (SSI) that was easy to understand. We think he has found a good method to make SSI easy to understand for any C-suite executive and business people that goes beyond the technology.
- How Verifiable Creds, Decentralized Identifiers and Blockchain Work Together for a Safer Internet 2021-08-22 Fluree, Hackernoon
Verifiable credentials, DIDs, and blockchain are evidence of what's to come: Web3, a more secure, widespread, machine-to-machine internet.
- Introduction to Decentralized Identity IOTA Wiki
Decentralized Identity or Self-Sovereign Identity (SSI) defines a new method for identity management and authentication. It removes the centralized aspects and puts the Identity subject in full control over its own identity. Decentralized Identity provides a solution for the increasing amount of database breaches, the lack of trust in any digital setting, and the increasingly difficult to comply with privacy legislation, such as GDPR.
- Self-Sovereign Identity — wiki.p2pfoundation 2019-11-13 P2P Foundation
The beauty of sovereignty isn't complete and total control, but rather balance of power that leads to negotiations about the nature of the relationships between various entities in the system."
- Self-Sovereign Identity 2019-06-17 Living Library
Identification document (ID) is a crucial part of every individual’s life, in that it is often a prerequisite for accessing a variety of services — ranging from creating a bank account to enrolling children in school to buying alcoholic beverages to signing up for an email account to voting in an election — and also a proof of simply being.
- [video] What is self-sovereign identity? 2019-05-31 Evernym
- A brief history and overview of self-sovereign identity / decentralized identity
- The top consumer-focused and business-focused benefits of SSI
- Real-world examples of SSI in action
- How organizations can the journey to a decentralized future
- Self-sovereign identity: 3 key questions 2019-03-19 CSO Online
SSI is on the extreme end of the digital identity spectrum. Its focus is putting control back in the hands of you, the user. But SSI is not the only way to skin a cat.
- Self-Sovereign Identity: Shifting the Locus of Control 2019-03-02 Tim Bouma
Simply put, the old (centralized and federated models) the locus of control was between the other parties that could make decisions about me, whether I was in the picture or not. In the new model (self-sovereign identity), the user is put into the centre of his/her own locus of control. See above.
- The Three Models of Digital Identity Relationships — How self-sovereign identity (SSI) is different, and why it’s better 2018-08-24 Timothy Ruff, Evernym
SSI is powerful yet elegant, bold yet familiar, and through it we can finally break free from the paradox of having to sacrifice security for user experience (or vice versa): we can have both, and at levels vastly improved over the status quo. Wonderfully, SSI also has life-altering potential for at-risk populations around the globe.
- Inevitable Rise of Self-Sovereign Identity 2018-03-28
The evolution of internet identity is the result of trying to satisfy three basic requirements:
- Security - the identity information must be protected from unintentional disclosure;
- Control - the identity owner must be in control of who can see and access their data and for what purposes;
- Portability - the user must be able to use their identity data wherever they want and not be tied into a single provide
- Self Sovereign Identity 2018-01-23 Kaliya 'Identity Woman' Young
The Social Human Fabric: This is critical to why we actually are having these breakthroughs woven together to create the open standards for self-sovereign identity to become real. A dedicated group of individuals that have been actively meeting face to face twice a year for over 12 years at the Internet Identity Workshop, and other industry events like the RSA Conference, Cloud Identity Summit and the new kid on the collaboration block Rebooting the Web of Trust.
Aspects of SSI
- GlobaliD 101: Device-based identity 2022-10-05 GlobalID
That way, your sensitive personal data is stored locally on your own device rather than hosted on some company’s server that becomes a target for hackers.
- GlobaliD 101: Bring Your Own Identity 2022-08-30 GlobalID
There is a real opportunity to combine technology that is being developed with the concept of BYO Identity that will create a new identity framework where you own and control your data.
- Part 1: What a smart and humanistic approach to digital identity would like 2022-07-05
- Part 2: The Trust Triangle — the system of issuers, holders, and verifiers that illustrates how identity works (and how it’s broken, today) 2022-07-21
- Part 3: Why the ID Wallet is the first step toward achieving a new vision for digital identity 2022-08-02
- Part 4: Why every company is an identity company 2022-08-16
- Trusted Third Parties vs Self-Sovereign Identity 2021-12-30 Affinidi
All of us have multiple identities at any point. We are sons, daughters, brothers, sisters, parents, partners, friends, colleagues, and more to different people.
- Selective Disclosure: Share Just What You Want 2021-08-02 Affinidi
In the context of SSI, selective disclosure is best implemented through verifiable credentials where the user has separate credentials for each piece of information such as his/her date of birth, full name, vaccination details, address, passport number, etc.
- Self-Sovereign Identity: What You Can/Can’t Do With SSI? 2021-06-24 Affinidi
it gives complete control and ownership of data to the individual entities as they can decide what data to share and with whom.
Beyond this encompassing vision, let’s drill down into the specifics to understand what you can and can’t do with SSI.
- When a user holds his:her own credentials locally on the phone, it creates a three-sided market 2020-12-04 Lissi ID
which puts the holder of the credential in the position of a carrier between issuer and verifiers.
- The Implications of Bring Your Own Identity Identity Defined Security Alliance 2020-12-03
My short stint as “Mark Jannell" taught me a lot of about trust and ease of use in a bring your own identity model. Trust, as always in security, is essential to this new class of relationships and must be established and then protected from abuse. Ease of use, it turns out, is a key factor in protecting that trust and promoting the adoption of good identity patterns. I’m sure that I could have learned these lessons in some other way, but I’ll never forget my half year answering to a pseudonym.
- What is the Trust Triangle? 2021-08-23 Affinidi
The relationship between the issuers, holders, and verifiers is called the trust triangle simply because you need an element of trust among these entities for them to work together.
- A Primer on Functional Identity 2017-08-26 Joe Andrieu rwot05-boston
Unfortunately, digital systems can unwittingly compromise real-world identity. Sometimes this occurs because digital identity systems neglect to consider external effects. Other times, it happens with systems that didn’t even realize they were dealing with identity-related personal information. A functional perspective allows engineers to see beyond static attributes and traditional notions of “Personally Identifiable Information” to better understand how engineering choices can impact identity, even outside their systems.
Security
- What is decentralized identity? 2022-07-06 CSO Online
The DID model allows you to establish a relationship between your private key (your blockchain wallet) and your citizenship. The issuing authority signs off on the truth of your claim and, thereafter, third parties can check your public key to see that the holder of the private key is in fact a British citizen.
- Getting Data Security Right 2022-05-23 Alan Michel
data security is about system-wide design, where many different elements need to fit together to create a working whole.
- Impact of Self-Sovereign Identity on Cybersecurity 2022-04 Security Boulevard
How does this change the world of cybersecurity protection? Typically, bad actors approach cybersecurity attacks by developing solutions that exploit the attack vectors of their target victims.
There are 4 attack vector categories to self-sovereign identity that map directly to each element: Issuer, Holder, Trust Registry and Verifier.
- ID Verification Threats On the Horizon 2022-03-31 Liminal Podcasts
Cognito's CEO Alain Meier joins the State of Identity host Cameron D’Ambrosi to dive into why industries beyond financial services are now in the market for identity verification. They also unpack the impact of synthetic identity fraud across verticals, and how platforms find the balance when building their onboarding processes.
- Security, Silos, and Sovereignty 2021-03-12 Daniel Hardman
Why portable security is the sleeper — but killer — feature for SSI
what’s cool about DIDs (besides their self-service creation) is that their metadata is cryptographically verifiable. That means that anyone in the world can tell whether the metadata is legit, in the blink of an eye, just by asking software to check some math. And it also means that you can build a transport-independent, tamper-proof, encrypted communication channel with whoever controls a DID.
- How Decentralized Identifiers Will Shape the Future of Identity 2020-11-09 HackerNoon
Hackers value personal information the most. 96% of hacking groups’ primary motive is intelligence gathering. Researchers at privacy website PrivacyAffairs.com found that you can obtain a person's full identity for the low price of $1,275.
Literature
- [WhitePaper] Self Sovereign Identity 2022-05-10 Phil Windley, Blockchain Research Institute
In this research, one of the leading experts and thought leaders in the digital identity space brings his latest thinking to enterprise innovators. He explains the value of the relationship view of identity, the nature of authentic digital relationships, the trust bases of identity systems, and the architecture of the identity metasystem, including decentralized identifier communication and the self-sovereign Internet. He then explores how to operationalize digital relationships and the potential of generative identities (e.g., verifiable credentials) and credential exchange. He concludes with a deep dive into self-sovereign identities in production: the UK National Health Service staff passport, Bonifii’s MemberPass for credit unions, the International Air Transport Association Travel Pass, and others. The project is a must-read for enterprise leaders looking to understand their opportunities in identity platforms and applications.
- [Whitepaper] Self-Sovereign Identity Foundations, Applications, and Potentials of Portable Digital Identities 2021-09 Fraunhofer Institute for Applied Information Technology FIT
This paper analyses the SSI paradigm's conceptual characteristics and technical aspects and presents three use cases as examples. It becomes clear that SSI offers advantages in individual control, data security, and full portability of identities between different services. For example, forgeryand tamper-proof digital versions of important personal documents such as ID cards, passports, birth certificates or medical confirmations can be created. However, the use cases are not limited to personal SSI but can also be, for example, digital identities of organizations and physical objects in the context of IoT solutions. This is particularly important in connection with the comprehensive digitization of companies.
- Digital identities – steps on the path to an ID ecosystem 2021-03-18 Bankenverband
This article is very very good in articulating the big picture of how SSI systems relative to older system and emerging fragmetned systems.
An answer to these challenges is an ecosystem in which digital identity data can be exchanged in a way that is secure, reliable, scalable and convenient. This will have a positive impact on the economic future of Germany and Europe while at the same time enhancing the private sphere of the individual.
Background
**Greatly influential on later thinking around digital identity and the **development of Self Sovereign Identity
- Kim Cameron Identity Laws 2005-05-13 IdentityBlog Whitepaper
Summary: Understand the dynamics causing digital identity systems to succeed or fail in various contexts, expressed as the Laws of Identity. Together these laws define a unifying identity metasystem that can offer the Internet the identity layer it needs. (14 printed pages)
**Shows an early use of 'sovereign' in relation to our internet **identities
- What is Sovereign Source Authority? 2012-02
What is required for structural integrity of a Sovereign domain originated of, by, for people?
A recursive signatory is starting point for an accurate self-sourced method that repeats, generation after generation, person after person, such that no second-class process supersedes the inherent requirement for functional Rights.
**The term "Self Sovereign Identity" started becoming widely used in **2014
- The Windhover Principles for Digital Identity, Trust, and Data 2014-09-21 Institute for Data Driven Design
- Self-Sovereignty of Digital Identity and Personal Data: Individuals and groups should have control of their digital personal identities and personal data.
- HubID First to Deploy Windhover Principles and Framework for Digital Identity, Trust and Open Data 2014-10-20
HubID, the self-sovereign digital identity system at the core of Hub Culture and the Ven currency, is the first consumer application to deploy the Windhover Principles and new frameworks for digital identity, trust and open data. The core technology has been in development with the Open Mustard Seed framework and quietly began use in July 2014 following a development announcement with ID3 in January 2014 at the World Economic Forum in Davos.
This article popularized the idea and term Self Sovereign Identity
- The Path to Self-Sovereign Identity 2016-04-25 Christopher Allen Popularized the concept of Self-Sovereign Identity
Since then, the idea of self-sovereign identity has proliferated. Loffreto has blogged how the term has evolved13. As a developer, he shows one way to address self-sovereign identity: as a mathematical policy, where cryptography is used to protect a user’s autonomy and control. However, that’s not the only model. Respect Network instead addresses self-sovereign identity as a legal policy; they define contractual rules and principles that members of their network agree to follow14. The Windhover Principles For Digital Identity, Trust and Data15 and Everynym’s Identity System Essentials16 offer some additional perspectives on the rapid advent of self-sovereign identity since 2012.
Early influential thinking on SSI
- A Technlogy-Free Definition of Self-Sovereign Identity 2016-10 Joe Andrieu
This paper explores what self‐sovereign identity means independent of technology: what people need from independent identity capabilities. I want to understand how such a system enables both individuals whose identities are in play (subjects), as well as those who use those “identities” to correlate interactions across contexts (observers). I start with grounding individual sovereignty in the Enlightenment and identity in its core function of correlation, then propose core characteristics of a self‐sovereign identity system.
- 10 Principles of Self-Sovereign Identity 2016-10-23 Rebooting Web of Trust
- Existence. Users must have an independent existence. Any self-sovereign identity is ultimately based on the ineffable “I” that’s at the heart of identity. It can never exist wholly in digital form. This must be the kernel of self that is upheld and supported. A self-sovereign identity simply makes public and accessible some limited aspects of the “I” that already exists.
- Schutte's Take 2016-10-26 Rebooting Web of Trust (criticism of the 10 principles)
A perceived sense of “a self” is the product that emerges from the interactions of these various agents.
Their coherent operation takes form in the world in ways that enable other actors to treat them as if they were a single actor rather than the complex set of collaborations amongst different processes that they actually are.
Of course, this is a heuristic, and like all heuristics, it may be a useful shortcut, but that doesn’t mean it accurately reflects reality.
In truth, our “self” is constantly interacting with agents both externally and internally, and these transform the functioning (and even the perceived boundaries) of the self.
- The Domains of Identity & Self-Sovereign Identity -- Presentation from Kaliya Young 2018-11-06 New America
Kaliya Young (“The Identity Woman”) explains 16 domains of identity
-variously related to government, civil society, commerce, employment, and the data broker industry-as presented in her recent report. Kaliya then explains how SSI can fundamentally alter the relationships within these domains.
Resources
- animo/awesome-self-sovereign-identity/ 2023-07-07
- WebOfTrustInfo/self-sovereign-id/ 2022-12-07 Rebooting Web of Trust