decentralized-id.github.io/unsorted/topics/explainer.md
⧉ infominer 16f4771eac sort
2023-06-20 20:52:13 +05:30

54 KiB
Raw Blame History

published
false

Explainer

Self Sovereign Identity

  • What is Self Sovereign Identity 2021-10-13 Florian Strauf

    The important thing in SSI is that instead of a stamp on the plastic card, the credential is signed cryptographically by the issuer, enabling anyone to verify who issued the credentials. This makes verification much easier than in the physical world.

  • #SSI gives its owner control over some aspects of identity, but not all 2021-12-14 Jolocom

    Connections, relationships, and third-party issued credentials are not entirely self-sovereign, nor should they be. #JolocomAdvent #AdventCalendar

  • What are Verifiable Credentials? Why do they matter? 2022-01-10 Fluree

    Authority Does Not Require Centralized Power

    As mentioned in my previous article, the trouble with centralization is that data is stored in a database. Once breached, a database can yield a treasure chest of information to be sold on the dark web.

  • What Are Verifiable Credentials? And How Can They Build Digital Trust? 2022-02-01 Salesforce

    Verifiable credentials and verifiable credential management technology offer a direct and secure channel between an organization and its stakeholders. Learn how they bring control over digital identity and build trust with organizations from health credentials to college degrees.

  • The Decentralized Identity Schelling Point 2023-03-01 Sarah Baldeo

    Back to the Schelling Point - communication requires a common language and understanding. As governments, banks, hospitals, etc. navigate how best to homogenize authenticating user identities in multiple contexts, solutions will depend on user adoption. Maximizing adoption requires avoiding a Schelling point by creating a shared, accessible, and evolving Decentralized Identity Lexicon.

  • [Video] Self-Sovereign Identity (SSI) Explained 2021-09-13 Animo

    In this video, we explain how third parties get to see a lot of personal information about you that they don't really need. Whether it is your local supermarket or your new job, you're often sharing a lot of data when all they really need is a very simple yes or no answer

  • Decentralizing Identity - Taking Back Control 2021-10-13 Madigan Solutions

    In a nutshell, Self-Sovereign Identity allows individuals to manage their own identities by moving physical credentials to digital devices. An individual will receive a credential from an issuer which will be stored in their digital wallet.

  • 17 Things You Should Know About Self Sovereign Identity 2021-10-29 Colin Iles

    lessons I took away from asking tech identity experts Andrew Baker (Head of EC2 Engineering at AWS), our mystery guest and Marius Mare, to why we need self-sovereign identity and why it has such profound implications.

  • [Video] Is Self Sovereign Identity Going Exponential - With Andrew Baker and A Suprise Guest 2021-10-27 Colin Iles

    despite the technological revolution we are living through, identity management is still as objectionable as ever, which is allowing criminals and companies (particularly the social media giants) to know more about you than can ever be justifiable.

    In this discussion I ask Andrew Baker, AWS's Head of EC2 Engineering and a surprise guest, to share their views on whether Self Sovereign Identity management could be the solution and how likely it is

  • Self-Sovereign Identity: a Primer 2021-08-03 Hartmut Obendorf

    Digital trust is often centralised, with select, well-known entities providing an anchor of trust that is propagated to everyone else; you are using this mechanism as you read this paragraph, having accessed a https: URL to find this article on your trusted platform, Medium.

  • Why self-sovereign identity matters 2020-04-29 GlobalID

    your digital identity represents you as a unique real-life person in a secure digital format. In fact, we likely have many different virtual identities across a spectrum of platforms and services.

  • Distributed, Decentralized, Self-Sovereign Identity 2021-04-22 Condatis

    With DID already being implemented, this new and exciting technology is due to shake up the digital identity space. We expect decentralized identity to continue making headway, with more and more sectors and businesses adopting the technology.

  • Introduction to Self-Sovereign Identity 2021-03-28 Jakubkoci

    In this article, I will do my best to explain self-sovereign identity from the end-user perspective, without any technicalities.

  • Kaliya Young on Identikit with Michelle Dennedy 2021-08-25 IdentityWoman

    our latest series examining the evolution of digital identity, and how self-sovereign identity, specifically, can advance a consent-based economy.

  • Decentralized Identity Trilemma

    There seems to exist a trilemma in decentralized identity analogous to @Zooko's triangle. None of the existing solutions are at the same time: 1) privacy-preserving, 2) Sybil-resistant 3) self-sovereign -[T]

  • When a user holds his:her own credentials locally on the phone, it creates a three-sided market 2020-12-04 Lissi ID

    which puts the holder of the credential in the position of a carrier between issuer and verifiers.

  • The Mental Models of Identity Enabled by SSI 2020-12-03 Adrian Doerk The Models: Space Time • Presentation • Attribute • Relationship • Capability
  • Why is SSI becoming a necessity and what potential it holds? 2020-11-12 ACEBlock
    • Natural persons and legal entities interact in the digital world with the same freedom and capacities as in the offline world (e. g. signing, authorizing documents, validating signatures, communicating privately etc.)
    • Data is stored privately on a user device and not replicated numerous times across the digital world.

    In other words, when a user “shares” data, it shares only the access to his/her data. And, as easy as one can do that, they can also revoke it (unless they are legally bound to share it for a certain period).

  • The Implications of Bring Your Own Identity Identity Defined Security Alliance 2020-12-03

    My short stint as “Mark Jannell" taught me a lot of about trust and ease of use in a bring your own identity model. Trust, as always in security, is essential to this new class of relationships and must be established and then protected from abuse. Ease of use, it turns out, is a key factor in protecting that trust and promoting the adoption of good identity patterns. Im sure that I could have learned these lessons in some other way, but Ill never forget my half year answering to a pseudonym.

  • Evolution of Self-Sovereign Identity (SSI) 2021-11-16 LionsGate

    The public keys of the user and the third-party organization for verifying the digital signature are recorded in a distributed ledger, and the user of the identity information verifies the provided information using them. In this way, users can control their own identity information without relying on a specific central administrator.

  • Self-Sovereign Identity Crisis 2021-11-23 Lionsgate

    Through deceptive marketing practices the first-movers in the Digital ID market have done-away with the sovereignty. As a result a burgeoning new industry is experiencing a Self-Sovereign Identity Crisis.

  • Trusted Third Parties vs Self-Sovereign Identity 2021-12-30 Affinidi

    All of us have multiple identities at any point. We are sons, daughters, brothers, sisters, parents, partners, friends, colleagues, and more to different people.

  • A Future Built on Decentralized Identity 2021-12-22 Bloom

    Decentralized identity is an emerging concept becoming more popular for online consumers by eliminating the need to pass personal identifiable information (PII) to an ever-increasing number of companies. However, in practice, decentralized identity has only existed for a handful of years, and its potential is still being discovered. So how did we get here?

  • SSI Essentials: Everything you need to know about Decentralized Identity 2021-11-29 Gataca

    Solving the identity paradox: the tradeoff between privacy, security, & user experience

  • What is Self Sovereign Identity 2021-10-13 Florian Strauf

    the digital representation of the identification process we know from the physical world. Things like showing our drivers license to prove we are allowed to drive, or sending a bank statement to a real estate agent to prove our income and account balance.

  • Self Sovereign Identity Explainer 2021-12-17 DIDAS Swiss (PDF

    The Self Sovereign Identity Explainer (in German) is the basis for the future discussions and in-depth learning. It briefly introduces the development history of digital identity and roughly describes the different phases of identity in the Internet age.

  • What Is Self-Sovereign Identity? 2020-04-28 Trinsic

    Self-sovereign identity is the marriage of real identity with the digital world that will ultimately make peoples lives better.² Its still in its infancy, and there is a long road ahead to truly make digital identity as legitimate and nuanced as a real-world identity.

  • Explaining SSI to C-suite executives, and anyone else for that matter John Phillips 2020-02-18 SSIMeetup

    John Phillips from 460degrees in Australia has been exploring with his team for more than two years for a way to describe Self-Sovereign Identity (SSI) that was easy to understand. We think he has found a good method to make SSI easy to understand for any C-suite executive and business people that goes beyond the technology.

  • Self-Sovereign Identity: The Ultimate Beginners Guide! 2021-02-23 101 Blockchains

    Apart from addressing the pitfalls in conventional identity management systems, SSI allows better functionalities for all users. With a wide range of benefits and the self-sovereign identity blockchain applications, it is important to take a step towards adopting SSI solutions.

  • [Video] Understanding the SSI Identity Model with Verifiable Credentials 2021-11-13 Manning

    Drummond Reed, an expert in Internet identity, security, privacy, and trust frameworks, explains the basic building blocks of SSI and how this new identity model fundamentally works.

  • The 5Ps of a Self-Sovereign Identity 2019-06-05 Dr Mark van Rijmenam

    A self-sovereign identity can be defined by the 5Ps as it is personal (it is about you), portable (meaning you can take your identity and data from one platform to another), private (you control your identity and data), persistent (it does not change without your consent) and protected (they cannot steal your identity).

  • Digital identities steps on the path to an ID ecosystem 2021-03-18 Bankenverband This article is very very good in articulating the big picture of how SSI systems relative to older system and emerging fragmetned systems.

    An answer to these challenges is an ecosystem in which digital identity data can be exchanged in a way that is secure, reliable, scalable and convenient. This will have a positive impact on the economic future of Germany and Europe while at the same time enhancing the private sphere of the individual.

  • Selective Disclosure: Share Just What You Want 2021-08-02 Affinidi

    In the context of SSI, selective disclosure is best implemented through verifiable credentials where the user has separate credentials for each piece of information such as his/her date of birth, full name, vaccination details, address, passport number, etc.

  • A beginners guide to self-sovereign identity (SSI) 2021-06-02 Domilabs

    An issuer makes claims or assertions about a user. These claims are bundled together into verifiable credentials and given to the user, who stores them in their digital wallet. From there, they can decide which verifiers they want to present these credentials to.

  • Self-Sovereign ID (SSI), The Unhackable Digital ID: What It Is and How It Works 2021-04 MemberPass
    • The Siloed Model: The organization owns the member information, not the member.
    • The Federated Model: The identity providers (IDP) owns the member data, not the member.
    • The Best Model: SSI • The members own their own data!
  • [Video] Karyl Fowler (Transmute) and Juan Caballero (DIF) present Intro to SSI at #IIW31 2020-10 Keryl Fowler, Juan Caballero Slides

    Karyl and Juan revisited their slide deck from #IIW30 to give an overview of decentralized identity first as a "philosophy" at the confluence of ideological currents (Juan), and then as a set of specific emerging technologies which unlocks new mental models and business models that are still coming into focus sector by sector (Karyl). There follows a brief overview of educational resources, including some products of DIF's recent educational "content sprint," and a wide-ranging Q&A including podcast recommendations and how to navigate open standards for the first time. The slides are here, in downloadable and hyperlinked PDF form:

  • [Video] Defining Self-Sovereign Identity with Kaliya Young 2021-06-02 Coding Over Cocktails

    In this short preview, "Identity Woman" and digital identity advocate Kaliya Young tackles the issues around self-sovereign identity and how individuals are the rightful points of federation in sharing and controlling their online information.

  • 19 FAQs on Verifiable Credentials and Self-Sovereign Identity 2021-05-31 Affinidi

    This article has some FAQs on the basics of Verifiable Credentials (VCs) and Self-Sovereign Identity (SSI).

  • Self-Sovereign Identity: What You Can/Cant Do With SSI? 2021-06-24 Affinidi

    it gives complete control and ownership of data to the individual entities as they can decide what data to share and with whom.

    Beyond this encompassing vision, lets drill down into the specifics to understand what you can and cant do with SSI.

  • The Basic Building Blocks of SSI 2020-07-29 Drummond Reed, Alex Preukschat Manning

    In many cases these core concepts have been established for decades. Whats new is how theyre put together to create a new model for digital identity management. The purpose of this article is to quickly familiarize you with these seven basic building blocks from a conceptual and technical point-of-view.

    • Verifiable credentials (aka digital credentials)
    • Issuers, holders, and verifiers
    • Digital wallets
    • Digital agents and hubs
    • Decentralized identifiers (DIDs)
    • Blockchains
    • Governance frameworks (aka trust frameworks)
  • How to decentralize identity and empower individuals 2021-07-26 GlobalID

    If the internet decentralized information and crypto decentralized money and payments, then verifiable credentials will decentralize identity. In this episode, we chat with Dev Bharel, the software architect leading the charge around verifiable credentials at GlobaliD.

  • Self-Sovereign Identity: Whats the Big Deal? 2021-07-06 Affinidi, Hackernoon

    Do you know where your digital credentials like your full name, date of birth, phone number, government ID, and other Personally Identifiable Information (PII) are stored online, and how they are used?

  • Bright Story: Self Sovereign Identity 2019-05-05 Brightlands (EN)

    the benefits (The good) of SSI are illustrated with a range of examples, comparing SSI-based business transactions to their current non-SSI-based equivalents and thus more cumbersome.

    In addition, examples are given of the disadvantages (The bad); how SSI technology can be misused by unscrupulous organizations and how a combination of technology, knowledge and legislation could mitigate this risk.

    Finally, we give examples of the harmful side (The ugly); how SSI technology can be used by criminals and what countermeasures are possible.

  • How Verifiable Creds, Decentralized Identifiers and Blockchain Work Together for a Safer Internet 2021-08-22 Fluree, Hackernoon

    Verifiable credentials, DIDs, and blockchain are evidence of what's to come: Web3, a more secure, widespread, machine-to-machine internet.

  • Beyond basics: Expert Q&A about SSI with Dr. Milly Perry and Martin Schäffner 2021-06-01

    In May, Dr. Milly Perry, blockchain expert and former research director at the Open University of Israel, had invited Martin Schäffner, the initiator of the SSI Working Group at the European Blockchain Association, to speak at a webinar of the Israeli Chamber of Information Technology (You can find the recording here). [...] Here is their exchange about Verifiable Credentials, biometrics, pitfalls and barriers, NFTs, the role of governments and the thing that could make SSI obsolete.

  • Self-Sovereign Identity Allows YOU to Control Your Personal Data 2022-12-13 Imageware

    SSI supports credential leveling, including:

    • Authentication Assurance Levels (AAL) 1, 2 & 3
    • Biometrics to protect your data
    • Affirmation/Metadata SSI credentials can be used:
    • In person or online
    • For government, financial, or high trust applications (document verification markets)
    • For asset ownership, decentralized finance (DeFi), and crypto markets

Security

  • Getting Data Security Right Alan Michel

    data security is about system-wide design, where many different elements need to fit together to create a working whole.

  • ID Verification Threats On the Horizon 2022-03-31 Liminal Podcasts

    Cognito's CEO Alain Meier joins the State of Identity host Cameron DAmbrosi to dive into why industries beyond financial services are now in the market for identity verification. They also unpack the impact of synthetic identity fraud across verticals, and how platforms find the balance when building their onboarding processes.

  • How Decentralized Identifiers Will Shape the Future of Identity 2020-11-09 HackerNoon

    Hackers value personal information the most. 96% of hacking groups primary motive is intelligence gathering. Researchers at privacy website PrivacyAffairs.com found that you can obtain a person's full identity for the low price of $1,275.

  • Security, Silos, and Sovereignty 2021-03-12 Daniel Hardman

    Why portable security is the sleeper — but killer — feature for SSI

    whats cool about DIDs (besides their self-service creation) is that their metadata is cryptographically verifiable. That means that anyone in the world can tell whether the metadata is legit, in the blink of an eye, just by asking software to check some math. And it also means that you can build a transport-independent, tamper-proof, encrypted communication channel with whoever controls a DID.

  • Impact of Self-Sovereign Identity on Cybersecurity 2022-04 Security Boulevard

    How does this change the world of cybersecurity protection? Typically, bad actors approach cybersecurity attacks by developing solutions that exploit the attack vectors of their target victims.

    There are 4 attack vector categories to self-sovereign identity that map directly to each element: Issuer, Holder, Trust Registry and Verifier.

Cryptography

Development

  • Comparing X.509 Certificates with SSI Windley

    X.509 certificates have been around for 40 years and have proven to be a trustworthy means of exchanging data. So, what are the differences between X.509 ceritificates and SSI? And what are the advantages of each?

  • [resources] Getting Started with Self Sovereign Identity SSI 2021-03-29

    The blog is my getting started with Self Sovereign identity. I plan to explore developing solutions using Self Sovereign Identities, the different services and evaluate some of the user cases in the next couple of blogs.

  • Bootstrapping a VDR-based Fully Decentralized Object (FDO)/Credential Platform: VON Example 2021-07-26 Hyperonomy

    What are the common/known strategies for bootstrapping a VDR-based decentralized credential/object platform? …asked naively on purpose. Strategies for placing the first/initial DIDs in the VDR?  …presumably purposed to be the initial Issuer(s) of verifiable

  • Challenges to Self-Sovereign Identity 2021-10-11 Damien Bod

    The article goes through some of the challenges we face when using or implementing identity, authentication and authorization solutions using self sovereign identity. I based my findings after implementing and testing solutions and wallets with the following SSI solution providers: Trinsic MATTR.global Evernym Azure Active Directory Verifiable Credentials Different Wallets like Lissi SSI

Germany

  • Decentralization is the Future of Digitization Jolocom

    Digital identity data is introduced as having a positive impact on Germanys future as well as Europes. Following, benefits of a decentralized identity based on a fully open infrastructure are given.

Markets

Education

Architecture

  • Crafting a “no-bs” SSI platform Aditya Santhanarn

    Lets look at a few pointers that I believe make it hard for the web3 protocols to work for businesses and users in general

Atla PRISM

  • [Video] Self-Sovereign Identity (SSI) & Atala PRISM with Allison Fromm Cardano Catalyst Women
    • [0:02:58] What is Identity?
    • [0:04:14] Problems with Digital Identity
    • [0:08:38] Solution: Self-Sovereign Identity (SSI)
    • [0:15:55] Getting Started with SSI: A Catalyst Proposal
    • [0:20:11] Conclusion
    • [0:22:20] Core team
    • [0:24:05] Questions

Reputation

  • [Video] SSI & Proof of Reputation Catalyst Swarm

    Join Frank Albanese (Snapbrillia), Lance Byrd (RootsID), Nick Mason (ProofSpace), Niels Kijf (Design Academy), Patrick Suzzi (F8 OSDE), Juan Sierra (HERG), Zoéys Welt, Brian Harper, Ashton Engberg, Ninh Tran (Snapbrillia) and many others as the community discusses the different what is SSI & Proof of Reputation and why it matters.

Big Picture

Blockchain

GDPR

Government

  • New Encyclopedia entry Self-Sovereign Identity (SSI) Encyclopedia.pub

  • [Whitepaper] Self-Sovereign Identity Foundations, Applications, and Potentials of Portable Digital Identities 2021-09 Fraunhofer Institute for Applied Information Technology FIT

    This paper analyses the SSI paradigm's conceptual characteristics and technical aspects and presents three use cases as examples. It becomes clear that SSI offers advantages in individual control, data security, and full portability of identities between different services. For example, forgeryand tamper-proof digital versions of important personal documents such as ID cards, passports, birth certificates or medical confirmations can be created. However, the use cases are not limited to personal SSI but can also be, for example, digital identities of organizations and physical objects in the context of IoT solutions. This is particularly important in connection with the comprehensive digitization of companies.

  • What is the Trust Triangle? Affinidi

    The relationship between the issuers, holders, and verifiers is called the trust triangle simply because you need an element of trust among these entities for them to work together.

  • [WhitePaper] Self Sovereign Identity Phil Windley, Blockchain Research Institute

    the relationship view of identity, the nature of authentic digital relationships, the trust bases of identity systems, and the architecture of the identity metasystem, including decentralized identifier communication and the self-sovereign Internet. He then explores how to operationalize digital relationships and the potential of generative identities (e.g., verifiable credentials) and credential exchange. He concludes with a deep dive into self-sovereign identities in production: the UK National Health Service staff passport, Bonifiis MemberPass for credit unions, the International Air Transport Association Travel Pass, and others.

  • The Era of Self-Sovereign Identity ChakRay

    Similar actions conducted in person do not represent the same amount of risk. For example, if someone asks you to verify your identity, we show our ID or drivers license, and when you pay at the store, you provide your bank card. In this way, the control and the ownership of the data stays with you.

  • Blockchain Self-Sovereign Identity: True Control Of Your Identity Komodo Platform

    The adoption of verifiable credentials is another fundamental part of the SSI concept. Verifiable credentials use a digital signature for identity claims by combining public-key hashing cryptography and privacy-protection techniques to convert credentials like ID cards to digital versions.

  • [Video] Exploring the Decentralized Web, Episode 4: Digital Identity Filecoin Foundation

    Episode 4 explores the relationship between authentication and authorization, the rise of single sign-on platforms, and the advantages of and use cases for self-sovereign identity. Guests include Brian Behlendorf, Rainey Reitman, Danny O'Brien, Sarah Friend, Wendy Hanamura, Andrew Hill, and Brad Kam.

Presentation: https://bit.ly/3OmuIRx

Podcast: Digital Identity and Self Sovereignty Kaliya Young & Lucy Yang -Future of You

  • The tools Kaliya and Lucy are developing to enable self-sovereign identities
  • Whether anonymity or pseudonymity is feasible while maintaining accountability
  • Wallet Wars: how might wallets evolve and consolidate across the public and private sector
  • myths and facts. Is Self-Sovereign Identity Dangerous? Jolocom (in german)

    we examine more closely whether self-sovereign identity can increase or reduce risks for data misuse in certain cases.

  • Digital Identity Conspiracies ContinuumLoop

    The only ones who will benefit from your digital ID are the Issuer (who gave you the credential), holder (you) and verifier (who youre sharing it with).

  • What is Self-Sovereign Identity? Tangle Labs

  • SteveWilson Considering SSI critics

    I reckon most cases of over-identification stem either from bad habits (e.g. RPs gathering circumstantial AuthN signals) or from Surveillance Capitalism. Either way, better deals for users will come from better design, not by weaponising Digital Identity (SSI, DIDs).

  • Understanding Verifiable Credentials Credivera

    The value of verifiable credentials and the critical role they will play to our future digital identities is undeniable. As we enter a new era of online representation, trust in the internet will need to be vigorously robust.

  • Never mind who I am, ask me about my credentials John Phillips

    Many (most) identity systems make a fundamental assumption that is built into their very architecture. This assumption creates three significant problems: privacy erosion; toxic data stores; and poor security.

  • Digital Identity Convenience Christine Martin, Continuum Loop

    You will take back control of your identity and hold it. Not Facebook, not Google, and you will decide what credentials to share on a need-to-know basis. We dont have to be scared of the shift; we have to ensure the architecture is built ethically for all

  • Understanding Verifiable Credentials by Credivera

    The value of verifiable credentials and the critical role they will play to our future digital identities is undeniable. As we enter a new era of online representation, trust in the internet will need to be vigorously robust.

  • Rewiring the Internet with Self-Sovereign Identities.

    In “Self-Sovereign Identity,” Johannes Sedlmeir makes a clear distinction between two concepts too often mixed: “identity” and “identifiers”. What we are experiencing in todays Web are some external organizations identifying us as citizens, community members, customers, etc. But this isnt our “identity.” Those are identifiers.

  • Digital Identities and Verifiable Credentials Johannes Sedlmeir • Reilly Smethurst • Alexander Rieger • Gilbert Fridgen Published October 2021

  • Myths about SSI Jolocom

The idea that as a user of SSI I have complete sovereignty over my digital identity is often misunderstood. At its core, SSI is about my digital identity being under my own control, so I can decide to whom I show my data, when, and for what.