decentralized-id.github.io/unsorted/topics/faq-myth.md
2023-06-23 00:50:18 +05:30

39 lines
3.9 KiB
Markdown
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

---
published: false
---
# Explainer
## Frequently Asked Questions
* [Answering Questions about Self-Sovereign Identity](https://www.windley.com/archives/2019/07/answering_questions_about_self-sovereign_identity.shtml) 2019-07 Phil Windley
> Identity professionals continue to have questions about self-sovereign identity (SSI). In this post, I answer a few questions that Susan Morrow raised about the commercial viability, security, privacy, and desired user experience of SSI.
* [19 FAQs on Verifiable Credentials and Self-Sovereign Identity](https://academy.affinidi.com/faqs-on-verifiable-credentials-and-self-sovereign-identity-3c3a505878bc) 2021-05-31 Affinidi
> This article has some FAQs on the basics of Verifiable Credentials (VCs) and Self-Sovereign Identity (SSI).
## Myth
* [Myths about SSI](https://jolocom.io/blog/myths-about-ssi/) Jolocom
> The idea that as a user of SSI I have complete sovereignty over my digital identity is often misunderstood. At its core, SSI is about my digital identity being under my own control, so I can decide to whom I show my data, when, and for what.
* [myths and facts. Is Self-Sovereign Identity Dangerous?](https://jolocom.io/blog/mythen-und-fakten-ist-self-sovereign-identity-gefahrlich/) Jolocom (in german)
> we examine more closely whether self-sovereign identity can increase or reduce risks for data misuse in certain cases.
* [For traditional identity models, the biggest misconception is “strong passwords”](https://idramp.com/for-traditional-identity-models-the-biggest-misconception-is-strong-passwords/) 2022-07-20 IDRamp
> One way to avoid password-related problems is to use decentralized identity management. This method is relatively new, so the best way to gain knowledge about it contact the experts. For this reason, we are speaking with Mike Vesey, CEO of [IdRamp](https://idramp.com/).
* [7 Myths of Self Sovereign Identity](https://medium.com/evernym/7-myths-of-self-sovereign-identity-67aea7416b1) 2018-10-31 Evernym
> - Self-sovereign means self-attested.
> - SSI attempts to reduce governments power over an identity owner.
> - SSI creates a national or “universal ID” credential.
> - SSI gives absolute control over identity.
> - Theres a “main” issuer of credentials.
> - Theres a built-in method of authenticating.
> - User-centric identity is the same as SSI.
## Big Picture
* [Crossfunctionality](https://docs.centre.io/blog/crossfunctionationality) 2022-08-13 Centre
> I have developed a pet peeve for "technosolutionism": the notion that a sufficiently innovative technology can solve a social problem, or a business problem, without complex and nuanced changes to social and business practice.
* [Unwrapping the Decentralised Identity Landscape](https://www.affinidi.com/post/unwrapping-the-decentralised-identity-landscape) 2022-07-08 Affinidi
> Decentralised identity, an emerging trust framework for digital identity, strives to give data ownership and control back to the user. This framework empowers individuals to own his or her data, decide where to store it, and choose to share some or all of it with others. Often, this decentralised identity is used to create verifiable and shareable data for securely accessing products and services.
* [Understanding Online Identity](https://educatedguesswork.org/posts/understanding-identity/) 2022-06-02 EducatedGuessWork (broad contextualization)
> As noted above, the ergonomics of having to make an account on every new system are fairly bad: it requires the user to have a large number of passwords, which is more opportunities to use a bad password or to lose your password and have to recover. There are some opportunities for improvement around the margin (e.g., WebAuthn instead of passwords for authentication), better form fill-in so users don't have to type their name over and over, etc, but at the end of the day, there's only so much you can do.