12 KiB
published |
---|
false |
- announcement: DIDComm user group Hardman, Daniel (Thursday, 20 January)
Now that the DIDComm v2 spec is nearing completion, and there are robust libraries in multiple programming languages, we are starting a user group to share learnings as we put DIDComm into production. We will organize community resources, produce a handbook, foster application-level protocol creation, maintain the didcomm.org website and repo, and recommend best practices.
- slides for DIDComm discussion on Tuesday's CCG call Daniel Hardman (Tuesday, 5 April)
application/pdf attachment: DIDComm_v2_Primer.pdf
DIDComm
- DIDComm has its own site
DIDComm lets people and software use DIDs to communicate securely and privately over many channels: the web, email, mobile push notifications, QR codes, Bluetooth, message queues, sneakernet, and more.
- DIDComm Identity Foundation
- #wg-didcomm on DIF Slack
- decentralized-identity/didcomm-messaging GitHub
- WG Calls Mondays at noon US/Pacific (Agenda
Specifications
- DIDComm Messaging v2.x Editor’s Draft Identity Foundation
- DIDComm v2 spec
Explainer
- Why the Internet Needs DIDComm by Sam Curren presentation
- Enables Verifiable Communication
- Intelligence at the edge (like email)
- Protocol Based (like email)
- Supports HTTP(s) (like APIs) and others as a transport
- Bluetooth enables Edge to Edge transport
- Mobile / Offline Friendly (like email)
- Supports rotating from one DID to another
- Security independent of transport
- Protocol development becomes easier and more robust (unlike email)
- Decentralized Semantics 101 by Paul Knowles Presentation
A digital network must contain authenticable data entry and immutable data
capture elements in order to maintain balance and integrity.
Within the context of a decentralized network, these fundamentals enable a self-regulating system where ...
(1) data inputs can be trusted as having come from an assured source under the control of a governing entity; and
(2) semantic items ensure that the meaning and use of inputted data remains unaltered for all interacting actors.
- DIDComm and the Self-Sovereign Internet by Phil Windley presentation
DID-based relationships are the foundation of self-sovereign identity (SSI). The exchange of DIDs to form a connection with another party gives both parties a relationship that is self-certifying and mutually authenticated. Further, the connection forms a secure messaging channel called DID Communication or DIDComm. DIDComm messaging is more important than most understand, providing a secure, interoperable, and flexible general messaging overlay for the entire internet.
- DIDComm and the Self-Sovereign Internet - Phillip J. Windley, Ph.D., Brigham Young University
DIDComm is a protocol layer capable of supporting specialized application protocols for specific workflows. Because of its general nature and inherent support for self-sovereign relationships, DIDComm provides a basis for a self-sovereign internet much more private, enabling, and flexible than the one we've built using Web 2.0 technologies. This talk introduces DIDComm, discusses its protocological nature, and presents use cases in the Internet of Things. Demonstrations of DIDComm protocol interactions will be shown on the Pico platform, which implements the Aries Cloud Agent (ACA) specification.
- Why we need DIDComm IdentityWoman
This is the text of an email I got today from a company that I had a contract with last year [...] I was reminded quite strongly why we need DIDComm as a protocol to enable the secure transport of all sorts of things not just signed VCs but intermediate uses
Development
-
Trusted P2P Messaging with DIDs, DIDComm and VCs uPort
about their path towards trusted P2P messaging and announces the DIDAgent Framework (DAF)
when we speak about a DID, then we need to be more precise and also speak about the particular DID method of that DID which defines the CRUD operations on a target system such as Ethereum.
-
DIDComm Mythconceptions Daniel Hardman
DIDComm is a peer-to-peer communication technology for SSI (self-sovereign identity) with security and privacy properties rooted in DIDs (decentralized identifiers). Its core value proposition is often misunderstood or oversimplified. This webinar provides a proper mental model.
-
FLOSS WEEKLY 685: DIDS AND DIDCOMM Featuring Sam Curren
Sam Curren unpacks for Doc Searls and Dan Lynch why DIDs and DIDcomm are the best approach to identity—and to making people first-class citizens on the Internet. Curren also discusses the origin story of picos and the advantages of nomadic living and hacking.
-
Steering Committee approved the DIDComm Messaging Spec (DIDComm v2) @IndicioID
-
DIDComm Messaging enables higher-order protocols that inherit its security, privacy, decentralization, and transport independence. Examples include exchanging verifiable credentials, creating and maintaining relationships, buying and selling, scheduling events, negotiating contracts, voting, presenting tickets for travel, applying to employers or schools or banks, arranging healthcare, and playing games.
-
DIDComm v2 reaches approved spec status! DIF Blog
DIDComm defines how messages are composed into application-level protocols and workflows.
-
Advanced DIDComm Messaging By: Karim Stekelenburg (Animo Solutions) -- karim@animo.id Date: 18-07-2022 Version: 0.1
in order for DIDComm to provide a potential replacement for commonly used chat protocols like WhatsApp (Extensible Messaging and Presence Protocol (XMPP)), Telegram (MTProto), or Signal (Signal Protocol), it needs to support modern chat features we use everyday
-
DIDComm & DIDComm Messaging Tim Vorgs, DATEV eG
-
Blockchain and Self-Sovereign Identity Empowered Cyber Threat Information Sharing Platform Siddhi
looks interesting and different - uses DIDComm
Presented in 7th IEEE International Conference on Smart Computing(IEEE SmartComp 2021)
-
Timo Glastra @TimoGlastra via Twitter
Just got my first DIDComm protocol published on the https://didcomm.org website.
-
DIDComm: ECDH-1PU Implementation Identity Foundation
In short, ECDH-1PU is a key derivation process that allows for sender authenticity and enables a “Perfect Forward Secrecy” mechanism, in addition to significant performance gains over JWS message nested in a JWE envelope, as used by existign ECDH-ES aproaches.
- We at Jolocom strongly believe that DIDComm is a crucial infrastructure element for the broader and future-proof SSI stack, and current work on DIDComm v2 includes Jolocom’s implementation of the specification with authcrypt (authenticated encrypted) and most of the low level of the protocol.
- trustbloc/hub-router DIDComm mediator and router with mailbox features.
The TrustBloc hub-router is a working implementation of the Mediator Coordination and the Pickup protocols built using Hyperledger Aries Framework - Go.
- DIDComm Messaging through libp2p uPort
Peers would still use their peer ID for libp2p routing and authentication. Alice and Bob would exchange their DID out of band and will be able to find their counterparty’s peer ID via their DIDs.
- DIDComm Messaging through libp2p Oliver Terbu
We outlined the next generation decentralized messaging solution built on top of DIDComm Messaging, DIDs and VCs and a libp2p overlay network. We presented how Alice and Bob establish a connection, exchange messages and demonstrated what connection types are supported.
- DIF F2FJan21 - DIDComm Demo Session with Ivan Temchenko, Tobias Looker, and Oliver Terbu
During the live demo he showed the message lifecycle in various setups using the new, open source didcomm-rs library on GitHub
-
Aries RFC 0453 - credential issuance protocol using DIDComm V1 data formats
-
Aries RFC 0454 - Present Proof protocol V2 using DIDCommV1 data formats
DIDComm v2
Work Item within DIF right now - envelope format with some other opinions we may or may want. Daniel Hardman gave vision - of parts that are done - leaving behind parts not done.
- DIDCom V2 Envelops JWEs (a standard that exists)
- Aries RFCs for payloads that go in JWE envelopes.
- Send envelopes over HTTP as a starting point
Michale Herman is excited about the new #VCA (Verifiable Credential Authorization) using the new #VCTPS (Secure Verifiable Credential Transport Protocol) over #DIDCOMM