decentralized-id.github.io/_posts/identosphere-dump/open-standards/exchange-protocol/didcomm.md
2022-12-04 02:46:02 -05:00

12 KiB
Raw Blame History

published
false

Now that the DIDComm v2 spec is nearing completion, and there are robust libraries in multiple programming languages, we are starting a user group to share learnings as we put DIDComm into production. We will organize community resources, produce a handbook, foster application-level protocol creation, maintain the didcomm.org website and repo, and recommend best practices.

application/pdf attachment: DIDComm_v2_Primer.pdf

DIDComm

  • DIDComm has its own site

    DIDComm lets people and software use DIDs to communicate securely and privately over many channels: the web, email, mobile push notifications, QR codes, Bluetooth, message queues, sneakernet, and more.

Specifications

Explainer

  • Why the Internet Needs DIDComm by Sam Curren presentation
    • Enables Verifiable Communication
    • Intelligence at the edge (like email)
    • Protocol Based (like email)
    • Supports HTTP(s) (like APIs) and others as a transport
    • Bluetooth enables Edge to Edge transport
    • Mobile / Offline Friendly (like email)
    • Supports rotating from one DID to another
    • Security independent of transport
    • Protocol development becomes easier and more robust (unlike email)
  • Decentralized Semantics 101 by Paul Knowles Presentation

    A digital network must contain authenticable data entry and immutable data

    capture elements in order to maintain balance and integrity.

    Within the context of a decentralized network, these fundamentals enable a self-regulating system where ...

    (1) data inputs can be trusted as having come from an assured source under the control of a governing entity; and

    (2) semantic items ensure that the meaning and use of inputted data remains unaltered for all interacting actors.

  • DIDComm and the Self-Sovereign Internet by Phil Windley presentation

    DID-based relationships are the foundation of self-sovereign identity (SSI). The exchange of DIDs to form a connection with another party gives both parties a relationship that is self-certifying and mutually authenticated. Further, the connection forms a secure messaging channel called DID Communication or DIDComm. DIDComm messaging is more important than most understand, providing a secure, interoperable, and flexible general messaging overlay for the entire internet.

  • DIDComm and the Self-Sovereign Internet - Phillip J. Windley, Ph.D., Brigham Young University

    DIDComm is a protocol layer capable of supporting specialized application protocols for specific workflows. Because of its general nature and inherent support for self-sovereign relationships, DIDComm provides a basis for a self-sovereign internet much more private, enabling, and flexible than the one we've built using Web 2.0 technologies. This talk introduces DIDComm, discusses its protocological nature, and presents use cases in the Internet of Things. Demonstrations of DIDComm protocol interactions will be shown on the Pico platform, which implements the Aries Cloud Agent (ACA) specification.

  • Why we need DIDComm IdentityWoman

    This is the text of an email I got today from a company that I had a contract with last year [...] I was reminded quite strongly why we need DIDComm as a protocol to enable the secure transport of all sorts of things not just signed VCs but intermediate uses

Development

  • Trusted P2P Messaging with DIDs, DIDComm and VCs uPort

    about their path towards trusted P2P messaging and announces the DIDAgent Framework (DAF)

    when we speak about a DID, then we need to be more precise and also speak about the particular DID method of that DID which defines the CRUD operations on a target system such as Ethereum.

  • DIDComm Mythconceptions Daniel Hardman

    DIDComm is a peer-to-peer communication technology for SSI (self-sovereign identity) with security and privacy properties rooted in DIDs (decentralized identifiers). Its core value proposition is often misunderstood or oversimplified. This webinar provides a proper mental model.

  • FLOSS WEEKLY 685: DIDS AND DIDCOMM Featuring Sam Curren

    Sam Curren unpacks for Doc Searls and Dan Lynch why DIDs and DIDcomm are the best approach to identity—and to making people first-class citizens on the Internet. Curren also discusses the origin story of picos and the advantages of nomadic living and hacking.

  • Steering Committee approved the DIDComm Messaging Spec (DIDComm v2) @IndicioID

  • DIDComm Messaging

    DIDComm Messaging enables higher-order protocols that inherit its security, privacy, decentralization, and transport independence. Examples include exchanging verifiable credentials, creating and maintaining relationships, buying and selling, scheduling events, negotiating contracts, voting, presenting tickets for travel, applying to employers or schools or banks, arranging healthcare, and playing games.

  • DIDComm v2 reaches approved spec status! DIF Blog

    DIDComm defines how messages are composed into application-level protocols and workflows.

  • Advanced DIDComm Messaging By: Karim Stekelenburg (Animo Solutions) -- karim@animo.id Date: 18-07-2022 Version: 0.1

    in order for DIDComm to provide a potential replacement for commonly used chat protocols like WhatsApp (Extensible Messaging and Presence Protocol (XMPP)), Telegram (MTProto), or Signal (Signal Protocol), it needs to support modern chat features we use everyday

  • DIDComm & DIDComm Messaging Tim Vorgs, DATEV eG

  • Blockchain and Self-Sovereign Identity Empowered Cyber Threat Information Sharing Platform Siddhi

    looks interesting and different - uses DIDComm

    Presented in 7th IEEE International Conference on Smart Computing(IEEE SmartComp 2021)

  • Timo Glastra @TimoGlastra via Twitter

    Just got my first DIDComm protocol published on the https://didcomm.org website.

  • DIDComm: ECDH-1PU Implementation Identity Foundation

In short, ECDH-1PU is a key derivation process that allows for sender authenticity and enables a “Perfect Forward Secrecy” mechanism, in addition to significant performance gains over JWS message nested in a JWE envelope, as used by existign ECDH-ES aproaches.

During the live demo he showed the message lifecycle in various setups using the new, open source didcomm-rs library on GitHub

DIDComm v2

Work Item within DIF right now - envelope format with some other opinions we may or may want. Daniel Hardman gave vision - of parts that are done - leaving behind parts not done.

  • DIDCom V2 Envelops JWEs (a standard that exists)
  • Aries RFCs for payloads that go in JWE envelopes.
  • Send envelopes over HTTP as a starting point

Michale Herman is excited about the new  #VCA (Verifiable Credential Authorization) using the new #VCTPS (Secure Verifiable Credential Transport Protocol) over #DIDCOMM