decentralized-id.github.io/_posts/history/2019-03-04-pre-history-and-resources.md
2020-11-10 03:37:29 -05:00

13 KiB
Raw Blame History

date layout title description excerpt permalink cannonical_url categories tags last_modified_at sidebar classes
2019-03-04 single Decentralized Identity. Pre-history + resources for further exploration. As computers began to proliferate, concern grew over our lack of control over our personal information. Naturally arising through this concern, is to consider ways an individual might have ownership over their personal idenitifier that relates with our personal data. These pages are loosely categorized by year and era. The date ranges, are somewhat arbitrary and not perfectly adhered to, and the headings are not perfect descriptors of those date ranges. Rather those are some major themes occuring within that time period. /history/ https://decentralized-id.com/history/
History
IETF
DPKI
PGP
2020-01-05
nav
didnav
wide

Ultimately, the idea is to put this all into some data-structure, and funnel this information into the identity-commons historical repository:

Here is a community timeline that was created at IIW in 2011 & renewed at IIW 28 in 2019

Category Index

This history behind decentralized identity is loosely categorized by year and era.

Pre-History

  • Sovereignty in Historical Context for Self-Sovereign Identityvideo

    This presentation reflects the first installment of a wider project examining the origins and potential of self-sovereign identity. While the term "self-sovereign identity" has become commonplace within digital identity circles and in the media, what it means in theory and in...

  • A short history of PKI

    The history of the research-development activity of PKI dates back to the renewal of postal and telegraph services at the end of the last century. The modernization was initiated by G·bor Baross, Minister of Commerce. In 1891 PKI was founded by a decree issued by the minister and was the second Post Office Research Station to open in Europe with the task of testing materials used in telegraph and telephone networks to introduce advanced equipment and provide high level services. Its staff included dr. Gyˆrgy BÈkÈsy, a physicist who worked for twenty years for the institute to earn undying merits in acoustics and ultimately to deserve the Nobel prize. In appreciation of its past the Institute, now the development centre of Magyar Telekom, Hungaryís leading telecommunications company, uses the abbreviation of its original name.

    The Institute in 1891 was operating in the Main Office Building of the Hungarian Royal Post Office in P·rizsi Street, then in 1903 moved to the building of a telephone exchange in Nagymező utca. The Institute in 1912 moved in the building in Zombori utca where it operated for 88 years. Network planning activities from 1994 to 2000 were however carried out at a different place, in the former building of the Postal Network Planning Directorate, in RÛna utca.

  • Some Experience with File Transfer - ??
  • "VERY DISTANT" HOST INTERFACE - ??
  • IAB Recommended Policy on Distributing Internet Identifier Assignment and IAB Recommended Policy Change to Internet "Connected" Status
  • Oral History of Elizabeth (Jake) Feinler
  • Establishing Identity Without Certification Authorities (1996) - Carl M. Ellison - CyberCash, Inc

Losing Control Over our Personal Information

  • Security without Identification Transactions Systems to Make Big Brother Obsolete - David Chaum, 1985.

    The large-scale automated transaction systems of the near future can be designed to protect the privacy and maintain the security of both individuals and organizations. Computerization is robbing individuals of the ability to monitor and control the ways information about them is used. As organizations in both the private and the public sectors routinely exchange such information, individuals have no way of knowing if the information is inaccurate, obsolete, or otherwise inappropriate. The foundation is being laid for a dossier society, in which computers could be used to infer individuals life-styles, habits, whereabouts, and associations from data collected in ordinary consumer transactions. Uncertainty about whether data will remain secure against abuse by those maintaining or tapping it can have a “chilling effect,” causing people to alter their observable activities. As computerization becomes mclre pervasive, the potential for these problems will grow dramatically.

    [...]

    The solution is based on an individuals ability to take a specially coded credential issued under one pseudonym and to transform it into a similarly coded form of the same credential that can be shown under the individuals other pseudonyms. -Security without Identification

Roger Clarke - Dataveillance

  • Information Technology and Dataveillance

    The concept of 'dataveillance' is introduced, and defined as the systematic monitoring of people's actions or communications through the application of information technology. Dataveillance's origins are traced, and an explanation provided as to why it is becoming the dominant means of monitoring individuals and populations. The paper identifies, classifies and describes the various dataveillance techniques. It then examines the benefits, and especially the dangers, arising from dataveillance. It considers the intrinsic and extrinsic controls that act to keep the application of dataveillance under control, and suggests some appropriate policy measures.

PGP - Web of Trust

  • Phil Zimmerman creates PGP, 1991.
    • First time strong encryption widely available to general public.
    • PGPs web-of-trust provide early foundation for SSI. However, PGP is known as difficult to use and failed to reach wide adoption for personal communication\identification.
  • Why I wrote PGP
  • PGP -Web of Trust -linux.com
  • PGP Web of Trust: Core Concepts Behind Trusted Communication - Lin...

    Public Key Cryptography infrastructure (PKI) has two main implementations. One is done using certificates and certificate authorities (CAs), and is described in the X.509 standard. It is best suited for structured organizational hierarchies with an implicitly trusted authorit...

  • The PGP Paradigm. by Jon Callas and Philip Zimmermann

    This chapter describes the mechanisms that PGP® software uses for its public key infrastructure. Much has written about PGP and practical public key cryptography. Much of this is to our opinion only mostly accurate. It is our goal in this chapter to describe the PGP models, as well as their implementation, standardization, and use. We also will put this in its historic and political context.

resources

  • Identity Blog
  • History - wiki.idcommons.net
  • Identity Commons-History -wiki.idcommons.net
  • Identity Woman
  • IIW - Past Workshops
  • windley.com/tags/identity
  • Path to Self Sovereign Identity
  • Web of Trust Info - github

    Shared repositories for #RebootingWebOfTrust Design Workshops - Web of Trust Info

  • The Evolution of Internet Identity
  • A Brief History of Digital Identity

    Many histories of digital identity start at the advent of the Internet, but the construction of name spaces is much older.

    Identity in our social systems is less concerned with encapsulating the human and more about the act of naming. As Silicon Valleys Jared Dunn says in a moment of sad wisdom, “a name is just a sound that somebody makes when they need you.” The purpose of these names (or numbers) is to prove the uniqueness of a particular individual, to ensure accountability, and to establish some trust between individuals and institutions, to provide points of reference for the framework of laws and other social contracts that run our society.

  • Identity Management OSS Map - web.archive.org
  • Vendor List - identityaccessmanagement.blogspot.com

    Updated: November 12 2006 I am trying to come up with the list of vendors and associated products in the Identity and Access Management ar...

  • Rebooting digital identity: how the social web is transforming citizen behaviours and expectations - Slideshare - 2012
  • A Step Back in Time: The History and Evolution of Digital Identity

    As Identity 3.0 continues to evolve, fascinating implementations and use cases are on the rise with the most talked-about frontier of the technological landscape: the Internet of Things (IoT).

  • Identity Trust Charter

    To advocate and facilitate open (not closed) internet policy notices and terms that enable people to control personal information. Enabling a rich ecosystem of granualr controls to set personal information free from its current privacy prison.

    Both Consent and Notice are primary tools online used to legally control and administer the flow of personal sharing and disclosure of information online. At this time this policy infrastructure is a relic of the industrial age, broken by surveillance capitalists, and not usable for privacy rights in context with identity management.

The Evolution of Internet Identity from Prabath Siriwardena

open-standards