11 KiB
layout | title | description | permalink | cannonical_url | categories | tags | last_modified_at | sidebar | classes | ||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
single | Pre-history and resources for further exploration. | As computers began to proliferate, concern grew over our lack of control over our personal information. Naturally arising through this concern, is to consider ways an individual might have ownership over their personal idenitifier that relates with our personal data. | /history/ | https://decentralized-id.com/history/ |
|
|
2020-01-05T13:22:33-23:00 |
|
wide |
Ultimately, the idea is to put this all into some data-structure, and funnel this information into the identity-commons historical repository:
Here is a community timeline that was created at IIW in 2011 & renewed at IIW 28 in 2019
For now, this is a reasonable solution.
Category Index
These pages are loosely categorized by year and era. The date ranges, are somewhat arbitrary and not perfectly adhered to, and the headings are not perfect descriptors of those date ranges. Rather those are some major themes occuring within that time period.
- User Centric Identity - 2000-2009
- Personal Data Ecosystem - 2010-2014
- Blockchain Identity - 2015-2019
Pre-History
- Sovereignty in Historical Context for Self-Sovereign Identity - video
This presentation reflects the first installment of a wider project examining the origins and potential of self-sovereign identity. While the term "self-sovereign identity" has become commonplace within digital identity circles and in the media, what it means in theory and in...
- A short history of PKI
The history of the research-development activity of PKI dates back to the renewal of postal and telegraph services at the end of the last century. The modernization was initiated by G·bor Baross, Minister of Commerce. In 1891 PKI was founded by a decree issued by the minister and was the second Post Office Research Station to open in Europe with the task of testing materials used in telegraph and telephone networks to introduce advanced equipment and provide high level services. Its staff included dr. Gyˆrgy BÈkÈsy, a physicist who worked for twenty years for the institute to earn undying merits in acoustics and ultimately to deserve the Nobel prize. In appreciation of its past the Institute, now the development centre of Magyar Telekom, Hungaryís leading telecommunications company, uses the abbreviation of its original name.
The Institute in 1891 was operating in the Main Office Building of the Hungarian Royal Post Office in P·rizsi Street, then in 1903 moved to the building of a telephone exchange in Nagymező utca. The Institute in 1912 moved in the building in Zombori utca where it operated for 88 years. Network planning activities from 1994 to 2000 were however carried out at a different place, in the former building of the Postal Network Planning Directorate, in RÛna utca.
- Some Experience with File Transfer - ??
- "VERY DISTANT" HOST INTERFACE - ??
- IAB Recommended Policy on Distributing Internet Identifier Assignment and IAB Recommended Policy Change to Internet "Connected" Status
- Oral History of Elizabeth (Jake) Feinler
- Establishing Identity Without Certification Authorities (1996) - Carl M. Ellison - CyberCash, Inc
Losing Control Over our Personal Information
- Security without Identification Transactions Systems to Make Big Brother Obsolete - David Chaum, 1985.
The large-scale automated transaction systems of the near future can be designed to protect the privacy and maintain the security of both individuals and organizations. Computerization is robbing individuals of the ability to monitor and control the ways information about them is used. As organizations in both the private and the public sectors routinely exchange such information, individuals have no way of knowing if the information is inaccurate, obsolete, or otherwise inappropriate. The foundation is being laid for a dossier society, in which computers could be used to infer individuals’ life-styles, habits, whereabouts, and associations from data collected in ordinary consumer transactions. Uncertainty about whether data will remain secure against abuse by those maintaining or tapping it can have a “chilling effect,” causing people to alter their observable activities. As computerization becomes mclre pervasive, the potential for these problems will grow dramatically.
...
The solution is based on an individual’s ability to take a specially coded credential issued under one pseudonym and to transform it into a similarly coded form of the same credential that can be shown under the individual’s other pseudonyms. -Security without Identification
Roger Clarke - Dataveillance
- Information Technology and Dataveillance
The concept of 'dataveillance' is introduced, and defined as the systematic monitoring of people's actions or communications through the application of information technology. Dataveillance's origins are traced, and an explanation provided as to why it is becoming the dominant means of monitoring individuals and populations. The paper identifies, classifies and describes the various dataveillance techniques. It then examines the benefits, and especially the dangers, arising from dataveillance. It considers the intrinsic and extrinsic controls that act to keep the application of dataveillance under control, and suggests some appropriate policy measures.
PGP - Web of Trust
Phil Zimmerman creates PGP, 1991.
-
First time strong encryption widely available to general public.
-
PGP’s web-of-trust provide early foundation for SSI. However, PGP is known as difficult to use and failed to reach wide adoption for personal communication\identification.
-
PGP Web of Trust: Core Concepts Behind Trusted Communication - Lin...
Public Key Cryptography infrastructure (PKI) has two main implementations. One is done using certificates and certificate authorities (CAs), and is described in the X.509 standard. It is best suited for structured organizational hierarchies with an implicitly trusted authorit...
-
The PGP Paradigm. by Jon Callas and Philip Zimmermann
This chapter describes the mechanisms that PGP® software uses for its public key infrastructure. Much has written about PGP and practical public key cryptography. Much of this is to our opinion only mostly accurate. It is our goal in this chapter to describe the PGP models, as well as their implementation, standardization, and use. We also will put this in its historic and political context.
resources
- Identity Blog
- History - wiki.idcommons.net
- Identity Commons-History -wiki.idcommons.net
- Identity Woman
- IIW - Past Workshops
- windley.com/tags/identity
- Path to Self Sovereign Identity
- Web of Trust Info - github
Shared repositories for #RebootingWebOfTrust Design Workshops - Web of Trust Info
- The Evolution of Internet Identity
- A Brief History of Digital Identity
On April 10th, Mattereum hosted the third Internet of Agreements® (IoA) conference at the Google Campus in London, dedicated to the topic…
- Identity Management OSS Map - web.archive.org
- Vendor List - identityaccessmanagement.blogspot.com
Updated: November 12 2006 I am trying to come up with the list of vendors and associated products in the Identity and Access Management ar...
- Rebooting digital identity: how the social web is transforming citizen behaviours and expectations - Slideshare - 2012
- A Step Back in Time: The History and Evolution of Digital Identity
As Identity 3.0 continues to evolve, fascinating implementations and use cases are on the rise with the most talked-about frontier of the technological landscape: the Internet of Things (IoT).
open-standards
- The Story of Open SSI Standards - Drummond Reed/Evernym - Webinar 1 - video - Self Sovereign Identity (SSI) Open standards with Drummond Reed
Drummond Reed, Chief Trust Officer at Evernym and Sovrin Foundation Trustee, features in our first Webinar "The Story of SSI Open Standards" by giving us the background on the foundation of Self Sovereign Identity.
- Identity_Standards: The_Soap Opera* - catch_up_on_previous episodes