11 KiB
title | description | excerpt | layout | toc | toc_sticky | permalink | canonical_url | categories | tags | last_modified_at | |||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Critique and Caution regarding Self Sovereign Identity | Is "acceptably non-dystopian" self-sovereign identity even possible? | It is evident that our ongoing discussions about identity, ethics, bias, privacy and consent revolve around a lot of noise (opinions) but little signal (alignment), but why? Recognising that in 30 years of digital identity, we still lack coherent and coordinated action to make it work for everyone is a reality. | single | true | false | /topic/critique-caution/ | https://decentralized-id.com/topic/critique-caution/ |
|
|
2023-06-29 |
Main
- I reckon most cases of over-identification stem either from bad habits 2022-03-10 SteveWilson
(e.g. RPs gathering circumstantial AuthN signals) or from Surveillance Capitalism. Either way, better deals for users will come from better design, not by weaponising Digital Identity (SSI, DIDs).
- Negative press related to DIDs and VCs 2021-06-29 Manu Sporny
These are things that I would expect we would normally just ignore, but I've received a number of private emails over the tweet above from various decision making parties inside the EU requesting that we respond publicly to theses sorts of accusations.
- Chartering work has started for a Linked Data Signature Working Group @W3C Harry Halpin
Hi, I'd like to point out that while there are no peer-reviewed publications on the (lack of) security of the so-called Verifiable Credential architecture and the problems with this kind of standardization of things like "Linked Data Proofs", In fact, published a peer-reviewed article explaining in detail how utterly broken the entire DID and Verified Credential architecture is, and how this is damaging the credibility of the W3C, and it was presented at Mozilla.
- Chartering work has started for a Linked Data Signature Working Group @W3C Harry Halpin
- [Literature] A Critique of Immunity Passports and W3C Decentralized Identifiers 2020-11-30 Harry Halpin
Our analysis shows that this group of technical identity standards are based on under-specified and often non-standardized documents that have substantial security and privacy issues, due in part to the questionable use of blockchain technology. One concrete proposal for immunity passports is even susceptible to dictionary attacks. The use of 'cryptography theater' in efforts like immunity passports, where cryptography is used to allay the privacy concerns of users, should be discouraged in standardization. Deployment of these W3C standards for `self-sovereign identity' in use-cases like immunity passports could just as well lead to a dangerous form identity totalitarianism.
- Blockchain, Self-Sovereign Identity, and Selling Off Humanity 2018-07-15 Wrench in the Gears
I think this piece is full of inaccuracies - it is also put together by someone really trying to understand a whole bunch of different things that some how get merged into being “all that bad blockchain technology that deprives people of dignity and rights” (Kaliya)
It’s time activists began to develop a working knowledge of Blockchain and self-sovereign digital identity, because these are the mechanisms that will drive the transition to IoT monitoring for the purposes of Pay for Success deal evaluation
Sheldrake Vs SSI
- Human identity: the number one challenge in computer science 2022-07-14 Philip Sheldrake
I find that many people working on digital identity today understand their undertaking solely in this bureaucratic context, even if they deny it, and they appear to operate therefore under the illusion that this somehow describes and supports our selves, culture, and nature, or at least has the qualities to do so.
- dystopia of self-sovereign identity 2020-11 Philip Sheldrake
A community is forming under the banner of generative identity. By generative I mean ‘participating as nature’. It denotes a capacity to produce unprompted change, growing not shrinking the possible; a capacity for leverage across a range of tasks, adaptability to a range of different tasks, ease of mastery, and accessibility
- Self Sovereign Identity Critique, Critique. IdentityWoman
if ever there’s a technological innovation for which ‘move fast and break things’ is not the best maxim, this is it.
To think that some how this community who has been working very slowly and diligently for 15 years [...] is some how “moving fast” is preposterous.
- Self-Sovereign Identity Critique, Critique /2
It might be a surprise to you Philip but we have “an identity layer” that is used on the internet right now. It exists and billions use it every day (with standards we created out of the IIW community, Oauth and OpenIDConnect). The problem with it is [...] companies own the identifiers we anchor our digitial representations of ourselves
- Self-Sovereign Identity Critique, Critique /3
When the SSI community refers to an ‘identity layer’, its subject is actually a set of algorithms and services designed to ensure the frictionless transmission of incorruptible messages between multiple parties. This involves some clever mathematics and neat code that will undoubtedly prove of some value in the world with appropriate tight constraints, and it will certainly impact the operation of various conceptualisations of identity, but this is not human identity per se, or the digitalization of human identity. Far from it, as we shall see. – THE DYSTOPIA OF SELF-SOVEREIGN IDENTITY (SSI)
So again. When I say you don’t understand the technology. I am reading things like this and asking myself what is he referring to?
- Self-Sovereign Identity Critique, Critique /4
Philip’s essay has so many flaws that I have had to continue to pull it a part
- Self-Sovereign Identity Critique, Critique /5
before you go pulling out and “waving around” the book Code: And other Laws of Cyberspace and saying “Code is Law” as if his work was a reason to NOT do anything in relationship to digital identity on the internet. He himself proposed an architecture for a certificate based digital identity system for the whole internet.
- Self-Soverieng Identity Critique, Critique /6
What is the point of doing this – to show you are “smart” you aren’t the first guy to show up and say – stop the presses – I have figured out all of identity. “Pay attention to ME”.
- Self-Sovereign Identity Critique, Critique /7
We have now gotten to the Buckminster Fuller section of the document.
- Self Sovereign Identity Critique, Critique. IdentityWoman
- The Generative Self Sovereign Internet 2020-12 Phil Windley
Generativity is a function of a technology’s capacity for leverage across a range of tasks, adaptability to a range of different tasks, ease of mastery, and accessibility.
- Generative Identity 2021-01 Phil Windley
The Generative Self-Sovereign Internet explored the generative properties of the self-sovereign internet, a secure overlay network created by DID connections. [...]
In this article, I explore the generativity of self-sovereign identity—specifically the exchange of verifiable credentials. One of the key features of the self-sovereign internet is that it is protocological—the messaging layer supports the implementation of protocol-mediated interchanges on top of it. This extensibility underpins its generativity.
Caution
- Is "acceptably non-dystopian" self-sovereign identity even possible? 2022-06-10 Molly Wood (Hacker News
as more and more developers and companies and “blockchain visionaries” seek to eschew centralization and trust in the state and institutions, it seems that their definition of “acceptably” when they describe “acceptably non-dystopian” projects is very different from my own.
- [Book] Identity Cycle 2021-11-18 Ian Grigg
Identity Cycle is a book in four parts exploring the nature of identity and how it might or might not fit in a digital world
Oddly, unlike most other innovations, the efforts to build flexible large scale identity systems into the digital domain have more or less flopped. More, in that they did not seem to protect and serve people, and less in that they have done something, even as their original promises were discarded.
- #Identity. Are we (the industry) the problem? 2021-08 MyDigitalFootprint
It is evident that our ongoing discussions about identity, ethics, bias, privacy and consent revolve around a lot of noise (opinions) but little signal (alignment), but why? Recognising that in 30 years of digital identity, we still lack coherent and coordinated action to make it work for everyone is a reality.
- An Examination of the Biases within Commercialized Identity 2021-03-09 Hello User
“There is no discipline for software engineers when it comes to identity and privacy due to the pace at which they are expected to build, but this will likely change because of liabilities and regulation.”
Takeaway #3: A potential side effect of the future of identity management could be a lack of anonymity.
“This exposes that gray area around allowing free speech while maintaining the right to privacy, and who should have access to authentication and verification.”
Takeaway #4: The technology exists to be able to create accountability models as it pertains to identity and to reduce misinformation.
“The challenge is having uncomfortable conversations to address the issues surrounding diversity.”