9.9 KiB
published |
---|
false |
Critique
“There is no discipline for software engineers when it comes to identity and privacy due to the pace at which they are expected to build, but this will likely change because of liabilities and regulation.”
Takeaway #3: A potential side effect of the future of identity management could be a lack of anonymity.
“This exposes that gray area around allowing free speech while maintaining the right to privacy, and who should have access to authentication and verification.”
Takeaway #4: The technology exists to be able to create accountability models as it pertains to identity and to reduce misinformation.
“The challenge is having uncomfortable conversations to address the issues surrounding diversity.”
- A rant about #trust following the terrific discussions at #IDPolicyForum Steve Willson, Lockstep
9/9 "Trust over IP" #ToIP is such a misnomer. It just doesn’t do what it says on the box. @trustoverip
Sheldrake Vs SSI
-
dystopia of self-sovereign identity by Philip Sheldrake
A community is forming under the banner of generative identity. By generative I mean ‘participating as nature’. It denotes a capacity to produce unprompted change, growing not shrinking the possible; a capacity for leverage across a range of tasks, adaptability to a range of different tasks, ease of mastery, and accessibility
- Self Sovereign Identity Critique, Critique. IdentityWoman
if ever there’s a technological innovation for which ‘move fast and break things’ is not the best maxim, this is it.
To think that some how this community who has been working very slowly and diligently for 15 years [...] is some how “moving fast” is preposterous.
- Self-Sovereign Identity Critique, Critique /2
It might be a surprise to you Philip but we have “an identity layer” that is used on the internet right now. It exists and billions use it every day (with standards we created out of the IIW community, Oauth and OpenIDConnect). The problem with it is [...] companies own the identifiers we anchor our digitial representations of ourselves
- Self-Sovereign Identity Critique, Critique /3
When the SSI community refers to an ‘identity layer’, its subject is actually a set of algorithms and services designed to ensure the frictionless transmission of incorruptible messages between multiple parties. This involves some clever mathematics and neat code that will undoubtedly prove of some value in the world with appropriate tight constraints, and it will certainly impact the operation of various conceptualisations of identity, but this is not human identity per se, or the digitalization of human identity. Far from it, as we shall see. – THE DYSTOPIA OF SELF-SOVEREIGN IDENTITY (SSI)
So again. When I say you don’t understand the technology. I am reading things like this and asking myself what is he referring to?
- Self-Sovereign Identity Critique, Critique /4
Philip’s essay has so many flaws that I have had to continue to pull it a part
- Self-Sovereign Identity Critique, Critique /5
before you go pulling out and “waving around” the book Code: And other Laws of Cyberspace and saying “Code is Law” as if his work was a reason to NOT do anything in relationship to digital identity on the internet. He himself proposed an architecture for a certificate based digital identity system for the whole internet.
- Self-Soverieng Identity Critique, Critique /6
What is the point of doing this – to show you are “smart” you aren’t the first guy to show up and say – stop the presses – I have figured out all of identity. “Pay attention to ME”.
- Self-Sovereign Identity Critique, Critique /7
We have now gotten to the Buckminster Fuller section of the document.
- Self Sovereign Identity Critique, Critique. IdentityWoman
-
The Generative Self Sovereign Internet Phil Windley
Generativity is a function of a technology’s capacity for leverage across a range of tasks, adaptability to a range of different tasks, ease of mastery, and accessibility.
-
Generative Identity - Phil Windley
The Generative Self-Sovereign Internet explored the generative properties of the self-sovereign internet, a secure overlay network created by DID connections. [...]
In this article, I explore the generativity of self-sovereign identity—specifically the exchange of verifiable credentials. One of the key features of the self-sovereign internet is that it is protocological—the messaging layer supports the implementation of protocol-mediated interchanges on top of it. This extensibility underpins its generativity.
-
Blockchain, Self-Sovereign Identity, and Selling Off Humanity Wrench in the Gears
I think this piece is full of inaccuracies - it is also put together by someone really trying to understand a whole bunch of different things that some how get merged into being “all that bad blockchain technology that deprives people of dignity and rights” (Kaliya)
It’s time activists began to develop a working knowledge of Blockchain and self-sovereign digital identity, because these are the mechanisms that will drive the transition to IoT monitoring for the purposes of Pay for Success deal evaluation
- The European Declaration on Digital Rights puts people in the firing line of the digital transformation Jaap-Henk Hoepman
By focusing on the risk to individual citizens, the Declaration complete ignores the systemic risks introduced by the digital transformation (and in general the reliance on so called programmable infrastructures, as expressed by Seda Gürses and Martha Poon among others).
“Blockchain” in SSI exists for PR only, not for engineering reasons.
Note: I am only going to talk about the “blockchain” part of Self-sovereign Identity. Many things, good and bad, can be said about self-sovereign identity, but in order to keep the scope of this document manageable, I’ll leave the broader SSI-discussion to others.
- Identity Cycle book by Iang
Identity Cycle is a book in four parts exploring the nature of identity and how it might or might not fit in a digital world
Oddly, unlike most other innovations, the efforts to build flexible large scale identity systems into the digital domain have more or less flopped. More, in that they did not seem to protect and serve people, and less in that they have done something, even as their original promises were discarded.
Philip Sheldrak’s new ANTI- SSI Paper
I find that many people working on digital identity today understand their undertaking solely in this bureaucratic context, even if they deny it, and they appear to operate therefore under the illusion that this somehow describes and supports our selves, culture, and nature, or at least has the qualities to do so.
Response to Kailiya’s post on AnnonCreds
- A response to Identity Woman's recent blog post about Anoncreds Kyle Den Hartog
It’s only when I started to take a step back that I realized that the architecture of Indy being a private, permissioned ledger leaves it heading in the same direction as many large corporations now extinct browser and intranet projects for many of the same reasons.
when we realized our customers were facing critical limitations caused by the underlying tech stack, we began developing an updated version of our platform that would reduce our dependency on these technologies and enable a better platform for our customers.
Great overview @IdentityWoman It matches with many conversations we had in the community in recent years, as well as observations we made ourselves at @GETJolocom. I hope it will help to make these issues more widely discussed and hopefully get them addressed.
Excellent post. No matter how great a tech or framework is, I am always on the lookout for its Achilles’ heel.