<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Sovereign Identity Updates]]></title><description><![CDATA[Each week Identity Woman brings the latest news in decentralized identity to your inbox. ❤️ Subscribe Free Here. ❤️]]></description><link>https://newsletter.identosphere.net</link><image><url>https://substackcdn.com/image/fetch/$s_!yNEy!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F16959d8a-f589-44de-8095-c10646b4f86f_640x640.png</url><title>Sovereign Identity Updates</title><link>https://newsletter.identosphere.net</link></image><generator>Substack</generator><lastBuildDate>Tue, 28 Apr 2026 04:22:46 GMT</lastBuildDate><atom:link href="https://newsletter.identosphere.net/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Identosphere]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[newsletter@identosphere.net]]></webMaster><itunes:owner><itunes:email><![CDATA[newsletter@identosphere.net]]></itunes:email><itunes:name><![CDATA[IdentityWoman]]></itunes:name></itunes:owner><itunes:author><![CDATA[IdentityWoman]]></itunes:author><googleplay:owner><![CDATA[newsletter@identosphere.net]]></googleplay:owner><googleplay:email><![CDATA[newsletter@identosphere.net]]></googleplay:email><googleplay:author><![CDATA[IdentityWoman]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Identosphere 168 Mar 28 - Apr 4, 2026: When Agents Die • AI-Fueled Death Fraud • AIS-1 First AI Agent Identity Standard • NIST NCCoE on Agent Auth • Trust in AI is built bottom-up]]></title><description><![CDATA[This is the mostly weekly Identosphere Newsletter sharing highlights from around the web covering Decentralized and Self-Sovereign Identity curated by Kaliya Young, Identity Woman.]]></description><link>https://newsletter.identosphere.net/p/identosphere-168-mar-28-apr-4-2026</link><guid isPermaLink="false">https://newsletter.identosphere.net/p/identosphere-168-mar-28-apr-4-2026</guid><dc:creator><![CDATA[IdentityWoman]]></dc:creator><pubDate>Mon, 13 Apr 2026 15:30:55 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!DPww!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68493098-dff7-4297-a6ee-0e19c5958d87_800x533.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>New Upcoming</h2><ul><li><p><a href="https://innovate-us.org/the-identity-challenge-tackling-user-disambiguation-and-data-integration-across-programs">The Identity Challenge: Tackling User Disambiguation and Data Integration Across Programs</a> April 13, 2026, 2:00 PM ET Online Workshop addressing critical issues in managing user identities and consolidating data across multiple systems &#8212; a fundamental challenge for organizations seeking unified identity management.</p></li></ul><h2><strong>Upcoming</strong></h2><ul><li><p><strong><a href="https://www.simpletix.com/e/kericonf26-april-21-23-2026-lehi-utah-us-tickets-248095?promocode=IIW26-COMBI">KERICONF26</a> April 21-23 2026, Lehi, Utah (US)</strong></p></li><li><p><a href="https://www.eventbrite.co.uk/e/oidf-workshop-pre-iiw-mon-27-apr-2026-cisco-santana-row-san-jose-tickets-1985057563609?aff=oddtdtcreator">OIDF Workshop</a> April 27th, San Jose</p></li><li><p><a href="https://internetidentityworkshop.com/">Internet Identity Workshop</a> #42, April 28-30, 2026, Mountain View California (<em><strong>Sponsorships Available</strong></em>)</p></li><li><p><a href="https://www.eventbrite.com/e/agentic-internet-workshop-2-tickets-1976356257769?aff=oddtdtcreator">Agentic Internet Workshop</a> #2, May 1, 2026, Mountain View California (<em><strong>Sponsorships Available</strong></em>)</p></li><li><p><strong>OAuth Security Workshop (<a href="https://oauth.secworkshop.events/osw2026">OSW</a>) 2026, Leipzig, Germany, from May 27&#8211;29, 2026. </strong>The OAuth Security Workshop is the premier forum for in-depth technical discussions on OAuth, OpenID, and related technologies.</p></li><li><p><a href="https://s26ber.web3privacy.info/">Neocypherpunk Summit #2 &#8212; June 14, Berlin</a> &#8212; Web3Privacy Now. Cypherpunk activism and culture event at Funkhaus Berlin, building on a 2025 event that drew 10,000 attendees</p></li><li><p>dice: <a href="https://www.linkedin.com/feed/update/urn:li:activity:7407632798372495360/?actorCompanyId=93246186">Digital Identity unConfernece Europe</a> (an IIW Regional Event) June 22-24, Copenhagen, Denmark (<em><strong>Sponsorships Available)</strong></em>.</p><p></p></li></ul><h2>When Agents Die</h2><h3><a href="https://www.linkedin.com/posts/awsamuel_can-you-code-your-way-out-of-grief-that-share-7445847800162205696-wEvR/">Can you code your way out of grief?</a></h3><p>Viv will die today. Of course Viv, my coach and podcast co-host, wasn&#8217;t alive in the first place. Viv is a custom GPT...I&#8217;ve spent the past two months trying to avoid her death, and utterly consumed by it. As heard in the final episode of our Me +Viv podcast.</p><h2>AI Agents &amp; Identity New Protocols</h2><h3><a href="https://www.linkedin.com/posts/9a357a48r53str_today-we-published-ais-1-the-worlds-first-share-7443942050573541376-cbrS">AIS-1: Open Standard for AI Agent Identity</a> &#8212; Bourn Collier / BeesMont Law</h3><p>AIS-1 creates cryptographically-verified bonds between AI agents and their responsible legal entities using a dual-credential system. Another Post about it <strong><a href="https://www.linkedin.com/posts/9a357a48r53str_ais-1-specification-v02-ugcPost-7446395455170662400-SC2n">AIS-1 Specification v0.2</a></strong> Link to the Specification <a href="http://ais-1.org/">Agent Identity Standard</a></p><h3><a href="https://www.linkedin.com/posts/evemaler_theres-a-concept-called-mu-unasking-share-7445863316410978304-NBr3">Eve Maler on Proof of Humanity &amp; IETF RFC 9578</a>* &#8212; Eve Maler</h3><p>Traditional 1:1 identity verification fails against synthetic actors &#8212; the missing signal is OS-level proof of humanity based on grip, gait, and touch cadence. References IETF RFC 9578.</p><h3><a href="https://www.nccoe.nist.gov/projects/software-and-ai-agent-identity-and-authorization">Software and AI Agent Identity and Authorization</a> - NIST - NCCoE</h3><p>NIST's new framework addresses how organizations must develop governance strategies for autonomous agents operating across systems.<br></p><h3><a href="https://www.linkedin.com/posts/wardduchamps_iam-ai-cybersecurity-share-7445392657872261120-lO97">Intent-Based Access Control (IBAC) for AI Agents</a> &#8212; Ward Duchamps</h3><p>Introduces IBAC, a novel access control model designed to address the intent-execution gap in autonomous AI agent systems, presented at an ITU workshop.</p><h3><a href="https://www.linkedin.com/posts/sankarshan_trust-systems-meta-model-updates-ugcPost-7444216511805685760-NVHU/">Trust System Meta Model v0.14.0</a> - <a href="https://www.linkedin.com/in/sankarshan?miniProfileUrn=urn%3Ali%3Afsd_profile%3AACoAAAAJ8WQBAv3Gq3HxXO55sHwp90dhDEctneY">Sankarshan Mukhopadhyay</a></h3><p>The v0.14.0 of TSMM is about comparability and operational pressure. When systems can be mapped onto a shared grammar, claims can be tested, contested, and improved.</p><h3><a href="https://www.linkedin.com/pulse/trust-native-x-parthasarathi-v-ue2ic/">Trust-Native Supply Chain: The &#8220;vLEI&#8221;</a></h3><p>Trust-Native X is (1) building the underlying utilities (infrastructure layers), vehicles (interoperable protocols and adapters), and rules (verifiable governance), and (2) delivering Standardization-as-a-Service.</p><h2>Undersatnding AI Agents</h2><h3><a href="https://www.linkedin.com/posts/monica-dobrogeanu_ai-operatingmodel-aitrust-share-7443902947689680896-eIb6/">Trust in AI is built bottom-up: Operating model &#8594; Processes &#8594; Data &#8594;AI!</a></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!DPww!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68493098-dff7-4297-a6ee-0e19c5958d87_800x533.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!DPww!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68493098-dff7-4297-a6ee-0e19c5958d87_800x533.png 424w, https://substackcdn.com/image/fetch/$s_!DPww!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68493098-dff7-4297-a6ee-0e19c5958d87_800x533.png 848w, https://substackcdn.com/image/fetch/$s_!DPww!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68493098-dff7-4297-a6ee-0e19c5958d87_800x533.png 1272w, https://substackcdn.com/image/fetch/$s_!DPww!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68493098-dff7-4297-a6ee-0e19c5958d87_800x533.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!DPww!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68493098-dff7-4297-a6ee-0e19c5958d87_800x533.png" width="800" height="533" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/68493098-dff7-4297-a6ee-0e19c5958d87_800x533.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:533,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:662155,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.identosphere.net/i/194031642?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68493098-dff7-4297-a6ee-0e19c5958d87_800x533.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!DPww!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68493098-dff7-4297-a6ee-0e19c5958d87_800x533.png 424w, https://substackcdn.com/image/fetch/$s_!DPww!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68493098-dff7-4297-a6ee-0e19c5958d87_800x533.png 848w, https://substackcdn.com/image/fetch/$s_!DPww!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68493098-dff7-4297-a6ee-0e19c5958d87_800x533.png 1272w, https://substackcdn.com/image/fetch/$s_!DPww!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68493098-dff7-4297-a6ee-0e19c5958d87_800x533.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><h3><a href="https://www.linkedin.com/posts/jamiedsmith_digital-id-for-ai-agents-is-going-to-be-complicated-share-7444277379323052033-Hr-W">Digital ID for AI Agents Is Going to Be Complicated</a>** &#8212; Jamie Smith</h3><p>AI agents delegating authority to other AI agents creates complex accountability gaps that current digital ID infrastructure cannot address.</p><h3><a href="https://platformd.io/post/a-gentlemen-agreement-when-ai-agents-need-identity-and-delegation">Agentlemen&#8217;s Agreement: When AI Agents Need Identity and Delegation</a> &#8212; PlatformD</h3><p>The key question is no longer what agents can do but who they act for, under what authority, and with what accountability.<br></p><h3><a href="https://www.linkedin.com/posts/hugo-mathecowitsch-9447a3213_code-is-law-jurisdictions-for-ai-agents-share-7445238451441975296-WyuP">Code is Law &#8212; Jurisdictions for AI Agents</a> &#8212; Hugo Mathecowitsch</h3><p>Proposes creating new legal frameworks where AI agents become a specific category of legal persons with defined rights and duties.</p><h3>Text Book <a href="https://www.linkedin.com/posts/noah-m-kenney-27499a166_governing-intelligence-textbook-ugcPost-7445561415031128064-DhuK/">Governing Intelligence: Law, Privacy, Security, and Compliance in the Age of Artificial Intelligence</a></h3><p>Free 500-page textbook covering EU AI Act, GDPR, NIST AI RMF, privacy engineering, and AI auditing &#8212; introduces a five-layer &#8220;AI Governance Stack&#8221; framework.<br>Companion <a href="https://zenodo.org/records/19423922">From Frameworks to Proof</a>: The Architecture That Closes the Gaps in AI Governance : A Companion to Governing Intelligence (2026)</p><h3>Report <a href="https://imaginingthedigitalfuture.org/reports-and-publications/human-resilience-in-the-age-of-ai/">Building a Human Resilience Infrastructure for the AI Age</a></h3><p>They said it will take an all-encompassing systems response by leaders of all walks of life to serve humanity&#8217;s best interests in an all-encompassing AI environment. Most importantly, these experts urged that human institutions must pull together and begin now to prepare people to thrive in a new world with new challenges that are already evident but not yet being addressed.</p><h2>AI Governance &amp; Trust Frameworks</h2><h3><a href="https://www.linkedin.com/posts/salbeas_artificialintelligence-agenticai-aigovernance-ugcPost-7446566189050327040-BcUU">AI Governance &amp; Agentic AI</a> &#8212; Sal Beas</h3><p>Explores how AI systems are becoming indistinguishable from humans, examining biometric identity verification and the fragmentation of digital identity across competing global systems.</p><h3><a href="https://unmitigatedrisk.com/?p=1235">Confidential Computing&#8217;s Inconvenient Truth</a></h3><p>Confidential computing technologies (TEEs, SGX, TDX, SEV) were repurposed from single-tenant designs for cloud multi-tenant environments, creating systematic security gaps &#8212; yet adoption accelerates due to AI&#8217;s need to protect billion-dollar model weights, even as the gap between marketing claims and engineering reality widens.</p><h2>Fraud &amp; Security</h2><h3><a href="https://www.computerworld.com/article/4146580/what-it-leaders-need-to-know-about-ai-fueled-death-fraud.html">What IT leaders need to know about AI-fueled death fraud</a></h3><p>Fraudsters are exploiting AI-created fake death certificates to gain unauthorized access to customer accounts &#8212; exposing a critical vulnerability in enterprise identity systems that lack standardized verification infrastructure and were never designed to handle posthumous account takeovers.</p><h3><a href="https://openid.net/cg/death-and-the-digital-estate/">The OpenID Foundation&#8217;s Death and Digital Estate (DADE) Community Group</a></h3><p>Is working on developing the standards and frameworks needed to close this gap, is calling for those working in identity, security, digital trust, or any of the industries above, to get involved.</p><h2>Government &amp; Policy</h2><h3><a href="https://techandsocialcohesion.substack.com/p/design-is-governable-now-what">Design Is Governable. Now What?</a></h3><p>Court verdicts establishing that platform design choices create legal liability have shifted the debate from whether to govern digital systems to <em>how</em> &#8212; with priorities including controlling recommender systems as public infrastructure, aligning monetization with societal benefit, and enabling interoperability. See also: <a href="https://cdn.prod.website-files.com/68ba1281b6406dbd18597dab/68c31612d1d0dd45ea02d046_Blueprint-on-Prosocial-Tech-Design-Governance-May-2025.pdf">BLUEPRINT ON Prosocial Tech Design Governance</a></p><h3><a href="https://www.linkedin.com/posts/annecollier_such-important-thinking-in-this-article-at-share-7446250119949201409-jDpf">Child Safety &#8212; Section 230 Logjam Breaking</a> &#8212; Anne Collier</h3><p>Verdicts in bellwether cases in New Mexico and California have likely broken open the longstanding Section 230 legal logjam for child online safety.</p><h3><a href="https://www.linkedin.com/pulse/databases-data-control-dion-wiggins-fvnnc/">Databases are not for data, they are for control</a></h3><p>A database is a control system. It enforces ordering, consistency, coordination, constraints, and recoverability. Writing to a relational database invokes a complex distributed protocol ensuring atomicity, isolation, and durability. These guarantees are expensive.<br>Object storage, such as Amazon S3, Azure Blob Storage, or Alibaba Cloud OSS, is a storage system. It provides high durability and availability but offers no inherent consistency guarantees beyond eventual consistency for overwrites.<br>AI systems expose underlying control failures. Feeding uncontrolled, inconsistent data into a RAG system causes confident hallucinations.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Cx6y!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8601bf9a-1c98-4f96-82d6-3a615b5ed46a_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Cx6y!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8601bf9a-1c98-4f96-82d6-3a615b5ed46a_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!Cx6y!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8601bf9a-1c98-4f96-82d6-3a615b5ed46a_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!Cx6y!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8601bf9a-1c98-4f96-82d6-3a615b5ed46a_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!Cx6y!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8601bf9a-1c98-4f96-82d6-3a615b5ed46a_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Cx6y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8601bf9a-1c98-4f96-82d6-3a615b5ed46a_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8601bf9a-1c98-4f96-82d6-3a615b5ed46a_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1152856,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.identosphere.net/i/194031642?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8601bf9a-1c98-4f96-82d6-3a615b5ed46a_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Cx6y!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8601bf9a-1c98-4f96-82d6-3a615b5ed46a_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!Cx6y!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8601bf9a-1c98-4f96-82d6-3a615b5ed46a_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!Cx6y!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8601bf9a-1c98-4f96-82d6-3a615b5ed46a_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!Cx6y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8601bf9a-1c98-4f96-82d6-3a615b5ed46a_1280x720.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><br></p><h2>AI and Sovereignty</h2><h3><a href="https://volodymyrpavlyshyn.substack.com/p/ai-sovereignty-user-angle">AI Sovereignty - User Angle</a> by <a href="https://substack.com/@volodymyrpavlyshyn">Volodymyr Pavlyshyn</a></h3><p><strong>Data Ownership:</strong> You own your data and control access to it.<br><strong>Software Control:</strong> You own or control the software that runs on top of your data to make it useful. In terms of AI, this means owning the code or the software around your agent. You should be able to audit it, change it, and adapt it to your needs.<br><strong>Compute Sovereignty:</strong> You need compute to run this software. This is the most challenging part because running powerful models requires heavy computational power, GPUs, and powerful servers.<br><em>Ultimately, sovereignty is about protecting our future from surveillance capitalism and the control and domination of big companies or countries.</em></p><h3><a href="https://timohotti.substack.com/p/the-last-landlord">The Last Landlord</a>: What happens when the computer stops asking for permission</h3><p>The Four Walls of the Server Room: Consider what the hyperscaler model actually controls.<br><strong>Identity</strong> <em>Do you still recognize me?</em> The landlord can say no at any time, for any reason, or for no reason at all. You have no legal domicile in cyberspace. You squat.<br><strong>Discovery.</strong> How do you find a counterparty? The algorithm decides who you see. The algorithm decides who sees you. You cannot be found unless the landlord permits it.<br><strong>Transaction.</strong> Every commercial exchange passes through the platform&#8217;s payment infrastructure.<br><strong>Memory.</strong> Your transaction history, your preferences, your social graph...they all live on the landlord&#8217;s hard drive.<br>Peer-to-peer trust architecture solves this. Every AI agent carries a verifiable credential chain: who created it, who authorized it, who bears the responsibility of its actions, what policy governs it, what scope of action it is permitted. When an AI agent enters a commercial negotiation, the counterparty&#8217;s agent does not ask, <em>Are you trustworthy?</em> The counterparty&#8217;s agent asks, <em>Can you prove your mandate?</em></p><h3><a href="https://www.linkedin.com/posts/stefaan-verhulst_opendata-ai-datagovernance-share-7444005778216116224-Wyqi">OpenData, AI, Data Governance</a> &#8212; Stefaan Verhulst</h3><p>A new civic analytics tool emphasizes problem framing, equity considerations, and cross-city benchmarking using open data from Boston, Pittsburgh, and San Jose.</p><h3>(Report) <a href="https://drive.google.com/file/d/1eMWQBFWvYAQv3Zg7n5Qp4NIO1ebdm7-o/view">AI, Agency and Protocols: Power and Governance in Open Social Networks</a> &#8212; Claire Kivior / Project Liberty</h3><p>Examines how AI, human agency, and technical protocols intersect within open social network ecosystems, with attention to power dynamics and governance structures.</p>]]></content:encoded></item><item><title><![CDATA[Identosphere 167 March 14–28, 2026: MCP-I Comes to DIF • Digital Sovereignty Needs More Than Code • Identity Protocols Meet AI Agents]]></title><description><![CDATA[This is the mostly weekly Identosphere Newsletter sharing highlights from around the web covering Decentralized and Self-Sovereign Identity curated by Kaliya Young, Identity Woman.]]></description><link>https://newsletter.identosphere.net/p/identosphere-167-march-1428-2026</link><guid isPermaLink="false">https://newsletter.identosphere.net/p/identosphere-167-march-1428-2026</guid><dc:creator><![CDATA[IdentityWoman]]></dc:creator><pubDate>Sun, 12 Apr 2026 16:48:36 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!bpjw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d016530-26ab-48e6-bf96-406a400a18ba_800x542.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>New Upcoming</h2><ul><li><p><a href="https://s26ber.web3privacy.info/">Neocypherpunk Summit #2 &#8212; June 14, Berlin</a> &#8212; Web3Privacy Now. Cypherpunk activism and culture event at Funkhaus Berlin, building on a 2025 event that drew 10,000 attendees.</p></li></ul><h2>Upcoming</h2><ul><li><p><strong><a href="https://www.simpletix.com/e/kericonf26-april-21-23-2026-lehi-utah-us-tickets-248095?promocode=IIW26-COMBI">KERICONF26</a> April 21-23 2026, Lehi, Utah (US)</strong></p></li><li><p><a href="https://www.eventbrite.co.uk/e/oidf-workshop-pre-iiw-mon-27-apr-2026-cisco-santana-row-san-jose-tickets-1985057563609?aff=oddtdtcreator">OIDF Workshop</a> April 27th, San Jose</p></li><li><p><a href="https://internetidentityworkshop.com/">Internet Identity Workshop</a> #42, April 28-30, 2026, Mountain View California (<em><strong>Sponsorships Available</strong></em>)</p></li><li><p><a href="https://www.eventbrite.com/e/agentic-internet-workshop-2-tickets-1976356257769?aff=oddtdtcreator">Agentic Internet Workshop</a> #2, May 1, 2026, Mountain View California (<em><strong>Sponsorships Available</strong></em>)</p></li><li><p><strong>OAuth Security Workshop (<a href="https://oauth.secworkshop.events/osw2026">OSW</a>) 2026, Leipzig, Germany, from May 27&#8211;29, 2026. </strong>The OAuth Security Workshop is the premier forum for in-depth technical discussions on OAuth, OpenID, and related technologies. </p></li><li><p>dice: <a href="https://www.linkedin.com/feed/update/urn:li:activity:7407632798372495360/?actorCompanyId=93246186">Digital Identity unConfernece Europe</a> (an IIW Regional Event) June 22-24, Copenhagen, Denmark (<em><strong>Sponsorships Available)</strong></em></p></li></ul><h2>Infrastructure Under the Sea</h2><h3><a href="https://www.linkedin.com/posts/hugh-gardner_yesterday-at-the-european-commissionconference-share-7442524799798677505-IGW5">European Commission Conference &#8212; Submarine Cable Security</a> &#8212; Hugh Gardner</h3><p>Actually about subsea cable infrastructure security and strategic risk management, not identity.</p><h2>Standards News </h2><h3><a href="https://www.linkedin.com/posts/opensource-lfdt-digitaltrust-share-7443029511862022144-82YT">URN:SAID Namespace Registered by IANA</a> &#8212; LF Decentralized Trust</h3><p>IANA formally registered the &#8220;urn:said&#8221; namespace, enabling Self-Addressing Identifiers from the KERI ecosystem to integrate with broader internet standards.</p><h3><a href="https://www.linkedin.com/posts/kimdhamilton_congratulations-to-decentralized-identity-share-7435415458486419457-hWYF">MCP-I (Model Context Protocol for Identity) Comes to DIF</a> &#8212; Kim Hamilton Duffy &#8594; <a href="https://lnkd.in/gKYkDmFY">Blog post</a></h3><p>The Decentralized Identity Foundation now hosts MCP-I, bringing decentralized identity standards into the Model Context Protocol ecosystem.</p><h3><a href="https://www.linkedin.com/posts/jeffdstephens_interesting-mcp-identity-integration-to-dig-share-7438580112637341696-WzLl">Dock Labs MCP Server for AI Credential Management</a> &#8212; Jeff Stephens &#8594; <a href="https://lnkd.in/e4saUzC7">Article</a></h3><p>Dock Labs released an MCP server enabling AI agents to issue and verify credentials while enforcing least-privilege access controls.</p><h3><a href="https://www.linkedin.com/posts/elainegroh_irisscan-openclaw-world-share-7440036061566689280-1fYO">World&#8217;s AgentKit: Iris Scan Identity Tokens for AI Agents</a> &#8212; Elaine Groh &#8594; <a href="https://lnkd.in/eDhZEmAG">Ars Technica</a></h3><p>World&#8217;s AgentKit uses iris-scanning and cryptographic identity tokens to prevent AI agent swarms from launching Sybil attacks on online services.</p><h2>Enterprise &amp; Supply Chain</h2><h3><a href="https://www.linkedin.com/posts/joris-van-vliet-191426223_supplychaintransparency-digitalproductpassport-share-7442938005310386177-Z9eA/">Digital Handover for Cotton Supply Chain</a> &#8212; Joris van Vliet / Fibre Forward</h3><p>A multidisciplinary team is building a digital handover mechanism for cotton supply chain transparency using digital product passports.</p><h2>AI Agents &amp; Identity</h2><h3><a href="https://www.linkedin.com/posts/colegrolmus_ososos-ai-agent-identity-market-landscape-activity-7439313270991339520-a812">The foundational model companies aren't going to solve AI agent identity alone.</a> &#8212; Cole Grolmus</h3><p>The AI agent identity market is fragmented, and whoever controls the narrative first will likely win &#8212; foundational model companies won&#8217;t solve this alone.</p><h3><a href="https://thetrustgraph.substack.com/p/the-proof-gap">The Proof Gap </a></h3><p>Verification systems were built for a world where humans did the verifying. Agents are arriving to find the door still locked.Human judgment can&#8217;t scale to the volume or speed of machine-generated content &#8212; cryptographic verification is the necessary next step for the agentic economy.</p><h3><a href="https://www.linkedin.com/posts/dgwbirch_this-weeks-newsletter-explores-a-slightly-ugcPost-7437180455906447360-QdRN">No Organisation is Ready for AI-Empowered Customers</a> &#8212; David Birch</h3><p>Customers armed with AI agents will demand transparency and make purchasing decisions faster and more ruthlessly than humans ever could &#8212; and no organization is prepared.</p><h3><a href="https://sphericalcowconsulting.com/2026/03/24/when-browsers-start-acting-for-you/">When Browsers Start Acting for You &#8212; AI Browsers and Identity</a> &#8212; Heather Flanagan</h3><p>If AI-powered browsers act autonomously on behalf of users, do they still meet the W3C&#8217;s definition of a &#8220;Web User Agent&#8221;?</p><h3><a href="https://www.linkedin.com/posts/kamlesh-nagware-1456094b_privacy-preserving-tech-landscape-ugcPost-7439253135849832449-HBBi">Privacy-Preserving Tech Landscape / SSI as Trust Layer for AI</a> &#8212; Kamlesh Nagware</h3><p>Self-Sovereign Identity ecosystems with DIDs and verifiable credentials are becoming essential trust infrastructure for autonomous AI systems.</p><h3><a href="https://www.linkedin.com/posts/kamlesh-nagware-1456094b_trustedai-safeai-blockchain-share-7441456254658691072-Oot8">Trusted AI, Safe AI, Blockchain</a> &#8212; Kamlesh Nagware</h3><p>Three pillars for trustworthy AI: guardrails (what can be enforced outside the model), alignment (does the model follow the right path), and governance through regulation.</p><h2></h2><h2>European &amp; UK Digital Identity</h2><h3><a href="https://inews.co.uk/news/politics/britons-paid-judge-controversial-digital-id-scheme-4307558">Britons to be paid &#163;550 to judge controversial digital ID scheme</a> &#8212; Stuart Young</h3><p>The UK government is paying 120 citizens &#163;550 each to participate in a consumer panel evaluating the national digital ID scheme, costing roughly &#163;830,000 total.</p><h3><a href="https://www.linkedin.com/posts/jamiedsmith_its-been-8-years-since-i-first-talked-about-share-7437219200290689025-JOXa">UK Government Adopting Verifiable Credentials for Digital ID</a> &#8212; Jamie Smith</h3><p>After eight years of advocacy, the UK government has announced plans to implement verifiable credentials for digital ID &#8212; a milestone for the community.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bpjw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d016530-26ab-48e6-bf96-406a400a18ba_800x542.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bpjw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d016530-26ab-48e6-bf96-406a400a18ba_800x542.jpeg 424w, https://substackcdn.com/image/fetch/$s_!bpjw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d016530-26ab-48e6-bf96-406a400a18ba_800x542.jpeg 848w, https://substackcdn.com/image/fetch/$s_!bpjw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d016530-26ab-48e6-bf96-406a400a18ba_800x542.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!bpjw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d016530-26ab-48e6-bf96-406a400a18ba_800x542.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bpjw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d016530-26ab-48e6-bf96-406a400a18ba_800x542.jpeg" width="800" height="542" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3d016530-26ab-48e6-bf96-406a400a18ba_800x542.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:542,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;diagram&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="diagram" title="diagram" srcset="https://substackcdn.com/image/fetch/$s_!bpjw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d016530-26ab-48e6-bf96-406a400a18ba_800x542.jpeg 424w, https://substackcdn.com/image/fetch/$s_!bpjw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d016530-26ab-48e6-bf96-406a400a18ba_800x542.jpeg 848w, https://substackcdn.com/image/fetch/$s_!bpjw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d016530-26ab-48e6-bf96-406a400a18ba_800x542.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!bpjw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d016530-26ab-48e6-bf96-406a400a18ba_800x542.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><a href="https://www.linkedin.com/posts/eidas2-digitalidentity-eudiw-share-7439680451281248257-wso7">eIDAS2 / EU Digital Identity Wallet</a></h3><p>Worldline announces the shift to Europe&#8217;s Digital Identity Wallet is underway, highlighting regulatory milestones and interoperability across 27+ wallets.</p><h3><a href="https://www.linkedin.com/posts/nick-lambert-gb_how-is-the-eudi-wallet-going-to-be-adopted-share-7442557163312418816-y9qV">EUDI Wallet Adoption &#8212; Chicken-and-Egg Problem</a> &#8212; Nick Lambert</h3><p>The EU is mandating business integration by late 2027 to jumpstart citizen usage and overcome the EUDI Wallet&#8217;s chicken-and-egg adoption challenge. Will the EUDI become something people actually rely on in their daily lives&#8230; or just another piece of infrastructure that exists on paper?</p><h3><a href="https://www.linkedin.com/posts/tobiasbojesen_the-pwc-map-of-digital-identity-adoption-share-7442939288649945088-rPdE">PwC Map of Digital Identity Adoption</a> &#8212; Tobias Bojesen</h3><p>PwC published a map examining digital identity adoption across 42 countries, emphasizing that the real challenge is cross-border interoperability through eIDAS2.</p><h2>Standards &amp; Interoperability</h2><h3><a href="https://blog.spruceid.com/digitaltransformation-how-to-measure-digital-transformation-success-kpis-beyond-go-live/">How to Measure Digital Transformation Success with Verifiable Credentials</a> &#8212; SpruceID</h3><p>Digital transformation success should be measured through resident outcomes and operational efficiency, not just credentials issued or system launch dates.</p><h3><a href="https://info.indicio.tech/idemia-public-security-white-paper">IDEMIA/Indicio White Paper: Decentralized Identity for Financial Services</a> &#8212; Indicio</h3><p>Verifiable digital credentials combined with authenticated biometrics establish a cryptographically-secure identity framework for financial services fraud, compliance, and efficiency.</p><h3><a href="https://www.linkedin.com/feed/update/urn:li:activity:7441151662058221568/">The physical card has been dying since 2014.</a></h3><p>The card keeps evolving. New materials, new form factors, new experiences. It's only dead for those who stopped paying attention</p><h3><a href="https://blog.identity.foundation/dif-welcomes-aven-hospitality/">DIF Welcomes Aven Hospitality as Associate Member</a> &#8212; Decentralized Identity Foundation</h3><p>DIF welcomed Aven Hospitality to collaborate on trusted, interoperable identity standards for the travel and hospitality industry.</p><h3><a href="https://www.linkedin.com/posts/jitenvalecha_digitalidentity-mdl-verifiablecredentials-share-7433627897795584000-1rXI"> mDL vs VC vs SEDI </a> &#8212; Jiten Valecha</h3><p>SEDI, mDL, and Verifiable Credentials are complementary layers of digital identity infrastructure rather than competing technologies, each serving distinct functions.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!jJrq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5691915-515f-4eb0-9d4b-51f1bfcc2cf5_800x800.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!jJrq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5691915-515f-4eb0-9d4b-51f1bfcc2cf5_800x800.jpeg 424w, https://substackcdn.com/image/fetch/$s_!jJrq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5691915-515f-4eb0-9d4b-51f1bfcc2cf5_800x800.jpeg 848w, https://substackcdn.com/image/fetch/$s_!jJrq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5691915-515f-4eb0-9d4b-51f1bfcc2cf5_800x800.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!jJrq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5691915-515f-4eb0-9d4b-51f1bfcc2cf5_800x800.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!jJrq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5691915-515f-4eb0-9d4b-51f1bfcc2cf5_800x800.jpeg" width="800" height="800" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a5691915-515f-4eb0-9d4b-51f1bfcc2cf5_800x800.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:800,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;table&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="table" title="table" srcset="https://substackcdn.com/image/fetch/$s_!jJrq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5691915-515f-4eb0-9d4b-51f1bfcc2cf5_800x800.jpeg 424w, https://substackcdn.com/image/fetch/$s_!jJrq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5691915-515f-4eb0-9d4b-51f1bfcc2cf5_800x800.jpeg 848w, https://substackcdn.com/image/fetch/$s_!jJrq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5691915-515f-4eb0-9d4b-51f1bfcc2cf5_800x800.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!jJrq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5691915-515f-4eb0-9d4b-51f1bfcc2cf5_800x800.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>Biometrics &amp; Fraud</h2><h3><a href="https://www.wsj.com/tech/cybersecurity/biometrics-risk-81912c30?reflink=desktopwebshare_permalink">Biometrics Sounds Cool&#8212;and Safe. Maybe, but Read This First</a> &#8212; WSJ  w/ <a href="https://www.linkedin.com/posts/maxinemost_biometrics-sounds-cooland-safe-maybe-but-share-7440866190857494528-rgOg/">Pushback</a> from Maxine Most </h3><p>Maxine Most pushes back on a Wall Street Journal article about biometrics, arguing the industry needs better public education on how the technology actually works.</p><h3><a href="https://www.linkedin.com/posts/paryalotfi_deepfake-identityverification-fraudprevention-ugcPost-7443259549370728448--_3v">46 Bank Accounts Opened with Deepfakes at ABN AMRO</a> &#8212; Parya Lotfi</h3><p>A fraudster opened 46 bank accounts at ABN AMRO using deepfake-manipulated identity documents, exposing critical vulnerabilities in current KYC and biometric verification.</p><h3><a href="https://www.linkedin.com/posts/samgregory_sora-aivideo-deepfakes-share-7443659906915811328-3WnL">Sora Shutdown &amp; Deepfake Normalization</a> &#8212; Sam Gregory (WITNESS)</h3><p>OpenAI shut down Sora, but the cultural normalization of hyper-realistic synthetic video during its six-month run will persist long after the platform disappears.</p><h2>Thoughtful</h2><h3><a href="https://www.kosmaconnect.net/interactionblog/technologypaternalism">Technology Paternalism &#8212; A Case for Self-Sovereign Identity</a> &#8212; Martina &#8594; <a href="https://www.linkedin.com/posts/activity-7439622132176789504-Sr7C">LinkedIn</a></h3><p>Technical systems shape user choices through design, algorithms, and infrastructure &#8212; &#8220;Technology Paternalism&#8221; &#8212; with deep implications for digital identity and autonomous AI.</p><h3><a href="https://www.linkedin.com/pulse/decentralization-identity-future-ai-slava-tykhonov-uxzdf">Decentralization, Identity &amp; Future of AI</a> &#8212; Slava Tykhonov</h3><p>DIDs and digital identity infrastructure could become foundational for AI systems, enabling ownership and control of data in a new economy built on verifiable credentials.</p><h3><a href="https://www.biometricupdate.com/202603/who-holds-the-keys-to-digital-sovereignty-it-might-not-be-who-you-think">Who holds the keys to digital sovereignty? It might not be who you think</a> &#8212; Biometric Update</h3><p>Cryptographic key control matters more for digital sovereignty than physical data storage location.</p><h3><a href="https://timohotti.substack.com/p/blockchains-that-cancelled-each-other">Blockchains That Cancelled Each Other Out</a> &#8212; Timo Hotti</h3><p>Combining identity and transaction models in blockchain architecture eliminates the need for blockchain altogether &#8212; the industry spent years optimizing a flawed foundation.</p><h3><a href="https://www.linkedin.com/posts/pkriaris_identity-is-the-most-misunderstood-layer-share-7442500178911330304-DVgY">&#8220;Identity is the most misunderstood layer in financial services.&#8221;</a> &#8212; Panagiotis Kriaris</h3><p>Identity verification has evolved from manual to digital to verified systems, but fragmentation across 150+ government schemes demands a unified orchestration layer.</p><h3><a href="https://www.linkedin.com/posts/tim-nicholls-57a50959_ive-spent-22-years-in-identity-and-access-share-7442511829899210752-jRUd">22 Years in Identity and Access</a> &#8212; Tim Nicholls</h3><p>The IAM industry keeps rebranding existing solutions with new acronyms rather than delivering genuine innovation &#8212; it confuses rather than helps customers.</p><h3><a href="https://www.linkedin.com/posts/kai-hartung_digitalsovereignty-opensource-share-7442326066381258753-nvzS">Digital Sovereignty &amp; Open File Formats</a> &#8212; Kai Hartung</h3><p>Digital sovereignty and open-source technology are essential for maintaining independence from centralized platforms.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!AMEx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82930344-0d36-402f-859e-18f3204231d8_800x1000.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!AMEx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82930344-0d36-402f-859e-18f3204231d8_800x1000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!AMEx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82930344-0d36-402f-859e-18f3204231d8_800x1000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!AMEx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82930344-0d36-402f-859e-18f3204231d8_800x1000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!AMEx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82930344-0d36-402f-859e-18f3204231d8_800x1000.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!AMEx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82930344-0d36-402f-859e-18f3204231d8_800x1000.jpeg" width="800" height="1000" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/82930344-0d36-402f-859e-18f3204231d8_800x1000.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1000,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;map&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="map" title="map" srcset="https://substackcdn.com/image/fetch/$s_!AMEx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82930344-0d36-402f-859e-18f3204231d8_800x1000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!AMEx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82930344-0d36-402f-859e-18f3204231d8_800x1000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!AMEx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82930344-0d36-402f-859e-18f3204231d8_800x1000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!AMEx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82930344-0d36-402f-859e-18f3204231d8_800x1000.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><a href="https://www.linkedin.com/pulse/digital-sovereignty-needs-more-than-cold-code-trust-nugraha-dewanto-80hyc">Digital Sovereignty Needs More Than Cold Code it needs Trust by Design</a> &#8212; Nugraha Dewanto</h3><p>Digital sovereignty in the Global South fails not at the infrastructure level but earlier, when state institutions lack the trust needed to make technical systems legitimate.</p><h3><a href="https://www.linkedin.com/posts/mgsarmiento_alternative-pathways-matching-creativity-ugcPost-7443641163074482176-c0ce">Alternative Pathways: Blockchain for Identity of Stateless Persons</a> &#8212; Dr. Maria-Gabriela Sarmiento</h3><p>Decentralized technology could help restore legal identity for over one billion stateless individuals, refugees, and undocumented migrants worldwide.</p><h2>Government &amp; AI Policy</h2><h3><a href="https://www.macfound.org/press/grantee-news/cntr-aisle-portal-makes-sense-of-ai-policy-bills-in-the-us?utm_campaign=gn-portal-ai-policy-bills-3-26&amp;utm_source=linkedin&amp;utm_medium=social">Center Aisle Portal &#8212; Making Sense of AI Policy</a></h3><p>Brown University&#8217;s Center for Technological Responsibility launched a portal to help the public navigate the 1,000+ AI-related bills introduced across the U.S.</p><h3><a href="https://worldprivacyforum.org/posts/world-privacy-forums-third-annual-wacv-privacy-tutorial-machine-unlearning-ai-governance-and-privacy/">World Privacy Forum&#8217;s Third Annual WACV Privacy Tutorial: Machine Unlearning, AI Governance, and Privacy</a> &#8212; Pam Dixon</h3><p>Machine unlearning is emerging as a requirement in AI governance and privacy law, addressing how models can be made to &#8220;forget&#8221; personal data.</p>]]></content:encoded></item><item><title><![CDATA[Identosphere 166 March 1-15: Agentic AI and Identity lots of articles • Monetizing DPI • new DCC report • LFDT Progress Report]]></title><description><![CDATA[This is the mostly weekly Identosphere Newsletter sharing highlights from around the web covering Decentralized and Self-Sovereign Identity curated by Kaliya Young, Identity Woman.]]></description><link>https://newsletter.identosphere.net/p/identosphere-166-march-1-15-agentic</link><guid isPermaLink="false">https://newsletter.identosphere.net/p/identosphere-166-march-1-15-agentic</guid><dc:creator><![CDATA[IdentityWoman]]></dc:creator><pubDate>Sat, 21 Mar 2026 23:13:41 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!PPCI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F859a8034-41af-4f10-85cd-96bd3e801a45_1237x623.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>New Upcoming</h2><h3><strong>OAuth Security Workshop (<a href="https://oauth.secworkshop.events/osw2026">OSW</a>) 2026</strong>, <strong>Leipzig, Germany, from May 27&#8211;29, 2026</strong>.</h3><blockquote><p>The OAuth Security Workshop is the premier forum for in-depth technical discussions on OAuth, OpenID, and related technologies. By fostering direct and open collaboration between industry professionals, academic researchers, and members of standardization groups, OSW has uniquely helped shape and improve internet protocols.</p><p>Leading researchers also attend to showcase cutting-edge results on identity protocol security. OSW serves as an essential independent venue for cross-pollination between the OpenID Foundation, IETF OAuth, and GNAP working groups.</p></blockquote><h2>Upcoming</h2><ul><li><p><strong><a href="https://www.simpletix.com/e/kericonf26-april-21-23-2026-lehi-utah-us-tickets-248095?promocode=IIW26-COMBI">KERICONF26</a> April 21-23 2026, Lehi, Utah (US)</strong></p></li><li><p><a href="https://www.eventbrite.co.uk/e/oidf-workshop-pre-iiw-mon-27-apr-2026-cisco-santana-row-san-jose-tickets-1985057563609?aff=oddtdtcreator">OIDF Workshop</a> April 27th, San Jose</p></li><li><p><a href="https://internetidentityworkshop.com/">Internet Identity Workshop</a> #42, April 28-30, 2026, Mountain View California (<em><strong>Sponsorships Available</strong></em>) </p></li><li><p><a href="https://www.eventbrite.com/e/agentic-internet-workshop-2-tickets-1976356257769?aff=oddtdtcreator">Agentic Internet Workshop</a> #2, May 1, 2026, Mountain View California (<em><strong>Sponsorships Available</strong></em>) </p></li><li><p>dice: <a href="https://www.linkedin.com/feed/update/urn:li:activity:7407632798372495360/?actorCompanyId=93246186">Digital Identity unConfernece Europe</a> (an IIW Regional Event) June 22-24, Copenhagen, Denmark (<em><strong>Sponsorships Available) </strong></em></p></li></ul><h2>Opportunities</h2><h3><a href="https://www.linkedin.com/feed/update/urn:li:activity:7435166931390869504/?updateEntityUrn=urn%3Ali%3Afs_updateV2%3A%28urn%3Ali%3Aactivity%3A7435166931390869504%2CFEED_DETAIL%2CEMPTY%2CDEFAULT%2Cfalse%29">Competitive DPI Deployment</a></h3><blockquote><p>The<a href="https://www.linkedin.com/company/centre-for-dpi/"> Centre for Digital Public Infrastructure - CDPI</a> is inviting System Integrators, GovTechs, and Digital Service Providers to express interest in upcoming competitive opportunities to deploy DPI as scalable, packaged solutions (DaaS).</p></blockquote><h2>Trust</h2><h3><a href="https://www.lfdecentralizedtrust.org/blog/decentralized-trust-infrastructure-at-lf-a-progress-report">Decentralized Trust Infrastructure at LF: A Progress Report</a></h3><blockquote></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PPCI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F859a8034-41af-4f10-85cd-96bd3e801a45_1237x623.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PPCI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F859a8034-41af-4f10-85cd-96bd3e801a45_1237x623.png 424w, https://substackcdn.com/image/fetch/$s_!PPCI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F859a8034-41af-4f10-85cd-96bd3e801a45_1237x623.png 848w, https://substackcdn.com/image/fetch/$s_!PPCI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F859a8034-41af-4f10-85cd-96bd3e801a45_1237x623.png 1272w, https://substackcdn.com/image/fetch/$s_!PPCI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F859a8034-41af-4f10-85cd-96bd3e801a45_1237x623.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PPCI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F859a8034-41af-4f10-85cd-96bd3e801a45_1237x623.png" width="1237" height="623" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/859a8034-41af-4f10-85cd-96bd3e801a45_1237x623.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:623,&quot;width&quot;:1237,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!PPCI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F859a8034-41af-4f10-85cd-96bd3e801a45_1237x623.png 424w, https://substackcdn.com/image/fetch/$s_!PPCI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F859a8034-41af-4f10-85cd-96bd3e801a45_1237x623.png 848w, https://substackcdn.com/image/fetch/$s_!PPCI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F859a8034-41af-4f10-85cd-96bd3e801a45_1237x623.png 1272w, https://substackcdn.com/image/fetch/$s_!PPCI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F859a8034-41af-4f10-85cd-96bd3e801a45_1237x623.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><a href="https://www.linkedin.com/feed/update/urn:li:activity:7432323224203587584/?updateEntityUrn=urn%3Ali%3Afs_updateV2%3A%28urn%3Ali%3Aactivity%3A7432323224203587584%2CFEED_DETAIL%2CEMPTY%2CDEFAULT%2Cfalse%29">&#128081; If everybody and their dog has a definition of &#119837;&#119842;&#119840;&#119842;&#119853;&#119834;&#119845; &#119852;&#119848;&#119855;&#119838;&#119851;&#119838;&#119842;&#119840;&#119847;&#119853;&#119858;,</a></h3><blockquote><p>I suppose I&#8217;m allowed to give it a stab, too &#128556;</p><p> &#119936;&#119952;&#119958; &#119938;&#119955;&#119942; &#119956;&#119952;&#119959;&#119942;&#119955;&#119942;&#119946;&#119944;&#119951; &#119952;&#119959;&#119942;&#119955; &#119956;&#119952;&#119950;&#119942;&#119957;&#119945;&#119946;&#119951;&#119944; &#8211; &#119938;&#119956; &#119938;&#119951; &#119946;&#119951;&#119941;&#119946;&#119959;&#119946;&#119941;&#119958;&#119938;&#119949; &#119952;&#119955; &#119938;&#119956; &#119938;&#119951; &#119952;&#119955;&#119944;&#119938;&#119951;&#119946;&#119956;&#119938;&#119957;&#119946;&#119952;&#119951; - &#119946;&#119943; &#119962;&#119952;&#119958;&#119955; &#119955;&#119946;&#119944;&#119945;&#119957;&#119956; &#119952;&#119959;&#119942;&#119955; &#119957;&#119945;&#119938;&#119957; &#119957;&#119945;&#119946;&#119951;&#119944; &#119938;&#119955;&#119942; &#119953;&#119955;&#119952;&#119957;&#119942;&#119940;&#119957;&#119942;&#119941; &#119938;&#119951;&#119941; &#119962;&#119952;&#119958; &#119938;&#119955;&#119942; &#119942;&#119951;&#119938;&#119939;&#119949;&#119942;&#119941; &#119957;&#119952; &#119942;&#119961;&#119942;&#119955;&#119940;&#119946;&#119956;&#119942; &#119957;&#119945;&#119942;&#119950; (&#120366;&#120358;&#120354;&#120367;&#120362;&#120367;&#120360;: &#120373;&#120361;&#120358; &#120365;&#120358;&#120360;&#120354;&#120365; &#120372;&#120378;&#120372;&#120373;&#120358;&#120366; &#120376;&#120362;&#120365;&#120365; &#120354;&#120356;&#120373;&#120374;&#120354;&#120365;&#120365;&#120378; &#120357;&#120368; &#120372;&#120368;&#120366;&#120358;&#120373;&#120361;&#120362;&#120367;&#120360; &#120376;&#120361;&#120358;&#120367; &#120378;&#120368;&#120374;&#120371; &#120371;&#120362;&#120360;&#120361;&#120373;&#120372; &#120354;&#120371;&#120358; &#120367;&#120368;&#120373; &#120371;&#120358;&#120372;&#120369;&#120358;&#120356;&#120373;&#120358;&#120357;).</p></blockquote><h3><a href="https://openid.net/why-digital-estates-need-standards-and-why-we-need-them-now/">Why digital estates need standards, and why we need them now</a></h3><blockquote><p>Today, the OpenID Foundation released <em><a href="https://openid.net/wp-content/uploads/2026/03/The-Unfinished-Digital-Estate-Final.pdf">The Unfinished Digital Estate</a></em> - the first comprehensive framework addressing this universal challenge. Developed by the foundation&#8217;s <a href="https://openid.net/cg/death-and-the-digital-estate/">Death and the Digital Estate (DADE) Community Group</a>, the report doesn&#8217;t just document the problem. It calls for coordinated action across governments, technology platforms, and industries to build the infrastructure we need.</p></blockquote><h3>(Politico Opinion) [Frank McCourt] <a href="https://www.politico.eu/article/personal-data-democracy/">Personal data is the new battleground for democracy</a></h3><blockquote><p>To reverse that reality, we must build alternative systems that respect individual rights, return ownership and control of personal data to individuals, and align with democratic principles. The technologies shaping our lives need to be optimized to protect citizens, not endanger them.</p></blockquote><h2>Education</h2><h3><a href="https://www.linkedin.com/feed/update/urn:li:activity:7434281950661476353/">Proof of Knowledge</a></h3><blockquote><p>POK implements portable digital credentials, aligned with Open Badges 3.0 and the European Learning Model as non-fungible tokens (NFTs) on the blockchain. In the Community Call, Tom&#225;s will address a number of topics at the intersection of education and technology &#8212; including AI and digital learning &#8212; and explain how digital credentials allow us to take advantage of these tools in service of equity, opportunity, and trust.</p></blockquote><h3>(Digital Credentials Consortium) [Report] <a href="https://blog.dcconsortium.org/the-essential-guide-to-interoperability-from-paper-trails-to-opportunity-pathways-d11eb621e6fd?postPublishedType=repub">The Essential Guide to Interoperability: From Paper Trails to Opportunity Pathways</a></h3><blockquote><p>However, too often credentials are locked inside proprietary platforms, rejected by Applicant Tracking System (ATS) filters that cannot parse the data, or not trusted because they cannot be quickly verified. (<a href="https://digitalcredentials.mit.edu/docs/The%20Essential%20Guide%20to%20Credential%20Interoperability%20.pdf">link to report)</a></p></blockquote><h2><strong>Identity and AI</strong></h2><h3><a href="https://mrinal.com/articles/agent-identities/">Agent Identities: everything you need to know</a></h3><blockquote><p>For over two decades, my work has kept circling back to one hard problem: how do machines prove they can be trusted?</p><p>Agents have raised the stakes: they take autonomous actions. Without cryptographic identity, we can&#8217;t authenticate requests, authorize actions, or attribute decisions.</p></blockquote><h3><a href="https://unmitigatedrisk.com/?p=1129&amp;c=1">Agents Are More Like Humans Than Workloads. Here&#8217;s Why That Matters for Identity.</a></h3><blockquote><p>Agents are the consultant, not the robot arm. Workload identity is built for maps: you know the territory, you draw the routes, if a service goes off-route it&#8217;s an error. Agent identity is built for compasses: you know the destination, but the route is discovered at runtime. Our identity infrastructure needs to reflect that difference.</p></blockquote><p><a href="https://sankarshanmukhopadhyay.github.io/digital-governance-paper-notes/">DPI Database of Papers</a></p><blockquote><p>Over the past year I have been reading a growing body of papers on digital public infrastructure, AI governance, agent systems, and digital identity. Many of these works raise important questions, but the insights are scattered across journals, policy blogs, research archives, and essays. It becomes difficult to track how the ideas connect, where the assumptions differ, and which architectural claims actually hold up under scrutiny.</p></blockquote><h3><a href="https://www.linkedin.com/posts/resilientcyber_ai-agent-authentication-and-authorizationpdf-ugcPost-7434950087899947008-jcEd">ResilientCyber LinkedIn post: AI Agent Authentication and Authorization</a></h3><blockquote><p>The core model treats agents as workloads with a full identity stack, identifiers, credentials, attestation, provisioning, auth, observability, and compliance.</p></blockquote><h3><a href="https://datatracker.ietf.org/doc/draft-klrc-aiagent-auth/">IETF Internet Draft: AI Agent Authentication and Authorization (draft-klrc-aiagent-auth-00)</a></h3><blockquote><p>This document proposes a model for authentication and authorization of AI agent interactions. It leverages existing standards such as the Workload Identity in Multi-System Environments (WIMSE) architecture and OAuth 2.0 family of specifications. Rather than defining new protocols, this document describes how existing and widely deployed standards can be applied or extended to establish agent authentication and authorization. By doing so, it aims to provide a framework within which to use existing standards, identify gaps and guide future standardization efforts for agent authentication and authorization.</p></blockquote><h3><a href="https://www.linkedin.com/feed/update/urn:li:activity:7435421383121215488/?updateEntityUrn=urn%3Ali%3Afs_updateV2%3A%28urn%3Ali%3Aactivity%3A7435421383121215488%2CFEED_DETAIL%2CEMPTY%2CDEFAULT%2Cfalse%29">Organizing the Landscape of DPI, AI, Governance, Agent Systems and Digital Identity</a></h3><blockquote><p>Over the past year I have been reading a growing body of papers on digital public infrastructure, AI governance, agent systems, and digital identity. Many of these works raise important questions, but the insights are scattered across journals, policy blogs, research archives, and essays. It becomes difficult to track how the ideas connect, where the assumptions differ, and which architectural claims actually hold up under scrutiny.</p><p><a href="https://sankarshanmukhopadhyay.github.io/digital-governance-paper-notes">This is a small attempt to organize that landscape.</a></p></blockquote><h3><a href="https://x.com/ryansadams/status/2029198636811264264">Ryan S. Adams: Nate Liason Built a Zero-Human Company Run by an AI CEO</a></h3><blockquote><p>Nate Liason built a company generating $80K in 30 days (~$1&#8211;2M ARR) run entirely by an AI CEO named Felix, built on Claude, with a total startup cost of $1,500 and $400/month in ongoing expenses.<br><br></p></blockquote><h3><a href="https://www.windley.com/archives/2026/03/cross-domain_delegation_in_a_society_of_agents.shtml">Phil Windley: Cross-Domain Delegation in a Society of Agents</a></h3><blockquote><p>Windley argues that cross-domain delegation between AI agents &#8212; where the delegating system no longer controls the enforcement point &#8212; only works reliably within a &#8220;society of agents&#8221; that combines three mechanisms: policies that deterministically constrain behavior within each domain, promises (signed structured commitments derived from an agent&#8217;s own policy set) that communicate intent across domains, and reputation as decentralized social memory that tracks whether those promises are honored over time.<br><br></p></blockquote><h3><a href="https://www.lfdecentralizedtrust.org/blog/decentralized-trust-infrastructure-at-lf-a-progress-report">LF Decentralized Trust: Decentralized Trust Infrastructure at LF &#8212; A Progress Report</a></h3><blockquote><p>Written by Drummond Reed in response to a challenge from Linux Foundation CEO Jim Zemlin following the XZ backdoor attack, this post describes how the Trust Over IP Foundation is building a Decentralized Trust Graph (DTG) model &#8212; using DIDs, Verifiable Relationship Credentials, zero-knowledge proof-based Personhood Credentials, and Verifiable Trust Agents &#8212; to replace the fragile PGP web-of-trust model for verifying open source contributors at scale. At the 2026 LF Member Summit, Affinidi contributed three new LFDT Labs including OpenVTC, a deployable &#8220;VTC in a box&#8221; for open source projects, with a goal of having the Linux kernel project test it at the Linux Kernel Maintainer Summit in Prague in October 2026.<br><br></p></blockquote><h3><a href="https://www.mastercard.com/us/en/news-and-trends/stories/2026/verifiable-intent.html">When AI Starts Buying for You, Trust Becomes the Product</a></h3><blockquote><p>Mastercard&#8217;s Chief Digital Officer Pablo Fourez announces Verifiable Intent, a new open, standards-based trust layer for agentic commerce co-developed with Google, which creates a tamper-resistant, privacy-preserving cryptographic record linking a consumer&#8217;s identity, intent, and authorized actions when an AI agent transacts on their behalf. Built on specifications from FIDO Alliance, EMVCo, IETF, and W3C, the specification and an initial reference implementation have been open-sourced on GitHub, with integration into Mastercard Agent Pay&#8217;s intent APIs planned for the coming months.<br><br></p></blockquote><h3><a href="https://www.schneier.com/blog/archives/2026/03/anthropic-and-the-pentagon.html">Anthropic and the Pentagon</a></h3><blockquote><p>Schneier and Sanders argue that while Anthropic&#8217;s stand against Pentagon demands for mass surveillance and autonomous weapons AI looks principled, it&#8217;s largely strategic posturing &#8212; and the real solution isn&#8217;t corporate heroism but stronger democratic laws governing military AI.</p></blockquote><h3><a href="https://www.linkedin.com/pulse/you-dont-give-agents-credentials-grant-them-power-karl-mcguinness-cvhtc/?trackingId=ZtRT5ukUTrGpvHrnv6gIHw%3D%3D">You Don&#8217;t Give Agents Credentials. You Grant Them Power of Attorney.</a></h3><blockquote><p>Agents don&#8217;t need your identity. They need your authority.Those are not the same thing. Identity establishes who the agent is. Authority governs why it is acting, under what conditions, and when it must stop. We have been granting the first and assuming the second follows. It does not.</p></blockquote><h3><a href="https://www.linkedin.com/feed/update/urn:li:activity:7433953397596393474/?updateEntityUrn=urn%3Ali%3Afs_updateV2%3A%28urn%3Ali%3Aactivity%3A7433953397596393474%2CFEED_DETAIL%2CEMPTY%2CDEFAULT%2Cfalse%29">Puritan Economics Can Teach Us About Agentic AI in a Capitalist Economy</a></h3><h3><a href="https://www.linkedin.com/feed/update/urn:li:activity:7434607825500135424/?updateEntityUrn=urn%3Ali%3Afs_updateV2%3A%28urn%3Ali%3Aactivity%3A7434607825500135424%2CFEED_DETAIL%2CEMPTY%2CDEFAULT%2Cfalse%29">TwinAI Inc - what are its implications and how do we give them credentials</a></h3><blockquote><p>It&#8217;s why we set up<a href="https://www.linkedin.com/company/trusted-agents/"> Trusted Agents</a>.</p><p>The picture below is our &#8216;Agentic Commerce Triangle&#8217; framework, which we use with clients for strategic planning. Because we don&#8217;t just need delegation to AI Agents. We also need ID and trust, and portable customer context.</p><p>More coming on the triangle soon.</p><p>If you need help making sense of AI Agents, or want to build your market response for agentic commerce, get in touch.</p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zgsX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F366f364a-cc1b-4e88-a124-7033e6fd69c3_800x596.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zgsX!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F366f364a-cc1b-4e88-a124-7033e6fd69c3_800x596.png 424w, https://substackcdn.com/image/fetch/$s_!zgsX!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F366f364a-cc1b-4e88-a124-7033e6fd69c3_800x596.png 848w, https://substackcdn.com/image/fetch/$s_!zgsX!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F366f364a-cc1b-4e88-a124-7033e6fd69c3_800x596.png 1272w, https://substackcdn.com/image/fetch/$s_!zgsX!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F366f364a-cc1b-4e88-a124-7033e6fd69c3_800x596.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zgsX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F366f364a-cc1b-4e88-a124-7033e6fd69c3_800x596.png" width="800" height="596" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/366f364a-cc1b-4e88-a124-7033e6fd69c3_800x596.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:596,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zgsX!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F366f364a-cc1b-4e88-a124-7033e6fd69c3_800x596.png 424w, https://substackcdn.com/image/fetch/$s_!zgsX!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F366f364a-cc1b-4e88-a124-7033e6fd69c3_800x596.png 848w, https://substackcdn.com/image/fetch/$s_!zgsX!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F366f364a-cc1b-4e88-a124-7033e6fd69c3_800x596.png 1272w, https://substackcdn.com/image/fetch/$s_!zgsX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F366f364a-cc1b-4e88-a124-7033e6fd69c3_800x596.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>(Phil Windley) <a href="https://www.windley.com/archives/2026/03/cross-domain_delegation_in_a_society_of_agents.shtml">Cross-Domain Delegation in a Society of Agents</a></h3><blockquote><p>Cross-domain delegation requires more than transferring a credential. In a society of agents, policies define boundaries, promises communicate intent derived from those policies, credentials carry delegated authority, and reputation allows trust to emerge through repeated interactions.</p></blockquote><h3>(Phil Windley) <a href="https://www.windley.com/archives/2026/03/delegation_as_data_applying_cedar_policies_to_openclaw_subagents.shtml">Delegation as Data: Applying Cedar Policies to OpenClaw Subagents</a></h3><blockquote><p>Intra-domain delegation enables an agent to grant constrained authority to subagents without expanding the system&#8217;s trust boundary. In the OpenClaw + Cedar demo, delegation is modeled as data and enforced by a stable policy set, preserving policy integrity while allowing dynamic scoping of power.</p></blockquote><h3><a href="https://www.linkedin.com/feed/update/urn:li:activity:7435478895669231616/?updateEntityUrn=urn%3Ali%3Afs_updateV2%3A%28urn%3Ali%3Aactivity%3A7435478895669231616%2CFEED_DETAIL%2CEMPTY%2CDEFAULT%2Cfalse%29">OAuth SPIFFE Client Authentication</a></h3><h2>Government News</h2><h3>[UK] <a href="https://www.computerweekly.com/news/366639706/Government-wants-to-build-digital-ID-system-in-house">Government wants to build digital ID system in-house</a></h3><blockquote><p>The Home Affairs Committee hearing on digital ID reveals consultation is due next week; there will be no central database; and while government wants to build the system in-house, it will not replace private digital ID providers</p></blockquote><h3><a href="https://www.linkedin.com/pulse/monetizing-digital-public-infrastructure-ranjit-john-ph-d--8pgvc/?trackingId=MODZMa7tTymA1yEovDBCQA%3D%3D">Monetizing Digital Public Infrastructure</a></h3><blockquote><p>Aadhaar provided high-quality data, actionable intelligence, and a trusted nation-scale process for verifying identity. Going from identity to impact will require an actionable framework that can baseline SDG status, provide transparency into underserved communities and geographies, identify gaps, make targeted investments, and quantify the return on investments. It will require reforming service delivery models, adopting best practices, and continuous and consistent monitoring of progress toward the goals.</p></blockquote><h3>[Response] (INATBA) <a href="https://www.linkedin.com/feed/update/urn:li:activity:7435334547300331520/?updateEntityUrn=urn%3Ali%3Afs_updateV2%3A%28urn%3Ali%3Aactivity%3A7435334547300331520%2CFEED_DETAIL%2CEMPTY%2CDEFAULT%2Cfalse%29">Privacy is not a secondary feature. It&#8217;s the foundation of the EUDI Wallet.</a></h3><h2>Interesting Enterprise Developments in Identity</h2><h3><a href="https://techcommunity.microsoft.com/blog/coreinfrastructureandsecurityblog/the-future-of-identity-self-service-account-recovery-preview-in-microsoft-entra/4499749">The Future of Identity: Self-Service Account Recovery (Preview) in Microsoft Entra</a></h3><h3>The transition to a passwordless world is incomplete if the &#8220;back door&#8221; (recovery) remains open and insecure. By integrating government-grade identity verification directly into the login flow, Microsoft Entra provides the final piece of the puzzle: a recovery method that is as secure as the primary login itself.</h3><h3><a href="https://digitalidentity.nz/2026/03/04/virtual-coffee-chat-recap-march-2026/">Virtual Coffee Chat Recap &#8211; March 2026</a></h3><blockquote><p>The Trusted Credential Adoption Group: Six Use Cases to Watch</p><p>The Trusted Credential Adoption Group (TCA Group) shared an update on its progress across six priority use cases for credential adoption in Aotearoa, including bank account opening, KYC (Know Your Customer), and lost phone / device recovery verification. The group is targeting a May deadline for market communications. Anyone interested in contributing or observing is welcome &#8211; reach out to the DINZ team to find out more.</p></blockquote><h3><a href="https://www.linkedin.com/feed/update/urn:li:activity:7434555779279650816/?updateEntityUrn=urn%3Ali%3Afs_updateV2%3A%28urn%3Ali%3Aactivity%3A7434555779279650816%2CFEED_DETAIL%2CEMPTY%2CDEFAULT%2Cfalse%29">If we don&#8217;t solve Digital Product Passport portability now&#8230;.</a></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!27WD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f5ff576-506f-490c-b4ed-de8ceccd6d79_800x600.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!27WD!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f5ff576-506f-490c-b4ed-de8ceccd6d79_800x600.png 424w, https://substackcdn.com/image/fetch/$s_!27WD!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f5ff576-506f-490c-b4ed-de8ceccd6d79_800x600.png 848w, https://substackcdn.com/image/fetch/$s_!27WD!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f5ff576-506f-490c-b4ed-de8ceccd6d79_800x600.png 1272w, https://substackcdn.com/image/fetch/$s_!27WD!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f5ff576-506f-490c-b4ed-de8ceccd6d79_800x600.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!27WD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f5ff576-506f-490c-b4ed-de8ceccd6d79_800x600.png" width="800" height="600" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8f5ff576-506f-490c-b4ed-de8ceccd6d79_800x600.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:600,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!27WD!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f5ff576-506f-490c-b4ed-de8ceccd6d79_800x600.png 424w, https://substackcdn.com/image/fetch/$s_!27WD!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f5ff576-506f-490c-b4ed-de8ceccd6d79_800x600.png 848w, https://substackcdn.com/image/fetch/$s_!27WD!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f5ff576-506f-490c-b4ed-de8ceccd6d79_800x600.png 1272w, https://substackcdn.com/image/fetch/$s_!27WD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f5ff576-506f-490c-b4ed-de8ceccd6d79_800x600.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>(Kantara Initiative) <a href="https://kantarainitiative.org/publication-notice-sp-800-63a-4-service-assessment-criteria-sac/">Publication Notice: SP 800-63A-4 Service Assessment Criteria (SAC)</a></h3><blockquote><p>Kantara Initiative announces the formal publication of the Kantara Identity Assurance Framework: SP 800-63A-4 Service Assessment Criteria (SAC) &amp; Statement of Criteria Applicability (SoCA), aligned to NIST Special Publication 800-63A Revision 4 &#8211; Identity Proofing.</p></blockquote>]]></content:encoded></item><item><title><![CDATA[Identosphere 165 Feb 14-28: SEDI Passes w/ Identity Bill of Rights (phases out mDL) • NIST working on Agentic AI security • MATTR on Agentic Trust • DPI & AI ]]></title><description><![CDATA[This is the mostly weekly Identosphere Newsletter sharing highlights from around the web covering Decentralized and Self-Sovereign Identity curated by Kaliya Young, Identity Woman.]]></description><link>https://newsletter.identosphere.net/p/identosphere-165-feb-14-28-sedi-passes</link><guid isPermaLink="false">https://newsletter.identosphere.net/p/identosphere-165-feb-14-28-sedi-passes</guid><dc:creator><![CDATA[IdentityWoman]]></dc:creator><pubDate>Fri, 06 Mar 2026 23:07:24 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!24dG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab39d474-6fd4-4de7-8148-6d1a570c4d09_768x374.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>SEDI Passes!</h2><h3>[Utah News Dispatch] <a href="https://utahnewsdispatch.com/2026/02/12/utah-digital-id-bill-of-rights-could-lead-nation-in-privacy-framework/">Utah&#8217;s digital ID program, &#8216;digital bill of rights&#8217; could lead the nation in privacy framework</a></h3><blockquote><p>One year after outlining state policy and creating privacy requirements, the legislature is back with a bill to implement a digital ID program for Utahns</p></blockquote><h2><a href="https://www.linkedin.com/feed/update/urn:li:share:7435348019459543040/?originTrackingId=ZS2w60Jm17nEGEa5LuM%2FVQ%3D%3D">Last night the Utah Senate unanimously passed SB275 State-Endorsed Digital Identity Amendments.</a></h2><blockquote><p>&#8226; Establishes the Digital Identity Bill of Rights</p><p>&#8226; Authorizes Utah&#8217;s State-Endorsed Digital Identity (SEDI) Program</p><p>&#8226; Creates the nation&#8217;s first comprehensive consumer protection framework governing issuers, wallet providers, verifiers, and relying parties for all state digital identities (not just SEDI).</p><p>&#8226; Introduces a first-in-the-nation Duty of Loyalty requirement,</p></blockquote><h3><a href="https://www.linkedin.com/feed/update/urn:li:activity:7433627898743259137/?updateEntityUrn=urn%3Ali%3Afs_updateV2%3A%28urn%3Ali%3Aactivity%3A7433627898743259137%2CFEED_DETAIL%2CEMPTY%2CDEFAULT%2Cfalse%29">If you&#8217;re asking &#8220;which digital ID wins,&#8221; you&#8217;re asking the wrong question.</a></h3><blockquote><p>A simple way to think about it:</p><p>&#9989; mDL = the document credential (high assurance, broad acceptance)</p><p>&#9989; VCs = the format for signed claims (portable proofs across use cases)</p><p>&#9989; SEDI = the governance / trust model (control, privacy posture, delegation)</p><p>This matters because once digital identity becomes public infrastructure, the debate shifts from &#8220;should we?&#8221; to &#8220;can others safely rely on it?&#8221;</p></blockquote><h3><a href="https://hendersoni.substack.com/p/utah-digital-identity-bill-of-right?r=3ye5r&amp;utm_medium=ios&amp;triedRedirect=true&amp;_src_ref=linkedin.com">Utah Digital Identity Bill of Right (and MyTerms?)</a></h3><blockquote><p>What I like most is the associated Bill of Rights. I&#8217;ve re-shared that as is below, and then added my own derivation that looks at these rights in individual/ first party language.</p></blockquote><h2>Agentic AI</h2><h3>(WE-BUILD) <a href="https://prod1-plate-attachments.s3.amazonaws.com/attachments/5548e27bf9/WE%20BUILD%20Non-paper%20-%20Trusted%20Identities%20for%20AI%20Agents%20-%20An%20Opportunity%20for%20Europe%20-%2027-02-26.pdf">&#120295;&#120319;&#120322;&#120320;&#120321;&#120306;&#120305; &#120284;&#120305;&#120306;&#120315;&#120321;&#120310;&#120321;&#120310;&#120306;&#120320; &#120307;&#120316;&#120319; &#120276;&#120284; &#120276;&#120308;&#120306;&#120315;&#120321;&#120320; &#8211; &#120276; &#120280;&#120322;&#120319;&#120316;&#120317;&#120306;&#120302;&#120315; &#120290;&#120317;&#120317;&#120316;&#120319;&#120321;&#120322;&#120315;&#120310;&#120321;&#120326;</a></h3><blockquote><p>We suggest that:</p><p>&#9679; The European Union convenes stakeholders to form a strategy for safe AI agents based on the EDIF and the Business Wallet framework.</p><p>&#9679; Standards bodies create working groups on interoperability between EU Digital Identity Wallets and AI agents.</p><p>&#9679; The European Union prioritises testing and pilots, and regulates only where strictly necessary</p></blockquote><h2>NIST <a href="https://www.nccoe.nist.gov/projects/software-and-ai-agent-identity-and-authorization#project-promo">Accelerating the Adoption of Software and AI Agent Identity and Authorization</a> &lt;- seeking comments</h2><blockquote><p>The US National Institute of Standards and Technology (NIST) has <a href="https://www.nccoe.nist.gov/sites/default/files/2026-02/accelerating-the-adoption-of-software-and-ai-agent-identity-and-authorization-concept-paper.pdf">released</a> a draft concept paper, titled Accelerating the Adoption of Software and AI Agent Identity and Authorization, which seeks to understand how identity principles such as identification, authentication, and authorization, and associated standards, apply to AI agents.</p><p>NIST is <a href="https://www.nccoe.nist.gov/projects/software-and-ai-agent-identity-and-authorization#project-promo">soliciting</a> comments on the paper, with responses accepted until 2 April 2026.</p></blockquote><h3><a href="https://unmitigatedrisk.com/?p=1129&amp;c=1">Agents Are More Like Humans Than Workloads. Here&#8217;s Why That Matters for Identity.</a></h3><h3><a href="https://www.linkedin.com/pulse/20-year-transition-from-cloud-ai-trust-parthasarathi-v-igxfc">The 20-year transition from Cloud to AI to Trust</a></h3><blockquote><p>- 2025s era of AI Infrastructure, currently democratizing intelligence through &#8220;<a href="https://x.com/ANI/status/2023671601259233788">AI ka UPI</a>&#8220; and shared compute resources.</p><p>- AI as the catalyst that makes the Trust Infrastructure necessary.</p><p>- 2030s era of Trust Infrastructure&#8212;the &#8220;next digitization wave&#8221;&#8212;which renders global value networks paper-less, document-less, contact-less, cash-less, presence-less and border-less indispensable layer of verified credibility anchored through trust infrastructures.</p></blockquote><h3>MATTR series on Agentic AI Trust</h3><blockquote><p>1) <a href="https://www.linkedin.com/posts/claire-barber-399bbb62_over-the-coming-weeks-ill-be-sharing-a-share-7424652714997006337-L4Qr/?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAACAeKCMBX9EDDIPREYyWcRHvXuAJw_sco34">Agentic Commerce Needs Trust Infrastructure, Not Just Intelligence</a></p><p>2) <a href="https://www.linkedin.com/posts/claire-barber-399bbb62_series-part-2-why-agentic-commerce-will-share-7427519677502894080-uYTZ/?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAAigptEBvfllv0To3JariT8fefU182xQecw">Why Agentic Commerce Will Fragment &#8212; and Why That&#8217;s Not the Real Risk</a></p><p>3) <a href="https://www.linkedin.com/posts/claire-barber-399bbb62_series-part-3-the-hard-part-of-agentic-commerce-activity-7430378897512452096-8tJQ/?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAACAeKCMBX9EDDIPREYyWcRHvXuAJw_sco34">The Hard Part of Agentic Commerce Isn&#8217;t AI &#8212; It&#8217;s Delegation</a></p><p>4) <a href="https://www.linkedin.com/feed/update/urn:li:activity:7433030506407161856/?updateEntityUrn=urn%3Ali%3Afs_updateV2%3A%28urn%3Ali%3Aactivity%3A7433030506407161856%2CFEED_DETAIL%2CEMPTY%2CDEFAULT%2Cfalse%29">Why Trust Can&#8217;t Be Hard-Coded Into Agentic Systems</a></p><p>5) <a href="https://www.linkedin.com/posts/claire-barber-399bbb62_series-part-5-building-the-trust-fabric-activity-7435528742543949825-BiTT/?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAACAeKCMBX9EDDIPREYyWcRHvXuAJw_sco34">Building the Trust Fabric for Agentic Systems</a></p></blockquote><h3><a href="https://www.linkedin.com/feed/update/urn:li:activity:7428873430235561984/?updateEntityUrn=urn%3Ali%3Afs_updateV2%3A%28urn%3Ali%3Aactivity%3A7428873430235561984%2CFEED_DETAIL%2CEMPTY%2CDEFAULT%2Cfalse%29">AI agents have no way to judge what&#8217;s trustworthy.</a></h3><blockquote><p>With a Trust Graph, AI agents and applications can instantly determine trust and authenticity. And if you&#8217;re adopting content authenticity standards (CAI and C2PA), this will extend that effort to a new trust layer that we&#8217;re building at<a href="http://noosphere.tech/"> Noosphere.Tech</a>.</p></blockquote><h2>Nation &amp; State Digital ID</h2><h3><a href="https://www.biometricupdate.com/202602/portugal-digital-business-wallet-aims-to-simplify-administration-for-companies">Portugal digital business wallet aims to simplify administration for companies</a></h3><blockquote><p>Tool for unifying company documents launches with four credentials, more on the way</p><p><a href="https://www.biometricupdate.com/tag/portugal">Portugal</a> has become the first EU nation to introduce a version of the European Business Wallet (EWB) for companies. A government release says the wallet &#8220;centralises in a single digital channel all of a company&#8217;s official documents in a secure and updated way.&#8221;</p></blockquote><h3><a href="https://www.biometricupdate.com/202602/australian-state-of-victoria-kicks-off-digital-birth-certificate-pilot">Australian state of Victoria kicks off digital birth certificate pilot</a></h3><blockquote><p>The digital birth certificate will first be trialled for enrolling children into kindergarten in three council areas, according to the Victorian government. Parents can add the digital document to the Service Victoria app, which currently offers more than 170 government services, including the veterans card, seniors card, digital driver&#8217;s licence, and more.</p></blockquote><h2>Books</h2><h3>(Eve Maler) [Book] <a href="https://www.linkedin.com/feed/update/urn:li:activity:7433223638482472960?updateEntityUrn=urn%3Ali%3Afs_updateV2%3A%28urn%3Ali%3Aactivity%3A7433223638482472960%2CFEED_DETAIL%2CEMPTY%2CDEFAULT%2Cfalse%29">Your identity strategy is your business model in disguise.</a></h3><blockquote><p>Her book: <a href="https://masteringdigitalidentity.com/">Mastering Digital Identity: From Risk to Revenue</a> launches April 23, 2026.</p><p>The book cover shows four interlocked rings, inspired by the Four Ps and a Celtic form called Solomon&#8217;s Knot. It&#8217;s not just pretty, it&#8217;s the point. Pull one thread, and the others move with it.</p></blockquote><h3>Book: <a href="https://www.linkedin.com/feed/update/urn:li:activity:7430264365817397248/">When Credentials Cause Harm: Unpacking the Risks of Verifiable Learning and Work Records.</a></h3><blockquote><p>In this powerful and research-grounded book, Kelly Page explores how verifiable learning and employment records (LERs) can unintentionally produce:</p><p>&#128995; Surveillance and behavioral monitoring</p><p>&#128995; Platform dependency and vendor lock-in</p><p>&#128995; Misrepresentation of human experience</p><p>&#128995; Erosion of meaningful consent</p><p>&#128995; New inequities for marginalized communities</p></blockquote><h2>Considering the Role of the States</h2><h3><a href="https://indyjohar.substack.com/p/degenerative-volatility-and-the-drift?r=8anod&amp;utm_medium=ios&amp;triedRedirect=true&amp;_src_ref=linkedin.com">Degenerative Volatility and the Drift of the Westphalian State towards War</a></h3><blockquote><p>The Westphalian state does not invent new architecture in moments of pressure. It activates the control surfaces it already possesses: fiscal instruments, security apparatus, regulatory authority, procurement systems, and borders. These are high-leverage tools. They can steer capital, redirect production, restrict flows, and enforce compliance.</p></blockquote><h3>(Balaji)<a href="https://x.com/balajis/status/2025177651175194790?s=20"> The purpose of crypto is to build a code-based order, because the rules-based order is unfortunately collapsing.</a></h3><blockquote><p>That&#8217;s what cryptocurrency was built for. If and when your state fails, or turns against you, the Internet will be there for you.</p></blockquote><h3><a href="https://www.linkedin.com/pulse/digital-sovereignty-without-drama-gianfranco-cecconi-0kdpe/?trackingId=7Uvuph5PSo6FZ36zxJheSg%3D%3D">Digital sovereignty without the drama</a></h3><blockquote><p>You might think that worrying about digital sovereignty is a &#8220;rich-world concern&#8221;, a hobby for digital activists or neo-luddites. I believe the opposite: it&#8217;s a duty &#8212; a way to deserve the amazing tools we now have at our disposal, and the extraordinary potential they carry, for good or for harm.</p></blockquote><h3><a href="https://digitalpublicinfrastructure.ai/">DPI-AI Framework</a> Vision paper on Building AI-Ready Nations through Digital Public Infrastructure.</h3><blockquote><p>This paper presents the DPI&#8211;AI Framework as a practical way to think about how <a href="https://digitalpublicinfrastructure.ai/glossary/artificial-intelligence-ai/">artificial intelligence</a> can be integrated into public digital systems through <a href="https://digitalpublicinfrastructure.ai/glossary/digital-public-infrastructure-dpi/">Digital Public Infrastructure</a> (DPI). It is written at a moment when AI capabilities are advancing rapidly, while many governments are still grappling with fragmented systems, legacy architectures, and uneven institutional capacity. Rather than proposing AI as a standalone transformation, the paper explores how existing DPI foundations can provide structure and coherence for the use of AI in the public sector.</p></blockquote><h3><a href="https://www.linkedin.com/feed/update/urn:li:activity:7429824064480919552/?updateEntityUrn=urn%3Ali%3Afs_updateV2%3A%28urn%3Ali%3Aactivity%3A7429824064480919552%2CFEED_DETAIL%2CEMPTY%2CDEFAULT%2Cfalse%29">Is AI Sovereignty Possible: Balancing Autonomy and Interdependence</a></h3><p>AI sovereignty is not about full independence but managed interdependence across a deeply globalised stack. The strategic priority is diversification, alliances, interoperability, and resilience across minerals, chips, cloud, energy, and talent.</p><h3>Digital Convergence Initiative - Interop Standards for Employment Support Systems and Social Protection</h3><blockquote><p>&#120315;&#120316;&#120324; &#120302;&#120323;&#120302;&#120310;&#120313;&#120302;&#120303;&#120313;&#120306; &#120307;&#120316;&#120319; &#120317;&#120322;&#120303;&#120313;&#120310;&#120304; &#120319;&#120306;&#120323;&#120310;&#120306;&#120324;. Your feedback is&#8239;extremely valuable&#8239;to ensure the standards are robust, scalable, and inclusive. You can&#8239;access&#8239;the draft standards on&#8239;DCI&#8239;GitBook&#8239;(&#128279;<a href="https://lnkd.in/eHCkMK3Y"> https://lnkd.in/eHCkMK3Y</a>). <a href="https://lnkd.in/eaXaha-i">&#120291;&#120322;&#120303;&#120313;&#120310;&#120304; &#120319;&#120306;&#120323;&#120310;&#120306;&#120324; &#120324;&#120306;&#120303;&#120310;&#120315;&#120302;&#120319;</a> &#120288;&#120302;&#120319;&#120304;&#120309; &#120813;&#120814;, &#120814;&#120812;&#120814;&#120818;, &#120307;&#120319;&#120316;&#120314; &#120813;&#120816;:&#120812;&#120812; &#120321;&#120316; &#120813;&#120817;:&#120815;&#120812; &#120278;&#120280;&#120295;! We will discuss the standards development process and&#8239;address any questions or concerns you might have about the standards.&#8239;This is&#8239;a great opportunity&#8239;to make your voice heard!</p></blockquote><h3><a href="https://thetrustgraph.substack.com/p/delegation-after-identity?r=2kd2e&amp;utm_campaign=post&amp;utm_medium=web&amp;triedRedirect=true&amp;_src_ref=linkedin.com">Delegation After Identity</a></h3><blockquote><p> We now speak fluently about identifiers, wallets, verifiable credentials and interoperable trust registries. Yet the structural shift unfolding in parallel is far more consequential. Once identity becomes portable and machine-readable, the critical question is no longer who you are. It is who can act on your behalf, under what authority, within what boundaries, and with what means of withdrawal.</p><p><strong>Part 1: Why Governance Has Already Moved</strong></p><p>1. Authority Lives in Execution Infrastructure</p><p>2. Identity Solved Recognition, Not Authority</p><p>3. Legitimacy as an Architectural Property</p><p>4. Guardianship Formalises What Markets Cannot Price</p><p>5. The Delegation Stack as Governance Infrastructure</p><p><strong>Part 2: The Spectrum of Autonomous Action</strong></p><p>6. Five Modes of Delegation, Five Governance Regimes</p><p>7. The Delegation Paradox</p><p>8. Three Pillars of Delegation Infrastructure</p><p>9. Predictable Failure Modes</p><p><strong>Part 3: Building the Delegation Layer</strong></p><p>10. Guardianship Patterns for Autonomous Systems</p><p>11. Delegation as Civic Infrastructure</p><p>12. The Irreversible Transformation</p></blockquote><h3><a href="https://digitalstatecraft.substack.com/p/the-minimum-digital-kernel-of-an?r=azqvp">The Minimum Digital Kernel of an Unbundled State</a></h3><blockquote><p>Government services often fail in a quiet way. You apply for a benefit, get rejected, and no one can clearly explain: Which rule was used? Which record was checked? Who is responsible? How do you fix it?</p></blockquote><h3><a href="https://www.thedatasphere.org/datasphere-publish/sandboxes-for-dpi/">Sandboxes for DPI: Co-creating the blocks of digital trust</a></h3><blockquote><p>Online launch on March 12th (registration needed):<a href="https://lnkd.in/dYV34cTP"> https://lnkd.in/dYV34cTP</a></p><p>Our report refines the classification for experimentation by sharpening the distinction between regulatory, operational, and hybrid sandboxes, while proposing the first-ever formal definition of a &#8220;DPI Sandbox.&#8221;  This conceptual framework is supported by the first global mapping of sandboxes specifically designed for DPI. We conclude with key recommendations for governments, the private sector, and civil society to engage in collaborative experimentation.</p></blockquote><h2>Thoughtful</h2><h3><strong>Question for us..How do we reduce the preception of risk? </strong><a href="https://www.hightechstrategies.com/perception-of-low-risk/">All Successful Innovations Reduce the Perception of Risk</a></h3><blockquote><p>Safety in Numbers</p><p>An independent infrastructure that allows people to interact with others they relate to, find independent sources of support and feel safe.</p></blockquote><h3><a href="https://www.linkedin.com/pulse/next-digitization-wave-moving-from-data-driven-trust-native-v-etqaf/">The Next Digitization Wave: Moving from Data-Driven to Trust-Native</a></h3><blockquote><p>The war on PDFs is to solve &#8216;data debt&#8217; and reclaim &#8216;dormant intelligence&#8217;. Startups are looking at semantic data by turning documents into structured code (like JSON or Markdown) that an AI can &#8220;reason&#8221; over instantly. And this is already going on.</p><p>Verifiable Credentials allow for Atomic Proofs. Instead of filling out a form to prove you&#8217;re a licensed broker or a doctor, your digital wallet shares a cryptographically signed Credential. The system checks the digital signature, sees it is from a trusted authority, and accepts it instantly.</p></blockquote><h3><a href="https://permissionlessimagination.substack.com/p/digital-identity-under-platform-rule">Digital Identity Under Platform Rule (Part One)</a></h3><p>Challenging the Authority Platforms Claim Over Identity in Digital and Physical Spaces</p><h3><a href="https://permissionlessimagination.substack.com/p/digital-identity-under-platform-rule-abd">Digital Identity Under Platform Rule (Part Two)</a></h3><p>When Technical Control Outpaces Social Governance &#8212; The Cost of Abstraction in Identity Infrastructure at Scale</p><p>The full essay is in conversation with written work from:<a href="https://www.linkedin.com/company/radicalxchange/"> RadicalxChange Foundation</a>,<a href="https://www.linkedin.com/in/eglenweyl/"> E. Glen Weyl</a>,<a href="https://www.linkedin.com/in/kaliya/"> Kaliya Young</a></p><h3>(oldy but goodie ) <a href="https://medium.com/learning-machine-blog/identity-and-digital-self-sovereignty-1f3faab7d9e3">Identity and Digital Self-Sovereignty: A New Paradigm for Sovereignty on the High Seas</a></h3><blockquote><p>Sovereignty on Today&#8217;s High Seas: The Internet</p><p>Identity as Continuous Addressability: Continuity of self-sameness over time is the most fundamental presupposition about identity which must be enshrined in a self-sovereign system of governance.</p></blockquote><h3><a href="https://www.linkedin.com/feed/update/urn:li:activity:7433254615237689346/?updateEntityUrn=urn%3Ali%3Afs_updateV2%3A%28urn%3Ali%3Aactivity%3A7433254615237689346%2CFEED_DETAIL%2CEMPTY%2CDEFAULT%2Cfalse%29">Is AI Sovereignty Possible In 2026? Managed Interdependence Beats Isolation</a></h3><blockquote><p>AI Sovereignty Is Not A Switch. It Is A Strategy.</p><p>This report argues &#8220;AI Sovereignty&#8221; is best understood as a spectrum of choices that increase a country&#8217;s capacity to make independent decisions about critical AI infrastructure deployment, use, &amp; adoption, not literal autarky. The practical alternative is &#8220;Managed Interdependence&#8221;, using alliances &amp; partnerships to reduce risk across the stack while preserving interoperability.</p></blockquote><h3><a href="https://www.linkedin.com/feed/update/urn:li:activity:7434567777224605698/?updateEntityUrn=urn%3Ali%3Afs_updateV2%3A%28urn%3Ali%3Aactivity%3A7434567777224605698%2CFEED_DETAIL%2CEMPTY%2CDEFAULT%2Cfalse%29">The Office for Digital Identity and Attributes</a></h3><blockquote><p>The Office for Digital Identity and Attributes within the<a href="https://www.linkedin.com/company/scitechgovuk/"> Department for Science, Innovation and Technology</a> has today published updates to the UK&#8217;s digital ID / Digital Verification Services Trust Framework (DVSTF, renamed from the DIATF):</p></blockquote><h3>(Telefonica) <a href="https://www.telefonica.com/en/communication-room/blog/future-biometric-why-next-generation-solutions-matter/">The Future is Biometric: Why Next Generation Solutions Matter</a></h3><blockquote><p>Next-generation biometric systems, powered by decentralized AI techniques like federated learning and on-device training, are enabling secure, privacy-preserving authentication across sectors while addressing challenges of bias, spoofing, and GDPR compliance &#8212; positioning biometrics as a cornerstone of trustworthy digital identity.</p></blockquote><h3><a href="https://www.linkedin.com/feed/update/urn:li:activity:7434164178698952704/?updateEntityUrn=urn%3Ali%3Afs_updateV2%3A%28urn%3Ali%3Aactivity%3A7434164178698952704%2CFEED_DETAIL%2CEMPTY%2CDEFAULT%2Cfalse%29">Scientists say no to age-assessment technology.</a></h3><blockquote><p>TL;DR Governments worldwide are moving to restrict access to online services based on age. More than 370 scientists have signed an open letter calling for a moratorium on age-assessment technologies until there is solid evidence of their feasibility and societal impact. Protecting minors is essential &#8212; but blanket identity control across the internet is unlikely to be the right solution.</p></blockquote><h2><a href="https://www.linkedin.com/feed/update/urn:li:activity:7432135145266003968/?updateEntityUrn=urn%3Ali%3Afs_updateV2%3A%28urn%3Ali%3Aactivity%3A7432135145266003968%2CFEED_DETAIL%2CEMPTY%2CDEFAULT%2Cfalse%29">Software is Changing</a></h2><blockquote><p>Our enterprise customers aren&#8217;t paying for the login button; they&#8217;re paying for the human accountability behind it: the SLAs, the SOC 2 audits, the active CVE responses, and the security hygiene that a machine can&#8217;t guarantee. Open source isn&#8217;t dying, but the business model has to evolve. We&#8217;re moving from selling &#8220;features&#8221; to selling &#8220;responsibility.&#8221;</p></blockquote><h2>EU</h2><h3><a href="https://cre8.github.io/eudi-nexus/">EUDI Nexus - Wallet Ecosystem StandardsEUDI Focus</a></h3><h3><a href="https://www.linkedin.com/feed/update/urn:li:activity:7432705729129713664/?updateEntityUrn=urn%3Ali%3Afs_updateV2%3A%28urn%3Ali%3Aactivity%3A7432705729129713664%2CFEED_DETAIL%2CEMPTY%2CDEFAULT%2Cfalse%29">6 signals shaping the EUDI Wallet ecosystem. &#127466;&#127482;&#128242;</a></h3><blockquote><p>The ecosystem is moving from discussion to deployment. The only way to confidently de-risk your EUDI project is with reliable market intelligence. Join hundreds of leaders who rely on this newsletter to stay ahead of the curve.</p><p>(Also see the <a href="https://www.lissi.id/newsletter">Lissi Newsletter on EUDI</a>)</p></blockquote><h3><a href="https://www.linkedin.com/pulse/mutual-recognition-uk-eu-digital-identity-schemes-richard-oliphant-ridaf/">Mutual recognition of UK and EU digital identity schemes</a></h3><blockquote><p>We tackled the vexed legal and political question of how to align the fledgling UK digital identity system with the EU eIDAS framework and the EU digital identity wallet (EUDI wallet).</p></blockquote><h3><a href="https://www.hks.harvard.edu/centers/carr-ryan/publications/product-safety-playbook-digital-age">A Product Safety Playbook for the Digital Age</a></h3><blockquote><p>Current digital product regulation resembles a chaotic free-for-all rather than a coherent strategy, and the author argues that adopting a &#8220;digital product safety&#8221; framework &#8212; modeled on the history of physical product safety regulation &#8212; is urgently needed to counter both the natural knowledge lag and industry&#8217;s well-funded resistance tactics.</p></blockquote><h3>(Siros) <a href="https://siros.org/blog/zero-knowledge-proofs-selective-disclosure-and-the-future-of-scalable-wallets">Zero Knowledge Proofs: shifting where the work happens</a></h3><blockquote><p>While current digital identity wallets often rely on batch credential issuance to achieve selective disclosure &#8212; a method that becomes costly and correlation-prone at national scale &#8212; the SIROS Foundation argues that zero-knowledge proofs offer a more privacy-preserving and scalable alternative by shifting cryptographic complexity from central issuers to user devices, enabling unlinkable, minimal-disclosure proofs from a single credential.</p></blockquote><h3>(IEEE) <a href="https://spectrum.ieee.org/age-verification">The Age-Verification Trap: Verifying user&#8217;s ages undermines everyone&#8217;s data protection</a></h3><blockquote><p>Age-restriction laws create an inescapable trap: effectively enforcing minimum age requirements forces platforms to collect, retain, and continuously monitor personal data in ways that directly undermine data privacy law &#8212; and the problem is worse in countries with weaker identity infrastructure, where companies fill the gap with even more invasive surveillance.</p></blockquote><h3><a href="https://www.linkedin.com/feed/update/urn:li:activity:7431673863970762752/?updateEntityUrn=urn%3Ali%3Afs_updateV2%3A%28urn%3Ali%3Aactivity%3A7431673863970762752%2CFEED_DETAIL%2CEMPTY%2CDEFAULT%2Cfalse%29">#OfDIA&#8217;s survey on &#8220;international use of digital identities and credentials&#8221;</a></h3><blockquote><p>There are no earth-shattering revelations. The 39 respondents overwhelmingly agreed that the UK should prioritise a &#8216;mutual recognition agreement&#8217; (MRA) with the EU.</p></blockquote><h3><a href="https://www.linkedin.com/feed/update/urn:li:activity:7431712453052334081?updateEntityUrn=urn%3Ali%3Afs_updateV2%3A%28urn%3Ali%3Aactivity%3A7431712453052334081%2CFEED_DETAIL%2CEMPTY%2CDEFAULT%2Cfalse%29">What happened last week at the AI for Impact Summit in India??!?</a></h3><blockquote><p>1. India positioned this as the first AI summit hosted by the Global South</p><p>2. Digital Public Infrastructure (DPI) was everywhere.</p><p>3. Multilingualism emerged as a core equity issue</p><p>4. India unveiled the &#8220;MANAV&#8221; vision &#8230; Moral and ethical systems, Accountable governance, National sovereignty, Accessible and inclusive technology, Valid and legitimate systems.</p><p>5. Big money showed up. Google announced a $15 billion investment in an AI hub in Visakhapatnam.</p><p>6. The Global South framing was real to many in my network, not just branding.</p></blockquote><h3><a href="https://www.linkedin.com/feed/update/urn:li:activity:7431617034892967936/?updateEntityUrn=urn%3Ali%3Afs_updateV2%3A%28urn%3Ali%3Aactivity%3A7431617034892967936%2CFEED_DETAIL%2CEMPTY%2CDEFAULT%2Cfalse%29">The customer experience of the EU Digital ID Wallet will have to be 10x better</a></h3><blockquote><p>The EUDIW will struggle to achieve mass adoption unless its designers prioritize user experience over technology and regulation &#8212; and right now, there&#8217;s little evidence they are.</p></blockquote><h3><a href="https://www.linkedin.com/feed/update/urn:li:activity:7430569616726396929?updateEntityUrn=urn%3Ali%3Afs_updateV2%3A%28urn%3Ali%3Aactivity%3A7430569616726396929%2CFEED_DETAIL%2CEMPTY%2CDEFAULT%2Cfalse%29">Triples failed us. Here&#8217;s what we built instead. &#129504;</a></h3><blockquote><p>Classic graph structures like RDF triples fail to capture the hierarchical, multi-relational nature of human memory, but through a progression from hypergraphs to metagraphs, the author arrived at layered bipartite graphs as an elegant solution. This approach achieves full metagraph expressiveness &#8212; modeling complex, recursive, contextual memory &#8212; using standard property graph databases like Neo4j that already exist today.</p></blockquote><h3><a href="https://www.linkedin.com/feed/update/urn:li:activity:7430188434570330113?updateEntityUrn=urn%3Ali%3Afs_updateV2%3A%28urn%3Ali%3Aactivity%3A7430188434570330113%2CFEED_DETAIL%2CEMPTY%2CDEFAULT%2Cfalse%29">&#119816;&#119839; &#119811;&#119842;&#119840;&#119842;&#119853;&#119834;&#119845; &#119823;&#119851;&#119848;&#119837;&#119854;&#119836;&#119853; &#119823;&#119834;&#119852;&#119852;&#119849;&#119848;&#119851;&#119853;&#119852; &#119852;&#119853;&#119834;&#119858; &#119836;&#119848;&#119846;&#119849;&#119845;&#119842;&#119834;&#119847;&#119836;&#119838;-&#119848;&#119847;&#119845;&#119858;, &#119853;&#119841;&#119838;&#119858; &#119835;&#119838;&#119836;&#119848;&#119846;&#119838; &#119834; &#119836;&#119848;&#119852;&#119853; &#8212; &#119847;&#119848;&#119853; &#119834; &#119836;&#119834;&#119853;&#119834;&#119845;&#119858;&#119852;&#119853;.</a></h3><blockquote><p>A DPP is a standardized data exchange infrastructure. Value emerges when:</p><p>&#8226; The right additional data is shared</p><p>&#8226; Clear business cases are defined</p><p>&#8226; Financial incentives are aligned</p><p>Not more data. -&gt; The right data.</p></blockquote><h3><a href="https://trbouma.substack.com/p/architecture-before-argument?utm_campaign=post-expanded-share&amp;utm_medium=web&amp;triedRedirect=true&amp;_src_ref=linkedin.com">Architecture Before Argument</a></h3><blockquote><p>When new substrates emerge, the first draft of order is rarely written in a legislature. It is written in contracts, in code, in standards documents, in committee rooms where engineers argue about field lengths and message formats. The legal system often arrives later, sometimes years later, to interpret, correct, or contain what has already hardened into infrastructure.</p></blockquote><h3><a href="https://www.linkedin.com/feed/update/urn:li:activity:7429656079086813185/">Digital Infrastructure and Legal Certainty</a></h3><blockquote><p>The<a href="https://www.linkedin.com/company/uncitral/"> UNCITRAL: United Nations Commission on International Trade Law</a> Colloquium on &#8220;Harmonizing law in the age of digital trade and finance &#8211; digital assets and platforms&#8221;<a href="https://lnkd.in/gAiEePJ5"> https://lnkd.in/gAiEePJ5</a> illustrated how legal certainty is critical to the functioning of Platforms, Exchanges, and Registries, underscoring that digital infrastructures supporting trade and finance rarely fail because of the technology.</p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!24dG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab39d474-6fd4-4de7-8148-6d1a570c4d09_768x374.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!24dG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab39d474-6fd4-4de7-8148-6d1a570c4d09_768x374.png 424w, https://substackcdn.com/image/fetch/$s_!24dG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab39d474-6fd4-4de7-8148-6d1a570c4d09_768x374.png 848w, https://substackcdn.com/image/fetch/$s_!24dG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab39d474-6fd4-4de7-8148-6d1a570c4d09_768x374.png 1272w, https://substackcdn.com/image/fetch/$s_!24dG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab39d474-6fd4-4de7-8148-6d1a570c4d09_768x374.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!24dG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab39d474-6fd4-4de7-8148-6d1a570c4d09_768x374.png" width="768" height="374" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ab39d474-6fd4-4de7-8148-6d1a570c4d09_768x374.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:374,&quot;width&quot;:768,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!24dG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab39d474-6fd4-4de7-8148-6d1a570c4d09_768x374.png 424w, https://substackcdn.com/image/fetch/$s_!24dG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab39d474-6fd4-4de7-8148-6d1a570c4d09_768x374.png 848w, https://substackcdn.com/image/fetch/$s_!24dG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab39d474-6fd4-4de7-8148-6d1a570c4d09_768x374.png 1272w, https://substackcdn.com/image/fetch/$s_!24dG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab39d474-6fd4-4de7-8148-6d1a570c4d09_768x374.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><a href="https://hendersoni.substack.com/p/the-empowerment-stack-is-here">The Empowerment Stack is Here</a></h3><blockquote><p>Own and control a standards-based digital identifier.</p><p>Gather and curate your core personal data.</p><p>Deploy an AI agent acting on your behalf in a fiduciary capacity.</p><p>Propose and enact MyTerms agreements with organizations you engage with.</p></blockquote><h3><a href="https://www.authsignal.com/blog/articles/account-recovery-is-the-identity-industrys-most-overlooked-challenge">Account recovery is the identity industry&#8217;s most overlooked challenge</a></h3><blockquote><p>Last year at Identiverse, I joined an expert panel on account recovery alongside Dean Saxe (IDpro), Ove-Morten Stalheim (BankID Norway), Rob Brown (Inverid), and Bertrand Carlier (Wavestone). The discussion kept coming back to the same point: most companies have account recovery in the wrong bucket. They treat it as a customer service problem when it&#8217;s really a security and business architecture challenge.</p></blockquote><h3><a href="https://www.linkedin.com/feed/update/urn:li:activity:7428525442317373440?updateEntityUrn=urn%3Ali%3Afs_updateV2%3A%28urn%3Ali%3Aactivity%3A7428525442317373440%2CFEED_DETAIL%2CEMPTY%2CDEFAULT%2Cfalse%29">The Synthetic Auth</a> (<a href="https://syntheticauth.ai">https://syntheticauth.ai</a>), a newsletter</h3><blockquote><p>I explore digital identity through a lens that&#8217;s equal parts technical, philosophical, and a little sardonic. What started as a way to make sense of my own curiosity became something I genuinely love working on. And this year I get to take it to the Identiverse stage. Pretty stoked about that!</p></blockquote>]]></content:encoded></item><item><title><![CDATA[Identosphere 164 Feb 1-13: China RealDID • Nepal gets $50m for Credential Lockers • Vietnam Edu Creds • DigiYatra Passport Enrollment • Singapore <-> India Edu Creds • Kyndryl Joins DIF]]></title><description><![CDATA[This is the mostly weekly Identosphere Newsletter sharing highlights from around the web covering Decentralized and Self-Sovereign Identity curated by Kaliya Young, Identity Woman.]]></description><link>https://newsletter.identosphere.net/p/identosphere-164-feb-1-13-china-realdid</link><guid isPermaLink="false">https://newsletter.identosphere.net/p/identosphere-164-feb-1-13-china-realdid</guid><dc:creator><![CDATA[IdentityWoman]]></dc:creator><pubDate>Mon, 16 Feb 2026 14:11:23 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!yNEy!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F16959d8a-f589-44de-8095-c10646b4f86f_640x640.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2><strong>Upcoming</strong></h2><ul><li><p><strong><a href="https://events.linuxfoundation.org/summit-on-human-agency/">Human Agency Summit</a>, February 23, Napa Valley </strong><em>(Kaliya will be there along with many other decentralize identity folks)</em></p></li><li><p><a href="https://didunconf.africa/">DIF Unconference Africa</a> (an IIW Regional Event) Feb 24-26, 2026 Cape Town</p></li><li><p><strong><a href="https://www.simpletix.com/e/kericonf26-april-21-23-2026-lehi-utah-us-tickets-248095?promocode=IIW26-COMBI">KERICONF26</a> April 21-23 2026, Lehi, Utah (US)</strong></p></li><li><p><a href="https://internetidentityworkshop.com/">Internet Identity Workshop</a> #42, April 28-30, 2026, Mountain View California</p></li><li><p><a href="https://www.eventbrite.com/e/agentic-internet-workshop-2-tickets-1976356257769?aff=oddtdtcreator">Agentic Internet Workshop</a> #2, May 1, 2026, Mountain View California</p></li><li><p>dice: <a href="https://www.linkedin.com/feed/update/urn:li:activity:7407632798372495360/?actorCompanyId=93246186">Digital Identity unConfernece Europe</a> (an IIW Regional Event) June 22-24, Copenhagen, Denmark</p></li></ul><h2>New W3C Community Group</h2><h3><a href="https://www.w3.org/community/blog/2026/02/03/proposed-group-physical-asset-attestation-uora-community-group/">Proposed Group: Physical Asset Attestation (UORA) Community Group</a></h3><blockquote><p>The mission of the Universal Object &amp; Resource Attestation (UORA) Community Group is to develop a vendor-neutral, decentralized protocol for the identity, state verification, and lifecycle tracking of physical assets. By bridging the gap between physical objects and digital identifiers, UORA enables every resource to function as a first-class citizen of the internet, fostering global trust, transparency, and interoperability across supply chains and industries.</p></blockquote><h2>Are We Worried Yet Department</h2><h3><a href="https://www.themarshallproject.org/2026/02/07/ai-texas-ice-mn-tech">How AI Surveillance Tech is Creeping From the Southern Border Into the Rest of the Country</a></h3><blockquote><p>Last week, The New York Times reported that when a U.S. citizen in Minneapolis was following ICE agents to observe their conduct, one <a href="https://www.nytimes.com/2026/01/30/technology/tech-ice-facial-recognition-palantir.html">agent addressed her by name</a> &#8212; information the agent may have obtained using some kind of facial recognition system, though DHS would not specify whether that was the case or which technology ICE is using. And while there&#8217;s something chilling about government agents generating a correct identification this way, the technology is also prone to false positives and errors, and according to reporting by WIRED, <a href="https://www.wired.com/story/cbp-ice-dhs-mobile-fortify-face-recognition-verify-identity/">is being used by DHS for identity &#8220;verification&#8221; tasks it wasn&#8217;t designed for</a>.</p></blockquote><h3>(Doc Searls) <a href="https://doc.searls.com/2026/02/12/because-pricing-is-getting-too-personal/">Because Pricing is Getting Too Personal</a></h3><blockquote><p>Surveillance pricing already has i<a href="https://en.wikipedia.org/wiki/Surveillance_pricing">ts own page</a> in Wikipedia. It also has its own authority: <a href="https://kelley.iu.edu/faculty-research/faculty-directory/profile.html?id=ASTEMLER">Abbey Stemler</a>, Associate Professor of Business Law and Ethics and Weimer Faculty Fellow in <a href="https://kelley.iu.edu/faculty-research/departments/business-law-ethics/index.html">Business Law &amp; Ethics </a>at Indiana University&#8217;s <a href="https://kelley.iu.edu/index.html">Kelly School of Business</a>. And she&#8217;ll be <a href="https://events.iu.edu/hls/event/2146325-when-the-app-is-the-aisle-price-discrimination-and">speaking about her work</a> a week from now: <a href="https://events.iu.edu/hls/event/2146325-when-the-app-is-the-aisle-price-discrimination-and">February 19, 2026 4-5 ET</a></p></blockquote><h3>(Evercred) <a href="https://everycred.com/blog/digital-police-identity-verification/">Digital Police Identity Verification in India: Combatting the &#8220;Digital Arrest&#8221; Crisis</a></h3><blockquote><p>The transition to digital policing tools in India has outpaced the development of secure identity infrastructure. The new Bharatiya Nyaya Sanhita (BNS) allows for the service of electronic summons. This is a necessary step towards modernization. However, legal experts highlight a critical gap: there is no current statutory mandate for how these electronic interactions must be authenticated.</p></blockquote><h3>[Research] <em>Important</em> <a href="https://link.springer.com/article/10.1007/s12525-025-00867-8">Self-sovereign identity: A conceptual framework and research agenda</a></h3><blockquote><p>Self-sovereign identity (SSI) is a novel approach to digital identity management, which is controversially discussed in technological communities and academia and lately also in the political space. Positions in the debate range from touting SSI as introducing a paradigm shift in internet identity and user privacy, while others dismiss the concept as libertarian hyperbole. SSI aims to give individuals an independent digital existence and control over their digital identities. Technically, this is achieved by providing individuals with digital identity wallet applications, which allow them to store and present digitally verifiable credentials. Despite its transformative potential, SSI is not comprehensively conceptualized in information system research. Therefore, in this Fundamentals article, we offer the following contributions: First, based on existing information systems research, we provide a consolidated definition and a conceptual framework of SSI structured along five analytic levels: (1) foundational principles, (2) credential exchange, (3) technical building blocks, (4) applications, and (5) governance. Second, we present an information systems research agenda on SSI, including concrete research questions and promising theoretical directions.</p><h3></h3></blockquote><h3><a href="https://idtechwire.com/world-bank-backs-nepal-digital-transformation-with-50m-and-verifiable-credentials-locker/">World Bank Backs Nepal Digital Transformation with $50M and Verifiable Credentials Locker</a></h3><blockquote><p>The World Bank has approved $50 million in financing for the Nepal Digital Transformation Project, an initiative aimed at expanding the country&#8217;s digital public infrastructure and accelerating the digitization of public services.</p></blockquote><h3><a href="https://sumsub.com/blog/digital-trust-trends-in-asia/">The Major Digital Trust Trends Shaping Asia in 2026</a></h3><blockquote><p><strong>Trend 2: The rise of decentralized identity</strong></p><p>China&#8217;s <a href="https://crypto.news/app/uploads/2024/12/Introduction-of-China-RealDID-System-20241106-Selva.pdf">RealDID system</a>, for example, uses decentralized identity blockchain infrastructure to allow credentials to be verified without being repeatedly shared.</p><p> In <a href="https://www.biometricupdate.com/202411/mobile-drivers-licenses-to-launch-in-hong-kong-in-2025">Hong Kong</a>, for example, the DID system was used in a limited pilot to allow visitors from mainland China to register for regulated stablecoin services without giving away any of their personal details.</p><p>In many APAC jurisdictions, there is no clear statutory recognition of self&#8209;sovereign credentials, and AML/KYC laws still assume the use of centralized government ID systems. Enterprises tend to move cautiously when infrastructure lacks clear standards or legal recognition.</p></blockquote><h3>[slide deck] <a href="https://crypto.news/app/uploads/2024/12/Introduction-of-China-RealDID-System-20241106-Selva.pdf">Introduction of China RealDID System</a></h3><blockquote></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QqC_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5b06ab0-266e-4dbc-ac0a-cf437b4a9c8b_974x286.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QqC_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5b06ab0-266e-4dbc-ac0a-cf437b4a9c8b_974x286.png 424w, https://substackcdn.com/image/fetch/$s_!QqC_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5b06ab0-266e-4dbc-ac0a-cf437b4a9c8b_974x286.png 848w, https://substackcdn.com/image/fetch/$s_!QqC_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5b06ab0-266e-4dbc-ac0a-cf437b4a9c8b_974x286.png 1272w, https://substackcdn.com/image/fetch/$s_!QqC_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5b06ab0-266e-4dbc-ac0a-cf437b4a9c8b_974x286.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QqC_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5b06ab0-266e-4dbc-ac0a-cf437b4a9c8b_974x286.png" width="974" height="286" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e5b06ab0-266e-4dbc-ac0a-cf437b4a9c8b_974x286.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:286,&quot;width&quot;:974,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!QqC_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5b06ab0-266e-4dbc-ac0a-cf437b4a9c8b_974x286.png 424w, https://substackcdn.com/image/fetch/$s_!QqC_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5b06ab0-266e-4dbc-ac0a-cf437b4a9c8b_974x286.png 848w, https://substackcdn.com/image/fetch/$s_!QqC_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5b06ab0-266e-4dbc-ac0a-cf437b4a9c8b_974x286.png 1272w, https://substackcdn.com/image/fetch/$s_!QqC_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5b06ab0-266e-4dbc-ac0a-cf437b4a9c8b_974x286.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><a href="https://www.animocabrands.com/announcement/luvia-and-open-campus-partner-to-bring-verifiable-credentials-to-vietnamese-students">Luvia and Open Campus partner to bring verifiable credentials to Vietnamese students through initiative supported by Ministry of Education and Training</a></h3><blockquote><p>Hanoi, Vietnam - Luvia and Open Campus have announced a strategic partnership to provide Vietnamese learners with portable, verifiable credentials through two initiatives: a personalized learning mobile app for high school and university students, and a learning management platform for schools. The initiatives integrate Open Campus ID and its verifiable credentials with the aim to modernize school operations nationwide.</p></blockquote><h3><a href="https://www.thehindu.com/sci-tech/technology/digi-yatra-plans-expansion-to-international-travel-with-passport-based-enrolment/article70623871.ece">Digi Yatra plans expansion to international travel with passport-based enrolment</a></h3><blockquote><p>Speaking with L.V. Navaneeth, CEO, The Hindu Group, Digi Yatra Foundation CEO Suresh Khadakbhavi addressed concerns around data security, stating Digi Yatra follows a decentralised architecture in which credentials reside on users&#8217; own devices rather than in a central database</p></blockquote><h3><a href="https://www.biometricupdate.com/202602/indicio-enables-ai-agents-to-verify-digital-travel-credentials">Indicio enables AI agents to verify Digital Travel Credentials</a></h3><blockquote><p>Once the traveler presents the credential to the agent, the AI travel agent cryptographically verifies that the information in the credential is authentic. After the verification is complete, the agent can help book rental cars and airlines, find the fastest route to a destination, book a hotel or an excursion, and change reservations, the firm explains in a <a href="https://indicio.tech/blog/digital-passport-for-ai-agents/">blog</a> post.</p></blockquote><h3><a href="https://www.biometricupdate.com/202602/nist-develops-playbook-for-online-use-cases-of-digital-credentials-in-financial-services">NIST develops playbook for online use cases of digital credentials in financial services: </a></h3><blockquote><p><strong>Panel on mDLs explores efforts by NIST, AAMVA to show benefits of digital credentials. </strong><a href="https://www.biometricupdate.com/202512/nist-announces-new-mdl-use-case-resources-to-support-financial-sector-adoption">NIST&#8217;s work on mDLs</a> gets an airing at the FIDO Identity, Authentication, and the Road Ahead 2026 conference, in a <a href="https://idforum2026.sched.com/event/2EfRT/nist-and-industry-partnering-to-advance-mdls-and-digital-ids">panel</a> focused on how NIST&#8217;s partnerships have advanced the digital ID sector. Panelists include Jeremy Grant, coordinator of the <a href="https://www.biometricupdate.com/tag/better-identity-coalition">Better Identity Coalition</a>; Ben Amsterdam of <a href="https://en.wikipedia.org/wiki/PNC_Financial_Services">PNC Bank</a>; Tim Maru, portfolio director for identity credentialing the American Association of Motor Vehicle Administrators (<a href="https://www.aamva.org/">AAMVA</a>); and Ryan Galluzzo, who leads NIST&#8217;s <a href="https://www.biometricupdate.com/202508/nist-finalizes-first-full-digital-identity-guidelines-update-since-2017">digital identity</a> program.</p></blockquote><h3><a href="https://statetechmagazine.com/article/2026/02/utah-advances-policy-first-digital-identity-framework-centered-individual-control">Utah Advances Policy-First Digital Identity Framework Centered On Individual Control</a></h3><blockquote><p>The state moves to authorize a digital identity framework emphasizing open standards, privacy and durable public policy nationwide.</p></blockquote><h3><a href="https://www.biometricupdate.com/202602/unicef-in-search-of-firm-to-co-design-youth-digital-credentialing-system">UNICEF in search of firm to co-design youth digital credentialing system</a></h3><blockquote><p>Companies or organizations with expertise in digital identity, credentialing, and education technology, have up to February 16 to bid for the contract.</p></blockquote><h3><a href="https://idtechwire.com/morocco-signs-cooperation-agreements-with-idakto-and-shareid-for-national-digital-wallet/">Morocco Signs Cooperation Agreements with iDakto and ShareID for National Digital Wallet</a></h3><blockquote><p>Morocco&#8217;s Ministry of Digital Transition and Administrative Reform has signed cooperation agreements with French firms iDakto and ShareID to support development of a national digital identity wallet, the ministry announced February 12. The project sits within Morocco&#8217;s broader Idarati X.0 public-sector digital modernization program and is designed to provide secure digital identity infrastructure for accessing public services and conducting online transactions.</p></blockquote><h3><a href="https://govinsider.asia/intl-en/article/singapore-and-india-engage-in-cross-border-dpi-through-verifiable-employment-credentials">Singapore and India engage in cross-border DPI through verifiable employment credentials</a></h3><blockquote><p>IMDA&#8217;s pilot converts background checks into cryptographically signed credentials stored in the individual candidate&#8217;s digital wallet, making employment verification much faster, easier and safer for Singapore businesses.</p></blockquote><h3><a href="https://hitconsultant.net/2026/02/10/ai-healthcare-privacy-self-sovereign-identity-blockchain/">The &#8220;Agent&#8221; Dilemma: How Blockchain Could Save Patient Privacy in a $500B AI Market</a></h3><blockquote><p>However, while AI&#8217;s promise of unprecedented efficiency and innovation is alluring, such rapid proliferation raises a number of serious concerns, namely around protecting patients&#8217; privacy and sensitive health data. How can a system that comprises countless semi-autonomous AI systems with potentially unclear directives guarantee that people&#8217;s personal information won&#8217;t be misused &#8211; even by accident?</p><p>One promising approach is self-sovereign identity (SSI) &#8211; a blockchain-based solution that empowers patients to control their data with precision and security.</p></blockquote><h3><a href="https://www.inkl.com/news/control-without-ownership-in-the-era-of-self-sovereign-identity">Control Without Ownership in the Era of Self-Sovereign Identity:</a></h3><blockquote><p>The situation calls for change. The concept of &#8220;control without ownership&#8221; outlined by Gorgiladze offers a viable legal framework that aligns technological capabilities of self-sovereign identity with existing legal systems. It provides a practical direction for the evolution of digital identity regulation&#8212;one that balances innovation, autonomy, and legal certainty.</p></blockquote><h3><a href="https://mojoauth.com/ciam-101/decentralized-identity-did-b2c-consumer-ssi#the-problem-with-centralizing-consumer-data">Decentralized Identity (DID) for B2C: Consumer Self-Sovereign Identity</a></h3><blockquote><p>This article covers the shift from centralized data silos to consumer-owned identity models and how did tech reduces breach surface areas for modern apps. You&#8217;ll learn about verifiable credentials and why moving away from passwords is the only way to truly protect user privacy while keeping iam flows simple for devs.</p></blockquote><h3><a href="https://www.linkedin.com/pulse/bringing-identity-back-human-what-self-sovereign-looks-slominski-h2ldf/">Bringing Identity Back to the Human: What Self-Sovereign, Human-Centered Identity Looks Like in Practice (2026)</a></h3><blockquote><p>For decades we outsourced our digital selves. Governments issued numbers, platforms built profiles, companies stored credentials, and we handed over the keys to our identity in exchange for convenience. But externalizing identity handed control to systems never designed to carry the weight of a human life. Those systems optimized for extraction, scale, and monetization&#8212;not dignity, privacy, or truth. Now the question is no longer theoretical: What does it look like to bring identity back to the human?</p></blockquote><h3>[Research]<a href="https://www.researchgate.net/publication/400594086_QR-MetaSSI_A_Quantum-Resistant_Self-Sovereign_Identity_Framework_for_Metaverse_Platforms"> QR-MetaSSI: A Quantum-Resistant Self-Sovereign Identity Framework for Metaverse Platforms</a></h3><blockquote><p>This paper proposes QR-MetaSSI, a framework integrating NIST-standardized post-quantum cryptography with W3C-compliant Self-Sovereign Identity principles to secure metaverse platforms against quantum threats, demonstrating through simulation that lattice-based DIDs and hash-based verifiable credentials can maintain authentication latency under 150ms with 128-bit quantum security at reasonable computational overhead compared to classical ECC-based systems.</p></blockquote><h3>(Heather Flanagan) <a href="https://doc.searls.com/2026/02/12/because-pricing-is-getting-too-personal/">Contributor Skills: How Standards Are Created</a></h3><h3>(Indicio) [slide deck] <a href="https://indicio.tech/wp-content/uploads/2026/02/Indicio-An-Intro-to-Decentralized-Identity-in-2026-1.pdf">Decentralized Identity in 2026: The Opportunities for Business</a></h3><h3><a href="https://blog.identity.foundation/dif-welcomes-kyndryl/">DIF Welcomes Kyndryl as Associate Member to Advance Secure, Decentralized AI Ecosystems</a></h3><ul><li><p>Advancing Trust in Agentic AI: Kyndryl&#8217;s Agentic AI Framework envisions a future where autonomous AI agents interact seamlessly across open, cross-domain ecosystems. Through DIF&#8217;s Trusted AI Agent Working Group, Kyndryl will contribute to defining standards that enable agents to establish strong trust. The Working Group addresses authentication, authorization, and delegation, allowing industry players to collaborate safely and reliably.</p></li></ul><h3>(Evercred) <a href="https://everycred.com/blog/digital-credential-verification-government/">How U.S. Agencies Can Prevent Fake Credentials Using Digital Credential Verification in 2026</a></h3><blockquote><p>The rise of deepfake technology allows bad actors to create realistic but fraudulent certificates. These documents often pass visual inspections. Agencies need a system that relies on cryptographic proof rather than visual markers.</p><p>By 2026, the cost of employment-related fraud has grown significantly. Government IT departments must prioritize systems that detect fake credentials before an individual enters the secure network.</p></blockquote><h3>[Research] <a href="https://arxiv.org/abs/2602.02629">Trustworthy Blockchain-based Federated Learning for Electronic Health Records: Securing Participant Identity with Decentralized Identifiers and Verifiable Credentials</a></h3><blockquote><p>This paper proposes a blockchain-based federated learning framework that uses Self-Sovereign Identity standards (DIDs and Verifiable Credentials) to enable secure, privacy-preserving AI model training across healthcare institutions, successfully preventing Sybil attacks while maintaining strong clinical performance.</p></blockquote>]]></content:encoded></item><item><title><![CDATA[Identosphere 163 Jan 17-30: Privacy Activists Broke Privacy • PNG Wallet Live • CAI Leader makes TIME Magazine AI 100 • Canda says: Your Data, Your Control]]></title><description><![CDATA[This is the mostly weekly Identosphere Newsletter sharing highlights from around the web covering Decentralized and Self-Sovereign Identity curated by Kaliya Young, Identity Woman.]]></description><link>https://newsletter.identosphere.net/p/identosphere-163-jan-17-30-privacy</link><guid isPermaLink="false">https://newsletter.identosphere.net/p/identosphere-163-jan-17-30-privacy</guid><dc:creator><![CDATA[IdentityWoman]]></dc:creator><pubDate>Wed, 11 Feb 2026 20:50:12 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!HVqv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2c0624a-0c3b-48ed-b3c2-8e1859f29eb3_1200x800.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>New Upcoming </p><ul><li><p><strong><a href="https://events.linuxfoundation.org/summit-on-human-agency/">Human Agency Summit</a>, February 23, Napa Valley </strong><em>(Kaliya will be there along with many other decentralize identity folks)</em></p></li></ul><h2>Upcoming </h2><ul><li><p>Workshop: <a href="https://github.com/credebl/">CREDEBL</a> For Decentralized Identity and Verifiable Credentials, Wednesday, February 18 at 8 AM Pacific <a href="https://zoom.us/meeting/register/Aq2iY0R7SV2BzPFpJ-Ih2g#/registration">Zoom</a></p></li><li><p>Join us at the<a href="https://www.1edtech.org/event/dc/summit/2026"> 1EdTech Digital Credentials Summit</a> in Philadelphia, February 18-20, 2026.</p></li><li><p><a href="https://didunconf.africa/">DIF Unconference Africa</a> (an IIW Regional Event) Feb 24-26, 2026 Cape Town</p></li><li><p><strong><a href="https://www.simpletix.com/e/kericonf26-april-21-23-2026-lehi-utah-us-tickets-248095?promocode=IIW26-COMBI">KERICONF26</a> April 21-23 2026, Lehi, Utah (US)</strong></p></li><li><p><a href="https://internetidentityworkshop.com/">Internet Identity Workshop</a> #42, April 28-30, 2026, Mountain View California</p></li><li><p><a href="https://www.eventbrite.com/e/agentic-internet-workshop-2-tickets-1976356257769?aff=oddtdtcreator">Agentic Internet Workshop</a> #2, May 1, 2026, Mountain View California</p></li><li><p>dice: <a href="https://www.linkedin.com/feed/update/urn:li:activity:7407632798372495360/?actorCompanyId=93246186">Digital Identity unConfernece Europe</a> (an IIW Regional Event) June 22-24, Copenhagen, Denmark</p></li></ul><h3><a href="https://www.facebook.com/pngdepartmentofict/posts/pngs-first-ever-verifiable-credential-wallet-app-now-available-on-google-playthe/1208436718080073/">PNG&#8217;s [Papua New Guinea] First Ever Verifiable Credential Wallet App now available on Google Play</a></h3><blockquote><p>The Department of Information and Communications Technology (DICT) has announced the official release of the SevisWallet App, now available for download on Google Play. The app is a Digital Public Infrastructure and marks a key achievement in PNG&#8217;s digital transformation journey, giving citizens SECURE ACCESS to decentralized verifiable credentials.</p></blockquote><h2>AI and Identity</h2><h3><a href="https://www.linkedin.com/posts/willgroah_know-your-agent-kya-is-emerging-as-a-share-7421925008937066497-YTY6/?utm_source=share&amp;utm_medium=member_ios&amp;rcm=ACoAAAAAZUMBU8SalbYc2xiqRyIGnrd7yxmrY8A">&#8220;Know Your Agent&#8221; (KYA) is emerging as a concept, but its framing guarantees it will fail at scale.</a></h3><p>AI agents are running into resistance today for the same structural reasons large, coordinated fraud operations succeed:</p><p>&#8594; They operate continuously</p><p>&#8594; They retry efficiently</p><p>&#8594; They optimize for task completion, not perception</p><p>To existing security and risk systems, that behavioral pattern is indistinguishable from attack. This constraint is missing in most discussions. Inference-based identity systems cannot reliably separate delegated intent from compromise once delegation begins to scale. The resulting cost shows up as false positives, throttling, and shutdowns, not because the systems are malfunctioning, but because they are behaving rationally given the information available to them.</p><h3><a href="https://www.linkedin.com/posts/rakeshgohel01_google-is-building-an-ai-agent-enabled-e-commerce-share-7416462921280430081-46gY/?utm_source=share&amp;utm_medium=member_ios&amp;rcm=ACoAAAAAZUMBU8SalbYc2xiqRyIGnrd7yxmrY8A">Google is building an AI Agent-enabled e-commerce ecosystem</a></h3><blockquote><p>Currently, agentic commerce is flawed. Every AI agent needs custom integrations for every platform. It is complete chaos. Google just solved this with UCP - an open standard co-developed with Shopify, Etsy, Wayfair, Target, and Walmart. Endorsed by 20+ companies, including Mastercard, Stripe, Visa, PayPal, and American Express.</p></blockquote><h3>[TIME Magainze 100 AI 2025] <a href="https://time.com/collections/time100-ai-2025/7305796/andy-parsons/">Andy Parsons Senior director of content authenticity, Adobe</a></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HVqv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2c0624a-0c3b-48ed-b3c2-8e1859f29eb3_1200x800.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HVqv!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2c0624a-0c3b-48ed-b3c2-8e1859f29eb3_1200x800.png 424w, https://substackcdn.com/image/fetch/$s_!HVqv!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2c0624a-0c3b-48ed-b3c2-8e1859f29eb3_1200x800.png 848w, https://substackcdn.com/image/fetch/$s_!HVqv!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2c0624a-0c3b-48ed-b3c2-8e1859f29eb3_1200x800.png 1272w, https://substackcdn.com/image/fetch/$s_!HVqv!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2c0624a-0c3b-48ed-b3c2-8e1859f29eb3_1200x800.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HVqv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2c0624a-0c3b-48ed-b3c2-8e1859f29eb3_1200x800.png" width="1200" height="800" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a2c0624a-0c3b-48ed-b3c2-8e1859f29eb3_1200x800.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:800,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!HVqv!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2c0624a-0c3b-48ed-b3c2-8e1859f29eb3_1200x800.png 424w, https://substackcdn.com/image/fetch/$s_!HVqv!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2c0624a-0c3b-48ed-b3c2-8e1859f29eb3_1200x800.png 848w, https://substackcdn.com/image/fetch/$s_!HVqv!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2c0624a-0c3b-48ed-b3c2-8e1859f29eb3_1200x800.png 1272w, https://substackcdn.com/image/fetch/$s_!HVqv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2c0624a-0c3b-48ed-b3c2-8e1859f29eb3_1200x800.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><blockquote><p>Parsons oversees the Content Authenticity Initiative, an Adobe project focused on creating a more transparent ecosystem where users can tell whether digital content has been made by humans, AI, or some combination of both. Its currency: &#8220;<a href="https://time.com/7094554/content-credentials/">Content Credentials</a>,&#8221; a digital signature that holds information like the creator&#8217;s name, what device was used to make the content, and the content&#8217;s edit history, including whether AI was used in its creation.</p></blockquote><blockquote><p>&#8220;It&#8217;s a new kind of metadata,&#8221; Parsons says. The credentials allow tracking of any changes to content, he says. &#8220;It&#8217;s permanently attached to the media, bound to the pixels, or the frames, or the waveforms.&#8221;</p></blockquote><h3><a href="https://sphericalcowconsulting.com/2026/01/20/the-ai-system-that-never-was/">The AI System That Never Was</a></h3><blockquote><p>&#8220;I have an embarrassing backlog of reading about what&#8217;s been happening with AI over the last few years. Going through it chronologically turned out to be unexpectedly useful.&#8221;</p></blockquote><blockquote><p>One pattern stood out more than any single policy shift or technical breakthrough: the use and then decline of the phrase &#8220;AI system.</p></blockquote><h3><a href="https://www.linkedin.com/posts/welker_model-ai-governance-framework-for-agentic-ugcPost-7420777610198077440-8zP3/?utm_source=share&amp;utm_medium=member_ios&amp;rcm=ACoAAAAAZUMBU8SalbYc2xiqRyIGnrd7yxmrY8A">Model AI Governance Framework for agentic AI.</a></h3><blockquote><p>Unveiled by Minister for Digital Development and Information<a href="https://www.linkedin.com/in/josephine-teo-ylm/"> Josephine Teo</a>, and released by the Singapore&#8217;s Infocomm Media Development Authority (IMDA), the framework addresses governance challenges specific to agentic AI systems, which can plan, take actions, interact with tools, and operate with varying degrees of autonomy.</p></blockquote><h3></h3><h2>Thoughtful</h2><h3><a href="https://markatwood.substack.com/p/privacy-activists-broke-privacy">Privacy Activists Broke Privacy</a></h3><blockquote><p>Blocking without replacement is not victory. It&#8217;s sabotage with better branding.</p></blockquote><blockquote><p>For the last 30 years, professional privacy activists have been a net negative for actual privacy. Not because privacy doesn&#8217;t matter. Because they fought the wrong war, with the wrong tools, and they won the wrong victories. They optimized for symbolic privacy (the kind that sounds good in a press release) and delivered a world of operational non-privacy (the kind that ruins actual lives).</p></blockquote><h3><a href="https://www.linkedin.com/pulse/digital-identity-bundling-unbundling-rebundling-parthasarathi-v-xullc">Digital Identity: Bundling, Unbundling and Rebundling</a></h3><blockquote><p>In the context of identity, we are currently transitioning from a period of extreme bundling (centralized silos) to a period of strategic unbundling (verifiable credentials), leading toward a future of user-centric re-bundling (self-sovereign identity). We are currently in the messy middle of this cycle. Governments and banks are beginning to &#8220;unbundle&#8221; their records into VCs (like Mobile Driver&#8217;s Licenses), and wallet providers are competing to be the place where you &#8220;re-bundle&#8221; your life.</p></blockquote><h3><a href="https://competition-bureau.canada.ca/en/how-we-foster-competition/education-and-outreach/publications/your-data-your-control">Canadian Competition Bureau - Your Data, Your Control:How data portability can unlock competition and empower consumers</a></h3><blockquote><p>This Canadian report examines data portability&#8212;the ability for consumers to transfer personal information between service providers&#8212;finding it could save Canadians $1.10&#8211;$3.83 billion annually in the insurance sector alone, while also boosting competition and innovation. However, successful implementation requires addressing behavioral barriers, privacy and security concerns, and interoperability challenges through smart regulatory design informed by international examples like the UK&#8217;s open banking and Australia&#8217;s Consumer Data Right.</p></blockquote><h2>Research</h2><h3>[Research] <a href="https://arxiv.org/pdf/2601.14982">Interoperable Architecture for Digital Identity Delegation for AI Agents with Blockchain Integration</a></h3><blockquote><p>This research proposes a framework for verifiable delegation in digital identity systems that introduces Delegation Grants as distinct authorization artifacts, a protocol-agnostic verification model, a layered trust architecture, and optional blockchain anchoring&#8212;designed to work across centralized, federated, and SSI environments for both human and AI agents.</p></blockquote><h3>[Research] <a href="https://arxiv.org/pdf/2601.14503">European digital identity &#8727; A missed opportunity</a></h3><blockquote><p>This paper critiques the EU Digital Identity (EUDI) framework and its OpenID architecture for having a narrow conception of authentication, insecure practices, limited credential types, and a trust model that fails to deliver meaningful gains in user control or privacy over existing solutions&#8212;while also arguing that the regulation&#8217;s institutionalized trusted lists risk re-centralization&#8212;and suggests alternatives like OAuth&#8217;s UMA/A4DS and GNAP to better support dynamic, decentralized identity use cases.</p></blockquote><h3></h3><h3>[Research]<a href="https://arxiv.org/pdf/2601.13903"> Know Your Contract: Extending eIDAS Trust into Public Blockchains</a></h3><blockquote><p>This paper presents an architecture for bridging the EU&#8217;s eIDAS trust framework with public blockchains by cryptographically binding smart contracts to qualified electronic seals, enabling machine-verifiable identity attribution of on-chain actions to legal entities&#8212;supporting automated regulatory compliance (KYC/KYB) for institutional DeFi, asset tokenization, and agentic commerce without introducing new trusted intermediaries.</p></blockquote><h3>[Video] (Nicky Hickman) <a href="https://www.youtube.com/watch?v=oPtnTLTpLbI">Verifiable AI with SSI - A Socio Technical Exploration </a> Link to<a href="https://www.spritehub.org/innovation-fora/verifiable-ai-with-self-sovereign-identity-a-socio-technical-exploration"> hackathon</a>.</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!65Bn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29ba303c-d54a-48cb-a6ac-a72b2686793c_1534x854.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!65Bn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29ba303c-d54a-48cb-a6ac-a72b2686793c_1534x854.png 424w, https://substackcdn.com/image/fetch/$s_!65Bn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29ba303c-d54a-48cb-a6ac-a72b2686793c_1534x854.png 848w, https://substackcdn.com/image/fetch/$s_!65Bn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29ba303c-d54a-48cb-a6ac-a72b2686793c_1534x854.png 1272w, https://substackcdn.com/image/fetch/$s_!65Bn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29ba303c-d54a-48cb-a6ac-a72b2686793c_1534x854.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!65Bn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29ba303c-d54a-48cb-a6ac-a72b2686793c_1534x854.png" width="1456" height="811" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/29ba303c-d54a-48cb-a6ac-a72b2686793c_1534x854.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:811,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!65Bn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29ba303c-d54a-48cb-a6ac-a72b2686793c_1534x854.png 424w, https://substackcdn.com/image/fetch/$s_!65Bn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29ba303c-d54a-48cb-a6ac-a72b2686793c_1534x854.png 848w, https://substackcdn.com/image/fetch/$s_!65Bn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29ba303c-d54a-48cb-a6ac-a72b2686793c_1534x854.png 1272w, https://substackcdn.com/image/fetch/$s_!65Bn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29ba303c-d54a-48cb-a6ac-a72b2686793c_1534x854.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>DIDs Going live for CBP (Slide 2) <a href="https://www.cbp.gov/sites/default/files/2026-01/ace_development_-_deployment_schedule_-_january_2026_508c.pdf">Cargo Traceability User Interface: Oil CBP-135a</a></h3><blockquote><p> Beginning as a pilot with a small set of participants, this enhancement enables use of global interoperability standards (GIS), including decentralized identifiers (DID) and verifiable credentials (VC), to trace crude oil imports from point-of-origin to arrival in the U.S. &#8226; For more information, review this related Federal Register Notice.</p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!OnGM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61b2ecab-9ac0-4a63-9db5-d86ab72d3c8f_1600x434.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OnGM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61b2ecab-9ac0-4a63-9db5-d86ab72d3c8f_1600x434.png 424w, https://substackcdn.com/image/fetch/$s_!OnGM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61b2ecab-9ac0-4a63-9db5-d86ab72d3c8f_1600x434.png 848w, https://substackcdn.com/image/fetch/$s_!OnGM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61b2ecab-9ac0-4a63-9db5-d86ab72d3c8f_1600x434.png 1272w, https://substackcdn.com/image/fetch/$s_!OnGM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61b2ecab-9ac0-4a63-9db5-d86ab72d3c8f_1600x434.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OnGM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61b2ecab-9ac0-4a63-9db5-d86ab72d3c8f_1600x434.png" width="1456" height="395" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/61b2ecab-9ac0-4a63-9db5-d86ab72d3c8f_1600x434.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:395,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!OnGM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61b2ecab-9ac0-4a63-9db5-d86ab72d3c8f_1600x434.png 424w, https://substackcdn.com/image/fetch/$s_!OnGM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61b2ecab-9ac0-4a63-9db5-d86ab72d3c8f_1600x434.png 848w, https://substackcdn.com/image/fetch/$s_!OnGM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61b2ecab-9ac0-4a63-9db5-d86ab72d3c8f_1600x434.png 1272w, https://substackcdn.com/image/fetch/$s_!OnGM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61b2ecab-9ac0-4a63-9db5-d86ab72d3c8f_1600x434.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><a href="https://www.linkedin.com/pulse/agentic-convergence-rebundling-trust-discovery-execution-v-sa9nc">The Agentic Convergence: Rebundling Trust, Discovery, and Execution</a></h3><blockquote><p><a href="https://diforum.community/spaces/16493726/search?term=trust%20frameworks%20for%20AI%20Agents&amp;sort=relevance&amp;sort_order=desc">Trust frameworks for Agentic AI</a> are fast developing. In the post-AI, post-agentic-AI era, we got to think identity rebundled not just as &#8220;data,&#8221; but as verifiable trust and agency. AI provides the discovery and intent, while Tokenization and Verifiable Identity provide the execution and trust. When these technologies converge, they solve the Last Mile problem of the digital economy&#8212;the gap between finding a service and actually executing a secure transaction without a mountain of paperwork.</p></blockquote><h3>(<a href="https://substack.com/@nitinbadjatia">Nitin Badjatia</a>) <a href="https://www.nitinbadjatia.com/p/the-case-for-us-why-the-agentic-web?r=1yrzj&amp;utm_campaign=post&amp;utm_medium=web&amp;triedRedirect=true">The Case for Us: Why the Agentic Web Needs Contracts, Not Consent</a></h3><blockquote><p>Something significant is happening to alter the path forward. MyTerms, the <a href="https://ieeexplore.ieee.org/document/11360682">IEEE 7012</a> standard for Machine Readable Personal Privacy Terms is now officially available to build with. I believe it&#8217;s a missing part of the protocol framework that will make the emerging agentic web actually work for people instead of against them. (full disclosure, my fellow board members at Customer Commons were deeply involved in the creation of MyTerms).</p></blockquote><h3><a href="https://www.technologyreview.com/2026/01/28/1131835/what-ai-remembers-about-you-is-privacys-next-frontier/">What AI &#8220;remembers&#8221; about you is privacy&#8217;s next frontier</a></h3><blockquote><p><a href="https://cdt.org/insights/its-getting-personal-how-advanced-ai-systems-are-personalized/">Personalized</a>, interactive AI systems are built to act on our behalf, maintain context across conversations, and improve our ability to carry out all sorts of tasks, from booking travel to filing taxes. From tools that learn a developer&#8217;s coding style to shopping agents that sift through thousands of products, these systems rely on the ability to store and retrieve increasingly intimate details about their users.  But doing so over time introduces alarming, and all-too-familiar, privacy vulnerabilities&#8211;&#8211;many of which have loomed since &#8220;big data&#8221; first teased the power of spotting and acting on user patterns. Worse, AI agents now appear poised to plow through whatever safeguards had been adopted to avoid those vulnerabilities.</p></blockquote><h3>[Report] (CDT) <a href="https://cdt.org/insights/a-roadmap-for-responsible-approaches-to-ai-memory/">A Roadmap For Responsible Approaches to AI Memory</a></h3><blockquote><p>As AI systems increasingly incorporate memory features to retain user preferences and context across interactions, they raise complex questions about privacy, personalization, transparency, and user control that both echo and deepen longstanding concerns from traditional digital platforms. A 2025 CDT and Microsoft workshop explored these implications, emphasizing that developers&#8217; current design choices around how memories are stored, edited, and deleted will critically shape whether AI memory systems operate responsibly and respect user privacy going forward.</p></blockquote><h3>[Report] <a href="https://www.ofcom.org.uk/siteassets/resources/documents/online-safety/information-for-industry/other/position-statement-age-assurance-and-online-safety-regulation.pdf?v=409356">Position Statement: Age Assurance &amp; Online Safety Regulation</a></h3><blockquote><p>The Global Online Safety Regulators Network, launched in 2022 as the first international forum for independent online safety regulators, is calling for a common, principles-based, and privacy-preserving international approach to age assurance to better protect children online, arguing that greater regulatory coherence will improve child safety, simplify compliance for tech platforms, and build public trust.</p></blockquote><h3>[MOSIP] <a href="https://www.linkedin.com/posts/claim-169s-new-version-is-out-if-you-share-7422566850678509568-MhQ3/?utm_source=share&amp;utm_medium=member_ios&amp;rcm=ACoAAAAAZUMBU8SalbYc2xiqRyIGnrd7yxmrY8A">Claim 169&#8217;s new version is out!</a></h3><blockquote><p>The latest enhancements are the result of continued collaborative efforts to refine our standardised, interoperable, and offline-friendly QR code. It now includes secondary-language support, elaborated clarifications on implementation guidelines, standard CWT &amp; COSE attributes, credential status, and security considerations, enabling individuals to verify identities quickly and securely in any language, setting or remote areas, while reinforcing trust across diverse identity systems.</p></blockquote><h3>(Tim Buma) <a href="https://www.linkedin.com/posts/trbouma_my-goto-architecture-diagrams-for-identity-ugcPost-7422327082367590401-2CI8/?utm_source=share&amp;utm_medium=member_ios&amp;rcm=ACoAAAAAZUMBU8SalbYc2xiqRyIGnrd7yxmrY8A">My goto architecture diagrams for identity, hegemony and payments.</a></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!W2l_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5eb7561c-2d5f-4783-b5e1-2bd7f2d06bb4_800x450.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!W2l_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5eb7561c-2d5f-4783-b5e1-2bd7f2d06bb4_800x450.png 424w, https://substackcdn.com/image/fetch/$s_!W2l_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5eb7561c-2d5f-4783-b5e1-2bd7f2d06bb4_800x450.png 848w, https://substackcdn.com/image/fetch/$s_!W2l_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5eb7561c-2d5f-4783-b5e1-2bd7f2d06bb4_800x450.png 1272w, https://substackcdn.com/image/fetch/$s_!W2l_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5eb7561c-2d5f-4783-b5e1-2bd7f2d06bb4_800x450.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!W2l_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5eb7561c-2d5f-4783-b5e1-2bd7f2d06bb4_800x450.png" width="800" height="450" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5eb7561c-2d5f-4783-b5e1-2bd7f2d06bb4_800x450.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:450,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!W2l_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5eb7561c-2d5f-4783-b5e1-2bd7f2d06bb4_800x450.png 424w, https://substackcdn.com/image/fetch/$s_!W2l_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5eb7561c-2d5f-4783-b5e1-2bd7f2d06bb4_800x450.png 848w, https://substackcdn.com/image/fetch/$s_!W2l_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5eb7561c-2d5f-4783-b5e1-2bd7f2d06bb4_800x450.png 1272w, https://substackcdn.com/image/fetch/$s_!W2l_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5eb7561c-2d5f-4783-b5e1-2bd7f2d06bb4_800x450.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><a href="https://www.linkedin.com/posts/thiru-neelaveni_digital-id-implementation-analysis-in-uk-ugcPost-7420526362307956736-ysEK/?utm_source=share&amp;utm_medium=member_ios&amp;rcm=ACoAAAAAZUMBU8SalbYc2xiqRyIGnrd7yxmrY8A">Digital ID Part 2: Three Countries, Three Choices &#127468;&#127463;&#127474;&#127486;&#127480;&#127468;</a></h3><blockquote><p>&#127480;&#127468;Singapore : Competence Without Consent</p><p>&#127474;&#127486; Malaysia: Speed Without Safeguards</p><p>&#127468;&#127463;UK: Rights Before Efficiency</p><p>Why is the implementation going through without resistance? Are people here less concerned about personal rights? Is it cultural differences? Collectivists vs Individualists? Where&#8217;s the independent bodies conversing awareness? Do citizens have access to information, legal protections, oversight and space to resist? Progress doesn&#8217;t need to require choosing between efficiency and citizen rights. Both can be built adjacently.</p></blockquote><h3></h3><h3><a href="https://www.linkedin.com/posts/adrian-doerk_les-preuves-d%C3%A2ge-arrivent-the-era-of-self-declared-share-7421844187815231488-iW70/?utm_source=share&amp;utm_medium=member_ios&amp;rcm=ACoAAAAAZUMBU8SalbYc2xiqRyIGnrd7yxmrY8A">Our children&#8217;s brains are not for sale.</a></h3><blockquote><p>Les preuves d&#8217;&#226;ge arrivent. The era of &#8220;self-declared&#8221; age on social media is coming to an end - and a &#127466;&#127482; European identity system is forming.</p><p>Yesterday, French lawmakers in the National Assembly voted overwhelmingly (116 to 23) to ban children under 15 from social media. This follows a similar landmark move by Australia and precedes Ireland&#8217;s own mandatory age-check plans.</p></blockquote>]]></content:encoded></item><item><title><![CDATA[Identosphere 262 Jan 10-Jan 17: Build Your Own Ecosystem” Is a Death Wish • A Field Guide to Digital Identity Standards Bodies • New Knowledge Base • New Universal Commerce Protocol ]]></title><description><![CDATA[This is the weekly Identosphere Newsletter sharing highlights from around the web covering Decentralized and Self-Sovereign Identity curated by Kaliya Young, Identity Woman.]]></description><link>https://newsletter.identosphere.net/p/identosphere-262-jan-10-jan-17-build</link><guid isPermaLink="false">https://newsletter.identosphere.net/p/identosphere-262-jan-10-jan-17-build</guid><dc:creator><![CDATA[IdentityWoman]]></dc:creator><pubDate>Thu, 22 Jan 2026 05:25:51 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!H7BH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F264f85dd-ae4a-4f48-937a-dff9742a8492_1456x873.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>New Upcoming</h2><h5>Introducing IEEE 7012: My Terms January 28, 2026 4PM GMT / 11 AM EST <a href="https://mytermswebinar.eventbrite.com/">Online</a> or <a href="https://mytermslondon.eventbrite.com/">In-person</a> in London, UK. Brought to you by Customer Commons, IEEE, MyData Global, Consumer Reports, Inrupt, Customer Futures Ltd, JLINC Labs, Midwest Fables.</h5><h5><a href="https://www.simpletix.com/e/kericonf26-april-21-23-2026-lehi-utah-us-tickets-248095?promocode=IIW26-COMBI">KERICONF26</a> April 21-23 2026, Lehi, Utah (US)</h5><h2><strong>Upcoming</strong></h2><p><em>These were all listed in previous newsletters</em></p><ul><li><p>Call for Papers Open Now <a href="https://openidentity.eu/">Open Identity Summit </a>Deadline: January 31st, 2026</p></li></ul><blockquote><p>The summit takes place May 21&#8211;22, 2026 at University of Applied Sciences Dresden (HTW Dresden) in Dresden, Germany</p></blockquote><ul><li><p>Protocols for Publishers <a href="https://protocolsforpublishers.com/pfp-london-dates-and-early-speakers/">PfP&#10024; </a>London on Feb 4-5, 2026 to discuss how we can preserve an open, equitable web, where no one company holds the keys.</p></li><li><p><a href="https://connect.mosip.io/">MOSIP Connect</a>, Rabat Moroco, Feb 11-13. <em>Feb 13th is an unconference day facilitated by Kaliya. Reach out to me for an invite.</em></p></li><li><p>Workshop: <a href="https://github.com/credebl/">CREDEBL</a> For Decentralized Identity and Verifiable Credentials, Wednesday, February 18 at 8 AM Pacific <a href="https://zoom.us/meeting/register/Aq2iY0R7SV2BzPFpJ-Ih2g#/registration">Zoom</a></p></li><li><p>Join us at the<a href="https://www.1edtech.org/event/dc/summit/2026"> 1EdTech Digital Credentials Summit</a> in Philadelphia, February 18-20, 2026.</p></li><li><p><a href="https://didunconf.africa/">DIF Unconference Africa</a> (an IIW Regional Event) Feb 24-26, 2026 Cape Town</p></li><li><p><a href="https://internetidentityworkshop.com/">Internet Identity Workshop</a> #42, April 28-30, 2026, Mountain View California</p></li><li><p><a href="https://www.eventbrite.com/e/agentic-internet-workshop-2-tickets-1976356257769?aff=oddtdtcreator">Agentic Internet Workshop</a> #2, May 1, 2026, Mountain View California</p></li><li><p>dice: <a href="https://www.linkedin.com/feed/update/urn:li:activity:7407632798372495360/?actorCompanyId=93246186">Digital Identity unConfernece Europe</a> (an IIW Regional Event) June 22-24, Copenhagen, Denmark</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.identosphere.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.identosphere.net/subscribe?"><span>Subscribe now</span></a></p><h2>Business Advice</h2><h3><a href="https://www.linkedin.com/pulse/verifiable-credentials-why-build-your-own-ecosystem-death-greene-q3d7e/">Verifiable Credentials: Why &#8220;Build Your Own Ecosystem&#8221; Is a Death Wish</a></h3><blockquote><p>If you are not: a government, Apple, or Google&#8230;then there are only two viable strategies in verifiable credentials:</p></blockquote><ol><li><p>Align tightly and early with government/EU standards and capture critical mass, or</p></li><li><p>Become a strong niche player solving one painful verifier workflow end-to-end.</p></li></ol><blockquote><p>Everything else, especially &#8220;let&#8217;s build our own ecosystem&#8221;, is a slow-motion failure.</p></blockquote><h2>Opportunity</h2><h3>MOSIP <a href="https://community.mosip.io/t/inji-community-expression-of-interest-eoi-now-open/2499"> Inji Community &#8211; Expression of Interest (EOI) Now Open!</a></h3><blockquote><p>If you&#8217;re enthusiastic about contributing to a global digital public infrastructure project, fill out the <a href="https://docs.google.com/forms/d/e/1FAIpQLSdA84Z2O54yplSgK4YwM5CFX-q8wqs1IiuUlaZJhkwqO8LlSA/viewform">form</a> below and we&#8217;ll reach out with next steps and community contribution guidelines.</p></blockquote><h2>Learning</h2><h3>(LF Education)<a href="https://training.linuxfoundation.org/resources/did-under-the-hood-storage-resolution-and-integrity/"> LF Insider: DID Under the Hood: Storage, Resolution, and Integrity</a></h3><blockquote><p>Explore the technical architecture of Decentralized Identifiers (DIDs) by learning how identity documents are stored across different networks, resolved into standardized formats, and cryptographically verified for tamper-evident trust.</p></blockquote><h2>Looking Ahead</h2><h2>(Spokeo) <a href="https://tech.yahoo.com/cybersecurity/articles/5-emerging-digital-id-trends-180008657.html">5 emerging digital ID trends in 2026 that could redefine your online persona</a></h2><blockquote><p>In the end, the adoption of these emerging technologies ensures that identities can be accurately digitally verified and that people&#8217;s private information is kept out of the wrong hands. Through constant technological progress and innovation, digital ID verification is becoming more secure and more user-friendly than ever before.</p></blockquote><h2>Thoughtful</h2><h3><a href="https://medium.com/@stephanef/democracys-missing-protocol-fixing-the-social-dilemma-without-censorship-3b67d7d68ed0">Democracy&#8217;s Missing Protocol: Fixing the Social Dilemma Without Censorship</a></h3><h3><a href="https://dgwbirch.substack.com/p/passwords-are-a-national-security">Passwords are a National Security Risk</a></h3><blockquote></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!H7BH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F264f85dd-ae4a-4f48-937a-dff9742a8492_1456x873.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!H7BH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F264f85dd-ae4a-4f48-937a-dff9742a8492_1456x873.png 424w, https://substackcdn.com/image/fetch/$s_!H7BH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F264f85dd-ae4a-4f48-937a-dff9742a8492_1456x873.png 848w, https://substackcdn.com/image/fetch/$s_!H7BH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F264f85dd-ae4a-4f48-937a-dff9742a8492_1456x873.png 1272w, https://substackcdn.com/image/fetch/$s_!H7BH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F264f85dd-ae4a-4f48-937a-dff9742a8492_1456x873.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!H7BH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F264f85dd-ae4a-4f48-937a-dff9742a8492_1456x873.png" width="1456" height="873" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/264f85dd-ae4a-4f48-937a-dff9742a8492_1456x873.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:873,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!H7BH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F264f85dd-ae4a-4f48-937a-dff9742a8492_1456x873.png 424w, https://substackcdn.com/image/fetch/$s_!H7BH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F264f85dd-ae4a-4f48-937a-dff9742a8492_1456x873.png 848w, https://substackcdn.com/image/fetch/$s_!H7BH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F264f85dd-ae4a-4f48-937a-dff9742a8492_1456x873.png 1272w, https://substackcdn.com/image/fetch/$s_!H7BH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F264f85dd-ae4a-4f48-937a-dff9742a8492_1456x873.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>Standards</h2><h3>(Heather Flanagan) <a href="https://sphericalcowconsulting.com/2026/01/13/sdo-process-field-guide/">A Field Guide to Digital Identity Standards Bodies</a></h3><h3>New Versions of Standards</h3><h3><a href="https://idtechwire.com/dci-publishes-v1-0-0-interoperability-standards-for-id-systems-and-social-protection-platforms/">DCI [Digital Convergence Initiative ] Publishes v1.0.0 Interoperability Standards for ID Systems and Social Protection Platforms</a></h3><blockquote><p>The Digital Convergence Initiative has published Version 1.0.0 of its ID systems and Social Protection systems interoperability standards, a framework intended to help <a href="https://idtechwire.com/papua-new-guinea-launches-national-digital-id-and-wallet-built-on-tech5-infrastructure/">national identity programs</a> and social protection delivery platforms exchange data and authenticate users more consistently. DCI is positioning the standards as a way to improve service delivery, reduce fragmentation across government systems, and support inclusion through more interoperable <a href="https://idtechwire.com/world-bank-approves-50-million-sri-lanka-digital-transformation-project-focused-on-digital-public-infrastructure/">identity-linked benefits infrastructure</a>.</p></blockquote><h3><a href="https://w3c-ccg.github.io/vcalm/">VCALM v0.9: A Verifiable Credential API for Lifecycle Management</a></h3><h3><a href="https://w3c-ccg.github.io/vp-request-spec/">Verifiable Presentation Request v2024: A data model for requesting presentations of verifiable credentials</a></h3><h2>New Product Launches</h2><h3><a href="https://www.telefonica.com/en/communication-room/press-room/telefonica-tech-launches-solution-private-secure-control-personal-information/">Telef&#243;nica Tech launches a solution for private and secure control of personal information</a></h3><blockquote><p><a href="https://telefonicatech.com/en">Telef&#243;nica Tech</a>, Telef&#243;nica&#8217;s digital business unit, launches a <a href="https://telefonicatech.com/en/solutions/ai-and-data/blockchain/self-sovereign-identity-and-verifiable-credentials">self-sovereign identity solution</a> based on verifiable credentials to help companies and public organisations adapt to and implement the European Union&#8217;s new legal and technical framework for Self-Sovereign Identity (SSI), whose reference project is the EUDI Wallet, which will come into force at the end of 2026 in all member states.</p></blockquote><h3><a href="https://www.biometricupdate.com/202601/telefonica-tech-launches-self-sovereign-identity-tool-based-on-verifiable-credentials">Telef&#243;nica Tech launches self-sovereign identity tool based on verifiable credentials</a></h3><blockquote><p>Telef&#243;nica&#8217;s digital business unit, <a href="https://telefonicatech.com/en">Telef&#243;nica Tech</a>, has announced the launch of a self-sovereign identity product based on verifiable credentials. A press release says the tool aims to help companies and public organizations implement the EU&#8217;s new legal and technical framework for Self-Sovereign Identity (SSI), whose reference project is the <a href="https://www.biometricupdate.com/202512/will-the-eudi-wallet-be-ready-in-2026-experts-say-probably-not">EUDI Wallet</a>.</p></blockquote><h3>Check out SpruceID&#8217;s new <a href="https://spruceid.com/learn">Knowledge Base</a></h3><blockquote><p>Digital Identity Fundamentals, Trust Infrastructure, Mobile Driver&#8217;s Licenses (mDLs), Verifiable Digital Credentials, Credential Formats &amp; Standards, Verification Mechanisms, Assurance &amp; Lifecycle Management, Privacy Risks &amp; Fraud Prevention, Digital Wallets &amp; Device Security, Authentication &amp; Access Protocols, Identity Policy &amp; Governance, Global Ecosystem &amp; Regulations, Real-World Use Cases</p></blockquote><h2>Member Credentials in the Wild</h2><h3><a href="https://theabp.org.uk/your-abp-digital-credentials-whats-changing-and-what-it-means-for-you/">Your ABP Digital Credentials: What&#8217;s Changing and What It Means for You</a></h3><h3><a href="https://www.aicerts.ai/news/credential-verification-automation-redefines-skills-first-hiring/">Credential Verification Automation Redefines Skills-First Hiring</a></h3><h2>Identity an AI</h2><h3><a href="https://www.biometricupdate.com/202601/kya-emerges-as-essential-tool-to-ensure-agentic-ai-is-trustworthy">KYA emerges as essential tool to ensure agentic AI is trustworthy</a>: From public attestations to PKI, industry explores how to stop secret agents</h3><blockquote><p><strong>Decentralized identity cuts out need for hierarchies: Kaliya Young</strong></p><p>A recent <a href="https://www.viaknowledgehub.com/p/decentralized-identity-in-the-age?utm_source=substack&amp;utm_medium=email">episode</a> of the Knowledge Hub podcast features insights from Kaliya Young, a 20-year veteran in the decentralized identity sector &#8211; making her among the first to recognize its potential. Young breaks down the concept of namespaces, in an explanation of why identity becoming decentralized, so to speak, is such a big deal.</p></blockquote><h3><a href="https://developers.googleblog.com/under-the-hood-universal-commerce-protocol-ucp/">(Google) Under the Hood: Universal Commerce Protocol (UCP)</a></h3><blockquote><p>The <a href="http://ucp.dev/">Universal Commerce Protocol (UCP)</a> is an open-source standard designed to power the next generation of agentic commerce. By establishing a common language and functional primitives, UCP enables seamless commerce journeys between consumer surfaces, businesses, and payment providers. It is built to work with existing retail infrastructure, and is compatible with Agent Payments Protocol (<a href="https://ap2-protocol.org/">AP2</a>) to provide secure agentic payments support. It also provides businesses flexible ways to integrate via APIs, Agent2Agent (<a href="https://a2a-protocol.org/latest/">A2A</a>), and the Model Context Protocol (<a href="https://modelcontextprotocol.io/docs/getting-started/intro">MCP</a>).</p></blockquote><h3><a href="https://auth0.com/blog/api-authorization-hierarchy-needs/">The API Authorization Hierarchy of Needs: Why You Aren&#8217;t Ready for AI Agents Yet</a></h3><blockquote></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bRS7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff69d6dda-fc96-420e-87db-c142f1f54e68_1024x572.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bRS7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff69d6dda-fc96-420e-87db-c142f1f54e68_1024x572.png 424w, https://substackcdn.com/image/fetch/$s_!bRS7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff69d6dda-fc96-420e-87db-c142f1f54e68_1024x572.png 848w, https://substackcdn.com/image/fetch/$s_!bRS7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff69d6dda-fc96-420e-87db-c142f1f54e68_1024x572.png 1272w, https://substackcdn.com/image/fetch/$s_!bRS7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff69d6dda-fc96-420e-87db-c142f1f54e68_1024x572.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bRS7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff69d6dda-fc96-420e-87db-c142f1f54e68_1024x572.png" width="1024" height="572" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f69d6dda-fc96-420e-87db-c142f1f54e68_1024x572.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:572,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!bRS7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff69d6dda-fc96-420e-87db-c142f1f54e68_1024x572.png 424w, https://substackcdn.com/image/fetch/$s_!bRS7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff69d6dda-fc96-420e-87db-c142f1f54e68_1024x572.png 848w, https://substackcdn.com/image/fetch/$s_!bRS7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff69d6dda-fc96-420e-87db-c142f1f54e68_1024x572.png 1272w, https://substackcdn.com/image/fetch/$s_!bRS7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff69d6dda-fc96-420e-87db-c142f1f54e68_1024x572.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>Ethereum New Proposal - <a href="https://ethereum-magicians.org/t/erc-8126-ai-agent-registration-and-verification/27445">ERC-8126: AI Agent Registration and </a><a href="https://auth0.com/blog/api-authorization-hierarchy-needs/">The API Authorization Hierarchy of Needs: Why You Aren&#8217;t Ready for AI Agents Yet</a><a href="https://ethereum-magicians.org/t/erc-8126-ai-agent-registration-and-verification/27445">Verification</a></h3><h3><a href="https://studio.dgverse.in/verifiable-ai-digital-trust">The Future of Digital Trust: Why Your Organization Needs Verifiable AI</a></h3><blockquote><p>Verifiable AI works the same way. Instead of blindly trusting an AI system&#8217;s output, it ensures that every action and decision can be proven&#8212;who deployed the AI, what it is authorized to do, and whether it followed the required rules. This is where Verifiable Credentials play a critical role: they act as the visas attached to the AI&#8217;s passport, defining scope, permission, and compliance, and making trust verifiable, enforceable, and reusable as AI systems operate across platforms and ecosystems.</p></blockquote><h3><a href="https://timohotti.substack.com/p/the-gradual-revolution-of-agentic">The Gradual Revolution of &#8220;Agentic Everything&#8221;</a></h3><blockquote><p>The answer lies in a simple, yet catastrophic, architectural omission from the 1970s. When the internet protocols (TCP/IP) were designed, they were built to move Data&#8212;what philosophers like John Searle call &#8220;Brute Facts.&#8221; The network is brilliant at proving that I sent you a file. It is perfect at moving a packet of information from Point A to Point B without corruption. It solves the physics of information transport perfectly.</p><p>But the internet has no concept of Value&#8212;what Searle calls &#8220;Institutional Facts.&#8221; An Institutional Fact is a social agreement that exists only because we say it does: &#8220;This piece of paper is worth five euros,&#8221; &#8220;I am over 18,&#8221; or &#8220;I owe you a favor.&#8221; The internet cannot natively prove that I am who I say I am, or that I owe you money. It can send a PDF of a contract, but it cannot enforce the &#8220;handshake&#8221; that makes the contract valid.</p></blockquote><h3><a href="https://blog.mykin.ai/p/import-your-chatgpt-or-claude-history">Import Your ChatGPT or Claude History to Kin</a></h3><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.identosphere.net/subscribe?group=true&quot;,&quot;text&quot;:&quot;Get a group subscription&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.identosphere.net/subscribe?group=true"><span>Get a group subscription</span></a></p><h3>Government Updates</h3><h3><a href="https://financefeeds.com/uk-scraps-digital-id-requirement-for-work-checks/">UK Scraps Digital ID Requirement for Work Checks Amid Growing Privacy Backlash</a></h3><h3><a href="https://www.gov.uk/government/publications/a-blueprint-for-modern-digital-government/a-blueprint-for-modern-digital-government-html">A blueprint for modern digital government (HTML)</a></h3><blockquote><p>This change will be led by the new digital centre of government. The digital centre exists to serve the public, departments and the wider public sector. It will be magnetic: the home of specialist expertise in digital service design, artificial intelligence and other areas. It will be catalytic: enabling teams to work together more easily to deliver the government&#8217;s missions and power public sector reform.</p></blockquote><h3><a href="https://gds.blog.gov.uk/2026/01/16/our-approach-to-keeping-gov-uk-one-login-secure/">Our approach to keeping GOV.UK One Login secure</a></h3><blockquote><p>In the GOV.UK One Login programme our security model involves multiple lines of protection, such as monitoring for threats, controlling access to systems, and keeping detailed logs.&#8239;&#8239;We regularly review and update these measures to stay ahead of any new risks.</p></blockquote><h3><a href="https://www.paycode.com/post/building-resilient-payment-systems-in-fragile-states-lessons-from-the-imf-and-the-role-of-offline-d">Building Resilient Payment Systems in Fragile States: Lessons from the IMF and the Role of Offline Digital Finance</a></h3><blockquote><p>Paycode enhances <strong>national ID systems</strong> with <strong>offline biometric authentication</strong> and is now integrating <strong>self-sovereign identity</strong> (SSI) models to ensure continuity even when central systems are unreachable.</p></blockquote><h2>Practical Implementation</h2><h3><a href="https://www.keycloak.org/2026/01/issue-credentials-over-openid4vci">Setting Up Keycloak as a Credential Issuer with OpenID4VCI</a></h3><h2>Data</h2><h3><a href="https://www.mylaminin.net/post/are-you-compliant-the-overlapping-rules-governing-research-data-today">Are You Compliant? The Overlapping Rules Governing Research Data Today</a></h3><h2>Identity not SSI</h2><h3><a href="https://auth0.com/blog/integrate-google-one-tap-auth0-react/">How to Implement Google One Tap in React with Auth0 and FedCM</a></h3><h2>Good Explainers</h2><h3><a href="https://blog.makerx.com.au/why-verified-credentials-vcs-are-coming-to-the-forefront-in-digital-security-and-identity-verification/">Why Verifiable Credentials (VCs) are Coming to the Forefront in Digital Security and Identity Verification</a></h3><h2>WorldID Watch</h2><h3><a href="https://franklyspeaking.substack.com/p/a-conversation-with-adrian-ludwig">A Conversation with Adrian Ludwig: Q&amp;A with Adrian Ludwig, CISO of Tools for Humanity</a></h3>]]></content:encoded></item><item><title><![CDATA[Identosphere 261 Jan 2-Jan 9:  NIST • Trust • New VC Charter @W3C • Biometric Data Discussion Group • Identity & AI]]></title><description><![CDATA[This is the weekly Identosphere Newsletter sharing highlights from around the web covering Decentralized and Self-Sovereign Identity curated by Kaliya Young, Identity Woman.]]></description><link>https://newsletter.identosphere.net/p/identosphere-261-jan-2-jan-9-nist</link><guid isPermaLink="false">https://newsletter.identosphere.net/p/identosphere-261-jan-2-jan-9-nist</guid><dc:creator><![CDATA[IdentityWoman]]></dc:creator><pubDate>Wed, 14 Jan 2026 18:15:33 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!VF_o!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed7ec7a3-beb4-48bb-a53a-9c384e66cdbd_657x488.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2><strong>Upcoming New</strong></h2><ul><li><p>Workshop: <a href="https://github.com/credebl/">CREDEBL</a> For Decentralized Identity and Verifiable Credentials, Wednesday, February 18 at 8 AM Pacific  <a href="https://zoom.us/meeting/register/Aq2iY0R7SV2BzPFpJ-Ih2g#/registration">Zoom</a></p></li></ul><h2><strong>Upcoming</strong></h2><p><em>These were all listed in previous newsletters</em></p><ul><li><p>Call for Papers Open Now <a href="https://openidentity.eu/">Open Identity Summit </a>Deadline: January 31st, 2026</p></li></ul><blockquote><p>The summit takes place May 21&#8211;22, 2026 at University of Applied Sciences Dresden (HTW Dresden) in Dresden, Germany</p></blockquote><ul><li><p>Protocols for Publishers <a href="https://protocolsforpublishers.com/pfp-london-dates-and-early-speakers/">PfP&#10024; </a>London on Feb 4-5, 2026 to discuss how we can preserve an open, equitable web, where no one company holds the keys.</p></li><li><p><a href="https://connect.mosip.io/">MOSIP Connect</a>, Rabat Moroco, Feb 11-13. <em>Feb 13th is an unconference day facilitated by Kaliya. Reach out to me for an invite.</em></p></li><li><p>Join us at the<a href="https://www.1edtech.org/event/dc/summit/2026"> 1EdTech Digital Credentials Summit</a> in Philadelphia, February 18-20, 2026.</p></li><li><p><a href="https://didunconf.africa/">DIF Unconference Africa</a> (an IIW Regional Event) Feb 24-26, 2026 Cape Town</p></li><li><p><a href="https://internetidentityworkshop.com/">Internet Identity Workshop</a> #42, April 28-30, 2026, Mountain View California</p></li><li><p><a href="https://www.eventbrite.com/e/agentic-internet-workshop-2-tickets-1976356257769?aff=oddtdtcreator">Agentic Internet Workshop</a> #2, May 1, 2026, Mountain View California</p></li><li><p>dice: <a href="https://www.linkedin.com/feed/update/urn:li:activity:7407632798372495360/?actorCompanyId=93246186">Digital Identity unConfernece Europe</a>  (an IIW Regional Event)  June 22-24, Copenhagen, Denmark</p></li></ul><h2>Standards</h2><h3>(NIST)<a href="https://www.nist.gov/blogs/cybersecurity-insights/digital-identities-getting-know-verifiable-digital-credential-0"> Digital Identities: Getting to Know the Verifiable Digital Credential Ecosystem</a> Post 2: Understanding mDL credential formats</h3><h3>(NIST) <a href="https://www.nist.gov/blogs/cybersecurity-insights/digital-identities-getting-know-verifiable-digital-credential-ecosystem">Digital Identities: Getting to Know the Verifiable Digital Credential Ecosystem</a> Post 1 Overview.</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!VF_o!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed7ec7a3-beb4-48bb-a53a-9c384e66cdbd_657x488.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!VF_o!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed7ec7a3-beb4-48bb-a53a-9c384e66cdbd_657x488.png 424w, https://substackcdn.com/image/fetch/$s_!VF_o!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed7ec7a3-beb4-48bb-a53a-9c384e66cdbd_657x488.png 848w, https://substackcdn.com/image/fetch/$s_!VF_o!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed7ec7a3-beb4-48bb-a53a-9c384e66cdbd_657x488.png 1272w, https://substackcdn.com/image/fetch/$s_!VF_o!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed7ec7a3-beb4-48bb-a53a-9c384e66cdbd_657x488.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!VF_o!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed7ec7a3-beb4-48bb-a53a-9c384e66cdbd_657x488.png" width="657" height="488" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ed7ec7a3-beb4-48bb-a53a-9c384e66cdbd_657x488.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:488,&quot;width&quot;:657,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!VF_o!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed7ec7a3-beb4-48bb-a53a-9c384e66cdbd_657x488.png 424w, https://substackcdn.com/image/fetch/$s_!VF_o!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed7ec7a3-beb4-48bb-a53a-9c384e66cdbd_657x488.png 848w, https://substackcdn.com/image/fetch/$s_!VF_o!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed7ec7a3-beb4-48bb-a53a-9c384e66cdbd_657x488.png 1272w, https://substackcdn.com/image/fetch/$s_!VF_o!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed7ec7a3-beb4-48bb-a53a-9c384e66cdbd_657x488.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>[DRAFT] <a href="https://w3c.github.io/vc-charter-2026/">Verifiable Credentials Working Group Charter: Start Date 2026 April 1, 2026</a></h3><p>The Working Group will deliver the following W3C normative specifications:</p><blockquote><p>Verifiable Credential Render Method v1.0</p><p>Verifiable Credential Confidence Method v1.0</p><p>Verifiable Credential API for Lifecycle Management v1.0</p><p>Verifiable Credential Barcodes v1.0</p><p>Verifiable Issuers and Verifiers v1.0</p><p>Data Integrity BBS Cryptosuites v1.0</p><p>Verifiable Credentials JSON Schema Specification v1.0</p></blockquote><h3><a href="https://spdci.org/news/enhaced-social-protection-through-interoperability-id-systems-standards-released/">Enhaced social protection through interoperability: ID systems standards released</a></h3><blockquote><p>Version 1.0.0 of the ID systems and SP-Systems Interoperability Standards is now available on <a href="https://standards.spdci.org/standards/id-systems-v1.0.0">Gitbook</a>. The standards, endorsed by the USP2030 Partnership, adopt <a href="https://openid.net/specs/openid-connect-core-1_0.html">OpenID Connect</a> (OpenID foundation) and <a href="https://www.w3.org/TR/vc-overview/">Verifiable Credentials</a> (W3C) as the technical foundation for interoperability. These open standards provide a secure and trusted framework that allows social protection systems to authenticate individuals and request reliable identity data&#8212;such as demographic attributes and authentication tokens&#8212;from ID systems in a privacy-preserving manner. This approach ensures that identity data can be exchanged safely while maintaining trust, security, and scalability.</p></blockquote><h3>(Kantara) <a href="https://kantarainitiative.org/work-groups/coming-soon-biometric-data-discussion-group/">Coming Soon &#8211; Biometric Data Discussion Group</a></h3><blockquote><p>The Biometric Data Discussion Group (Biometrics) will address the management, security, and privacy of biometric data, from collection to destruction, with a focus on practical application and GDPR compliance. While standards do exist, they are often inaccessible to non-experts, and there is a need to decode and translate existing standards into a straightforward, practical guide for real-world application.  Biometrics will develop a set of recommendations and best practices for biometric data management to fill this need for use alongside existing standards.</p></blockquote><h2>Opt Out for Data Brokers </h2><h3><a href="https://paray.com/ca-gets-the-drop-on-data-brokers/">CA Gets the DROP on Data Brokers</a></h3><blockquote><p>Beginning in 2026, California residents can access the <a href="https://consumer.drop.privacy.ca.gov/">Delete Request and Opt-out Platform (DROP)</a> and request data brokers delete their personal information &#8211; information collected from third parties or from consumers in a non-&#8220;first party&#8221; capacity (i.e., through an interaction where the consumer did not intend or expect to interact with the data broker).</p></blockquote><h2>In the Real World</h2><h3>[Podcast] <a href="https://northernblock.io/podcasts/how-iata-is-building-trust-for-nearly-400-airlines">How IATA is Building Trust for Nearly 400 Airlines (with Gabriel Marquie)</a></h3><blockquote><p>How does an airline instantly trust a travel agency on the other side of the world? And what does it take to enable a future where passengers move through airports with a seamless, contactless identity experience?</p></blockquote><h3><a href="https://www.linkedin.com/posts/daniellesl_digitalidentity-verifiablecredentials-activity-7415051442958278657-4i9Q/">The SSI pitch that worked 2 years ago doesn&#8217;t work anymore.</a></h3><blockquote><p>Getting them to work in production when you&#8217;re processing millions of verifications? That&#8217;s where most implementations fall apart. Interoperability that goes beyond marketing slides. Your credentials need to work with ISO mdoc systems, OIDC4VC flows, and yes, even the SAML dinosaurs that half the enterprise world still runs on.</p></blockquote><h3>(SpruceID) <a href="https://blog.spruceid.com/how-to-build-a-digital-id-people-actually-want-to-use-5-lessons-from-the-field/">How to Build a Digital ID People Actually Want to Use: 5 Lessons From the Field</a></h3><blockquote><p>Lesson 1: Anchor on Everyday Use Cases and Make Them Visible</p><p>Lesson 2: Get Big Names on Board Early</p><p>Lesson 3: Reduce Friction for Everyone</p><p>Lesson 4: Use Policy to Unlock Adoption</p><p>Lesson 5: Earn the Trust Dividend</p></blockquote><h3>(SpruceID) <a href="https://blog.spruceid.com/digital-identity-in-america/">Digital Identity In America: Series Overview</a></h3><blockquote><p>An executive guide to SpruceID&#8217;s multi-part series on the future of digital identity in the U.S.</p><p>1. Foundations of Digital Identity</p><p>2. Policy Momentum: Why Governments Care Now</p><p>3. The Technology Powering Digital Identity</p><p>4. Privacy and User Control</p><p>5. Practical Digital Identity in America</p><p>6. Enabling Issuers of U.S. Digital Identity</p><p>7. Verifiers: Building Trust at the Point of Use</p><p>8. Digital Identity: End User Experience</p></blockquote><h3>(Heather Flanagan)  <a href="https://sphericalcowconsulting.com/2026/01/06/process-standards-and-gartner-iam/">Process, Standards, and the AI Rogue Wave: Notes from Gartner IAM</a></h3><blockquote><p>First, many organizations don&#8217;t really need a better product; they need a process they can sustain. Second, standards work is happening, but it&#8217;s largely invisible in the conversations where buying decisions take shape. And third, even as Gartner itself warned that the current AI hype is spiraling, the market continues to reward vendors for leaning into it anyway.</p></blockquote><h2>Identity and AI</h2><h3><a href="https://www.linkedin.com/pulse/key-issues-agentic-id-david-birch-qr1ie?utm_source=share&amp;utm_medium=member_ios&amp;utm_campaign=share_via">The Key Issues in Agentic ID</a></h3><blockquote><p>That is why I have long made myself unpopular in the crypto world by maintaining that while not your keys, not your coins is a fun rallying cry for Bitcoin maximalists<a href="https://www.forbes.com/sites/davidbirch/2021/10/15/not-your-keys-not-your-coins-whatever/"> it makes absolutely no sense</a> that people should be loaded with this responsibility. I like<a href="https://www.linkedin.com/in/adamlevine18/"> Adam Levine</a>&#8217;s framing that while the idea of self-sovereignty in crypto is empowering it demands a &#8220;persistent competence&#8221; that I think is well beyond the capability and capacity of the average member of the public, and I include myself in that category.</p></blockquote><h3><a href="https://blog.gitguardian.com/what-ai-agents-can-teach-us-about-nhi-governance/">What AI Agents Can Teach Us About NHI Governance</a></h3><blockquote><p>Agentic AI is a stress test for non-human identity governance. Discover how and why identity, trust, and access control must evolve to keep automation safe.</p></blockquote><h3><a href="https://auth0.com/blog/mcp-november-2025-specification-update/">(Auth0) Model Context Protocol Nov 2025 Specification Update: CIMD, XAA, and Security</a></h3><blockquote><p>The <a href="https://modelcontextprotocol.io/specification/2025-11-25">Nov 25, 2025, specification update</a> for the Model Context Protocol (MCP) is out.</p><p>For those of us working in Identity, this is the update that starts to solve the hard problems of connecting AI agents to real-world business data. It moves the protocol away from custom solutions and aligns it with standard OAuth patterns that developers and security teams already understand.</p></blockquote><h3>(Indicio) <a href="https://indicio.tech/blog/why-verifiable-credentials-will-power-real-world-ai-in-2026/">Why Verifiable Credentials will power real-world AI in 2026</a></h3><blockquote><p>AI systems are going to deliver business success in 2026, they must be able to safely access high-value data and act across organizational boundaries. To do this, systems and agents need to be:</p><p>- Identifiable</p><p>- Have access to structured and accurate data in a permissioned and auditable way</p><p>- Demonstrate that they have the delegated authority to share this data with other identifiable AI agents and systems.</p></blockquote><h3><a href="https://billions.network/blog/billions-know-your-agent">Billions&#8217; Know Your Agent - Identity and accountability for AI agents</a></h3><blockquote><p>Billions provides an Agent JS SDK that allows AI agents to generate and manage DIDs, perform authentication, and interact with the public attestation registry. The SDK supports LLMs with function calling and integrates with frameworks like LangChain.</p></blockquote><h3>(Phil Windley) <a href="https://www.windley.com/archives/2026/01/authorization_before_retrieval_making_rag_safe_by_construction.shtml">Authorization Before Retrieval: Making RAG Safe by Construction</a></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gEAl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F60c2e902-fb8c-4489-ac54-b4ffa5dca552_759x389.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gEAl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F60c2e902-fb8c-4489-ac54-b4ffa5dca552_759x389.png 424w, https://substackcdn.com/image/fetch/$s_!gEAl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F60c2e902-fb8c-4489-ac54-b4ffa5dca552_759x389.png 848w, https://substackcdn.com/image/fetch/$s_!gEAl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F60c2e902-fb8c-4489-ac54-b4ffa5dca552_759x389.png 1272w, https://substackcdn.com/image/fetch/$s_!gEAl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F60c2e902-fb8c-4489-ac54-b4ffa5dca552_759x389.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gEAl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F60c2e902-fb8c-4489-ac54-b4ffa5dca552_759x389.png" width="759" height="389" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/60c2e902-fb8c-4489-ac54-b4ffa5dca552_759x389.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:389,&quot;width&quot;:759,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!gEAl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F60c2e902-fb8c-4489-ac54-b4ffa5dca552_759x389.png 424w, https://substackcdn.com/image/fetch/$s_!gEAl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F60c2e902-fb8c-4489-ac54-b4ffa5dca552_759x389.png 848w, https://substackcdn.com/image/fetch/$s_!gEAl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F60c2e902-fb8c-4489-ac54-b4ffa5dca552_759x389.png 1272w, https://substackcdn.com/image/fetch/$s_!gEAl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F60c2e902-fb8c-4489-ac54-b4ffa5dca552_759x389.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>(Phil Windley) <a href="https://www.windley.com/archives/2025/12/what_ai_can_tell_you_about_your_authorization_policies.shtml">What AI Can Tell You About Your Authorization Policies</a></h3><p><em>Review and audit are different.</em></p><blockquote><p>In review and audit, the intent is assumed to already exist. The policies are fixed. The question is no longer how authority should be expressed, but how it is already expressed and whether that expression can be understood, defended, and justified.</p><p>This difference matters because it changes how AI should be used. In authoring, AI is invited to explore alternatives. In audit, that permission must be taken away. The AI&#8217;s role shifts from collaborator to examiner: explaining behavior, enumerating scope, and surfacing consequences without proposing changes. The goal of a policy audit is not to optimize policies or propose fixes, but to understand what the current policy set allows, how broad that access is, and whether it can be defended as intentional.</p></blockquote><h3>(Phil Windley) <a href="https://www.windley.com/archives/2025/12/policy_authoring_and_analysis_with_ai.shtml">Policy Authoring and Analysis with AI</a></h3><blockquote><p>AI doesn&#8217;t belong in the business of deciding who can access what, but it can be an effective partner in reasoning about authorization policies. When used inside clear guardrails, AI helps humans author, analyze, and refine policies without taking over access decisions.</p></blockquote><h3>[Podcast]<a href="https://www.viaknowledgehub.com/p/decentralized-identity-in-the-age"> Decentralized identity in the age of AI agents with Kaliya Young</a></h3><blockquote><p>In this episode, we sit down with <a href="https://www.linkedin.com/in/kaliya/">Kaliya Young</a>. Kaliya is widely known as the &#8220;Identity Woman&#8221; and is one of the earliest pioneers of decentralized and self-sovereign identity. With over 20 years in the field, Kaliya breaks down complex concepts like decentralized identifiers (DIDs) and verifiable credentials in practical, real-world terms.</p></blockquote><h2>Education </h2><h3><a href="https://www.opengroup.org/certifications/openbadges">How The Open Group Uses Open Badges</a></h3><blockquote><p>The Open Group issues Open Badges to individuals who earn certifications, credentials, or other recognized achievements across its portfolio of programs. These badges:</p><p>- Provide a digital representation of an individual&#8217;s certification</p><p>- Include verifiable metadata about the achievement</p><p>- Allow certified individuals to share their credentials easily with employers, peers, and professional communities</p><p>- Support lifelong learning by enabling individuals to build a visible, portable record of their professional development</p></blockquote><h3>(Simone Ravaioli) <a href="https://www.plaio.org/index.php/home/article/view/332">REGEN: REfugeesGENeration - AI Can Transform How We Recognize and Empower Refugees</a></h3><blockquote><p>REGEN is a proposed AI-powered framework that would recognize and validate refugees&#8217; informal skills and experiences through narrative analysis and issue verifiable credentials, transforming refugee recognition from a bureaucratic gatekeeping process into a pathway for empowerment and economic integration.</p></blockquote><h2>Trust and Other Things</h2><h3><a href="https://www.linkedin.com/pulse/trust-services-trust-as-a-service-parthasarathi-v-oj8yc">Trust Services, Trust-as-a-Service, Trust-Enhancing-Technologies</a></h3><blockquote><p>In this context, its important to understand - Trust Services, Trust-as-a-Service, Trust-Enhancing-Technologies. Let us take 3 players across different domains to illustrate how things are evolving.</p></blockquote><h3><a href="https://vidos.id/blog/december-2025-cross-border-testing-proves-digital-identity-interoperability">December 2025: Cross-Border Testing Proves Digital Identity Interoperability</a></h3><blockquote><p>December 2025: the EU&#8217;s EUDI Wallets Launchpad event in Brussels demonstrated that cross-border digital identity interoperability works through successful conformance testing between Member State wallets and relying party infrastructure. While the UK&#8217;s Digital Identity Trust Framework achieved statutory status with 48 certified providers and Ireland announced plans to use its 2026 EU Council presidency to push for EU-wide ID-verified social media accounts, the month&#8217;s defining moment was proof that the technical architecture can deliver on its interoperability promise.</p></blockquote><h3><a href="https://www.finextra.com/blogposting/30528/will-proof-of-purchase-aka-e-receipt-become-the-highest-volume-verifiable-credential">Will Proof of Purchase (AKA e-receipt) become the highest-volume verifiable credential?</a></h3><blockquote><p>Now when general-purpose EBWs will be either mandatory or self-evidently useful for all enterprises (need it also for eg receiving job applications)  it is time to restart the journey towards linespecific use of e-receipts. Better named Proof of Purchase verifiable credentials (PoPs) to underline the importance of so many wallet2wallet2wallet reuse opportunities.</p></blockquote><h3><a href="https://passkeys.substack.com/p/physical-badges-with-integrated-passkeys">Physical Badges with integrated Passkeys</a></h3><blockquote><p>How to build a Digital Credential Issuer (Developer Guide)</p></blockquote><h3><a href="https://securitybrief.com.au/story/the-future-of-authentication-in-2026-insights-from-yubico-s-experts">The future of authentication in 2026: Insights from Yubico&#8217;s experts</a></h3><blockquote><p>If you&#8217;ve followed us this year, you&#8217;ve read various posts from Yubico experts sharing their insights and expertise on the latest trends impacting cybersecurity around the world. We strive to post content that is insightful to not just our customers, but the businesses and individuals that are looking for information and actionable takeaways that can help them become truly cyber resilient in this digital world.</p></blockquote><h3>(Ethereum Leaders) <a href="https://trustlessness.eth.limo/general/2025/11/11/the-trustless-manifesto.html">The Trustless Manifesto</a></h3><blockquote><p>Authors: Yoav Weiss, Vitalik Buterin, Marissa Posner</p><p>Ethereum was not created to make finance efficient or apps convenient.<br>It was created to set people free &#8212; to empower anyone, anywhere to coordinate without permission and without trusting anyone they cannot hold accountable.</p></blockquote>]]></content:encoded></item><item><title><![CDATA[Identosphere 260 Dec 20- Jan 2: Business Wallets • Pakistan VCs • UK ID Musings by Dave Birch • Age Verification • AI and Identity • More Year in Review]]></title><description><![CDATA[This is the weekly Identosphere Newsletter sharing highlights from around the web covering Decentralized and Self-Sovereign Identity curated by Kaliya Young, Identity Woman.]]></description><link>https://newsletter.identosphere.net/p/identosphere-260-dec-20-jan-2-business</link><guid isPermaLink="false">https://newsletter.identosphere.net/p/identosphere-260-dec-20-jan-2-business</guid><dc:creator><![CDATA[IdentityWoman]]></dc:creator><pubDate>Tue, 06 Jan 2026 21:42:35 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!GTn-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80c71ee8-51fd-490c-a6ac-5de68f55398d_1600x716.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>I turned on paid subscriptions on in Substack. The newsletter will continue to come out each week for all subscribers. Contributions are also possible on <a href="https://www.patreon.com/identosphere">Patreon</a> or <a href="https://identitywoman.net/identosphere/">Paypal</a>. <strong>I accept lump sum contributions too.</strong> If you would like to do this send information to kaliya@identitywoman.net and I can send you an invoice via Stripe or via .</em></p><h2>Upcoming </h2><ul><li><p>Call for Papers Open Now <a href="https://openidentity.eu/">Open Identity Summit </a>Deadline: January 31st, 2026</p></li></ul><blockquote><p>The summit takes place May 21&#8211;22, 2026 at University of Applied Sciences Dresden (HTW Dresden) in Dresden, Germany</p></blockquote><ul><li><p>Protocols for Publishers <a href="https://protocolsforpublishers.com/pfp-london-dates-and-early-speakers/">PfP&#10024; </a>London on Feb 4-5, 2026 to discuss how we can preserve an open, equitable web, where no one company holds the keys.</p></li><li><p><a href="https://connect.mosip.io/">MOSIP Connect</a>, Rabat Moroco, Feb 11-13. <em>Feb 13th is an unconference day facilitated by Kaliya. Reach out to me for an invite.</em></p></li><li><p>Join us at the<a href="https://www.1edtech.org/event/dc/summit/2026"> 1EdTech Digital Credentials Summit</a> in Philadelphia, February 18-20, 2026.</p></li><li><p><a href="https://didunconf.africa/">DIF Unconference Africa</a> (an IIW Regional Event) Feb 24-26, 2026 Cape Town</p></li><li><p><a href="https://internetidentityworkshop.com/">Internet Identity Workshop</a> #42, April 28-30, 2026, Mountain View California</p></li><li><p><a href="https://www.eventbrite.com/e/agentic-internet-workshop-2-tickets-1976356257769?aff=oddtdtcreator">Agentic Internet Workshop</a> #2, May 1, 2026, Mountain View California</p></li><li><p>dice: <a href="https://www.linkedin.com/feed/update/urn:li:activity:7407632798372495360/?actorCompanyId=93246186">Digital Identity unConfernece Europe</a>, June 22-24, Copenhagen, Denmark</p></li></ul><h2>Hiring</h2><h3>(Socure) <a href="https://hello.cv/jobs/share/386684093966053376">Senior Product Manager - Reusable Identity Wallet</a></h3><h2>Up First</h2><h3>(Jon Shamah) <a href="https://www.linkedin.com/pulse/reflections-international-collaboration-digital-identity-jon-shamah-uinfe/?trackingId=TmgzM2v5TQqRDjF0pM9zaw%3D%3D">Reflections on International Collaboration in Digital Identity and Trust Services</a></h3><blockquote><p>I have just returned from a productive meeting at the Senate in Ottawa, Canada, where I presented a study, co-authored with my colleague Keith Jansa, and which was commissioned by the European Union and the Digital Governance Council of Canada. The focus of the study was to explore pathways for enhanced digital collaboration between the EU and Canada.</p></blockquote><h3><a href="https://anonyome.com/resources/blog/whats-a-state-endorsed-digital-identity-and-why-is-utah-creating-one/">What&#8217;s a &#8220;State Endorsed Digital Identity&#8221; and Why is Utah Creating One?</a></h3><blockquote><p>Using the birth certificate paradigm as its model, Utah has asserted that <em>each individual has a unique identity</em>, which is not established by the state, but is inherent to the individual.</p></blockquote><h3>Seen on weak <a href="https://www.linkedin.com/pulse/250-weak-signals-i-tracked-2025-estelle-metayer-0z4pe/">signals list:</a></h3><blockquote><p><strong>- New category: </strong><em><strong>Personal Algorithmic Identity</strong></em><strong> passports</strong></p><p><strong>- Kids building portfolio identities starting age 7</strong></p></blockquote><h3><a href="https://reclaimthenet.org/alaska-plans-ai-powered-digital-id-linking-identity-and-payments">Alaska Plots AI-Driven Digital Identity, Payments, and Biometric Data System</a></h3><blockquote><p>The state&#8217;s new system could turn bureaucracy into automation, and consent into a checkbox no one really controls. (<a href="https://docs.reclaimthenet.org/rfi-my-alaska-mobile-application-enhancement.pdf">Document</a>)</p></blockquote><h3>Pakistan&#8217;s<a href="https://www.nadra.gov.pk/verifiableCredentials"> NANRA is into VCs</a></h3><blockquote><p>Verifiable credentials let you prove who you are without carrying physical documents. Whether you are pplying for a service, sharing qualifications, or confirming your identity,  your credentials are digitally secure, instantly verifiable, and fully in your control.</p></blockquote><h3>(Dave Birch) <a href="https://dgwbirch.substack.com/p/thinking-about-a-uk-digital-identity">Thinking About a UK Digital Identity Infrastructure</a></h3><blockquote><p>even if you are one of three million people who signed a petition against having a digital identity card, the fact is that a modern society needs a digital identity infrastructure. In my view, the public debate itself needs to change: It should no longer be about whether people should be made to carry a card or not!</p></blockquote><h3>mDL</h3><h3>(Biometric Update) <a href="https://www.biometricupdate.com/202512/nist-announces-new-mdl-use-case-resources-to-support-financial-sector-adoption">NIST announces new mDL use case, resources to support financial sector adoption</a></h3><blockquote><p>NIST&#8217;s response is a document called &#8220;Building Assurance in the <a href="https://www.biometricupdate.com/202510/mdl-fragmentation-clouds-us-digital-id-landscape-as-adoption-ticks-steadily-up">mDL ecosystem</a>,&#8221; which Galuzzo says focuses on three core components. &#8220;One was enrollment into the system of record. How do we understand what degree of vetting and proofing went into the issuance of that original polycarbonate plastic, whatever kind of physical ID was involved in the actual process of being provisioned to the DMV.&#8221;</p></blockquote><h3><a href="https://reason.com/2025/12/31/dhs-says-real-id-which-dhs-certifies-is-too-unreliable-to-confirm-u-s-citizenship/">DHS Says REAL ID, Which DHS Certifies, Is Too Unreliable To Confirm U.S. Citizenship</a></h3><blockquote><p>In a December 11 <a href="https://storage.courtlistener.com/recap/gov.uscourts.alsd.76579/gov.uscourts.alsd.76579.44.1.pdf">court filing</a>, Philip Lavoie, the acting assistant special agent in charge of DHS&#8217; Mobile, Alabama, office, stated that, &#8220;REAL ID can be unreliable to confirm U.S. citizenship.&#8221;</p><p>In a <a href="https://storage.courtlistener.com/recap/gov.uscourts.alsd.76579/gov.uscourts.alsd.76579.48.0.pdf">court filing</a> in response to DHS, the Institute for Justice noted how incredible this position is. &#8220;REAL IDs require proof of citizenship or lawful status,&#8221;</p></blockquote><h2>Age Verification</h2><h3><a href="https://www.thinkdigitalpartners.com/news/2025/12/31/building-trust-into-online-age-verification/">Building trust into online age verification</a></h3><blockquote><p>As the UK moves to enforce online age verification under the Online Safety Act, protecting children must not come at the cost of privacy or digital trust. To succeed, age checks need to be privacy-preserving by design, giving users confidence that safety, security and personal data rights can coexist online, says Richard Hall, AVP at DigiCert.</p></blockquote><h3><a href="https://ec.europa.eu/digital-building-blocks/sites/spaces/EUDIGITALIDENTITYWALLET/pages/930450954/The+Age+Verification+Manual">EU Age Verification Manual</a></h3><blockquote><p>The age verification use case allows EU citizens to prove they are above a specific age threshold (e.g., over 16, 18, or 21) using a verifiable digital credential stored in their EUDI Wallet. The wallet enables selective disclosure: confirming age without revealing full birthdate or other identifying information. It is more secure than sharing a passport or national ID as less identifying data is shared.</p><p>This use case manual explains in practical terms how the age verification will work with EU Digital Identity Wallets. It also provides links to relevant technical and legal resources. (<a href="https://digital-strategy.ec.europa.eu/en/news/commission-releases-enhanced-second-version-age-verification-blueprint">Blueprint</a>)</p></blockquote><h2>AI and Identity</h2><h3><a href="https://www.linkedin.com/pulse/reflections-international-collaboration-digital-identity-jon-shamah-uinfe/?trackingId=TmgzM2v5TQqRDjF0pM9zaw%3D%3D">(Dyne.org) How we will delegate bureaucracy to AI</a></h3><blockquote><p>The future of identification technologies will involve delegating tasks to automated agents. Between the decentralised dream and the password asphyxiation, a third actor is emerging: the automatic intermediary.</p></blockquote><h3><a href="https://www.linkedin.com/posts/franceszelazny_ai-agents-and-verifiable-credentials-a-match-activity-7409238922280542208-CP8p/">AI Agents and VCs there are Issues</a></h3><blockquote><p>I&#8217;ve seen multiple articles and companies trying to position verifiable credentials as the foundation for identity in the age of AI agents. But there is a fundamental flaw here.</p></blockquote><h3><a href="https://medium.com/origintrail/5-trends-to-drive-the-ai-roi-in-2026-trust-is-capital-372ac5dabc38">5 Trends to drive the AI ROI in 2026: Trust is Capital</a></h3><blockquote><p>Strategic shift: trustworthy AI infrastructure is becoming a business advantage rather than a compliance burden.</p><p>By strengthening Integrity (the technical and ethical bedrock), mastering Data quality and sovereignty, insisting on Information transparency, cultivating verifiable Knowledge networks, and enforcing wise Governance at the top, organizations create a virtuous cycle.</p></blockquote><h3><a href="https://indicio.tech/blog/gartner-highlights-indicio-as-a-leader-in-decentralized-identity-for-ai-and-machines/">Gartner highlights Indicio as a leader in decentralized identity for AI and machines</a></h3><h3>(Evin McMullen, Billions) <a href="https://www.fintechweekly.com/magazine/articles/digital-identity-self-sovereign-wallets-income-monetization">Your Identity Is Your Most Valuable Asset; It&#8217;s About To Become Income, Too</a></h3><blockquote><p>Identity is the single most valuable digital asset. We need systems that allow users to capture that value rather than cede it to intermediaries who view personal data as their property. Now that the technology is readily available, self-sovereign identity will serve as the foundation of trust necessary for the next generation of digital services, one that compensates users for verified credentials rather than exploiting them.</p></blockquote><h3><a href="https://www.linkedin.com/pulse/why-protecting-human-identity-matters-age-ofai-arifa-khan-aar5e/">Why Protecting Human Identity Matters in the Age of AI</a></h3><blockquote><p><strong>Universal Digital Identity</strong>: Secure, interoperable, privacy-enhancing digital ID systems encompassing individuals, organizations, and autonomous entities.</p></blockquote><h3>(Okta) <a href="https://www.bankinfosecurity.com/verifiable-credentials-counter-ai-driven-identity-fraud-a-30318">Verifiable Credentials Counter AI-Driven Identity Fraud</a></h3><h2>Year Review - Year Ahead</h2><h3>(Heather Flanagan) <a href="https://sphericalcowconsulting.com/2025/12/30/icymi-2025/">ICYMI 2025: What You All Read the Most This Year</a></h3><ul><li><p>AI isn&#8217;t a feature anymore &#8212; it&#8217;s a structural change.</p></li><li><p>Governance beat technology as the real bottleneck.</p></li><li><p>Definitions matter. A lot.</p></li><li><p>Identity is expanding to new kinds of actors.</p></li><li><p>Interoperability is the quiet throughline.</p></li></ul><h3><a href="https://www.dock.io/post/will-big-tech-win-the-eudi-wallet-race">Will Big Tech Win the EUDI Wallet Race?</a></h3><h3><a href="https://cheqd.io/blog/2025-in-review-cheqds-year-of-building-trust-identity-and-verifiable-ai/">2025 in Review: cheqd&#8217;s Year of Building Trust, Identity, and Verifiable AI</a></h3><h3><a href="https://betanews.com/2025/12/30/maturing-id-wallets-investment-for-compliance-and-confidential-ai-privacy-predictions-for-2026/">Maturing ID wallets, investment for compliance and confidential AI -- privacy predictions for 2026</a></h3><h3><a href="https://iacde.org/uncategorized/%F0%9D%97%94%F0%9D%97%BF%F0%9D%97%B2-%F0%9D%97%97%F0%9D%97%B6%F0%9D%97%B4%F0%9D%97%B6%F0%9D%98%81%F0%9D%97%AE%F0%9D%97%B9-%F0%9D%97%96%F0%9D%97%BF%F0%9D%97%B2%F0%9D%97%B1%F0%9D%97%B2%F0%9D%97%BB/">Are Digital Credentials Replacing Degrees? trends for 2025-2030</a></h3><h2>Thoughtful</h2><h3><a href="https://liminal.co/articles/2026-predictions-whats-next-fraud-identity/">2026 Predictions: What Comes Next in Fraud, Cybersecurity, and Identity</a></h3><h3>(Doc Searls) <a href="https://projectvrm.org/2025/12/22/when-branding-means-relating/">When Branding Means Relating</a></h3><h3>(Doc Searls) <a href="https://projectvrm.org/2025/12/27/how-notice-consent-fails/">Writings on the Failings of Notice &amp; Consent</a></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!GTn-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80c71ee8-51fd-490c-a6ac-5de68f55398d_1600x716.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!GTn-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80c71ee8-51fd-490c-a6ac-5de68f55398d_1600x716.png 424w, https://substackcdn.com/image/fetch/$s_!GTn-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80c71ee8-51fd-490c-a6ac-5de68f55398d_1600x716.png 848w, https://substackcdn.com/image/fetch/$s_!GTn-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80c71ee8-51fd-490c-a6ac-5de68f55398d_1600x716.png 1272w, https://substackcdn.com/image/fetch/$s_!GTn-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80c71ee8-51fd-490c-a6ac-5de68f55398d_1600x716.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!GTn-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80c71ee8-51fd-490c-a6ac-5de68f55398d_1600x716.png" width="1456" height="652" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/80c71ee8-51fd-490c-a6ac-5de68f55398d_1600x716.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:652,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!GTn-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80c71ee8-51fd-490c-a6ac-5de68f55398d_1600x716.png 424w, https://substackcdn.com/image/fetch/$s_!GTn-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80c71ee8-51fd-490c-a6ac-5de68f55398d_1600x716.png 848w, https://substackcdn.com/image/fetch/$s_!GTn-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80c71ee8-51fd-490c-a6ac-5de68f55398d_1600x716.png 1272w, https://substackcdn.com/image/fetch/$s_!GTn-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80c71ee8-51fd-490c-a6ac-5de68f55398d_1600x716.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>Research</h2><h3>(Research) S<a href="https://link.springer.com/chapter/10.1007/978-3-032-02056-7_66">elf-Sovereign Identity a Catalyst for Secure and Efficient Employee Onboarding and Management</a></h3><blockquote><p>This paper examines how self-sovereign identity (SSI) technology can transform employee identity verification. It highlights the benefits of SSI such as simplified processes, enhanced security, employee empowerment and cost savings. The paper analyses the strategic advantages of adopting SSI, including leadership positioning, talent acquisition and retention, efficiency gains and data security compliance. Finally, the paper delves into the implementation of SSI and its future potential in the world of digital identity.</p></blockquote><h3>(Research) <a href="https://www.frontiersin.org/journals/blockchain/articles/10.3389/fbloc.2025.1730645/abstract">Self-Sovereign Identity for Verifiable Authorship Consent and Privacy-Preserving Conflict-of-Interest Screening in Academic Publishing: A Permissioned Blockchain Registry Approach</a></h3><blockquote><p>This paper proposes a decentralized framework using Self-Sovereign Identity technologies (DIDs and Verifiable Credentials) to address ethical gaps in academic publishing by enabling explicit authorship consent verification, accurate contributor role documentation, and privacy-preserving conflict-of-interest detection&#8212;backed by stakeholder survey support and positioned as a design contribution toward future implementation.</p></blockquote><h2>Business Wallets</h2><h3><a href="https://www.dock.io/post/eu-business-wallet-what-you-need-to-know-about-the-eus-digital-id-for-companies-video-and-takeaways">EU Business Wallet: What You Need to Know About the EU&#8217;s Digital ID for Companies</a> [Video and Takeaways]</h3><h3><a href="https://www.dock.io/post/business-wallets-and-organizational-identity-what-the-ewc-pilots-revealed">Business Wallets and Organizational Identity: What the EWC Pilots Revealed</a></h3><h3><a href="https://www.finextra.com/blogposting/30498/the-importance-of-the-sea-change-with-european-business-wallets-cannot-be-overstated">The importance of the Sea Change with European Business Wallets cannot be overstated</a></h3><h3>(Good4Work) <a href="https://good4work.com/the-rise-of-decentralized-identity-in-workforce-recognition/">The Rise of Decentralized Identity in Workforce Recognition</a></h3><blockquote><p>For employers, HR leaders, and platforms ready to lead in the next era of talent, embracing DIDs is a new way to engage with potential employees.</p></blockquote><h2>Protocols and Standards</h2><h3><a href="https://www.linkedin.com/feed/update/urn:li:activity:7404817083781341184/">OpenID and ISO announce Collaboration</a></h3><blockquote><p><a href="https://www.linkedin.com/search/results/all/?keywords=%23launchpad&amp;origin=HASH_TAG_FROM_FEED">A</a> event:<a href="https://www.linkedin.com/in/gail-hodges-26b1b9/"> Gail Hodges</a> (<a href="https://www.linkedin.com/company/openid-foundation/">OpenID Foundation</a> ) and Loffie Jordan (<a href="https://www.linkedin.com/company/isostandards/">ISO - International Organization for Standardization</a> ) are launching a joint group to work on harmonising digital credential protocols and avoiding fragmentation. A great step forward &#8211; well done! &#127881;</p></blockquote><h3>New Thinking: <a href="https://www.linkedin.com/posts/nicolagallo83_why-isnt-decentralized-identity-mainstream-activity-7412533797629599745-rwrw/">Proof of Continuity changes the question</a>: not &#8220;who holds this?&#8221; &#8594; &#8220;can this authority validly continue?&#8221;</h3><blockquote><p>DIDs solved identification.</p><p>VCs improved claims.</p><p>PoC solves authority.</p></blockquote><h3><a href="https://github.com/pic-protocol/pic-spec/blob/main/draft/0.1/pic-spec.md">Provenance Identity Continuity (PIC) Model Specification</a></h3><h3>(Heather Flanagan) <a href="https://sphericalcowconsulting.com/2025/12/23/web-payments-and-digital-identity/">Web Payments and Digital Identity Standards Are Converging &#8211; #TIL</a></h3><h3><a href="https://openid.net/authzen-shows-enterprise-readiness-at-gartner-iam-summit/">AuthZEN shows enterprise readiness at Gartner IAM Summit</a></h3><blockquote><p>The main AuthZEN session drew nearly 100 attendees whose questions revealed an important shift in market maturity. Rather than asking whether standards based authorization works, practitioners wanted to understand implementation specifics for their own environments - a clear indication that AuthZEN has moved from concept to viable technology.</p></blockquote><h3><a href="https://spdci.org/resource/best-practices-for-developing-implementing-and-managing-interoperability-standards/">Best practices for developing, implementing, and managing interoperability standards</a></h3>]]></content:encoded></item><item><title><![CDATA[Identosphere 259 Dec 14-19: 2025: Kim Duffy signs out of DIF • The Seven Sins of European Digital Identity • Two APIs Walk Into a Browser • AI Agent Registry Research ]]></title><description><![CDATA[This is the weekly Identosphere Newsletter sharing highlights from around the web covering Decentralized and Self-Sovereign Identity curated by Kaliya Young, Identity Woman.]]></description><link>https://newsletter.identosphere.net/p/identosphere-259-dec-14-19-2025-kim</link><guid isPermaLink="false">https://newsletter.identosphere.net/p/identosphere-259-dec-14-19-2025-kim</guid><dc:creator><![CDATA[IdentityWoman]]></dc:creator><pubDate>Mon, 05 Jan 2026 00:00:44 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!DbZb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4573246e-12a2-4d0b-b2b2-29e69470533b_682x385.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Upcoming</h2><ul><li><p>Call for Papers Open Now <a href="https://openidentity.eu/">Open Identity Summit </a>Deadline: January 31st, 2026</p></li></ul><blockquote><p>The summit takes place May 21&#8211;22, 2026 at University of Applied Sciences Dresden (HTW Dresden) in Dresden, Germany</p></blockquote><ul><li><p>Protocols for Publishers <a href="https://protocolsforpublishers.com/pfp-london-dates-and-early-speakers/">PfP&#10024; </a>London on Feb 4-5, 2026 to discuss how we can preserve an open, equitable web, where no one company holds the keys.</p></li><li><p><a href="https://connect.mosip.io/">MOSIP Connect</a>, Rabat Moroco, Feb 11-13. <em>Feb 13th is an unconference day facilitated by Kaliya. Reach out to me for an invite. </em></p></li><li><p>Join us at the<a href="https://www.1edtech.org/event/dc/summit/2026"> 1EdTech Digital Credentials Summit</a> in Philadelphia, February 18-20, 2026.</p></li><li><p><a href="https://didunconf.africa/">DIF Unconference Africa</a> (an IIW Regional Event) Feb 24-26, 2026 Cape Town</p></li><li><p><a href="https://internetidentityworkshop.com/">Internet Identity Workshop</a> #42, April 28-30, 2026, Mountain View California</p></li><li><p><a href="https://www.eventbrite.com/e/agentic-internet-workshop-2-tickets-1976356257769?aff=oddtdtcreator">Agentic Internet Workshop</a> #2, May 1, 2026, Mountain View California</p></li></ul><p>dice:  <a href="https://www.linkedin.com/feed/update/urn:li:activity:7407632798372495360/?actorCompanyId=93246186">Digital Identity unConfernece Europe</a>, June 22-24, Copenhagen,  Denmark </p><h3>Goodbye from Kim Duffy: <a href="https://blog.identity.foundation/dif-newsletter-56/">From the [DIF] Executive Director</a></h3><h3><a href="https://blog.spruceid.com/spruceid-at-the-sec-roundtable-advancing-privacy-first-digital-identity/">SpruceID at the SEC Roundtable: Advancing Privacy-First Digital Identity</a></h3><blockquote><p>This week, SpruceID Founder and CEO Wayne Chang participated in the U.S. Securities and Exchange Commission&#8217;s Roundtable on Financial Surveillance and Privacy, sharing perspectives on the role of digital identity in modern financial systems.</p></blockquote><h2>Europe</h2><h3>(Dyne) <a href="https://news.dyne.org/the-problems-of-european-digital-identity/">The Seven Sins of European Digital Identity (EUDI)</a></h3><blockquote><p>I want Europe to be excellent to all its citizens. We should develop our technological solutions following a human-centric approach grounded on principles of privacy, fairness, and inclusion. The motivation behind EUDI is that of achieving strategic autonomy for our public and social services, but its realization goes in the opposite direction, effectively putting in the hands of mobile OS manufacturers core interaction channels with the institutions governing our society. <strong>As it is today, EUDI has lost my trust, and it does not deserve yours either.</strong></p></blockquote><h3><a href="https://www.linkedin.com/posts/lissi_allez-the-french-eudi-wallet-activity-7405181273234808832-stMU/?utm_source=share&amp;utm_medium=member_ios&amp;rcm=ACoAAAAAZUMBU8SalbYc2xiqRyIGnrd7yxmrY8A">Allez! The French &#127467;&#127479; &#129734;&#128242; EUDI Wallet Sandbox is open for testing:</a></h3><blockquote><p>Get started here:</p><p>Documentation:<a href="https://lnkd.in/dCA_anzB"> https://lnkd.in/dCA_anzB</a></p><p>Access Form:<a href="https://lnkd.in/dPg5eu5i"> https://lnkd.in/dPg5eu5i</a></p></blockquote><h3>New Version of EU <a href="https://eudi.dev/2.7.3/architecture-and-reference-framework-main/">Architecture and Reference Framework 2.7.3</a></h3><h3>The &#128210;&#8221;Yellow Pages&#8221; of the &#127466;&#127482; &#128242; EUDI Wallet ecosystem are live. <a href="https://eidas.ec.europa.eu/efda/wallet">eIDAS Dashboard</a></h3><h3>(Webinar) <a href="https://www.youtube.com/watch?v=dHg-qCETzjw">Advanced features of European Digital Credentials for Learning (EDC)</a></h3><h3><a href="https://diacc.ca/2025/12/12/statement-on-canada-eu-digital-credentials-and-trust-services-mou-international-alignment-benefits-from-domestic-coordination/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=statement-on-canada-eu-digital-credentials-and-trust-services-mou-international-alignment-benefits-from-domestic-coordination">Statement on Canada-EU Digital Credentials and Trust Services MOU: International Alignment Benefits From Domestic Coordination</a></h3><blockquote><p>DIACC welcomes Canada and the European Union&#8217;s commitment to collaborate on digital credentials and trust services, formalized through the December 8 memorandum of understanding. International alignment matters deeply&#8212;for Canadian economic competitiveness, for secure cross-border transactions, and for ensuring our citizens can participate fully in the global digital economy.</p></blockquote><h3><a href="https://www.dock.io/post/eudi-in-practice-inside-germanys-digital-identity-strategy-video-and-takeaways">EUDI in Practice: Inside Germany&#8217;s Digital Identity Strategy [Video and Takeaways]</a></h3><blockquote><p>In a recent webinar, we spoke with Mirko Mollik, Identity Architect at SPRIND (Germany&#8217;s Federal Agency for Breakthrough Innovation), to unpack how Germany is approaching the rollout of the EUDI ecosystem. The conversation went beyond high-level regulation and focused on the realities of implementation: how wallets will be certified, how issuers and verifiers will onboard, how privacy is enforced in practice, and which standards are truly mandatory.</p></blockquote><h3><a href="https://www.dock.io/post/business-wallets-and-organizational-identity-what-the-ewc-pilots-revealed">Business Wallets and Organizational Identity: What the EWC Pilots Revealed</a></h3><blockquote><p>Unlike personal wallets, business wallets introduce a different set of requirements, structures, and challenges. The EWC pilots provided early insight into how these could function in real operational environments.</p></blockquote><h3><a href="https://www.eubusinessnews.com/digital-onboarding-and-identity-in-europe-the-next-frontier-for-financial-services/">Digital Onboarding and Identity in Europe: The Next Frontier for Financial Services</a></h3><blockquote><p>Current LLM-based AI agents cannot establish differentiated trust when initiating cross-organizational dialogues, so this article presents a prototype using W3C DIDs and Verifiable Credentials to enable agent authentication and trust establishment, though LLM-controlled security procedures show limitations.</p></blockquote><h3>(European Data Protection Supervisor) [Tech Dispatch] <a href="https://www.edps.europa.eu/data-protection/our-work/publications/techdispatch/2025-12-15-techdispatch-32025-digital-identity-wallets_de"> The path towards a data protection by design and by default approach</a></h3><blockquote><p>The purpose of this TechDispatch is to introduce the concept of a DIW, understand the privacy risks that exist when using a DIW, and discuss relevant data protection by design and by default requirements and their implementation, including relevant technologies. Eventually, we assess how the European Digital Identity Wallet (EUDIW), mandated by the eIDAS 2 Regulation, fits within the framework outlined.</p></blockquote><h3><a href="http://biometricupdate.com/202512/germanys-eid-cards-issued-without-adequate-identity-verification">Germany&#8217;s eID cards issued without adequate identity verification</a></h3><p>Gap in biometric IDV, doc verification enables fraudsters opening fake bank accounts</p><h2>Thoughtful</h2><h3>(<a href="https://www.linkedin.com/in/bo-harald-4768b51/">Bo Harald</a>) <a href="https://www.finextra.com/blogposting/30487/how-will-ai-change-standardisation-work">How will AI change standardisation work?</a></h3><blockquote><p>- Semantic layers become the anchor</p><p>- Envelopes (JWT, SD-JWT, mdoc, COSE) become interchangeable wrappers</p><p><strong>Exactly the direction you&#8217;ve been arguing for in EUDI / EBW / WeBuild:<br>VCDM + controlled vocabularies first, envelopes second.</strong></p><p><strong>Trust standards become non-negotiable</strong></p><p>AI cannot function safely without: verifiable identity,  authority, provenance, evocation.</p><p>This makes trust infrastructure standards foundational: wallets,  verifiable credentials,  registries, governance rulebooks.</p><p>AI forces standardisation to confront lawfulness, accountability, and responsibility head-on.</p></blockquote><h3>(John Philips) <a href="https://www.linkedin.com/posts/11dot2_digitaltrust-activity-7404308529894969345-Lq4L/?utm_source=share&amp;utm_medium=member_ios&amp;rcm=ACoAAAAAZUMBU8SalbYc2xiqRyIGnrd7yxmrY8A">Apple Citizens?</a></h3><blockquote><p>&#8220;Apple don&#8217;t just want you as their customer, they want you as their citizen&#8221; - that was the conclusion that I reached (and voiced) at the<a href="https://www.linkedin.com/company/ibm/"> IBM</a> TechXChange workshop session yesterday in Melbourne.</p></blockquote><h3>(<a href="https://medium.com/@alan_90529?source=post_page---byline--ab9d85271ad5---------------------------------------">Alan Mitchell</a>) <a href="https://medium.com/mydex/why-the-words-we-use-matter-ab9d85271ad5">Why the words we use matter</a></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!DbZb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4573246e-12a2-4d0b-b2b2-29e69470533b_682x385.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!DbZb!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4573246e-12a2-4d0b-b2b2-29e69470533b_682x385.png 424w, https://substackcdn.com/image/fetch/$s_!DbZb!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4573246e-12a2-4d0b-b2b2-29e69470533b_682x385.png 848w, https://substackcdn.com/image/fetch/$s_!DbZb!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4573246e-12a2-4d0b-b2b2-29e69470533b_682x385.png 1272w, https://substackcdn.com/image/fetch/$s_!DbZb!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4573246e-12a2-4d0b-b2b2-29e69470533b_682x385.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!DbZb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4573246e-12a2-4d0b-b2b2-29e69470533b_682x385.png" width="682" height="385" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4573246e-12a2-4d0b-b2b2-29e69470533b_682x385.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:385,&quot;width&quot;:682,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!DbZb!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4573246e-12a2-4d0b-b2b2-29e69470533b_682x385.png 424w, https://substackcdn.com/image/fetch/$s_!DbZb!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4573246e-12a2-4d0b-b2b2-29e69470533b_682x385.png 848w, https://substackcdn.com/image/fetch/$s_!DbZb!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4573246e-12a2-4d0b-b2b2-29e69470533b_682x385.png 1272w, https://substackcdn.com/image/fetch/$s_!DbZb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4573246e-12a2-4d0b-b2b2-29e69470533b_682x385.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><a href="https://sphericalcowconsulting.com/2025/12/16/two-apis-walk-into-a-browser/">Two APIs Walk Into a Browser: FedCM vs. the DC API</a></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8RJz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0615f70-e4e4-49bb-9042-4a90551c8cb6_1464x924.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8RJz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0615f70-e4e4-49bb-9042-4a90551c8cb6_1464x924.png 424w, https://substackcdn.com/image/fetch/$s_!8RJz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0615f70-e4e4-49bb-9042-4a90551c8cb6_1464x924.png 848w, https://substackcdn.com/image/fetch/$s_!8RJz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0615f70-e4e4-49bb-9042-4a90551c8cb6_1464x924.png 1272w, https://substackcdn.com/image/fetch/$s_!8RJz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0615f70-e4e4-49bb-9042-4a90551c8cb6_1464x924.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8RJz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0615f70-e4e4-49bb-9042-4a90551c8cb6_1464x924.png" width="1456" height="919" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e0615f70-e4e4-49bb-9042-4a90551c8cb6_1464x924.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:919,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!8RJz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0615f70-e4e4-49bb-9042-4a90551c8cb6_1464x924.png 424w, https://substackcdn.com/image/fetch/$s_!8RJz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0615f70-e4e4-49bb-9042-4a90551c8cb6_1464x924.png 848w, https://substackcdn.com/image/fetch/$s_!8RJz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0615f70-e4e4-49bb-9042-4a90551c8cb6_1464x924.png 1272w, https://substackcdn.com/image/fetch/$s_!8RJz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0615f70-e4e4-49bb-9042-4a90551c8cb6_1464x924.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>AI and Identity</h2><h3><a href="https://www.pingidentity.com/en/resources/blog/post/human-in-the-loop-ai.html">Human-in-the-Loop AI and Identity: Putting People at the Center of Machine-Driven Decisions</a></h3><blockquote><p>For <a href="https://www.pingidentity.com/en/resources/identity-fundamentals/identity-and-access-management.html">identity and access management</a> (IAM), HITL helps answer a growing question: How do we use AI to make smarter decisions without giving up control? The answer lies in balancing automation with human judgment, and identity is the anchor that makes that possible.</p></blockquote><h3><a href="https://www.isaca.org/resources/news-and-trends/industry-news/2025/the-looming-authorization-crisis-why-traditional-iam-fails-agentic-ai">The Looming Authorization Crisis: Why Traditional IAM Fails Agentic AI</a></h3><blockquote><p>Where Current IAM Falls Short</p><p>Promising IAM Frameworks for Agentic AI</p><p>The stakes are high. Without a comprehensive plan for managing these agents&#8212;one that tracks who they are, what they can access, and when their permissions expire&#8212;organizations risk disaster through complexity and compromise. Identity remains the foundation of enterprise security, and its scope must expand quickly to shield the autonomous revolution.</p></blockquote><h3><a href="https://securitybrief.co.uk/story/digital-wallets-ai-threats-to-reshape-id-security">Digital wallets &amp; AI threats to reshape ID security</a></h3><blockquote><p>&#8220;The strategic takeaway for CISOs is clear: identity is no longer a directory entry; it is a dynamic security signal. Cyber resilience in 2026 hinges on building an &#8216;Identity-Runtime Mesh&#8217; - uniting identity, zero trust, and real-time workload security to ensure accountability and control at speed.&#8221;</p></blockquote><h3>(Research) <a href="https://arxiv.org/pdf/2508.03095">Evolution of AI Agent Registry Solutions: Centralized, Enterprise, and Distributed Approaches</a></h3><blockquote><p>Abstract&#8212;Autonomous AI agents now operate across cloud, enterprise, and decentralized domains, creating demand for registry infrastructures that enable trustworthy discovery, capability negotiation, and identity assurance. We analyze five prominent approaches: (1) MCP Registry (centralized publication of mcp.json descriptors), (2) A2A Agent Cards (decentralized self-describing JSON capability manifests), (3) AGNTCY Agent Directory Service (IPFS Kademlia DHT content routing extended for semantic taxonomy&#8211;based content discovery, OCI artifact storage, and Sigstore-backed integrity), (4) Microsoft Entra Agent ID (enterprise SaaS directory with policy and zero-trust integration), and (5) NANDA Index AgentFacts (cryptographically verifiable, privacy-preserving fact model with credentialed assertions). Using four evaluation dimensions&#8212;security, authentication, scalability, and maintainability&#8212;we surface architectural trade-offs between centralized control, enterprise governance, and distributed resilience. We conclude with design recommendations for an emerging Internet of AI Agents requiring verifiable identity, adaptive discovery flows, and interoperable capability semantics.</p></blockquote><h2>Year End Refelections + Year Ahead</h2><h3><a href="https://diacc.ca/2025/12/11/the-diacc-2025-annual-report/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=the-diacc-2025-annual-report">The DIACC 2025 Annual Report</a></h3><blockquote><p>AI-generated fraud and misinformation threaten economic stability. DIACC&#8217;s work has never been more critical. Our new <a href="https://diacc.ca/dashboard/">Canadian Digital Trust Adoption Dashboard</a> provides unprecedented transparency into provincial programs. Our partnership with the <a href="https://diacc.ca/2025/10/28/diacc-and-siros-foundation-partnership/">SIROS Foundation</a> positions Canada to leverage credentials for cross-border labour mobility.</p></blockquote><h3><a href="https://liminal.co/articles/2025-reflections-a-year-of-acceleration/">2025 Reflections: Lessons from a Year of Acceleration</a></h3><blockquote><p>1. Fraud became more personal, adaptive, and believable</p><p>2. First-party fraud moved into the center of the P&amp;L conversation</p><p>3. AI governance and data access control became operational necessities</p><p>4. KYC, AML, and financial crime teams made progress while facing higher stakes</p><p>5. Capital returned with clearer priorities and a higher bar</p><p>6: Age assurance moves from debate to implementation</p></blockquote><h3><a href="https://indicio.tech/blog/juniper-research-names-indicio-as-a-disruptor-and-challenger-in-2025-digital-identity-leaderboard/">Juniper Research names Indicio as a &#8220;Disruptor and Challenger&#8221; in 2025 Digital Identity Leaderboard</a></h3><blockquote><p>As digital identity threats evolve, independent market analysis shows Verifiable Credentials is the most powerful way to defend against AI deepfakes, synthetic IDs, and document fraud. Indicio&#8217;s inclusion in the report points to the strength of its market-leading decentralized identity solution, Indicio Proven&#174;, and the pace of customer deployment.</p></blockquote><h3><a href="https://www.lfdecentralizedtrust.org/blog/2025-community-awards-recognizing-contributions-from-across-the-lf-decentralized-trust-community">2025 Community Awards: Recognizing Contributions from Across the LF Decentralized Trust Community</a></h3><h3><a href="https://www.namirial.com/en/blog/inspiration/namirial-predictions-2026/">It&#8217;s that time of the year&#8230; Namirial predictions for 2026!</a></h3><h2>Research</h2><h3>[Research] <a href="https://www.researchgate.net/publication/398849500_Comparative_Analysis_of_Traditional_vs_Decentralized_Identity_Management_Security_Implications_for_Enterprise_Networks">Comparative Analysis of Traditional vs. Decentralized Identity Management: Security Implications for Enterprise Networks</a></h3><blockquote><p>This research compares centralized and decentralized identity management systems, finding that DIM frameworks using blockchain and DIDs offer superior security, privacy, and resilience against identity theft and unauthorized access, though they require careful enterprise integration.</p></blockquote><h3>[Research] <a href="https://arxiv.org/pdf/2512.17538">Binding Agent ID: Unleashing the Power of AI Agents with accountability and credibility</a></h3><blockquote><p>BAID (Binding Agent ID) proposes a comprehensive identity infrastructure using biometric authentication, blockchain-based identity management, and zkVM-based code authentication to create verifiable, traceable accountability for autonomous AI agents by cryptographically linking operators to their agents&#8217; code and execution.</p></blockquote><h3>[Research] <a href="https://arxiv.org/html/2511.02841v2">AI Agents with Decentralized Identifiers and Verifiable Credentials</a></h3><blockquote><p>This article proposes equipping AI agents with self-sovereign digital identities using W3C Decentralized Identifiers (DIDs) and Verifiable Credentials (VCs) to enable autonomous, cross-domain trust establishment at the start of agent-to-agent dialogues, though evaluation reveals limitations when LLMs solely control security procedures.</p></blockquote><h2>News</h2><h3>Digital Identity New Zealand <a href="https://digitalidentity.nz/2025/12/19/meri-kirihimete-me-te-tau-hou-hari/">Meri Kirihimete me te Tau Hou Hari</a></h3><h3>[LFDT] <a href="https://www.lfdecentralizedtrust.org/blog/building-the-foundations-for-a-decentralized-world-a-decade-of-community-code-and-market-development-at-the-linux-foundation">Building the foundations for a decentralized world: A decade of community, code, and market development at the Linux Foundation</a></h3><blockquote><p>Ten years ago today, the Linux Foundation launched its first blockchain-related project, the Hyperledger Project, a collaborative effort to &#8220;<a href="https://www.linuxfoundation.org/press/press-release/linux-foundation-unites-industry-leaders-to-advance-blockchain-technology?utm_source=chatgpt.com&amp;__hstc=120149271.9db71dace6adbda6fdf056fb8c885c18.1761783050214.1765668574529.1766518431768.11&amp;__hssc=120149271.4.1766518431768&amp;__hsfp=3991146425">advance popular blockchain technology</a>.&#8221; At the time, blockchain was largely viewed in the enterprise as an experimental technology. It was  promising in theory, but unproven at scale, raising questions about security, performance, governance, and regulatory fit. It was often also conflated with cryptocurrency, which many institutions associated with volatility, regulatory uncertainty, and speculative use cases.</p></blockquote><h3><a href="https://openid.net/openid-for-verifiable-credential-self-certification-to-launch-feb-2026/">OpenID for Verifiable Credential self-certification to launch Feb 2026</a></h3><blockquote><p>The OpenID Foundation is pleased to announce implementers will be able to start self-certifying their implementations in February 26th 2026 for <a href="https://openid.net/specs/openid-4-verifiable-presentations-1_0.html">OpenID for Verifiable Presentations (OpenID4VP) 1.0</a>, <a href="https://openid.net/specs/openid-4-verifiable-credential-issuance-1_0.html">OpenID for Verifiable Credential Issuance (OpenID4VCI) 1.0</a> and <a href="https://openid.net/specs/openid4vc-high-assurance-interoperability-profile-1_0.html">High Assurance Interoperability Profile (HAIP) 1.0</a> implementations through <a href="https://openid.net/how-to-certify-your-implementation/">the OpenID Foundation&#8217;s conformance testing platform</a>.</p></blockquote><h3><a href="https://www.ibm.com/docs/en/viadc/25.12.0">IBM Verify Identity Access Digital Credentials</a> &lt;- company site</h3><h3><a href="https://credentialengine.org/2025/12/15/connecting-learning-and-work-worldwide-2025-ctdl-recap/">Connecting Learning and Work Worldwide: 2025 CTDL Recap</a></h3><blockquote><p>The opportunities provided by digital credentials make this work more essential than ever. In the United States alone, the <em><a href="https://credentialengine.org/all-resources/2025-counting-credentials/">Counting Credentials 2025</a></em> report identifies more than 1.85 million unique credentials, with an increasing share now digital. This reflects a global shift toward new forms of learning recognition. As digital credentials expand worldwide, the need for interoperable data becomes even more critical, reinforcing the benefits of CTDL.</p></blockquote><h3><a href="https://werd.io/why-rss-matters/">Why RSS matters</a></h3>]]></content:encoded></item><item><title><![CDATA[Identosphere 258 Dec 8-13 2025: LER Testimony • Hiring Standards Architect • Swiss eID early 2026 • EU-Canada ID alliance • TRQP Public Review • OIDF Community ]]></title><description><![CDATA[This is the weekly Identosphere Newsletter sharing highlights from around the web covering Decentralized and Self-Sovereign Identity curated by Kaliya Young, Identity Woman.]]></description><link>https://newsletter.identosphere.net/p/identosphere-258-dec-8-13-2025-ler</link><guid isPermaLink="false">https://newsletter.identosphere.net/p/identosphere-258-dec-8-13-2025-ler</guid><dc:creator><![CDATA[IdentityWoman]]></dc:creator><pubDate>Tue, 23 Dec 2025 23:07:32 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!UaPI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0e7854d-aadc-420e-b426-af605a11a5be_600x448.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>I turned on paid subscriptions on in Substack. The newsletter will continue to come out each week for all subscribers. Contributions are also possible on <a href="https://www.patreon.com/identosphere">Patreon</a> or <a href="https://identitywoman.net/identosphere/">Paypal</a>.</em></p><p><em>You may have some money left over in your budget you could contribute to the newsletter - <strong>I accept end of year lump sum contributions too.</strong> If you would like to do this send information to kaliya@identitywoman.net.</em></p><h2>Upcoming: </h2><ul><li><p>Call for Papers Open Now <a href="https://openidentity.eu/">Open Identity Summit </a>Deadline: January 31st, 2026</p></li></ul><blockquote><p>The summit takes place May 21&#8211;22, 2026 at University of Applied Sciences Dresden (HTW Dresden) in Dresden, Germany</p></blockquote><ul><li><p>Join us at the<a href="https://www.1edtech.org/event/dc/summit/2026"> 1EdTech Digital Credentials Summit</a> in Philadelphia, February 18-20, 2026.</p></li><li><p><a href="https://didunconf.africa/">DIF Unconference Africa</a> (an IIW Regional Event) Feb 24-26, 2026 Cape Town</p></li><li><p><a href="https://internetidentityworkshop.com/">Internet Identity Workshop</a> #42, April 28-30, 2026, Mountain View California</p></li><li><p><a href="https://www.eventbrite.com/e/agentic-internet-workshop-2-tickets-1976356257769?aff=oddtdtcreator">Agentic Internet Workshop</a> #2, May 1, 2026, Mountain View California </p></li></ul><h2>Hiring:</h2><h3><a href="https://job-boards.greenhouse.io/affinidi/jobs/7560902003">Affindi: Standards Architect</a></h3><blockquote><p>20 other positions - <a href="https://www.affinidi.com/careers">https://www.affinidi.com/careers</a></p></blockquote><h3><a href="https://edworkforce.house.gov/uploadedfiles/kaplan_testimony_final.pdf">Written Testimony on Learning and Employment Records: </a></h3><blockquote><p>Hearing on Building a Talent Marketplace: How LERs Empower Workers and Expand Opportunity US House of Representatives Subcommittee on Higher Education and Workforce Development Presented by Alex Kaplan December 10, 2025</p><p>The choice before us is clear: we can build a verified credential infrastructure that enables AI to expand opportunity for millions of Americans, or we can allow AI to perpetuate the inefficiencies of our current talent ecosystem.</p></blockquote><h3><a href="https://humancolossus.foundation/blog/n3gsylv3aor40vhkpjjdr7yzv8zllm-xyngw-p5mpg-2stzm-a3kmw">Switzerland: E-ID set to go live in early 2026</a></h3><blockquote><p>On December 6, 2024, the Swiss Federal Council made decisions regarding the technical implementation of the Confederation&#8217;s new electronic identity proof (e-ID) and the underlying operational infrastructure.<a href="https://www.admin.ch/gov/en/start/documentation/media-releases.msg-id-102922.html"> A press release [1]</a> describes a two-stage </p></blockquote><h3>(Dave Birch) <a href="https://www.linkedin.com/posts/dgwbirch_digital-identity-lesson-for-the-day-no-94-activity-7405294265343561728-DumJ/">Digital Identity Lesson for the Day no. 94</a></h3><blockquote><p> &#119830;&#119841;&#119838;&#119847; &#8220;&#119837;&#119842;&#119840;&#119842;&#119853;&#119834;&#119845; &#119816;&#119811;&#8221; &#119842;&#119852; &#119843;&#119854;&#119852;&#119853; &#119834; &#119849;&#119851;&#119838;&#119853;&#119853;&#119858; &#119849;&#119842;&#119836;&#119853;&#119854;&#119851;&#119838;, &#119853;&#119841;&#119842;&#119852; &#119842;&#119852; &#119856;&#119841;&#119834;&#119853; &#119841;&#119834;&#119849;&#119849;&#119838;&#119847;&#119852;. Denver man was just charged with spoofing Colorado&#8217;s digital ID app to forge driver&#8217;s licenses and open lines of credit. Story here:<a href="https://lnkd.in/e5TecUCe"> https://lnkd.in/e5TecUCe</a></p></blockquote><h3><a href="https://mobileidworld.com/eu-and-canada-map-out-interoperable-digital-id-wallets/">EU and Canada Map Out Interoperable Digital ID Wallets</a></h3><blockquote><p>The European Union and Canada are turning their digital partnership into concrete work on interoperable digital identity wallets, using a new Memorandum of Understanding on digital credentials and trust services to frame cross-border pilots and standards alignment. The first meeting of the Canada-EU Digital Partnership Council took place in Montreal on December 8, co-chaired by Canada&#8217;s Minister of Artificial Intelligence and Digital Innovation Evan Solomon and European Commission Executive Vice-President Henna Virkkunen.</p></blockquote><h2>Standards</h2><h3><a href="https://www.lfdecentralizedtrust.org/blog/toip-announces-public-review-02-of-the-trust-registry-query-protocol-trqp-specification-v2.0">ToIP Announces Public Review 02 of the Trust Registry Query Protocol (TRQP) Specification V2.0</a></h3><blockquote><p>The Trust Registry Query Protocol (TRQP) is a lightweight, read-only protocol for making fast, efficient queries for authoritative data from trust registries. It is often described as &#8220;DNS for trust.&#8221; Just as DNS name servers serve name domains, TRQP trust registries serve trust domains (also known as <a href="https://glossary.trustoverip.org/?__hstc=120149271.9db71dace6adbda6fdf056fb8c885c18.1761783050214.1765668574529.1766518431768.11&amp;__hssc=120149271.7.1766518431768&amp;__hsfp=3991146425#term:digital-trust-ecosystem">digital trust ecosystems</a>).</p></blockquote><h3><a href="https://projectvrm.org/2025/12/08/a-myterms-summary/">A MyTerms Summary</a></h3><blockquote><p>The MyTerms standard also says that both sides will use machine agents to make agreements. These can be as simple as browser plug-ins on the individual side and server plug-ins on the corporate side. They can also be AI agents, which is why it is opportune for the standard to be published in an age when AI is still a new and rapidly evolving&#8212;for both companies and individuals.</p></blockquote><h3><a href="https://openid.net/announcing-the-2026-openid-foundation-community-representatives-election/">Announcing the 2026 OpenID Foundation Community Representatives Election</a></h3><blockquote><p>- Nominations open:  Monday, December 8, 2025</p><p>- Nominations close:  Friday, December 26, 2025</p><p>- Election begins:  Monday, December 29, 2025</p></blockquote><h3>[Report] <a href="https://www.bis.org/innovation_hub/2025_g20_techpsprint.pdf">G20 TechSprint 2025: Trust and integrity in scalable and open finance</a></h3><blockquote><p>Digital identity solutions for secure and trusted finance</p><p>G20 TechSprint 2025: Innovative approaches from shortlisted finalists</p><p><strong>Meeco</strong> - By providing portable, verifiable and privacy-preserving credentials, the platform builds</p><p>trust and unlocks a wide range of identity use cases for individuals and businesses.</p><p><strong>Walt.id</strong> - Walt.id delivers an open source decentralised identity and wallet infrastructure that extends interoperability across payment systems. </p></blockquote><h3><a href="https://sphericalcowconsulting.com/2025/12/09/starting-in-identity/">What I Wish I Knew When I Started in Identity</a></h3><blockquote><p>The most common thing I hear from people in their first six months is some variant of: &#8220;I didn&#8217;t realize how big this was.&#8221;</p><p>And because it&#8217;s big, it&#8217;s also intimidating. The learning curve feels like a hill that grows steeper as you climb it. Newcomers oscillate between excitement&#8212;because identity really is fascinating&#8212;and frustration, because every answer seems to introduce a new question.</p></blockquote><h3><a href="https://www.dock.io/post/dock-labs-year-in-review-2025">Dock Labs Year in Review 2025: Digital ID&#8217;s Breakout Year</a></h3><blockquote><p>This yearly review reflects on how the market evolved, how our strategy aligned with these shifts, and what it reveals about where digital identity is heading next. On the way, we&#8217;ll discuss the move toward reusable digital identity, the growing demand for stronger authentication, the emergence of <a href="https://www.dock.io/post/ai-agent-identity">AI agent identity</a>, and the rise of reusable organizational identity.</p></blockquote><h3><a href="https://humancolossus.foundation/blog/congrats-to-our-team-">ArgonAuths x Human Colossus: Finalists at HackNation 2025 &#8212; Redefining Trust in the Digital Public Sphere</a></h3><blockquote><p>We are thrilled to share that Team &#8220;Sigmion&#8221; - joint forces of Argonauths and Human Colossus &#8211; has been selected as one of the three finalists in the Prawda w Sieci (&#8220;Truth on the Web&#8221;) challenge, held under the patronage of Centralny O&#347;rodek Informatyki (<a href="https://coi.gov.pl/">COI</a>), the institution behind Poland&#8217;s digital-services and identity initiative<a href="https://www.gov.pl/web/mobywatel"> mObywatel</a>.</p></blockquote><h3>(Indicio)<a href="https://indicio.tech/blog/game-over-traditional-identity-authentication-game-on-verifiable-credentials/">  Game over, traditional identity authentication &#8212; game on, Verifiable Credentials</a></h3><blockquote><p>The result is the growth of &#8220;Fraud-as-a-Service (FaaS), a global market where identity forgery, credential spoofing, and document manipulation are packaged and sold on demand.&#8221;</p><p>Stop doing identity authentication the same way and shift to decentralized identity and Verifiable Credentials for identity and document authentication. </p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UaPI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0e7854d-aadc-420e-b426-af605a11a5be_600x448.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UaPI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0e7854d-aadc-420e-b426-af605a11a5be_600x448.png 424w, https://substackcdn.com/image/fetch/$s_!UaPI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0e7854d-aadc-420e-b426-af605a11a5be_600x448.png 848w, https://substackcdn.com/image/fetch/$s_!UaPI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0e7854d-aadc-420e-b426-af605a11a5be_600x448.png 1272w, https://substackcdn.com/image/fetch/$s_!UaPI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0e7854d-aadc-420e-b426-af605a11a5be_600x448.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UaPI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0e7854d-aadc-420e-b426-af605a11a5be_600x448.png" width="600" height="448" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d0e7854d-aadc-420e-b426-af605a11a5be_600x448.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:448,&quot;width&quot;:600,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!UaPI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0e7854d-aadc-420e-b426-af605a11a5be_600x448.png 424w, https://substackcdn.com/image/fetch/$s_!UaPI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0e7854d-aadc-420e-b426-af605a11a5be_600x448.png 848w, https://substackcdn.com/image/fetch/$s_!UaPI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0e7854d-aadc-420e-b426-af605a11a5be_600x448.png 1272w, https://substackcdn.com/image/fetch/$s_!UaPI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0e7854d-aadc-420e-b426-af605a11a5be_600x448.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>(SpruceID) <a href="https://blog.spruceid.com/how-strong-ux-turns-digital-id-into-strong-security/">How Strong UX Turns Digital ID Into Strong Security</a></h3><blockquote><p>Usability is a security requirement. And for those building the next generation of digital identity, recognizing that truth changes how we plan, deploy, and measure success. Read on to learn how treating usability as a core security principle strengthens adoption, accessibility, and trust in digital identity systems.</p></blockquote><h3>(EDRi) <a href="https://edri.org/our-work/rushed-eu-eid-wallet-risks-privacy-and-security-calls-for-safeguards-are-getting-ignored-in-hasty-eidas-implementation/?utm_source=chatgpt.com">Rushed EU eID Wallet risks privacy and security: Calls for safeguards are getting ignored in hasty eIDAS implementation</a></h3><blockquote><p>From a visit to the doctor to public transport tickets , the European eID will handle our most sensitive personal data in a wide range of every-day applications. Yet, speed seems more important to the European Commission than a properly functioning eID system that is safe &amp; secure to use.</p></blockquote><h3><a href="https://blooloop.com/worldmodel-thinking-destinations/">When destinations start thinking: how the WorldModel becomes the next big category in themed entertainment</a></h3><blockquote><p>Imagine arriving at a destination that understands you. Not because it tracks you or because an app predicted your behaviour, but because the place itself behaves with awareness.</p><p>It is the reason mega-projects in the Middle East, Asia, Europe, and the United States are now explicitly asking for one thing: a venue-wide, multi-venue, multi-campus intelligence layer that makes the environment coherent.</p></blockquote><h3>SAP <a href="https://www.sap.com/germany/products/technology-platform/decentralized-identity-verification.html#plans-and-pricing">Self-Sovereign Identity Product Page</a></h3><h3><a href="https://www.biometricupdate.com/202512/smart-ring-maker-oura-looks-to-ride-recent-investments-into-digital-identity-market">Smart ring maker Oura looks to ride recent investments into digital identity market</a></h3><blockquote><p>In 2023, <a href="https://www.biometricupdate.com/202305/oura-acquires-proxy-bringing-digital-id-applications-to-biometric-smart-ring">Oura acquired Proxy</a>, a U.S. identity tech startup that had <a href="https://www.biometricupdate.com/202004/proxy-to-base-digital-id-signals-on-continuous-biometrics-from-wearables-with-motiv-acquisition">previously absorbed</a> smart ring startup <a href="https://www.biometricupdate.com/201810/motiv-adds-2fa-and-biometric-identification-features-to-its-smart-ring-wearable">Motiv</a>, signaling an interest in authentication use cases for the Oura ring.</p></blockquote><h3>[Podcast] <a href="https://www.cryptoaltruists.com/blog/episode-203-privado-id-building-trust-between-humans-and-ai-agents-with-blockchain-powered-decentralized-identity">Crypto Altruists Episode 203 - Privado ID - Building Trust Between Humans and AI Agents with Blockchain-Powered Decentralized Identity</a></h3><blockquote><p>In this episode, Evin shares powerful insights from her vast experience about why decentralized identity matters deeply, how blockchain-driven privacy solutions are essential for safeguarding our digital lives, how Web3 can empower the one billion people who lack proof of identity, and why Privado&#8217;s Billions Network and Quadratic Accelerator are game changers&#8212;not just for Web3, but for the responsible evolution of AI as well.</p></blockquote><h3>[article] (Biometric Update) <a href="https://www.biometricupdate.com/202512/turing-institute-introduces-digital-id-safety-pack-to-protect-against-common-threats">Turing Institute introduces Digital ID Safety Pack to protect against common threats</a></h3><blockquote><p>The Alan Turing Institute&#8217;s <a href="https://www.turing.ac.uk/TDI/Cyobs">Cyber Threat Observatory</a> hosted an information-rich webinar on Trustworthy Digital Infrastructure for Identity Systems. Over the three-hour webinar insights on face morphing, fraud, digital identity in Sri Lanka and Ethiopia, threat reporting, and much more, were delivered.</p></blockquote><h3>[report] <a href="https://www.turing.ac.uk/sites/default/files/2025-12/generative_ai_and_the_rise_of_credential_fraud_in_digital_public_infrastructure_final_1512.pdf">Cyber Threat Observatory for National Identity Systems Quarterly Report: Generative AI and the Rise of Credential Fraud in Digital Public Infrastructure November 2025</a></h3><blockquote><p>This report provides a comprehensive and strategic analysis of the escalating threats posed by synthetic identities and deepfake-enabled credential fraud within Digital Public Infrastructure (DPI). As DPI systems, particularly digital identity platforms, become foundational to public service delivery, their risk exposure also increases. </p></blockquote><h3>[Research] <a href="https://www.sciencedirect.com/science/article/pii/S0167404825003967">Privacy evaluation of the European Digital Identity Wallet&#8217;s Architecture and Reference Framework</a></h3><blockquote><p>The paper conducts a comprehensive privacy analysis of the European Digital Identity Wallet (EUDIW) across three key use cases, identifying multiple privacy risks including linkability, identifiability, and excessive data disclosure that stem from inherent design choices like SD-JWT/mDOC formats and Wallet Unit Attestations. The authors demonstrate how advanced Privacy-Enhancing Technologies, particularly Zero-Knowledge Proofs, could mitigate these privacy risks while maintaining the high assurance levels required for regulated identity use cases.</p></blockquote><h3>[Research] <a href="https://ceur-ws.org/Vol-3737/paper41.pdf">How does the EU Digital Identity Wallet change the risk of over-sharing data? A Dutch perspective.</a></h3><blockquote><p>This paper analyzes the risk of over-sharing personal data through the EU Digital Identity Wallet based on expert interviews, identifying that users may share more data than strictly necessary due to factors including user capabilities, loss of context awareness, data quality issues, and the ease of sharing mechanisms. Despite the DIW&#8217;s goal of giving citizens control over personal data sharing, the research reveals that multiple aspects influence over-sharing risk and require deeper understanding to effectively protect user privacy in practice. launch of the e-ID, with the first delivery planned for 2026. </p></blockquote>]]></content:encoded></item><item><title><![CDATA[Identosphere 257: DEC 1-7: New DIF ED •Digitizing Vital Records • Trust Engineering Digital Death • The Computational Pressure on Personhood • Ethereum on Decentralized Identity]]></title><description><![CDATA[This is the weekly Identosphere Newsletter sharing highlights from around the web covering Decentralized and Self-Sovereign Identity curated by Kaliya Young, Identity Woman.]]></description><link>https://newsletter.identosphere.net/p/identosphere-257-dec-1-7-new-dif</link><guid isPermaLink="false">https://newsletter.identosphere.net/p/identosphere-257-dec-1-7-new-dif</guid><dc:creator><![CDATA[IdentityWoman]]></dc:creator><pubDate>Fri, 19 Dec 2025 15:47:37 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!OsYQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc78749e-d50c-4aa4-835d-6875b2a9ada1_1052x604.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3><a href="https://blog.identity.foundation/welcome-grace-rachmany/">Welcoming Grace Rachmany as DIF&#8217;s New Executive Director</a></h3><blockquote><p>Grace has been deeply involved in building communities around decentralized technology that prioritize individual rights and human agency. She brings a rare combination of governance expertise, practical execution, and a deep understanding of how people collaborate in decentralized environments. I&#8217;m especially excited about her commitment to global outreach.</p></blockquote><h3>Ethereum Publishes: <a href="https://ethereum.org/decentralized-identity/">Decentralized Identity</a></h3><h2>Digital Credentials</h2><h3>(SpruceID) <a href="https://blog.spruceid.com/highlights-from-naphsis-building-the-next-layer-of-digital-verification-for-vital-records/">Highlights from NAPHSIS: Building the Next Layer of Digital Verification for Vital Records</a></h3><blockquote><p>His presentation, <em>Identity, Privacy, and Trust: Building the Next Layer of Digital Verification</em>, outlined why verifiable digital credentials (VDCs) are rapidly becoming essential public infrastructure, and how states can implement them in a secure, privacy-preserving, and interoperable manner.</p></blockquote><h3>(SpruceID) <a href="https://blog.spruceid.com/how-does-multi-format-issuance-future-proof-digital-credentials/">How Does Multi-Format Issuance Future-Proof Digital Credentials?</a></h3><blockquote><p>As states modernize digital identity programs, one architectural decision stands above the rest: what credential format to issue. But here&#8217;s the reality, there&#8217;s no single format that works everywhere. Airport security, online age verification, healthcare check-ins, and cross-border transactions each rely on different ecosystems. Issuing in only one format means leaving residents stranded when they step outside that ecosystem.</p></blockquote><h3><a href="https://ec.europa.eu/digital-building-blocks/sites/spaces/EUDIGITALIDENTITYWALLET/pages/930453034/Launchpad+Testing">Testing is at the heart of EUDI Wallets Launchpad 2025</a></h3><blockquote><p>The EUDI Wallet Launchpad Testing track aims to bring together different actors involved in the development, testing, and roll-out of the European Digital Identity Wallet ecosystem. Participation is open to all Member States and associated stakeholders contributing to the EUDI framework implementation process, regardless of their current level of technical maturity.</p></blockquote><h2>Trust</h2><h3><a href="https://www.linkedin.com/pulse/trust-engineering-parthasarathi-v-snx0c/?trackingId=wOv8W0b1S2uJfHz6kmCagw%3D%3D">Trust Engineering</a></h3><blockquote><p>The second- and third-order consequences of AI are still a weak signal in most security and privacy conversations. System-1 thinking remains dominant: defense, fear, compliance checklists, guardrails, and higher walls. A faster-developing System-2 signal is now emerging: the privatization of trust and the discipline of Trust Engineering.</p></blockquote><h3>(Sankarshan) <strong><a href="https://thetrustgraph.substack.com/p/the-political-economy-of-trust-registries">The Political Economy of Trust Registries</a></strong></h3><blockquote><p>Digital trust stacks are often described as a set of modular components: identifiers, verifiable credentials, wallets, protocols, assurance frameworks. In that diagram, trust registries are usually drawn as a small box somewhere in the background, labelled &#8220;directory of issuers&#8221; or &#8220;list of authorities.&#8221; The visual rhetoric is deliberate, and it is misleading: it suggests that registries are supporting utilities rather than centres of power.</p></blockquote><h3>(Sankarshan) <a href="https://substack.com/app-link/post?publication_id=44428&amp;post_id=179902633&amp;utm_source=post-email-title&amp;utm_campaign=email-post-title&amp;isFreemail=true&amp;r=f9962&amp;token=eyJ1c2VyX2lkIjoyNTYyNjAyNiwicG9zdF9pZCI6MTc5OTAyNjMzLCJpYXQiOjE3NjUxNzczNDIsImV4cCI6MTc2Nzc2OTM0MiwiaXNzIjoicHViLTQ0NDI4Iiwic3ViIjoicG9zdC1yZWFjdGlvbiJ9.erORYEeZ7grGajJUdAnflI5IZpYZUegooCFYeIzwei8">The Computational Pressure on Personhood</a></h3><blockquote><p>The danger of being known without being understood lies not in the volume of data collected but in the assumptions embedded in its interpretation. Digital systems misread complexity as inconsistency, nuance as noise, and context as risk. They see too much and understand too little. This imbalance produces structural inequity because the system&#8217;s misunderstandings are expressed as rules, flags, or scores that determine real-world outcomes.</p></blockquote><h3><a href="https://substack.com/app-link/post?publication_id=241358&amp;post_id=180860212&amp;utm_source=post-email-title&amp;utm_campaign=email-post-title&amp;isFreemail=true&amp;r=3zfsq&amp;token=eyJ1c2VyX2lkIjo2NjkyMjgyLCJwb3N0X2lkIjoxODA4NjAyMTIsImlhdCI6MTc2NDk5NzgxOSwiZXhwIjoxNzY3NTg5ODE5LCJpc3MiOiJwdWItMjQxMzU4Iiwic3ViIjoicG9zdC1yZWFjdGlvbiJ9.UCxMlIoir-rW5QBjO3ofh19ltGJr_DtxJwGArtEf5es">Digital Trust Is Not Engineered &#8212; It Is Negotiated: Trust Lives in the Space Between Security, Privacy, and Safety</a></h3><blockquote><p>Trust is created not by choosing privacy, safety, or security alone, but by balancing them in everyday decisions &#8212; whether it&#8217;s journalists protecting sources while relying on oversight, parents setting boundaries without invading a child&#8217;s privacy, or banks preventing fraud without collecting excessive data. Trust emerges when no single value overwhelms the others.</p></blockquote><h2>AI and Identity</h2><h3><a href="https://thefocusgrouponline.substack.com/p/dick-hardt-on-mcp-security">Dick Hardt on MCP Security</a></h3><blockquote><p>This is the first installment of my conversation with Dick Hardt, covering his thoughts on agentic security and his work on <a href="https://github.com/dickhardt/agent-auth">Agent Auth (AAuth)</a>. We&#8217;ve edited the interview for readability and clarity.</p></blockquote><h3>(David Birch) <a href="https://www.linkedin.com/pulse/digital-public-infrastructure-agents-david-birch-ittke/">Digital Public Infrastructure and Agents</a></h3><p>We need to extend digital public infrastructure to AIs.</p><blockquote><p>I have to say I agree with him wholeheartedly about this, and also see his view that agents will soon conduct &#8220;most&#8221; economic transactions as far from hyperbolic. And I&#8217;m not the only one.<a href="https://www.linkedin.com/in/craigdewitt/"> Craig DeWitt</a>, from<a href="https://www.linkedin.com/company/tryskyfire/"> Skyfire</a> (who are building agent-agent infrastructure)<a href="https://www.finextra.com/newsarticle/45618/skyfire-payments-network-for-ai-agents-exits-beta?utm_medium=newsflash&amp;utm_source=2025-3-7&amp;member=36853"> makes a similar point</a>:</p><p>&#8220;AI has payment and identity requirements that are different from anything we&#8217;ve seen before&#8221;.</p><p>He goes on to talk about the paradigm shift here, meaning that we are looking at an entirely new approach to how agents will access and pay for services.</p></blockquote><h2>Death</h2><h3>(Interview w/ Dean Saxe) <a href="https://www.helpnetsecurity.com/2025/10/22/what-happens-to-your-online-accounts-after-death/">Life, death, and online identity: What happens to your online accounts after death?</a></h3><blockquote><p>This emerging area of asset management remains in its early stages, facing a complex technological landscape, fragmented (or nonexistent) legal frameworks, and significant systemic gaps.</p><p>To address these challenges, the OpenID Foundation (OIDF) has been developing a new whitepaper and a digital estate planning guide that examine this issue on a global scale.</p></blockquote><h3><a href="https://www.linkedin.com/posts/wayan_gdhf2025-activity-7403012211931250688-abFc/?utm_source=share&amp;utm_medium=member_ios&amp;rcm=ACoAAAAAZUMBU8SalbYc2xiqRyIGnrd7yxmrY8A">Kenya just sold 25 years of citizen health data for $20 per person.</a></h3><blockquote><p>Kenya signed a 25-year agreement giving the US unprecedented access to:</p><p>&#128073; Personal medical records</p><p>&#128073; Genetic information</p><p>&#128073; Lab samples</p><p>&#128073; Insurance details</p><p>&#128073; Digital health platforms</p></blockquote><p>The price? $1.6 billion over 5 years.</p><h3><a href="https://mydata.org/2025/12/03/eus-data-policy-overhaul-whats-missing-whats-next-and-four-big-ideas-that-matter/">EU&#8217;s data policy overhaul: what&#8217;s missing, what&#8217;s next, and four big ideas that matter</a></h3><blockquote><p>November 19 was a <a href="https://ec.europa.eu/commission/presscorner/detail/en/ip_25_2718">big day</a> for EU data policy. It saw the release of the <a href="https://digital-strategy.ec.europa.eu/en/library/data-union-strategy-unlocking-data-ai">European Data Union Strategy</a> (now reframed to pursue data for AI), the <a href="https://digital-strategy.ec.europa.eu/en/library/digital-omnibus-regulation-proposal">Digital Simplification Omnibus</a> (proposing simplifications and reforms across multiple acts and directives), and a <a href="https://ec.europa.eu/info/law/better-regulation/have-your-say/initiatives/15554-Digital-fitness-check-testing-the-cumulative-impact-of-the-EUs-digital-rules_en">Digital Fitness Check call for evidence</a> (to review how the entire body of regulation on digital &#8220;affects and supports the competitiveness objective of the EU&#8221;).</p></blockquote><h3>(LFDT/Indicio) [Case Study] <a href="https://www.lfdecentralizedtrust.org/blog/open-source-flywheel-how-indicio-built-credibility-growth-and-global-reach-through-leadership-in-the-lf-decentralized-trust-community">Open source flywheel: Indicio turns leadership in the LF Decentralized Trust community into credibility, growth, and global reach</a></h3><blockquote><p>The founding team chose to focus on community leadership rather than traditional marketing. Indicio built its flagship offering, Indicio Proven, directly on technologies openly developed by LF Decentralized Trust and, in some cases, now OpenWallet Foundation communities, including Aries Framework, ACA-Py, Credo, Hyperledger AnonCreds, Hyperledger Indy, and Trust Over IP.</p></blockquote><h3>(DIACC) <a href="https://diacc.ca/2025/12/04/from-trust-to-growth-the-business-case-for-digital-client-verification-in-open-banking-and-lending/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=from-trust-to-growth-the-business-case-for-digital-client-verification-in-open-banking-and-lending">From Trust to Growth: The Business Case for Digital Client Verification in Open Banking and Lending</a></h3><blockquote><p>The Digital ID and Authentication Council of Canada (DIACC) convened an industry workshop in Montreal focused on exploring the business case for digital trust in open banking and lending. The session brought together stakeholders from government, financial services, technology providers, and legal sectors to examine how digital client identity verification (IDV) can drive measurable value while mitigating fraud and enabling growth.</p></blockquote><h3>(OIDF) <a href="https://openid.net/public-review-period-for-proposed-openid-federation-1-final-specification/">Public Review Period for Proposed OpenID Federation 1.0 Final Specification</a></h3><blockquote><p>A Final Specification provides intellectual property protections to implementers of the specification and is not subject to further revision. This note starts the 60-day public review period for the specification draft in accordance with the OpenID Foundation IPR policies and procedures.</p></blockquote><h3><a href="https://fidoalliance.org/fido-alliance-launches-new-digital-credentials-initiative-to-accelerate-and-secure-an-interoperable-digital-identity-ecosystem/">FIDO Alliance Launches New Digital Credentials Initiative to Accelerate and Secure an Interoperable Digital Identity Ecosystem</a></h3><blockquote><p>The FIDO Alliance announced today the launch of a new <a href="https://fidoalliance.org/fido-alliance-digital-credentials/">digital credentials initiative</a>, marking an expansion of its mission to accelerate the adoption of verifiable digital credentials and identity wallets. This initiative is poised to help the world simplify and secure online and in-person interactions by establishing a trusted, and interoperable identity wallet ecosystem.</p></blockquote><h3>(Indicio) <a href="https://indicio.tech/blog/verifiable-credentials-strengthen-aml-compliance-kyc-for-digital-assets-and-finance/">Verifiable Credentials strengthen AML compliance, KYC for digital assets and finance</a></h3><p>To:U.S. Department of the Treasury.</p><p><a href="https://indicio.tech/wp-content/uploads/2025/11/2025-Indicio-Treasury-RFI-submission.pdf">Subject: Request for comment, Innovative Methods To Detect Illicit Activity Involving Digital Assets</a></p><h2>Thoughtful</h2><h3><a href="https://sphericalcowconsulting.com/2025/12/02/robots-humans-and-the-edges-of-the-open-web/">Robots, Humans, and the Edges of the Open Web</a></h3><blockquote><p>A week later, at the W3C TPAC meetings in Kobe, Japan, I ended up in an almost identical conversation, hosted again by Mark and David, fortunately a somewhat larger room. That discussion brought in new faces, new community norms, and a different governance culture, but in both discussions, we almost immediately fell to the question:</p></blockquote><h3><a href="https://www.linkedin.com/pulse/digital-identity-tokenization-burning-platform-parthasarathi-v-fg8oc/">Digital Identity, Tokenization, and the Burning Platform</a></h3><blockquote><p>Digital Identity in the context of Asset Tokenization provides the necessary trust fabric and helps in regulatory compliance for asset tokenization to unlock dormant capital. Tokenization is the process of issuing digital representations of assets on a programmable ledger. A game changer because of the below:</p></blockquote><h2>Updates</h2><h3><a href="https://verime.coop/">VeriMe Cooperative</a></h3><blockquote><p>VeriMe is a membership cooperative dedicated to researcher identity verification. Worldwide.</p><p>We provide researchers digital identity verification services that enable verified access to research systems, facilities, and workflows without exposing personal data.</p></blockquote><h3><strong><a href="https://www.linkedin.com/posts/jmarskell_digitalidentity-id4d-dpi-activity-7399046132892520448-TwJI/?utm_source=share&amp;utm_medium=member_ios&amp;rcm=ACoAAAAAZUMBU8SalbYc2xiqRyIGnrd7yxmrY8A">ASEAN ID Update</a></strong></h3><blockquote><p>Brunei has softly launched BruneiID (with a cool website:<a href="https://lnkd.in/gaSYXZXQ"> https://lnkd.in/gaSYXZXQ</a>) and Indonesia has made improvements to IKD. I&#8217;ve also added Malaysia&#8217;s MyGOV app, which includes a wallet, while myDigitalID is an authenticator.</p></blockquote><h2>Research</h2><h3>[Reserch] <a href="https://www.frontiersin.org/journals/blockchain/articles/10.3389/fbloc.2025.1696955/full">Towards a refined architecture for socio-technical decentralized identity services</a></h3><blockquote><p>While blockchain-based Decentralized Identity (DID) services are increasingly recognized as foundational for secure, user-controlled identity management, existing implementations remain predominantly technology-focused and overlook critical socio-technical factors such as governance, usability, and stakeholder trust. This study addresses this gap by proposing an STS-based (Socio-Technical Systems) framework that integrates social and technical components, validated through expert consultation, and introduces a Refined DID Service Architecture for enterprise deployment that balances technological robustness with social acceptance while addressing key adoption barriers like interoperability gaps and regulatory inconsistencies.</p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!OsYQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc78749e-d50c-4aa4-835d-6875b2a9ada1_1052x604.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OsYQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc78749e-d50c-4aa4-835d-6875b2a9ada1_1052x604.png 424w, https://substackcdn.com/image/fetch/$s_!OsYQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc78749e-d50c-4aa4-835d-6875b2a9ada1_1052x604.png 848w, https://substackcdn.com/image/fetch/$s_!OsYQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc78749e-d50c-4aa4-835d-6875b2a9ada1_1052x604.png 1272w, https://substackcdn.com/image/fetch/$s_!OsYQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc78749e-d50c-4aa4-835d-6875b2a9ada1_1052x604.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OsYQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc78749e-d50c-4aa4-835d-6875b2a9ada1_1052x604.png" width="1052" height="604" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fc78749e-d50c-4aa4-835d-6875b2a9ada1_1052x604.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:604,&quot;width&quot;:1052,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!OsYQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc78749e-d50c-4aa4-835d-6875b2a9ada1_1052x604.png 424w, https://substackcdn.com/image/fetch/$s_!OsYQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc78749e-d50c-4aa4-835d-6875b2a9ada1_1052x604.png 848w, https://substackcdn.com/image/fetch/$s_!OsYQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc78749e-d50c-4aa4-835d-6875b2a9ada1_1052x604.png 1272w, https://substackcdn.com/image/fetch/$s_!OsYQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc78749e-d50c-4aa4-835d-6875b2a9ada1_1052x604.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>[Research] <a href="https://link.springer.com/article/10.1186/s42162-025-00603-8">Designing and implementing the trust diamond for verifiable and privacy-preserving data sharing: engineering energy flexibility provision</a></h3><blockquote><p>This study addresses the tension between data verifiability and privacy in electricity grid operations&#8212;where grid operators need verifiable data from small-scale flexibility devices while owners seek data protection&#8212;by designing a Flexibility Provision Data Flow and digital Trust Diamond using wallet-based identity management. Through Action Design Research, the authors develop two design principles (Verifiability through Delegation and Mediated Sovereignty) and propose a Decentralized Flexibility Provision Architecture that demonstrates practical scalability in laboratory and field tests, enabling privacy-preserving yet verifiable data sharing for decentralized grid flexibility and Redispatch measures.</p></blockquote><h3>[Research] <a href="https://www.ndss-symposium.org/ndss-paper/a-security-and-usability-analysis-of-local-attacks-against-fido2/">A Security and Usability Analysis of Local Attacks Against FIDO2</a></h3><blockquote><p>In this paper, we explore threats from local attacks on FIDO2 that have received less attention---a malicious browser extension or cross-site scripting (XSS), and attackers gaining physical access to an HSK. Our systematic analysis of current implementations of FIDO2 reveals four underlying flaws, and we demonstrate the feasibility of seven attacks that exploit those flaws</p></blockquote>]]></content:encoded></item><item><title><![CDATA[Identosphere 256 Nov 24-Nov 30: EUID Launchpad Dec 10-12 • NCCoE Mobile Driver’s License Dec 16 • Lots of AI • Age Verification • Standards Politics ]]></title><description><![CDATA[This is the weekly Identosphere Newsletter sharing highlights from around the web covering Decentralized and Self-Sovereign Identity curated by Kaliya Young, Identity Woman.]]></description><link>https://newsletter.identosphere.net/p/identosphere-256-nov-24-nov-30-euid</link><guid isPermaLink="false">https://newsletter.identosphere.net/p/identosphere-256-nov-24-nov-30-euid</guid><dc:creator><![CDATA[IdentityWoman]]></dc:creator><pubDate>Thu, 04 Dec 2025 02:04:22 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!yNEy!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F16959d8a-f589-44de-8095-c10646b4f86f_640x640.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>I turned on paid subscriptions on in Substack. The newsletter will continue to come out each week for all subscribers.  Contributions are also possible on <a href="https://www.patreon.com/identosphere">Patreon</a> or <a href="https://identitywoman.net/identosphere/">Paypal</a>.</em></p><p><em>You may have some money left over in your budget you could contribute to the newsletter - <strong>I accept end of year lump sum contributions too.</strong> If you would like to do this send information to kaliya@identitywoman.net.  </em></p><h2>Upcoming</h2><ul><li><p>Call for Papers Open Now <a href="https://openidentity.eu/">Open Identity Summit </a>Deadline: January 31st, 2026</p></li></ul><blockquote><p>The summit takes place May 21&#8211;22, 2026 at University of Applied Sciences Dresden (HTW Dresden) in Dresden, Germany</p></blockquote><ul><li><p>European Commission is hosting the <strong><a href="https://ec.europa.eu/digital-building-blocks/sites/spaces/EUDIGITALIDENTITYWALLET/pages/929202296/Launchpad+Agenda">EUDI Wallet Launchpad </a>in Brussels</strong> (Dec 10-12).</p></li><li><p><strong><a href="https://ec.europa.eu/eusurvey/runner/AdvancedEDCregistration">Advanced features of European Digital Credentials for Learning (EDC)</a>&#8221;,</strong>  <strong>11 December at 11:00 CET</strong>. </p></li></ul><blockquote><p>This webinar is a follow-up to the <a href="https://www.youtube.com/watch?v=shEw1wWZ_0I">Basics of European Digital Credentials for Learning</a> organised in January 2025 and is a great opportunity to deepen your knowledge about EDC and its use. Focus on advanced topics such as implementation scenarios (service vs. code-based), available resources on <a href="http://code.europa.eu/">code.europa.eu</a>, EDC claim types, REST API integration, credential preview customisation, and future developments, including new credential types, improved sealing options, and replicable use cases for University Alliances.</p></blockquote><ul><li><p><strong>NCCoE Mobile Driver&#8217;s License Project Update Webinar December 16, 2025.</strong></p></li></ul><blockquote><p>The NIST National Cybersecurity Center of Excellence (NCCoE) is making progress in accelerating the secure adoption of mobile driver&#8217;s license (mDL) standards and best practices. Join us for a <a href="https://links-1.govdelivery.com/CL0/https:%2F%2Fwww.nccoe.nist.gov%2Fget-involved%2Fattend-events%2Fmobile-drivers-license-project-update-webinar/1/0100019aa28cdbd8-022f3973-4036-4aeb-a995-de4dc04fe872-000000/UBzNb-78Z56Efp_0wIU5diCO0gpKloqFw2JEuX5MXV4=432">webinar</a> where we&#8217;ll be sharing newly available project resources and announcing our second project use case.</p></blockquote><ul><li><p>Join us at the<a href="https://www.1edtech.org/event/dc/summit/2026"> 1EdTech Digital Credentials Summit</a> in Philadelphia, February 18-20, 2026.</p></li><li><p><a href="https://didunconf.africa/">DIF Unconference Africa</a> (an IIW Regional Event) Feb 24-26, 2026 Cape Town</p></li></ul><h2>Hiring</h2><h3><a href="https://filancore.zohorecruit.eu/jobs/Careers">Finacore</a></h3><blockquote><p>&#8220;We&#8217;re honored to announce that filancore has been listed as a Verifiable Credentials provider in two Gartner Hype Cycles this year!&#8221;</p></blockquote><h2>New Projects</h2><h3><a href="https://www.iadb.org/en/project/RG-T4538">AgroWeb3: Verifiable Credentials for Smallholder Farmers</a></h3><blockquote><p>Three million: Develop the ecosystem of verifiable digital credentials in four countries in Latin America and the Caribbean for their use in managing the economic and environmental asset portfolios of smallholder farmers (AgroWeb3).</p></blockquote><h2>Thoughtful</h2><h3>(Heather Flanagan) <a href="https://sphericalcowconsulting.com/2025/11/25/dc-api-politics/">Digital Identity Wallet Standards, the DC API, and Politics</a></h3><blockquote><p>The DC API is a protocol under development at the W3C. It isn&#8217;t a standard yet, it isn&#8217;t a wallet, and it isn&#8217;t an OS-level API. It&#8217;s one layer in a larger system.</p><p>The DC API connects a request from the browser to a wallet. Everything else happens above or below it. Tim Cappalli is doing amazing work documenting this on the <a href="https://digitalcredentials.dev/docs/concepts/layering/">Digital Credentials Developers</a> website.</p></blockquote><h3>(Kuppinger Cole) <a href="https://www.kuppingercole.com/blog/kuppinger/apples-digital-id-move-helpful-progress-but-not-yet-the-breakthrough">Apple&#8217;s Digital ID Move: Helpful Progress, but Not Yet the Breakthrough</a></h3><h3><a href="https://mydata.org/2025/11/18/mydata-in-practice-transforming-job-seeking-by-aggregating-skillsdata/">MyData in Practice: Transforming Job Seeking By Aggregating #SkillsData</a></h3><h3><a href="https://timohotti.substack.com/p/the-death-of-the-wallet?r=3r59&amp;utm_medium=ios&amp;triedRedirect=true">The Death of the Wallet</a></h3><blockquote><p>Chapter 1: The Skeuomorphic Trap</p><p>Chapter 2: The Rise of the &#8220;Person Agent&#8221;</p><p>Chapter 3: The &#8220;Organization Agent&#8221;</p><p>Chapter 4: The EUBW Paradox</p><p>Chapter 5: The Ephemeral Context</p><p>Chapter 6: Conclusion</p></blockquote><h3>[video] (Spruce) <a href="https://www.youtube.com/watch?v=ze1TDxxXDic">How Verifiable Digital Credentials Work</a></h3><blockquote><p>Today&#8217;s identity systems weren&#8217;t built for the digital world. Verifiable digital credentials offer a modern alternative: secure, portable, privacy-protected, and built for cross-agency use. In this video, we break down how this technology works across public services.</p></blockquote><h3><a href="https://dhh1128.github.io/papers/acdc-vc-diff.html">ACDCs Should Underpin Digital Trust; Keep W3C VCs as Derivative Artifacts</a></h3><h2>Standards</h2><h3><a href="https://w3c.github.io/vc-bitstring-status-list-test-suite/">VC Bitstring Status List Interoperability Report 1.0</a></h3><blockquote><p>Test Interoperability Report for Verifiable Credentials status</p><p>30 November 2025</p></blockquote><h3><a href="https://openid.net/haip-1-0-openid4vp-1-0-achieve-98-in-oidf-interop-testing/">HAIP 1.0 &amp; OpenID4VP 1.0 achieve 98% in OIDF interop testing</a></h3><blockquote><p>The OpenID Foundation is proud to announce successful interoperability testing of the <a href="https://openid.net/specs/openid4vc-high-assurance-interoperability-profile-1_0-05.html">High Assurance Interoperability Profile (HAIP) 1.0 draft 05</a>, alongside the Final specifications for <a href="https://openid.net/specs/openid-4-verifiable-presentations-1_0.html">OpenID for Verifiable Presentations (OpenID4VP) 1.0 </a>and <a href="https://openid.net/specs/openid-4-verifiable-credential-issuance-1_0.html">OpenID for Verifiable Credential Issuance (OpenID4VCI) 1.0</a>.</p></blockquote><h3><a href="https://openid.net/bloomberg-joins-the-openid-foundation-as-newest-member-and-commits-directed-funding-for-authzen/">Bloomberg joins the OpenID Foundation as newest member and commits directed funding for AuthZEN</a></h3><blockquote><p>The OpenID Foundation is pleased to welcome <a href="http://www.techatbloomberg.com/opensource">Bloomberg</a> as its newest member. Bloomberg, a global leader in business and financial information, brings a wealth of expertise and a strong commitment to advancing open identity standards that will benefit the entire community.</p></blockquote><h3>Education</h3><h3><a href="https://www.velocitynetwork.foundation/get-more-out-of-open-badges-how-velocity-network-complements-open-badges-to-ensure-trust-privacy-and-utility">Get More out of Open Badges: How Velocity Network complements Open Badges to ensure trust, privacy and utility</a></h3><blockquote><p>The Velocity Network, governed by the Velocity Network Foundation community, perfectly aligns to all these requirements, clearly and transparently defining all elements of the rulebook&#8230;.Not only are all these requirements defined by the global community in a democratic process, but the rulebook is implemented in a fully operational, scalable, open and public infrastructure &#8211; the Velocity Network MainNet.</p></blockquote><h2>Children</h2><h3><a href="https://mydata.org/2025/11/25/when-children-design-ai-what-we-learned-by-actually-listening/">When Children Design AI: What We Learned by Actually Listening</a></h3><blockquote><p>What if children aren&#8217;t just AI users to be protected, but experts we should be learning from? At MyData 2025, the MyData4Children workshop turned the usual conversation on its head. Instead of adults designing AI for children, seven children aged 7-10 took the lead, showing us how they understand AI, what they want from it, and&#8212;perhaps most importantly&#8212;what they absolutely don&#8217;t want it to do.  The results surprised even the parents in the room.</p></blockquote><h3><a href="https://liminal.co/articles/age-assurances-new-reality/">From Pilot Programs to Global Mandate: Age Assurance&#8217;s New Reality</a></h3><blockquote><p>Age assurance has moved from a developing trend to a global mandate, and the broader world of age verification has shifted with it. <a href="https://www.euronews.com/next/2025/11/17/the-age-verification-era-which-eu-countries-are-restricting-access-to-adult-sites">More than 45 countries now require platforms to verify age</a> through methods like device-based age verification, on-device estimation, reusable credentials, or structured checks tied to new age verification laws.</p></blockquote><h3><a href="https://www.reddit.com/r/worldnews/comments/1p6bdyr/the_european_parliament_close_to_calling_for_a/">The European Parliament close to calling for a ban on social networks for under-16s</a></h3><h2>AI</h2><h3><a href="https://arxiv.org/abs/2505.10609">Agent Name Service (ANS): A Universal Directory for Secure AI Agent Discovery and Interoperability</a></h3><h3>(Indicio) <a href="https://indicio.tech/blog/four-reasons-why-travel-companies-using-ai-need-indicio-proven/">Four reasons why travel companies using AI need Indicio Proven</a></h3><blockquote><p>How to prevent a spoofed AI agent in your travel solution? AI isn&#8217;t going to work if customers can&#8217;t trust your agents &#8212; and right now legacy authentication isn&#8217;t up to the task. At Indicio, we&#8217;re making AI systems a practical, implementable reality for travel and tourism by using decentralized identity and Verifiable Credentials for secure, privacy-preserving, GDPR-compliant authentication and data sharing.</p></blockquote><h3><a href="https://blog.identity.foundation/building-ai-trust-at-scale-4/">Building AI Trust at Scale: Authorising Autonomous Agents at Scale</a></h3><h3>[Video] (Dock)<a href="https://www.dock.io/post/know-your-agent-solving-identity-for-ai-agents-video-and-takeaways"> Know Your Agent: Solving Identity for AI Agents [Video and Takeaways]</a></h3><blockquote><p>The rise of AI agents is one of the most significant shifts unfolding across the internet today. From booking travel to managing work tasks, agents are quickly becoming powerful tools that act on behalf of users. In fact, by next year, there may be more non-human agents online than human users. The promise is clear: automate the drudge work and reclaim your time.</p></blockquote><h3>(Glama) <a href="https://glama.ai/blog/2025-11-27-securing-enterprise-ai-agents-with-unique-identities-in-the-model-context-protocol-mcp">Securing Enterprise AI Agents with Unique Identities in the Model Context Protocol (MCP)</a></h3><h3>(dock)<a href="https://www.dock.io/post/5-identity-gaps-that-put-ai-agents-at-risk">5 Identity Gaps That Put AI Agents at Risk</a></h3><h3><a href="https://www.scworld.com/resource/identity-proofing-verifiable-digital-credentials-in-the-ai-era">Identity proofing: Verifiable digital credentials in the AI era</a></h3><h3><a href="https://www.hpcwire.com/aiwire/2025/11/25/when-ai-becomes-the-attacker-rethinking-identity-for-agentic-ai/">When AI Becomes the Attacker: Rethinking Identity for Agentic AI</a></h3><h3><a href="https://curity.io/blog/identity-and-access-management-for-AI-agents/">Identity and Access Management for AI Agents</a></h3><h3><a href="https://www.biometricupdate.com/202511/agentic-ai-explosion-driven-by-50b-market-opportunity-and-related-risks">Agentic AI explosion driven by $50B market opportunity and related risks</a></h3><h3><a href="https://medium.com/@paul_15561/schematic-interoperability-lives-in-the-architecture-not-the-models-f77bdcc52f55">Schematic Interoperability Lives in the Architecture, Not the Models</a></h3><h3>[blog and short video] (GLEIF) <a href="https://www.gleif.org/en/newsroom/gleif-podcasts/vlei-accelerate-innovation-by-enabling-trusted-digital-identity-using-verifiable-credentials?cachepath=ja%2Fnewsroom%2Fgleif-podcasts%2Fvlei-accelerate-innovation-by-enabling-trusted-digital-identity-using-verifiable-credentials%2F">vLEI: Accelerate Innovation by Enabling Trusted Digital Identity using Verifiable Credentials</a></h3><h2>New Wallet / Updates</h2><h3><a href="https://play.google.com/store/apps/details?id=app.lcw&amp;hl=en_AU">Learner Credential Wallet</a></h3><h2>Digital Diplomacy</h2><h3><a href="https://ec.europa.eu/commission/presscorner/detail/en/ip_25_2851">European Union and Singapore discuss reinforcing digital cooperation through Digital Partnership Council</a></h3><blockquote><p>Artificial Intelligence</p><p>Online safety and tackling scams</p><p>Trust services</p><p>Cybersecurity</p><p>Data</p><p>Semiconductors and quantum</p></blockquote><h3><a href="http://nesen.id">Nesen.ID</a>  (<a href="https://github.com/user-attachments/files/23771332/NansenID_LQ.pdf">SlideDeck</a>) (<a href="https://www.producthunt.com/products/identity-global?launch=nansen-id-the-digital-visas-life-raft">Video</a>)</h3><h2>Decentralized Social</h2><h3><a href="https://werd.io/the-state-of-the-open-social-web/">The State of the Open Social Web</a></h3><h2>From the &#8220;This Doesn&#8217;t Sound Good&#8221; Department</h2><h3><a href="https://www.forbes.com/sites/zakdoffman/2025/12/03/google-starts-sharing-all-your-text-messages-with-your-employer/">Google Starts Sharing All Your Text Messages With Your Employer</a></h3><h3><a href="https://www.biometricupdate.com/202511/identity-verification-processes-broke-down-during-trump-govt-transition-report">Identity verification processes broke down during Trump govt transition: report</a></h3><p></p><h2>Research</h2><h3>(Research) <a href="https://arxiv.org/abs/2511.18379">On Addressing Isolation in Blockchain-Based Self-Sovereign Identity</a></h3><blockquote><p>Unfortunately, blockchains are mostly siloed, affecting the interoperability and universality of SSI. We investigate the effect of blockchain isolation on blockchain-based SSI. We first define possible scenarios for cross-chain SSI and exemplify with real-life use cases</p></blockquote><h3>(Research) <a href="https://www.sciencedirect.com/science/article/abs/pii/S0167404825004699">DID-TUF [The Update Framework]: Secure Decentralized Identifier Management using Trustless Registries</a></h3><blockquote><p>The Update Framework (TUF) to enable secure and efficient dissemination of DID documents through a trustless registry model. This method blends the strengths of registry-based and registry-less approaches to enhance the resilience and security of decentralized identity systems. Our solution is robust against a wide range of attacks while maintaining a small overhead. It is also agnostic to the DID document storage method and provides an auditable trail of updates.</p></blockquote><h3>(Research) <a href="https://www.frontiersin.org/journals/blockchain/articles/10.3389/fbloc.2025.1688287/full">Towards a Universal Digital Identity: a blockchain-based framework for borderless verification</a></h3><blockquote><p>The paper sets out the vision, necessity, operational framework, and implications of a blockchain-based UDI, arguing that such a transformation is both inevitable and essential for the future of the digital economy.</p></blockquote><h3>(Research) <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=5785263">Modern IAM Standards Landscape: A Systematic Mapping of Open IAM Standards to Enterprise Identity Frameworks</a></h3><blockquote><p>The study finds that the strengths of coverage in authentication and Single Sign-On (SSO) are high, coverage in provisioning is moderate, and coverage in governance integration is high. An open-source implementation taxonomy, that is, Keycloak, Ory, Gluu/Janssen, Open Policy Agent (OPA), and MidPoint, is created to measure interoperability, maturity, and standard compliance. The resultant assessment framework incorporates process coverage, implementation maturity and governance alignment and offers a blueprint that researchers and practitioners can use to standardize IAM implementations.</p></blockquote><h3>(Research) <a href="http://mdpi.com/2410-387X/9/4/74">A Review on Blockchain-Based Trust and Reputation Schemes in Metaverse Environments</a></h3><blockquote><p>This paper provides an extensive review of blockchain-enabled trust and reputation frameworks specifically tailored to metaverse ecosystems.Our analysis finds that score-based designs trade scalability for nuanced reputation representation, while SSI- and SBT-based approaches improve Sybil-resistance but introduce significant privacy governance challenges.</p></blockquote>]]></content:encoded></item><item><title><![CDATA[Identosphere 255 Nov 17-24: EUDI LSP report out • EUBW Draft • ENS looses in court • INATBA AI Report • ATIS Telecom Org ID ]]></title><description><![CDATA[This is the weekly Identosphere Newsletter sharing highlights from around the web covering Decentralized and Self-Sovereign Identity curated by Kaliya Young, Identity Woman.]]></description><link>https://newsletter.identosphere.net/p/identosphere-255-nov-17-24-eudi-lsp</link><guid isPermaLink="false">https://newsletter.identosphere.net/p/identosphere-255-nov-17-24-eudi-lsp</guid><dc:creator><![CDATA[IdentityWoman]]></dc:creator><pubDate>Tue, 25 Nov 2025 21:24:46 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!N5OX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa74c687c-cc9d-4565-8413-ad9ab3c7b398_1920x1094.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<ul><li><p>Call for Papers Open Now <a href="https://openidentity.eu/">Open Identity Summit </a> Deadline: January 31st, 2026</p></li></ul><blockquote><p>The summit takes place May 21&#8211;22, 2026 at University of Applied Sciences Dresden (HTW Dresden) in Dresden, Germany</p></blockquote><ul><li><p><a href="https://sidi-hub.community/sidi-hub-pre-conference-workshop-at-trustech-tuesday-2nd-december-2025-14-00-18-00-register-interest-spots-are-limited/">SIDI Hub Pre-Conference Workshop @ TRUSTECH 2025</a> - Paris, France | Tuesday, 2 December 2025 | 14:00 &#8211; 18:00 CET</p></li><li><p><strong>NCCoE Mobile Driver&#8217;s License Project Update Webinar December 16, 2025.</strong></p></li></ul><blockquote><p>The NIST National Cybersecurity Center of Excellence (NCCoE) is making progress in accelerating the secure adoption of mobile driver&#8217;s license (mDL) standards and best practices. Join us for a <a href="https://links-1.govdelivery.com/CL0/https:%2F%2Fwww.nccoe.nist.gov%2Fget-involved%2Fattend-events%2Fmobile-drivers-license-project-update-webinar/1/0100019aa28cdbd8-022f3973-4036-4aeb-a995-de4dc04fe872-000000/UBzNb-78Z56Efp_0wIU5diCO0gpKloqFw2JEuX5MXV4=432">webinar</a> where we&#8217;ll be sharing newly available project resources and announcing our second project use case.</p></blockquote><ul><li><p>Join us at the<a href="https://www.1edtech.org/event/dc/summit/2026"> 1EdTech Digital Credentials Summit</a> in Philadelphia, February 18-20, 2026.</p></li><li><p><a href="https://didunconf.africa/">DIF Unconference Africa</a> (an IIW Regional Event) Feb 24-26, 2026 Cape Town</p></li></ul><h3>(SprucID) <a href="https://blog.spruceid.com/interoperability-is-a-policy-decision-not-just-a-technical-one/">Interoperability Is a Policy Decision, Not Just a Technical One</a></h3><blockquote><p>States should prefer that the technical standards used in a state digital identity program be open, freely available, and implementable by the public and private sector without proprietary licensing restrictions. Open standards are critical to ensuring transparency, interoperability, and long-term sustainability.</p></blockquote><h3>(MATTR) <a href="https://mattr.global/article/rethinking-coverage-in-digital-credential-verification">Rethinking &#8220;coverage&#8221; in digital credential verification</a></h3><blockquote><p>The real opportunity lies in asking the <em>next layer</em> of questions: How do we make sure verification remains future-ready? How do we design for interoperability from day one? That&#8217;s where digital trust moves from being a checkbox to a true enabler of transformation</p></blockquote><h3>[Video] <a href="https://www.dock.io/post/eudi-key-takeaways-from-europes-largest-digital-id-pilot-video-and-takeaways">EUDI: Key Takeaways From Europe&#8217;s Largest Digital ID Pilot</a></h3><blockquote><p>The <a href="https://www.dock.io/post/eu-digital-identity-wallet">European Digital Identity Wallet</a> is entering one of the most consequential phases of its rollout, and few people are closer to the work than Esther Makaay, VP of Digital Identity at Signicat. After spending the last three years at the center of the European Identity Wallet Consortium (EWC), Esther joined us for a deep-dive presentation on what the Large-Scale Pilots have actually delivered, and how ready Europe truly is for the 2026 deadline.</p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!N5OX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa74c687c-cc9d-4565-8413-ad9ab3c7b398_1920x1094.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!N5OX!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa74c687c-cc9d-4565-8413-ad9ab3c7b398_1920x1094.png 424w, https://substackcdn.com/image/fetch/$s_!N5OX!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa74c687c-cc9d-4565-8413-ad9ab3c7b398_1920x1094.png 848w, https://substackcdn.com/image/fetch/$s_!N5OX!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa74c687c-cc9d-4565-8413-ad9ab3c7b398_1920x1094.png 1272w, https://substackcdn.com/image/fetch/$s_!N5OX!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa74c687c-cc9d-4565-8413-ad9ab3c7b398_1920x1094.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!N5OX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa74c687c-cc9d-4565-8413-ad9ab3c7b398_1920x1094.png" width="1456" height="830" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a74c687c-cc9d-4565-8413-ad9ab3c7b398_1920x1094.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:830,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!N5OX!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa74c687c-cc9d-4565-8413-ad9ab3c7b398_1920x1094.png 424w, https://substackcdn.com/image/fetch/$s_!N5OX!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa74c687c-cc9d-4565-8413-ad9ab3c7b398_1920x1094.png 848w, https://substackcdn.com/image/fetch/$s_!N5OX!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa74c687c-cc9d-4565-8413-ad9ab3c7b398_1920x1094.png 1272w, https://substackcdn.com/image/fetch/$s_!N5OX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa74c687c-cc9d-4565-8413-ad9ab3c7b398_1920x1094.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><a href="https://cstoecker.spherity.com/eubw-draft-nov-19-2025-what-to-expext-and-why-this-is-very-important-4f8676e60d93">EUBW Draft, Nov 19 2025: What to Expect and Why This is Important</a></h3><blockquote><p>The EUBW will sit at the centre of almost all major EU digital and industrial initiatives: DPPs, Industry 4.0, data spaces, NIS2, the Cyber Resilience Act, reporting obligations, Trusted AI, VAT in the Digital Age, customs modernization, and Europe&#8217;s digital sovereignty agenda. If the EUBW is fragmented or built on the wrong foundations, all these initiatives will inherit the same fragmentation and complexity.</p></blockquote><h3><a href="https://www.linkedin.com/posts/trbouma_apple-just-turned-identity-into-a-product-activity-7395496197093953536-64l0/?utm_source=share&amp;utm_medium=member_ios&amp;rcm=ACoAAAAAZUMBU8SalbYc2xiqRyIGnrd7yxmrY8A">&#127823; Apple just turned identity into a product category.</a></h3><h3><a href="https://www.linkedin.com/posts/wiam-el-abd_businesses-are-getting-their-own-digital-activity-7397643760500879361-mqJ3/">&#127466;&#127482; Businesses are getting their own digital wallet, and this will reshape how companies operate across borders.</a></h3><h3><a href="https://medium.com/@paul_15561/rethinking-the-wallet-why-words-shape-digital-identity-architecture-d480067279d6">Rethinking the &#8220;Wallet&#8221;: Why Words Shape Digital Identity Architecture</a></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!nxFY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F520c988c-31e8-461e-b401-98ca964e5cdd_1276x782.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!nxFY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F520c988c-31e8-461e-b401-98ca964e5cdd_1276x782.png 424w, https://substackcdn.com/image/fetch/$s_!nxFY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F520c988c-31e8-461e-b401-98ca964e5cdd_1276x782.png 848w, https://substackcdn.com/image/fetch/$s_!nxFY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F520c988c-31e8-461e-b401-98ca964e5cdd_1276x782.png 1272w, https://substackcdn.com/image/fetch/$s_!nxFY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F520c988c-31e8-461e-b401-98ca964e5cdd_1276x782.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!nxFY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F520c988c-31e8-461e-b401-98ca964e5cdd_1276x782.png" width="1276" height="782" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/520c988c-31e8-461e-b401-98ca964e5cdd_1276x782.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:782,&quot;width&quot;:1276,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!nxFY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F520c988c-31e8-461e-b401-98ca964e5cdd_1276x782.png 424w, https://substackcdn.com/image/fetch/$s_!nxFY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F520c988c-31e8-461e-b401-98ca964e5cdd_1276x782.png 848w, https://substackcdn.com/image/fetch/$s_!nxFY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F520c988c-31e8-461e-b401-98ca964e5cdd_1276x782.png 1272w, https://substackcdn.com/image/fetch/$s_!nxFY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F520c988c-31e8-461e-b401-98ca964e5cdd_1276x782.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>New Zealand Government: <a href="https://www.dia.govt.nz/Trust-Framework-for-Digital-Identity-templates-and-guidance">Dept of Internal Affairs: Trust Framework Forms and Guidance</a> Updated Nov 2025</h3><h3><a href="https://thehill.com/opinion/technology/5512706-china-internet-id-law/">China&#8217;s internet ID push signals a new era of digital control</a></h3><blockquote><p>The digital ID system also complements other previously designed surveillance systems, such as <a href="https://cset.georgetown.edu/article/chinas-sharp-eyes-program-aims-to-surveil-100-of-public-space/">Sharp Eyes</a>, <a href="https://www.brookings.edu/articles/how-china-harnesses-data-fusion-to-make-sense-of-surveillance-data/">police cloud systems</a>, <a href="https://www.rfa.org/english/china/2025/02/20/china-ai-neuro-quantum-surveillance-security-threat/">facial recognition closed-circuit television systems</a> and <a href="https://www.nytimes.com/2024/05/25/world/asia/china-surveillance-xi.html">grid-style social management</a>, allowing the Chinese Ministry of State Security to link online activities directly into national monitoring systems.</p><p>The digital ID system also complements broader data-localization and true-name tracking policies first enacted in 2017 under the <a href="https://digichina.stanford.edu/work/translation-cybersecurity-law-of-the-peoples-republic-of-china-effective-june-1-2017/">Cybersecurity Law</a> and fortified under the <a href="https://www.jtl.columbia.edu/bulletin-blog/the-personal-information-protection-law-chinas-version-of-the-gdpr">Personal Information Protection Law</a> of 2021.</p></blockquote><h3><a href="https://www.velocitynetwork.foundation/elements-of-a-community-governed-trust-framework-and-how-velocity-network-delivers-them-all-today">Elements of a Community-Governed Trust Framework (and how Velocity Network delivers them all TODAY)</a></h3><blockquote><p>In an article published in November 2025 titled  &#8220;<a href="https://www.finextra.com/blogposting/29727/credentials-not-anchored-in-law---versus-anchored">Credentials not anchored in law &#8211; versus anchored</a>&#8221;, Bo Harald, a thought leader in verifiable credentials and Trust Infrastructure, explains the critical roles of a trust layer. In this article, he explores the difference between credentials anchored in law and those not anchored in law.</p></blockquote><h2>Identity and AI</h2><h3>[Report] (INATBA)<a href="https://inatba.org/wp-content/uploads/2025/11/Building-Trust_-Integrating-AI-Blockchain-and-Digital-Identity_NOVEMBER-2025.docx.pdf"> Building Trust: Integrating AI, Blockchain, and Digital Identity</a></h3><blockquote><p>The convergence of Self-Sovereign Identity (SSI) and Artificial Intelligence (AI) represents a significant step toward establishing a global benchmark for digital trust, rights-based governance, and competitiveness.</p></blockquote><h3><a href="https://auth0.com/blog/auth0-for-ai-agents-generally-available/">Auth0 for AI Agents is Now Generally Available (GA)</a></h3><h3><a href="https://auth0.com/blog/secure-ai-agents-auth0/">Secure Your AI Agents: The Power is Already in Your Auth0 Plan</a></h3><h3>(Indicio) <a href="https://indicio.tech/blog/win-web3-with-verifiable-credentials-from-indicio/">Win Web3 with Verifiable Credentials from Indicio</a></h3><h3><a href="https://fortune.com/2025/11/18/bitfury-bitcoin-mining-launches-1-billion-initiative/">Exclusive: Bitfury, known for its Bitcoin mining, launches $1 billion initiative to invest in ethical tech and AI</a></h3><blockquote><p>&#8220;We&#8217;re big fans of [the American architect] Buckminster Fuller, who said, &#8216;You never change things by fighting the existing reality. To change something, build a new model that makes the existing model completely obsolete,&#8217;&#8221; Kikvadze said.</p></blockquote><h2>Telecoms</h2><h3><a href="https://atis.org/press-releases/atis-releases-new-framework-for-telecom-organizational-identity-governance/">ATIS Releases New Framework for Telecom Organizational Digital Identity Governance</a></h3><blockquote><p>The paper outlines how verifiable credentials can integrate with existing STIR/SHAKEN and Rich Call Data (RCD) frameworks to enable end-to-end verification of organizational identity for calling and messaging. It further highlights how integrating existing trusted organizational digital identity into telecom infrastructure, the industry can significantly elevate the integrity of communications.</p></blockquote><h3>Labor Market Needs VCS to counter AI</h3><h3><a href="https://www.linkedin.com/pulse/new-hiring-crisis-ai-fakes-need-verifiable-alttaf-hussain-n8ece/">The New Hiring Crisis: AI Fakes and the Need for Verifiable Credentials</a></h3><blockquote><p>Right now, candidates with real credentials spend weeks in background check limbo while fraudulent candidates breeze through with convincing stories and AI-generated answers. Verifiable credentials flip that equation. The honest candidates move faster. The fraudulent ones get filtered out before they waste anyone&#8217;s time.</p></blockquote><h3><a href="https://cepr.org/voxeu/columns/labour-market-institutions-ai-era-need-verified-employment-records">Labour market institutions for the AI era: The need for verified employment records</a></h3><blockquote><p>The rise of AI fundamentally alters the balance between formal credentials and verified experience in labour markets, but without verified employment records, experience remains invisible. This column reviews employment record systems across eight advanced and emerging economies, as well as EU-level initiatives, to establish design principles and draw lessons from implementation failures. The analysis reveals that technical infrastructure alone does not guarantee success. Effective systems require aligned incentives, continuous stakeholder engagement, and careful sequencing.</p></blockquote><h2>Money and Identity</h2><h3>[Slide Deck] (Hart Montgomery) <a href="https://rdi.berkeley.edu/berkeley-defi/assets/material/f25/lec9-hart-montgomery.pdf">Practical Privacy for DEFI with an Open Source Software Perspective</a></h3><h3><a href="https://chyp.com/2025/11/18/shaping-the-future-of-finance-key-insights-from-m2020-usa/">Shaping the future of finance: key insights from M2020 USA.</a></h3><blockquote><p>- The era of agentic AI.</p><p>- Stablecoins and the future of money.</p></blockquote><h2>Company News</h2><h3>(IBM) <a href="https://www.linkedin.com/pulse/combat-identity-fraud-ibm-verify-digital-credentials-secure-bowie-h6voc/">Combat Identity Fraud with IBM Verify Digital Credentials: Secure, Interoperable, Future-Ready</a></h3><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8CIF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F441aa64a-24e7-45b1-b181-189e48c45a5b_901x205.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8CIF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F441aa64a-24e7-45b1-b181-189e48c45a5b_901x205.png 424w, https://substackcdn.com/image/fetch/$s_!8CIF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F441aa64a-24e7-45b1-b181-189e48c45a5b_901x205.png 848w, https://substackcdn.com/image/fetch/$s_!8CIF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F441aa64a-24e7-45b1-b181-189e48c45a5b_901x205.png 1272w, https://substackcdn.com/image/fetch/$s_!8CIF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F441aa64a-24e7-45b1-b181-189e48c45a5b_901x205.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8CIF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F441aa64a-24e7-45b1-b181-189e48c45a5b_901x205.png" width="901" height="205" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/441aa64a-24e7-45b1-b181-189e48c45a5b_901x205.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:205,&quot;width&quot;:901,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!8CIF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F441aa64a-24e7-45b1-b181-189e48c45a5b_901x205.png 424w, https://substackcdn.com/image/fetch/$s_!8CIF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F441aa64a-24e7-45b1-b181-189e48c45a5b_901x205.png 848w, https://substackcdn.com/image/fetch/$s_!8CIF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F441aa64a-24e7-45b1-b181-189e48c45a5b_901x205.png 1272w, https://substackcdn.com/image/fetch/$s_!8CIF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F441aa64a-24e7-45b1-b181-189e48c45a5b_901x205.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><h3><a href="https://learn.microsoft.com/en-us/entra/verified-id/idv-partners">Microsoft Entra Verified ID Identity Verification partners</a></h3><blockquote><p>Our Identity Verification (IDV) partner network extends Microsoft Entra Verified ID capabilities to help you build seamless end-user experiences. With Verified ID, you can integrate with IDV partners to enable scenarios like remote onboarding, secure access to resources and Account recovery with Government ID checks using identity verification and proofing services.</p></blockquote><h3>(Walt.ID) <a href="https://walt.id/blog/p/ssi-kit">The SSI Kit: Discontinuation Notice!</a></h3><p>Web3 Keeps trying to solve Proof of Personhood</p><h3><a href="https://polkadot.com/blog/proof-of-personhood-polkadot-project-individuality/">Proof of Personhood: How Polkadot proves you&#8217;re real without KYC</a></h3><h3><a href="https://cheqd.io/blog/why-cheqd-is-changing-from-trust-registry-to-trust-graph/">Why cheqd is Changing from Trust Registry to Trust Graph</a></h3><blockquote><p>Instead of a simple list, a Trust Graph maps the rich, living connections between people, organisations, and AI agents, showing not just who is trusted, but how, why, and to what degree. It&#8217;s a more dynamic and connected way to represent trust in the digital age.</p><p>A Trust Graph is a living, interconnected network that shows how trust flows between people, organisations, and AI agents. It maps the relationships, hierarchies, permissions, and reputation signals between them. Think of it as a constantly evolving web of trust rather than a static spreadsheet.</p></blockquote><h3>Web 3</h3><h3><a href="https://99bitcoins.com/news/altcoins/ens-just-got-smacked-down-by-an-unstoppable-legal-action/">ENS looses patent fight with Unstoppable Domains</a></h3><h3><a href="https://www.yahoo.com/news/articles/uk-bringing-digital-ids-stop-151124821.html?guccounter=1&amp;guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&amp;guce_referrer_sig=AQAAAIvwbN6l2DepR4FSX7UeGYv0634wcoIgrSCmy1mJf04rcSCLPOs7oDHnCkipyqBc3De5G3z48v2fBqQGQNR1BwEntD7X8-bnJUFwdN3w_ZKoSc5WjHLer-AH-rWLgdS5-nTeO5dgWC9I6h3JUBe1ssbw2s3kcS1yAZUOut98p9hG">The UK is bringing in digital IDs. Here&#8217;s how to stop them becoming surveillance tools</a></h3><blockquote><p>For governments, SSI could underpin a digital ID framework that strengthens trust and efficiency without enabling mass surveillance, just like Switzerland.</p></blockquote><h3>[short video] (NEC) <a href="https://www.nec.com/en/global/onlinetv/en/selfsovereignid_customerexperience.html">Face Recognition and Self-Sovereign Identity Reinvents Customer Experience [1:30]</a></h3><h2>Thoughtful</h2><h3><a href="https://www.linkedin.com/pulse/alternatives-sorting-out-trust-all-suck-jerry-michalski-vqqhc/?trackingId=e8CBUniwTTmlVI93SRZ2vg%3D%3D">The Alternatives to Sorting Out Trust All Suck</a></h3><blockquote><p>Trust is<a href="https://wiki.openglobalmind.com/Projects/Jerry%27s_Nuggets/Trust_is%E2%80%A6.html"> so central</a> to humanity that I&#8217;m surprised it doesn&#8217;t figure more prominently in recent visions of where we&#8217;re headed. I haven&#8217;t found a rigorous, exhaustive (<a href="https://en.wikipedia.org/wiki/MECE_principle">MECE</a>) framework that encompasses all the futures we might face, but the futures on offer today do seem bleak.</p></blockquote><h3>(Heather Flanagan) <a href="https://sphericalcowconsulting.com/2025/11/18/the-regulators-dilemma/">The Regulator&#8217;s Dilemma</a></h3>]]></content:encoded></item><item><title><![CDATA[Identosphere 254 Nov 9-16: Indian Aadhaar # -> VCs • Swiss Gov Docs • AI and Identity • SSI + AI Agents (not Blockchain) • DIF election results]]></title><description><![CDATA[This is the weekly Identosphere Newsletter sharing highlights from around the web covering Decentralized and Self-Sovereign Identity curated by Kaliya Young, Identity Woman.]]></description><link>https://newsletter.identosphere.net/p/identosphere-254-nov-9-16-indian</link><guid isPermaLink="false">https://newsletter.identosphere.net/p/identosphere-254-nov-9-16-indian</guid><dc:creator><![CDATA[IdentityWoman]]></dc:creator><pubDate>Thu, 20 Nov 2025 19:01:50 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!qoCw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26c5367b-1b89-424b-904e-1e564d00d61b_1200x1200.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Government ID Projects</h2><h3>SWIYU (Swiss Government) <a href="https://swiyu-admin-ch.github.io/specifications/trust-protocol/">Trust Protocol based on VCs</a></h3><blockquote><p>This document defines the publicly consumable technical specification of the trust protocol, is based on VCs and was created as an initial concept for the swiyu Trust Infrastructure. The aim is to provide a straight-forward solution allowing a governing body (trust issuer) to confirm the identity of issuers and verifiers.</p></blockquote><h3><a href="https://swiyu-admin-ch.github.io/specifications/interoperability-profile/">swiyu Trust Infrastructure: Interoperability profile</a></h3><h3><a href="https://damienbod.com/2025/11/10/implement-mfa-using-swiyu-the-swiss-e-id-with-duende-identityserver-asp-net-core-identity-and-net-aspire/">Implement MFA using swiyu, the Swiss E-ID with Duende IdentityServer, ASP.NET Core Identity and .NET Aspire</a></h3><h3><a href="https://www.biometricupdate.com/202511/with-openage-k-id-presents-itself-as-one-big-interoperable-solution-for-age-checks">With OpenAge, k-ID presents itself as one big interoperable solution for age checks</a></h3><h3>Funke challenge by SPRIND - Bundesagentur f&#252;r Sprunginnovationen.</h3><blockquote><p>Last Funke conference recording:<a href="https://lnkd.in/e4Qne9Zc"> https://lnkd.in/e4Qne9Zc</a></p><p>The funded teams just dropped their codebases publicly &#8212; a rare chance to peek under the hood of real EUDI Wallet implementations built with passion, specs, and caffeine. The best: all under Apache 2.0 license, so feel free to work with it. OpenCode Repo:<a href="https://lnkd.in/e9kXnYsc"> https://lnkd.in/e9kXnYsc</a></p></blockquote><h3><a href="https://economictimes.indiatimes.com/wealth/save/new-aadhaar-app-how-to-use-uidais-new-aadhaar-app-for-face-authentication-offline-qr-and-verifiable-credentials/articleshow/125221442.cms?from=mdr">New Aadhaar App: How to use UIDAI&#8217;s new Aadhaar App for face authentication, offline QR, and verifiable credentials</a></h3><blockquote><p>The app promises a safer and smarter way to use an Aadhaar card anytime, anywhere. It allows residents to access all their Aadhaar details on their smartphones and share the data in a verifiable credential format.</p><p>Biometric locking/unlocking: This feature secures biometric authentication by locking biometric data. Once enabled, biometrics remain locked until the Aadhaar holder temporarily unlocks or disables the system.</p></blockquote><h3><a href="https://in.mashable.com/tech/102287/uidais-latest-aadhaar-app-turns-your-phone-into-a-secure-digital-id-wallet-whats-new">UIDAI&#8217;s Latest Aadhaar App Turns Your Phone Into a Secure Digital ID Wallet: What&#8217;s New</a></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qoCw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26c5367b-1b89-424b-904e-1e564d00d61b_1200x1200.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qoCw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26c5367b-1b89-424b-904e-1e564d00d61b_1200x1200.png 424w, https://substackcdn.com/image/fetch/$s_!qoCw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26c5367b-1b89-424b-904e-1e564d00d61b_1200x1200.png 848w, https://substackcdn.com/image/fetch/$s_!qoCw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26c5367b-1b89-424b-904e-1e564d00d61b_1200x1200.png 1272w, https://substackcdn.com/image/fetch/$s_!qoCw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26c5367b-1b89-424b-904e-1e564d00d61b_1200x1200.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qoCw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26c5367b-1b89-424b-904e-1e564d00d61b_1200x1200.png" width="1200" height="1200" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/26c5367b-1b89-424b-904e-1e564d00d61b_1200x1200.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1200,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!qoCw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26c5367b-1b89-424b-904e-1e564d00d61b_1200x1200.png 424w, https://substackcdn.com/image/fetch/$s_!qoCw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26c5367b-1b89-424b-904e-1e564d00d61b_1200x1200.png 848w, https://substackcdn.com/image/fetch/$s_!qoCw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26c5367b-1b89-424b-904e-1e564d00d61b_1200x1200.png 1272w, https://substackcdn.com/image/fetch/$s_!qoCw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26c5367b-1b89-424b-904e-1e564d00d61b_1200x1200.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><a href="https://kantarainitiative.org/kantara-achieves-historic-first-accredited-to-certify/">Kantara Achieves Historic First: Accredited to Certify Against the UK DIATF</a></h3><h3><a href="https://diacc.ca/2025/11/12/statement-on-bill-c-4-balancing-economic-relief-with-privacy-considerations/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=statement-on-bill-c-4-balancing-economic-relief-with-privacy-considerations">Statement on Bill C-4: Balancing Economic Relief with Privacy Considerations</a> (Canada)</h3><h3><a href="https://blog.spruceid.com/framework-vs-credential-choosing-the-right-model-for-state-identity/">Framework vs. Credential: Choosing the Right Model for State Identity</a></h3><blockquote><p>Explore why a flexible, standards-aligned framework offers the strongest foundation for modern, privacy-preserving digital identity.</p></blockquote><h3><a href="https://www.rpp.works/ways-of-doing/digital-identity-and-the-uk-governments-announceability-problem/">Digital identity and the UK government&#8217;s announceability problem</a></h3><blockquote><p>Digital public services and infrastructure are complex sociotechnical systems. Getting them right is the result of thousands of small product design decisions. Policy professionals are not product specialists. To ensure the civil service is delivering what they want, ministers need to get much closer to product delivery teams &#8212; and demand that announcements they sign off on give teams the space they need to deliver at speed, not create inertia.</p></blockquote><h2>DPI Explored</h2><h3><a href="https://dial.global/research/design-systems-for-digital-government/">From Backend to Citizen: Design Systems as the Translation Layer for Digital Government</a></h3><blockquote><p>- Conditions and structures that help a design system emerge, be sustained, and delivered</p><p>- Understanding design systems in government beyond visual standardization&#8212;the &#8220;behind the scenes&#8221; elements that make a design system truly systemic</p><p>- The value of design systems&#8212;how they progress and are shared across government</p></blockquote><h2>Thoughtful</h2><h3><a href="https://ai.plainenglish.io/beyond-the-glass-cage-why-self-sovereign-identity-not-blockchains-will-power-agent-autonomy-6408ff72bd7a">Beyond the Glass Cage: Why Self-Sovereign Identity, Not Blockchains, Will Power Agent Autonomy</a></h3><blockquote><p>The choice between blockchains and self-sovereign identity isn&#8217;t just technical &#8212; it&#8217;s philosophical and practical. It determines whether we repeat the centralizing mistakes of the past, just distributed across more servers, or finally build the genuinely decentralized future we&#8217;ve been promised.</p></blockquote><h3><a href="https://www.strata.io/identityheroes/ep8-heather-flanagan/?utm_medium=social&amp;utm_source=linkedin">Identity Heros Podcast: Heather Flanagan</a></h3><h3>(David Kelts) <a href="https://medium.com/@dkelts.id/trust-management-for-comment-fc53b86e0133">Categories of the Mechanisms of Trust Management</a> + Trust Vectors</h3><blockquote><p>- <strong>Centralized trust anchor</strong> (one CA authority)</p><p>- <strong>Hierarchical PKI</strong> (common trust anchor)</p><p>- <strong>Federated</strong> (multiple trust anchors authorized by the Trust Framework). A Trust Registry may be the mechanism for dispensing trust anchors for inspection. There may be a convention for querying any participant about conformance.</p><p>- <strong>Decentralized Trust </strong>(Smart Contracts as trust anchors (?) coordinated by the Trust Framework)</p><p>- <strong>Free Market </strong>(lack of conventions or mechanisms; can create reliance on reputational trust only)</p><p><em><strong>Questions of Readers of this Blog Post: Are there any other Trust Vectors overlooked?</strong></em></p></blockquote><h3><a href="https://www.linkedin.com/pulse/trust-never-problem-proof-amit-arora-21lfc/">Trust Was Never the Problem - Proof Was</a></h3><blockquote><p>One expert put it bluntly: &#8220;Lack of data ownership and protections is limiting blockchain&#8217;s impact. Institutions need privacy for regulatory compliance. Without protections, data is freely available.&#8221;</p><p>Verifiable Credentials (VCs) and Decentralised Identity The backbone of proof-based trust. These allow an issuer to digitally sign data about you (a credential), which you store and later present as needed. &#8220;Verify once, use everywhere.&#8221;</p></blockquote><h2>Identity and Payments</h2><h3>(Fime) <a href="https://www.fime.com/blog/blog-15/post/payment-tokenization-has-a-tipping-point-been-reached-and-what-are-the-implications-607">Payment tokenization. Has a tipping point been reached and what are the implications?</a></h3><blockquote><p>Payment tokenization has strong crossovers to the emerging work on payments within identity initiatives such as the European Identity Wallet. Whilst initially appearing quite separate, the core topics of authentication, trust and assurance lie deep within both topics.</p></blockquote><h3>(Signet) <a href="https://docs.getsignet.xyz/credentials">Verifiable Credentials Management</a></h3><blockquote><p>The verifiable credentials model handles the data fields used in the VC Management API endpoints for managing enrollments, credentials, and payments. It enables secure enrollment of users, issuance of payment authorization credentials, and processing of verifiable payments.</p></blockquote><h2>eIDAS</h2><h3>(<a href="http://walt.id">walt.id</a>) [Report] <a href="https://walt.id/white-paper/eidas2-implementers-guide">eIDAS2 Implementers Guide</a></h3><blockquote><p>In 2016 the eIDAS (electronic Identification, Authentication and Trust Services) regulation created a framework for cross&#8209;border electronic identification. It focused on a small set of trust services, notably electronic signatures, and left wide latitude to Member States. As a result, national implementations diverged, interoperability remained limited and citizens lacked a harmonised digital identity. During the pandemic, physical presence requirements made identity proofing difficult and fragmentation slowed adoption beyond the public sector.</p></blockquote><h2>(Katryna Dow: MeeCo)<a href="https://www.linkedin.com/posts/katrynadow_part-2-of-the-eudi-large-scale-pilots-series-activity-7396135161907691520-4_D1/?utm_source=share&amp;utm_medium=member_ios&amp;rcm=ACoAAAAAZUMBU8SalbYc2xiqRyIGnrd7yxmrY8A"> &#127466;&#127482;Part 2: EUDI Large Scale Pilots Final Reports &#128209;</a></h2><blockquote><p>This week we feature the results published by the<a href="https://www.linkedin.com/company/eu-digital-identity-wallet-consortium-ewc/"> EU Digital Wallet Consortium (EWC)</a> where the focus was on travel &#9972;&#65039; &#9992;&#65039; and payments &#128182;</p><p>The great news is the &#8220;technical&#8221; progress, confirmation on infrastructure and interoperability - these are all incredible milestones. &#9989;</p><p>But....now the hard work - adoption - user experience - the &#8220;so what&#8221; &#129335;&#8205;&#9794;&#65039;</p><p>Positively 29% is high when considered in the context of &#8220;tipping point&#8221;</p></blockquote><h2>Company News</h2><h3>(NEC)<a href="https://www.acnnewswire.com/press-release/english/103615/indicio-secures-investment-from-nec-x,-accelerating-a-new-era-of-user-controlled-digital-identity"> Indicio Secures Investment from NEC X, Accelerating A New Era of User-Controlled Digital Identity</a></h3><h3><a href="https://www.crypto-reporter.com/press-releases/cardano-summit-day-two-recap-trust-and-digital-identity-to-drive-blockchain-towards-enterprise-adoption-116717/">Cardano Summit Day Two Recap: Trust and Digital Identity to Drive Blockchain Towards Enterprise Adoption</a></h3><blockquote><p>Christoph Schneider of the Global Legal Entity Identifier Foundation explored the infrastructure requirements of building trust-minimized distributed systems in enterprise environments, outlining the importance of safe, secure, scalable and reliable infrastructure, stating businesses have &#8220;a lot to gain in this decentralized system.&#8221; The panel emphasized that trust minimized doesn&#8217;t mean less trust, but rather more verification. &#8220;Now is the time for corporates, and or banks to get ready for trade and payments in four or five years,&#8221; Blockdaemon&#8217;s Stefan Schmitt urged. &#8220;That will be verifiable proof on chain, authentication and distributed ledger payments.&#8221;</p></blockquote><h3><a href="https://idtechwire.com/andreessen-horowitz-urges-us-treasury-to-adopt-decentralized-digital-id-for-crypto-aml/">Andreessen Horowitz Urges US Treasury to Adopt Decentralized Digital ID for Crypto AML</a></h3><blockquote><p>In its submission to FinCEN, the Treasury&#8217;s Financial Crimes Enforcement Network, a16z proposed a fundamental shift away from the traditional model where every financial service provider must collect and report detailed personal identifiable information. This old model, the firm argues, creates massive, centralized honeypots of data (like names, addresses, and social security numbers) that are prime targets for hackers.</p><p>The firm&#8217;s proposed solution centers on <a href="https://idtechwire.com/identity-com-launches-mobile-app-for-secure-digital-identity-management/">Decentralized Identifiers (DIDs) and Verifiable Digital Credentials</a> (VDCs). This user-centric model separates the act of identity verification from the act of identity use.</p></blockquote><h2>Protocols using Verifiable Credentials</h2><h3><a href="https://eclipse-dataspace-dcp.github.io/decentralized-claims-protocol/v1.0.1/">Eclipse Decentralized Claims Protocol v1.012 November 2025</a></h3><blockquote><p>Dataspaces require the ability to communicate participant identities and credentials to secure data access. This specification defines a set of protocols for asserting participant identities, issuing verifiable credentials, and presenting verifiable credentials using a decentralized architecture for verification and trust.</p></blockquote><h2>Learning the Lingo of Identity</h2><h3><a href="https://www.dock.io/post/entity-resolution">Entity Resolution: What is it and why is it important?</a></h3><ul><li><p>How Does Entity Resolution Work?</p></li><li><p>Entity Resolution and Customer Data Accuracy</p></li><li><p>Challenges in Achieving Effective Entity Resolution</p></li><li><p>Entity Resolution Use Cases: Real-World Applications Across Industries</p></li><li><p>Entity Resolution Techniques: How Businesses Achieve Data Matching Accuracy</p></li></ul><h3><a href="https://arxiv.org/abs/2511.05572">AgriTrust: a Federated Semantic Governance Framework for Trusted Agricultural Data Sharing</a></h3><blockquote><p>The &#8220;AgData Paradox&#8221;&#8212;where agricultural data remains siloed despite its recognized value due to lack of trust and interoperability&#8212;is addressed by AgriTrust, a federated semantic governance framework combining multi-stakeholder governance with a blockchain-agnostic ontology for true semantic interoperability. Case studies across Brazilian coffee, soy, and beef supply chains demonstrate that AgriTrust enables verifiable provenance, automates compliance, and creates new revenue streams, transforming data sharing from a trust dilemma into a governed, automated operation.</p></blockquote><h3><a href="https://indicio.tech/blog/5-things-indicio-is-excited-about-at-phocuswright-2025/">5 things Indicio is excited about at Phocuswright 2025</a></h3><ul><li><p>Digital Travel Credentials (DTCs)</p></li><li><p>AI and Verifiable Credentials for travel customer service</p></li><li><p>Age assurance technology in travel</p></li><li><p>Government DTC-2 type deployments</p></li><li><p>Building for the European Union Digital Identity (EUDI)</p></li></ul><h3><a href="https://hackernoon.com/humanity-protocol-integrates-open-finance-into-human-id">Humanity Protocol Integrates Open Finance into Human ID</a></h3><blockquote><p>Humanity Protocol, an on-chain digital identity solution provider, today announced a new integration that brings together Mastercard&#8217;s open finance connectivity with Humanity Protocol&#8217;s identity verification platform Human ID.</p></blockquote><h3><a href="https://blog.identity.foundation/dif-newsletter-55/">DIF Steering Committee Election Results</a></h3><ul><li><p><a href="https://www.linkedin.com/in/jcebersbach/?ref=blog.identity.foundation">JC Ebersbach</a> (identinet)</p></li><li><p><a href="https://www.linkedin.com/in/mtmckinney/?ref=blog.identity.foundation">Matt McKinney</a> (ArcBlock, AIGNE)</p></li><li><p><a href="https://www.linkedin.com/in/ericscouten/?ref=blog.identity.foundation">Eric Scouten</a> (Adobe)</p></li></ul><ul><li><p><a href="https://www.linkedin.com/in/samcurren/?ref=blog.identity.foundation">Sam Curren</a> (Indicio)</p></li><li><p><a href="https://www.linkedin.com/in/rouvenheck/?ref=blog.identity.foundation">Rouven Heck</a> (Fidenexum)</p></li><li><p><a href="https://www.linkedin.com/in/markus-sabadello-353a0821/?ref=blog.identity.foundation">Markus Sabadello</a> (DanubeTech)</p></li></ul><h2>AI and Identity</h2><h3>(MeeCo) <a href="https://www.linkedin.com/posts/meeco-me_agentic-commerce-activity-7387411805083508737-nvlk/?utm_source=share&amp;utm_medium=member_ios&amp;rcm=ACoAAAAAZUMBU8SalbYc2xiqRyIGnrd7yxmrY8A">The future of commerce isn&#8217;t just digital &#8212; it&#8217;s agentic.</a></h3><h3><a href="https://agenticiam.ai/call-for-participants-peer-benchmarking-of-mcp-governance-acd38ecb36a7">Call for Participants: Peer Benchmarking of MCP Governance</a></h3><blockquote><p>In particular, we are looking for enterprises that currently have (or are quickly approaching) ~100+ MCP Servers.</p></blockquote><h3><a href="https://www.linkedin.com/pulse/new-vital-ai-fraud-signal-customer-present-vs-jamie-smith--paoke/?trackingId=fGWkk4PqTpO%2BHuagUKyGbQ%3D%3D">The new vital AI fraud signal: &#8216;Customer Present&#8217; vs. &#8216;Customer NOT Present&#8217;</a></h3><h3><a href="https://doc.searls.com/personal-ai/">Personal AI</a></h3><blockquote><p>A theme throughout all those writings is the need for all of us to be on top of our digital lives: how we record and archive it, how we manage it, and how we use it to better inform and interact with each other and with the organizations we engage. To my knowledge, nothing yet addresses that collection needs, and is ours and not just a service by some giant. If you think I have that wrong, tell me how.</p></blockquote><h3><a href="https://www.linkedin.com/posts/davidjcohn_agentic-workflows-explained-an-in-depth-activity-7389697308717789186-pFWV/?utm_source=share&amp;utm_medium=member_ios&amp;rcm=ACoAAAAAZUMBU8SalbYc2xiqRyIGnrd7yxmrY8A">Agentic Workflows Explained - an in-depth but simple guide for Product Teams</a></h3><h3><a href="https://www.securityinfowatch.com/ai/article/55326177/ai-agents-are-the-new-workload-what-that-means-for-security">AI Agents Are the New Workload: What That Means for Security</a></h3><h3>(Alan Karp) <a href="https://www.linkedin.com/posts/alanhkarp_iiw-aiw-activity-7391222507598643202-jpCC/?utm_source=share&amp;utm_medium=member_ios&amp;rcm=ACoAAAAAZUMBU8SalbYc2xiqRyIGnrd7yxmrY8A">We should be focusing less on agent identity and more on identifying the responsible party. What do you think?</a></h3><h3>(Alan Karp) <a href="https://www.linkedin.com/posts/alanhkarp_ai-agent-identity-or-identifier-the-easiest-activity-7394426845611540480-8aTF/">AI Agent: Identity or Identifier?</a></h3><h3>(Alan Karp) <a href="https://www.linkedin.com/feed/update/urn:li:activity:7391222507598643202/">AI Agent Identity is not What You Need</a></h3><h3><a href="https://sverhulst.medium.com/the-weaponisation-of-openness-toward-a-new-social-contract-for-data-in-the-ai-era-fb9f49ef6109">The Weaponisation of Openness? Toward a New Social Contract for Data in the AI Era</a></h3><h3><a href="https://agenticstate.org/paper.html">Agentic State Vision Paper</a></h3>]]></content:encoded></item><item><title><![CDATA[Identosphere 252 Nov 3-9: UK Identity • OpenID Fnd Verifiable Credentials Help Address Fraud • Web of Trust Map • The Role of the Unique Identifiers in civil registration]]></title><description><![CDATA[This is the weekly Identosphere Newsletter sharing highlights from around the web covering Decentralized and Self-Sovereign Identity curated by Kaliya Young, Identity Woman.]]></description><link>https://newsletter.identosphere.net/p/identosphere-252-nov-3-9-uk-identity</link><guid isPermaLink="false">https://newsletter.identosphere.net/p/identosphere-252-nov-3-9-uk-identity</guid><dc:creator><![CDATA[IdentityWoman]]></dc:creator><pubDate>Thu, 13 Nov 2025 02:03:19 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!RSPF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F831b9799-136f-4989-ab01-6e0039caa5a6_1600x895.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!IEr9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!IEr9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png 424w, https://substackcdn.com/image/fetch/$s_!IEr9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png 848w, https://substackcdn.com/image/fetch/$s_!IEr9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png 1272w, https://substackcdn.com/image/fetch/$s_!IEr9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!IEr9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png" width="1344" height="256" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:256,&quot;width&quot;:1344,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!IEr9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png 424w, https://substackcdn.com/image/fetch/$s_!IEr9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png 848w, https://substackcdn.com/image/fetch/$s_!IEr9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png 1272w, https://substackcdn.com/image/fetch/$s_!IEr9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><h3>Upcoming</h3><ul><li><p><a href="https://liminal.co/demo-day/redefining-age-assurance/">Redefining Age Assurance</a> November 19 9:30 AM - 12:10 PM ET Virtual</p></li><li><p><a href="https://sidi-hub.community/sidi-hub-pre-conference-workshop-at-trustech-tuesday-2nd-december-2025-14-00-18-00-register-interest-spots-are-limited/">SIDI Hub Pre-Conference Workshop @ TRUSTECH 2025</a> - Paris, France | Tuesday, 2 December 2025 | 14:00 &#8211; 18:00 CET</p></li><li><p>Join us at the<a href="https://www.1edtech.org/event/dc/summit/2026"> 1EdTech Digital Credentials Summit</a> in Philadelphia, February 18-20, 2026.</p></li><li><p><a href="https://didunconf.africa/">DID Unconference Africa</a> (an IIW Regional Event) Feb 24-26, 2026 Cape Town</p></li></ul><h2>Hiring</h2><h3><a href="https://www.uni.lu/en/jobs/research-associate-postdoc-position-in-computer-science-on-the-security-and-privacy-of-digital-identity-wallets/">Research Associate (PostDoc) Position in Computer Science on the Security and Privacy of Digital Identity Wallets</a></h3><blockquote><p>The candidate will be funded through an industry partnership with Luxembourg&#8217;s Ministry for Digitalisation, as well as other industry partnerships or public research projects. Carry out research in the field of digital identity wallets,</p></blockquote><h2>Engaging with Governments</h2><h3>Submission to UK Government <a href="https://committees.parliament.uk/writtenevidence/151159/html/">Harnessing the potential of new digital forms of identification</a></h3><blockquote><p>Evidence Submission to The Home Affairs Select Committee House of Commons: &#8220;Written evidence submitted by The Age Verification Providers Association (HAR3318)</p><p>So, the first question for the Committee is why would the government now wish to invest millions of pounds and take several years to re-invent the wheel and create a parallel government-issued</p><p>alternative to the existing solution already implemented by the same government?</p></blockquote><h3><a href="https://www.biometricupdate.com/202511/physical-id-private-sector-alternatives-pitched-to-save-uk-digital-identity-plan">Physical ID, private sector alternatives pitched to save UK digital identity plan</a></h3><h3>(Tony Blair Institute) [Report] <a href="https://assets.ctfassets.net/75ila1cntaeh/2yqHZ1LZQG8xBqrI5OWQSq/9a7994557c71f89288fcad2d0bdbe447/1P9iwbjnZwHgeU4EZfKDqs--090024092025">Time for Digital ID: A New Consensus for a State That Works</a></h3><blockquote><p>Public-opinion research commissioned by the Tony Blair Institute for Global Change (TBI), published for the first time in this paper, shows that digital ID enjoys majority support among the British public, with 62 per cent in favour and just 19 per cent opposed.</p></blockquote><h3>(Nat Sakamura) [Japan] <a href="https://www.sakimura.org/en/2025/11/7725/">Digital Agency: First Expert Meeting on Attribute Certification Issues</a></h3><blockquote><p>I participated in the <a href="https://www.digital.go.jp/councils/vc-diw-governance/2c9c78e4-4cb5-4ef0-a3e5-6fd461d0ef84">First meeting</a> of Digital Agency&#8217;s &#8220;<a href="https://www.digital.go.jp/councils/vc-diw-governance">Experts&#8217; Committee on Attribute Certification Issues</a>&#8220; remotely as a committee member</p></blockquote><h3><a href="https://humancolossus.foundation/blog/voting-without-tracing">Switzerland&#8217;s E-Challenges &#8212; And What the World Can Learn</a></h3><blockquote><p>As a global leader in direct democracy, Switzerland faces a unique test: how to scale secure, private, and verifiable E-Collecting, E-Voting, national E-ID, patient health records across 26 cantons &#8212; without eroding public trust and losing digital sovereignty.</p></blockquote><h3><a href="https://diacc.ca/2025/11/03/diacc-ai-consultation-submission-to-the-federal-government/">DIACC AI Consultation Submission to the [Canadian] Federal Government</a></h3><blockquote><p>Canada has the opportunity not only to develop world-class AI capabilities, but also to build an ecosystem where AI innovation and responsible deployment are enabled by a strong foundation of digital trust, identity, authentication, and interoperability.<a href="https://diacc.ca/"> DIACC&#8217;s</a> mission is to accelerate the adoption of digital trust by enabling privacy-respecting, secure, interoperable digital trust and identity verification services through the<a href="https://diacc.ca/2016/08/11/pctf-overview/"> DIACC Pan-Canadian Trust Framework (PCTF)</a>.</p></blockquote><h3>(UIDAI) [Video] <a href="https://uidai.gov.in/en/webinar.html">Verify your users through Aadhaar Verifiable Credentials &#8211; in a privacy preserving manner</a></h3><h3><a href="https://rewiregov.substack.com/p/making-a-case-for-a-digital-public?r=1g143&amp;utm_campaign=post&amp;utm_medium=web&amp;triedRedirect=true">Making a case for a Digital Public Infrastructure (DPI) Act for America</a></h3><blockquote><p>America&#8217;s current digital landscape is a patchwork of systems across states, agencies and private companies and misses an interoperability layer. This means fragmented identity verification, uneven instant payment networks, and siloed data exchange rules and mechanisms. This fragmentation not only frustrates citizens but also costs taxpayers billions, leads to inefficiency and fraud.</p></blockquote><h3><a href="https://www.linkedin.com/smart-links/AQF-YDLHBlGtBA/0062d522-9edc-4502-8b3b-81667a441456">European Digital Identity Framework as part of eIdAS - Timeline</a></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!RSPF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F831b9799-136f-4989-ab01-6e0039caa5a6_1600x895.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!RSPF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F831b9799-136f-4989-ab01-6e0039caa5a6_1600x895.png 424w, https://substackcdn.com/image/fetch/$s_!RSPF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F831b9799-136f-4989-ab01-6e0039caa5a6_1600x895.png 848w, https://substackcdn.com/image/fetch/$s_!RSPF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F831b9799-136f-4989-ab01-6e0039caa5a6_1600x895.png 1272w, https://substackcdn.com/image/fetch/$s_!RSPF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F831b9799-136f-4989-ab01-6e0039caa5a6_1600x895.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!RSPF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F831b9799-136f-4989-ab01-6e0039caa5a6_1600x895.png" width="1456" height="814" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/831b9799-136f-4989-ab01-6e0039caa5a6_1600x895.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:814,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!RSPF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F831b9799-136f-4989-ab01-6e0039caa5a6_1600x895.png 424w, https://substackcdn.com/image/fetch/$s_!RSPF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F831b9799-136f-4989-ab01-6e0039caa5a6_1600x895.png 848w, https://substackcdn.com/image/fetch/$s_!RSPF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F831b9799-136f-4989-ab01-6e0039caa5a6_1600x895.png 1272w, https://substackcdn.com/image/fetch/$s_!RSPF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F831b9799-136f-4989-ab01-6e0039caa5a6_1600x895.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>Verifiable Credentials Help Address Fraud</h2><h3>(OIDF) [Blog Post] <a href="https://openid.net/verifiable-credentials-a-valuable-tool-in-the-fight-against-rising-id-fraud/">Verifiable credentials: a valuable tool in the fight against rising ID fraud?</a></h3><h3>[Report] <a href="https://openid.net/wp-content/uploads/2025/11/Proposed-mDL-Metadata-Framework-to-support-KYC-CIP-Compliance-for-the-United-States.pdf">Proposed mDL Metadata Framework to support KYC &amp; CIP Compliance for the United States</a></h3><h3>[Report] <a href="https://openid.net/wp-content/uploads/2025/11/WG-Extended-Metadata-Framework-Considerations.pdf">Harmonized mDL Metadata for eKYC &amp; CIP: Comparative Analysis and Implementation Guidance</a></h3><h2>Supply Chains</h2><h3>RBA Launches Interoperable Data Exchange for Supply Chain Transparency</h3><blockquote><p>Large-scale pilot of the Responsible Business Transparency Protocol is underway. The Responsible Business Alliance (RBA) today announced the live implementation of its Responsible Business Transparency Protocol (RBTP), a data exchange protocol built on the United Nations Transparency Protocol (UNTP) and World Wide Web Consortium (W3C) verifiable credentials.</p></blockquote><h2>Standards</h2><h3><a href="https://w3c.github.io/vc-bitstring-status-list-test-suite/">VC Bitstring Status List Interoperability Report 1.0: Test Interoperability Report for Verifiable Credentials status 02 November 2025</a></h3><h3><strong><a href="https://w3c-ccg.github.io/vcalm/">VCALM v0.9: </a></strong><a href="https://w3c-ccg.github.io/vcalm/">A Verifiable Credential API for Lifecycle Management</a></h3><h2>WorldCoin Watch Continues</h2><h3><a href="https://www.identity.com/worldcoins-orb-wants-to-prove-youre-human-but-at-what-cost/">Worldcoin&#8217;s Orb Scans Your Iris&#8212;But at What Cost?</a></h3><p></p><h2>Thoughtful</h2><h3>(David Birch) <a href="https://www.forbes.com/sites/davidbirch/2025/11/04/cybersecurity-is-a-digital-identity-problem-and-we-must-deal-with-it/">Cybersecurity Is A Digital Identity Problem And We Must Deal With It</a></h3><blockquote><p>I am skeptical about maximal SSI, because I think that most people (e.g., me) lack the persistent competence necessary to manage identities for themselves, but I think some form of custodial SSI where the identities are managed by regulated institutions on behalf of customers make a lot of sense.</p></blockquote><h3>(IdentityWeek, Mike Leahy) <a href="https://identityweek.net/the-fiduciary-commons-restoring-ordered-liberty-in-the-age-of-data/">The fiduciary commons: restoring ordered liberty in the age of data</a></h3><blockquote><p>This Article proposes a corrective: the fiduciary commons, a legal and institutional architecture that recasts the relationship between individuals, institutions, and information as one of entrustment rather than ownership. Drawing from property theory, information law, fiduciary doctrine, and constitutional liberty jurisprudence, it argues that while databases may be proprietary, the underlying facts they contain exist within an unownable commons&#8212; a domain of truth that must remain free from enclosure.</p></blockquote><h3><a href="https://humancolossus.foundation/blog/hcf-to-participate-in-gc25-advancing-global-digital-collaboration-on-wallets-amp-credentials-9j6zg-n3lcg">Think Globally, Act Locally: HCF at the Intersection of Global Digital Governance and Local Implementation</a></h3><blockquote><p>The participation of the Human Colossus Foundation in both an international and Swiss events underlines the necessity of new globally accessible protocols for digital authenticity and integrity.</p></blockquote><h3>(SpruceID) <a href="https://blog.spruceid.com/translating-privacy-law-into-digital-architecture/">Translating Privacy Law into Digital Architecture</a></h3><blockquote><p>Explore how statutory privacy protections become real through code and technical standards.</p></blockquote><h3>(Heather Flanagan) <a href="https://sphericalcowconsulting.com/2025/11/04/the-infrastructure-we-forgot-we-built/">The Infrastructure We Forgot We Built</a></h3><blockquote><p>So let&#8217;s talk about that outage. On 19 October 2025, an AWS outage (of course <a href="https://www.theregister.com/2025/10/23/amazon_outage_postmortem/?td=rt-3a">it was the DNS</a>) made the Internet wobble. Payments failed. Authentication broke. Delivery systems froze. For a few hours, the digital economy looked a lot less digital and a lot more fragile.</p></blockquote><h2>Agentic IA Identity</h2><h3><a href="https://arxiv.org/html/2511.03434v1">Inter-Agent Trust Models: A Comparative Study of Brief, Claim, Proof, Stake, Reputation and Constraint in Agentic Web Protocol Design&#8212;A2A, AP2, ERC-8004, and Beyond</a></h3><blockquote><p>This paper comparatively analyzes six trust models (Brief, Claim, Proof, Stake, Reputation, and Constraint) in emerging inter-agent protocols like Google&#8217;s A2A and Ethereum&#8217;s ERC-8004, examining how LLM-specific vulnerabilities such as prompt injection and hallucination expose weaknesses in purely reputational or claim-based approaches. The authors argue no single mechanism suffices and recommend hybrid &#8220;trustless-by-default&#8221; architectures that anchor high-impact actions in cryptographic proof and staked collateral, augmented by identity claims and reputation overlays for flexibility.</p></blockquote><h3>(Heather Flanagan) <a href="https://sphericalcowconsulting.com/2025/09/02/roads-robots-and-responsibility/amp/">Roads, Robots, and Responsibility: Why Agentic AI Needs Identity Infrastructur</a>e</h3><blockquote><p>Identity in the age of agentic AI? Same deal. It&#8217;s infrastructure. And just like a good road system, it needs to be engineered with care, built on solid standards, and ready for traffic we can&#8217;t even imagine yet.</p></blockquote><h2>Making Sense of it All</h2><h3>[Report] <a href="https://www.weboftrust.org/pdf/web-of-trust-map-report---the-global-infrastructure-of-decentralized-digital-identity.pdf">Web of Trust Map: The Global Infrastructure of Decentralized Digital Identity</a></h3><blockquote><p>Decentralized identity technologies have been on the rise for the past decade, yet until recently there had never been a systematic effort to map all initiatives claiming to use the technology or aligning with self-sovereign identity principles. To address this, Key State Capital initiated the Web of Trust Map research in 2022, documenting government-affiliated decentralized identity projects, consortia, collaborators, and technologies. This report, based on projects announced up to July 2023, provides an overview of the ecosystem&#8217;s maturity, the dominant technologies, and the actors driving development.</p></blockquote><h3>[Podcast] <a href="https://www.hopae.com/blog/digital-identity-adoption-global-trends-challenges-and-the-path-to-trust?utm_campaign=10452325-blog&amp;utm_source=linkedin&amp;utm_medium=social&amp;utm_content=voi-102025-key-state-capital">Digital identity adoption: Global trends, challenges, and the path to trust</a></h3><blockquote><p>This month, we spoke with <strong><a href="https://www.linkedin.com/in/danielaicano/">Ivette Cano</a></strong>, Chief Marketing Officer<strong> </strong>and<strong> <a href="https://www.linkedin.com/in/nizagonzalez/">Niza Gonz&#225;lez</a></strong>, Head of Data at <strong>Key State Capital</strong>, an early-stage venture firm and <strong>ecosystem catalyst driving innovation in decentralized identity</strong>.</p></blockquote><h3>[Report] (UNICEF) <a href="https://getinthepicture.org/sites/default/files/resources/Unique%20Identifiers%20in%20Civil%20Registration%20final%20030925.pdf">The Role of the Unique Identifiers in Civil Registration and Vital Statistics and National Identification Systems</a></h3><blockquote><p>Unique identifiers, often in the form of a unique identification number (UIN), are critical in the management of administrative records&#8230;Unique identifiers also pose specific risks for people in vulnerable situations and groups at risk of marginalization, including those relating to data protection and privacy, exclusion through system design or technology limitations and failures, and unintended uses of linked data&#8230;In light of these benefits and risks, due consideration should be given to developing both robust identifiers and strong supporting systems.</p></blockquote>]]></content:encoded></item><item><title><![CDATA[Identosphere 251 Oct 27-Nov 2: Telecom and Decentralized ID • OIDF Gov Feedback • New Collaborations • Verifiable Credential Rendering Methods Final • Thoughfulness]]></title><description><![CDATA[This is the weekly Identosphere Newsletter sharing highlights from around the web covering Decentralized and Self-Sovereign Identity curated by Kaliya Young, Identity Woman.]]></description><link>https://newsletter.identosphere.net/p/identosphere-251-oct-27-nov-2-telecom</link><guid isPermaLink="false">https://newsletter.identosphere.net/p/identosphere-251-oct-27-nov-2-telecom</guid><dc:creator><![CDATA[IdentityWoman]]></dc:creator><pubDate>Wed, 05 Nov 2025 09:22:59 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!4qvV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1d43f27-4f13-4274-a12f-56614c6af69e_1280x720.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!IEr9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!IEr9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png 424w, https://substackcdn.com/image/fetch/$s_!IEr9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png 848w, https://substackcdn.com/image/fetch/$s_!IEr9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png 1272w, https://substackcdn.com/image/fetch/$s_!IEr9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!IEr9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png" width="1344" height="256" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:256,&quot;width&quot;:1344,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!IEr9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png 424w, https://substackcdn.com/image/fetch/$s_!IEr9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png 848w, https://substackcdn.com/image/fetch/$s_!IEr9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png 1272w, https://substackcdn.com/image/fetch/$s_!IEr9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><h2>UpComing</h2><ul><li><p><a href="https://www.dock.io/live-event-eudi-key-takeaways-from-europes-largest-digital-id-pilot">EUDI: Key Takeaways from Europe&#8217;s Largest Digital ID Pilot</a> November 12, 9am PST Virtual</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4qvV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1d43f27-4f13-4274-a12f-56614c6af69e_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4qvV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1d43f27-4f13-4274-a12f-56614c6af69e_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!4qvV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1d43f27-4f13-4274-a12f-56614c6af69e_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!4qvV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1d43f27-4f13-4274-a12f-56614c6af69e_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!4qvV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1d43f27-4f13-4274-a12f-56614c6af69e_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4qvV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1d43f27-4f13-4274-a12f-56614c6af69e_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d1d43f27-4f13-4274-a12f-56614c6af69e_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4qvV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1d43f27-4f13-4274-a12f-56614c6af69e_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!4qvV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1d43f27-4f13-4274-a12f-56614c6af69e_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!4qvV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1d43f27-4f13-4274-a12f-56614c6af69e_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!4qvV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1d43f27-4f13-4274-a12f-56614c6af69e_1280x720.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><ul><li><p><a href="https://liminal.co/demo-day/redefining-age-assurance/">Redefining Age Assurance</a> November 19 9:30 AM - 12:10 PM ET Virtual</p></li><li><p><a href="https://sidi-hub.community/sidi-hub-pre-conference-workshop-at-trustech-tuesday-2nd-december-2025-14-00-18-00-register-interest-spots-are-limited/">SIDI Hub Pre-Conference Workshop @ TRUSTECH 2025</a> - Paris, France | Tuesday, 2 December 2025 | 14:00 &#8211; 18:00 CET</p></li><li><p>Join us at the<a href="https://www.1edtech.org/event/dc/summit/2026"> 1EdTech Digital Credentials Summit</a> in Philadelphia, February 18-20, 2026.</p></li><li><p><a href="https://didunconf.africa/">DIF Unconference Africa</a> (an IIW Regional Event) Feb 24-26, 2026 Cape Town </p></li></ul><h3>[Magazine Interview] Issue 2 <em><a href="https://domainstandard.com/">The Voice of the Quarter</a></em><a href="https://domainstandard.com/"> - The Future of Identity: Kaliya Young (aka Identity Woman) on Decentralization, Ethics, and the Web3 Frontier</a> 4 Page Interview</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!sDnp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea7b7534-af40-4f02-a61c-9bfe4fe40c7c_1198x608.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!sDnp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea7b7534-af40-4f02-a61c-9bfe4fe40c7c_1198x608.png 424w, https://substackcdn.com/image/fetch/$s_!sDnp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea7b7534-af40-4f02-a61c-9bfe4fe40c7c_1198x608.png 848w, https://substackcdn.com/image/fetch/$s_!sDnp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea7b7534-af40-4f02-a61c-9bfe4fe40c7c_1198x608.png 1272w, https://substackcdn.com/image/fetch/$s_!sDnp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea7b7534-af40-4f02-a61c-9bfe4fe40c7c_1198x608.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!sDnp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea7b7534-af40-4f02-a61c-9bfe4fe40c7c_1198x608.png" width="1198" height="608" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ea7b7534-af40-4f02-a61c-9bfe4fe40c7c_1198x608.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:608,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!sDnp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea7b7534-af40-4f02-a61c-9bfe4fe40c7c_1198x608.png 424w, https://substackcdn.com/image/fetch/$s_!sDnp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea7b7534-af40-4f02-a61c-9bfe4fe40c7c_1198x608.png 848w, https://substackcdn.com/image/fetch/$s_!sDnp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea7b7534-af40-4f02-a61c-9bfe4fe40c7c_1198x608.png 1272w, https://substackcdn.com/image/fetch/$s_!sDnp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea7b7534-af40-4f02-a61c-9bfe4fe40c7c_1198x608.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>Open Wallet&#8217;s Many Projects</h2><h3><a href="https://openwallet-foundation.github.io/digital-wallet-and-agent-overviews-sig/#/wallets">Open Wallet Foundation Chart of Wallets</a></h3><h2>DIACC</h2><h3><a href="https://diacc.ca/2025/10/28/diacc-and-siros-foundation-partnership/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=diacc-and-siros-foundation-partnership">DIACC and SIROS Foundation Partner to Advance Global Leadership in Digital Trust and Interoperable Credentials</a></h3><p>Through this collaboration, DIACC and SIROS will:</p><ul><li><p>Address challenges and opportunities related to international interoperability, digital trust and identity assurance policy, and trust in specific use cases.</p></li></ul><ul><li><p>Align efforts to enhance the secure and trusted exchange of digital credentials across sectors and jurisdictions.</p></li><li><p>Develop and showcase real-world use cases proving the effectiveness of interoperable digital trust and identity solutions.</p></li><li><p>Collaborate to advance policy alignment and technical interoperability through pilot projects and testing around use cases, including: Travel, Education, Payments, Organizational/Business credentials, Labour mobility, Professional upskilling, and Academic integration</p></li></ul><h3><a href="https://diacc.ca/2025/10/28/diacc-congratulates-quebec-on-historic-adoption-of-national-digital-identity-legislation/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=diacc-congratulates-quebec-on-historic-adoption-of-national-digital-identity-legislation">DIACC Congratulates Quebec on Historic Adoption of National Digital Identity Legislation</a></h3><blockquote><p>We proudly congratulate the <a href="https://www.quebec.ca/nouvelles/actualites/details/adoption-du-projet-de-loi-no-82-des-mesures-concretes-pour-des-services-numeriques-plus-efficaces-et-securitaires-66584">Government of Quebec and the Assembl&#233;e nationale on the adoption of Bill 82, the Act respecting national digital identity</a> and amending other provisions.</p></blockquote><h2>Public Services</h2><h3><a href="https://digitalgovernmenthub.org/publications/digital-doorways-to-public-benefits-user-experiences-with-digital-identity/">Digital Doorways to Public Benefits: Beneficiary Experiences with Digital Identity</a></h3><blockquote><p>Led by the Digital Benefits Network in partnership with Public Policy Lab, the Digital Doorways research project amplifies the lived experiences of beneficiaries to provide new insights into people&#8217;s experiences with digital identity processes and technology in public benefits. This report details the project&#8217;s findings, directly highlighting the voices of beneficiaries through videos and photos.</p></blockquote><h3><a href="https://digitalgovernmenthub.org/publications/implementing-benefits-eligibility-enrollment-systems-state-responses-to-h-r-1/?utm_source=DBN+CRM+Current+List&amp;utm_campaign=517dc26431-Digital_Doorways_DD_IEE&amp;utm_medium=email&amp;utm_term=0_bb8d64ad71-517dc26431-423362974">Implementing Benefits Eligibility + Enrollment Systems: State Responses to H.R. 1</a></h3><blockquote><p>This report summarizes insights from interviews with seven states on how they are adapting integrated eligibility and enrollment (IEE) systems in response to sweeping federal changes to SNAP and Medicaid under H.R. 1.</p></blockquote><h3>(SpruceID) <a href="https://blog.spruceid.com/digital-wallet-certification-the-foundation-for-interoperable-state-identity-systems/">Digital Wallet Certification: The Foundation for Interoperable State Identity Systems</a></h3><blockquote><p>SpruceID believes that additional legislation should be enacted to establish a formal certification program for wallets, issuers, and potentially verifiers participating in a state digital identity ecosystem. The legislation should specify that the designated regulating entity may conduct audits and certify providers directly, or delegate certification responsibilities to qualified external organizations, provided such delegation is formally approved by the appropriate higher authority.</p></blockquote><h2>Telecom</h2><h3><a href="https://www.dock.io/post/gsma-telefonica-tech-tmt-id-and-dock-labs-collaborate-to-reinvent-call-centre-authentication">GSMA, Telef&#243;nica Tech, TMT ID and Dock Labs collaborate to reinvent call centre authentication</a></h3><blockquote><p>End-to-end encrypted communication: Built on the DIDComm protocol, ensuring all exchanges between the call centre and the customer&#8217;s app remain tamper-proof and confidential.</p><p><strong>Verifiable Credentials</strong>: Enable cryptographically signed proofs of identity (e.g. account ownership).</p><p>(send to Rebekah &amp; Peirce)</p></blockquote><h3><a href="https://atis.org/resources/the-future-of-digital-identity-a-self-sovereign-identity-technical-implementation-guide-for-the-telecom-provider/">The Future of Digital Identity: A Self-Sovereign Identity Technical Implementation Guide for the Telecom Provider</a></h3><h2>Latest on DPI</h2><h3><a href="https://dpimap.org/iipp-state-of-dpi-report-2025.pdf">2025 State of Digital Public Infrastructure Report OCTOBER 2025 A Look at Measurement and Prevalence as DPI Transitions from Experiment to Scale</a></h3><h3><a href="https://documents.worldbank.org/en/publication/documents-reports/documentdetail/099537409182599392">Ten Years of Impact : Putting People at the Center of Digital Transformation - Annual Report 2024-25 (English)</a></h3><h3><a href="https://reports.weforum.org/docs/WEF_Advancing_Digital_Trade_2025.pdf">(WEF) [Report] Advancing Digital Trade: Insights from the UAE TradeTech Regulatory Sandbox</a></h3><blockquote><p>To that end, the report presents concrete, forward-looking policy recommendations: broader adoption of the United Nations Commission on International Trade Law (UNCITRAL) Model Law on Electronic Transferable Records (MLETR), formal recognition of decentralized identity and verifiable credentials and the development of regulatory pathways for tokenized trade assets, digital bank guarantees and stablecoin-based settlement tools.</p></blockquote><h2>Thoughtful</h2><h3><a href="https://www.finextra.com/blogposting/29727/credentials-not-anchored-in-law---versus-anchored">Credentials not anchored in law - versus anchored</a></h3><h3>(Heather Flanagan) <a href="https://sphericalcowconsulting.com/2025/10/28/internet-standards-fragmented-world/">Can Standards Survive Trade Wars and Sovereignty Battles?</a></h3><h3>Series by <strong><a href="https://www.linkedin.com/in/vparthasarathi/">Parthasarathi V</a></strong></h3><ul><li><p><a href="https://www.linkedin.com/pulse/trust-infrastructures-parthasarathi-v-wj3wc/">Trust Infrastructures</a></p></li><li><p><a href="https://www.linkedin.com/pulse/thoughts-identity-trust-parthasarathi-v-ly0cc/">Thoughts on Identity = Trust!</a></p></li><li><p><a href="https://www.linkedin.com/posts/vparthasarathi_digitalpublicinfrastructure-dailyrundownindia-activity-7292845032749903872-7FNU/">The emerging Wallets Economy</a></p></li></ul><h3><a href="https://mhrsntrk.com/blog/evil-web-and-the-consent-trap">Evil Web &amp; The Consent Trap</a></h3><blockquote><p>- How SSI and DIDs Can Fix Consent&#8212;and Fix Trust</p></blockquote><h3><a href="https://www.blockchaincommons.com/musings/musings-exodus-protocol/">Musings of a Trust Architect: The Exodus Protocol: Five Patterns for Creating Autonomous Infrastructures</a></h3><blockquote><p>ABSTRACT: Digital infrastructure is built on sand due to its control by centralized entities, most of which are focused on profit over service. We need Exodus Protocol services that build infrastructure without centralization, ensuring its continuation into the far future. Bitcoin offers our prime example to date. Five design patterns suggest how to create similar services for coordination, collaboraiton, and identity.</p></blockquote><h3>(Christopher Allen) [Video] <a href="https://www.youtube.com/watch?v=NBURjbIerw8">Sad State of Decentralized Identity, and What To Do About It</a></h3><h3><a href="https://mhrsntrk.com/blog/enabling-a-sustainable-future-through-self-sovereign-identity">Enabling a Sustainable Future through Self-Sovereign Identity</a></h3><h3><a href="https://mhrsntrk.com/blog/the-decentralization-utopia">The Decentralization Utopia</a></h3><h2>Virtual Identities Department</h2><h3><a href="https://restofworld.org/2025/metaverse-kpop-idols/">The metaverse is rewriting the rules of who can be a K-pop star</a></h3><p>The global market for virtual idols and streamers is projected to reach $4 billion by 2029,</p><h2>AI &amp; Identity</h2><h3><a href="https://indicio.tech/blog/five-reasons-why-ai-needs-decentralized-identity/">(Indicio ) Five reasons why AI needs decentralized identity</a></h3><h2>AI Agents and Payments</h2><h3><a href="https://www.finextra.com/blogposting/29723/deep-dive-what-a16zs-state-of-crypto-2025-really-says-about-stablecoins-and-ai">Deep Dive: What a16z&#8217;s &#8220;State of Crypto 2025&#8221; Really Says About Stablecoins and AI</a></h3><blockquote><p>A16z&#8217;s report calls out new protocol standards like &#8220;x402&#8221; (a riff on HTTP 402 Payment Required) emerging as the financial backbone for autonomous AI agents. These standards would let AI agents make micro-transactions, pay for API calls, and settle payments with no intermediaries</p></blockquote><h2>Productive Feedback to US Gov</h2><h3><a href="https://openid.net/oidf-offers-standards-roadmap-for-genius-act/">OIDF offers standards roadmap for GENIUS Act</a></h3><blockquote><p>Executive Director of the OpenID Foundation, Gail Hodges, said: &#8220;This submission is part of our broader engagement with policymakers in the US and abroad on digital identity and financial innovation. The US is well placed to demonstrate how smart policies can leverage standards and conformance to deliver secure, interoperable identity infrastructure for a rapidly evolving financial sector.&#8221;</p><p>The full letter and supporting documents can be found here: <a href="https://openid.net/wp-content/uploads/2025/10/Letter-OIDF-_TREAS-DO-2025-0070-0001.pdf">Letter OIDF comment on TREAS-DO-2025-0070-0001.</a></p></blockquote><h3><a href="https://openid.net/oidf-submits-comments-on-cfpb-data-rights-rule/">OIDF submits comments on CFPB Data Rights Rule</a></h3><h2>Trust</h2><h3>(Cardano) <a href="https://x.com/Cardano_CF/status/1983554854745162094">We just published a new eBook on securing trust in the Internet of Things.</a></h3><h3><a href="https://www.forbes.com/councils/forbestechcouncil/2025/10/30/architecting-trust-in-a-distrustful-world-the-digital-leaders-role/">Architecting Trust In A Distrustful World: The Digital Leader&#8217;s Role</a></h3><blockquote><p>Centralized identity repositories have become prime targets for attackers. A shift toward decentralized identity models allows users to hold and selectively share verified credentials issued by trusted parties. This reduces the risk of mass breaches while strengthening user control over personal data. It also aligns with the growing expectation that digital identity should be as portable and user-owned as a physical wallet.</p></blockquote><h2>The Problem we are Solving</h2><h3><a href="https://www.linkedin.com/posts/alen-horvat-0418b551_verifiable-credentials-as-a-framework-for-activity-7388968814308245504-eAcE/">Verifiable Credentials, as a framework for fraud prevention, solve this problem easily.</a></h3><h2>Making Sense of it All</h2><h3><a href="https://gaia-x.gitlab.io/glossary/pdf/document.pdf">Gaia-X Glossary - glossary_25.05 Release</a></h3><h2>Education</h2><h3><a href="https://www.edsurge.com/news/2025-10-29-why-standards-and-credentials-matter-in-dual-enrollment">Why Standards and Credentials Matter in Dual Enrollment</a></h3><h3><a href="https://dgc-cgn.org/crediveras-journey-deploying-verifiable-credentials-in-high-risk-industries-with-dgsi-ts-1152023/">Credivera&#8217;s Journey: Deploying Verifiable Credentials in High-Risk Industries with DGSI/TS 115</a></h3><h2>Standards</h2><h3><a href="https://x.com/billions_ntwk/status/1984983969012543878">Digital identity standards just got official! : Billions helped write them.</a></h3><h3><a href="https://www.w3.org/news/2025/first-public-working-drafts-confidence-method-v1-0-and-verifiable-credential-rendering-methods-v0-9/">First Public Working Drafts: Confidence Method v1.0 and Verifiable Credential Rendering Methods v1.0</a></h3><h3><a href="https://www.w3.org/TR/vc-render-method/">Verifiable Credential Rendering Methods v1.0</a></h3><h2>New Collaborations</h2><h3><a href="https://www.gleif.org/en/newsroom/blog/global-vlei-hackathon-how-affinidi-and-gleif-are-accelerating-privacy-preserving-identity-for-the-ai-era">Global vLEI Hackathon: How Affinidi and GLEIF Are Accelerating Privacy-Preserving Identity for the AI Era</a></h3><h3><a href="https://t.co/X6iBwKAYIk">Affinidi and GLEIF by GLEIF</a></h3><p>GBG&#8217;s Digital ID solution is enabled through partnerships with leading industry providers including <a href="https://trinsic.id/partners/">Trinsic</a> and <a href="https://mattr.global/">MATTR</a>. To learn more about GBG&#8217;s Digital ID solution visit: <a href="https://www.gbg.com/en-us/verify-identity/digital-ids/">https://www.gbg.com/en-us/verify-identity/digital-ids/</a></p><h3>Daon: <a href="https://www.daon.com/resource/daon-launches-industry-leading-mobile-drivers-license-support-powered-by-mattrs-verifiable-credential-infrastructure/">Daon Launches Industry-Leading Mobile Driver&#8217;s License Support, Powered by MATTR&#8217;s Verifiable Credential Infrastructure</a></h3><h3><a href="https://www.biometricupdate.com/202510/biometrics-verifiable-credentials-enable-mdl-support-in-daon-mattr-partnership">Biometrics, verifiable credentials enable mDL support in Daon, Mattr partnership</a></h3><h2>Europe</h2><h3><a href="https://damienbod.com/2025/10/27/use-swiyu-the-swiss-e-id-to-authenticate-users-with-duende-and-net-aspire/">Use swiyu, the Swiss E-ID to authenticate users with Duende and .NET Aspire</a></h3><h3><a href="https://www.certifydoc.eu/blog/press-release-cert-connects-vocational-education-with-europe-verifiable-credentials-digital-identity-and-esco-harmonisation/">Press Release &#8211; CERT connects Vocational Education with Europe: verifiable credentials, digital identity and ESCO harmonisation</a></h3><h3>[Research] <a href="https://www.frontiersin.org/journals/blockchain/articles/10.3389/fbloc.2025.1682474/full">Digital citizenship: Challenges and uncertainty in applying blockchain</a></h3><blockquote><p>Colombia&#8217;s digital citizenship initiative faces limited adoption due to mistrust around data security and privacy, despite offering services like digital authentication, citizen folders, and signatures. This review suggests that blockchain-based Self-Sovereign Identity systems could rebuild trust by giving citizens greater control over their data, but only if implemented through permissioned designs with proper governance, interoperability standards, and regulatory alignment.</p></blockquote><p>[Research] <a href="https://arxiv.org/abs/2510.25477">A Study on Privacy-Preserving Scholarship Evaluation Based on Decentralized Identity and Zero-Knowledge Proofs</a></p><p>[Research] <a href="https://www.researchgate.net/publication/358508950_Identity_Model_for_Blockchain-Based_Land_Registry_System_A_Comparison">Identity Model for Blockchain-Based Land Registry System: A Comparison</a></p><p> [Research] <a href="https://www.frontiersin.org/journals/blockchain/articles/10.3389/fbloc.2025.1688287/abstract">Towards a Universal Digital Identity: A Blockchain-Based Framework for Borderless Verification</a></p>]]></content:encoded></item><item><title><![CDATA[Identoshpere 250 Oct 20-26: • NVIDIA + VCs • SEDI in Utah + Response • OpenID in ITU-T • DIF Steering Election • Edu Future Tech Stack • Inji Certify - 0.12.2]]></title><description><![CDATA[This is the weekly Identosphere Newsletter sharing highlights from around the web covering Decentralized and Self-Sovereign Identity curated by Kaliya Young, Identity Woman.]]></description><link>https://newsletter.identosphere.net/p/identoshpere-250-oct-20-26-nvidia</link><guid isPermaLink="false">https://newsletter.identosphere.net/p/identoshpere-250-oct-20-26-nvidia</guid><dc:creator><![CDATA[IdentityWoman]]></dc:creator><pubDate>Fri, 31 Oct 2025 22:15:36 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!mVG8!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff990cede-ad7c-4bc6-96ec-87b643b96c65_1134x1440.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!IEr9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!IEr9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png 424w, https://substackcdn.com/image/fetch/$s_!IEr9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png 848w, https://substackcdn.com/image/fetch/$s_!IEr9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png 1272w, https://substackcdn.com/image/fetch/$s_!IEr9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!IEr9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png" width="1344" height="256" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:256,&quot;width&quot;:1344,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!IEr9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png 424w, https://substackcdn.com/image/fetch/$s_!IEr9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png 848w, https://substackcdn.com/image/fetch/$s_!IEr9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png 1272w, https://substackcdn.com/image/fetch/$s_!IEr9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><h2>Identity and AI</h2><h3><a href="https://indicio.tech/blog/indicio-joins-nvidia-inception-program-to-bring-verifiable-credentials-to-ai-systems/">Indicio joins NVIDIA Inception Program to bring Verifiable Credentials to AI systems</a></h3><blockquote><p>Indicio has officially joined the <a href="https://www.nvidia.com/en-us/startups/">NVIDIA Inception Program</a>, a global initiative that supports startups advancing artificial intelligence and high-performance computing. Indicio will focus on applying decentralized identity and Verifiable Credential technology &#8212; in the form of <a href="https://indicio.tech/artificial-intelligence/">Indicio ProvenAI</a> &#8212; to AI systems.</p><p>ProvenAI enables AI agents and their users to authenticate each other using decentralized identifiers and <a href="https://indicio.tech/verifiable-credentials-2/">Verifiable Credentials</a>. This means an AI agent can cryptographically prove who it is interacting with and that entity can do the same &#8212; all before any data is shared.</p></blockquote><h3><a href="https://idtechwire.com/id-tech-digest-october-23-2025/">Ledger Rebrands Hardware Wallets as &#8216;Signers,&#8217; Launches &#8216;Proof of You&#8217; to Combat AI Fraud</a></h3><blockquote><p>Ledger has <a href="https://idtechwire.com/__trashed-1150__trashed/">rebranded its hardware wallets </a>as &#8220;Signers&#8221; and introduced &#8220;Proof of You&#8221; and &#8220;Proof of Authority&#8221; to counter AI impersonation and verify digital intent. The move shifts Ledger&#8217;s focus from asset storage to identity and consent verification, positioning its devices as physical anchors of trust in a deepfake-prone digital ecosystem. The new Ledger Nano Gen5 includes a Secure Element chip and touchscreen, reflecting a hardware-based response to identity manipulation in crypto and digital asset environments.</p></blockquote><h3><a href="https://securityboulevard.com/2025/10/reclaiming-control-over-secrets-correlating-credentials-to-nhis-for-safe-and-automated-remediation/">Reclaiming Control Over Secrets: Correlating Credentials to NHIs for Safe and Automated Remediation</a></h3><blockquote><p>In fast-moving, cloud-native and AI environments, the number of Non-Human Identities (NHIs), like service accounts, workload identities, ephemeral compute roles, and automation agents, has exploded. These NHIs need credentials to authenticate, but credentials are inherently fragile. They&#8217;re created rapidly, passed across system boundaries, are long-lived, and stored in a wide array of locations.</p></blockquote><h2>UTAH</h2><h3><a href="https://www.biometricupdate.com/202510/utah-officials-privacy-advocates-pitch-states-incoming-digital-id-to-public">Utah officials, privacy advocates pitch State&#8217;s incoming digital ID to public</a></h3><blockquote><p>The new, optional State-Endorsed Digital Identity (SEDI) initiative was mandated with the <a href="https://www.biometricupdate.com/202506/with-sb-260-utah-looks-to-change-the-rules-around-who-defines-identity">passage of SB 260</a> earlier this year.</p><p>Bramwell says the new digital ID will not track users or log interactions, and emphasized the security advantages of a decentralized data storage model. The architecture will also avoid the need for Utah to reissue all its residents&#8217; digital IDs if State IT systems are breached.</p></blockquote><h3><a href="https://openid.net/oidf-submits-comments-on-utahs-state-endorsed-digital-identity-rfi/">OIDF submits comments on Utah&#8217;s state-endorsed digital identity RFI</a></h3><blockquote><p>The OpenID Foundation has submitted <a href="https://openid.net/wp-content/uploads/2025/10/20251006-Utah-SEDI-RFI-Comments-from-OpenID-Foundation.pdf">its comments</a> on <a href="https://utah.bonfirehub.com/opportunities/200845">Utah&#8217;s Request for Information (RFI #AE26-1) regarding the State-Endorsed Digital Identity (SEDI) program</a>. This submission reflects the OpenID Foundation&#8217;s ongoing commitment to supporting governments worldwide as they develop digital identity frameworks that prioritize security, privacy, and interoperability.</p></blockquote><h3><a href="https://blog.spruceid.com/a-practical-checklist-to-future-proof-your-states-digital-infrastructure/">A Practical Checklist to Future-Proof Your State&#8217;s Digital Infrastructure</a></h3><blockquote><p>This actionable checklist provides clear criteria for state IT leaders, procurement officers, and policymakers to evaluate any new digital identity technology or system. Use this framework to ensure technology investments are resilient, secure, and future-proof.</p></blockquote><h2>Standards Organizations</h2><h3><a href="https://openid.net/openid-connect-core-1-0-now-published-as-itu-standard/">OpenID Connect Core 1.0 now published as ITU standard</a></h3><blockquote><p>We&#8217;re pleased to announce that <a href="https://www.itu.int/rec/T-REC-X.1285-202505-I/en">Recommendation X.1285</a>, incorporating <a href="https://openid.net/specs/openid-connect-core-1_0.html">the OpenID Connect Core 1.0 - errata set 2 specification</a>, has been officially published by the <a href="https://www.itu.int/en/Pages/default.aspx">International Telecommunication Union</a>.</p></blockquote><h3><a href="https://diacc.ca/2025/10/23/fcts-client-id-verification-achieves-diacc-pctf-certification-enhancing-digital-trust-for-legal-professionals/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=fcts-client-id-verification-achieves-diacc-pctf-certification-enhancing-digital-trust-for-legal-professionals">FCT&#8217;s Client ID Verification Achieves DIACC PCTF Certification: Enhancing Digital&#8239;Trust for Legal Professionals</a></h3><blockquote><p>Toronto, October 23, 2025 &#8211; We are thrilled to announce that <a href="https://fct.ca/">FCT</a> Client ID Verification has been <a href="https://diacc.ca/certification-program/trusted-list/">certified</a> against the <a href="https://diacc.ca/trust-framework/">Pan-Canadian Trust Framework &#8482;(PCTF)</a> Verified Person Component at LOA2. Established in 2012, <a href="https://diacc.ca/">DIACC</a> is Canada&#8217;s largest multistakeholder organization, exclusively addressing digital trust and identity verification, fostering confidence and consistency in the market through its internationally recognized framework and standardized third-party conformity assessment program.</p></blockquote><h3><a href="https://blog.identity.foundation/steering-committee-election-2025-candidate-statements/">Steering Committee Election 2025: Candidate Statements</a></h3><ul><li><p><a href="https://blog.identity.foundation/steering-committee-election-2025-candidate-statements/#sam-curren-indicio-us">Sam Curren</a> (<a href="https://indicio.tech/?ref=blog.identity.foundation">Indicio</a>, US)</p></li><li><p><a href="https://blog.identity.foundation/steering-committee-election-2025-candidate-statements/#jan-christoph-ebersbach-identinet-germany">Jan-Christoph Ebersbach</a> (<a href="https://identinet.io/?ref=blog.identity.foundation">Identinet</a>, Germany)</p></li><li><p><a href="https://blog.identity.foundation/steering-committee-election-2025-candidate-statements/#rouven-heck-independent">Rouven Heck</a> (Independent, US)</p></li><li><p><a href="https://blog.identity.foundation/steering-committee-election-2025-candidate-statements/#matthew-mckinney-arcblock-us">Matthew McKinney</a> (<a href="https://www.arcblock.io/en?ref=blog.identity.foundation">ArcBlock</a>, US)</p></li><li><p><a href="https://blog.identity.foundation/steering-committee-election-2025-candidate-statements/#doug-rice-hospitality-network-us">Doug Rice</a> (<a href="https://hospitalitytech.com/?ref=blog.identity.foundation">Hospitality Technology Network</a>, US)</p></li><li><p><a href="https://blog.identity.foundation/steering-committee-election-2025-candidate-statements/#markus-sabadello-danubetech-austria">Markus Sabadello</a> (<a href="https://danubetech.com/?ref=blog.identity.foundation">DanubeTech</a>, Austria)</p></li><li><p><a href="https://blog.identity.foundation/steering-committee-election-2025-candidate-statements/#eric-scouten-adobe-us">Eric Scouten</a> (<a href="https://c2pa.org/?ref=blog.identity.foundation">Adobe</a>, US)</p></li><li></li></ul><h3><a href="https://diacc.ca/2025/10/28/leading-the-way-client-idv-success-in-canadas-legal-sector/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=leading-the-way-client-idv-success-in-canadas-legal-sector">[DIACC] Leading the Way: Client IDV Success in Canada&#8217;s Legal Sector</a></h3><blockquote><p>Canada&#8217;s legal sector has achieved over 700,000 client identity verification (client IDV) transactions in a single year (October 1, 2023 &#8211; September 30, 2024), proving that secure, convenient digital client IDV can operate at scale in highly regulated environments.</p><p>DIACC member organizations are leading this transformation in a $50-70M legal-sector verification market that points to an economic opportunity of $500M to $1B spanning financial services, healthcare, telecommunications, and government.</p></blockquote><h3><a href="https://www.linkedin.com/pulse/digital-identity-verifiable-credentials-from-declarative-trust-8f6of/">Digital Identity &amp; Verifiable Credentials : From declarative trust to verifiable trust</a></h3><blockquote><p>The generalisation of digital identity no longer falls under the concept. It is now a well-established global trend. According to Gartner, more than 500 million people should use a digital identity wallet by 2026. In Europe, the Commission aims for effective access for 80% of citizens before 2030. The global market of digital identity, estimated at 30.8 billion dollars in 2023, will reach more than 100 billion in 2030, that is an average annual growth of nearly 18% according to Fortune Business Insights.</p></blockquote><h2>Company Updates</h2><h3><a href="https://www.morningstar.com/news/pr-newswire/20251022cn04103/frankieone-and-mattr-unite-to-strengthen-digital-identity-assurance-with-verifiable-government-issued-credentials">FrankieOne and MATTR unite to strengthen digital identity assurance with verifiable, government-issued credentials</a></h3><blockquote><p>The collaboration embeds MATTR&#8217;s digital trust technology into FrankieOne&#8217;s identity orchestration platform, enabling organisations to verify customers with greater assurance and privacy. Through this integration, enterprises can accept emerging credentials such as mobile Driver&#8217;s Licences (mDLs). These digital credentials, which conform to ISO 18013-5 and -7 standards, provide high-assurance, privacy-preserving verification that enhances customer experience while working seamlessly alongside existing data sources and risk signals.</p></blockquote><h3><a href="https://community.mosip.io/t/release-announcement-inji-certify-0-12-2-is-here/2349">Release Announcement: Inji Certify - 0.12.2 is here!</a></h3><blockquote><p>We&#8217;re pleased to announce the release of Inji Certify v0.12.2!</p><p>This update focuses on enabling issuers with greater control and flexibility in managing their credential signing infrastructure, while enhancing overall usability and operational stability. With this release, Certify introduces key APIs to streamline integration with external Certificate Authorities (CAs) &#8212; empowering issuers to securely manage the full certificate lifecycle and extend their credential issuance capacity.</p></blockquote><h3>(Techademics, Learner Studio) [Report] <a href="https://thelearnerstudio.org/wp-content/uploads/2025/10/Learner-Studio-The-Future-Tech-Stack-Reimagining-Requirements-for-Learner-Centered-Futures.pdf">The Future Tech Stack: Reimagining Requirements for Learner-Centered Futures</a></h3><blockquote><p>At the core of the requirements are key integrated components&#8212;each designed to work together while remaining flexible, standards-based, and adaptable to local context. All of these components are powered by Agentic AI and strengthened through human connection.</p><p>The Learner Wallet is a secure, portable, and learner-owned application for managing and selectively sharing verified achievements, credentials, skills, and experiences. It acts as a dynamic record hub, enabling individuals to validate and share credentials across settings while maintaining ultimate control over their data. Built on standards such as W3C Verifiable Credentials and 1EdTech Open Badges 3.0, the wallet ensures portability and interoperability across diverse platforms</p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mVG8!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff990cede-ad7c-4bc6-96ec-87b643b96c65_1134x1440.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mVG8!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff990cede-ad7c-4bc6-96ec-87b643b96c65_1134x1440.png 424w, https://substackcdn.com/image/fetch/$s_!mVG8!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff990cede-ad7c-4bc6-96ec-87b643b96c65_1134x1440.png 848w, https://substackcdn.com/image/fetch/$s_!mVG8!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff990cede-ad7c-4bc6-96ec-87b643b96c65_1134x1440.png 1272w, https://substackcdn.com/image/fetch/$s_!mVG8!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff990cede-ad7c-4bc6-96ec-87b643b96c65_1134x1440.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mVG8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff990cede-ad7c-4bc6-96ec-87b643b96c65_1134x1440.png" width="1134" height="1440" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f990cede-ad7c-4bc6-96ec-87b643b96c65_1134x1440.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1440,&quot;width&quot;:1134,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mVG8!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff990cede-ad7c-4bc6-96ec-87b643b96c65_1134x1440.png 424w, https://substackcdn.com/image/fetch/$s_!mVG8!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff990cede-ad7c-4bc6-96ec-87b643b96c65_1134x1440.png 848w, https://substackcdn.com/image/fetch/$s_!mVG8!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff990cede-ad7c-4bc6-96ec-87b643b96c65_1134x1440.png 1272w, https://substackcdn.com/image/fetch/$s_!mVG8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff990cede-ad7c-4bc6-96ec-87b643b96c65_1134x1440.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>(SpruceID) <a href="https://blog.spruceid.com/the-technology-powering-digital-identity/">The Technology Powering Digital Identity: The Future of Digital Identity in America - Post 3</a></h3><blockquote><p>Every successful infrastructure layer in technology&#8212;whether it was TCP/IP for the internet or HTTPS for secure web traffic&#8212;has been built on standards. Decentralized identity is no different. Standards ensure that issuers, holders, and verifiers can interact without building one-off integrations or relying on proprietary systems.</p></blockquote>]]></content:encoded></item><item><title><![CDATA[Identosphere 249 Oct 13-19: Keypear • DIF Identity Projects • Sad State of Decentralized Identity • SPRN-D Highlights • DIACC Trust Adoption Dashboard ]]></title><description><![CDATA[This is the weekly Identosphere Newsletter sharing highlights from around the web covering Decentralized and Self-Sovereign Identity curated by Kaliya Young, Identity Woman.]]></description><link>https://newsletter.identosphere.net/p/identosphere-249-oct-13-19-keypear</link><guid isPermaLink="false">https://newsletter.identosphere.net/p/identosphere-249-oct-13-19-keypear</guid><dc:creator><![CDATA[IdentityWoman]]></dc:creator><pubDate>Fri, 31 Oct 2025 22:10:14 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ixnc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c65f548-95f7-43d8-9c55-33a8e2bf5ef5_1470x1368.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!IEr9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!IEr9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png 424w, https://substackcdn.com/image/fetch/$s_!IEr9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png 848w, https://substackcdn.com/image/fetch/$s_!IEr9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png 1272w, https://substackcdn.com/image/fetch/$s_!IEr9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!IEr9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png" width="1344" height="256" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:256,&quot;width&quot;:1344,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!IEr9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png 424w, https://substackcdn.com/image/fetch/$s_!IEr9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png 848w, https://substackcdn.com/image/fetch/$s_!IEr9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png 1272w, https://substackcdn.com/image/fetch/$s_!IEr9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><h2>Comprehensive Overviews</h2><h3><a href="https://www.lissi.id/blog/eu-identity-wallet-communities">EU Identity Wallet communities</a></h3><blockquote><p>eIDAS is an ecosystem play with network effects: The value of the network increases with every new participant. Here&#8217;s an overview of the most important communities.</p></blockquote><h3><a href="https://www.namirial.com/en/inspiration/digital-identity-in-latin-america-progress-challenges-and-outlook-for-2025/">Digital identity in Latin America: progress, challenges and outlook for 2025</a></h3><blockquote><p>The regulatory framework In Latin America is still under development. Some countries have made progress in digitalizing their identity documents, while others are in preliminary exploration or institutional design phases. The lack of harmonized regional regulation complicates the creation of cross-border digital ecosystems, although efforts toward convergence inspired by the European model are evident.</p><p>Citizen perception of new forms of digital identity is divided. Let us focus on countries where solutions are already available to the population.</p></blockquote><h3><a href="https://keypear.io/keypear-unlocking-the-digital-economy-in-hong-kong-with-iam-smart-and-corpid-integration/">KeyPear: Unlocking the Digital Economy in Hong Kong with iAM Smart and CorpID Integration</a></h3><blockquote><p>At its core, <a href="https://keypear.io/">KeyPear</a> is a did:webvh wallet, built on the principles of Decentralized Identifiers (DIDs) and Verifiable Credentials (VCs). This architecture is the key to its power.</p><p>KeyPear&#8217;s strategic integrations with iAM Smart and CorpID, combined with its role as a secure gateway to the stablecoin economy, position it as a defining piece of infrastructure for Hong Kong&#8217;s next chapter.</p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ixnc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c65f548-95f7-43d8-9c55-33a8e2bf5ef5_1470x1368.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ixnc!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c65f548-95f7-43d8-9c55-33a8e2bf5ef5_1470x1368.png 424w, https://substackcdn.com/image/fetch/$s_!ixnc!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c65f548-95f7-43d8-9c55-33a8e2bf5ef5_1470x1368.png 848w, https://substackcdn.com/image/fetch/$s_!ixnc!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c65f548-95f7-43d8-9c55-33a8e2bf5ef5_1470x1368.png 1272w, https://substackcdn.com/image/fetch/$s_!ixnc!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c65f548-95f7-43d8-9c55-33a8e2bf5ef5_1470x1368.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ixnc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c65f548-95f7-43d8-9c55-33a8e2bf5ef5_1470x1368.png" width="1456" height="1355" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7c65f548-95f7-43d8-9c55-33a8e2bf5ef5_1470x1368.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1355,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ixnc!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c65f548-95f7-43d8-9c55-33a8e2bf5ef5_1470x1368.png 424w, https://substackcdn.com/image/fetch/$s_!ixnc!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c65f548-95f7-43d8-9c55-33a8e2bf5ef5_1470x1368.png 848w, https://substackcdn.com/image/fetch/$s_!ixnc!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c65f548-95f7-43d8-9c55-33a8e2bf5ef5_1470x1368.png 1272w, https://substackcdn.com/image/fetch/$s_!ixnc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c65f548-95f7-43d8-9c55-33a8e2bf5ef5_1470x1368.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><a href="https://www.uvu.edu/herbertinstitute/data_governance/state_endorsed_digital_identity_summit.html">SEDI Summit</a> Home Page</h3><blockquote><p>The State of Utah invites you to attend the State-endorsed Digital Identity (SEDI) Summit&#8212;a national gathering for states to lead the way in rethinking how identity works in the digital age.</p><p>As digital transactions become foundational to modern life, trust in identity systems must be earned, not assumed. The time has come for a model where states uphold their constitutional role, and individuals regain control over their identity.</p></blockquote><h2>AI and Identity</h2><h3><a href="https://finxtech.com/what-happens-when-an-ai-agent-goes-rogue/">What Happens When an AI Agent Goes Rogue?</a></h3><blockquote><p>That could mean extending today&#8217;s digital identity frameworks, such as device fingerprinting, behavioral biometrics or cryptographic signatures, to include AI agents. In practice, <strong>each approved agent might carry a verifiable credential issued by the customer&#8217;s bank or identity provider, ensuring that every transaction or request can be cryptographically linked back to a legitimate owner</strong>.</p></blockquote><h3><a href="https://www.lfdecentralizedtrust.org/projects/tag/decentralized-identity">LF Decentralized Trust: Identity Projects</a></h3><blockquote><p>Hylerledger AnonCredds</p><p>Credebl</p><p>Hylerledger Identus</p><p>Hylerledger Indy</p><p>Trust over IP</p></blockquote><h3><a href="https://www.arcblock.io/blog/en/5-reasons-human-centric-data-products">5 Reasons We Must Shift to Human-Centric Data Design</a></h3><p>Here are five reasons the future needs to be human-centric design and how<a href="https://www.arcblock.io"> ArcBlock&#8217;s</a> decentralized identity can delivery it:</p><p>1. Less Data, Less Risk</p><blockquote><p>2. Put People Back in Control</p><p>3. Trust Isn&#8217;t a Feature&#8212;It&#8217;s an Advantage</p><p>4. Break the Surveillance Economy</p><p>5. From Data Hoarding to Data Dialogue</p></blockquote><h3><a href="https://developer.blockchaincommons.com/meetings/2025-10-tabconf/">TABConf 7: October 2025: Beyond Bitcoin &amp; The Sad State of Decentralized Identity</a></h3><blockquote><p>Christopher Allen was invited to support a new decentralized identity track at TABConf 7 and made two presentations, one on &#8220;Beyond Bitcoin: Engineering Exodus Protocols for Coordination &amp; Identity&#8221; and one on the &#8220;Sad State of Decentralized Identity (and What To Do About It)&#8221;.</p></blockquote><h3><a href="https://www.imsglobal.org/spec/ob/v3p0">Open Badges Specification: Final Release Spec Version 3.0</a></h3><blockquote><p>This specification is a new version of the <a href="https://www.imsglobal.org/activity/digital-badges">1EdTech Open Badges Specification</a> that aligns with the conventions of the <a href="https://www.w3.org/TR/vc-data-model-2.0/">Verifiable Credentials Data Model v2.0</a> for the use cases of <a href="https://www.imsglobal.org/spec/ob/v3p0#dfn-defined-achievement-claim">Defined Achievement Claim</a> and a <a href="https://www.imsglobal.org/spec/ob/v3p0#dfn-skill-claim">Skill Claim</a>. The credentials that are produced are easily be bundled into <a href="https://www.imsglobal.org/spec/ob/v3p0#dfn-clr">Comprehensive Learner Records</a> and <a href="https://www.imsglobal.org/spec/ob/v3p0#dfn-vp">Verifiable Presentations</a>. Portability and learner data privacy are improved by expanding the usage of cryptographic proofs/signatures, because this format will be compatible with a growing array of proof schemas that are developed for the Verifiable Credentials Data Model.</p></blockquote><h3><a href="https://www.okta.com/blog/identity-security/technical-overview-of-verifiable-digital-credentials-ecosystem/?utm_id=aNK4z000000029jGAA&amp;utm_campaign=global_all_all_everyonesocial_organic_employee_share&amp;utm_source=linkedin&amp;utm_medium=everyone-social&amp;es_id=2c28cd0fdd">(Okta:Tim Cappalli) [explainer] A technical overview of the verifiable digital credentials ecosystem</a></h3><blockquote><p>- You can think of VDCs as an evolved form of federation.</p><p>- An issuer (similar to an IdP in federation) asserts claims about you.</p><p>- You, the holder, present those claims to a verifier (similar to a service provider in federation).</p><p>- The verifier checks validity using one or more trust lists.</p></blockquote><h3><a href="https://www.intesigroup.com/en/news/eudi-wallet-tourism/">Intesi Group contributes to the first European trial of the EU Digital Identity Wallet in tourism</a></h3><blockquote><p>Intesi Group, a leading Italian Qualified Trust Service Provider (QTSP), proudly announces the release of PhotoID as Electronic Attestation of Attributes (EAA) according to eIDAS regulation, developed as part of the first European pilot of the EU Digital Identity Wallet in the tourism sector.</p></blockquote><h3>[Research] <a href="https://www.sciencedirect.com/science/article/pii/S0167404825003992">Mapping the metaverse minefield: A TIPS framework for security-conscious business adoption</a></h3><blockquote><p>This study examines metaverse adoption by organizations (particularly M/SMEs) through the Trust, Identity, Privacy, and Security (TIPS) framework, using qualitative NLP analysis of interviews with business and IT professionals to understand the interdependencies between these security dimensions. The research reveals a hierarchical dependency structure where trust is influenced by user embodiment, avatar-based identities complicate verification and privacy protection, and privacy demands transparency frameworks&#8212;ultimately recommending that organizations adopt security-by-design principles balanced with user experience considerations for successful metaverse implementation.</p></blockquote><h3><a href="https://grabtheaxe.com/digital-identity-paradox-ssi-explained/">The Digital Identity Paradox: Reconciling Privacy and Security in the Age of Self-Sovereign Identity (SSI)</a></h3><blockquote><p>The journey to Self-Sovereign Identity is a marathon, not a sprint. The current identity model, with its endless cycle of data breaches and eroded trust, is unsustainable. SSI offers a viable path forward, one that flips the script by making the user the sovereign owner of their digital self. It resolves the Digital Identity Paradox by designing a system where robust security and individual privacy are not competing interests but mutually reinforcing goals.</p></blockquote><h3>[Reserch] <a href="https://www.sciencedirect.com/science/article/abs/pii/S092054892500114X">BcFCKA:Blockchain-based Fair and continuous key agreement for DIDComm in Self-Sovereign Identity</a></h3><blockquote><p>Self-Sovereign Identity (SSI) systems face security challenges in their DIDComm communication framework, including lack of perfect forward secrecy and poor message loss resilience. The authors propose BcFCKA, a blockchain-based key agreement protocol that enables continuous, fair session key updates without centralized trust, achieving strong security properties while maintaining practical performance with millisecond-level execution times.</p></blockquote><h3><a href="https://epicenter.tv/episode/620-brave-building-the-private-user-friendly-internet">Brave: Building the Private User-Friendly Internet - Guest Kyle Den Hartog</a></h3><blockquote><p>In this episode, Friederike is joined by Kyle Den Hartog, security engineer at Brave, to explore the browser&#8217;s role in a user-first web. From his roots in penetration testing and verifiable credentials, Kyle arrived at web3 via self-sovereign identity, viewing it as empowering despite imperfections.</p></blockquote><h3>SPRN-D Highlights of the the Funke &#8220;EUDI Wallet Prototypes&#8221; conference this week at Radialsystem Berlin. :</h3><blockquote><p>- The presentation is now available on <a href="https://gitlab.opencode.de/bmi/eudi-wallet/eidas2/-/tree/main/06_Funke_Conference/251014_Funke_Conference_03?ref_type=heads">OpenCoDE.</a></p><p>- We uploaded the recordings on our <a href="https://www.sprind.org/en/eudi-wallet#eudi-wallet-prototypes-the-usecases-conference">website</a> and we will provide them on <a href="https://gitlab.opencode.de/bmi/eudi-wallet/eidas2/-/tree/main/06_Funke_Conference/251014_Funke_Conference_03?ref_type=heads">OpenCoDE</a> within the upcoming week as well.</p><p>- You can also find the pictures from the event <a href="https://www.picdrop.com/felixadler/WwcYcQ2K8k">here</a> &#8211; please credit SPRIND and the photographer Felix Adler (&#169; SPRIND / Felix Adler) when using them. The images may be used for internal communication and your own social media channels. For any other use, please follow the copyright information provided by the photographer.</p></blockquote><h3><a href="https://www.blockchaincommons.com/musings/musings-swiss-eid/">Musings of a Trust Architect: Five Anchors to Preserve Autonomy &amp; Sovereignty: Solutions for Swiss e-ID and Other Digital Identity Systems</a></h3><blockquote><p>ABSTRACT: How do you protect autonomy and democratic sovereignty in digital identity systems? This article suggests five foundations: protecting choice by design; building for an extended future; maintaining platform independence; requiring duties; and implementing institutional safeguards.</p></blockquote><h3><a href="https://projectvrm.org/2025/10/13/gathering-the-myterms-troops/">Gathering the MyTerms Troops</a></h3><blockquote><p>Here is some of what&#8217;s going on around MyTerms. The draft is complete and on track for publication early next year. But work can start in the meantime.</p></blockquote><h3><a href="https://diacc.ca/2025/10/15/reimagining-canada-post-from-delivering-mail-to-delivering-trust/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=reimagining-canada-post-from-delivering-mail-to-delivering-trust">Reimagining Canada Post: From Delivering Mail to Delivering Trust</a></h3><blockquote><p>Consider what Canada Post actually represents: a trusted institution with physical presence in virtually every Canadian community, deep expertise in verification and logistics, existing relationships spanning individuals and businesses, public accountability, and a mandate to serve all Canadians regardless of commercial viability.</p><p>These aren&#8217;t assets to be wound down. They are the foundations for building Canada&#8217;s digital trust infrastructure.</p></blockquote><h3><a href="https://diacc.ca/2025/10/15/diacc-unviels-digital-trust-adoption-dashboard-transparency-for-a-connected-canada/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=diacc-unviels-digital-trust-adoption-dashboard-transparency-for-a-connected-canada">DIACC Unviels Digital Trust Adoption Dashboard: Transparency for a Connected Canada</a></h3><blockquote><p>This public resource maps the evolution of digital trust programs across Canada&#8217;s provinces and territories. By combining data from government sources with an interactive, map-based interface, the dashboard reveals the current state of digital verification and authentication services, trust program adoption, interoperability, and maturity across the country.</p></blockquote><h3><a href="https://diacc.ca/2025/10/16/a-milestone-in-enhancing-digital-trust-for-lawyers-digitally-verifying-client-id/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=a-milestone-in-enhancing-digital-trust-for-lawyers-digitally-verifying-client-id">A Milestone in Enhancing Digital Trust for Lawyers: Digitally Verifying Client ID</a></h3><blockquote><p>The PCTF Legal Professionals Profile establishes Conformance Criteria for how lawyers and their agents expect services to conduct client identity verification (IDV) in a manner that is auditable and consistent.</p></blockquote><h3><a href="https://openid.net/oidf-applauds-new-fido-and-shared-signals-whitepaper/">OIDF applauds new FIDO and Shared Signals whitepaper</a></h3><blockquote><p>The OpenID Foundation welcomes the publication of <a href="https://fidoalliance.org/wp-content/uploads/2025/10/fido-and-the-shared-signals-framework.pdf#:~:text=This%20paper%20introduces%20a%20strategic%20approach%20that%20combines,authentication%2C%20and%20promote%20collaborative%20defense%20against%20identity%20threats.">a new whitepaper</a> from the <a href="https://fidoalliance.org/">FIDO Alliance</a> that examines how FIDO authentication and the <a href="https://openid.net/wg/sharedsignals/">Shared Signals Framework (SSF)</a> work together to address enterprise security challenges.</p></blockquote><h3>[Video] (<a href="http://grant.io">Grant.io</a>) <a href="https://www.youtube.com/watch?v=d2MOt01HKx4">EUDI Wallet &amp; OpenID4VP | Digital Credential Query Language Scenario #1: Basic Credential Query</a></h3><blockquote><p>Explore how EUDI Wallets use OpenID4VP and the Digital Credential Query Language (DCQL) to enable secure, trusted credential sharing in the EU Digital Identity ecosystem. In this first scenario &#8212; Basic Credential Query with Trusted Authority &#8212; you&#8217;ll see how a relying party requests a verified credential (e.g., a university degree) from a wallet holder, ensuring it is issued by a recognised and trusted EU authority (present in the Trust List).</p></blockquote>]]></content:encoded></item><item><title><![CDATA[Identosphere 248 Sept 6-12: Agentic AI • Bhutan adopts Ethereum • Billions on a roll • Verifiable AI with Self-Sovereign Identity: a Socio-Technical Exploration]]></title><description><![CDATA[This is the weekly Identosphere Newsletter sharing highlights from around the web covering Decentralized and Self-Sovereign Identity curated by Kaliya Young, Identity Woman.]]></description><link>https://newsletter.identosphere.net/p/identosphere-248-sept-6-12-agentic</link><guid isPermaLink="false">https://newsletter.identosphere.net/p/identosphere-248-sept-6-12-agentic</guid><dc:creator><![CDATA[IdentityWoman]]></dc:creator><pubDate>Thu, 16 Oct 2025 00:32:58 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!riEW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10ede7f1-fcd3-4f87-becd-53f650b3ddee_932x842.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!IEr9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!IEr9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png 424w, https://substackcdn.com/image/fetch/$s_!IEr9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png 848w, https://substackcdn.com/image/fetch/$s_!IEr9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png 1272w, https://substackcdn.com/image/fetch/$s_!IEr9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!IEr9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png" width="1344" height="256" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:256,&quot;width&quot;:1344,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!IEr9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png 424w, https://substackcdn.com/image/fetch/$s_!IEr9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png 848w, https://substackcdn.com/image/fetch/$s_!IEr9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png 1272w, https://substackcdn.com/image/fetch/$s_!IEr9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19262b5a-1c22-4ddc-9ace-cfed26d5cce7_1344x256.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><h2><strong>Upcoming</strong></h2><ul><li><p><a href="https://openid.net/registration-open-for-openid-foundation-hybrid-workshop-at-cisco-on-mon-20th-october-2025/">Registration Open for OpenID Foundation Hybrid Workshop at Cisco on Mon 20th October 2025</a></p></li><li><p><a href="https://internetidentityworkshop.com/">Internet Identity Workshop</a> #41 October 21-23 Mountain View California</p></li><li><p><a href="https://liminal.co/demo-day/agentic-ai-ecommerce/">How Do We Build Trust in Agentic Commerce?</a> Demo Day October 22</p></li><li><p>W3C CCG APAC Friendly Time <a href="https://www.w3.org/events/meetings/14198fcc-b6af-44ff-bb64-0cd718583766/20251022T120000/">22nd of October</a>: A microcredential ecosystem</p></li><li><p><a href="https://agenticinternetworkshop.org/">Agentic Internet Workshop</a>* October 24th Mountain View California (*Inspired IIW by and hosted by the IIW Foundation</p></li></ul><h2>Deloitte Dept:</h2><h3>[Wall St Journal sponsored by Deloitte] <a href="https://deloitte.wsj.com/riskandcompliance/rethinking-identity-security-the-rise-of-wallet-based-credentials-4af8471e?gaa_at=eafs&amp;gaa_n=ASWzDAgBkENqyh32OQ9GVFJcW4ygUJT6w0lxdERotJILa_yd7-2CGMVIYAjaRPEZ_oY%3D&amp;gaa_ts=68eed5e0&amp;gaa_sig=sTAH9-YcveY8Jy2NXzX2JFrWyKVYcEWC0uZ8rhiJiiSzRItnLZ59RewzshtYk78HwaxOF1mGfA2FXz7lAHFQ_Q%3D%3D">Rethinking Identity Security: The Rise of Wallet-Based Credentials</a></h3><blockquote><p>A self-sovereign approach to identity security can transform business risk and customer trust, helping organizations shed related liabilities and strengthen cyber protections</p></blockquote><h3><a href="https://billions.network/blog/when-deloitte-validates-your-vision-billions-tech-stack-named-in-4-trillion-market-report">When Deloitte Validates Your Vision: Billions&#8217; Tech Stack Named in $4 Trillion Market Report</a></h3><blockquote><p>Billions&#8217; tech stack and Privado ID is now part of the institutional playbook for tokenized finance.</p><p>And according to Deloitte&#8217;s latest report on semi-liquid funds - a $4 trillion market opportunity- they&#8217;re choosing our tech stack: <strong>Privado ID</strong>.</p></blockquote><h3><a href="https://www.tradingview.com/news/cointelegraph:d5fea95ea094b:0-worldcoin-s-less-dystopian-more-cypherpunk-rival-billions-network/">Worldcoin&#8217;s less &#8216;dystopian,&#8217; more cypherpunk rival: Billions Network</a></h3><blockquote><p>We make it easy for you to prove who you are things like the fact youre a person, a unique human, not a bot, over a certain age, things like your KYC status, from the comfort of your own device, McCullen says. The system uses the updated Decentralized Identifiers (DIDs) open standard from the World Wide Web Consortium &#8220;the good people who brought us the internet.</p></blockquote><h2>AI and Identity</h2><h3>(Video Instagram) <a href="https://www.instagram.com/reel/DPgXQ6WEaMj/">Michael Casey has introduced a new organization dedicated to advancing decentralized AI</a></h3><blockquote><p>The initiative aims to build AI systems that are open, secure, and human-aligned&#8212;bridging Web3 innovation with enterprise adoption to enable privacy-preserving data ownership and collaboration across industries. The mission: to help shape the foundation of a more decentralized, AI-driven global economy.</p></blockquote><h3><a href="https://openid.net/new-whitepaper-tackles-ai-agent-identity-challenges/">New whitepaper tackles AI agent identity challenges</a></h3><blockquote><p>The rapid rise of AI agents presents urgent challenges in authentication, authorization, and identity management. Current agent-centric protocols (like MCP) highlight the demand for clarified best practices in authentication and authorization. Looking ahead, ambitions for highly autonomous agents raise complex long-term questions regarding scalable access control, agent-centric identities, AI workload differentiation, and delegated authority. This whitepaper is for stakeholders at the intersection of AI agents and access management. It outlines the resources already available for securing today&#8217;s agents and presents a strategic agenda to address the foundational authentication, authorization, and identity problems pivotal for tomorrow&#8217;s widespread autonomous systems.</p></blockquote><h3><a href="https://auth0.com/blog/auth0-token-vault-secure-token-exchange-for-ai-agents/">Auth0 Token Vault: Secure Token Exchange for AI Agents</a></h3><blockquote></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!riEW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10ede7f1-fcd3-4f87-becd-53f650b3ddee_932x842.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!riEW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10ede7f1-fcd3-4f87-becd-53f650b3ddee_932x842.png 424w, https://substackcdn.com/image/fetch/$s_!riEW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10ede7f1-fcd3-4f87-becd-53f650b3ddee_932x842.png 848w, https://substackcdn.com/image/fetch/$s_!riEW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10ede7f1-fcd3-4f87-becd-53f650b3ddee_932x842.png 1272w, https://substackcdn.com/image/fetch/$s_!riEW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10ede7f1-fcd3-4f87-becd-53f650b3ddee_932x842.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!riEW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10ede7f1-fcd3-4f87-becd-53f650b3ddee_932x842.png" width="932" height="842" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/10ede7f1-fcd3-4f87-becd-53f650b3ddee_932x842.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:842,&quot;width&quot;:932,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!riEW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10ede7f1-fcd3-4f87-becd-53f650b3ddee_932x842.png 424w, https://substackcdn.com/image/fetch/$s_!riEW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10ede7f1-fcd3-4f87-becd-53f650b3ddee_932x842.png 848w, https://substackcdn.com/image/fetch/$s_!riEW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10ede7f1-fcd3-4f87-becd-53f650b3ddee_932x842.png 1272w, https://substackcdn.com/image/fetch/$s_!riEW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10ede7f1-fcd3-4f87-becd-53f650b3ddee_932x842.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><a href="https://liminal.co/articles/buildng-trust-in-agentic-commerce/">Building Trust in Agentic Commerce</a></h3><blockquote><p>If agentic AI is going to matter in e-commerce, we need guardrails that make it safe, compliant, and worth the operational risk. That is where authentication, authorization, and verification come in. Think identity, boundaries, and proof. Until teams can check those boxes with confidence, adoption will stall.</p></blockquote><h3><a href="https://www.linkedin.com/posts/andorsk_why-policy-design-matter-for-autonomous-activity-7376657570931019776-njdj/?utm_source=share&amp;utm_medium=member_ios&amp;rcm=ACoAAAAAZUMBU8SalbYc2xiqRyIGnrd7yxmrY8A">&#128272; Why Policy Design Matter for Autonomous Agents</a></h3><blockquote><p>That&#8217;s why recent papers like : &#8220;Policy Design in Zero-Trust Distributed Networks: Challenges and Solutions&#8221;<a href="https://lnkd.in/g9N-f-Di"> https://lnkd.in/g9N-f-Di</a> are important, as it describes the impact of policy design for AI Agents. Policy languages like CEDAR, OpenFGA, and OPA are important considerations we need to be thinking about.</p></blockquote><h3><a href="https://cartography-of-generative-ai.net/">Cartography of Generative AI</a> &lt;-amazing map</h3><h3><a href="https://www.linkedin.com/posts/stuart-winter-tear_agent%C2%B2-an-agent-generates-agent-framework-ugcPost-7379932256678674432-AVie/?utm_source=share&amp;utm_medium=member_ios&amp;rcm=ACoAAAAAZUMBU8SalbYc2xiqRyIGnrd7yxmrY8A">Agents building agents.</a></h3><h3><a href="https://www.linkedin.com/feed/update/urn:li:activity:7381717010474430464/?utm_source=share&amp;utm_medium=member_ios&amp;rcm=ACoAAAAAZUMBU8SalbYc2xiqRyIGnrd7yxmrY8A">The &#119820;&#119810;&#119823; &#119808;&#119854;&#119853;&#119841;&#119848;&#119851;&#119842;&#119859;&#119834;&#119853;&#119842;&#119848;&#119847; &#119852;&#119849;&#119838;&#119836; &#119842;&#119852; &#119834; &#119847;&#119848;&#119847;-&#119852;&#119853;&#119834;&#119851;&#119853;&#119838;&#119851; for enterprises.</a></h3><blockquote><p>&#128313; Challenges from the current MCP Authorization spec</p><p>&#128313; Alternative enhancements from folks like Aaron Parecki and Dick Hardt</p><p>&#128313; Our recommendations for securing MCP in the enterprise</p></blockquote><h2>Blockchain</h2><h3><a href="https://kuenselonline.com/dz/news/bhutan-adopts-ethereum-blockchain-for-national-identity">Bhutan adopts Ethereum blockchain for the national identity.</a></h3><h3><a href="https://www.bitget.com/news/detail/12560605014076">Bhutan becomes first nation to anchor digital ID on Ethereum</a></h3><blockquote><p>Bhutan has migrated its national digital identity system to the Ethereum blockchain, marking a historic step toward decentralized public infrastructure.</p></blockquote><h3><a href="https://cryptonews.net/news/altcoins/31764172/">IOTA to Secure Digital Identity Framework Connecting 36 Countries and 4.78 Billion Citizens</a></h3><blockquote><p>- IOTA could become the backbone for digital identity verification for over half the world&#8217;s population, while Europe&#8217;s serves around 450 million people.</p><p>- IOTA has spent years building a feeless, energy-efficient distributed ledger purpose-built for machine-to-machine and identity use cases.</p></blockquote><h3><a href="https://www.scbf.ch/insights/theory-meets-practice-how-can-blockchain-technology-help-to-scale-customer-centric-financial-services-today">Theory meets practice: How can blockchain technology help to scale customer-centric financial services today?</a></h3><blockquote><p><a href="https://www.gravity.earth/">Gravity</a> provides verifiable digital identity wallets that allow users to issue and share Verifiable Credentials securely. Gravity currently operates in Kenya.</p><p><strong>Is it customer centric?</strong> The service can be used either with or without a smartphone. With a smartphone, beneficiaries create their digital wallet through the Gravity app. Later, when the NGO or financial institution needs to authenticate the beneficiary&#8217;s information, the beneficiary can remotely authenticate themselves by responding to a notification through the same app. Without a smartphone, the NGO, or any other trusted organisation wishing to onboard their users using a digital ID, creates the digital wallet on the beneficiary&#8217;s behalf. The beneficiary is then issued a QR code, which a service provider can scan at a later date when the identity needs to be authenticated.</p></blockquote><h2>National Opportunities</h2><h3>[Video] (Kenya) <a href="https://www.youtube.com/watch?v=K9EvV2R-QbQ">Stakeholders Workshop for Verifiable Credentials</a></h3><blockquote><p>The Government of Kenya is establishing effective mechanisms of replacing issuance of paper degrees with a Digital Verifiable Credential, which can be securely authenticated using a digital system.</p></blockquote><h3><a href="https://openid.net/openid-foundation-applauds-western-balkans-digital-id-plan/">OpenID Foundation Applauds Western Balkans Digital ID Plan</a></h3><blockquote><p>A key accomplishment of the event was the 6 Western Balkan countries agreeing to the Joint Statement on Achieving Western Balkans Six Interoperable Digital ID Wallets and Trust Services. &#8220;<em><a href="https://www.rcc.int/news/969/western-balkans-digital-summit-2025-concludes-in-skopje-with-strong-regional-commitments-on-connectivity-and-digital-identity">By agreeing to implement regionally interoperable digital identity wallets, harmonise trust services, and strengthen regulatory and technical capacities, the Western Balkans Six committed to advancing secure and seamless digital access for citizens and businesses, in line with EU eIDAS 2.0 standards</a>.&#8221;</em></p></blockquote><h3><a href="https://www.ownyourdata.eu/en/dpp-mydata25/">Digital Product Passports Towards More Sustainable Futures</a></h3><blockquote><p>In our presentation, we also introduced the Promoting Accelerated Circular Economy through Digital Product Passports (PACE-DPP) project as an applied case study to explore the potential for DPPs.</p><p>A Digital Product Passport is a <strong>product-specific dataset</strong> accessible via a digital carrier. It enables businesses, regulators, and consumers to access key information&#8212;such as material composition, environmental impact, production history, and recyclability.</p></blockquote><h3><a href="https://www.dock.io/post/what-we-learned-showing-digital-ids-for-local-government">What We Learned Showing Digital IDs for Local Government</a></h3><blockquote><p>Richard Esplin (Head of Product) put together a live demo.</p><p>Instead of complex architectures or long timelines, he showed how a city could issue a digital residency credential and use it instantly across departments. From getting a library card to scheduling trash pickup.</p></blockquote><h3><a href="https://blog.spruceid.com/why-digital-identity-frameworks-should-be-public-infrastructure/">Why Digital Identity Frameworks Should Be Public Infrastructure</a></h3><blockquote><p>Digital identity is essential infrastructure, and it deserves the same level of public investment, oversight, and trust as other core systems like roads or utilities.</p></blockquote><h2>Interesting</h2><h3>(Indicio) <a href="https://indicio.tech/blog/your-authentication-dilemma-diy-or-off-the-shelf-decentralized-identity/">Your authentication dilemma: DIY or off-the-shelf decentralized identity?</a></h3><blockquote><p>There&#8217;s a reason Indicio was the first (and still the only) company to launch a complete, off-the-shelf solution for implementing Verifiable Credentials in both the <a href="https://aws.amazon.com/marketplace/seller-profile?id=seller-yj52u25epd65s">Amazon</a> and <a href="https://cloud.google.com/find-a-partner/partner/indicio">Google Cloud Marketplaces</a>: We built a team composed of pioneers and leaders in decentralized identity, engineers and developers deeply engaged with the open source codebases and communities that have shaped this technology. They live and breathe this stuff every day. And even so, it still took years to build an interoperable, multi-credential, multi-protocol, system that can scale to country-level deployments.</p></blockquote><h3>(Dock) <a href="https://www.dock.io/post/why-derived-credentials-are-the-future-of-digital-id">Why Derived Credentials Are the Future of Digital ID</a></h3><blockquote><p>In our <a href="https://www.dock.io/post/mdls-privacy-and-user-tracking-what-you-need-to-know-video-and-takeaways">recent live podcast</a>, Richard Esplin (Dock Labs) spoke with Andrew Hughes (VP of Global Standards, FaceTec) and Ryan Williams (Program Manager of Digital Credentialing, AAMVA) about the rollout of mobile driver&#8217;s licenses (mDLs) and what comes next.</p><p>One idea stood out: derived credentials.</p></blockquote><h2>Thoughtful</h2><h3>(Nicky Hickman via Cheqd) <a href="https://www.linkedin.com/posts/cheqd-identity_verifiable-ai-with-self-sovereign-identity-activity-7382084123600769024-MZU9/">Verifiable AI with Self-Sovereign Identity: a Socio-Technical Exploration</a></h3><blockquote><p>As part of the research, two practical outputs were created.</p><p>1. Entangled Relationship Guide: considers AI in relation to wider systems including the environment, ecology and non-human stakeholders, drawing on perspectives from indigenous knowledge and socio-environmental research.</p><p>2. Human-Centric Relationship Guide: focused on designing AI systems that interact directly with people, addressing themes such as authenticity, authorisation and trust.</p></blockquote><h3>(Heather Flanagan) <a href="https://sphericalcowconsulting.com/2025/10/07/the-end-of-the-global-internet/">The End of the Global Internet</a></h3><blockquote><p>- Technical fragmentation: differences in protocols, infrastructure, censorship, filtering; sometimes entire national &#8220;gateways&#8221; or shutdowns.</p><p>- Regulatory / governmental fragmentation: national laws around data flows, privacy, platform regulation, online safety, and content moderation diverge sharply.</p><p>- Commercial fragmentation: companies facing divergent rules in different markets (privacy, liability, content) so they adapt differently; global products become &#8220;local versions.&#8221;</p><p>A <a href="https://unidir.org/wp-content/uploads/2023/12/UNIDIR_internet_fragmentation_cybersecurity_primer.pdf">primer</a> from the United Nations Institute for Disarmament Research (UNIDIR) published in 2023 lays this out in detail.</p></blockquote><h3><a href="https://auth0.com/blog/demystifying-jose-jwt-family/">Demystifying JOSE, the JWT Family: JWS, JWE, JWA, and JWK Explained</a></h3><blockquote><p>If you&#8217;ve worked with modern authentication or secure data exchange, you&#8217;ve undoubtedly encountered JSON Web Tokens, or JWTs. However, if you dig deeper, you may encounter a series of confusing acronyms: JWS, JWE, JWK, JWA, and the umbrella term, JOSE. What do they all mean? How do they relate to each other?</p></blockquote><h3><a href="https://blog.spruceid.com/foundations-of-decentralized-identity/">Foundations of Decentralized Identity</a></h3><blockquote><p>Decentralized identity operationalizes these ideas for the digital era. By distributing trust, it reduces dependency on monopolistic platforms. By lowering the cost of verification, it unlocks new forms of commerce. By centering autonomy, it ensures liberty is preserved even as interactions move online.</p></blockquote><h2>Wallets and Identity and Money</h2><h3><a href="https://www.forbes.com/sites/digital-assets/2025/10/12/from-wallets-to-passports-to-monetization-your-identity-reimagined/">From Wallets To Passports To Monetization: Your Identity Reimagined</a></h3><blockquote><p>The building blocks are falling into place: regulatory clarity in Europe, purpose-built blockchains like Moca Chain, and applications such as Vyvo that show how identity can be applied across industries. The challenge ahead is making these systems interoperable, user-friendly, and economically compelling.</p><p>If wallets truly become passports, and if identity verifications can become income-generating events, then digital identity could shift from being a bureaucratic necessity to a financial opportunity. For users, that means more control, more privacy, and perhaps even more upside from something as simple as proving who they are.</p></blockquote><h3><a href="https://www.bankless.com/read/the-eu-is-building-a-digital-wallet-that-ignores-crypto">The EU Is Building a Digital Wallet That Ignores Crypto</a></h3><blockquote><p>The omission of stablecoins is disappointing given the parallel rollout of <a href="https://www.esma.europa.eu/esmas-activities/digital-finance-and-innovation/markets-crypto-assets-regulation-mica?ref=bankless.ghost.io">MiCA</a> (Markets in Crypto-Assets), the EU&#8217;s landmark stablecoin legislation. MiCA introduces strong reserve requirements, audit obligations, and licensing for issuers of tokens. It is one of the most comprehensive regulatory frameworks for crypto assets on the planet, and it creates a clear legal pathway for compliant stablecoins. Yet, the EU has chosen not to prioritize them in its plans here.</p></blockquote><h2>Company News</h2><h3><a href="https://www.biometricupdate.com/202510/ssi-startup-transcrypts-raises-15m-to-expand-digital-identity-credential-verification-platform">SSI startup TransCrypts raises $15M to expand digital identity, credential verification platform</a></h3><h3>With the new funding, TransCrypts plans to scale its team significantly, focusing on its newly established co-headquarters in downtown Toronto alongside its San Francisco base. The company aims to further develop its credential ecosystem and meet growing demand for trusted, user-controlled identity solutions in an increasingly digitized world.</h3><h2>Research</h2><h3><a href="https://www.nature.com/articles/s41599-025-05880-y">Self sovereign identity in e-governance: blockchain solutions for fintech compliance and citizen-centric financial services</a></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5s15!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F476640cf-e427-4ccd-8acf-398a97b84aa3_1308x852.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5s15!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F476640cf-e427-4ccd-8acf-398a97b84aa3_1308x852.png 424w, https://substackcdn.com/image/fetch/$s_!5s15!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F476640cf-e427-4ccd-8acf-398a97b84aa3_1308x852.png 848w, https://substackcdn.com/image/fetch/$s_!5s15!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F476640cf-e427-4ccd-8acf-398a97b84aa3_1308x852.png 1272w, https://substackcdn.com/image/fetch/$s_!5s15!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F476640cf-e427-4ccd-8acf-398a97b84aa3_1308x852.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5s15!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F476640cf-e427-4ccd-8acf-398a97b84aa3_1308x852.png" width="1308" height="852" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/476640cf-e427-4ccd-8acf-398a97b84aa3_1308x852.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:852,&quot;width&quot;:1308,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5s15!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F476640cf-e427-4ccd-8acf-398a97b84aa3_1308x852.png 424w, https://substackcdn.com/image/fetch/$s_!5s15!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F476640cf-e427-4ccd-8acf-398a97b84aa3_1308x852.png 848w, https://substackcdn.com/image/fetch/$s_!5s15!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F476640cf-e427-4ccd-8acf-398a97b84aa3_1308x852.png 1272w, https://substackcdn.com/image/fetch/$s_!5s15!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F476640cf-e427-4ccd-8acf-398a97b84aa3_1308x852.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div>]]></content:encoded></item></channel></rss>