Identosphere 102 • VCs for Vital Records in California • Post Quantum vCreds • Ethereum's Identity Layer
Your weekly digest of upcoming events, company news, organization updates, open standards development and the latest headlines related to self sovereign identity.
Join a growing group of subscribers in supporting of our efforts to track the ecosystems growing around Self Sovereign Identity.
Become our Patron Today! (…or reach out to Kaliya directly to get an invoice for a year support)
Thanks to our Supporters!
Read previous issues and Subscribe : newsletter.identosphere.net
Content Submissions: newsletter [at] identosphere [dot] net
Internet Identity Workshop #35 11/14-16, Mountain View CA
Prices go up October 10th - will likely sell out again - get tickets now!
Verifiable Credential’s Policy Committee (Kaliya Chairs) in California had a big win this week 🎉
approved another on Wednesday that instructs county records offices to allow for the use of blockchain technology and verifiable credentials. The technology would be established in the distribution of birth, death and marriage records, allowing PDFs [sic] to be sent immediately rather than using a typical 10-day postal delivery.
6 months of KI Identity Assurance in the UK Kantara Initiative
We believe it is vital that certification bodies work with DCMS and UKAS in a spirit of partnership – bringing together the cumulative value of dozens of great minds! To this end, we have been encouraged by the proactive approach of DCMS in creating forums where the 5 certification bodies can discuss ideas and feedback on the program in action.
I know almost everyone can probably find something that they wished were different in the bill. On the other hand, I do think we have a band-aid for the American people who are just fed up with the lack of privacy online
SSI4Web: A Self-sovereign Identity (SSI) Framework for the Web Md. Sadek Ferdous, Andrei Ionita of FIT & BRAC University
a framework for integrating Self-sovereign Identity (SSI) for providing web services in a secure passwordless manner with much more user control and greater flexibility. We provide its architecture, discuss its implementation details, sketch out its use-case with an analysis of its advantages and limitations.
Toward a Post-Quantum Zero-Knowledge Verifiable Credentials Simone Dutto, Davide Margaria, Carlo Sanna, Andrea Vesco of LNKS Foundation & Politecnico di Torino
we select as one of the possible post-quantum alternatives a lattice-based scheme proposed by Jeudy, Roux-Langlois, and Sander, and we try to identify the open problems for achieving VCs suitable for selective disclosure, non-interactive renewal mechanisms, and efficient revocation.
Data is the lifeblood of the digital world. Data sharing can only expand. Of course nefarious, underhanded and misleading collection must be fought, but well-intended data collection must continue. Instead of changing the way data is used, we must change the way data is presented. We must make data better.
A pilot project for interoperable decentralised identity between Aigües de Barcelona, CaixaBank and Validated ID Validated ID
The lines of action of the laboratory are framed in six blocks: resilient water resources, the impact of global change; efficient infrastructure management; the environment and health; water and energy; and water demand management. The projects developed contribute to the achievement of one or more Sustainable Development Goals, putting the citizen at the center of digital transformation and advocating a perspective on technological humanism.
[Podcast] Are Trust Registries Vital to the Success of Decentralized Identity? Northern Block, with Darrell O’Donnell
What are the differences between Verifiable Data Registries and Trust Registries?
How can Trust Registries help establish the Authenticity of Data?
Does placing too much Governance at the Verifiable Data Registry layer cause scaling issues?
Why DNS can become an elegant Root of Trust solution to validate the authenticity of Credential Issuers.
Who in the Trust Triangle benefits the most from Trust Registries
RFC and IPR Review: PCTF Infrastructure (Technology & Operations) Final Recommendation V1.1 DIACC (RFC Closes 10/27)
The intent of the Infrastructure (Technology & Operations) component is to identify the operational policies, plans, technology and technology operations requirements to support implementation of the principles of the PCTF Profiles in the context of a Digital Identity Ecosystem.
BC Digital Trust BCGov
Nice resources page from BCGov
OrgBook BC A live service providing organization-related Verifiable Credentials in BC, Canada
Verifiable Credentials for People Tools and services for issuing and verifying Verifiable Credentials
Safe Entry BC Demo A prototype of a contactless way to manage access to a facility, using Verifiable Credentials
Conference Book Demo A demo showing the use of Verifiable Credentials for attending a conference
Chat Server Demo A demo giving access to a chat service using Verifiable Credentials
Circle and Industry Leaders Have Built the First Decentralized Identity Proof-of-Concept for Crypto Finance using Verite Credentials Circle
Circle joined other crypto and blockchain companies in February 2022 to introduce Verite as a open-source framework for decentralized identity credential issuance, custody and verification. Verite is designed to help make it safer, easier and more efficient to do business across the transformative worlds of DeFi and Web3 commerce.
TBD and Circle are collaborating on a set of open standards and open source technologies aimed at enabling global-scale, mainstream adoption of digital currency in payments and financial applications. The first step of which will support cross-border remittances and self-custody wallets that can hold stablecoins.
Zero Trust, Web5, and GLEIF’s vLEI Timothy Ruff
In an email exchange during the last 72 hours, Sam opined about the McKinsey Technology Trends Report for 2022 (the full report), which strongly touts both self-sovereign identity (SSI) — which I now believe should be considered as part of Web5 — and zero trust architecture (ZTA). As happens often, I found Sam’s private comments insightful, but this time so much so that I’m making them immediately public, with his permission.
The new FPX Junction cloud software suite is designed for fine-grained API authorization and user-centric digital identity management. The digital wallet and user-managed access 2.0 authorization server work together to enable single-sign on federation. An optional user interface SDK for the digital wallet provides native mobile and web support.
Open Workplace Recognition using Verifiable Credentials WeAreOpenCoop
Yesterday, the draft Verifiable Credentials for Education, Employment, and Achievement Use Cases report was published [...] The next version of the Open Badges specification (v3.0) will be compatible with Verifiable Credentials (VCs).
By producing an accessible, open-source wrapper library, Tangle Labs provides any business or development team the opportunity to easily explore SSI and to test and prototype solutions that can bring added value to your business.
Introduction to Decentralized Identity IOTA Wiki
We had the opportunity to present on Ethereum's Identity Layer, covering the evolution of decentralized identity, and how Ethereum presents an incredible opportunity for users to truly own and control their identity and data. Check out that talk in this post.
By incorporating the main components detailed above: DIDs, tokens and verifiable credentials, Civic.me is our proof of concept for an enriched identity layer on Web3, which goes beyond simple public keys and wallets.
In this summary paper, we will explain the different components of decentralization, the benefits of decentralized systems, examples of how different projects have approached the process of decentralizing, and good-faith critiques of decentralization. This paper will act as a TL;DR summarizing the concept of decentralization within its current usage, while providing linked resources throughout for those interested in digging deeper into specific areas.
Create a governance token that gives holders the right to vote in some sort of directly- democratic process;
Distribute governance tokens, usually as an airdrop to past users and stakeholders based on specific criteria determined by the initial project team;
Invest in processes that relinquish the founding team’s control over the project, like creating a constitution to help navigate future challenges, forming internal working group structures, passing control of administrative controls and treasury management to the community of stakeholders, and providing a venue for stakeholders to participate in governance discussions.
Tweet of the week (emphasis ours)
Self sovereign online identity is going to be a CRITICAL tool for everyone on the internet. Without it, we will lose trust of any content on the internet due to AI advancement in the next 12-24 months.
This one of the most urgent issues in our society today.
Most Refugees and IDPs did not have the time to properly prepare by gathering all their important documents such as passports, identity cards, driver’s licenses, and land titles or rental agreements. Fleeing your home may save your life, but fleeing without identity documents can lead to a very long wait – sometimes a decade or more – before your life is stable again.
Until now, we relied on physical id document such as ID cards driving licenses to identify ourselves in the real world as well as online. Digital attributes and credentials were solely used online. Digital identity wallets, like the IDnow Wallet, are about to change that, as they are simultaneously addressing our digital and real-world requirements by bringing physical and digital credentials together.
The global supply chain management market size was valued at USD 10.1 Billion in 2020 and is projected to reach USD 19.3 Billion by 2028. Supply chain is the path for any product such as food, clothes, or appliances to go from where it was a produced, to distributors, procurement officers (quality inspections), and the market.
Similarly, a battery passport is nothing but a presentation of data points about a particular battery – who manufactured it, its physical and chemical composition, its current state of health, whether it was refurbished or repurposed from another battery, and so on.
The two main ingredients of SSI are verifiable credentials (VCs) and decentralized identifiers (DIDs).
According to W3: "Verifiable credentials represent statements made by an issuer in a tamper-evident and privacy-respecting manner."
Self-Sovereign Identity, Zero-Knowledge Proofs & the Future of Data Blockchain Australia
No other additional information is needed to complete this data exchange. So how do you know that the information being provided is authentic? The identity ‘proof’ uses a cryptographic hash function that confirms beyond any doubt that the identity claim is accurate.
The public keys, as the name implies are there to view anytime and are used for exchanging information and can be revoked, however, the private key is for the account holder himself, be that an issuer, a verifier, or a subject. It is only through a private key that one can pass on his credentials using his DID to an issuer who then validates the credentials and sends them to the verifier using his DID.
Identity not SSI
The platform, Amnesty says, wasn’t merely a passive site with insufficient content moderation. Instead, Meta’s algorithms “proactively amplified and promoted content” on Facebook, which incited violent hatred against the Rohingya beginning as early as 2012.
The OpenID Connect Logout specifications are now Final Specifications
Thanks to all who helped us reach this important milestone! This was originally announced on the OpenID blog.