Identosphere 104 • Self-Managed Identity (was SSI) • Graph Data Science on VCs • SSI: Systematic Review, Mapping and Taxonomy Research
Contribute on patreon in appreciation for our weekly digest of events, use-cases, explainers, organization and company news and developments in Self Sovereign Identity and reclaiming the internet.
Welcome to Identosphere Weekly Digest!
Read previous issues and Subscribe : newsletter.identosphere.net
Content Submissions: newsletter [at] identosphere [dot] net
Open Badges: From Recognition to Empowerment OpenRecognition 10/19-21
Digital Identity For Policy Makers - London 10/24 presented by Kaliya Young
Internet Identity Workshop #35 11/15-17, Mountain View CA
London - October 24th Digital Identity for Policy Makers Kaliya is collaborating with Newspeak House in London on putting on the 3 hour workshop she led in September - It will walk through key elements of digital identity systems and consider the emerging technologies that are part of considerations of eIDAS and other government identity systems across the globe including issuance of US Green Cards.
New DIF Interoperability Survey ← please fill it out if you haven’t yet
Kaliya co-chairs this group and with these results we we are looking to support more interoperability activity and testing this fall and winter.
Verifiable Credentials (VCs) TechFi
The Future Is Here: Putting People in Control of Their Identity with Self-Sovereign Identity Mobile Ecosystem Forum, Michael Becker and Drummond Reed
Looks like i forgot to mention the fun part! We’re rebranding decentralized id as (current lead) “self-managed identity”, because decentralized id only resonates with us identity wankers who think about the progression from centralized, federated, …
Despite the declining expectation and hype, MPC is predicted to be “transformational” in 5–10 years. Hence, we expect that MPC will be mainstream by the end of this decade.
Listen to this episode for an entertaining deep dive into the topic of badges and credentials, as Donald Taylor sits down with Dr. Doug Belshaw to discuss the importance, various fields of application, and actual value of badges and credentials.
It’s P7012: Standard for Machine Readable Personal Privacy Terms, which “identifies/addresses the manner in which personal privacy terms are proffered and how they can be read and agreed to by machines.”
The United Nations Trust Graph Transmute
In July the UN/CEFACT eDATA project published a white paper on the adoption of Verifiable Credentials for Cross Border Trade. [...] I will specifically focus on the concept of Trust Graphs, introduced in the white paper (section 3.3). Trust Graphs essentially combine the cryptographic verifiability of VCs with the data analytics potential of knowledge graphs
Using OpenID4VC for Credential Exchange Phil Windley
These specifications support the W3C Verifiable credential data model specification and support both full credential and derived credential presentations. The OpenID specifications allow for other credential formats as well, such as the ISO mobile driver’s license.
RWOT11: A credential profile comparison matrix to facilitate technical and non-technical decision making
Read the Inclusive and Ethical Use of Digital Identity (IEUDI) Working Group’s research and discussion paper on the existing mahi both in New Zealand and around the world in the areas of inclusivity and ethics in digital identity.
Self-Sovereign Identity: A Systematic Review, Mapping and Taxonomy Frederico Schardong and Ricardo Custódio
This study conducts a comprehensive and rigorous systematic review of the literature and a systematic mapping of theoretical and practical advances in SSI. We identified and analyzed evidence from reviewed materials to address four research questions, resulting in a novel SSI taxonomy used to categorize and review publications.
How Capital One Put Identity in the Cloud Ping Identity
Transmute worked with U.S. CBP to craft a storyline for our upcoming e-commerce tech demo in 2024. The story focuses on critical trade verifiable credentials being issued, presented, and verified by trade, CBP, and PGAs.
An easy-to-use mobile application for sharing data with trusted connections in a privacy-preserving way
ATA World Financial Symposium (WFS): Northern Block Post-Event Notes by COO Khalid Maliki Northern Block
In September 2022, Northern Block was selected as part of 16 startups to join Accelerate@IATA’s 2022 cohort, a travel tech startup accelerator jointly run by the International Air Transport Association (IATA)
The UK’s ICC and its Centre for Digital Trade & Innovation (C4DTI) announced several initiatives to prepare UK trade for the soon-to-be-passed Electronic Trade Documents Bill. The Bill, now in Parliament, removes the hundreds of years old requirement for commercial trade documents to be handled on paper.
These two international organizations are combining their talents to deliver SSI (self-sovereign identity) and Verifiable Credentials for the ARUCC MyCreds™ virtual wallet [...] for mobile learners, creating a triangle of trust that includes them and the Canadian colleges and universities.
[Video] Why We Use Self-Sovereign Identity CommonLand
[THREAD] JC Ebersbach via Twitter
I'm wondering, is there any initiative to make verifiable credentials public so that everyone can verify them. The use case I have in mind is: companies publish their business registration documents, ISO certificates, etc..
@DecentralizeID replies “Archblock, the team behind the TrueFi protocol, MetaMask Institutional and Parallel Markets, Circle Internet Financial has built the first [Verite] proof-of-concept for “know your business” (KYB) verification”
Paving a Digital Road to Hell? Anti Traditional Digital ID report by CHRGJ
Since many initiatives are shaped and supported by a global network of powerful proponents, the only way to effectively counter this confluence of interests and ideas, and to change outcomes, is through an equally global effort by the entire human rights ecosystem.
Commentary by Kaliya: This report does not mention SSI at all and the Decentralized Identity industry failure to engage with the human, civil and digital rights community means that this type of report will affect all our work because they don’t understand differences between different systems and all digital ID systems.
The first iteration of 3ID kept things super simple and worked similarly to a Key DID in that it was immutable. However, it added some flexibility by allowing the use of a variety of different key types in one DID document.
Sign-In with Ethereum describes how Ethereum accounts authenticate with off-chain applications. ReCap introduces a mechanism that allows an off-chain application to combine authentication and authorization of such, while preserving security and optimizing UX.
Moving Our Lives into the Metaverse with Timmu Tõke Step into the Metaverse, The Digital Speaker
● [01:15] - Creating avatars that are used by more than 3500 companies.
● [03:26] - An interactive 3D world that is connected.
● [04:09] - Ensuring identity and repetition in the metaverse.
● [07:46] - The main characteristics of an avatar and what they will look like in the future.
● [14:35] - Looking good virtually: The importance of digital products in the metaverse.
● [16:48] - How interoperability across platforms will be achieved in the metaverse.
● [21:00] - Will identity theft happen in the metaverse?
● [23:29] - What the retail industry will look like in a Direct-to-Avatar world.
According to the plaintiffs, Oracle is collecting this trove of data without user consent. The lawsuit alleges that Oracle even uses proxies to get around privacy controls.”
Tornado Cash Sanctions
Regulating DAOs Schneir
Woods’s speech helped inspire the first DAO (The DAO), and his ideas live on in Tornado Cash. Tornado Cash was designed, in its founder’s words, “to be unstoppable.” The way the protocol is “designed, decentralized and autonomous …[,] there’s nobody in charge.”
Crypto Think Tank Coin Center Sues US Treasury Over Tornado Cash Sanctions 10/12 - CoinDesk [Tornado Cash] allows Plaintiffs to conduct their legitimate activities with some measure of anonymity, use their preferred software tool without fear of penalties
Coinbase is financing a lawsuit to overturn sanctions on Tornado Cash 9/22 - were relying upon Tornado Cash to donate money to relief efforts in Ukraine and to protect their salary information from prying eyes,” he said. “Ordinary people doing ordinary things suddenly swept up in designations that had no basis in law
Coin Center has filed a court challenge against the Treasury Dept. over unconstitutional financial surveillance 6/22 It is a clear overreach for the government to force citizens to spy on each other without a warrant
The Mattereum Universal Bridge Mattereum
Binding the physical object to the law only gets us so far. For the bridge to reach all the way to the blockchain, there needs to be an extra step that binds the law to the chain; this is where Mattereum’s system comes into play. Mattereum makes this all-important final connection through its unique system of Mattereum Asset Passports (MAPs).
Amy Madison @_amymadison via Twitter
you might need to be licensed & registered (plus conduct KYC/AML on users, etc.).
The Support Centre will support the Data Innovation Board to propose guidelines for common European data spaces, such as cross-sectoral data sharing standards, requirements for security and access procedures.
Via the wide and multidisciplinary network of partners, the project will build consensus and engage with the broad community of skills stakeholders.
Competing with SSI
FIDO Alliance Announces Document Authenticity Certification Program for Remote Verification Fido Alliance
For service providers, the program provides a benchmark when evaluating multiple vendors to ensure they meet global performance standards and can assist in stopping bad actors from creating accounts using fake or stolen documentation.
Identity not SSI
Minimum Viable IndieAuth Server Here’s Tom with the Weather
[White Paper] Guidance for Making FIDO Deployments Accessible to Users with Disabilities Fido Alliance (Where is the paper like this for Decentralized identity?)
APIs, Fraud, & Number Verify State of Identity - a seamless, SIM-based verification that the user is in possession of their mobile device.
How the NYT Identity team tried out the Analytic Hierarchy Process to select a user ID format. New York Times
Really Interesting NOT SSI but how to think about picking Identity systems inside a company
AHP participants compare pairs of evaluation criteria to establish their prioritization. Then they compare each pair of alternatives for each criterion. For example, Wikipedia’s leader example compares four criteria (six pairwise comparisons) for three candidates (three pairwise comparisons for each of the four criteria).