Identosphere 104 • Self-Managed Identity (was SSI) • Graph Data Science on VCs • SSI: Systematic Review, Mapping and Taxonomy Research
Contribute on patreon in appreciation for our weekly digest of events, use-cases, explainers, organization and company news and developments in Self Sovereign Identity and reclaiming the internet.
Welcome to Identosphere Weekly Digest!
Consider pledging a small amount each month via Patreon …or contact Kaliya for PayPal
Read previous issues and Subscribe : newsletter.identosphere.net
Content Submissions: newsletter [at] identosphere [dot] net
Upcoming
Open Badges: From Recognition to Empowerment OpenRecognition 10/19-21
Digital Identity For Policy Makers - London 10/24 presented by Kaliya Young
HM Government of Gibraltar DLT seminar by Paul G Astengo 11/01
Internet Identity Workshop #35 11/15-17, Mountain View CA
London - October 24th Digital Identity for Policy Makers Kaliya is collaborating with Newspeak House in London on putting on the 3 hour workshop she led in September - It will walk through key elements of digital identity systems and consider the emerging technologies that are part of considerations of eIDAS and other government identity systems across the globe including issuance of US Green Cards.
New DIF Interoperability Survey ← please fill it out if you haven’t yet
Kaliya co-chairs this group and with these results we we are looking to support more interoperability activity and testing this fall and winter.
Explainer
Verifiable Credentials (VCs) TechFi
The Future Is Here: Putting People in Control of Their Identity with Self-Sovereign Identity Mobile Ecosystem Forum, Michael Becker and Drummond Reed
REBRAND!
Tweet of the week from Kim Hamilton Duffy
Looks like i forgot to mention the fun part! We’re rebranding decentralized id as (current lead) “self-managed identity”, because decentralized id only resonates with us identity wankers who think about the progression from centralized, federated, …
Trends
Overview, Applications, and Use Cases of Multi-Party Computation (MPC) for Key Management Finema
Despite the declining expectation and hype, MPC is predicted to be “transformational” in 5–10 years. Hence, we expect that MPC will be mainstream by the end of this decade.
Badges and Credentials – A new currency for the digital world? with Doug Belshaw Speexx
Listen to this episode for an entertaining deep dive into the topic of badges and credentials, as Donald Taylor sits down with Dr. Doug Belshaw to discuss the importance, various fields of application, and actual value of badges and credentials.
Standards Work
The most important standard in development today Doc Searls
It’s P7012: Standard for Machine Readable Personal Privacy Terms, which “identifies/addresses the manner in which personal privacy terms are proffered and how they can be read and agreed to by machines.”
Neo4J Graph Data Science with Verifiable Credential Data Transmute
The United Nations Trust Graph Transmute
In July the UN/CEFACT eDATA project published a white paper on the adoption of Verifiable Credentials for Cross Border Trade. [...] I will specifically focus on the concept of Trust Graphs, introduced in the white paper (section 3.3). Trust Graphs essentially combine the cryptographic verifiability of VCs with the data analytics potential of knowledge graphs
Using OpenID4VC for Credential Exchange Phil Windley
These specifications support the W3C Verifiable credential data model specification and support both full credential and derived credential presentations. The OpenID specifications allow for other credential formats as well, such as the ISO mobile driver’s license.
RWOT11: A credential profile comparison matrix to facilitate technical and non-technical decision making
Research
Inclusive and Ethical Use of Digital Identity Research Paper Published DigitalIDNZ
Read the Inclusive and Ethical Use of Digital Identity (IEUDI) Working Group’s research and discussion paper on the existing mahi both in New Zealand and around the world in the areas of inclusivity and ethics in digital identity.
Self-Sovereign Identity: A Systematic Review, Mapping and Taxonomy Frederico Schardong and Ricardo Custódio
This study conducts a comprehensive and rigorous systematic review of the literature and a systematic mapping of theoretical and practical advances in SSI. We identified and analyzed evidence from reviewed materials to address four research questions, resulting in a novel SSI taxonomy used to categorize and review publications.
Company Stories
How Capital One Put Identity in the Cloud Ping Identity
Transmute U.S. CBP E-Commerce Tech Demo
Transmute worked with U.S. CBP to craft a storyline for our upcoming e-commerce tech demo in 2024. The story focuses on critical trade verifiable credentials being issued, presented, and verified by trade, CBP, and PGAs.
Holdr+ is an easy-to-use mobile application for sharing data in a privacy-preserving way! Indicio
An easy-to-use mobile application for sharing data with trusted connections in a privacy-preserving way
ATA World Financial Symposium (WFS): Northern Block Post-Event Notes by COO Khalid Maliki Northern Block
In September 2022, Northern Block was selected as part of 16 startups to join Accelerate@IATA’s 2022 cohort, a travel tech startup accelerator jointly run by the International Air Transport Association (IATA)
Adoption
UK International Chambers of Commerce (ICC) announces support for LEIs UbiSecure
The UK’s ICC and its Centre for Digital Trade & Innovation (C4DTI) announced several initiatives to prepare UK trade for the soon-to-be-passed Electronic Trade Documents Bill. The Bill, now in Parliament, removes the hundreds of years old requirement for commercial trade documents to be handled on paper.
Bridging today and tomorrow – ensuring self-sovereignty for learners through ARUCC’s MyCreds
These two international organizations are combining their talents to deliver SSI (self-sovereign identity) and Verifiable Credentials for the ARUCC MyCreds™ virtual wallet [...] for mobile learners, creating a triangle of trust that includes them and the Canadian colleges and universities.
[Video] Why We Use Self-Sovereign Identity CommonLand
[THREAD] JC Ebersbach via Twitter
I'm wondering, is there any initiative to make verifiable credentials public so that everyone can verify them. The use case I have in mind is: companies publish their business registration documents, ISO certificates, etc..
@DecentralizeID replies “Archblock, the team behind the TrueFi protocol, MetaMask Institutional and Parallel Markets, Circle Internet Financial has built the first [Verite] proof-of-concept for “know your business” (KYB) verification”
@darrello replies “The government of British Columbia does this now. https://orgbook.gov.bc.ca/search”
@posth replies “Yes there is --> https://trublo.eu/verisimpledc/”
Reports
Paving a Digital Road to Hell? Anti Traditional Digital ID report by CHRGJ
Since many initiatives are shaped and supported by a global network of powerful proponents, the only way to effectively counter this confluence of interests and ideas, and to change outcomes, is through an equally global effort by the entire human rights ecosystem.
Commentary by Kaliya: This report does not mention SSI at all and the Decentralized Identity industry failure to engage with the human, civil and digital rights community means that this type of report will affect all our work because they don’t understand differences between different systems and all digital ID systems.
Web 3
Account Management in Ceramic: The Evolution of 3ID Ceramic
The first iteration of 3ID kept things super simple and worked similarly to a Key DID in that it was immutable. However, it added some flexibility by allowing the use of a variety of different key types in one DID document.
Extending Sign-In with Ethereum to Authorizations - ReCap Spruce ID
Sign-In with Ethereum describes how Ethereum accounts authenticate with off-chain applications. ReCap introduces a mechanism that allows an off-chain application to combine authentication and authorization of such, while preserving security and optimizing UX.
Moving Our Lives into the Metaverse with Timmu Tõke Step into the Metaverse, The Digital Speaker
● [01:15] - Creating avatars that are used by more than 3500 companies.
● [03:26] - An interactive 3D world that is connected.
● [04:09] - Ensuring identity and repetition in the metaverse.
● [07:46] - The main characteristics of an avatar and what they will look like in the future.
● [14:35] - Looking good virtually: The importance of digital products in the metaverse.
● [16:48] - How interoperability across platforms will be achieved in the metaverse.
● [21:00] - Will identity theft happen in the metaverse?
● [23:29] - What the retail industry will look like in a Direct-to-Avatar world.
Policy
How the Sweeping US Class Action Against Oracle Might Set Remarkable Privacy Precedent Anonyme
According to the plaintiffs, Oracle is collecting this trove of data without user consent. The lawsuit alleges that Oracle even uses proxies to get around privacy controls.”
Tornado Cash Sanctions
Regulating DAOs Schneir
Woods’s speech helped inspire the first DAO (The DAO), and his ideas live on in Tornado Cash. Tornado Cash was designed, in its founder’s words, “to be unstoppable.” The way the protocol is “designed, decentralized and autonomous …[,] there’s nobody in charge.”
Crypto Think Tank Coin Center Sues US Treasury Over Tornado Cash Sanctions 10/12 - CoinDesk [Tornado Cash] allows Plaintiffs to conduct their legitimate activities with some measure of anonymity, use their preferred software tool without fear of penalties
Coinbase is financing a lawsuit to overturn sanctions on Tornado Cash 9/22 - were relying upon Tornado Cash to donate money to relief efforts in Ukraine and to protect their salary information from prying eyes,” he said. “Ordinary people doing ordinary things suddenly swept up in designations that had no basis in law
Coin Center has filed a court challenge against the Treasury Dept. over unconstitutional financial surveillance 6/22 It is a clear overreach for the government to force citizens to spy on each other without a warrant
Use Cases
How to Prevent Certificate Fraud in Education and Training With Blockchain Dock
From Home to Airport to Hotel and Back Again: Indicio’s Route to Seamless Travel Indicio Tech
The Mattereum Universal Bridge Mattereum
Binding the physical object to the law only gets us so far. For the bridge to reach all the way to the blockchain, there needs to be an extra step that binds the law to the chain; this is where Mattereum’s system comes into play. Mattereum makes this all-important final connection through its unique system of Mattereum Asset Passports (MAPs).
Amy Madison @_amymadison via Twitter
you might need to be licensed & registered (plus conduct KYC/AML on users, etc.).
MyData
Data Spaces Support Centre is now launched MyData
The Support Centre will support the Data Innovation Board to propose guidelines for common European data spaces, such as cross-sectoral data sharing standards, requirements for security and access procedures.
Data Space for Skills development kicks off MyData
Via the wide and multidisciplinary network of partners, the project will build consensus and engage with the broad community of skills stakeholders.
Competing with SSI
FIDO Alliance Announces Document Authenticity Certification Program for Remote Verification Fido Alliance
For service providers, the program provides a benchmark when evaluating multiple vendors to ensure they meet global performance standards and can assist in stopping bad actors from creating accounts using fake or stolen documentation.
Identity not SSI
Secure QR Code Authentication Standard Approved by OASIS Open Oasis Open
Minimum Viable IndieAuth Server Here’s Tom with the Weather
[White Paper] Guidance for Making FIDO Deployments Accessible to Users with Disabilities Fido Alliance (Where is the paper like this for Decentralized identity?)
APIs, Fraud, & Number Verify State of Identity - a seamless, SIM-based verification that the user is in possession of their mobile device.
How the NYT Identity team tried out the Analytic Hierarchy Process to select a user ID format. New York Times
Really Interesting NOT SSI but how to think about picking Identity systems inside a company
AHP participants compare pairs of evaluation criteria to establish their prioritization. Then they compare each pair of alternatives for each criterion. For example, Wikipedia’s leader example compares four criteria (six pairwise comparisons) for three candidates (three pairwise comparisons for each of the four criteria).
✨ Thanks for Reading! ✨
Subscribe \ Read More: newsletter.identosphere.net
Support this publication: patreon.com/identosphere
Contact \ Submission: newsletter [at] identosphere [dot] net