Identosphere 105 • BlueSky: Authenticated Transfer • ROI of Digital Signatures • Inclusive and Ethical Uses of Digital Identity
Weekly edition of the latest Self Sovereign Identity related news, development, upcoming events, and thoughtful commentary from the blog-o-sphere SUPPORT US ON PATREON
Welcome to Identosphere Weekly Digest!
Read previous issues and Subscribe : newsletter.identosphere.net
Content Submissions: newsletter [at] identosphere [dot] net
Internet Identity Workshop #35 11/15-17, Mountain View CA
The EEMA Open SSI Forum 11/17 Berlin
[Hiring] Open position: Projects lead MyData Submit your application latest by 20 Nov!
Orie Steele @OR13b Seeking feedback:
I am trying to improve the out of the box semantic support in Verifiable Credentials v2, if you have time to comment, I greatly welcome your feedback on: In support of adding @vocab to Verifiable Credentials V2
SuperSkills! is a learning game ecosystem and digital wallet for kids, developed in partnership with LEGO Foundation, to showcase W3C's Universal Wallet, a packaging of draft standards and open source frameworks
FIDO Conference Authenticate
punchline of the talk “Thus the FIDO standards are adjacent to the most important data security functions today. If an end user device can perform FIDO authentication, then it should only be a matter of programming to extend that device to hold and present verifiable credentials.”
We recognize that web technologies can be used to manipulate and deceive people, complicate isolation, and encourage addictive behaviors. We seek to mitigate against these potential abuses
IDTech framing getting good support
Tim: IDtech is a great label! Much less charged than Web3, Web5 or SSI. I am also starting to use the more boring term of ‘user-controlled data.’
Riley: Yes, and I think they serve different purposes
User-controlled data / self-sovereign identity = a concept or philosophy
Web3 / Web5 = technologies (blockchain, DIDs, NFTs, etc)
IDtech = a product. Something a user can download and/or pay for
The internet’s missing layer Hard Yaka
whether or not Galloway realizes it, what he’s describing is the emerging self-sovereign identity movement and developments around verifiable credentials. You don’t want to trust Meta, but more importantly, you don’t have to when you own your own portable, digital identity.
Anil John Writes
Web3 has an Identity Problem: Building Decentralized Identity by Jelena Hoffart at 9Yards Capital provides a VC's perspective on the applicability of W3C Decentralized Identifiers and W3C Verifiable Credentials to the Web3 ecosystem and its importance.
what we hope to have shown is that in other platform shifts, we are able to build the first few apps before there are great tools
OCA is providing a critical tool to enable “Objectual Integrity”, an essential Dynamic Data Economy (DDE) Principle of the DDE Trust Architecture Semantic Layer (Layer 1), by providing an interoperable solution for data capture and exchange, agnostic to existing data models and representation formats.
The Verifiable Credential Selector is an open source widget that makes it easy for you to gain possession of your data from FinTech apps.
The Transmute Verifiable Data Platform (VDP) is now available for limited beta testing.
We are looking for users with interest or experience in digitally securing a supply chain ecosystem using cryptographically verifiable data.
MEF Market Review: Personal Data and Identity Meeting of the Waters Michael Becker, Identity Praxis
Regulatory, technological, cultural, and economic factors are shifting the context of personal data and identity: the what, when, why, who, where, and how. [download here]
HCF announces Dynamic Data Economy v1.0 Human Colossus Foundation
a trust infrastructure that preserves the structural, definitional, and contextual integrity (DDE Principle 1) of any object and their relationships in the Semantic domain, the factual authenticity (DDE Principle 2) of any recorded event in the Inputs domain, and the consensual veracity (DDE Principle 3) of any purpose-driven policy or notice in the Governance domain. As a result, actors in DDE ecosystems will ultimately have the transactional sovereignty (DDE Principle 4) to share accurate information bilaterally in the fourth domain, the Economic domain.
The Human Colossus Trust Infrastructure Stack Version 1.0 - "Infrastructure" versus "Security" incrementally through the core data domains as a tool to define and describe what contributes to creating a trust infrastructure for access and use of accurate data.
Inclusive and Ethical Uses of Digital Idenity DigitalID New Zealand
Read the Inclusive and Ethical Use of Digital Identity (IEUDI) Working Group’s research and discussion paper on the existing mahi both in New Zealand and around the world in the areas of inclusivity and ethics in digital identity.
The HTF partners with the DIACC on recommendations for a trusted and safe adoption of Digital Identity
The Human Technology Foundation (HTF) is excited to announce its partnership with the Digital ID and Authentication Council of Canada […] to develop a white paper for the fall of 2022 that will provide recommendations to Canadian and European policymakers on ongoing projects, with the common goal of unlocking secure, equitable access to the global digital economy.
DIDAS looks forward to the next steps and recommends a priority treatment in the Federal Council. Furthermore, we recommend pushing for technical proof of concepts and minimal viable products (MVPs) involving all stakeholders and civil society in order to make the best use of the planned implementation timeline for the political decision.
#unfakeablecredentials from http://studio.dhiway.com are digitally verifiable credentials which businesses need today!
[podcast] Hear why SAP has issued verifiable credentials to global partners Velocity Network
recently used verifiable credentials to recognize SAP Success Factor’s ‘partner excellence’ at an event featuring nominated organizations like Accenture, Beamly, Deloitte, EY and PwC.
The building blocks of Self-sovereign Identity (SSI) Crypto Huduga
 Selective Sharing GlobaliD
Self-sovereign identity is making data personal TechMonitor - Countries around the world are adopting their own forms of SSI. Questions about interoperability, however, remain unresolved
[glossary] The ABC's of Decentralized Identity Spruce Systems
[slide deck] The Future of Open Recognition Technology
Open Recognition Challenges
1. Building the World Wide Web of Recognition
2. Recognition should be visible immediately.
3. Pre-defining achievements locally is not necessary to begin recognizing them.
4. Recognition happens in conversations.
5. Recognition builds a community and helps it understand itself.
Who Develops Decentralized Ecosystem Governance? Indicio Tech
The development process is collaborative. There will, inevitably, be specific issues and technical details revealed in development that the rule-makers didn’t consider. The result of this collaborative process is a machine-readable governance file.
[Podcast] Converging Towards a Common Digital Trust Protocol (with Drummond Reed) Northern Block
Wallets vs Agents – their differences, their relationship and how agents will use more and more contextual intelligence to help you make decisions according to your preferences.
Can non-OS digital trust infrastructure providers compete with the device OS providers? (e.g., Apple owns the OS for mobile/desktops/tablets/smart watches)
Comparing DIDComm to NFC – if NFC really facilitates security and trust for close distance, do the combinations of digital wallets, digital agents and protocols (like DIDComm) do the same for trust at distance?
Trust Spanning Protocol – establishing authentic connections where both parties can authenticate each other (using the same hourglass model as TCP/IP). What are the architectural requirements for this protocol? And how can various protocols (e.g., DIDComm, KERI) converge into a trust spanning protocol?
BlueSky: The AT Protocol
Bluesky was created to build a social protocol. [...] today we’re sharing a preview of what’s to come. ADX is now the “Authenticated Transfer Protocol” — or, more simply, the “AT Protocol.”
[thread] Robert Mao (@mave99a) tweets: I just read through the developer document of @jack's new social network @at_protocol by @bluesky. Here how it works in high-level
And this MVP is dedicated to one feature: ID Karma Social Network. I hope it sounds weird to you, cause why the hell do we need one more social network at all? Let's discover it in the next article...
The Highly Anticipated Impervious Browser 😈 Impervious.ai [tech]
October 19, 2022 – Impervious Technologies Inc. (Impervious.ai) today released the Alpha version of the highly anticipated Impervious Browser.
From Structure to Governance, everything you need to know about Metadium to grant trust based on VC (Verifiable Credentials) to various services. Metadium's DID authentication system has demonstrated its capabilities in various government projects and corporate partnerships with solid performance) [docs]
The Month of DAO: What to Expect ConsenSys
Friends with Benefits – the community that uses crypto, not a crypto community Defiant - DAO’s as cities, not companies.
More Than Half of Ethereum Network is Excluding U.S.-Sanctioned Wallets Defiant - ‘Sad Milestone in Censorship’ Pressure on Flashbots and MEV Players
[Podcast] Ethan Buchman & Zaki Manian: ATOM 2.0 – Deep Dive Epicenter
Atom 2.0 has sparked intense debate in the Cosmos community and throughout the blockchain ecosystem. It proposes three pillars for the Cosmos Hub: Interchain Security, the Interchain Allocator, and the Interchain Scheduler.
Talents verify themselves via KYC. We use Stripe Identity for this purpose. During the process, we ask for provide government documents and selfies to prove that the Talent exists. All data is redacted and no logs are stored on Stripe after the verification completes.
Cardano lets you own your identity Cexplorer
Lace will be integrated with a [...] (SSI) platform called Atla PRISM, which uses the Cardano blockchain to function.
Interpol To Create A Metaverse For Training Purposes BitNation - participate in virtual training sessions
The Educational Metaverse DigitalScot
22 Augmented Reality Trends Accelerating the Evolution of the Metaverse AR guru Tom Emrich shares insights on the major tech trends shaping the Metaverse
Migration to the metaverse: We need guaranteed basic Immersive Rights VentureBeat (could be a magical transformation, expanding what it means to be human. Or it could be a deeply oppressive turn that gives corporations unprecedented control over humanity)
Moving Our Lives into the Metaverse with Timmu Tõke Step into the Metaverse, Digital Speaker - why there needs to be a universal system for different worlds, identity validation in the metaverse, avatar interop