Sovereign Identity Updates

Share this post

Identosphere 122: Regi-Trust • Data Primer for Policy Makers • Digital Provenance Tools • Cross-border Paperless Trade Toolkit •

newsletter.identosphere.net

Identosphere 122: Regi-Trust • Data Primer for Policy Makers • Digital Provenance Tools • Cross-border Paperless Trade Toolkit •

Your weekly digest of the latest news, events, and development related to the use of open standards to eliminate centralized control over digital identification

Infominer
and
IdentityWoman
Feb 23
Share this post

Identosphere 122: Regi-Trust • Data Primer for Policy Makers • Digital Provenance Tools • Cross-border Paperless Trade Toolkit •

newsletter.identosphere.net

Identosphere’s Weekly Highlights:
We Gather, You Read!

Contribute to Identosphere by PayPal, or Patreon! We’ll keep aggregating industry info.

Upcoming 

  • Regi-TRUST 4Week Governance Consultation! Regi-TRUST Governance Consultation: How to Operate and Govern a Global Trust Network of Networks? Beginning this week.

  • Update: Conversation with Phil Windley & his new book: Learning Digital Identity 2/28 Online

  • DID:Day 3/1 around ETHDenver - also WalletCon

  • Demystifying the EUDI Wallet Architecture Reference Framework - 3/2

  • APAC Digital Identity unConference 3/1-3 Bangkok, Thailand

  • Digital Identity in Aotearoa – Report and Research results DigitalID NZ 3/9 Virtual

  • Call for Proposals Open Now! MyData 3/15 - 3/26

  • [One Day!] Thoughtful Biometrics Workshop virtual unConference 3/16 [Registration]

  • Webinar on European data sovereignty Innopay 3/22

  • FediForum virtual unConference 3/29-30

  • Save the Date Digital Identity unConference Europe June 7-9 Zurich

Explainer

Regi-Trust

Digital TRUST Infrastructure for Discovery and Validation (Regi-TRUST) is an infrastructure project sponsored and hosted at the United Nations Development Programme (UNDP). The project is intended to develop and provide a suite of tools to enable discovery and validation of trusted services by leveraging existing Internet infrastructures of the Domain Name System (DNS) and its security extensions. 

Beyond Blockchain: How Decentralized Identifiers (DIDs) Work Transmute

Decentralized identifiers can be boiled down to three general types: Ephemeral, Web-based, Blockchain

[video] Kaliya presenting at the Plurality Research Network IdentityWoman.net

VC & DID explained in 5 min!

[howto] How to create a DID:WEB and issue and verify W3C Verifiable Credentials Stavros Kounis

This article will provide a comprehensive yet simple introduction to DID:WEB and the W3C Verifiable Credentials. It will also comes with code snippets and fully working examples in Javascript using the Decentralized Identity libraries.

[twitter spaces] techgirl1908's Feb 22nd panel with @auth0 & @TBD54566975 to discuss Verifiable Credentials TBD

Company Stories

Velocity Trailblazers Challenge

We’re excited to announce our Trailblazers’ Challenge to encourage and reward those who are helping to bootstrap momentum by engaging as many individuals as possible to download a velocity career wallet and claim career and education credentials. The reward is sponsored by Velocity Career Labs, Inc.

Dentity, the Secure Digital Credentials and ID Verification Platform, Closes a Seed Round to Expand Service to Millions of Consumers

“This capital infusion will further support our efforts to bring the most advanced, modern, comprehensive standard for privacy and security to consumers – for free,” said Jeffrey Schwartz, Founder and CEO of Dentity.

Policy

Wyoming - HB0086 Wyoming.gov

AN ACT relating to digital assets; prohibiting the compelled production of a private key that relates to a digital asset, digital identity or other interest or right except as specified; providing a definition; repealing a definition; and providing for an effective date.

Why zero-knowledge KYC won't work Cointelegraph

These eternal ledgers are not designed for personal privacy, and for such use, they are not compliant with privacy regulations such as the General Data Protection Regulation and California Consumer Privacy Act. 

A Ten Point Personal Data Primer for Policy Makers Alan Mitchell, MyDex

We need a much better understanding of where personal data’s opportunities lie, and how to unlock this potential. That is what our White Paper and blog series has done

Open Standards

[tweet] A beckon for Beckn Project VRM (Still investigating)

moving into deployment, and expected to grow toward ubiquity on the same slope as Aadhaar, the government ID now held by 1.35 billion people

Beckn Protocol FAQ - a set of specifications consisting of APIs, data models, reference architecture, transaction mechanisms, and global standards that when adopted by digital platforms, enable the creation of decentralized networks.

Products using VCs

Protected Virtual Meetings

The Protected Virtual Meeting service is built on Microsoft (MS) Entra Verified ID and the IdRamp Virtual Meeting Cyber Security-mesh. […] The solution can protect any virtual meeting or Webcast provider including MS Teams, Cisco WebEx, Zoom, On24, Global Meet and many more.

Making the Spiral Economy a Reality Mattereum

The concept of taking something that’s been used, stripping it down to its components, reusing what you can and melting down the rest for chemicals as a means of efficiently preventing waste is bad engineering, at best. The whole idea of recycling is built on a fundamental falsehood

Badge Count 2022 1EDTech

Detailed findings on the remarkable growth in the use of Open Badges—the world's leading format for digital badges.

Standards Development

What Is a Governance Registry? Continuum Loop

We have ongoing discussions at the Trust Over IP Foundation. Join the ToIP github “Trust Registry” (there’s that term again!) community to dive in!

VCWG F2F in Miami

Minutes: D1 02-14 (Presentation) D2 2-15 D3 02-16

[tweet] W3C Verifiable Credentials Working Group Face to Face in Miami Orie Steele

Native VC formats, one less work item, unlimited mappings… Context is optional in native formats.

[Tweet] There's no tech silver bullet that prevents "bad" data inputs all together, but #verifiablecredentials come closest Karyl Fowler

When you bind identity to claims [about performance, quality of goods/services, etc.] you codify an incentive to meet those obligations + a defense of legitimacy.

Get started with digital provenance tools Content Authenticity Initiative

we share developer demos and tips on how to get started with the CAI's free open-source tools, which activate an open industry standard for content authenticity and provenance

Organization

Passport to the New Economy of Movement — Introducing the ITN

in partnership with MEF ([AAIS] and many consortia to come!), mobiNET is evolving into the Integrated Trust Network (ITN). mobiNET/ITN is a member-owned and operated protocol-agnostic digital infrastructure that provides the core trust services of governance, authority, identity, and assurance.  

New Executive Directors in the Ecosystem

  • Rouven Heck Welcomes Clare Nelson as New Executive Director of DIF DIF

  • A Conversation with Judith Fleenor, The ToIP Foundation new ED. TOIP

Other new Leadership in identity orgs

  • IDENTOS CTO elected as Kantara Initiative’s new Chair of Leadership Council Identos

  • Rayissa Armata elected chairperson of Bitkom’s new ‘Digital Identities’ working group IDNow

SSI Use Cases

  • Who Painted It, Who Owned It, And Who Wants It? DHIWay

  • Verifiable Credentials Digitally Transform Banking, Finance, and Payments Indicio

  • Scammers are creating fake receipts — and a digital shoplifting boom RestofWorld (Why Digitally Signed things are important)

Organisation Identity, Legal Intent, and the Power of Frameworks Ubisecure

At Ubisecure we delivered such a use case over a decade ago that reduced costs for the Tax Office in Finland by 99%. Despite an arguably limited adoption in other jurisdictions, I think we are now at a point where the importance of organisation identity is finally receiving the mainstream recognition it deserves.

[report] Cross-border Paperless Trade Toolkit WTO

Page 28: The United States Department of Homeland Security, for example, is funding the development of DID-based identity credentials as a standard that the United States Customs and Border Protection service can use for supply chain verification.

Web 3

EU Markets in Crypto-Assets (MiCA) with Seth Hertlein, Patrick Hansen, & Rebecca Rettig bankless

a landmark crypto bill over in the EU called MiCA (Markets in Crypto-Assets) and its worth paying attention to!

Web3 NFTs for Identity and Access Control, Now Available on Marketplace Auth0

tokens have a long history in identity and access management. They are the keystone of authorization in many apps, primarily through the issuance of JSON web tokens.

Fetch ENS profile data using Okta Customer Identity Cloud Auth0

Tezos Digital Wallet Altme Now Conformant With European Blockchain Services Infrastructure (EBSI) XTZ News

NFTs could make big extension to token-based IAM

First crypto wallet to become conformant with the European Blockchain Infrastructure

Identity not SSI

A Single Digital Identity Is the Future for State and Local Government Cybersecurity StateTech 

streamlining the identity process across a single user-operated platform, states can provide stronger protection against cyberattacks targeting personal information and reduce the risk of mass exposure of citizen data

Why passkeys from Apple, Google, Microsoft may soon replace your passwords CNBC

Passkeys getting mainstream coverage

Using a passkey allows an individual to gain access to an account by approving the login on an external device, with no password required. [...] From a safety standpoint, passkeys are much more secure than passwords for a number of reasons. 

ISO/PC 317 - New ISO Standard for Privacy by Design Oasis Open

But does it do anything? PC317 operational guidance/vision  “should not delve into detail about ‘how to’, or be prescriptive or restrictive on proving or providing evidence of privacy by design”

This standard represents the first set of preventative international guidelines for assuring that consumer privacy is embedded into the design of a product or service

[Nepal] Shankar Uprety started Hamro Patro to keep track of the local calendar and has since turned it into a must-have super app RestofWorld

Time is different…and we need to remember that. 

The Nepali calendar is not very straightforward [...] while months are based on the solar calendar, days are calculated based on the lunar phases. 

Thieves and Stalkers Engadget

the company requires verification with a government ID and biometric info to activate the feature. And if someone gets caught using them to stalk, Tile’s terms and conditions will slap them with a $1 million penalty.

Thanks for Reading

  • Read more \ Subscribe: newsletter.identosphere.net

  • Please support our efforts by Patreon or Paypal

  • Contact \ Submission: newsletter [at] identosphere [dot] net

Share this post

Identosphere 122: Regi-Trust • Data Primer for Policy Makers • Digital Provenance Tools • Cross-border Paperless Trade Toolkit •

newsletter.identosphere.net
Comments
TopNewCommunity

No posts

Ready for more?

© 2023 Identosphere
Privacy ∙ Terms ∙ Collection notice
Start WritingGet the app
Substack is the home for great writing