Identosphere 131: Feds Talk Regulating Data Brokers • Road to ISO 31700 • Ed\EcDSA Cryptosuite Drafts •
We do our very best to cram the top SSI\VC\DID news ideas and market insight to a single page EVERY WEEK!!!! Consider supporting to our efforts by PayPal or Patreon.
Welcome to Identosphere - We Gather, You Read
Contribute by PayPal, or Patreon! We’ll keep aggregating information crucial to the development of these ecosystems.
Send us a message at firstname.lastname@example.org if you have an RSS feed you want us to track for this digest.
Digital Identity from Vienna #36: Thinking Locally and Globally for Digital Wallets and Identification 5/2 [SignUp]
GS1 Standards Week 4/25-27 - business and technical [...] Retail, Consumer Goods, Fresh Foods, Healthcare, Transport, Logistics
eIDAS 2.0 l New Opportunities in Digital Identity 4/27 Frankfurt
Silicon Valley Innovation Program (SVIP) Demo Week 2023 Washington, DC 5/18-19 [register]
The 19th Represents Summit on tech, justice, and economic mobility Chicago 5/18-20
Web 3.0: Self Sovereign Identity for Startups 5/24 - Panel at Wacom Europe GmbH
Heroes of Data Privacy – the practise-oriented data privacy conference in Vienna LionsGate 5/24 Vienna, Austria
London Event: MEF CONNECTS Personal Data & Identity 5/25 Identity Praxis, Inc.
Digital Identity unConference Europe 6/7-9 Zurich ← Registration open
Velocity Network Foundation® 2023 General Assembly NYC 6/19-20
The Closing Conference of the Blockchain & Society Policy Research Lab 7/3-4 Amsterdam
Operations Manager (Remote) Indicio - be responsible for assisting with the creation, development, and maintenance of the internal systems that support the documentation and communication
[linkedin] Decentralized Identity: Empowering Users and Enhancing Privacy Next Level Tech
DID and VC — Core Standards On The Road To Self-Sovereign Identity Ziden - [in Part 1 and Part 2], we described “Decentralization, Privacy, and Interoperability” as the three essential pillars in our solutions
[IoT] The Design of Trustworthy Things Talking Identity - Trust is something that you earn, something that is given to you.
Inclusive Economics and the Access Economy: The Role of Decentralized Identity, Open Access, and an Ethical Web3 Elacity
we see six defining elements that will create the Access Economy [...]
Open Markets and Exchange [...]
Users Control Their Identity [...]
Users Own Their Content [...]
Community and Inclusive Economics [...]
AI as a Driver for Access [...]
New Ethics for The Access Economy [...]
[...] for the $104.2 billion economy to mature it needs to use an inclusive approach to safeguard users
[tweet] The existing tech in the decentralized identity space can provide the HOW DarrelO
[IIW, OpenID Workshop] OpenID Presentations at April 2023 OpenID Workshop and IIW SelfIssued
OpenID Connect Working Group [PDF]
Introduction to OpenID Connect [PDF]
[tweet, IIW] DIDComm V2 Interoperability-athon at the Internet Identity Workshop! Tony Rose
[Thoughtful Bio] Thoughtful Biometrics 2023 takeaways Kaliya Identity Woman
One of the highlights for me was learning about what is happening in Portland. They are doing pretty deep civil society engagement around biometrics including making an inventory of surveillance technologies. [book of proceedings]
Unlocking the Potential of Reusable Identities Liminal via SCMag
consumer education remains a significant barrier to widespread adoption, which big tech marketing budgets aim to address this year.
Research Report: The Market for Reusable Identity and How to Get There
[Podcast] Digital Credentialing and Cybersecurity VC Trends High Stakes
We will discuss federal, state, and provincial government policy, standards, legislation, and initiatives. We will also discuss the public benefit component of venture-backed investment in interoperable digital credentialing through commercial open-source software and open standards communities.
Government \ Public Sector
[Australia] Queensland digital licences rollout in Townsville after delays ABC AU
Driver's licences, marine licences and photo identification cards will be accessible via a phone app designed by the Thales Group.
[Finland] Findynet Test Network technology survey results Findinet
we wanted to focus on tried and tested technologies that are usable right now [...] We received 15 responses by the end of March [...] The results are published in the report Findynet Test Network Technology Survey Results.
[Canada] Canadians Continue to Demand Transparency and Control Over Personal Data DIACC
Regarding digital wallets, familiarity with the concept continues to grow, with 59% of respondents being familiar in 2022, compared to 54% in 2021. In addition, the use of digital wallets is also increasing, with 41% of respondents using one in 2022 compared to 38% in 2021.
[Māori, New Zealand] How we communicate identity’s changing landscape matters to society DigitalID NZ
Māori already have a long history of developed systems for communicating identity [...] examples of these being Tribal registries, Māori land court records, and Iwi or Hapū membership cards. This raises questions around whether Te Ao Māori will then adopt the use of DID’s and VC’s
[eIDAS, White Paper] Using FIDO for the EUDI Wallet FIDO Alliance
It certainly raises questions of how data brokers aren’t just violating people’s privacy but their civil liberties as well. ….This isn’t acceptable. Data brokers’ days of surveilling in the dark should be over. - Feds blast ‘shadow’ operations of data brokers, revive calls for federal privacy law SCMagazine
[GLEIF, ICC, Citi Bank, MonetaGo, IATBA] The Importance of LEI in Global Trade and Supply Chains Ubisecure
The LEI is the only standardised, regulated and global method to identify verified organisations
[GLEIF, Business] LEI and the History of Identities for Businesses Ubisecure
Clare Rowley: I will go all the way back to September of 2008 […] now referred to as the Lehman weekend.
Without Verified Digital Identities, Sustainability Will Lose its Battle Ubisecure
[individuals] can buy different types of carbon credits (e.g. offset a flight) to reduce their carbon footprint. All these transactions are made in the voluntary carbon market, so called because the purchases are made without any obligation
[Aruba] Aruba streamlines travel procedures with the new Aruba Happy One Pass for US travelers RoutesOnline
Governments, airlines, and airports are increasingly seeing the benefit of a digital credential, which streamlines the identification process and still allows the passenger to better control their data using a medium they prefer: their mobile device.
Invest in Aviation’s Identity-First Future - NEC’s Latest White Paper Find Biometrics
NEC lays out the case for investing in digital ID technologies for aviation, drawing on the latest market research from FindBiometrics and Acuity Market Intelligence to present a vision of air travel’s bright, identity-first future.
What Is JWT Authentication? How Does It Work? 1Kosmos
A JSON token consists of three parts:
• A Header containing information about the type of token and algorithms used to generate the signature.
• A Payload containing the “claims” (ID and authentication verifications) made by the user that can include a User ID, the user’s name, an email address, and metainformation about the operation of the token.
• A Signature, or cryptographic mechanism, is used to verify the token’s integrity.
Privacy by Design: Road to ISO 31700 with Ann Cavoukian and Katryna Dow Ubisecure
“If you don’t have a strong foundation of security from end to end with full lifecycle protection, you’re not going to have any privacy.” ~ Ann Cavoukian
ISO 31700-1:2023 Consumer protection — Privacy by design for consumer goods and services — Part 1: High-level requirements
Verifiable Credentials Working Group has published the following two First Public Working Drafts W3C
• EdDSA Cryptosuite v2022: […] using the twisted Edwards Curve Digital Signature Algorithm (EdDSA) and Curve25519 (ed25519).
• ECDSA Cryptosuite v2019: […] based on the Standards for Efficient Cryptography over prime fields using a verifiably random Elliptic Curve (secpr1).
Tutorial: SSX and Next.js SpruceID
Creating your Next.js project - you can skip this step if you already have one
Adding SSX dependencies - how to install the dependencies on your project
Setting up the Backend - how to configure your backend
Setting up the Frontend - how to configure your frontend
Issuing W3C Verifiable Credentials From a SQLite Database Trinsic
Identify your data source
Create a credential template in the Trinsic dashboard
Set up the Trinsic SDK
Query the data from the database
Transform the data into a JSON that maps to the credential template
Issue and send credentials to the user wallets
Easy Migration to Open-Source Verifiable Credentials with Indicio’s Proven API Indicio
By migrating to Indicio Proven, you are able to take advantage of Decentralized Ecosystem Governance (DEGov), which allows you to easily approve and manage credential issuers, and arrange complex and hierarchical information flows.
Try and Test Verifiable Credential Technology with Indicio Proven Sandbox Indicio
Inside the sandbox version of the Indicio Proven platform, users have access to their own easy-to-use platform for issuing, sharing, and verifying credentials — all while receiving full technical support from Indicio’s experts
TBD's SSI Service hosted by benri.io TBD
It is not meant for production use, but is a learning tool to learn more about SSI technology.
[github] Transmute Verifiable Data Platform GitHub Action Transmute
We're thrilled to unveil Transmute's GitHub Action. Integrating DIDs and VCs into your workflow has never been easier - and it's never been done like this before.
Civic Milestones and Updates: Q1 2023 Civic
It’s easy to connect a wallet and experience the user flow for issuing a Civic Pass on Ethereum, Polygon and Solana. In this way, we’ve made it far easier for dApps to test out the capabilities of Civic Pass before integrating.
LATE FILING OF ANNUAL FINANCIAL STATEMENTS LIQUID AVATAR TECHNOLOGIES
The Company has access to sufficient funds now […] the Company has requested that the Ontario Securities Commission and other Canadian securities regulatory authorities issue a temporary management cease trade order
Bluesky is my favorite Twitter clone yet TheVerge
Right now, the small community is delightful to be a part of. And thanks to the AT Protocol, the service has a promising future.
Twitter’s decentralized alternative Bluesky arrives as an invite-only iOS app
The Jack Dorsey-backed social network could be getting closer to becoming a reality.
The AT Protocol Developer Ecosystem Bluesky
we’ve made it a priority to simplify the complexity of building on top of it. This effort extends to not only new clients, but also new experiences, such as algorithmic choice and composable moderation.
Growing the Fediverse reb00ted
PeerTube for video, PixelFed for photos, FunkWhale for audio, Mobilizon for events, OwnCast for streaming, Bookwyrm for reading, Micro.blog for blogging and more … and all interoperating on the same network. Each new feature like that grows the Fediverse, as I can now do more things
Identity not SSI
Password intelligence infused in IBM Security Verify SaaS IBM
IBM Security X-Force is comprised of researchers, ethical hackers, and engineers from across the globe. The X-Force team crawls the web to find phishing websites and reverse hacks the sites to identify the phished passwords that ultimately may be used in password spraying and credential stuffing attacks.
[Certificate Authorities] Google’s 90 Day Proposal for TLS Certificates Entrust
CA/Browser Forum (CABF) meeting in late February, Google announced its Moving Forward, Together This initiative includes a proposal to reduce the maximum TLS certificate validity and domain validation reuse period from the current 398 days to 90 days, which will impact many certificate subscribers.
Thanks for Reading
Read more \ Subscribe: newsletter.identosphere.net
Contact \ Submission: newsletter [at] identosphere [dot] net