Discover more from Sovereign Identity Updates
Identosphere 133: Beyond Client/Server • DIDs on Metamask • SSI Market Share • Decentralized Social Networking Protocol
Thanks for reading our weekly digest: news, policy, events, jobs, and the proliferation sovereign identification systems, and verifiable credentials. We are appreciate your support! (Paypal\Patreon)
Identosphere’s Weekly Highlights:
We Gather, You Read!
[online] Is Your Association Ready for Verifiable Credentials? Credivera 5/15 - providing greater value to their constituents, while protecting their education and credentialing programs
Silicon Valley Innovation Program (SVIP) Demo Week 2023 Washington, DC 5/18-19 [register]
[Brussels] Blockchain-Based Identity Management Systems: Opportunities and Challenges 5/24 - CPDP gathers academics, lawyers, practitioners, policy-makers, industry and civil society from all over the world to discuss the latest emerging issues and trends
Web 3.0: Self Sovereign Identity for Startups 5/24 - Panel at Wacom Europe GmbH
Heroes of Data Privacy – the practise-oriented data privacy conference in Vienna LionsGate 5/24 Vienna, Austria
[Virtual Option] London Event: MEF CONNECTS Personal Data & Identity 5/25 Identity Praxis, Inc. ←-Rebekah CEO of Numeracle is presenting
Digital Identity unConference Europe 6/7-9 Zurich ← Registration open (Kaliya is helping organize)
[podcast] Thinking Beyond Client-Server Architectures (with Daniel Hardman) Northern Block, SSIOrbit
The purpose of this podcast episode isn’t to sway people against using client-server architecture for digital identity implementations. Rather, we aim to have a discussion around the trade-offs we make when making these architectural decisions.
Internet Centralization: What Can Standards Do? IETF, Mark Nottingham
This document discusses centralization in Internet protocols and relates it to consolidation of power, explains why both are undesirable, identifies forces that contribute to them, catalogues limitations of common approaches to decentralization, and explores what Internet standards efforts can do.
The OAuth 2.0 Demonstrating Proof-of-Possession at the Application Layer (DPoP) specification was approved by the IESG (spec)
enables presentation of Verifiable Credentials as Verifiable Presentations. Verifiable Credentials and Verifiable Presentations can be of any format, including, but not limited to W3C Verifiable Credentials Data Model, ISO mdoc, and AnonCreds.
This specification defines how Verifiable Credentials can be represented as JSON Web Tokens (JWT) [RFC7519] and secured using JSON Web Signatures (JWS) [RFC7515].
What happened to MITREid Connect? Justin Security
• No internal user management, this would be handled by the corporate identity management system and plugged in through a service layer
• Pluggable authentication, so we could adapt it to whatever the corporate system and our customer environments had in place already
IPVM, or the InterPlanetary Virtual Machine, is Fission's effort to bring computation to IPFS using Wasm, SPKI, and object capabilities. Furthermore, IPVM liberates computation from its dependence on prenegotiated services and paves the way for interoperability.
New Paper Released in English
security requirements for mobile, native wallet architecture for self-sovereign users and evaluate the existing security solution building blocks for hardware-bound key storage, biometrics and features of Android and iOS operating systems. The regulatory requirements are addressed through …
[Case Study, Digital Product Passport, GS1] Empowering Sustainable Products and Consumer Confidence through Verifiable Credentials IDUnion
The proposed legislations, the Eco-design for Sustainable Products Regulation (ESPR) (ESPR)2 and the "new Battery Regulation"3 provide the opportunity to drive this change by mandating the use of a digital product passport (DPP).
[Ethereum Zürich, Education] Self-Sovereign Identity UZH Blockchain Center; Daniel Saeuberli, ProofSpace
happy to be here and was invited by by the University of Zurich because of the project we did with them when it comes to student self-centered identities and master diplomas as verifiable credentials
[podcast] Monaco with Walt.ID
Dom from Walt.ID joined the Podcast to explain to us what Walt.ID is all about, and how they are working towards the adoption of digital identity. Working with several companies, partner of IOTA Foundation and also involved with governments.
• The global identity solutions market was estimated to be worth $27.9 USD billion in 2022 and is expected to grow to 70.7 billion in 2027, which is a Compound Annual Growth Rate (CAGR) of 20.4%.
• Data by Gartner shows that 30% of all national governments will enable Digital Identity Wallets for mobile phones by 2024.
• In one study, 90% of global consumers said they would be willing to use a single digital identity service instead of providing their personal details to every site they use.
[video] authentic storytelling for the era of generative AI Content Authenticity
Content Authenticity Initiative presented a panel to discuss how transparency tools and context meets the challenges and opportunities in generative technologies.
[tweet thread] Decentralized Identity, or DID, is a Proof-of-Citizen Infrastructure MashBean
Therefore, digital sovereignty = Sovereign State + Self-sovereign identity. One cannot be missing. This is the direction I have been researching recently. (5/5)
The public sector forms outlined here are generalizations for the purpose of framing a discussion around the design, implementation and adoption of digital wallets and the digital identifiers and credentials stored there-in [...]
• Central authority, strong decentralized authority with wary support of population
• Centralized authority, strong decentralized authority with support of population
• Strong centralized authority with support of population
[USA] The Best & Worst States in America for Online Privacy (2023 Update) Private Internet Access
• Authentic conversations -- from the head, the heart, and the gut
• A feeling of ownership. Participants become evangelists
• A spirit of group creativity, experimentation, exploration, good will.
Blue checks for email are a bad idea Ben Werdmuller
It’s an unequal, annoying policy, made worse by the realization that Gmail is likely to add
SSI & Web3ID
What Is Decentralized Identity? The Pillar of Web3 Blockworks Research
Another banger from Blockworks
Users need to be able to express their identity without accidentally making sensitive information permanently public [and] without carrying every mistake into an interaction. The decentralized identity ecosystem also [...] needs guarantees that [an] applicant isn’t hiding negative reputation claims.
Identity Snap - DIDs on Metamask Tuum Tech
Frequency, the first implementation of The Decentralized Social Network Protocol (DSNP) [...] is probably best known as the protocol underpinning real estate billionaire Frank McCourt’s Project Liberty.
Rather than charging transaction fees to send messages, Frequency uses a token staking model that earns “capacity”
[tweet thread, Web3, DNS] Web3 Domains and their intersection with Decentralized Identity (DID) HashBrown Research
Conflates DID with their use in Web3 DNS
Not sure there is an actual “standard” involved
This means developers can use one common standard for making attestations that interoperate across the Superchain and Ethereum Mainnet.
Blue skies over Mastodon Erin Kissane
Mastodon fans know that the network absolutely cannot compete on user friendliness and basic social functionality
The fediverse and the AT Protocol Ben Werdmuller
One core difference between the fediverse and the AT Protocol seems to be that AT decouples many key building blocks – identity, moderation, ranking algorithms, even your own data to some degree – from your server. The fediverse, on the other hand, ties them all to your server and sees that as a desirable feature.