Discover more from Sovereign Identity Updates
Identosphere 137: Exploring Approaches to Digital Wallets • New SVIP Open Call Re: Wallets • SSI is to Data, as Streaming is to Music •AI Discourse - 5 articles
Continuing to bring you the leading stories surrounding decentralized identity and verifiable credentials on the weekly. Please Contribute (paypal\patreon)
Identosphere’s Weekly Highlights
We Gather, You Read!
[online] did:hack - decentralized identity hackathon for people to learn, collaborate, and build a project centered around decentralized identity. 6/5-8
[Zurich] Digital Identity unConference Europe 6/7-9 ← Kaliya co-facilitating.
[Zurich/Online] 6/9 Digital Identity in the Age of Generative AI: A Group Discussion hosted by RxC Zurich ← Kaliya is the speaker
[Virtual \ Paris] Web3 & Digital Identity: a human-centric technology 06-14
[NYC] Velocity Network Foundation® 2023 General Assembly 6/19-20 ← Kaliya will be attending
[NYC] Future Identity Finance 6/20 ←Lucy will be speaking.
[Amsterdam] The Closing Conference of the Blockchain & Society Policy Research Lab [Call for Papers] 7/3-4
[New Zealand] Digital Trust Hui Taumata: Registrations now open! 8/1
Exploring Approaches to Digital Wallets Identity Woman
Today, we are releasing the Interviews Summary Report, which is an aggregation of key points from the six interviews we conducted respectively with:
David Birch, Internationally Known Digital Money and Identity Expert
Daniel Goldscheider, Founder and Executive Director of OpenWallet Foundation
Luke Mclntyre, Chief Product Officer at MATTR
The Bhutan National Digital Identity Project Team
Jo Spencer & John Phillips, Co-Founders of Sezoo
Karan Puri, Associate Vice President at TD Bank
Self-Sovereign Identity is to Data, as Streaming is to Music 2023-05-30 Marie Wallace
With SSI, and streaming music, you just consume what you need, when you need it, and have access to vastly more data/songs than you would otherwise have.
SSI will not only make vastly more data available, but it will also significantly reduce the cost & risk of consuming personal data and realize new value propositions for both organization and data subject.
Why do detectives at a crime scene collect finger prints? To ‘bind’ the person to the place. Jamie Smith
Identity Binding is where it is at.
If companies start checking the BINDING of my data to my digital wallet - and to a verifiable connection - then the data becomes useless to anyone else.
EU-Digital Wallet – Chances and challenges for EU Digital Identity – a German perspective 2023-06 Steffen Schwalm
a commentary of the current version of Architecture and Reference Framework on EU Digital Wallet - which questions the ARF regarding practical utilization, adoption of existing solutions, needs for wide utilization in Europe and gives an Outlook on possible homework and next steps to achieve comprehensive and holistic EU Digital Identity & Trust Services.
Usability Evaluation of SSI Digital Wallets Abylay Satybaldy
In this article we evaluate the usability of existing SSI digital wallets: Trinsic, Connect.me, Esatus and Jolocom Smartwallet. We study how these early experiments with SSI address the usability challenges. We aim to identify the potential obstacles and usability issues, which might hinder wide-scale adoption of these wallets.
Digital identity models: What’s next for secure and seamless travel? 2023-05-30 European Sting
According to an IATA Global Passenger Survey, 83% of travellers would share their immigration information to speed up the airport arrival process and 93% are interested in a programme for trusted travellers to expedite security screening. The need for digital credentials to facilitate travel is clear.
21st Century Technologies: Identity and Access Management (IAM) 2023-05-31 Capetown Citylife
As governments and industry bodies introduce new regulations and standards aimed at protecting the privacy and security of personal data, organizations must ensure that their IAM systems are capable of meeting these requirements.
The Role of Blockchain in Identity Management and Verification 2023-06-01 Capetown Citylife
Another significant benefit of blockchain technology in identity management is its ability to provide a single, unified source of truth.
User experience is the leading force behind the success and acceptance of any technology, and Self-Sovereign Identity is no exception. Let's face it, even the most groundbreaking tech can flop if users struggle to navigate it.
We're excited to announce the Aries plugin for @veramolabs for our product, CARO 2023-06-01 Spherity
. Fully built around Aries RFCs (selective) using Veramo Message Handler architecture, this plug-in supports selective DIDComm messages. 👉https://github.com/spherity/aries-rfcs-veramo-plugin
This release is the biggest yet, and marks a major milestone in making the framework agnostic of credential formats, ledgers and exchange protocols. We've outlined the top 5 features here
[Video] Proven API Demo Indicio
A short demonstration of how APIs can be used to interact with verifiable credentials.
SSI is in the digital nomad dictionary - but their definition is well…read it for yourself.
Self-Sovereign Identity (SSI) is a concept in the digital movement that only you should own your identity – that is, you should be the one to control your personal data and privacy.
Trend #5: Emergence of Self-Sovereign Identity (SSI)
In an age where personal data is often collected, stored, and controlled by third parties, self-sovereign identity (SSI) is gaining momentum. SSI aims to empower individuals with full control over their digital identities, allowing them to manage and share their personal information securely and selectively.
[Podcast] Digital Credentialing and Cybersecurity VC Trends High Stakes
We will discuss federal, state, and provincial government policy, standards, legislation, and initiatives.
We will also discuss the public benefit component of venture-backed investment in interoperable digital credentialing through commercial open-source software and open standards communities.
[Identiverse 2023] My favorite quote from the irrepressible @Steve_Lockstep in his talk on “Zero Identity” 2023-06-02 drummondreed
“After all this time, the best product to come out of the #digitalidentity industry is verifiablecredentials—digitally signed data.” That’s all we really need.
Among other things, the [VC-DATA-MODEL-2] specifies the models used for Verifiable Credentials, Verifiable Presentations, and explains the relationships between three parties: issuers, holders, and verifiers. Critical pieces of functionality referenced throughout the [VC-DATA-MODEL-2] are the that of verifiability, extensibility, and semantic interoperability. This specification provides a mechanism to make use of a Credential Schema in Verifiable Credential, leveraging the existing Data Schemas concept.
[Report] Plotting the Roadmap for Digital Identity 2023 Curity
Secure digital identities are a critical component in this ongoing digital transformation. Businesses rely on technology to enhance and improve their services and competitive edge. Usernames and passwords will wane in popularity and methods such as biometric authenticators and Passkeys will help deliver these new services and thwart the hackers.
Privacy Preserving Digital Credential Wallets & Verifiers
DHS Operational Components are globally authoritative issuers and verifiers of identifiers, licenses, entitlements, attestations, and certifications, a.k.a. credentials, for a variety of purposes including immigration, residency status, employment eligibility, travel, training, education, affiliation, benefits delivery, organizational identity, and supply chain security.
This SVIP Call seeks privacy preserving technical capabilities that directly support and integrate with the three-party digital identity model (issuer, holder, verifier) enabled by W3C VCDM and W3C DIDs, that could serve the mission needs of DHS Operational Components and Offices including:
U.S. Citizenship and Immigration Services (USCIS)
U.S. Customs and Border Protection (CBP)
DHS Privacy Office (PRIV)
Population scale ID verification in focus at ID4Africa 2023 Biometrics Update
Atick’s presentation also focused on identity verification as a digital public infrastructure, and also emphasized the importance of adopting the right enabling regulatory and legal frameworks to allow the private sector to innovate and invest in the development of other more privacy friendly platforms, such as decentralized identity verification and verifiable credentials.
[Report] Borders 2030: From vision to reality Accenture
Border agencies are continually challenged to adapt to the social, political, cultural and economic forces that shape what they do and how they do it. They serve stakeholders across trade, security, immigration and tourism mandates under unyielding pressure to provide excellent services and facilitate the safe and rapid transit of people and goods.
European Commission is seeking to accomplish a true monetary union within the member states, mimicking the formation of the largest contemporary federal republic – the United States of America. The process has been far from a walk in the park, and there is still considerable work required before the “United States of Europe” becomes a sovereign superstate
From the moment Self-Sovereign Identity (SSI) was identified as a possible solution for the new Swiss E-ID, this new technology has moved into the spotlight – even more so following the Decision of the Federal Council of December 17, 2021. It becomes increasingly clear that SSI goes far beyond issuing a digital identity card.
What is the European Digital Identity Wallet Architecture and Reference Framework (EUDI Wallet ARF)
What is Gaia-X?
What is the European Blockchain Services Infrastructure (EBSI)?
Healthcare Professionals Credential Verification Model Using Blockchain-Based Self-sovereign Identity 2023-05-28 Shubham Saha, Sifat Nawrin Nova, Ishtiaq Iqbal
which verifies healthcare professionals’ credentials to impede them from practicing with fraudulent licenses, disclosing minimal information, and providing data secrecy which proves an attribute from a credential without disclosing the actual value and provides a secured end-to-end communication channel for data transmission.
[Report] Income and Wealth Creation in Web3 CRADL
Kaliya was a reviewer of the paper - there is a section on Identity and personal Data featuring SSI companies.
An exploration of nascent Web3 use cases and projects that purport to support greater equity in income generation, wealth creation, and ownership opportunities.
A reference for industry and policymakers related to business cases using Web3 tooling.
User Generated Content (UGC) are integral to the concept and design of metaverse. To enable complete ownership of UGC, a self-sovereign native identity construct is necessary to ensure users are empowered to control their identity and data across various metaverses.
When asked about SBTs on stage at Consensus during a panel titled “Not Your Keys, Not Your Identity: How to Protect our Most Precious Asset” Thursday afternoon, Daniel Buchner, Block’s head of decentralized identity, made his opinion clear.
Private Beta Update & Roadmap 2023-06-02 BlueSky
Flipboard added Bluesky integration, so now you can browse Bluesky content from within Flipboard
Atlas maps the social clusters on the network, and is a fun way of visualizing communities joining the beta
SkyFeed surfaced custom feeds even before we released them in the official Bluesky app
IS BLUESKY BILLIONAIRE-PROOF? The Intercept
What is Bluesky’s business model? What prevents another Elon Musk from buying Bluesky PBLLC and destroying it 10 years down the line?
Identity not SSI
FIDO Alliance Publishes Research-backed Guidelines for Optimizing User Sign-in Experience with Passkeys FIDO Alliance
The guidelines were created by the FIDO Alliance UX Working Group in partnership with usability research firm Blink UX – with added underwriting support from 1Password, Google, Trusona and US Bank. This group collectively conducted formal research of FIDO user journeys and actively engaged with FIDO Alliance stakeholders to establish these UX best practices.
[Video] Deploy passkeys at work Apple
Discover how you can take advantage of passkeys in managed environments at work. We'll explore how passkeys can work well in enterprise environments through Managed Apple ID support for iCloud Keychain. We'll also share how administrators can manage passkeys for specific devices using Access Management controls in Apple Business Manager and Apple School Manager.
Rule-Based Programming and the Internet of Things Phil Windley
Rules, triggered by an event, determine what should be done to respond to the event. IoT rule-systems use event-condition-action (ECA) rules: when something happens, if this is true, do this. Multiple rules can be triggered by the same event. This allows functionality to be layered on
AI as an evolutionary trend Ben Werdemuller
GENERATIVE AI: WHAT YOU NEED TO KNOW NeedToKnow