Discover more from Sovereign Identity Updates
Identosphere 143: ENISA's EUDI Wallet Recommendations • Lightweight VCs Schema and Process TC • CCG Standards Stack
Verifiable Credentials and Self Sovereign Identity. From standards development, product updates, enterprise insight, Web3, DWeb, real world use, policy and research. Thanks for your continued support.
Welcome to Identosphere Weekly Digest!
Thanks to our Supporters!
Contribute on Patreon …or reach out to Kaliya directly
Read previous issues and Subscribe : newsletter.identosphere.net
Content Submissions: newsletter [at] identosphere [dot] net
[Los Angeles] Digital Identity Security Architect ZipRecruiter
OASIS Enlists Key Players to Advance Secure and Interoperable Verifiable Credentials Standard 2023-07-12 Oasis Open
Lightweight Verifiable Credentials Schema and Process Technical Committee (LVCSP TC) [...] will focus on developing a lightweight, scalable, and interoperable schema, based on the W3C Verifiable Credential (VC) standard, that enables individuals and organizations to easily and securely share their verified credentials across various domains.
Traceability Interop Draft Credentials Community Group
ENISA issues new EUDI Wallet recommendations in report on digital ID standards 2023-07-14 Masha Borak, Biometric Update
One of ENISA’s key recommendations for policymakers regarding the EUDI Wallet is finding a clear legal definition of the term “digital identity.” Another is to use the new Digital Markets Act to provide direct access from the mobile application to the security anchor provided by EU CC-certified secure elements available on smartphones.
Decentralized Identity – a Playbook for Your Enterprise 2023 Anne Bailey, Kuppinger Cole
The recent ‘Overcoming Human Harms in Digital Identity Ecosystems’ white paper [...] lays out the moral case for a systemic framework for understanding and mitigating digital identity harms and explains the commercial benefits of enhanced trustworthiness:
Reduced reputational, compliance and fraud risks
Reduced human resource management and customer service costs
Increased revenues and investment — the ultimate value of trustworthiness
Digital Wallet Interoperability: Overcoming Challenges & Embracing Ecosystem-Level Collaboration 2023-07-14 Christine Martin Continuum Loop
We can pave the way towards enhanced interoperability by establishing trust relationships through deliberate partnerships, adhering to standardized protocols, and leveraging technological advancements like Trust Registries.
Ten Actions Countries Should Take to Create a Digital-Identity Ecosystem 2023-07-14 Tony Blair Institute for Global Change
As our recent paper The Great Enabler: Transforming the Future of Britain’s Public Services Through Digital Identity examines, some countries have a political battle to win before advances can be made. But research from Deloitte indicates that people are more in favour of digital identity than opposed, particularly when the benefits are made clear and security and privacy are priorities.
[Privacy] Challenging Public Private Surveillance Partnerships: A Handbook for Civil Society 2022-06 Privacy International [handbook][checklists]
Investigate a public-private partnership, find out relevant information
Ask the right questions to the partners involved (private and public)
Identify concerns related to the technology involved and the governance of the partnership
We have separately developed a set of safeguards for public-private surveillance partnerships, that you can use for advocacy ideas once you have identified concerns through this handbook.
[USA] State Department’s Young Latin American Leaders Program to Bring 14 Entrepreneurs to Atlanta 2023-04-04 Global Atlanta
Over four weeks in the city, they will also be embedded within local organizations in the following sectors
educational tools and content teaching democracy
human rights advocacy
mental health services
SSI (self-sovereign identity) […]
[USA] The past, present and future of authentication 2023-07-17 Sriram Karra, Aaron Weis
We were pleased to take part in the Biden Administration’s symposium today focused on multi-factor authentication (MFA), continuing the industry’s ongoing efforts to strengthen authentication for online security.
[Bhutan] What Adoption of the National Digital Identity Bill means 2023-07-11 The Bhutanese
It allows people with incapacitations to appoint guardians to manage data through the NDI wallet on their behalf. And People who lack digital literacy can also opt to do the same.
[Beyond SSI, India] How a simple tag helped India save fuel worth $8.4 billion 2023-07-12 Rest of World
India made FASTag mandatory for vehicles in February 2021. The tech seamlessly transfers the toll fee from the vehicle owner’s registered e-wallet — such as their Paytm wallet — to the National Highways Authority of India (NHAI).
[UK] Now Eurostar passengers can bypass UK border checks at St Pancras by scanning their face and passport at home with new facial verification app 2023-07-18 Daily Mail
Eurostar said the launch of the technology is aimed at easing congestion, although it is currently restricted to only its Business Premier and Carte Blanche passengers.
Yes, I’m an independent consultant now 2023-07-11 Mike Jones
I named my business Self-Issued Consulting. Special thanks to Heather Flanagan, who clearly explained to me why I want to be a consultant at this juncture in my career, and who told me to write a Standards CV before I launched my professional Web site.
Spruce Developer Update #33 2023-07-10 Spruce
Re: SSX, SIWEth, Kepler, SpruceID, DIDKit, TreeLDR, Rebase
Unlocking the Power of Identity and Communication: Our New Messaging Feature 2023-07-12 Lissi ID
The messaging feature in the Lissi Wallet app is currently limited to uni-directional communication. This means users can only receive messages, but not send them. While this sounds limiting at first, it ensures organisations can focus on providing value without being overwhelmed with individual customer requests.
Microsoft Entra Expands into Security Service Edge with Two New Offerings 2023-07-11 Sinead O'Donovan Microsoft [Related]
With Identity and Network Access solutions working together, organizations don’t need to spend time deciding which tool would work better for each app, or how to bridge the policies your identity team created with the policies your networking team created. You can now configure unified identity and network controls with Conditional Access in Microsoft Entra.
Lifecycle Workflows is now generally available! 2023-07-14 Microsoft
User identity lifecycle is a critical part of an organization’s security posture, and when managed correctly, can have a positive impact on their users’ productivity for Joiners, Movers, and Leavers (JML).
Key Terms in Decentralized Identity 2023-07-11 Indicio
Most people will never need to know the meaning of any of these terms, they will simply enjoy the seamless benefits, privacy protection, and security that the technology delivers; but as this technology is increasingly deployed, a quick lexicon of essential concepts and terms will help businesses and organizations get a better grasp of the digital transformation now on tap.
DIAM Demystified: Unveiling the Secrets of Decentralized Identity and Access Management for a New Digital Era! 2023-07-16 Know
As businesses and businesses embrace this transformative technology, the possibilities for secure and trusted digital interactions are limitless. The future of identity is decentralized, and DIAM is leading the way toward a more secure and empowered digital world.
Authentication With Web5 2023-07-13 Ebony Louis, TBD
This user-friendly approach relieves you from the burdens of creating new content or manually downloading from one platform to upload on another. All the content to which you have granted the application access to will be readily available for the application to read/write to, simply by logging in with your DID.
Decoding the Internet: The Rise of Web 3.0 and Self-Sovereign Identity 2023-07-13 Gravity Earth
As our digital footprint widens, the spotlight turns onto the invisible threads that connect our lives to the internet. However, these threads, representing our personal data, are often tangled in a complex web of security risks and privacy concerns, prompting us to question - What’s wrong with the internet?In this article, we aim to unravel these complex threads, dive into the challenges of the current internet landscape, and journey from the early times of the internet Web 1.0 towards the promising horizon of Web 3.0
Shadow Identity, how to fix internet identity 2023-07-12 Krill
An Identity Proxy (IP) is an identity that serves as a wrapper or a mediator between one identity or an entity (a human being) and any other one or multiple identities. The main feature of IP is retaining ownership of one or multiple identities, becoming a singular access point. Account abstraction on Ethereum could be counted as a specific implementation of IP.
ChainDiscipline - Towards A Blockchain-IoT-Based Self-Sovereign Identity Management Framework 2023-05-25 Marius Popa, Sebastian Michael Stoklossa, Somnath Mazumdar
In this paper, we proposed and implemented a generic blockchain- IoT-based self-sovereign identity management framework called ChainDiscipline. We have demonstrated the framework's operability and functionality by implementing healthcare and smart home data management-based use cases.
[Research] Evaluation of Trust Service and Software Product Regimes for Zero-Knowledge Proof Development Under Eidas 2.0 2023-07-10 Raül Ramos Fernández
Our findings suggest that the path we take may lead us to the largest system of surveillance and control in electronic environments to date, or to an environment where instead of sharing data we share proof of its existence to achieve true decentralized identity systems in the EU environment.
Google Embraces Digital Assets With Updated Play Store Policy 2023-07-14 The Defiant
Mills added that Google Play will soon talk to “industry partners” regarding improving its support for “blockchain-based app experiences, including in areas such as secondary markets.”
The news comes as Google appears to be expanding its presence in the web3 industry. Over the past year, Google Cloud has inked partnerships with Polygon, Solana, Near Protocol, and Hedera.
This mission highlights the Verida Wallet’s support for Polygon ID in receiving and storing Verifiable Credentials. Moreover, it demonstrates how these credentials can be presented to third parties using Zero-Knowledge Proofs, ensuring privacy and confidentiality.
How Crypto Security is Evolving in 2023 2023-07-11
Arkham intelligence is a ‘’next-gen company intelligence platform’’. It sounds like something owned by the real life Batman, and much like your average vigilante-hero of the people, Arkham has recently come under fire for its controversial practices. Because UNLIKE a superhero, Arkham, which is known for its AI platform and searchable database of crypto users, has been accused of doxxing users for MONTHS.