Discover more from Sovereign Identity Updates
Identosphere 156: Revocation by EBSI • JSON-LD VCs are NOT just JSON • NSA\CISA Guidance • Towards Interoperable Identity Assurance
Weekly highlights of the latest Verifiable Credentials and Self Sovereign Identity related news, development, events, and commentary from the blog-o-sphere
Identosphere’s Weekly Highlights
We Gather, You Read!
IIW was Great! Updates next week
[Virtual] DIF Hackathon 10/26-12/01 [$19,000 prize pool]
[London] Newspeak House & Identosphere Digital Identity Social with Kaliya Young 11/02 in the evening.
[virtual] An Intro to Trinsic and the BBS Signature Scheme 11/02
[Prague] IETF 118 11/04-10 - lots of identity standards activity happening in this venue now - Kaliya will be attending.
[virtual] Register for our Education Cluster Event Velocity Network 11/08,14
[EU] DIGITAL HORIZONS 360 Sponsorship Invitation. Hospitality Technology Innovation 02/20-21 Spain
Vaultie Senior Product Manager - Hybid Toronto.
The Passing of Vittorio Bertocci
And Just Like That, He’s Gone 2023-10-07 Talking Identity
Writing this post is hard, because the emotions are still fresh and very raw. In so many ways, I feel like I was only just beginning to know Vittorio Luigi Bertocci.
In Loving Memory of Vittorio Bertocci: A Guiding Light in the Digital ID Community 2023-10-12 Joerg Resch, KuppingerCole
There are rare individuals who carve out spaces of brilliance wherever they tread. Vittorio Bertocci was one of those souls; a luminary whose impact resonated not only in the corridors of professional seminars but in the hearts of those fortunate to know him personally. Today, we mourn the loss of Vittorio, who, after a fierce battle with cancer, left a void that words alone cannot
[Video] Zero Identity (Identiverse 2023) 2023-10-14 Steve Wilson, Lockstep
Let’s see if we can design systems without putting identity first. We’ve become obsessed with identity. We seem to begin the design process for each new system with identity.
This reduced integration means that IDV customers can leverage identity data in more business processes, which strengthens their relationship with the IDV vendor.
How Verifiable Credentials Drive Business Value 2023-10-10 Dock, Decentralized Identity Foundation
Alex Lyashok, Merit Protocol’s CEO and Co-Founder, anticipates that this will reduce the cost of the loan application process by up to ten times while preserving employees’ privacy.
[Podcast] Nate Soffio: Reusable Identity in Financial Services 2023-10-12 Trinsic: Future of ID
Portabl’s user experience and how it differs from other reusable KYC products. Nate also provides insight into lessons learned, deliberate product decisions Portable has made, and common mistakes he has seen IDtech founders make.
101 Use Cases for Verifiable Credentials 2023-10-11 Indicio
Recently our team was asked a question that we encounter, in different forms, all the time: “Well, what can we do with verifiable credentials?” Or, “Why would we want them?”
Data ecosystem energy data-X is funded by the German federal government 2023-10-11 Spherity
The objective of the consortium is to build a future-proof, secure and sovereign system for the use of data in the energy industry. This data ecosystem is intended to lay the foundations for innovative business models that can be applied across different value chains and sectors
National Digital Identity set to launch today 2023-10-13 The Bhutan Live
While the Bhutan NDI assures data privacy, the GovTech Agency said that people should be careful before sharing sensitive information or making transactions through the digital wallet.
Its on the Apple store now!
Overlooking legacy systems, the Bhutan NDI wallet is underpinned by the notion of a self-sovereign identity that provides secure verification and transactions between service providers and users who retain sole ownership over their data. The wallet encompasses personal data including health information, tax records, career and education records and bank statements.
[NSA,CISA] Five Key Takeaways From the New NSA and CISA IAM Guidance 2023-10-10 HYPR
On October 4, 2023, the Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA) jointly released new guidance titled Identity and Access Management: Developer and Vendor Challenges, which addresses technology gaps that limit adoption of more secure identity and access management (IAM) practices.
JSON-LD VCs are NOT “just JSON” 2023-10-14 Markus Sabadello
In the world of Verifiable Credentials (VCs), it can be hard to keep track of various evolving formats and data models. A potpourri of similar-sounding terms can be found in specification documents, mailing lists and meeting notes, such as VCDM, VC-JWT, VC-JWS, JWT VCs, SD-JWT, SD-JWT-VC, SD JWS, VC JOSE COSE, SDVC, JsonWebSignature2020, etc.
DecentralizedID is presenting BBS Signatures to the #NIST crypto club on October 18 2023-10-08 Claire Nelson, DIF
Get the meeting invite by sending email here, firstname.lastname@example.org. [BBS Signature Scheme] on its way to becoming a standard via IETF
[NIST SP 800-63] A Major Step Towards Interoperable Identity Assurance 2023-10-09 OpenID
[OIDF eKYC & IDA Working Group] decided to modularize the OpenID Connect for Identity Assurance draft, separating out the schema definition for an element called “verified_claims”. They realised that this JSON structure could be, in their words, “re-usable across many different contexts and application layer protocols including but not limited to OpenID Connect and Verifiable Credentials”. The separated schema definition will also be available to the newly formed Digital Credential Protocols Working Group (DCP WG), that is working on OpenID for Verifiable Credential Issuance and OpenID for Verifiable Presentations drafts.
[EBSI, Whitepaper] Revocation by EBSI: EBSI’s Credential Status Framework and how to choose a revocation method 2023-10-06 European Commission
The modular design of the VC status framework enables use cases to meet their business, privacy, and security requirements by choosing from different strategies for either short-lived or long-lived VCs. Short-lived VCs involve the holder obtaining a fresh VC each time it is needed. In contrast, long-lived VCs may involve obtaining status information directly from the Trusted Issuer, through the EBSI network, or from the Issuer or a third party as a separate status VC.
ISSUE AND VERIFY BBS+ VERIFIABLE CREDENTIALS USING ASP.NET CORE AND TRINSIC.ID 2023-10-09 Damien Bod
The edge or web wallet authenticates using trinsic.id based on a single factor email code. The verifier needs no authentication, it only verifies that the verifiable credential is authentic and valid. The verifiable credentials uses JSON-LD ZKP with BBS+ Signatures and selective disclosure to verify. [Code]
[Webinar] Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Circom support, and blinded issuance 2023-10-13 Lovesh Harchandani, SSI Meetup
We show how various zero knowledge primitives we’ve built can be used in a modular fashion to solve real-world use cases. We cover privacy-preserving signature schemes, zero knowledge attribute equalities, range proofs, and verifiable encryption based on ZK-SNARKs, expressing arbitrary predicates as Circom programs and creating ZK proofs for them and blinded credentials (issuer is unaware of all attributes).
SpruceID Developer Update #36 2023-10-13 Spruce
Research around WebAuthn around creating a consistent signing identity using WebAuthn, creating and signing capability objects using WebAuthn, and using WebAuthn signers with EIP-4337.
Indicio Makes Verifiable Credentials Free to Try, Easy to Adopt 2023-10-10 Indicio
Indicio launches free trial of Indicio Proven™, its award-winning verifiable credential solution
connect your agent to the Indicio Mediator through whatever means your agent provides. This connection will subsequently be used to manage your mediated connections.
It was a great experience for @AnonyomeLabs to take part in the JPMorgan Onyx Digital Identity Hackathon 2023-10-09 Paul Ashley
We focused on the W3C JSON-LD credentials challenge
MUFG, Fujitsu, NTT Data form Japanese consortium for decentralized identity (DID) 2023-10-10 Ledger Insights
Eight Japanese firms [Fujitsu, Hitachi, NTT Data, TOPPAN Digital, ITOCHU Tecno and Hakuhodo Key3] announced the formation of a decentralized identity (DID) and verifiable credential (VC) co-creation consortium (DVCC).
Open-source solution from AyanWorks gets Digital Public Good status 2023-10-09 Business Standard
for an open-source self-sovereign identity (SSI) and digital credentials management system from the United Nations-endorsed Digital Public Goods Alliance (DPGA).
The verifiable digital credential system CREDEBL has been included in the registry of digital public goods maintained by DPGA
Since 2015, Bluenumber has been on a mission to change how people use digital identity and benefit from data they create. We believe that workers have a right to own and benefit from data they generate. We enable workers to have a ‘bluenumber’ (B#), a free unique self-sovereign identity (SSI), an SSI wallet, and a Personal Data Vault (PDV) to own and keep data they create as digital assets. We ensure B# holders behave ethically and respect data property rights. Data creators choose what data to share, when and with whom.
[Product] Provision privacy-first digital identities, usable across platforms Bloock
Leverage zero-knowledge proofs to authenticate users without collecting any credential information, ensuring compliance with GDPR/CCPA and the EU Data Act.
[Wallet] A New Generation of Crypto Wallet Altme
Altme is open-source, built on open standards. W3C, OpenID, DIF, WalletsConnect, Beacon
The future of training and credentialling starts here DIGITAL VERIFIABLE CREDENTIALS
I Have a Verifiable Credential, Now What? 2023-10-10 The New Stack
[Video] The many uses for Verifiable Credentials with James Schulte Identity Insights
SSI models offer best hope for building effective digital ID, academics posit 2023-10-12 Biometrics Update
[Video] Blockchain Use Case - Digitally Verifiable Degree Certificates 2023-08-09 Dhiway
Securely sharing educational records, blockchain shows the way 2023-07-18 DHIWay
A new ‘open loop’ digital identity ecosystem is now inevitable 2023-10-13 Jamie Smith
Digital identity won’t just become easy to use, secure and private. It can become open- like the internet itself. It can work for everyone, everywhere.
[Whitepaper] Identity disruptors: How verifiable credentials, policy, and generative AI are reshaping identity 2023-10-06 Avancer Corp
In this white paper, we dive into how verifiable credentials, policy, and generative AI are reshaping identity security
[IDM Europe 2023] The Rise of Organisation Identity 2023-10-12 Simon Wood, UbiSecure
Just as there are assurance levels associated with individual identities, the same holds true for organisation identities, ranging from low to high assurance levels. This is where the distinction between low assurance organisation identities, such as social groups, and high assurance ones, like legal entities, becomes evident.
Should Ethereum be okay with enshrining more things in the protocol? 2023-09-30 Vitalik
[Web3ID Explainer] Are DIDs the Key to Decolonizing the Internet From Big Tech Giants? 2023-10-10 Richard Larsson, Data Driven Investor - The kind of question we like
[Whitepaper] Compute Anything on Bitcoin 2023-10-09 BitVM
BitVM is a computing paradigm to express Turing-complete Bitcoin contracts. This requires no changes to the network’s consensus rules. Rather than executing computations on Bitcoin, they are merely verified, similarly to optimistic rollups. A prover makes a claim that a given function evaluates for some particular inputs to some specific output. If that claim is false, then the verifier can perform a succinct fraud proof and punish the prover. Using this mechanism, any computable function can be verified on Bitcoin
[BitVM] It would be interesting to apply the W3C Verifiable Credentials Data Model to the claims and proofs Mark Foster 2021-10-10
'Circle Research' to Advance Open Source Development Across Crypto, Blockchain, and Web3 2023-09-29 Circle
Today we are also announcing Circle Research's inaugural contribution - Perimeter Protocol, a new standard for credit facilitation on the internet. Perimeter Protocol is a set of smart contracts built on open standards to enable the seamless exchange of capital on secure, open and public networks.
[German] Bluesky: Blue sky with some dark clouds Heise
It is often overlooked that almost all data in Bluesky is public. If you have an account, you can also use the API to view data that is not displayed in the client, such as who blocks whom or who blocks them. You also have unhindered access to the firehose, i.e. the entire data stream. The network is only not visible from the outside. It is therefore not sensible to link to an external contribution.
Bluesky for Journalists 2023-10-13 BlueSky
each organization now manages verifications for their own journalists too. For example, a newsroom can verify an affiliated journalist through a subdomain like @name.newsroom.com.
Freelance journalists and writers that aren't affiliated with a specific organization can set their username to be their website.
DIF Hackathon: Web5 Challenge 2023-10-11 TBD
Build a decentralized web app using Web5.js
Fission Fridays 2023-10-13 Fission
UCANs were mentioned in the 2023 AT Protocol Roadmap regarding support for verifiable inter-service requests. IPFS Connect Istanbul tickets are on sale now.
ID Not SSI
[Presentation] IT in Health Sector (DIGHEL4360) Security I – Identity Management and Email Security 2023-10-11 UIO - Great Deck on every day IDM for an organization.
The Ping/ForgeRock combination 2023-10-09 Martin Kuppinger KuppingerCole
A couple of months ago, the series of acquisitions of SailPoint, ForgeRock, and Ping Identity by Thoma Bravo triggered discussions and rumors about the impact on the broader Identity & Access Management (IAM) market. Recently, Thoma Bravo announced that ForgeRock would be combined into Ping Identity.