Identosphere 172: Survey on DIDs and VCs • EBSI Projects • Standardization in Employee Verification • On Trust, Trustworthy, and Trustworthiness
Your weekly digest in Verifiable Credentials and Decentralized Identity. You have the power to Support this Publication with Patreon or Paypal.
We Gather, You Read!
3+ years and still aggregating industry info: No Marketing, No Sponsorship, Just the top stories in the Verifiable Credentials galaxy!
Support our efforts by PayPal, or Patreon!
Upcoming
Announcing the Agent Explorer Plugin Hackathon 1/25-2/22 Veramo
[Webinar] PRIVÉ Digital Wallet - Getting it right with privacy and trust in Digital Identity Wallets 2/13
OPC Canada has extended deadline for comments on draft biometrics guidance 02/16
[EU] DIGITAL HORIZONS 360 Sponsorship Invitation. Hospitality Technology Innovation 02/20-21 Spain
[Webinar, Paywall] Road to EIC: What’s Next in Digital Identity Standards? 02/21 Kuppinger Cole
A European Blockchain technology for the use in accreditation and certification 02/29
[Online] OIX Members Meeting 03/05
[Ethiopia] MOSIP Connect 03/5-7
Annual Privacy Forum 2024 Enisa. Submissions due 04/15
[California] Internet Identity Workshop #38 04/16-18
Sponsorship opportunities for IIW and DICE
Hiring
Director, Product Management for the Customer Digital Identity team Walmart
Identity and Access Management IAM Officer The Office of the NATO Chief Information Officer (OCIO) at the NHQ in Brussels
Standards
Public Review Period for Proposed Implementer’s Draft of OpenID for Verifiable Credential Issuance Until 3/24 OpenID
On Trust, Trustworthy, and Trustworthiness 2024-01-25 ToIP Trust Registry Protocol v2 TF DRAFT
The term trust is loaded with varied meanings that often conflict. In the context of trust registries we need to establish the scope of what we are talking about when we apply the term “trust” to trust registires. There are baseline definitions that follow this limiting scope.
A trust registry does not create trust. The decision for one entity to “trust” another is their decision. A trust registry may provide information that helps the consuming party in deciding that an entity is trustworthy.
Adoption
Demystifying the Maze: User Psychology in Self-Sovereign Identity Adoption 2024-02-09 Omer Shafiq
the success of SSI hinges not only on technological prowess but also on a deep understanding of user psychology. By addressing concerns around trust, privacy, and convenience, fostering a sense of control, and leveraging the power of community and education, we can pave the way
A Survey on Decentralized Identifiers and Verifiable Credentials 2024-02-04 Carlo Mazzocca , Abbas Acar , Selcuk Uluagac , Rebecca Montanari , Paolo Bellavista , Mauro Conti
we first provide the background on DIDs and VCs. Then, we analyze available implementations and offer an in-depth review of how these technologies have been employed across different use-case scenarios. Furthermore, we examine recent regulations and initiatives that have been emerging worldwide. Finally, we present some challenges that hinder their adoption in real-world scenarios and future research directions.
Use Case
[Supply Chain] Bridging the Digital Deserts Along Your Supply Chain 2023-12 Transmute, Nis Jespersen
It is remarkable how much paper is passed around supply chains. Very often, emailing a PDF is considered “digital”, despite still depending on human consumption. The standard has arrived to change this: the globally recognized W3C internet standard for Verifiable Credentials enables a scalable approach to digitally signed, structured data.
[Deepfakes] Paravision Unveils AI-Powered Deepfake Detection for Fraud and Misinformation Protection 2024-02-06 Paravision
Paravision Deepfake Detection employs AI-based analysis to assess the likelihood of digital manipulation using leading deepfake generation technologies, and outputs a score to guide automated or human-in-the-loop fraud analysis.
[Travel, Video] Verifiable Credentials: A look ahead at 2024 - Spotlight: Travel and Hospitality 2024-01-30
verifiable credentials are acting as a catalyst for revolutionary breakthroughs and a look at what's to come. From digital passports to seamless experiences across airports, hotels, cruises, and more
[Energy] DENA and Energy Web Unite to Launch DIVE to Transform the Energy System with Digital Identities 2024-02-05 EnergyWeb
At the heart of the DIVE project lies a critical objective — establishing secure and reliable digital identities for devices and systems within the energy sector. These digital identities act as trust anchors, verifying the existence and capabilities of each system in real time. By automating verification processes, DIVE allows device owners to choose and change the electricity use cases that their devices are participating in almost no time and little effort, ensuring grid stability and cost savings for energy consumers.
[Employment] Embracing Standardization in Employee Verification 2024-02-01 DIDAS Swiss
The practicality of the EmployeeID VC was tested in real-world scenarios by organizations SBB, AXA, Orell Füssli, and Swisscom. Together they showed the power of an interoperable eco system based on the credential “EmployeeID”.
Banking
Addressing identity-related fraud with verifiable credentials 2024-01-23 The Paypers
Banks often view digital identity as a potential profit centre, but there is a lot to be gained by preventing spiralling fraud costs
Shifting Loan Power to Borrowers 2024-01-30 TBD
To provide a more holistic view of a person's creditworthiness, FormFree developed a new system called Residual Income Knowledge Index™ (RIKI™). Instead, RIKI analyzes monthly income and spending. Integrating this method into our existing credit system provides greater opportunities for home ownership, car purchases, and other essential loans.
Data Protection
The Role of Self-Sovereign Identity in Data Protection 2023-08 SelfKey via CoinMarketCap
By enabling users to provide explicit consent before their identity information is shared, SSID may prevent the unauthorized collection and use of personal data, as every sharing instance requires user approval. This may minimize the exposure of sensitive information, reducing the attack surface for potential hackers.
[tweet] 🔓 The 'mother of all breaches' exposed 26 billion stolen records 2024-01-26 CondatisUK
Cyberattacks like these underscore the critical necessity of digital identity solutions for all-around security
FreshMenu Data Breach 2024: Case Study 2024-02-01 HypersignID
this article explores Hypersign's Encrypted Data Vault (EDV) as a robust solution for enhancing data security. Encrypted Data Vaults employ advanced encryption and blockchain technology to ensure secure data storage, selective data disclosure, and integrity. This approach makes sensitive data inaccessible and unreadable to unauthorized entities and provides a scalable and interoperable framework for data privacy.
Education
The Future of Verifiable Credentials in Education 2024-02-05 Phillip Shoemaker, Identity.com
The education sector has seen remarkable technological advancements in recent decades. However, challenges such as fraudulent activities, lack of credential transparency, and the difficulty in tracing qualifications persist. These issues underscore the need for technology in critical areas of the educational process.
Issue Unlimited Academic Credentials for Free Gataca
The Higher Education Program is an exclusive opportunity for universities to get started with ID Wallets and digital academic credentials - tamper-proof, verifiable, and easy to share
Business
[Blogs Review] Don't Sell SSI … build on top of it. Outlook of 2023 in SSI journey 2023-12-31 Volodymyr Pavlyshyn
Government
[Audio] Unveiling Bhutan's National Digital Identity Ecosystem 2023-11-28 Untrustables
In this debut episode of the (un)Trustables Podcast, we dive into Bhutan's groundbreaking National Digital Identity (NDI) project, exploring its core components, its impact on citizens, and the incredible governance journey behind its creation. Join us on a journey of digital transformation, inclusivity, and the power of decentralized identity (SSI) on a national scale.
Qualified Ledgers: Bridging the Gap between Blockchain Technology and Legal Compliance 2024-01 Schwalm Steffen
With the close binding of QTSP on QEAA and the wallet so the mandatory correlation of implementing acts for EUDI Wallet and QEAA both components directly depend on each other — same with the PID as mandatory for EUDI Wallet. EUDI Wallet, PID and QEAA depend on same protocols, formats etc. as given in the ARF.
EBSI Projects: Make information easy to verify and almost impossible to fake. EU Commission
Public Sector: The Spanish case - Municipality Credentials - European Qualification Passport for Refugees
Education and lifelong learning: Student Authentication - University Alliances - Transcript of Records - Micro-credentials: Success Story - Formal Accreditation and Recognition - Bachelor / Master Degree - Vocational Education and Training
Employment: Work certificate - Licence to Practice
Development
[Code] DSR Contributes reference implementation of Selective Disclosure for JWTs (SD-JWT) in Rust to OpenWallet Foundation DSR
Becoming a member of the OpenWallet Foundation, DSR proposed the SD-JWT code contribution, committing to its ongoing maintenance and preservation as a reference implementation.
Acceptance Networks for Self-Sovereign Identity 2024-01-29 Phil Windley
Acceptance networks are an instantiation of the metasystem for a particular set of users and types of transactions. A metasystem for self-sovereign identity might have several acceptance networks operating in it to facilitate the operation of specific identity systems.
How to build a human-centric data space: introducing the Blueprint for the European Data Space for Skills & Employment 2024-02-01 MyData
This first version of the DS4Skills Blueprint, developed by a set of expert partners and in collaboration with a wide community of interested stakeholders and the Data Spaces Support Centre (DSSC), includes:
Usage Scenarios: Practical applications for the data space.
Business Models: Frameworks for data space use cases.
Governance Models: Structures ensuring effective data management.
Technical Architecture: Building blocks for seamless integration.
User Experience Recommendations: Enhancing usability for diverse needs.
Explainer
[Report] Decentralized Identity vs. Traditional Identity Management THE ULTIMATE COMPARISON GUIDE Gattaca
This guide aims to demystify decentralized identity and provide a clear comparison with traditional identity management systems. It is designed to be a resource for organizations navigating the evolving identity landscape, helping them make informed decisions about the future of identity management. We will explore the technical foundations, practical implications, and strategic considerations of both models.
SSI: a primer in 11 steps 2024-01-30 GI DE
We don’t include a lot of explainers, anymore, but this seems like a good approach.
An identification protocol is required that is easy to use, widely accepted, digital-specific, and completely secure from a data privacy standpoint. At the same time, it should be operationally independent of commercial players. SSI can address this need.
Identity not SSI
Estonia and Iceland: a tale of innovation and collaboration in digital identity E-Estonia
[Web3ID] Crafting the Future You: A Guide to Building Your Digital Identity in the Metaverse PintaPash
Entrust in Talks to Buy Onfido FindBiometrics
New Mozilla service seeks to protect personal info from data brokers SCMagazine
[Conspiracy Watch] WEF Agenda touts biometric digital identity, liveness detection to combat deepfakes Sociable
[Web3ID] Who Are You? Welcome to the Kinode Identity System Kinode
Like ENS, Kinode domains (managed by our KNS) are registered by a wallet and owned in the form of an NFT. However, unlike ENS, Kinode domains never expire.
Thanks for Reading
Read more \ Subscribe: newsletter.identosphere.net
Contact \ Submission: newsletter [at] identosphere [dot] net