Identosphere 176: Ring Signatures using DIDs • Offensive and Defensive Data Management • SSI for Value Chain Pig Production
Upcoming events, company news, organizational updates; standards, specifications, and deep thoughts on everything related to decentralized identity and verifiable credentials
We Gather, You Read!
3+ years and still aggregating industry info: No Marketing, No Sponsorship, Just the top stories in the Verifiable Credentials galaxy!
Support our efforts by PayPal, or Patreon!
Upcoming
Decentralized Identity – a Key to Reusing Identity for Improved Security and User Experiences 03-14
Unlocking the power of identity verification 3/27 1Kosmos
Annual Privacy Forum 2024 ENISA. Submissions due 04/15
[California] Internet Identity Workshop #38 04/16-18
OpenID Foundation Hybrid Workshop at Google 2024-04-15
[Berlin] Digital ID, Web3, and Metaverses EICC 06/4-7
[Portugal] Open Identity Summit 2024: Research, Experience and Innovation 06/20-21
[Switzerland] Digital Identity unConference Europe 06/18-20
[ARES Conference] International Workshop on Emerging Digital Identities Deadline 05/08 Event 07/30-08/02
Hiring
Head of Growth 3Box Labs
OpenID Foundation Certification Program Recruiting a Java Developer OpenID
Systems Administrator The Tor Project
Explainer
#266 - Identity Wallets with Nick Mothershaw of The Open Identity Exchange Identity at the Edge
In this episode, hosts Jim McDonald and Jeff Steadman engage in a fascinating conversation with guest Nick Mothershaw, Chief Identity Strategist at Open Identity Exchange (OIX). They delve deep into topics such as the concept and functionality of digital wallets, the role of governments in issuing these wallets, and the exciting future of smart and roaming wallets.
A Beginner-Friendly Illustrated Guide to Verifiable Credentials 2024-03-06 Rizèl Scarlett for TBD
Microsoft’s dream of decentralized IDs enters the real world 2024-03-04 Wired
“Properly implemented, decentralized digital identity solutions promise to provide more control to users,” Gün Sirer says. “I just fundamentally doubt that the breakthrough we need can come from a centralized software vendor.”
Funding
SITA SERVES AS LEAD INVESTOR IN INDICIO’S SERIES A FUNDING ROUND 2024-03-05 Phocuswire
“We have a technology that can be applied to any kind of decision-making that requires trusting data,” said Dahl. “We have a technology that allows just-in-time data sharing. These are capacities that were dreamed and talked about just a few years ago, and Indicio made them happen.”
Business
Securing Your Digital Future: A Three-Part Series on Enhanced Privacy through Data Protection - Part 1 2024-03-08 Human Colossus Foundation
Developed by the Human Colossus Foundation (HCF) and supported by Kantara Initiative, the BIT provides a robust framework for identifying and flagging sensitive information within data sets. Its purpose is not just to adhere to privacy laws such as GDPR and CCPA but to fortify the semantic understanding of what constitutes 'sensitive data.' The BIT involves a nuanced comprehension of data attributes that, if mishandled, could lead to privacy breaches or misuse.
Balancing Offensive and Defensive Data Management Strategies: Q&A With Fluree's Eliud Polanco - Database Trends and Applications 2023-06-13 DBTA
The offensive data strategy drives business value, revenue, and new products. It’s using data in customer relationships, acquisitions, or development, etc. We are seeing a tough balance of offense and defense. For business managers, being offensive is critical, but it is a balancing act.
Government
The AU Digital ID Bill passes Senate Committee review 2024-03-04 Steve Wilson
It seems to me the government has heeded 15 years of experience of a stagnant digital identity market. With its fresh new Bill, the Australian government has progressed beyond the past idealism of reusable “digital identity”. The Digital ID Bill doesn’t use the term anymore, and instead focuses on digitising the many trusted IDs we already have, so they are more reliable online.
EU
NGI Forum 2023 Unveils Insights for EBSI-CAN Project: Advancing Digital Identity and Credentials 3CL Foundation
The NGI Forum 2023 provided a rich source of insights that directly align with the goals and challenges of the EBSI-CAN project. The shared emphasis on interoperability, privacy, security standards, and collaborative development signifies a harmonious trajectory in advancing digital credentials and cross-border educational services.
EU Digital Identity Wallet: A Catalyst for Business Transformation 2024-03-04 Kuppinger Cole
Protecting the integrity and confidentiality of digital wallet data is critical and requires robust security measures to prevent unauthorized access and ensure controlled access for authorized users. Nevertheless, its legal backing and the EU's commitment to neutrality, security and user privacy sets the EU Digital Identity Wallet apart from corporate digital wallets.
INCM [the Portuguese Mint and Official Printing Office] Implements Verifiable Credentials in Pilot with Universidade Lusófona Using Gataca Technology 2024-03-04 Gataca
"The pilot project with INCM will allow us to test the implementation of verifiable credentials following a self-sovereign identity logic at the Higher Education level. It will be a big challenge, which joins two others where Lusófona University is already a partner, namely the 3rd generation pilot of EBSI and the large-scale DC4EU pilot." - Paulo Ferreira, Innovation Support Office, Lusófona University.
Research
Digitalization of the Value Chain Pig Production - Discussion of Novel Approaches and Application of Self-Sovereign Identity 2023-12-14 Hauke Precht, Cedrik Theesen, Paula Buermann, Jan Reinkensmeier, Jorge Marx
we raise the question if Self Sovereign Identity (SSI) can be leveraged for creating decentralized digital identities, particularly in pig production, by discussing three proposals towards SSI adoption in the value chain pig production. We discuss employing Sovrin’s thing controller approach followed by a proposal for pig representation through Verifiable Credential (VC)
DID:RING: Ring Signatures using Decentralised Identifiers For Privacy-Aware Identity 2024-03-11 Dimitrios Kasimatis, Sam Grierson, William J. Buchanan, Chris Eckl, Pavlos Papadopoulos, Nikolaos Pitropakis, Craig Thomson, and Baraq Ghaleb
assesses the repercussions of employing this new method in the verification process, focusing specifically on privacy and security aspects. Although ring signatures are an established asset of cryptographic protocols, this paper seeks to leverage their capabilities in the evolving domain of digital identities.
DWeb
Startup pitch: Social VIP: A way for organizations to more easily join the fediverse Ben Werdmuller
Fediverse VIP is a managed service that allows any brand to create individual fediverse profiles for its employees and shared ones for its publications, on its own domain, using its own brand styles, with abuse prevention and individual safety features, and with full analytics reporting.
Introduction to P2P Networks Fission Codes
In conclusion, peer-to-peer networks are a resilient and decentralized way to share and distribute files, collaborate with other users, and distribute compute power and resources.
Bluesky
How Does BlueSky Work? 2024-02-24 Steve Klabnik
Furthermore, I think the separation of concerns between atproto and BlueSky are very meaningful, as having a “killer app” for the network gives a reason to use it. It also is a form of dogfooding, making sure that atproto is good enough to be able to build real applications on.
[video] Bluesky and PLC Fission Tech Talks
Bryan Newbold, protocol engineer for Bluesky, joined us to discuss DID PLC, a self-authenticating decentralized identifier that is key to account portability on the Bluesky social network.
Bluenumber: Platform For Digital Identity With Data Rights
B# Single Sign-on (SSO).
BlueSky™ Control Tower. Organizations manage their data vault, SSI wallet and functions to connect,
B# App. Individuals see data assets in their Personal Data Vault (PDV), activate their SSI Wallet to receive credentials, shows who they exchanged data with.
Identity not SSI
[explainer] Who should be in charge of Digital Identity and of IAM?
FIDO Alliance ensures long-term value of its specifications in post quantum era Fido Alliance
Artificial Intelligence and Identity and Access Management Radiant Logic
There is No Such Thing as Privacy KuppingerCole
Thanks for Reading
Read more \ Subscribe: newsletter.identosphere.net
Contact \ Submission: newsletter [at] identosphere [dot] net