Identosphere 185: Claims and Credentials Initiative • Plausible Utopias • Bridging the Gap: OpenID and DIDComm • Parallel Signatures in VCs
Your weekly digest of the latest news and developments in Verifiable Credentials, Self Sovereign Identity, and Decentralized ID.
We Gather, You Read!
3+ years and still aggregating industry info: No Marketing, No Sponsorship, Just the top stories in the Verifiable Credentials galaxy!
Support our efforts by PayPal, or Patreon!
Coming Up
[London/Hybrid] MEF CONNECTS ID & DATA 05/21
[Las Vegas] Identiverse 05/28-31 (Kaliya Speaking)
[Santa Clara] PERP ‘24: 2024 USENIX Conference on Privacy Engineering Practice and Respect 06/3-4 USENIX
[Santa Clara, CA] Governing Identity, Respectfully 06/04 Wendy Seltzer, Usenix
[Berlin] Digital ID, Web3, and Metaverses EICC 06/4-7 (Kaliya is Speaking)
[Switzerland] Digital Identity unConference Europe 06/18-20 will sell out get your tickets!
[Portugal] Open Identity Summit: Research, Experience and Innovation 06/20-21
[ARES Conference] International Workshop on Emerging Digital Identities Event 07/30-08/02
[South Africa] DID UnConf: Africa 09/25-27 registration opens soon
Hiring
[Dutch] Mobile Wallet (Native iOS en Rust) Developer
SpruceID Hiring
Quality Engineer, React Native Developer, Site Reliability Engineer, Software Engineer, Android, Software Engineer, Cross-Platform Rust, Business Development, B2B, Business Development, Public Sector, Technical Success Manager
Organization
[Big News!] A step closer to social media consumers: TikTok joins the CAI and C2PA 2024-05-09 Content Authenticity Organization
As the newest member of both the Content Authenticity Initiative (CAI) and the Coalition for Content Provenance and Authenticity (C2PA), TikTok will begin labeling AI-generated content with Content Credentials, with more integration to follow. This makes TikTok the first major social media platform to support the open C2PA standard.
Findynet Initiates OpenID Federation Implementation 2024-05-15 Findynet
This strategic initiative, funded by Findynet, will be executed by Sphereon and Northern Block, based on Findynet’s requirement specification. The core functionality will be made available under an open-source license, promoting transparency and collaboration within the community.
Open Recognition - CAI
Plausible Utopias: the future of Open Recognition 2024-05-08 Doug Belshaw, Open Recognition
Previously, we discussed working towards a manifesto for Open Recognition, an initiative which involves envisioning what we might call ‘plausible utopias’. This is work for and on behalf of the Open Recognition is for Everybody (ORE) Community, which is stewarded by WAO and sponsored by Participate.
Using ZK Proofs to Fight Disinformation 2022-09-29 Dan Boneh
Our cropping proof-generation program creates constraints that assert that the new photo has the same RGB values as the original photo in the cropped range. Table 1 shows the timing results for this program.
[tweet] C2PA is more or less a format for passing around, creating, and consuming stacks of attestations about content 2024-05-09 _laudiacay
If you want to deep-dive, this document is very helpful because it shows "C2PA in context" instead of making you comb through piles of "the first three bytes MAY BE reserved" RFC bullshit. For your ease of mindless Twitter scrolling, I've written a worked example through the entire data supply chain, with UX consideration at every step.
Standards Work
[Youtube] DIF's New Claims and Credentials Efforts 2024-05-16 Decentralized Identity Foundation
The Decentralized Identity Foundation is launching a work item under the Claims & Credentials WG, focused on interoperable credentials for use cases such as: Reusable KYC credentials Age Verification Proof of Humanity
Benjamin Young presented the "VC Test Suite" at W3C CCG 2024-04-22 Harrison Tang
The specification testing is a requirement in the W3C process, and test suites are critical to open-standard development and interoperability. [recording: start @ 9:30]
Post-Quantum Identity Standards 2024-05-07 OpenID
Members of the panel and OIDF members in the room reached consensus that, given the post-quantum vulnerabilities to identity tokens, credentials, and trust ecosystems, this is an area that requires immediate attention on behalf of the Foundation.
[Youtube] Identity in the Era of Quantum Computing -- Notes from OpenID Foundation Workshop Nat Sakimura
@manusporny gave a great presentation on "Parallel Signatures in Verifiable Credentials" at our W3C CCG last week Harrison Tang
two different approaches to securing verifiable credentials: (1) #enveloping format that encapsulates the same payload in multiple envelopes, such as SD-JWT, and (2) #embedded format that adds multiple proofs to the same payload, such as Data Integrity. He then described in detail how Data Integrity and parallel signature work. [recording 9:35]
DIDComm and OpenID4VC
[IIW, Video] DIDComm and OpenID VC Protocols: Demonstrations and Discussion 2024-05-02 Indicio
how to get started with DIDComm, and the other being how OpenID and DIDComm work together — as well as discuss the functionality they can add to existing applications, where we are now, and what the next steps are.
Bridging the Gap: OpenID and DIDComm 2024-05-10 Decentralized Identity Foundation
developers can unlock new functionalities for digital identity while ensuring compliance with regulatory frameworks such as the Electronic Identification, Authentication and Trust Services (eIDAS) 2.0 regulation in the European Union.
Development
The Power of DIDs #6: Unlock the Power of Decentralized Identity with godiddy’s GraphQL API
Today we focus on DID usage across various identity networks with our new godiddy stats graphQL API.
KERI Tutorial: Sign and Verify with Signify & Keria 2024-05-06 Kriskanin Hengniran, Finema
The guide starts with installation and running the agents using Docker containers. The guide then provides a script to showcase the use of Signify and KERIA agents, including procedures for creating autonomic identifiers (AIDs), signing messages, and verifying signatures.
Taking the next step in Zero Trust with Decentralized Identity 2024-05-08 Indicio
In a new White Paper from Indicio, Trevor Butterworth, Chase Cunningham, and Will Groah explain the importance of understanding how identity and security are connected and that a Zero Trust strategy for security can only be fully realized through a decentralized approach to identity.
Research
Self-Sovereign Identity Based Privacy-Preserving Federated Learning 2024-05-07 Rakib Ul Haque, A.S.M. Touhidul Hasan, Mohammed Ali Mohammed Al-Hababi, Yuqing Zhang, Dianxiang Xu
applies Differential Privacy to protect against model inversion attacks and membership inference attacks. The third step focuses on establishing Federated Learning with a novel hybrid deep learning to achieve better scores than conventional methods. The SSI-FL performance analysis is done based on security, formal, scalability, and score analysis. Moreover, the proposed method outperforms all the state-of-art techniques.
SSI4IoT: Unlocking the Potential of IoT Tailored Self-Sovereign Identity 2024-05-03 Thusitha Dayaratne, Xinxin Fan, Yuhong Liu, Carsten Rudolph
identifying a number of key challenges of applying SSI to the Internet of Things (IoT) and providing a comprehensive taxonomy and usage of VCs in the IoT context with respect to their validity period, trust and interoperability level, and scope of usage. The life-cycle management of VCs as well as various optimization techniques for realizing SSI in IoT environments are also addressed in great detail
Evaluation of trust service and software product regimes for zero-knowledge proof development under eIDAS 2.0 2024-04-30 Raül Ramos Fernández
Our findings reveal that ZKP technology must have legal value and a presumption system to be effective. However, the path we take could lead us either to develop a system of surveillance and control in electronic environments or to build an environment where we share not the data itself but proof of its existence.
Product
Empowering Digital Identity: Introducing Socious' New Identity Wallet and Beta Testing Opportunity Socious
Signing up is easy! Visit our Beta Testing Sign-Up Page to learn more and register. We’re offering rewards for your participation and insights—because at Socious, every voice matters.
Understanding Verifiable Credentials on Algorand with Gora and GoPlausible 2024-05-09 Gora Network
GoPlausible is a decentralized protocol on the Algorand blockchain that provides tools for the issuance, registration, and distribution of W3C-compliant DIDs, Verifiable Credentials, and smart utility NFTs in a permissionless and user-friendly manner.
Explainer
Did you know Self-Sovereign Identity is not only about identities? - [Youtube] SSI Beyond Identities 2024-05-07 GluuStream (Identerati Office Hours)
Fundamentals of SSI 2024-05-03 Extremian
Good resource collection
[Government, Australia] A governance regime for all data 2024-05-13 Steve Wilson
I see CDR and Digital ID boiling down to data and metadata, in the broadest sense of that word.
That is, what are the properties of a data record that really matter when deciding whether to use it for some application? Where did the record come from? What is its intended purpose? If it’s a personal data record, then what consent was granted for its usage?
The same sort of metadata is routinely baked into verifiable credentials.
Identity Not SSI
97% of organizations report difficulties with identity verification Security Magazine
Insurance Trends 2024: Navigating Digital Identity Ping Identity
The Rising Threat of Deepfakes: Detection, Challenges, and Market Growth 2024-05-07 Liminal
The market for deepfake detection, crucial in combating the rising threat of deepfakes, is poised for significant growth, with projections showing an increase from $5.5 billion in 2023 to $15.7 billion by 2026, at a CAGR of 42.0%.
UK’s Draft Children’s Safety Codes Could Boost Digital ID, Age Assurance Tech 2024-05-09 FindBiometrics
Central to these proposals is the requirement for robust age verification processes to prevent children from accessing harmful content, such as material related to suicide, self-harm, pornography, and eating disorders.
[tweet] The promise v reality all too often. The Facebook comma widely adopted 2024-05-15 Privacy Matters
Fediverse
Jack Dorsey says he quit Bluesky because it was becoming another Twitter Business Insider
Jack Dorsey quits Bluesky board and urges users to stay on Elon Musk’s X The Guardian
BlueSky 2024 Protocol Roadmap BluskyApp
Holochain 0.2.8 & The Weave Holochain
Thanks for Reading
Read more \ Subscribe: newsletter.identosphere.net
Contact \ Submission: newsletter [at] identosphere [dot] net