Identosphere 191: Digital Product Passport for Plastic Recycling • Zero Knowledge Proofs in Digital Identity • Building Credibility into Digital Credentials
Weekly edition of the latest Self Sovereign Identity related news, development, upcoming events, and thoughtful commentary from the blog-o-sphere. Thanks for your continued support.
Identosphere’s Weekly Highlights
We Gather, You Read!
We’re still aggregating industry info.
Thanks for supporting our efforts by PayPal \ Patreon
Coming Up
[ARES Conference] International Workshop on Emerging Digital Identities Event 07/30-08/02
[California] DWebCamp 08/07-10
[South Africa] DID UnConf: Africa *an IIW Inspired Regional Event 09/25-27 REGISTRATION IS OPEN!!!
[California] Internet Identity Workshop #39 10/29-31 Super Early Bird Registration is Open.
Standards
OASIS Launches Global Initiative to Standardize Supply Chain Information Models 2024-06-20 Mary Beth Minto; www.oasis-open.org
With escalating cybersecurity threats exploiting software supply chain vulnerabilities, there’s an urgent need for better understanding and proactive measures to identify and prevent future risks.
Group Note: Verifiable Credentials Overview 2024-06-13 w3.org
This document provides a non-normative, high-level overview for W3C's Verifiable Credential specifications and serves as a roadmap for the documents that define, describe, and secure these credentials.
The Verifiable Credentials Working Group has just published a Working Group Note of Verifiable Credentials Overview.
Government
Germany’s Wallet Strategy, Interop Profiles, Big Tech (with Kristina Yasuda & Niels Klomp) 2024-06-14 Christine Martin; northernblock.io
They delve into Germany’s approach to creating a secure and user-friendly wallet infrastructure, the challenges of achieving interoperability across different systems, and how major technology companies are shaping the digital identity space.
Lessons from the City of Helsinki: Three Paradigm Shifts in Smart Cities 2024-06-14 mydata.org
Essentially, the service (=news) delivery model was flipped. By leveraging user data and sending personalised notifications, we aimed to create a more engaging and relevant news experience. This user-centric and proactive approach inspired me to advocate for a similar model in the public sector. I was wondering if we can proactively or even automatically deliver services to citizens based on their needs and eligibility, potentially saving time, money and improving accessibility.
Markets
In today’s world, people want to know what's going on with their personal data 2024-06-21 www.scmagazine.com
This new regulatory environment also presents a unique opportunity for innovation. Businesses are actively seeking ways to comply with data sovereignty laws while maintaining operational efficiency. This drives innovation in data management and security technologies.
Digital Identity: There’s a Lot at Stake - Entrust Blog 2024-06-20 Adam Gothmann; www.entrust.com
A 2023 Connectivity Benchmark Report revealed that 72% of customer interactions are digital, and we’re witnessing the convergence of payments and identity in real time with the expectation that 30% of digital identities will be stored in mobile wallets by 2029, according to a 2023 report from Goode Intelligence.
Company Stories
Microsoft Entra ID Governance licensing clarifications 2024-06-18 techcommunity.microsoft.com
the term “multi-tenant organization” has two descriptions: an organization that owns and operates more than one tenant; and a set of features that enhance the collaboration experience for users between these tenants. However, your organization doesn’t have to deploy those capabilities to take advantage of the one person, one license philosophy.
Introducing Our New AI-Powered Drag-and-Drop PDF Feature for USMCA Certificates of Origin 2024-06-14 Benjamin Collins; Transmute Tech Talk
Drag and Drop: Simply drag your existing USMCA Certificate of Origin PDF into the designated area in our web application. AI Processing: Our advanced AI technology reads the PDF and extracts the necessary information. Digital Conversion: The extracted data is then populated into a digital form.
[career] SSI With Trusted Credentials: Exploring Velocity Network Checks - Part 1 2024-06-16 Velocity Network
Reinventing how career records are shared across the global market. Empowering individuals, businesses and educational institutions through transformational blockchain technology – public, open, trusted and self-sovereign.
Velocity Network's Architecture for Issuer Trust - Part 2 2024-06-18 Andres Olave; Velocity Network
Velocity Network’s major value-add is to provide a globally regulated environment for holders, issuers, and relying parties to exchange data and operate within a walled garden of trust and, therefore, reliable data.
Authoritative Sources for Verifiable Credentials - Part 3 2024-06-18 Andres Olave Velocity Network
Issuer permissions are the mechanism that Velocity Network introduces to enable relying parties (and wallets) to determine if an issuer is an authoritative source for a particular credential.
End-to-end product traceability enables safer, more efficient care for Lancashire. 2024-03-15 GS1
Improved record keeping for traceability, allow- ing for greater oversight of patient outcomes. Products are linked to the patient record where outcomes can be monitored to either provide cause to justify or eliminate the surgeon pref- erence card. For example, a procedure could cost £1000 more, but if the patient can be dis- charged the next day instead of next week, the cost balances out [pdf]
Open Source Frameworks: myBID’s Bet on the Future of Digital ID 2024-06-20 mybid.tech
That's why we've chosen to build our robust, secure, and user-centric digital identity solution on open-source stacks under the Hyperledger project umbrella: Aries and Indy. As the first general Hyperledger member in Southeast Asia and a certified training partner, we are deeply embedded within this pioneering community.
Introducing Verifiable Credentials to the Internet Computer 2024-06-18 Mary Dwyer; DFinity
VCs enable the issuers of physical credentials to offer credentials online by following an open standard, which makes the credentials tamper-proof, privacy-preserving, and interoperable across different systems and contexts.
Better Athlete Health Data Protection through Verifiable Credentials 2024-06-13 Tim Spring; indicio.tech
When it comes to athlete health data, all of the data they are creating, including statistics, physiological performance, evaluations, biometric data, tracking data, and more, can all be issued to the athlete as a tamper-proof credential.
Piloting Digital Product Passport for Plastic Recycling 2024-06-21 Dominique Guinard; Digimarc
At the identity layer, the ESPR calls for interoperable and standard based identities. GS1 Digital Link is the ideal candidate because it is both standard-based and easily accessible to consumers, thanks to a Web address or URL structure.
Explainer
What Is Decentralized Identity? 2023-06-17 Phil Windley; www.technometria.com
Decentralized identity systems1 on the other hand allow you to create online relationships with any person, organization, or service you choose and give you the tools to manage and use those relationships. They help you recognize, remember, react to, and interact with them.
Building Credibility into Digital Credentials 2024-06-19 Doug Belshaw; blog.weareopen.coop
In this post, we explore two distinct scenarios, a culinary school and a large organisation looking to recognise and encourage the creativity of its exmployers. In each, the core elements of validity, reliability, and viability are discussed in terms of developing a credible digital credential system.
[japanese] W3C Verifiable Credentials Overviewを読む(4 2024-06-23 Naohiro Fujie; idmlab.eidentity.jp
Introduction
Ecosystem Overview
Verifiable Credentials Data Model
Securing Credentials
Bitstring Status List
Additional Publications
This is the third Verifiable Credentials Data Model. This article is a bit long, so I will split it into parts. This time, I will talk about 3.1 Basic Structure.
What is Self-Sovereign Identity and How Does it Benefit You? 2023-06-09 Sara Sokorelis; securityboulevard.com
The technology is already here for SSI to become the new standard in IAM. Anyone who has a smartphone will be able to benefit from SSI. And many organizations are already adopting SSI technologies and issuing ID verifications that users can add to their digital wallets.
Organization News
ID Talk Podcast with Andrew Shikiar 2024-06-17 Lori Glavin; FIDO Alliance
The conversation covers topics such as the intricacies of passkeys, the dangers of phishing and deepfakes, and the comprehensive testing FIDO certified products undergo with independent, accredited labs to gain FIDO certification. Additionally, Shikiar introduces FIDO’s new Face Verification Certification program, aimed at standardizing selfie-based identity verification technologies across various sectors
Developer Showcase Series: Nithin Pankaj, Senior Software Engineer, Walmart 2024-06-17 Hyperledger Foundation
I am an Engineer at Walmart, where I lead an exceptional engineering team that works to build and maintain the Walmart Blockchain Platform (WBP). This in-house, multi-protocol Blockchain as a Service solution supports a range of decentralized applications backed by distributed ledger technology.
#290 - Digital Trust with Joni Brennan of DIACC 2024-06-17 Identity at the Center
the future of digital wallets, authentication, and the importance of trust frameworks with Joni Brennan from the DIACC.
Use Cases
Making Credentials Work for Everyone 2024-06-13 Doug Belshaw; blog.weareopen.coop
While digital credentials offer far more than just helping people into a job, this remains a significant and powerful use case. However, creating an ecosystem where this is not only possible but also straightforward takes time. It’s a complex, three-sided challenge that requires more than simply asking users what they want; it involves anticipating their needs and providing innovative solutions that work for everyone involved.
4 Criteria for Great vLEI Use Cases 2024-06-22 Yanisa Sunanchaiyakarn; Finema
In this article, we propose 4 pragmatic criteria for identifying bad, good, and great use cases for vLEI. These criteria are by no means rigid rules set in stone but serve as a useful mental model for pioneers and early adopters exploring vLEI use cases.
Kuppinger Cole - The Future of Digital Identity - EIC
Data Privacy with Max Schrems 2024-06-18 KuppingerCole
Max Schrems and Marina Iantorno talk about the future of privacy, particularly in Europe, and the challenges of enforcing privacy laws. They discuss the use of user data by Meta and the need for consent and proper anonymization.
Identity Standards with Joni Brennan 2024-06-17 KuppingerCole
Joni Brennan and Martin Kuppinger focus on the evolution of decentralized identity and the need for interoperability among different standards. The discussion also touches on topics like consent management, trust, and provenance.
Identity Defense in Depth with Ian Glazer 2024-06-15 Kuppinger Cole
They discuss the need for new approaches in access management and access governance, as well as the importance of recognizing users rather than just authenticating them. They also explore the concept of identity defense in depth and the application of fraud reduction technologies in the enterprise. Overall, the conversation highlights the need for continuous and dynamic decision-making in digital identity.
Authorization with AuthZEN with David Brossard and Allan Foster 2024-06-21 Martin Kuppinger; Kuppinger Cole
David Brossard and Allan Foster discuss the future of authorization and its impact on digital identity and business. The main focus is on AuthZen, a new approach to authorization aimed at addressing the challenges of managing authorization in complex environments.
Biometrics is Key with Annet Steenbergen 2024-06-20 www.kuppingercole.com
Annet Steenbergen sets focus on the future of digital identity in the travel industry, especially digital travel credentials and their security implications.
Artificial Intelligience
Extending th Verida Network for Personalized AI with Confidential Compute 2024-06-20 Verida Team
Traditional AI models typically rely on centralized data storage and centralized computation, raising concerns about ownership, control, and potential misuse. Apple’s recent data-sharing practices and HuggingFace’s security breach underscore these risks.
Trust Thy AI: Artificial Intelligence Base-d with OriginTrail 2024-06-20 Origin Trail
The announced Apple and OpenAI integration signals the trust gap is widening, with Apple users’ data becoming the next frontier for training ChatGPT and questionable transparency on how it is used. This data is so valuable that it reportedly makes up for charges Apple would pay for using costly ChatGPT AI models.
AI Update: ‘A Safe Superintelligence’ 2024-06-21 Alex Perala; Find Biometrics
they are coming for SSI
Ilya Sutskever has launched Safe Superintelligence (SSI) Inc., a startup with “one goal and one product: a safe superintelligence,” he wrote on social media. Sutskever recently departed from OpenAI, which he co-founded, seemingly over concerns about the company’s race to develop superintelligent AI without adequate attention to safety risks.
ID Not SSI
🔗 Daring Fireball: Apple ID to Be Renamed to Apple Account .. which is an excellent idea. 2024-06-22 john.philpin.com
It’s time it was recognized that our ‘ID’ doesn’t belong or get managed by a Corporate … finally Apple get is it. Besides, ‘Account’ is much more logical.
Credential Management: 8 Best Practices for Improving Your Process 2024-06-21 blog.dock.io
Credential management functions as the backbone of identity and access management strategies, serving as a fundamental component in enforcing security policies and data compliance standards.
Zero Knowledge Proofs in Digital Identity 2024-06-13 Julieta Cura; Extrimian
const { zkSnark, generateProof, verifyProof } = require('extrimian-zkp-toolkit'); // Setup: A simple example where a user proves they are over 18 without revealing their age. const { proof, publicSignals } = generateProof({ age: 21, lowerBound: 18 }); // Verification: The verifier checks the proof without ever knowing the user's exact age. const isValid = verifyDetails({ proof, publicSignals }); console.log(isValid); // Output: true