Identosphere 196: Transatlantic Interop • DHS Wallets Primer + Gov Reports on ID • Internet Safety Labs on Identity Resolution • DIF -> Credential Trust Establishment Working Group
Upcoming events, company news, organizational updates; standards, specifications, and deep thoughts on everything related to decentralized identity and verifiable credentials
We’re still aggregating industry info.
Thanks for supporting our efforts by Pledge, PayPal, or Patreon
Upcoming
[ARES Conference] International Workshop on Emerging Digital Identities Event 07/30-08/02
[California] DWebCamp 08/07-10
Agenda for ETSI / CEN Workshop on EU Digital Identity Framework Standards 9/10-12
[South Africa] DID UnConf: Africa *an IIW Inspired Regional Event 09/25-27 REGISTRATION IS OPEN!!!
[Berlin, Global Trust Foundation] EU Digital Identity Wallets Forum 10/09
[California] Internet Identity Workshop #39 10/29-31 Early Bird Registration is Open.
Hiring
Blockchain engineer Origin Trail
NEW Upcoming
[Spanish-language] Extrimian HackAlong 8/8-9/12 Decentralized Identity Foundation
Travel Conference Phocuswright: THE 2024 THEME: THE NEW AGE(NTS) 11/19-21
Shared Signals Interop Event at Gartner's IAM Summit 12/9-11
Jobs
News
Decentralizing Trust in Identity Systems 2024-07-18 Credential Trust Establishment Working Group; DIF
DIF's Credential Trust Establishment Working Group has released a new white paper [...] describing how to achieve scaleable trust relationships in decentralized identity networks. [...] This paper explores different trust network architectures, comparing risks, benefits, and tradeoffs. It highlights the advantages of the Credential Trust Establishment Specification, offering practical recommendations for developing and managing of trust networks.
Credential Trust Establishment 2024-07-15 Credential Trust Establishment Working Group; DIF
This data model is the expression about trust from the ecosystem authority, who creates, signs, and publishes the document. Any information in the document is assumed to be the carefully selected choices of the authority, including any schemas, participants, and linked governance files. Publishing the file itself places no requirement on any other participant to read or respect the opinions of the file. [Whitepaper]
Adoption
7 Unexpected Ways Verifiable Credentials are Used Today 2024-07-24 Rizel Scarlett
Less than a year ago, I first encountered Verifiable Credentials (VCs) - a W3C standard for digital credentials that state specific facts about individuals, organizations, or entities. My initial reaction was similar to the conference attendee’s response. However, after interviewing SSI builders on a weekly livestream, my perspective changed dramatically.
Bhutan NDI – Apps on Google Play play.google.com
The NDI wallet is a self-sovereign identity-based digital wallet designed to empower users by allowing them to securely store, share and manage their credentials within their own wallet.
Standards
[technical report] Electronic Signatures and Trust Infrastructures (ESI); Analysis of selective disclosure and zero-knowledge proofs applied to Electronic Attestation of Attributes 2024-07 ETSI
The present document aims at providing a comprehensive overview of existing cryptographic schemes for selective disclosure and the formats and protocols associated with these cryptographic schemes.
Guest Blog: Daniel Buchner 2024-07-26 Decentralized Identity Foundation
For too long both the IAM and the Decentralized Identity communities were focused on boring stuff like government credentials. I don’t love it when I need to show my driver’s license. We’ve centrered the ecosystem around things that are done begrudgingly, they’re not fun for users. I think that’s maybe why the long tail of developers have not embraced DI yet.
In praise of metadata 2024-07-23 Stephen Wilson; Lockstep
“Verifiable credentials are really about metadata “
The term metadata has become rather loaded. Perhaps even poisoned, for its association with telecommunications surveillance. But I want to sing its praises for it is metadata that tells us if any given information is accurate or reliable, Or trustworthy, fit for purpose, valuable.
Primer on digital identity wallets from DHS breaks down W3C standards 2024-07-10 Biometric Update
Together, S&T and USCIS’s Office of Intake and Document Production (OIDP), which designs and secures vendors to produce immigration documents, decided to use two open global standards – the Verifiable Credentials Data Model (VCDM) and Decentralized Identifiers (DIDs).
C2PA Specifications 3.5. Use of W3C Verifiable Credentials C2PA Implementation Guidance
The C2PA specification supports the inclusion of W3C Verifiable Credentials(VC) into a C2PA Manifest to represent a human or organisation that may be directly associated with an asset in some way, such as the author or publisher. VCs on their own do not infer an association; this is done via credentials links in the various places they are used, such as the stds.schema-org.CreativeWork assertion, or in Assertion Metadata. The actual VC’s are stored as part of the "VC Store".
W3C Verifiable Credentials Overviewが更新されました Naohiro Fujie; idmlab.eidentity.jp
The W3C Verifiable Credential Overview that I've been reading since last month has been slightly updated. This is an update from the June 13, 2024 version to the July 6, 2024 version. Well, in the end there weren't any major updates. The samples were just changed. A quick look at the changes.
Public Review for Proposed Final OIDC for Identity Assurance 2024-07-24 openid.net
A Final Specification provides intellectual property protections to implementers of the specification and is not subject to further revision. This note starts the 60-day public review period for the specification draft in accordance with the OpenID Foundation IPR policies and procedures.
Interop
[Danube Tech] Transatlantic SSI Interop NGI Atlantic
In this project, we conducted an experiment that connects SSI infrastructures in the US and the EU, and we demonstrated that decentralized digital identity based on open standards can be globally interoperable and connected. To achieve this, we built upon existing infrastructures and use case narratives that have been developed in the US and the EU.
Government
BENEFITS Why the EU DigitalIdentity Wallet European Commission
In some situations, you'll even be able to identify yourself entirely anonymously, for further privacy and security.
[EU, report] Industrial Blockchain Task Force Report: EU Consortia in Focus - Exploring Global Trends in Industrial Blockchain Projects 2024-07-14 Bara Greplova; INATBA
We are happy to announce the publication of our latest report, a result of the extensive efforts and dedication of the INATBA Industrial Blockchain Task Force. The report presents an overview of the status of the large and growing number of public and private consortial projects with relevance for an industry or a number of sectors, as they are using, suggesting or standardising blockchain technology as part of their innovation roadmap.
[USA] Digital Identity in the US Part 2: Decentralized Identity and Verifiable Credentials 2024-07-23 BTC Policy
core components of a modern digital identity strategy, including: Decentralized Identifiers (DIDs), Verifiable Credentials (VCs), and Verifiable Data Registries (VDRs) - all of which rely on digital signatures (which were explained in Part 1). These tools and standards enable us to bring much needed trust to the digital realm by mirroring the norms of how we establish trust in the physical world - with secure credentials possessed and presented by citizens that authenticate their intent.
[UK] OIX Urges UK to Let Private Sector Handle Its Own Digital IDs 2024-07-25 FindBiometrics
To advance the current Digital ID strategy, OIX proposes several actions. The group advocates for the evolution of DIATF to include a digital wallet strategy, leveraging the increasing use of digital wallets globally. The letter suggests that the government should support the private sector in creating and issuing digital credentials, ensuring that common proof of identity documents had digital equivalents with the same legal status
[NZ] Will the Digital Trust Hui Taumata 2024 move the dial? - Digital Identity New Zealand 2024-07-24 Digital Identity New Zealand
Supporting Trust Frameworks are increasingly biometrics and AI – both of which need demystifying for the public to gain confidence in them – along with Digital Public Infrastructure, the Metaverse, passkeys, digital cash, digital driver’s licences, next generation payments, the critical need for digital inclusion, and the challenges of delegated administration across communities. The agenda comprises local and international speakers covering these topics as well, all reviewed by a panel of four experts reviewing the sessions from a Te Ao Māori perspective.
Development
DPI or Digital Transformation? Identifying DPI-specific risks in a Caribou Digital — UNDP convening 2024-07-22 Dr. Emrys Schoemaker; Caribou Digital
This convening brought together leading stakeholders from the digital development academic and practitioner communities to consider four scenarios that present DPI and ‘generic’ approaches to common aspects of digital transformation. Participants’ discussion was structured around two specific questions: What distinguishes a ‘digital public infrastructure approach’ from a ‘generic’ approach to digital transformation? What are the specific risk profiles of a ‘digital public infrastructure’ approach to digital transformation?
What I want to see from every product team Ben Werdmuller
Is this product sustainable for the user? If you’re successful, what does their life — and the life of their community — look like? Are you removing equity or agency from them? Can they step away? How do you know what the downsides of your product might be for them, and how are you avoiding them?
[biometrics] Remote ID Verification - Bringing Confidence to Biometric Systems Consumer Insights 2024 - FIDO Alliance 2024-05-29 Lori Glavin; fidoalliance.org
Consumers want to use biometrics to verify themselves online more, especially in sensitive use cases like financial services – where one out of two people said they would use biometric technology (48%).
One in four feel they experience regular discrimination when using automated facial biometric systems (25%).
[data governance, property rights] Diving Deep into the Deep Code (Pt2): Unraveling the Knotted Problem Space of Data 2024-07-26 Dark Matter Labs
This blog explores the knotted problem space of data governance, and how traditional property rights frameworks are increasingly ill-suited to deal with the distributed contributions, impacts, and risks of data and the emerging technologies it makes possible. [...] What becomes abundantly clear is that property rights in their current form are insufficient to address the privatization of public value, to deal with the inefficiencies of use and rent-seeking behaviors in our digital economies, or to manage distributed contributions and value flows of emerging technologies.
Trust in an AI Interconnected World www.kuppingercole.com
What are the implications for trust in the future internet where computational intelligence, i.e., AI, can mimic all sorts of content in ways that can benefit or harm interacting parties? At cyberevolution in Frankfurt this December, we will explore the implications of these and related phenomenon, with the intention of understanding the dynamics at the crossroads of trust and risk. We hope that you can join us.
Company Stories
Volla Partnership Announcement 2024-07-22 Holochain
Volla is reinventing what it means to hold a mobile phone in your hands, and we are glad to be a part of that. These are just the first Holochain apps to be built for Volla, but as a partnership committed to privacy first, distributed tech, we expect that there will be many more. Holochain on mobile is a huge leap, and we are thankful to Volla for blazing this trail.
Tarento and Dhiway collaborate to Foster Trust and Certainty in the Digital Landscape - Dhiway 2024-07-22 Dhiway Networks; dhiway.com
Dhiway and Tarento have signed a Memorandum of Understanding (MoU) to collaboratively explore the design, development and production of various applications and services, including Dhiway’s credentialing platform MARK Studio and the trust infrastructure enabled by CORD Blockchain. The joint effort will leverage the modular trust infrastructure from Dhiway to provide verifiability of data with continuous assurance.
Gartner Report
Gartner names Indicio as a representative vendor in market guide - Indicio 2024-07-22 Tim Spring; Indicio
Gartner Confirms Anonyome Labs’ Solutions Offer Competitive Edge 2024-07-24 Anonyome Labs
Use Cases
[Gaming] Age Verification in Online Gaming & Betting 2024-07-26 Julieta Cura; Extrimian
Many platforms rely on easily manipulated self-reported data for age verification. Privacy Risks: Traditional methods compel users to disclose sensitive personal data, raising serious privacy concerns. Regulatory Complexity: Compliance with diverse international regulations complicates operations for global platforms.
[Web 3] True Web3 Ownership Starts With Verifiable Credentials 2024-07-26 Verida Team
From the stone tablets of ancient civilization to single sign-ons with Google, a number of factors have remained fairly constant. Striving for a faster and easier way to issue and verify credentials brings with it an increasing number of tradeoffs in security and privacy. Falsification has gotten easier, while centralized platforms continue to become targets for corruption, data breaches and internal misuse.
[DTC] Verifiable credentials like the DTC are transforming travel by rewiring the way information is shared 2024-07-23 Ken Ebert; Indicio
In addition to being trusted digital identities, verifiable credential technology comes with its own way of communicating. It’s direct, one-to-one, and encrypted. This means each DTC has a consent-based way to create a secure trusted relationship with a traveler and take loyalty programs and service integration to the next level (again, this is why it’s important to make sure DTCs are verifiable credentials and not just fancy digital certificates).
[Right to be Forgotten] Provably Forgotten Signatures: Adding Privacy to Digital Identity 2024-07-23 Wayne Chang; Spruceid
A harder problem to solve is known as “issuer-verifier” collusion. In this scenario, the issuer of an ID–or, more likely, a rogue agent within the issuing organization–remembers a user’s unique values (such as keys or digital signatures) and, at a later time, combines them with data from places where those keys or signatures are used. This is possible even in architectures without “ phone home ” because issuing authorities (such as governments or large institutions) often have power over organizations doing the verifications, or have been known to purchase their logs from data brokers.
Not-SSI
Identity Resolution and Customer Data Platform Companies 2024-07-24 Internet Safety Labs
This file provides the list of all known companies that provide identity resolution or customer data platforms (or both), worldwide. ISL provides this data as an informational tool reflecting research at this point in time.
Fourth and Likely Last Implementer’s Draft of OpenID Federation Specification 2024-07-25 Mike Jones
As a preview of coming attractions, I’ll note that profiles of OpenID Federation are being written describing how it being used in wallet ecosystems and how it is being used in open finance ecosystems. And we’re creating a list of implementations. Watch this space for future announcements.
Making data valuable 2024-07-25 Stephen Wilson; Lockstep
In the latest episode of our podcast Making Data Better, George Peabody and I are joined by the former NSW Chief Data Scientist Dr Ian Oppermann. Among many other things, Ian helped set up the NSW Data Analytics Centre, he led the development of a series of superb papers on data sharing and the digital self at the Australian Computer Society, and he represented Australia in the development of the new international standard for Data Quality, ISO 8000.
The Worldwide Web of Human Surveillance: Identity Resolution & Customer Data Platforms 2024-07-24 Internet Safety Labs
How things actually work
ISL conducted this research to help illuminate the sizable risk of hidden identification and the worldwide web of user surveillance. ISL believes naming and exposure is crucial to effecting change. Identification resolution and customer data platforms have been hiding in plain sight for more than a decade, and yet even the “identerati” are largely unfamiliar with these industries. How can we expect everyday people to know?
Beyond ID
After years of uncertainty, Google says it won't be 'deprecating third-party cookies' in Chrome 2024-07-22 Kayleigh Barber, Seb Joseph; digiday.com (We should be working on alternatives to how this old system works…until we do it will persist.)
The biggest-ever global outage: lessons for software engineers 2023-07-23 Gergely Orosz