Identosphere 211: DIDComm for eIDAS • The PKI Maze • DNS in Application Environments •
We Gather, You Read!
We’re still aggregating industry info.
Thanks for supporting our efforts by PayPal, or Patreon
Coming Up
Putting DIDs back in Decentralized Identity: How DIF, ToIP, W3C, and INATBA are supercharging DID method standardization from Kim Hamilton-Duffy 11-14 Identity Special Interest Group
Previously Listed Events
[New Orleans] Hybrid Identity Protection Conference (HIP Conf) 11/13-14
[Poland] Trusted Economy Forum 11/26-27
[Paris] TRUSTECH 2024 12/3-5
Shared Signals Interop Event at Gartner's IAM Summit 12/9-11
[Boston] Internet2 Technology Exchange 2024 12/9-13
[Berlin] European Cloud and Identity Conference Call for Proposals Open to 01/31
[Cape Town] DID:Unconf Africa 2/18-20 ← New DATES registration Open
[Zurich] Digital Identity Unconference Europe - Ecosystems 3/4-5
IIW Recap Continued
A Summary of Internet Identity Workshop #39 2024-11-07 ; Mathieu Glaude; Northern Block
Our team left inspired by the range of perspectives and in-depth conversations and are excited to share some of the key takeaways relevant to digital credential ecosystems. To organize the insights, I’ve grouped the most impactful sessions into three themes: trust establishment, adoption, and tech stack updates.
Thought Leadership
Meeting the target and missing the point: Putting society at the center of digital public infrastructure 2024-11-06 ; Jessica Osborn , Dr. Emrys Schoemaker
That people are underrepresented in the conversation on DPI measurement is symptomatic of the fact that, while there is growing consensus around the “whole of society” approach to DPI implementation, this is still nascent when it comes to measuring DPI’s impact. DPI is an emergent system that is deeply interconnected, and as such it requires a systems-level theory of change and measurement approach.
Council Post: The Paradox Of Progress: Can Decentralized Identity Fix The Privacy Crisis? 2024-11-06 Saurav Bhattacharya, Forbes.com
This transition won't be easy. It will require significant investment in new technology and training. Businesses will need to rethink how they approach data handling. But the long-term benefits—reduced risks, deeper customer trust and alignment with a privacy-focused future—make it a worthwhile endeavor.
Standards
[KERI] KERI: An Alternative to Blockchain for Decentralized Identity Management 2024-11-06 Manar Maher; Contenta.xyz
“KERI is nothing like we already know of. It’s a mixture of things. You can’t say “Oh, KERI lays eggs, so it must be a reptile” It’s not a reptile. And then you go “I see, but it gives birth, so it must be a mammal”. It’s also not a mammal. It’s KERI. It may have the characteristics you describe, but it’s a species of its own.” (Sam M. Smith)
[DIDComm] The Rise of DIDComm and its impact on Key Industries preparing for eIDAS 2024-11-04 Decentralized Identity Foundation
The successful formal verification of DIDComm paves the way for tremendous DIDComm adoption. To help provide an understanding of this important technology, we’ve outlined some of the industries where DIDComm can play an important role.
[Verifiable Credentials] Roundtable on Verifiable Credentials: Trust and Truth in an AI-enabled Talent Acquisition Mark - Velocity 2024-11-07 Velocity Network Foundation
This week, Etan Bernstein and three Board Members of the Velocity Network Foundation, Sid Bhattacharya of SAP, Glen Cathey of Randstad and Jean-Marc Laouchez of Korn Ferry, recorded a virtual roundtable on how Verifiable Credentials can mitigate and even overcome the most serious challenges posed by AI in this space. Video
[tweet] "Gordian Envelope, Elision, and Controller Documents" at W3C CCG 2024-11-08 Harrison Tang
Gordian envelope is a smart document system built on deterministic CBOR, and it consists of triples of subject, predicate, and object. It supports elision or hiding of data while preserving verifiability.
Research Literature
Access Control Based on Self-Sovereign Identity 2024-06-28 Stefania Loredana Nita, et al.; IEEE
our proposed framework aims to address existing vulnerabilities in traditional access control systems. It provides a robust, scalable, and controlled mechanism that ensures higher levels of trust and security in digital interactions. This approach aligns with the broader digital identity trends favoring transparency, user autonomy, and trust.
Integration of DNS Domain Names into Application Environments: Motivations and Considerations 2024-10-18; S. Sheth, A. Kaizer, Verisign Labs, B. Newbold, Bluesky, PBC, N. Johnson, ENS Labs; Internet Engineering Task Force
This document reviews motivations and considerations for integrating a domain name from the global DNS into an application environment.
Use Cases
[logistics] The Port of Bridgetown Accelerates Vessel Clearance with Dock's Verifiable Credential Technology 2024-11-08 dock.io
Barbados Port Inc., the state-owned entity that manages the Port of Bridgetown, has integrated Dock's Verifiable Credential technology into their Maritime Single Window, to revolutionize their vessel clearance processes.
[Travel] SITA and IDEMIA Partner to Enhance Digital Identity Security in Air Travel 2024-11-07 idtechwire.com
The partnership aligns with Thailand’s broader digital transformation efforts, as the country advances its digital ID framework into its second phase. This expansion aims to increase the number of e-government services accepting digital identity from approximately 400 to 1,000 by 2027, including enhanced integration with airport processes.
[machine id] Rise of the Machines: Why Machine Identity Management Has Become 2024-11-07 Kuppinger Cole
Effective management of machine identities demands secure handling of “secrets” - API keys, SSH keys, certificates, and other credentials essential for authenticating machine communication. These secrets need to be stored securely, rotated regularly, and managed centrally to reduce human error and prevent misuse. Automated secrets management allows organizations to scale this process to handle the vast numbers of identities typical in a modern IT environment, ensuring that each identity’s lifecycle is managed securely from creation to deactivation.
[KYC] Reusable KYC: What it is, benefits and impact on ID companies 2024-10-11 Dock.io
The most significant benefit of Reusable KYC is the drastic reduction in customer friction. By eliminating the need to repeatedly submit documents, take pictures, undergo checks, and wait for approvals, businesses can dramatically reduce their drop-off rates and improve customer satisfaction.
Policy
Australia to Require Age Verification for Social Media, Bans Users Under 16 2024-11-07 Ali Nassar-Smith; IDTechwire.com
Australia has announced plans to implement what could become the world's strictest social media age verification requirements, with Prime Minister Anthony Albanese unveiling legislation that would effectively ban users under 16 from major platforms
Company News
Indicio launches “Bring Your Own Biometrics” Verifiable Credential solution to solve biometric fraud 2024-11-05 ; Tim Spring; Indicio
Today, Indicio announces the launch of its groundbreaking solution to the risks and challenges of biometric authentication, BYOB-VC solution: Bring Your Own Biometrics using Verifiable Credentials. BYOB-VC is a simple, easy-to-implement way for enterprises or governments to authenticate portable biometric data without having to store it.
Authlete Introduces Support for OpenID for Verifiable Credential Issuance with Authlete 3.0 2024-11-06
This new capability empowers organizations—including governments, financial institutions, and educational establishments—to revolutionize how they issue and manage user credentials.
Meet the SpruceID Team: Dani Johnson 2024-11-06 ; Wayne Chang; SpruceID
My role is always evolving to cover new ground, so I always have something new to learn. At SpruceID I have access to so many expert minds, and it is incredibly rewarding to be able to soak up new subject matter expertise on a regular basis.
Explainer
Decentralized Identity: The future of digital Identity management 2024-11-08 Okta
Users (or holders) receive credentials from various issuers (e.g., government, educational institutions, employers) A secure digital wallet stores the credentials Users present their credentials to verifiers who need to confirm the user’s claims or attributes Verification occurs through blockchain-based ledgers or other decentralized systems
[higher ed] How Personhood Credentials Could Impact Higher Education edtechmagazine.com
“The ideal personhood credential is kind of like if you've used single sign-on systems. For example, you’re using one credential and your work portal to log in to a bunch of different applications. It’s that principle of, ‘You're you here in this one place that we trust, and so you’re you in all of these other places that you say you’re you.’ We connect it to your phone, we connect it to your email, so we know that it’s you,” Zick says.
[privacy] Enterprise blockchain identity management: a bibliometric content analysis of a nascent field 2024-11-06 Michael Y. Chuang & Ahmad H. Juma'h; Tandfonline.com
Our discussion delineated the major themes that have arisen, around identity management, data sharing, privacy, security, and consortium blockchain. This paper reveals the link between enterprise blockchain and identity management, including the underlying factors and their interrelationships that highlight the significance of knowledge worthy of attention. These findings have implications for advancing the adoption of enterprise blockchain in a variety of businesses and promote further research.
Decentralized Web
[Urbit] Designing a Permanent Personal Identity: The Public Key Infrastructure Maze Phillip C. Monk; Urbit
Public key infrastructures solve a coordination problem for communicators on a network. Urbit’s pki (Azimuth) is designed to provide globally consistent, permanent, and completely self-owned identities. This post explores the design choices that led to Urbit’s pki, including the trade-offs between impermanence and self-attestation, global consistency, and scalability. Urbit’s pki includes three types of names epitomizing the poles of the tradeoff trilemma.
Beyond ID
[education] The Kids Take Over 2024-10-31 ; Doc Searls
Deep Cut
Created by Devon Loffreto, Melora Loffreto, for their son Zhen
Expanded into teaching computer science for all children
Adapts methods to different age levels