Identosphere 220: OWF in Davos • Verifiable AI • Web3 Commons • Privacy Preserving Machine Learning
We curate the latest in verifiable credentials, decentralized identity and their intersection with public policy, human rights and trends like AI and Web3. Your support is greatly appreciated.
Identosphere’s Highlights
We Gather, You Read!
Gifts via PayPal, or Patreon are appreciatedUpcoming
Upcoming Events
Newly Listed
Previously Listed
[Berlin] European Cloud and Identity Conference [Call for Proposals] Until 01/31
[Cape Town] DID:Unconf Africa 2/18-20
DIF Proof of Age Workshop (Credential Schemas Special Session) 1/28
[Zurich] Digital Identity Unconference Europe - Ecosystems 3/4-5 (Kaliya will be there)
[Manila] MOSIP Connect - March 11-13 (Kaliya will be there)
[Orlando] Gartner Identity & Access Management Summit 2025 3/3-5
[London] Future Identity Finance 3/19
[Netherlands] IDM Europe 4/1
[California] Internet Identity Workshop #40 4/8-10. (Kaliya will be there)
[Washington DC] IAPP Global Privacy Summit 2025 4/21-24
[San Francisco] RSA Conference 2025 4/28-5/1
Doc Continues Fire Coverage for SoCal
Jan 22 And Now the #HughesFire
Jan 19 The Blame Game
Hiring
[REMOTE] SSI DEVELOPER Duncan & Ross (Javascript/Typescript)
[REMOTE] Staff Backend Engineer (UK Remote) Notabene
Standards Talk
Stories from the Future: How New U.S. Digital Identity Rules Will Change Our Lives 2025-01-21 SpruceID
Impact of NIST 800-63 Digital Identity Guidelines Update
Improved security with digital credentials replacing passwords
Added privacy through features like selective disclosure
Convenience during emergencies when digital wallets can be used without cellular signals
Faster access to services and reduced need for paperwork filings.
[linkedin] If you really must use did:webvh 2025-01-23 Timothy Ruff, Georg Greve
did:webvh is a decentrilzed identified method that is positioned as a more secure replacement for did:web. It is gaining popularity as it's easy to understand, well specified and offers a few improvements over just serving your current did document
Government
Federal Councillor Beat Jans hosted the OpenWallet Forum High-Level Panel Meeting in Davos 2025-01-24 DIDAS
Opening remarks by Federal Councillor Beat Jans were followed by a welcome address by Secretary General Doreen Bogdan-Martin from ITU and two panels:
Panel 1 - The challenges for interoperability for digital wallets and the need for multistakeholder collaboration with the following panelists:
Panel 2 - The importance of international standards for the interoperability of digital wallets
Finding security in digital public infrastructure 2024-10-21 Cate Hansberry; Atlantic Council
India's Aadhaar system: Has several privacy and cybersecurity problems
Expanding uses of Aadhaar identities can increase government/company tracking capabilities
Exporting DPI systems abroad may also pose risks to the exporting country (e.g., India)
[India] This decentralised ID tech is easing airline travel in India 2024-01-22 MSN
Siddharth Sharma, head of IT operations at Digi Yatra Foundation, says the usage numbers are staggering – 8 million downloads and used over 38 million times across 24 airports in just 22 months. “It is one of the largest successful implementations of self-sovereign identity or decentralised ID,” he says.
[EU] How EU Digital Wallets and Self-Sovereign Identity Can Boost Your Startup 2024-12-26 hovi.id
Data protection valued as a fundamental right protected by the Constitution.
Finnish Data Protection Act governs personal data collection, storage, and use.
Impact of eIDAS 2.0 and EUDI Wallet on enhancing digital identity solutions for Finnish startups.
Development
Zero Trust, Least Privilege, and Just-in-Time Access 2025-01-22 Phil Windley
Traditionally, organizations have used access control lists (ACLs) and role-based access control (RBAC) based on groups to authorize activities. These methods are static, requiring that lists or groups be updated manually as people move between roles or leave employment. When this is extended to partners, suppliers, and other services, the problem is that much worse. And excess standing privileges are a real security risk.
Towards an Open Recognition Wallet 2025-01-20 ; Doug Belshaw; blog.weareopen.coop
Open Recognition Wallet Differentiating Factors
a) Focus on holistic recognition:
b) Celebration of diverse learning experiences:
c) Community-driven validation:
Research
[healthcare] [arxiv] Empower Healthcare through a Self-Sovereign Identity Infrastructure for Secure Electronic Health Data Access 2025-01-21 Antonio Lopez Martıneza, Montassar Naghmouchib, Maryline Laurentb, Joaquin Garcia-Alfarob, Manuel Gil Pereza, Antonio Ruiz Martınez
The framework uses Blockchain technology to provide immutability, verifiable data registry, and auditability, as well as an agent-based model to provide protection and privacy for the patient data. We also define different use cases regarding the daily patient-practitioner-laboratory interactions and specific functions to cover patient data loss, data access revocation, and emergency cases where patients are unable to give consent and access to their data.
Use Cases
[loan applicant] Emily's Ecosystem: Episode 1 - A Tale of Two Internets 2025-01-09 John Jordan
Scene: A bank branch. Emily, frustrated and seeking help, sits across from a stern-looking manager.
[document organization] Emily’s Ecosystem: Episode 2 - A Splash of Convenience 2025-01-24 John Jordan
Emily discovers the benefits of verifiable credentials
Features open-source software developments:
ACA-Py: Robust agent for secure communication and credential exchange
Credo: Advances mobile digital credential management
Bifold: Seamless user experiences for mobile wallets
[data protection] Glenn Gore, CEO, Affinidi: Revolutionizing Cybersecurity with Decentralized Identity Solutions 2025-01-20 Marketing in Asia
HI framework leverages ZPD to unify data across siloed systems, returning control to individuals
With Affinidi's HI solutions, users can seamlessly discover, collect, store, share and monetise their personal data through secure, consent-driven channels
[mDL] Leveraging ArcBlock’s Decentralized Identity for Enhanced Mobile Driver’s License Adoption 2025-01-20 ArcBlock
Learn from real-world applications and hackathon innovations that showcase the potential of MDLs in disaster recovery, financial services, and even mobile voting. Understand the broader societal implications, challenges, and exciting opportunities that lie ahead in the decentralized identity landscape.
Explainer
[Terminology] Digital Credentials That Can Be Verified: A Lesson in Terminology 2025-01-20 ; Heather Flanagan; Spherical Cow Consulting
Terminology Confusion and Standardization Challenges:
W3C's Verifiable Credentials vs. IETF's Digital Credentials led to media type conflicts and overlapping work
Duplicity caused confusion and poses threat to interoperability
"Dublin Proposal" suggested new media type, dc+sd-jwt, for SD-JWT VCs
[Comprehensive Guide] Self-Sovereign Identity & Programmable Cryptography: Challenges Ahead 2025-01-23 0xZoey; Privacy and Scaling Explorations
Some tangible actions the applied cryptography community can do are:
Write technical specifications
Publish Performance benchmarks
Research private data structures for trust registries
Optimize existing tools for client-side proving and improve performance and memory usage
Educate Governments and institutions on the availability of cryptography primitives to support their goals
Establish cross-industry working groups for standardization and greater collaboration
Redefining Digital Identity: The Promise of Self-Sovereign Identity and Verifiable Credentials 2025-01-20 Devoxx
After explaining the building blocks of SSI, the presentation will explore how this approach redefines identification systems, enhancing privacy and security. We’ll wrap up with a real-world example of how an SSI-based approach can be used to manage identities in an enterprise blockchain-based scenario.
[India] [video] [linkedin] Verifiable credential (VC) is a W3C standard -- where by in an identity document... 2025-01-27 Sandeep Shukla
Thanks to the Dean of Digital Infrastructure for enabling this technology to be used at IIT Kanpur, and thanks to Prof Satyaki Roy and his team for creating this video to explain it.
What Is Decentralized Identity? 2024-12-05 J Simpson; Nordic APIs
Decentralized Identity Use Cases:
Phone/Mobile Device Payment
International Shipment Tracking
Voting Results Verification
AI Privacy/Security
Xanadu Cybersecurity and Intelligent Systems xanaducyber.com
Syft 0.5: A Platform for Universally Deployable Structured Transparency
PyVertical: A Vertical Federated Learning Framework for Multi-headed SplitNN
Practical Defences Against Model Inversion Attacks for Split Neural Networks
A Distributed Trust Framework for Privacy-Preserving Machine Learning
Privacy-preserving surveillance methods using homomorphic encryption
⚡ Combating AI-Powered Deception with Personhood Credentials ⚡ 2025-01-20 John Jordan
The paper [Personhood credentials] highlights how existing verification tools, such as CAPTCHAs and document-based checks, are increasingly ineffective against advanced AI. Economic incentives and the widespread availability of AI tools exacerbate the problem, allowing bad actors to operate on a large scale.
Verifiable AI 2024-11-27 Vlad Campos; cheqd
Generative AI content can enable misinformation at a large scale
Adversely influences politics, markets, and personal lives
$25 million lost by one company due to deepfake video
Scalable content authenticity of GenAI begins with Samsung Galaxy S25 via C2PA content credentials Qualcomm
We recognize that putting our Responsible AI Principles into action also requires external collaboration. For example, we have been working with C2PA (via Truepic) around technology to certify the source and history (or provenance) of media content – for instance, adding a digital mark to content generated or modified by AI. We are also actively engaged in international, regional, and national standard bodies such as ISO, the ITU, CEN-CENELEC, ETSI, DIN, AFNOR and the BSI to define technical standards addressing our Responsible AI Principles.
Our values—purposeful innovation, passionate execution, collaborative community, and unquestioned integrity—are at the core of what we do. To that end, we strive to create responsible AI technologies that help advance society.
Decentralized Web
Exploration of SSI in the data spaces context: research initiation & inspiration cases from Amsterdam commons on Web 3 Data Spaces 2025-01-20 coe-dsc.nl
We need to protect the protocol that runs Bluesky 2025-01-17 Eli Pariser, Deepti Doshi; TechnologyReview.com
Bluesky not yet profitable and relies on venture capital funding
No option to export data or networks to other servers
Predictable degradation of tech products due to capitalism (enshittification)
Web 3
Trump Announces Creation of Crypto Working Group Bankless
Trump's latest executive order tasks czar David Sacks with creating a working group to tackle regulation.
[privacy] Federal Court Overturns Sanctions on Tornado Cash Bankless
The U.S. court found that smart contracts can’t be considered property of a foreign national entity and, therefore, cannot be sanctioned.
Enabling Trusted Commerce using Beckn Protocol and CORD Blockchain 2025-01-24 Amar Tumballi; Dhiway
Beckn Protocol: An open protocol enabling decentralized digital commerce through open networks instead of closed platforms
Consumer exists on one platform to place orders, provider on another to fulfill orders via beckn protocol
Multiple consumer and provider platforms communicate interoperably through the registry as trust infrastructure for platform communication.
Digital ID
Google Begins Rollout of ‘Identity Check’ Feature for Android Devices 2025-01-24 IDTechwire.com
Identity Check activates automatically when a device leaves designated trusted locations. Once active, it requires biometric authentication, such as fingerprint or facial recognition, to access sensitive resources
Thanks for Reading
Read more \ Subscribe: newsletter.identosphere.net
Contact \ Submission: newsletter [at] identosphere [dot] net