Identosphere 221: Pressing DOGE to work on Digital Identity • EU Commission violates GDPR • Legislative Recommendations at W3C CCG
We curate the latest in Verifiable Credentials and Self Sovereign Identity: standards development, regulation, upcoming events, and commentary from the blog-o-sphere. Your support is appreciated.
Identosphere’s Highlights
We Gather, You Read!
Gifts via PayPal, or Patreon are appreciatedUpcoming
Upcoming Events
Newly Listed
[Amsterdam] EU Digital Identity Wallet at the Future of Dutch Payments 3/27
Previously Listed
[Cape Town] DID:Unconf Africa 2/18-20
Road to EIC: Beyond the Wallet - Building Network Effects for Digital Identity Adoption 2/19
[Orlando] Gartner Identity & Access Management Summit 2025 3/3-5
[Zurich] Digital Identity Unconference Europe - Ecosystems 3/4-5 (Kaliya will be there)
[Manila] MOSIP Connect - 3/11-13 (Kaliya will be there)
[London] Future Identity Finance 3/19
[Netherlands] IDM Europe 4/1
[California] Internet Identity Workshop #40 4/8-10. (Kaliya will be there)
[Washington DC] IAPP Global Privacy Summit 2025 4/21-24
[San Francisco] RSA Conference 2025 4/28-5/1
Standards Development
W3C issues new technical draft for verifiable credentials standards 2024-08-15 Biometric Update
With support from the DHS S&T, and U.S. Citizen and Immigration Service, the W3C Working Group has been developing the online digital ID standards.
VCDM 2.0 introduces several enhancements, including processing clarifications, transitions into an tangible data model, media types, and data model simplifications while still maintaining the VCDM 1.1 baseline.
DIF works toward standardized data scheme for age assurance credentials 2025-01-29 Biometric Update
Create a format-agnostic "data template" (schema) for age verification and estimation
Consistency in data fields across different credential formats
[linkedin] [includes audio] Securing the Software Supply Chain: How SCITT, SPIFFE, and WIMSE Work Together 2025-02-03 Heather Flanagan
I’ve been saying that to follow what’s happening in NHI standards, some of the core work you need to follow is happening in the IETF: SPICE, WIMSE, and SCITT. Everybody loves WIMSE with its workload identity architecture, and building the credential format in SPICE that can meet the needs of NHIs is of course brilliant (I’m not biased, you’re biased!). But thinking about this from the bottom up is what SCITT (Supply Chain Integrity, Transparency, and Trust) is all about, and it’s time to learn more about it and its close allies, SPIFFE (which isn’t happening in the IETF) and, yes, WIMSE. (I’ll cover SPICE in a future blog post.)
[explainer] The Vital Role of Identity Verification in Verifiable Credentials 2025-01-29 ; James Schulte; Indicio
Government
Industry coalition presses DOGE to act on digital identity 2025-01-29 federalnewsnetwork.com
Develop a digital identity strategy involving more direct government role in addressing deficiencies in digital identity infrastructure
Consider accepting digital identity documents that meet certain privacy and security standards
Improve Login.gov, a secure sign-in service run by General Services Administration (GSA) used by various federal agencies.
Trust Framework for Digital Identity [New Zealand]
The Trust Framework Authority is the regulator of digital identity services that are accredited. It came into effect on 1 July 2024.
accredits providers and services
publishes the list of accredited providers and services on the Trust Framework Register
makes sure accredited providers consistently meet the laws, rules and regulations of the Trust Framework
assesses and investigates complaints made about accredited providers or services
manages the accreditation mark for the Digital Identity services Trust Framework.
The EU’s Privacy Paradox: Commission Busted for Breaking Its Own Rules Clement Saudu
The case, which made headlines at the beginning of the year, involved a German citizen who, in March 2022, visited the now-inactive “futuru.europa.eu” website, a platform run by the European Commission. While registering for an event, the individual used the “Sign in with Facebook” option. However, this seemingly innocuous action resulted in the Commission transmitting the individual’s personal data, including their IP address and browser metadata, to Meta’s servers in the United States.
Digital ID State Legislative Recommendations at W3C CCG 2025-01-27 tang_talks; Daniel Gillmor; Jay Stanley; ACLU
Daniel Gillmor and Jay Stanley from #ACLU gave a great presentation on ". ACLU recommends that new digital ID systems should have the following properties: (1) no access to police, (2) no “Phone Home”, (3) selective disclosure, (4) unlinkability, (5) open ecosystem, (6) verifier accountability, (7) no individual kill switch, and other protocol-external requirements. Watch the recording of the presentation (start at 12m)
Development
Hyperledger Identus – then, now, and tomorrow 2025-01-26 IOHK
The Identus identity solution is built on the robust foundational work of the Atala PRISM protocol, which enables a degree of flexibility that other solutions lack – the Identus SDKs work with a multitude of platforms, such as web (through Typescript) and mobile (through Swift and Kotlin) – and delivers a comprehensive suite of tools for decentralized identity solutions.
ACA-Py (and Aries VCX) Upgraded to Fully Support cheqd 2025-01-15 ; Alex Tweeddale; cheqd
We are glad to announce that ACA-Py and Aries VCX have been upgraded to fully support cheqd.
Take 1... Solid Pods and Dids xditao.blogspot.com
A super simple “BooksWeLike” app—a place where I can review books and see what my friends are reading and enjoying.
What makes this app different is how it handles data. Unlike traditional apps where data lives in a centralized database, my app will let users store their own data in Solid Pods.
Use-Case
[prevention] Digital Identity Wallets & Fraud Prevention: Insights from John Erik Setsaas at cyberevolution 2024 2025-01-27 KuppingerCole
Technology and Financial Regulations:
Instant payment regulation: Fraudsters can exploit short processing time to make transactions before detection
GDPR: Protects consumers' privacy, making it challenging for banks to share fraud information between institutions
European digital identity wallet: Privacy-oriented and does not allow profiling; difficulties monitoring direct person-to-person payments or asset transfers under current regulations
[communications] The Value of Verifiable Credentials in Telecom – Building a Framework for Trust 2025-01-28 Ian Deakin; ATIS
Telecom VC Governance Framework
Endorses credulously issued verifiable credentials from external bodies
Ensures alignment with telecom-specific standards
Maintains and shares list of endorsed externally issued VCs with telecom verifiers
Member Spotlight: The Camino Network Foundation 2025-01-29 blog.identity.foundation
Camino's compliance-first approach with mandatory KYC for smart contract deployments and KYB for validators ensures a trusted and professional ecosystem for travel companies. Adhering to regulatory standards enhances legitimacy and simplifies onboarding, reducing risks in global/cross-border collaboration. This fosters confidence among partners and regulators, making blockchain adoption smoother and more secure for the travel industry
[researchgate] A Self-Sovereign Identity Blockchain Framework for Access Control and Transparency in Financial Institutions 2025-01 Hsia-Hung Ou, Guan-Yu Chen, Iuon-Chang Lin
To address the credit assessment needs of financial institutions, this paper proposes a Customer Self-Sovereign Identity and access-control framework (CSSI) based on SSI technology. Customers can securely store assessable assets and credit data on the blockchain using this framework. These data are then linked to a digital account address. With customer authorization, financial institutions processing loan applications can comprehensively evaluate customers’ repayment capabilities and conduct risk management by accessing this credit data.
Techruption Ben Smits, Virág Szijjártó, TNO June 2022
An introduction to ID poverty 2025-01-02 Vouchsafe
UN Sustainable Development Goals (SDG 16.9):
Provide legal identity for all by 2030
Addressing ID Poverty:
Rethink identity verification methods
Broaden types of acceptable verification: bank accounts, government correspondence, or trusted referees
Inclusive Identity Solutions:
Break down barriers and provide access to essential services
Design systems that reflect real-world experiences
Organizational News
Robert McGough joins Velocity's board 2025-01-30 Velocity
Reinventing how career records are shared across the global market. Empowering individuals, businesses and educational institutions through transformational blockchain technology – public, open, trusted and self-sovereign. Turn career achievements into digital credentials. Verified, secured and truly global. Own them, use them to access better opportunities.
Company Stories
Hovi and cheqd Announce Strategic Partnership to Advance Decentralized Identity Adoption Hovi.id
Partnership aims to address technical, operational, and financial obstacles to decentralized identity adoption
Innovative tools designed to simplify integration, ensure cost efficiency, and provide smooth implementation
Humanity Protocol raises $20M at $1.1B valuation 2025-01-27 Biometric Update
Enables interoperable, privacy-preserving credentials across decentralized ecosystems
Credentials authenticated using Humanity Protocol's verifiable credential framework and Proof of Humanity (PoP)
Goal is to build trust in Open Campus’ credentials through zero knowledge proofs
Entra Verifiable credentials Admin API with PowerShell 2025-01-29 Andres Bohren; icewolf.ch
To create a valid JWT: $JWT = $EncodedHeader + "." + $EncodedPayload
Get private key of certificate: $PrivateKey = ([System.Security.Cryptography.X509Certificates.RSACertificateExtensions]::GetRSAPrivateKey($Certificate))
Define RSA signature and hashing algorithm: $RSAPadding = [Security.Cryptography.RSASignaturePadding]::Pkcs1; $HashAlgorithm = [Security.Cryptography.HashAlgorithmName]::SHA256
Create signature of JWT: $Signature = [Convert]::ToBase64String($PrivateKey.SignData([System.Text.Encoding]::UTF8.GetBytes($JWT), $HashAlgorithm, $RSAPadding)) -replace '+' , '-' -replace '/' , '' -replace '='
Join signature to JWT with ".": $JWT = $JWT + "." + $Signature
Research Papers
Demystifying Interoperability – Development Gateway: An IREX Venture 2024-11-12
This paper discusses, in practical terms, what goes into implementing interoperable solutions in partnership with public administrations. Based on 20+ years of DG’s experience, the paper demystifies key components needed to build robust, resilient, and interoperable data systems, focusing on the “how” of data standardization, data governance, and implementing technical infrastructure.
[arxiv] CRSet: Non-Interactive Verifiable Credential Revocation with Metadata Privacy for Issuers and Everyone Else 2025-01 Felix Hoops, Jonas Gebele, Florian Matthes
IDs. We introduce CRSet, a revocation mechanism that allows an issuer to encode revocation information for years worth of VCs as a Bloom filter cascade. Padding is used to provide deniability for issuer metrics. Issuers periodically publish this filter cascade on a decentralized storage system. Relying Parties (RPs) can download it to perform any number of revocation checks locally. Compared to existing solutions, CRSet protects the metadata of subject, RPs, and issuer equally. At the same time, it is non-interactive, making it work with wallet devices having limited hardware power and drop-in compatible with existing VC exchange protocols and wallet applications. We present a prototype using the Ethereum blockchain as decentralized storage.
Post-Quantum Cryptography in VC - PQ and PQ/T Approaches 2025-01-31 tang_talks; Andrea Vesco; LINKS Foundation; W3C CCG
Quantum computers will break most of the cryptographies used today, so we will need to develop post-quantum cryptography #PQC, along with cryptographic agility and pliability, to future-proof security. In Verifiable Credentials #VC and Verifiable Presentations #VP, PQC needs to have (1) short signature verification time first and foremost, (2) short signature generation time, (3) small signature size, and (4) small public key size. ML-DSA-44 (Module-Lattice-Based Digital Signature Algorithm), ML-DSA-65, and ML-DSA-87 fit these requirements. PQ/T (Post-Quantum and Traditional) hybrid cryptographic schemes combine both PQC and traditional signature algorithms, and it is secure as long as one of the algorithms holds. One of the ways to combine signature schemes is the concatenation combiner that archives the weak non-separability #WNS property. Watch the recording of the presentation and discussion (start at 8:30):
AI
Are You Human? A Dive Into the Proof of Personhood Debate Heather Flanagan 2025-01-27
I don’t think of myself as an expert in non-human identity (NHI). Instead, I’d say I’m NHI-curious and eager to share what I’m learning. Lately, I’ve been going down a rabbit hole about when and how to indicate if someone—or something—is human. I’m clearly not alone in asking this. Last year, I was one of many co-authors on a paper, Personhood Credentials: Artificial Intelligence and the Value of Privacy-Preserving Tools to Distinguish Who is Real Online, exploring these questions and challenges. Spoiler: we ended with a call for further discussion.
[linkedin] WEF Report on AI in TradeTech GLEIF
World Economic Forum's TradeTech Initiative highlights GLEIF and the verifiable Legal Entity Identifier (vLEI)
The vLEI is recognized as a secure, global "root of trust"
The emergence of Personalized AI Companions
[linkedin] Rant: Wallet Wars Pt 3 - Authentication for AI Agents 2024-01-28 David Birch
That credential will contain the public key of the agent, signed with the private key of a bank in the framework. Since my bank knows the public key of the other bank it can easily check the credential is authentic. But how does it know that the credential is being used by the correct agent? It must then check that the agent has control of the private key that corresponds to the public key in the credential.
Kin: Local First Blog 2024-09-26 Yngvi Karlson; blog.mykin.ai
Our local-first architecture houses user data directly on your mobile device. This means your innermost thoughts will remain in your control and yours only.
What Trust Is, and Why AI Needs It ; Yngvi Karlson; blog.mykin.ai
Part 1 of 4 about Trust and AI. Trust is a complex feeling, and without fully understanding and building it, AI will forever be limited by it.
Definition of Trustworthy AI:
Combines reliability, likeability, predictability, and correctness
Best chance for building trust
Overcomes negative stereotypes
[AI] CAN/DGSI 118 DIGITAL GOVERNANCE STANDARDS INSTITUTE
Technical committees: create, review, and approve draft standards
Open to anyone with interest in a committee's focus
Hundreds of thought leaders and stakeholders bring unique perspectives
Commitment to annual reviews: ensure reflectiveness of latest digital technology changes.
Public Review Period Announced for Data Governance in Human Research January 23, 2025
Paving the Path for Progress: Launching First-of-its-Kind Regulatory Sandbox Standard January 14, 2025
Future-Proofing AI, CAN/DGSI 101:2025 The Latest Standard Revolutionizes Ethical Tech for SMEsJanuary 8, 2025
Future-Proofing Digital Governance: Maintenance Review of Agile and Open Procurement Standard for Digital Solutions (CAN/DGSI 108) December 18, 2024
CAN/DGSI 112: Canada’s Cybersecurity Workforce Stands Strong December 12, 2024
DGSI Publishes New Standard for Online Voting: CAN/DGSI 111-1 December 11, 2024
Web3
[cryptocurrency] [ieee] Cross-Chain Asset Transaction Method Based on Decentralized Digital Identity 2024-08-17 Ruiyao Zhou; Shuhui Zhang; Lianhai Wang; Shujiang Xu; Wei Shao; Ting Gao
this study optimizes identity identification and authentication methods with a privacy-preserving solution for cross-chain asset transactions. This enhances the identity management mechanism, safeguarding user privacy. Initially using ring signature algorithms to anonymize user identities, the study now employs Decentralized Identity (DID) and Verifiable Credentials (VC) for unified identity identification and authentication across chains. This approach grants users control over their identities, removes blockchain barriers, and adapts to multiple scenarios. Comparative analysis includes gas consumption, transaction delays, and performance evaluations of both solutions.
Explainer
[linkedin] The difference between digital identity, identification, and ID David Eaves
Explore a Robotic ID element in Ghanaian design
Unique DOVID (Diffractive Optically Variable Image Device) for authentication with IQ CHECK mobile application powered by Trask
Sophisticated protection against identity document forgery
Privacy
[linkedin] I Know Where You Live Simone Onofri
🗺️ I Know Where You Live: Inferring Details of People’s Lives by Visualizing Publicly Shared Location Data
Thanks for Reading
Read more \ Subscribe: newsletter.identosphere.net
Contact \ Submission: newsletter [at] identosphere [dot] net