Identosphere 249 Oct 13-19: Keypear • DIF Identity Projects • Sad State of Decentralized Identity • SPRN-D Highlights • DIACC Trust Adoption Dashboard
This is the weekly Identosphere Newsletter sharing highlights from around the web covering Decentralized and Self-Sovereign Identity curated by Kaliya Young, Identity Woman.
Comprehensive Overviews
EU Identity Wallet communities
eIDAS is an ecosystem play with network effects: The value of the network increases with every new participant. Here’s an overview of the most important communities.
Digital identity in Latin America: progress, challenges and outlook for 2025
The regulatory framework In Latin America is still under development. Some countries have made progress in digitalizing their identity documents, while others are in preliminary exploration or institutional design phases. The lack of harmonized regional regulation complicates the creation of cross-border digital ecosystems, although efforts toward convergence inspired by the European model are evident.
Citizen perception of new forms of digital identity is divided. Let us focus on countries where solutions are already available to the population.
KeyPear: Unlocking the Digital Economy in Hong Kong with iAM Smart and CorpID Integration
At its core, KeyPear is a did:webvh wallet, built on the principles of Decentralized Identifiers (DIDs) and Verifiable Credentials (VCs). This architecture is the key to its power.
KeyPear’s strategic integrations with iAM Smart and CorpID, combined with its role as a secure gateway to the stablecoin economy, position it as a defining piece of infrastructure for Hong Kong’s next chapter.
SEDI Summit Home Page
The State of Utah invites you to attend the State-endorsed Digital Identity (SEDI) Summit—a national gathering for states to lead the way in rethinking how identity works in the digital age.
As digital transactions become foundational to modern life, trust in identity systems must be earned, not assumed. The time has come for a model where states uphold their constitutional role, and individuals regain control over their identity.
AI and Identity
What Happens When an AI Agent Goes Rogue?
That could mean extending today’s digital identity frameworks, such as device fingerprinting, behavioral biometrics or cryptographic signatures, to include AI agents. In practice, each approved agent might carry a verifiable credential issued by the customer’s bank or identity provider, ensuring that every transaction or request can be cryptographically linked back to a legitimate owner.
LF Decentralized Trust: Identity Projects
Hylerledger AnonCredds
Credebl
Hylerledger Identus
Hylerledger Indy
Trust over IP
5 Reasons We Must Shift to Human-Centric Data Design
Here are five reasons the future needs to be human-centric design and how ArcBlock’s decentralized identity can delivery it:
1. Less Data, Less Risk
2. Put People Back in Control
3. Trust Isn’t a Feature—It’s an Advantage
4. Break the Surveillance Economy
5. From Data Hoarding to Data Dialogue
TABConf 7: October 2025: Beyond Bitcoin & The Sad State of Decentralized Identity
Christopher Allen was invited to support a new decentralized identity track at TABConf 7 and made two presentations, one on “Beyond Bitcoin: Engineering Exodus Protocols for Coordination & Identity” and one on the “Sad State of Decentralized Identity (and What To Do About It)”.
Open Badges Specification: Final Release Spec Version 3.0
This specification is a new version of the 1EdTech Open Badges Specification that aligns with the conventions of the Verifiable Credentials Data Model v2.0 for the use cases of Defined Achievement Claim and a Skill Claim. The credentials that are produced are easily be bundled into Comprehensive Learner Records and Verifiable Presentations. Portability and learner data privacy are improved by expanding the usage of cryptographic proofs/signatures, because this format will be compatible with a growing array of proof schemas that are developed for the Verifiable Credentials Data Model.
(Okta:Tim Cappalli) [explainer] A technical overview of the verifiable digital credentials ecosystem
- You can think of VDCs as an evolved form of federation.
- An issuer (similar to an IdP in federation) asserts claims about you.
- You, the holder, present those claims to a verifier (similar to a service provider in federation).
- The verifier checks validity using one or more trust lists.
Intesi Group contributes to the first European trial of the EU Digital Identity Wallet in tourism
Intesi Group, a leading Italian Qualified Trust Service Provider (QTSP), proudly announces the release of PhotoID as Electronic Attestation of Attributes (EAA) according to eIDAS regulation, developed as part of the first European pilot of the EU Digital Identity Wallet in the tourism sector.
[Research] Mapping the metaverse minefield: A TIPS framework for security-conscious business adoption
This study examines metaverse adoption by organizations (particularly M/SMEs) through the Trust, Identity, Privacy, and Security (TIPS) framework, using qualitative NLP analysis of interviews with business and IT professionals to understand the interdependencies between these security dimensions. The research reveals a hierarchical dependency structure where trust is influenced by user embodiment, avatar-based identities complicate verification and privacy protection, and privacy demands transparency frameworks—ultimately recommending that organizations adopt security-by-design principles balanced with user experience considerations for successful metaverse implementation.
The Digital Identity Paradox: Reconciling Privacy and Security in the Age of Self-Sovereign Identity (SSI)
The journey to Self-Sovereign Identity is a marathon, not a sprint. The current identity model, with its endless cycle of data breaches and eroded trust, is unsustainable. SSI offers a viable path forward, one that flips the script by making the user the sovereign owner of their digital self. It resolves the Digital Identity Paradox by designing a system where robust security and individual privacy are not competing interests but mutually reinforcing goals.
[Reserch] BcFCKA:Blockchain-based Fair and continuous key agreement for DIDComm in Self-Sovereign Identity
Self-Sovereign Identity (SSI) systems face security challenges in their DIDComm communication framework, including lack of perfect forward secrecy and poor message loss resilience. The authors propose BcFCKA, a blockchain-based key agreement protocol that enables continuous, fair session key updates without centralized trust, achieving strong security properties while maintaining practical performance with millisecond-level execution times.
Brave: Building the Private User-Friendly Internet - Guest Kyle Den Hartog
In this episode, Friederike is joined by Kyle Den Hartog, security engineer at Brave, to explore the browser’s role in a user-first web. From his roots in penetration testing and verifiable credentials, Kyle arrived at web3 via self-sovereign identity, viewing it as empowering despite imperfections.
SPRN-D Highlights of the the Funke “EUDI Wallet Prototypes” conference this week at Radialsystem Berlin. :
- The presentation is now available on OpenCoDE.
- We uploaded the recordings on our website and we will provide them on OpenCoDE within the upcoming week as well.
- You can also find the pictures from the event here – please credit SPRIND and the photographer Felix Adler (© SPRIND / Felix Adler) when using them. The images may be used for internal communication and your own social media channels. For any other use, please follow the copyright information provided by the photographer.
Musings of a Trust Architect: Five Anchors to Preserve Autonomy & Sovereignty: Solutions for Swiss e-ID and Other Digital Identity Systems
ABSTRACT: How do you protect autonomy and democratic sovereignty in digital identity systems? This article suggests five foundations: protecting choice by design; building for an extended future; maintaining platform independence; requiring duties; and implementing institutional safeguards.
Gathering the MyTerms Troops
Here is some of what’s going on around MyTerms. The draft is complete and on track for publication early next year. But work can start in the meantime.
Reimagining Canada Post: From Delivering Mail to Delivering Trust
Consider what Canada Post actually represents: a trusted institution with physical presence in virtually every Canadian community, deep expertise in verification and logistics, existing relationships spanning individuals and businesses, public accountability, and a mandate to serve all Canadians regardless of commercial viability.
These aren’t assets to be wound down. They are the foundations for building Canada’s digital trust infrastructure.
DIACC Unviels Digital Trust Adoption Dashboard: Transparency for a Connected Canada
This public resource maps the evolution of digital trust programs across Canada’s provinces and territories. By combining data from government sources with an interactive, map-based interface, the dashboard reveals the current state of digital verification and authentication services, trust program adoption, interoperability, and maturity across the country.
A Milestone in Enhancing Digital Trust for Lawyers: Digitally Verifying Client ID
The PCTF Legal Professionals Profile establishes Conformance Criteria for how lawyers and their agents expect services to conduct client identity verification (IDV) in a manner that is auditable and consistent.
OIDF applauds new FIDO and Shared Signals whitepaper
The OpenID Foundation welcomes the publication of a new whitepaper from the FIDO Alliance that examines how FIDO authentication and the Shared Signals Framework (SSF) work together to address enterprise security challenges.
[Video] (Grant.io) EUDI Wallet & OpenID4VP | Digital Credential Query Language Scenario #1: Basic Credential Query
Explore how EUDI Wallets use OpenID4VP and the Digital Credential Query Language (DCQL) to enable secure, trusted credential sharing in the EU Digital Identity ecosystem. In this first scenario — Basic Credential Query with Trusted Authority — you’ll see how a relying party requests a verified credential (e.g., a university degree) from a wallet holder, ensuring it is issued by a recognised and trusted EU authority (present in the Trust List).




