Discover more from Sovereign Identity Updates
Identosphere #54 • NFT, VC & PICO • Data Privacy Floor • Challenges to SSI
A weekly publication following the leading news in decentralized identity standardization, governance, education and development.
This weekly newsletter is possible thanks to Patrons, like yourself.
Just over a year since this weekly review began. Incredible! Thanks for sticking with us!
Read previous issues and Subscribe : newsletter.identosphere.net
Contact \ Content Submissions: newsletter [at] identosphere [dot] net
Self-Sovereign-Identity & eIDAS a contradiction? Challenges and chances of eIDAS 2.0 University of Murcia/Alastria 10/19
Authenticate Virtual Summit Recap and looking forward Authenticate 2021 • 10/18-20 • Fido Alliance
Last month, Google, Apple, and Mozilla lodged formal objections to W3C approval of the W3C Decentralized Identifiers (DIDs) 1.0 specification.
Engineering Successful IAM Projects to Support Digital Business 11/23 KuppingerCole
What is Self Sovereign Identity Florian Strauf
Decentralizing Identity - Taking Back Control Madigan Solutions
Self-Sovereign Identity allows individuals to manage their own identities by moving physical credentials to digital devices. An individual will receive a credential from an issuer which will be stored in their digital wallet.
In his latest venture Global ID, Greg is acting on his long-held belief that people’s identity should be truly portable and owned by individuals themselves rather than corporations or governments.
Sign in with Ethereum is being developed by Spruce
Already used throughout web3, this is an effort to standardize the method with best practices and to make it easier for web2 services to adopt it.
Why would you have 75 logins when you could have 1?
About Dick Hardt’s new thing
Gimly ID is leading self-sovereign identity innovation, with the implementation of SSI with self-issued openID provider (SIOPv2) and full support for openID connect and DIF presentation exchange.
Proof-of-possession (pop) AMR method added to OpenID Enhanced Authentication Profile spec Mike Jones
I’ve defined an Authentication Method Reference (AMR) value called “pop” to indicate that Proof-of-possession of a key was performed. Unlike the existing “hwk” (hardware key) and “swk” (software key) methods [...] Among other use cases, this AMR method is applicable whenever a WebAuthn or FIDO authenticator are used.
OpenID Connect Presentation at IIW XXXIII Mike Jones
The session was well attended. There was a good discussion about the use of passwordless authentication with OpenID Connect.
NFTs, Verifiable Credentials, and Picos Phil Windley
Summary: The hype over NFTs and collectibles is blinding us to their true usefulness as trustworthy persistent data objects. How do they sit in the landscape with verifiable credentials and picos? Listening to this Reality 2.0 podcast about NFTs with Doc Searls, Katherine Druckman, and their guest Greg Bledsoe got me thinking about NFTs.
Clear is better than clever Cheney.net
“why would I read your code?” To be clear, when I say I, I don’t mean me, I mean you. And when I say your code I also mean you, but in the third person. So really what I’m asking is, “why would you read another person’s code?”
Passwords were a major point of contention in that regard, with a strong majority (68 percent) of consumers indicating that it is difficult to remember and key in a large number of passwords. Nearly half (44 percent) believe that biometric authenticators are easier to use, while 34 percent would prefer to use them as their primary means of identity
These competitors joined forces to allow readers to use a single login across their news sites Nieman Lab
The founding media partners all agreed, however, that having more first-party data and increasing the share of registered visitors would allow them to build better relationships with readers and more relevant news products.
While self-sovereign identity (SSI) sounds like an unfamiliar concept for some, others are actively leveraging the technology to address industry-specific challenges — take the KYC trial of the Financial Conduct Authority or the IATA Travel Pass.
Challenges to Self-Sovereign Identity Damien Bod
I based my findings after implementing and testing solutions and wallets with the following SSI solution providers:
Data Co-Operatives through Data Sovereignty
[…] This article illustrates an open debate in data governance and the data justice field related to current trends and challenges in smart cities, resulting in a new approach advocated for and recently coined by the UN-Habitat programme ‘People-Centred Smart Cities’.
EEMA Training Launches with Focus on eIDAS, Self-Sovereign and National Identity, Blockchain, EU Legal Frameworks and Cyber Security
Everyone who takes part in a course will have been taught by those leading their respective fields. We do not believe this caliber of training can be found anywhere else.
The New York Times recently did a deep dive into the United States’ lack of a national data privacy law
1. Data collection and sharing rights
2. Opt-in consent
3. Data minimization
4. Non-discrimination and no data use discrimination
Automated identification procedures ensure seamless processes without media disruption and increase cost efficiency. By modernizing laws that allow these procedures, many cases can be simplified and modernized in the future.
Our submission (in German) is available here
The vital role of LEI Issuers in facilitating wider adoption of globally recognized business identities across Africa GLEIF
We spoke with Alberta Abbey, LEI Analyst, Data & Analytics, LSEG to discuss how this initiative will support wider adoption of globally recognized business identities, in the form of Legal Entity Identifiers (LEIs), across Africa and how to encourage more entities across Africa to obtain LEIs.
On solving the worldwide shipping crisis Doc Searls
“The supply chain is essentially in the hands of the private sector,” a White House official told Donna Littlejohn of the Los Angeles Daily News, “so we need the private sector…to help solve these problems.” But Biden has brokered a deal among the different stakeholders to end what was becoming a crisis.
It's been 15 years of Project VRM: Here's a collection of use cases and requirements identified over the years rebooted
I categorize them by the stage of the relationship between customer and vendor:
Category 1: Establishing the relationship
Top 5 Most Interesting NFT Use Cases (Part 1) Europechain
From racehorses to virtual sushi: a dizzying NFT panoply
Information security and identity management is not their core business, yet is a critical factor in compliant, secure business operations.
This video demonstrates the TrustBloc platform to Issue a W3C Verifiable Credential through CHAPI and Share the Verifiable Credential/Presentation through WACI.
Levels of Assurance (LOA)
The Concept of Trust
The World of Trust Frameworks
The Importance of Open Source for Trust Creation
The SDI maintains to keep the practicality of a unique identifier while guaranteeing the security of the data and the user's sovereignty over it.
The federal privacy commissioner also said it has not yet received a report, and said it has contacted Portpass to seek further information in order to determine next steps, and that it is in communication with its provincial counterpart.
Building towards a decentralized European Data Economy: A Minimal Viable Gaia-X (MVG) Ocean Protocol
Gaia-X is the cradle of an open, transparent, decentralized digital ecosystem, where data and services can be made available, collated, shared, and monetized in an environment of trust. More than 300 organizations and over 2500 contributors are already supporting Gaia-X.
Each of the capabilities of the Sudo Platform is attached to a persona. This includes masked email and masked credit cards, private telephony, private and compartmentalized browsing (with ad/tracker blocker and site reputation), VPN, password management, decentralized identity and more.
Cloud, mobile, and Bring Your Own Device (BYOD) have transformed the dynamics of the digital world over the past decade. At the same time, IT is struggling to keep up with all of these changes, and developers are more burdened than ever
secure cloud deployment option for organizations seeking strategic fit with their technology stack, supporting regional data residency capabilities and higher control over customer data.
developers can plug Civic Pass into their platform and create an identity layer that allows for a permissioned dApp platform, be it a DEX, an NFT marketplace or mint, a metaverse
Equifax’s suite of identity protection products including Digital Identity Trust, Document Verification and the recently acquired Kount Identity Trust Global Network are incorporated into the new holistic solution.
Verifiable credentials is a beautiful set of technology that allows people and organizations to get the data in a verifiable form that still respects agency
WAYF has now been certified according to the standard for information security ISO 27001.
Beyond OnRamp’s direct data integrations, the platform also supports the ability for third party credentials to enter the OnRamp platform via the WACI specification
Just as the World Wide Web empowered people to connect and share knowledge and information, the rise of Bitcoin taught us that we could have direct ownership over our valuable assets and payments — no middle man or central operator necessary.
ID Not SSI
All the nodes of an X-Road network have their own sequence of transactions that are not shared with any other nodes – not even in a Security Server cluster. Therefore, there’s no need for a consensus algorithm in X-Road.
Thanks for Reading!
Read more \ Subscribe: newsletter.identosphere.net
Support this publication: patreon.com/identosphere
Contact \ Submission: newsletter [at] identosphere [dot] net