Identosphere 65 • Building DID with MS • EU DGA meets TOIP (& MyData) • Devon Lofretto still not Moxy Marlinspike
Your weekly digest of the latest news, events, and development related to creating a system for ID online giving users ownership of their personal info, and eliminates the use of access control lists
Thanks to Patrons like you.
…or reach out to Kaliya, and she will invoice by your preferred means!
Read previous issues and Subscribe : newsletter.identosphere.net
Contact \ Content Submissions: newsletter [at] identosphere [dot] net
Correction: Moxy Tongue (Devon Lofretto, still not Marlinspike)
We also shared an image about Human Authority found on Devon Lofretto’s website Moxy Tongue, misattributed (again) to Moxy Marlinspike; a longstanding misattribution, only recently, “once and for all” publicly corrected.
TLDR; No Relation (but the, now famous, mis-attribution)
- Devon Lofretto came up with the original idea of Sovereign Source Authority, which became Self Sovereign Identity.
- Moxy Marlinspike, created Signal App. Nice privacy focused messaging app.
Speaking: Markus Sabadello, Michael Shae, Tim Brückmann, Tim Heidfeld
Data Space Launchpad MyData • Until 2/22
Introduction to DID 01/13
Introduction to DID (continued) 01/20
Outside of a few philosophers, social scientists, and a tiny minority of specialized technologists, however, most people feel uncomfortable making any definitive or authoritative statements about identity.
What will be the buzzwords of 2022?
Remembering Kim Cameron Vittorio Bertocci
Kim might no longer update his blog, nudge identity products toward his vision or give inspiring, generous talks to audiences large and small, but his influence looms large in the identity industry – an industry Kim changed forever.
Memories of Kim Cameron Ian Glazer
Reification. I learned that word from Kim. In the immediate next breath he said from the stage that he was told not everyone knew what reify meant and that he would use a more approachable word: “thingify.” And therein I learned another lesson from Kim about how to present to an audience.
Community Resources - DID Primer Credentials Community Group
decentralized public key infrastructure (DPKI) could have as much impact on global cybersecurity and cyberprivacy as the development of the SSL/TLS protocol for encrypted Web traffic (now the largest PKI in the world).
Why we need DIDComm IdentityWoman
This is the text of an email I got today from a company that I had a contract with last year [...] I was reminded quite strongly why we need DIDComm as a protocol to enable the secure transport of all sorts of things not just signed VCs but intermediate uses
NGI - ESSIF LAB reports
The project SSIComms adds SSI to internet communications by adding SSI wallets to the renowned SYLK Suite, an award winning ensemble of communications solutions with the SIP protocol at its core.
The SSI mandate service is a generic and holistic approach to provide and request mandates. Mandates are SSI credentials signed by the dependent that can be requested by either the dependent or authorized representative. These credentials can be used to prove to a verifier that the authorized representative is authorized to act for specific actions on behalf of the dependent.
The concept of SSI was designed with the citizen and privacy in mind. However, existing implementations lack user-friendliness (e.g. showing hash codes to users), creating potential barriers in users’ adoption. OnboardSSI focuses on providing a secure and user-friendly wallet solution creating an easier way for citizens to manage their identity.
Kids PRIVCY ACT Me2BA
Strengthen the legal protections afforded to children under COPPA, and extend COPPA protections to adolescents ages 13 to 17, who have long gone without privacy protections online, while creating new rights for families.
Prohibit surveillance advertising and other harmful uses of data on all digital services likely to be accessed by children, rather than limiting protection to ineffectual notice and consent on “child-directed sites.”
As MyData Global saw in our reflection on 2021, the transformation towards a human-centric personal data economy is underway. This transformation is driven by two forces: first, the dominant unethical approaches to personal data are starting to show how unsustainable they really are.
The DGA defines an “intermediary” that facilitates processing and sharing of data for individuals and organizations to “…increase trust in data intermediation services and foster data altruism across the EU”. In the MyData framework for user-controlled data sharing, intermediaries are called MyData Operators and there is a certification program in place.
During COP26, GLEIF announced a partnership with Amazon and OS-Climate to add LEI datasets to Amazon’s Sustainability Data Initiative [...] We have since caught up with Ana Pinheiro Privette, Global Lead for ASDI, to discuss how the partnership is working to improve global sustainability data modelling, mapping and calculations, and the expected impact on climate finance risk and opportunity evaluations.
• Biometrics SHOULD only be used where its use is demonstrably necessary and […] is proportionate to basic human rights, privacy laws, and justifiable to the benefits gained.
• The biometric technology MUST require suitable accuracy, minimize data collection
• The evaluation of proportionaliry SHOULD include evaluating […] sensitivity, necessity, proportionality, effectiveness, and minimal intrusiveness.
it will be a transformative change, shifting power from travel suppliers to travelers themselves and giving travelers more choice, better personalization, lower friction and more security.
The potential use cases for self-sovereign identity to transform the travel industry are almost limitless, particularly with the impending arrival of decentralized identifier communications, also known as DIDComm
Let’s say Mr.X is forced out of his country due to war and he reaches the neighboring country but doesn’t have any physical document to prove his identity such as name, address, educational qualifications, work experience, etc.
What is Web3 and Why It Matters Dion Hinchcliffe
OpenSea, Web3, and Aggregation Theory Stratechery
what gives Aggregators their power is not their control of supply: they are not the only way to find websites, or to post your opinions online; rather, it is their control of demand. People are used to Google, or it is the default, so sites and advertisers don’t want to spend their time and money on alternatives; people want other people to see what they have to say
Web3 and Digital Embodiment Phil Windley
Web3 will make a difference for all of us if it enables people to become digitally embodied, able to recognize, remember, and react to other people and organizations online—without the need to be in someone else's database.
Web 3.0 - How to get started! Tech3.0
What is Web3Auth???
Web3Auth aggregates OAuth (Google, Twitter, Discord) logins, different wallets, and existing key management solutions, and provides dApps/wallets a familiar experience that fits every user. Mobile, web, and blockchain agnostic
The SSI model has an individual’s value — be it crypto, in-game items, or other NFTs — directly tied to their identity. It will be accessible with a simple click for physical services, like an Uber, as well as digital ones
Avatars May Use SSI In Metaverse To Prove Identity Hypersign ID
The tech got a surge especially after Facebook decided to change its name to Meta. In this blog […] focus will be on explaining why decentralized digital identities are an important tool for Metaverse to replicate the real world.
SSI makes it easier to rely on traditional economic actuators (Brands) online and off-line to develop traffic and business on decentralized platforms and the Metaverse
MetaMUI and Sovereign Yidindji Government launched 1st self-sovereign identity-based National ID system Cointelegraph
We are delighted to announce that our first E-Government pilot program with the Sovereign Yidindji Government has been successfully completed on Jan 7, 2022.
a few notable government-led projects, such as Aadhaar (India), Verify (UK), eIDAS (EU), and the Ontario Digital Identity Program (Canada) - What decentralization means for portability, scalability, flexibility, and privacy - How governments and commercial organizations can enhance existing federated identity systems with verifiable credentials
Our Self-Sovereign Identity initiative with SwissSign, the canton of Aargau and cardossier clearly shows: Even if there are still uncertainties regarding technical maturity and governance – SSI is happening and brings major advantages in data protection and cross-organizational digitization.
SURF: Technical exploration Ledger-based Self Sovereign Identity Identity Economy DE
the privacy-friendly nature of SSI, end-user control over disclosure of personal information, and the SSI trust model aligned well with the public values typically found in R&D. The platform we used (based Hyperledger Indy) allowed us to successfully run all use cases.
Composed of the desk, wallet and gateway, SSI+ offers a complete solution for issuers, holders and verifiers of verifiable credentials (VCs) to get started with self-sovereign identity projects today.
Katryna discusses Meeco’s mission to enable everyone on the planet access to equity and value in exchange for the data and information they share.
International Thank You Day Jolocom
We at Jolocom reflect on amazing projects that became possible by joining forces with partners such as T-Labs, Bundesdruckerei, Stacks, and TIB – the Technical Information Library Hanover.
Non-human Personas: Including Nature in the Participatory Design of Smart Cities Martin Tomitsch, Joel Fredericks, Dan Vo, Jessica Frawley, Marcus Foth
we introduce a framework for developing and employing non-human personas. As a key element of the framework, we describe a middle-out approach for forming a coalition that can speak on behalf of the non-human species that are impacted by design decisions.
Identity not SSI
“The data economy needs a secure and interoperable data network. And we are finally getting there with FAPI and eKYC standards. So, you guys need to get ready for the ride. It’s the time. You need to start acting, start preparing for that.”
The Rise of the Identity Data Fabric Radiant Logic
Every new identity project takes much longer than anticipated, demands huge costs in customization, presents a huge burden on staff across the enterprise, and reveals security gaps due to the complexity and inflexibility of the legacy infrastructure.