Identosphere 70 • Realizing Augmented Social Network Vision • Just call it Decentralized Public Key Infrastructure • IRS: Privacy Optional
Your weekly dose of upcoming events, company news, blog-posts, community discussions, and the latest in standards development and regulatory insight.
Welcome! and Thanks to our Patrons <3
…or reach out to Kaliya directly
Read previous issues and Subscribe : newsletter.identosphere.net
Content Submissions: newsletter [at] identosphere [dot] net
Decentralized Autonomous Organizations to revolutionize the way we work? Alex Puig • Caelum Labs 2/24
What Makes A Successful SSI Strategy? 3/1 Evernym
Naming the Harms of Web 1 & 2.0 3/4 Planetwork
Mitigating Harms in Web3 4/1 Planetwork
Study the existing/emerging standards for SSI.
Offer a brief overview of the existing technologies to implement SSI.
Select the adequate technologies and development frameworks.
Study how existing established authentication standard (SAML and OIDC) are compatible with SSI
Implement a proof of concept of MFA with SSI.
In this role, you will work with our engineering teams and with external engineers from companies all over the world to create and adopt decentralized identity specifications that meet our guiding principles for decentralized technology and that forward secure and innovative identity practices.
Support to the implementation of the European Digital Identity Framework & implementation of the Once Only System under the Single Digital Gateway Regulation Until May 17
The objective of the topic is to develop, implement and scale up the European Digital Identity framework, based on the revised eIDAS regulatory framework as well as the exchange of evidence as set out in article 14 the Single Digital Gateway Regulation. The broader objective of European Digital Identity is to improve citizen’s access to highly trusted and secure electronic identity means and trust services such as digital signatures, improve citizens’ possibilities to use them and improve their ability to control over sharing their personal identity data.
Web 3.0 presents a promise to address the above issues with Identity. The term Web 3.0 refers to a decentralized internet that uses crypto tokens. Decentralization is at the heart of Web 3.0 which has the potential to democratize technology and put the users in control of their data.
critical questions of user experience and acceptance can be validated in real life. The findings and results will feedback into further development of the systems and hardening of security and privacy. This is also a great practical way to identify legal aspects that need clarification or even potential changes in the relevant laws
THE IRS AND ID.ME: PRIVACY OPTIONAL Trust Over IP
While it is not clear why the IRS would relinquish this extremely sensitive capability in its entirety to a single, private-sector entity using a proprietary solution, there are clues
The time for the eIDAS Bridge ValidatedID
The main goal of this new program was to provide an implementation of eIDAS bridge and to proof the interoperability between different provider implementations. Validated ID was selected to participate in part of the Call 1 of infrastructure. The results of this project are available as open source. If you are interested in digging into the code, you can find it all in the following repositories: our open source version implementation and the SSI eIDAS Bridge interoperability performed with SICPA.
The proof of concept stage is where the Canadian government tests digital credentials use cases in cooperation with regulators and organizations to advance the adoption and maturity of digital credentials technology. The National Digital Trust Service aims to enable Canadians and businesses to issue, use and verify digital credentials during transactions.
Emergent community building WeAreOpenCoop
Last week, we ran the first Keep Badges Weird community call
There’s an outstanding question, for us, around how this community explores and thinks about the theoretical underpinnings of a Community of Practice (CoP), but one thing is for sure, Keep Badges Weird is a CoP.
We’re not convinced that “constraint” is the right theoretical approach for an emerging technology, especially one that is being deployed in different sectors for different use cases. To underscore this, we want to address a particular constraint implied by ToIP’s design concepts that is likely to be fatal to any deployment.
Trusted Career Credentials Dr Gordon Jones
Today, even in this digital world that has expanded over the past two years, the job market still relies on self-reported attributes, records, resumes, and/or LinkedIn profiles, that individuals share with employers or recruiters as the source for applicants and employee data.
Someone said this - this week. “we need a better name” Infominer says just call it like it is, Decentralized Public Key Infrastructure.
The principle is self-evident. But I’ll be posting at length about the ways we can combine user-control, self-issued claims and verified claims to create the next big mainstream identity technology.
Evernym’s Verity issuing to:
Evernym’s Connect.Me holding credentials issued from or proving to:
The tools people have to participate in these territories, browsers and password managers, let us visit those territories, but we ourselves cannot be visited. We cannot act. Online relationships (client-server) are inherently asymmetric and the power accrues to those who define the territory.
3Box Labs, core developers of Ceramic, has raised a $30,000,000 Series A co-led by Multicoin Capital and Union Square Ventures Ceramic
…Ceramic, a decentralized network for composable Web3 data. The network consists of three core components:
Scalable, decentralized data infrastructure
Open APIs for storing, modifying, and retrieving data
Community-created marketplace of reusable data models
On the 31st of January, 2022, we deployed SkillWallet DAO, and the first self-sovereign ID that ever existed. Soon we will be sharing more details about the DAO Mechanics and our radically transparent approach to progressive decentralization.
avatars (the visualisation of self-sovereign identities) go beyond simply providing users with further ownership and control over their cryptographically secure identities, by offering an end-to-end application ecosystem designed to facilitate the commerce and exchange of digital and physical services
Building a Credential Exchange Infrastructure for Digital Identity: A Sociohistorical Perspective and Policy Guidelines Mawaki Chango
Credential Exchange Infrastructures based on open standards are emerging with work ongoing across many different jurisdictions, in several global standards bodies and industry associations, as well as at a national level. This article addresses the technology advances on this topic, particularly around identification mechanisms, through the Self-sovereign identity model.
A Consortium Blockchain-Based Secure and Trusted Electronic Portfolio Management Scheme Mpyana Mwamba Merlec, Mainul Islam,Youn Kyu Lee, Hoh Peter
This system guarantees the authenticity and integrity of user credentials and e-portfolio data. Decentralized identifiers and verifiable credentials are used for user profile identification, authentication, and authorization, whereas verifiable claims are used for e-portfolio credential proof authentication and verification. We have designed and implemented a prototype of the proposed scheme using a Quorum consortium blockchain network. Based on the evaluations, our solution is feasible, secure, and privacy-preserving. It offers excellent performance.