Sovereign Identity Updates

Share this post

Identosphere 70 • Realizing Augmented Social Network Vision • Just call it Decentralized Public Key Infrastructure • IRS: Privacy Optional

newsletter.identosphere.net

Identosphere 70 • Realizing Augmented Social Network Vision • Just call it Decentralized Public Key Infrastructure • IRS: Privacy Optional

Your weekly dose of upcoming events, company news, blog-posts, community discussions, and the latest in standards development and regulatory insight.

IdentityWoman
and
Infominer
Feb 23, 2022
2
Share this post

Identosphere 70 • Realizing Augmented Social Network Vision • Just call it Decentralized Public Key Infrastructure • IRS: Privacy Optional

newsletter.identosphere.net

Welcome! and Thanks to our Patrons <3

Consider supporting this publication with a monthly payment via Patreon ← click here

…or reach out to Kaliya directly

  • Read previous issues and Subscribe : newsletter.identosphere.net

  • Content Submissions: newsletter [at] identosphere [dot] net

Coming Up

  • Decentralized Autonomous Organizations to revolutionize the way we work? Alex Puig • Caelum Labs 2/24

  • eSSIF-Lab workshop: Building an SSI ecosystem together 2/25

  • What Makes A Successful SSI Strategy? 3/1 Evernym

  • MyData and GovStack – Accelerating digital transformations in the public sector globally 3/1

  • Naming the Harms of Web 1 & 2.0 3/4 Planetwork

  • Mitigating Harms in Web3 4/1 Planetwork

Help Wanted

(Internship) Self-Sovereign Identity: A decentralized identity management Stellen Anzel

STELLENBESCHREIBUNG:

  • Study the existing/emerging standards for SSI.

  • Offer a brief overview of the existing technologies to implement SSI.

  • Select the adequate technologies and development frameworks.

  • Study how existing established authentication standard (SAML and OIDC) are compatible with SSI

  • Implement a proof of concept of MFA with SSI.

Principal Program Manager Redmond, Washington, United States Microsoft

In this role, you will work with our engineering teams and with external engineers from companies all over the world to create and adopt decentralized identity specifications that meet our guiding principles for decentralized technology and that forward secure and innovative identity practices.    

DIGITAL-SIMPLE Grants

Support to the implementation of the European Digital Identity Framework & implementation of the Once Only System under the Single Digital Gateway Regulation Until May 17

The objective of the topic is to develop, implement and scale up the European Digital Identity framework, based on the revised eIDAS regulatory framework as well as the exchange of evidence as set out in article 14 the Single Digital Gateway Regulation. The broader objective of European Digital Identity is to improve citizen’s access to highly trusted and secure electronic identity means and trust services such as digital signatures, improve citizens’ possibilities to use them and improve their ability to control over sharing their personal identity data.

Explainer

Blockchain for Decentralized Identity — Self-Sovereign Identity De-mystified Anita Rao

Web 3.0 presents a promise to address the above issues with Identity. The term Web 3.0 refers to a decentralized internet that uses crypto tokens. Decentralization is at the heart of Web 3.0 which has the potential to democratize technology and put the users in control of their data.

Public Sector

Implementing the Swiss SSI Ecosystem – Two Streams Approach DIDAS Swiss

critical questions of user experience and acceptance can be validated in real life. The findings and results will feedback into further development of the systems and hardening of security and privacy. This is also a great practical way to identify legal aspects that need clarification or even potential changes in the relevant laws

THE IRS AND ID.ME: PRIVACY OPTIONAL Trust Over IP

While it is not clear why the IRS would relinquish this extremely sensitive capability in its entirety to a single, private-sector entity using a proprietary solution, there are clues

The time for the eIDAS Bridge ValidatedID

The main goal of this new program was to provide an implementation of eIDAS bridge and to proof the interoperability between different provider implementations. Validated ID was selected to participate in part of the Call 1 of infrastructure. The results of this project are available as open source. If you are interested in digging into the code, you can find it all in the following repositories: our open source version implementation and the SSI eIDAS Bridge interoperability performed with SICPA.  

ATB Ventures works with Canadian government on digital ID proof of concept Biometric Update

The proof of concept stage is where the Canadian government tests digital credentials use cases in cooperation with regulators and organizations to advance the adoption and maturity of digital credentials technology. The National Digital Trust Service aims to enable Canadians and businesses to issue, use and verify digital credentials during transactions.

Organization

Emergent community building WeAreOpenCoop

Last week, we ran the first Keep Badges Weird community call

​There’s an outstanding question, for us, around how this community explores and thinks about the theoretical underpinnings of a Community of Practice (CoP), but one thing is for sure, Keep Badges Weird is a CoP.

Machine Readable Governance is the Key to Scaling Decentralized Trust Indicio

We’re not convinced that “constraint” is the right theoretical approach for an emerging technology, especially one that is being deployed in different sectors for different use cases. To underscore this, we want to address a particular constraint implied by ToIP’s design concepts that is likely to be fatal to any deployment.

Use-case

Trusted Career Credentials Dr Gordon Jones

Today, even in this digital world that has expanded over the past two years, the job market still relies on self-reported attributes, records, resumes, and/or LinkedIn profiles, that individuals share with employers or recruiters as the source for applicants and employee data.

Sovereign Identity

Let’s find a more accurate term than ‘Self-Sovereign Identity Kim Cameron

Someone said this - this week. “we need a better name” Infominer says just call it like it is, Decentralized Public Key Infrastructure.

The principle is self-evident.  But I’ll be posting at length about the ways we can combine user-control, self-issued claims and verified claims to create the next big mainstream identity technology.

Interop

Evernym Joins with Other Solution Providers to Achieve Interoperability Milestone

Evernym’s Verity issuing to:

  • Trinsic Wallet

  • IBM Verify App

  • Lissi by Main Incubator

  • esatus Wallet

Evernym’s Connect.Me holding credentials issued from or proving to:

  • Aries Cloud Agent Python

  • Trinsic

  • IBM Security Verify

  • idRamp Passport

  • esatus SeLF

Web3

Framing and Self-Sovereignty in Web3 Windley

The tools people have to participate in these territories, browsers and password managers, let us visit those territories, but we ourselves cannot be visited. We cannot act. Online relationships (client-server) are inherently asymmetric and the power accrues to those who define the territory.

3Box Labs, core developers of Ceramic, has raised a $30,000,000 Series A co-led by Multicoin Capital and Union Square Ventures Ceramic

…Ceramic, a decentralized network for composable Web3 data. The network consists of three core components:

  1. Scalable, decentralized data infrastructure

  2. Open APIs for storing, modifying, and retrieving data

  3. Community-created marketplace of reusable data models

SkillWallet raises $1.65M to build the Identity Layer of Web3 SkillWallet

On the 31st of January, 2022, we deployed SkillWallet DAO, and the first self-sovereign ID that ever existed. Soon we will be sharing more details about the DAO Mechanics and our radically transparent approach to progressive decentralization.

Avatars as Self Sovereign Digital Identity 653.ETH

avatars (the visualisation of self-sovereign identities) go beyond simply providing users with further ownership and control over their cryptographically secure identities, by offering an end-to-end application ecosystem designed to facilitate the commerce and exchange of digital and physical services

Research 

Building a Credential Exchange Infrastructure for Digital Identity: A Sociohistorical Perspective and Policy Guidelines Mawaki Chango

Credential Exchange Infrastructures based on open standards are emerging with work ongoing across many different jurisdictions, in several global standards bodies and industry associations, as well as at a national level. This article addresses the technology advances on this topic, particularly around identification mechanisms, through the Self-sovereign identity model.

A Consortium Blockchain-Based Secure and Trusted Electronic Portfolio Management Scheme Mpyana Mwamba Merlec, Mainul Islam,Youn Kyu Lee, Hoh Peter

This system guarantees the authenticity and integrity of user credentials and e-portfolio data. Decentralized identifiers and verifiable credentials are used for user profile identification, authentication, and authorization, whereas verifiable claims are used for e-portfolio credential proof authentication and verification. We have designed and implemented a prototype of the proposed scheme using a Quorum consortium blockchain network. Based on the evaluations, our solution is feasible, secure, and privacy-preserving. It offers excellent performance.

Thanks for Reading!

Read more \ Subscribe: newsletter.identosphere.net
Support this publication: patreon.com/identosphere
Contact \ Submission: newsletter [at] identosphere [dot] net

Share this post

Identosphere 70 • Realizing Augmented Social Network Vision • Just call it Decentralized Public Key Infrastructure • IRS: Privacy Optional

newsletter.identosphere.net
Comments
TopNewCommunity

No posts

Ready for more?

© 2023 Identosphere
Privacy ∙ Terms ∙ Collection notice
Start WritingGet the app
Substack is the home for great writing