Discover more from Sovereign Identity Updates
Identosphere 71 • EU Data Act Published • EU Digital ID Architecture and Reference Framework • No, I Don't Trust You
We curate the latest in decentralized identity, with upcoming events, use-cases and developments in open standards and the public sector.
Welcome to Identosphere’s Weekly!
Thanks to our Patrons <3
…or reach out to Kaliya directly
Read previous issues and Subscribe : newsletter.identosphere.net
Content Submissions: newsletter [at] identosphere [dot] net
SSI Harms Task Force 02-28
What Makes A Successful SSI Strategy? 3/1 Evernym
Naming the Harms of Web 1 & 2.0 3/4 Planetwork
Mitigating Harms in Web3 4/1 Planetwork
DIDcomm Users Group every 2 weeks on Wednesday
Internet Identity Workshop 4/26-28, Mountain View, California
DIDcomm Users Group Time Poll - are the proposed time slots for this event.
Falsehoods Programmers Believe About Names - With Examples Shine Solutions Group
In this post I’m going to list all 40 of Patrick’s original falsehoods, but give you an example (or two) drawn from my experiences working in this space. Ready? Let’s go!
People have exactly one canonical full name.
People have exactly one full name which they go by.
Bob Blakely shared his reflections on SAML interop work DIF Interop WG
This white paper/research paper does a really great job of sharing a current state of play for many countries around the world. We highlighly recommend it.
Digital Identity Attestation Roundup Open Source Security Foundation
We kicked off the first Digital Identity Attestation Working Group meeting under the OpenSSF in August, 2020. The objective of this working group is to enable open source maintainers, contributors and end-users to understand and make decisions on the provenance or origin of the code they maintain, produce and use.
In particular, Affinidi has been at the forefront in building many components such as the Affinidi Wallet, Schema Manager, Consent Manager, and more that have enhanced the adoption of decentralised identity among communities and individuals.
Transforming Scottish Education for the 21st Century Digital Scot
This of course is the backbone of the education system, how grades are assessed and rewarded, and it is here therefore where the biggest levers for change are possible, and in this article we’ll explain the role new technologies can play in underpinning and enabling such a transformation.
With the transition to the web 3.0 ecosystem, the development of distributed registries (blockchain technology) and the regulatory environment that is forcing digital players to favour privacy by design, the ISS approach will become the new standard, whether for entering into customer relations, managing digital identities or ensuring compliance of administrative processes in companies and institutions.
The document in particular outlines the EUDI Wallet:
The EU Commission published the long-awaited Data Act on February 23, 2022. This is a progressive legislative proposal to increase access to data for the users of connected products suchs as Iot devices and related services. It is a significant move towards realising the MyData principle of portability, access, and re-use as well as the principle of interoperability. It will potentially also move the needle towards the shift from formal to actionable rights in terms of the right of data portability. With such a progressive agenda, the proposal will certainly also face significant opposition and counter-lobbying from those who stand to benefit from the status quo.
“NO, I DON’T TRUST YOU” – IMPLEMENTING ZERO-TRUST ARCHITECTURE IN THE WORLD OF SELF-SOVEREIGN IDENTITY (SSI)
Efforts are underway around the globe to promote new trust models between governments and citizens that promotes privacy and improves how trust is established between entities sharing information. Now is the time for the US government to consider and adopt the ToIP Framework as a starting point to not only support ZTA but promote greater privacy in information sharing within its ecosystem.
Problem 1: Unique wallet IDs
Problem 2: Remote Wallet Kill Switches
Problem 3: Wallet Content Restrictions
Problem 4: Private Sector Restrictions
Exciting New Opportunities for eIDAS 2.0
Opportunity 1: Basic or Enhanced Wallets
Opportunity 2: Turning Regulations Into Revenue
Opportunity 3: Person-to-Person Verification
Opportunity 4: Secure messaging.
Life is a Metasystem Windley
Rather than being a DAO, the world is a gigantic metasystem that provides numerous tacit capabilities for action and interaction. So, while “Life is a DAO” makes a better t-shirt, I prefer “Life is a Metasystem.” Take the red pill.
What is New in the World of Blockchain? Interview with Vinay Gupta
Vinay: My history goes back to the 1990s. I was involved very heavily in the kind of cypherpunk movement in the ’90s. My first year where 100% of my salary went through crypto cash was 1999, so ‘99/2000 I got a full year of salary in crypto cash.
The Decentralized Web: An Introduction Archive.org
Providing that baseline of knowledge is the goal of a series of six workshops called “Imagining a Better Online World: Exploring the Decentralized Web.”
Doc Searls and Katherine Druckman talk to Mike Vesey, CEO of IdRamp, about verifiable credentials, decentralization, and real-world identity solutions.
Leveraging Self-Sovereign Identity, Blockchain, and Zero-Knowledge Proof to Build a Privacy-Preserving Vaccination Pass Maurício Barrosa, Frederico Schardong, Ricardo Felipe Custódio
This solution allows users to prove that they are vaccinated for different pathogens without revealing their identity. The architecture is loosely coupled, allowing components to be exchanged, which we discuss when we present the implementation of a working prototype.