Sovereign Identity Updates

Share this post

Identosphere 72 • EBSI Documentation • EUDI Wallet Review • Global Assured Identity Network POC

newsletter.identosphere.net

Identosphere 72 • EBSI Documentation • EUDI Wallet Review • Global Assured Identity Network POC

We curate the latest news and updates in decentralized identity, with upcoming events, standards talk, use-cases and business strategy.

IdentityWoman
and
Infominer
Mar 8, 2022
1
Share this post

Identosphere 72 • EBSI Documentation • EUDI Wallet Review • Global Assured Identity Network POC

newsletter.identosphere.net

Welcome to Identosphere’s Weekly!

Thanks to our Patrons <3

Consider supporting this publication with a monthly payment via Patreon ← click here

…or reach out to Kaliya directly

  • Read previous issues and Subscribe : newsletter.identosphere.net

  • Content Submissions: newsletter [at] identosphere [dot] net

Upcoming

  • Pacific the Hyperledger Climate Action and Accounting SIG discuss Indy & Aries is used by BC and the Open Earth Foundation to integrate carbon and climate data across a mining supply chain. 3/8

  • CONNECTING WITH MYDATA OPERATORS 2022 3/16

  • Blockchain Africa Conference Online 3/17-18

    • BlockchainZA on Twitter :@lohanspies, Founder & CEO of @didxyz & Chair of Sovrin Steward Council at @SovrinID, is moderating the panel discussion, 'The Value of #SelfSovereignIdentity #SSI to Organisations & Citizens in a #SouthAfrican Context' on Day 1 of #BAC2022!

  • Mitigating Harms in Web3 4/1 Planetwork

  • Internet Identity Workshop 4/26-28, Mountain View, California

  • New: DIDcomm Users Group every 2 weeks on Wednesday

Funding

Showcase programme “Secure Digital Identities” Digitale Technoligen DE

With this innovation competition, the Federal Ministry for Economic Affairs and Climate Action (BMWK) is directly contributing to Germany’s digital sovereignty and data security on the Internet. The measure aims to strengthen the confidence of citizens and companies in digital transformation.

Showcase programme “Secure Digital Identities”

Hiring

Full Stack JavaScript Developer Indicio

Come and make the world a better place by writing software for creating, managing, and using privacy-focused verifiable credentials! The ideal candidate will design and code software and user interfaces for decentralized identity applications using Node.js, Express.js, and React.js.

Explainers

The Off Chain Internet: Decentralized Identity & Verifiable Credentials - Evin McMullen

^^^^^^^^ FANTASTIC NEW TALK!!!! ^^^^^^^^^

Self-Sovereign Identity: The Foundation of the Digital Wallet Nevis

Turning identifying features into verified credentials

How exactly does this work? Let’s look at the three roles of user, issuer and verifier. Firstly, users can have any number of attributes – such as their credit rating, national identity document or driving licence – certified by the entity responsible for each attribute. 

WHAT IS PII (PERSONALLY IDENTIFIABLE INFORMATION)? Thrivacy

Since we are experiencing massive boosts in our digital economy in the form of investment and innovation, being able to secure and "own" our PII is crucial. In an unprecedented time of hackable honey pots, we need to be able to protect our online and offline identities. 

Techgirl1908 on Twitter

In case you missed it, learn about a new type of identification... Decentralized IDs (DID)

We talk use cases, benefits, DIDs vs NFTs, and what should and shouldnt go on a blockchain.

RADIO WITH PICTURES Trust over IP

Exploring why human trust should be an essential design element in the next generation of digital solutions

Take Control of Your Data with Self-Sovereign Identity Rainfall One

The SSI identity system gives you the ability to authenticate your own identity, using credentials you have been issued or information you can verify directly, which is stored in a digital wallet.

Why all living artists should create their provenance and self-sovereign identity with their art? Artracx

This self-sovereign capability of associating the artist, the collector and the art work itself with an identity — creates value for everyone. We did also share that the opportunity of secondary sale income / commission that could be attributed back to him as the original artists is also possible (albeit very complicated).

Perkins Coie Podcast about SSI

On the @IAlsoPodcast, partner Charlyn Ho discusses w/hosts @nicolekyle and @SophieWHolm #digitalidentity, how #blockchain empowers users to take control of their data, #privacy under #Web2 vs. #Web3, and more. Tune in 🎧: https://apple.co/3IvGVjr. #womenintech #ialsowantmoney

Public Sector

Verifiable Credentials Lifecycle - EBSI Documentation - CEF Digital European Commission

Your one-stop-shop for navigating EBSI's Verifiable Credentials Profile

Why and how to make your digital wallet conformant with EBSI? European Commission

Creating EBSI's Verifiable Credentials Profile containing all the EBSI specifications.

On-boarding legal entities flows clarifications - EBSI Documentation - CEF Digital European Commission

  • EBSI Onboarding Service (EOS)

  • Trusted Accreditation Organisation (TAO)

  • Trusted Issuer (TI)

The time for the eIDAS Bridge ValidatedID

if you wonder how many of us, users, can really take advantage of PKI for identifying ourselves on the internet, the answer is quite deceiving. This mature technology has been available for decades but has never become mainstream among the society for identifying end users.

EUDI Wallet: Illustration of the eIDAS roles and functions Lissi ID

In the graphic below we reorganised and regrouped the stakeholders to map the requirements for the eIDAS toolbox architecture onto a SSI framework (Self-Sovereign Identity framework).

Our Analysis of the EU Digital Identity Architecture and Reference Framework Evernym

Broadly, we at Evernym/Avast are impressed with the content and the underlying principles in the Framework. There’s a lot that we like, but there are also some areas of significant concern that need careful attention.

Global Identity Networks: How to Leverage Them for Business Benefit Kuppinger Cole

The EU Commission did reflect on the effectiveness of the regulation in its Impact Assessment, and is developing a revision of it. There are multiple revision options being discussed, but thus far, the preferred option would establish a framework that provides citizens with optional use of a personal digital wallet

EBSI Documentation 

Governments and the societies they serve need technology capable of verifying the authenticity of the information they handle.

As we build the European regulatory framework, in the transfer from paper to digital, a key question arises: how to share official documents, called ‘evidences’ or ‘credentials’ in a way that can be trusted?

VIDchain is the first ID wallet to become EBSI compliant

Validated ID participates in a project to build the European Blockchain Services Infrastructure (EBSI) for the support of cross-border public services, an initiative created by the European Commission. EBSI is developing a strong and mature ecosystem that Validated ID is proud to be part of.

Governance

LAYER 1 UTILITIES: AN UNDERGROUND NETWORK CONNECTING ALL SSI ECOSYSTEMS Trust Over IP

  • Understand: A general framework for choosing which Layer 1 Utility and did method to utilise

  • Compare: A comparison chart of all Layer 1 Utilities and identity overlay networks

  • Comply: A guidance document for data protection and GDPR compliance

  • Innovate: DeFi compliance on top of Layer 1 Utilities (Shyft, Notabene, Centre), payments for Verifiable Credentials (cheqd, Kilt, Velocity), overlay networks (did:ion, did:tz, did:orb), KERI and self-certifying identifiers, self-executable governance (to name a few!) are all Layer 1 Utility innovations on the horizon. Let us know what you’d like to see going forward and how we can build guidance and documentation around it!

Introducing the Global Assured Identity Network (GAIN) Proof of Concept Community Group OpenID

The OpenID Foundation is pleased to announce the launch of the Global Assured Identity Network (GAIN) Proof of Concept Community Group, which aims to test the technical hypotheses underlying the “GAIN Digital Trust” white paper.

Web3

Cryptocurrencies: A Necessary Scam? Matt Stoller

The amount of utopian bullshit and fake promises on a technology that doesn’t really work as anything but a speculative bubble and money laundering device should be a big red flag. Crypto is a movement based on the theory that the existing nation-state is a system rigged by billionaires, and the right response is to create a different and more corrupt order rigged by different billionaires, money launderers, and dictators. 

The Social Web3 | Protocols for a Digital Society | POAP, Lens Protocol, Disco.XYZ Bankless

Web3 social media? Decentralized identity? Digital society in the metaverse? On this episode, we unpack the future social world in the metaverse and the protocols that will help shape it.

Three thoughts about NFTs Doc Searls

There’s a thread in a list I’m on titled “NFTs are a Scam.” I know too little about NFTs to do more than dump here three thoughts I shared on the list in response to a post that suggested that owning digital seemed to be a mania of some kind. Here goes…

Web3Auth at one of the World’s Largest Web3 Events — ETHDenver 2022 Torus

In the three years since we’ve been active as a Web3 company, this is the second time we had the opportunity to participate in this massive gathering of some of the brightest minds in the Web3 space. What better way to open our presence at ETHDenver than to become official sponsors of the Opening Party?

Web3 Reputation Market Map Kerman Kohil

Self-Sovereign Identity: The Jewel in the Web 3.0 Crown The Grow Group

In sum, SSI saves time, enhances security, and returns personal data ownership to individuals, thereby lessening the power of GAFA [Google, Apple, Facebook, and Amazon].

Velocity Network Foundation successfully launches Velocity Network Mainnet : Internet of Careers

Still not excited about tokenization of credential exchange. (Kaliya)

A game changing, blockchain based, public utility layer, which makes it simple for people and organizations to exchange verifiable, immutable, trusted self-sovereign career credentials. 

Privacy

Exposed documents reveal how the powerful clean up their digital past using a reputation laundering firm Rest of World

Reputation firms like Eliminalia use legal threats and copyright notices to have material taken down around the world.

From the we can’t talk about ourselves without ®’s camp

What is Privacy? Windley

Ask ten people what privacy is and you'll likely get twelve different answers. The reason for the disparity is that your feelings about privacy depend on context and your experience. Privacy is not a purely technical issue, but a human one.

Research

Bridging the Open Web and APIs: Alternative Social Media Alongside the Corporate Web Jamie Jackson

We analyzed GitHub issues to find breakdowns when syndicating between brid.gy and Facebook. Results explore how alternative social media can coexist w/ the corporate web

Bridging the Open Web and APIs: Alternative Social Media Alongside the Corporate Web.

Self-Sovereign Identity using Decentralized Identifiers Rishabh Garg

The present project is aimed to deliberate upon the feasibility, benefits and privacy concerns associated with different identity models. All possible decentralized identity models shall be audited in light of data protection, immutability, revocation, accountability, auditability, speed and users control over the personally identifiable information...... and the one that promises self-sovereign identity, shall be worked out with associated bare-bone framework.

Company News

Privatyze collaborates with Indicio to build a decentralized data marketplace Indicio

“In a data-driven economy, we need a marketplace for data that’s inclusive and not exploitative,” said Heather Dahl, CEO of Indicio

Validated ID turns 10 years old! The best is yet to come ValidatedID

Today, we want to celebrate our ten years, reflecting on what we have accomplished and anticipating the future, because we are sure that there will be many more to come. As a result, we want to reaffirm our commitment to our objectives and mission.

Critique

Blockchain, Self-Sovereign Identity, and Selling Off Humanity Wrench in the Gears

I think this piece is full of inaccuracies - it is also put together by someone really trying to understand a bunch of different things that get merged into “all that bad blockchain technology that deprives people of dignity and rights”. Unless we figure out how to differentiate what we are doing from others we will all get lumped together. (Kaliya)

It’s time activists began to develop a working knowledge of Blockchain and self-sovereign digital identity, because these are the mechanisms that will drive the transition to IoT monitoring for the purposes of Pay for Success deal evaluation

Use Case

Impacts from a new reality drive the need for an enhanced digital identity framework Bank Automation News

While US-based entities are adhering to an enhanced regulatory framework, these mandates are particularly applicable in Europe, where there is necessary compliance with enacted standards (such as the General Data Protection Regulation—commonly known as GDPR—and the Payment Service Providers Directive 2—referred to as PSD2. A clear need for a true and persistent digital identity as a solution to the ancillary—and sometimes unforeseen—challenges that have arisen.

Thanks for Reading!

Read more \ Subscribe: newsletter.identosphere.net
Support this publication: patreon.com/identosphere
Contact \ Submission: newsletter [at] identosphere [dot] net

Share this post

Identosphere 72 • EBSI Documentation • EUDI Wallet Review • Global Assured Identity Network POC

newsletter.identosphere.net
Comments
TopNewCommunity

No posts

Ready for more?

© 2023 Identosphere
Privacy ∙ Terms ∙ Collection notice
Start WritingGet the app
Substack is the home for great writing