Identosphere 78 • SSI on Cyber Security • Fujitsu's successful SSI Pilot • Identity Proofing
Upcoming events, funding, podcasts, videos, thought-leadership and technicals, development and breakthroughs around putting users in control over PII.
Welcome to Identosphere’s Weekly!
✨✨Thanks to our newest patrons✨✨
Support Identosphere on Patreon …or reach out to Kaliya directly.
Read and Subscribe : newsletter.identosphere.net
Submissions: newsletter [at] identosphere [dot] net
Carbon Accounting with OpenClimate and the Government of British Columbia Zoom - ToIP - 4/20
Internet Identity Workshop #24 4/26-28, [Sold Out] Mountain View, California
Exploring Digital ID Online - Continuum Loop - 4/27
MEF CONNECTS Personal Data & Identity 5/10-11 Mobile Ecosystem Forum (Kaliya will be there & its free!!)
European Identity & Cloud Conference celebrates its 15th edition Berlin - 5/10-13
IdRamp from the front lines of Verifiable Credentials
Mike Vesey, CEO of IdRamp, has been selected to speak about “Verifiable Credentials on the front line”at EIC 2022,
European Identity and Cloud Conference 2022. Berlin 2022- 5/10-13
Kaliya will be there - their decentralized identity track on May 12th looks excellen
ID4Africa Marrakesh, Morocco 6/15-16
Kaliya and other community members will be there.
Affinidi is Hiring - like a lot
Blockchain Self-Sovereign Identity: True Control Of Your Identity Komodo Platform
The adoption of verifiable credentials is another fundamental part of the SSI concept. Verifiable credentials use a digital signature for identity claims by combining public-key hashing cryptography and privacy-protection techniques to convert credentials like ID cards to digital versions.
Exploring the Decentralized Web, Episode 4: Digital Identity Filecoin Foundation
10min Video Montage
Episode 4 explores the relationship between authentication and authorization, the rise of single sign-on platforms, and the advantages of and use cases for self-sovereign identity. Guests include Brian Behlendorf, Rainey Reitman, Danny O'Brien, Sarah Friend, Wendy Hanamura, Andrew Hill, and Brad Kam.
(the) Use Case
Impact of Self-Sovereign Identity on Cybersecurity | Avast (Formerly Evernym)
Great explainer - infominer
How does this change the world of cybersecurity protection? Typically, bad actors approach cybersecurity attacks by developing solutions that exploit the attack vectors of their target victims.
There are 4 attack vector categories to self-sovereign identity that map directly to each element: Issuer, Holder, Trust Registry and Verifier.
SSI & Proof of Reputation Catalyst Swarm
I’m not totally sure what this was/is but it was an interesting brainstorm to observe.
Join Frank Albanese (Snapbrillia), Lance Byrd (RootsID), Nick Mason (ProofSpace), Niels Kijf (Design Academy), Patrick Suzzi (F8 OSDE), Juan Sierra (HERG), Zoéys Welt, Brian Harper, Ashton Engberg, Ninh Tran (Snapbrillia) and many others as the community discusses the different what is SSI & Proof of Reputation and why it matters.
How my team won FinCEN/FDIC’s Digital Identity Tech Sprint Vadim Slavin GlobalID
“What is a scalable, cost-efficient, risk-based solution to measure the effectiveness of digital identity proofing to ensure that individuals who remotely (i.e., not in person) present themselves for financial activities are who they claim to be?”
Demo: Verifiable Credential Exchange with Trinsic v2
Easier IoT Deployments with LoraWan and Helium Phil Windley
Unlike a Wifi network, you don't put the network credentials in the device, you put the devices credentials (keys) in the network. Once I'd done that, the sensor started connecting to hotspots near my house and transmitting data. Today I've been driving around with it in my truck and it's roaming onto other hotspots as needed, still reporting temperatures.
Fujitsu declares success in trial of self-sovereign ID for students with university Biometric Updates
To resolve the complications, Fujitsu says it collaborated with the Keio Research Institute at SFC on a digital identity technology in September 2021, which resulted in an identity conversion gateway that enables multiple identity infrastructures to be interconnected without using a unified protocol.
Issue Hundreds of Credentials in Minutes with Dock Certs Dock
Bulk Issuance supports high customer volumes by bulk issuing verifiable credentials in batches of 100+. Simply import a CSV file and issue verifiable credentials within minutes, averaging 1 credential being issued every second.
Sign In With Ethereum (SIWE), Now Available on Auth0
Thanks to the hard work of Spruce, following their announcement on March 8th, you can now add Sign-in with Ethereum to your Auth0 tenant via their marketplace integration.
ATB Ventures is looking at SSI - Unsurprising since ATB is an early adopter.
They have oliu in their portfolio
We're so excited to announce our acquisition of @ConcentricSky, the makers of @BadgrTeam, an #edtech leader in micro-credentialing tools and a longtime Canvas partner.
Infrastructure buys Badgr
Badgr, the longtime free micro-credentialing tool in Canvas LMS, has been rebranded as “Canvas Badges” as it joins the Instructure Learning Platform. The deal also makes Badgr Pro‘s advanced suite of tools available to our customers for an additional fee in new “Canvas Credentials,” offering unlimited badging, leaderboards, analytics and personalized pathway progress visualizations.
How the Digital Markets Act (DMA) will shape the future of digital identity in Europe IDNow
On March 24th, 2022, the European Parliament and Council reached an agreement on the final version of the Digital Markets Act (DMA). According to the European Commission, the DMA regulation is expected to be reviewed and enacted by October 2022.
Request for Comment & IPR Review: PCTF Digital Wallet Draft Recommendation V1.0
a framework that Digital Identity Ecosystem Participants can use to assess the degree to which the digital wallets that are part of their respective ecosystems accomplish the following:
Provide Citizens and Consumers with a Digital Identity Wallet that complies with the human rights principles of preserving people’s privacy and control over their information.
Introduces a consistent identity metaphor and consent-driven automated experience across all Ecosystem Participants to reduce impact on users caused by Digital Transformation.
Contribute to a stable infrastructure with longevity and world-wide interoperability by adopting and supporting relevant standards as appropriate (e.g., W3C Standards for Verifiable Credentials and DIDs).
Counter cyber vulnerability and extortion by enabling Service Providers to incrementally replace existing login mechanisms, some of which may be exploitable, without suffering negative impact to business.
Establish an environment of trust within which the wallet’s owner can interact with other Ecosystem Participants such as Issuers, Verifiers, and other Relying Parties.
Web2's pervasive blind spot: governance
blockchain is only about governance? (yes, that’s right -infominer)
Have you noticed that pretty much all senior technologists that dismiss Web3 — usually in highly emotional terms – completely ignore that pretty much all the genuinely interesting innovations in the Web3 world are governance innovations?
Game Governance Domains: a NFT Support Nightmare Habitat Chronicles
“I was working on an online trading-card game in the early days that had player-to-player card trades enabled through our servers. The vast majority of our customer support emails dealt with requests to reverse a trade because of some kind of trade scams. When I saw Hearthstone’s dust system, I realized it was genius; they probably cut their support costs by around 90% with that move alone.”
FaceDAO: Self-sovereign Identity and the Blockchain CoinMarketCap
By having SSI in place for users, FaceDAO promises users total security of their data. For FaceDAO, self-sovereign identity on the blockchain implies an identity user’s own. It’s theirs. Only they can hold it on their accounts and only they can decide who gets to see it and what they get to see.
The Files are IN the Computer
Our unique ability (we call it model driven virtualization) to extract existing objects relationships out of data silos and link objects across these silos allows us to generate a global object and relationship map—which allows you to model infinite context-driven views that reflect how objects are related across your company. In the realm of security and beyond, this map means your teams are no longer flying blind when it comes to identity.
Importance of an Integrated KYC solution for your compliance program kyc-chain
The way many businesses have traditionally implemented KYC is by taking a manual, fragmented approach – essentially implementing various different KYC processes using different tools, methods and resources, including human compliance teams.
The GNAPathon Justin Security
At the recent IETF 113 meeting in Vienna, Austria, we put the GNAP protocol to the test by submitting it as a Hackathon project. Over the course of the weekend, we built out GNAP components and pointed them at each other to see what stuck. Here’s what we learned.
Trusted Timestamping Part 3: Family of Standards Nunnaphat Songmanee Finema
Read more about timestamping and its concepts at Trusted Timestamping Part 1: Scenarios and Trusted Timestamping Part 2: Process and Safeguards.
Family of standards related to timestamping
Thanks for Reading!
Read More \ Subscribe: newsletter.identosphere.net
Support this publication: patreon.com/identosphere
Contact \ Submission: newsletter [at] identosphere [dot] net