Identosphere 84 • Microsoft wants your credentials • Interop Plugfest • INDY:DID delivers Interoperability
Upcoming events, use-cases, high-level reviews, company news and updates in development around verifiable credentials, standardization of decentralized identity frameworks
✨Support Identosphere on Patreon✨← click here
…or reach out to Kaliya directly to get an invoice.
Read previous issues and Subscribe : newsletter.identosphere.net
Contact \ Content Submissions: newsletter [at] identosphere [dot] net
Exclusive IIW and EIC specials went to our Patreon supporters, this weekend. If you become a Patreon supporter now you can access those reports.
ID4Africa Marrakesh 6/15-16 (Kaliya will be there in advance)
Kaliya hosting a meetup in the Netherlands on 6/18 (details TBD) reach out if interested
Identiverse in Denver 6/21-24 (Kaliya is talking there)
Thoughtful Biometrics Workshop - Mid July virtual
Decentralized Web Camp 8/24-28 in Northern California (Kaliya’s attending & encouraging SSI folks to participate)
Internet Identity Workshop #35 11/14-16, Mountain View California
As part of the forthcoming Verified ID service, individuals would be able to get digital credentials issued by Microsoft that prove where they work, what school they graduated from, which bank account they have — and even whether they're in good health according to their doctor.
Decentralized Identity Market Signals Tim Spring Indicio
In this rapid fire review we will take a look at, and break down, the biggest recent stories in digital identity and what they could mean for business and the average person using the internet.
Understanding Verifiable Credentials by Credivera
The value of verifiable credentials and the critical role they will play to our future digital identities is undeniable. As we enter a new era of online representation, trust in the internet will need to be vigorously robust.
In “Self-Sovereign Identity,” Johannes Sedlmeir makes a clear distinction between two concepts too often mixed: “identity” and “identifiers”. What we are experiencing in today’s Web are some external organizations identifying us as citizens, community members, customers, etc. But this isn’t our “identity.” Those are identifiers.
Digital Identities and Verifiable Credentials Johannes Sedlmeir • Reilly Smethurst • Alexander Rieger • Gilbert Fridgen Published October 2021
Myths about SSI Jolocom
The idea that as a user of SSI I have complete sovereignty over my digital identity is often misunderstood. At its core, SSI is about my digital identity being under my own control, so I can decide to whom I show my data, when, and for what.
Getting Data Security Right Alan Michel
data security is about system-wide design, where many different elements need to fit together to create a working whole.
Kim Cameron remembered via his 7 Laws for Identity Biometric Update
Friends of the late computer scientist Kim Cameron took the opportunity of gathering at the KuppingerCole European Identity & Cloud Conference (EIC 2022), to remember Cameron, his life and contribution to digital identity and beyond via his 7 Laws of Identity.
Invest in a public/private partnership to co-develop a self-sovereign identity solution for Europe.
Specifically, the FTC will be more closely monitoring all companies covered by the Children’s Online Privacy Protection Act of 1998 (COPPA), with particular attention to ed tech, to ensure that children have access to educational tools without being subject to surveillance capitalism.
In this letter, we focus on a couple of issues that would be beneficial in expanding the Australian regulatory frameworks to include crypto assets. Furthermore, our comments pertain specifically to fiat-backed stablecoins, which are backed on a 1:1 basis by reserve assets, such as bank deposits and short-term government bonds.
Our Input to the California Privacy Protection Agency (CPPA) Pre-Rulemaking Stakeholder Sessions Me2Ba
We have monitored and involved ourselves in this new agency since its inception, and Lisa LeVasseur (our Executive Director) and Noreen Whysel (Director of Validation Research) shared their expertise on product audits and dark patterns, respectively, in a recent pre-rulemaking CPPA Stakeholder Session (May 5-6).
How Might we Design Consent Experiences for Data Sharing? ToIP HXWG with Dr Arianna Rossi & Xengie Doan of SnT at Luxembourg
the mere fact of building such a verifiable and traceable architecture does not automatically translate into understandable communications, easily applicable instructions and smooth transactions for human beings.
WHAT DO RUSSIAN protesters have in common with Twitter users freaked out about Elon Musk reading their DMs and people worried about the criminalization of abortion? It would serve them all to be protected by a more robust set of design practices from companies developing technologies.
Design From the Margins Centering the most marginalized and impacted in design processes - from ideation to production
Can digital identity help with the world refugee crisis? SecurityBoulevard
The first international agreement on how refugees could handle the issue of missing or incomplete identity documents resulted from the Arrangement of 5 July, 1922, which was a meeting of the League of Nations. Among other things, the conference established a uniform “identity certificate” for Russian refugees, between one and two million of whom had been displaced by various conflicts over the previous decade.
Self-Sovereign Identity as a Service: Architecture in Practice Yepeng Ding, Hiroyuki Sato, University of Tokyo
we present an architecture for constructing and customizing SSI services with a set of architectural patterns and provide corresponding evaluations. Furthermore, we demonstrate the feasibility of our proposed architecture in practice with Selfid, an SSIaaS platform based on our proposed architecture.
The model of self-sovereign identity offers tempting benefits as educational systems become increasingly global and as learning spans a lifetime.
Educate + Engage = Activate! Laura Hilliger
Who is the Desired Audience (Early Adopter) for SSI?
Decentralized Identity: Keys to Mainstream Adoption Trust Over IP
When it comes to decentralized identity solutions, many business sponsors do not yet understand how DCI can provide practical answers to immediate frontline business problems. This climate creates the impression that decentralized identity is interesting but not ready for prime time adoption.
Semantic Overlay Architecture Own Your Data
We have documented the functionality of SOyA in a W3C-conforming Specifiation and the full source code is available under the MIT License on Github. Examples and an introduction how to use SOyA is available in a dedicated Tutorial
An Introduction to Verifiable Credentials VerifiableCredential.io
Interoperability Plugfest #1 JFF & VC-EDU
The Cardea Community at Linux Foundation Public Health is pleased to announce the third Interop-a-thon on June 16, between 8:00am and 12:00pm MST (UTC-7:00). Anyone building a Hyperledger Aries compatible product or system can sign up here.
the Indy DID Method is not an optional upgrade. It’s a major development that delivers interoperability.
open standards are a key enabler for the development and scaling of new digital identity services around the globe – Mung Ki Woo, VP Trust Services, Ledger
Introducing Verite Justin Hunter of Pinata
Currently available in TypeScript and published through NPM, the Verite library seeks to make it easier to implement VCs in a variety of forms. The library is early and an additional goal of the library is to collect community feedback.
The Me2B Alliance is now Internet Safety Labs Internet Safety Labs
We are excited to announce the Me2B Alliance is now Internet Safety Labs. We’ve changed our name but not our core mission.
FlexID is giving users a blockchain wallet that stores their verificable credentials. Verification is done on-chain through Algorand, which bills itself as a solution to the blockchain trilemma of security, scalability and decentralization. FlexID will also be integrating with other Algorand decentralized apps (dApps).
Avast’s Charlie Walton wants you to BYOID Biometric Update
What was a European security company doing buying a U.S.-based decentralized digital identity technology company? Could Avast bring the dream of decentralized identity to the masses?
low-code/no-code orchestration services, what to consider when making long-term complex identity decisions, and what the US is doing to protect Americans from sophisticated cyber threats after the White House issued Executive Order 14028 on Improving the Nation’s Cybersecurity.
Sign-In with Ethereum opens a path where large corporations can no longer strip a user's ability to access services or spy on their actions. It opens the door for a massive amount of impact in web2 apps and services
we've harmonized the behavior of our SIWE Core APIs across different languages, added a number of optimizations, and have released a new beta of our TypeScript library with the included changes.
Building a better internet won't happen by chance or simply maximizing freedom. We have to build systems that support justice. How can we do that?
Humans are tribal, we want to belong and integrate ourselves in like-minded communities that are focused on the things we are passionate about. And, just as we have since the dawn of humanity, we submit to our innate urges to form tribes, develop communication standards and protect one another.
How Web3 apps are building composable trust Ceramic Network
Explore the unique paradigms behind Web3 reputation, prominent use cases, and example architectures to incorporate credentials into your application.
SSI is on the list of investment interests
SpruceID is mentioned