Identosphere 88 • MDL vs SSI • American Data Privacy • Design for the Data Economy • Historical Context of SSI
Your weekly dose of upcoming events, company news, blog-posts, community discussions, and the latest in standards, development & regulatory insight.
Welcome to Identosphere’s Weekly
Thanks to our Supporters!
If you haven’t already Contribute on Patreon …or reach out to Kaliya directly
Read previous issues and Subscribe : newsletter.identosphere.net
Content Submissions: newsletter [at] identosphere [dot] net
Velocity Network is hosting a Membership Assembly 7/13-14 in NYC
Member meeting of ESRA the Electronic Signature and Records Association 7/14 Portland OR - has a session on SSI
Decentralized Web Camp 8/24-28 in Northern California (Kaliya’s attending & encouraging SSI folks to participate)
Hyper Ledger Global Forum 9/12-14
Open Source Summit Europe Linux Foundation , Dublin Ireland 9/13-16
Identity Week USA (formerly Connect:ID) Washington DC 10/4-5
Internet Identity Workshop #35 11/14-16, Mountain View California
Whether a beginning learner, or interested in advanced concepts like Game Development, Hardware Prototyping, or Competitive Coding, you will find tools, lessons and mentors
That includes companies that are trying to prevent digital fraud, as well as companies that are engaged in identity verification and decentralized identity projects. However, the list is not exhaustive [...] Allthenticate will be the recipient of its first investment.
As the Herald reports Kate Forbes has announced £45m in funding to “transform Scotland into one of Europe’s leading economies to start or grow a technology business.”
Filecoin Explorer Awards first round of applications is due July 15th and the second round is due August 15th ($1000 - $10,000)
Drummond Reed and Alex Preukschat, co-authors of Manning Publication's new book 'Self-Sovereign Identity,' for a conversation on the book's development and recent release and what the future holds for SSI as a technology, architecture, and movement.
The Evolution of Digital Identity Tomas Hahn
How is it possible that the Internet has spread and developed to such an extent, while the unambiguous digital identification is not yet feasible?
What Does Self-Sovereign Identity Mean For My Business? Continuum Loop
What will happen if I don’t jump on this train?
What would it mean if I didn’t have to own my customer’s digital identity but establish a deep digital relationship with them instead?
Do I have the capacity to learn about this? If not, who do you trust to figure it out – both on the business and technical sides.
What changes when digital identity becomes a revenue driver and asset for your business? (hint: top and bottom line)
Which of my competitors is probably already doing this?
MDL vs SSI
The ISO mDL specification (ISO-compliant Driving License or IDL) is purpose driven, as its name implies, but is said to be specifically intended to:
enable verifiers not affiliated with or associated with the issuing authority to gain access to and authenticate the information
allow the holder of the driving license to decide what information to release to a verifier
include the ability to update information frequently, and to authenticate information at a high level of confidence.
“Decentralised Identity: What’s at Stake?”. ← earlier paper
It is clear that both approaches strive to maintain user control of their personal data, selective disclosure/data minimization, and cryptographic methods to prove the integrity of identity claims. The differences are: first in their reliance (mDL) or independence (SSI) from issuer involvement in verification interactions, and second in their cryptographic approach, mDL relies on externally provided cryptographic tools, SSI builds on holder controlled private keys
what are the challenges and solutions surrounding mobile credentials, what is IAM’s role in this and how systems need to be developed around trust.
for the user interface, data storage, cryptographic protocols, sensitive cryptographic material and eID mean modules. "Requirements and Solution CNECT/LUX/2022/OP/0011"
We are glad to be among the first few along with @ValidatedID @danube @GATACA_ID @walt_id @DXCTechnology @CIMEA_Naric @identyum @ThalesDigiSec @posteitaliane
Self-sovereign identity Internet Policy Review V10I2 Alexandra Giannopoulou
The concept of self-sovereign identity (SSI) describes an identity management system created to operate independently of third-party public or private actors, based on decentralised technological architectures, and designed to prioritise user security, privacy, individual autonomy and self-empowerment.
Seeing Self-Sovereign Identity in Historical Context Kaliya Identity Woman
New paper by Kaliya presented at Identiverse for the first time - in first public review.
Feedback welcome :)
follows the ways in which identities were designed and managed in computer systems. [...] examines the evolution of paper-based identity systems that emerged in Europe. [...] explains why the underlying technological design of SSI aligns with Western liberal democratic values in a way that the earlier digital identity systems designs do not.
Transferable Accounts Putting Passengers at Risk Phil Windley
The non-transferability of verifiable credential is one of their super powers. This post examines how that super power can be used to reduce fraud and increase safety in a hired car platform.
The convergence of multiple rapidly maturing technologies, such as AI, IoT, and blockchain permits any connected entity — whether a person, vehicle, device, package, piece of infrastructure, or data set — to communicate and autonomously participate as an independent economic agent in transactions.
Web5 — The Niche Tech Solves The Niche Problem Umbala Wolves
Web 5 is based on four primary technological pillars in order to realize the goal of building a genuinely decentralized web platform, including:
Decentralized Identifiers (DIDs)
Verifiable credentials (VCs)
Decentralized Web Nodes (DWNs)
Self-Sovereign Identity Service (SSIS)
Now is the key moment to bring the ethos, technology and ambition of web3 to the real world to solve human problems.
Why the SSI community should embrace million dollar apes Animo Solutions
someone opened his door using Ethereum [...] this is hilarious. I can think of ten ways to open your door that are more secure. But I believe there’s more to these stories. These people are coming up with solutions that are in line with most of the core values we in the SSI space have been working on for years.
Why, if we had Chainauth, based on verifiable credentials, did we release Civic Pass, a token protocol very similar to SBTs?
Citopia Self-Sovereign Digital Twins™ (#SSDTs) enable trusted identity & data autonomy in the #Web3 economy
Migrating from Bloom Vault to Affinidi Vault for improved performance
Server-side search by credential Id
Server-side search by credential types
Indicio worked with SITA and the Aruban government to develop a decentralized identity solution for managing Covid testing and vaccination for travelers to the tourism-dependent island.
SC Election results: DIF welcomes new SC members Sam Curren, Daniel Buchner, Karyl Fowler, Rouven Heck, Markus Sabadello & Kaliya Young!
legal safeguards relating to continuity and longevity of purpose need to be built into how they operate.
Children’s right for privacy also in the digital world is guaranteed under the Convention on the Rights of the Child MyData
Last week, the Prime Minister of Finland, Sanna Marin, stated that she will not give consent to the media to take and publish photos of her child. This led to wide discussion and international headlines – even though the right to privacy is guaranteed under the Convention on the Rights of the Child.
Postcard from the UK DIGITAL IDENTITY NEW ZEALAND
In the UK and in Europe more generally there seems to be more awareness of, and a sense of urgency around, the vulnerability of mobile smartphones, given the expectation that they will be the device of choice for most people to download digital identity related wallet apps.
American Data Privacy and Protection Act
The Federal Trade Commission would have to maintain a public registry of data brokers and present a way for users to opt out of targeted advertisements and other data sharing practices.
Consumers could access, correct and delete their own data and companies would have to tell third parties to change user data where users request it.
What is the American Data Privacy and Protection Act? IdentityReview
If a business has had an annual revenue less than “$41 million, did not collect or process the data of more than 100,000 individuals, and did not derive more than 50% of revenue from transferring personal information” in the last three years, they are not considered a covered entity in this bill.