Identosphere 90 • Verifiable Credentials went mainstream at Identiverse • DIDComm V2 Ratified • Digital Wallets and Migration Policy
Your weekly digest of upcoming events, company news, organization updates, open standards development and the latest headlines in self sovereign identity.
Welcome to Identosphere’s Weekly and Thanks to our Supporters!
We just sent out a Patrons only review of Identiverse check your e-mail
Contribute on Patreon …or reach out to Kaliya directly
Read previous issues and Subscribe : newsletter.identosphere.net
Content Submissions: newsletter [at] identosphere [dot] net
Upcoming
National digital trust summit will help NZ 7/27 (Registration)
The Business of Self-Sovereign Identity IIW Special Topic 1/2 day event - August 4th
Digital Identity Across Asia IIW Special Topic 1/2 day event- 8/9 (in US Evening 8/8)
Exploring digital identity for a Decentralized Society — a RadicalxChange Open Space (virtual) unConference - Save the Date August 16th and 18th.
Decentralized Web Camp 8/24-28 in Northern California (Kaliya’s attending & encouraging SSI folks to participate)
Hyper Ledger Global Forum 9/12-14 - Kaliya will be attending.
Open Source Summit Europe Linux Foundation , Dublin Ireland 9/13-16
Identity Week USA (formerly Connect:ID) Washington DC 10/4-5
Internet Identity Workshop #35 11/14-16, Mountain View CA
Engineer your world this summer: K-University student + teacher opportunities KidOYO
Hiring
Join us – Consult Hyperion
For over 30 years, Consult Hyperion have been dedicated to providing advisory and technical consulting services and have grown to be globally recognised as thought leaders and experts in the areas of Digital Identity, Payments and Smart Ticketing.
Blockchain Developer (f/d/m) Litentry
Implement the pallets based on Substrate
Contribute to the WASM smart contract development
Write the technical documentation
Fix the bugs in our testnet and mainnet
Research the latest secure computing technologies, such as SGX
Open Standards
Harrison Tang, CEO of Spokeo, is the new co-chair of the CCG
W3C CCG (World Wide Web Consortium’s Credentials Community Group) aims to explore the creation, storage, presentation, verification, and user control of credentials (i.e. a set of claims made about someone, or a person record).
Steering Committee approved the DIDComm Messaging Spec (DIDComm v2) @IndicioID
DIDComm Messaging
DIDComm Messaging enables higher-order protocols that inherit its security, privacy, decentralization, and transport independence. Examples include exchanging verifiable credentials, creating and maintaining relationships, buying and selling, scheduling events, negotiating contracts, voting, presenting tickets for travel, applying to employers or schools or banks, arranging healthcare, and playing games.
Open Source
Introducing Hyperledger Aries Framework JavaScript 0.2.0 Hyperledger
The new Hyperledger Aries Framework JavaScript release (0.2.0) contains some incredible steps forward. Especially in our goal to make the framework AIP 2.0 compliant. AIP 2.0 compliance will not only ensure the framework supports the latest standards and protocols, but it will also greatly increase interoperability and make it more useful outside of the Hyperledger Indy ecosystem.
OpenID Specs Up for Review
Public Review Period for Second Proposed RISC Profile Implementer’s Draft
This specification defines event types and their contents based on the SSE Framework that are required to implement Risk Incident Sharing and Coordination.
Public Review Period for Proposed Final OpenID Connect Logout
Unless issues are identified during the review that the working group believes must be addressed by revising the drafts, this review period will be followed by a seven-day voting period during which OpenID Foundation members will vote on whether to approve these drafts as OpenID Final Specifications.
Using a Theory of Justice to Build a Better Web3 Phil Windley
Summary: Building a better internet won't happen by chance or simply maximizing freedom. We have to build systems that support justice. How can we do that? Philosophy discussions are the black hole of identity. Once you get in, you can't get out. Nevertheless, I find that I'm drawn to them
Verifiable Credentials
Verifiable Credentials go mainstream at Identiverse 2022 Biometric Update
Verifiable Credentials was a breakthrough topic and it’s clearly on the path to mainstream adoption. Main sessions by Microsoft and Avast showcased their application of VCs in the IAM landscape, showing VCs aren’t the future anymore–they are the present.
Common Delegation Patterns in the Verifiable Credential Ecosystem Kyle Den Hartog
did you know that there are three ways in which you can utilize VCs and DIDs to enable delegation [...] look to the ZCAP-LD data model which is designed especially for these concepts. And if you’re still confused and would like some help please reach out and I can see how I can help.
VCs need Threat Modeling
Thread started by Pamela Dingle
Another pre-read recommendation for @identiverse: the @openid for Verifiable Credentials Whitepaper. It is a great high level explanation of decentralized benefits and use cases, both @kristinayasuda & @tlodderstedt contributed! OpenID for Verifiable Credentials
Firstyear Replying to @Erstejahre @pamelarosiedee and 4 others
It also seems to lack any sections about threat modelling and possible risks, making it hard to trust since risks are not directly and clearly addressed.
Torsten Lodderstedt Replying to @Erstejahre @pamelarosiedee and 3 others
I agree. We thread model while we are designing the protocol, we also need to add it to the spec. Please note: we build on existing work. There is an extensive thread model for OAuth and countermeasures that we built on (datatracker.ietf.org/doc/html/draft-ietf-oauth-security-topics). Feel free to contribute.
Web 3 - Vinay is on a roll…
Winter Has Come Humanizing the Singularity
crypto wins by solving problems that nobody else can solve, profitably. It has to win at three levels to survive:
Ordinary people have to use it
It has to generate actual value, not just move value around
Governments have to tolerate it or use it themselves — either one will do
Build Back Better! Humanizing the Singularity
VR is not ready for artistic reasons, far more than for technical ones.
So my prediction is this: the Metaverse is going to fail.
The stay-at-home culture which VR is fundamentally rooted in doesn’t provide the lived experiences which people want.
What is a DAO? A non-technical definition Reb00ted
Definitions of “DAO” (short for Decentralized Autonomous Organization) usually start with technology, specifically blockchain. But I think that actually misses much of what’s exciting about DAOs, a bit like if you were to explain why your smartphone is great by talking about semiconductor circuits. Let’s try to define DAO without starting with blockchain.
In a totally synthetic metaverse, what does “authentic” even mean?
Will we have to agree on what counts as a “real” identity under the covers? Will there always be biological or “legal” identities behind every metaverse entity? What happens when metaverse entities create completely synthetic digital children? Will there be levels of identity that bottom out somewhere?
Ecosystem
RootsID SSI Report - E1
covers our work with DIF, Trust over IP, and attending Consensus 2022.
What will we learn from the Market Failure of Digital Identity? Stephen Wilson
Identiverse follow-up
The common law system countries (AU, CA, NZ, UK & US) left the market to work out identity, and the market “decided” that there’s no need for IdPs. Let us respect that decision. The market has been trying to tell us for over a decade: IDENTITY IS NOT FOR SALE!
Kim Cameron Award Winner Reflects on EIC Rachelle Sellung
In a matter of a few days, I heard many inspiring presentations, had many interesting conversations, and met many wonderful people in this field at the Conference. It has already led to multiple conversations of working together regarding future stakeholder research that will hopefully be useful and support the identity community.
Thoughtful
Actually Doing It Humanizing the Singularity
We restore trust by making the system transparent: visibility into our counterparties’ supply chains enables us to make a better guess about whether or not they’re going to be able to deliver. This kind of trust problem on trading and delivery is breaking out all over the place, in previously-unprecedented ways.
Decentralized Systems Don't Care Phil Windley
I like to remind my students that decentralized systems don't care what they (or anyone else thinks). The paradox is that they care very much what everyone thinks. We call that coherence and it's what makes decentralized systems maddeningly frustrating to understand, architect, and maintain.
Company Stories
Spruce Developer Update #21
We're currently working on a new, ergonomic way to use Sign-In with Ethereum and session management for applications, and are currently in the process of setting up beta testing. If you're interested in trying this out, please get in touch.
Entrepreneurship, Innovation & Leadership with Andre Durand Nonconformist Innovation
Andre talks about what motivated him to start a company, how his best ideas came about, his thoughts about building teams, questions he asks of new hires, the legacy he hopes will endure, and how he fights entropy. Steve also asks Andre about his favorite music and the next concert he is planning to attend.
Interop
JFF PlugFest
Identiproof demonstrates early commitment to Open Badges V3 Crossworld Cybersecurity
It does this through selective disclosure, whereby the recipient requests the minimum of information in conformance with GDPR. Identiproof is one of the first systems built to the 2019 W3C recommendations: The Verifiable Credentials Data Model and Web Authentication (FIDO2) - two new global web security standards.
EU-Interop
EBSI European Blockchain Demo Day 31 May 2022
The European Commission and the European Blockchain Partnership are laying the foundations to implement it in the different EU member states, both in the public and private sectors, launching the European Blockchain Services Infrastructure (EBSI) network, with the aim of 'leveraging blockchain to accelerate the creation of cross-border services for public administrations and their ecosystems
EBSI Demo Day May 31, 2022 - The Multi University Pilot and Demos 1 - 2 - 3
00:00 The Early Adopters programmme and the Multi-University pilot
11:01 Demo 1: A student gets a diploma with a list of course units validated from Erasmus
42:22 Demo 2: A student applies for a PhD with a Bachelor/Master degree from a foreign country
01:04:16 Demo 3: A student gets access to local discounts using municipality credential based on a European student card
Use Cases
GLEIF – Standardizing Legal Entity Verification (with Karla McKenna) Northern Block
I see what we’re doing in self-sovereign identity as further reducing the costs of business/transactions. And this incremental value value is achieved by reducing trust costs across silos.
A Digital Staff Passport for hospital facilities, DIZME voted best solution at SHACK22 hackathon Infocert
The hackathon held by INTEROPen, a leading organization to support & accelerate the delivery and adoption of Interoperability Standards in health & social, in partnership with NHS (National Health System) was aimed at developing innovative solutions for the management of access and safe mobility of staff in hospital facilities.
Why is Trusted Identity Important in IoT Commerce?
The evident solution is to imbue connected entities with unique, tamper-evident, self-sovereign, Decentralized Identifiers (DIDs), developed by the W3C, anchored in a decentralized trust network. For MOBI’s community, this is the Integrated Trust Network, or ITN.
Wallets Report
Digital Wallets and Migration Policy: A Critical Intersection (Download)
In cross-border and migration contexts, digital wallets promise to have wide ranging implications for global governance, especially in identity management and finance. In this brief Margie Cheesman outlines use cases as well as concerns and risks when it comes to their adoption in the migration sector.
Explainers
The Self-Sovereign Identity (SSI) Basics Santanderigo
The very center of the digital identity is your documents: from your National ID or Passport to your degrees, mobile phone number, bank account number, or your medical records. Anything that is intrinsically bound to you is your data and therefore your identity. While talking about SSI these are called Verifiable Credentials (VC).
What is decentralized identity? In CSO
The DID model allows you to establish a relationship between your private key (your blockchain wallet) and your citizenship. The issuing authority signs off on the truth of your claim and, thereafter, third parties can check your public key to see that the holder of the private key is in fact a British citizen.
How Self-Sovereign Identity Works with Trinsic's Riley Hughes Georgian
● What is identity?
● The different ways Trinsic can be used by developers.
● Ways to disrupt or democratize the current model of identity.
● Decentralized identity and its many use cases.
● The continued need for anonymity in a digital identity world.
● How identity will evolve with web 3 and the metaverse.
Thanks for Reading!
Read more \ Subscribe: newsletter.identosphere.net
Support this publication: patreon.com/identosphere
Contact \ Submission: newsletter [at] identosphere [dot] net