Identosphere 90 • Verifiable Credentials went mainstream at Identiverse • DIDComm V2 Ratified • Digital Wallets and Migration Policy
Your weekly digest of upcoming events, company news, organization updates, open standards development and the latest headlines in self sovereign identity.
Welcome to Identosphere’s Weekly and Thanks to our Supporters!
We just sent out a Patrons only review of Identiverse check your e-mail
Contribute on Patreon …or reach out to Kaliya directly
Read previous issues and Subscribe : newsletter.identosphere.net
Content Submissions: newsletter [at] identosphere [dot] net
The Business of Self-Sovereign Identity IIW Special Topic 1/2 day event - August 4th
Digital Identity Across Asia IIW Special Topic 1/2 day event- 8/9 (in US Evening 8/8)
Exploring digital identity for a Decentralized Society — a RadicalxChange Open Space (virtual) unConference - Save the Date August 16th and 18th.
Decentralized Web Camp 8/24-28 in Northern California (Kaliya’s attending & encouraging SSI folks to participate)
Hyper Ledger Global Forum 9/12-14 - Kaliya will be attending.
Open Source Summit Europe Linux Foundation , Dublin Ireland 9/13-16
Identity Week USA (formerly Connect:ID) Washington DC 10/4-5
Internet Identity Workshop #35 11/14-16, Mountain View CA
For over 30 years, Consult Hyperion have been dedicated to providing advisory and technical consulting services and have grown to be globally recognised as thought leaders and experts in the areas of Digital Identity, Payments and Smart Ticketing.
Blockchain Developer (f/d/m) Litentry
Implement the pallets based on Substrate
Contribute to the WASM smart contract development
Write the technical documentation
Fix the bugs in our testnet and mainnet
Research the latest secure computing technologies, such as SGX
Harrison Tang, CEO of Spokeo, is the new co-chair of the CCG
W3C CCG (World Wide Web Consortium’s Credentials Community Group) aims to explore the creation, storage, presentation, verification, and user control of credentials (i.e. a set of claims made about someone, or a person record).
DIDComm Messaging enables higher-order protocols that inherit its security, privacy, decentralization, and transport independence. Examples include exchanging verifiable credentials, creating and maintaining relationships, buying and selling, scheduling events, negotiating contracts, voting, presenting tickets for travel, applying to employers or schools or banks, arranging healthcare, and playing games.
OpenID Specs Up for Review
This specification defines event types and their contents based on the SSE Framework that are required to implement Risk Incident Sharing and Coordination.
Unless issues are identified during the review that the working group believes must be addressed by revising the drafts, this review period will be followed by a seven-day voting period during which OpenID Foundation members will vote on whether to approve these drafts as OpenID Final Specifications.
Using a Theory of Justice to Build a Better Web3 Phil Windley
Summary: Building a better internet won't happen by chance or simply maximizing freedom. We have to build systems that support justice. How can we do that? Philosophy discussions are the black hole of identity. Once you get in, you can't get out. Nevertheless, I find that I'm drawn to them
Verifiable Credentials go mainstream at Identiverse 2022 Biometric Update
Verifiable Credentials was a breakthrough topic and it’s clearly on the path to mainstream adoption. Main sessions by Microsoft and Avast showcased their application of VCs in the IAM landscape, showing VCs aren’t the future anymore–they are the present.
did you know that there are three ways in which you can utilize VCs and DIDs to enable delegation [...] look to the ZCAP-LD data model which is designed especially for these concepts. And if you’re still confused and would like some help please reach out and I can see how I can help.
VCs need Threat Modeling
Another pre-read recommendation for @identiverse: the @openid for Verifiable Credentials Whitepaper. It is a great high level explanation of decentralized benefits and use cases, both @kristinayasuda & @tlodderstedt contributed! OpenID for Verifiable Credentials
It also seems to lack any sections about threat modelling and possible risks, making it hard to trust since risks are not directly and clearly addressed.
I agree. We thread model while we are designing the protocol, we also need to add it to the spec. Please note: we build on existing work. There is an extensive thread model for OAuth and countermeasures that we built on (datatracker.ietf.org/doc/html/draft-ietf-oauth-security-topics). Feel free to contribute.
Web 3 - Vinay is on a roll…
Winter Has Come Humanizing the Singularity
crypto wins by solving problems that nobody else can solve, profitably. It has to win at three levels to survive:
Ordinary people have to use it
It has to generate actual value, not just move value around
Governments have to tolerate it or use it themselves — either one will do
Build Back Better! Humanizing the Singularity
VR is not ready for artistic reasons, far more than for technical ones.
So my prediction is this: the Metaverse is going to fail.
The stay-at-home culture which VR is fundamentally rooted in doesn’t provide the lived experiences which people want.
Definitions of “DAO” (short for Decentralized Autonomous Organization) usually start with technology, specifically blockchain. But I think that actually misses much of what’s exciting about DAOs, a bit like if you were to explain why your smartphone is great by talking about semiconductor circuits. Let’s try to define DAO without starting with blockchain.
Will we have to agree on what counts as a “real” identity under the covers? Will there always be biological or “legal” identities behind every metaverse entity? What happens when metaverse entities create completely synthetic digital children? Will there be levels of identity that bottom out somewhere?
covers our work with DIF, Trust over IP, and attending Consensus 2022.
The common law system countries (AU, CA, NZ, UK & US) left the market to work out identity, and the market “decided” that there’s no need for IdPs. Let us respect that decision. The market has been trying to tell us for over a decade: IDENTITY IS NOT FOR SALE!
Kim Cameron Award Winner Reflects on EIC Rachelle Sellung
In a matter of a few days, I heard many inspiring presentations, had many interesting conversations, and met many wonderful people in this field at the Conference. It has already led to multiple conversations of working together regarding future stakeholder research that will hopefully be useful and support the identity community.
Actually Doing It Humanizing the Singularity
We restore trust by making the system transparent: visibility into our counterparties’ supply chains enables us to make a better guess about whether or not they’re going to be able to deliver. This kind of trust problem on trading and delivery is breaking out all over the place, in previously-unprecedented ways.
Decentralized Systems Don't Care Phil Windley
I like to remind my students that decentralized systems don't care what they (or anyone else thinks). The paradox is that they care very much what everyone thinks. We call that coherence and it's what makes decentralized systems maddeningly frustrating to understand, architect, and maintain.
We're currently working on a new, ergonomic way to use Sign-In with Ethereum and session management for applications, and are currently in the process of setting up beta testing. If you're interested in trying this out, please get in touch.
Entrepreneurship, Innovation & Leadership with Andre Durand Nonconformist Innovation
Andre talks about what motivated him to start a company, how his best ideas came about, his thoughts about building teams, questions he asks of new hires, the legacy he hopes will endure, and how he fights entropy. Steve also asks Andre about his favorite music and the next concert he is planning to attend.
Identiproof demonstrates early commitment to Open Badges V3 Crossworld Cybersecurity
It does this through selective disclosure, whereby the recipient requests the minimum of information in conformance with GDPR. Identiproof is one of the first systems built to the 2019 W3C recommendations: The Verifiable Credentials Data Model and Web Authentication (FIDO2) - two new global web security standards.
The European Commission and the European Blockchain Partnership are laying the foundations to implement it in the different EU member states, both in the public and private sectors, launching the European Blockchain Services Infrastructure (EBSI) network, with the aim of 'leveraging blockchain to accelerate the creation of cross-border services for public administrations and their ecosystems
00:00 The Early Adopters programmme and the Multi-University pilot
11:01 Demo 1: A student gets a diploma with a list of course units validated from Erasmus
42:22 Demo 2: A student applies for a PhD with a Bachelor/Master degree from a foreign country
01:04:16 Demo 3: A student gets access to local discounts using municipality credential based on a European student card
I see what we’re doing in self-sovereign identity as further reducing the costs of business/transactions. And this incremental value value is achieved by reducing trust costs across silos.
A Digital Staff Passport for hospital facilities, DIZME voted best solution at SHACK22 hackathon Infocert
The hackathon held by INTEROPen, a leading organization to support & accelerate the delivery and adoption of Interoperability Standards in health & social, in partnership with NHS (National Health System) was aimed at developing innovative solutions for the management of access and safe mobility of staff in hospital facilities.
The evident solution is to imbue connected entities with unique, tamper-evident, self-sovereign, Decentralized Identifiers (DIDs), developed by the W3C, anchored in a decentralized trust network. For MOBI’s community, this is the Integrated Trust Network, or ITN.
In cross-border and migration contexts, digital wallets promise to have wide ranging implications for global governance, especially in identity management and finance. In this brief Margie Cheesman outlines use cases as well as concerns and risks when it comes to their adoption in the migration sector.
The Self-Sovereign Identity (SSI) Basics Santanderigo
The very center of the digital identity is your documents: from your National ID or Passport to your degrees, mobile phone number, bank account number, or your medical records. Anything that is intrinsically bound to you is your data and therefore your identity. While talking about SSI these are called Verifiable Credentials (VC).
The DID model allows you to establish a relationship between your private key (your blockchain wallet) and your citizenship. The issuing authority signs off on the truth of your claim and, thereafter, third parties can check your public key to see that the holder of the private key is in fact a British citizen.
● What is identity?
● The different ways Trinsic can be used by developers.
● Ways to disrupt or democratize the current model of identity.
● Decentralized identity and its many use cases.
● The continued need for anonymity in a digital identity world.
● How identity will evolve with web 3 and the metaverse.