Identosphere 91 • Blockchain ID is Objectively Bad? • Is EUID wallet SSI? • Ultimate Guide to Verifiable Credentials
A weekly digest on self sovereign identity: upcoming events, company news, policy, organizational updates, standards development and more!!!!
Welcome to the Identosphere Weekly Digest!
Thanks to our Supporters!
Contribute on Patreon …or reach out to Kaliya directly
Read previous issues and Subscribe : newsletter.identosphere.net
Content Submissions: newsletter [at] identosphere [dot] net
The Business of Self-Sovereign Identity IIW Special Topic 1/2 day event - August 4th
Digital Identity Across Asia IIW Special Topic 1/2 day event- 8/9 (in US Evening 8/8)
Exploring digital identity for a Decentralized Society — a RadicalxChange Open Space (virtual) unConference - August 16th and 18th - Kaliya & Heidi are helping with this event.
Decentralized Web Camp 8/24-28 in Northern California (Kaliya’s attending & encouraging SSI folks to participate)
Hyper Ledger Global Forum 9/12-14 - Kaliya will be attending.
Open Source Summit Europe Linux Foundation , Dublin Ireland 9/13-16
Identity Week USA (formerly Connect:ID) Washington DC 10/4-5
Internet Identity Workshop #35 11/14-16, Mountain View CA
Happened in June - Presentation Slides Available now.
IPEN invites participants from different areas such as regulators, academia, open source and business development, and other individuals who are committed to finding engineering solutions to privacy challenges. The overall objective is to integrate data protection and privacy into all phases of the development process, from the requirements phase to production, as most appropriate depending on the development model and the application environment.
This ideathon was specially designed as an exciting challenge for the Singapore interns and centered around trusted data. Here are some of the incredible solutions that the five teams came up with.
Ping CEO Andre Durand ‘s opening keynote set the tone by putting decentralized identity front and center. Stating that our current systems do not scale, Andre took us on a journey through the history of Identity solutions from passwords, to single sign-on, to OAuth, to centralized and federated identity.
Identity Week 2022 ReCap Dan Bachenheimer
The conference had three tracks, Security Documents, Biometrics, and Digital ID with the mission to “… to accelerate the move towards a world where trusted identity solutions enable governments and commercial organizations to provide citizens, employees, customers and consumers with a multitude of opportunities to transact in a seamless, yet secure manner. All the while preventing the efforts of those intent on doing harm.”
At EIC, we could learn who are the key enablers and drivers of the evolution: the European Digital Identity (EUDI) program that is transforming Europe’s digital identity, mDL that enables driver’s license digitalisation, EBSI that established a framework for trusted verifiable credentials exchange, OpenID Connect’s work on standardisation of Verifiable Credentials exchange, Global Assured Identity Network (GAIN) authentication and identification with highest assurance levels on a global scale, Open Identity Exchange (OIX) for assurance-level and policy matching and mapping, TrustOverIP (ToIP) for the next-generation trusted internet, and others. Global trust, assurance, interoperability and user-centric identity are vital elements that lead to an open digital identity.
HPEC @HPECid (From the Velocity Foundation Conference)
We’re here with the @VelocityFdn learning about how they are growing their ecosystem that empowers the individuals to own their right to work through #SelfSovereign #DigitalIdentity & #VerifiableCredentials
Identity is the sum of a lot of individual parts that, when pieced together, paint a comprehensive and multi-layered picture of who someone truly is
Zaisan’s my.D platform leverages blockchain technology to provide a comprehensive digital identity management solution
My.D enables a cost-effective and efficient management solution for an individual’s digital credentials
Digital Identity: It’s All About Authenticity video from GLEIF
Through the creation of the verifiable Legal Entity Identifier (vLEI), GLEIF has created a universal system of organizational identity that answers this need. The vLEI enables instant and automated business verification for all legal entities and their official representatives
“There will be no Green Energy Transition without full digitalization. There will be no EU data strategy without data sharing. Data Spaces can answer to both challenges at once, being Energy one of the flagship use cases.” Javier Valiño — Atos
Products & Resources
these are not posts but pages from companies we are tracking
The Open Policy Agent is an open source, general-purpose policy engine that unifies policy enforcement. OPA provides a high-level declarative language called Rego that lets you specify policy as code in order to offload policy decision-making from your business logic.
This is a significant undertaking for both IATA and the other parties involved. As part of MATTR’s role in supporting this initiative, we developed a series of educational videos in partnership with IATA to explain the value and mechanics of a decentralised identity ecosystem.
The Use of Self-Sovereign Identity With Zero-Knowledge Proof (ZKP) Data Driven Investor
Decentralization of Identity Exstalis
What is decentralized identity? CSO Online
Our goal has been to completely abstract away the complexity of the ever-changing landscape so organizations can focus on the important stuff—what product to build, and how to take it to market. Teams shouldn’t have to “pick winners” and wager what to build on. Their products should be interoperable with multiple ecosystems. That’s what Trinsic is providing, out-of-the-box.
Credential metadata: This might be cryptographically signed by the issuer and contains the credential identifier as well as properties about the credential itself such as the expiry date and who the issuer is.
Claim(s): A tamper-proof set of claims made about the credential subject such as someone’s employee number and job title.
Proof(s): Cryptographic method that allows people to verify
Sociocracy is a system of governance that seeks to create psychologically safe environments and productive organizations. It draws on the use of consent, rather than majority voting, in discussion and decision-making by people who have a shared goal or work process.
Trust registries also need to be interoperable. The Trust Over IP Foundation has a specification for an interoperable trust registry, and ours is the first implementation of this spec. Because of this, Trinsic’s Trust Registry Service is architected so that one ecosystem could reference or incorporate a trust registry from a separate ecosystem if needed.
Harrison new Co-Chair of the CCG and CEO of Spokeo explaining SSI Harrison Tang @TheCEODad
Self-sovereign identity, or SSI, is basically an identity owned by you - the user. In self-sovereign identity, you control and manage the access to your information
“Blockchain” in SSI exists for PR only, not for engineering reasons.
Note: I am only going to talk about the “blockchain” part of Self-sovereign Identity. Many things, good and bad, can be said about self-sovereign identity, but in order to keep the scope of this document manageable, I’ll leave the broader SSI-discussion to others.
Identity Cycle book by Iang
Identity Cycle is a book in four parts exploring the nature of identity and how it might or might not fit in a digital world
Oddly, unlike most other innovations, the efforts to build flexible large scale identity systems into the digital domain have more or less flopped. More, in that they did not seem to protect and serve people, and less in that they have done something, even as their original promises were discarded.
Philip Sheldrake’s new ANTI- SSI Paper
I find that many people working on digital identity today understand their undertaking solely in this bureaucratic context, even if they deny it, and they appear to operate therefore under the illusion that this somehow describes and supports our selves, culture, and nature, or at least has the qualities to do so.
Blog Posts with Sezoo for Governments: Building Digital Trust on Open Standards IdentityWoman & Sezoo
Sezoo and IdentityWoman in Business are planning to publish some joint posts that we think will be important to government agencies looking for digital transformation using open standards and decentralised models of trust. Here’s why...
The New Draft Law on eID Switzerland Procivis
The preliminary draft of the federal law declared the purpose of the E-ID to be to ensure "secure identification by means of E-ID among private individuals and with authorities". The protection of the personality and fundamental rights of individuals is to be provided by the following principles defined in the law:
Data protection through technology
Decentralized data storage
Leading the digital trust conversation DI NewZealand
the Digital Identity Services Trust Framework Act has the potential to provide a game-changing regulatory foundation for the identification and authentication components of services delivered through the digital channel.
Lacchain ID Framework IADB (Report)
A Set of Recommendations for Blockchain-Based Interoperable, Privacy-Preserving, Regulatory Compliant, Secure and Standardized Digital Identifiers, Credentials, and Wallets.
this analysis is based on what is currently known or can be assumed.
The SSI principles of existence, access, interoperability, consent, minimalization, and protection will likely be fulfilled by the EU Digital Identity Wallet. It will allow citizens to have an independent existence.
A Decentralised Real Estate Transfer Verification Based on Self-Sovereign Identity and Smart Contracts (we have not read this paper yet)
SSI technology enable methods for acquiring verified credential (VC) that are verifiable on a decentralised blockchain registry to identify both real estate owner(s) and real estate property. Second, the smart contracts are used to negotiate the secure transfer of real estate property deeds on the marketplace.
A Survey on Essential Components of a Self-Sovereign Identity (we have not read this paper yet)
We further distinguish two major approaches, namely the Identifier Registry Model and its extension the Claim Registry Model. [...] We will provide a more coherent view of verifiable claims in regards to blockchain based SSI and clarify differences in the used terminology. Storage solutions for the verifiable claims, both on- and off-chain, are presented with their advantages and disadvantages.
A Self-Sovereign Digital Twin™ (SSDT) is a digital twin which is anchored in a decentralized trust network using W3C’s DIDs)Standard (for MOBI’s community, this is the Integrated Trust Network, or ITN). By using the SSDT and W3C’s VC Standard, the controller of the SSDT can participate as an autonomous economic agent in trusted transactions through issuing VCs and Verifiable Presentations (VPs).
Critique of the SoulBound Token Paper
Souls, Tokens, and Verifiable Credentials Indicio Tech
Even little bits of what might be considered ‘mostly harmless’ private information when correlated can present unexpected privacy problems. What this means is that the only information safely applicable for use in a Soul Bound Token is so impersonal as to be of little practical use.
As this is a complex and often polarising issue, it must be discussed with patience, diligence, and determination. MyData Global has not yet reached a position on the topic. In this piece, we share our considerations and questions, and hope to inspire you to join this important deliberation.
Subscriptification Doc Searls
Let’s start with what happened to TV.
For decades, all TV signals were “over the air,” and free to be watched by anyone with a TV and an antenna.
Our Approach to Resources on-ledger: Using the capabilities of the DID Core specification for standards-compliant resource lookup
Decentralised Identifiers (DIDs): are often stored on ledgers (e.g., cheqd, Hyperledger Indy, distributed storage (e.g., IPFS in Sidetree), or non-ledger distributed systems (e.g., KERI). Yet, DIDs can be stored on traditional centralised-storage endpoints (e.g., did:web, did:git).
An alternative to passwords that includes QR Codes is described, and typical use cases are described. This document also provides an overview and context for using QR Codes for security purposes.
The Most Inventive Thing I've Done Phil Windley
every pico is serverless and cloud-native, presenting an API that can be fully customized by developers. Because they're persistent, picos support databaseless programming with intuitive data isolation. As an actor-model programming system, different picos can operate concurrently without the need for locks, making them a natural choice for easily building decentralized systems.
✨Thanks for Reading!✨
Thanks for reading Sovereign Identity Updates! Subscribe for free to receive new posts and support my work.