Discover more from Sovereign Identity Updates
Identosphere 97 • IAPP publishes SSI White Paper • New INATBA Report • Rise of Digital Twins w LFPH
Weekly edition of the latest Self Sovereign Identity related news, development, upcoming events, and thoughtful commentary from the blog-o-sphere
Welcome to Identosphere Weekly Digest!
Thanks to our Supporters!
Contribute on Patreon …or reach out to Kaliya directly
Read previous issues and Subscribe : newsletter.identosphere.net
Content Submissions: newsletter [at] identosphere [dot] net
The Next Era of Trust and Data Exchange 9/1-2 Martin Donevski, Tim Schlagenhaufer (DIF member Bosch discusses their SSI implementation)
Hyperledger Global Forum 9/12-14 - Open Source Summit Europe Linux Foundation, Dublin Ireland 9/13-16 - Trust Over IP Summit (co-located with Linux Foundation’s Open Source Summit Europe) Dublin, Ireland 9/14
Identity Week USA (formerly Connect:ID) Washington DC 10/4-5
Infrachain Summit 10/4 - The Summit is about real business – not the next hype. The event is centered on operational use cases in the world of 3rd party distributed trust.
Internet Identity Workshop #35 11/14-16, Mountain View CA
Even though some questions are still unanswered, self-sovereign identities will unlock enormous economic value. If you want to get some initial experience with SSI you can try the available open-source technologies. A successful proof of concept will enable companies to see the possibilities of the new technology and harness this potential more effectively.
The response has been overwhelming: over the past 15 days, 12,000+ Masa SBTs have been minted on testnet. The community resonated with our thesis: web3 needs an identity protocol.
But the first thing you should know about the metaverse, even as it’s still emerging and being defined, is that the time to act is now. The metaverse is expected to contribute USD 3 trillion to global GDP by 2013 and customers will expect immersive and interactive activities and apps from your brand
DAOs: Why Sovereign Accountable Commons Might Be Better: Fundamentals for Stronger Communities Holochain
We designed Sovereign Accountable Commons (SACs) in order to embed mutual accountability in apps and organizations without needing blockchains to secure the integrity of the space. Because all Holochain apps inherently hold the code underlying SACs, any platform built on Holochain has the ability to follow the principles which we lay out in this article.
New White Papers & Reports
Self-sovereign identity as future privacy by design solution in digital identity? International Association of Privacy Professionals (White Paper)
With ongoing research in the field and growing awareness of the potential for privacy protection of SSI solutions, the concepts of privacy by default and privacy by design are increasingly adopted for new architectures using distributed ledger technology. It will, however, need the private sector to follow a SSI market roadmap, and to implement and use the opportunities of SSI to complete this (r)evolution of digital identity
The objective of this workstream was to examine the technology and policy landscapes for digital credentials of INATBA-Governmental Advisory Body (GAB) members, identify the commonalities and gaps, and then develop recommendations for enabling interoperability and mutual support for digital credentials across borders.
Distributed Attestation Revocation in Self-Sovereign Identity Rowdy Chotkan, Jérémie Decouchant, Johan Pouwelse
the first fully distributed SSI revocation mechanism that does not rely on specialised trusted nodes. Our novel gossip-based propagation algorithm disseminates revocations throughout the network and provides nodes with a proof of revocation that enables offline verification of revocations. We demonstrate through simulations that our protocol adequately scales to national levels.
Frontiers Research Topic Establishing Self Sovereign Identity with Blockchain
Editorial: Establishing Self Sovereign Identity with Blockchain Frontiers Alan Sherriff, Kaliya Young, Michael Shea 19 Aug 2022
3 Stages of a Pan-African Identity Framework for Establishing Self-Sovereign Identity With Blockchain S. Solomon Darnell, Joseph Sevilla 11 Nov 2021
Decentralized, Self-Sovereign, Consortium: The Future of Digital Identity in Canada Andre Boysen 29 Apr 2021
Sovrin: An Identity Metasystem for Self-Sovereign Identity Phillip J. Windley 28 Jul 2021
Blockchain, Self-Sovereign Identity and Digital Credentials: Promise Versus Praxis in Education Alex GrechIra Sood, Lluís Ariño 30 Mar 2021
Exploring Value Propositions to Drive Self-Sovereign Identity Adoption Mick Lockwood 04 Mar 2021
An Accessible Interface Layer for Self-Sovereign Identity Mick Lockwood 02 Mar 2021
Development of a Mobile, Self-Sovereign Identity Approach for Facility Birth Registration in Kenya Maria FreytsisIain, Barclay Swapna, Krishnakumar Radha, Adam Czajka, Geoffery H., SiwoIan Taylor, Sherri Bucher 15 Feb 2021
Distributed Ledger Technologies, Value Accounting, and the Self Sovereign Identity Sarah Manski 23 Jun 2020 2 citations
Fun fact Riley Hughes
The 'indy' name was originally short for "independent identity" which was a naming candidate before "self-sovereign" was settled on
Harrison Tang on a roll with these short videos.
#selfsovereignidentity, or #SSI, is the ultimate form of #decentralizedidentity because the power and control lie in tens of billions of person entities like you and me, not just hundreds of thousands of computer network nodes TheCEODad
Literally doing ID management for bullets! Wow.
we sit down with Cristian Talle of Bullet ID to discuss the interesting technology they have created to improve the current systems for tracking bullets.
about the brand new GlobaliD website and how it contextualizes our role in the world of digital identity while allowing us to tell our story more effectively.
how new identity-based technology can help people, governments and companies develop greater digital trust in a modern society.
Everyone will have an ID wallet GlobalID
how ID wallets work within the digital identity ecosystem, briefly explains the trust triangle, and previews the GlobaliD Wallet which will be released later this year
LFPH tackles the next frontier in Open Source Health Technology: The rise of Digital Twins Linux Foundation Public Health
To create a pairing between the digital world and the real world, a digital twin leverages real time data, such as smart sensor technology, coupled with analytics, and often artificial intelligence (AI) in order to detect and prevent system failures, improve system performance, and explore innovative uses or functional models.
Digital Twin Consortium drives the awareness, adoption, interoperability, and development of digital twin technology. Through a collaborative partnership with industry, academia, and government expertise, the Consortium is dedicated to the overall development of digital twins. We accelerate the market by propelling innovation and guiding outcomes for technology end-users.
O -> Open Standards
R -> Revocable by individuals
G -> Granular
A -> Auditable
N -> Notice to all parties involved
S -> Secure
TreeLDR is an open-source developer tool with a DSL that makes managing data schemas as easy as defining data structures in your favorite (sane) statically-typed language.
Our open banking platform is guided by our data responsibility principles. Mastercard
Built on Open Standards
As our approach evolves, we also remain keen to support open source solutions that interoperate with other national and international efforts. There is no dominant design yet, no one network or technology, so we must remain nimble and flexible in our exploration. We also need to coexist with existing identity solutions that millions of British Columbians already rely upon.
Managing Trust and Reputation via Trust Registries Continuum Loop
The concept behind a Trust Registry is that a Wallet needs to know which decentralized identifiers (DIDs) to “trust” as a source of truth. At many levels, this “trust” translates to “authority” – knowing that somebody, centralized or decentralized, is responsible for maintaining a list of trusted DIDs.
Keys can be given different capabilities using Verification Relationships
We support 4 Verification Relationships: Authentication, Assertion, Key Agreement, and Capability Invocation.
DIDs can now be controlled by other DIDs
DIDs can now have service endpoints
Dock now supports off-chain DID Documents
ONDC: An Open Network for Ecommerce Phil Windley
Open Network for Digital Commerce is a non-profit established by the Indian government to develop open ecommerce. The goal is to end platform monopolies in ecommerce using an open protocol called Beckn. I'd never heard of Beckn before. From the reaction on the VRM mailing list, not many there had either.
Identity not SSI
Daon-Neustar Partnership Combines Voice Authentication With Phone Number Verification Find Biometrics
By incorporating Neustar’s ANI validation and matching technology into our IdentityX contact center solution, we are better able to protect our customers from the onslaught of fraudsters,” explained Daon President Ralph Rodriguez.