Summary 119: Attacking SSI • Global Supply Chain with Knowledge Graphs • JOSE WG Reanimated
Who's Hiring? Whos Funding? What Who's Who thinks about What and Why! Upcoming events, Recordings from previous events! 2 years going strong, the original SSI newsletter. Support us on Patreon!!!
Welcome to Identosphere • We Gather, You Read
Be sure your blog has an rss feed so we can better track and feature your content! Send us a message at email@example.com if you have an RSS feed you want us to track for this digest.
GS1 Global Forum 2/13-16
Heroes of Data Privacy – the practise-oriented data privacy conference in Vienna LionsGate 5/24 Vienna, Austria
DID:Day 3/1 around ETHDenver
APAC Digital Identity unConference 3/1-3 Bangkok, Thailand
Internet Identity Workshop 4/18-20, Mountain View, CA
MyData Awards 2023 call is now open to recognise and celebrate human-centric services that put the individual at the centre of digital solutions.
Learn how to bring a responsible data approach to your work with our cohort-learning programme Engine Room
Decentralized Identity Attack Surface – Part 2 Shaked Reiner
Infominer thinks its incredible this is our first article detailing the attack surface of ssi. Been wishing for something like this.. Need more!
This is the second part of our Decentralized Identity (DID) blog series. In case you’re not familiar with DID concepts, we highly encourage you to start with the first part. This time we will cover a different DID implementation — Sovrin. We will also see what a critical (CVSS 10) DID vulnerability looks like by reviewing the one we found in this popular implementation.
Key Takeaways From CIAM Survey Ping Identity
Ping Identity strives to understand the challenges consumers face and the expectations they have for the brands they interact with. The Ping Identity CIAM Survey titled “The Balancing Act: Earning Trust Through Convenience and Security” has given us a lot of information about consumers’ relationship with their identity
This article was based on Transmute Solutions Architect Nis Jespersen’s ‘UN/CEFACT Linked Data’ presentation from December 2022. Leading the UN Web Vocabulary project, I presented at the December 2022 UN/CEFACT Forum.
When E-Commerce and In-Store Collide: What You Need to Know to Stay Relevant Next Level Supply Chain Podcast with GS1
Your customers want more information – and that could include your product catalog. Join us as we chat with Mike Massey, CEO at Locally, a business that gives access to real-time inventory to nearby shoppers using e-commerce tactics
Trusted and extensible product master data hub based on the OriginTrail Decentralized Knowledge Graph Origin Trail
Trusted and extensible product master data hub based on the OriginTrail Decentralized Knowledge Graph and GS1 standards Product master data — the foundation for supply chain visibility
[youtube] Building on EBSI [live event]
Mobile Driving Licence (mDL): Exploring ISO 18013-5&7 Andrew Hughes, Northern Block
“No, I don’t trust you” - Implementing Zero-Trust Architecture in the world of Self-Sovereign Identity (SSI) Trust Over IP
how the public sector should consider SSI, we examine the efforts of the US federal government to adopt zero trust architecture (ZTA) and its implications for using decentralized identity. As stated in federal guidance, “The foundational tenet of the Zero Trust Model is that no actor, system, network, or service operating outside or within the security perimeter is trusted.
The Basics of DIDs ep.1 VESSI Labs and Kouki Minamoto
Gear Up for the Future with Decentralized Identity KuppingerCole, by Warwick Ashford
Going Passwordless – Separating Identity and Authentication Kuppinger Cole, by Alejandro Leal
Google and Facebook: Steam Engines of the Information Age MyDEX - Steam had its day. Then the world moved on.
What has data got to do with net zero? MyDEX - At first glance it may not seem that data, especially personal data, has much to do with climate change.
Future State: Digital Credentials for Healthcare Spruce - Digital credentials and self-sovereign identity have the potential to revolutionize the healthcare industry by providing a more secure and efficient way to store and share important health information.
In God We Trust: Everything Else, we VERIFY #3TB - Are these cases for better crime detection? Or just the correct use cases for verifiable credentials?
A Digital Identity Stack to Improve Privacy in the IoT - Lockstep S. Wilson, N. Moustafa and E. Sitnikova,
Cybersecurity Policy Forum: Identity, Authentication and the Road AheadCybersecurity Policy Forum FIDO Alliance - 2023 brings a new year and a new Congress – but America is still struggling with many of the same old problems when it comes to digital identity and authentication.
Recap: 2023 Identity, Authentication and the Road Ahead #IDPolicyForum FIDO Alliance - tremendous transformation in 2023 as lawmakers and regulators alike struggle to help protect individual privacy and improve access to services
“Always bet on good regulation.” IDnow - the era of black-market operators is coming to an end, and which gambling trends to bet on in 2023.
The Swedish Data Protection Authority (IMY) decided in a case involving Nordax Bank AB due to a complaint. The context is that Nordax failed to initially comply with requests from a complainant for access and erasure under Art. 15 and 17 GDPR, on the grounds that the company does not process or store the complainant's personal data.
JFF (Jobs for the Future) Plugfest 2 ValidatedID
JFF (Jobs for the Future) and W3C aim to build an ecosystem for verifiable credentials wallets regarding learning and employment, and Verifiable Credential (VC) issuers and Decentralized Identifiers (DIDs).
[github] did:pkh Method Specification Wayne Chang, Charles Lehner, Juan Caballero, Joel Thorstensson
did:pkh is similar in many ways to did:key, except that did:pkh is optimized for identifiers derived from hashes of public keys according to well-known algorithms (commonly referred to as "public key hashes", because, in most cases, they are a public key hashed according to a standard hash function).
whose verifiable credentials are trustworthy in any given use case? Two solutions to this challenge—Trust Registries and Trust Lists— have emerged from two different organizations.
WAO! We’re almost seven We Are Open
Credential Engine CEO Scott Cheney joins Velocity board Velocity Network
Wider Team had a verifiable 2022 Wider Team
Our small band of strategy consultants gave back to our professional communities in 2022. Here's the recap of our digital identity, ethics, manufacturing, and supply chain talks, papers, standards work, and workshops.
Thanks to winning one of the latest challenges, Indicio will upgrade the Hyperledger Indy SDK in all Hyperledger Indy and Aries software. This includes updating all BC Gov Aries Cloud Agent Python (ACA-Py) installations still using the Indy SDK to use Aries Askar
Our chefs are experienced. They have tasted good dishes and bad ones. They experiment and innovate mixing old ingredients and new, and delight when they create something delicious that no one has ever seen, tasted, or smelled before.
Mastodon for Developers: Everything You Need to Know auth0 - Learn how to use Mastodon effectively as a developer.
Activity Streams graphical model reb00ted
[tweet thread] Reimagining the Social Landscape | State of the DAOs BanklessWriters
In this thread, you will discover the difference between the web3 social landscape and that of web2 [...] The social landscape needs to change. This is where the web3 social landscape comes in. It gives us hope as two of the biggest opportunities in web3 are to change the way communities are formed and the platform we use to come together.
[tweet] Domain name http://atprotocol.com is for sale! NameOnline
What are LSDs? Defiant - Liquid Staking Derivatives! LSDs.
An Exploration of Decentralized Identity at ETHDenver BUIDLWeek. Web3 has enabled countless users to take control of their financial assets across the web, and we aim to take this a step further - allowing users to control their identity and data.
We launched SSX in November to provide developers with the easiest way to integrate Sign-In with Ethereum. We are continuously working on a positive developer experience, and additional features to enable builders to work with emerging decentralized identity paradigms.
Our collaboration with Altme allows for the integration of SSI verifiable credentials on the Tezos blockchain through TezID. This feature enables Tezos applications to verify user information directly on-chain, improving the user experience, privacy and enabling more customized experiences and services.