Discover more from Sovereign Identity Updates
The AI Dilema Video • ETH Account Abstraction • Massive Growth for Decentralized ID • Claims and Credentials Without DLT
Announcing Updates for Decentralized-ID.com and continuing to bring you the leading stories surrounding decentralized identity and verifiable credentials on the weekly
Welcome to Identosphere - We Gather, You Read
Be sure your blog has an rss feed so we can better track and feature your content! Send us a message at email@example.com if you have an RSS feed you want us to track for this digest.f
Propelling understanding and adoption of verifiable digital credentials: The Digital Credentials Consortium and the W3C Verifiable Credentials for Education Mondays (everyone welcome)
MeetUp Holland FinTech: The Future of Banking Innopay 4/13 Netherlands
[Pre-IIW] OpenID Foundation Workshop at Microsoft 4/17
Internet Identity Workshop 4/18-20, Mountain View, CA ← buy your tickets
GS1 Standards Week 4/25-27 - business and technical [...] Retail, Consumer Goods, Fresh Foods, Healthcare, Transport, Logistics
eIDAS 2.0 l New Opportunities in Digital Identity 4/27 Frankfurt
Silicon Valley Innovation Program (SVIP) Demo Week 2023 Washington, DC 5/18-19 [register]
Heroes of Data Privacy – the practise-oriented data privacy conference in Vienna LionsGate 5/24 Vienna, Austria
Digital Identity unConference Europe 6/7-9 Zurich ← Registration open
The Closing Conference of the Blockchain & Society Policy Research Lab 7/3-4 Amsterdam (Submissions due 4/15)
Software Engineer, Full-Stack Himalayas
Spruce is building a future where users control their identity and data across all digital interactions.
If an identity is decentralized it means that no one group or authority has complete control. A great example of this is your public address on a crypto wallet, such as Metamask. Metamask is an application that allows for the easy use of the blockchain, but it also serves as a cryptographic key for making sure you are in fact the owner of a specific public identity.
[tweet] decentralized identity uses [distributed technologies] to enable peer-to-peer trust and verification 0xArhat
Decentralized: Users data is stored in their own devices and protected by cryptography. Users’ data is not stored or exposed on the blockchain or on any other platform.
KERI Tutorial Series: Treasure Hunting in Abydos! Issuing and Verifying a Credential (ACDC) Kent Bull
According to ATHENA, explorers desiring entrance through the Osireion must present a verifiable, secure proof signed by the Wise Man in order to be accepted by the Gatekeeper.
When a DID is created, a pointer is created on the blockchain to where the actual DID document is stored. The actual DID Documents (and all their historical versions) are stored on low cost, commodity HTTP servers.
Let’s delve into the intricacies of IPFS and Verida DbStore, comparing their architecture, security, performance, storage types, and suitability for handling personally identifiable information (PII).
AU10TIX’s forensic-level document and biometric verification technology together with its Instinct identity monitoring tools for synthetic fraud help provide strong verification, encrypted as verifiable credentials assets.
[This is part 2 of a 5 part sequence on how security and cryptography can help AI safety, published and linked here a few days apart.]
[video] The A.I. Dilemma Tristan Harris ← watch this video!!!
with leading technologists and decision-makers with the ability to influence the future of large-language model AIs. This presentation was given before the launch of GPT-4
valued at USD 379.66 million in 2021 and is expected to expand at a compound annual growth rate of 88.2 per cent from 2022 to 2030. By 2027, the DI market is likely to be valued at USD 6,822 million and, by 2030, it is expected to reach USD 102.0 billion.
In 2022, the decentralized identity market was projected to reach $270 million.
[report] Trust in Trade: A foundational digital layer underpinning the physical, financial, and information supply chain International Chamber of Commerce (ICC), Digital Standards Initiative
A new verifiable trust layer, underpinning the existing information supply chain, is needed.
Decentralized SSI Governance Trust Over IP
Participatory governance for all three roles in credential exchange (holder, issuer and verifier) to set policy for their respective contexts.
Automating decision-making based on arguments (business logic).
SSI assurance communities that are built on the existing accreditation, certification and audit regimes.
What the revised charter for the Privacy Enhancing Mobile Credentials Work Group means for our industry Kantara Initiative
to develop the necessary privacy-related guidance for those organizations issuing, verifying, and developing the technologies to hold digital credentials such as mobile drivers’ licenses (mDL) when in person
Modern IT systems allow for the track and trace of connected devices with a big catch — the location of device users (Personal Identifiable Information, or PII) is exposed! Vehicles on dealer lots are filled with sensors that can provide accurate data about the vehicle’s condition, location, and other important information.
[Wow] Pluriverse Verses
Verses aims to contribute to a clearer set of technologies, infrastructures, institutions, and processes that realize the ethic of the pluriverse in the concrete and material. We build together towards a cyberspace that is interdependent. As such, we follow a method of loose collaboration which we call "stone soup".
Government \ Policy
[New Zealand] Govt helps to protect New Zealanders digital identities Behive.gov.nz
[EU, Report] Digital Product Passport Corporate Leaders Group
The EU must foster large-scale demand for domestically produced circular and climate neutral materials and products to support industrial decarbonisation and reduce dependency on primary material imports
[USA] Evolving Government to Citizen Shared Identity Services Anil John
It is time for it to occupy the room it owns instead of outsourcing solutions to private sector entities who do not have the public interest at heart.
Design and implement digital identity systems that respond to the needs of users and service providers;
Prioritise inclusion and minimise barriers to access to and the use of digital identity;
Take a strategic approach to digital identity and define roles and responsibilities across the digital identity ecosystem;
Protect privacy and prioritise security to ensure trust in digital identity systems;
Align their legal and regulatory frameworks and provide resources to enable interoperability;
TikTok \ RESTRICT ACT
[tweet🧵] The RESTRICT Act is not limited to TikTok […] gives the government authority over communication domestic or abroad Mises Caucus - “enforce any mitigation measure to address any risk” to national security now and in any “potential future transaction”
[tweet🧵] 20 years jailterm for using a VPN? Blockworks Research - Here's a little more on the infamous Tiktok Bill
Web3 \ DWeb
[NEW, IPFS] IPFS Principles specs.ipfs.tech
[tweet thread] what I think about appchains vs shared blockchains. Here's a simple framework to help devs Sergey Gorbunov
If you're so popular that you can't afford bad UX during peak hours on shared environments, or want to innovate in user onboarding journeys -- control your own stack by launching an appchain & connect it with all others.
Algorithmic choice Bluesky
We want a future where you control what you see on social media. We aim to replace the conventional "master algorithm," controlled by a single company, with an open and diverse "marketplace of algorithms.
[thread] The Basics of The Splurge A guide on Ethereum's: 1. EVM upgrades 2. EIP-1559 changes 3. Account abstraction Blockworks Research
"Money, Money, Money, it must be funny, in a Digital Wallet World" Global Trust Foundation
money needs to follow the data flows, the question is how is that done, and how is it done without an audit trail which will blow a hole in any privacy expectations?