Sovereign Identity Updates

Share this post

Identosphere 87 • Verifiable Credentials in Web3 practical • IAM + SSI • Health Credential System Implementation Guide

newsletter.identosphere.net

Identosphere 87 • Verifiable Credentials in Web3 practical • IAM + SSI • Health Credential System Implementation Guide

You weekly guide to the latest news events and related info surrounding development and implementation of decentralized identity and verifiable credentials

IdentityWoman
and
Infominer
Jun 21, 2022
1
Share this post

Identosphere 87 • Verifiable Credentials in Web3 practical • IAM + SSI • Health Credential System Implementation Guide

newsletter.identosphere.net

Welcome to Identosphere’s Weekly

Thanks to our Supporters!

If you haven’t already Contribute on Patreon …or reach out to Kaliya directly
  • Read previous issues and Subscribe : newsletter.identosphere.net

  • Content Submissions: newsletter [at] identosphere [dot] net

Upcoming 

  • MyData is this week: Program Highlights

  • Identiverse in Denver 6/21-24 (Kaliya is talking there re: Seeing SSI in Historical Context)

    • Identity in the Metaverse

  • DIF All-Hands - 6/22nd - new steering committee members being annouced.

  • Velocity Network is hosting a Membership Assembly 7/13-14 in NYC 

  • Member meeting of ESRA the Electronic Signature and Records Association 7/14 Portland OR  - has a session on SSI

  • Decentralized Web Camp 8/24-28 in Northern California (Kaliya’s attending & encouraging SSI folks to participate)

  • Hyper Ledger Global Forum 9/12-14

  • Open Source Summit Europe Linux Foundation , Dublin Ireland 9/13-16

  • Identity Week USA (formerly Connect:ID) Washington DC 10/4-5

  • Internet Identity Workshop #35 11/14-16, Mountain View California

Hiring

  • Disco - Technical Product Manager

  • Spokeo - https://www.spokeo.com/careers - Their CEO just became the co-chair of the Credentials Community Group (CCG). 

  • Trinsic is Hiring a Director of Marketing

Explainer

What are the main contributions of the Self-Sovereign Identity? 

Identity represents a great asset. But we do not have control of this asset, as it is in the hands of organizations, governments, institutions, etc. These entities know everything about us from all this data.

FLOSS WEEKLY 685: DIDS AND DIDCOMM Featuring Sam Curren

Sam Curren unpacks for Doc Searls and Dan Lynch why DIDs and DIDcomm are the best approach to identity—and to making people first-class citizens on the Internet. Curren also discusses the origin story of picos and the advantages of nomadic living and hacking.

Bridging the Gap: SSI going mainstream

IAM and SSI: A Combined Approach to Digital Identity

Gabe Albert, Managing Director - Security/Digital Identity, Accenture

and Lexi Ashpole, Manager - Tech Innovation/Digital Identity, Accenture

speak at the June 15, 2022 All Members meeting at the Trust Over IP Foundation. 

Research

Self-sovereign Identity: A Conceptual Framework & Ecosystem Design Tripi, Gabriele, Department of Science and Technology. Linköping University.

the findings are presented as two parts of a whole, the first being the conceptual framework that describes a set of essential factors that an ecosystem requires in order to fulfill the goals of self-sovereign identity and interoperability. The second is a set of visualizations of how the framework can be used to design systems and interactions, inside and between the systems, to create an ecosystem. 

NSSIA: A New Self-Sovereign Identity Scheme with Accountability Qiuyun Lyu, Shaopeng Cheng, Hao Li, Junliang Liu, Yanzhao Shen, Zhen Wang

Organization News

Achieving Trusted Digital Transactions Across the Globe: OIX and ToIP Align to make it Happen Trust over IP 

With a combined worldwide membership of over 400 organisations and individuals, including some of the world’s largest stakeholders in a digital ID future, this is a crucial development in the journey towards full digital ID adoption and a digital future that will work for everyone involved.

Digital Scotland: Blueprint for a 21st Century Scottish Digital Nation (eBook)

From the Blockchain through AI and the ‘Metaverse’, Scotland is presented with a wide spectrum of technology innovations to harness. And from Education through Economy, there is an equally wide spectrum of opportunity areas where it can be applied, for great national benefit.

The Digital Health Credential System Implementation Guide Covid Credentials Initiative (PDF)

The Implementation Guide V1 provides a set of baseline recommendations to the CCI community of application and services developers, implementers with which to evaluate product designs. The requirements mentioned in this guide should be read along side (and not as a substitute to) the regulations applicable to the jurisdiction in which the applications and services will be made available

Company Coverage

Jose San Juan, GATACA: “blockchain technology has become the protagonist of the world we live in” Cybernews

For the past 4 years, GATACA has focused the majority of its efforts on building an interoperable, secure, and user-friendly product for the European region. We not only plan to continue to focus on the needs of our clients and regulatory, as well as standardization demands from the market but to take our SSI tech to the next level.

Lissi demonstrates authentication for Gaia-X Federation Services Lissi ID

Gaia-X creates an open, federated digital ecosystem for data infrastructure for decentralized cloud and edge workloads and data sharing capabilities. As part of the core services, the so-called Gaia-X Federation Services (GXFS) are targeting the areas of Identity & Trust, Federated Catalogue, Sovereign Data Exchange and Compliance as open-source reference implementations.

Spruce At Graph Hack 2022 SpruceID

Earlier this month, The Graph hosted Graph Hack at the Palace of Fine Arts in San Francisco. Graph Hack was a three-day hackathon, bringing together developers to kickstart the latest dapps and ideas featuring a mix of on and off-chain data via a variety of impactful use-cases.

Centre - Verite

Verite: Growing a Decentralized Identity Ecosystem Centre Consortium

Developed last year and launched in Q1 of 2022, the Verite standard welcomes this flourishing of products and experiments with Verifiable Credentials and other privacy-preserving, data-minimizing patterns and principles.  

Introducing Verite Justin Hunter, Pinata, Centre

But as the world shifts to an increasingly digital native format, and as people take more ownership over their identity, how can the issuance of, presentation of, and verification of credentials be managed?

Crossfunctionality Juan Caballero, Centre

Real progress is made by rich, cross-disciplinary teams and heterogeneous coalitions coming together to attack hard problems from every angle at once.

Verifiable Credentials + Web3

How To Create a Verifiable Credentials Registry Smart Contract in Solidity Justin Hunter, Pinata, Centre

Verifiable Credentials (VCs) allow people and organizations to issue statements on behalf of others. These statements are then verifiable even if the original issuer is no longer around. We can see VCs in action in many KYC (Know Your Customer) and AML (Anti-Money Laundering) flows. For the entire flow to work, though, there needs to be a verifier. 

How To Use Verifiable Credentials And Verite To Build An Off-Chain NFT Allowlist Justin Hunter, Pinata, Centre

if the signature is verified, we allow the minting to happen. When that's complete, we update the PREVIOUS_SIGNATURE variable. This is, as with many things in this demo, a simplified replay attack prevention model. This can and probably should be extended to support your own use cases.

Short Promotional User Journey videos

SICPA Digital Identity for Travel - Sharing and Validating Credentials

SICPA Digital Identity for Refugees - Creating, Using and Validating Credentials

Thoughtful

Self-Administered Governance In America

Self-Administration of human authority, possessed equally by all living Individuals who choose civil participation as a method of Governance derived "of, by, for" people, begins and ends with the structural accuracy of words, and their functional practices. 

Is "acceptably non-dystopian" self-sovereign identity even possible? By Molly Wood (Hacker News)

as more and more developers and companies and “blockchain visionaries” seek to eschew centralization and trust in the state and institutions, it seems that their definition of “acceptably” when they describe “acceptably non-dystopian” projects is very different from my own.

Use Case

How LEIs streamline KYC Ubisecure

Ubisecure brought innovation to the LEI market by automating LEI issuance. Revolutionising how quickly and effectively an LEI can be registered. While improving data accuracy along the way by connecting directly to business registries globally. This innovation has helped RapidLEI to become the #1 LEI Issuer globally, issuing about 1 in 4 new LEIs monthly, in just 3 short years.

How badges can change the world: Part 2: Why we need to transition

In Part 1: The Two Loops Model for Open Recognition advocacy, we talked about how as one system begins to deteriorate, an alternative begins to emerge. We know the alternative system, one that integrates credentials with other forms of recognition, is better for everyone. Without that integration, cold-hard credentialing supports outdated power dynamics. 

Web3

Introducing Sign-in with Web3 — Building a Non-Custodial World Web3Auth

In a much needed multi-chain extension to Sign-in with Ethereum, users will now be able to control their digital identity with their Ethereum/ENS, Solana, and Starknet accounts instead of relying on traditional/custodial profiles.

Technology and System — Which is the primary productive force?: Hope, Confusion, and Practice of Web3 Ontology

OWN (Ontology Web3 Network) Infrastructure is a series of general blockchain basic protocols and products provided by Ontology for Web3 applications. Basic components including data and reputation, etc., and general-purpose tools such as a Web3 wallet, etc. Web3 applications can choose different basic components according to different scenarios for easy integration. 

How to Save the Blockchain Ian Simmons, Matterium

crypto wins by solving problems that nobody else can solve, profitably. It has to win at three levels to survive:

  • Ordinary people have to use it

  • It has to generate actual value, not just move value around

  • Governments have to tolerate it or use it themselves — either one will do

Regulation & Crypto

Crypto Regulatory Affairs: US Senators Introduce Framework For Crypto Regulation

The Gillibrand official press release (but not the RFI bill text) specifically calls out both Bitcoin and Ether – which, together, comprise more than half of the total market capitalization of crypto – as being commodities under the bill’s framework and thus falling under CFTC’s jurisdiction. 

Lummis-Gillibrand Responsible Financial 8 Innovation Act Gillibrand.Senate.Gov

Regulatory Response to Stablecoins and the Terra Collapse Coinfirm

Regulations around stablecoins have a long way to go for this asset class to be properly regulated. Nevertheless, improvements are being made and such incidents only speed up the process. 

What if people could send legally binding Information Sharing Agreements to Businesses: Internet Safety Labs

What if people had the ability to assert their own legally binding permissions for data collection, use, sharing, and retention by the technologies they use? The IEEE P7012 has been working on an interoperability specification for machine-readable personal privacy terms to support such an ability since 2018.

Identity not SSI 

FIDO passkeys are an existential threat to fintech startups

by definition, screen scraping requires storing a user’s financial system passwords in clear text. Nonetheless, you can bet that every system that integrates with payroll systems, and almost every system that integrates with banks (at a minimum), uses the technique. The US has badly needed open banking style standards for years.

Disasters in the World of Data

  • Facebook Is Receiving Sensitive Medical Information from Hospital Websites

  • Facebook and Anti-Abortion Clinics Are Collecting Highly Sensitive Info on Would-Be Patients

  • Tech on Juneteenth: Some tech firms perpetuate modern-day slavery by using prison labor

Thanks for Reading!

Read more \ Subscribe: newsletter.identosphere.net
Support this publication: patreon.com/identosphere
Contact \ Submission: newsletter [at] identosphere [dot] net

Share this post

Identosphere 87 • Verifiable Credentials in Web3 practical • IAM + SSI • Health Credential System Implementation Guide

newsletter.identosphere.net
Comments
TopNewCommunity

No posts

Ready for more?

© 2023 Identosphere
Privacy ∙ Terms ∙ Collection notice
Start WritingGet the app
Substack is the home for great writing