Identosphere 87 • Verifiable Credentials in Web3 practical • IAM + SSI • Health Credential System Implementation Guide
You weekly guide to the latest news events and related info surrounding development and implementation of decentralized identity and verifiable credentials
Welcome to Identosphere’s Weekly
Thanks to our Supporters!
If you haven’t already Contribute on Patreon …or reach out to Kaliya directly
Read previous issues and Subscribe : newsletter.identosphere.net
Content Submissions: newsletter [at] identosphere [dot] net
MyData is this week: Program Highlights
Identiverse in Denver 6/21-24 (Kaliya is talking there re: Seeing SSI in Historical Context)
DIF All-Hands - 6/22nd - new steering committee members being annouced.
Velocity Network is hosting a Membership Assembly 7/13-14 in NYC
Member meeting of ESRA the Electronic Signature and Records Association 7/14 Portland OR - has a session on SSI
Decentralized Web Camp 8/24-28 in Northern California (Kaliya’s attending & encouraging SSI folks to participate)
Hyper Ledger Global Forum 9/12-14
Open Source Summit Europe Linux Foundation , Dublin Ireland 9/13-16
Identity Week USA (formerly Connect:ID) Washington DC 10/4-5
Internet Identity Workshop #35 11/14-16, Mountain View California
Disco - Technical Product Manager
Spokeo - https://www.spokeo.com/careers - Their CEO just became the co-chair of the Credentials Community Group (CCG).
Trinsic is Hiring a Director of Marketing
Identity represents a great asset. But we do not have control of this asset, as it is in the hands of organizations, governments, institutions, etc. These entities know everything about us from all this data.
FLOSS WEEKLY 685: DIDS AND DIDCOMM Featuring Sam Curren
Sam Curren unpacks for Doc Searls and Dan Lynch why DIDs and DIDcomm are the best approach to identity—and to making people first-class citizens on the Internet. Curren also discusses the origin story of picos and the advantages of nomadic living and hacking.
Bridging the Gap: SSI going mainstream
Gabe Albert, Managing Director - Security/Digital Identity, Accenture
and Lexi Ashpole, Manager - Tech Innovation/Digital Identity, Accenture
speak at the June 15, 2022 All Members meeting at the Trust Over IP Foundation.
Self-sovereign Identity: A Conceptual Framework & Ecosystem Design Tripi, Gabriele, Department of Science and Technology. Linköping University.
the findings are presented as two parts of a whole, the first being the conceptual framework that describes a set of essential factors that an ecosystem requires in order to fulfill the goals of self-sovereign identity and interoperability. The second is a set of visualizations of how the framework can be used to design systems and interactions, inside and between the systems, to create an ecosystem.
NSSIA: A New Self-Sovereign Identity Scheme with Accountability Qiuyun Lyu, Shaopeng Cheng, Hao Li, Junliang Liu, Yanzhao Shen, Zhen Wang
Achieving Trusted Digital Transactions Across the Globe: OIX and ToIP Align to make it Happen Trust over IP
With a combined worldwide membership of over 400 organisations and individuals, including some of the world’s largest stakeholders in a digital ID future, this is a crucial development in the journey towards full digital ID adoption and a digital future that will work for everyone involved.
From the Blockchain through AI and the ‘Metaverse’, Scotland is presented with a wide spectrum of technology innovations to harness. And from Education through Economy, there is an equally wide spectrum of opportunity areas where it can be applied, for great national benefit.
The Digital Health Credential System Implementation Guide Covid Credentials Initiative (PDF)
The Implementation Guide V1 provides a set of baseline recommendations to the CCI community of application and services developers, implementers with which to evaluate product designs. The requirements mentioned in this guide should be read along side (and not as a substitute to) the regulations applicable to the jurisdiction in which the applications and services will be made available
Jose San Juan, GATACA: “blockchain technology has become the protagonist of the world we live in” Cybernews
For the past 4 years, GATACA has focused the majority of its efforts on building an interoperable, secure, and user-friendly product for the European region. We not only plan to continue to focus on the needs of our clients and regulatory, as well as standardization demands from the market but to take our SSI tech to the next level.
Gaia-X creates an open, federated digital ecosystem for data infrastructure for decentralized cloud and edge workloads and data sharing capabilities. As part of the core services, the so-called Gaia-X Federation Services (GXFS) are targeting the areas of Identity & Trust, Federated Catalogue, Sovereign Data Exchange and Compliance as open-source reference implementations.
Spruce At Graph Hack 2022 SpruceID
Earlier this month, The Graph hosted Graph Hack at the Palace of Fine Arts in San Francisco. Graph Hack was a three-day hackathon, bringing together developers to kickstart the latest dapps and ideas featuring a mix of on and off-chain data via a variety of impactful use-cases.
Centre - Verite
Verite: Growing a Decentralized Identity Ecosystem Centre Consortium
Developed last year and launched in Q1 of 2022, the Verite standard welcomes this flourishing of products and experiments with Verifiable Credentials and other privacy-preserving, data-minimizing patterns and principles.
Introducing Verite Justin Hunter, Pinata, Centre
But as the world shifts to an increasingly digital native format, and as people take more ownership over their identity, how can the issuance of, presentation of, and verification of credentials be managed?
Crossfunctionality Juan Caballero, Centre
Real progress is made by rich, cross-disciplinary teams and heterogeneous coalitions coming together to attack hard problems from every angle at once.
Verifiable Credentials + Web3
How To Create a Verifiable Credentials Registry Smart Contract in Solidity Justin Hunter, Pinata, Centre
Verifiable Credentials (VCs) allow people and organizations to issue statements on behalf of others. These statements are then verifiable even if the original issuer is no longer around. We can see VCs in action in many KYC (Know Your Customer) and AML (Anti-Money Laundering) flows. For the entire flow to work, though, there needs to be a verifier.
How To Use Verifiable Credentials And Verite To Build An Off-Chain NFT Allowlist Justin Hunter, Pinata, Centre
if the signature is verified, we allow the minting to happen. When that's complete, we update the PREVIOUS_SIGNATURE variable. This is, as with many things in this demo, a simplified replay attack prevention model. This can and probably should be extended to support your own use cases.
Short Promotional User Journey videos
Self-Administration of human authority, possessed equally by all living Individuals who choose civil participation as a method of Governance derived "of, by, for" people, begins and ends with the structural accuracy of words, and their functional practices.
as more and more developers and companies and “blockchain visionaries” seek to eschew centralization and trust in the state and institutions, it seems that their definition of “acceptably” when they describe “acceptably non-dystopian” projects is very different from my own.
How LEIs streamline KYC Ubisecure
Ubisecure brought innovation to the LEI market by automating LEI issuance. Revolutionising how quickly and effectively an LEI can be registered. While improving data accuracy along the way by connecting directly to business registries globally. This innovation has helped RapidLEI to become the #1 LEI Issuer globally, issuing about 1 in 4 new LEIs monthly, in just 3 short years.
In Part 1: The Two Loops Model for Open Recognition advocacy, we talked about how as one system begins to deteriorate, an alternative begins to emerge. We know the alternative system, one that integrates credentials with other forms of recognition, is better for everyone. Without that integration, cold-hard credentialing supports outdated power dynamics.
In a much needed multi-chain extension to Sign-in with Ethereum, users will now be able to control their digital identity with their Ethereum/ENS, Solana, and Starknet accounts instead of relying on traditional/custodial profiles.
Technology and System — Which is the primary productive force?: Hope, Confusion, and Practice of Web3 Ontology
OWN (Ontology Web3 Network) Infrastructure is a series of general blockchain basic protocols and products provided by Ontology for Web3 applications. Basic components including data and reputation, etc., and general-purpose tools such as a Web3 wallet, etc. Web3 applications can choose different basic components according to different scenarios for easy integration.
How to Save the Blockchain Ian Simmons, Matterium
crypto wins by solving problems that nobody else can solve, profitably. It has to win at three levels to survive:
Ordinary people have to use it
It has to generate actual value, not just move value around
Governments have to tolerate it or use it themselves — either one will do
Regulation & Crypto
The Gillibrand official press release (but not the RFI bill text) specifically calls out both Bitcoin and Ether – which, together, comprise more than half of the total market capitalization of crypto – as being commodities under the bill’s framework and thus falling under CFTC’s jurisdiction.
Lummis-Gillibrand Responsible Financial 8 Innovation Act Gillibrand.Senate.Gov
Regulations around stablecoins have a long way to go for this asset class to be properly regulated. Nevertheless, improvements are being made and such incidents only speed up the process.
What if people could send legally binding Information Sharing Agreements to Businesses: Internet Safety Labs
What if people had the ability to assert their own legally binding permissions for data collection, use, sharing, and retention by the technologies they use? The IEEE P7012 has been working on an interoperability specification for machine-readable personal privacy terms to support such an ability since 2018.
Identity not SSI
by definition, screen scraping requires storing a user’s financial system passwords in clear text. Nonetheless, you can bet that every system that integrates with payroll systems, and almost every system that integrates with banks (at a minimum), uses the technique. The US has badly needed open banking style standards for years.