Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

My Identiverse: The Evolution of Digital Identity and Openness

115 views

Published on

This is a talk I was asked to give at the What is Universe? at the University of Oregon, (on their Portland Campus). I cover this history of the Internet Identity Workshop and talk about its core nature as a torus / bowl a feminine form and how this has resulted in the innovation of Self-Sovereign Identity

Published in: Internet
  • Be the first to comment

  • Be the first to like this

My Identiverse: The Evolution of Digital Identity and Openness

  1. 1. Plenary #3: Digital Identity and Embodied Practice  What is Universe? University of Oregon, Portland April 19, 2018 My Identiverse: The Evolution of Digital Identity and Openness Kaliya “Identity Woman” Young
  2. 2. Internet Identity Workshop
  3. 3. What really makes it work? Protocol
  4. 4. Protocol is a universalism achieved through negotiation, meaning that in the future protocol can and will be different. From Alexander Gallway’s book Protocol
  5. 5. The goal of protocol is totality. It must accept everything, not matter what source, sender, or destination. It consumes diversity, aiming instead for university. From Alexander Gallway’s book Protocol
  6. 6. Protocol’s virtues include robustness, contingency, inter-operability, flexibility, heterogeneity, an pantheism. From Alexander Gallway’s book Protocol
  7. 7. Protocol is a system of distributed management that facilitates peer-to-peer relationships between autonomous entities. From Alexander Gallway’s book Protocol
  8. 8. Protocol is a type of controlling logic that operates largely outside institutional, government and corporate power. From Alexander Gallway’s book Protocol
  9. 9. Protocol is synonymous with possibility. From Alexander Gallway’s book Protocol
  10. 10. Internet protocols allow for inter-operation between computers. From Alexander Gallway’s book Protocol
  11. 11. Protocol is a language that regulates flow, directs netspace, codes relationships, and connects life forms. It is etiquette for autonomous agents. From Alexander Gallway’s book Protocol
  12. 12. The Protocol for Email
  13. 13. The Protocol displaying Websites
  14. 14. Protocol for 2nd Factor Authentication
  15. 15. WHERE IS LAYER 8?
  16. 16. How can people control their own identities?
  17. 17. BE IN SOMEONE ELSE’s NAME SPACE
  18. 18. RENT-A MYURL.COM #
  19. 19. Long Time Ago in a Far Far away Planetwork convened 50 Environmental Groups at the Presidio in SF in1999 They asked how can we use the internet to work together to solve our environmentalcrises.
  20. 20. There were two answers - neither one was good.
  21. 21. Global Ecology and Information Technology 2000
  22. 22. At the Time we had these choices for social presence online
  23. 23. These entities were going to give us digital identities??? Really?
  24. 24. Building Identity and Trust into the Next Generation Internet
  25. 25. Underlying this report is the assumption that every individual ought to have the right to control his or her own online identity. You should be able to decide what information about yourself is collected as part of your digital profile, and of that information, who has access to different aspects of it. Certainly, you should be able to read the complete contents of your own digital profile at any time. An online identity should be maintained as a capability that gives the user many forms of control. Without flexible access and control, trust in the system of federated network identity will be minimal.
  26. 26. A digital profile is not treated [by corporations who host them] as the formal extension of the person it represents. But if this crucial data about you is not owned by you, what right do you have to manage its use? A civil society approach to persistent identity is a cornerstone of the Augmented Social Network project.
  27. 27. Building Identity and Trust into the Next Generation Internet
  28. 28. Organizations would have identities People would have identities
  29. 29. They would be able to connect on their own terms Each being first class nodes on the network
  30. 30. People can connect directly to each other co-owining the connection NOT through a social network.
  31. 31. LInkedIn OWNS the social graph
  32. 32. This is a meeting of the Identity Gang
  33. 33. Internet Identity Workshop 2005
  34. 34. Internet Identity Workshop 2006
  35. 35. Internet Identity Workshop 2008
  36. 36. The technology of Open Space
  37. 37. People Announce Sessions
  38. 38. Sessions get Posted on the Board
  39. 39. Session Happen
  40. 40. We gather together at the end of the day and share about what happened
  41. 41. Who is here? This map was made by the community gathered. Their are 450 groups in this map.
  42. 42. We have been really innovative. Here is a protocol family tree.
  43. 43. Lots of Open Standards XRI/XDI SAML Information Cards
  44. 44. OpenID, Working Groups and Standards
  45. 45. IETF Working Groups and Neighbors
  46. 46. OASIS Working Groups
  47. 47. FIDO Alliance Connection to W3C
  48. 48. W3C and Internet Technical Advisory Committee of the OECD
  49. 49. We collect notes from all of the sessions.
  50. 50. Opening Closing Unconference Day 5-6 breakout sessions
  51. 51. We are a Torus
  52. 52. Conventional Facilitation holds the space in the center of the Torus
  53. 53. With Open Space Technology the space is held at the edge.
  54. 54. Shifting Metaphors Slightly We are a Bowl
  55. 55. CREEPY NSA (and others) SPYING Rules for Lawful Intercept IN THIS BIGYELLOW BOX What did NSTIC focus on?
  56. 56. CREEPY NSA (and others) SPYING Rules for Lawful Intercept NORMATIVE RULES BUSINESS PRACTICES TECHNOLOGIES FOR EVERY DAY LIFE Business - Business Business - Consumer Business - Government Citizen/Person - Gov
  57. 57. Governance Meeting for NSTIC
  58. 58. I was there representing IIW this Bowl Shape
  59. 59. There were all these pyramid shaped organizations with a very clear hierarchy.
  60. 60. They were VERY confused by IIW’s shape/form They wanted to know who was in charge and could put them on the “schedule” of the conference.
  61. 61. Abrahamic Cultural Frame Relational Cultural Frame It also goes to deeper philosophical differences about where identity comes from.
  62. 62. Identity along with all things flows down from GOD.Identity and all things are present in the world and relate to each other.
  63. 63. There is a whole community gathering to co-create user-centric/self-sovereign identity.
  64. 64. There is NO “Great Man” creating this technology
  65. 65. There is a whole community building these protocols and getting these technologies to work.
  66. 66. What protocols are we building?
  67. 67. Big Co. Web 1.0 Web 2.0
  68. 68. Decentralized IDentifier - DID did:sov:3k9dg356wdcj5gf2k9bw8kfg7a Method Scheme Method-Specific Identifier
  69. 69. Decentralized IDentifier - DID DID Document 1) DID (self-describing) 2) List of public keys (For the owner) 3) List of controlling DIDs (for key recovery) 4) List of service endpoints (for interaction) 5) Timestamps (for audit history) 6) Signature (for integrity)
  70. 70. Put them on Shared Ledgers
  71. 71. Public-Private Cryptographic Keys Public Key Infrastructure = PKI
  72. 72. did:sov:3k9dg356wdcj5gf2k9bw8kfg7a 047d599d4521480d9e1919481b024f29d2693f2 72d19473dbef971d7d529f6e9 Private
 Key Public Key cc2cd0ffde594d278c2d9b432f4748506a7f9f2 5141e485eb84bc188382019b6
  73. 73. Smart Phones and Cloud Services
  74. 74. DID Layer The decentralized identity “stack” Identity Owners Cloud Layer Cloud Wallet Cloud Wallet Cloud Agent Cloud Agent Edge Layer Edge Wallet Edge Wallet Edge Agent Edge Agent Encrypted P2P verifiable claims exchange
  75. 75. Verifiable Claims
  76. 76. W3C Verifiable Claims Ecosystem HolderIssuer Verifier Issues 
 Claim Presents
 Claim Decentralized Identifiers (DIDs) Public Blockchain or other Decentralized Network Signs Claim Countersigns Claim Verifies Signatures Wallet
  77. 77. Directed Identifiers
  78. 78. Sovrin Verifiable Claims Ecosystem HolderIssuer Verifier Issues 
 Claim Presents
 Claim Decentralized Identifiers (DIDs) Public Blockchain or other Decentralized Network Signs Claim Countersign s Claim Verifies Signatures Wallet Pairwise Unique
 DID Pairwise Unique
 DID
  79. 79. Sovrin Verifiable Claims Ecosystem HolderIssuer Verifier Issues 
 Claim Presents
 Claim Decentralized Identifiers (DIDs) Public Blockchain or other Decentralized Network Signs Claim Countersign s Claim Verifies Signatures Wallet Zero Know- ledge Claim Zero Know- ledge Proof Does not reveal pairwise unique DID of Holder with Issuer Supports selective disclosure
  80. 80. HOW DO YOU KNOW ITS TRUE? Without…
  81. 81. HOW DO YOU KNOW ITS TRUE? Without…
  82. 82. HOW DO YOU KNOW ITS TRUE? Without…
  83. 83. 113
  84. 84. HOW CAN YOU RESOLVE FOR THEM? They are Distributed right?
  85. 85. Decentralized Identity Foundation
  86. 86. Building: UNIVERSAL RESOLVER
  87. 87. Building: UNIVERSAL RESOLVER
  88. 88. My Identiverse has changed….
  89. 89. I question the path of its evolution AND our openness
  90. 90. Protocol: How Control Exists after Decentralization
  91. 91. Protocol is a type of controlling logic that operates largely outside institutional, government and corporate power. From Alexander Gallway’s book Protocol
  92. 92. The goal of protocol is totality. It must accept everything, not matter what source, sender, or destination. It consumes diversity, aiming instead for university. From Alexander Gallway’s book Protocol
  93. 93. Protocol is a universalism achieved through negotiation, meaning that in the future protocol can and will be different. From Alexander Gallway’s book Protocol
  94. 94. It is essential that we change the culture around how technology is built now: • to put humanness first, • to center communities that have been marginalized in its creation to date • to design with awareness of threat models that have often been ignored until it’s too late.

  95. 95. Internet Identity Workshop #27 October 23-25

×