Introduction to Self-Sovereign Identity

Introduction to
Self-Sovereign Identity
INTERNET IDENTITY WORKSHOP | SPRING 2020
Nice to Meet You
WELCOME
AGENDAHOSTS
Karyl Fowler
CEO @Transmute
@TheKaryl
karyl@transmute.industries
Juan Caballero
Comms / Research @Spherity GmbH
@by_caballero
juan.caballero@spherity.com
1. Two Tales: Self-Sovereign Identity
2. SSI: The Movement
3. SSI: The Technology
4. Pairing the Two: Uses & Applications
5. Where to Learn More & Get Involved
6. Audience Q&A
2
Self-Sovereign Identity (SSI)
TWO PARTS
The Movement The Technology
3
The Movement
SELF – SOVEREIGN IDENTITY
Influential writers and essayists:
- Kim Cameron (“Laws of Identity”, 2005)
- Doc Searls (co-founded IIW in 2005 with...)
- Kaliya Young (...who gives this talk some years!)
- Christopher Allen (author of “10 principles” and of slide #6!)
4
Shared Ideals
THE MOVEMENT
Data Sovereignty
21st Century
Governance & Policy21st Century
Business Practices
Decentralized
Identity / SSI
Decentralization,
Shared data,
Open source
Open data,
Data rights
Privacy-by-design, Open standards
& protocols, Data unions, Rights to
Repair & Portability
Radical
Transparency
& Auditability,
Ecosystem design,
Mechanism design,
Incentive
engineering
Multi-stakeholder
data controls,
Differential privacy,
Data accountability,
revocable anonymity
Digital-first,
Trust economics
5
Key characteristics:
• Minimum Disclosure
• Full Control
• Necessary Proofs
• Legally-Enabled
6
Key characteristics:
• Anonymity
• Web of Trust
• Censorship Resistance
• Defend Human Rights vs. Powerful Actors
(nation states, multi-national corps,
mafias, etc.)
* Originally coined by Tim Bouma (@trbouma) https://medium.com/@trbouma/less-identity-65f65d87f56b
CC BY-SA 4.0
Less Identity + Trustless Identity
TWO MAJOR TRACKS
Or more properly
“Trust Minimized” Identity
“Legally-Enabled
Self-Sovereign” Identity*
SLIDE CREDIT: CHRISTOPHER ALLEN’S ODYSSEY PRESENTATION 2020
7
The Technology
SELF – SOVEREIGN IDENTITY
Identity is the gene of
software applications.
8
©TRANSMUTE | ALL RIGHTS RESERVED.
Centralized Identity
EXISTING WAY OF DOING THINGS
9
Our “identities” (assembling into “profiles”) are stored away
on the servers of identity providers, which own the structure,
the content, and the access rights to everything we do.
They lend us a key, but they can change the locks, or throw
away the contents. We are but lowly subjects of the data
barons.
Federated Identity
EXISTING WAY OF DOING THINGS 2.0
10
By linking together silos into a “federation,” managers of
businesses, platforms and services can outsource the “ID
checks” at the door, making them interchangeable and
interoperable. Authentication is tricky business, and most
relying parties are happy to offload this headache…
...onto ever more powerful middlemen who now hold richer,
multi-silo identities on all of us in exchange for this
convenience. Single-Sign On makes the data barons into
data emperors.
Today’s Problems
PAST WAY OF DOING THINGS CAUSED
11
• Usage data collected to create detailed profiles with all-or-nothing access
• Who owns user data & decides how it’s used?
• Difficult to delegate or attenuate access or privileges dynamically
• Users can’t control how their data is secured or shared
(or notified if there is a breach)
• Single points of failure and honeypots everywhere
• Usernames + Password databases are an attack surface
• Data bloat: businesses taking on liability for more data than they need
• There is no identity layer that persists across all systems
• Lacking data portability
SLIDE INSPIRATION: HEATHER VESCENT + KIM HAMILTON DUFFY + KALIYA YOUNG
Decentralized Identity
WEB 3.0 WAY OF DOING THINGS
Blockchains and DLTs aren’t perfect, but they’re the
best way currently stable and production-ready for
self-publishing and self-controlling the cryptographic
keys for our identity. Some work (such as KERI and
Sidetree) are pushing the envelope on other ways
of decentralizing public key infrastructure.
Tech Foundations
SELF – SOVEREIGN IDENTITY
Decentralized Identifiers (DIDs):
self-controlled, digital fingerprints assigned to
people, entities, or things
Verifiable Credentials (VCs): Like “files” but
with granular controls baked in
Resolvers (“Mini DNS”): can function as
local namespaces (or not)
Secure Data Storage (“lockers”): Extend
granular controls to underlying data
Cutting-edge Privacy-preserving Crypto:
Zero-Knowledge, Differential Privacy, MPC, etc
Wallets & Agents: Web interfaces beyond
the “browser”/”app” paradigm 13
A Decentralized Identifier (DID) is a new
type of identifier that is globally unique,
resolvable with high availability, and
cryptographically verifiable.
Decentralized Identifiers
DEFINITION
14
https://w3c-ccg.github.io/did-primer/
The purpose of the DID document is to
describe the public keys, authentication
protocols, and service endpoints necessary
to bootstrap cryptographically-verifiable
interactions with the identified entity.
>50 DID Methods Today
DIFFERENT STROKES FOR DIFFERENT FOLKS
15
https://w3c-ccg.github.io/did-method-registry/
A verifiable credential (VC) is a set of tamper-evident claims
and metadata about real life achievements, qualifications, or
attributes that includes a cryptographic proof about who
issued it.
Verifiable Credentials
DEFINITION
16
https://www.w3.org/TR/vc-data-model/#credentials
Examples of verifiable credentials include digital employee
identification cards, digital birth certificates, and digital
educational certificates, authentication and authorization
bearer tokens, logistics or shipping certifications.
• Reduce database security risks and business process risks
• Give users increased to total control over their identity data and credentials
• Increased data portability and near-global scope (for reputation and history)
• Increase business efficiency through streamlined onboarding & auditing
• Reduce fraud by confirming multiple data points
• Streamline confirmation of compliance data/documentation
• Increase trust of any verified data that must be shared downstream, in a form more
persistent than the legal persons involved
• Key use cases: Drug trials, Compliance documents, Provenance data
DIDs + VCs Can...
SO WHAT?
17
SLIDE INSPIRATION: HEATHER VESCENT + KIM HAMILTON DUFFY + KALIYA YOUNG
FRAMEWORK FOR ADOPTION
1. Is selective disclosure or privacy a priority?
2. Is there high coordination burden?
3. Is traceability or auditability important?
Application Areas
Chains of Custody
Commercial + Defense Supply Chain Logistics
Cold Chain (pharma to agriculture)
Contract Management (Legal, HR, Real Estate)
Software
Data Infrastructure & Governance_
Cloud roles + access management_
Microservices monitoring_
Telco
5G + IoT Enablement
Identity/Data-as-a-Service
Anti-Fraud (verification + roaming)
Healthcare_
Insurance + Billing_
Patient-centric data sharing + management_
18©TRANSMUTE | ALL RIGHTS RESERVED.
Ideas
(2-10 years)
Incubation
(6-18 months)
Refinement
(1-3 years)
Standardization
(~18-24 months)
Conversations
Whitepapers, position
papers
Experiments, Specifications,
Pilots
Standards
W3C Community Groups
Rebooting the Web
of Trust
19
SLIDE CREDIT: HEATHER VESCENT @ THE PURPLE TORNADO
Get Involved
RESOURCES
Primary Sources:
• W3C Credentials Community Group
• DIF Working Group Records
• Rebooting the Web of Trust Conference, Proceedings & Digests
• Internet Identity Workshop (You are here) Conf & Notes
Secondary Sources & Commentaries:
• 2019 IIW Intro to SSI Deck by Heather Vescent + Karyl Fowler + Lucas
Tétreault
• 2018 IIW Intro to SSI Deck by Heather Vescent + Kim Hamilton Duffy
• 2018 IIW Intro to SSI Deck by Drummond Reed +
• Infominer’s Resources: https://decentralized-id.com/
• The Purple Tornado reports for US DHS (2019)
• PSA (Privacy, Surveillance, Anonymity) Podcast (Kaliya Young, Seth
Goldstein)
• SSIMeetup Webinar series (Alex Preukschat)
• Definitely Identity podcast (Tim Bouma)
• One World Identity (“KNOW”) Podcast
• MyData Slack and Conference series
• CyberForge (includes some great posts by Anil John, US DHS S&T)
• Transmute TechTalk: On Enterprise Use + Integrations
Monographs:
• Comprehensive Guide to Self Sovereign Identity (2019) - Heather
Vescent / Kaliya Young
• Spherity’s SSI 101 Series on Medium (2020) - Juan Caballero
• Self Sovereign Identity (2021) - Alex Preukschat / Drummond Reed
Technical Resources:
• W3C DID Specification & Use Case guidance
• W3C VC Data Model Specification
• Digital Credential Consortium whitepaper (Kim Hamilton Duffy)
• Secure Data Storage Specification WG (DIF-W3C)
• Credential Handler API (CHAPI)
• Universal Resolver (Danube Tech)
• Trust Over IP Foundation (TBD)
• DIDcomm WG (DIF-W3C)
• Aries RFCs (Hyperledger)
20
Knowledge Bases + Education
REFERENCES
Thank You!QUESTIONS?
1 of 21

Recommended

Self-Sovereign Identity: Ideology and Architecture with Christopher Allen by
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSelf-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSSIMeetup
2.8K views85 slides
Self-Sovereign Identity for the Decentralized Web Summit by
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitKaliya "Identity Woman" Young
962 views138 slides
The Shift from Federated to Decentralized Identity by
The Shift from Federated to Decentralized IdentityThe Shift from Federated to Decentralized Identity
The Shift from Federated to Decentralized IdentityEvernym
386 views20 slides
Digital Guardianship in Self-Sovereign Identity by
Digital Guardianship in Self-Sovereign IdentityDigital Guardianship in Self-Sovereign Identity
Digital Guardianship in Self-Sovereign IdentityEvernym
1.6K views27 slides
Verifiable Credentials in Self-Sovereign Identity (SSI) by
Verifiable Credentials in Self-Sovereign Identity (SSI)Verifiable Credentials in Self-Sovereign Identity (SSI)
Verifiable Credentials in Self-Sovereign Identity (SSI)Evernym
498 views29 slides
What is self-sovereign identity (SSI)? by
What is self-sovereign identity (SSI)?What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?Evernym
1.2K views44 slides

More Related Content

What's hot

OIDC4VP for AB/C WG by
OIDC4VP for AB/C WGOIDC4VP for AB/C WG
OIDC4VP for AB/C WGTorsten Lodderstedt
396 views18 slides
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove... by
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...SSIMeetup
11.8K views44 slides
OpenID for Verifiable Credentials @ IIW 36 by
OpenID for Verifiable Credentials @ IIW 36OpenID for Verifiable Credentials @ IIW 36
OpenID for Verifiable Credentials @ IIW 36Torsten Lodderstedt
243 views39 slides
Introduction to Self Sovereign Identity by
Introduction to Self Sovereign IdentityIntroduction to Self Sovereign Identity
Introduction to Self Sovereign IdentityHeather Vescent
1.4K views67 slides
Self Sovereign Identity (SSI) Open standards with Drummond Reed by
Self Sovereign Identity (SSI) Open standards with Drummond Reed Self Sovereign Identity (SSI) Open standards with Drummond Reed
Self Sovereign Identity (SSI) Open standards with Drummond Reed SSIMeetup
2.3K views44 slides
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan George by
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan GeorgeHyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan GeorgeSSIMeetup
6.1K views37 slides

What's hot(20)

Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove... by SSIMeetup
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
SSIMeetup11.8K views
Introduction to Self Sovereign Identity by Heather Vescent
Introduction to Self Sovereign IdentityIntroduction to Self Sovereign Identity
Introduction to Self Sovereign Identity
Heather Vescent1.4K views
Self Sovereign Identity (SSI) Open standards with Drummond Reed by SSIMeetup
Self Sovereign Identity (SSI) Open standards with Drummond Reed Self Sovereign Identity (SSI) Open standards with Drummond Reed
Self Sovereign Identity (SSI) Open standards with Drummond Reed
SSIMeetup2.3K views
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan George by SSIMeetup
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan GeorgeHyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
SSIMeetup6.1K views
Overview of Decentralized Identity by Jim Flynn
Overview of Decentralized IdentityOverview of Decentralized Identity
Overview of Decentralized Identity
Jim Flynn1.2K views
Blockchain Perspective - Internet of Memorable Things by Tim Lackey
Blockchain Perspective - Internet of Memorable ThingsBlockchain Perspective - Internet of Memorable Things
Blockchain Perspective - Internet of Memorable Things
Tim Lackey1.6K views
Integrating FIDO Authentication & Federation Protocols by FIDO Alliance
Integrating FIDO Authentication & Federation ProtocolsIntegrating FIDO Authentication & Federation Protocols
Integrating FIDO Authentication & Federation Protocols
FIDO Alliance15K views
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver... by Torsten Lodderstedt
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
Torsten Lodderstedt1.2K views
What are Decentralized Identifiers (DIDs)? by Evernym
What are Decentralized Identifiers (DIDs)?What are Decentralized Identifiers (DIDs)?
What are Decentralized Identifiers (DIDs)?
Evernym4.8K views
Introduction to Self Sovereign Identity - IIW October 2019 by Heather Vescent
Introduction to Self Sovereign Identity - IIW October 2019Introduction to Self Sovereign Identity - IIW October 2019
Introduction to Self Sovereign Identity - IIW October 2019
Heather Vescent996 views
Digital Identity Wallets: What They Mean For Banks by Evernym
Digital Identity Wallets: What They Mean For BanksDigital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For Banks
Evernym434 views
Self-issued OpenID Provider_OpenID Foundation Virtual Workshop by Kristina Yasuda
Self-issued OpenID Provider_OpenID Foundation Virtual Workshop Self-issued OpenID Provider_OpenID Foundation Virtual Workshop
Self-issued OpenID Provider_OpenID Foundation Virtual Workshop
Kristina Yasuda664 views
OAuth & OpenID Connect Deep Dive by Nordic APIs
OAuth & OpenID Connect Deep DiveOAuth & OpenID Connect Deep Dive
OAuth & OpenID Connect Deep Dive
Nordic APIs1.6K views
Masterclass on the DID Universal Resolver by Markus Sabadello
Masterclass on the DID Universal ResolverMasterclass on the DID Universal Resolver
Masterclass on the DID Universal Resolver
Markus Sabadello360 views
Becoming a hyperledger aries developer learn things.online by djaber3
Becoming a hyperledger aries developer   learn things.onlineBecoming a hyperledger aries developer   learn things.online
Becoming a hyperledger aries developer learn things.online
djaber3350 views

Similar to Introduction to Self-Sovereign Identity

Barcelona presentationv6 by
Barcelona presentationv6Barcelona presentationv6
Barcelona presentationv6Mohan Venkataraman
40 views23 slides
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity) by
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)Digipolis Antwerpen
288 views43 slides
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19 by
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19Andrew Hughes
370 views23 slides
Self-Sovereign Identity: Lightening Talk at RightsCon by
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Kaliya "Identity Woman" Young
432 views76 slides
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity by
The Future of Authentication - Verifiable Credentials / Self-Sovereign IdentityThe Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign IdentityEvernym
341 views35 slides
Compliance & Identity access management by
Compliance & Identity access management Compliance & Identity access management
Compliance & Identity access management Prof. Jacques Folon (Ph.D)
1.1K views107 slides

Similar to Introduction to Self-Sovereign Identity(20)

Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity) by Digipolis Antwerpen
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19 by Andrew Hughes
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Andrew Hughes370 views
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity by Evernym
The Future of Authentication - Verifiable Credentials / Self-Sovereign IdentityThe Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
Evernym341 views
Blockchain R&D to Decentralized Identity Deployment by Anil John
Blockchain R&D to Decentralized Identity DeploymentBlockchain R&D to Decentralized Identity Deployment
Blockchain R&D to Decentralized Identity Deployment
Anil John107 views
How Personal Cloud Networks Enable New Business Models by drummondreed
How Personal Cloud Networks Enable New Business ModelsHow Personal Cloud Networks Enable New Business Models
How Personal Cloud Networks Enable New Business Models
drummondreed3.8K views
Crypto Valley Conference 2019 - CULedger by Darrell O'Donnell
Crypto Valley Conference 2019 - CULedgerCrypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedger
Darrell O'Donnell154 views
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す by Hyperleger Tokyo Meetup
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出すTrusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
Trusting External Identity Providers for Global Research Collaborations by jbasney
Trusting External Identity Providers for Global Research CollaborationsTrusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research Collaborations
jbasney717 views
Lessons in privacy engineering from a nation scale identity system - connect id by David Kelts, CIPT
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect id
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity by Data Con LA
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized IdentityData Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity
Data Con LA18 views
Web 3.0 – From Buzzword to Security with Schellman by saastr
Web 3.0 – From Buzzword to Security with SchellmanWeb 3.0 – From Buzzword to Security with Schellman
Web 3.0 – From Buzzword to Security with Schellman
saastr60 views

Recently uploaded

Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue by
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueElevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueShapeBlue
222 views7 slides
Cencora Executive Symposium by
Cencora Executive SymposiumCencora Executive Symposium
Cencora Executive Symposiummarketingcommunicati21
159 views14 slides
Future of Indian ConsumerTech by
Future of Indian ConsumerTechFuture of Indian ConsumerTech
Future of Indian ConsumerTechKapil Khandelwal (KK)
36 views68 slides
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue by
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueWhat’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueShapeBlue
263 views23 slides
Evaluation of Quality of Experience of ABR Schemes in Gaming Stream by
Evaluation of Quality of Experience of ABR Schemes in Gaming StreamEvaluation of Quality of Experience of ABR Schemes in Gaming Stream
Evaluation of Quality of Experience of ABR Schemes in Gaming StreamAlpen-Adria-Universität
38 views34 slides
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue by
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlueCloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlueShapeBlue
135 views13 slides

Recently uploaded(20)

Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue by ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueElevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
ShapeBlue222 views
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue by ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueWhat’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
ShapeBlue263 views
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue by ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlueCloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
ShapeBlue135 views
LLMs in Production: Tooling, Process, and Team Structure by Aggregage
LLMs in Production: Tooling, Process, and Team StructureLLMs in Production: Tooling, Process, and Team Structure
LLMs in Production: Tooling, Process, and Team Structure
Aggregage42 views
Optimizing Communication to Optimize Human Behavior - LCBM by Yaman Kumar
Optimizing Communication to Optimize Human Behavior - LCBMOptimizing Communication to Optimize Human Behavior - LCBM
Optimizing Communication to Optimize Human Behavior - LCBM
Yaman Kumar38 views
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P... by ShapeBlue
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...
ShapeBlue194 views
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue by ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueVNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
ShapeBlue203 views
The Role of Patterns in the Era of Large Language Models by Yunyao Li
The Role of Patterns in the Era of Large Language ModelsThe Role of Patterns in the Era of Large Language Models
The Role of Patterns in the Era of Large Language Models
Yunyao Li85 views
Business Analyst Series 2023 - Week 4 Session 7 by DianaGray10
Business Analyst Series 2023 -  Week 4 Session 7Business Analyst Series 2023 -  Week 4 Session 7
Business Analyst Series 2023 - Week 4 Session 7
DianaGray10139 views
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ... by ShapeBlue
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
ShapeBlue126 views
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading... by The Digital Insurer
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...
Transcript: Redefining the book supply chain: A glimpse into the future - Tec... by BookNet Canada
Transcript: Redefining the book supply chain: A glimpse into the future - Tec...Transcript: Redefining the book supply chain: A glimpse into the future - Tec...
Transcript: Redefining the book supply chain: A glimpse into the future - Tec...
BookNet Canada41 views
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online by ShapeBlue
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineKVM Security Groups Under the Hood - Wido den Hollander - Your.Online
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online
ShapeBlue221 views
The Power of Heat Decarbonisation Plans in the Built Environment by IES VE
The Power of Heat Decarbonisation Plans in the Built EnvironmentThe Power of Heat Decarbonisation Plans in the Built Environment
The Power of Heat Decarbonisation Plans in the Built Environment
IES VE79 views
NTGapps NTG LowCode Platform by Mustafa Kuğu
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform
Mustafa Kuğu423 views

Introduction to Self-Sovereign Identity

  • 1. Introduction to Self-Sovereign Identity INTERNET IDENTITY WORKSHOP | SPRING 2020
  • 2. Nice to Meet You WELCOME AGENDAHOSTS Karyl Fowler CEO @Transmute @TheKaryl karyl@transmute.industries Juan Caballero Comms / Research @Spherity GmbH @by_caballero juan.caballero@spherity.com 1. Two Tales: Self-Sovereign Identity 2. SSI: The Movement 3. SSI: The Technology 4. Pairing the Two: Uses & Applications 5. Where to Learn More & Get Involved 6. Audience Q&A 2
  • 3. Self-Sovereign Identity (SSI) TWO PARTS The Movement The Technology 3
  • 4. The Movement SELF – SOVEREIGN IDENTITY Influential writers and essayists: - Kim Cameron (“Laws of Identity”, 2005) - Doc Searls (co-founded IIW in 2005 with...) - Kaliya Young (...who gives this talk some years!) - Christopher Allen (author of “10 principles” and of slide #6!) 4
  • 5. Shared Ideals THE MOVEMENT Data Sovereignty 21st Century Governance & Policy21st Century Business Practices Decentralized Identity / SSI Decentralization, Shared data, Open source Open data, Data rights Privacy-by-design, Open standards & protocols, Data unions, Rights to Repair & Portability Radical Transparency & Auditability, Ecosystem design, Mechanism design, Incentive engineering Multi-stakeholder data controls, Differential privacy, Data accountability, revocable anonymity Digital-first, Trust economics 5
  • 6. Key characteristics: • Minimum Disclosure • Full Control • Necessary Proofs • Legally-Enabled 6 Key characteristics: • Anonymity • Web of Trust • Censorship Resistance • Defend Human Rights vs. Powerful Actors (nation states, multi-national corps, mafias, etc.) * Originally coined by Tim Bouma (@trbouma) https://medium.com/@trbouma/less-identity-65f65d87f56b CC BY-SA 4.0 Less Identity + Trustless Identity TWO MAJOR TRACKS Or more properly “Trust Minimized” Identity “Legally-Enabled Self-Sovereign” Identity* SLIDE CREDIT: CHRISTOPHER ALLEN’S ODYSSEY PRESENTATION 2020
  • 7. 7 The Technology SELF – SOVEREIGN IDENTITY
  • 8. Identity is the gene of software applications. 8 ©TRANSMUTE | ALL RIGHTS RESERVED.
  • 9. Centralized Identity EXISTING WAY OF DOING THINGS 9 Our “identities” (assembling into “profiles”) are stored away on the servers of identity providers, which own the structure, the content, and the access rights to everything we do. They lend us a key, but they can change the locks, or throw away the contents. We are but lowly subjects of the data barons.
  • 10. Federated Identity EXISTING WAY OF DOING THINGS 2.0 10 By linking together silos into a “federation,” managers of businesses, platforms and services can outsource the “ID checks” at the door, making them interchangeable and interoperable. Authentication is tricky business, and most relying parties are happy to offload this headache… ...onto ever more powerful middlemen who now hold richer, multi-silo identities on all of us in exchange for this convenience. Single-Sign On makes the data barons into data emperors.
  • 11. Today’s Problems PAST WAY OF DOING THINGS CAUSED 11 • Usage data collected to create detailed profiles with all-or-nothing access • Who owns user data & decides how it’s used? • Difficult to delegate or attenuate access or privileges dynamically • Users can’t control how their data is secured or shared (or notified if there is a breach) • Single points of failure and honeypots everywhere • Usernames + Password databases are an attack surface • Data bloat: businesses taking on liability for more data than they need • There is no identity layer that persists across all systems • Lacking data portability SLIDE INSPIRATION: HEATHER VESCENT + KIM HAMILTON DUFFY + KALIYA YOUNG
  • 12. Decentralized Identity WEB 3.0 WAY OF DOING THINGS Blockchains and DLTs aren’t perfect, but they’re the best way currently stable and production-ready for self-publishing and self-controlling the cryptographic keys for our identity. Some work (such as KERI and Sidetree) are pushing the envelope on other ways of decentralizing public key infrastructure.
  • 13. Tech Foundations SELF – SOVEREIGN IDENTITY Decentralized Identifiers (DIDs): self-controlled, digital fingerprints assigned to people, entities, or things Verifiable Credentials (VCs): Like “files” but with granular controls baked in Resolvers (“Mini DNS”): can function as local namespaces (or not) Secure Data Storage (“lockers”): Extend granular controls to underlying data Cutting-edge Privacy-preserving Crypto: Zero-Knowledge, Differential Privacy, MPC, etc Wallets & Agents: Web interfaces beyond the “browser”/”app” paradigm 13
  • 14. A Decentralized Identifier (DID) is a new type of identifier that is globally unique, resolvable with high availability, and cryptographically verifiable. Decentralized Identifiers DEFINITION 14 https://w3c-ccg.github.io/did-primer/ The purpose of the DID document is to describe the public keys, authentication protocols, and service endpoints necessary to bootstrap cryptographically-verifiable interactions with the identified entity.
  • 15. >50 DID Methods Today DIFFERENT STROKES FOR DIFFERENT FOLKS 15 https://w3c-ccg.github.io/did-method-registry/
  • 16. A verifiable credential (VC) is a set of tamper-evident claims and metadata about real life achievements, qualifications, or attributes that includes a cryptographic proof about who issued it. Verifiable Credentials DEFINITION 16 https://www.w3.org/TR/vc-data-model/#credentials Examples of verifiable credentials include digital employee identification cards, digital birth certificates, and digital educational certificates, authentication and authorization bearer tokens, logistics or shipping certifications.
  • 17. • Reduce database security risks and business process risks • Give users increased to total control over their identity data and credentials • Increased data portability and near-global scope (for reputation and history) • Increase business efficiency through streamlined onboarding & auditing • Reduce fraud by confirming multiple data points • Streamline confirmation of compliance data/documentation • Increase trust of any verified data that must be shared downstream, in a form more persistent than the legal persons involved • Key use cases: Drug trials, Compliance documents, Provenance data DIDs + VCs Can... SO WHAT? 17 SLIDE INSPIRATION: HEATHER VESCENT + KIM HAMILTON DUFFY + KALIYA YOUNG
  • 18. FRAMEWORK FOR ADOPTION 1. Is selective disclosure or privacy a priority? 2. Is there high coordination burden? 3. Is traceability or auditability important? Application Areas Chains of Custody Commercial + Defense Supply Chain Logistics Cold Chain (pharma to agriculture) Contract Management (Legal, HR, Real Estate) Software Data Infrastructure & Governance_ Cloud roles + access management_ Microservices monitoring_ Telco 5G + IoT Enablement Identity/Data-as-a-Service Anti-Fraud (verification + roaming) Healthcare_ Insurance + Billing_ Patient-centric data sharing + management_ 18©TRANSMUTE | ALL RIGHTS RESERVED.
  • 19. Ideas (2-10 years) Incubation (6-18 months) Refinement (1-3 years) Standardization (~18-24 months) Conversations Whitepapers, position papers Experiments, Specifications, Pilots Standards W3C Community Groups Rebooting the Web of Trust 19 SLIDE CREDIT: HEATHER VESCENT @ THE PURPLE TORNADO Get Involved RESOURCES
  • 20. Primary Sources: • W3C Credentials Community Group • DIF Working Group Records • Rebooting the Web of Trust Conference, Proceedings & Digests • Internet Identity Workshop (You are here) Conf & Notes Secondary Sources & Commentaries: • 2019 IIW Intro to SSI Deck by Heather Vescent + Karyl Fowler + Lucas Tétreault • 2018 IIW Intro to SSI Deck by Heather Vescent + Kim Hamilton Duffy • 2018 IIW Intro to SSI Deck by Drummond Reed + • Infominer’s Resources: https://decentralized-id.com/ • The Purple Tornado reports for US DHS (2019) • PSA (Privacy, Surveillance, Anonymity) Podcast (Kaliya Young, Seth Goldstein) • SSIMeetup Webinar series (Alex Preukschat) • Definitely Identity podcast (Tim Bouma) • One World Identity (“KNOW”) Podcast • MyData Slack and Conference series • CyberForge (includes some great posts by Anil John, US DHS S&T) • Transmute TechTalk: On Enterprise Use + Integrations Monographs: • Comprehensive Guide to Self Sovereign Identity (2019) - Heather Vescent / Kaliya Young • Spherity’s SSI 101 Series on Medium (2020) - Juan Caballero • Self Sovereign Identity (2021) - Alex Preukschat / Drummond Reed Technical Resources: • W3C DID Specification & Use Case guidance • W3C VC Data Model Specification • Digital Credential Consortium whitepaper (Kim Hamilton Duffy) • Secure Data Storage Specification WG (DIF-W3C) • Credential Handler API (CHAPI) • Universal Resolver (Danube Tech) • Trust Over IP Foundation (TBD) • DIDcomm WG (DIF-W3C) • Aries RFCs (Hyperledger) 20 Knowledge Bases + Education REFERENCES