Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

21st Century Digital Citizenship Presentation

177 views

Published on

Presentation from the Track Deep Dive in preparation for Odyssey Hackathon 2019.

Published in: Software
  • Be the first to comment

  • Be the first to like this

21st Century Digital Citizenship Presentation

  1. 1. Odyssey Track Deep Dive 21st Century Digital Citizenship February 8 Ministry of the Interior The Hague
  2. 2. Wouter Welling Coordinating policy officer Ministery of the Interior and Kingdom relations Your host of today
  3. 3. 13.30 Welcome and vision of the Dutch Ministry of the Interior and Kingdom Relations (Marieke van Wallenburg, directeur-generaal Overheidsorganisatie at the Ministry of the Interior) 13.45 The Odyssey Hackathon – What can you achieve by participating? (Rutger van Zuidam – CEO of DutchChain & Odyssey) 14.00 Why is decentralized digital identity important for the future of a country? What are the next technical and societal steps in Digital Identity? (Alex Preukschat, Director of Strategic Blockchain Projects at Evernym) Prepare by reading Alex his thoughts on Self Sovereign Identity and the key differentiator between Blockchain and DLT believers on Medium. 14.20 Developments in the self-sovereign identity domain – working on an open ledger infrastructure for identity. (Paco Garcia, CTO at Yoti) 14.35 Challenge 1 by the Dutch Ministry for the Interior – Presentation and Q&A: Next Gen Government Backed Digital ID (Hans-Rob de Reus, senior advisor at the Dutch Ministry for the Interior) Program Overview
  4. 4. 15.00 Coffee Break 15.15 Open data and data sharing under the GDPR – Current and near future blockchain and AI developments (Silvan Jongerius, Managing Partner at TechGDPR) 15.35 Challenge 2 by the Dutch Ministry for the Interior – Presentation and Q&A: The Privacy Breach Detector (Paul Suijkerbuik, Open Data Expert at Dutch Ministry for the Interior) 16.00 The vision for Odyssey’s future development – becoming a Tokenized Digital Innovation Infrastructure (Rutger van Zuidam – CEO of DutchChain & Odyssey) 16.30 Challenge Presentation and Q&A: Tokenizing the Odyssey Ecosystem (Abe Scholte, Tokenization Lead at Odyssey) 17.00 Drinks & Bites – Ample time to Connect
  5. 5. Marieke van Wallenburg Directeur-generaal Overheidsorganisatie at the Ministry of the Interior 7 Welcome and vision of The Dutch Ministry of the Interior and Kingdom Relations 8 februari 2019 | Track Deep Dive
  6. 6. Rutger Van Zuidam CEO of DutchChain & Odyssey THE ODYSSEY HACKATHON What can you achieve by participating?
  7. 7. We believe…. technology like blockchain, crypto currencies, AI, IOT, open digital public infrastructure and the digital commons can unlock completely new ways of interconnected mass collaboration to establish the breakthrough progress we need in all fields of our society and all sectors of our economy.
  8. 8. Ecosystem transformation
  9. 9. Odyssey Hackathon 11-15 April 2019 Thursday April 11: Arrive and register in Groningen Masterclasses Opening party in DOT
  10. 10. Odyssey Hackathon 11-15 April 2019 Friday April 12: Grand opening Validate & pivot Saturday April 13: Go go go! Sunday April 14: Jury assessment
  11. 11. Monday April 15: Acceleration Conference Odyssey Hackathon 11-15 April 2019
  12. 12. Team selection Ultimate deadline to register February 25
  13. 13. Alex Preukschat Director of Strategic Blockchain Projects at Evernym Why is Decentralized Digital Identity Important for The Future of a Country? What are the next technical and societal steps in Digital Identity?
  14. 14. Self-Sovereign Identity (SSI) — From Identity to Money Identity is the new money Alex Preukschat — Global Head Strategic Blockchain Projects, Evernym @AlexPreukschat | alex.preukschat@evernym.com | February 2018
  15. 15. The Challenge of Now Technology — Artificial Intelligence/Cognitive Analytics, Drones, IoT, Blockchain, Robot Process Automation, new payment methods, etc. Regulatory pressure Digital natives — The native digital customer has high expectations and less patience NewTech — The deconstruction of the value chain and the birth of new business models Everyone is your competitor — Competition without limits Monetary policy
  16. 16. PAPER IS THE GLOBAL STANDARD FOR CREDENTIALS SAYS WHO?
  17. 17. No global digital standard: BUT IT DOESN’T WORK IN CYBERSPACE THE DIGITAL WORLD HAS NO EQUIVALENT FOR PAPER CREDENTIALS
  18. 18. invented established
  19. 19. DIGITAL VERIFIABLE CREDENTIALS JUST LIKE TODAY, BUT DIGITAL, MORE SECURE, AND GLOBAL
  20. 20. BITCOIN is decentralized money. ETHEREUM is decentralized applications. SOVRIN is decentralized identity.
  21. 21. These Are Some Of The People Building It
  22. 22. PUBLIC BLOCKCHAINS BLOCKCHAIN STACK Source: Joel Monegro USV The Blockchain Application Stack etc
  23. 23. Connector Public or Private Blockchains? PUBLIC BLOCKCHAINS etc Permissionless Permissioned / Private Blockchains DLT Distributed Ledger Technology Connector
  24. 24. Blockchain: Access and Validation Permissionless Permissioned /DLT ACCESS PrivatePublic VALIDATION Non applicable
  25. 25. Low trust vs. High trust in institutions. A question of censorship resistance? Network/Governance More decentralized Nodes “Anonymous” or Pseudonymous Low trust in institutions More censorship resistant “Everybody” votes With token Network/Governance Less decentralized Nodes identified High trust in institutions Less censorship resistant Few vote Usually without token Low Trust in institutions High Trust in institutionsTrust Public Blockchain/ Permissionless Private Blockchain/ DLT/ Permissioned Hybrid Blockchain/ Semi- public Public-Permissioned CC BY SA by @AlexPreukschat
  26. 26. Why do we have money?
  27. 27. How do we define money? 1. Scarcity 2. Durability 3. Homogenous 4. Divisible 5. Transportable 6. Storable 7. Difficult to fake Characteristics 1. Store of value 2. Medium of exchange 3. Unit of account Functions
  28. 28. How much time do we have?
  29. 29. The world is a network of 7 billion nodes
  30. 30. Want to learn about decentralization?
  31. 31. @AlexPreukschat @LibroBlockchain @BlockchainES www.BlockchainEspana.com www.LibroBlockchain.com www.AlianzaBlockchain.org
  32. 32. www.IdentityBook.info @IdentityBookHQ www.SSIMeetup.org @SSIMeetup @AlexPreukschat
  33. 33. Paco Garcia CTO at Yoti Developments in The Self- sovereign Identity Domain Working on an open ledger infrastructure for identity
  34. 34. Odyssey 2019 / Identity Track Distributed Identity / Paco Garcia - CTO
  35. 35. Who we are Installs with over 8,000 per day Global reach, government issued IDs from 160+ countries London HQ, office in Bangalore, launching in US, Canada person team from around the world 3.1 m Privately funded investment to date Bank level encryption ‘Privacy by Design’ Multi-award winning Cross industry uses: from government to businesses to charities $50 m 230+
  36. 36. Who really owns your identity online?
  37. 37. Who really owns your identity online?
  38. 38. Who really owns your identifiers? ID Global / Unique Owner Paco No No one Alreadytaken@gmail.co m Yes User < gmail < google < .com TLD < Root DNS Servers (+44)3133731337 Yes User < Phone operator < OFCOM
  39. 39. did:libre:f84ee5b09eac407da54 DID: Distributed Identifier
  40. 40. did:libre:f84ee5b09eac407da54 Public KeyPrivate Key DID: Distributed Identifier
  41. 41. did:libre:f84ee5b09eac407da54 Public Key Service Endpoint Private Key DID: Distributed Identifier
  42. 42. DID: Distributed Identifier did:libre:f84ee5b09eac407da54 { "@context":"https://w3id.org/did/v1", "id":"did:libre:f84ee5b09eac407da54", "authentication": [{ "id":"did:yoti:f84ee5b09eac407da54#keys-1", "type": "Rsa4096", "controller":"did:libre:f84ee5b09eac407da54", "publicKeyPem": "-----BEGIN PUBLIC KEY...ABC-----rn" }], ”recovery": [{ ”did":"did:libre:bdca4e59e0d541d1#keys-1" }], "service": [{ "type": "AuthService", "serviceEndpoint":"https://yoti.com/auth/f84ee5b09eac407da" }] }
  43. 43. DIDs are Interoperable
  44. 44. Use Case Login did:libre:f84ee5b09eac407da54
  45. 45. Use Case Login did:libre:f84ee5b09eac407da54 Public Key Authentication Service Endpoint
  46. 46. Use Case Login did:libre:f84ee5b09eac407da54 Public Key Authentication Service Endpoint
  47. 47. did:libre:f84ee5b09eac407da54 { "@context":"https://w3id.org/did/v1", "id":"did:libre:f84ee5b09eac407da54", "authentication": [{ "id":"did:yoti:f84ee5b09eac407da54#keys-1", "type": "Rsa4096", "controller":"did:libre:f84ee5b09eac407da54", "publicKeyPem": "-----BEGIN PUBLIC KEY...ABC----- rn" }], ”recovery": [{ ”did":"did:libre:bdca4e59e0d541d1#keys-1" }], "service": [{ "type": "AuthService", "serviceEndpoint":"https://yoti.com/auth/f84ee5b09 eac407da" }] } did:libre:f84ee5b09eac407da54 { "@context":"https://w3id.org/did/v1", "id":"did:libre:f84ee5b09eac407da54", "authentication": [{ "id":"did:yoti:f84ee5b09eac407da54#keys-1", "type": "Rsa4096", "controller":"did:libre:f84ee5b09eac407da54", "publicKeyPem": "-----BEGIN PUBLIC KEY...XYZ-----rn" }], ”recovery": [{ ”did":"did:libre:bdca4e59e0d541d1#keys-1" }], "service": [{ "type": "AuthService", "serviceEndpoint":"https://yoti.com/auth/f84ee5b09 eac407da" }] } BLOCK N BLOCK N+1
  48. 48. Use Case Recovered DID did:libre:f84ee5b09eac407da54 Public Key Authentication Service Endpoint
  49. 49. Because Identity is more than just identifiers: Verifiable claims
  50. 50. Mobile app installs adsExamples of Yoti across mu GOVERNMENT EMPLOYER EMAIL PROVIDER Pub Pub Pub Pub Alice’s secure identity container Pub Pub Pub Pub PUBLIC LEDGER Verifiable claims – Privacy by design
  51. 51. Mobile app installs adsExamples of Yoti across mu GOVERNMENT EMPLOYER EMAIL PROVIDER Pub Pub Pub Pub Alice’s master secretAlice’s secure identity container Pub Pub Pub Pub PUBLIC LEDGER Verifiable claims – Privacy by design
  52. 52. Mobile app installs adsExamples of Yoti across mu GOVERNMENT EMPLOYER EMAIL PROVIDER Pub Pub Pub Pub Alice’s master secretAlice’s secure identity container Pub Pub Pub Pub PUBLIC LEDGER A B C D Verifiable claims – Privacy by design
  53. 53. Mobile app installs adsExamples of Yoti across mu GOVERNMENT EMPLOYER EMAIL PROVIDER A B C D Pub Pub Pub Pub Alice’s master secretAlice’s secure identity container A B C D Pub Pub Pub Pub PUBLIC LEDGER Verifiable claims – Privacy by design
  54. 54. Mobile app installs adsExamples of Yoti across mu GOVERNMENT EMPLOYER EMAIL PROVIDER A B C D Pub Pub Pub Pub Alice’s master secretPrivat e ledger Alice’s secure identity container A B C D Pub Pub Pub Pub PUBLIC LEDGER Verifiable claims – Privacy by design
  55. 55. Mobile app installs adsExamples of Yoti across mu GOVERNMENT EMPLOYER EMAIL PROVIDER A B C D Zero Knowledge Proof Disclosure Pub Pub Pub Pub Alice’s master secretAlice’s secure identity container A B C D Pub Pub Pub Pub PUBLIC LEDGER Privat e ledger Verifiable claims – Privacy by design
  56. 56. Facial Recognition Age Scan Facial Anti-spoofing Face Scan Behavioural biometrics Lip reading biometrics What about biometrics? Speaker Identification
  57. 57. Yoti is the new way to prove your identity 3.1 MILLION downloads Thank you!
  58. 58. Hans-Rob de Reus Senior advisor at the Dutch Ministry for the Interior Challenge 1 by the Dutch Ministry for The Interior - Presentation and Q&A Next Gen Government Backed Digital ID
  59. 59. Next Gen Digital ID
  60. 60. Next Gen Digital ID AMBITION Our ambition is for all citizens in The Netherlands to be able to prove their identity (provide attributes) on the internet with a high level of trust and ease of use.
  61. 61. Next Gen Digital ID THE CHALLENGE Creating a potentially Dutch government-backed next-generation digital identity for adoption throughout Europe, with the citizen, not the government, as the starting point. The Dutch Ministry of the Interior challenges you to come up with a truly new approach to reliably, easily establishing a digital identity (using real- world identification such as a passport). To enable widespread testing in practice and, if successful, in order for the Dutch government to confirm and present the solution as suitable for private markets throughout Europe, it must potentially function on all devices commonly owned by the general public, empower the citizen (user) to have control over their own attributes and the level of the system/bridge must be ‘substantial’(level Substantial eIDAS). Let me explain the above a bit more….
  62. 62. Next Gen Digital ID The challenge in a nutshell myTax myPension myeHealth BSN BSN BSN BSN 13,5 mln citizens BSN = Citizen (Burger) Service Number Develop an App that delivers the attribute BSN on a level of assurance eIDAS Substantial in the C2G domain. Optional: • lastname • firstname • date of birth • … C2B C2G
  63. 63. Next Gen Digital ID What is the starting point in NL? Citizen Administration BSN = Citizen (Burger) Service Number myTax myPension myeHealth BSN BSN BSN Show your identity online C2G BSN ✓ 13,5 mln users (NL population 17 mln) ✓ 280 mln authentications per year ✓ more than 600 connected organizations BSN How many have a smartphone Show your identity
  64. 64. Next Gen Digital ID What is the starting point in NL? Citizen Administration BSN = Citizen (Burger) Service Number myTax myPension myeHealth BSN BSN BSN Show your identity online C2G BSN ✓ 13,5 mln users (NL population 17 mln) ✓ 280 mln authentications per year ✓ more than 600 connected organizations BSN How many have a smartphone Show your identity 1 2 3 4
  65. 65. Next Gen Digital ID Available assets for the challenge 1 Citizen Administration (stub) Available data: • passport photo • lastname • firstname • date of birth • place of birth • documentnumber ID • BSN 2 ID smartcards (specimen) Both contain a chip with NFC readable data: • passport photo • lastname • firstname • date of birth • place of birth • documentnumber ID • BSN BSN 3 4 User login for C2G (testaccounts) Bring your own smartphone
  66. 66. Next Gen Digital ID What is the challenge? Designing the onboarding process as a self service deployment AND meets the requirement of LoA eIDAS Substantial! The procedure to prove and verify the identity of a “Person” applying for the issuance of electronic identification means. Strong identity verification check in the onboarding process.
  67. 67. Next Gen Digital ID Suggested use cases 1. Initial onboarding: getting the BSN-attribute loaded in the App on LoA Substantial. 2. Using the App providing the BSN to a service provider 3. Losing/getting a new smartphone, loading the App again myTax myPension myeHealth BSN BSN BSN BSN
  68. 68. Next Gen Digital ID
  69. 69. COFFEE BREAK
  70. 70. Silvan Jongerius Managing Partner at TechGDPR Open Data and Data Sharing Under the GDPR Current and near future blockchain and AI developments
  71. 71. Challenge 2 by the Dutch Ministry for the Interior – Presentation and Q&A The Privacy Breach Detector Paul Suijkerbuik Open Data Expert at Dutch Ministry for the Interior
  72. 72. The Vision for Odyssey’s Future Development Becoming a Tokenized Digital Innovation Infrastructure Rutger van Zuidam CEO of DutchChain & Odyssey
  73. 73. <PROBLEM> Funding the digital commons
  74. 74. <PROBLEM> BUIDLRS, Investors and Users are misaligned for collaboration and mass adoption
  75. 75. <CURRENT MODEL> High (VC/ Startup) risk High stress High dependency on ownership Result?
  76. 76. <CHALLENGE> to create an investment vehicle that aligns investors with builders to drive mass adoption for new, ownerless protocols, while mitigating the risk of startup failure. to make the digital commons economically viable!
  77. 77. <IMAGINE>
  78. 78. DAO Concept: - Ownerless (No shares) - Open source - Certificates for votes - Certificates for revshare - Balanced stakehodlers - Capped multiplier - Non speculative - Regulated - Governance model
  79. 79. ENABLING Shared drive for adoption + lowest cost Collaboration between competitors Turning costs into revenuestream + asset Elimination of startup failure risks Merging and forking
  80. 80. <EXPLORATION> Token design(s) Dashboards PIPs Voting + review + approval system Market price adjusting mechanisms Interfaces
  81. 81. Challenge Presentation and Q&A Tokenizing the Odyssey Ecosystem Abe Scholte Tokenization Lead at Odyssey
  82. 82. <GOAL> Creating the prototype of a Protocol Investment Vehicle by creating a DAO/Tokenized Ecosystem
  83. 83. <ECOSYSTEMS> self-sustainable | community-driven | complex inter-connected | circular flow of energy & information
  84. 84. <TOKENS> Information carrier | who contributed what? transactions (of resources) | measures value
  85. 85. <TOKENS> Source: https://medium.com/paratii/on-the-immaturity-of-tokenized-value-capture-mechanisms-1fde33f2bc8e adapted by Ocean Protocol
  86. 86. <BUIDL TIME!> Team | Strategy | Tools
  87. 87. <TEAM>
  88. 88. Source: https://outlierventures.io/wp-content/uploads/2018/10/Token-Ecosystem-Creation-Outlier-Ventures-PDF.pdf
  89. 89. <STRATEGY>
  90. 90. <STRATEGY> Collaboration Think in complex systems Evidence based around experimentation Pragmatic not dogmatic Agile
  91. 91. Tom Wujec: Build a Tower, Build a Team
  92. 92. Source: tokenengineering.net <TOOLS>
  93. 93. Source: Michael Zargham | BlockScience
  94. 94. Entity Investment Vehicle <THE GOAL>
  95. 95. Entity Investment Vehicle Build to simulate/model the solution <THE GOAL>
  96. 96. Entity Investment Vehicle ? ? ? Build to simulate/model the solution Imagine / Explore and DESCRIBE <THE GOAL>
  97. 97. Source: XKCD | Efficiency
  98. 98. <A KIND REMINDER> Hackathon dates
  99. 99. The End of Plenary Program - Time to Connect REGISTER TODAY AT THE ODYSSEY STAND!

×