SlideShare a Scribd company logo
1 of 34
1
Returning to Online Privacy?
Dr. David Hyland-Wood
david@hyland-wood.org
5 November 2019
The people held the government,
but they did not hold the power.
“
”
When the missionaries came to Africa,
they had the Bible and we had the land.
They said “let us close our eyes and
pray.” When we opened them, we had
the Bible, and they had the land.
More Privacy
Less Privacy
MoreAnonymity
LessAnonymity
Anatomy of a Verifiable Credential
Verifiable Credential
Issuer Signature
ClaimsClaimsClaims
Credential Identifier
Credential MetadataCredential MetadataCredential Metadata
17
Verifiable Credentials Ecosystem
18
Issuer
(Website)
Government, Employer,
etc.
Verifier
(Website)
Company, Bank, etc.
Holder
(Digital Wallet /
Personal Data Store)
Citizen, Employee, etc.
Issue
Credentials
Present
Profiles
W3C Verifiable Credentials
19
The mission of the W3C Verifiable Claims Working Group:
Express credentials on the Web in a way that is
cryptographically secure, privacy respecting, and
automatically verifiable.
The laws of mathematics are very
commendable, but the only law that
applies in Australia is the law of Australia.“
The Web’s Identifier Problem
21
To date, every identifier you use online
does not belong to you; it belongs to
someone else.
This results in problems related to cost, data
portability, data privacy, and data security.
Why is this a problem?
22
500 Million guests
412 Million users
145 Million users
110 Million shoppers
3,000 Million users
Web Identifiers Today
23
Domain Name System
(Identifiers are leased to individuals)
Issuer
(Website)
Government, Employer,
etc.
Verifier
(Website)
Company, Bank, etc.
Holder
(Digital Wallet /
Personal Data Store)
Citizen, Employee, etc.
Issue
Credentials
Present
Profiles
What is missing?
24
Many portable identifiers for any person, organisation,
or thing that does not depend on a centralised
authority, are protected by cryptography, and enable
privacy and data portability.
Decentralised Identifiers
25
A new type of globally resolvable,
cryptographically-verifiable identifier, registered
directly on a distributed ledger or blockchain
What does a DID look like?
26
did:example:123456789abcdefghijk
Schem
e
DID
Method
DID Method Specific String
did:v1:nym:DwkYwcoyUXHNkpj3whn4DgXB4fcg9gj95vKxYN2apkZD
Example:
DIDs Resolve to DID Documents
27
{
"@context": "https://w3id.org/veres-one/v1",
"id": "did:v1:nym:DwkYwcoyUXHNkpj3whn4DgXB4fcg9gj95vKxYN2apkZD",
"authentication": [{
"type": "Ed25519SignatureAuthentication2018",
"publicKey": [{
"id": "did:v1:test:nym:DwkYwcoyUXHNkpj3whn4DgXB4fcg9gj95vKxYN2apkZD#authn-key-1",
"type": "Ed25519VerificationKey2018",
"owner": "did:v1:nym:DwkYwcoyUXHNkpj3whn4DgXB4fcg9gj95vKxYN2apkZD",
"publicKeyBase58": "DwkYwcoyUXHNkpj3whn4DgXB4fcg9gj95vKxYN2apkZD"
}]
}],
"service": [{
"type": "ExampleMessagingService",
"serviceEndpoint": ”https://example.com/services/messages”
}],
… more DID-specific information here …
}
1. Authentication Mechanisms
3. Service Discovery
2. Public Key Material
Decentralized Identifiers
28
Decentralized Identifiers
(Identifiers are owned by individuals)
Blockchains / DHTs
(Decentralized Ledger)
Veres One, Sovrin, Bitcoin, Ethereum, etc.
Issuer
(Website)
Government, Employer,
etc.
Verifier
(Website)
Company, Bank, etc.
Holder
(Digital Wallet /
Personal Data Store)
Citizen, Employee, etc.
Issue
Credentials
Present
Profiles
29
© 2018 Tim Whyatt
(David) Wheeler’s Law
All problems in computer science can be solved by
another level of indirection, but that will usually
(David) Wheeler’s Law
All problems in computer science can be solved by
another level of indirection, but that will usually
create another problem.
http://w3id.org/people/prototypo/talks/uq20191105
Acknowledgments
34
● Vintage 1984 movie poster modified from a version by Flikr user “book radio”, CC-BY-2.0 license,
https://www.flickr.com/photos/bookdio/14164592302
● Photo of the bombing of La Moneda (Chilean presidential palace) on 11 Sep 1973 by Biblioteca del Congreso Nacional, CC-BY-3.0-CL
license, https://commons.wikimedia.org/w/index.php?curid=16325488
● Photo of Salvador Allende, CC-BY-3.0-CL license, https://commons.wikimedia.org/wiki/File:Salvador_Allende_1952.JPG
● Salvador Allende quote from United States Congress, House Committee on Foreign Affairs (1789-1975), “Hearings, Reports and Prints of
the House Committee on Foreign Affairs”, U.S. Government Printing Office, 1975, pp 585
● Project Cybersyn operations room photo by Source, fair use due to historical significance (low resolution) for educational purposes,
https://en.wikipedia.org/w/index.php?curid=12937653,
https://en.wikipedia.org/wiki/Project_Cybersyn#/media/File:Cybersyn_control_room.jpg
● Nuremburg Laws illustration German Government (“Entwurf Willi Hackenberger”, “Copyright by Reichsausschuß für
Volksgesundheitsdienst”, government agency apparently part of the Reichs- und Preußisches Ministerium des Innern), in the public domain,
https://commons.wikimedia.org/wiki/File:Nuremberg_laws_Racial_Chart.jpg
● Photo of birth and death records in a family bible by Chuck Coker, CC BY-ND 2.0 license,
https://www.flickr.com/photos/caveman_92223/3288595909
● IDC projections from IDC White Paper, The Digitization of the World - From Edge to Core, Doc# US44413318, November 2018,
https://www.seagate.com/www-content/our-story/trends/files/idc-seagate-dataage-whitepaper.pdf
Acknowledgments
35
● Illustration of “Saltbush Bill's Second Fight” by Frank Mahony, The Antipodean, Public Domain,
https://commons.wikimedia.org/w/index.php?curid=37814122
● Illustration of Henry Lawson’s The Team by an unknown artist, The Australian Town and Country Journal, Public
Domain, https://en.wikipedia.org/wiki/The_Teams#/media/File:The_Teams_-_illo.png
● Brisbane City Hall photo by Tanya Dedyukhina, CC-BY-3.0 license,
https://commons.wikimedia.org/wiki/File:Brisbane_City_Hall_-_panoramio.jpg
● Photo of Desmond Tutu provided by Lavinia Browne under the public domain,
https://commons.wikimedia.org/wiki/File:Archbishop-Tutu-medium.jpg
● Desmond Tutu quote from Steven Gish, Desmond Tutu: A Biography, 2004, pp. 101 (although potentially
originally attributable to Rolf Hochhuth, The Deputy, a Christian tragedy, Grove Press, 1964, pp. 144)
● Credit cards photograph by Nick Youngson, CC BY-SA 3.0 license, http://www.picserver.org/c/credit-cards26.html
● Wiretap meme courtesy of Reddit user benjaminikuta, February 2018
● Privacy vs. Anonymity chart used by many, but possibly originally by Adam Ludwin, 20 January 2015,
https://coincenter.org/entry/how-anonymous-is-bitcoin
Copyright and Trademark Attribution
36
Corporate logos used in this presentation are the registered trademarks of their
respective companies.
Logos are used for educational purposes only under fair use provisions of
copyright law. The lowest resolution visible to the audience was used.

More Related Content

What's hot

Towards the decentralisation of personal data through blockchains and linked ...
Towards the decentralisation of personal data through blockchains and linked ...Towards the decentralisation of personal data through blockchains and linked ...
Towards the decentralisation of personal data through blockchains and linked ...John Domingue
 
Future of AI: Blockchain and Deep Learning
Future of AI: Blockchain and Deep LearningFuture of AI: Blockchain and Deep Learning
Future of AI: Blockchain and Deep LearningMelanie Swan
 
UKSG webinar: Blockchain in research and education with Martin Hamilton, Jisc
UKSG webinar: Blockchain in research and education with Martin Hamilton, JiscUKSG webinar: Blockchain in research and education with Martin Hamilton, Jisc
UKSG webinar: Blockchain in research and education with Martin Hamilton, JiscUKSG: connecting the knowledge community
 
Blockchain Smartnetworks: Bitcoin and Blockchain Explained
Blockchain Smartnetworks: Bitcoin and Blockchain ExplainedBlockchain Smartnetworks: Bitcoin and Blockchain Explained
Blockchain Smartnetworks: Bitcoin and Blockchain ExplainedMelanie Swan
 
Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...
Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...
Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...Alexia Maddox
 
MERRILL LYNCH PLOTS BITCOIN’S PATH TO GLOBAL LEGITIMACY
MERRILL LYNCH PLOTS BITCOIN’S PATH TO GLOBAL LEGITIMACYMERRILL LYNCH PLOTS BITCOIN’S PATH TO GLOBAL LEGITIMACY
MERRILL LYNCH PLOTS BITCOIN’S PATH TO GLOBAL LEGITIMACYSteven Rhyner
 
COVID-19 Antibody Test+Vaccination Certificates: There's an app for that
COVID-19 Antibody Test+Vaccination Certificates: There's an app for thatCOVID-19 Antibody Test+Vaccination Certificates: There's an app for that
COVID-19 Antibody Test+Vaccination Certificates: There's an app for thatmeisenstadt
 
Master of Sheets: A Tale of Compromised Cloud Documents
Master of Sheets: A Tale of Compromised Cloud DocumentsMaster of Sheets: A Tale of Compromised Cloud Documents
Master of Sheets: A Tale of Compromised Cloud DocumentsJeremiah Onaolapo
 
Blockchain Economics
Blockchain EconomicsBlockchain Economics
Blockchain EconomicsMelanie Swan
 
Blockchain Singularities
Blockchain SingularitiesBlockchain Singularities
Blockchain SingularitiesMelanie Swan
 
GOLDMAN SACHS: BLOCKCHAIN IS READY FOR CENTRE STAGE
GOLDMAN SACHS: BLOCKCHAIN IS READY FOR CENTRE STAGEGOLDMAN SACHS: BLOCKCHAIN IS READY FOR CENTRE STAGE
GOLDMAN SACHS: BLOCKCHAIN IS READY FOR CENTRE STAGESteven Rhyner
 
Blockchain Landscape Report 2019
Blockchain Landscape Report 2019Blockchain Landscape Report 2019
Blockchain Landscape Report 2019[x]cube LABS
 
Supply Chain Management using Blockchain
Supply Chain Management using BlockchainSupply Chain Management using Blockchain
Supply Chain Management using BlockchainYugn27
 
Overview of blockchain technology and architecture
Overview of blockchain technology and   architectureOverview of blockchain technology and   architecture
Overview of blockchain technology and architectureEY
 
Blockchain Smartnetworks
Blockchain Smartnetworks Blockchain Smartnetworks
Blockchain Smartnetworks Melanie Swan
 
Blockchain for Executives, Entrepreneurs and Investors
Blockchain for Executives, Entrepreneurs and InvestorsBlockchain for Executives, Entrepreneurs and Investors
Blockchain for Executives, Entrepreneurs and InvestorsFenbushi Capital
 
Web tracking and privacy law
Web tracking and privacy lawWeb tracking and privacy law
Web tracking and privacy lawJoe Mornin
 
Blockchain and Beyond
Blockchain and BeyondBlockchain and Beyond
Blockchain and Beyondijtsrd
 
Social Media Copyright Management using Semantic Web and Blockchain
Social Media Copyright Management  using Semantic Web and BlockchainSocial Media Copyright Management  using Semantic Web and Blockchain
Social Media Copyright Management using Semantic Web and BlockchainRoberto García
 

What's hot (20)

Towards the decentralisation of personal data through blockchains and linked ...
Towards the decentralisation of personal data through blockchains and linked ...Towards the decentralisation of personal data through blockchains and linked ...
Towards the decentralisation of personal data through blockchains and linked ...
 
Future of AI: Blockchain and Deep Learning
Future of AI: Blockchain and Deep LearningFuture of AI: Blockchain and Deep Learning
Future of AI: Blockchain and Deep Learning
 
UKSG webinar: Blockchain in research and education with Martin Hamilton, Jisc
UKSG webinar: Blockchain in research and education with Martin Hamilton, JiscUKSG webinar: Blockchain in research and education with Martin Hamilton, Jisc
UKSG webinar: Blockchain in research and education with Martin Hamilton, Jisc
 
Blockchain Smartnetworks: Bitcoin and Blockchain Explained
Blockchain Smartnetworks: Bitcoin and Blockchain ExplainedBlockchain Smartnetworks: Bitcoin and Blockchain Explained
Blockchain Smartnetworks: Bitcoin and Blockchain Explained
 
Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...
Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...
Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...
 
MERRILL LYNCH PLOTS BITCOIN’S PATH TO GLOBAL LEGITIMACY
MERRILL LYNCH PLOTS BITCOIN’S PATH TO GLOBAL LEGITIMACYMERRILL LYNCH PLOTS BITCOIN’S PATH TO GLOBAL LEGITIMACY
MERRILL LYNCH PLOTS BITCOIN’S PATH TO GLOBAL LEGITIMACY
 
COVID-19 Antibody Test+Vaccination Certificates: There's an app for that
COVID-19 Antibody Test+Vaccination Certificates: There's an app for thatCOVID-19 Antibody Test+Vaccination Certificates: There's an app for that
COVID-19 Antibody Test+Vaccination Certificates: There's an app for that
 
Master of Sheets: A Tale of Compromised Cloud Documents
Master of Sheets: A Tale of Compromised Cloud DocumentsMaster of Sheets: A Tale of Compromised Cloud Documents
Master of Sheets: A Tale of Compromised Cloud Documents
 
Blockchain Economics
Blockchain EconomicsBlockchain Economics
Blockchain Economics
 
Blockchain Singularities
Blockchain SingularitiesBlockchain Singularities
Blockchain Singularities
 
GOLDMAN SACHS: BLOCKCHAIN IS READY FOR CENTRE STAGE
GOLDMAN SACHS: BLOCKCHAIN IS READY FOR CENTRE STAGEGOLDMAN SACHS: BLOCKCHAIN IS READY FOR CENTRE STAGE
GOLDMAN SACHS: BLOCKCHAIN IS READY FOR CENTRE STAGE
 
Blockchain Landscape Report 2019
Blockchain Landscape Report 2019Blockchain Landscape Report 2019
Blockchain Landscape Report 2019
 
Supply Chain Management using Blockchain
Supply Chain Management using BlockchainSupply Chain Management using Blockchain
Supply Chain Management using Blockchain
 
Overview of blockchain technology and architecture
Overview of blockchain technology and   architectureOverview of blockchain technology and   architecture
Overview of blockchain technology and architecture
 
Blockchain Smartnetworks
Blockchain Smartnetworks Blockchain Smartnetworks
Blockchain Smartnetworks
 
Blockchain for Executives, Entrepreneurs and Investors
Blockchain for Executives, Entrepreneurs and InvestorsBlockchain for Executives, Entrepreneurs and Investors
Blockchain for Executives, Entrepreneurs and Investors
 
Web tracking and privacy law
Web tracking and privacy lawWeb tracking and privacy law
Web tracking and privacy law
 
Blockchain and Beyond
Blockchain and BeyondBlockchain and Beyond
Blockchain and Beyond
 
Blockchain v Cryptocurrency: Talk for BridgeSF
Blockchain v Cryptocurrency: Talk for BridgeSF Blockchain v Cryptocurrency: Talk for BridgeSF
Blockchain v Cryptocurrency: Talk for BridgeSF
 
Social Media Copyright Management using Semantic Web and Blockchain
Social Media Copyright Management  using Semantic Web and BlockchainSocial Media Copyright Management  using Semantic Web and Blockchain
Social Media Copyright Management using Semantic Web and Blockchain
 

Similar to Returning to Online Privacy?

Privacy in the Smart City
Privacy in the Smart CityPrivacy in the Smart City
Privacy in the Smart CityDavid Wood
 
Masterclass on the DID Universal Resolver
Masterclass on the DID Universal ResolverMasterclass on the DID Universal Resolver
Masterclass on the DID Universal ResolverMarkus Sabadello
 
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...Pw Carey
 
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...Pw Carey
 
G32 Wiki Leaks Social Media & Whistleblowers The Future Of It Auditing A ...
G32 Wiki Leaks Social Media & Whistleblowers The Future Of It Auditing A ...G32 Wiki Leaks Social Media & Whistleblowers The Future Of It Auditing A ...
G32 Wiki Leaks Social Media & Whistleblowers The Future Of It Auditing A ...Pw Carey
 
Science B.0 Blockchain, Cryptoeconomics and autonomous agents
Science B.0 Blockchain, Cryptoeconomics and autonomous agentsScience B.0 Blockchain, Cryptoeconomics and autonomous agents
Science B.0 Blockchain, Cryptoeconomics and autonomous agentsSoenke Bartling
 
Blockchain for Land Records and Real Estate
Blockchain for Land Records and Real EstateBlockchain for Land Records and Real Estate
Blockchain for Land Records and Real EstateJohn Mirkovic
 
ODI 2015 06 opentech - Gavin Starks
ODI 2015 06 opentech - Gavin StarksODI 2015 06 opentech - Gavin Starks
ODI 2015 06 opentech - Gavin StarkstheODI
 
Verifiable Credentials in Self-Sovereign Identity (SSI)
Verifiable Credentials in Self-Sovereign Identity (SSI)Verifiable Credentials in Self-Sovereign Identity (SSI)
Verifiable Credentials in Self-Sovereign Identity (SSI)Evernym
 
Blockchain for Business: What, How, Why & USE CASES
Blockchain for Business: What, How, Why & USE CASESBlockchain for Business: What, How, Why & USE CASES
Blockchain for Business: What, How, Why & USE CASESmichaelmcgowan27
 
What Should The Public Sector Demand Jerry Fishenden 15.05.2009
What Should The Public Sector Demand   Jerry Fishenden 15.05.2009What Should The Public Sector Demand   Jerry Fishenden 15.05.2009
What Should The Public Sector Demand Jerry Fishenden 15.05.2009Jerry Fishenden
 
net1.digital - Bitcoin & Blockchain Intro - Network-based money
net1.digital - Bitcoin & Blockchain Intro - Network-based moneynet1.digital - Bitcoin & Blockchain Intro - Network-based money
net1.digital - Bitcoin & Blockchain Intro - Network-based moneyBoris K. A. Reinhard
 
The Blockchain: Introduction and Implications
The Blockchain: Introduction and ImplicationsThe Blockchain: Introduction and Implications
The Blockchain: Introduction and ImplicationsMichael Lesniak
 
Data Con LA 2018 - From the Panama Papers by Mark Quinsland
Data Con LA 2018 - From the Panama Papers by Mark QuinslandData Con LA 2018 - From the Panama Papers by Mark Quinsland
Data Con LA 2018 - From the Panama Papers by Mark QuinslandData Con LA
 
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Black Duck by Synopsys
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitKaliya "Identity Woman" Young
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenienceDon Lovett
 
Privacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable ClaimsPrivacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable ClaimsDavid Wood
 
DID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
DID Resolution: Given a DID how do I retrieve its document? – Markus SabadelloDID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
DID Resolution: Given a DID how do I retrieve its document? – Markus SabadelloSSIMeetup
 
ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx
 ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx
ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docxarnit1
 

Similar to Returning to Online Privacy? (20)

Privacy in the Smart City
Privacy in the Smart CityPrivacy in the Smart City
Privacy in the Smart City
 
Masterclass on the DID Universal Resolver
Masterclass on the DID Universal ResolverMasterclass on the DID Universal Resolver
Masterclass on the DID Universal Resolver
 
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
 
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
 
G32 Wiki Leaks Social Media & Whistleblowers The Future Of It Auditing A ...
G32 Wiki Leaks Social Media & Whistleblowers The Future Of It Auditing A ...G32 Wiki Leaks Social Media & Whistleblowers The Future Of It Auditing A ...
G32 Wiki Leaks Social Media & Whistleblowers The Future Of It Auditing A ...
 
Science B.0 Blockchain, Cryptoeconomics and autonomous agents
Science B.0 Blockchain, Cryptoeconomics and autonomous agentsScience B.0 Blockchain, Cryptoeconomics and autonomous agents
Science B.0 Blockchain, Cryptoeconomics and autonomous agents
 
Blockchain for Land Records and Real Estate
Blockchain for Land Records and Real EstateBlockchain for Land Records and Real Estate
Blockchain for Land Records and Real Estate
 
ODI 2015 06 opentech - Gavin Starks
ODI 2015 06 opentech - Gavin StarksODI 2015 06 opentech - Gavin Starks
ODI 2015 06 opentech - Gavin Starks
 
Verifiable Credentials in Self-Sovereign Identity (SSI)
Verifiable Credentials in Self-Sovereign Identity (SSI)Verifiable Credentials in Self-Sovereign Identity (SSI)
Verifiable Credentials in Self-Sovereign Identity (SSI)
 
Blockchain for Business: What, How, Why & USE CASES
Blockchain for Business: What, How, Why & USE CASESBlockchain for Business: What, How, Why & USE CASES
Blockchain for Business: What, How, Why & USE CASES
 
What Should The Public Sector Demand Jerry Fishenden 15.05.2009
What Should The Public Sector Demand   Jerry Fishenden 15.05.2009What Should The Public Sector Demand   Jerry Fishenden 15.05.2009
What Should The Public Sector Demand Jerry Fishenden 15.05.2009
 
net1.digital - Bitcoin & Blockchain Intro - Network-based money
net1.digital - Bitcoin & Blockchain Intro - Network-based moneynet1.digital - Bitcoin & Blockchain Intro - Network-based money
net1.digital - Bitcoin & Blockchain Intro - Network-based money
 
The Blockchain: Introduction and Implications
The Blockchain: Introduction and ImplicationsThe Blockchain: Introduction and Implications
The Blockchain: Introduction and Implications
 
Data Con LA 2018 - From the Panama Papers by Mark Quinsland
Data Con LA 2018 - From the Panama Papers by Mark QuinslandData Con LA 2018 - From the Panama Papers by Mark Quinsland
Data Con LA 2018 - From the Panama Papers by Mark Quinsland
 
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web Summit
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenience
 
Privacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable ClaimsPrivacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable Claims
 
DID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
DID Resolution: Given a DID how do I retrieve its document? – Markus SabadelloDID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
DID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
 
ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx
 ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx
ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx
 

More from David Wood

Internet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchainInternet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchainDavid Wood
 
Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...
Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...
Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...David Wood
 
BlockSW 2019 Keynote
BlockSW 2019 KeynoteBlockSW 2019 Keynote
BlockSW 2019 KeynoteDavid Wood
 
Controlling Complexities in Software Development
Controlling Complexities in Software DevelopmentControlling Complexities in Software Development
Controlling Complexities in Software DevelopmentDavid Wood
 
Implementing the Verifiable Claims data model
Implementing the Verifiable Claims data modelImplementing the Verifiable Claims data model
Implementing the Verifiable Claims data modelDavid Wood
 
So You Wanna be a Startup CTO 20170301
So You Wanna be a Startup CTO 20170301So You Wanna be a Startup CTO 20170301
So You Wanna be a Startup CTO 20170301David Wood
 
Functional manipulations of large data graphs 20160601
Functional manipulations of large data graphs 20160601Functional manipulations of large data graphs 20160601
Functional manipulations of large data graphs 20160601David Wood
 
When Metaphors Kill
When Metaphors KillWhen Metaphors Kill
When Metaphors KillDavid Wood
 
Secularism in Australia
Secularism in AustraliaSecularism in Australia
Secularism in AustraliaDavid Wood
 
Meditations on Writing in Paradoxes, Oxymorons, and Pleonasms
Meditations on Writing in Paradoxes, Oxymorons, and PleonasmsMeditations on Writing in Paradoxes, Oxymorons, and Pleonasms
Meditations on Writing in Paradoxes, Oxymorons, and PleonasmsDavid Wood
 
Building a writer's platform with social media
Building a writer's platform with social mediaBuilding a writer's platform with social media
Building a writer's platform with social mediaDavid Wood
 
Summary of the Hero's Journey
Summary of the Hero's JourneySummary of the Hero's Journey
Summary of the Hero's JourneyDavid Wood
 
Open by Default
Open by DefaultOpen by Default
Open by DefaultDavid Wood
 
Lod Then, Now and Next 20110926
Lod Then, Now and Next 20110926Lod Then, Now and Next 20110926
Lod Then, Now and Next 20110926David Wood
 
Linked Data ROI 20110426
Linked Data ROI 20110426Linked Data ROI 20110426
Linked Data ROI 20110426David Wood
 
Introduction to Linked Data: RDF Vocabularies
Introduction to Linked Data: RDF VocabulariesIntroduction to Linked Data: RDF Vocabularies
Introduction to Linked Data: RDF VocabulariesDavid Wood
 
Introduction to Linked Data: RDF Vocabularies
Introduction to Linked Data: RDF VocabulariesIntroduction to Linked Data: RDF Vocabularies
Introduction to Linked Data: RDF VocabulariesDavid Wood
 
Introduction to Linked Data: RDF Vocabularies
Introduction to Linked Data: RDF VocabulariesIntroduction to Linked Data: RDF Vocabularies
Introduction to Linked Data: RDF VocabulariesDavid Wood
 
Intro to Linked Data: SPARQL
Intro to Linked Data: SPARQLIntro to Linked Data: SPARQL
Intro to Linked Data: SPARQLDavid Wood
 
Intro to Linked Data: Data Modeling
Intro to Linked Data: Data ModelingIntro to Linked Data: Data Modeling
Intro to Linked Data: Data ModelingDavid Wood
 

More from David Wood (20)

Internet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchainInternet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchain
 
Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...
Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...
Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...
 
BlockSW 2019 Keynote
BlockSW 2019 KeynoteBlockSW 2019 Keynote
BlockSW 2019 Keynote
 
Controlling Complexities in Software Development
Controlling Complexities in Software DevelopmentControlling Complexities in Software Development
Controlling Complexities in Software Development
 
Implementing the Verifiable Claims data model
Implementing the Verifiable Claims data modelImplementing the Verifiable Claims data model
Implementing the Verifiable Claims data model
 
So You Wanna be a Startup CTO 20170301
So You Wanna be a Startup CTO 20170301So You Wanna be a Startup CTO 20170301
So You Wanna be a Startup CTO 20170301
 
Functional manipulations of large data graphs 20160601
Functional manipulations of large data graphs 20160601Functional manipulations of large data graphs 20160601
Functional manipulations of large data graphs 20160601
 
When Metaphors Kill
When Metaphors KillWhen Metaphors Kill
When Metaphors Kill
 
Secularism in Australia
Secularism in AustraliaSecularism in Australia
Secularism in Australia
 
Meditations on Writing in Paradoxes, Oxymorons, and Pleonasms
Meditations on Writing in Paradoxes, Oxymorons, and PleonasmsMeditations on Writing in Paradoxes, Oxymorons, and Pleonasms
Meditations on Writing in Paradoxes, Oxymorons, and Pleonasms
 
Building a writer's platform with social media
Building a writer's platform with social mediaBuilding a writer's platform with social media
Building a writer's platform with social media
 
Summary of the Hero's Journey
Summary of the Hero's JourneySummary of the Hero's Journey
Summary of the Hero's Journey
 
Open by Default
Open by DefaultOpen by Default
Open by Default
 
Lod Then, Now and Next 20110926
Lod Then, Now and Next 20110926Lod Then, Now and Next 20110926
Lod Then, Now and Next 20110926
 
Linked Data ROI 20110426
Linked Data ROI 20110426Linked Data ROI 20110426
Linked Data ROI 20110426
 
Introduction to Linked Data: RDF Vocabularies
Introduction to Linked Data: RDF VocabulariesIntroduction to Linked Data: RDF Vocabularies
Introduction to Linked Data: RDF Vocabularies
 
Introduction to Linked Data: RDF Vocabularies
Introduction to Linked Data: RDF VocabulariesIntroduction to Linked Data: RDF Vocabularies
Introduction to Linked Data: RDF Vocabularies
 
Introduction to Linked Data: RDF Vocabularies
Introduction to Linked Data: RDF VocabulariesIntroduction to Linked Data: RDF Vocabularies
Introduction to Linked Data: RDF Vocabularies
 
Intro to Linked Data: SPARQL
Intro to Linked Data: SPARQLIntro to Linked Data: SPARQL
Intro to Linked Data: SPARQL
 
Intro to Linked Data: Data Modeling
Intro to Linked Data: Data ModelingIntro to Linked Data: Data Modeling
Intro to Linked Data: Data Modeling
 

Recently uploaded

ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 

Recently uploaded (20)

ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 

Returning to Online Privacy?

  • 1. 1 Returning to Online Privacy? Dr. David Hyland-Wood david@hyland-wood.org 5 November 2019
  • 2.
  • 3. The people held the government, but they did not hold the power. “
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. ” When the missionaries came to Africa, they had the Bible and we had the land. They said “let us close our eyes and pray.” When we opened them, we had the Bible, and they had the land.
  • 9.
  • 10.
  • 11.
  • 12.
  • 14.
  • 15. Anatomy of a Verifiable Credential Verifiable Credential Issuer Signature ClaimsClaimsClaims Credential Identifier Credential MetadataCredential MetadataCredential Metadata 17
  • 16. Verifiable Credentials Ecosystem 18 Issuer (Website) Government, Employer, etc. Verifier (Website) Company, Bank, etc. Holder (Digital Wallet / Personal Data Store) Citizen, Employee, etc. Issue Credentials Present Profiles
  • 17. W3C Verifiable Credentials 19 The mission of the W3C Verifiable Claims Working Group: Express credentials on the Web in a way that is cryptographically secure, privacy respecting, and automatically verifiable.
  • 18. The laws of mathematics are very commendable, but the only law that applies in Australia is the law of Australia.“
  • 19. The Web’s Identifier Problem 21 To date, every identifier you use online does not belong to you; it belongs to someone else. This results in problems related to cost, data portability, data privacy, and data security.
  • 20. Why is this a problem? 22 500 Million guests 412 Million users 145 Million users 110 Million shoppers 3,000 Million users
  • 21. Web Identifiers Today 23 Domain Name System (Identifiers are leased to individuals) Issuer (Website) Government, Employer, etc. Verifier (Website) Company, Bank, etc. Holder (Digital Wallet / Personal Data Store) Citizen, Employee, etc. Issue Credentials Present Profiles
  • 22. What is missing? 24 Many portable identifiers for any person, organisation, or thing that does not depend on a centralised authority, are protected by cryptography, and enable privacy and data portability.
  • 23. Decentralised Identifiers 25 A new type of globally resolvable, cryptographically-verifiable identifier, registered directly on a distributed ledger or blockchain
  • 24. What does a DID look like? 26 did:example:123456789abcdefghijk Schem e DID Method DID Method Specific String did:v1:nym:DwkYwcoyUXHNkpj3whn4DgXB4fcg9gj95vKxYN2apkZD Example:
  • 25. DIDs Resolve to DID Documents 27 { "@context": "https://w3id.org/veres-one/v1", "id": "did:v1:nym:DwkYwcoyUXHNkpj3whn4DgXB4fcg9gj95vKxYN2apkZD", "authentication": [{ "type": "Ed25519SignatureAuthentication2018", "publicKey": [{ "id": "did:v1:test:nym:DwkYwcoyUXHNkpj3whn4DgXB4fcg9gj95vKxYN2apkZD#authn-key-1", "type": "Ed25519VerificationKey2018", "owner": "did:v1:nym:DwkYwcoyUXHNkpj3whn4DgXB4fcg9gj95vKxYN2apkZD", "publicKeyBase58": "DwkYwcoyUXHNkpj3whn4DgXB4fcg9gj95vKxYN2apkZD" }] }], "service": [{ "type": "ExampleMessagingService", "serviceEndpoint": ”https://example.com/services/messages” }], … more DID-specific information here … } 1. Authentication Mechanisms 3. Service Discovery 2. Public Key Material
  • 26. Decentralized Identifiers 28 Decentralized Identifiers (Identifiers are owned by individuals) Blockchains / DHTs (Decentralized Ledger) Veres One, Sovrin, Bitcoin, Ethereum, etc. Issuer (Website) Government, Employer, etc. Verifier (Website) Company, Bank, etc. Holder (Digital Wallet / Personal Data Store) Citizen, Employee, etc. Issue Credentials Present Profiles
  • 27. 29
  • 28. © 2018 Tim Whyatt
  • 29. (David) Wheeler’s Law All problems in computer science can be solved by another level of indirection, but that will usually
  • 30. (David) Wheeler’s Law All problems in computer science can be solved by another level of indirection, but that will usually create another problem.
  • 32. Acknowledgments 34 ● Vintage 1984 movie poster modified from a version by Flikr user “book radio”, CC-BY-2.0 license, https://www.flickr.com/photos/bookdio/14164592302 ● Photo of the bombing of La Moneda (Chilean presidential palace) on 11 Sep 1973 by Biblioteca del Congreso Nacional, CC-BY-3.0-CL license, https://commons.wikimedia.org/w/index.php?curid=16325488 ● Photo of Salvador Allende, CC-BY-3.0-CL license, https://commons.wikimedia.org/wiki/File:Salvador_Allende_1952.JPG ● Salvador Allende quote from United States Congress, House Committee on Foreign Affairs (1789-1975), “Hearings, Reports and Prints of the House Committee on Foreign Affairs”, U.S. Government Printing Office, 1975, pp 585 ● Project Cybersyn operations room photo by Source, fair use due to historical significance (low resolution) for educational purposes, https://en.wikipedia.org/w/index.php?curid=12937653, https://en.wikipedia.org/wiki/Project_Cybersyn#/media/File:Cybersyn_control_room.jpg ● Nuremburg Laws illustration German Government (“Entwurf Willi Hackenberger”, “Copyright by Reichsausschuß für Volksgesundheitsdienst”, government agency apparently part of the Reichs- und Preußisches Ministerium des Innern), in the public domain, https://commons.wikimedia.org/wiki/File:Nuremberg_laws_Racial_Chart.jpg ● Photo of birth and death records in a family bible by Chuck Coker, CC BY-ND 2.0 license, https://www.flickr.com/photos/caveman_92223/3288595909 ● IDC projections from IDC White Paper, The Digitization of the World - From Edge to Core, Doc# US44413318, November 2018, https://www.seagate.com/www-content/our-story/trends/files/idc-seagate-dataage-whitepaper.pdf
  • 33. Acknowledgments 35 ● Illustration of “Saltbush Bill's Second Fight” by Frank Mahony, The Antipodean, Public Domain, https://commons.wikimedia.org/w/index.php?curid=37814122 ● Illustration of Henry Lawson’s The Team by an unknown artist, The Australian Town and Country Journal, Public Domain, https://en.wikipedia.org/wiki/The_Teams#/media/File:The_Teams_-_illo.png ● Brisbane City Hall photo by Tanya Dedyukhina, CC-BY-3.0 license, https://commons.wikimedia.org/wiki/File:Brisbane_City_Hall_-_panoramio.jpg ● Photo of Desmond Tutu provided by Lavinia Browne under the public domain, https://commons.wikimedia.org/wiki/File:Archbishop-Tutu-medium.jpg ● Desmond Tutu quote from Steven Gish, Desmond Tutu: A Biography, 2004, pp. 101 (although potentially originally attributable to Rolf Hochhuth, The Deputy, a Christian tragedy, Grove Press, 1964, pp. 144) ● Credit cards photograph by Nick Youngson, CC BY-SA 3.0 license, http://www.picserver.org/c/credit-cards26.html ● Wiretap meme courtesy of Reddit user benjaminikuta, February 2018 ● Privacy vs. Anonymity chart used by many, but possibly originally by Adam Ludwin, 20 January 2015, https://coincenter.org/entry/how-anonymous-is-bitcoin
  • 34. Copyright and Trademark Attribution 36 Corporate logos used in this presentation are the registered trademarks of their respective companies. Logos are used for educational purposes only under fair use provisions of copyright law. The lowest resolution visible to the audience was used.

Editor's Notes

  1. On the 11th of September, warplanes bombed the presidential mansion. Within five hours, the president committed suicide in his office as Army troops supporting the coup stormed the building. The oldest and most apparently stable democracy in its region was toppled by its own federal police and military. This was no simple power grab. The culprits were well known: A deadly combination of foreign interference in elections, including from a superpower’s intelligence agencies, and the raw greed of those controlling access to rich mineral deposits combined to create an atmosphere of political bifurcation. Right wing parties controlled the legislature while the left controlled the executive. The date was the 11th of September 1973. The place was La Moneda the presidential palace of Santiago, Chile.
  2. The president was Salvador Allende, a physician and the first Marxist ever elected to lead a democratic country. In the three years that followed, the government of dictator General Augusto Pinochet imprisoned 130,000 people in country where 50% of the GDP was controlled by only 300,000. What, I hear you ask, does this have to do with libraries? Everything, it turns out, because it has to do with data and how we choose to use it in our societies. Librarians, and a few philosophers, have been the only ones asking questions about data, its organisation, its long term storage and the ethics of its access for many centuries. This has been true across many forms of government since Aristotle first organised his books in a hierarchy and Callimachus of Cyrenae expanded that system in the Pinakes.
  3. Allende’s government had spent three years attempting to remove foreign control of the key mining industries, especially copper. They did that by nationalising those industries, and attempting to run them from the government. This is not the bridge of the original Star Trek series; it is the operations room of Project Cybersyn, the government control centre of the new economy. Cybersyn collected an unprecedented amount of data from 500 factories via a network of telex machines. Data was collected on individual workers, such as when they did or not show up for work, as well as production schedules. Data from Cybersyn was used to organise relief supplies coming into Santiago during a truckers strike. The breaking of that strike would be used to justify the following year’s coup. NB: Cybersyn is a portmanteau of the words "cybernetics" and "synergy".
  4. It was not the first time in history data collection was used to facilitate a coup or the brutal crackdown that followed. The Nazi Party used census data first collected in 1840s Prussia to perpetrate the Holocaust. A question regarding household religion was added to the census nearly a century before it was used by Nazi eugenicists under the Nuremberg Laws to determine who was allowed to marry, who could be permitted to have children, and finally who was sent to concentration camps for enslavement and execution.
  5. The amount of data involved was tiny: How many people in a house, their ages and gender, what was the family religion? By 1970s Chile, when did they show up for work? It was not much more than the birth and death listings most often kept in a family Bible. NB: My own father’s birthday was originally written in such a document, and eventually transferred to county records. But my grandmother was off by a year. It was easy to happen after ten children and while running a family farm, but it was a source of frustration to my father when he went to enlist in World War II, or to acquire his retirement benefits.
  6. These basic forms of data collection were the common experience of Australia’s current culture’s formative years. It wasn’t that long ago.
  7. We don’t think about how quickly this has changed. The Brisbane City Hall was built, mostly by hand, just two generations after Patterson and Lawson wrote their most well-known works. Elsewhere, countries were already creating skyscrapers that would require the marriage of people and increasingly capable machinery to build. NB: Within the living memory of my parents Brisbane City Hall, started 1920, finished 1930 Empire State Building, started 1930, finished 1931 Last year I watched a house across the street from me being built in St. Lucia by only two men - and some very capable remote controlled robots. Our machines have moved well beyond their ability to help us physically. They are now helping us create, manipulate, distribute and communicate information.
  8. As our populations grew, it was our Governments who would act as trusted third parties for transactions that would prove situational identity, e.g. library card, door pass, drivers license. These are all done in advance for later use. They help us navigate a world full of strangers with whom we must interact.
  9. But those abilities come with a warning label. Power and greed can change a society very, very quickly.
  10. We are now in a period of time when the data we both produce and collect for use is growing at an unprecedented rate. Our machines are also creating data for us and about us. 2013 was the first year Internet traffic was created majority by machines. Human Internet traffic has been in the minority ever since. Our data is also (disproportionally) moving out of our hands. We are giving this data to others to hold for us, and often for it to be used to advertise to us, sell to us, manipulate our behaviours, and sometimes to control our behaviours.
  11. Our new sources of data come predominately from corporations, not from governments. In most cases, it comes from our actions as we move through our digital world. Our credit cards are joined by loyalty cards, such as Fly Buys, Velocity, coffee cards, etc. These are all opportunities to give data about your life and your habits to someone. The key to collecting information is to develop systems where users willingly provide it. Facebook and other social networks followed the card companies in this business model. Google performs 2.3M searches per minute, and considers 200 factors to arrive at each search result. That is a staggering amount of data about our personal lives. It is, in short, the greatest tool for authoritarianism ever produced.
  12. We are even inviting these systems into our personal lives, sometimes in very intimate ways. We have learned this year that Google, Apple and others have been able to distinguish when home users of these technologies have been sleeping, eating, working, and having sex. Of course, they also know when you are home and when you are not. You might think this is hardly mainstream, but last year Fortune magazine reported “32% of the country already owns a smart speaker and another 16% plan on getting one this holiday season.” Children, and their habits, are now often tracked from birth.
  13. Starting in 2016, China’s Social Credit System is actively implementing a system based on strong knowledge of identity and reputation to decide who is more valuable for work, housing, social mobility, and travel. What kind of society do we want? The Social Credit System has been called, in headlines, a privacy invasion, state innovation, a way to restore trust in society, an Orwellian degree of control. Which is it? Well, all of them, of course.
  14. What are we to do? Should we go “all in” as China has (and India might), defer entirely to corporations like the U.S., legislate privacy like the E.U.? We do have hints of other options if we analyse what we mean by privacy. The Bitcoin and Ethereum blockchains have shown us it is possible to conduct anonymous transactions in plain sight.
  15. The W3C, the organisation that brought you the Web and ensured it was built to be accessed by all of humanity, has taken up this challenge. However reluctantly.
  16. Let’s have a quick look at a credential. They all have similar characteristics.
  17. We get our credentials from somewhere (e.g. Government, Facebook), they are stored somewhere, and used to prove who we are (and what we should have access to).
  18. Cryptographically secure… could be a problem at the moment.
  19. This is a problem because we cannot trust the people currently doing it for us. Marriot: 2018 Equifax: 2017 AFF: 2016 Ebay: 2014 Yahoo: 2013 Target: 2013 Australia 2019 (Jan only!): Nova Entertainment Victorian Public Servants Hawthorn Football Club Big W Early Warning Network Marriott (again) and Starwood Hotels NSW Department of Planning and Environment First National Real Estate Fisheries Queensland Collection #1 Optus SkoolBag My Health Records Facebook
  20. The companies working to implement verifiable credentials generally wish to offer you a service, for a fee. There are currently 13, including some of the big ones, who have committed to an implementation of the upcoming standard.
  21. We have yet to determine how blockchain-based monetary systems, distributed identifiers, or similar technologies will impact our societies. Of particular note is our involvement with law enforcement. Sometimes the only thing that protects us is the aphorism that “real data is dirty”. The data others hold about us is not always accurate, nor timely. However, it is getting more so on a daily basis. It is time to protect ourselves by design.
  22. This suggestion is simply another level of indirection. So, a caveat. David Wheeler: First PhD in CS (Cambridge, 1951) and inventor of the subroutine.
  23. Wheeler is most often misquoted by leaving off the end of his sentence. It is wise to take heed.
  24. Slides are available here.