Everyone is excited about SSI but there still aren’t any use cases that form part of people’s daily lives, so the team at Cheqd set out to change that. In this session, Ankur Banerjee walks through the research that led them to settle on social reputation in Web3 ecosystems as a use case that would be fun and drive daily usage. Find out more on creds.xyz.
100 Percent Encrypted Web New Challenges For TLS RSA Conference 2017CASCouncil
The web is moving towards a 100% Encrypted Web—but can we get it, right? Understanding the surge in use of https for malware and phishing, the renewed importance of revocation checking, the role of browser UI design in protecting users, the renewed importance of identity in TLS certificates, and the latest industry studies and initiatives for a safer Internet.
Building SSI Products: A Guide for Product ManagersSSIMeetup
Self-sovereign identity, decentralised identity, web5… collectively “ID Tech” has become a much more mainstream topic in recent years, and we are seeing an increasing number of products being built using these new technologies. However, with all the hand-wringing about adoption that we hear in the industry, it can sometimes feel like a hammer looking for nails. Which specific and tangible benefits can ID Tech bring to its users, and what special considerations should a product manager have in mind when working in this space? James Monaghan has been a product leader for two decades and has worked on ID Tech projects in financial services, travel, healthcare, education and more. In this talk he will share his views on how to tell whether a customer problem might call for an ID Tech solution, and how to approach some of the product decisions which arise when applying these tools.
Learn what a modern architecture looks like. It accepts any identity, authenticates users, and asserts those identities to any cloud, mobile, web, or network resource without requiring directory migration or duplication.
Learn from security experts at Deloitte how you can rethink your architecture with a fresh outlook that meets the needs of your agile enterprise.
100 Percent Encrypted Web New Challenges For TLS RSA Conference 2017CASCouncil
The web is moving towards a 100% Encrypted Web—but can we get it, right? Understanding the surge in use of https for malware and phishing, the renewed importance of revocation checking, the role of browser UI design in protecting users, the renewed importance of identity in TLS certificates, and the latest industry studies and initiatives for a safer Internet.
Building SSI Products: A Guide for Product ManagersSSIMeetup
Self-sovereign identity, decentralised identity, web5… collectively “ID Tech” has become a much more mainstream topic in recent years, and we are seeing an increasing number of products being built using these new technologies. However, with all the hand-wringing about adoption that we hear in the industry, it can sometimes feel like a hammer looking for nails. Which specific and tangible benefits can ID Tech bring to its users, and what special considerations should a product manager have in mind when working in this space? James Monaghan has been a product leader for two decades and has worked on ID Tech projects in financial services, travel, healthcare, education and more. In this talk he will share his views on how to tell whether a customer problem might call for an ID Tech solution, and how to approach some of the product decisions which arise when applying these tools.
Learn what a modern architecture looks like. It accepts any identity, authenticates users, and asserts those identities to any cloud, mobile, web, or network resource without requiring directory migration or duplication.
Learn from security experts at Deloitte how you can rethink your architecture with a fresh outlook that meets the needs of your agile enterprise.
Many people don’t realize there is enormous demand for legal forms of ID. This is especially true for people living in developing areas where access to identification is difficult or near impossible. Over 1 billion worldwide people do not have verifiable ID restricting their ability to apply to schools or college, open a bank account, apply for credit or loans, and to get healthcare or health insurance.
Integrations - Thinking outside the box - Presentation Engage 2023 in AmsterdamRoland Driesen
Introduction and advantages on outside the box thinking. Then two examples:
Case 1: Customer moved mail to 365 while their Electronic Medical Record system (EMR) has only support for Notes/Domino and no support yet for Outlook/365.
Solution: Provide Notes agenda in Outlook trough iCal feed.
Case 2: A Notes/Domino application collects data from production systems. Customer wants to have a subset of this data available in SharePoint.
Solution: Don’t rebuild everything, but simply sync/upload the required data to a SharePoint list.
it is growing every year. The sky-rocketing salary which Blockchain professionals draw is also a contributing factor that has made Blockchain certifications in greater demand. Expanding this point further, we bring you a list of some of the most sought-after Blockchain certifications that you can pursue online.
Blockchain applications are growing; almost all the business verticals are trying to explore the different ways to implement the Blockchain technology in their business. They are also hiring Blockchain developers and blockchain experts who can leverage this technology. We all know about Blockchain's application in different business domains like healthcare, sales, marketing, pharma, education, and finance, and many other sectors. Here we will focus on how the world's largest CRM company, Salesforce, has embraced the Blockchain platform and how it will be using it for the benefit of the Salesforce users.
CoLabora March 2022 - Improve security posture by implementing new Azure AD ...Peter Selch Dahl
Improve security posture by implementing new Azure AD Security features for better protection for M365 and Azure.
Azure AD Enterprise Application
Azure AD Application Registration
https://www.meetup.com/CoLabora/events/284462324/
Choreo - Build unique digital experiences on WSO2's platform, secured by Etho...WSO2
Every organization is looking to differentiate needs to create unique and compelling digital experiences for both external and internal customers. And yet, building these experiences is difficult and slow due to the complexity that comes from integrating existing systems, building new services, and managing new APIs. Piecing together the development and operation technologies you need — including Kubernetes, Docker, and service meshes — takes time and requires dedicated expertise to manage.
Choreo is a Digital Platform as a Service for delivering new digital experiences optionally pre-integrated with Ethos Identity. Choreo enables you to shift your focus from operations back to development by abstracting away the complexity of cloud-native infrastructure so you can create new integrations, services, and APIs in hours or days instead of weeks or months.
Explore how Choreo can make your digital development and operations fast, simple, and secure.
Microsoft Windows Azure - Developer’s Guide Access Control in the Windows Azu...Microsoft Private Cloud
The goal of this whitepaper is to show developers how to use a claims-based identity model and the Access Control feature of the Windows Azure platform AppFabric to implement single sign-on, federated identity, and role based access control in REST Web Services and clients today, with support for WS-* and single sign on for web applications coming in the future.
With the rise of Blockchain and cryptocurrency, there has been a surge in demand for Blockchain experts and professionals who can leverage this technology for the benefit of the businesses. But at the same time, it has also paved the way for many new budding entrepreneurs to venture into the Blockchain segment by providing blockchain-based applications and solutions, which will eventually help the business grow. Besides some of the big names in the business, we are also witnessing many startups and new names venturing into this business.
ManekTech is leading a mobile and software development outsourcing company India, who offers the best Enterprise application solution for your business. Our professional expert team of developers and programmers who provide a better solution in Microsoft.NET, SharePoint, Java, PHP, Open Source & Mobile Apps Development.
Asp.net Web Application Development Services | ManekTechManekTech
ManekTech is one of the best Microsoft.NET application development company in India, offers Asp.Net web, mobile app development services and solutions across to our clients.
Manektech is Umbraco Development Company in India, which providing top-notch Umbraco CMS web design & development services. Our certified Umbraco experts team builds a website for complex application development services and solutions for your business.
ZKorum: Building the Next Generation eAgora powered by SSISSIMeetup
The immense potential unlocked by SSI in content-centric social networks (forums) is largely unaddressed by the recent wave of decentralized social networks. Enter ZKorum - a network of verifiable communities where members create anonymous polls and discussions. In this episode, Nicolas Gimenez, the Co-Founder and CTO of ZKorum, unveils the Alpha version and delves into its architecture, drawing inspiration from SSI, DWeb, and Password Managers.
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...SSIMeetup
Lovesh Harchandani from Dock presents their approach to anonymous credentials and dives in on the various predicates that can be proven in zero knowledge. In over 90 minutes of discussion, we cover what these cryptographic techniques are, how they enable several important use cases for digital identity credentials, and we stretch James Monaghan's ability to keep up as interviewer by taking a look at the source code which makes it all possible! We show how various zero knowledge primitives we've built can be used in a modular fashion to solve real-world use cases. We cover privacy-preserving signature schemes, zero knowledge attribute equalities, range proofs, and verifiable encryption based on ZK-SNARKs, expressing arbitrary predicates as Circom programs and creating ZK proofs for them and blinded credentials (issuer is unaware of all attributes). For anyone interested in the technical underpinnings of this new frontier of digital identity, this episode is a must!
More Related Content
Similar to Cheqd: Making privacy-preserving digital credentials fun
Many people don’t realize there is enormous demand for legal forms of ID. This is especially true for people living in developing areas where access to identification is difficult or near impossible. Over 1 billion worldwide people do not have verifiable ID restricting their ability to apply to schools or college, open a bank account, apply for credit or loans, and to get healthcare or health insurance.
Integrations - Thinking outside the box - Presentation Engage 2023 in AmsterdamRoland Driesen
Introduction and advantages on outside the box thinking. Then two examples:
Case 1: Customer moved mail to 365 while their Electronic Medical Record system (EMR) has only support for Notes/Domino and no support yet for Outlook/365.
Solution: Provide Notes agenda in Outlook trough iCal feed.
Case 2: A Notes/Domino application collects data from production systems. Customer wants to have a subset of this data available in SharePoint.
Solution: Don’t rebuild everything, but simply sync/upload the required data to a SharePoint list.
it is growing every year. The sky-rocketing salary which Blockchain professionals draw is also a contributing factor that has made Blockchain certifications in greater demand. Expanding this point further, we bring you a list of some of the most sought-after Blockchain certifications that you can pursue online.
Blockchain applications are growing; almost all the business verticals are trying to explore the different ways to implement the Blockchain technology in their business. They are also hiring Blockchain developers and blockchain experts who can leverage this technology. We all know about Blockchain's application in different business domains like healthcare, sales, marketing, pharma, education, and finance, and many other sectors. Here we will focus on how the world's largest CRM company, Salesforce, has embraced the Blockchain platform and how it will be using it for the benefit of the Salesforce users.
CoLabora March 2022 - Improve security posture by implementing new Azure AD ...Peter Selch Dahl
Improve security posture by implementing new Azure AD Security features for better protection for M365 and Azure.
Azure AD Enterprise Application
Azure AD Application Registration
https://www.meetup.com/CoLabora/events/284462324/
Choreo - Build unique digital experiences on WSO2's platform, secured by Etho...WSO2
Every organization is looking to differentiate needs to create unique and compelling digital experiences for both external and internal customers. And yet, building these experiences is difficult and slow due to the complexity that comes from integrating existing systems, building new services, and managing new APIs. Piecing together the development and operation technologies you need — including Kubernetes, Docker, and service meshes — takes time and requires dedicated expertise to manage.
Choreo is a Digital Platform as a Service for delivering new digital experiences optionally pre-integrated with Ethos Identity. Choreo enables you to shift your focus from operations back to development by abstracting away the complexity of cloud-native infrastructure so you can create new integrations, services, and APIs in hours or days instead of weeks or months.
Explore how Choreo can make your digital development and operations fast, simple, and secure.
Microsoft Windows Azure - Developer’s Guide Access Control in the Windows Azu...Microsoft Private Cloud
The goal of this whitepaper is to show developers how to use a claims-based identity model and the Access Control feature of the Windows Azure platform AppFabric to implement single sign-on, federated identity, and role based access control in REST Web Services and clients today, with support for WS-* and single sign on for web applications coming in the future.
With the rise of Blockchain and cryptocurrency, there has been a surge in demand for Blockchain experts and professionals who can leverage this technology for the benefit of the businesses. But at the same time, it has also paved the way for many new budding entrepreneurs to venture into the Blockchain segment by providing blockchain-based applications and solutions, which will eventually help the business grow. Besides some of the big names in the business, we are also witnessing many startups and new names venturing into this business.
ManekTech is leading a mobile and software development outsourcing company India, who offers the best Enterprise application solution for your business. Our professional expert team of developers and programmers who provide a better solution in Microsoft.NET, SharePoint, Java, PHP, Open Source & Mobile Apps Development.
Asp.net Web Application Development Services | ManekTechManekTech
ManekTech is one of the best Microsoft.NET application development company in India, offers Asp.Net web, mobile app development services and solutions across to our clients.
Manektech is Umbraco Development Company in India, which providing top-notch Umbraco CMS web design & development services. Our certified Umbraco experts team builds a website for complex application development services and solutions for your business.
Similar to Cheqd: Making privacy-preserving digital credentials fun (20)
ZKorum: Building the Next Generation eAgora powered by SSISSIMeetup
The immense potential unlocked by SSI in content-centric social networks (forums) is largely unaddressed by the recent wave of decentralized social networks. Enter ZKorum - a network of verifiable communities where members create anonymous polls and discussions. In this episode, Nicolas Gimenez, the Co-Founder and CTO of ZKorum, unveils the Alpha version and delves into its architecture, drawing inspiration from SSI, DWeb, and Password Managers.
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...SSIMeetup
Lovesh Harchandani from Dock presents their approach to anonymous credentials and dives in on the various predicates that can be proven in zero knowledge. In over 90 minutes of discussion, we cover what these cryptographic techniques are, how they enable several important use cases for digital identity credentials, and we stretch James Monaghan's ability to keep up as interviewer by taking a look at the source code which makes it all possible! We show how various zero knowledge primitives we've built can be used in a modular fashion to solve real-world use cases. We cover privacy-preserving signature schemes, zero knowledge attribute equalities, range proofs, and verifiable encryption based on ZK-SNARKs, expressing arbitrary predicates as Circom programs and creating ZK proofs for them and blinded credentials (issuer is unaware of all attributes). For anyone interested in the technical underpinnings of this new frontier of digital identity, this episode is a must!
Value proposition of SSI tech providers - Self-Sovereign IdentitySSIMeetup
Talk with Vladimir Vujovic, Senior Digital Innovation Manager from SICPA about product definition and value proposition of Issuer/Holder/Verifier software of SSI tech providers. Why is it hard to convey the right message to the audience coming from outside of SSI domain. How different SSI tech providers define their offering and the language they use to convey the message. What is really the value proposition of SSI tech providers who are offering their Issuer/Verifier software to the market. How big regulation initiatives like the one in Europe for eIDAS v2 are driving the market and roadmaps for SSI tech providers and how will such initiative will have impact to the rest of the world in terms of regulation, but some of the underlying technical standards. What is the place of SSI platforms in the broader Identity landscape and when are we going to see more maturity from the market.
SSI Adoption: What will it take? Riley HughesSSIMeetup
Adoption: its the elephant in the room. SSI has so much potential, but the benefits are only realised once adoption happens at scale. In this webinar, Riley Hughes, CEO and Co-Founder of Trinsic, shares his 3 concrete recommendations for building products which are successful according to the most important metric - getting adopted!
Daniel Buchner is here to save the web. Not the web as we know it, full of closed platforms and intermediaries where both free choice and free speech are curtailed, but the web as it was intended to be: a thriving, open ecosystem of apps and protocols which put individuals at the center. To do this, he and the TBD team at Block are building what they call “Web5” which combines decentralized identifiers, verifiable credentials and personal datastores to create a platform for building truly self-sovereign apps on the web. In this webinar, we go beyond the controversial name to learn what the project is, why it is important, and what we can expect from the upcoming release this summer.
Portabl - The state of open banking, regulations, and the intersection of SSI...SSIMeetup
Complying with Know Your Customer and Anti Money Laundering regulations is hugely complicated and expensive for financial institutions, and burdensome for their customers. Nate Soffio, Co-Founder and CEO of Portabl, believes that the solution lies in secure, interoperable data - enabled by verifiable credentials. In this webinar, he explains why it is such a thorny problem, how open banking needs to evolve to more of a “tap to prove” model as organizations increasingly need continuous identity assurance, and why despite describing the task as “playing SSI on ‘hard mode’”, he believes building a “compound startup” is the best way to get the job done.
PharmaLedger: A Digital Trust Ecosystem for HealthcareSSIMeetup
Daniel Fritz, Executive Director of the PharmaLedger Association and Marco Cuomo, Director of Tech Products & Innovation at Novartis, will present their SSI journey from the initial ideas, through realization of several Proof of Concepts with DIDs and VCs, to the PharmaLedger initiative. PharmaLedger was a 29 member, 3-year, €22 million project under the EU and EFPIA Innovative Medicine Initiative pursued DIDs with external partners such as the global standards organization GS1 and the Global Legal Identifier Foundation (GLEIF). The project also resulted in the creation of the PharmaLedger Association in 2022, a non-profit Swiss association mandated to launch the first open-source product, electronic Product Information (eLeaflet). The webinar will review some of the use cases and dive a little into the technical architecture adopted in the project.
Polygon ID offers tools that allow developers to build self-sovereign, decentralized and private identity solutions for users that leverage zero knowledge proofs. Polygon ID was released as open source last March 2023 at ETH Denver. In this presentation, Otto Mora, BD Lead for Americas, and Oleksander Brezhniev, Technical Lead at Polygon ID, will be covering aspects of the did:PolygonID method including: Verifiable presentations leveraging ZK Proofs; How the Proofs are generated; Credential Issuance Methods; and Identity Management Features.
Solving compliance for crypto businesses using Decentralized Identity – Pelle...SSIMeetup
https://ssimeetup.org/solving-compliance-crypto-businesses-using-decentralized-identity-pelle-braendgaard-webinar-60/
A new global framework for regulating the crypto industry is coming into place this year. One of the most important new rules that businesses interacting with crypto has to implement is what is known as the Travel Rule. The Travel Rule, which is also known as The Wire Transfer rule, requires a business managing crypto on behalf of their user to transfer KYC’d (Know-Your-Customer) Identity Information to a receiving institution. Pelle Braendgaard, CEO of Notabene, will share his insights and explain how his company is tackling this business challenge for the industry.
Complying with this rule provides many challenges for the industry. Several industry groups have already started to invent several new protocols to solve this. Notabene helps financial companies be compliant with new, global anti-money laundering (AML) regulations for crypto transactions coming into effect right now. Pelle believes this is a critical use case for SSI (Self-Sovereign Identity). In this talk, he will go over the rule itself, industry protocols, how he sees SSI can help here, and how they are helping to solve it.
The Pan-Canadian Trust Framework (PCTF) for SSISSIMeetup
https://ssimeetup.org/pan-canadian-trust-framework-pctf-ssi-tim-bouma-webinar-59/
We are very proud to release a special webinar to introduce the next chapter of the “Self-Sovereign Identity Book” from two of the most eminent authorities on digital identity in government: Tim Bouma and Dave Roberts, senior public servants with the Government of Canada and major contributors to the Pan-Canadian Trust Framework (PCTF).
In this chapter, Tim and Dave explain the PCTF model and how it maps to the SSI model and the Trust over IP (ToIP) stack.
This webinar describes how a world leader in digital identity (which Canada has been for two decades) sees the opportunity in the new decentralized identity model represented by SSI (Self-Sovereign Identity).
Identity-centric interoperability with the Ceramic ProtocolSSIMeetup
https://ssimeetup.org/identity-centric-interoperability-ceramic-protocol-joel-thorstensson-webinar-57/
Ceramic is a new permissionless protocol for creating and accessing unstoppable documents that serve as the foundation for a connected, interoperable web without silos. Joel Thorstensson is the founder and CTO of 3Box and the primary author of the ceramic protocol as well as several Ethereum standards for identity and will provide a conceptual and technical intro to Ceramic.
At the root of many of the internet’s problems is that apps and services today are built primarily in silos. This includes identity registries and credentials, user data and access permissions, infrastructure, and services. It not only puts control over data and identities in the wrong hands, but it’s a fundamentally outdated and inefficient model for building digital products.
Ceramic unlocks information interoperability between all platforms and services across the web, allowing participants to create and resolve documents for any type of information without any centralized service. Ceramic uses DIDs (Decentralized Identifiers), IPLD (InterPlanetary Linked Data), signed messages, and blockchain anchoring to create a trusted and shared graph of verifiable documents. While flexible, these documents are especially well-suited for self-sovereign identity systems, user-centric data ecosystems, and open web services.
https://ssimeetup.org/ssi-ecosystem-south-korea-jaehoon-shim-webinar-56/
Jaehoon Shim, a blockchain researcher at LG CNS and the founder of SSIMeetup Korea, will introduce the Self-Sovereign Identity (SSI) ecosystem of South Korea. South Korea became a hotbed of Self Sovereign Identity in the last couple of years. The number of government-funded projects, including the mobile credential for government officials, requires using DIDs (Decentralized Identifiers). Also, hundreds of enterprises joined public/private consortia on decentralized identity to empower the digital transformation of the South Korean society. Jaehoon will explain in detail the current ecosystem and discuss opportunities for the future.
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloSSIMeetup
https://ssimeetup.org/introducing-ssi-eidas-legal-report-ignacio-alamillo-webinar-55/
The European Commission developed the SSI (Self-Sovereign Identity) eIDAS bridge, an ISA2 funded initiative, to promote eIDAS as a trust framework for the SSI ecosystem. It assists a VC (Verifiable Credential) issuer in the signing process, and helps the verifier to automate the identification of the organization behind the issuer’s DID (Decentralized Identifier). Simply by “crossing” the eIDAS Bridge, a Verifiable Credential can be proven trustworthy in the EU. Ignacio Alamillo will present at this SSI Meetup webinar the insights gained from this report.
In the context of the eIDAS bridge project, we performed an analysis on how eIDAS can legally support digital identity and trustworthy DLT-based transactions in the Digital Single Market, and this is reflected in the SSI eIDAS legal report, available at this link. The objective of this report is to evaluate the potential legal issues that are important to an SSI solution and make some recommendations to be used as policy input for the eIDAS 2020 review. The report outlines short-term objectives, where changes in the Regulation would not be necessary, but also mid to long-term scenarios requiring major changes in the Regulation to comply with the SSI design principles.
The different scenarios described in the report are aligned with the proposed architectural and procedural considerations designed in the SSI eIDAS Bridge project and the European Self Sovereign Identity Framework.
Learn about the Trust Over IP (ToIP) stackSSIMeetup
https://ssimeetup.org/trust-over-ip-toip-stack-webinar-54/
At SSI Meetup you’ve been hearing about the Trust over IP (ToIP) stack (originally called the “SSI stack”) since last September 2019. In this webinar, three pioneers of this new architecture for Internet-scaled digital trust infrastructure will share exciting news about where ToIP is going. We can’t reveal the details yet—it is under embargo until next Tuesday—but let’s just say you don’t want to miss it.
How to avoid another identity nightmare with SSI? Christopher AllenSSIMeetup
https://ssimeetup.org/how-avoid-another-identity-tragedy-with-ssi-christopher-allen-webinar-53/
Join the Dutch Self-Sovereign Identity community in a #Foremembrance for those who died by attempting to bomb the civil archives captured by the Nazis & those defending the vulnerable today. Christopher Allen will share with us the importance of this event for the self-sovereign identity community to build the future of identity on sunset Amsterdam time March 27th. We will also analyze the impact and risk of COVID-19 for privacy and identity systems.
March 27th is a Friday this year. Sunset in Amsterdam is at 19:06 CET, 2:06 pm EDT, 11:06 am PDT & is 1:06 am March 28 in Taipei & Hong Kong.
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSSIMeetup
https://ssimeetup.org/self-sovereign-identity-why-we-here-christopher-allen-webinar-51/
Internet cryptography and Self-sovereign identity (SSI) pioneer Christopher Allen talks about essential insights and reflections around historical, technological and ethical aspects of Self-Sovereign Identity at the 51st SSIMeetup.org webinar in collaboration with Rebooting the Web of Trust (RWOT) and Alianza Blockchain Iberoamérica as part of the events that took place at RWOT in Buenos Aires (Argentina).
Christopher is an entrepreneur and technologist who specializes in collaboration, security, and trust. As a pioneer in internet cryptography, he’s initiated cross-industry collaborations and co-created industry standards that influence the entire internet. Christopher’s focus on internet trust began as the founder of Consensus Development where he co-authored the IETF TLS internet-draft that is now at the heart of all secure commerce on the World Wide Web. Christopher is co-chair of the W3C Credentials CG working on standards for decentralized identity. Christopher has also been a digital civil liberties and human-rights privacy advisor, was part of the team that led the first UN summit on Digital Identity & Human Rights, and was the producer of a half-dozen iPhone and iPad games, and of Infinite PDF, a non-linear media app.
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemsSSIMeetup
https://ssimeetup.org/eidas-regulation-anchoring-trust-self-sovereign-identity-systems-ignacio-alamillo-webinar-49/
Ignacio Alamillo is a lawyer, PhD in eIDAS Regulation, CISA, CISM, and EU Commission legal expert for EBSI eSSIF and the EBSI eIDAS Bridge initiatives. Ignacio will introduce SSI solutions, using the Alastria ID reference model as an illustrative example, taking into account the need for trust management frameworks, and trust anchors. Secondly, he will introduce the eIDAS Regulation, currently the major electronic identification regulation in the European Union, supporting a pan-European identity federation system, and the legal framework for the so-called trust services.
The EU has developed some key proposals arising from the legal assessment of the EBSI ESSIF use case, oriented to extend the eIDAS Regulation to SSI solutions used with public sector bodies relationships and procedures. This results were publicly presented in the 2nd ESSIF Stakeholders Meeting that took place in Brussels mid-January 2020.
The objective of the ESSIF legal assessment is to evaluate the potential legal issues that are horizontal to an SSI solution, including:
DIDs: What is the legal nature and ownership of DIDs (asset vs a special kind of pseudonym), how should be DIDs managed in case of minors and incapable persons, if DID may be subject to seizure, when DIDs may be deactivated, what is the legal regime of keys and wallets, etc.
VCs: What are the duties and responsibilities of VCs issuers, holders and verifiers. How to model the contractual/non-contractual relations between issuers & verifiers, and set up liability models. We should pay special attention to the legal aspects of the VC lifecycle (issuance, suspension and revocation causes, etc).
Alignment of the SSI solution with the eIDAS Regulation: aligning VCs with eIDAS eID rules, but also linking VCs to eSeals or eSignatures.
Trust framework: legal input regarding LoAs, governance aspects, conformity, etc.
The use cases include:
Using eIDAS identification means (and qualified certificates?) to issue verifiable credentials.
Using qualified certificates to support verifiable claims (EBSI eIDAS bridge) and legal evidences with full legal value.
Using SSI VCs as an eIDAS identification means.
Using blockchain plus SSI as an electronic registered delivery service.
All content represent just the opinion of Ignacio Alamillo, and do not represent any official position from the EU Commission nor any of its officers
Explaining SSI to C-suite executives, and anyone else for that matterSSIMeetup
https://ssimeetup.org/explaining-ssi-c-suite-executives-anyone-else-john-phillips-webinar-48/
John Phillips from 460degrees in Australia has been exploring with his team for more than two years for a way to describe Self-Sovereign Identity (SSI) that was easy to understand. We think he has found a good method to make SSI easy to understand for any C-suite executive and business people that goes beyond the technology.
John published a video in late 2019 that we found deeply insightful and we have invited him to share this with the SSI Meetup audience. This demo has been going down amazingly well with audiences from c-suite technology execs to design students.
This approach quite literally animates the discussion. People add other objects into the mix, move things around, ask relevant, insightful, questions.
John will share the learnings he is gaining from University research, as well as the results of work in supporting capstone projects for higher education students, and how this has led us to a storytelling model to explain SSI.
Decentralized Identifier (DIDs) fundamentals deep diveSSIMeetup
https://ssimeetup.org/decentralized-identifiers-dids-fundamentals-identitybook-info-drummond-reed-markus-sabadello-webinar-46/
Decentralized identifiers (abbreviated as “DIDs”), are the cryptographic counterpart to verifiable credentials (VCs) that together are the “twin pillars” of SSI architecture. In this special IdentityBook.info webinar Markus Sabadello, Founder and CEO of Danube Tech, and Drummond Reed, Chief Trust Officer at Evernym, co-authors of the DID chapter of the “Self-Sovereign Identity:
Decentralized Digital Identity and Verifiable Credentials” book published by Manning will explain all the fundamentals of DIDs. Based on the did chapter of the book, you will learn how DIDs evolved from the work started with VCs, how they are related to URLs and URNs, why a new type of cryptographically-verifiable identifier is needed for SSI, and how DIDs are being standardized at World Wide Web Consortium (W3C). Your guides will be two of the editors of the W3C Decentralized Identifier 1.0 specification: Markus Sabadello and Drummond Reed.
The 2nd Official W3C DID Working Group Meeting (The Netherlands)SSIMeetup
https://ssimeetup.org/did-report-2-2nd-official-w3c-did-working-group-meeting-netherlands-drummond-reed-markus-sabadello-webinar-45/
The DID Report 2 about the Second Meeting of the W3C DID Working Group with Drummond Reed and Markus Sabadello from Danube Tech, co-authors of the W3C DID specification.
DID spec co-author Drummond Reed and Markus Sabadello will report back from Amsterdam (The Netherlands) for the second official meeting of the W3C DID Working Group taking place from January 29-31, 2020 to share highlights of the meeting and the roadmap for taking DIDs to a full Web standard.
This session will be followed one hour later by a full DID education session based on the DID chapter published with Manning by IdentityBook.info authors Drummond Reed, Markus Sabadello and Alex Preukschat. If you want to learn all the basics about DIDs please also join this session here: Webinar 46
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
Cheqd: Making privacy-preserving digital credentials fun
1. Creating the trusted data economy
Ankur Banerjee
CTO & Cofounder, Cheqd
Making
privacy-preserving
digital credentials fun
2. 1. Empower global SSI
communities
2. Open to everyone interested
in SSI
3. All content is shared with CC
BY SA
Alex Preukschat @SSIMeetup
@AlexPreukschat
James Monaghan
@james_monaghan
Coordinating Nodes
SSIMeetup.org
SSIMeetup objectives
3. “People want more privacy”
3
cheqd (.io)
Read more 👉 cheqd.link/top-5-trends
https://creativecommons.org/licenses/by-sa/4.0/
4. You should
be the centre
of your
data universe
cheqd.link/what-is-cheqd
4
cheqd (.io)
https://creativecommons.org/licenses/by-sa/4.0/
10. “People want more privacy…the
same way they want to exercise
more”
10
cheqd (.io)
Read more 👉 cheqd.link/top-5-trends
https://creativecommons.org/licenses/by-sa/4.0/
12. How do we currently originate digital credentials?
“Show me your passport, a
selfie, these other documents
from two years ago…”
You aka “holder” Bank aka “receiver”
Trusted
organisations
aka “issuers”
Govt Agency
Employer
Credit bureau
“Can I trust what’s in
these documents?”
12
cheqd (.io)
https://creativecommons.org/licenses/by-sa/4.0/
13. This is expensive right now
Can’t have access because check
takes ~minutes ⏱ to ~weeks 📆
You aka “holder” Bank aka “receiver”
Trusted
organisations
aka “issuers”
Govt Agency
Employer
Credit bureau
$10
$2
$50
Takes time,
effort, and
money
13
cheqd (.io)
https://creativecommons.org/licenses/by-sa/4.0/
14. 14
So why should companies give it away for free?
cheqd (.io)
Basic KYC check: ~$5-10
Criminal record check: ~$50-100
Company background: $100-500
(GLEIF-accredited LEI: ~$100/year)
Having a sustainable business
model: Priceless 💸
https://creativecommons.org/licenses/by-sa/4.0/
15. cheqd is not just another layer one.
We believe in open standards and
fixing broken business models.
15
cheqd (.io)
https://creativecommons.org/licenses/by-sa/4.0/
16. We are establishing a clear incentive model for the entire
ecosystem (especially issuers)
Flow of value
Note: Issuers will also be verifiers
and vice versa, verifiers will also
be issuers.
Credential
Holder
Credential
Receiver
Credential
Issuer
Infrastructure:
cheqd & other node operators
16
We are incentivising
organisations with data
silos to release that data
to individuals and join
the SSI revolution
This benefits everyone
in the SSI ecosystem
cheqd (.io)
Node operator
% of revenue flow
Node operator Node operator Node operator YOU
https://creativecommons.org/licenses/by-sa/4.0/
17. Establishing a clear incentive model
for the entire ecosystem
Value / payment
Lower KYC costs
Current ID checks cost
between $2 - $10
Recurring
revenue stream
Collected by the issuer each
time a Credential is verified
Infrastructure:
17
cheqd (.io)
Node operator Node operator Node operator Node operator Node operator
ID check reduced
to 0.25c
0.20c
0.05c
Credential flow /
verifiable trust
Verifiable trust
Bank
(Issuer)
Holder
Company
(Verifier)
https://creativecommons.org/licenses/by-sa/4.0/
18. Node operator
SSI’s potential to create new data
marketplaces is exponential
x 100 -
1000s
of these ecosystems
Infrastructure:
cheqd (.io)
Node operator Node operator Node operator Node operator
Government Banking Healthcare
Insurance
Credit
Travel
e-Commerce
Lenders
https://creativecommons.org/licenses/by-sa/4.0/
19. Growth of
Self
Sovereign
Identity
Better user experience,
privacy, and security
More identity subjects
using and demanding SSI
More places accepting SSI
More organisations issuing SSI
Lower cost structure for
creating trusted data
Lower prices for
consuming trusted data
Flywheel for SSI adoption
cheqd (.io)
https://creativecommons.org/licenses/by-sa/4.0/
24. Our partners work globally, cross-industry & use-case
24
cheqd (.io)
SSI for gaming
Portable avatars / experience /
achievements
Community credentials
Credentials for reputation / access
Decentralised reputation
Prove reputation without central
authorities
Regulatory compliant DeFi
Privacy-preserving KYC for DeFi
Preferences
Express preferences with privacy
Single sign-on
No more username or password logins
Onboarding
Re-usable, digital KYC credentials
Corporate identity
Re-usable, digital KYB credentials
Supply chain
Prove supply chain is certified
Healthcare
Portable, digital healthcare records
Employment / HR
Portable, digital professional records,
e.g. degree
Citizens / governments
SSI-based national identity
Travel / hospitality
User-centric home for travel
documents, inc. vaccines
e-Commerce / Retail
One-click checkout for anyone to
improve conversion and prevent fraud
https://creativecommons.org/licenses/by-sa/4.0/
25. What else is cheqd doing
differently?
25
cheqd (.io)
https://creativecommons.org/licenses/by-sa/4.0/
26. License issued in 2012
Schemas are used in digital credentials…and traditional ID docs
This becomes increasingly important in a world of Verifiable Credentials, where reliance on the
schema is a core part of the verifier being able to trust the a credential presented to them.
Schema attributes
https://creativecommons.org/licenses/by-sa/4.0/
27. License issued in 2012 License issued in 2015
new attributes in new format
Schemas regularly change over time
In this example, we have two driver’s licenses. The first is valid between 2012 and 2020, which
overlaps with the issuance of a new license format in 2015. In this scenario, systems will need to
understand and check the validity of both licenses and their associated schemas.
https://creativecommons.org/licenses/by-sa/4.0/
28. ✓ Height
✓ Weight
✓ Eyes
Schema issued in 2012 Schema issued in 2015
Schemas regularly change over time
If the initial schema is updated in a centralised registry such as schema.org, it may actually
overwrite and invalidate the old schema, making it very difficult for client applications and verifiers
to trust older or deprecated documents - which should still retain a high level of assurance.
https://schema.org/driversLicense
✓ Name
✓ DoB
✓ Sex
✓ Issuance
✓ Expiry
✓ Class
✓ ID
✓ Name
✓ DoB
✓ Sex
✓ Issuance
✓ Expiry
✓ Class
✓ ID
https://schema.org/driversLicense
☒ Height
☒ Weight
☒ Eyes
https://creativecommons.org/licenses/by-sa/4.0/
29. This can be problematic for client apps
I can assure you
that this license
was valid in 2015
Computer says no…
We’ve all encountered some form of ‘Computer says no’ in this context. This could cause even
more headaches with Verifiable Credentials if we do not learn from previous mistakes..
https://creativecommons.org/licenses/by-sa/4.0/
30. Single point of failure when storing schemas at web URLs
The Facebook outage of 2021
which took down apps that
used “Login with Facebook”
functional
https://creativecommons.org/licenses/by-sa/4.0/
31. Cloud infrastructure is quite centralised and concentrated
Systematic, global outages on
cloud providers has take out
many, many services
https://creativecommons.org/licenses/by-sa/4.0/
32. “Linkrot” breaks links on the web, all the time
https://creativecommons.org/licenses/by-sa/4.0/
33. How is cheqd fixing the user
experience and longevity issues?
33
cheqd (.io)
https://creativecommons.org/licenses/by-sa/4.0/
34. DID method
prefix
Resource
Collection ID
Query parameters
Resources discoverable using DID URLs
did:cheqd:mainnet:46e2af9a-2ea0-4815-999d-730a6778227c?resourceName=Passport&versionTime=2022-07-01
https://creativecommons.org/licenses/by-sa/4.0/
35. DID method
prefix
Resource
Collection ID
Module path Specific
Resource ID
Resources discoverable using DID URLs
did:cheqd:mainnet:46e2af9a-2ea0-4815-999d-730a6778227c/resources/688e0e6f-74dd-43cc-9078-09e4fa05cacb
DID method
prefix
Resource
Collection ID
Module path Specific
Resource ID
did:cheqd:mainnet:zF7rhDBfUt9d1gJPjx7s1JXfUY7oVWkY/resources/688e0e6f-74dd-43cc-9078-09e4fa05cacb
UUID-style identifier
Indy-style identifier
https://creativecommons.org/licenses/by-sa/4.0/
36. Visual representations of credentials help users pick them out
In this example from British Airways, the
pass at the front is for a “Gold” loyalty
status member, whereas the pass at the
back is for a “standard” loyalty status
member.
This information can be represented in a
Verifiable Credential, of course, but the
example here uses the Apple Wallet /
Google Wallet formats to overlay a richer
display.
https://creativecommons.org/licenses/by-sa/4.0/
37. How can we make
privacy-preserving digital
credentials fun and a daily habit?
37
cheqd (.io)
https://creativecommons.org/licenses/by-sa/4.0/