Drummond Reed, Chief Trust Officer at Evernym and Sovrin Foundation Trustee, features in this Webinar "Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Puzzle". If you can't manage the keys for your DIDs (Decentralized Identifiers), then the SSI engine will never get started. That's why DKMS (Decentralized Key Management System) is one of the core open standards in the DID "stack".
DKMS inverts a core assumption of conventional PKI (public key infrastructure) architecture, namely that public key certificates will be issued by centralized or federated certificate authorities (CAs). With DKMS, the initial "root of trust" for all participants is any blockchain or distributed ledger that supports DIDs. This webinar will explain why we need DKMS, what a DKMS-compatible identity wallet looks like, how DKMS can solve some longstanding problems in wallet backup and recovery, and where DKMS is headed for standardization.
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...SSIMeetup
Drummond Reed, Chief Trust Officer at Evernym, will explain in our second Webinar "Decentralized Identifiers (DIDs) - Building Block of Self-Sovereign Identity (SSI)" giving us the background on how DIDs work, where they come from and why they are important for Blockchain based Digital Identity.
What are decentralized identifiers (DIDs), how do they enable self-sovereign identity, and what does W3C standardization mean for interoperability and adoption?
Evernym's Drummond Reed and Brent Zundel discussed all this and more on our Sep 26, 2019 webinar.
Verifiable Credentials in Self-Sovereign Identity (SSI)Evernym
On our March 12, 2020 webinar, Evernym Chief Architect Daniel Hardman provided a great introduction to verifiable credentials and compared them to the physical credentials (passports, driver's licenses, loyalty cards) we use every day. He then identified six lessons we can learn from today's physical credentials and how we're applying each to the world of self-sovereign identity.
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSSIMeetup
https://ssimeetup.org/self-sovereign-identity-why-we-here-christopher-allen-webinar-51/
Internet cryptography and Self-sovereign identity (SSI) pioneer Christopher Allen talks about essential insights and reflections around historical, technological and ethical aspects of Self-Sovereign Identity at the 51st SSIMeetup.org webinar in collaboration with Rebooting the Web of Trust (RWOT) and Alianza Blockchain Iberoamérica as part of the events that took place at RWOT in Buenos Aires (Argentina).
Christopher is an entrepreneur and technologist who specializes in collaboration, security, and trust. As a pioneer in internet cryptography, he’s initiated cross-industry collaborations and co-created industry standards that influence the entire internet. Christopher’s focus on internet trust began as the founder of Consensus Development where he co-authored the IETF TLS internet-draft that is now at the heart of all secure commerce on the World Wide Web. Christopher is co-chair of the W3C Credentials CG working on standards for decentralized identity. Christopher has also been a digital civil liberties and human-rights privacy advisor, was part of the team that led the first UN summit on Digital Identity & Human Rights, and was the producer of a half-dozen iPhone and iPad games, and of Infinite PDF, a non-linear media app.
Decentralized Identifier (DIDs) fundamentals deep diveSSIMeetup
https://ssimeetup.org/decentralized-identifiers-dids-fundamentals-identitybook-info-drummond-reed-markus-sabadello-webinar-46/
Decentralized identifiers (abbreviated as “DIDs”), are the cryptographic counterpart to verifiable credentials (VCs) that together are the “twin pillars” of SSI architecture. In this special IdentityBook.info webinar Markus Sabadello, Founder and CEO of Danube Tech, and Drummond Reed, Chief Trust Officer at Evernym, co-authors of the DID chapter of the “Self-Sovereign Identity:
Decentralized Digital Identity and Verifiable Credentials” book published by Manning will explain all the fundamentals of DIDs. Based on the did chapter of the book, you will learn how DIDs evolved from the work started with VCs, how they are related to URLs and URNs, why a new type of cryptographically-verifiable identifier is needed for SSI, and how DIDs are being standardized at World Wide Web Consortium (W3C). Your guides will be two of the editors of the W3C Decentralized Identifier 1.0 specification: Markus Sabadello and Drummond Reed.
OSCON 2018 Getting Started with Hyperledger IndyTracy Kuhrt
Presented at OSCON 2018. Hyperledger Indy is a distributed ledger built for decentralized identity and is one of the open source frameworks hosted by Hyperledger. It provides tools, libraries, and reusable components for creating and using independent digital identities rooted on blockchains or other distributed ledgers. In this presentation, I introduce The Linux Foundation and Hyperledger. We look at Decentralized Identity Concepts -- identity models, decentralized identity, zero-knowledge proofs, and verifiable credentials. We look at a demo that utilizes Hyperledger Indy and these concepts. We then look at Hyperledger Indy's software stack and roadmap and touch on how you can get involved.
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...SSIMeetup
Drummond Reed, Chief Trust Officer at Evernym, will explain in our second Webinar "Decentralized Identifiers (DIDs) - Building Block of Self-Sovereign Identity (SSI)" giving us the background on how DIDs work, where they come from and why they are important for Blockchain based Digital Identity.
What are decentralized identifiers (DIDs), how do they enable self-sovereign identity, and what does W3C standardization mean for interoperability and adoption?
Evernym's Drummond Reed and Brent Zundel discussed all this and more on our Sep 26, 2019 webinar.
Verifiable Credentials in Self-Sovereign Identity (SSI)Evernym
On our March 12, 2020 webinar, Evernym Chief Architect Daniel Hardman provided a great introduction to verifiable credentials and compared them to the physical credentials (passports, driver's licenses, loyalty cards) we use every day. He then identified six lessons we can learn from today's physical credentials and how we're applying each to the world of self-sovereign identity.
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSSIMeetup
https://ssimeetup.org/self-sovereign-identity-why-we-here-christopher-allen-webinar-51/
Internet cryptography and Self-sovereign identity (SSI) pioneer Christopher Allen talks about essential insights and reflections around historical, technological and ethical aspects of Self-Sovereign Identity at the 51st SSIMeetup.org webinar in collaboration with Rebooting the Web of Trust (RWOT) and Alianza Blockchain Iberoamérica as part of the events that took place at RWOT in Buenos Aires (Argentina).
Christopher is an entrepreneur and technologist who specializes in collaboration, security, and trust. As a pioneer in internet cryptography, he’s initiated cross-industry collaborations and co-created industry standards that influence the entire internet. Christopher’s focus on internet trust began as the founder of Consensus Development where he co-authored the IETF TLS internet-draft that is now at the heart of all secure commerce on the World Wide Web. Christopher is co-chair of the W3C Credentials CG working on standards for decentralized identity. Christopher has also been a digital civil liberties and human-rights privacy advisor, was part of the team that led the first UN summit on Digital Identity & Human Rights, and was the producer of a half-dozen iPhone and iPad games, and of Infinite PDF, a non-linear media app.
Decentralized Identifier (DIDs) fundamentals deep diveSSIMeetup
https://ssimeetup.org/decentralized-identifiers-dids-fundamentals-identitybook-info-drummond-reed-markus-sabadello-webinar-46/
Decentralized identifiers (abbreviated as “DIDs”), are the cryptographic counterpart to verifiable credentials (VCs) that together are the “twin pillars” of SSI architecture. In this special IdentityBook.info webinar Markus Sabadello, Founder and CEO of Danube Tech, and Drummond Reed, Chief Trust Officer at Evernym, co-authors of the DID chapter of the “Self-Sovereign Identity:
Decentralized Digital Identity and Verifiable Credentials” book published by Manning will explain all the fundamentals of DIDs. Based on the did chapter of the book, you will learn how DIDs evolved from the work started with VCs, how they are related to URLs and URNs, why a new type of cryptographically-verifiable identifier is needed for SSI, and how DIDs are being standardized at World Wide Web Consortium (W3C). Your guides will be two of the editors of the W3C Decentralized Identifier 1.0 specification: Markus Sabadello and Drummond Reed.
OSCON 2018 Getting Started with Hyperledger IndyTracy Kuhrt
Presented at OSCON 2018. Hyperledger Indy is a distributed ledger built for decentralized identity and is one of the open source frameworks hosted by Hyperledger. It provides tools, libraries, and reusable components for creating and using independent digital identities rooted on blockchains or other distributed ledgers. In this presentation, I introduce The Linux Foundation and Hyperledger. We look at Decentralized Identity Concepts -- identity models, decentralized identity, zero-knowledge proofs, and verifiable credentials. We look at a demo that utilizes Hyperledger Indy and these concepts. We then look at Hyperledger Indy's software stack and roadmap and touch on how you can get involved.
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan GeorgeSSIMeetup
https://ssimeetup.org/hyperledger-aries-open-source-interoperable-identity-solutions-nathan-george-webinar-30/
Nathan George, Sovrin Foundation CTO, and Hyperledger Contributor will explain what Hyperledger Aries is and how it will facilitate an open source infrastructure for interoperable identity solutions.
Aries was born out of the work on identity agents and identity wallets that began in the Hyperledger Indy project. Aries is, in fact, the second Hyperledger project to spin out of Hyperledger Indy. The first was Hyperledger Ursa, announced in December 2018.
Self-sovereign identity based on DIDs requires strong interoperability and pluggability at the infrastructure level. It also requires great applications that offer end-to-end functionality so that users can accomplish jobs with greater security, flexibility, and privacy. Aries is expected to be a major step forward in this direction.
Aries will be the industry’s first implementation of interoperable open source wallets for digital credentials that use the DKMS (Decentralized Key Management System) architecture that Evernym pioneered under a contract with the U.S. Department of Homeland Security.
The Shift from Federated to Decentralized IdentityEvernym
Up until recently, the majority of digital identity systems have been federated, where a small group of “identity providers” supply individuals with a digital identity that can be used to access other websites and services within the federation. Now we’re seeing the shift to decentralized identity solutions and open ecosystems based on verifiable credentials, where anyone can participate, issue, and verify.
In the first of a new series on digital identity and government, we invited leading experts from Accenture and Evernym to discuss the state of digital identity systems within the public sector and the reasons why government interest in decentralized models continues to increase.
We covered:
- The key differences between federated and decentralized identity systems
- An analysis of a few notable government-led projects, such as Aadhaar (India), Verify (UK), eIDAS (EU), and the Ontario Digital Identity Program (Canada)
- What decentralization means for portability, scalability, flexibility, and privacy
- How governments and commercial organizations can enhance existing federated identity systems with verifiable credentials
Verifiable Credentials 101 for SSI and Decentralized Digital Identity - Tyler...SSIMeetup
http://ssimeetup.org/verifiable-credentials-101-ssi-tyler-ruff-webinar-11/
Tyler Ruff, product manager at Evernym, will be our next guest to walk us through Verifiable Credentials in the context of Self-Sovereign Identity. He will cover how they are created, issued and shared, as well as cover some common technical questions.
The Verifiable Credentials discussed are based off a W3C standard for DIDs (decentralized identifiers) and Verifiable Credentials. The hope is that educating the identity and blockchain community on best practices for creating, issuing, storing and sharing Verifiable Credentials will foster interoperability between identity providers, ultimately making the whole ecosystem more valuable to the end consumer.
The focus of this presentation is how Verifiable Credentials work, and why the different steps and components are necessary.
If we can make Verifiable Credentials truly interoperable across industries, providers and domains, we can take a giant step forward towards a real self-sovereign world where individuals are in control of their digital lives and can benefit from every interaction they have—online and off. It all starts with getting interoperable, Verifiable Credentials under your control.
Verifiable Credentials, Self Sovereign Identity and DLTs Vasiliy Suvorov
My talk from Crypto Valley Conference 2018 on emerging standards in Self-Sovereign Identity, Technology behind it, Overview of implementations and how to use it with blockchain and DLT systems.
OpenID Connect 4 SSI is an initiative conducted at OpenID Foundation in liaison with the Decentralized Identity Foundation. It aims at specifying a set of protocols based on OpenID Connect to enable SSI applications.
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...Torsten Lodderstedt
This deck gives an overview of OpenID 4 Verifiable Credentials and shows how the specs can be tailored to the needs of a certain category of projects/ecosystems.
OpenID for Verifiable Credentials is a family of protocols supporting implementation of applications with Verifiable Credentials, i.e. verifiable credential issuance, credential presentation, and pseudonyms authentication.
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...SSIMeetup
https://ssimeetup.org/peer-dids-secure-scalable-method-dids-off-ledger-daniel-hardman-webinar-42/
Daniel Hardman, Chief Architect, Evernym / Secretary, Technical Governance Board – Sovrin Foundation will show how Peer DIDs will allow off-chain transactions for the self-sovereign identity (SSI) world.
Most documentation about decentralized identifiers (DIDs) describes them as identifiers that are rooted in a public source of truth like a blockchain, a database, a distributed filesystem, or similar. This publicness lets arbitrary parties resolve the DIDs to an endpoint and keys. It is an important feature for many use cases. However, the vast majority of relationships between people, organizations, and things have simpler requirements. When Alice(Corp|Device) and Bob want to interact, there are exactly and only 2 parties in the world who should care: Alice and Bob. Instead of arbitrary parties needing to resolve their DIDs, only Alice and Bob do. Peer DIDs are perfect in these cases. In many ways, peer DIDs are to public, blockchain-based DIDs what Ethereum Plasma or state channels are to on-chain smart contracts— or what Bitcoin’s Lightning Network is to on-chain cryptopayments. They move interactions off-chain, but offer options to connect back to a chain-based ecosystem as needed. Peer DIDs create the conditions for people, organizations, and things to have full control of their end of the digital relationships they sustain.
What are the questions you need to ask yourself before embarking on your self-sovereign identity journey? How can a clear, business-focused strategy help propel your initiative from proof-of-concept to delivery at scale?
In this presentation, we’ll help you evaluate what SSI means for your organization and design a plan that navigates both the technical and business considerations for a successful launch.
The Hyperledger Indy Public Blockchain NodeSSIMeetup
https://ssimeetup.org/hyperledger-indy-public-blockchain-node-alexander-shcherbakov-webinar-43/
Alexander Shcherbakov is a software engineer at DSR working on the team at Evernym. He has a Ph.D. in Mathematics and is one of the maintainers of Hyperledger Indy and Hyperledger Plenum. In this presentation, he will explain the value of a decentralized ledger in an SSI ecosystem and examine Hyperledger Indy, which is the distributed ledger that has been powering the Sovrin Network for more than two years.
Our identities have to be trusted to be useful. When we meet strangers, we decide how much we trust them by what they tell us, and whether a trusted third party will vouch for them. In traditional identity systems, the trusted third party knows everything about everyone in the ecosystem. In Self-Sovereign Identity systems, we rely on a decentralized ledger to privately validate that the identity claims do in fact come from a trusted issuer.
Indy’s blockchain implementation is Plenum, which is a general purpose, public-permissioned, BFT distributed ledger. The presentation takes a technical look at the architecture, cryptography, transactions, data structures, and storage of the ledger including auditability, request processing, catch-up procedure, and support for custom plugins and custom transactions.
Self-sovereign identity (SSI) is a new identity model that gives the user control and ownership over her data.
To dive into what this means and the benefits it offers, Evernym's Andy Tobin gave a webinar on October 17, 2019 introducing the topic of self-sovereign identity and its role in transforming customer experiences and unlocking competitive advantage.
Self Sovereign Identity (SSI) Open standards with Drummond Reed SSIMeetup
Drummond Reed, Chief Trust Officer at Evernym and Sovrin Foundation Trustee, features in our first Webinar "The Story of SSI Open Standards" by giving us the background on the foundation of Self Sovereign Identity. Drummond explains the technical and development aspects of DIDs, DKMS, DID Auth and Verifiable Credentials that will make Self Sovereign Identity possible.
Trust Frameworks and SSI: An Interview with CULedger on the Credit Union MyCU...SSIMeetup
http://ssimeetup.org/trust-frameworks-ssi-interview-culedger-credit-union-mycuid-trust-framework-drummond-reed-webinar-9/
Drummond Reed, Chief Trust Officer at Evernym and Sovrin Foundation Trustee, features in this Webinar “Trust Frameworks and SSI: An Interview with CULedger on the Credit Union MyCUID Trust Framework”. To make SSI work, verifiable digital credentials must be something that websites, businesses, governments, and many others accept. To do that, they need assurances about who issued the credential under what rules. This “rulebook” for issuing digital credentials is called a trust framework.
In this webinar, Evernym Chief Trust Officer Drummond Reed, chair of the Sovrin Foundation Trust Framework Working Group, will explain what a trust framework is and why they are are essential to SSI. Then he will interview executives of CULedger, the credit union blockchain consortia, about the MyCUID Trust Framework—the first global trust framework for proving membership in a credit union.
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan GeorgeSSIMeetup
https://ssimeetup.org/hyperledger-aries-open-source-interoperable-identity-solutions-nathan-george-webinar-30/
Nathan George, Sovrin Foundation CTO, and Hyperledger Contributor will explain what Hyperledger Aries is and how it will facilitate an open source infrastructure for interoperable identity solutions.
Aries was born out of the work on identity agents and identity wallets that began in the Hyperledger Indy project. Aries is, in fact, the second Hyperledger project to spin out of Hyperledger Indy. The first was Hyperledger Ursa, announced in December 2018.
Self-sovereign identity based on DIDs requires strong interoperability and pluggability at the infrastructure level. It also requires great applications that offer end-to-end functionality so that users can accomplish jobs with greater security, flexibility, and privacy. Aries is expected to be a major step forward in this direction.
Aries will be the industry’s first implementation of interoperable open source wallets for digital credentials that use the DKMS (Decentralized Key Management System) architecture that Evernym pioneered under a contract with the U.S. Department of Homeland Security.
The Shift from Federated to Decentralized IdentityEvernym
Up until recently, the majority of digital identity systems have been federated, where a small group of “identity providers” supply individuals with a digital identity that can be used to access other websites and services within the federation. Now we’re seeing the shift to decentralized identity solutions and open ecosystems based on verifiable credentials, where anyone can participate, issue, and verify.
In the first of a new series on digital identity and government, we invited leading experts from Accenture and Evernym to discuss the state of digital identity systems within the public sector and the reasons why government interest in decentralized models continues to increase.
We covered:
- The key differences between federated and decentralized identity systems
- An analysis of a few notable government-led projects, such as Aadhaar (India), Verify (UK), eIDAS (EU), and the Ontario Digital Identity Program (Canada)
- What decentralization means for portability, scalability, flexibility, and privacy
- How governments and commercial organizations can enhance existing federated identity systems with verifiable credentials
Verifiable Credentials 101 for SSI and Decentralized Digital Identity - Tyler...SSIMeetup
http://ssimeetup.org/verifiable-credentials-101-ssi-tyler-ruff-webinar-11/
Tyler Ruff, product manager at Evernym, will be our next guest to walk us through Verifiable Credentials in the context of Self-Sovereign Identity. He will cover how they are created, issued and shared, as well as cover some common technical questions.
The Verifiable Credentials discussed are based off a W3C standard for DIDs (decentralized identifiers) and Verifiable Credentials. The hope is that educating the identity and blockchain community on best practices for creating, issuing, storing and sharing Verifiable Credentials will foster interoperability between identity providers, ultimately making the whole ecosystem more valuable to the end consumer.
The focus of this presentation is how Verifiable Credentials work, and why the different steps and components are necessary.
If we can make Verifiable Credentials truly interoperable across industries, providers and domains, we can take a giant step forward towards a real self-sovereign world where individuals are in control of their digital lives and can benefit from every interaction they have—online and off. It all starts with getting interoperable, Verifiable Credentials under your control.
Verifiable Credentials, Self Sovereign Identity and DLTs Vasiliy Suvorov
My talk from Crypto Valley Conference 2018 on emerging standards in Self-Sovereign Identity, Technology behind it, Overview of implementations and how to use it with blockchain and DLT systems.
OpenID Connect 4 SSI is an initiative conducted at OpenID Foundation in liaison with the Decentralized Identity Foundation. It aims at specifying a set of protocols based on OpenID Connect to enable SSI applications.
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...Torsten Lodderstedt
This deck gives an overview of OpenID 4 Verifiable Credentials and shows how the specs can be tailored to the needs of a certain category of projects/ecosystems.
OpenID for Verifiable Credentials is a family of protocols supporting implementation of applications with Verifiable Credentials, i.e. verifiable credential issuance, credential presentation, and pseudonyms authentication.
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...SSIMeetup
https://ssimeetup.org/peer-dids-secure-scalable-method-dids-off-ledger-daniel-hardman-webinar-42/
Daniel Hardman, Chief Architect, Evernym / Secretary, Technical Governance Board – Sovrin Foundation will show how Peer DIDs will allow off-chain transactions for the self-sovereign identity (SSI) world.
Most documentation about decentralized identifiers (DIDs) describes them as identifiers that are rooted in a public source of truth like a blockchain, a database, a distributed filesystem, or similar. This publicness lets arbitrary parties resolve the DIDs to an endpoint and keys. It is an important feature for many use cases. However, the vast majority of relationships between people, organizations, and things have simpler requirements. When Alice(Corp|Device) and Bob want to interact, there are exactly and only 2 parties in the world who should care: Alice and Bob. Instead of arbitrary parties needing to resolve their DIDs, only Alice and Bob do. Peer DIDs are perfect in these cases. In many ways, peer DIDs are to public, blockchain-based DIDs what Ethereum Plasma or state channels are to on-chain smart contracts— or what Bitcoin’s Lightning Network is to on-chain cryptopayments. They move interactions off-chain, but offer options to connect back to a chain-based ecosystem as needed. Peer DIDs create the conditions for people, organizations, and things to have full control of their end of the digital relationships they sustain.
What are the questions you need to ask yourself before embarking on your self-sovereign identity journey? How can a clear, business-focused strategy help propel your initiative from proof-of-concept to delivery at scale?
In this presentation, we’ll help you evaluate what SSI means for your organization and design a plan that navigates both the technical and business considerations for a successful launch.
The Hyperledger Indy Public Blockchain NodeSSIMeetup
https://ssimeetup.org/hyperledger-indy-public-blockchain-node-alexander-shcherbakov-webinar-43/
Alexander Shcherbakov is a software engineer at DSR working on the team at Evernym. He has a Ph.D. in Mathematics and is one of the maintainers of Hyperledger Indy and Hyperledger Plenum. In this presentation, he will explain the value of a decentralized ledger in an SSI ecosystem and examine Hyperledger Indy, which is the distributed ledger that has been powering the Sovrin Network for more than two years.
Our identities have to be trusted to be useful. When we meet strangers, we decide how much we trust them by what they tell us, and whether a trusted third party will vouch for them. In traditional identity systems, the trusted third party knows everything about everyone in the ecosystem. In Self-Sovereign Identity systems, we rely on a decentralized ledger to privately validate that the identity claims do in fact come from a trusted issuer.
Indy’s blockchain implementation is Plenum, which is a general purpose, public-permissioned, BFT distributed ledger. The presentation takes a technical look at the architecture, cryptography, transactions, data structures, and storage of the ledger including auditability, request processing, catch-up procedure, and support for custom plugins and custom transactions.
Self-sovereign identity (SSI) is a new identity model that gives the user control and ownership over her data.
To dive into what this means and the benefits it offers, Evernym's Andy Tobin gave a webinar on October 17, 2019 introducing the topic of self-sovereign identity and its role in transforming customer experiences and unlocking competitive advantage.
Self Sovereign Identity (SSI) Open standards with Drummond Reed SSIMeetup
Drummond Reed, Chief Trust Officer at Evernym and Sovrin Foundation Trustee, features in our first Webinar "The Story of SSI Open Standards" by giving us the background on the foundation of Self Sovereign Identity. Drummond explains the technical and development aspects of DIDs, DKMS, DID Auth and Verifiable Credentials that will make Self Sovereign Identity possible.
Trust Frameworks and SSI: An Interview with CULedger on the Credit Union MyCU...SSIMeetup
http://ssimeetup.org/trust-frameworks-ssi-interview-culedger-credit-union-mycuid-trust-framework-drummond-reed-webinar-9/
Drummond Reed, Chief Trust Officer at Evernym and Sovrin Foundation Trustee, features in this Webinar “Trust Frameworks and SSI: An Interview with CULedger on the Credit Union MyCUID Trust Framework”. To make SSI work, verifiable digital credentials must be something that websites, businesses, governments, and many others accept. To do that, they need assurances about who issued the credential under what rules. This “rulebook” for issuing digital credentials is called a trust framework.
In this webinar, Evernym Chief Trust Officer Drummond Reed, chair of the Sovrin Foundation Trust Framework Working Group, will explain what a trust framework is and why they are are essential to SSI. Then he will interview executives of CULedger, the credit union blockchain consortia, about the MyCUID Trust Framework—the first global trust framework for proving membership in a credit union.
Identity and the quest for Self-Sovereign Identity - Daniel HardmanSSIMeetup
Self-sovereign identity (SSI) is exploding as a topic. It can be hard to make sense of all the initiatives and technologies, and of similar words like "decentralized identity." However, a few deep themes are emerging as foundational elements, no matter which details are true of your favorite approach. This webinar with Daniel Hardman, Chief Architect, Evernym / Secretary , Technical Governance Board - Sovrin Foundation, will distill the topic down to certain fundamentals, show how they manifest differently in various approaches, and discuss where the community is likely to coalesce or diverge.
In this presentation, Erik Van Buggenhout (NVISO founder & SANS Instructor) zooms in on Windows 10 CredentialGuard and how it can be used to protect against LSASS hash dumping (e.g. using Mimikatz). Want to learn more? Join us at SANS SEC599!
Blockchain R&D to Decentralized Identity DeploymentAnil John
DHS S&T SVIP Presentation on the DHS work using W3C Verifiable Credentials and W3C Decentralized Identifiers at the EU/EC NGI's ESSIF-Lab Final Event in Brussels on 12 Dec, 2022.
Highlights of Internet Identity Workshop #28 with Drummond ReedSSIMeetup
https://ssimeetup.org/highlights-internet-identity-workshop-28-drummond-reed-ssi-meetup-one-year-anniversary-special-webinar-27/
SSI Meetup veteran Drummond Reed, Chief Trust Officer at Evernym and Trustee at the Sovrin Foundation, will cover the highlights of the latest edition of the longest-running conference in the Internet identity space—Internet Identity Workshop. Drummond has attended all 28 IIWs, and he will share his major takeaways from this gathering of the movers and shakers in SSI from around the world to celebrate SSIMeetup’s one year anniversary.
Data protection on premises, and in public and private cloudsUlf Mattsson
With sensitive data residing everywhere, organizations becoming more mobile, and the breach epidemic growing, the need for advanced identity and data protection solutions has become even more critical.
Learn about the Identity and Data Protection solutions for enterprise security organizations can take a data-centric approach to their security posture.
Learn about the new trends in Data Masking, Tokenization and Encryption.
Learn about the guidance and standards from FFIEC, PCI DSS, ISO and NIST.
Learn about the new API Economy and eCommerce trends and how to control sensitive data — both on-premises, and in public and private clouds.
This session is for worldwide directors and managers in Fin services, healthcare, energy, government and more
Jon Noble. Jon will give a brief overview of why you should consider security as part of your CloudStack deployment, why your approach to security needs to be different than in a traditional environment, and also talk about some of the motives behind the attacks – why they attack you and what they do once they have compromised a system.
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...Michael Noel
Organizations today are vastly unprepared for the threat of modern cyber-attacks. At the same time, the attackers are becoming more sophisticated and the amount of resources at their disposal is increasing. It has become a lucrative business to hack, disrupt, and steal intellectual property from organizations of all sizes and in all business sectors.
While the attackers are becoming more sophisticated, organizations have their IT security positioned for threats from the past century, with poor password management techniques, simple ACL based file permissions, and basic firewall and zone-based containment techniques. This makes it easier for attackers to obtain access to critical intellectual property and makes career-ruining disruptions all the more common.
This session focuses on understanding what is currently wrong with IT security practices and how your organization can change processes, techniques, and tools to provide for a significantly higher level of IT security without necessarily having to implement expensive tools or obtrusive processes.
• Understand the pitfalls of current IT Security practices, including myths around password change policies, allowing logins without providing multiple factors, and the proliferation of ‘always-on’ admin rights.
• Examine how simple changes in IT strategy can greatly improve your overall IT posture, including providing for up to a 99% improvement in the likelihood of a data credential theft.
• Determine which easy to deploy tools and features which you may already be licensed for can be used to tighten up IT security within an environment, including solutions such as Microsoft Defender for Identity, Azure Sentinel, Microsoft Cloud App Security, next-generation firewalls, and more.
Apache Milagro Presentation at ApacheCon Europe 2016Brian Spector
Apache Milagro (incubating) establishes a new internet security framework purpose-built for cloud-connected app-centric software and IoT devices that require Internet scale. Milagro's purpose is to provide a secure, free, and positive open source alternative to centralised and proprietary monolithic trust providers such as commercial certificate authorities and the certificate backed cryptosystems that rely on them.
Milagro is an open source, pairing-based cryptographic platform that delivers solutions for device and end user authentication, secure communications and fintech / blockchain security; issues challenging Cloud Providers and their customers. It does this without the need for certificate authorities, putting into place a new category of service providers called Distributed Trust Authorities (D-TA®).
Milagro's M-Pin® protocol, and its existing open-source MIRACL® implementation on which MILAGRO is built, is already in use by Experian, NTT, Ingram Micro, and Gov.UK and rolled out to perform at Internet scale for Zero Password® multi-factor authentication and certificate-less HTTPS / secure channel.
Identity can seem deceptively simple. We know who we are. Sometimes we have to convince others of that fact and confirm other characteristics: our age, our qualifications, or our right to access some services or tools. This happens every day over the Internet, but in ways that are disorganized, redundant, and risky. The lack of reliable, universal standards puts our private information at risk of public dissemination, fraud or worse.
The pioneers developing the internet didn’t define nuanced standards for identity -- most everything was just username and passwords. Over the past 20 years we have seen a range of standards that solve some identity challenges, including SAML, LDAP, OpenID Connect, OAuth, SCIM, Information Cards, and FIDO. None of them have comprehensively addressed the challenge of identity at internet scale.
A new set of standards is emerging that creates an infrastructure for self-sovereign identity that can scale. This talk looks forward to help you think ahead and prepare for this new infrastructure. We will walk through standards that together create a new identity infrastructure that leverages the blockchain. This isn’t about what you can implement tomorrow to solve your employee identity challenges or manage customer accounts. It will instead prepare you for the coming changes and help you play a role in shaping them.
ZKorum: Building the Next Generation eAgora powered by SSISSIMeetup
The immense potential unlocked by SSI in content-centric social networks (forums) is largely unaddressed by the recent wave of decentralized social networks. Enter ZKorum - a network of verifiable communities where members create anonymous polls and discussions. In this episode, Nicolas Gimenez, the Co-Founder and CTO of ZKorum, unveils the Alpha version and delves into its architecture, drawing inspiration from SSI, DWeb, and Password Managers.
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...SSIMeetup
Lovesh Harchandani from Dock presents their approach to anonymous credentials and dives in on the various predicates that can be proven in zero knowledge. In over 90 minutes of discussion, we cover what these cryptographic techniques are, how they enable several important use cases for digital identity credentials, and we stretch James Monaghan's ability to keep up as interviewer by taking a look at the source code which makes it all possible! We show how various zero knowledge primitives we've built can be used in a modular fashion to solve real-world use cases. We cover privacy-preserving signature schemes, zero knowledge attribute equalities, range proofs, and verifiable encryption based on ZK-SNARKs, expressing arbitrary predicates as Circom programs and creating ZK proofs for them and blinded credentials (issuer is unaware of all attributes). For anyone interested in the technical underpinnings of this new frontier of digital identity, this episode is a must!
Value proposition of SSI tech providers - Self-Sovereign IdentitySSIMeetup
Talk with Vladimir Vujovic, Senior Digital Innovation Manager from SICPA about product definition and value proposition of Issuer/Holder/Verifier software of SSI tech providers. Why is it hard to convey the right message to the audience coming from outside of SSI domain. How different SSI tech providers define their offering and the language they use to convey the message. What is really the value proposition of SSI tech providers who are offering their Issuer/Verifier software to the market. How big regulation initiatives like the one in Europe for eIDAS v2 are driving the market and roadmaps for SSI tech providers and how will such initiative will have impact to the rest of the world in terms of regulation, but some of the underlying technical standards. What is the place of SSI platforms in the broader Identity landscape and when are we going to see more maturity from the market.
SSI Adoption: What will it take? Riley HughesSSIMeetup
Adoption: its the elephant in the room. SSI has so much potential, but the benefits are only realised once adoption happens at scale. In this webinar, Riley Hughes, CEO and Co-Founder of Trinsic, shares his 3 concrete recommendations for building products which are successful according to the most important metric - getting adopted!
Daniel Buchner is here to save the web. Not the web as we know it, full of closed platforms and intermediaries where both free choice and free speech are curtailed, but the web as it was intended to be: a thriving, open ecosystem of apps and protocols which put individuals at the center. To do this, he and the TBD team at Block are building what they call “Web5” which combines decentralized identifiers, verifiable credentials and personal datastores to create a platform for building truly self-sovereign apps on the web. In this webinar, we go beyond the controversial name to learn what the project is, why it is important, and what we can expect from the upcoming release this summer.
Portabl - The state of open banking, regulations, and the intersection of SSI...SSIMeetup
Complying with Know Your Customer and Anti Money Laundering regulations is hugely complicated and expensive for financial institutions, and burdensome for their customers. Nate Soffio, Co-Founder and CEO of Portabl, believes that the solution lies in secure, interoperable data - enabled by verifiable credentials. In this webinar, he explains why it is such a thorny problem, how open banking needs to evolve to more of a “tap to prove” model as organizations increasingly need continuous identity assurance, and why despite describing the task as “playing SSI on ‘hard mode’”, he believes building a “compound startup” is the best way to get the job done.
PharmaLedger: A Digital Trust Ecosystem for HealthcareSSIMeetup
Daniel Fritz, Executive Director of the PharmaLedger Association and Marco Cuomo, Director of Tech Products & Innovation at Novartis, will present their SSI journey from the initial ideas, through realization of several Proof of Concepts with DIDs and VCs, to the PharmaLedger initiative. PharmaLedger was a 29 member, 3-year, €22 million project under the EU and EFPIA Innovative Medicine Initiative pursued DIDs with external partners such as the global standards organization GS1 and the Global Legal Identifier Foundation (GLEIF). The project also resulted in the creation of the PharmaLedger Association in 2022, a non-profit Swiss association mandated to launch the first open-source product, electronic Product Information (eLeaflet). The webinar will review some of the use cases and dive a little into the technical architecture adopted in the project.
Cheqd: Making privacy-preserving digital credentials funSSIMeetup
Everyone is excited about SSI but there still aren’t any use cases that form part of people’s daily lives, so the team at Cheqd set out to change that. In this session, Ankur Banerjee walks through the research that led them to settle on social reputation in Web3 ecosystems as a use case that would be fun and drive daily usage. Find out more on creds.xyz.
Polygon ID offers tools that allow developers to build self-sovereign, decentralized and private identity solutions for users that leverage zero knowledge proofs. Polygon ID was released as open source last March 2023 at ETH Denver. In this presentation, Otto Mora, BD Lead for Americas, and Oleksander Brezhniev, Technical Lead at Polygon ID, will be covering aspects of the did:PolygonID method including: Verifiable presentations leveraging ZK Proofs; How the Proofs are generated; Credential Issuance Methods; and Identity Management Features.
Building SSI Products: A Guide for Product ManagersSSIMeetup
Self-sovereign identity, decentralised identity, web5… collectively “ID Tech” has become a much more mainstream topic in recent years, and we are seeing an increasing number of products being built using these new technologies. However, with all the hand-wringing about adoption that we hear in the industry, it can sometimes feel like a hammer looking for nails. Which specific and tangible benefits can ID Tech bring to its users, and what special considerations should a product manager have in mind when working in this space? James Monaghan has been a product leader for two decades and has worked on ID Tech projects in financial services, travel, healthcare, education and more. In this talk he will share his views on how to tell whether a customer problem might call for an ID Tech solution, and how to approach some of the product decisions which arise when applying these tools.
Solving compliance for crypto businesses using Decentralized Identity – Pelle...SSIMeetup
https://ssimeetup.org/solving-compliance-crypto-businesses-using-decentralized-identity-pelle-braendgaard-webinar-60/
A new global framework for regulating the crypto industry is coming into place this year. One of the most important new rules that businesses interacting with crypto has to implement is what is known as the Travel Rule. The Travel Rule, which is also known as The Wire Transfer rule, requires a business managing crypto on behalf of their user to transfer KYC’d (Know-Your-Customer) Identity Information to a receiving institution. Pelle Braendgaard, CEO of Notabene, will share his insights and explain how his company is tackling this business challenge for the industry.
Complying with this rule provides many challenges for the industry. Several industry groups have already started to invent several new protocols to solve this. Notabene helps financial companies be compliant with new, global anti-money laundering (AML) regulations for crypto transactions coming into effect right now. Pelle believes this is a critical use case for SSI (Self-Sovereign Identity). In this talk, he will go over the rule itself, industry protocols, how he sees SSI can help here, and how they are helping to solve it.
The Pan-Canadian Trust Framework (PCTF) for SSISSIMeetup
https://ssimeetup.org/pan-canadian-trust-framework-pctf-ssi-tim-bouma-webinar-59/
We are very proud to release a special webinar to introduce the next chapter of the “Self-Sovereign Identity Book” from two of the most eminent authorities on digital identity in government: Tim Bouma and Dave Roberts, senior public servants with the Government of Canada and major contributors to the Pan-Canadian Trust Framework (PCTF).
In this chapter, Tim and Dave explain the PCTF model and how it maps to the SSI model and the Trust over IP (ToIP) stack.
This webinar describes how a world leader in digital identity (which Canada has been for two decades) sees the opportunity in the new decentralized identity model represented by SSI (Self-Sovereign Identity).
Identity-centric interoperability with the Ceramic ProtocolSSIMeetup
https://ssimeetup.org/identity-centric-interoperability-ceramic-protocol-joel-thorstensson-webinar-57/
Ceramic is a new permissionless protocol for creating and accessing unstoppable documents that serve as the foundation for a connected, interoperable web without silos. Joel Thorstensson is the founder and CTO of 3Box and the primary author of the ceramic protocol as well as several Ethereum standards for identity and will provide a conceptual and technical intro to Ceramic.
At the root of many of the internet’s problems is that apps and services today are built primarily in silos. This includes identity registries and credentials, user data and access permissions, infrastructure, and services. It not only puts control over data and identities in the wrong hands, but it’s a fundamentally outdated and inefficient model for building digital products.
Ceramic unlocks information interoperability between all platforms and services across the web, allowing participants to create and resolve documents for any type of information without any centralized service. Ceramic uses DIDs (Decentralized Identifiers), IPLD (InterPlanetary Linked Data), signed messages, and blockchain anchoring to create a trusted and shared graph of verifiable documents. While flexible, these documents are especially well-suited for self-sovereign identity systems, user-centric data ecosystems, and open web services.
https://ssimeetup.org/ssi-ecosystem-south-korea-jaehoon-shim-webinar-56/
Jaehoon Shim, a blockchain researcher at LG CNS and the founder of SSIMeetup Korea, will introduce the Self-Sovereign Identity (SSI) ecosystem of South Korea. South Korea became a hotbed of Self Sovereign Identity in the last couple of years. The number of government-funded projects, including the mobile credential for government officials, requires using DIDs (Decentralized Identifiers). Also, hundreds of enterprises joined public/private consortia on decentralized identity to empower the digital transformation of the South Korean society. Jaehoon will explain in detail the current ecosystem and discuss opportunities for the future.
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloSSIMeetup
https://ssimeetup.org/introducing-ssi-eidas-legal-report-ignacio-alamillo-webinar-55/
The European Commission developed the SSI (Self-Sovereign Identity) eIDAS bridge, an ISA2 funded initiative, to promote eIDAS as a trust framework for the SSI ecosystem. It assists a VC (Verifiable Credential) issuer in the signing process, and helps the verifier to automate the identification of the organization behind the issuer’s DID (Decentralized Identifier). Simply by “crossing” the eIDAS Bridge, a Verifiable Credential can be proven trustworthy in the EU. Ignacio Alamillo will present at this SSI Meetup webinar the insights gained from this report.
In the context of the eIDAS bridge project, we performed an analysis on how eIDAS can legally support digital identity and trustworthy DLT-based transactions in the Digital Single Market, and this is reflected in the SSI eIDAS legal report, available at this link. The objective of this report is to evaluate the potential legal issues that are important to an SSI solution and make some recommendations to be used as policy input for the eIDAS 2020 review. The report outlines short-term objectives, where changes in the Regulation would not be necessary, but also mid to long-term scenarios requiring major changes in the Regulation to comply with the SSI design principles.
The different scenarios described in the report are aligned with the proposed architectural and procedural considerations designed in the SSI eIDAS Bridge project and the European Self Sovereign Identity Framework.
Learn about the Trust Over IP (ToIP) stackSSIMeetup
https://ssimeetup.org/trust-over-ip-toip-stack-webinar-54/
At SSI Meetup you’ve been hearing about the Trust over IP (ToIP) stack (originally called the “SSI stack”) since last September 2019. In this webinar, three pioneers of this new architecture for Internet-scaled digital trust infrastructure will share exciting news about where ToIP is going. We can’t reveal the details yet—it is under embargo until next Tuesday—but let’s just say you don’t want to miss it.
How to avoid another identity nightmare with SSI? Christopher AllenSSIMeetup
https://ssimeetup.org/how-avoid-another-identity-tragedy-with-ssi-christopher-allen-webinar-53/
Join the Dutch Self-Sovereign Identity community in a #Foremembrance for those who died by attempting to bomb the civil archives captured by the Nazis & those defending the vulnerable today. Christopher Allen will share with us the importance of this event for the self-sovereign identity community to build the future of identity on sunset Amsterdam time March 27th. We will also analyze the impact and risk of COVID-19 for privacy and identity systems.
March 27th is a Friday this year. Sunset in Amsterdam is at 19:06 CET, 2:06 pm EDT, 11:06 am PDT & is 1:06 am March 28 in Taipei & Hong Kong.
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemsSSIMeetup
https://ssimeetup.org/eidas-regulation-anchoring-trust-self-sovereign-identity-systems-ignacio-alamillo-webinar-49/
Ignacio Alamillo is a lawyer, PhD in eIDAS Regulation, CISA, CISM, and EU Commission legal expert for EBSI eSSIF and the EBSI eIDAS Bridge initiatives. Ignacio will introduce SSI solutions, using the Alastria ID reference model as an illustrative example, taking into account the need for trust management frameworks, and trust anchors. Secondly, he will introduce the eIDAS Regulation, currently the major electronic identification regulation in the European Union, supporting a pan-European identity federation system, and the legal framework for the so-called trust services.
The EU has developed some key proposals arising from the legal assessment of the EBSI ESSIF use case, oriented to extend the eIDAS Regulation to SSI solutions used with public sector bodies relationships and procedures. This results were publicly presented in the 2nd ESSIF Stakeholders Meeting that took place in Brussels mid-January 2020.
The objective of the ESSIF legal assessment is to evaluate the potential legal issues that are horizontal to an SSI solution, including:
DIDs: What is the legal nature and ownership of DIDs (asset vs a special kind of pseudonym), how should be DIDs managed in case of minors and incapable persons, if DID may be subject to seizure, when DIDs may be deactivated, what is the legal regime of keys and wallets, etc.
VCs: What are the duties and responsibilities of VCs issuers, holders and verifiers. How to model the contractual/non-contractual relations between issuers & verifiers, and set up liability models. We should pay special attention to the legal aspects of the VC lifecycle (issuance, suspension and revocation causes, etc).
Alignment of the SSI solution with the eIDAS Regulation: aligning VCs with eIDAS eID rules, but also linking VCs to eSeals or eSignatures.
Trust framework: legal input regarding LoAs, governance aspects, conformity, etc.
The use cases include:
Using eIDAS identification means (and qualified certificates?) to issue verifiable credentials.
Using qualified certificates to support verifiable claims (EBSI eIDAS bridge) and legal evidences with full legal value.
Using SSI VCs as an eIDAS identification means.
Using blockchain plus SSI as an electronic registered delivery service.
All content represent just the opinion of Ignacio Alamillo, and do not represent any official position from the EU Commission nor any of its officers
Explaining SSI to C-suite executives, and anyone else for that matterSSIMeetup
https://ssimeetup.org/explaining-ssi-c-suite-executives-anyone-else-john-phillips-webinar-48/
John Phillips from 460degrees in Australia has been exploring with his team for more than two years for a way to describe Self-Sovereign Identity (SSI) that was easy to understand. We think he has found a good method to make SSI easy to understand for any C-suite executive and business people that goes beyond the technology.
John published a video in late 2019 that we found deeply insightful and we have invited him to share this with the SSI Meetup audience. This demo has been going down amazingly well with audiences from c-suite technology execs to design students.
This approach quite literally animates the discussion. People add other objects into the mix, move things around, ask relevant, insightful, questions.
John will share the learnings he is gaining from University research, as well as the results of work in supporting capstone projects for higher education students, and how this has led us to a storytelling model to explain SSI.
The 2nd Official W3C DID Working Group Meeting (The Netherlands)SSIMeetup
https://ssimeetup.org/did-report-2-2nd-official-w3c-did-working-group-meeting-netherlands-drummond-reed-markus-sabadello-webinar-45/
The DID Report 2 about the Second Meeting of the W3C DID Working Group with Drummond Reed and Markus Sabadello from Danube Tech, co-authors of the W3C DID specification.
DID spec co-author Drummond Reed and Markus Sabadello will report back from Amsterdam (The Netherlands) for the second official meeting of the W3C DID Working Group taking place from January 29-31, 2020 to share highlights of the meeting and the roadmap for taking DIDs to a full Web standard.
This session will be followed one hour later by a full DID education session based on the DID chapter published with Manning by IdentityBook.info authors Drummond Reed, Markus Sabadello and Alex Preukschat. If you want to learn all the basics about DIDs please also join this session here: Webinar 46
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Puzzle - Drummond Reed
1. Decentralized Key Management System
(DKMS): An Essential Missing Piece of
the Self-Sovereign Identity (SSI) Puzzle
Drummond Reed @drummondreed
Chief Trust Officer Evernym and Sovrin Foundation Trustee
July 2018
Background photo: Christoph Scholz https://creativecommons.org/licenses/by-sa/2.0/
7. Emerging Open Standards for SSI
DID (Decentralized Identifier)
DKMS (Decentralized Key
Management System)
DID Auth
Verifiable Credentials
SSIMeetup.org
30. How did DKMS happen?
1. Conceived in 2016 by Evernym as part of
our initial contract with U.S. Dept of
Homeland Security S&T to develop DIDs
2. DKMS Design and Architecture
developed over a 1-year contract w/DHS
3. Published in Hyperledger Indy repo for
announcement at IIW #26 in April 2017
30 SSIMeetup.org
31. 31
The initial DKMS architecture is
now in open public review in the
Hyperledger Indy github:
http://bit.ly/dkmsv3
SSIMeetup.org
32. 32
The plan is to form a DKMS
Technical Committee at OASIS,
currently the home of the KMIP
(Key Management Interoperability
Protocol) open standard
SSIMeetup.org
33. 33
Work on the DID specification has been funded in part
by a Small Business Innovation Research (SBIR) grant
from the U.S. Department of Homeland Security
Science and Technology Directorate.
The content of this specification does not necessarily
reflect the position or the policy of the U.S. Government
and no official endorsement should be inferred.
Thank You
SSIMeetup.org
35. Trust Frameworks and SSI:
An Interview with CULedger on the
Credit Union MyCUID Trust Framework
Drummond Reed with Rick Cranston, COO, and Julie Esser, Chief
Engagement Officer of CULedger
July, 2018
SSIMeetup.orghttps://creativecommons.org/licenses/by-sa/4.0/
36. Decentralized Key Management System
(DKMS): An Essential Missing Piece of
the Self-Sovereign Identity (SSI) Puzzle
Drummond Reed @drummondreed
Chief Trust Officer Evernym and Sovrin Foundation Trustee
July 2018
Background photo: Christoph Scholz https://creativecommons.org/licenses/by-sa/2.0/