How can we leverage on distributed ledger technology and cryptography to provide identity as a global, cross-jurisdiction and accessible utility for the world?
Part 1: Introduction to Self-Sovereing Identity (SSI), Verifiable Credentials, Standards defined by Decentralised Identity Foundation and W3C.
Part2: How to use it with Corda to develop scalable, decentralised applications that use smart contracts and SSI to orchestrate complex, multi-party processes.
Decentralized identity uses standards to create an interoperable language for new identity products and services to be build. Using Verifiable Credentials and Decentralized Identifiers.
Introduction to Self Sovereign Identity - IIW October 2019Heather Vescent
The document describes an internet identity workshop discussing decentralized identity models, standards, and specifications. It provides an agenda that includes introductions from three speakers and their backgrounds in decentralized identity. The vision for a global digital rail is presented, covering interoperability, cross-border functionality, and government support. Digital identity models from centralized to federated to decentralized are defined. Emerging standards for decentralized identifiers (DIDs) are explained, including DID documents, methods, authentication, and verifiable credentials. Examples from Transmute and Vivvo are mentioned, along with a Q&A session.
Verifiable Credentials, Self Sovereign Identity and DLTs Vasiliy Suvorov
My talk from Crypto Valley Conference 2018 on emerging standards in Self-Sovereign Identity, Technology behind it, Overview of implementations and how to use it with blockchain and DLT systems.
Hyperledger Indy Platform - Privacy, Security and Power for Digital Identity ...Gokul Alex
Blockchain Engineering Workshop for World Blockchain Conclave organised by 1point2GWS. Session on Hyperledger Indy Framework, Architecture Model, Components, Modules, Workflows. Demonstrated Verifiable Organisation Networks and Decentralised Workflows on Hyperledger Indy. Demonstrated Hyperledger Indy CLI and Indy Sandbox. Deep Dive on Decentralised Identifiers ( DID ) and the goals of DID. An overview of Sovrin platform is included.
Decentralized Identifiers (DIDs) are self-sovereign identifiers for individuals, organizations, and things that are persistent, dereferenceable, decentralized, and cryptographically verifiable identifiers registered in a blockchain or other decentralized network. There are different DID methods that must have a specification and resolver implementation. A DID document containing public keys, service endpoints, and other metadata is resolved from the DID. DIDs enable verifiable credentials and authentication through challenge-response protocols using the DID document. Standards groups are working on further developing DIDs, verifiable credentials, and rebooting the web of trust through decentralized identity.
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply ChainHeather Vescent
Supply chain is a complex ecosystem with many participants, that may include governments, transnational companies, brokers and other middlemen, and local farms, factories, and other suppliers. Another reason supply chain is complex is because it cuts across borders, and must adhere to laws and regulations in multiple jurisdictions: global, national, and local.
This report researched the supply chain through the lens of digital identity for tracking and auditing.
Download the reports:
Gaps: bit.ly/NPEreport
Supply Chain: bit.ly/GSCreport
This document summarizes a presentation about decentralized digital identities. It discusses past approaches where identity data was siloed or federated through centralized identity providers. A new generation uses distributed ledgers like blockchains to allow for self-sovereign identities through decentralized identifiers (DIDs). DIDs are cryptographically verifiable identifiers stored on a distributed ledger along with DID documents containing public keys and other identity data. Projects are working to develop verifiable credentials and standards like DID, DID Auth, and DKMS to enable decentralized, self-sovereign identity management. Permissionless systems like Poker face challenges in achieving full decentralization without trusted third parties.
Part 1: Introduction to Self-Sovereing Identity (SSI), Verifiable Credentials, Standards defined by Decentralised Identity Foundation and W3C.
Part2: How to use it with Corda to develop scalable, decentralised applications that use smart contracts and SSI to orchestrate complex, multi-party processes.
Decentralized identity uses standards to create an interoperable language for new identity products and services to be build. Using Verifiable Credentials and Decentralized Identifiers.
Introduction to Self Sovereign Identity - IIW October 2019Heather Vescent
The document describes an internet identity workshop discussing decentralized identity models, standards, and specifications. It provides an agenda that includes introductions from three speakers and their backgrounds in decentralized identity. The vision for a global digital rail is presented, covering interoperability, cross-border functionality, and government support. Digital identity models from centralized to federated to decentralized are defined. Emerging standards for decentralized identifiers (DIDs) are explained, including DID documents, methods, authentication, and verifiable credentials. Examples from Transmute and Vivvo are mentioned, along with a Q&A session.
Verifiable Credentials, Self Sovereign Identity and DLTs Vasiliy Suvorov
My talk from Crypto Valley Conference 2018 on emerging standards in Self-Sovereign Identity, Technology behind it, Overview of implementations and how to use it with blockchain and DLT systems.
Hyperledger Indy Platform - Privacy, Security and Power for Digital Identity ...Gokul Alex
Blockchain Engineering Workshop for World Blockchain Conclave organised by 1point2GWS. Session on Hyperledger Indy Framework, Architecture Model, Components, Modules, Workflows. Demonstrated Verifiable Organisation Networks and Decentralised Workflows on Hyperledger Indy. Demonstrated Hyperledger Indy CLI and Indy Sandbox. Deep Dive on Decentralised Identifiers ( DID ) and the goals of DID. An overview of Sovrin platform is included.
Decentralized Identifiers (DIDs) are self-sovereign identifiers for individuals, organizations, and things that are persistent, dereferenceable, decentralized, and cryptographically verifiable identifiers registered in a blockchain or other decentralized network. There are different DID methods that must have a specification and resolver implementation. A DID document containing public keys, service endpoints, and other metadata is resolved from the DID. DIDs enable verifiable credentials and authentication through challenge-response protocols using the DID document. Standards groups are working on further developing DIDs, verifiable credentials, and rebooting the web of trust through decentralized identity.
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply ChainHeather Vescent
Supply chain is a complex ecosystem with many participants, that may include governments, transnational companies, brokers and other middlemen, and local farms, factories, and other suppliers. Another reason supply chain is complex is because it cuts across borders, and must adhere to laws and regulations in multiple jurisdictions: global, national, and local.
This report researched the supply chain through the lens of digital identity for tracking and auditing.
Download the reports:
Gaps: bit.ly/NPEreport
Supply Chain: bit.ly/GSCreport
This document summarizes a presentation about decentralized digital identities. It discusses past approaches where identity data was siloed or federated through centralized identity providers. A new generation uses distributed ledgers like blockchains to allow for self-sovereign identities through decentralized identifiers (DIDs). DIDs are cryptographically verifiable identifiers stored on a distributed ledger along with DID documents containing public keys and other identity data. Projects are working to develop verifiable credentials and standards like DID, DID Auth, and DKMS to enable decentralized, self-sovereign identity management. Permissionless systems like Poker face challenges in achieving full decentralization without trusted third parties.
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan GeorgeSSIMeetup
https://ssimeetup.org/hyperledger-aries-open-source-interoperable-identity-solutions-nathan-george-webinar-30/
Nathan George, Sovrin Foundation CTO, and Hyperledger Contributor will explain what Hyperledger Aries is and how it will facilitate an open source infrastructure for interoperable identity solutions.
Aries was born out of the work on identity agents and identity wallets that began in the Hyperledger Indy project. Aries is, in fact, the second Hyperledger project to spin out of Hyperledger Indy. The first was Hyperledger Ursa, announced in December 2018.
Self-sovereign identity based on DIDs requires strong interoperability and pluggability at the infrastructure level. It also requires great applications that offer end-to-end functionality so that users can accomplish jobs with greater security, flexibility, and privacy. Aries is expected to be a major step forward in this direction.
Aries will be the industry’s first implementation of interoperable open source wallets for digital credentials that use the DKMS (Decentralized Key Management System) architecture that Evernym pioneered under a contract with the U.S. Department of Homeland Security.
Self Sovereign Identity (SSI) Open standards with Drummond Reed SSIMeetup
Drummond Reed, Chief Trust Officer at Evernym and Sovrin Foundation Trustee, features in our first Webinar "The Story of SSI Open Standards" by giving us the background on the foundation of Self Sovereign Identity. Drummond explains the technical and development aspects of DIDs, DKMS, DID Auth and Verifiable Credentials that will make Self Sovereign Identity possible.
Identity-centric interoperability with the Ceramic ProtocolSSIMeetup
https://ssimeetup.org/identity-centric-interoperability-ceramic-protocol-joel-thorstensson-webinar-57/
Ceramic is a new permissionless protocol for creating and accessing unstoppable documents that serve as the foundation for a connected, interoperable web without silos. Joel Thorstensson is the founder and CTO of 3Box and the primary author of the ceramic protocol as well as several Ethereum standards for identity and will provide a conceptual and technical intro to Ceramic.
At the root of many of the internet’s problems is that apps and services today are built primarily in silos. This includes identity registries and credentials, user data and access permissions, infrastructure, and services. It not only puts control over data and identities in the wrong hands, but it’s a fundamentally outdated and inefficient model for building digital products.
Ceramic unlocks information interoperability between all platforms and services across the web, allowing participants to create and resolve documents for any type of information without any centralized service. Ceramic uses DIDs (Decentralized Identifiers), IPLD (InterPlanetary Linked Data), signed messages, and blockchain anchoring to create a trusted and shared graph of verifiable documents. While flexible, these documents are especially well-suited for self-sovereign identity systems, user-centric data ecosystems, and open web services.
Alastria Digital Identity: the Spanish Blockchain solution for SSI - Carlos P...SSIMeetup
1) Alastria is a Spanish blockchain network that provides a solution for self-sovereign identity (SSI) called Alastria ID.
2) Alastria ID allows individuals to own and control their digital identities and attributes through decentralized identifiers and verifiable credentials that are owned by the individual rather than a central authority.
3) The Alastria network is a permissioned blockchain that is open for any organization to join and develop applications, with the goal of creating a coopetitive ecosystem for digital identity services.
Identity can seem deceptively simple. We know who we are. Sometimes we have to convince others of that fact and confirm other characteristics: our age, our qualifications, or our right to access some services or tools. This happens every day over the Internet, but in ways that are disorganized, redundant, and risky. The lack of reliable, universal standards puts our private information at risk of public dissemination, fraud or worse.
The pioneers developing the internet didn’t define nuanced standards for identity -- most everything was just username and passwords. Over the past 20 years we have seen a range of standards that solve some identity challenges, including SAML, LDAP, OpenID Connect, OAuth, SCIM, Information Cards, and FIDO. None of them have comprehensively addressed the challenge of identity at internet scale.
A new set of standards is emerging that creates an infrastructure for self-sovereign identity that can scale. This talk looks forward to help you think ahead and prepare for this new infrastructure. We will walk through standards that together create a new identity infrastructure that leverages the blockchain. This isn’t about what you can implement tomorrow to solve your employee identity challenges or manage customer accounts. It will instead prepare you for the coming changes and help you play a role in shaping them.
Identity and the quest for Self-Sovereign Identity - Daniel HardmanSSIMeetup
This document summarizes a webinar about self-sovereign identity. It discusses traditional centralized identity systems and how self-sovereign identity uses decentralized networks and blockchains to allow individuals to control their own identity information. It also describes the Indy platform for self-sovereign identity and how it works using decentralized identifiers, credentials, and blockchains without a central authority. Challenges around privacy, regulation and ease of use for self-sovereign identity are also mentioned.
Trust, Blockchains, and Self-Soveriegn IdentityPhil Windley
This talk discusses sovereignty as a foundational model for a new kind of identity system that not only establishes all entities as peers, but also provides the means of using verifiable claims to build trustworthy relationships. A self-soversign identity system with verifiable claims provides increased privacy and control for individuals, more transparent consent, opens new opportunities for relying parties and third party claims providers, and reduces or eliminates integration costs while making systems simpler.
Blockchain-based Solutions for Identity & Access ManagementPrabath Siriwardena
This document discusses self-sovereign identity and decentralized identifiers (DIDs). It provides an overview of identity evolution from centralized to user-centric models. Self-sovereign identity allows individuals to control their digital identities across systems without relying on centralized authorities. DIDs are a new type of identifier that can be registered on a distributed ledger without a centralized registration authority. The document outlines the goals and components of DID specifications and describes how DIDs and verifiable claims work on networks like Sovrin to enable self-sovereign identity.
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...SSIMeetup
Drummond Reed, Chief Trust Officer at Evernym, will explain in our second Webinar "Decentralized Identifiers (DIDs) - Building Block of Self-Sovereign Identity (SSI)" giving us the background on how DIDs work, where they come from and why they are important for Blockchain based Digital Identity.
DIDs Demystified: A hands-on intro to DIDs via the Bitcoin Reference (BTCR) D...SSIMeetup
This talk will demystify Decentralized Identifiers (DIDs) via the simple Bitcoin Reference (BTCR) DID Method. Kim will introduce the basics of DIDs and show how they work in action through demos of the creation/updating and resolution process in BTCR. We'll build on this knowledge by discussing advanced features enabled by DIDs, along with a brief survey of other DID methods. By the end of the talk, you'll be able to create and resolve your own BTCR DIDs through the live BTCR playground.
This document provides an overview of self-sovereign identity technologies, including decentralized identifiers (DIDs), DID documents, DID methods, the universal resolver, DID authentication, and verifiable credentials. It also describes the Sovrin identity network built using Hyperledger Indy and provides an example proof-of-concept called myIDsafe that demonstrates use cases for self-sovereign identity.
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloSSIMeetup
https://ssimeetup.org/introducing-ssi-eidas-legal-report-ignacio-alamillo-webinar-55/
The European Commission developed the SSI (Self-Sovereign Identity) eIDAS bridge, an ISA2 funded initiative, to promote eIDAS as a trust framework for the SSI ecosystem. It assists a VC (Verifiable Credential) issuer in the signing process, and helps the verifier to automate the identification of the organization behind the issuer’s DID (Decentralized Identifier). Simply by “crossing” the eIDAS Bridge, a Verifiable Credential can be proven trustworthy in the EU. Ignacio Alamillo will present at this SSI Meetup webinar the insights gained from this report.
In the context of the eIDAS bridge project, we performed an analysis on how eIDAS can legally support digital identity and trustworthy DLT-based transactions in the Digital Single Market, and this is reflected in the SSI eIDAS legal report, available at this link. The objective of this report is to evaluate the potential legal issues that are important to an SSI solution and make some recommendations to be used as policy input for the eIDAS 2020 review. The report outlines short-term objectives, where changes in the Regulation would not be necessary, but also mid to long-term scenarios requiring major changes in the Regulation to comply with the SSI design principles.
The different scenarios described in the report are aligned with the proposed architectural and procedural considerations designed in the SSI eIDAS Bridge project and the European Self Sovereign Identity Framework.
The document provides an overview of decentralized identifiers (DIDs) and the DID universal resolver. It discusses how DIDs enable self-sovereign identity and describes their key properties. It then explains how the universal resolver allows looking up DID documents across different DID methods through configurable drivers. Finally, it outlines several potential applications of DIDs like verifiable credentials, authentication, and decentralized key management.
What are decentralized identifiers (DIDs), how do they enable self-sovereign identity, and what does W3C standardization mean for interoperability and adoption?
Evernym's Drummond Reed and Brent Zundel discussed all this and more on our Sep 26, 2019 webinar.
Introduction to Ion – a layer 2 network for Decentralized Identifiers with Bi...SSIMeetup
https://ssimeetup.org/introduction-ion-layer-2-network-decentralized-identifiers-bitcoin-daniel-buchner-webinar-29/
Microsoft presented in May 2019 in New York the first decentralized infrastructure implementation by a major tech company that is built directly on the Bitcoin blockchain called Ion. Daniel Buchner, who is leading this initiative at Microsoft and a founding member of the Decentralized Identity Foundation, will discuss the culture at Microsoft, how decentralized identity works with Bitcoin and what you need to know to use the Bitcoin blockchain for non-financial transactions.
Ion handles the decentralized identifiers, which control the ability to prove you own the keys to this data.
Introduction to DID Auth for SSI with Markus SabadelloSSIMeetup
Markus Sabadello, CEO of Danube Tech, will talk about DID Auth, an emerging building block in the SSI ecosystem. Although the technical details of DID Auth are not well-defined at this point, its general concept is clear: With self-sovereign identity infrastructure, the most trivial and straightforward functionality for identity owners should be the ability to authenticate, i.e. to prove control of a DID in some relationship or during a transaction. This could take place using a number of different data formats, protocols, and flows. DID Auth includes the ability to authenticate to web sites and applications, and to establish mutually authenticated communication channels. In this webinar, we will discuss the current state of the DID Auth concept, and how it relates to other efforts such as Verifiable Credentials and agent protocols.
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...SSIMeetup
The document discusses using decentralized identifiers (DIDs) and verifiable credentials to enable trust and interoperability in the Internet of Things (IoT). It describes how traditional IoT systems face challenges with identity, authentication, authorization, and interoperability due to fragmented identification schemes. The presentation introduces DIDs as a new type of identifier that allows entities to prove control over digital identities. It also discusses how verifiable credentials and decentralized key management can improve trustworthiness for IoT devices and systems. The goal is to establish a common foundation for identity to simplify development of autonomous systems using connected devices and machines.
Blockchain, Self-Sovereign Identity and CredentialsStrategyWorks
A primer on how the blockchain may be repurposed within higher education contexts. Based on research and praxis. Link to the webinar: https://www.youtube.com/watch?v=2ubwTmtlkWc&t=316s
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...SSIMeetup
https://ssimeetup.org/peer-dids-secure-scalable-method-dids-off-ledger-daniel-hardman-webinar-42/
Daniel Hardman, Chief Architect, Evernym / Secretary, Technical Governance Board – Sovrin Foundation will show how Peer DIDs will allow off-chain transactions for the self-sovereign identity (SSI) world.
Most documentation about decentralized identifiers (DIDs) describes them as identifiers that are rooted in a public source of truth like a blockchain, a database, a distributed filesystem, or similar. This publicness lets arbitrary parties resolve the DIDs to an endpoint and keys. It is an important feature for many use cases. However, the vast majority of relationships between people, organizations, and things have simpler requirements. When Alice(Corp|Device) and Bob want to interact, there are exactly and only 2 parties in the world who should care: Alice and Bob. Instead of arbitrary parties needing to resolve their DIDs, only Alice and Bob do. Peer DIDs are perfect in these cases. In many ways, peer DIDs are to public, blockchain-based DIDs what Ethereum Plasma or state channels are to on-chain smart contracts— or what Bitcoin’s Lightning Network is to on-chain cryptopayments. They move interactions off-chain, but offer options to connect back to a chain-based ecosystem as needed. Peer DIDs create the conditions for people, organizations, and things to have full control of their end of the digital relationships they sustain.
The document discusses IBM's Trusted Identity solution for self-sovereign identity. It proposes establishing a decentralized identity network based on principles of user consent, privacy, and interoperability. This network would provide convenience and security for individuals, businesses, and governments by enabling trusted digital identity verification and management across domains. Technical components include decentralized identifiers (DIDs), verifiable credential schemas, and an open-source Sovrin identity framework using distributed ledger technology.
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19Andrew Hughes
An overview of new and existing approaches for Digital Identity including enterprise and customer identity. New blockchain-oriented techniques and where they fit into the IAM landscape.
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan GeorgeSSIMeetup
https://ssimeetup.org/hyperledger-aries-open-source-interoperable-identity-solutions-nathan-george-webinar-30/
Nathan George, Sovrin Foundation CTO, and Hyperledger Contributor will explain what Hyperledger Aries is and how it will facilitate an open source infrastructure for interoperable identity solutions.
Aries was born out of the work on identity agents and identity wallets that began in the Hyperledger Indy project. Aries is, in fact, the second Hyperledger project to spin out of Hyperledger Indy. The first was Hyperledger Ursa, announced in December 2018.
Self-sovereign identity based on DIDs requires strong interoperability and pluggability at the infrastructure level. It also requires great applications that offer end-to-end functionality so that users can accomplish jobs with greater security, flexibility, and privacy. Aries is expected to be a major step forward in this direction.
Aries will be the industry’s first implementation of interoperable open source wallets for digital credentials that use the DKMS (Decentralized Key Management System) architecture that Evernym pioneered under a contract with the U.S. Department of Homeland Security.
Self Sovereign Identity (SSI) Open standards with Drummond Reed SSIMeetup
Drummond Reed, Chief Trust Officer at Evernym and Sovrin Foundation Trustee, features in our first Webinar "The Story of SSI Open Standards" by giving us the background on the foundation of Self Sovereign Identity. Drummond explains the technical and development aspects of DIDs, DKMS, DID Auth and Verifiable Credentials that will make Self Sovereign Identity possible.
Identity-centric interoperability with the Ceramic ProtocolSSIMeetup
https://ssimeetup.org/identity-centric-interoperability-ceramic-protocol-joel-thorstensson-webinar-57/
Ceramic is a new permissionless protocol for creating and accessing unstoppable documents that serve as the foundation for a connected, interoperable web without silos. Joel Thorstensson is the founder and CTO of 3Box and the primary author of the ceramic protocol as well as several Ethereum standards for identity and will provide a conceptual and technical intro to Ceramic.
At the root of many of the internet’s problems is that apps and services today are built primarily in silos. This includes identity registries and credentials, user data and access permissions, infrastructure, and services. It not only puts control over data and identities in the wrong hands, but it’s a fundamentally outdated and inefficient model for building digital products.
Ceramic unlocks information interoperability between all platforms and services across the web, allowing participants to create and resolve documents for any type of information without any centralized service. Ceramic uses DIDs (Decentralized Identifiers), IPLD (InterPlanetary Linked Data), signed messages, and blockchain anchoring to create a trusted and shared graph of verifiable documents. While flexible, these documents are especially well-suited for self-sovereign identity systems, user-centric data ecosystems, and open web services.
Alastria Digital Identity: the Spanish Blockchain solution for SSI - Carlos P...SSIMeetup
1) Alastria is a Spanish blockchain network that provides a solution for self-sovereign identity (SSI) called Alastria ID.
2) Alastria ID allows individuals to own and control their digital identities and attributes through decentralized identifiers and verifiable credentials that are owned by the individual rather than a central authority.
3) The Alastria network is a permissioned blockchain that is open for any organization to join and develop applications, with the goal of creating a coopetitive ecosystem for digital identity services.
Identity can seem deceptively simple. We know who we are. Sometimes we have to convince others of that fact and confirm other characteristics: our age, our qualifications, or our right to access some services or tools. This happens every day over the Internet, but in ways that are disorganized, redundant, and risky. The lack of reliable, universal standards puts our private information at risk of public dissemination, fraud or worse.
The pioneers developing the internet didn’t define nuanced standards for identity -- most everything was just username and passwords. Over the past 20 years we have seen a range of standards that solve some identity challenges, including SAML, LDAP, OpenID Connect, OAuth, SCIM, Information Cards, and FIDO. None of them have comprehensively addressed the challenge of identity at internet scale.
A new set of standards is emerging that creates an infrastructure for self-sovereign identity that can scale. This talk looks forward to help you think ahead and prepare for this new infrastructure. We will walk through standards that together create a new identity infrastructure that leverages the blockchain. This isn’t about what you can implement tomorrow to solve your employee identity challenges or manage customer accounts. It will instead prepare you for the coming changes and help you play a role in shaping them.
Identity and the quest for Self-Sovereign Identity - Daniel HardmanSSIMeetup
This document summarizes a webinar about self-sovereign identity. It discusses traditional centralized identity systems and how self-sovereign identity uses decentralized networks and blockchains to allow individuals to control their own identity information. It also describes the Indy platform for self-sovereign identity and how it works using decentralized identifiers, credentials, and blockchains without a central authority. Challenges around privacy, regulation and ease of use for self-sovereign identity are also mentioned.
Trust, Blockchains, and Self-Soveriegn IdentityPhil Windley
This talk discusses sovereignty as a foundational model for a new kind of identity system that not only establishes all entities as peers, but also provides the means of using verifiable claims to build trustworthy relationships. A self-soversign identity system with verifiable claims provides increased privacy and control for individuals, more transparent consent, opens new opportunities for relying parties and third party claims providers, and reduces or eliminates integration costs while making systems simpler.
Blockchain-based Solutions for Identity & Access ManagementPrabath Siriwardena
This document discusses self-sovereign identity and decentralized identifiers (DIDs). It provides an overview of identity evolution from centralized to user-centric models. Self-sovereign identity allows individuals to control their digital identities across systems without relying on centralized authorities. DIDs are a new type of identifier that can be registered on a distributed ledger without a centralized registration authority. The document outlines the goals and components of DID specifications and describes how DIDs and verifiable claims work on networks like Sovrin to enable self-sovereign identity.
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...SSIMeetup
Drummond Reed, Chief Trust Officer at Evernym, will explain in our second Webinar "Decentralized Identifiers (DIDs) - Building Block of Self-Sovereign Identity (SSI)" giving us the background on how DIDs work, where they come from and why they are important for Blockchain based Digital Identity.
DIDs Demystified: A hands-on intro to DIDs via the Bitcoin Reference (BTCR) D...SSIMeetup
This talk will demystify Decentralized Identifiers (DIDs) via the simple Bitcoin Reference (BTCR) DID Method. Kim will introduce the basics of DIDs and show how they work in action through demos of the creation/updating and resolution process in BTCR. We'll build on this knowledge by discussing advanced features enabled by DIDs, along with a brief survey of other DID methods. By the end of the talk, you'll be able to create and resolve your own BTCR DIDs through the live BTCR playground.
This document provides an overview of self-sovereign identity technologies, including decentralized identifiers (DIDs), DID documents, DID methods, the universal resolver, DID authentication, and verifiable credentials. It also describes the Sovrin identity network built using Hyperledger Indy and provides an example proof-of-concept called myIDsafe that demonstrates use cases for self-sovereign identity.
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloSSIMeetup
https://ssimeetup.org/introducing-ssi-eidas-legal-report-ignacio-alamillo-webinar-55/
The European Commission developed the SSI (Self-Sovereign Identity) eIDAS bridge, an ISA2 funded initiative, to promote eIDAS as a trust framework for the SSI ecosystem. It assists a VC (Verifiable Credential) issuer in the signing process, and helps the verifier to automate the identification of the organization behind the issuer’s DID (Decentralized Identifier). Simply by “crossing” the eIDAS Bridge, a Verifiable Credential can be proven trustworthy in the EU. Ignacio Alamillo will present at this SSI Meetup webinar the insights gained from this report.
In the context of the eIDAS bridge project, we performed an analysis on how eIDAS can legally support digital identity and trustworthy DLT-based transactions in the Digital Single Market, and this is reflected in the SSI eIDAS legal report, available at this link. The objective of this report is to evaluate the potential legal issues that are important to an SSI solution and make some recommendations to be used as policy input for the eIDAS 2020 review. The report outlines short-term objectives, where changes in the Regulation would not be necessary, but also mid to long-term scenarios requiring major changes in the Regulation to comply with the SSI design principles.
The different scenarios described in the report are aligned with the proposed architectural and procedural considerations designed in the SSI eIDAS Bridge project and the European Self Sovereign Identity Framework.
The document provides an overview of decentralized identifiers (DIDs) and the DID universal resolver. It discusses how DIDs enable self-sovereign identity and describes their key properties. It then explains how the universal resolver allows looking up DID documents across different DID methods through configurable drivers. Finally, it outlines several potential applications of DIDs like verifiable credentials, authentication, and decentralized key management.
What are decentralized identifiers (DIDs), how do they enable self-sovereign identity, and what does W3C standardization mean for interoperability and adoption?
Evernym's Drummond Reed and Brent Zundel discussed all this and more on our Sep 26, 2019 webinar.
Introduction to Ion – a layer 2 network for Decentralized Identifiers with Bi...SSIMeetup
https://ssimeetup.org/introduction-ion-layer-2-network-decentralized-identifiers-bitcoin-daniel-buchner-webinar-29/
Microsoft presented in May 2019 in New York the first decentralized infrastructure implementation by a major tech company that is built directly on the Bitcoin blockchain called Ion. Daniel Buchner, who is leading this initiative at Microsoft and a founding member of the Decentralized Identity Foundation, will discuss the culture at Microsoft, how decentralized identity works with Bitcoin and what you need to know to use the Bitcoin blockchain for non-financial transactions.
Ion handles the decentralized identifiers, which control the ability to prove you own the keys to this data.
Introduction to DID Auth for SSI with Markus SabadelloSSIMeetup
Markus Sabadello, CEO of Danube Tech, will talk about DID Auth, an emerging building block in the SSI ecosystem. Although the technical details of DID Auth are not well-defined at this point, its general concept is clear: With self-sovereign identity infrastructure, the most trivial and straightforward functionality for identity owners should be the ability to authenticate, i.e. to prove control of a DID in some relationship or during a transaction. This could take place using a number of different data formats, protocols, and flows. DID Auth includes the ability to authenticate to web sites and applications, and to establish mutually authenticated communication channels. In this webinar, we will discuss the current state of the DID Auth concept, and how it relates to other efforts such as Verifiable Credentials and agent protocols.
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...SSIMeetup
The document discusses using decentralized identifiers (DIDs) and verifiable credentials to enable trust and interoperability in the Internet of Things (IoT). It describes how traditional IoT systems face challenges with identity, authentication, authorization, and interoperability due to fragmented identification schemes. The presentation introduces DIDs as a new type of identifier that allows entities to prove control over digital identities. It also discusses how verifiable credentials and decentralized key management can improve trustworthiness for IoT devices and systems. The goal is to establish a common foundation for identity to simplify development of autonomous systems using connected devices and machines.
Blockchain, Self-Sovereign Identity and CredentialsStrategyWorks
A primer on how the blockchain may be repurposed within higher education contexts. Based on research and praxis. Link to the webinar: https://www.youtube.com/watch?v=2ubwTmtlkWc&t=316s
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...SSIMeetup
https://ssimeetup.org/peer-dids-secure-scalable-method-dids-off-ledger-daniel-hardman-webinar-42/
Daniel Hardman, Chief Architect, Evernym / Secretary, Technical Governance Board – Sovrin Foundation will show how Peer DIDs will allow off-chain transactions for the self-sovereign identity (SSI) world.
Most documentation about decentralized identifiers (DIDs) describes them as identifiers that are rooted in a public source of truth like a blockchain, a database, a distributed filesystem, or similar. This publicness lets arbitrary parties resolve the DIDs to an endpoint and keys. It is an important feature for many use cases. However, the vast majority of relationships between people, organizations, and things have simpler requirements. When Alice(Corp|Device) and Bob want to interact, there are exactly and only 2 parties in the world who should care: Alice and Bob. Instead of arbitrary parties needing to resolve their DIDs, only Alice and Bob do. Peer DIDs are perfect in these cases. In many ways, peer DIDs are to public, blockchain-based DIDs what Ethereum Plasma or state channels are to on-chain smart contracts— or what Bitcoin’s Lightning Network is to on-chain cryptopayments. They move interactions off-chain, but offer options to connect back to a chain-based ecosystem as needed. Peer DIDs create the conditions for people, organizations, and things to have full control of their end of the digital relationships they sustain.
The document discusses IBM's Trusted Identity solution for self-sovereign identity. It proposes establishing a decentralized identity network based on principles of user consent, privacy, and interoperability. This network would provide convenience and security for individuals, businesses, and governments by enabling trusted digital identity verification and management across domains. Technical components include decentralized identifiers (DIDs), verifiable credential schemas, and an open-source Sovrin identity framework using distributed ledger technology.
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19Andrew Hughes
An overview of new and existing approaches for Digital Identity including enterprise and customer identity. New blockchain-oriented techniques and where they fit into the IAM landscape.
Jan Keil - Identity and access management Facts. Challenges. SolutionTimetogrowup
This document discusses identity and access management. It begins by introducing the author and providing background on blockchain technology. It then discusses challenges with existing identity management systems like centralized servers and human errors. Blockchain is presented as a solution to issues like weak credentialing and data manipulation. The document outlines how blockchain could provide online passports for identification and give users control over their identity data. It also discusses using biometrics and knowing customer processes for identity verification. The role of access management in regulating user access is explained. Case studies on OAuth and Remme.io and how they utilize blockchain and tokens for decentralized identity and access management are presented.
A public key infrastructure (PKI) allows for secure communication and data exchange over public networks through the use of public and private cryptographic key pairs provided by a certificate authority. A PKI uses asymmetric encryption where a public key is used to encrypt data and a private key is used to decrypt it. Digital certificates issued by a certificate authority are used to verify the identity of individuals by containing their public key and identification details signed by the certificate authority. This allows for trust in electronic transactions by ensuring people receive keys from the actual identity they claim to be rather than an impersonator.
Value proposition of SSI tech providers - Self-Sovereign IdentitySSIMeetup
Talk with Vladimir Vujovic, Senior Digital Innovation Manager from SICPA about product definition and value proposition of Issuer/Holder/Verifier software of SSI tech providers. Why is it hard to convey the right message to the audience coming from outside of SSI domain. How different SSI tech providers define their offering and the language they use to convey the message. What is really the value proposition of SSI tech providers who are offering their Issuer/Verifier software to the market. How big regulation initiatives like the one in Europe for eIDAS v2 are driving the market and roadmaps for SSI tech providers and how will such initiative will have impact to the rest of the world in terms of regulation, but some of the underlying technical standards. What is the place of SSI platforms in the broader Identity landscape and when are we going to see more maturity from the market.
Nowadays most components of a full identity infrastructure are available as Open Source components - and some even within The ASF: identity repositories, provisioning engines, access management systems.
Picking these bricks to realize a solution that will suit the wide-range ever-changing organizations' needs is a real challenge for all system integrators in the Identity & Access Management area.
Some real-word use cases and scenarios will be reviewed in this presentation to highlight strengths, flexibility and benefits - but also wicked problems and possible improvements - that Open Source Identity infrastructures can provide to organizations and final users.
Blockchain Perspective - Internet of Memorable ThingsTim Lackey
A blockchain is a distributed digital ledger that records transactions in a verifiable way without a central authority. The document discusses how blockchain technology can be applied to identity management for both people and devices/things in the context of the growing Internet of Things. It outlines several key benefits blockchains provide for identity such as self-sovereign identity control, persistence of data over time, and the ability to uniquely identify any entity or object. The future of identity management is moving towards a user-centric model enabled by blockchain technology.
Blockchain-Anchored Identity -- Daniel Buchner, Microsoftbernardgolden
The document discusses the potential of blockchain-anchored decentralized identity to transform how individuals control and share their personal data and credentials through "identity hubs", allowing a new generation of applications and services to access rich semantic identity data in real-time through standardized interfaces, ultimately creating a "web of everything" with unprecedented opportunities for interoperability and information flow.
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...Torsten Lodderstedt
- The document discusses decentralized identity systems and verifiable credentials, and introduces OpenID for Verifiable Credentials as a standard for issuing and presenting verifiable credentials in a decentralized and interoperable way.
- OpenID for Verifiable Credentials uses existing protocols like OAuth 2.0 and OpenID Connect to build upon established security practices. It supports various credential formats, identifier methods, and trust models to accommodate different needs.
- Implementations of OpenID for Verifiable Credentials allow users to privately obtain and present verifiable credentials from multiple credential issuers to different verifiers through a digital wallet on their device or in the cloud. Standards and profiles continue to be developed to promote adoption and interoperability.
Introduction to Self-Sovereign IdentityKaryl Fowler
Juan Caballero from Spherity and Karyl Fowler from Transmute co-presented the Introduction to Self-Sovereign Identity (SSI) session at the 30th Internet Identity Workshop (IIW) in April 2020, demonstrating to newcomers the difference between the values associated with the "SSI movement" and "collection of technologies" that power applications that embody some of said values.
This document provides an introduction and overview of blockchain technology. It begins with key concepts, explaining that blockchain allows parties to reach consensus without trusting each other through decentralization, security, and immutability. It then discusses how blockchain works, including the roles of wallets, miners, and consensus algorithms like proof of work. The document reviews the state of the art, including examples of cryptocurrencies, digital assets, identity solutions, smart contracts, decentralized applications, and challenges to adoption. It positions blockchain as a foundational technology that is just beginning to transform how information and value are transferred.
Despite both sides having different benefits and tradeoffs, DeFi and CeFi are...VijayBhosale49
However, the scaffolding is emerging for a historic disruption of our current financial infrastructure. DeFi, or
decentralized finance, seeks to build and combine opensource financial building blocks into sophisticated products
with minimized friction and maximized value to users
utilizing blockchain technology. Given it costs no more to
provide services to a customer with $100 or $100 million
in assets, we believe that DeFi will replace all meaningful
centralized financial infrastructure in the future. This is a
technology of inclusion whereby anyone can pay the flat fee
to use and benefit from the innovations of DeFi
This document provides a summary of the fintech module for week 4. It reminds students that the module is half completed and slides will be made available online. It notes that the next week is a reading week and module 4 will be on November 16th. The syllabus topics for the module are then listed, including digital identity, regulation, and payments technologies. Key points about identity emphasize the development of digital identity standards and the role of identity as a banking business model. Authentication methods and post-authentication identity management are discussed. The document also covers privacy issues and the relationship between legaltech and social credit systems.
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...Torsten Lodderstedt
This deck gives an overview of OpenID 4 Verifiable Credentials and shows how the specs can be tailored to the needs of a certain category of projects/ecosystems.
A guest lecture delivered by Dr Farrukh Habib at INCEIF, Kuala Lumpur, on 22nd March, 2018.
Dr Farrukh Habib is an expert in sharia and Islamic finance. He is a adviser, researcher and trainer. He is keen interest in FinTech.
Blockchain and Hyperledger were discussed. Key points include:
- Blockchain originated from Bitcoin and solves issues like double spending through decentralization and distributed ledgers.
- Hyperledger is an open source blockchain project focused on enterprise applications. Hyperledger Fabric is a leading Hyperledger project.
- Hyperledger Fabric uses channels for private transactions, smart contracts (chaincode), and a modular architecture for flexibility and scalability in enterprise settings.
Similar to FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin (20)
Shared on 5th Dec at SGInnovate with Swirlds Mance Harmon, Jordan Fried and Edgar Seah.
Hashgraph consensus, demo apps in Swirlds Java SDK, babble (unofficial golang implementation of Hashgraph) and their implications for distributed ledger technology.
Functional Programming for OO Programmers (part 2)Calvin Cheng
Code examples demonstrating Functional Programming concepts, with JavaScript and Haskell.
Part 1 can be found here - http://www.slideshare.net/calvinchengx/functional-programming-part01
Source code can be found here - http://github.com/calvinchengx/learnhaskell
Let me know if you spot any errors! Thank you! :-)
Functional Programming for OO Programmers (part 1)Calvin Cheng
The Why and Benefits of Functional Programming paradigm. Part 2 with source code can be found here: http://www.slideshare.net/calvinchengx/functional-programming-for-oo-programmers-part-2
Related source code https://github.com/calvinchengx/learnhaskell
This document provides an overview of lessons for building an iOS app, including a lesson on data modeling. It describes how to create a storyboard to visually represent the user interface with scenes and views. It explains how view controllers manage views and navigation between screens. It also shows code for creating, editing, displaying and deleting notes data using a data model to manage the data and share it between view controllers.
The document discusses data storage options for an iOS app. It covers using local storage like the Documents directory to persist data when the app is closed. Common storage options include User Defaults, files, Core Data, and third party solutions. It also discusses representing app data using custom classes like a Note class for a note taking app. The last section of the document demonstrates how to create a Data class to represent notes and describes methods for storing notes using dictionaries, User Defaults, and saving to files.
This document provides an overview of the anatomy of an iOS application. It discusses the key components including the UIApplication object, which maintains the app's event loop. The AppDelegate handles state transitions like launching and becoming active. View controllers manage views and their presentation. Data model objects represent app data. The UIWindow displays content and views provide visual representation. It also covers view controller code examples and different app templates like single view, tabbed, and master-detail apps.
This document provides an introduction to iOS programming. It begins with an overview of the instructor and contact information. It then asks why the reader wants to learn programming and what problems they want to solve. The document outlines four lessons: introductions, iOS specifics, data modeling, and logic/interface. Lesson 1 covers setting up a project in Xcode and an Objective-C primer, including basic syntax, variables, objects, classes, and the MVC architecture. It demonstrates creating a project in Xcode and discusses prerequisites. It also provides comparisons to other programming languages and covers object-oriented programming concepts. The next steps outlined are the four planned lessons.
So, you want to build a Bluetooth Low Energy device?Calvin Cheng
What does it take to build a BLE device? What are the trends emerging in this Internet of Things era? This short presentation summarizes key aspects with respect to your market and product development considerations.
Shared with OneKind.Asia during a lunch time get-together. OneKind.Asia is an autonomous brand innovation company and a wholly-owned subsidiary of Ogilvy.
Fabric is a Python library and command-line tool for streamlining system administration tasks like configuration management, deployment, and more. It executes commands locally or remotely over SSH. Fabric allows defining Python functions for tasks in a fabfile.py and running them with the fab command. It helps automate server setup, deployment, maintenance and other operations across multiple servers defined by roles.
Learning iOS and hunting NSZombies in 3 weeksCalvin Cheng
Language (programming language) wars are overrated.
As a professional/career software engineer, it is our job to learn fast, evolve and continually grow in the context of different languages and software paradigms.
Learning Objective-C and iOS cocoa touch framework isn't as scary as people purport it to be. Ignore the critics, trust in your own abilities and dive into Objective-C if you need to build a mobile app for your company. Today.
This document provides an overview of a training session on Python and Django basics. Session 1 introduces Python, including its syntax, object orientation, dynamic typing, standard libraries, and extensibility. It also covers getting started with Django by creating projects and apps using django-admin.py and manage.py. The session explains Django's basic architecture, including urls.py, views.py, and templates. It concludes by discussing project structure and organizing static and media files. Upcoming Session 2 will cover models, the object-relational mapper (ORM), and working with databases in Django projects.
Customize the lightweight, versatile and powerful vim editor!
It's a programmable editor that has a great sense of humor. What else can you ask for? ;-)
Django and GeoDjango allow for the creation of geospatial web applications. GeoDjango builds on Django to add support for geographic objects, pre-defined model fields for geospatial data types, and a database agnostic ORM for spatial queries and analyses. GeoDjango applications can leverage spatial databases like PostGIS to store and query geographic information. Example applications built with GeoDjango include species extinction calculators and tools for analyzing REDD+ programs.
Google App Engine provides advantages like not requiring servers, free usage within quotas, and quick deployment. However, it also has disadvantages like not supporting all dependencies, requiring rewriting of queries and ORMs, and limitations on queries and APIs. Frameworks are recommended for App Engine to enable agile development, team development, maintainability through MVC, and test-driven development. Example frameworks discussed are Django and Kay, noting their quick starts, learning curves, and differences in relationships from traditional servers. Sharding techniques are needed to address query object count limitations.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
6. identity is…
• 10 principles -
(e.g. existence, control, access, transparency…)
• Identity is a double-edge sword - it can be used for beneficial
and for malevolent purposes
• Identity only makes sense from a 3rd party perspective
7. experts’ views…
• W3C Verifiable Claims Working Group ~ April 2017
• charter:
“It is currently difficult to express banking account
information, education qualifications, healthcare data and
other sorts of machine-readable personal information that has
been verified by a 3rd party on the web. These sorts of data
are often referred to as verifiable claims. The mission of the
Verifiable Claims Working Group is to make expressing,
exchanging and verifying claims easier and more secure on
the web”
8. current system
• W3C Verifiable Claims Working Group ~ April 2017
• charter:
• It is currently difficult to express banking account information,
education qualifications, healthcare data and other sorts of
machine-readable personal information that has been verified
by a 3rd party on the web. These sorts of data are often
referred to as verifiable claims. The mission of the Verifiable
Claims Working Group is to make expressing, exchanging and
verifying claims easier and more secure on the web
9. current system
• We can use public key cryptography (PKI, public key
infrastructure) to solve this problem?
• However, PKI is costly and centralised
• If a CA makes a mistake on a digital certificate or service fails,
everything falls apart
11. SSI means…
• Self-sovereign identity
• “I own my identity”, not a 3rd party organization
• User-centric perspective to the concept of identity
• “truth”
12. SSI benefits
• Simplify KYC, AML regulations
• Simplify verification of credentials
(e.g. education, driving licenses, work visa…)
• Reduce dependence on organisations that monetise our data
13. SSI approach
• Blockchain technology (or DLTs) uses consensus algorithms
operating over many different machines and replicated by
many different entities in a decentralised network
• Hyperledger Indy/Sovrin - decentralised PKI (DPKI), every
public key has its own address (DID, decentralised identifier)
• DIDs enable true self-sovereign identity - lifetime portable
digital identity for any person, organization or thing that
cannot be taken away
14. SSI approach
• DID specification ensures that issuers and verifiers
everywhere can look up the necessary public keys on a public
blockchain regardless of whether they belong to the same
organization or identity federation
• Evolution from disconnected “islands of identity” each with its
own PKI to a global identity network based on DPKI
• Akin to “local area networks” to global internet
16. challenges
• No standard way to verify digital credentials
• Standardising how to verify the digital signatures of credential
issuers
• Data liability and over-reliance on centralised systems
(Equifax)
17. challenge:
• W3C is standardising digital credentials
“…no standard way to verify digital credentials…”
18. challenge:
• Usually done by PKI (centralised public key cryptography)
• DID - another standard coming from W3C:
• Allows every public key to have its own address
• An open standard
• Uses cryptography
• Enables true SSI
• Anyone can issue a digitally-signed claims; others can verify it
“…how to verify digital signatures of credential issuers?”
19. challenge:
“…privacy issues for data stored on blockchain (or centralised db)?”
• Blockchain, being decentralised, is ideal; to serve as a self-
service registry for public keys
20. SSI core requirements
1. Governance: trusted by all stakeholders
2. Performance: internet scale
3. Accessibility: identity is available to all
4. Privacy
22. hyperledger indy? sovrin?
• Hyperledger Indy - a distributed ledger framework for creating
and managing self-sovereign identities
• Sovrin - an instance of Hyperledger Indy
• Sovrin Foundation - an international non-profit, with a board of
trustees from diverse background and industries
• Public network, permissioned by stewards (a consortium of
diverse organisations)
41. cryptography
• AnonCred: anonymous credentials with type-3 revocation
(prove identity satisfy certain properties in uncorrelated way
without revealing other identity details)
42. nodes & ledger
• nodes:
consensus with plenum BFT (specifically Redundant BFT)
client-node and node-node network communication with
Curve ZMQ
• ledger is replicated across all nodes, backed by merkle tree
43. state & storage
• state:
Ethereum’s Patricia Trie
• storage:
leveldb as key-value storage for ledger and state
47. indy-plenum
nodes, ledger, state, storage
• nodes:
consensus with plenum BFT (specifically Redundant BFT)
client-node and node-node network communication with Curve ZMQ
• ledger:
replicated across all nodes, backed by merkle tree
• state:
Ethereum’s Patricia Trie
• storage:
leveldb as key-value storage for ledger and state
48. indy-crypto
crypto
• AnonCred: anonymous credentials with type-3 revocation
(prove identity satisfy certain properties in uncorrelated way
without revealing other identity details)
49. indy-sdk
client
• Client-side library (Rust) to interact with Hyperledger Indy
• Compiles to .so for client-to-indy communication
• Embed in your client application
54. digital identity
Philippines
• In 2017, only 44% of Filipinos used bank accounts, often
because of inefficient identity systems
• Bankers Association of Philippines, Hyperledger member
Amihan and banks including AUB, BPI and Citibank collaborate
• POC implements SSI with Hyperledger Indy
• Consumers provide information once in a privacy preserving
way and re-use that data to open new accounts. Banks can
trust the data
56. considerations
Solutions for Users
• Centralised Applications - why are they successful?
• Decentralised Applications - how can they be successful?
• Analogy:
Unix/BSD adoption vs macOS adoption? (usability + hardware)