http://ssimeetup.org/identity-privacy-past-present-digital-brenda-k-leong-webinar-12/
Brenda K. Leong, Senior Counsel & Director of Strategy of the Future of Privacy Forum, will talk about Identity and Privacy. The problem of whether private citizens should be required to have government-issued documentation (verifying their personal identity in order to access goods and services, seek employment, travel, or obtain government benefits), long predates the current discussions related to digital identity systems, the use of biometrics, or platforms like blockchain. But whether past or present, these challenges are all based on the question of how to balance government efficiencies and national security against protections for individual freedoms and liberty.
Underlying this conversation is the concept of privacy. Is it a fundamental right? What does it mean? Who gets to decide which conveniences are worth the tradeoffs they require? Are the protections for personal data offered by policy and law sufficient, or should technical and security protections be required? Are some systems simply too high-risk to implement regardless of perceived benefits? To answer those questions, it’s important to understand the technologies at work – biometrics such as fingerprints and facial recognition offer greater reliability, security and certainty, but raise fears of “permanent” breach if the personal data is compromised. These systems offer accessibility at scale that can be updated throughout a lifetime in a way that password-based accounts cannot equal. But fair access to all, protections of personal data, and most importantly, legal, policy, and technical protections against discrimination and abuse are critical to ensuring these and related technologies are not simply used to restrict personal freedom, or target groups and other populations. Brenda covers how these and other aspects of the modern concept of “digital identity” are being approached in different ways, and what some of the benefits and risks are for the future.
Schema Definitions and Overlays for Self-Sovereign Identity (SSI) - Paul KnowlesSSIMeetup
http://ssimeetup.org/overlays-1o1-establishing-schema-definitions-self-sovereign-identity-ssi-ecosystem-paul-knowles-webinar-17/
Paul Knowles, Innovation & Emerging Technology at Dativa and chair of the Schemas and Overlays Working Group at Sovrin Foundation, will be our next guest presenting a new data capture model to the global SSI (Self-Sovereign Identity) community.
This talk introduces Overlays, data structures that provide extra layers of contextual and/or conditional information to Schemas. Paul will show how Overlays ensure that Schema definitions can remain in their simplest form thus providing a standard base from which to decentralise data. The extra context provided by Overlays can be used by an Agent to transform how information is displayed to a viewer or to guide the Agent in how to apply a custom process to Schema data. All components within this flexible data capture architecture contain DIDs (Decentralised Identifiers) for linked association and search purposes.
The presentation will also include a live demonstration from *Robert Mitwicki from Lab10 Collective* to show how a set of Overlays can be added to a plain Schema to provide richer complexity to the base structure.
Alastria Digital Identity: the Spanish Blockchain solution for SSI - Carlos P...SSIMeetup
Alastria is an association to foster the implementation of a Spanish national blockchain whose nodes are run by Alastria members. Alastria gathers over 250 cross-industry members and was initiated by the some of the biggest corporations in Spain. Alastria ID proposes an implementation of the Self Sovereign Identity paradigm over a public-permissioned Blockchain and will be presented by Carlos Pastor, Alastria’s Digital Identity Commission Leader, in this webinar from SSIMeetup.org. Alastria ID vision is to become the cornerstone of a legally binding ID for members and final users, giving users complete control over their personal data. Alastria ID not only strives to be “GDPR compliant”, but also to become the best and easiest way to fulfill GDPR user rights, providing a full-fledged Identity management solution from identity creation to attestation and claim management, including consent as well as issuer revocation and user deletion rights.
DID Resolution: Given a DID how do I retrieve its document? – Markus SabadelloSSIMeetup
http://ssimeetup.org/did-resolution-given-did-how-do-retrieve-document-markus-sabadello-webinar-13/
Markus Sabadello, CEO of Danube Tech, will talk about DID Resolution and how to retrieve a DID document. As we know, Decentralized Identifiers (DIDs) are a key component in SSI architecture. They are used as building blocks for verifiable credentials, wallets, agents, and data exchange protocols. To make all this work, we need to be able to “resolve” DIDs to their associated DID Documents. This process fulfills a similar purpose as DNS does in the classic web. And while DID Resolution is not a very complicated topic, it is still important to understand how it works and how it relates to other topics. In this webinar, we will give a general introduction to DID Resolution, discuss a few in-depth topics, and also demo concrete tools that are available today.
Most DID Resolution implementations envision an architecture where a common base component invokes a set of “drivers” or “plugins” or “modules” to implement method-specific functionality, e.g. see the DIF Universal Resolver, Digital Bazaar’s did-client, or the uPort JavaScript DID Resolver. We envision such “DID Resolver” tools to become as central to SSI infrastructure as DNS is for the web today.
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...SSIMeetup
Drummond Reed, Chief Trust Officer at Evernym and Sovrin Foundation Trustee, features in this Webinar "Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Puzzle". If you can't manage the keys for your DIDs (Decentralized Identifiers), then the SSI engine will never get started. That's why DKMS (Decentralized Key Management System) is one of the core open standards in the DID "stack".
DKMS inverts a core assumption of conventional PKI (public key infrastructure) architecture, namely that public key certificates will be issued by centralized or federated certificate authorities (CAs). With DKMS, the initial "root of trust" for all participants is any blockchain or distributed ledger that supports DIDs. This webinar will explain why we need DKMS, what a DKMS-compatible identity wallet looks like, how DKMS can solve some longstanding problems in wallet backup and recovery, and where DKMS is headed for standardization.
Self-Sovereign Identity (SSI) and Open Source - Richard EsplinSSIMeetup
Richard Esplin is currently the product manager responsible for Evernym’s contributions to the Hyperledger Indy project and the Sovrin identity network. He is an open source advocate and technology evangelist who loves creating products that not only meet business goals but also benefit the larger community and will share in this webinar why open source is relevant to Self-Sovereign Identity. This presentation is specifically designed to help SSI evangelists better communicate these concepts to team members, clients, and the interested public.
Most technology professionals today are familiar with open source software, but many are unclear on why this approach to software development and licensing is important for building or selecting technologies that implement self-sovereign identities (SSIs).
SSI empowers individuals with specific rights and responsibilities. Open source software enables SSI by providing the required technologies under software licenses that support those rights. These software licenses encourage collaborative development and ensure users that the identities based on these technologies are secure and cannot be taken away.
We will cover:
What makes an identity self-sovereign, and why most digital identity solutions today are not SSI.
How open source software helps to address many of the problems with digital identity solutions.
What drives the development of free and open source software.
How the open source movement has impacted society.
Why consumers frequently prefer open source technologies.
The different types of open source licenses, and how they influence commercial models.
Highlights of Internet Identity Workshop #28 with Drummond ReedSSIMeetup
https://ssimeetup.org/highlights-internet-identity-workshop-28-drummond-reed-ssi-meetup-one-year-anniversary-special-webinar-27/
SSI Meetup veteran Drummond Reed, Chief Trust Officer at Evernym and Trustee at the Sovrin Foundation, will cover the highlights of the latest edition of the longest-running conference in the Internet identity space—Internet Identity Workshop. Drummond has attended all 28 IIWs, and he will share his major takeaways from this gathering of the movers and shakers in SSI from around the world to celebrate SSIMeetup’s one year anniversary.
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...SSIMeetup
Drummond Reed, Chief Trust Officer at Evernym, will explain in our second Webinar "Decentralized Identifiers (DIDs) - Building Block of Self-Sovereign Identity (SSI)" giving us the background on how DIDs work, where they come from and why they are important for Blockchain based Digital Identity.
Self Sovereign Identity (SSI) Open standards with Drummond Reed SSIMeetup
Drummond Reed, Chief Trust Officer at Evernym and Sovrin Foundation Trustee, features in our first Webinar "The Story of SSI Open Standards" by giving us the background on the foundation of Self Sovereign Identity. Drummond explains the technical and development aspects of DIDs, DKMS, DID Auth and Verifiable Credentials that will make Self Sovereign Identity possible.
Schema Definitions and Overlays for Self-Sovereign Identity (SSI) - Paul KnowlesSSIMeetup
http://ssimeetup.org/overlays-1o1-establishing-schema-definitions-self-sovereign-identity-ssi-ecosystem-paul-knowles-webinar-17/
Paul Knowles, Innovation & Emerging Technology at Dativa and chair of the Schemas and Overlays Working Group at Sovrin Foundation, will be our next guest presenting a new data capture model to the global SSI (Self-Sovereign Identity) community.
This talk introduces Overlays, data structures that provide extra layers of contextual and/or conditional information to Schemas. Paul will show how Overlays ensure that Schema definitions can remain in their simplest form thus providing a standard base from which to decentralise data. The extra context provided by Overlays can be used by an Agent to transform how information is displayed to a viewer or to guide the Agent in how to apply a custom process to Schema data. All components within this flexible data capture architecture contain DIDs (Decentralised Identifiers) for linked association and search purposes.
The presentation will also include a live demonstration from *Robert Mitwicki from Lab10 Collective* to show how a set of Overlays can be added to a plain Schema to provide richer complexity to the base structure.
Alastria Digital Identity: the Spanish Blockchain solution for SSI - Carlos P...SSIMeetup
Alastria is an association to foster the implementation of a Spanish national blockchain whose nodes are run by Alastria members. Alastria gathers over 250 cross-industry members and was initiated by the some of the biggest corporations in Spain. Alastria ID proposes an implementation of the Self Sovereign Identity paradigm over a public-permissioned Blockchain and will be presented by Carlos Pastor, Alastria’s Digital Identity Commission Leader, in this webinar from SSIMeetup.org. Alastria ID vision is to become the cornerstone of a legally binding ID for members and final users, giving users complete control over their personal data. Alastria ID not only strives to be “GDPR compliant”, but also to become the best and easiest way to fulfill GDPR user rights, providing a full-fledged Identity management solution from identity creation to attestation and claim management, including consent as well as issuer revocation and user deletion rights.
DID Resolution: Given a DID how do I retrieve its document? – Markus SabadelloSSIMeetup
http://ssimeetup.org/did-resolution-given-did-how-do-retrieve-document-markus-sabadello-webinar-13/
Markus Sabadello, CEO of Danube Tech, will talk about DID Resolution and how to retrieve a DID document. As we know, Decentralized Identifiers (DIDs) are a key component in SSI architecture. They are used as building blocks for verifiable credentials, wallets, agents, and data exchange protocols. To make all this work, we need to be able to “resolve” DIDs to their associated DID Documents. This process fulfills a similar purpose as DNS does in the classic web. And while DID Resolution is not a very complicated topic, it is still important to understand how it works and how it relates to other topics. In this webinar, we will give a general introduction to DID Resolution, discuss a few in-depth topics, and also demo concrete tools that are available today.
Most DID Resolution implementations envision an architecture where a common base component invokes a set of “drivers” or “plugins” or “modules” to implement method-specific functionality, e.g. see the DIF Universal Resolver, Digital Bazaar’s did-client, or the uPort JavaScript DID Resolver. We envision such “DID Resolver” tools to become as central to SSI infrastructure as DNS is for the web today.
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...SSIMeetup
Drummond Reed, Chief Trust Officer at Evernym and Sovrin Foundation Trustee, features in this Webinar "Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Puzzle". If you can't manage the keys for your DIDs (Decentralized Identifiers), then the SSI engine will never get started. That's why DKMS (Decentralized Key Management System) is one of the core open standards in the DID "stack".
DKMS inverts a core assumption of conventional PKI (public key infrastructure) architecture, namely that public key certificates will be issued by centralized or federated certificate authorities (CAs). With DKMS, the initial "root of trust" for all participants is any blockchain or distributed ledger that supports DIDs. This webinar will explain why we need DKMS, what a DKMS-compatible identity wallet looks like, how DKMS can solve some longstanding problems in wallet backup and recovery, and where DKMS is headed for standardization.
Self-Sovereign Identity (SSI) and Open Source - Richard EsplinSSIMeetup
Richard Esplin is currently the product manager responsible for Evernym’s contributions to the Hyperledger Indy project and the Sovrin identity network. He is an open source advocate and technology evangelist who loves creating products that not only meet business goals but also benefit the larger community and will share in this webinar why open source is relevant to Self-Sovereign Identity. This presentation is specifically designed to help SSI evangelists better communicate these concepts to team members, clients, and the interested public.
Most technology professionals today are familiar with open source software, but many are unclear on why this approach to software development and licensing is important for building or selecting technologies that implement self-sovereign identities (SSIs).
SSI empowers individuals with specific rights and responsibilities. Open source software enables SSI by providing the required technologies under software licenses that support those rights. These software licenses encourage collaborative development and ensure users that the identities based on these technologies are secure and cannot be taken away.
We will cover:
What makes an identity self-sovereign, and why most digital identity solutions today are not SSI.
How open source software helps to address many of the problems with digital identity solutions.
What drives the development of free and open source software.
How the open source movement has impacted society.
Why consumers frequently prefer open source technologies.
The different types of open source licenses, and how they influence commercial models.
Highlights of Internet Identity Workshop #28 with Drummond ReedSSIMeetup
https://ssimeetup.org/highlights-internet-identity-workshop-28-drummond-reed-ssi-meetup-one-year-anniversary-special-webinar-27/
SSI Meetup veteran Drummond Reed, Chief Trust Officer at Evernym and Trustee at the Sovrin Foundation, will cover the highlights of the latest edition of the longest-running conference in the Internet identity space—Internet Identity Workshop. Drummond has attended all 28 IIWs, and he will share his major takeaways from this gathering of the movers and shakers in SSI from around the world to celebrate SSIMeetup’s one year anniversary.
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...SSIMeetup
Drummond Reed, Chief Trust Officer at Evernym, will explain in our second Webinar "Decentralized Identifiers (DIDs) - Building Block of Self-Sovereign Identity (SSI)" giving us the background on how DIDs work, where they come from and why they are important for Blockchain based Digital Identity.
Self Sovereign Identity (SSI) Open standards with Drummond Reed SSIMeetup
Drummond Reed, Chief Trust Officer at Evernym and Sovrin Foundation Trustee, features in our first Webinar "The Story of SSI Open Standards" by giving us the background on the foundation of Self Sovereign Identity. Drummond explains the technical and development aspects of DIDs, DKMS, DID Auth and Verifiable Credentials that will make Self Sovereign Identity possible.
Understanding the European Self-Sovereign Identity Framework (ESSIF)SSIMeetup
https://ssimeetup.org/understanding-european-self-sovereign-identity-framework-essif-daniel-du-seuil-carlos-pastor-webinar-32/
Daniël Du Seuil, Programm manager and blockchain architect with the Flemish public service, and Carlos Pastor, from BME in Spain, give an overview of the vision, objectives, and approach of the European Self-Sovereign Identity Framework (ESSIF).
In the current times, the mentioned values and goals of the EU need not only to be pursued in the analog world but also in the emerging and expanding digital world. In a world which is overall becoming more insecure, competitive, and authoritarian, Europe needs to project its core values in the digital world – for its own citizens and beyond. Just as the GDPR has a global signaling and role model function, we need a new model of digital identity based on European values to work across the globe. This model will not only protect and empower the citizens and organizations but also allow more efficient interactions and new business models.
The new emerging technologies and concepts like blockchain and self-sovereign identity hold the promise to construct a new model of digital identity and the EU member states want to take the lead in this disruptive approach. In 2018, 27 EU Member States, Norway, and Lichtenstein signed a deceleration creating the European Blockchain Partnership (EBP). The EBP assists the European Commission in establishing a European Blockchain Services Infrastructure (EBSI). In the short term (2019-2020), the main objective is to start the operation of EU-wide Blockchain-based services and to promote the use of the EBSI in “virtually” every domain of the public sector able to benefit from Blockchain technology. The EBSI has a particular focus on cross-border public services. In 2018, the EBP identified a set of Use-Cases to be implemented on the EBSI one of these important use cases is the European Self Sovereign Identity Framework (ESSIF). The EBSI will implement a generic Self-Sovereign Identity capability that is integrated and interoperable with existing building blocks and legal frameworks like eIDAS and GDPR.
The ESSIF will be focussing in the first stage and implementation on the public services/member states and the EBSI use cases that are now being developed (diploma and notarization). But a much larger scope and ambitions lie in the near future. Public-private interactions could also benefit from this concept and the ESSIF project wants to accelerate and stimulate an emerging market on SSI solutions/concepts with the trust and help on standardization/interoperability Europe can provide in the new digital world. The goal and focus of this project are to develop a first version or Minimum Valuable Product (MVP) of the ESSIF within the new European Blockchain Service Infrastructure by the end of 2019/begin 2020.
SSI: The Trillion Dollar Business OpportunitySSIMeetup
https://ssimeetup.org/ssi-trillion-dollar-business-opportunity-webinar-34/
This webinar, based on a panel of the same name held at Seattle Devcon in July 2019, will feature four experts from different areas of the digital identity industry explaining why they believe Self-Sovereign Identity (SSI) is one of the most significant applications of blockchain technology to enable all kind of new business model for the digital economy.
Panelists will include Chris Spanton, Principal Architect—Blockchain at T-Mobile; Vaughan Emery, CEO of Datafi Labs; and Drummond Reed, Chief Trust Officer at Evernym and a Trustee of the Sovrin Foundation.
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...SSIMeetup
https://ssimeetup.org/machine-identity-dids-verifiable-credentials-trust-interoperability-iot-webinar-25-mrinal-wadhwa/
Mrinal Wadhwa, CTO of Ockam, will talk about how Decentralized Identifiers, Verifiable Credentials, and Decentralized Key Management enable highly secure and reliable systems of connected devices.
The promise of IoT has been a future where systems of connected machines would work together, using intelligent algorithms, to almost magically improve our lives; Systems in farms and factories that would intelligently sense and control physical processes to optimize yield and reduce waste, homes that would adapt for our comfort and safety, and resilient cities that would pollute less and smartly manage our limited resources. These are the autonomous systems that developers in the Internet of Things community are passionate about. We all want to build this magical future.
The status quo, however, is that most IoT solutions are incredibly difficult to secure and take too long to develop, provision, and integrate. This talk will show how several emerging open standards can be combined to create open developer tools that help you avoid the plumbing required to build trust between connected devices. It will also briefly touch on Ockam’s DID method for devices and their open source Go DID Parser.
Solving compliance for crypto businesses using Decentralized Identity – Pelle...SSIMeetup
https://ssimeetup.org/solving-compliance-crypto-businesses-using-decentralized-identity-pelle-braendgaard-webinar-60/
A new global framework for regulating the crypto industry is coming into place this year. One of the most important new rules that businesses interacting with crypto has to implement is what is known as the Travel Rule. The Travel Rule, which is also known as The Wire Transfer rule, requires a business managing crypto on behalf of their user to transfer KYC’d (Know-Your-Customer) Identity Information to a receiving institution. Pelle Braendgaard, CEO of Notabene, will share his insights and explain how his company is tackling this business challenge for the industry.
Complying with this rule provides many challenges for the industry. Several industry groups have already started to invent several new protocols to solve this. Notabene helps financial companies be compliant with new, global anti-money laundering (AML) regulations for crypto transactions coming into effect right now. Pelle believes this is a critical use case for SSI (Self-Sovereign Identity). In this talk, he will go over the rule itself, industry protocols, how he sees SSI can help here, and how they are helping to solve it.
The State of Digital Identity Wallets – Darrell O’DonnellSSIMeetup
https://ssimeetup.org/state-digital-identity-crypto-wallets-darrell-odonnell-webinar-22/
Darrell O’Donnell, President & CEO of Continuum Loop and Sovrin community contributor, will be our next guest. He’ll be sharing an update on a Digital Identity and Crypto Wallet study and report that he is releasing.
Discussions about Digital Wallets (aka Identity Wallets) have ended with hand-waving at many hard problems. The Digital Wallet study begins as leaders in Canada looked at what was needed to really enable self-sovereign identity to have an impact. The project sponsors realized that in order to bring Self-Sovereign Identity (SSI) into their businesses a deep understanding of the current and future state of Digital Wallets was required.
The seemingly simple wallet turns out to be exceedingly hard. The initial focus of the study was on the enterprise aspects of Digital Wallets but it quickly shifted and broadened to apply generally to people and organizations. The project is culminating in a public and private report. The public report is intended to start a deeper discussion into what we really need from our Digital Wallet.
Darrell will walk us through, at a high-level, the findings of the study and give viewers access to a pre-publication version of the public report.
The 2nd Official W3C DID Working Group Meeting (The Netherlands)SSIMeetup
https://ssimeetup.org/did-report-2-2nd-official-w3c-did-working-group-meeting-netherlands-drummond-reed-markus-sabadello-webinar-45/
The DID Report 2 about the Second Meeting of the W3C DID Working Group with Drummond Reed and Markus Sabadello from Danube Tech, co-authors of the W3C DID specification.
DID spec co-author Drummond Reed and Markus Sabadello will report back from Amsterdam (The Netherlands) for the second official meeting of the W3C DID Working Group taking place from January 29-31, 2020 to share highlights of the meeting and the roadmap for taking DIDs to a full Web standard.
This session will be followed one hour later by a full DID education session based on the DID chapter published with Manning by IdentityBook.info authors Drummond Reed, Markus Sabadello and Alex Preukschat. If you want to learn all the basics about DIDs please also join this session here: Webinar 46
Kiva protocol: building the credit bureau of the future using SSISSIMeetup
https://ssimeetup.org/kiva-protocol-building-credit-bureau-future-using-ssi-alan-krassowski-webinar-37/
Alan Krassowski, VP of Technology & Blockchain at Kiva, will explain how the Kiva Protocol team is leveraging Self-Sovereign Identity (SSI) and related technologies to develop identity and credit solutions for traditionally underserved populations, starting with an implementation in concert with Sierra Leone’s government and banking systems, in partnership with the United Nations Development Programme (UNDP).
Alan will provide an overview of the project and its goals, including some of the challenges related to infrastructure, such as limited electricity, Internet bandwidth and penetration of smartphone devices — and how Kiva is overcoming those challenges. Alan will also explain how Kiva is leveraging various Hyperledger codebases related to verifiable credentials, decentralized identifiers, and distributed ledgers, as well as how Kiva is contributing back to the open-source community.
The audience will gain a better understanding of a real-world application of SSI technologies that will provide powerful benefits to citizens in the developing world. How is Kiva giving unbanked people digital identity and secure control over their own credit information? How can a systems-level change in identity and credit unlock capital and opportunity for millions of people?
Alan has been a professional software engineer, architect, and leader for over thirty years. After earning his B.S. in Computer Engineering from Rochester Institute of Technology, he worked as a software developer in a wide variety of domains including fintech, insurance, desktop publishing, point-of-sale, accounting, budgeting, video streaming, and narrative theory. He has also held technical leadership roles at various companies in the cybersecurity space, including Chief Architect at Cylance, Inc., Chief Architect & Senior Director at McAfee / Intel Security, and Architect in the Office of the CTO at Symantec. Prior to his role at Kiva, he was a Decentralization Architect at ConsenSys and CTO of ConsenSys Capital where he worked with Ethereum-based blockchain solutions. He has been a technical editor/reviewer on four software security books and one on Bitcoin, and is excited about how advances in cryptography have led to new solutions for people to communicate, collaborate and trade while minimizing the need to trust in centralized institutions.
Decentralized Identifier (DIDs) fundamentals deep diveSSIMeetup
https://ssimeetup.org/decentralized-identifiers-dids-fundamentals-identitybook-info-drummond-reed-markus-sabadello-webinar-46/
Decentralized identifiers (abbreviated as “DIDs”), are the cryptographic counterpart to verifiable credentials (VCs) that together are the “twin pillars” of SSI architecture. In this special IdentityBook.info webinar Markus Sabadello, Founder and CEO of Danube Tech, and Drummond Reed, Chief Trust Officer at Evernym, co-authors of the DID chapter of the “Self-Sovereign Identity:
Decentralized Digital Identity and Verifiable Credentials” book published by Manning will explain all the fundamentals of DIDs. Based on the did chapter of the book, you will learn how DIDs evolved from the work started with VCs, how they are related to URLs and URNs, why a new type of cryptographically-verifiable identifier is needed for SSI, and how DIDs are being standardized at World Wide Web Consortium (W3C). Your guides will be two of the editors of the W3C Decentralized Identifier 1.0 specification: Markus Sabadello and Drummond Reed.
All you need to know about SSI for Corporates and IoT – Heather VescentBlockchain España
https://ssimeetup.org/gaps-corporate-iot-identity-heather-vescent-webinar-35/
Heather Vescent, the owner of The Purple Tornado a foresight and strategic intelligence consultancy, explains how Digital identity gaps in Corporate and IoT Identity can be solved from an NPE (non-person entity) point of view. The webinar will answer: What is an NPE? How is an NPE both different and similar to human identity? What is the relationship humans have with NPEs? How is NPE identity more complex than the identity we know today? What considerations do we need to make when developing identity solutions for the future?
The webinar defines a taxonomy for Non-Person Entities (NPEs), defines the relationships NPEs have with humans and each other, and identifies 11 market gaps in today’s technology solutions, that have the potential to be solved using decentralized identity technology. Industry-wide solutions must be forged collaboratively in order to address a broad set of digital identity and data privacy problems.
This webinar shares research funded by the Department of Homeland Security Science & Technology, Cybersecurity directorate by The Purple Tornado, with Heather Vescent as the Principal Investigator. Vescent has delivered research insights to governments and corporations in digital identity, military learning, payments, transactions, and new economic models. She is the writer/producer of 14 documentaries and short films about future technology. Her clients include US & UK governments, SWIFT, CitiVentures, Disney, IEEE, mid-size companies and start-ups. Her research has been covered in the New York Times, CNN, American Banker, CNBC, Fox, and the Atlantic. She is an author of the Cyber Attack Survival Manual, published by Weldon-Owen. Her work has won multiple awards from the Association of Professional Futurists.
Decentralized Identifiers DIDs and W3C with Manu Sporny and Drummond ReedSSIMeetup
Drummond Reed, Chief Trust Officer at Evernym and Sovrin Foundation Trustee, and Manu Sporny, CEO – Founder and Owner of Digital Bazaar feature in this DID backgrounder. This webinar slide deck covers one of the most exciting developments in SSI open standards: the push for W3C to form a new Working Group for DIDs (Decentralized Identifiers).
Manu Sporny and Drummond Reed, are co-editors of the current DID specification at the W3C Credentials Community Group. In an free-ranging interview, they cover how DIDs have become the fundamental building block of SSI—the origin story, development of the first spec, community adoption, the move to the W3C CCG, and now the process of forming a full Working Group.
The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...SSIMeetup
https://ssimeetup.org/did-report-1-first-official-w3c-did-working-group-meeting-japan-drummond-reed-webinar-36/
The DID Report 1 about the First Meeting of the New W3C DID Working Group with Drummond Reed, co-author of the W3C DID specification, and Markus Sabadello from Danube Tech. Headline news in SSI land: this month W3C members approved forming a full W3C Working Group for Decentralized Identifiers (DIDs).
DID spec co-author Drummond Reed has been in Fukuoka Japan for the first official meeting of this new Working Group and he will share highlights of the meeting and the roadmap for taking DIDs to a full Web standard.
The Pan-Canadian Trust Framework (PCTF) for SSISSIMeetup
https://ssimeetup.org/pan-canadian-trust-framework-pctf-ssi-tim-bouma-webinar-59/
We are very proud to release a special webinar to introduce the next chapter of the “Self-Sovereign Identity Book” from two of the most eminent authorities on digital identity in government: Tim Bouma and Dave Roberts, senior public servants with the Government of Canada and major contributors to the Pan-Canadian Trust Framework (PCTF).
In this chapter, Tim and Dave explain the PCTF model and how it maps to the SSI model and the Trust over IP (ToIP) stack.
This webinar describes how a world leader in digital identity (which Canada has been for two decades) sees the opportunity in the new decentralized identity model represented by SSI (Self-Sovereign Identity).
https://ssimeetup.org/ssi-ecosystem-south-korea-jaehoon-shim-webinar-56/
Jaehoon Shim, a blockchain researcher at LG CNS and the founder of SSIMeetup Korea, will introduce the Self-Sovereign Identity (SSI) ecosystem of South Korea. South Korea became a hotbed of Self Sovereign Identity in the last couple of years. The number of government-funded projects, including the mobile credential for government officials, requires using DIDs (Decentralized Identifiers). Also, hundreds of enterprises joined public/private consortia on decentralized identity to empower the digital transformation of the South Korean society. Jaehoon will explain in detail the current ecosystem and discuss opportunities for the future.
Blockcerts: The Open Standard for Blockchain CredentialsSSIMeetup
https://ssimeetup.org/blockcerts-open-standard-blockchain-credentials-daniel-paramo-anthony-ronning-webinar-39/
Anthony Ronning, an engineer behind Blockcerts and backend dev at Learning Machine and Daniel Paramo, co-founder of swys and advisor at Xertify, explains how Blockcerts started, deep dive on how Blockcerts work, which institutions are implementing this solution and what companies have made a solution for the adoption of this standard. We will review the current Blockcerts roadmap and their pros and cons. What considerations do we need to take when developing a solution around Blockcerts?
Blockcerts is an open standard for creating, issuing, viewing, and verifying blockchain-based certificates. These digital records are registered on a blockchain, cryptographically signed, tamper-proof, and shareable. The goal is to enable a wave of innovation that gives individuals the capacity to possess and share their own official records.
The initial design was based on prototypes developed at the MIT Media Lab and by Learning Machine. The goal of this community is to create technical resources that other developers can utilize in their own projects. Rather than independently developing custom implementations.
Blockcerts consists of open-source libraries, tools, and mobile apps enabling a decentralized, standards-based, recipient-centric ecosystem, enabling trustless verification through blockchain technologies.
Blockcerts uses and encourages consolidation on open standards. Blockcerts is committed to self-sovereign identity of all participants, and enabling recipient control of their claims through easy-to-use tools such as the certificate wallet (mobile app). Blockcerts is also committed to availability of credentials, without single points of failure.
These open-source repos may be utilized by other research projects and commercial developers. It contains components for creating, issuing, viewing, and verifying certificates across any blockchain.
Trust Frameworks and SSI: An Interview with CULedger on the Credit Union MyCU...SSIMeetup
http://ssimeetup.org/trust-frameworks-ssi-interview-culedger-credit-union-mycuid-trust-framework-drummond-reed-webinar-9/
Drummond Reed, Chief Trust Officer at Evernym and Sovrin Foundation Trustee, features in this Webinar “Trust Frameworks and SSI: An Interview with CULedger on the Credit Union MyCUID Trust Framework”. To make SSI work, verifiable digital credentials must be something that websites, businesses, governments, and many others accept. To do that, they need assurances about who issued the credential under what rules. This “rulebook” for issuing digital credentials is called a trust framework.
In this webinar, Evernym Chief Trust Officer Drummond Reed, chair of the Sovrin Foundation Trust Framework Working Group, will explain what a trust framework is and why they are are essential to SSI. Then he will interview executives of CULedger, the credit union blockchain consortia, about the MyCUID Trust Framework—the first global trust framework for proving membership in a credit union.
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...SSIMeetup
https://ssimeetup.org/peer-dids-secure-scalable-method-dids-off-ledger-daniel-hardman-webinar-42/
Daniel Hardman, Chief Architect, Evernym / Secretary, Technical Governance Board – Sovrin Foundation will show how Peer DIDs will allow off-chain transactions for the self-sovereign identity (SSI) world.
Most documentation about decentralized identifiers (DIDs) describes them as identifiers that are rooted in a public source of truth like a blockchain, a database, a distributed filesystem, or similar. This publicness lets arbitrary parties resolve the DIDs to an endpoint and keys. It is an important feature for many use cases. However, the vast majority of relationships between people, organizations, and things have simpler requirements. When Alice(Corp|Device) and Bob want to interact, there are exactly and only 2 parties in the world who should care: Alice and Bob. Instead of arbitrary parties needing to resolve their DIDs, only Alice and Bob do. Peer DIDs are perfect in these cases. In many ways, peer DIDs are to public, blockchain-based DIDs what Ethereum Plasma or state channels are to on-chain smart contracts— or what Bitcoin’s Lightning Network is to on-chain cryptopayments. They move interactions off-chain, but offer options to connect back to a chain-based ecosystem as needed. Peer DIDs create the conditions for people, organizations, and things to have full control of their end of the digital relationships they sustain.
Streetcred: Improving the Developer Experience in SSI – Michael BoydSSIMeetup
https://ssimeetup.org/streetcred-improving-developer-experience-ssi-michael-boyd-webinar-41/
Michael is the Cofounder and Chief Product Officer of Streetcred ID. Coming from multiple startup ventures as technical lead, Michael was the first software engineer at Sovrin Foundation, where he was a strong advocate for privacy and security in decentralized identity systems. He was an original contributor to the initial Hyperledger Indy Agent code, which later became Hyperledger Aries Project. He is passionate about creating a pleasant experience for developers who want to implement self-sovereign identity with Streetcred.
In this talk, Michael will discuss the evolution of the developer experience in the SSI community, including the easiest ways to get started building credential issuers, verifiers, and identity wallets. He’ll introduce a framework for how to best approach user experience problems in decentralized identity, touching on hard topics like key management, schema discovery, and building a web of trust.
Verifiable Credentials 101 for SSI and Decentralized Digital Identity - Tyler...SSIMeetup
http://ssimeetup.org/verifiable-credentials-101-ssi-tyler-ruff-webinar-11/
Tyler Ruff, product manager at Evernym, will be our next guest to walk us through Verifiable Credentials in the context of Self-Sovereign Identity. He will cover how they are created, issued and shared, as well as cover some common technical questions.
The Verifiable Credentials discussed are based off a W3C standard for DIDs (decentralized identifiers) and Verifiable Credentials. The hope is that educating the identity and blockchain community on best practices for creating, issuing, storing and sharing Verifiable Credentials will foster interoperability between identity providers, ultimately making the whole ecosystem more valuable to the end consumer.
The focus of this presentation is how Verifiable Credentials work, and why the different steps and components are necessary.
If we can make Verifiable Credentials truly interoperable across industries, providers and domains, we can take a giant step forward towards a real self-sovereign world where individuals are in control of their digital lives and can benefit from every interaction they have—online and off. It all starts with getting interoperable, Verifiable Credentials under your control.
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloSSIMeetup
https://ssimeetup.org/introducing-ssi-eidas-legal-report-ignacio-alamillo-webinar-55/
The European Commission developed the SSI (Self-Sovereign Identity) eIDAS bridge, an ISA2 funded initiative, to promote eIDAS as a trust framework for the SSI ecosystem. It assists a VC (Verifiable Credential) issuer in the signing process, and helps the verifier to automate the identification of the organization behind the issuer’s DID (Decentralized Identifier). Simply by “crossing” the eIDAS Bridge, a Verifiable Credential can be proven trustworthy in the EU. Ignacio Alamillo will present at this SSI Meetup webinar the insights gained from this report.
In the context of the eIDAS bridge project, we performed an analysis on how eIDAS can legally support digital identity and trustworthy DLT-based transactions in the Digital Single Market, and this is reflected in the SSI eIDAS legal report, available at this link. The objective of this report is to evaluate the potential legal issues that are important to an SSI solution and make some recommendations to be used as policy input for the eIDAS 2020 review. The report outlines short-term objectives, where changes in the Regulation would not be necessary, but also mid to long-term scenarios requiring major changes in the Regulation to comply with the SSI design principles.
The different scenarios described in the report are aligned with the proposed architectural and procedural considerations designed in the SSI eIDAS Bridge project and the European Self Sovereign Identity Framework.
Privacy in today’s connected world is an illusion. All of our transactional data, both online and real-world can be mined. If someone truly wanted access to your information, they could have it with relatively little effort. As a result, privacy has begun to be regarded as a luxury item. What are the risks associated with your behavior? Why are data breaches so prevalent? What can you do to protect yourself? In this presentation, I share subject matter expertise derived from data security research and project-specific cybersecurity trend analysis. I share some practices I’ve developed in an effort to be better educated personally and make more informed choices about my own behavior.
Understanding the European Self-Sovereign Identity Framework (ESSIF)SSIMeetup
https://ssimeetup.org/understanding-european-self-sovereign-identity-framework-essif-daniel-du-seuil-carlos-pastor-webinar-32/
Daniël Du Seuil, Programm manager and blockchain architect with the Flemish public service, and Carlos Pastor, from BME in Spain, give an overview of the vision, objectives, and approach of the European Self-Sovereign Identity Framework (ESSIF).
In the current times, the mentioned values and goals of the EU need not only to be pursued in the analog world but also in the emerging and expanding digital world. In a world which is overall becoming more insecure, competitive, and authoritarian, Europe needs to project its core values in the digital world – for its own citizens and beyond. Just as the GDPR has a global signaling and role model function, we need a new model of digital identity based on European values to work across the globe. This model will not only protect and empower the citizens and organizations but also allow more efficient interactions and new business models.
The new emerging technologies and concepts like blockchain and self-sovereign identity hold the promise to construct a new model of digital identity and the EU member states want to take the lead in this disruptive approach. In 2018, 27 EU Member States, Norway, and Lichtenstein signed a deceleration creating the European Blockchain Partnership (EBP). The EBP assists the European Commission in establishing a European Blockchain Services Infrastructure (EBSI). In the short term (2019-2020), the main objective is to start the operation of EU-wide Blockchain-based services and to promote the use of the EBSI in “virtually” every domain of the public sector able to benefit from Blockchain technology. The EBSI has a particular focus on cross-border public services. In 2018, the EBP identified a set of Use-Cases to be implemented on the EBSI one of these important use cases is the European Self Sovereign Identity Framework (ESSIF). The EBSI will implement a generic Self-Sovereign Identity capability that is integrated and interoperable with existing building blocks and legal frameworks like eIDAS and GDPR.
The ESSIF will be focussing in the first stage and implementation on the public services/member states and the EBSI use cases that are now being developed (diploma and notarization). But a much larger scope and ambitions lie in the near future. Public-private interactions could also benefit from this concept and the ESSIF project wants to accelerate and stimulate an emerging market on SSI solutions/concepts with the trust and help on standardization/interoperability Europe can provide in the new digital world. The goal and focus of this project are to develop a first version or Minimum Valuable Product (MVP) of the ESSIF within the new European Blockchain Service Infrastructure by the end of 2019/begin 2020.
SSI: The Trillion Dollar Business OpportunitySSIMeetup
https://ssimeetup.org/ssi-trillion-dollar-business-opportunity-webinar-34/
This webinar, based on a panel of the same name held at Seattle Devcon in July 2019, will feature four experts from different areas of the digital identity industry explaining why they believe Self-Sovereign Identity (SSI) is one of the most significant applications of blockchain technology to enable all kind of new business model for the digital economy.
Panelists will include Chris Spanton, Principal Architect—Blockchain at T-Mobile; Vaughan Emery, CEO of Datafi Labs; and Drummond Reed, Chief Trust Officer at Evernym and a Trustee of the Sovrin Foundation.
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...SSIMeetup
https://ssimeetup.org/machine-identity-dids-verifiable-credentials-trust-interoperability-iot-webinar-25-mrinal-wadhwa/
Mrinal Wadhwa, CTO of Ockam, will talk about how Decentralized Identifiers, Verifiable Credentials, and Decentralized Key Management enable highly secure and reliable systems of connected devices.
The promise of IoT has been a future where systems of connected machines would work together, using intelligent algorithms, to almost magically improve our lives; Systems in farms and factories that would intelligently sense and control physical processes to optimize yield and reduce waste, homes that would adapt for our comfort and safety, and resilient cities that would pollute less and smartly manage our limited resources. These are the autonomous systems that developers in the Internet of Things community are passionate about. We all want to build this magical future.
The status quo, however, is that most IoT solutions are incredibly difficult to secure and take too long to develop, provision, and integrate. This talk will show how several emerging open standards can be combined to create open developer tools that help you avoid the plumbing required to build trust between connected devices. It will also briefly touch on Ockam’s DID method for devices and their open source Go DID Parser.
Solving compliance for crypto businesses using Decentralized Identity – Pelle...SSIMeetup
https://ssimeetup.org/solving-compliance-crypto-businesses-using-decentralized-identity-pelle-braendgaard-webinar-60/
A new global framework for regulating the crypto industry is coming into place this year. One of the most important new rules that businesses interacting with crypto has to implement is what is known as the Travel Rule. The Travel Rule, which is also known as The Wire Transfer rule, requires a business managing crypto on behalf of their user to transfer KYC’d (Know-Your-Customer) Identity Information to a receiving institution. Pelle Braendgaard, CEO of Notabene, will share his insights and explain how his company is tackling this business challenge for the industry.
Complying with this rule provides many challenges for the industry. Several industry groups have already started to invent several new protocols to solve this. Notabene helps financial companies be compliant with new, global anti-money laundering (AML) regulations for crypto transactions coming into effect right now. Pelle believes this is a critical use case for SSI (Self-Sovereign Identity). In this talk, he will go over the rule itself, industry protocols, how he sees SSI can help here, and how they are helping to solve it.
The State of Digital Identity Wallets – Darrell O’DonnellSSIMeetup
https://ssimeetup.org/state-digital-identity-crypto-wallets-darrell-odonnell-webinar-22/
Darrell O’Donnell, President & CEO of Continuum Loop and Sovrin community contributor, will be our next guest. He’ll be sharing an update on a Digital Identity and Crypto Wallet study and report that he is releasing.
Discussions about Digital Wallets (aka Identity Wallets) have ended with hand-waving at many hard problems. The Digital Wallet study begins as leaders in Canada looked at what was needed to really enable self-sovereign identity to have an impact. The project sponsors realized that in order to bring Self-Sovereign Identity (SSI) into their businesses a deep understanding of the current and future state of Digital Wallets was required.
The seemingly simple wallet turns out to be exceedingly hard. The initial focus of the study was on the enterprise aspects of Digital Wallets but it quickly shifted and broadened to apply generally to people and organizations. The project is culminating in a public and private report. The public report is intended to start a deeper discussion into what we really need from our Digital Wallet.
Darrell will walk us through, at a high-level, the findings of the study and give viewers access to a pre-publication version of the public report.
The 2nd Official W3C DID Working Group Meeting (The Netherlands)SSIMeetup
https://ssimeetup.org/did-report-2-2nd-official-w3c-did-working-group-meeting-netherlands-drummond-reed-markus-sabadello-webinar-45/
The DID Report 2 about the Second Meeting of the W3C DID Working Group with Drummond Reed and Markus Sabadello from Danube Tech, co-authors of the W3C DID specification.
DID spec co-author Drummond Reed and Markus Sabadello will report back from Amsterdam (The Netherlands) for the second official meeting of the W3C DID Working Group taking place from January 29-31, 2020 to share highlights of the meeting and the roadmap for taking DIDs to a full Web standard.
This session will be followed one hour later by a full DID education session based on the DID chapter published with Manning by IdentityBook.info authors Drummond Reed, Markus Sabadello and Alex Preukschat. If you want to learn all the basics about DIDs please also join this session here: Webinar 46
Kiva protocol: building the credit bureau of the future using SSISSIMeetup
https://ssimeetup.org/kiva-protocol-building-credit-bureau-future-using-ssi-alan-krassowski-webinar-37/
Alan Krassowski, VP of Technology & Blockchain at Kiva, will explain how the Kiva Protocol team is leveraging Self-Sovereign Identity (SSI) and related technologies to develop identity and credit solutions for traditionally underserved populations, starting with an implementation in concert with Sierra Leone’s government and banking systems, in partnership with the United Nations Development Programme (UNDP).
Alan will provide an overview of the project and its goals, including some of the challenges related to infrastructure, such as limited electricity, Internet bandwidth and penetration of smartphone devices — and how Kiva is overcoming those challenges. Alan will also explain how Kiva is leveraging various Hyperledger codebases related to verifiable credentials, decentralized identifiers, and distributed ledgers, as well as how Kiva is contributing back to the open-source community.
The audience will gain a better understanding of a real-world application of SSI technologies that will provide powerful benefits to citizens in the developing world. How is Kiva giving unbanked people digital identity and secure control over their own credit information? How can a systems-level change in identity and credit unlock capital and opportunity for millions of people?
Alan has been a professional software engineer, architect, and leader for over thirty years. After earning his B.S. in Computer Engineering from Rochester Institute of Technology, he worked as a software developer in a wide variety of domains including fintech, insurance, desktop publishing, point-of-sale, accounting, budgeting, video streaming, and narrative theory. He has also held technical leadership roles at various companies in the cybersecurity space, including Chief Architect at Cylance, Inc., Chief Architect & Senior Director at McAfee / Intel Security, and Architect in the Office of the CTO at Symantec. Prior to his role at Kiva, he was a Decentralization Architect at ConsenSys and CTO of ConsenSys Capital where he worked with Ethereum-based blockchain solutions. He has been a technical editor/reviewer on four software security books and one on Bitcoin, and is excited about how advances in cryptography have led to new solutions for people to communicate, collaborate and trade while minimizing the need to trust in centralized institutions.
Decentralized Identifier (DIDs) fundamentals deep diveSSIMeetup
https://ssimeetup.org/decentralized-identifiers-dids-fundamentals-identitybook-info-drummond-reed-markus-sabadello-webinar-46/
Decentralized identifiers (abbreviated as “DIDs”), are the cryptographic counterpart to verifiable credentials (VCs) that together are the “twin pillars” of SSI architecture. In this special IdentityBook.info webinar Markus Sabadello, Founder and CEO of Danube Tech, and Drummond Reed, Chief Trust Officer at Evernym, co-authors of the DID chapter of the “Self-Sovereign Identity:
Decentralized Digital Identity and Verifiable Credentials” book published by Manning will explain all the fundamentals of DIDs. Based on the did chapter of the book, you will learn how DIDs evolved from the work started with VCs, how they are related to URLs and URNs, why a new type of cryptographically-verifiable identifier is needed for SSI, and how DIDs are being standardized at World Wide Web Consortium (W3C). Your guides will be two of the editors of the W3C Decentralized Identifier 1.0 specification: Markus Sabadello and Drummond Reed.
All you need to know about SSI for Corporates and IoT – Heather VescentBlockchain España
https://ssimeetup.org/gaps-corporate-iot-identity-heather-vescent-webinar-35/
Heather Vescent, the owner of The Purple Tornado a foresight and strategic intelligence consultancy, explains how Digital identity gaps in Corporate and IoT Identity can be solved from an NPE (non-person entity) point of view. The webinar will answer: What is an NPE? How is an NPE both different and similar to human identity? What is the relationship humans have with NPEs? How is NPE identity more complex than the identity we know today? What considerations do we need to make when developing identity solutions for the future?
The webinar defines a taxonomy for Non-Person Entities (NPEs), defines the relationships NPEs have with humans and each other, and identifies 11 market gaps in today’s technology solutions, that have the potential to be solved using decentralized identity technology. Industry-wide solutions must be forged collaboratively in order to address a broad set of digital identity and data privacy problems.
This webinar shares research funded by the Department of Homeland Security Science & Technology, Cybersecurity directorate by The Purple Tornado, with Heather Vescent as the Principal Investigator. Vescent has delivered research insights to governments and corporations in digital identity, military learning, payments, transactions, and new economic models. She is the writer/producer of 14 documentaries and short films about future technology. Her clients include US & UK governments, SWIFT, CitiVentures, Disney, IEEE, mid-size companies and start-ups. Her research has been covered in the New York Times, CNN, American Banker, CNBC, Fox, and the Atlantic. She is an author of the Cyber Attack Survival Manual, published by Weldon-Owen. Her work has won multiple awards from the Association of Professional Futurists.
Decentralized Identifiers DIDs and W3C with Manu Sporny and Drummond ReedSSIMeetup
Drummond Reed, Chief Trust Officer at Evernym and Sovrin Foundation Trustee, and Manu Sporny, CEO – Founder and Owner of Digital Bazaar feature in this DID backgrounder. This webinar slide deck covers one of the most exciting developments in SSI open standards: the push for W3C to form a new Working Group for DIDs (Decentralized Identifiers).
Manu Sporny and Drummond Reed, are co-editors of the current DID specification at the W3C Credentials Community Group. In an free-ranging interview, they cover how DIDs have become the fundamental building block of SSI—the origin story, development of the first spec, community adoption, the move to the W3C CCG, and now the process of forming a full Working Group.
The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...SSIMeetup
https://ssimeetup.org/did-report-1-first-official-w3c-did-working-group-meeting-japan-drummond-reed-webinar-36/
The DID Report 1 about the First Meeting of the New W3C DID Working Group with Drummond Reed, co-author of the W3C DID specification, and Markus Sabadello from Danube Tech. Headline news in SSI land: this month W3C members approved forming a full W3C Working Group for Decentralized Identifiers (DIDs).
DID spec co-author Drummond Reed has been in Fukuoka Japan for the first official meeting of this new Working Group and he will share highlights of the meeting and the roadmap for taking DIDs to a full Web standard.
The Pan-Canadian Trust Framework (PCTF) for SSISSIMeetup
https://ssimeetup.org/pan-canadian-trust-framework-pctf-ssi-tim-bouma-webinar-59/
We are very proud to release a special webinar to introduce the next chapter of the “Self-Sovereign Identity Book” from two of the most eminent authorities on digital identity in government: Tim Bouma and Dave Roberts, senior public servants with the Government of Canada and major contributors to the Pan-Canadian Trust Framework (PCTF).
In this chapter, Tim and Dave explain the PCTF model and how it maps to the SSI model and the Trust over IP (ToIP) stack.
This webinar describes how a world leader in digital identity (which Canada has been for two decades) sees the opportunity in the new decentralized identity model represented by SSI (Self-Sovereign Identity).
https://ssimeetup.org/ssi-ecosystem-south-korea-jaehoon-shim-webinar-56/
Jaehoon Shim, a blockchain researcher at LG CNS and the founder of SSIMeetup Korea, will introduce the Self-Sovereign Identity (SSI) ecosystem of South Korea. South Korea became a hotbed of Self Sovereign Identity in the last couple of years. The number of government-funded projects, including the mobile credential for government officials, requires using DIDs (Decentralized Identifiers). Also, hundreds of enterprises joined public/private consortia on decentralized identity to empower the digital transformation of the South Korean society. Jaehoon will explain in detail the current ecosystem and discuss opportunities for the future.
Blockcerts: The Open Standard for Blockchain CredentialsSSIMeetup
https://ssimeetup.org/blockcerts-open-standard-blockchain-credentials-daniel-paramo-anthony-ronning-webinar-39/
Anthony Ronning, an engineer behind Blockcerts and backend dev at Learning Machine and Daniel Paramo, co-founder of swys and advisor at Xertify, explains how Blockcerts started, deep dive on how Blockcerts work, which institutions are implementing this solution and what companies have made a solution for the adoption of this standard. We will review the current Blockcerts roadmap and their pros and cons. What considerations do we need to take when developing a solution around Blockcerts?
Blockcerts is an open standard for creating, issuing, viewing, and verifying blockchain-based certificates. These digital records are registered on a blockchain, cryptographically signed, tamper-proof, and shareable. The goal is to enable a wave of innovation that gives individuals the capacity to possess and share their own official records.
The initial design was based on prototypes developed at the MIT Media Lab and by Learning Machine. The goal of this community is to create technical resources that other developers can utilize in their own projects. Rather than independently developing custom implementations.
Blockcerts consists of open-source libraries, tools, and mobile apps enabling a decentralized, standards-based, recipient-centric ecosystem, enabling trustless verification through blockchain technologies.
Blockcerts uses and encourages consolidation on open standards. Blockcerts is committed to self-sovereign identity of all participants, and enabling recipient control of their claims through easy-to-use tools such as the certificate wallet (mobile app). Blockcerts is also committed to availability of credentials, without single points of failure.
These open-source repos may be utilized by other research projects and commercial developers. It contains components for creating, issuing, viewing, and verifying certificates across any blockchain.
Trust Frameworks and SSI: An Interview with CULedger on the Credit Union MyCU...SSIMeetup
http://ssimeetup.org/trust-frameworks-ssi-interview-culedger-credit-union-mycuid-trust-framework-drummond-reed-webinar-9/
Drummond Reed, Chief Trust Officer at Evernym and Sovrin Foundation Trustee, features in this Webinar “Trust Frameworks and SSI: An Interview with CULedger on the Credit Union MyCUID Trust Framework”. To make SSI work, verifiable digital credentials must be something that websites, businesses, governments, and many others accept. To do that, they need assurances about who issued the credential under what rules. This “rulebook” for issuing digital credentials is called a trust framework.
In this webinar, Evernym Chief Trust Officer Drummond Reed, chair of the Sovrin Foundation Trust Framework Working Group, will explain what a trust framework is and why they are are essential to SSI. Then he will interview executives of CULedger, the credit union blockchain consortia, about the MyCUID Trust Framework—the first global trust framework for proving membership in a credit union.
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...SSIMeetup
https://ssimeetup.org/peer-dids-secure-scalable-method-dids-off-ledger-daniel-hardman-webinar-42/
Daniel Hardman, Chief Architect, Evernym / Secretary, Technical Governance Board – Sovrin Foundation will show how Peer DIDs will allow off-chain transactions for the self-sovereign identity (SSI) world.
Most documentation about decentralized identifiers (DIDs) describes them as identifiers that are rooted in a public source of truth like a blockchain, a database, a distributed filesystem, or similar. This publicness lets arbitrary parties resolve the DIDs to an endpoint and keys. It is an important feature for many use cases. However, the vast majority of relationships between people, organizations, and things have simpler requirements. When Alice(Corp|Device) and Bob want to interact, there are exactly and only 2 parties in the world who should care: Alice and Bob. Instead of arbitrary parties needing to resolve their DIDs, only Alice and Bob do. Peer DIDs are perfect in these cases. In many ways, peer DIDs are to public, blockchain-based DIDs what Ethereum Plasma or state channels are to on-chain smart contracts— or what Bitcoin’s Lightning Network is to on-chain cryptopayments. They move interactions off-chain, but offer options to connect back to a chain-based ecosystem as needed. Peer DIDs create the conditions for people, organizations, and things to have full control of their end of the digital relationships they sustain.
Streetcred: Improving the Developer Experience in SSI – Michael BoydSSIMeetup
https://ssimeetup.org/streetcred-improving-developer-experience-ssi-michael-boyd-webinar-41/
Michael is the Cofounder and Chief Product Officer of Streetcred ID. Coming from multiple startup ventures as technical lead, Michael was the first software engineer at Sovrin Foundation, where he was a strong advocate for privacy and security in decentralized identity systems. He was an original contributor to the initial Hyperledger Indy Agent code, which later became Hyperledger Aries Project. He is passionate about creating a pleasant experience for developers who want to implement self-sovereign identity with Streetcred.
In this talk, Michael will discuss the evolution of the developer experience in the SSI community, including the easiest ways to get started building credential issuers, verifiers, and identity wallets. He’ll introduce a framework for how to best approach user experience problems in decentralized identity, touching on hard topics like key management, schema discovery, and building a web of trust.
Verifiable Credentials 101 for SSI and Decentralized Digital Identity - Tyler...SSIMeetup
http://ssimeetup.org/verifiable-credentials-101-ssi-tyler-ruff-webinar-11/
Tyler Ruff, product manager at Evernym, will be our next guest to walk us through Verifiable Credentials in the context of Self-Sovereign Identity. He will cover how they are created, issued and shared, as well as cover some common technical questions.
The Verifiable Credentials discussed are based off a W3C standard for DIDs (decentralized identifiers) and Verifiable Credentials. The hope is that educating the identity and blockchain community on best practices for creating, issuing, storing and sharing Verifiable Credentials will foster interoperability between identity providers, ultimately making the whole ecosystem more valuable to the end consumer.
The focus of this presentation is how Verifiable Credentials work, and why the different steps and components are necessary.
If we can make Verifiable Credentials truly interoperable across industries, providers and domains, we can take a giant step forward towards a real self-sovereign world where individuals are in control of their digital lives and can benefit from every interaction they have—online and off. It all starts with getting interoperable, Verifiable Credentials under your control.
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloSSIMeetup
https://ssimeetup.org/introducing-ssi-eidas-legal-report-ignacio-alamillo-webinar-55/
The European Commission developed the SSI (Self-Sovereign Identity) eIDAS bridge, an ISA2 funded initiative, to promote eIDAS as a trust framework for the SSI ecosystem. It assists a VC (Verifiable Credential) issuer in the signing process, and helps the verifier to automate the identification of the organization behind the issuer’s DID (Decentralized Identifier). Simply by “crossing” the eIDAS Bridge, a Verifiable Credential can be proven trustworthy in the EU. Ignacio Alamillo will present at this SSI Meetup webinar the insights gained from this report.
In the context of the eIDAS bridge project, we performed an analysis on how eIDAS can legally support digital identity and trustworthy DLT-based transactions in the Digital Single Market, and this is reflected in the SSI eIDAS legal report, available at this link. The objective of this report is to evaluate the potential legal issues that are important to an SSI solution and make some recommendations to be used as policy input for the eIDAS 2020 review. The report outlines short-term objectives, where changes in the Regulation would not be necessary, but also mid to long-term scenarios requiring major changes in the Regulation to comply with the SSI design principles.
The different scenarios described in the report are aligned with the proposed architectural and procedural considerations designed in the SSI eIDAS Bridge project and the European Self Sovereign Identity Framework.
Privacy in today’s connected world is an illusion. All of our transactional data, both online and real-world can be mined. If someone truly wanted access to your information, they could have it with relatively little effort. As a result, privacy has begun to be regarded as a luxury item. What are the risks associated with your behavior? Why are data breaches so prevalent? What can you do to protect yourself? In this presentation, I share subject matter expertise derived from data security research and project-specific cybersecurity trend analysis. I share some practices I’ve developed in an effort to be better educated personally and make more informed choices about my own behavior.
The Present and Future of Blockchain and AI by Dinis GuardaDinis Guarda
The Present and Future of Blockchain and AI
How Public and Private Sectors can holistically benefit from embracing blockchain AI tech.
DNA OF OUR TIME = TECH - DATA + BLOCKCHAIN + AI
by Dinis Guarda
Introduction to Self-Sovereign IdentityKaryl Fowler
Juan Caballero from Spherity and Karyl Fowler from Transmute co-presented the Introduction to Self-Sovereign Identity (SSI) session at the 30th Internet Identity Workshop (IIW) in April 2020, demonstrating to newcomers the difference between the values associated with the "SSI movement" and "collection of technologies" that power applications that embody some of said values.
Supporting the global efforts in strengthening the safety, security and resilience of Cyberspace, the Commonwealth Cybersecurity Forum 2013, organised by the Commonwealth Telecommunications Organisation. The ceremonial opening examined how Cyberspace could be governed and utilised in a manner to foster freedom and entrepreneurship, while protecting individuals, property and the state, leading to socio-economic development. Speakers of this session, Mr Mario Maniewicz, Chief, Department of Infrastructure, Enabling Environment and E-Applications, ITU; Mr David Pollington, Director, International Security Relations, Microsoft; Mr Alexander Seger, Secretary, Cybercrime Convention Committee, Council of Europe; Mr Nigel Hickson, Vice President, Europe, ICANN and Mr Pierre Dandjinou, Vice President, Africa, ICANN, added their perspectives on various approaches to Cybergovernance, with general agreement on the role Cyberspace could play to facilitate development equitably and fairly across the world.
Hosted by the Ministry of Posts and Telecommunications of Cameroon together with the Telecommunications Regulatory Board of Cameroon and backed by partners and industry supporters including ICANN, Council of Europe, Microsoft, MTN Cameroon, AFRINIC and Internet Watch Foundation, the Commonwealth Cybersecurity Forum 2013 seeks to broaden stakeholder dialogue to facilitate practical action in Cybergovernance and Cybersecurity, some of which will be reflected in the CTO’s own work programmes under its Cybersecurity agenda.
I gave this version of my Design for Privacy presentation to the NY Experience Group of Publicis Sapient on Monday, 4 October 2021. It includes examples of privacy and security issues, our role in designing for privacy as design professionals, as well as best practices for privacy to keep in mind.
The future of digital identity 2019 future agendaFuture Agenda
How we prove that we are who or what we say we are during digital transactions and interactions is set to become one of the defining features of the next stage of the human digital transformation. Today, we are living with early attempts to solve the problem that are no longer fit for purpose. At best, the multitude of different ways we login, confirm our identities, and establish trust in claims made during digital exchanges, has become profoundly inconvenient. At worst, they have left us in a connected world which is neither safe nor secure, and in which we seem to have completely lost control of our most personal information. The next generation solutions to the digital identity challenge could change all of this.
In the short term, new solutions are likely to move us towards the promise of a single Digital ID that allows us to simply, safely and securely navigate a connected world.
Looking further forward, the changes could be even more profound. The ways that we digitally manage, share and verify our personal information could well come to completely redefine the human digital experience. Current digital business models that seem immutable could collapse. Centres of digital power might shift radically. And the current personal data ‘land grab’ could be replaced by a new digital norm in which individuals can finally make meaningful claims to data ownership and control.
However, there are a number of potentially calamitous pitfalls to navigate along the way. Some of these could lead to whole new kinds of digital dystopia.
At the end of 2018, Future Agenda undertook a major project exploring the Future of Digital Identity. With the generous support of Mastercard, the Future Agenda team ran a series of expert workshops in different locations around the world that explored the key factors that are likely to shape the future of digital identity. The programme began with an initial perspective as a provocation. Participants in the workshops then gave us new, more fully formed, insights which were in turn explored further during one-to-one interviews with major stakeholders and thinkers in the space.
As always, we consider our reports to be the start point for further conversations, and would welcome further input. If you would like to join the conversation, you can join our LinkedIn Group here. If you have any further questions or would like to have a conversation about how your organisation can best make use of our
Cartesian assesses the current state of identity management, and outlines the opportunity for trusted service providers such as MNOs, financial institutions and governments to act as “digital identity authorities”.
UK Government identity initiatives since the late 1990s - IDnext 2015Jerry Fishenden
My presentation from IDnext 2015, the European Digital Identity Event. "UK government identity initiatives past, present, future: policy and technology perspectives"
Future of digital identity Programme summary - 15 dec 2018 lrFuture Agenda
Over the past few months we have run a series of expert workshops exploring the future of digital identity. Supported by Mastercard five events took place in London, Singapore, Sydney, San Francisco and Brussels building a collaborative expert view.
The project online and initial perspective is here https://www.futureagenda.org/news/the-future-of-digital-identity
The full report will be published in the New Year
Keynote presentation slides from Ubisecure's IAMwithUBI Nordic IAM event May 2018. Digital Identity in the style of an age-old wedding rhyme, how digital identity in 2018 can be explained through something old (Facebook), something new (GDPR, AI, Blockchain Identity), something borrowed (Consent Receipts), something blue (Ubisecure!).
ZKorum: Building the Next Generation eAgora powered by SSISSIMeetup
The immense potential unlocked by SSI in content-centric social networks (forums) is largely unaddressed by the recent wave of decentralized social networks. Enter ZKorum - a network of verifiable communities where members create anonymous polls and discussions. In this episode, Nicolas Gimenez, the Co-Founder and CTO of ZKorum, unveils the Alpha version and delves into its architecture, drawing inspiration from SSI, DWeb, and Password Managers.
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...SSIMeetup
Lovesh Harchandani from Dock presents their approach to anonymous credentials and dives in on the various predicates that can be proven in zero knowledge. In over 90 minutes of discussion, we cover what these cryptographic techniques are, how they enable several important use cases for digital identity credentials, and we stretch James Monaghan's ability to keep up as interviewer by taking a look at the source code which makes it all possible! We show how various zero knowledge primitives we've built can be used in a modular fashion to solve real-world use cases. We cover privacy-preserving signature schemes, zero knowledge attribute equalities, range proofs, and verifiable encryption based on ZK-SNARKs, expressing arbitrary predicates as Circom programs and creating ZK proofs for them and blinded credentials (issuer is unaware of all attributes). For anyone interested in the technical underpinnings of this new frontier of digital identity, this episode is a must!
Value proposition of SSI tech providers - Self-Sovereign IdentitySSIMeetup
Talk with Vladimir Vujovic, Senior Digital Innovation Manager from SICPA about product definition and value proposition of Issuer/Holder/Verifier software of SSI tech providers. Why is it hard to convey the right message to the audience coming from outside of SSI domain. How different SSI tech providers define their offering and the language they use to convey the message. What is really the value proposition of SSI tech providers who are offering their Issuer/Verifier software to the market. How big regulation initiatives like the one in Europe for eIDAS v2 are driving the market and roadmaps for SSI tech providers and how will such initiative will have impact to the rest of the world in terms of regulation, but some of the underlying technical standards. What is the place of SSI platforms in the broader Identity landscape and when are we going to see more maturity from the market.
SSI Adoption: What will it take? Riley HughesSSIMeetup
Adoption: its the elephant in the room. SSI has so much potential, but the benefits are only realised once adoption happens at scale. In this webinar, Riley Hughes, CEO and Co-Founder of Trinsic, shares his 3 concrete recommendations for building products which are successful according to the most important metric - getting adopted!
Daniel Buchner is here to save the web. Not the web as we know it, full of closed platforms and intermediaries where both free choice and free speech are curtailed, but the web as it was intended to be: a thriving, open ecosystem of apps and protocols which put individuals at the center. To do this, he and the TBD team at Block are building what they call “Web5” which combines decentralized identifiers, verifiable credentials and personal datastores to create a platform for building truly self-sovereign apps on the web. In this webinar, we go beyond the controversial name to learn what the project is, why it is important, and what we can expect from the upcoming release this summer.
Portabl - The state of open banking, regulations, and the intersection of SSI...SSIMeetup
Complying with Know Your Customer and Anti Money Laundering regulations is hugely complicated and expensive for financial institutions, and burdensome for their customers. Nate Soffio, Co-Founder and CEO of Portabl, believes that the solution lies in secure, interoperable data - enabled by verifiable credentials. In this webinar, he explains why it is such a thorny problem, how open banking needs to evolve to more of a “tap to prove” model as organizations increasingly need continuous identity assurance, and why despite describing the task as “playing SSI on ‘hard mode’”, he believes building a “compound startup” is the best way to get the job done.
PharmaLedger: A Digital Trust Ecosystem for HealthcareSSIMeetup
Daniel Fritz, Executive Director of the PharmaLedger Association and Marco Cuomo, Director of Tech Products & Innovation at Novartis, will present their SSI journey from the initial ideas, through realization of several Proof of Concepts with DIDs and VCs, to the PharmaLedger initiative. PharmaLedger was a 29 member, 3-year, €22 million project under the EU and EFPIA Innovative Medicine Initiative pursued DIDs with external partners such as the global standards organization GS1 and the Global Legal Identifier Foundation (GLEIF). The project also resulted in the creation of the PharmaLedger Association in 2022, a non-profit Swiss association mandated to launch the first open-source product, electronic Product Information (eLeaflet). The webinar will review some of the use cases and dive a little into the technical architecture adopted in the project.
Cheqd: Making privacy-preserving digital credentials funSSIMeetup
Everyone is excited about SSI but there still aren’t any use cases that form part of people’s daily lives, so the team at Cheqd set out to change that. In this session, Ankur Banerjee walks through the research that led them to settle on social reputation in Web3 ecosystems as a use case that would be fun and drive daily usage. Find out more on creds.xyz.
Polygon ID offers tools that allow developers to build self-sovereign, decentralized and private identity solutions for users that leverage zero knowledge proofs. Polygon ID was released as open source last March 2023 at ETH Denver. In this presentation, Otto Mora, BD Lead for Americas, and Oleksander Brezhniev, Technical Lead at Polygon ID, will be covering aspects of the did:PolygonID method including: Verifiable presentations leveraging ZK Proofs; How the Proofs are generated; Credential Issuance Methods; and Identity Management Features.
Building SSI Products: A Guide for Product ManagersSSIMeetup
Self-sovereign identity, decentralised identity, web5… collectively “ID Tech” has become a much more mainstream topic in recent years, and we are seeing an increasing number of products being built using these new technologies. However, with all the hand-wringing about adoption that we hear in the industry, it can sometimes feel like a hammer looking for nails. Which specific and tangible benefits can ID Tech bring to its users, and what special considerations should a product manager have in mind when working in this space? James Monaghan has been a product leader for two decades and has worked on ID Tech projects in financial services, travel, healthcare, education and more. In this talk he will share his views on how to tell whether a customer problem might call for an ID Tech solution, and how to approach some of the product decisions which arise when applying these tools.
Identity-centric interoperability with the Ceramic ProtocolSSIMeetup
https://ssimeetup.org/identity-centric-interoperability-ceramic-protocol-joel-thorstensson-webinar-57/
Ceramic is a new permissionless protocol for creating and accessing unstoppable documents that serve as the foundation for a connected, interoperable web without silos. Joel Thorstensson is the founder and CTO of 3Box and the primary author of the ceramic protocol as well as several Ethereum standards for identity and will provide a conceptual and technical intro to Ceramic.
At the root of many of the internet’s problems is that apps and services today are built primarily in silos. This includes identity registries and credentials, user data and access permissions, infrastructure, and services. It not only puts control over data and identities in the wrong hands, but it’s a fundamentally outdated and inefficient model for building digital products.
Ceramic unlocks information interoperability between all platforms and services across the web, allowing participants to create and resolve documents for any type of information without any centralized service. Ceramic uses DIDs (Decentralized Identifiers), IPLD (InterPlanetary Linked Data), signed messages, and blockchain anchoring to create a trusted and shared graph of verifiable documents. While flexible, these documents are especially well-suited for self-sovereign identity systems, user-centric data ecosystems, and open web services.
Learn about the Trust Over IP (ToIP) stackSSIMeetup
https://ssimeetup.org/trust-over-ip-toip-stack-webinar-54/
At SSI Meetup you’ve been hearing about the Trust over IP (ToIP) stack (originally called the “SSI stack”) since last September 2019. In this webinar, three pioneers of this new architecture for Internet-scaled digital trust infrastructure will share exciting news about where ToIP is going. We can’t reveal the details yet—it is under embargo until next Tuesday—but let’s just say you don’t want to miss it.
How to avoid another identity nightmare with SSI? Christopher AllenSSIMeetup
https://ssimeetup.org/how-avoid-another-identity-tragedy-with-ssi-christopher-allen-webinar-53/
Join the Dutch Self-Sovereign Identity community in a #Foremembrance for those who died by attempting to bomb the civil archives captured by the Nazis & those defending the vulnerable today. Christopher Allen will share with us the importance of this event for the self-sovereign identity community to build the future of identity on sunset Amsterdam time March 27th. We will also analyze the impact and risk of COVID-19 for privacy and identity systems.
March 27th is a Friday this year. Sunset in Amsterdam is at 19:06 CET, 2:06 pm EDT, 11:06 am PDT & is 1:06 am March 28 in Taipei & Hong Kong.
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSSIMeetup
https://ssimeetup.org/self-sovereign-identity-why-we-here-christopher-allen-webinar-51/
Internet cryptography and Self-sovereign identity (SSI) pioneer Christopher Allen talks about essential insights and reflections around historical, technological and ethical aspects of Self-Sovereign Identity at the 51st SSIMeetup.org webinar in collaboration with Rebooting the Web of Trust (RWOT) and Alianza Blockchain Iberoamérica as part of the events that took place at RWOT in Buenos Aires (Argentina).
Christopher is an entrepreneur and technologist who specializes in collaboration, security, and trust. As a pioneer in internet cryptography, he’s initiated cross-industry collaborations and co-created industry standards that influence the entire internet. Christopher’s focus on internet trust began as the founder of Consensus Development where he co-authored the IETF TLS internet-draft that is now at the heart of all secure commerce on the World Wide Web. Christopher is co-chair of the W3C Credentials CG working on standards for decentralized identity. Christopher has also been a digital civil liberties and human-rights privacy advisor, was part of the team that led the first UN summit on Digital Identity & Human Rights, and was the producer of a half-dozen iPhone and iPad games, and of Infinite PDF, a non-linear media app.
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemsSSIMeetup
https://ssimeetup.org/eidas-regulation-anchoring-trust-self-sovereign-identity-systems-ignacio-alamillo-webinar-49/
Ignacio Alamillo is a lawyer, PhD in eIDAS Regulation, CISA, CISM, and EU Commission legal expert for EBSI eSSIF and the EBSI eIDAS Bridge initiatives. Ignacio will introduce SSI solutions, using the Alastria ID reference model as an illustrative example, taking into account the need for trust management frameworks, and trust anchors. Secondly, he will introduce the eIDAS Regulation, currently the major electronic identification regulation in the European Union, supporting a pan-European identity federation system, and the legal framework for the so-called trust services.
The EU has developed some key proposals arising from the legal assessment of the EBSI ESSIF use case, oriented to extend the eIDAS Regulation to SSI solutions used with public sector bodies relationships and procedures. This results were publicly presented in the 2nd ESSIF Stakeholders Meeting that took place in Brussels mid-January 2020.
The objective of the ESSIF legal assessment is to evaluate the potential legal issues that are horizontal to an SSI solution, including:
DIDs: What is the legal nature and ownership of DIDs (asset vs a special kind of pseudonym), how should be DIDs managed in case of minors and incapable persons, if DID may be subject to seizure, when DIDs may be deactivated, what is the legal regime of keys and wallets, etc.
VCs: What are the duties and responsibilities of VCs issuers, holders and verifiers. How to model the contractual/non-contractual relations between issuers & verifiers, and set up liability models. We should pay special attention to the legal aspects of the VC lifecycle (issuance, suspension and revocation causes, etc).
Alignment of the SSI solution with the eIDAS Regulation: aligning VCs with eIDAS eID rules, but also linking VCs to eSeals or eSignatures.
Trust framework: legal input regarding LoAs, governance aspects, conformity, etc.
The use cases include:
Using eIDAS identification means (and qualified certificates?) to issue verifiable credentials.
Using qualified certificates to support verifiable claims (EBSI eIDAS bridge) and legal evidences with full legal value.
Using SSI VCs as an eIDAS identification means.
Using blockchain plus SSI as an electronic registered delivery service.
All content represent just the opinion of Ignacio Alamillo, and do not represent any official position from the EU Commission nor any of its officers
Explaining SSI to C-suite executives, and anyone else for that matterSSIMeetup
https://ssimeetup.org/explaining-ssi-c-suite-executives-anyone-else-john-phillips-webinar-48/
John Phillips from 460degrees in Australia has been exploring with his team for more than two years for a way to describe Self-Sovereign Identity (SSI) that was easy to understand. We think he has found a good method to make SSI easy to understand for any C-suite executive and business people that goes beyond the technology.
John published a video in late 2019 that we found deeply insightful and we have invited him to share this with the SSI Meetup audience. This demo has been going down amazingly well with audiences from c-suite technology execs to design students.
This approach quite literally animates the discussion. People add other objects into the mix, move things around, ask relevant, insightful, questions.
John will share the learnings he is gaining from University research, as well as the results of work in supporting capstone projects for higher education students, and how this has led us to a storytelling model to explain SSI.
The Hyperledger Indy Public Blockchain NodeSSIMeetup
https://ssimeetup.org/hyperledger-indy-public-blockchain-node-alexander-shcherbakov-webinar-43/
Alexander Shcherbakov is a software engineer at DSR working on the team at Evernym. He has a Ph.D. in Mathematics and is one of the maintainers of Hyperledger Indy and Hyperledger Plenum. In this presentation, he will explain the value of a decentralized ledger in an SSI ecosystem and examine Hyperledger Indy, which is the distributed ledger that has been powering the Sovrin Network for more than two years.
Our identities have to be trusted to be useful. When we meet strangers, we decide how much we trust them by what they tell us, and whether a trusted third party will vouch for them. In traditional identity systems, the trusted third party knows everything about everyone in the ecosystem. In Self-Sovereign Identity systems, we rely on a decentralized ledger to privately validate that the identity claims do in fact come from a trusted issuer.
Indy’s blockchain implementation is Plenum, which is a general purpose, public-permissioned, BFT distributed ledger. The presentation takes a technical look at the architecture, cryptography, transactions, data structures, and storage of the ledger including auditability, request processing, catch-up procedure, and support for custom plugins and custom transactions.
Internet Identity Workshop #29 highlights with Drummond ReedSSIMeetup
https://ssimeetup.org/highlights-internet-identity-workshop-29-drummond-reed-autumn-2019-webinar-38/
SSI Meetup veteran Drummond Reed, Chief Trust Officer at Evernym and Trustee at the Sovrin Foundation, will cover the highlights of the latest edition of the longest-running conference in the Internet identity space—Internet Identity Workshop. Drummond has attended all 29 IIWs, and he will share his major takeaways from this gathering of the movers and shakers in SSI from around the world in the autumn of 2019.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Identity and Privacy: Past, Present, and Digital - Brenda K. Leong
1. Identity and Privacy –
Past, Present, and Digital
Brenda K. Leong, Senior Counsel & Director of Strategy
Future of Privacy Forum
https://creativecommons.org/licenses/by-sa/4.0/
2. 1. Empower global SSI communities
2. Open to everyone interested in SSI
3. All content is shared with CC BY SA
SSIMeetup.org
Alex Preukschat @SSIMeetup @AlexPreukschat
Coordinating Node SSIMeetup.org
https://creativecommons.org/licenses/by-sa/4.0/
SSIMeetup objectives
3. Who is FPF?
The Members
130+
Companies
25+
Leading Academics
10+
Advocates
The Mission
Bridging the policymaker-industry-academic gap in privacy policy
Developing privacy protections, ethical norms, and workable business practices
The Workstreams
Ethics
De-identification
Smart Cities
IoT/Connected Toys
Connected Cars
Student Data
Health
Location & Ad Tech
Artificial Intelligence
Biometrics
https://creativecommons.org/licenses/by-sa/4.0/
4. “When a place gets crowded enough to
require ID's, social collapse is not far away. It is
time to go elsewhere. The best thing about
space travel is that it made it possible to go
elsewhere.”
- Robert Heinlein
https://creativecommons.org/licenses/by-sa/4.0/
5. “By 2030, provide legal identity for all,
including birth registration.”
- UN Sustainable Development Goals
https://creativecommons.org/licenses/by-sa/4.0/
6. To Credential or Not to Credential*
•Creation
•Verification
•Authentication
•Authorization
•Federation
* World Bank estimates over 1.1B people who cannot prove their identity
https://creativecommons.org/licenses/by-sa/4.0/
7. Passports Were Once Offensive
• Only Letters of Introduction for elites
• Rendered reputation irrelevant
• Affront to “dignity of the traveler”
• Culture of distrust and documentation
• “The State’s creature”
https://creativecommons.org/licenses/by-sa/4.0/
8. National Identity System
• Unique ID of individual citizens
• Universal medical care
• Combat ID theft
• Census for allocation of services
• Suppression
• Political repression
• Individual troublemakers
• Ethnic groups
https://creativecommons.org/licenses/by-sa/4.0/
9. Cultural Values
•Community v. individual autonomy
•High-income Countries
•Identify terrorist and NS threats
•Target people for minor infractions
•Low-income Countries
•Government efficiencies
•Deliver goods and services
https://creativecommons.org/licenses/by-sa/4.0/
10. In the U.S. - REAL ID
Concerns:
• State v. Federal
• Individual freedom
• Anonymity
• Data requirements
• Sharing across states
https://creativecommons.org/licenses/by-sa/4.0/
11. Current Reality
• Photo ID required now; frequently 2 forms
• Separate IDs for library, credit, travel
• Many becoming digital – passwords…
• National IDs already in many countries
• Argentina, Belgium, Germany, Italy, Peru, Spain
• ID number , used for many purposes
• Extensive personal data
https://creativecommons.org/licenses/by-sa/4.0/
12. Digital ID Challenges
• Accuracy
• Security
• Government Abuse
• Privacy
https://creativecommons.org/licenses/by-sa/4.0/
13. Digital Opportunities
• New channels for human interaction
• Personal data is transportable
• Real-time value of information
• Financial inclusion/unbanked
• Est. 63% of population worldwide owns a mobile phone
https://creativecommons.org/licenses/by-sa/4.0/
15. Biometric Systems
• Type – fingerprint, facial recognition
• Comparisons – passwords; tokens
• Accuracy – edge cases
• Cost – implementation; long term
• Security – spoofing; risk valuations
https://creativecommons.org/licenses/by-sa/4.0/
16. Privacy Protections
•Regulatory
• Data protection laws
• Independent oversight
• Appeals and recourse
•Technical safeguards
• Distributed or decentralized data
• On-device standards
•Market competition
• Competitive opportunities
https://creativecommons.org/licenses/by-sa/4.0/
17. EU ID Cards
EDPS Opinion 7/2018 – Proposal to Strengthen security of ID cards
• ID cards and residence documents
• Proposal includes facial image & fingerprints
• Biometric data are sensitive data
• Mandatory fingerprinting – “strict necessity”
• GDPR impact
• Safeguards against national databases
• Delete immediately; no image on chip
• Anti-fraud doesn’t justify 2 biometrics
• Concerns for children
https://creativecommons.org/licenses/by-sa/4.0/
18. We Can’t Go to Space (yet), So…
•Awareness
•Public-private
engagement
•Diverse voices included
•Oversight
•Human Rights
https://creativecommons.org/licenses/by-sa/4.0/
19. Identity and Privacy –
Past, Present, and Digital
Brenda K. Leong, Senior Counsel & Director of Strategy
Future of Privacy Forum
https://creativecommons.org/licenses/by-sa/4.0/