SlideShare a Scribd company logo
Identity: Past Solutions &
Current Blockchain Landscape
SiliconValley Ethereum Meetup: May 7, 2017
Andy Atkin (andrew.atkin@gmail.com)
What is Identity? (Dictionary)
1. The fact of being who or what a person or thing is.
2. A close similarity or affinity
• People
• Organizations (e.g. companies)
• Things (e.g. IoT devices, servers)
Identity: Control & Ownership
(B. Golden, email conversation 3/2017)
•Who “owns” it?
•Who controls it?
•Who has the ability to change it?
Personal Identity
(wikipedia)
• Composed of multiple overlapping attributes many of
which change over time:
• Age
• Race
• Clan/Family
• Ethnicity
• Nationality
• Gender
• Profession etc.
• A philosophical and social construct.
Digital Identity – Related Concepts
(wikipedia)
•Subject & Entity
•Attributes, Preferences &Traits
•Trust, Authentication & Authorization
•IdentityTaxonomies
•Identity Networks
Digital Identity – Some Legal Intersections
Compliance Census/National ID Digital
Notaries
Travel Crime
KYC/AML – US
Financial
Sector
India - Aadhaar Notarize.com Passports –
TSA ”Pre”
Identity
Theft
HIPAA – US
Healthcare
Citizenship Services -
Estonia
DocuSign Immigration &
Visas
Fraud
Right to be
Forgotten - EU
Access to Medical
Care
Blockchain
Solutions – e.g.
Blocknotary
Refugees and
plight of the
undocumented
Illicit
Purchase
Current Electronic Identifier Examples
(all have limits, often combined in 2FA & MFA)
1. Username/Password
2.Biometrics
3. “Hard” tokens
4. PKI – Client Certificates
5.PGPWeb of Trust / Keybase
6.EmailAddress
Current Identity Landscape
225 companies, 13 segments (oneworldidentity.com)
Startup Identity Landscape
187 companies, 7 segments (oneworldidentity.com)
”Traditional” Blockchain Identity
(Excerpt from Sabadello on github)
• Wallet Address is an abstract term for the entirety of addresses owner by a
single user (stackexchange)
• Namecoin is a blockchain that has been conceived from the start to be used
for registering domain names. It is the first fork of the Bitcoin software
• Contract Address (ethereum), the original Eris project was an early attempt
a DAO contract registry written in LLL (DOUG).
• Simple Registries (e.g. namereg on ethereum), e.g. wallet address -> 20 byte
name or email lookup
Hierarchically Deterministic (HD)Wallets
(Mastering Bitcoin/BIP32, 39, 44)
An approach for multiple identities from a common seed
Self-Sovereign Identity (Allan)
1. Existence: Users must have an independent existence.
2. Control: Users must control their identities.
3. Access: Users must have access to their own data.
4. Transparency: Systems and algorithms must be transparent.
5. Persistence: Identities must be long-lived.
6. Portability: The user remains in control of his identity no matter what.
7. Interoperability: IDs are of little value if they work only in little niches.
8. Consent: Users must agree to the use of their identity.
9. Minimization: Disclosure of claims must be minimized.
10.Protection: Freedoms and rights of the individuals over the needs of the
network.
uPort - Overview
(uPort.me)
• Uses mobile devices, the ethereum blockchain and off-chain BLOB store
(e.g. IPFS, AWS, Dropbox)
• Built on self-sovereign identity principles
• Key recovery/revocation possible using a quorum of delegates
• Allows for creation of attestations, credentials and reputation on an
immutable identity
uPort Credentials & Attestations
(uPort whitepaper)
uPort – Current Status
(from uPort.me)
• Incubated by ConsenSys
• Currently in Alpha
• iOS & Android* client currently available (keys stored in secure
enclaves)
• Partnered with Gnosis, others to follow
• Future Enhancements (whitepaper):
1. Multiple identities
2. Swappable enhanced controller with spending limits and other features
3. Recovery delegate list to be hidden from public view
4. End-to-End encryption for messaging server (Chasqui)
5. Better user subsidy logic for onboarding users (Sensui)
• * Just updated slide
What Makes a Good Name Service?
(Johnson)
1. Separation of concerns
• Don’t conflate registration & resolution a la GoDaddy etc.
2. Distributed authority & implementation
• Keep in decentralized to avoid single points of failure
3. Forward-compatibility
• There will be unforeseen applications of a naming service
as there were with DNS
4. Efficient on-chain resolution (must be fast!)
Ethereum Naming Service –Version 0.1
(ENS Documentation, EIP 137, 162)
• Performs a similar functional as DNS but implementation
details differ significantly
• Resolve human readable names for ethereum addresses,
Swarm & IPFS content hashes as well as metadata (e.g.
whois, contract ABIs)
• Composed of:
1. Registry
2. Resolvers
3. Registrars
Components of ENS
(Johnson)
Registrar/Owners of a Domain Registry Resolver
• Set the resolver andTTL for
domain
• Records owner of the domain • Translates names into addresses
• Transfer ownership of domain to
another address
• Records resolver of the domain • Supports an optional number of
different record types
• Change ownership of subdomains • RecordsTTL for all records under
domain
Registering a Name
(ENS Documentation, EIP 162)
1. .eth Registrar is FIFS (first in first served)
2. Interim “McDonalds” solution until permanent
registry is finalized
3. Restricted to .ethTLD with subdomains being a
minimum of 7 characters in length
4. Uses aVickrey auction: Sealed bid, 2nd price
5. Initial deeds last for 1 year
ENS – Current Status
1. Supported by
• Metamask supports sending funds to ENS names.
• Mist is working on ENS support
• LEth is working on ENS support
• Status is working on ENS support
2. No firm date for permanent registry (?)
3. Not directly affiliated with ConsenSys
Questions/Comments?
• Feel free to get in touch with me:
 andrew.atkin@gmail.com
• SpecialThanks to:
 Grant Fondo (speaker and host @ Goodwin Law)
 Bernard Golden (speaker & topic idea)
 Christian Peel (SV Meetup organzizer)
 Daniel Buchner (speaker)
 SteveWaldman (moderator)
References
1. Antonopoulos, A. (2014). Mastering Bitcoin Unlocking Digital Cryptocurrencies. Chapter 4. San Francisco, CA:
O’Reilly Media.
2. Allan, C. (2015, April 25). The Path to Self-Sovereign Identity [Web log post]. Retrieved May 7, 2017, from
http://www.lifewithalacrity.com/2016/04/the-path-to-self-soverereign-identity.html.
3. D’Ambrosi, C. (2017, January). The Identity Industry Landscape: 225+ Companies . Retrieved May 7, 2017 from from
https://oneworldidentity.com/identity-industry-landscape/.
4. Digital Identity. (2017, May). Retrieved May 7, 2017 from https://en.wikipedia.org/wiki/Digital_identity.
5. Johnson, Nick. (Presented at DEVCON2, September 19-21, 2016). ENS: Ethereum Naming Service. Retrieved May
7, 2017, from https://arachnid.github.io/devcon2/#/title
6. Lundkvist, Heck,Torstensson et al. (DraftVersion February 21, 2017). uPort: A Platform for Self-Sovereign Identity.
Retrieved May 7, 2017, from https://whitepaper.uport.me/uPort_whitepaper_DRAFT20170221.pdf.
7. Personal Identity. (2017, May). Retrieved May 7, 2017 from https://en.wikipedia.org/wiki/Personal_identity
8. Sabadello, M. (2017, April). Blockchain and Identity. Retrieved May 7, 2017, from
https://github.com/peacekeeper/blockchain-identity.
9. The Identity Startup Landscape: 187 Companies. (2017, February). Retrieved from
https://oneworldidentity.com/identity-startup-landscape.
10. Welcome to ENS’s documentation!. (2017, May). Retrieved May 7, 2017 from http://docs.ens.domains/en/latest/
11. uPort. (2017, May). Retrieved May 7, 2017 from https://www.uport.me/.

More Related Content

What's hot

Blockchain, Self-Sovereign Identity and Credentials
Blockchain, Self-Sovereign Identity and CredentialsBlockchain, Self-Sovereign Identity and Credentials
Blockchain, Self-Sovereign Identity and Credentials
StrategyWorks
 
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSelf-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
SSIMeetup
 
Hyperledger Indy Platform - Privacy, Security and Power for Digital Identity ...
Hyperledger Indy Platform - Privacy, Security and Power for Digital Identity ...Hyperledger Indy Platform - Privacy, Security and Power for Digital Identity ...
Hyperledger Indy Platform - Privacy, Security and Power for Digital Identity ...
Gokul Alex
 
Ecosystem map Prototype & Future Vision
Ecosystem map  Prototype & Future VisionEcosystem map  Prototype & Future Vision
Ecosystem map Prototype & Future Vision
Kaliya "Identity Woman" Young
 
Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs
Vasiliy Suvorov
 
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
Kaliya "Identity Woman" Young
 
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/SovrinFOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
Calvin Cheng
 
Trust, Blockchains, and Self-Soveriegn Identity
Trust, Blockchains, and Self-Soveriegn IdentityTrust, Blockchains, and Self-Soveriegn Identity
Trust, Blockchains, and Self-Soveriegn Identity
Phil Windley
 
The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018
Kaliya "Identity Woman" Young
 
Blockchain 3.0 - Decentral Applications
Blockchain 3.0 - Decentral ApplicationsBlockchain 3.0 - Decentral Applications
Blockchain 3.0 - Decentral Applications
Bart Waeterschoot
 
Verifiable credentials explained by CCI
Verifiable credentials explained by CCIVerifiable credentials explained by CCI
Verifiable credentials explained by CCI
Kaliya "Identity Woman" Young
 
Insight analytics: Identity Nexus - The Future of Consumer Personal Information
Insight analytics: Identity Nexus - The Future of Consumer  Personal InformationInsight analytics: Identity Nexus - The Future of Consumer  Personal Information
Insight analytics: Identity Nexus - The Future of Consumer Personal Information
Kaliya "Identity Woman" Young
 
Legal, Policy & the Blockchain
Legal, Policy & the BlockchainLegal, Policy & the Blockchain
Legal, Policy & the Blockchain
Tudor Stanciu
 
How to avoid another identity nightmare with SSI? Christopher Allen
How to avoid another identity nightmare with SSI? Christopher AllenHow to avoid another identity nightmare with SSI? Christopher Allen
How to avoid another identity nightmare with SSI? Christopher Allen
SSIMeetup
 
Three aspects of personal data processing & GDPR
Three aspects of personal data processing & GDPRThree aspects of personal data processing & GDPR
Three aspects of personal data processing & GDPR
Tudor Stanciu
 
History of Identity in Computers
History of Identity in ComputersHistory of Identity in Computers
History of Identity in Computers
Kaliya "Identity Woman" Young
 
Introduction to Self Sovereign Identity
Introduction to Self Sovereign IdentityIntroduction to Self Sovereign Identity
Introduction to Self Sovereign Identity
Heather Vescent
 
My Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and OpennessMy Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and Openness
Kaliya "Identity Woman" Young
 
Privacy applications on blockchain
Privacy applications on blockchainPrivacy applications on blockchain
Privacy applications on blockchain
Wilson Bright
 
Digital Identity on Blockchain
Digital Identity on BlockchainDigital Identity on Blockchain
Digital Identity on Blockchain
jakubkoci
 

What's hot (20)

Blockchain, Self-Sovereign Identity and Credentials
Blockchain, Self-Sovereign Identity and CredentialsBlockchain, Self-Sovereign Identity and Credentials
Blockchain, Self-Sovereign Identity and Credentials
 
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSelf-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
 
Hyperledger Indy Platform - Privacy, Security and Power for Digital Identity ...
Hyperledger Indy Platform - Privacy, Security and Power for Digital Identity ...Hyperledger Indy Platform - Privacy, Security and Power for Digital Identity ...
Hyperledger Indy Platform - Privacy, Security and Power for Digital Identity ...
 
Ecosystem map Prototype & Future Vision
Ecosystem map  Prototype & Future VisionEcosystem map  Prototype & Future Vision
Ecosystem map Prototype & Future Vision
 
Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs
 
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
 
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/SovrinFOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
 
Trust, Blockchains, and Self-Soveriegn Identity
Trust, Blockchains, and Self-Soveriegn IdentityTrust, Blockchains, and Self-Soveriegn Identity
Trust, Blockchains, and Self-Soveriegn Identity
 
The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018
 
Blockchain 3.0 - Decentral Applications
Blockchain 3.0 - Decentral ApplicationsBlockchain 3.0 - Decentral Applications
Blockchain 3.0 - Decentral Applications
 
Verifiable credentials explained by CCI
Verifiable credentials explained by CCIVerifiable credentials explained by CCI
Verifiable credentials explained by CCI
 
Insight analytics: Identity Nexus - The Future of Consumer Personal Information
Insight analytics: Identity Nexus - The Future of Consumer  Personal InformationInsight analytics: Identity Nexus - The Future of Consumer  Personal Information
Insight analytics: Identity Nexus - The Future of Consumer Personal Information
 
Legal, Policy & the Blockchain
Legal, Policy & the BlockchainLegal, Policy & the Blockchain
Legal, Policy & the Blockchain
 
How to avoid another identity nightmare with SSI? Christopher Allen
How to avoid another identity nightmare with SSI? Christopher AllenHow to avoid another identity nightmare with SSI? Christopher Allen
How to avoid another identity nightmare with SSI? Christopher Allen
 
Three aspects of personal data processing & GDPR
Three aspects of personal data processing & GDPRThree aspects of personal data processing & GDPR
Three aspects of personal data processing & GDPR
 
History of Identity in Computers
History of Identity in ComputersHistory of Identity in Computers
History of Identity in Computers
 
Introduction to Self Sovereign Identity
Introduction to Self Sovereign IdentityIntroduction to Self Sovereign Identity
Introduction to Self Sovereign Identity
 
My Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and OpennessMy Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and Openness
 
Privacy applications on blockchain
Privacy applications on blockchainPrivacy applications on blockchain
Privacy applications on blockchain
 
Digital Identity on Blockchain
Digital Identity on BlockchainDigital Identity on Blockchain
Digital Identity on Blockchain
 

Similar to Identity - Past Solutions & Current Blockchain Landscape

A technical Introduction to Blockchain.
A technical Introduction to Blockchain.A technical Introduction to Blockchain.
A technical Introduction to Blockchain.
Dev
 
Hacking blockchain
Hacking blockchainHacking blockchain
Hacking blockchain
Jose L. Quiñones-Borrero
 
Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon
Kaliya "Identity Woman" Young
 
SWXG 2010.6.9 v2
SWXG 2010.6.9 v2SWXG 2010.6.9 v2
SWXG 2010.6.9 v2
Paul Trevithick
 
The Promise of BlockChain
The Promise of BlockChainThe Promise of BlockChain
The Promise of BlockChain
Nevada County Tech Connection
 
Meetup symbotic sept21_en_v1.0_hc
Meetup symbotic sept21_en_v1.0_hcMeetup symbotic sept21_en_v1.0_hc
Meetup symbotic sept21_en_v1.0_hc
Henk van Cann
 
Blockchain meetup
Blockchain meetupBlockchain meetup
Blockchain meetup
QuantUniversity
 
Blockchain and Hook model of engagement
Blockchain and Hook model of engagement Blockchain and Hook model of engagement
Blockchain and Hook model of engagement
Rajeev Soni
 
Building open source identity infrastructures
Building open source identity infrastructuresBuilding open source identity infrastructures
Building open source identity infrastructures
Francesco Chicchiriccò
 
Attacking Decentralized Identity.pdf
Attacking Decentralized Identity.pdfAttacking Decentralized Identity.pdf
Attacking Decentralized Identity.pdf
ssuser264cc11
 
Tony Nadalin' presentation at eComm 2008
Tony Nadalin' presentation at eComm 2008Tony Nadalin' presentation at eComm 2008
Tony Nadalin' presentation at eComm 2008eComm2008
 
Emerging Applications of Blockchain for Supply Chains
Emerging Applications of Blockchain for Supply ChainsEmerging Applications of Blockchain for Supply Chains
Emerging Applications of Blockchain for Supply Chains
MIT Enterprise Forum Cambridge
 
Blockchain Perspective - Internet of Memorable Things
Blockchain Perspective - Internet of Memorable ThingsBlockchain Perspective - Internet of Memorable Things
Blockchain Perspective - Internet of Memorable Things
Tim Lackey
 
The deep skill of blockchain david lee 27_april2017 final
The deep skill of blockchain david lee 27_april2017 finalThe deep skill of blockchain david lee 27_april2017 final
The deep skill of blockchain david lee 27_april2017 final
David Lee Kuo Chuen 李国权
 
Advanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsAdvanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU Investigators
Sloan Carne
 
02_07_2018_«El valor de blockchain en el registro de la actividad académica: ...
02_07_2018_«El valor de blockchain en el registro de la actividad académica: ...02_07_2018_«El valor de blockchain en el registro de la actividad académica: ...
02_07_2018_«El valor de blockchain en el registro de la actividad académica: ...
eMadrid network
 
SAnno: a unifying framework for semantic annotation
SAnno: a unifying framework for semantic annotationSAnno: a unifying framework for semantic annotation
SAnno: a unifying framework for semantic annotation
Davide Eynard
 
Blockchain and Crypto 101 - October 2017
Blockchain and Crypto 101 - October 2017Blockchain and Crypto 101 - October 2017
Blockchain and Crypto 101 - October 2017
🔗Audrey Chaing
 
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign IdentityThe Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
Evernym
 

Similar to Identity - Past Solutions & Current Blockchain Landscape (20)

A technical Introduction to Blockchain.
A technical Introduction to Blockchain.A technical Introduction to Blockchain.
A technical Introduction to Blockchain.
 
Hacking blockchain
Hacking blockchainHacking blockchain
Hacking blockchain
 
Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon
 
SWXG 2010.6.9 v2
SWXG 2010.6.9 v2SWXG 2010.6.9 v2
SWXG 2010.6.9 v2
 
The Promise of BlockChain
The Promise of BlockChainThe Promise of BlockChain
The Promise of BlockChain
 
Meetup symbotic sept21_en_v1.0_hc
Meetup symbotic sept21_en_v1.0_hcMeetup symbotic sept21_en_v1.0_hc
Meetup symbotic sept21_en_v1.0_hc
 
Blockchain meetup
Blockchain meetupBlockchain meetup
Blockchain meetup
 
Blockchain and Hook model of engagement
Blockchain and Hook model of engagement Blockchain and Hook model of engagement
Blockchain and Hook model of engagement
 
Building open source identity infrastructures
Building open source identity infrastructuresBuilding open source identity infrastructures
Building open source identity infrastructures
 
Attacking Decentralized Identity.pdf
Attacking Decentralized Identity.pdfAttacking Decentralized Identity.pdf
Attacking Decentralized Identity.pdf
 
Tony Nadalin' presentation at eComm 2008
Tony Nadalin' presentation at eComm 2008Tony Nadalin' presentation at eComm 2008
Tony Nadalin' presentation at eComm 2008
 
Emerging Applications of Blockchain for Supply Chains
Emerging Applications of Blockchain for Supply ChainsEmerging Applications of Blockchain for Supply Chains
Emerging Applications of Blockchain for Supply Chains
 
Blockchain Perspective - Internet of Memorable Things
Blockchain Perspective - Internet of Memorable ThingsBlockchain Perspective - Internet of Memorable Things
Blockchain Perspective - Internet of Memorable Things
 
The deep skill of blockchain david lee 27_april2017 final
The deep skill of blockchain david lee 27_april2017 finalThe deep skill of blockchain david lee 27_april2017 final
The deep skill of blockchain david lee 27_april2017 final
 
Advanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsAdvanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU Investigators
 
Understanding data -latest
Understanding data  -latestUnderstanding data  -latest
Understanding data -latest
 
02_07_2018_«El valor de blockchain en el registro de la actividad académica: ...
02_07_2018_«El valor de blockchain en el registro de la actividad académica: ...02_07_2018_«El valor de blockchain en el registro de la actividad académica: ...
02_07_2018_«El valor de blockchain en el registro de la actividad académica: ...
 
SAnno: a unifying framework for semantic annotation
SAnno: a unifying framework for semantic annotationSAnno: a unifying framework for semantic annotation
SAnno: a unifying framework for semantic annotation
 
Blockchain and Crypto 101 - October 2017
Blockchain and Crypto 101 - October 2017Blockchain and Crypto 101 - October 2017
Blockchain and Crypto 101 - October 2017
 
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign IdentityThe Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
 

Recently uploaded

Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 

Recently uploaded (20)

Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 

Identity - Past Solutions & Current Blockchain Landscape

  • 1. Identity: Past Solutions & Current Blockchain Landscape SiliconValley Ethereum Meetup: May 7, 2017 Andy Atkin (andrew.atkin@gmail.com)
  • 2. What is Identity? (Dictionary) 1. The fact of being who or what a person or thing is. 2. A close similarity or affinity • People • Organizations (e.g. companies) • Things (e.g. IoT devices, servers)
  • 3. Identity: Control & Ownership (B. Golden, email conversation 3/2017) •Who “owns” it? •Who controls it? •Who has the ability to change it?
  • 4. Personal Identity (wikipedia) • Composed of multiple overlapping attributes many of which change over time: • Age • Race • Clan/Family • Ethnicity • Nationality • Gender • Profession etc. • A philosophical and social construct.
  • 5. Digital Identity – Related Concepts (wikipedia) •Subject & Entity •Attributes, Preferences &Traits •Trust, Authentication & Authorization •IdentityTaxonomies •Identity Networks
  • 6. Digital Identity – Some Legal Intersections Compliance Census/National ID Digital Notaries Travel Crime KYC/AML – US Financial Sector India - Aadhaar Notarize.com Passports – TSA ”Pre” Identity Theft HIPAA – US Healthcare Citizenship Services - Estonia DocuSign Immigration & Visas Fraud Right to be Forgotten - EU Access to Medical Care Blockchain Solutions – e.g. Blocknotary Refugees and plight of the undocumented Illicit Purchase
  • 7. Current Electronic Identifier Examples (all have limits, often combined in 2FA & MFA) 1. Username/Password 2.Biometrics 3. “Hard” tokens 4. PKI – Client Certificates 5.PGPWeb of Trust / Keybase 6.EmailAddress
  • 8. Current Identity Landscape 225 companies, 13 segments (oneworldidentity.com)
  • 9. Startup Identity Landscape 187 companies, 7 segments (oneworldidentity.com)
  • 10. ”Traditional” Blockchain Identity (Excerpt from Sabadello on github) • Wallet Address is an abstract term for the entirety of addresses owner by a single user (stackexchange) • Namecoin is a blockchain that has been conceived from the start to be used for registering domain names. It is the first fork of the Bitcoin software • Contract Address (ethereum), the original Eris project was an early attempt a DAO contract registry written in LLL (DOUG). • Simple Registries (e.g. namereg on ethereum), e.g. wallet address -> 20 byte name or email lookup
  • 11. Hierarchically Deterministic (HD)Wallets (Mastering Bitcoin/BIP32, 39, 44) An approach for multiple identities from a common seed
  • 12. Self-Sovereign Identity (Allan) 1. Existence: Users must have an independent existence. 2. Control: Users must control their identities. 3. Access: Users must have access to their own data. 4. Transparency: Systems and algorithms must be transparent. 5. Persistence: Identities must be long-lived. 6. Portability: The user remains in control of his identity no matter what. 7. Interoperability: IDs are of little value if they work only in little niches. 8. Consent: Users must agree to the use of their identity. 9. Minimization: Disclosure of claims must be minimized. 10.Protection: Freedoms and rights of the individuals over the needs of the network.
  • 13. uPort - Overview (uPort.me) • Uses mobile devices, the ethereum blockchain and off-chain BLOB store (e.g. IPFS, AWS, Dropbox) • Built on self-sovereign identity principles • Key recovery/revocation possible using a quorum of delegates • Allows for creation of attestations, credentials and reputation on an immutable identity
  • 14. uPort Credentials & Attestations (uPort whitepaper)
  • 15. uPort – Current Status (from uPort.me) • Incubated by ConsenSys • Currently in Alpha • iOS & Android* client currently available (keys stored in secure enclaves) • Partnered with Gnosis, others to follow • Future Enhancements (whitepaper): 1. Multiple identities 2. Swappable enhanced controller with spending limits and other features 3. Recovery delegate list to be hidden from public view 4. End-to-End encryption for messaging server (Chasqui) 5. Better user subsidy logic for onboarding users (Sensui) • * Just updated slide
  • 16. What Makes a Good Name Service? (Johnson) 1. Separation of concerns • Don’t conflate registration & resolution a la GoDaddy etc. 2. Distributed authority & implementation • Keep in decentralized to avoid single points of failure 3. Forward-compatibility • There will be unforeseen applications of a naming service as there were with DNS 4. Efficient on-chain resolution (must be fast!)
  • 17. Ethereum Naming Service –Version 0.1 (ENS Documentation, EIP 137, 162) • Performs a similar functional as DNS but implementation details differ significantly • Resolve human readable names for ethereum addresses, Swarm & IPFS content hashes as well as metadata (e.g. whois, contract ABIs) • Composed of: 1. Registry 2. Resolvers 3. Registrars
  • 18. Components of ENS (Johnson) Registrar/Owners of a Domain Registry Resolver • Set the resolver andTTL for domain • Records owner of the domain • Translates names into addresses • Transfer ownership of domain to another address • Records resolver of the domain • Supports an optional number of different record types • Change ownership of subdomains • RecordsTTL for all records under domain
  • 19. Registering a Name (ENS Documentation, EIP 162) 1. .eth Registrar is FIFS (first in first served) 2. Interim “McDonalds” solution until permanent registry is finalized 3. Restricted to .ethTLD with subdomains being a minimum of 7 characters in length 4. Uses aVickrey auction: Sealed bid, 2nd price 5. Initial deeds last for 1 year
  • 20. ENS – Current Status 1. Supported by • Metamask supports sending funds to ENS names. • Mist is working on ENS support • LEth is working on ENS support • Status is working on ENS support 2. No firm date for permanent registry (?) 3. Not directly affiliated with ConsenSys
  • 21. Questions/Comments? • Feel free to get in touch with me:  andrew.atkin@gmail.com • SpecialThanks to:  Grant Fondo (speaker and host @ Goodwin Law)  Bernard Golden (speaker & topic idea)  Christian Peel (SV Meetup organzizer)  Daniel Buchner (speaker)  SteveWaldman (moderator)
  • 22. References 1. Antonopoulos, A. (2014). Mastering Bitcoin Unlocking Digital Cryptocurrencies. Chapter 4. San Francisco, CA: O’Reilly Media. 2. Allan, C. (2015, April 25). The Path to Self-Sovereign Identity [Web log post]. Retrieved May 7, 2017, from http://www.lifewithalacrity.com/2016/04/the-path-to-self-soverereign-identity.html. 3. D’Ambrosi, C. (2017, January). The Identity Industry Landscape: 225+ Companies . Retrieved May 7, 2017 from from https://oneworldidentity.com/identity-industry-landscape/. 4. Digital Identity. (2017, May). Retrieved May 7, 2017 from https://en.wikipedia.org/wiki/Digital_identity. 5. Johnson, Nick. (Presented at DEVCON2, September 19-21, 2016). ENS: Ethereum Naming Service. Retrieved May 7, 2017, from https://arachnid.github.io/devcon2/#/title 6. Lundkvist, Heck,Torstensson et al. (DraftVersion February 21, 2017). uPort: A Platform for Self-Sovereign Identity. Retrieved May 7, 2017, from https://whitepaper.uport.me/uPort_whitepaper_DRAFT20170221.pdf. 7. Personal Identity. (2017, May). Retrieved May 7, 2017 from https://en.wikipedia.org/wiki/Personal_identity 8. Sabadello, M. (2017, April). Blockchain and Identity. Retrieved May 7, 2017, from https://github.com/peacekeeper/blockchain-identity. 9. The Identity Startup Landscape: 187 Companies. (2017, February). Retrieved from https://oneworldidentity.com/identity-startup-landscape. 10. Welcome to ENS’s documentation!. (2017, May). Retrieved May 7, 2017 from http://docs.ens.domains/en/latest/ 11. uPort. (2017, May). Retrieved May 7, 2017 from https://www.uport.me/.

Editor's Notes

  1. Identity is core concept on which so many others are anchored. Buchner: “Anchor identity on the blockchain”.
  2. Fragmented & siloed. Many of these are great technical solutions but UX and portability hinders wide adoption. Low adoption in turn lowers the value of a given solution due to network effects.
  3. Existence: Users must have an independent existence. Any self-sovereign identity is ultimately based on the ineffable "I" that’s at the heart of identity. It can never exist wholly in digital form. This must be the kernel of self that is upheld and supported Control: Users must control their identities. Subject to well-understood and secure algorithms that ensure the continued validity of an identity and its claims, the user is the ultimate authority on their identity. Access: Users must have access to their own data. A user must always be able to easily retrieve all the claims and other data within his identity. There must be no hidden data and no gatekeepers. Transparency: Systems and algorithms must be transparent. The systems used to administer and operate a network of identities must be open, both in how they function and in how they are managed and updated. Persistence: Identities must be long-lived. Preferably, identities should last forever, or at least for as long as the user wishes. Portability: Transportable identities ensure that the user remains in control of his identity no matter what, and can also improve an identity’s persistence over time. Interoperability: Identities should be as widely usable as possible. Identities are of little value if they only work in limited niches. The goal of a 21st-century digital identity system is to make identity information widely available, crossing international boundaries to create global identities, without losing user control. Thanks to persistence and autonomy these widely available identities can then become continually available.Consent: Users must agree to the use of their identity. Minimization: Disclosure of claims must be minimized. When data is disclosed, that disclosure should involve the minimum amount of data necessary to accomplish the task at hand. Protection: When there is a conflict between the needs of the identity network and the rights of individual users, then the network should err on the side of preserving the freedoms and rights of the individuals over the needs of the network.
  4. Controller controls access to the proxy contract and contains recovery contract – you can lose your phone and still recover your immutable ID (great!) Proxy holds the immutable ID and is used to pass ID to the App/Dapp contract(s)
  5. Controller controls access to the proxy contract and contains recovery contract Proxy holds the immutable ID and is used to pass ID to the App/Dapp contract(s)
  6. Controller controls access to the proxy contract and contains recovery contract Proxy holds the immutable ID and is used to pass ID to the App/Dapp contract(s)
  7. Controller controls access to the proxy contract and contains recovery contract Proxy holds the immutable ID and is used to pass ID to the App/Dapp contract(s)
  8. Controller controls access to the proxy contract and contains recovery contract Proxy holds the immutable ID and is used to pass ID to the App/Dapp contract(s)
  9. Controller controls access to the proxy contract and contains recovery contract Proxy holds the immutable ID and is used to pass ID to the App/Dapp contract(s)
  10. Controller controls access to the proxy contract and contains recovery contract Proxy holds the immutable ID and is used to pass ID to the App/Dapp contract(s)
  11. Use the right arrow to click through/animate Nick Johnson’s slides (not obvious). 