https://ssimeetup.org/interpersonal-data-identity-relationships-pursuit-collective-minds-philip-sheldrake-webinar-24/
Philip Sheldrake is a technologist, Chartered Engineer, architect of the Web Science Trust endorsed hi:project, consultant, and a Web Science researcher at Southampton University. He works with the AKASHA Foundation, nurturing projects to help individuals unlock their potential through open systems that expand our collective minds at local, regional and global scales, with a keen eye on the development of regenerative planetary systems.
Grappling with identity will never be easy — those who consider it “solvable” represent a danger to society. The identity community is entangled in code (the technologically possible), law (the legally available), and norms (the socially acceptable). There is no separation of these societal concerns. No reductionism. Life is complex and will remain so.
As Margaret Wheatley and Myron Kellner-Rogers note (A Simpler Way, 1996), life’s natural tendency is to organize into greater levels of complexity to support more diversity and greater sustainability. Pertinently, life organizes around a self. Organizing is a living system that always creates identity, and networks, patterns, and structures emerge without external imposition or direction.
Wheatley homes in on three conditions of self-organizing:
1. Identity — the sense-making capacity of the organization
2. Information — the medium of the organization
3. Relationships — the pathways of organization.
This webinar will explore these reciprocally defining domains, the dangers of rigid identity, and the vision for interpersonal data as a substance from which identities may sustain appropriate complexity.
SSI Meetup – interpersonal data, identity and collective mindsPhilip Sheldrake
Grappling with identity will never be easy — those who consider it “solvable” represent a danger to society. The identity community is entangled in code (the technologically possible), law (the legally available), and norms (the socially acceptable). There is no separation of these societal concerns. No reductionism. Life is complex and will remain so.
And yet such understanding provides, I think, the perfect foundation to create something wonderful together.
Presentation to the UK Information Commissioner's Data Protection Officer conference, March 2010.
The outlook for online privacy in social, technological and policy terms...
we present some examples of socially-responsible projects developed in Mexico, while exploring the concept of 'collective intelligence' for the promotion of a socially-aware conscience in different contexts and environments.
Remember not so long ago when breaches created shocking headlines? Today, they’re so frequent that we’re becoming de-sensitized when we hear that household-name companies are robbed of customer data. While the news feels less shocking, the problem is actually getting worse. The bad guys are not only getting more sophisticated, they’re becoming better financed — so protecting corporate data has never been more crucial. In this session, hear how companies must improve how their data moves in an information-centric security environment, and how it’s no longer about the CIO aligning business and technology, but aligning business, technology and security.
SSI Meetup – interpersonal data, identity and collective mindsPhilip Sheldrake
Grappling with identity will never be easy — those who consider it “solvable” represent a danger to society. The identity community is entangled in code (the technologically possible), law (the legally available), and norms (the socially acceptable). There is no separation of these societal concerns. No reductionism. Life is complex and will remain so.
And yet such understanding provides, I think, the perfect foundation to create something wonderful together.
Presentation to the UK Information Commissioner's Data Protection Officer conference, March 2010.
The outlook for online privacy in social, technological and policy terms...
we present some examples of socially-responsible projects developed in Mexico, while exploring the concept of 'collective intelligence' for the promotion of a socially-aware conscience in different contexts and environments.
Remember not so long ago when breaches created shocking headlines? Today, they’re so frequent that we’re becoming de-sensitized when we hear that household-name companies are robbed of customer data. While the news feels less shocking, the problem is actually getting worse. The bad guys are not only getting more sophisticated, they’re becoming better financed — so protecting corporate data has never been more crucial. In this session, hear how companies must improve how their data moves in an information-centric security environment, and how it’s no longer about the CIO aligning business and technology, but aligning business, technology and security.
Social Networks and Well-Being in Democracy in the Age of Digital CapitalismAJHSSR Journal
ABSTRACT : The objective of this work is, on the one hand, to study the new competitive forms that
correspond to the development of the different markets linked to electronic platforms and social networks on the
Internet. On the other hand, to develop a proposal for social welfare for the positive and negative impacts
produced by the development of these markets. In the first part, the main social and economic changes inherent
to political and social evolution are addressed. The main logical trends of the market are presented about
production and modalities of information appropriation, in particular the new forms of information asymmetries
in the electronic market.
KEYWORDS: Imperfections information; Network Economy; Social Welfare; Democracy, Digital Capitalism.
No Yin Without Yang: Community Needs Civic Intelligence to be CompleteDouglas Schuler
This was presented at the Community Now conference at the Jewish Museum in Berlin in February 2015. http://community-infrastructuring.org/wp-content/uploads/Community_Now_Program.pdf
Predicting the social culture of our future – The Neurobiology of social networking
What is expected of tomorrow’s social networks to address the needs of a more and more complex society? Where is Facebook falling short? What can Neurobiology tell us about the wellbeing of our digital culture?
In an entertaining and inspiring talk, the speakers will use an Australian model of Neurobiology to answer these questions.
The story begins where we will explore the different personas present in our minds. We find out that different platforms such as Tinder, Facebook and Snapchat are just manifestations of these personas and our deepest longings. Then, we will enter the secret side of our brains and explore what Whisper and Lord of the Rings have in common. The speakers will then reveal the six intelligence centers of the human brain in order to classify today’s social networks and predict what is needed to build more sustainable digital platforms. In an inspiring crescendo, the speakers will make bold predictions impacting our social culture as well as our digital future.
Entrepreneurs, listen up! The speakers will predict what social platforms need to emerge to satisfy the social cognitive needs of the human brain. Using the insights of focus groups with digital natives and drawing from a wealth of research and Neurobiology, the speakers will explore the underlying motives of a digital society. This will include an outlook on Google Glass as well as an exploration into the depth of our psychological being.
Notions of Human Superiority and Inferiority The Construction o.docxvannagoforth
Notions of Human Superiority and Inferiority: The Construction of Race
Week 2: HD 361
Personal Story
Personal stories can be the starting link that creates social action. Did you know that “personal stories make up 65% of our conversations?” By using a personal story, people tend to feel connected to you and the experience that you had. This can help to give motivation and direction towards making change.
Collective Research
Collective research allows collaboration of information, resources, studies, etc., by a group of people who have a common goal and objective. The integration of resources and information allows for more data to be obtained and thus allowing for the implementation of social action.
References
Widrich, L. (2012). The science of storytelling: What listening to a story does to our brains. Retrieved from https://blog.bufferapp.com/science-of- storytelling-why-telling-a-story-is-the-most-powerful-way-to-activate- our-brains
...
Privacy Transparency Secrecy - The PRactice April 2017 issueThe PRactice
We often talk about privacy but don’t seem to really understand it in all its complexity. We are concerned about giving up our right to it but are unclear about what it is exactly that worries us. Going Luddite is not really an option but we would still like to understand how technology is intruding into spaces that were previously off limits.
The raising amount data exhaust of the past years has created the need for more and better tools to analyze what lies within this massive amount of raw material. Visualization leveraging the human cognition proves to be an invaluable tool to explore, digest, analyze and communicate the information. We reveal patterns, trends, relations or dependencies that were buried before.
But, what happens after we have created such an elaborate and powerful visualization and released it to the world? How does the it affect the beholder? How does it help shaping his opinions or even changing his behavior? Because, at the end of the day, visualization is simply a means to an end — a tool to achieve a bigger goal.
Module 1 - CaseInformation Networking as Technology Tools, Uses, .docxbunnyfinney
Module 1 - Case
Information Networking as Technology: Tools, Uses, and Socio-Technical Interactions
Assignment Overview
Information overload! The phrase alone is enough to strike terror into the hardiest of managers; it presages the breakdown of society as we know it and the failure of management to cope with change. The media constantly dissect the forthcoming collapse brought on by TMI ("too much information"), even as they themselves pile up larger and larger dossiers on the subject, and we are frequently informed that it is our own damn fault that we are drowning in data, since we simply can't discriminate between the important stuff and everything else. Hence, the info-tsunami warning signs posted all along what we once so naively called the "information superhighway.”
Of course, this is arrant nonsense—human beings have been suffering from information overload in varying forms since about the time we hit the ground and found ourselves simultaneously running after the antelope and away from the lion. There's no question that the human mind has a limited capacity to process information, but after several million years we've gotten pretty good at figuring out how to handle a lot. The two basic tricks turn out to be distinguishing between short-term and long-term information storage, and "chunking"—putting things in a limited number of baskets. This isn't primarily a course in the psychology of memory—it's about information tools and systems—but in fact the same things that make our information tools and systems work are the same things that have kept us near the antelopes and away from the lions (mostly) for the last million years or so. So we're beginning this course by thinking about information tools, what makes them like and unlike other kinds of tools, how the concept of a socio-technical system (in which social and behavioral functions shape results as much as does the technology itself) helps make sense of what we're facing, and why the technology just might win after all.
Let's start with a little historical review. Amy Blair has recently done a very intriguing summary of just why information overload isn't something that we, or still less our kids, dreamed up—people have been drowning in data for ages regardless of the tools at their disposal:
Blair, A. (2010) Information Overload, Then and Now. The Chronicle of Higher Education Review. November 28. Retrieved November 15, 2010 from
http://chronicle.com/article/Information-Overload-Then-and/125479/?sid=cr&utm_source=cr&utm_medium=en
We thought we had it all nailed down when the information theorists came up with their typology distinguishing between "data" (raw stuff), "information" (cooked stuff), and "knowledge" (cooked stuff that we've eaten). This rather elegant approach did have the virtue of emphasizing that information processing is a human task, even though we might delegate part of it to machinery, and that the tests of that task are the results for humans. It helps retur.
What is civic intelligence? Why is it so important? Why is it threatened and what can we do about it. Some focus on Trumpism in the United States but civic intelligence is needed everywhere.
ZKorum: Building the Next Generation eAgora powered by SSISSIMeetup
The immense potential unlocked by SSI in content-centric social networks (forums) is largely unaddressed by the recent wave of decentralized social networks. Enter ZKorum - a network of verifiable communities where members create anonymous polls and discussions. In this episode, Nicolas Gimenez, the Co-Founder and CTO of ZKorum, unveils the Alpha version and delves into its architecture, drawing inspiration from SSI, DWeb, and Password Managers.
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...SSIMeetup
Lovesh Harchandani from Dock presents their approach to anonymous credentials and dives in on the various predicates that can be proven in zero knowledge. In over 90 minutes of discussion, we cover what these cryptographic techniques are, how they enable several important use cases for digital identity credentials, and we stretch James Monaghan's ability to keep up as interviewer by taking a look at the source code which makes it all possible! We show how various zero knowledge primitives we've built can be used in a modular fashion to solve real-world use cases. We cover privacy-preserving signature schemes, zero knowledge attribute equalities, range proofs, and verifiable encryption based on ZK-SNARKs, expressing arbitrary predicates as Circom programs and creating ZK proofs for them and blinded credentials (issuer is unaware of all attributes). For anyone interested in the technical underpinnings of this new frontier of digital identity, this episode is a must!
More Related Content
Similar to Interpersonal data, identity, and relationships – in pursuit of collective minds – Philip Sheldrake
Social Networks and Well-Being in Democracy in the Age of Digital CapitalismAJHSSR Journal
ABSTRACT : The objective of this work is, on the one hand, to study the new competitive forms that
correspond to the development of the different markets linked to electronic platforms and social networks on the
Internet. On the other hand, to develop a proposal for social welfare for the positive and negative impacts
produced by the development of these markets. In the first part, the main social and economic changes inherent
to political and social evolution are addressed. The main logical trends of the market are presented about
production and modalities of information appropriation, in particular the new forms of information asymmetries
in the electronic market.
KEYWORDS: Imperfections information; Network Economy; Social Welfare; Democracy, Digital Capitalism.
No Yin Without Yang: Community Needs Civic Intelligence to be CompleteDouglas Schuler
This was presented at the Community Now conference at the Jewish Museum in Berlin in February 2015. http://community-infrastructuring.org/wp-content/uploads/Community_Now_Program.pdf
Predicting the social culture of our future – The Neurobiology of social networking
What is expected of tomorrow’s social networks to address the needs of a more and more complex society? Where is Facebook falling short? What can Neurobiology tell us about the wellbeing of our digital culture?
In an entertaining and inspiring talk, the speakers will use an Australian model of Neurobiology to answer these questions.
The story begins where we will explore the different personas present in our minds. We find out that different platforms such as Tinder, Facebook and Snapchat are just manifestations of these personas and our deepest longings. Then, we will enter the secret side of our brains and explore what Whisper and Lord of the Rings have in common. The speakers will then reveal the six intelligence centers of the human brain in order to classify today’s social networks and predict what is needed to build more sustainable digital platforms. In an inspiring crescendo, the speakers will make bold predictions impacting our social culture as well as our digital future.
Entrepreneurs, listen up! The speakers will predict what social platforms need to emerge to satisfy the social cognitive needs of the human brain. Using the insights of focus groups with digital natives and drawing from a wealth of research and Neurobiology, the speakers will explore the underlying motives of a digital society. This will include an outlook on Google Glass as well as an exploration into the depth of our psychological being.
Notions of Human Superiority and Inferiority The Construction o.docxvannagoforth
Notions of Human Superiority and Inferiority: The Construction of Race
Week 2: HD 361
Personal Story
Personal stories can be the starting link that creates social action. Did you know that “personal stories make up 65% of our conversations?” By using a personal story, people tend to feel connected to you and the experience that you had. This can help to give motivation and direction towards making change.
Collective Research
Collective research allows collaboration of information, resources, studies, etc., by a group of people who have a common goal and objective. The integration of resources and information allows for more data to be obtained and thus allowing for the implementation of social action.
References
Widrich, L. (2012). The science of storytelling: What listening to a story does to our brains. Retrieved from https://blog.bufferapp.com/science-of- storytelling-why-telling-a-story-is-the-most-powerful-way-to-activate- our-brains
...
Privacy Transparency Secrecy - The PRactice April 2017 issueThe PRactice
We often talk about privacy but don’t seem to really understand it in all its complexity. We are concerned about giving up our right to it but are unclear about what it is exactly that worries us. Going Luddite is not really an option but we would still like to understand how technology is intruding into spaces that were previously off limits.
The raising amount data exhaust of the past years has created the need for more and better tools to analyze what lies within this massive amount of raw material. Visualization leveraging the human cognition proves to be an invaluable tool to explore, digest, analyze and communicate the information. We reveal patterns, trends, relations or dependencies that were buried before.
But, what happens after we have created such an elaborate and powerful visualization and released it to the world? How does the it affect the beholder? How does it help shaping his opinions or even changing his behavior? Because, at the end of the day, visualization is simply a means to an end — a tool to achieve a bigger goal.
Module 1 - CaseInformation Networking as Technology Tools, Uses, .docxbunnyfinney
Module 1 - Case
Information Networking as Technology: Tools, Uses, and Socio-Technical Interactions
Assignment Overview
Information overload! The phrase alone is enough to strike terror into the hardiest of managers; it presages the breakdown of society as we know it and the failure of management to cope with change. The media constantly dissect the forthcoming collapse brought on by TMI ("too much information"), even as they themselves pile up larger and larger dossiers on the subject, and we are frequently informed that it is our own damn fault that we are drowning in data, since we simply can't discriminate between the important stuff and everything else. Hence, the info-tsunami warning signs posted all along what we once so naively called the "information superhighway.”
Of course, this is arrant nonsense—human beings have been suffering from information overload in varying forms since about the time we hit the ground and found ourselves simultaneously running after the antelope and away from the lion. There's no question that the human mind has a limited capacity to process information, but after several million years we've gotten pretty good at figuring out how to handle a lot. The two basic tricks turn out to be distinguishing between short-term and long-term information storage, and "chunking"—putting things in a limited number of baskets. This isn't primarily a course in the psychology of memory—it's about information tools and systems—but in fact the same things that make our information tools and systems work are the same things that have kept us near the antelopes and away from the lions (mostly) for the last million years or so. So we're beginning this course by thinking about information tools, what makes them like and unlike other kinds of tools, how the concept of a socio-technical system (in which social and behavioral functions shape results as much as does the technology itself) helps make sense of what we're facing, and why the technology just might win after all.
Let's start with a little historical review. Amy Blair has recently done a very intriguing summary of just why information overload isn't something that we, or still less our kids, dreamed up—people have been drowning in data for ages regardless of the tools at their disposal:
Blair, A. (2010) Information Overload, Then and Now. The Chronicle of Higher Education Review. November 28. Retrieved November 15, 2010 from
http://chronicle.com/article/Information-Overload-Then-and/125479/?sid=cr&utm_source=cr&utm_medium=en
We thought we had it all nailed down when the information theorists came up with their typology distinguishing between "data" (raw stuff), "information" (cooked stuff), and "knowledge" (cooked stuff that we've eaten). This rather elegant approach did have the virtue of emphasizing that information processing is a human task, even though we might delegate part of it to machinery, and that the tests of that task are the results for humans. It helps retur.
What is civic intelligence? Why is it so important? Why is it threatened and what can we do about it. Some focus on Trumpism in the United States but civic intelligence is needed everywhere.
Similar to Interpersonal data, identity, and relationships – in pursuit of collective minds – Philip Sheldrake (20)
ZKorum: Building the Next Generation eAgora powered by SSISSIMeetup
The immense potential unlocked by SSI in content-centric social networks (forums) is largely unaddressed by the recent wave of decentralized social networks. Enter ZKorum - a network of verifiable communities where members create anonymous polls and discussions. In this episode, Nicolas Gimenez, the Co-Founder and CTO of ZKorum, unveils the Alpha version and delves into its architecture, drawing inspiration from SSI, DWeb, and Password Managers.
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...SSIMeetup
Lovesh Harchandani from Dock presents their approach to anonymous credentials and dives in on the various predicates that can be proven in zero knowledge. In over 90 minutes of discussion, we cover what these cryptographic techniques are, how they enable several important use cases for digital identity credentials, and we stretch James Monaghan's ability to keep up as interviewer by taking a look at the source code which makes it all possible! We show how various zero knowledge primitives we've built can be used in a modular fashion to solve real-world use cases. We cover privacy-preserving signature schemes, zero knowledge attribute equalities, range proofs, and verifiable encryption based on ZK-SNARKs, expressing arbitrary predicates as Circom programs and creating ZK proofs for them and blinded credentials (issuer is unaware of all attributes). For anyone interested in the technical underpinnings of this new frontier of digital identity, this episode is a must!
Value proposition of SSI tech providers - Self-Sovereign IdentitySSIMeetup
Talk with Vladimir Vujovic, Senior Digital Innovation Manager from SICPA about product definition and value proposition of Issuer/Holder/Verifier software of SSI tech providers. Why is it hard to convey the right message to the audience coming from outside of SSI domain. How different SSI tech providers define their offering and the language they use to convey the message. What is really the value proposition of SSI tech providers who are offering their Issuer/Verifier software to the market. How big regulation initiatives like the one in Europe for eIDAS v2 are driving the market and roadmaps for SSI tech providers and how will such initiative will have impact to the rest of the world in terms of regulation, but some of the underlying technical standards. What is the place of SSI platforms in the broader Identity landscape and when are we going to see more maturity from the market.
SSI Adoption: What will it take? Riley HughesSSIMeetup
Adoption: its the elephant in the room. SSI has so much potential, but the benefits are only realised once adoption happens at scale. In this webinar, Riley Hughes, CEO and Co-Founder of Trinsic, shares his 3 concrete recommendations for building products which are successful according to the most important metric - getting adopted!
Daniel Buchner is here to save the web. Not the web as we know it, full of closed platforms and intermediaries where both free choice and free speech are curtailed, but the web as it was intended to be: a thriving, open ecosystem of apps and protocols which put individuals at the center. To do this, he and the TBD team at Block are building what they call “Web5” which combines decentralized identifiers, verifiable credentials and personal datastores to create a platform for building truly self-sovereign apps on the web. In this webinar, we go beyond the controversial name to learn what the project is, why it is important, and what we can expect from the upcoming release this summer.
Portabl - The state of open banking, regulations, and the intersection of SSI...SSIMeetup
Complying with Know Your Customer and Anti Money Laundering regulations is hugely complicated and expensive for financial institutions, and burdensome for their customers. Nate Soffio, Co-Founder and CEO of Portabl, believes that the solution lies in secure, interoperable data - enabled by verifiable credentials. In this webinar, he explains why it is such a thorny problem, how open banking needs to evolve to more of a “tap to prove” model as organizations increasingly need continuous identity assurance, and why despite describing the task as “playing SSI on ‘hard mode’”, he believes building a “compound startup” is the best way to get the job done.
PharmaLedger: A Digital Trust Ecosystem for HealthcareSSIMeetup
Daniel Fritz, Executive Director of the PharmaLedger Association and Marco Cuomo, Director of Tech Products & Innovation at Novartis, will present their SSI journey from the initial ideas, through realization of several Proof of Concepts with DIDs and VCs, to the PharmaLedger initiative. PharmaLedger was a 29 member, 3-year, €22 million project under the EU and EFPIA Innovative Medicine Initiative pursued DIDs with external partners such as the global standards organization GS1 and the Global Legal Identifier Foundation (GLEIF). The project also resulted in the creation of the PharmaLedger Association in 2022, a non-profit Swiss association mandated to launch the first open-source product, electronic Product Information (eLeaflet). The webinar will review some of the use cases and dive a little into the technical architecture adopted in the project.
Cheqd: Making privacy-preserving digital credentials funSSIMeetup
Everyone is excited about SSI but there still aren’t any use cases that form part of people’s daily lives, so the team at Cheqd set out to change that. In this session, Ankur Banerjee walks through the research that led them to settle on social reputation in Web3 ecosystems as a use case that would be fun and drive daily usage. Find out more on creds.xyz.
Polygon ID offers tools that allow developers to build self-sovereign, decentralized and private identity solutions for users that leverage zero knowledge proofs. Polygon ID was released as open source last March 2023 at ETH Denver. In this presentation, Otto Mora, BD Lead for Americas, and Oleksander Brezhniev, Technical Lead at Polygon ID, will be covering aspects of the did:PolygonID method including: Verifiable presentations leveraging ZK Proofs; How the Proofs are generated; Credential Issuance Methods; and Identity Management Features.
Building SSI Products: A Guide for Product ManagersSSIMeetup
Self-sovereign identity, decentralised identity, web5… collectively “ID Tech” has become a much more mainstream topic in recent years, and we are seeing an increasing number of products being built using these new technologies. However, with all the hand-wringing about adoption that we hear in the industry, it can sometimes feel like a hammer looking for nails. Which specific and tangible benefits can ID Tech bring to its users, and what special considerations should a product manager have in mind when working in this space? James Monaghan has been a product leader for two decades and has worked on ID Tech projects in financial services, travel, healthcare, education and more. In this talk he will share his views on how to tell whether a customer problem might call for an ID Tech solution, and how to approach some of the product decisions which arise when applying these tools.
Solving compliance for crypto businesses using Decentralized Identity – Pelle...SSIMeetup
https://ssimeetup.org/solving-compliance-crypto-businesses-using-decentralized-identity-pelle-braendgaard-webinar-60/
A new global framework for regulating the crypto industry is coming into place this year. One of the most important new rules that businesses interacting with crypto has to implement is what is known as the Travel Rule. The Travel Rule, which is also known as The Wire Transfer rule, requires a business managing crypto on behalf of their user to transfer KYC’d (Know-Your-Customer) Identity Information to a receiving institution. Pelle Braendgaard, CEO of Notabene, will share his insights and explain how his company is tackling this business challenge for the industry.
Complying with this rule provides many challenges for the industry. Several industry groups have already started to invent several new protocols to solve this. Notabene helps financial companies be compliant with new, global anti-money laundering (AML) regulations for crypto transactions coming into effect right now. Pelle believes this is a critical use case for SSI (Self-Sovereign Identity). In this talk, he will go over the rule itself, industry protocols, how he sees SSI can help here, and how they are helping to solve it.
The Pan-Canadian Trust Framework (PCTF) for SSISSIMeetup
https://ssimeetup.org/pan-canadian-trust-framework-pctf-ssi-tim-bouma-webinar-59/
We are very proud to release a special webinar to introduce the next chapter of the “Self-Sovereign Identity Book” from two of the most eminent authorities on digital identity in government: Tim Bouma and Dave Roberts, senior public servants with the Government of Canada and major contributors to the Pan-Canadian Trust Framework (PCTF).
In this chapter, Tim and Dave explain the PCTF model and how it maps to the SSI model and the Trust over IP (ToIP) stack.
This webinar describes how a world leader in digital identity (which Canada has been for two decades) sees the opportunity in the new decentralized identity model represented by SSI (Self-Sovereign Identity).
Identity-centric interoperability with the Ceramic ProtocolSSIMeetup
https://ssimeetup.org/identity-centric-interoperability-ceramic-protocol-joel-thorstensson-webinar-57/
Ceramic is a new permissionless protocol for creating and accessing unstoppable documents that serve as the foundation for a connected, interoperable web without silos. Joel Thorstensson is the founder and CTO of 3Box and the primary author of the ceramic protocol as well as several Ethereum standards for identity and will provide a conceptual and technical intro to Ceramic.
At the root of many of the internet’s problems is that apps and services today are built primarily in silos. This includes identity registries and credentials, user data and access permissions, infrastructure, and services. It not only puts control over data and identities in the wrong hands, but it’s a fundamentally outdated and inefficient model for building digital products.
Ceramic unlocks information interoperability between all platforms and services across the web, allowing participants to create and resolve documents for any type of information without any centralized service. Ceramic uses DIDs (Decentralized Identifiers), IPLD (InterPlanetary Linked Data), signed messages, and blockchain anchoring to create a trusted and shared graph of verifiable documents. While flexible, these documents are especially well-suited for self-sovereign identity systems, user-centric data ecosystems, and open web services.
https://ssimeetup.org/ssi-ecosystem-south-korea-jaehoon-shim-webinar-56/
Jaehoon Shim, a blockchain researcher at LG CNS and the founder of SSIMeetup Korea, will introduce the Self-Sovereign Identity (SSI) ecosystem of South Korea. South Korea became a hotbed of Self Sovereign Identity in the last couple of years. The number of government-funded projects, including the mobile credential for government officials, requires using DIDs (Decentralized Identifiers). Also, hundreds of enterprises joined public/private consortia on decentralized identity to empower the digital transformation of the South Korean society. Jaehoon will explain in detail the current ecosystem and discuss opportunities for the future.
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloSSIMeetup
https://ssimeetup.org/introducing-ssi-eidas-legal-report-ignacio-alamillo-webinar-55/
The European Commission developed the SSI (Self-Sovereign Identity) eIDAS bridge, an ISA2 funded initiative, to promote eIDAS as a trust framework for the SSI ecosystem. It assists a VC (Verifiable Credential) issuer in the signing process, and helps the verifier to automate the identification of the organization behind the issuer’s DID (Decentralized Identifier). Simply by “crossing” the eIDAS Bridge, a Verifiable Credential can be proven trustworthy in the EU. Ignacio Alamillo will present at this SSI Meetup webinar the insights gained from this report.
In the context of the eIDAS bridge project, we performed an analysis on how eIDAS can legally support digital identity and trustworthy DLT-based transactions in the Digital Single Market, and this is reflected in the SSI eIDAS legal report, available at this link. The objective of this report is to evaluate the potential legal issues that are important to an SSI solution and make some recommendations to be used as policy input for the eIDAS 2020 review. The report outlines short-term objectives, where changes in the Regulation would not be necessary, but also mid to long-term scenarios requiring major changes in the Regulation to comply with the SSI design principles.
The different scenarios described in the report are aligned with the proposed architectural and procedural considerations designed in the SSI eIDAS Bridge project and the European Self Sovereign Identity Framework.
Learn about the Trust Over IP (ToIP) stackSSIMeetup
https://ssimeetup.org/trust-over-ip-toip-stack-webinar-54/
At SSI Meetup you’ve been hearing about the Trust over IP (ToIP) stack (originally called the “SSI stack”) since last September 2019. In this webinar, three pioneers of this new architecture for Internet-scaled digital trust infrastructure will share exciting news about where ToIP is going. We can’t reveal the details yet—it is under embargo until next Tuesday—but let’s just say you don’t want to miss it.
How to avoid another identity nightmare with SSI? Christopher AllenSSIMeetup
https://ssimeetup.org/how-avoid-another-identity-tragedy-with-ssi-christopher-allen-webinar-53/
Join the Dutch Self-Sovereign Identity community in a #Foremembrance for those who died by attempting to bomb the civil archives captured by the Nazis & those defending the vulnerable today. Christopher Allen will share with us the importance of this event for the self-sovereign identity community to build the future of identity on sunset Amsterdam time March 27th. We will also analyze the impact and risk of COVID-19 for privacy and identity systems.
March 27th is a Friday this year. Sunset in Amsterdam is at 19:06 CET, 2:06 pm EDT, 11:06 am PDT & is 1:06 am March 28 in Taipei & Hong Kong.
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSSIMeetup
https://ssimeetup.org/self-sovereign-identity-why-we-here-christopher-allen-webinar-51/
Internet cryptography and Self-sovereign identity (SSI) pioneer Christopher Allen talks about essential insights and reflections around historical, technological and ethical aspects of Self-Sovereign Identity at the 51st SSIMeetup.org webinar in collaboration with Rebooting the Web of Trust (RWOT) and Alianza Blockchain Iberoamérica as part of the events that took place at RWOT in Buenos Aires (Argentina).
Christopher is an entrepreneur and technologist who specializes in collaboration, security, and trust. As a pioneer in internet cryptography, he’s initiated cross-industry collaborations and co-created industry standards that influence the entire internet. Christopher’s focus on internet trust began as the founder of Consensus Development where he co-authored the IETF TLS internet-draft that is now at the heart of all secure commerce on the World Wide Web. Christopher is co-chair of the W3C Credentials CG working on standards for decentralized identity. Christopher has also been a digital civil liberties and human-rights privacy advisor, was part of the team that led the first UN summit on Digital Identity & Human Rights, and was the producer of a half-dozen iPhone and iPad games, and of Infinite PDF, a non-linear media app.
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemsSSIMeetup
https://ssimeetup.org/eidas-regulation-anchoring-trust-self-sovereign-identity-systems-ignacio-alamillo-webinar-49/
Ignacio Alamillo is a lawyer, PhD in eIDAS Regulation, CISA, CISM, and EU Commission legal expert for EBSI eSSIF and the EBSI eIDAS Bridge initiatives. Ignacio will introduce SSI solutions, using the Alastria ID reference model as an illustrative example, taking into account the need for trust management frameworks, and trust anchors. Secondly, he will introduce the eIDAS Regulation, currently the major electronic identification regulation in the European Union, supporting a pan-European identity federation system, and the legal framework for the so-called trust services.
The EU has developed some key proposals arising from the legal assessment of the EBSI ESSIF use case, oriented to extend the eIDAS Regulation to SSI solutions used with public sector bodies relationships and procedures. This results were publicly presented in the 2nd ESSIF Stakeholders Meeting that took place in Brussels mid-January 2020.
The objective of the ESSIF legal assessment is to evaluate the potential legal issues that are horizontal to an SSI solution, including:
DIDs: What is the legal nature and ownership of DIDs (asset vs a special kind of pseudonym), how should be DIDs managed in case of minors and incapable persons, if DID may be subject to seizure, when DIDs may be deactivated, what is the legal regime of keys and wallets, etc.
VCs: What are the duties and responsibilities of VCs issuers, holders and verifiers. How to model the contractual/non-contractual relations between issuers & verifiers, and set up liability models. We should pay special attention to the legal aspects of the VC lifecycle (issuance, suspension and revocation causes, etc).
Alignment of the SSI solution with the eIDAS Regulation: aligning VCs with eIDAS eID rules, but also linking VCs to eSeals or eSignatures.
Trust framework: legal input regarding LoAs, governance aspects, conformity, etc.
The use cases include:
Using eIDAS identification means (and qualified certificates?) to issue verifiable credentials.
Using qualified certificates to support verifiable claims (EBSI eIDAS bridge) and legal evidences with full legal value.
Using SSI VCs as an eIDAS identification means.
Using blockchain plus SSI as an electronic registered delivery service.
All content represent just the opinion of Ignacio Alamillo, and do not represent any official position from the EU Commission nor any of its officers
Explaining SSI to C-suite executives, and anyone else for that matterSSIMeetup
https://ssimeetup.org/explaining-ssi-c-suite-executives-anyone-else-john-phillips-webinar-48/
John Phillips from 460degrees in Australia has been exploring with his team for more than two years for a way to describe Self-Sovereign Identity (SSI) that was easy to understand. We think he has found a good method to make SSI easy to understand for any C-suite executive and business people that goes beyond the technology.
John published a video in late 2019 that we found deeply insightful and we have invited him to share this with the SSI Meetup audience. This demo has been going down amazingly well with audiences from c-suite technology execs to design students.
This approach quite literally animates the discussion. People add other objects into the mix, move things around, ask relevant, insightful, questions.
John will share the learnings he is gaining from University research, as well as the results of work in supporting capstone projects for higher education students, and how this has led us to a storytelling model to explain SSI.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
ER(Entity Relationship) Diagram for online shopping - TAEHimani415946
https://bit.ly/3KACoyV
The ER diagram for the project is the foundation for the building of the database of the project. The properties, datatypes, and attributes are defined by the ER diagram.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
Interpersonal data, identity, and relationships – in pursuit of collective minds – Philip Sheldrake
1. Interpersonal data,
identity, and
relationships
— in pursuit of collective minds
Philip Sheldrake
engineer, web science
philipsheldrake.com
@sheldrake
AKASHA Foundation
AKASHA.org
1ssimeetup.org · 1 April 2019 · CC BY-SA 4.0 International (see image credits)
2. 1. Empower global SSI communities
2. Open to everyone interested in SSI
3. All content is shared with CC BY SA
SSIMeetup.org
Alex Preukschat @SSIMeetup @AlexPreukschat
Coordinating Node SSIMeetup.org
https://creativecommons.org/licenses/by-sa/4.0/
SSIMeetup objectives
3. Coming up …
The AKASHA Foundation
Co-operative + self-organizing
(Inter)personal data
Identity
Beware
Collective minds
3
4. AKASHA
A non-profit foundation born at the
intersection of blockchain and collective
intelligence.
We nurture projects helping individuals
unlock their potential through open
systems that expand our collective
minds at local, regional and global
scales.
See AKASHA.org.
4
6. 6
Life did not take over the globe by
combat, but by networking.
Lynn Margulis, biologist
7. The ultimate information technology
challenge is the care and maintenance
of a digital infrastructure that can help
us rise up to so-called super wicked
problems, collectively.
Sustainability requires healthy,
distributed networks, with both diversity
and individual agency, to facilitate the
emergence of collective intelligence.
7
Sheldrake, Global Peter Drucker Forum
8. Life organizes around identity.
Every living thing acts to develop
and preserve itself. Identity is the
filter that every organism or system
uses to make sense of the world.
New information, new
relationships, changing
environments — all are interpreted
through a sense of self.
8
9. The 6 circle model
9
Traditionally, organizing / system
change has been attempted with a
focus “above the green line”.
Research has shown however that
change can only be initiated and
sustained when equal attention is
paid above and below the line.
See Leadership and the New Science, Margaret J. Wheatley.
INFORMATION
(flowing → knowledge)
RELATIONSHIP
(interdepending)
IDENTITY
(narrative)
STRUCTURE
(forms)
PATTERN
(strategies)
PROCESS
(operations)
HUMAN
EXPERIENCE
10. 1
0
The 3 conditions
INFORMATION
(flowing → knowledge)
RELATIONSHIP
(interdepending)
IDENTITY
(narrative) THE SENSE-MAKING CAPACITY
OF THE ORGANIZING
Of the selves that organize and
the “self” that gets organized.
Defined in terms of history,
present decisions and activities,
and sense for the future.
THE MEDIUM OF THE
ORGANIZING
Life uses information to organize
itself, i.e. when a system assigns
meaning to data.THE PATHWAYS OF
ORGANIZING
Required for the creation and
transformation of information,
the expansion of the
organizational identity, and
accumulation of wisdom.
11. 11
The 3 conditions — reciprocally defining
INFORMATION
(flowing → knowledge)
RELATIONSHIP
(interdepending)
IDENTITY
(narrative)
Identities assemble from who we
know (relationships) and what
we do (personally and socially
material information).
Information is contextual to
individuals in relationships.
Relationships are formed with
information exchange between
identifying individuals in
identifying organizings.
12. I am not a thing — a noun.
I seem to be a verb, an
evolutionary process – an
integral function of the universe.
Buckminster Fuller
12
“
”
13. 13
It is necessary to begin with the event
as a basic concept, and later to arrive at
the object as a continuing structure of
related and ordered events.
David Bohm
“
”
16. 16
“
”
There might well be a market for
personal data, just like there is,
tragically, a market for live human
organs, but that does not mean that
we can or should give that market
the blessing of legislation. One
cannot monetise and subject a
fundamental right to a simple
commercial transaction, even if it is
the individual concerned by the data
who is a party to the transaction.
The European Data Protection Supervisor, 2017
17. 17
my data data about me
over which I have agency,
through which I have agency,
with which we become.
19. Personal data
Any information relating to an identified
or identifiable natural person – one who
can be identified, directly or indirectly,
by reference to a name, an identification
number, location data, or other
identifier, or to factors specific to the
physical, physiological, genetic, mental,
economic, cultural or social identity of
that person.
General Data Protection Regulation
19
20. 20
And yet we’re social animals.
Unsurprisingly, the vast
majority of personal data is in
fact interpersonal data.
Alice, Coffee
Store Street Espresso, Store
Street
Monday, 1 Apr 2019
from 17:30 to 18:00
Bob, Coffee
Store Street Espresso, Store
Street
Monday, 1 Apr 2019
from 17:30 to 18:00
21. 21
PERSONAL DATA INTERPERSONAL DATA
legal natural
data subjects humans +
node-centric edge-centric
control agency
tree-like rhizomatic
facsimile cache
privacy privacy + collective intelligence
26. 26
NOUN-LIKE RIGIDITY
BASED ON ESSENTIAL PROPERTIES THAT DON’T CHANGE
VERB-LIKE CONTEXTUAL CORRELATING
RE-IDENTIFYING WITH A CERTAIN PROPERTY — DIACHRONICITY
trait
E.G. FINGERPRINT, IRIS, FACE, DNA
government
BIRTH CERTIFICATE, CITIZEN ID, PASSPORT, ETC.
username + profile
CORROBORATED WITH A PASSWORD E.G. FACEBOOK ID
private key
DIGITAL ‘FINGERPRINT’ BUT HARDER TO COPY AND EASIER TO LOSE
physicality
CONTAINED BY ONE'S SKIN
social
YOU’RE NOBODY UNTIL YOU’RE SOMEBODY TO SOMEONE
behavioural
YOU ARE WHAT YOU DO
transcendental
THE ERASURE OF EMBODIMENT
cartesian
PERSISTENT SENSE OF SELFHOOD; COGITO ERGO SUM; NARRATIVE
CONTROLLING? ENABLING?
30. 30
BEWARE:
INCLUDING IS ALSO EXCLUDING
claudo
From Proto-Italic *klaudō, from
Proto-Indo-European *kleh₂u- (“key, hook, nail”).
Cognate with Ancient Greek κλείς (kleís, “bar, bolt,
key”), Old High German sliozan (“to close, conclude,
lock”).
34. 34
BEWARE:
THE FRICTIONLESS
Friction is an important system property.
Failure to re-engineer appropriate
frictions in our sociotechnical system may
lead to very poor social outcomes.
Likely requires a blend of legal and
technical codes.
36. 36
NOUN-LIKE RIGIDITY
BASED ON ESSENTIAL PROPERTIES THAT CANNOT CHANGE
CONTROLLING?
trait
E.G. FINGERPRINT, IRIS, FACE, DNA
government
BIRTH CERTIFICATE, CITIZEN ID, PASSPORT, ETC.
username + profile
CORROBORATED WITH A PASSWORD E.G. FACEBOOK ID
private key
DIGITAL ‘FINGERPRINT’ BUT HARDER TO COPY AND EASIER TO LOSE
physicality
CONTAINED BY ONE'S SKIN
IF WE GET
THIS WRONG
38. 38
A mind is not a name for a thing, a
substance, but rather a collection
of cognitive processes,
dispositional states,
meaning-making, and behavioural
characteristics. It is not easily
delimited and definitely not in
terms of “what’s in your head”.
AKASHA about us webpage
39. 39
Gregory Bateson has clearly
shown that what he calls the
‘ecology of ideas’ cannot be
contained within the domain of
the psychology of the individual,
but organizes itself into systems
or ‘minds’, the boundaries of
which no longer coincide with
the participant individuals.
Felix Guattari
“
”
40. We’re focused on collective
minds to enhance human
agency in co-operation to help
produce a fairer, more peaceful,
more intelligent, sustainable
and regenerative future.
40
INFORMATION
(flowing → knowledge)
RELATIONSHIP
(interdepending)
IDENTITY
(narrative)
43. Interpersonal data architecture
• The data surrounds us
• Nesting and interpenetrating
• Privacy-preserving and socially meaningful
• Neither individualistic nor collectivized
• Distributed and disintermediating
• ‘Intelligence’ is invited to the data rather than
requiring the data go to the ‘intelligence’
• About mutual value creation not property rights
• Markets don’t transform personal data so much as
interpersonal data transform markets
• Identity will be contextual, local, verb-like, and
digitally co-emergent with interpersonal data
43
44. Decentralized data trust
The Open Data Institute defines a
data trust as “a legal structure that
provides independent stewardship of
data.”
A decentralized data trust entails a
decentralized trust structure governing
for fairness in the social context the
facilities for decentralized, social
sense-making of interpersonal data.
44
45. 45
Thank you.
We chat here:
• https://discordapp.com/invite/JqqKasJ
We blog here:
• https://akasha.org/blog
ssimeetup.org · 1 April 2019 · CC BY-SA 4.0 International (see image credits)
Slides available at:
● https://ssimeetup.org
● https://akasha.org/blog/2019/04/01/ssi
meetup-webinar
46. Image credits
Painted face, by Sharon McCutcheon
Colourful corridor, copyright Shutterstock
Lichen, by Annie Spratt
The Earth, by NASA
Photo of Time Magazine cover of Buckminster Fuller, by Hilary Mason
Sunflower dance, ink drawing on paper, by Jos van Wunnik
Water, by Imleedh Ali
Woman on bus, by Dan Bøțan
Coffee, by Joshua Ness
boypoolrhizome, slide 22, copyright Mark Ingham, reproduced with permission
46
René Descartes, via Picryl
Stream, via Free Nature Stock
Intermingling colours, by Daniel Olah
Car tire, by pngimg
Wavering curves, by David Jorre
One of several wolves, slide 39, copyright Marc Ngui, reproduced with
permission
Coral, by Sagar
Amazon product co-purchasing network, slide 44, copyright Dr. Christophe
Hurter, reproduced with permission