https://ssimeetup.org/trust-over-ip-toip-stack-webinar-54/
At SSI Meetup you’ve been hearing about the Trust over IP (ToIP) stack (originally called the “SSI stack”) since last September 2019. In this webinar, three pioneers of this new architecture for Internet-scaled digital trust infrastructure will share exciting news about where ToIP is going. We can’t reveal the details yet—it is under embargo until next Tuesday—but let’s just say you don’t want to miss it.
Solving compliance for crypto businesses using Decentralized Identity – Pelle...SSIMeetup
https://ssimeetup.org/solving-compliance-crypto-businesses-using-decentralized-identity-pelle-braendgaard-webinar-60/
A new global framework for regulating the crypto industry is coming into place this year. One of the most important new rules that businesses interacting with crypto has to implement is what is known as the Travel Rule. The Travel Rule, which is also known as The Wire Transfer rule, requires a business managing crypto on behalf of their user to transfer KYC’d (Know-Your-Customer) Identity Information to a receiving institution. Pelle Braendgaard, CEO of Notabene, will share his insights and explain how his company is tackling this business challenge for the industry.
Complying with this rule provides many challenges for the industry. Several industry groups have already started to invent several new protocols to solve this. Notabene helps financial companies be compliant with new, global anti-money laundering (AML) regulations for crypto transactions coming into effect right now. Pelle believes this is a critical use case for SSI (Self-Sovereign Identity). In this talk, he will go over the rule itself, industry protocols, how he sees SSI can help here, and how they are helping to solve it.
The Pan-Canadian Trust Framework (PCTF) for SSISSIMeetup
https://ssimeetup.org/pan-canadian-trust-framework-pctf-ssi-tim-bouma-webinar-59/
We are very proud to release a special webinar to introduce the next chapter of the “Self-Sovereign Identity Book” from two of the most eminent authorities on digital identity in government: Tim Bouma and Dave Roberts, senior public servants with the Government of Canada and major contributors to the Pan-Canadian Trust Framework (PCTF).
In this chapter, Tim and Dave explain the PCTF model and how it maps to the SSI model and the Trust over IP (ToIP) stack.
This webinar describes how a world leader in digital identity (which Canada has been for two decades) sees the opportunity in the new decentralized identity model represented by SSI (Self-Sovereign Identity).
https://ssimeetup.org/ssi-ecosystem-south-korea-jaehoon-shim-webinar-56/
Jaehoon Shim, a blockchain researcher at LG CNS and the founder of SSIMeetup Korea, will introduce the Self-Sovereign Identity (SSI) ecosystem of South Korea. South Korea became a hotbed of Self Sovereign Identity in the last couple of years. The number of government-funded projects, including the mobile credential for government officials, requires using DIDs (Decentralized Identifiers). Also, hundreds of enterprises joined public/private consortia on decentralized identity to empower the digital transformation of the South Korean society. Jaehoon will explain in detail the current ecosystem and discuss opportunities for the future.
Verifiable Credentials 101 for SSI and Decentralized Digital Identity - Tyler...SSIMeetup
http://ssimeetup.org/verifiable-credentials-101-ssi-tyler-ruff-webinar-11/
Tyler Ruff, product manager at Evernym, will be our next guest to walk us through Verifiable Credentials in the context of Self-Sovereign Identity. He will cover how they are created, issued and shared, as well as cover some common technical questions.
The Verifiable Credentials discussed are based off a W3C standard for DIDs (decentralized identifiers) and Verifiable Credentials. The hope is that educating the identity and blockchain community on best practices for creating, issuing, storing and sharing Verifiable Credentials will foster interoperability between identity providers, ultimately making the whole ecosystem more valuable to the end consumer.
The focus of this presentation is how Verifiable Credentials work, and why the different steps and components are necessary.
If we can make Verifiable Credentials truly interoperable across industries, providers and domains, we can take a giant step forward towards a real self-sovereign world where individuals are in control of their digital lives and can benefit from every interaction they have—online and off. It all starts with getting interoperable, Verifiable Credentials under your control.
SSI: The Trillion Dollar Business OpportunitySSIMeetup
https://ssimeetup.org/ssi-trillion-dollar-business-opportunity-webinar-34/
This webinar, based on a panel of the same name held at Seattle Devcon in July 2019, will feature four experts from different areas of the digital identity industry explaining why they believe Self-Sovereign Identity (SSI) is one of the most significant applications of blockchain technology to enable all kind of new business model for the digital economy.
Panelists will include Chris Spanton, Principal Architect—Blockchain at T-Mobile; Vaughan Emery, CEO of Datafi Labs; and Drummond Reed, Chief Trust Officer at Evernym and a Trustee of the Sovrin Foundation.
Blockcerts: The Open Standard for Blockchain CredentialsSSIMeetup
https://ssimeetup.org/blockcerts-open-standard-blockchain-credentials-daniel-paramo-anthony-ronning-webinar-39/
Anthony Ronning, an engineer behind Blockcerts and backend dev at Learning Machine and Daniel Paramo, co-founder of swys and advisor at Xertify, explains how Blockcerts started, deep dive on how Blockcerts work, which institutions are implementing this solution and what companies have made a solution for the adoption of this standard. We will review the current Blockcerts roadmap and their pros and cons. What considerations do we need to take when developing a solution around Blockcerts?
Blockcerts is an open standard for creating, issuing, viewing, and verifying blockchain-based certificates. These digital records are registered on a blockchain, cryptographically signed, tamper-proof, and shareable. The goal is to enable a wave of innovation that gives individuals the capacity to possess and share their own official records.
The initial design was based on prototypes developed at the MIT Media Lab and by Learning Machine. The goal of this community is to create technical resources that other developers can utilize in their own projects. Rather than independently developing custom implementations.
Blockcerts consists of open-source libraries, tools, and mobile apps enabling a decentralized, standards-based, recipient-centric ecosystem, enabling trustless verification through blockchain technologies.
Blockcerts uses and encourages consolidation on open standards. Blockcerts is committed to self-sovereign identity of all participants, and enabling recipient control of their claims through easy-to-use tools such as the certificate wallet (mobile app). Blockcerts is also committed to availability of credentials, without single points of failure.
These open-source repos may be utilized by other research projects and commercial developers. It contains components for creating, issuing, viewing, and verifying certificates across any blockchain.
Internet Identity Workshop #29 highlights with Drummond ReedSSIMeetup
https://ssimeetup.org/highlights-internet-identity-workshop-29-drummond-reed-autumn-2019-webinar-38/
SSI Meetup veteran Drummond Reed, Chief Trust Officer at Evernym and Trustee at the Sovrin Foundation, will cover the highlights of the latest edition of the longest-running conference in the Internet identity space—Internet Identity Workshop. Drummond has attended all 29 IIWs, and he will share his major takeaways from this gathering of the movers and shakers in SSI from around the world in the autumn of 2019.
Decentralized Identifier (DIDs) fundamentals deep diveSSIMeetup
https://ssimeetup.org/decentralized-identifiers-dids-fundamentals-identitybook-info-drummond-reed-markus-sabadello-webinar-46/
Decentralized identifiers (abbreviated as “DIDs”), are the cryptographic counterpart to verifiable credentials (VCs) that together are the “twin pillars” of SSI architecture. In this special IdentityBook.info webinar Markus Sabadello, Founder and CEO of Danube Tech, and Drummond Reed, Chief Trust Officer at Evernym, co-authors of the DID chapter of the “Self-Sovereign Identity:
Decentralized Digital Identity and Verifiable Credentials” book published by Manning will explain all the fundamentals of DIDs. Based on the did chapter of the book, you will learn how DIDs evolved from the work started with VCs, how they are related to URLs and URNs, why a new type of cryptographically-verifiable identifier is needed for SSI, and how DIDs are being standardized at World Wide Web Consortium (W3C). Your guides will be two of the editors of the W3C Decentralized Identifier 1.0 specification: Markus Sabadello and Drummond Reed.
Solving compliance for crypto businesses using Decentralized Identity – Pelle...SSIMeetup
https://ssimeetup.org/solving-compliance-crypto-businesses-using-decentralized-identity-pelle-braendgaard-webinar-60/
A new global framework for regulating the crypto industry is coming into place this year. One of the most important new rules that businesses interacting with crypto has to implement is what is known as the Travel Rule. The Travel Rule, which is also known as The Wire Transfer rule, requires a business managing crypto on behalf of their user to transfer KYC’d (Know-Your-Customer) Identity Information to a receiving institution. Pelle Braendgaard, CEO of Notabene, will share his insights and explain how his company is tackling this business challenge for the industry.
Complying with this rule provides many challenges for the industry. Several industry groups have already started to invent several new protocols to solve this. Notabene helps financial companies be compliant with new, global anti-money laundering (AML) regulations for crypto transactions coming into effect right now. Pelle believes this is a critical use case for SSI (Self-Sovereign Identity). In this talk, he will go over the rule itself, industry protocols, how he sees SSI can help here, and how they are helping to solve it.
The Pan-Canadian Trust Framework (PCTF) for SSISSIMeetup
https://ssimeetup.org/pan-canadian-trust-framework-pctf-ssi-tim-bouma-webinar-59/
We are very proud to release a special webinar to introduce the next chapter of the “Self-Sovereign Identity Book” from two of the most eminent authorities on digital identity in government: Tim Bouma and Dave Roberts, senior public servants with the Government of Canada and major contributors to the Pan-Canadian Trust Framework (PCTF).
In this chapter, Tim and Dave explain the PCTF model and how it maps to the SSI model and the Trust over IP (ToIP) stack.
This webinar describes how a world leader in digital identity (which Canada has been for two decades) sees the opportunity in the new decentralized identity model represented by SSI (Self-Sovereign Identity).
https://ssimeetup.org/ssi-ecosystem-south-korea-jaehoon-shim-webinar-56/
Jaehoon Shim, a blockchain researcher at LG CNS and the founder of SSIMeetup Korea, will introduce the Self-Sovereign Identity (SSI) ecosystem of South Korea. South Korea became a hotbed of Self Sovereign Identity in the last couple of years. The number of government-funded projects, including the mobile credential for government officials, requires using DIDs (Decentralized Identifiers). Also, hundreds of enterprises joined public/private consortia on decentralized identity to empower the digital transformation of the South Korean society. Jaehoon will explain in detail the current ecosystem and discuss opportunities for the future.
Verifiable Credentials 101 for SSI and Decentralized Digital Identity - Tyler...SSIMeetup
http://ssimeetup.org/verifiable-credentials-101-ssi-tyler-ruff-webinar-11/
Tyler Ruff, product manager at Evernym, will be our next guest to walk us through Verifiable Credentials in the context of Self-Sovereign Identity. He will cover how they are created, issued and shared, as well as cover some common technical questions.
The Verifiable Credentials discussed are based off a W3C standard for DIDs (decentralized identifiers) and Verifiable Credentials. The hope is that educating the identity and blockchain community on best practices for creating, issuing, storing and sharing Verifiable Credentials will foster interoperability between identity providers, ultimately making the whole ecosystem more valuable to the end consumer.
The focus of this presentation is how Verifiable Credentials work, and why the different steps and components are necessary.
If we can make Verifiable Credentials truly interoperable across industries, providers and domains, we can take a giant step forward towards a real self-sovereign world where individuals are in control of their digital lives and can benefit from every interaction they have—online and off. It all starts with getting interoperable, Verifiable Credentials under your control.
SSI: The Trillion Dollar Business OpportunitySSIMeetup
https://ssimeetup.org/ssi-trillion-dollar-business-opportunity-webinar-34/
This webinar, based on a panel of the same name held at Seattle Devcon in July 2019, will feature four experts from different areas of the digital identity industry explaining why they believe Self-Sovereign Identity (SSI) is one of the most significant applications of blockchain technology to enable all kind of new business model for the digital economy.
Panelists will include Chris Spanton, Principal Architect—Blockchain at T-Mobile; Vaughan Emery, CEO of Datafi Labs; and Drummond Reed, Chief Trust Officer at Evernym and a Trustee of the Sovrin Foundation.
Blockcerts: The Open Standard for Blockchain CredentialsSSIMeetup
https://ssimeetup.org/blockcerts-open-standard-blockchain-credentials-daniel-paramo-anthony-ronning-webinar-39/
Anthony Ronning, an engineer behind Blockcerts and backend dev at Learning Machine and Daniel Paramo, co-founder of swys and advisor at Xertify, explains how Blockcerts started, deep dive on how Blockcerts work, which institutions are implementing this solution and what companies have made a solution for the adoption of this standard. We will review the current Blockcerts roadmap and their pros and cons. What considerations do we need to take when developing a solution around Blockcerts?
Blockcerts is an open standard for creating, issuing, viewing, and verifying blockchain-based certificates. These digital records are registered on a blockchain, cryptographically signed, tamper-proof, and shareable. The goal is to enable a wave of innovation that gives individuals the capacity to possess and share their own official records.
The initial design was based on prototypes developed at the MIT Media Lab and by Learning Machine. The goal of this community is to create technical resources that other developers can utilize in their own projects. Rather than independently developing custom implementations.
Blockcerts consists of open-source libraries, tools, and mobile apps enabling a decentralized, standards-based, recipient-centric ecosystem, enabling trustless verification through blockchain technologies.
Blockcerts uses and encourages consolidation on open standards. Blockcerts is committed to self-sovereign identity of all participants, and enabling recipient control of their claims through easy-to-use tools such as the certificate wallet (mobile app). Blockcerts is also committed to availability of credentials, without single points of failure.
These open-source repos may be utilized by other research projects and commercial developers. It contains components for creating, issuing, viewing, and verifying certificates across any blockchain.
Internet Identity Workshop #29 highlights with Drummond ReedSSIMeetup
https://ssimeetup.org/highlights-internet-identity-workshop-29-drummond-reed-autumn-2019-webinar-38/
SSI Meetup veteran Drummond Reed, Chief Trust Officer at Evernym and Trustee at the Sovrin Foundation, will cover the highlights of the latest edition of the longest-running conference in the Internet identity space—Internet Identity Workshop. Drummond has attended all 29 IIWs, and he will share his major takeaways from this gathering of the movers and shakers in SSI from around the world in the autumn of 2019.
Decentralized Identifier (DIDs) fundamentals deep diveSSIMeetup
https://ssimeetup.org/decentralized-identifiers-dids-fundamentals-identitybook-info-drummond-reed-markus-sabadello-webinar-46/
Decentralized identifiers (abbreviated as “DIDs”), are the cryptographic counterpart to verifiable credentials (VCs) that together are the “twin pillars” of SSI architecture. In this special IdentityBook.info webinar Markus Sabadello, Founder and CEO of Danube Tech, and Drummond Reed, Chief Trust Officer at Evernym, co-authors of the DID chapter of the “Self-Sovereign Identity:
Decentralized Digital Identity and Verifiable Credentials” book published by Manning will explain all the fundamentals of DIDs. Based on the did chapter of the book, you will learn how DIDs evolved from the work started with VCs, how they are related to URLs and URNs, why a new type of cryptographically-verifiable identifier is needed for SSI, and how DIDs are being standardized at World Wide Web Consortium (W3C). Your guides will be two of the editors of the W3C Decentralized Identifier 1.0 specification: Markus Sabadello and Drummond Reed.
Kiva protocol: building the credit bureau of the future using SSISSIMeetup
https://ssimeetup.org/kiva-protocol-building-credit-bureau-future-using-ssi-alan-krassowski-webinar-37/
Alan Krassowski, VP of Technology & Blockchain at Kiva, will explain how the Kiva Protocol team is leveraging Self-Sovereign Identity (SSI) and related technologies to develop identity and credit solutions for traditionally underserved populations, starting with an implementation in concert with Sierra Leone’s government and banking systems, in partnership with the United Nations Development Programme (UNDP).
Alan will provide an overview of the project and its goals, including some of the challenges related to infrastructure, such as limited electricity, Internet bandwidth and penetration of smartphone devices — and how Kiva is overcoming those challenges. Alan will also explain how Kiva is leveraging various Hyperledger codebases related to verifiable credentials, decentralized identifiers, and distributed ledgers, as well as how Kiva is contributing back to the open-source community.
The audience will gain a better understanding of a real-world application of SSI technologies that will provide powerful benefits to citizens in the developing world. How is Kiva giving unbanked people digital identity and secure control over their own credit information? How can a systems-level change in identity and credit unlock capital and opportunity for millions of people?
Alan has been a professional software engineer, architect, and leader for over thirty years. After earning his B.S. in Computer Engineering from Rochester Institute of Technology, he worked as a software developer in a wide variety of domains including fintech, insurance, desktop publishing, point-of-sale, accounting, budgeting, video streaming, and narrative theory. He has also held technical leadership roles at various companies in the cybersecurity space, including Chief Architect at Cylance, Inc., Chief Architect & Senior Director at McAfee / Intel Security, and Architect in the Office of the CTO at Symantec. Prior to his role at Kiva, he was a Decentralization Architect at ConsenSys and CTO of ConsenSys Capital where he worked with Ethereum-based blockchain solutions. He has been a technical editor/reviewer on four software security books and one on Bitcoin, and is excited about how advances in cryptography have led to new solutions for people to communicate, collaborate and trade while minimizing the need to trust in centralized institutions.
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...SSIMeetup
Drummond Reed, Chief Trust Officer at Evernym, will explain in our second Webinar "Decentralized Identifiers (DIDs) - Building Block of Self-Sovereign Identity (SSI)" giving us the background on how DIDs work, where they come from and why they are important for Blockchain based Digital Identity.
The State of Digital Identity Wallets – Darrell O’DonnellSSIMeetup
https://ssimeetup.org/state-digital-identity-crypto-wallets-darrell-odonnell-webinar-22/
Darrell O’Donnell, President & CEO of Continuum Loop and Sovrin community contributor, will be our next guest. He’ll be sharing an update on a Digital Identity and Crypto Wallet study and report that he is releasing.
Discussions about Digital Wallets (aka Identity Wallets) have ended with hand-waving at many hard problems. The Digital Wallet study begins as leaders in Canada looked at what was needed to really enable self-sovereign identity to have an impact. The project sponsors realized that in order to bring Self-Sovereign Identity (SSI) into their businesses a deep understanding of the current and future state of Digital Wallets was required.
The seemingly simple wallet turns out to be exceedingly hard. The initial focus of the study was on the enterprise aspects of Digital Wallets but it quickly shifted and broadened to apply generally to people and organizations. The project is culminating in a public and private report. The public report is intended to start a deeper discussion into what we really need from our Digital Wallet.
Darrell will walk us through, at a high-level, the findings of the study and give viewers access to a pre-publication version of the public report.
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...SSIMeetup
https://ssimeetup.org/machine-identity-dids-verifiable-credentials-trust-interoperability-iot-webinar-25-mrinal-wadhwa/
Mrinal Wadhwa, CTO of Ockam, will talk about how Decentralized Identifiers, Verifiable Credentials, and Decentralized Key Management enable highly secure and reliable systems of connected devices.
The promise of IoT has been a future where systems of connected machines would work together, using intelligent algorithms, to almost magically improve our lives; Systems in farms and factories that would intelligently sense and control physical processes to optimize yield and reduce waste, homes that would adapt for our comfort and safety, and resilient cities that would pollute less and smartly manage our limited resources. These are the autonomous systems that developers in the Internet of Things community are passionate about. We all want to build this magical future.
The status quo, however, is that most IoT solutions are incredibly difficult to secure and take too long to develop, provision, and integrate. This talk will show how several emerging open standards can be combined to create open developer tools that help you avoid the plumbing required to build trust between connected devices. It will also briefly touch on Ockam’s DID method for devices and their open source Go DID Parser.
Highlights of Internet Identity Workshop #28 with Drummond ReedSSIMeetup
https://ssimeetup.org/highlights-internet-identity-workshop-28-drummond-reed-ssi-meetup-one-year-anniversary-special-webinar-27/
SSI Meetup veteran Drummond Reed, Chief Trust Officer at Evernym and Trustee at the Sovrin Foundation, will cover the highlights of the latest edition of the longest-running conference in the Internet identity space—Internet Identity Workshop. Drummond has attended all 28 IIWs, and he will share his major takeaways from this gathering of the movers and shakers in SSI from around the world to celebrate SSIMeetup’s one year anniversary.
Introduction to Ion – a layer 2 network for Decentralized Identifiers with Bi...SSIMeetup
https://ssimeetup.org/introduction-ion-layer-2-network-decentralized-identifiers-bitcoin-daniel-buchner-webinar-29/
Microsoft presented in May 2019 in New York the first decentralized infrastructure implementation by a major tech company that is built directly on the Bitcoin blockchain called Ion. Daniel Buchner, who is leading this initiative at Microsoft and a founding member of the Decentralized Identity Foundation, will discuss the culture at Microsoft, how decentralized identity works with Bitcoin and what you need to know to use the Bitcoin blockchain for non-financial transactions.
Ion handles the decentralized identifiers, which control the ability to prove you own the keys to this data.
Streetcred: Improving the Developer Experience in SSI – Michael BoydSSIMeetup
https://ssimeetup.org/streetcred-improving-developer-experience-ssi-michael-boyd-webinar-41/
Michael is the Cofounder and Chief Product Officer of Streetcred ID. Coming from multiple startup ventures as technical lead, Michael was the first software engineer at Sovrin Foundation, where he was a strong advocate for privacy and security in decentralized identity systems. He was an original contributor to the initial Hyperledger Indy Agent code, which later became Hyperledger Aries Project. He is passionate about creating a pleasant experience for developers who want to implement self-sovereign identity with Streetcred.
In this talk, Michael will discuss the evolution of the developer experience in the SSI community, including the easiest ways to get started building credential issuers, verifiers, and identity wallets. He’ll introduce a framework for how to best approach user experience problems in decentralized identity, touching on hard topics like key management, schema discovery, and building a web of trust.
Identity-centric interoperability with the Ceramic ProtocolSSIMeetup
https://ssimeetup.org/identity-centric-interoperability-ceramic-protocol-joel-thorstensson-webinar-57/
Ceramic is a new permissionless protocol for creating and accessing unstoppable documents that serve as the foundation for a connected, interoperable web without silos. Joel Thorstensson is the founder and CTO of 3Box and the primary author of the ceramic protocol as well as several Ethereum standards for identity and will provide a conceptual and technical intro to Ceramic.
At the root of many of the internet’s problems is that apps and services today are built primarily in silos. This includes identity registries and credentials, user data and access permissions, infrastructure, and services. It not only puts control over data and identities in the wrong hands, but it’s a fundamentally outdated and inefficient model for building digital products.
Ceramic unlocks information interoperability between all platforms and services across the web, allowing participants to create and resolve documents for any type of information without any centralized service. Ceramic uses DIDs (Decentralized Identifiers), IPLD (InterPlanetary Linked Data), signed messages, and blockchain anchoring to create a trusted and shared graph of verifiable documents. While flexible, these documents are especially well-suited for self-sovereign identity systems, user-centric data ecosystems, and open web services.
Understanding the European Self-Sovereign Identity Framework (ESSIF)SSIMeetup
https://ssimeetup.org/understanding-european-self-sovereign-identity-framework-essif-daniel-du-seuil-carlos-pastor-webinar-32/
Daniël Du Seuil, Programm manager and blockchain architect with the Flemish public service, and Carlos Pastor, from BME in Spain, give an overview of the vision, objectives, and approach of the European Self-Sovereign Identity Framework (ESSIF).
In the current times, the mentioned values and goals of the EU need not only to be pursued in the analog world but also in the emerging and expanding digital world. In a world which is overall becoming more insecure, competitive, and authoritarian, Europe needs to project its core values in the digital world – for its own citizens and beyond. Just as the GDPR has a global signaling and role model function, we need a new model of digital identity based on European values to work across the globe. This model will not only protect and empower the citizens and organizations but also allow more efficient interactions and new business models.
The new emerging technologies and concepts like blockchain and self-sovereign identity hold the promise to construct a new model of digital identity and the EU member states want to take the lead in this disruptive approach. In 2018, 27 EU Member States, Norway, and Lichtenstein signed a deceleration creating the European Blockchain Partnership (EBP). The EBP assists the European Commission in establishing a European Blockchain Services Infrastructure (EBSI). In the short term (2019-2020), the main objective is to start the operation of EU-wide Blockchain-based services and to promote the use of the EBSI in “virtually” every domain of the public sector able to benefit from Blockchain technology. The EBSI has a particular focus on cross-border public services. In 2018, the EBP identified a set of Use-Cases to be implemented on the EBSI one of these important use cases is the European Self Sovereign Identity Framework (ESSIF). The EBSI will implement a generic Self-Sovereign Identity capability that is integrated and interoperable with existing building blocks and legal frameworks like eIDAS and GDPR.
The ESSIF will be focussing in the first stage and implementation on the public services/member states and the EBSI use cases that are now being developed (diploma and notarization). But a much larger scope and ambitions lie in the near future. Public-private interactions could also benefit from this concept and the ESSIF project wants to accelerate and stimulate an emerging market on SSI solutions/concepts with the trust and help on standardization/interoperability Europe can provide in the new digital world. The goal and focus of this project are to develop a first version or Minimum Valuable Product (MVP) of the ESSIF within the new European Blockchain Service Infrastructure by the end of 2019/begin 2020.
The 2nd Official W3C DID Working Group Meeting (The Netherlands)SSIMeetup
https://ssimeetup.org/did-report-2-2nd-official-w3c-did-working-group-meeting-netherlands-drummond-reed-markus-sabadello-webinar-45/
The DID Report 2 about the Second Meeting of the W3C DID Working Group with Drummond Reed and Markus Sabadello from Danube Tech, co-authors of the W3C DID specification.
DID spec co-author Drummond Reed and Markus Sabadello will report back from Amsterdam (The Netherlands) for the second official meeting of the W3C DID Working Group taking place from January 29-31, 2020 to share highlights of the meeting and the roadmap for taking DIDs to a full Web standard.
This session will be followed one hour later by a full DID education session based on the DID chapter published with Manning by IdentityBook.info authors Drummond Reed, Markus Sabadello and Alex Preukschat. If you want to learn all the basics about DIDs please also join this session here: Webinar 46
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloSSIMeetup
https://ssimeetup.org/introducing-ssi-eidas-legal-report-ignacio-alamillo-webinar-55/
The European Commission developed the SSI (Self-Sovereign Identity) eIDAS bridge, an ISA2 funded initiative, to promote eIDAS as a trust framework for the SSI ecosystem. It assists a VC (Verifiable Credential) issuer in the signing process, and helps the verifier to automate the identification of the organization behind the issuer’s DID (Decentralized Identifier). Simply by “crossing” the eIDAS Bridge, a Verifiable Credential can be proven trustworthy in the EU. Ignacio Alamillo will present at this SSI Meetup webinar the insights gained from this report.
In the context of the eIDAS bridge project, we performed an analysis on how eIDAS can legally support digital identity and trustworthy DLT-based transactions in the Digital Single Market, and this is reflected in the SSI eIDAS legal report, available at this link. The objective of this report is to evaluate the potential legal issues that are important to an SSI solution and make some recommendations to be used as policy input for the eIDAS 2020 review. The report outlines short-term objectives, where changes in the Regulation would not be necessary, but also mid to long-term scenarios requiring major changes in the Regulation to comply with the SSI design principles.
The different scenarios described in the report are aligned with the proposed architectural and procedural considerations designed in the SSI eIDAS Bridge project and the European Self Sovereign Identity Framework.
All you need to know about SSI for Corporates and IoT – Heather VescentBlockchain España
https://ssimeetup.org/gaps-corporate-iot-identity-heather-vescent-webinar-35/
Heather Vescent, the owner of The Purple Tornado a foresight and strategic intelligence consultancy, explains how Digital identity gaps in Corporate and IoT Identity can be solved from an NPE (non-person entity) point of view. The webinar will answer: What is an NPE? How is an NPE both different and similar to human identity? What is the relationship humans have with NPEs? How is NPE identity more complex than the identity we know today? What considerations do we need to make when developing identity solutions for the future?
The webinar defines a taxonomy for Non-Person Entities (NPEs), defines the relationships NPEs have with humans and each other, and identifies 11 market gaps in today’s technology solutions, that have the potential to be solved using decentralized identity technology. Industry-wide solutions must be forged collaboratively in order to address a broad set of digital identity and data privacy problems.
This webinar shares research funded by the Department of Homeland Security Science & Technology, Cybersecurity directorate by The Purple Tornado, with Heather Vescent as the Principal Investigator. Vescent has delivered research insights to governments and corporations in digital identity, military learning, payments, transactions, and new economic models. She is the writer/producer of 14 documentaries and short films about future technology. Her clients include US & UK governments, SWIFT, CitiVentures, Disney, IEEE, mid-size companies and start-ups. Her research has been covered in the New York Times, CNN, American Banker, CNBC, Fox, and the Atlantic. She is an author of the Cyber Attack Survival Manual, published by Weldon-Owen. Her work has won multiple awards from the Association of Professional Futurists.
Decentralized governance for SSI and Blockchains with Lawrence Lundy-BryanSSIMeetup
https://ssimeetup.org/no-such-thing-decentralized-governance-ssi-blockchains-lawrence-lundy-bryan-webinar-26/
Lawrence Lundy is a partner and head of research at Outlier Ventures, a venture platform that supports the development and growth of emerging technologies. To do this we advise and invest in talented teams, and support businesses which create value for an open data economy.
Today, most crypto projects are governed by the open-source development tradition based predominantly on Linux and the foundation model instigated by Ethereum. These structures are not robust enough if we are to build inclusive equitable global public utilities. On-chain governance solutions are a step in the right direction but are liable to concentration of power in a technocratic elite with the time, knowledge and reputation to vote and decide on policy changes. The separation of powers (trias politica) model which forms the basis of almost all liberal democracies provides a more appropriate framework than traditional corporate governance or full on-chain governance.
This talk will explore how crypto networks could experiment with an executive (implement law), a legislative (create law) and a judiciary (interpret law). Three network branches would formalise powers and act as necessary checks and balances on power consolidation. Regular voting and term limits would prevent power grabs by stakeholders, and formalised laws would build trust in the system by users that don’t want to participate in governance directly. A separation of powers will form the foundation of a social contract between the network and users and bring legitimacy to digital public utilities going from Self-Sovereign Identity (SSI) to any other decentralized or Blockchain based technology.
The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...SSIMeetup
https://ssimeetup.org/did-report-1-first-official-w3c-did-working-group-meeting-japan-drummond-reed-webinar-36/
The DID Report 1 about the First Meeting of the New W3C DID Working Group with Drummond Reed, co-author of the W3C DID specification, and Markus Sabadello from Danube Tech. Headline news in SSI land: this month W3C members approved forming a full W3C Working Group for Decentralized Identifiers (DIDs).
DID spec co-author Drummond Reed has been in Fukuoka Japan for the first official meeting of this new Working Group and he will share highlights of the meeting and the roadmap for taking DIDs to a full Web standard.
Self Sovereign Identity (SSI) Open standards with Drummond Reed SSIMeetup
Drummond Reed, Chief Trust Officer at Evernym and Sovrin Foundation Trustee, features in our first Webinar "The Story of SSI Open Standards" by giving us the background on the foundation of Self Sovereign Identity. Drummond explains the technical and development aspects of DIDs, DKMS, DID Auth and Verifiable Credentials that will make Self Sovereign Identity possible.
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...SSIMeetup
https://ssimeetup.org/peer-dids-secure-scalable-method-dids-off-ledger-daniel-hardman-webinar-42/
Daniel Hardman, Chief Architect, Evernym / Secretary, Technical Governance Board – Sovrin Foundation will show how Peer DIDs will allow off-chain transactions for the self-sovereign identity (SSI) world.
Most documentation about decentralized identifiers (DIDs) describes them as identifiers that are rooted in a public source of truth like a blockchain, a database, a distributed filesystem, or similar. This publicness lets arbitrary parties resolve the DIDs to an endpoint and keys. It is an important feature for many use cases. However, the vast majority of relationships between people, organizations, and things have simpler requirements. When Alice(Corp|Device) and Bob want to interact, there are exactly and only 2 parties in the world who should care: Alice and Bob. Instead of arbitrary parties needing to resolve their DIDs, only Alice and Bob do. Peer DIDs are perfect in these cases. In many ways, peer DIDs are to public, blockchain-based DIDs what Ethereum Plasma or state channels are to on-chain smart contracts— or what Bitcoin’s Lightning Network is to on-chain cryptopayments. They move interactions off-chain, but offer options to connect back to a chain-based ecosystem as needed. Peer DIDs create the conditions for people, organizations, and things to have full control of their end of the digital relationships they sustain.
Identity and the quest for Self-Sovereign Identity - Daniel HardmanSSIMeetup
Self-sovereign identity (SSI) is exploding as a topic. It can be hard to make sense of all the initiatives and technologies, and of similar words like "decentralized identity." However, a few deep themes are emerging as foundational elements, no matter which details are true of your favorite approach. This webinar with Daniel Hardman, Chief Architect, Evernym / Secretary , Technical Governance Board - Sovrin Foundation, will distill the topic down to certain fundamentals, show how they manifest differently in various approaches, and discuss where the community is likely to coalesce or diverge.
DID Resolution: Given a DID how do I retrieve its document? – Markus SabadelloSSIMeetup
http://ssimeetup.org/did-resolution-given-did-how-do-retrieve-document-markus-sabadello-webinar-13/
Markus Sabadello, CEO of Danube Tech, will talk about DID Resolution and how to retrieve a DID document. As we know, Decentralized Identifiers (DIDs) are a key component in SSI architecture. They are used as building blocks for verifiable credentials, wallets, agents, and data exchange protocols. To make all this work, we need to be able to “resolve” DIDs to their associated DID Documents. This process fulfills a similar purpose as DNS does in the classic web. And while DID Resolution is not a very complicated topic, it is still important to understand how it works and how it relates to other topics. In this webinar, we will give a general introduction to DID Resolution, discuss a few in-depth topics, and also demo concrete tools that are available today.
Most DID Resolution implementations envision an architecture where a common base component invokes a set of “drivers” or “plugins” or “modules” to implement method-specific functionality, e.g. see the DIF Universal Resolver, Digital Bazaar’s did-client, or the uPort JavaScript DID Resolver. We envision such “DID Resolver” tools to become as central to SSI infrastructure as DNS is for the web today.
Trust Frameworks and SSI: An Interview with CULedger on the Credit Union MyCU...SSIMeetup
http://ssimeetup.org/trust-frameworks-ssi-interview-culedger-credit-union-mycuid-trust-framework-drummond-reed-webinar-9/
Drummond Reed, Chief Trust Officer at Evernym and Sovrin Foundation Trustee, features in this Webinar “Trust Frameworks and SSI: An Interview with CULedger on the Credit Union MyCUID Trust Framework”. To make SSI work, verifiable digital credentials must be something that websites, businesses, governments, and many others accept. To do that, they need assurances about who issued the credential under what rules. This “rulebook” for issuing digital credentials is called a trust framework.
In this webinar, Evernym Chief Trust Officer Drummond Reed, chair of the Sovrin Foundation Trust Framework Working Group, will explain what a trust framework is and why they are are essential to SSI. Then he will interview executives of CULedger, the credit union blockchain consortia, about the MyCUID Trust Framework—the first global trust framework for proving membership in a credit union.
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemsSSIMeetup
https://ssimeetup.org/eidas-regulation-anchoring-trust-self-sovereign-identity-systems-ignacio-alamillo-webinar-49/
Ignacio Alamillo is a lawyer, PhD in eIDAS Regulation, CISA, CISM, and EU Commission legal expert for EBSI eSSIF and the EBSI eIDAS Bridge initiatives. Ignacio will introduce SSI solutions, using the Alastria ID reference model as an illustrative example, taking into account the need for trust management frameworks, and trust anchors. Secondly, he will introduce the eIDAS Regulation, currently the major electronic identification regulation in the European Union, supporting a pan-European identity federation system, and the legal framework for the so-called trust services.
The EU has developed some key proposals arising from the legal assessment of the EBSI ESSIF use case, oriented to extend the eIDAS Regulation to SSI solutions used with public sector bodies relationships and procedures. This results were publicly presented in the 2nd ESSIF Stakeholders Meeting that took place in Brussels mid-January 2020.
The objective of the ESSIF legal assessment is to evaluate the potential legal issues that are horizontal to an SSI solution, including:
DIDs: What is the legal nature and ownership of DIDs (asset vs a special kind of pseudonym), how should be DIDs managed in case of minors and incapable persons, if DID may be subject to seizure, when DIDs may be deactivated, what is the legal regime of keys and wallets, etc.
VCs: What are the duties and responsibilities of VCs issuers, holders and verifiers. How to model the contractual/non-contractual relations between issuers & verifiers, and set up liability models. We should pay special attention to the legal aspects of the VC lifecycle (issuance, suspension and revocation causes, etc).
Alignment of the SSI solution with the eIDAS Regulation: aligning VCs with eIDAS eID rules, but also linking VCs to eSeals or eSignatures.
Trust framework: legal input regarding LoAs, governance aspects, conformity, etc.
The use cases include:
Using eIDAS identification means (and qualified certificates?) to issue verifiable credentials.
Using qualified certificates to support verifiable claims (EBSI eIDAS bridge) and legal evidences with full legal value.
Using SSI VCs as an eIDAS identification means.
Using blockchain plus SSI as an electronic registered delivery service.
All content represent just the opinion of Ignacio Alamillo, and do not represent any official position from the EU Commission nor any of its officers
How to Achieve NIST Compliance using SanerNow?SecPod
Protecting what you build is much more complicated today, with the security landscape witnessing rapid changes. National Institute of Standards and Technology's Cybersecurity Framework (NIST CSF) is popular among organizations to manage security risks effectively. Due to the flexibility and adaptability of the NIST framework, many organizations across the globe are using it to protect their IT network.
SanerNow provides an in-depth NIST CSF coverage to help organizations achieve salient security. SanerNow's automated solution provides a holistic view of your organization's NIST compliance posture and helps your network adhere to the benchmark.
In this session, you will learn,
• About the coverage of the NIST CSF framework in SanerNow
• How to implement NIST compliance using SanerNow
• What are the in-built and customizable compliance reports offered by SanerNow
Kiva protocol: building the credit bureau of the future using SSISSIMeetup
https://ssimeetup.org/kiva-protocol-building-credit-bureau-future-using-ssi-alan-krassowski-webinar-37/
Alan Krassowski, VP of Technology & Blockchain at Kiva, will explain how the Kiva Protocol team is leveraging Self-Sovereign Identity (SSI) and related technologies to develop identity and credit solutions for traditionally underserved populations, starting with an implementation in concert with Sierra Leone’s government and banking systems, in partnership with the United Nations Development Programme (UNDP).
Alan will provide an overview of the project and its goals, including some of the challenges related to infrastructure, such as limited electricity, Internet bandwidth and penetration of smartphone devices — and how Kiva is overcoming those challenges. Alan will also explain how Kiva is leveraging various Hyperledger codebases related to verifiable credentials, decentralized identifiers, and distributed ledgers, as well as how Kiva is contributing back to the open-source community.
The audience will gain a better understanding of a real-world application of SSI technologies that will provide powerful benefits to citizens in the developing world. How is Kiva giving unbanked people digital identity and secure control over their own credit information? How can a systems-level change in identity and credit unlock capital and opportunity for millions of people?
Alan has been a professional software engineer, architect, and leader for over thirty years. After earning his B.S. in Computer Engineering from Rochester Institute of Technology, he worked as a software developer in a wide variety of domains including fintech, insurance, desktop publishing, point-of-sale, accounting, budgeting, video streaming, and narrative theory. He has also held technical leadership roles at various companies in the cybersecurity space, including Chief Architect at Cylance, Inc., Chief Architect & Senior Director at McAfee / Intel Security, and Architect in the Office of the CTO at Symantec. Prior to his role at Kiva, he was a Decentralization Architect at ConsenSys and CTO of ConsenSys Capital where he worked with Ethereum-based blockchain solutions. He has been a technical editor/reviewer on four software security books and one on Bitcoin, and is excited about how advances in cryptography have led to new solutions for people to communicate, collaborate and trade while minimizing the need to trust in centralized institutions.
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...SSIMeetup
Drummond Reed, Chief Trust Officer at Evernym, will explain in our second Webinar "Decentralized Identifiers (DIDs) - Building Block of Self-Sovereign Identity (SSI)" giving us the background on how DIDs work, where they come from and why they are important for Blockchain based Digital Identity.
The State of Digital Identity Wallets – Darrell O’DonnellSSIMeetup
https://ssimeetup.org/state-digital-identity-crypto-wallets-darrell-odonnell-webinar-22/
Darrell O’Donnell, President & CEO of Continuum Loop and Sovrin community contributor, will be our next guest. He’ll be sharing an update on a Digital Identity and Crypto Wallet study and report that he is releasing.
Discussions about Digital Wallets (aka Identity Wallets) have ended with hand-waving at many hard problems. The Digital Wallet study begins as leaders in Canada looked at what was needed to really enable self-sovereign identity to have an impact. The project sponsors realized that in order to bring Self-Sovereign Identity (SSI) into their businesses a deep understanding of the current and future state of Digital Wallets was required.
The seemingly simple wallet turns out to be exceedingly hard. The initial focus of the study was on the enterprise aspects of Digital Wallets but it quickly shifted and broadened to apply generally to people and organizations. The project is culminating in a public and private report. The public report is intended to start a deeper discussion into what we really need from our Digital Wallet.
Darrell will walk us through, at a high-level, the findings of the study and give viewers access to a pre-publication version of the public report.
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...SSIMeetup
https://ssimeetup.org/machine-identity-dids-verifiable-credentials-trust-interoperability-iot-webinar-25-mrinal-wadhwa/
Mrinal Wadhwa, CTO of Ockam, will talk about how Decentralized Identifiers, Verifiable Credentials, and Decentralized Key Management enable highly secure and reliable systems of connected devices.
The promise of IoT has been a future where systems of connected machines would work together, using intelligent algorithms, to almost magically improve our lives; Systems in farms and factories that would intelligently sense and control physical processes to optimize yield and reduce waste, homes that would adapt for our comfort and safety, and resilient cities that would pollute less and smartly manage our limited resources. These are the autonomous systems that developers in the Internet of Things community are passionate about. We all want to build this magical future.
The status quo, however, is that most IoT solutions are incredibly difficult to secure and take too long to develop, provision, and integrate. This talk will show how several emerging open standards can be combined to create open developer tools that help you avoid the plumbing required to build trust between connected devices. It will also briefly touch on Ockam’s DID method for devices and their open source Go DID Parser.
Highlights of Internet Identity Workshop #28 with Drummond ReedSSIMeetup
https://ssimeetup.org/highlights-internet-identity-workshop-28-drummond-reed-ssi-meetup-one-year-anniversary-special-webinar-27/
SSI Meetup veteran Drummond Reed, Chief Trust Officer at Evernym and Trustee at the Sovrin Foundation, will cover the highlights of the latest edition of the longest-running conference in the Internet identity space—Internet Identity Workshop. Drummond has attended all 28 IIWs, and he will share his major takeaways from this gathering of the movers and shakers in SSI from around the world to celebrate SSIMeetup’s one year anniversary.
Introduction to Ion – a layer 2 network for Decentralized Identifiers with Bi...SSIMeetup
https://ssimeetup.org/introduction-ion-layer-2-network-decentralized-identifiers-bitcoin-daniel-buchner-webinar-29/
Microsoft presented in May 2019 in New York the first decentralized infrastructure implementation by a major tech company that is built directly on the Bitcoin blockchain called Ion. Daniel Buchner, who is leading this initiative at Microsoft and a founding member of the Decentralized Identity Foundation, will discuss the culture at Microsoft, how decentralized identity works with Bitcoin and what you need to know to use the Bitcoin blockchain for non-financial transactions.
Ion handles the decentralized identifiers, which control the ability to prove you own the keys to this data.
Streetcred: Improving the Developer Experience in SSI – Michael BoydSSIMeetup
https://ssimeetup.org/streetcred-improving-developer-experience-ssi-michael-boyd-webinar-41/
Michael is the Cofounder and Chief Product Officer of Streetcred ID. Coming from multiple startup ventures as technical lead, Michael was the first software engineer at Sovrin Foundation, where he was a strong advocate for privacy and security in decentralized identity systems. He was an original contributor to the initial Hyperledger Indy Agent code, which later became Hyperledger Aries Project. He is passionate about creating a pleasant experience for developers who want to implement self-sovereign identity with Streetcred.
In this talk, Michael will discuss the evolution of the developer experience in the SSI community, including the easiest ways to get started building credential issuers, verifiers, and identity wallets. He’ll introduce a framework for how to best approach user experience problems in decentralized identity, touching on hard topics like key management, schema discovery, and building a web of trust.
Identity-centric interoperability with the Ceramic ProtocolSSIMeetup
https://ssimeetup.org/identity-centric-interoperability-ceramic-protocol-joel-thorstensson-webinar-57/
Ceramic is a new permissionless protocol for creating and accessing unstoppable documents that serve as the foundation for a connected, interoperable web without silos. Joel Thorstensson is the founder and CTO of 3Box and the primary author of the ceramic protocol as well as several Ethereum standards for identity and will provide a conceptual and technical intro to Ceramic.
At the root of many of the internet’s problems is that apps and services today are built primarily in silos. This includes identity registries and credentials, user data and access permissions, infrastructure, and services. It not only puts control over data and identities in the wrong hands, but it’s a fundamentally outdated and inefficient model for building digital products.
Ceramic unlocks information interoperability between all platforms and services across the web, allowing participants to create and resolve documents for any type of information without any centralized service. Ceramic uses DIDs (Decentralized Identifiers), IPLD (InterPlanetary Linked Data), signed messages, and blockchain anchoring to create a trusted and shared graph of verifiable documents. While flexible, these documents are especially well-suited for self-sovereign identity systems, user-centric data ecosystems, and open web services.
Understanding the European Self-Sovereign Identity Framework (ESSIF)SSIMeetup
https://ssimeetup.org/understanding-european-self-sovereign-identity-framework-essif-daniel-du-seuil-carlos-pastor-webinar-32/
Daniël Du Seuil, Programm manager and blockchain architect with the Flemish public service, and Carlos Pastor, from BME in Spain, give an overview of the vision, objectives, and approach of the European Self-Sovereign Identity Framework (ESSIF).
In the current times, the mentioned values and goals of the EU need not only to be pursued in the analog world but also in the emerging and expanding digital world. In a world which is overall becoming more insecure, competitive, and authoritarian, Europe needs to project its core values in the digital world – for its own citizens and beyond. Just as the GDPR has a global signaling and role model function, we need a new model of digital identity based on European values to work across the globe. This model will not only protect and empower the citizens and organizations but also allow more efficient interactions and new business models.
The new emerging technologies and concepts like blockchain and self-sovereign identity hold the promise to construct a new model of digital identity and the EU member states want to take the lead in this disruptive approach. In 2018, 27 EU Member States, Norway, and Lichtenstein signed a deceleration creating the European Blockchain Partnership (EBP). The EBP assists the European Commission in establishing a European Blockchain Services Infrastructure (EBSI). In the short term (2019-2020), the main objective is to start the operation of EU-wide Blockchain-based services and to promote the use of the EBSI in “virtually” every domain of the public sector able to benefit from Blockchain technology. The EBSI has a particular focus on cross-border public services. In 2018, the EBP identified a set of Use-Cases to be implemented on the EBSI one of these important use cases is the European Self Sovereign Identity Framework (ESSIF). The EBSI will implement a generic Self-Sovereign Identity capability that is integrated and interoperable with existing building blocks and legal frameworks like eIDAS and GDPR.
The ESSIF will be focussing in the first stage and implementation on the public services/member states and the EBSI use cases that are now being developed (diploma and notarization). But a much larger scope and ambitions lie in the near future. Public-private interactions could also benefit from this concept and the ESSIF project wants to accelerate and stimulate an emerging market on SSI solutions/concepts with the trust and help on standardization/interoperability Europe can provide in the new digital world. The goal and focus of this project are to develop a first version or Minimum Valuable Product (MVP) of the ESSIF within the new European Blockchain Service Infrastructure by the end of 2019/begin 2020.
The 2nd Official W3C DID Working Group Meeting (The Netherlands)SSIMeetup
https://ssimeetup.org/did-report-2-2nd-official-w3c-did-working-group-meeting-netherlands-drummond-reed-markus-sabadello-webinar-45/
The DID Report 2 about the Second Meeting of the W3C DID Working Group with Drummond Reed and Markus Sabadello from Danube Tech, co-authors of the W3C DID specification.
DID spec co-author Drummond Reed and Markus Sabadello will report back from Amsterdam (The Netherlands) for the second official meeting of the W3C DID Working Group taking place from January 29-31, 2020 to share highlights of the meeting and the roadmap for taking DIDs to a full Web standard.
This session will be followed one hour later by a full DID education session based on the DID chapter published with Manning by IdentityBook.info authors Drummond Reed, Markus Sabadello and Alex Preukschat. If you want to learn all the basics about DIDs please also join this session here: Webinar 46
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloSSIMeetup
https://ssimeetup.org/introducing-ssi-eidas-legal-report-ignacio-alamillo-webinar-55/
The European Commission developed the SSI (Self-Sovereign Identity) eIDAS bridge, an ISA2 funded initiative, to promote eIDAS as a trust framework for the SSI ecosystem. It assists a VC (Verifiable Credential) issuer in the signing process, and helps the verifier to automate the identification of the organization behind the issuer’s DID (Decentralized Identifier). Simply by “crossing” the eIDAS Bridge, a Verifiable Credential can be proven trustworthy in the EU. Ignacio Alamillo will present at this SSI Meetup webinar the insights gained from this report.
In the context of the eIDAS bridge project, we performed an analysis on how eIDAS can legally support digital identity and trustworthy DLT-based transactions in the Digital Single Market, and this is reflected in the SSI eIDAS legal report, available at this link. The objective of this report is to evaluate the potential legal issues that are important to an SSI solution and make some recommendations to be used as policy input for the eIDAS 2020 review. The report outlines short-term objectives, where changes in the Regulation would not be necessary, but also mid to long-term scenarios requiring major changes in the Regulation to comply with the SSI design principles.
The different scenarios described in the report are aligned with the proposed architectural and procedural considerations designed in the SSI eIDAS Bridge project and the European Self Sovereign Identity Framework.
All you need to know about SSI for Corporates and IoT – Heather VescentBlockchain España
https://ssimeetup.org/gaps-corporate-iot-identity-heather-vescent-webinar-35/
Heather Vescent, the owner of The Purple Tornado a foresight and strategic intelligence consultancy, explains how Digital identity gaps in Corporate and IoT Identity can be solved from an NPE (non-person entity) point of view. The webinar will answer: What is an NPE? How is an NPE both different and similar to human identity? What is the relationship humans have with NPEs? How is NPE identity more complex than the identity we know today? What considerations do we need to make when developing identity solutions for the future?
The webinar defines a taxonomy for Non-Person Entities (NPEs), defines the relationships NPEs have with humans and each other, and identifies 11 market gaps in today’s technology solutions, that have the potential to be solved using decentralized identity technology. Industry-wide solutions must be forged collaboratively in order to address a broad set of digital identity and data privacy problems.
This webinar shares research funded by the Department of Homeland Security Science & Technology, Cybersecurity directorate by The Purple Tornado, with Heather Vescent as the Principal Investigator. Vescent has delivered research insights to governments and corporations in digital identity, military learning, payments, transactions, and new economic models. She is the writer/producer of 14 documentaries and short films about future technology. Her clients include US & UK governments, SWIFT, CitiVentures, Disney, IEEE, mid-size companies and start-ups. Her research has been covered in the New York Times, CNN, American Banker, CNBC, Fox, and the Atlantic. She is an author of the Cyber Attack Survival Manual, published by Weldon-Owen. Her work has won multiple awards from the Association of Professional Futurists.
Decentralized governance for SSI and Blockchains with Lawrence Lundy-BryanSSIMeetup
https://ssimeetup.org/no-such-thing-decentralized-governance-ssi-blockchains-lawrence-lundy-bryan-webinar-26/
Lawrence Lundy is a partner and head of research at Outlier Ventures, a venture platform that supports the development and growth of emerging technologies. To do this we advise and invest in talented teams, and support businesses which create value for an open data economy.
Today, most crypto projects are governed by the open-source development tradition based predominantly on Linux and the foundation model instigated by Ethereum. These structures are not robust enough if we are to build inclusive equitable global public utilities. On-chain governance solutions are a step in the right direction but are liable to concentration of power in a technocratic elite with the time, knowledge and reputation to vote and decide on policy changes. The separation of powers (trias politica) model which forms the basis of almost all liberal democracies provides a more appropriate framework than traditional corporate governance or full on-chain governance.
This talk will explore how crypto networks could experiment with an executive (implement law), a legislative (create law) and a judiciary (interpret law). Three network branches would formalise powers and act as necessary checks and balances on power consolidation. Regular voting and term limits would prevent power grabs by stakeholders, and formalised laws would build trust in the system by users that don’t want to participate in governance directly. A separation of powers will form the foundation of a social contract between the network and users and bring legitimacy to digital public utilities going from Self-Sovereign Identity (SSI) to any other decentralized or Blockchain based technology.
The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...SSIMeetup
https://ssimeetup.org/did-report-1-first-official-w3c-did-working-group-meeting-japan-drummond-reed-webinar-36/
The DID Report 1 about the First Meeting of the New W3C DID Working Group with Drummond Reed, co-author of the W3C DID specification, and Markus Sabadello from Danube Tech. Headline news in SSI land: this month W3C members approved forming a full W3C Working Group for Decentralized Identifiers (DIDs).
DID spec co-author Drummond Reed has been in Fukuoka Japan for the first official meeting of this new Working Group and he will share highlights of the meeting and the roadmap for taking DIDs to a full Web standard.
Self Sovereign Identity (SSI) Open standards with Drummond Reed SSIMeetup
Drummond Reed, Chief Trust Officer at Evernym and Sovrin Foundation Trustee, features in our first Webinar "The Story of SSI Open Standards" by giving us the background on the foundation of Self Sovereign Identity. Drummond explains the technical and development aspects of DIDs, DKMS, DID Auth and Verifiable Credentials that will make Self Sovereign Identity possible.
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...SSIMeetup
https://ssimeetup.org/peer-dids-secure-scalable-method-dids-off-ledger-daniel-hardman-webinar-42/
Daniel Hardman, Chief Architect, Evernym / Secretary, Technical Governance Board – Sovrin Foundation will show how Peer DIDs will allow off-chain transactions for the self-sovereign identity (SSI) world.
Most documentation about decentralized identifiers (DIDs) describes them as identifiers that are rooted in a public source of truth like a blockchain, a database, a distributed filesystem, or similar. This publicness lets arbitrary parties resolve the DIDs to an endpoint and keys. It is an important feature for many use cases. However, the vast majority of relationships between people, organizations, and things have simpler requirements. When Alice(Corp|Device) and Bob want to interact, there are exactly and only 2 parties in the world who should care: Alice and Bob. Instead of arbitrary parties needing to resolve their DIDs, only Alice and Bob do. Peer DIDs are perfect in these cases. In many ways, peer DIDs are to public, blockchain-based DIDs what Ethereum Plasma or state channels are to on-chain smart contracts— or what Bitcoin’s Lightning Network is to on-chain cryptopayments. They move interactions off-chain, but offer options to connect back to a chain-based ecosystem as needed. Peer DIDs create the conditions for people, organizations, and things to have full control of their end of the digital relationships they sustain.
Identity and the quest for Self-Sovereign Identity - Daniel HardmanSSIMeetup
Self-sovereign identity (SSI) is exploding as a topic. It can be hard to make sense of all the initiatives and technologies, and of similar words like "decentralized identity." However, a few deep themes are emerging as foundational elements, no matter which details are true of your favorite approach. This webinar with Daniel Hardman, Chief Architect, Evernym / Secretary , Technical Governance Board - Sovrin Foundation, will distill the topic down to certain fundamentals, show how they manifest differently in various approaches, and discuss where the community is likely to coalesce or diverge.
DID Resolution: Given a DID how do I retrieve its document? – Markus SabadelloSSIMeetup
http://ssimeetup.org/did-resolution-given-did-how-do-retrieve-document-markus-sabadello-webinar-13/
Markus Sabadello, CEO of Danube Tech, will talk about DID Resolution and how to retrieve a DID document. As we know, Decentralized Identifiers (DIDs) are a key component in SSI architecture. They are used as building blocks for verifiable credentials, wallets, agents, and data exchange protocols. To make all this work, we need to be able to “resolve” DIDs to their associated DID Documents. This process fulfills a similar purpose as DNS does in the classic web. And while DID Resolution is not a very complicated topic, it is still important to understand how it works and how it relates to other topics. In this webinar, we will give a general introduction to DID Resolution, discuss a few in-depth topics, and also demo concrete tools that are available today.
Most DID Resolution implementations envision an architecture where a common base component invokes a set of “drivers” or “plugins” or “modules” to implement method-specific functionality, e.g. see the DIF Universal Resolver, Digital Bazaar’s did-client, or the uPort JavaScript DID Resolver. We envision such “DID Resolver” tools to become as central to SSI infrastructure as DNS is for the web today.
Trust Frameworks and SSI: An Interview with CULedger on the Credit Union MyCU...SSIMeetup
http://ssimeetup.org/trust-frameworks-ssi-interview-culedger-credit-union-mycuid-trust-framework-drummond-reed-webinar-9/
Drummond Reed, Chief Trust Officer at Evernym and Sovrin Foundation Trustee, features in this Webinar “Trust Frameworks and SSI: An Interview with CULedger on the Credit Union MyCUID Trust Framework”. To make SSI work, verifiable digital credentials must be something that websites, businesses, governments, and many others accept. To do that, they need assurances about who issued the credential under what rules. This “rulebook” for issuing digital credentials is called a trust framework.
In this webinar, Evernym Chief Trust Officer Drummond Reed, chair of the Sovrin Foundation Trust Framework Working Group, will explain what a trust framework is and why they are are essential to SSI. Then he will interview executives of CULedger, the credit union blockchain consortia, about the MyCUID Trust Framework—the first global trust framework for proving membership in a credit union.
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemsSSIMeetup
https://ssimeetup.org/eidas-regulation-anchoring-trust-self-sovereign-identity-systems-ignacio-alamillo-webinar-49/
Ignacio Alamillo is a lawyer, PhD in eIDAS Regulation, CISA, CISM, and EU Commission legal expert for EBSI eSSIF and the EBSI eIDAS Bridge initiatives. Ignacio will introduce SSI solutions, using the Alastria ID reference model as an illustrative example, taking into account the need for trust management frameworks, and trust anchors. Secondly, he will introduce the eIDAS Regulation, currently the major electronic identification regulation in the European Union, supporting a pan-European identity federation system, and the legal framework for the so-called trust services.
The EU has developed some key proposals arising from the legal assessment of the EBSI ESSIF use case, oriented to extend the eIDAS Regulation to SSI solutions used with public sector bodies relationships and procedures. This results were publicly presented in the 2nd ESSIF Stakeholders Meeting that took place in Brussels mid-January 2020.
The objective of the ESSIF legal assessment is to evaluate the potential legal issues that are horizontal to an SSI solution, including:
DIDs: What is the legal nature and ownership of DIDs (asset vs a special kind of pseudonym), how should be DIDs managed in case of minors and incapable persons, if DID may be subject to seizure, when DIDs may be deactivated, what is the legal regime of keys and wallets, etc.
VCs: What are the duties and responsibilities of VCs issuers, holders and verifiers. How to model the contractual/non-contractual relations between issuers & verifiers, and set up liability models. We should pay special attention to the legal aspects of the VC lifecycle (issuance, suspension and revocation causes, etc).
Alignment of the SSI solution with the eIDAS Regulation: aligning VCs with eIDAS eID rules, but also linking VCs to eSeals or eSignatures.
Trust framework: legal input regarding LoAs, governance aspects, conformity, etc.
The use cases include:
Using eIDAS identification means (and qualified certificates?) to issue verifiable credentials.
Using qualified certificates to support verifiable claims (EBSI eIDAS bridge) and legal evidences with full legal value.
Using SSI VCs as an eIDAS identification means.
Using blockchain plus SSI as an electronic registered delivery service.
All content represent just the opinion of Ignacio Alamillo, and do not represent any official position from the EU Commission nor any of its officers
How to Achieve NIST Compliance using SanerNow?SecPod
Protecting what you build is much more complicated today, with the security landscape witnessing rapid changes. National Institute of Standards and Technology's Cybersecurity Framework (NIST CSF) is popular among organizations to manage security risks effectively. Due to the flexibility and adaptability of the NIST framework, many organizations across the globe are using it to protect their IT network.
SanerNow provides an in-depth NIST CSF coverage to help organizations achieve salient security. SanerNow's automated solution provides a holistic view of your organization's NIST compliance posture and helps your network adhere to the benchmark.
In this session, you will learn,
• About the coverage of the NIST CSF framework in SanerNow
• How to implement NIST compliance using SanerNow
• What are the in-built and customizable compliance reports offered by SanerNow
Blockchain - The Next Big Thing for MiddlewareKai Wähner
Fascinating new technologies are emerging these days. Everybody talks about cloud, containers, big data and machine learning. Another disrupting technology is blockchain. You might have heard about blockchain as the underlying infrastructure of Bitcoin. But Bitcoin is just the tip of the iceberg. This slide deck explains the use cases and technical concepts behind blockchain, gives an overview about available services, and points out why middleware is a key success factor in this space.
ECM and Open Source Software: A Disruptive Force in ECM SolutionsJeff Potts
Open source software is finally getting the recognition it deserves from analysts like Forrester and Gartner as a disruptive force in IT. Over the years, open source has “climbed up the stack” from operating systems to databases and now to business applications where it has established a firm foothold in the content management space.What should enterprises know about open source content management? Is it really just for Web Content Management (WCM) or does it meet the needs of broader Enterprise Content Management (ECM) deployments? Arelarge enterprises doing big, meaningful content management projects with open source or is its appeal limited to subsets of the market? What about Enterprise 2.0 initiatives? Can you assemble an Enterprise 2.0 solution from open source components? How does it compare with something like Sharepoint?
How to Be a Responsible Open Source CitizenIvar Grimstad
Have you ever worked on a project that didn't use any open source tools, libraries, or products? Using open source has been such an integral part of our daily work life that we don't even think about it. We just expect it to be available, secure, stable, and bug-free.
But how many of you are actually contributing back to an open source project? In this session, I will go through some aspects of being a responsible open source citizen.
There may even be a couple of pointers on how to make a career in open source.
8th of 8 slide decks aimed at helping small to medium enterprises illustrating some of the issues to be considered when commissioning a web site for the first time. Final, summary slide deck. This deck also contains links to other, hopefully useful links on information management architectures that we hope people will find useful
Security & Resiliency of Cloud Native Apps with Weave GitOps & Tetrate Servic...Weaveworks
Cloud-native applications are increasingly spanning across hybrid and multi-cloud environments such as on-premise data centers, in the cloud (Amazon EKS, Azure AKS, Google Cloud GKE) and at the edge. Customers need to ensure security and resiliency for their cloud-native applications while managing releases through reliable, consistent deployment and runtime policies.
In this session, we’ve partnered with Tetrate to showcase how to effectively manage advanced deployments using Weave GitOps. Managing application configurations by different teams across multiple Kubernetes clusters is made possible with Weave GitOps and Tetrate Service Bridge. Using familiar Git workflows, Weave Policy-as-Code enables application engineers to quickly deliver new features safely.
Join us as we demonstrate the scenarios where:
- All changes to application configuration are managed through Git workflows.
- GitOps provides an extra layer of security by removing the need for direct access to Kubernetes clusters.
- Policy-as-Code guarantees security, resilience and coding standards compliance.
- Tetrate Service Bridge provides dynamic configuration of application workloads and failover across multiple Kubernetes clusters.
CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...sparkfabrik
In this talk I’ll explain what is the Software Supply Chain, common threats and mitigations and how they apply to IAC ecosystem too. I’ll show off security threats using Terraform and its ecosystem and finally i’ll talk about OCI images talking about digital signatures and SBOM using Sigstore and Syft. I’ll do a live coding session showing off how to deploy secure OCI images on K8S cluster with security policies built with Kyverno, the session includes also security scanning using the generated SBOM.
Making Money is Important! Open Business Models as an Integrated Part of Crea...Haggen So
Creative Commons was found due to the failure to stop the Copyright Term Extension Act. This ever increasing control is imposed on us in the name of the benefits of the creators, with the latest incarnation as the Directive on Copyright in the Digital Single Market. By giving creators tools to receive revenue without retaining full copyright, we can demonstrate that open business models are viable alternatives other than control. The success of "Made with Creative Commons" strongly indicated that Open Business Models should be an integrated part of the Creative Commons Movement
https://ccglobalsummit2019lisbonportugal.sched.com/event/MmjR/opening-night-program
In this complimentary webinar, Toby Ward, CEO of Prescient Digital Media gives a behind-the-scenes look at the best intranets from the 4th Intranet Global Forum conference in LA.
Webex APIs for Admins - Cisco Live Orlando 2018 - DEVNET-3610Cisco DevNet
Join to explore concrete use cases implemented with the Administrative & Serviceability capabilities of Webex Teams (formally Cisco Spark) APIs.
We'll cover how to manage Webex Teams Users but also track Spaces activity through the recently added /events API resource. Moreover, we will dig into the possibilities offered by the xAPI for Webex Teams-registered devices: discover Company Branding, People counting, and how to initiate Video Calls to Webex Teams & SIP addresses.
This session is aimed at Webex Teams Administrators, Compliance Officers, and Cisco Collaboration Endpoints owners.
DEVNET-3610
https://www.ciscolive.com/us/learn/sessions/session-catalog/?search=DEVNET-3610
Pol Vanbiervliet van Cisco werkt voor een van de vroegste gebruikers van social media die ook snel overschakelde naar meer video. Dus, met enkele filmpjes liet Pol zien wat de mogelijkheden zijn, onder meer van Cisco SocialMiner.
Building Microservices in the cloud at AutoScout24Christian Deger
http://continuouslifecycle.de/veranstaltung-4846-building-microservices-in-the-cloud-at-autoscout24.html?id=4846
Fed up with stop and go in your data center? Why not shift into overdrive and pull into the fast lane? Learn how AutoScout24 are building their Autobahn in the cloud to become the market leader in Europe's vehicle classified business. Reinventing themselves by making a radical transition from monoliths to microservices, from .NET on Windows to Scala on Linux, from data center to AWS and from built by devs and run by ops to a devops mindset. While the current stack keeps running, ever more microservices will go live as you listen to stories from the trenches.
The Session Initiation Protocol (SIP) was originally defined as a protocol for creating and managing sessions. Its main use is for telecommunication applications but given its extensibility and flexibility features it may be used for other implementations as well. Many segments are looking today for their next generation communication and control solutions these include applications such as transportation control, public transportation monitoring, elderly and healthcare applications and home automation. Traditionally most of these segments have been using proprietary implementations but lately we see a growing trend for implementing standard based solutions. RADVISION has gained experience in such solutions. This webinar is delivered by our leading technology and architecture people, people who have taken a significant role in shaping many of the VoIP standards to date. Please join us to gain from their experience and insights.
[Rakuten TechConf2014] [Fukuoka] Security checking which is as a part of Cont...Rakuten Group, Inc.
Rakuten Technology Conference 2014
"Security checking which is as a part of Continuous Integration"
Masanori Fujisaki (HEARTBEATS Corporation / Walti, Inc.)
Similar to Learn about the Trust Over IP (ToIP) stack (20)
ZKorum: Building the Next Generation eAgora powered by SSISSIMeetup
The immense potential unlocked by SSI in content-centric social networks (forums) is largely unaddressed by the recent wave of decentralized social networks. Enter ZKorum - a network of verifiable communities where members create anonymous polls and discussions. In this episode, Nicolas Gimenez, the Co-Founder and CTO of ZKorum, unveils the Alpha version and delves into its architecture, drawing inspiration from SSI, DWeb, and Password Managers.
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...SSIMeetup
Lovesh Harchandani from Dock presents their approach to anonymous credentials and dives in on the various predicates that can be proven in zero knowledge. In over 90 minutes of discussion, we cover what these cryptographic techniques are, how they enable several important use cases for digital identity credentials, and we stretch James Monaghan's ability to keep up as interviewer by taking a look at the source code which makes it all possible! We show how various zero knowledge primitives we've built can be used in a modular fashion to solve real-world use cases. We cover privacy-preserving signature schemes, zero knowledge attribute equalities, range proofs, and verifiable encryption based on ZK-SNARKs, expressing arbitrary predicates as Circom programs and creating ZK proofs for them and blinded credentials (issuer is unaware of all attributes). For anyone interested in the technical underpinnings of this new frontier of digital identity, this episode is a must!
Value proposition of SSI tech providers - Self-Sovereign IdentitySSIMeetup
Talk with Vladimir Vujovic, Senior Digital Innovation Manager from SICPA about product definition and value proposition of Issuer/Holder/Verifier software of SSI tech providers. Why is it hard to convey the right message to the audience coming from outside of SSI domain. How different SSI tech providers define their offering and the language they use to convey the message. What is really the value proposition of SSI tech providers who are offering their Issuer/Verifier software to the market. How big regulation initiatives like the one in Europe for eIDAS v2 are driving the market and roadmaps for SSI tech providers and how will such initiative will have impact to the rest of the world in terms of regulation, but some of the underlying technical standards. What is the place of SSI platforms in the broader Identity landscape and when are we going to see more maturity from the market.
SSI Adoption: What will it take? Riley HughesSSIMeetup
Adoption: its the elephant in the room. SSI has so much potential, but the benefits are only realised once adoption happens at scale. In this webinar, Riley Hughes, CEO and Co-Founder of Trinsic, shares his 3 concrete recommendations for building products which are successful according to the most important metric - getting adopted!
Daniel Buchner is here to save the web. Not the web as we know it, full of closed platforms and intermediaries where both free choice and free speech are curtailed, but the web as it was intended to be: a thriving, open ecosystem of apps and protocols which put individuals at the center. To do this, he and the TBD team at Block are building what they call “Web5” which combines decentralized identifiers, verifiable credentials and personal datastores to create a platform for building truly self-sovereign apps on the web. In this webinar, we go beyond the controversial name to learn what the project is, why it is important, and what we can expect from the upcoming release this summer.
Portabl - The state of open banking, regulations, and the intersection of SSI...SSIMeetup
Complying with Know Your Customer and Anti Money Laundering regulations is hugely complicated and expensive for financial institutions, and burdensome for their customers. Nate Soffio, Co-Founder and CEO of Portabl, believes that the solution lies in secure, interoperable data - enabled by verifiable credentials. In this webinar, he explains why it is such a thorny problem, how open banking needs to evolve to more of a “tap to prove” model as organizations increasingly need continuous identity assurance, and why despite describing the task as “playing SSI on ‘hard mode’”, he believes building a “compound startup” is the best way to get the job done.
PharmaLedger: A Digital Trust Ecosystem for HealthcareSSIMeetup
Daniel Fritz, Executive Director of the PharmaLedger Association and Marco Cuomo, Director of Tech Products & Innovation at Novartis, will present their SSI journey from the initial ideas, through realization of several Proof of Concepts with DIDs and VCs, to the PharmaLedger initiative. PharmaLedger was a 29 member, 3-year, €22 million project under the EU and EFPIA Innovative Medicine Initiative pursued DIDs with external partners such as the global standards organization GS1 and the Global Legal Identifier Foundation (GLEIF). The project also resulted in the creation of the PharmaLedger Association in 2022, a non-profit Swiss association mandated to launch the first open-source product, electronic Product Information (eLeaflet). The webinar will review some of the use cases and dive a little into the technical architecture adopted in the project.
Cheqd: Making privacy-preserving digital credentials funSSIMeetup
Everyone is excited about SSI but there still aren’t any use cases that form part of people’s daily lives, so the team at Cheqd set out to change that. In this session, Ankur Banerjee walks through the research that led them to settle on social reputation in Web3 ecosystems as a use case that would be fun and drive daily usage. Find out more on creds.xyz.
Polygon ID offers tools that allow developers to build self-sovereign, decentralized and private identity solutions for users that leverage zero knowledge proofs. Polygon ID was released as open source last March 2023 at ETH Denver. In this presentation, Otto Mora, BD Lead for Americas, and Oleksander Brezhniev, Technical Lead at Polygon ID, will be covering aspects of the did:PolygonID method including: Verifiable presentations leveraging ZK Proofs; How the Proofs are generated; Credential Issuance Methods; and Identity Management Features.
Building SSI Products: A Guide for Product ManagersSSIMeetup
Self-sovereign identity, decentralised identity, web5… collectively “ID Tech” has become a much more mainstream topic in recent years, and we are seeing an increasing number of products being built using these new technologies. However, with all the hand-wringing about adoption that we hear in the industry, it can sometimes feel like a hammer looking for nails. Which specific and tangible benefits can ID Tech bring to its users, and what special considerations should a product manager have in mind when working in this space? James Monaghan has been a product leader for two decades and has worked on ID Tech projects in financial services, travel, healthcare, education and more. In this talk he will share his views on how to tell whether a customer problem might call for an ID Tech solution, and how to approach some of the product decisions which arise when applying these tools.
How to avoid another identity nightmare with SSI? Christopher AllenSSIMeetup
https://ssimeetup.org/how-avoid-another-identity-tragedy-with-ssi-christopher-allen-webinar-53/
Join the Dutch Self-Sovereign Identity community in a #Foremembrance for those who died by attempting to bomb the civil archives captured by the Nazis & those defending the vulnerable today. Christopher Allen will share with us the importance of this event for the self-sovereign identity community to build the future of identity on sunset Amsterdam time March 27th. We will also analyze the impact and risk of COVID-19 for privacy and identity systems.
March 27th is a Friday this year. Sunset in Amsterdam is at 19:06 CET, 2:06 pm EDT, 11:06 am PDT & is 1:06 am March 28 in Taipei & Hong Kong.
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSSIMeetup
https://ssimeetup.org/self-sovereign-identity-why-we-here-christopher-allen-webinar-51/
Internet cryptography and Self-sovereign identity (SSI) pioneer Christopher Allen talks about essential insights and reflections around historical, technological and ethical aspects of Self-Sovereign Identity at the 51st SSIMeetup.org webinar in collaboration with Rebooting the Web of Trust (RWOT) and Alianza Blockchain Iberoamérica as part of the events that took place at RWOT in Buenos Aires (Argentina).
Christopher is an entrepreneur and technologist who specializes in collaboration, security, and trust. As a pioneer in internet cryptography, he’s initiated cross-industry collaborations and co-created industry standards that influence the entire internet. Christopher’s focus on internet trust began as the founder of Consensus Development where he co-authored the IETF TLS internet-draft that is now at the heart of all secure commerce on the World Wide Web. Christopher is co-chair of the W3C Credentials CG working on standards for decentralized identity. Christopher has also been a digital civil liberties and human-rights privacy advisor, was part of the team that led the first UN summit on Digital Identity & Human Rights, and was the producer of a half-dozen iPhone and iPad games, and of Infinite PDF, a non-linear media app.
Explaining SSI to C-suite executives, and anyone else for that matterSSIMeetup
https://ssimeetup.org/explaining-ssi-c-suite-executives-anyone-else-john-phillips-webinar-48/
John Phillips from 460degrees in Australia has been exploring with his team for more than two years for a way to describe Self-Sovereign Identity (SSI) that was easy to understand. We think he has found a good method to make SSI easy to understand for any C-suite executive and business people that goes beyond the technology.
John published a video in late 2019 that we found deeply insightful and we have invited him to share this with the SSI Meetup audience. This demo has been going down amazingly well with audiences from c-suite technology execs to design students.
This approach quite literally animates the discussion. People add other objects into the mix, move things around, ask relevant, insightful, questions.
John will share the learnings he is gaining from University research, as well as the results of work in supporting capstone projects for higher education students, and how this has led us to a storytelling model to explain SSI.
The Hyperledger Indy Public Blockchain NodeSSIMeetup
https://ssimeetup.org/hyperledger-indy-public-blockchain-node-alexander-shcherbakov-webinar-43/
Alexander Shcherbakov is a software engineer at DSR working on the team at Evernym. He has a Ph.D. in Mathematics and is one of the maintainers of Hyperledger Indy and Hyperledger Plenum. In this presentation, he will explain the value of a decentralized ledger in an SSI ecosystem and examine Hyperledger Indy, which is the distributed ledger that has been powering the Sovrin Network for more than two years.
Our identities have to be trusted to be useful. When we meet strangers, we decide how much we trust them by what they tell us, and whether a trusted third party will vouch for them. In traditional identity systems, the trusted third party knows everything about everyone in the ecosystem. In Self-Sovereign Identity systems, we rely on a decentralized ledger to privately validate that the identity claims do in fact come from a trusted issuer.
Indy’s blockchain implementation is Plenum, which is a general purpose, public-permissioned, BFT distributed ledger. The presentation takes a technical look at the architecture, cryptography, transactions, data structures, and storage of the ledger including auditability, request processing, catch-up procedure, and support for custom plugins and custom transactions.
Indirect Identity Control: delegation, guardianship, and controllership – Dan...SSIMeetup
https://ssimeetup.org/indirect-identity-control-delegation-guardianship-controllership-daniel-hardman-webinar-33/
Daniel Hardman, Chief Architect, Evernym / Secretary, Technical Governance Board – Sovrin Foundation, will compare and contrast three forms of indirect identity control that have much in common and that should be explored together: delegation, guardianship, and controllership.
Daniel will recommend mechanisms that allow identity technology to model each with flexibility, precision, and safety. These recommendations can be applied to many decentralized identity and credentialing ecosystems.
Daniel has been a software engineer, architect, and dev leader for a quarter century–much of it intersecting with the fields of cybersecurity and digital identity. He developed the original specs for Hyperledger Indy’s SDK, and has contributed code or guidance to most of the Indy codebases. He writes regularly on identity topics. He’s also worked in machine learning/AI, supercomputers, public and private cloud, big data, SaaS, and enterprise software, and he’s founded and sold a dot com. He has graduate degrees in computational linguistics and business. He currently serves as the secretary for the Technical Governance Board of the Sovrin Foundation.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
1. Breaking News about
Trust Over IP (ToIP)
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
Drummond Reed, Chief
Trust Officer, Evernym
Mike Vesey, President,
IdRamp
Darrell O'Donnell, CEO,
Continuum Loop
2. 1. Empower global SSI communities
2. Open to everyone interested in SSI
3. All content is shared with CC BY SA
SSIMeetup.org
Alex Preukschat @SSIMeetup @AlexPreukschat
Coordinating Node SSIMeetup.org
https://creativecommons.org/licenses/by-sa/4.0/
SSIMeetup objectives
3. Breaking News about
Trust Over IP (ToIP)
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
Drummond Reed, Chief
Trust Officer, Evernym
Mike Vesey, President,
IdRamp
Darrell O'Donnell, CEO,
Continuum Loop
4. Announcing the newest member of
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
5. This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
6. Purpose
The purpose of the Trust over IP Foundation is to define a
complete architecture for Internet-scale digital trust that
combines cryptographic trust at the machine layer with
human trust at the business, legal, and social layers.
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
7. This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
8. This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
9. This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
10. What market gap does
the Trust over IP
Foundation fill?
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
11. The W3C DID (Decentralized Identifier)
and Verifiable Credential standards
are catching on quickly, but a
solidifying event is needed to initiate the
establishment of a single interoperable
stack for digital trust
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
12. This lack of interoperability could
be a major inhibitor to adoption
just like the lack of a dominant
internetworking standard
held back the Internet
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
13. The internetworking problem was
solved by the TCP/IP stack.
The interoperable digital trust
infrastructure problem can be solved
by the Trust over IP stack.
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
14. What are the market
problems the Trust over
IP stack can solve?
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
15. Until now, our Internet identities have
all been rooted on accounts.
Account-based identity means there is
always an intermediary in all our digital
relationships.
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
16. By moving to cryptographically-
verifiable digital credentials, we can
finally start proving our identity,
attributes, or relationships without
intermediaries
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
17. People can begin using passwordless
authentication and intelligent
authorization for faster, easier, safer,
more privacy-respecting digital
experiences
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
18. Organizations can begin forming and
maintaining lifetime private digital
connections with customers, suppliers,
partners, and regulators—with full audit
trails for regulatory compliance
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
19. Physical and digital goods of all kinds can
now have Verifiable Origins and prove
every step of their journey through a
supply or ownership chain
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
20. Who are the founding
members?
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
24. What are the
Working Groups?
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
25. Steering Committee
Elected from Steering Members
(Max one seat per member)
Technical Stack
Working Group
Governance Stack
Working Group
Members + Invited Experts
Members + Invited Experts
Utility Foundry
Working Group
Members + Invited Experts
Ecosystem Foundry
Working Group
Members + Invited Experts
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
26. This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
28. Breaking News about
Trust Over IP (ToIP)
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
Drummond Reed, Chief
Trust Officer, Evernym
Mike Vesey, President,
IdRamp
Darrell O'Donnell, CEO,
Continuum Loop