SlideShare a Scribd company logo
@evernym | www.evernym.com | November 2020
Open Source
& What It Means For
Self-Sovereign Identity
MODERATOR
Andy Tobin
Managing Director, Europe
PRESENTER
Richard Esplin
Director of Product
PRESENTER
James Monaghan
VP Product
On the agenda
Introduction
Open source culture
What this means for you
What this means for Evernym products
Getting started with open source and SSI
Q&A
Green Room: Networking and continued Q&A
Join us in two weeks for
our next product webinar
Tuesday, Dec 1 | 8am PT (same time block as this webinar)
We’ll cover:
• An overview of Connect.Me and our
Mobile SDK
• What's new in our Mobile SDK's General
Availability release and Connect.Me 1.4
• A sneak peek at our 2021 roadmap
Register at www.evernym.com/webinars
If you have questions….
Please write them in the Zoom Q&A, and we’ll
cover them after the presentation.
Please note, this webinar is being recorded
Open Source
Culture
FLOSS
Free / Libre Software
• Free as in Speech / Freedom.
• Sharing is a moral duty.
• Copyleft: hack copyright to enforce sharing.
Open Source
• Open is better engineering.
• With many eyes, all bugs are shallow.
• Scratch your own itch.
• Don’t reinvent the wheel.
• Collaboration is fun.
Open culture
● Maker movement
● Art and media
● Legal access
● Scientific data access
● Scientific hardware
● Bio-hacking
Open development
• Focus on building community.
• Communicate transparently.
• Products should be easy to adopt and
easy to contribute to.
• Public: source code, architecture,
documentation, tooling, roadmaps.
• Private: customer data.
TODO Group OSS
Code of Conduct
● Be friendly and patient.
● Be welcoming.
● Be considerate.
● Be respectful.
● Be careful in the words that
we choose.
● Try to understand why we
disagree.
The four freedoms
0. Run the program for any purpose.
1. Study how the program works.
2. Redistribute the program.
3. Improve the program, and
redistribute the improvements.
Open source
and SSI
The goals of Open Source and the mission
of Self-Sovereign Identity reinforce one
another.
● Decentralization
● User control
● Transparency in systems and algorithms
● Systems that are long lived and broadly
adopted
● Transportable information
● User rights
Related webinars
• SSI Meetup: Self Sovereign Identity and Open Source Software
• https://ssimeetup.org/self-sovereign-identity-ssi-open-source-richard-espli
n-webinar-16/
• Evernym: Open Source Product Strategy
• https://www.youtube.com/watch?v=Z43uDfEsVuk
What this means for you
Evernym works with lots of “you’s”
• Hyperledger Indy/Aries/Ursa
• Sovrin Foundation
• Trust over IP Foundation
• Verity users
• Mobile wallet users
• Evernym customers
• Evernym contributors
• Implementation partners
• Wider SSI community
○ DIF, IIW, RWOT
• Standards bodies
○ W3C
• Governments
• NGOs
• Cryptocurrency and blockchain
Secondary communitiesPrimary communities
Customer benefits
Customers are guaranteed:
● Vendor independence
● Vendor risk mitigation
● An improved negotiating position
● Compliance with policy
● An ancillary social benefit
And are likely to receive:
● A focus on support
● Faster adoption
● Increased security
● Innovation
● Transparency
● Interoperability
End user benefits
End users also benefit:
● Increased control over their
technology
● Can investigate and experiment
● Greater confidence in privacy and
security
● Faster adoption of SSI best practices
● Greater interoperability
● Greater data portability
Impactful decisions
The license1
2
3
The governance model
Standards
The license1
• Gift
• Apache
• Sharing with Rules
• GPL
• In-Between
• LGPL
• Time based
○ BSL
• All rights except . . .
○ CCL, SSPL
• Mixed open and closed
○ Elastic License
Source AvailableOpen Source
Bruce Perens, 2009
The license: Open business models1
Pure Play Source Available
Everything is open
source
Revenue comes
tangentially: support,
hosting, training
Source is available.
Development is public.
License is proprietary.
Open Core
Parts are open, parts
are closed.
Revenue comes from
upsell to proprietary
features.
The governance model2
No formal
governance
Vendor-
controlled
Most of GitHub
Be prepared to take
over.
Mongo, Elastic, JBoss
Focused on customer
needs, risk of lock-in.
Formal
community
Apache,
Hyperledger, Debian
Healthy project, hard
to influence.
The governance model2
Community governance Corporate governance
● Multiple copyright holders
● Anyone can merge
● Community consensus process
Pros:
● Broad adoption
Cons:
● Hard to achieve alignment
● Susceptible to “tragedy of the
commons” (lack of polish)
● Single copyright holder (CLA)
● Restricted merge rights
● Corporate vision
Pros:
● Customer focus
Cons:
● Often narrows use cases
● If you disagree, you have to
fork
Standards3
1. W3C DID Spec
https://w3c-ccg.github.io/did-spec/
2. W3C Verifiable Credentials
https://w3c.github.io/vc-data-model/
3. Agent to agent / DID Communications
https://trustoverip.org/blog/2020/10/19/trust-over-ip-foundation
-introduces-a-new-tool-for-interoperable-digital-trust/
What this means for
Evernym products
Evernym’s licensing goals
• Grow the ecosystem in which we sell.
• Drive adoption of best practices and
standards.
• Foster innovation by leveraging community
projects.
• Encourage 3rd party contributions to our
products.
• Gain brand recognition and community
marketing.
• Grow customer goodwill and loyalty.
• Be an on-ramp to paid offerings.
• Scale our business.
Evernym’s product
valueEvernym’s products combine the value of
• an open network of interoperable
credentials,
• and community-governed,
vendor-independent tools,
With
• easy to adopt solutions with advanced
capabilities designed around customer
needs,
• and support from the world’s experts in SSI.
We commit to:
We commit to:
1. Keeping customers free from vendor lock-in
We commit to:
1. Keeping customers free from vendor lock-in
2. Supporting open protocols and interoperability
We commit to:
1. Keeping customers free from vendor lock-in
2. Supporting open protocols and interoperability
3. Licensing the source code for all of our generally available products under a
permissive license within three years.
We commit to:
1. Keeping customers free from vendor lock-in
2. Supporting open protocols and interoperability
3. Licensing the source code for all of our generally available products under a
permissive license within three years.
Exceptions:
● Integrations with proprietary products.
● Infrastructure code.
● License enforcement code.
● Fixes to old code bases.
Additional commitments around
open development
• Collaborate with the broader community on foundational technologies.
• Be transparent about our policies and practices.
• Follow open development principles by hosting public source code, CI / CD, issue
tracking, documentation, and engaging with our user and developer communities.
• Exceptions will apply to proprietary integrations, customer data, niche use
cases, and security.
Licensing
Apache 2.0 License
• “Gift” style license, that allows reuse of
any kind.
• Used where we want broad adoption.
• Indy and Aries: Governed by the
community
• Verity SDK: Governed by Evernym
Licensing
Evernym Business Source License (EvBSL)
• Allows free usage of our commercial
products
• Code is publicly available and usable for any
purpose, within the following restrictions:
• No production use beyond 500 MAUs.
• Nor to provide commercial services to 3rd
parties.
• Non-production usage is always permitted.
• After 36 months from public access, each
commit will convert to the Apache 2.0
license.
Breakdown per product
Artifact Open License Governance Model
Verity (Server + Agency) Evernym BSL or Commercial Evernym
Verity SDK Apache 2.0 or Commercial Evernym
Connect.Me Evernym BSL or Commercial Evernym
Mobile SDK Evernym BSL or Commercial Evernym
Ev LibVCX Evernym BSL or Commercial Evernym
Indy, Aries, Ursa Apache 2.0 Community
Next steps in this
journey
DONE
• Verity SDK
• Verity
• MySQL Storage Plugin (part of EvLibVCX)
ON DECK
• Mobile SDK
• Connect.Me
• EvLibVCX
Improved contribution processes
• “Open source scaffolding” in each repo.
• Readme, License, Contributing, Security
• Improved distribution of support artifacts.
• Public CI / CD.
• Easy Contributor License Agreements.
• Public pull requests.
• Public issue tracker.
With special thanks to eSSIF-LAB
This effort is part of a project that has
received funding from the European
Union’s horizon 2020 research and
innovation program under grant
agreement No 871932 delivered
through our participation in the
eSSIF-LAB, which aims to advance the
broad adoption of self-sovereign
identity for the benefit of all.
Getting Started
Open Source vs SaaS
• Public repos.
• Self supported.
• You provide hosting.
• Great for learning the
internals.
• SaaS Verity.
• Evernym supported.
• Evernym hosts.
• Great for getting stuff
done.
Usage as
SaaS
Usage as Open Source /
Source Available
Next steps for you
• Review the documentation.
• Play with the Verity Sandbox.
• Check out the source code.
• PRs are welcome.
www.evernym.com/developers
Thanks for tuning in.
To register for upcoming webinars and ‘green room’ chats,
visit www.evernym.com/webinars/.
Connect with us via Twitter or Email
@evernym
info@evernym.com

More Related Content

What's hot

Meet Evernym's SSI Platform
Meet Evernym's SSI PlatformMeet Evernym's SSI Platform
Meet Evernym's SSI Platform
Evernym
 
Dao - Mobiloitte
Dao - MobiloitteDao - Mobiloitte
Dao - Mobiloitte
Mobiloitte Technologies
 
An Expert Panel on Safe Credentials
An Expert Panel on Safe CredentialsAn Expert Panel on Safe Credentials
An Expert Panel on Safe Credentials
Evernym
 
The Shift from Federated to Decentralized Identity
The Shift from Federated to Decentralized IdentityThe Shift from Federated to Decentralized Identity
The Shift from Federated to Decentralized Identity
Evernym
 
Overview of Decentralized Identity
Overview of Decentralized IdentityOverview of Decentralized Identity
Overview of Decentralized Identity
Jim Flynn
 
Blockchain With IoT - Top Blockchain IoT Use Cases
Blockchain With IoT - Top Blockchain IoT Use CasesBlockchain With IoT - Top Blockchain IoT Use Cases
Blockchain With IoT - Top Blockchain IoT Use Cases
101 Blockchains
 
Identity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic ProtocolIdentity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic Protocol
SSIMeetup
 
Decentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep diveDecentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep dive
SSIMeetup
 
Blockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain CredentialsBlockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain Credentials
SSIMeetup
 
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
SSIMeetup
 
Introduction to Self Sovereign Identity
Introduction to Self Sovereign IdentityIntroduction to Self Sovereign Identity
Introduction to Self Sovereign Identity
Heather Vescent
 
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemseIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
SSIMeetup
 
Introduction to Self-Sovereign Identity
Introduction to Self-Sovereign IdentityIntroduction to Self-Sovereign Identity
Introduction to Self-Sovereign Identity
Karyl Fowler
 
Streetcred: Improving the Developer Experience in SSI – Michael Boyd
Streetcred: Improving the Developer Experience in SSI – Michael BoydStreetcred: Improving the Developer Experience in SSI – Michael Boyd
Streetcred: Improving the Developer Experience in SSI – Michael Boyd
SSIMeetup
 
Polygon Presents "DeFi For All: Build DeFi For Mass Adoption"
Polygon Presents "DeFi For All: Build DeFi For Mass Adoption"Polygon Presents "DeFi For All: Build DeFi For Mass Adoption"
Polygon Presents "DeFi For All: Build DeFi For Mass Adoption"
XendFinance
 
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
SSIMeetup
 
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloIntroducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
SSIMeetup
 
Learn about the Trust Over IP (ToIP) stack
Learn about the Trust Over IP (ToIP) stackLearn about the Trust Over IP (ToIP) stack
Learn about the Trust Over IP (ToIP) stack
SSIMeetup
 
All you need to know about SSI for Corporates and IoT – Heather Vescent
All you need to know about SSI for Corporates and IoT – Heather VescentAll you need to know about SSI for Corporates and IoT – Heather Vescent
All you need to know about SSI for Corporates and IoT – Heather Vescent
Blockchain España
 
Digital Credentials Enabling Mobility and Verification of Educational Achieve...
Digital Credentials Enabling Mobility and Verification of Educational Achieve...Digital Credentials Enabling Mobility and Verification of Educational Achieve...
Digital Credentials Enabling Mobility and Verification of Educational Achieve...
Brandon Muramatsu
 

What's hot (20)

Meet Evernym's SSI Platform
Meet Evernym's SSI PlatformMeet Evernym's SSI Platform
Meet Evernym's SSI Platform
 
Dao - Mobiloitte
Dao - MobiloitteDao - Mobiloitte
Dao - Mobiloitte
 
An Expert Panel on Safe Credentials
An Expert Panel on Safe CredentialsAn Expert Panel on Safe Credentials
An Expert Panel on Safe Credentials
 
The Shift from Federated to Decentralized Identity
The Shift from Federated to Decentralized IdentityThe Shift from Federated to Decentralized Identity
The Shift from Federated to Decentralized Identity
 
Overview of Decentralized Identity
Overview of Decentralized IdentityOverview of Decentralized Identity
Overview of Decentralized Identity
 
Blockchain With IoT - Top Blockchain IoT Use Cases
Blockchain With IoT - Top Blockchain IoT Use CasesBlockchain With IoT - Top Blockchain IoT Use Cases
Blockchain With IoT - Top Blockchain IoT Use Cases
 
Identity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic ProtocolIdentity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic Protocol
 
Decentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep diveDecentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep dive
 
Blockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain CredentialsBlockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain Credentials
 
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
 
Introduction to Self Sovereign Identity
Introduction to Self Sovereign IdentityIntroduction to Self Sovereign Identity
Introduction to Self Sovereign Identity
 
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemseIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
 
Introduction to Self-Sovereign Identity
Introduction to Self-Sovereign IdentityIntroduction to Self-Sovereign Identity
Introduction to Self-Sovereign Identity
 
Streetcred: Improving the Developer Experience in SSI – Michael Boyd
Streetcred: Improving the Developer Experience in SSI – Michael BoydStreetcred: Improving the Developer Experience in SSI – Michael Boyd
Streetcred: Improving the Developer Experience in SSI – Michael Boyd
 
Polygon Presents "DeFi For All: Build DeFi For Mass Adoption"
Polygon Presents "DeFi For All: Build DeFi For Mass Adoption"Polygon Presents "DeFi For All: Build DeFi For Mass Adoption"
Polygon Presents "DeFi For All: Build DeFi For Mass Adoption"
 
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
 
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloIntroducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
 
Learn about the Trust Over IP (ToIP) stack
Learn about the Trust Over IP (ToIP) stackLearn about the Trust Over IP (ToIP) stack
Learn about the Trust Over IP (ToIP) stack
 
All you need to know about SSI for Corporates and IoT – Heather Vescent
All you need to know about SSI for Corporates and IoT – Heather VescentAll you need to know about SSI for Corporates and IoT – Heather Vescent
All you need to know about SSI for Corporates and IoT – Heather Vescent
 
Digital Credentials Enabling Mobility and Verification of Educational Achieve...
Digital Credentials Enabling Mobility and Verification of Educational Achieve...Digital Credentials Enabling Mobility and Verification of Educational Achieve...
Digital Credentials Enabling Mobility and Verification of Educational Achieve...
 

Similar to Open Source & What It Means For Self-Sovereign Identity (SSI)

Selecting an Open Source License and Business Model for Your Project to Have ...
Selecting an Open Source License and Business Model for Your Project to Have ...Selecting an Open Source License and Business Model for Your Project to Have ...
Selecting an Open Source License and Business Model for Your Project to Have ...
All Things Open
 
Best practices for using open source software in the enterprise
Best practices for using open source software in the enterpriseBest practices for using open source software in the enterprise
Best practices for using open source software in the enterprise
Marcel de Vries
 
"Open Source licensing and software quality" by Monty Michael Widenius @ eLib...
"Open Source licensing and software quality" by Monty Michael Widenius @ eLib..."Open Source licensing and software quality" by Monty Michael Widenius @ eLib...
"Open Source licensing and software quality" by Monty Michael Widenius @ eLib...
eLiberatica
 
Open Source All The Things
Open Source All The ThingsOpen Source All The Things
Open Source All The Things
All Things Open
 
[Workshop] Building an Integration Agile Digital Enterprise with Open Source ...
[Workshop] Building an Integration Agile Digital Enterprise with Open Source ...[Workshop] Building an Integration Agile Digital Enterprise with Open Source ...
[Workshop] Building an Integration Agile Digital Enterprise with Open Source ...
WSO2
 
open_source_tools.pptx 4th sem bca......
open_source_tools.pptx 4th sem bca......open_source_tools.pptx 4th sem bca......
open_source_tools.pptx 4th sem bca......
MohammedAnas871930
 
Intro to open source - 101 presentation
Intro to open source - 101 presentationIntro to open source - 101 presentation
Intro to open source - 101 presentation
Javier Perez
 
Open source in India
Open source in IndiaOpen source in India
Open source in India
Chetan Garg
 
OSS has taken over the enterprise: The top five OSS trends of 2015
OSS has taken over the enterprise: The top five OSS trends of 2015OSS has taken over the enterprise: The top five OSS trends of 2015
OSS has taken over the enterprise: The top five OSS trends of 2015
Rogue Wave Software
 
Open source technology
Open source technologyOpen source technology
Open source technologyRohit Kumar
 
Breaking Free from Proprietary Gravitational Pull
Breaking Free from Proprietary Gravitational PullBreaking Free from Proprietary Gravitational Pull
Breaking Free from Proprietary Gravitational Pull
Great Wide Open
 
Tracing the evolution - Open source & Embedded systems
Tracing the evolution - Open source & Embedded systemsTracing the evolution - Open source & Embedded systems
Tracing the evolution - Open source & Embedded systems
Emertxe Information Technologies Pvt Ltd
 
Managing the Software Supply Chain: Policies that Promote Innovation While Op...
Managing the Software Supply Chain: Policies that Promote Innovation While Op...Managing the Software Supply Chain: Policies that Promote Innovation While Op...
Managing the Software Supply Chain: Policies that Promote Innovation While Op...
FINOS
 
Open source
Open sourceOpen source
Open source
Yin-Ta Pan
 
Open Source Developer by Binary Semantics
Open Source Developer by Binary SemanticsOpen Source Developer by Binary Semantics
Open Source Developer by Binary Semantics
Binary Semantics
 
Open soucre(cut shrt)
Open soucre(cut shrt)Open soucre(cut shrt)
Open soucre(cut shrt)Shivani Rai
 
Speaker trung huynh opensource business model
Speaker trung huynh   opensource business modelSpeaker trung huynh   opensource business model
Speaker trung huynh opensource business modelAiTi Education
 
Open Source vs Proprietary
Open Source vs ProprietaryOpen Source vs Proprietary
Open Source vs Proprietary
M. Antoinette Jerom
 
Leverage the power of Open Source in your company
Leverage the power of Open Source in your company Leverage the power of Open Source in your company
Leverage the power of Open Source in your company
Guillaume POTIER
 
Open Source evaluation: A comprehensive guide on what you are using
Open Source evaluation: A comprehensive guide on what you are usingOpen Source evaluation: A comprehensive guide on what you are using
Open Source evaluation: A comprehensive guide on what you are using
All Things Open
 

Similar to Open Source & What It Means For Self-Sovereign Identity (SSI) (20)

Selecting an Open Source License and Business Model for Your Project to Have ...
Selecting an Open Source License and Business Model for Your Project to Have ...Selecting an Open Source License and Business Model for Your Project to Have ...
Selecting an Open Source License and Business Model for Your Project to Have ...
 
Best practices for using open source software in the enterprise
Best practices for using open source software in the enterpriseBest practices for using open source software in the enterprise
Best practices for using open source software in the enterprise
 
"Open Source licensing and software quality" by Monty Michael Widenius @ eLib...
"Open Source licensing and software quality" by Monty Michael Widenius @ eLib..."Open Source licensing and software quality" by Monty Michael Widenius @ eLib...
"Open Source licensing and software quality" by Monty Michael Widenius @ eLib...
 
Open Source All The Things
Open Source All The ThingsOpen Source All The Things
Open Source All The Things
 
[Workshop] Building an Integration Agile Digital Enterprise with Open Source ...
[Workshop] Building an Integration Agile Digital Enterprise with Open Source ...[Workshop] Building an Integration Agile Digital Enterprise with Open Source ...
[Workshop] Building an Integration Agile Digital Enterprise with Open Source ...
 
open_source_tools.pptx 4th sem bca......
open_source_tools.pptx 4th sem bca......open_source_tools.pptx 4th sem bca......
open_source_tools.pptx 4th sem bca......
 
Intro to open source - 101 presentation
Intro to open source - 101 presentationIntro to open source - 101 presentation
Intro to open source - 101 presentation
 
Open source in India
Open source in IndiaOpen source in India
Open source in India
 
OSS has taken over the enterprise: The top five OSS trends of 2015
OSS has taken over the enterprise: The top five OSS trends of 2015OSS has taken over the enterprise: The top five OSS trends of 2015
OSS has taken over the enterprise: The top five OSS trends of 2015
 
Open source technology
Open source technologyOpen source technology
Open source technology
 
Breaking Free from Proprietary Gravitational Pull
Breaking Free from Proprietary Gravitational PullBreaking Free from Proprietary Gravitational Pull
Breaking Free from Proprietary Gravitational Pull
 
Tracing the evolution - Open source & Embedded systems
Tracing the evolution - Open source & Embedded systemsTracing the evolution - Open source & Embedded systems
Tracing the evolution - Open source & Embedded systems
 
Managing the Software Supply Chain: Policies that Promote Innovation While Op...
Managing the Software Supply Chain: Policies that Promote Innovation While Op...Managing the Software Supply Chain: Policies that Promote Innovation While Op...
Managing the Software Supply Chain: Policies that Promote Innovation While Op...
 
Open source
Open sourceOpen source
Open source
 
Open Source Developer by Binary Semantics
Open Source Developer by Binary SemanticsOpen Source Developer by Binary Semantics
Open Source Developer by Binary Semantics
 
Open soucre(cut shrt)
Open soucre(cut shrt)Open soucre(cut shrt)
Open soucre(cut shrt)
 
Speaker trung huynh opensource business model
Speaker trung huynh   opensource business modelSpeaker trung huynh   opensource business model
Speaker trung huynh opensource business model
 
Open Source vs Proprietary
Open Source vs ProprietaryOpen Source vs Proprietary
Open Source vs Proprietary
 
Leverage the power of Open Source in your company
Leverage the power of Open Source in your company Leverage the power of Open Source in your company
Leverage the power of Open Source in your company
 
Open Source evaluation: A comprehensive guide on what you are using
Open Source evaluation: A comprehensive guide on what you are usingOpen Source evaluation: A comprehensive guide on what you are using
Open Source evaluation: A comprehensive guide on what you are using
 

More from Evernym

What makes a successful SSI strategy?
What makes a successful SSI strategy?What makes a successful SSI strategy?
What makes a successful SSI strategy?
Evernym
 
Verifiable Credentials for Travel & Hospitality
Verifiable Credentials for Travel & HospitalityVerifiable Credentials for Travel & Hospitality
Verifiable Credentials for Travel & Hospitality
Evernym
 
SSI & Healthcare: Lessons from the NHS
SSI & Healthcare: Lessons from the NHSSSI & Healthcare: Lessons from the NHS
SSI & Healthcare: Lessons from the NHS
Evernym
 
IATA Travel Pass - Evernym Webinar
IATA Travel Pass - Evernym WebinarIATA Travel Pass - Evernym Webinar
IATA Travel Pass - Evernym Webinar
Evernym
 
Meet Connect.Me & Evernym's Mobile SDK
Meet Connect.Me & Evernym's Mobile SDKMeet Connect.Me & Evernym's Mobile SDK
Meet Connect.Me & Evernym's Mobile SDK
Evernym
 
The Future of Digital Wallets - Evernym Webinar
The Future of Digital Wallets - Evernym WebinarThe Future of Digital Wallets - Evernym Webinar
The Future of Digital Wallets - Evernym Webinar
Evernym
 
Meet Verity, Evernym's Digital Credential Platform
Meet Verity, Evernym's Digital Credential PlatformMeet Verity, Evernym's Digital Credential Platform
Meet Verity, Evernym's Digital Credential Platform
Evernym
 
Enhancing Learner Mobility with SSI & Portable Digital Credentials
Enhancing Learner Mobility with SSI & Portable Digital CredentialsEnhancing Learner Mobility with SSI & Portable Digital Credentials
Enhancing Learner Mobility with SSI & Portable Digital Credentials
Evernym
 
Trust over IP (ToIP)
Trust over IP (ToIP)Trust over IP (ToIP)
Trust over IP (ToIP)
Evernym
 
SSI & Digital Guardianship Webinar
SSI & Digital Guardianship WebinarSSI & Digital Guardianship Webinar
SSI & Digital Guardianship Webinar
Evernym
 
Digital Guardianship in Self-Sovereign Identity
Digital Guardianship in Self-Sovereign IdentityDigital Guardianship in Self-Sovereign Identity
Digital Guardianship in Self-Sovereign Identity
Evernym
 
What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?
Evernym
 

More from Evernym (12)

What makes a successful SSI strategy?
What makes a successful SSI strategy?What makes a successful SSI strategy?
What makes a successful SSI strategy?
 
Verifiable Credentials for Travel & Hospitality
Verifiable Credentials for Travel & HospitalityVerifiable Credentials for Travel & Hospitality
Verifiable Credentials for Travel & Hospitality
 
SSI & Healthcare: Lessons from the NHS
SSI & Healthcare: Lessons from the NHSSSI & Healthcare: Lessons from the NHS
SSI & Healthcare: Lessons from the NHS
 
IATA Travel Pass - Evernym Webinar
IATA Travel Pass - Evernym WebinarIATA Travel Pass - Evernym Webinar
IATA Travel Pass - Evernym Webinar
 
Meet Connect.Me & Evernym's Mobile SDK
Meet Connect.Me & Evernym's Mobile SDKMeet Connect.Me & Evernym's Mobile SDK
Meet Connect.Me & Evernym's Mobile SDK
 
The Future of Digital Wallets - Evernym Webinar
The Future of Digital Wallets - Evernym WebinarThe Future of Digital Wallets - Evernym Webinar
The Future of Digital Wallets - Evernym Webinar
 
Meet Verity, Evernym's Digital Credential Platform
Meet Verity, Evernym's Digital Credential PlatformMeet Verity, Evernym's Digital Credential Platform
Meet Verity, Evernym's Digital Credential Platform
 
Enhancing Learner Mobility with SSI & Portable Digital Credentials
Enhancing Learner Mobility with SSI & Portable Digital CredentialsEnhancing Learner Mobility with SSI & Portable Digital Credentials
Enhancing Learner Mobility with SSI & Portable Digital Credentials
 
Trust over IP (ToIP)
Trust over IP (ToIP)Trust over IP (ToIP)
Trust over IP (ToIP)
 
SSI & Digital Guardianship Webinar
SSI & Digital Guardianship WebinarSSI & Digital Guardianship Webinar
SSI & Digital Guardianship Webinar
 
Digital Guardianship in Self-Sovereign Identity
Digital Guardianship in Self-Sovereign IdentityDigital Guardianship in Self-Sovereign Identity
Digital Guardianship in Self-Sovereign Identity
 
What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?
 

Recently uploaded

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 

Open Source & What It Means For Self-Sovereign Identity (SSI)

  • 1. @evernym | www.evernym.com | November 2020 Open Source & What It Means For Self-Sovereign Identity
  • 2. MODERATOR Andy Tobin Managing Director, Europe PRESENTER Richard Esplin Director of Product PRESENTER James Monaghan VP Product
  • 3. On the agenda Introduction Open source culture What this means for you What this means for Evernym products Getting started with open source and SSI Q&A Green Room: Networking and continued Q&A
  • 4. Join us in two weeks for our next product webinar Tuesday, Dec 1 | 8am PT (same time block as this webinar) We’ll cover: • An overview of Connect.Me and our Mobile SDK • What's new in our Mobile SDK's General Availability release and Connect.Me 1.4 • A sneak peek at our 2021 roadmap Register at www.evernym.com/webinars
  • 5. If you have questions…. Please write them in the Zoom Q&A, and we’ll cover them after the presentation. Please note, this webinar is being recorded
  • 7. FLOSS Free / Libre Software • Free as in Speech / Freedom. • Sharing is a moral duty. • Copyleft: hack copyright to enforce sharing. Open Source • Open is better engineering. • With many eyes, all bugs are shallow. • Scratch your own itch. • Don’t reinvent the wheel. • Collaboration is fun.
  • 8. Open culture ● Maker movement ● Art and media ● Legal access ● Scientific data access ● Scientific hardware ● Bio-hacking
  • 9. Open development • Focus on building community. • Communicate transparently. • Products should be easy to adopt and easy to contribute to. • Public: source code, architecture, documentation, tooling, roadmaps. • Private: customer data. TODO Group OSS Code of Conduct ● Be friendly and patient. ● Be welcoming. ● Be considerate. ● Be respectful. ● Be careful in the words that we choose. ● Try to understand why we disagree.
  • 10. The four freedoms 0. Run the program for any purpose. 1. Study how the program works. 2. Redistribute the program. 3. Improve the program, and redistribute the improvements.
  • 11. Open source and SSI The goals of Open Source and the mission of Self-Sovereign Identity reinforce one another. ● Decentralization ● User control ● Transparency in systems and algorithms ● Systems that are long lived and broadly adopted ● Transportable information ● User rights
  • 12. Related webinars • SSI Meetup: Self Sovereign Identity and Open Source Software • https://ssimeetup.org/self-sovereign-identity-ssi-open-source-richard-espli n-webinar-16/ • Evernym: Open Source Product Strategy • https://www.youtube.com/watch?v=Z43uDfEsVuk
  • 13. What this means for you
  • 14. Evernym works with lots of “you’s” • Hyperledger Indy/Aries/Ursa • Sovrin Foundation • Trust over IP Foundation • Verity users • Mobile wallet users • Evernym customers • Evernym contributors • Implementation partners • Wider SSI community ○ DIF, IIW, RWOT • Standards bodies ○ W3C • Governments • NGOs • Cryptocurrency and blockchain Secondary communitiesPrimary communities
  • 15. Customer benefits Customers are guaranteed: ● Vendor independence ● Vendor risk mitigation ● An improved negotiating position ● Compliance with policy ● An ancillary social benefit And are likely to receive: ● A focus on support ● Faster adoption ● Increased security ● Innovation ● Transparency ● Interoperability
  • 16. End user benefits End users also benefit: ● Increased control over their technology ● Can investigate and experiment ● Greater confidence in privacy and security ● Faster adoption of SSI best practices ● Greater interoperability ● Greater data portability
  • 17. Impactful decisions The license1 2 3 The governance model Standards
  • 18. The license1 • Gift • Apache • Sharing with Rules • GPL • In-Between • LGPL • Time based ○ BSL • All rights except . . . ○ CCL, SSPL • Mixed open and closed ○ Elastic License Source AvailableOpen Source Bruce Perens, 2009
  • 19. The license: Open business models1 Pure Play Source Available Everything is open source Revenue comes tangentially: support, hosting, training Source is available. Development is public. License is proprietary. Open Core Parts are open, parts are closed. Revenue comes from upsell to proprietary features.
  • 20. The governance model2 No formal governance Vendor- controlled Most of GitHub Be prepared to take over. Mongo, Elastic, JBoss Focused on customer needs, risk of lock-in. Formal community Apache, Hyperledger, Debian Healthy project, hard to influence.
  • 21. The governance model2 Community governance Corporate governance ● Multiple copyright holders ● Anyone can merge ● Community consensus process Pros: ● Broad adoption Cons: ● Hard to achieve alignment ● Susceptible to “tragedy of the commons” (lack of polish) ● Single copyright holder (CLA) ● Restricted merge rights ● Corporate vision Pros: ● Customer focus Cons: ● Often narrows use cases ● If you disagree, you have to fork
  • 22. Standards3 1. W3C DID Spec https://w3c-ccg.github.io/did-spec/ 2. W3C Verifiable Credentials https://w3c.github.io/vc-data-model/ 3. Agent to agent / DID Communications https://trustoverip.org/blog/2020/10/19/trust-over-ip-foundation -introduces-a-new-tool-for-interoperable-digital-trust/
  • 23. What this means for Evernym products
  • 24. Evernym’s licensing goals • Grow the ecosystem in which we sell. • Drive adoption of best practices and standards. • Foster innovation by leveraging community projects. • Encourage 3rd party contributions to our products. • Gain brand recognition and community marketing. • Grow customer goodwill and loyalty. • Be an on-ramp to paid offerings. • Scale our business.
  • 25. Evernym’s product valueEvernym’s products combine the value of • an open network of interoperable credentials, • and community-governed, vendor-independent tools, With • easy to adopt solutions with advanced capabilities designed around customer needs, • and support from the world’s experts in SSI.
  • 27. We commit to: 1. Keeping customers free from vendor lock-in
  • 28. We commit to: 1. Keeping customers free from vendor lock-in 2. Supporting open protocols and interoperability
  • 29. We commit to: 1. Keeping customers free from vendor lock-in 2. Supporting open protocols and interoperability 3. Licensing the source code for all of our generally available products under a permissive license within three years.
  • 30. We commit to: 1. Keeping customers free from vendor lock-in 2. Supporting open protocols and interoperability 3. Licensing the source code for all of our generally available products under a permissive license within three years. Exceptions: ● Integrations with proprietary products. ● Infrastructure code. ● License enforcement code. ● Fixes to old code bases.
  • 31. Additional commitments around open development • Collaborate with the broader community on foundational technologies. • Be transparent about our policies and practices. • Follow open development principles by hosting public source code, CI / CD, issue tracking, documentation, and engaging with our user and developer communities. • Exceptions will apply to proprietary integrations, customer data, niche use cases, and security.
  • 32. Licensing Apache 2.0 License • “Gift” style license, that allows reuse of any kind. • Used where we want broad adoption. • Indy and Aries: Governed by the community • Verity SDK: Governed by Evernym
  • 33. Licensing Evernym Business Source License (EvBSL) • Allows free usage of our commercial products • Code is publicly available and usable for any purpose, within the following restrictions: • No production use beyond 500 MAUs. • Nor to provide commercial services to 3rd parties. • Non-production usage is always permitted. • After 36 months from public access, each commit will convert to the Apache 2.0 license.
  • 34. Breakdown per product Artifact Open License Governance Model Verity (Server + Agency) Evernym BSL or Commercial Evernym Verity SDK Apache 2.0 or Commercial Evernym Connect.Me Evernym BSL or Commercial Evernym Mobile SDK Evernym BSL or Commercial Evernym Ev LibVCX Evernym BSL or Commercial Evernym Indy, Aries, Ursa Apache 2.0 Community
  • 35. Next steps in this journey DONE • Verity SDK • Verity • MySQL Storage Plugin (part of EvLibVCX) ON DECK • Mobile SDK • Connect.Me • EvLibVCX
  • 36. Improved contribution processes • “Open source scaffolding” in each repo. • Readme, License, Contributing, Security • Improved distribution of support artifacts. • Public CI / CD. • Easy Contributor License Agreements. • Public pull requests. • Public issue tracker.
  • 37. With special thanks to eSSIF-LAB This effort is part of a project that has received funding from the European Union’s horizon 2020 research and innovation program under grant agreement No 871932 delivered through our participation in the eSSIF-LAB, which aims to advance the broad adoption of self-sovereign identity for the benefit of all.
  • 39. Open Source vs SaaS • Public repos. • Self supported. • You provide hosting. • Great for learning the internals. • SaaS Verity. • Evernym supported. • Evernym hosts. • Great for getting stuff done. Usage as SaaS Usage as Open Source / Source Available
  • 40. Next steps for you • Review the documentation. • Play with the Verity Sandbox. • Check out the source code. • PRs are welcome. www.evernym.com/developers
  • 41. Thanks for tuning in. To register for upcoming webinars and ‘green room’ chats, visit www.evernym.com/webinars/. Connect with us via Twitter or Email @evernym info@evernym.com