Forging Self-Sovereign Identity in the Age of the Blockchain - Christopher Al...Christopher Allen
Presentation by Christopher Allen of Blockstream on self-sovereign decentralized identity, confidentiality, privacy, and human rights at Milan Bitcoin Meetup on April 11, 2017. Video at https://www.youtube.com/watch?v=p0-oXpp6yrM&t=5m7s
Blockchain-Anchored Identity -- Daniel Buchner, Microsoftbernardgolden
In this presentation, Daniel Buchner discusses the need and challenge of identity in the digital society. Particular interest is paid to technical challenges and supporting blockchain technologies
Identity - Past Solutions & Current Blockchain Landscapeaatkin1971
Identity - Past Solutions & Current Blockchain Landscape. Intro and profile of ENS (Ethereum Naming Service) & uPort identity solution. Silicon Valley Ethereum meetup @ Goodwin Law, May 7, 2017.
Forging Self-Sovereign Identity in the Age of the Blockchain - Christopher Al...Christopher Allen
Presentation by Christopher Allen of Blockstream on self-sovereign decentralized identity, confidentiality, privacy, and human rights at Milan Bitcoin Meetup on April 11, 2017. Video at https://www.youtube.com/watch?v=p0-oXpp6yrM&t=5m7s
Blockchain-Anchored Identity -- Daniel Buchner, Microsoftbernardgolden
In this presentation, Daniel Buchner discusses the need and challenge of identity in the digital society. Particular interest is paid to technical challenges and supporting blockchain technologies
Identity - Past Solutions & Current Blockchain Landscapeaatkin1971
Identity - Past Solutions & Current Blockchain Landscape. Intro and profile of ENS (Ethereum Naming Service) & uPort identity solution. Silicon Valley Ethereum meetup @ Goodwin Law, May 7, 2017.
How to avoid another identity nightmare with SSI? Christopher AllenSSIMeetup
https://ssimeetup.org/how-avoid-another-identity-tragedy-with-ssi-christopher-allen-webinar-53/
Join the Dutch Self-Sovereign Identity community in a #Foremembrance for those who died by attempting to bomb the civil archives captured by the Nazis & those defending the vulnerable today. Christopher Allen will share with us the importance of this event for the self-sovereign identity community to build the future of identity on sunset Amsterdam time March 27th. We will also analyze the impact and risk of COVID-19 for privacy and identity systems.
March 27th is a Friday this year. Sunset in Amsterdam is at 19:06 CET, 2:06 pm EDT, 11:06 am PDT & is 1:06 am March 28 in Taipei & Hong Kong.
Blockchanging the world - An overview of the blockchain academic landscapeSebastian Cochinescu
An overview of the blockchain academic landscape - presentation from the ICO Advisory Group's Event "Blockchanging the world – the academic, technological and legal challenges of the blockchain revolution" held at Techhub Bucharest on December 20th, 2017.
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSSIMeetup
https://ssimeetup.org/self-sovereign-identity-why-we-here-christopher-allen-webinar-51/
Internet cryptography and Self-sovereign identity (SSI) pioneer Christopher Allen talks about essential insights and reflections around historical, technological and ethical aspects of Self-Sovereign Identity at the 51st SSIMeetup.org webinar in collaboration with Rebooting the Web of Trust (RWOT) and Alianza Blockchain Iberoamérica as part of the events that took place at RWOT in Buenos Aires (Argentina).
Christopher is an entrepreneur and technologist who specializes in collaboration, security, and trust. As a pioneer in internet cryptography, he’s initiated cross-industry collaborations and co-created industry standards that influence the entire internet. Christopher’s focus on internet trust began as the founder of Consensus Development where he co-authored the IETF TLS internet-draft that is now at the heart of all secure commerce on the World Wide Web. Christopher is co-chair of the W3C Credentials CG working on standards for decentralized identity. Christopher has also been a digital civil liberties and human-rights privacy advisor, was part of the team that led the first UN summit on Digital Identity & Human Rights, and was the producer of a half-dozen iPhone and iPad games, and of Infinite PDF, a non-linear media app.
Vlad Andrei's presentation from the ICO Advisory Group's Event "Blockchanging the world – the academic, technological and legal challenges of the blockchain revolution" held at Techhub Bucharest on December 20th, 2017.
What do you get if you combine two over-hyped subjects, blockchain and IOT? At the Trusted IOT Alliance founders meeting, the answer was a surprisingly level headed conversation, and demonstrations of how IOT projects are currently being secured by blockchain.
Presentation outline:
- What is blockchain & distributed ledger technology? Why is it useful? (no hype overview)
- The work of the Trusted IOT Alliance (www.trusted-iot.org)?
- Stories about how blockchain is being used
This is an update of my previous presentation from 2012. I discuss several recent topics including the Witnesses Principle, the rise of Big Metadata, and the need for autonomy and possibly self-awareness for financial instruments designed to hold value for periods greater than a single human lifetime.
Potential of blockchain into industry 4.0 TechXpla
MGM’s College of Engineering and Technology (MGMCET) at Kamothe, Navi Mumbai has organized a National Conference on theme of “Industry 4.0”.
Dept. of Electronics & Tele communication Engineering, Mechanical Engineering and Computer Engineering jointly organised this.
This is presentation of Blockchain into Industry 4.0
In supply chain and many other industry verticals there is a lot of opacity related to the origin of products and the chain of custody. Blockchain at scale unlocks a network of trust and value, which connects to the real world using IoT.
A quick, simple presentation on four images of the future of the blockchain. This was used a short 10 minute presentation to kick off a roundtable discussion at Bitcoins in Bali, 22 August 2017.
Age Friendly Economy - Legislation and Ethics of Data UseAgeFriendlyEconomy
Upon completion of this module you will:
- Be able to recognize the necessity of regulating big data
- Understand the difference between privacy and data protection
- Know how to implement actions of data protection into your own (future) company
Duration of the module: approximately 1 – 2 hours
How to avoid another identity nightmare with SSI? Christopher AllenSSIMeetup
https://ssimeetup.org/how-avoid-another-identity-tragedy-with-ssi-christopher-allen-webinar-53/
Join the Dutch Self-Sovereign Identity community in a #Foremembrance for those who died by attempting to bomb the civil archives captured by the Nazis & those defending the vulnerable today. Christopher Allen will share with us the importance of this event for the self-sovereign identity community to build the future of identity on sunset Amsterdam time March 27th. We will also analyze the impact and risk of COVID-19 for privacy and identity systems.
March 27th is a Friday this year. Sunset in Amsterdam is at 19:06 CET, 2:06 pm EDT, 11:06 am PDT & is 1:06 am March 28 in Taipei & Hong Kong.
Blockchanging the world - An overview of the blockchain academic landscapeSebastian Cochinescu
An overview of the blockchain academic landscape - presentation from the ICO Advisory Group's Event "Blockchanging the world – the academic, technological and legal challenges of the blockchain revolution" held at Techhub Bucharest on December 20th, 2017.
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSSIMeetup
https://ssimeetup.org/self-sovereign-identity-why-we-here-christopher-allen-webinar-51/
Internet cryptography and Self-sovereign identity (SSI) pioneer Christopher Allen talks about essential insights and reflections around historical, technological and ethical aspects of Self-Sovereign Identity at the 51st SSIMeetup.org webinar in collaboration with Rebooting the Web of Trust (RWOT) and Alianza Blockchain Iberoamérica as part of the events that took place at RWOT in Buenos Aires (Argentina).
Christopher is an entrepreneur and technologist who specializes in collaboration, security, and trust. As a pioneer in internet cryptography, he’s initiated cross-industry collaborations and co-created industry standards that influence the entire internet. Christopher’s focus on internet trust began as the founder of Consensus Development where he co-authored the IETF TLS internet-draft that is now at the heart of all secure commerce on the World Wide Web. Christopher is co-chair of the W3C Credentials CG working on standards for decentralized identity. Christopher has also been a digital civil liberties and human-rights privacy advisor, was part of the team that led the first UN summit on Digital Identity & Human Rights, and was the producer of a half-dozen iPhone and iPad games, and of Infinite PDF, a non-linear media app.
Vlad Andrei's presentation from the ICO Advisory Group's Event "Blockchanging the world – the academic, technological and legal challenges of the blockchain revolution" held at Techhub Bucharest on December 20th, 2017.
What do you get if you combine two over-hyped subjects, blockchain and IOT? At the Trusted IOT Alliance founders meeting, the answer was a surprisingly level headed conversation, and demonstrations of how IOT projects are currently being secured by blockchain.
Presentation outline:
- What is blockchain & distributed ledger technology? Why is it useful? (no hype overview)
- The work of the Trusted IOT Alliance (www.trusted-iot.org)?
- Stories about how blockchain is being used
This is an update of my previous presentation from 2012. I discuss several recent topics including the Witnesses Principle, the rise of Big Metadata, and the need for autonomy and possibly self-awareness for financial instruments designed to hold value for periods greater than a single human lifetime.
Potential of blockchain into industry 4.0 TechXpla
MGM’s College of Engineering and Technology (MGMCET) at Kamothe, Navi Mumbai has organized a National Conference on theme of “Industry 4.0”.
Dept. of Electronics & Tele communication Engineering, Mechanical Engineering and Computer Engineering jointly organised this.
This is presentation of Blockchain into Industry 4.0
In supply chain and many other industry verticals there is a lot of opacity related to the origin of products and the chain of custody. Blockchain at scale unlocks a network of trust and value, which connects to the real world using IoT.
A quick, simple presentation on four images of the future of the blockchain. This was used a short 10 minute presentation to kick off a roundtable discussion at Bitcoins in Bali, 22 August 2017.
Age Friendly Economy - Legislation and Ethics of Data UseAgeFriendlyEconomy
Upon completion of this module you will:
- Be able to recognize the necessity of regulating big data
- Understand the difference between privacy and data protection
- Know how to implement actions of data protection into your own (future) company
Duration of the module: approximately 1 – 2 hours
In recent years, there has been a buzz around the term "crypto" or "cryptocurrency." But what exactly is crypto and how does it work?
Reading this guide will help you understand the World of Cryptocurrencies, Blockchain, and Decentralized Finance.
There are many cryptocurrencies available in the market with different functions and specifications. Bitcoin is the first cryptocurrency.
Visit - https://jncx.io/
Some of the points to be covered in the book Blockchain Insider. Blockchain, Bitcoin & Money at a Glance. Case studies and suggestions on possible implementation in 4 major categories:
1) Smart Money
2) Smart Energy
3) Smart Contract
4) Smart Assets
This presentation slide serves as a guide on how Blockchain related topics can be arranged and trained.
Lessons in privacy engineering from a nation scale identity system - connect idDavid Kelts, CIPT
Everybody wants to achieve privacy by design? But how do you do that? This slideshare will show you how. What is privacy? What thought processes will bring about understanding of the security measures to take in order to ensure your users privacy?
The objective of this module is to gain an overview of the ethics surrounding big data and the legislation that governs it.
Upon completion of this module you will:
- Gain knowledge on how to recognize the necessity of regulating big data
- Obtain an understanding of the difference between privacy and data protection
- Understand the need to implement data protection actions into your own business
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Epistemic Interaction - tuning interfaces to provide information for AI support
Privacy applications on blockchain
1. JUNE. 2, 2020 • BLOCKSURVEY
Privacy
Applications of
Blockchain
2. Agenda
UNDERSTANDING PRIVACY
Physical vs Digital
Why privacy is important?
Who owns it?
UNDERSTANDING BLOCKCHAIN
History and Principles
It's a protocol
Identity and Data ownership
Path to decentralized era
PRIVACY APPLICATIONS ON
BLOCKCHAIN
Own your identity and data
List of applications
How to build?
Research
4. Physical
vs
Digital World
Both worlds have converged.
WHERE DO YOU LIVE?
You are an enhanced human.
DIGITAL WORLD
Access, security, privacy, surveillance
ethics, ownership.....
DIGITAL ISSUES
13. Data & trust breaches are causing
consumers to second-guess data silos
Developers want more room for
innovation outside of current data-
monopolies
Developers want to reduce cost,
overhead, and liability of deploying
apps
Current era
No data-monopolies, data is user owned
and can be used in any app
Universal, password-less authentication
Apps run on user devices, explicit user opt-in
and increased security
Decentralized era
20. Other Resources
BOOKS
Privacy 3.0, Surveillance Capitalism, Where will man take us?, 1984, Permanent
Record...
MOVIES
1984, Minority Report, Snowden, Imitation Game, Great Hack....
COMMUNITY
Internet Freedom Foundation, BlockStack, Mozilla, Solid