SlideShare a Scribd company logo
https://creativecommons.org/lic
enses/by-sa/4.0/
Self-Sovereign Identity and
Open Source Software
Richard Esplin
Product Manager Evernym
Hyperledger Indy project and the Sovrin identity Network
November 12, 2018
1. Empower global SSI communities
2. Open to everyone interested in SSI
3. All content is shared with CC BY SA
SSIMeetup.org
Alex Preukschat @SSIMeetup @AlexPreukschat
Coordinating Node SSIMeetup.org
https://creativecommons.org/licenses/by-sa/4.0/
SSIMeetup objectives
What is Self Sovereign Identity?
SSIMeetup.org
https://creativecommons.org/licenses/by-
sa/4.0/
Carriers of Identity
Digital Identity
Also Known As
User-Centric Identity
User-Controlled Identity
User-Owned Identity
Bring Your Own Identity
SSIMeetup.org
https://creativecommons.org/licenses/by-
sa/4.0/
A Brief History of Open Source
SSIMeetup.org
https://creativecommons.org/licenses/by-
sa/4.0/
Sharing Early Software
The money is in the
hardware, so why bother
protecting software?
SSIMeetup.org
https://creativecommons.org/licenses/by-
sa/4.0/
Unix Culture
Software isn’t our
business.
Unix is academic.
Sharing gets things done.
Homebrew
Hobbyist exploring the limits of computing.
Bill Gates:
Sharing software is theft.
Free Software
Free as in Freedom. (Free as in Speech.)
Sharing is a moral duty.
Proprietary software keeps users divided
and helpless.
Proprietary software does not allow users
to have control of their computing.
Copyleft: hack copyright to enforce sharing.
Open Source
Open source is better
engineering.
With many eyes, all bugs
are shallow.
Scratch your own itch.
Don’t reinvent the wheel.
Collaboration is fun.
Open Culture
Art and media
Legal access
Scientific data access
Scientific hardware
Bio-hacking
Maker movement
SSIMeetup.org
https://creativecommons.org/licenses/by-
sa/4.0/
Principles of FLOSS
SSIMeetup.org
https://creativecommons.org/licenses/by-
sa/4.0/
Free Software
Open Source Software
Libre Software
SSIMeetup.org
https://creativecommons.org/licenses/by-
sa/4.0/
The Four Freedoms
0. Run the program for any purpose.
1. Study how the program works.
2. Redistribute the program.
3. Improve the program, and redistribute the
improvements.
Open Source Definition
1. Free Redistribution
2. Source Code Availability
3. Derived Works Allowed
4. Integrity of the Author’s Source Code
5. No Discrimination Against Persons or Groups
6. No Discrimination Against Fields of Endeavor
7. Distribution of License
8. License Must Not Be Specific to a Product
9. License Must Not Restrict Other Software
10. License Must Be Technology-Neutral
SSIMeetup.org
https://creativecommons.org/licenses/by-
sa/4.0/
Commercial Open Source
Provides customers with:
● A focus on support
● Vendor independence
● Vendor risk mitigation
● An improved negotiating
position
● Compliance with policy
● Fast adoption (no purchase
necessary!)
● An ancillary social benefit
And has a reputation for:
● Low price
● Security
● Innovation
● Transparency
● Interoperability
SSIMeetup.org
https://creativecommons.org/licenses/by-
sa/4.0/
Three Types of Licenses
1. Gift:
Apache
2. Sharing with Rules:
GPL
3. In-Between:
LGPL
Bruce Perens, 2009
https://www.datamation.com/osrc/article.php/3803101/Bruce-Perens-How-Many-Open-Source-Licenses-Do-You-Need.htm
Three Types of Licenses
1. Gift:
Maximize adoption, standards, and
collaboration.
Usually community governed.
Apache, CC0, BSD, MIT,
Public Domain, Artistic
SSIMeetup.org
https://creativecommons.org/licenses/by-
sa/4.0/
Three Types of Licenses
2. Sharing with Rules:
Share-alike, including derivatives.
Respect the user, while allowing the
copyright holder a privileged position (a
competitive advantage).
Often vendor driven.
GPL, AGPL, CC-SA
SSIMeetup.org
https://creativecommons.org/licenses/by-
sa/4.0/
Three Types of Licenses
3. In-Between:
Share-alike changes to the received
work, but not to derivatives.
Respect the user, retain product control,
but allow adoption in a wide set of
derivatives.
LGPL, MPL
SSIMeetup.org
https://creativecommons.org/licenses/by-
sa/4.0/
Good Reads
Open Source and SSI
SSIMeetup.org
https://creativecommons.org/licenses/by-
sa/4.0/
Ten Principles of Self-Sovereign Identity
1. Users must have an independent existence.
2. Users must control their identities.
3. Users must have access to their own data.
4. Systems and algorithms must be transparent.
5. Identities must be long-lived.
6. Information and services about identity must be transportable.
7. Identities should be as widely used as possible.
8. Users must agree to the use of their identity.
9. Disclosure of claims must be minimized.
10. The rights of users must be protected.
Christopher Allen, 2016
http://www.lifewithalacrity.com/2016/04/the-path-to-self-soverereign-identity.html
A Brief Story
SSIMeetup.org
https://creativecommons.org/licenses/by-
sa/4.0/
Alice uses a proprietary SSI solution . . .
Alice Bob Soul-less
Mega-corp
SSIMeetup.org
https://creativecommons.org/licenses/by-
sa/4.0/
Alice uses a proprietary SSI solution . . .
Alice Bob Soul-less
Mega-corp
$$
SSIMeetup.org
https://creativecommons.org/licenses/by-
sa/4.0/
Alice uses a proprietary SSI solution . . .
Alice Bob Soul-less
Mega-corp
$$$$$$
X
SSIMeetup.org
https://creativecommons.org/licenses/by-
sa/4.0/
Alice uses an open SSI solution . . .
Alice Bob Soul-less
Mega-corp
SSIMeetup.org
https://creativecommons.org/licenses/by-
sa/4.0/
Alice uses an open SSI solution . . .
Alice Bob Soul-less
Mega-corp
$$
SSIMeetup.org
https://creativecommons.org/licenses/by-
sa/4.0/
Alice uses an open SSI solution . . .
Alice Bob Soul-less
Mega-corp
$$$$$$
SSIMeetup.org
https://creativecommons.org/licenses/by-
sa/4.0/
Alice uses an open SSI solution . . .
Alice Bob Soul-less
Mega-corp
$$$
$$$
Carol
$$
SSIMeetup.org
https://creativecommons.org/licenses/by-
sa/4.0/
More Than Code
SSIMeetup.org
https://creativecommons.org/licenses/by-
sa/4.0/
Creating Trust
Moral Pressure
Reputational Pressure
Institutional Pressure
Security Systems
Bruce Schneier, 2012
Liars and Outliers: Enabling the Trust that Society Needs to Thrive
The BLT
Business
Legal
Technical
Sovrin Trust Framework
Evernym’s Design Requirements
A reliable self-sovereign solution:
● Provides an open source option
● Implements open standards
● Is private by design
● And private by default
● Exists within a trust framework
https://creativecommons.org/lic
enses/by-sa/4.0/
Self-Sovereign Identity and
Open Source Software
Richard Esplin
Product Manager Evernym
Hyperledger Indy project and the Sovrin identity Network
November 12, 2018

More Related Content

What's hot

DID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
DID Resolution: Given a DID how do I retrieve its document? – Markus SabadelloDID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
DID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
SSIMeetup
 
Highlights of Internet Identity Workshop #28 with Drummond Reed
Highlights of Internet Identity Workshop #28 with Drummond ReedHighlights of Internet Identity Workshop #28 with Drummond Reed
Highlights of Internet Identity Workshop #28 with Drummond Reed
SSIMeetup
 
Solving compliance for crypto businesses using Decentralized Identity – Pelle...
Solving compliance for crypto businesses using Decentralized Identity – Pelle...Solving compliance for crypto businesses using Decentralized Identity – Pelle...
Solving compliance for crypto businesses using Decentralized Identity – Pelle...
SSIMeetup
 
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
SSIMeetup
 
Decentralized governance for SSI and Blockchains with Lawrence Lundy-Bryan
Decentralized governance for SSI and Blockchains with Lawrence Lundy-BryanDecentralized governance for SSI and Blockchains with Lawrence Lundy-Bryan
Decentralized governance for SSI and Blockchains with Lawrence Lundy-Bryan
SSIMeetup
 
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloIntroducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
SSIMeetup
 
Understanding the European Self-Sovereign Identity Framework (ESSIF)
Understanding the European Self-Sovereign Identity Framework (ESSIF)Understanding the European Self-Sovereign Identity Framework (ESSIF)
Understanding the European Self-Sovereign Identity Framework (ESSIF)
SSIMeetup
 
The Pan-Canadian Trust Framework (PCTF) for SSI
The Pan-Canadian Trust Framework (PCTF) for SSIThe Pan-Canadian Trust Framework (PCTF) for SSI
The Pan-Canadian Trust Framework (PCTF) for SSI
SSIMeetup
 
Decentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep diveDecentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep dive
SSIMeetup
 
SSI: The Trillion Dollar Business Opportunity
SSI: The Trillion Dollar Business OpportunitySSI: The Trillion Dollar Business Opportunity
SSI: The Trillion Dollar Business Opportunity
SSIMeetup
 
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
SSIMeetup
 
Streetcred: Improving the Developer Experience in SSI – Michael Boyd
Streetcred: Improving the Developer Experience in SSI – Michael BoydStreetcred: Improving the Developer Experience in SSI – Michael Boyd
Streetcred: Improving the Developer Experience in SSI – Michael Boyd
SSIMeetup
 
Identity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic ProtocolIdentity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic Protocol
SSIMeetup
 
Blockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain CredentialsBlockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain Credentials
SSIMeetup
 
The SSI Ecosystem in South Korea
The SSI Ecosystem in South KoreaThe SSI Ecosystem in South Korea
The SSI Ecosystem in South Korea
SSIMeetup
 
All you need to know about SSI for Corporates and IoT – Heather Vescent
All you need to know about SSI for Corporates and IoT – Heather VescentAll you need to know about SSI for Corporates and IoT – Heather Vescent
All you need to know about SSI for Corporates and IoT – Heather Vescent
Blockchain España
 
Verifiable Credentials 101 for SSI and Decentralized Digital Identity - Tyler...
Verifiable Credentials 101 for SSI and Decentralized Digital Identity - Tyler...Verifiable Credentials 101 for SSI and Decentralized Digital Identity - Tyler...
Verifiable Credentials 101 for SSI and Decentralized Digital Identity - Tyler...
SSIMeetup
 
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemseIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
SSIMeetup
 
The 2nd Official W3C DID Working Group Meeting (The Netherlands)
The 2nd Official W3C DID Working Group Meeting (The Netherlands)The 2nd Official W3C DID Working Group Meeting (The Netherlands)
The 2nd Official W3C DID Working Group Meeting (The Netherlands)
SSIMeetup
 
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSelf-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
SSIMeetup
 

What's hot (20)

DID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
DID Resolution: Given a DID how do I retrieve its document? – Markus SabadelloDID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
DID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
 
Highlights of Internet Identity Workshop #28 with Drummond Reed
Highlights of Internet Identity Workshop #28 with Drummond ReedHighlights of Internet Identity Workshop #28 with Drummond Reed
Highlights of Internet Identity Workshop #28 with Drummond Reed
 
Solving compliance for crypto businesses using Decentralized Identity – Pelle...
Solving compliance for crypto businesses using Decentralized Identity – Pelle...Solving compliance for crypto businesses using Decentralized Identity – Pelle...
Solving compliance for crypto businesses using Decentralized Identity – Pelle...
 
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
 
Decentralized governance for SSI and Blockchains with Lawrence Lundy-Bryan
Decentralized governance for SSI and Blockchains with Lawrence Lundy-BryanDecentralized governance for SSI and Blockchains with Lawrence Lundy-Bryan
Decentralized governance for SSI and Blockchains with Lawrence Lundy-Bryan
 
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloIntroducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
 
Understanding the European Self-Sovereign Identity Framework (ESSIF)
Understanding the European Self-Sovereign Identity Framework (ESSIF)Understanding the European Self-Sovereign Identity Framework (ESSIF)
Understanding the European Self-Sovereign Identity Framework (ESSIF)
 
The Pan-Canadian Trust Framework (PCTF) for SSI
The Pan-Canadian Trust Framework (PCTF) for SSIThe Pan-Canadian Trust Framework (PCTF) for SSI
The Pan-Canadian Trust Framework (PCTF) for SSI
 
Decentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep diveDecentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep dive
 
SSI: The Trillion Dollar Business Opportunity
SSI: The Trillion Dollar Business OpportunitySSI: The Trillion Dollar Business Opportunity
SSI: The Trillion Dollar Business Opportunity
 
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
 
Streetcred: Improving the Developer Experience in SSI – Michael Boyd
Streetcred: Improving the Developer Experience in SSI – Michael BoydStreetcred: Improving the Developer Experience in SSI – Michael Boyd
Streetcred: Improving the Developer Experience in SSI – Michael Boyd
 
Identity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic ProtocolIdentity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic Protocol
 
Blockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain CredentialsBlockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain Credentials
 
The SSI Ecosystem in South Korea
The SSI Ecosystem in South KoreaThe SSI Ecosystem in South Korea
The SSI Ecosystem in South Korea
 
All you need to know about SSI for Corporates and IoT – Heather Vescent
All you need to know about SSI for Corporates and IoT – Heather VescentAll you need to know about SSI for Corporates and IoT – Heather Vescent
All you need to know about SSI for Corporates and IoT – Heather Vescent
 
Verifiable Credentials 101 for SSI and Decentralized Digital Identity - Tyler...
Verifiable Credentials 101 for SSI and Decentralized Digital Identity - Tyler...Verifiable Credentials 101 for SSI and Decentralized Digital Identity - Tyler...
Verifiable Credentials 101 for SSI and Decentralized Digital Identity - Tyler...
 
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemseIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
 
The 2nd Official W3C DID Working Group Meeting (The Netherlands)
The 2nd Official W3C DID Working Group Meeting (The Netherlands)The 2nd Official W3C DID Working Group Meeting (The Netherlands)
The 2nd Official W3C DID Working Group Meeting (The Netherlands)
 
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSelf-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
 

Similar to Self-Sovereign Identity (SSI) and Open Source - Richard Esplin

Introduction To Open Web Protocols
Introduction To Open Web ProtocolsIntroduction To Open Web Protocols
Introduction To Open Web Protocols
Mohan Krishnan
 
Building SSI Products: A Guide for Product Managers
Building SSI Products: A Guide for Product ManagersBuilding SSI Products: A Guide for Product Managers
Building SSI Products: A Guide for Product Managers
SSIMeetup
 
Kiva protocol: building the credit bureau of the future using SSI
Kiva protocol: building the credit bureau of the future using SSIKiva protocol: building the credit bureau of the future using SSI
Kiva protocol: building the credit bureau of the future using SSI
SSIMeetup
 
GSP East 2008: Open Social: Open For Business
GSP East 2008: Open Social: Open For BusinessGSP East 2008: Open Social: Open For Business
GSP East 2008: Open Social: Open For Business
Patrick Chanezon
 
ITAM UK 2017 Open source alternatives_John Springall
ITAM UK 2017 Open source alternatives_John Springall ITAM UK 2017 Open source alternatives_John Springall
ITAM UK 2017 Open source alternatives_John Springall
Martin Thompson
 
Open Source SW Business
Open Source SW Business Open Source SW Business
Open Source SW Business
SANGHEE SHIN
 
061203_futurewebapps_tempo
061203_futurewebapps_tempo061203_futurewebapps_tempo
061203_futurewebapps_tempo
cjin cheng
 
Open Source & What It Means For Self-Sovereign Identity (SSI)
Open Source & What It Means For Self-Sovereign Identity (SSI)Open Source & What It Means For Self-Sovereign Identity (SSI)
Open Source & What It Means For Self-Sovereign Identity (SSI)
Evernym
 
09 Myths About Open Source Software
09 Myths About Open Source Software09 Myths About Open Source Software
09 Myths About Open Source Software
Suyati Technologies
 
OpenChain Webinar #11 - cii-bp-badge-intro
OpenChain Webinar #11 - cii-bp-badge-introOpenChain Webinar #11 - cii-bp-badge-intro
OpenChain Webinar #11 - cii-bp-badge-intro
Shane Coughlan
 
Open Source vs Proprietary
Open Source vs ProprietaryOpen Source vs Proprietary
Open Source vs Proprietary
M. Antoinette Jerom
 
The Open Web
The Open WebThe Open Web
The Open Web
Lachlan Hardy
 
The Big Picture of Agile: How to Pitch the Agile Mindset to Stakeholders
The Big Picture of Agile: How to Pitch the Agile Mindset to StakeholdersThe Big Picture of Agile: How to Pitch the Agile Mindset to Stakeholders
The Big Picture of Agile: How to Pitch the Agile Mindset to Stakeholders
Stefan Wolpers
 
Introducing OpenAthens Cloud for content providers
Introducing OpenAthens Cloud for content providersIntroducing OpenAthens Cloud for content providers
Introducing OpenAthens Cloud for content providers
OpenAthens
 
The Case For Next Generation IAM
The Case For Next Generation IAM The Case For Next Generation IAM
The Case For Next Generation IAM
Patrick Harding
 
Synopsys Security Event Israel Presentation: New AppSec Paradigms with Open S...
Synopsys Security Event Israel Presentation: New AppSec Paradigms with Open S...Synopsys Security Event Israel Presentation: New AppSec Paradigms with Open S...
Synopsys Security Event Israel Presentation: New AppSec Paradigms with Open S...
Synopsys Software Integrity Group
 
Open source software
Open source softwareOpen source software
Open source software
jaimeacurry
 
BarCamp KL H20 Open Social Hackathon
BarCamp KL H20 Open Social HackathonBarCamp KL H20 Open Social Hackathon
BarCamp KL H20 Open Social Hackathon
marvin337
 
Licenses, Contributions, Support or the lack thereof
Licenses, Contributions, Support or the lack thereofLicenses, Contributions, Support or the lack thereof
Licenses, Contributions, Support or the lack thereof
Alexander Graebe
 
20190523 archiver fim
20190523 archiver fim20190523 archiver fim
20190523 archiver fim
Archiver
 

Similar to Self-Sovereign Identity (SSI) and Open Source - Richard Esplin (20)

Introduction To Open Web Protocols
Introduction To Open Web ProtocolsIntroduction To Open Web Protocols
Introduction To Open Web Protocols
 
Building SSI Products: A Guide for Product Managers
Building SSI Products: A Guide for Product ManagersBuilding SSI Products: A Guide for Product Managers
Building SSI Products: A Guide for Product Managers
 
Kiva protocol: building the credit bureau of the future using SSI
Kiva protocol: building the credit bureau of the future using SSIKiva protocol: building the credit bureau of the future using SSI
Kiva protocol: building the credit bureau of the future using SSI
 
GSP East 2008: Open Social: Open For Business
GSP East 2008: Open Social: Open For BusinessGSP East 2008: Open Social: Open For Business
GSP East 2008: Open Social: Open For Business
 
ITAM UK 2017 Open source alternatives_John Springall
ITAM UK 2017 Open source alternatives_John Springall ITAM UK 2017 Open source alternatives_John Springall
ITAM UK 2017 Open source alternatives_John Springall
 
Open Source SW Business
Open Source SW Business Open Source SW Business
Open Source SW Business
 
061203_futurewebapps_tempo
061203_futurewebapps_tempo061203_futurewebapps_tempo
061203_futurewebapps_tempo
 
Open Source & What It Means For Self-Sovereign Identity (SSI)
Open Source & What It Means For Self-Sovereign Identity (SSI)Open Source & What It Means For Self-Sovereign Identity (SSI)
Open Source & What It Means For Self-Sovereign Identity (SSI)
 
09 Myths About Open Source Software
09 Myths About Open Source Software09 Myths About Open Source Software
09 Myths About Open Source Software
 
OpenChain Webinar #11 - cii-bp-badge-intro
OpenChain Webinar #11 - cii-bp-badge-introOpenChain Webinar #11 - cii-bp-badge-intro
OpenChain Webinar #11 - cii-bp-badge-intro
 
Open Source vs Proprietary
Open Source vs ProprietaryOpen Source vs Proprietary
Open Source vs Proprietary
 
The Open Web
The Open WebThe Open Web
The Open Web
 
The Big Picture of Agile: How to Pitch the Agile Mindset to Stakeholders
The Big Picture of Agile: How to Pitch the Agile Mindset to StakeholdersThe Big Picture of Agile: How to Pitch the Agile Mindset to Stakeholders
The Big Picture of Agile: How to Pitch the Agile Mindset to Stakeholders
 
Introducing OpenAthens Cloud for content providers
Introducing OpenAthens Cloud for content providersIntroducing OpenAthens Cloud for content providers
Introducing OpenAthens Cloud for content providers
 
The Case For Next Generation IAM
The Case For Next Generation IAM The Case For Next Generation IAM
The Case For Next Generation IAM
 
Synopsys Security Event Israel Presentation: New AppSec Paradigms with Open S...
Synopsys Security Event Israel Presentation: New AppSec Paradigms with Open S...Synopsys Security Event Israel Presentation: New AppSec Paradigms with Open S...
Synopsys Security Event Israel Presentation: New AppSec Paradigms with Open S...
 
Open source software
Open source softwareOpen source software
Open source software
 
BarCamp KL H20 Open Social Hackathon
BarCamp KL H20 Open Social HackathonBarCamp KL H20 Open Social Hackathon
BarCamp KL H20 Open Social Hackathon
 
Licenses, Contributions, Support or the lack thereof
Licenses, Contributions, Support or the lack thereofLicenses, Contributions, Support or the lack thereof
Licenses, Contributions, Support or the lack thereof
 
20190523 archiver fim
20190523 archiver fim20190523 archiver fim
20190523 archiver fim
 

More from SSIMeetup

ZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSIZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSI
SSIMeetup
 
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
SSIMeetup
 
Value proposition of SSI tech providers - Self-Sovereign Identity
Value proposition of SSI tech providers - Self-Sovereign IdentityValue proposition of SSI tech providers - Self-Sovereign Identity
Value proposition of SSI tech providers - Self-Sovereign Identity
SSIMeetup
 
SSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley HughesSSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley Hughes
SSIMeetup
 
Web5 - Open to Build - Block-TBD
Web5 - Open to Build - Block-TBDWeb5 - Open to Build - Block-TBD
Web5 - Open to Build - Block-TBD
SSIMeetup
 
Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...
SSIMeetup
 
PharmaLedger: A Digital Trust Ecosystem for Healthcare
PharmaLedger: A Digital Trust Ecosystem for HealthcarePharmaLedger: A Digital Trust Ecosystem for Healthcare
PharmaLedger: A Digital Trust Ecosystem for Healthcare
SSIMeetup
 
Cheqd: Making privacy-preserving digital credentials fun
Cheqd: Making privacy-preserving digital credentials funCheqd: Making privacy-preserving digital credentials fun
Cheqd: Making privacy-preserving digital credentials fun
SSIMeetup
 
PolygonID Zero-Knowledge Identity Web2 & Web3
PolygonID Zero-Knowledge Identity Web2 & Web3PolygonID Zero-Knowledge Identity Web2 & Web3
PolygonID Zero-Knowledge Identity Web2 & Web3
SSIMeetup
 
Learn about the Trust Over IP (ToIP) stack
Learn about the Trust Over IP (ToIP) stackLearn about the Trust Over IP (ToIP) stack
Learn about the Trust Over IP (ToIP) stack
SSIMeetup
 
How to avoid another identity nightmare with SSI? Christopher Allen
How to avoid another identity nightmare with SSI? Christopher AllenHow to avoid another identity nightmare with SSI? Christopher Allen
How to avoid another identity nightmare with SSI? Christopher Allen
SSIMeetup
 
Explaining SSI to C-suite executives, and anyone else for that matter
Explaining SSI to C-suite executives, and anyone else for that matterExplaining SSI to C-suite executives, and anyone else for that matter
Explaining SSI to C-suite executives, and anyone else for that matter
SSIMeetup
 
The Hyperledger Indy Public Blockchain Node
The Hyperledger Indy Public Blockchain NodeThe Hyperledger Indy Public Blockchain Node
The Hyperledger Indy Public Blockchain Node
SSIMeetup
 
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
SSIMeetup
 
Internet Identity Workshop #29 highlights with Drummond Reed
Internet Identity Workshop #29 highlights with Drummond ReedInternet Identity Workshop #29 highlights with Drummond Reed
Internet Identity Workshop #29 highlights with Drummond Reed
SSIMeetup
 
The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...
The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...
The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...
SSIMeetup
 

More from SSIMeetup (16)

ZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSIZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSI
 
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
 
Value proposition of SSI tech providers - Self-Sovereign Identity
Value proposition of SSI tech providers - Self-Sovereign IdentityValue proposition of SSI tech providers - Self-Sovereign Identity
Value proposition of SSI tech providers - Self-Sovereign Identity
 
SSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley HughesSSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley Hughes
 
Web5 - Open to Build - Block-TBD
Web5 - Open to Build - Block-TBDWeb5 - Open to Build - Block-TBD
Web5 - Open to Build - Block-TBD
 
Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...
 
PharmaLedger: A Digital Trust Ecosystem for Healthcare
PharmaLedger: A Digital Trust Ecosystem for HealthcarePharmaLedger: A Digital Trust Ecosystem for Healthcare
PharmaLedger: A Digital Trust Ecosystem for Healthcare
 
Cheqd: Making privacy-preserving digital credentials fun
Cheqd: Making privacy-preserving digital credentials funCheqd: Making privacy-preserving digital credentials fun
Cheqd: Making privacy-preserving digital credentials fun
 
PolygonID Zero-Knowledge Identity Web2 & Web3
PolygonID Zero-Knowledge Identity Web2 & Web3PolygonID Zero-Knowledge Identity Web2 & Web3
PolygonID Zero-Knowledge Identity Web2 & Web3
 
Learn about the Trust Over IP (ToIP) stack
Learn about the Trust Over IP (ToIP) stackLearn about the Trust Over IP (ToIP) stack
Learn about the Trust Over IP (ToIP) stack
 
How to avoid another identity nightmare with SSI? Christopher Allen
How to avoid another identity nightmare with SSI? Christopher AllenHow to avoid another identity nightmare with SSI? Christopher Allen
How to avoid another identity nightmare with SSI? Christopher Allen
 
Explaining SSI to C-suite executives, and anyone else for that matter
Explaining SSI to C-suite executives, and anyone else for that matterExplaining SSI to C-suite executives, and anyone else for that matter
Explaining SSI to C-suite executives, and anyone else for that matter
 
The Hyperledger Indy Public Blockchain Node
The Hyperledger Indy Public Blockchain NodeThe Hyperledger Indy Public Blockchain Node
The Hyperledger Indy Public Blockchain Node
 
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
 
Internet Identity Workshop #29 highlights with Drummond Reed
Internet Identity Workshop #29 highlights with Drummond ReedInternet Identity Workshop #29 highlights with Drummond Reed
Internet Identity Workshop #29 highlights with Drummond Reed
 
The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...
The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...
The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...
 

Recently uploaded

快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
APNIC
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
thezot
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
APNIC
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 

Recently uploaded (12)

快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 

Self-Sovereign Identity (SSI) and Open Source - Richard Esplin

  • 1. https://creativecommons.org/lic enses/by-sa/4.0/ Self-Sovereign Identity and Open Source Software Richard Esplin Product Manager Evernym Hyperledger Indy project and the Sovrin identity Network November 12, 2018
  • 2. 1. Empower global SSI communities 2. Open to everyone interested in SSI 3. All content is shared with CC BY SA SSIMeetup.org Alex Preukschat @SSIMeetup @AlexPreukschat Coordinating Node SSIMeetup.org https://creativecommons.org/licenses/by-sa/4.0/ SSIMeetup objectives
  • 3.
  • 4. What is Self Sovereign Identity? SSIMeetup.org https://creativecommons.org/licenses/by- sa/4.0/
  • 7. Also Known As User-Centric Identity User-Controlled Identity User-Owned Identity Bring Your Own Identity SSIMeetup.org https://creativecommons.org/licenses/by- sa/4.0/
  • 8. A Brief History of Open Source SSIMeetup.org https://creativecommons.org/licenses/by- sa/4.0/
  • 9. Sharing Early Software The money is in the hardware, so why bother protecting software? SSIMeetup.org https://creativecommons.org/licenses/by- sa/4.0/
  • 10. Unix Culture Software isn’t our business. Unix is academic. Sharing gets things done.
  • 11. Homebrew Hobbyist exploring the limits of computing. Bill Gates: Sharing software is theft.
  • 12. Free Software Free as in Freedom. (Free as in Speech.) Sharing is a moral duty. Proprietary software keeps users divided and helpless. Proprietary software does not allow users to have control of their computing. Copyleft: hack copyright to enforce sharing.
  • 13. Open Source Open source is better engineering. With many eyes, all bugs are shallow. Scratch your own itch. Don’t reinvent the wheel. Collaboration is fun.
  • 14. Open Culture Art and media Legal access Scientific data access Scientific hardware Bio-hacking Maker movement SSIMeetup.org https://creativecommons.org/licenses/by- sa/4.0/
  • 16. Free Software Open Source Software Libre Software SSIMeetup.org https://creativecommons.org/licenses/by- sa/4.0/
  • 17. The Four Freedoms 0. Run the program for any purpose. 1. Study how the program works. 2. Redistribute the program. 3. Improve the program, and redistribute the improvements.
  • 18. Open Source Definition 1. Free Redistribution 2. Source Code Availability 3. Derived Works Allowed 4. Integrity of the Author’s Source Code 5. No Discrimination Against Persons or Groups 6. No Discrimination Against Fields of Endeavor 7. Distribution of License 8. License Must Not Be Specific to a Product 9. License Must Not Restrict Other Software 10. License Must Be Technology-Neutral SSIMeetup.org https://creativecommons.org/licenses/by- sa/4.0/
  • 19. Commercial Open Source Provides customers with: ● A focus on support ● Vendor independence ● Vendor risk mitigation ● An improved negotiating position ● Compliance with policy ● Fast adoption (no purchase necessary!) ● An ancillary social benefit And has a reputation for: ● Low price ● Security ● Innovation ● Transparency ● Interoperability SSIMeetup.org https://creativecommons.org/licenses/by- sa/4.0/
  • 20. Three Types of Licenses 1. Gift: Apache 2. Sharing with Rules: GPL 3. In-Between: LGPL Bruce Perens, 2009 https://www.datamation.com/osrc/article.php/3803101/Bruce-Perens-How-Many-Open-Source-Licenses-Do-You-Need.htm
  • 21. Three Types of Licenses 1. Gift: Maximize adoption, standards, and collaboration. Usually community governed. Apache, CC0, BSD, MIT, Public Domain, Artistic SSIMeetup.org https://creativecommons.org/licenses/by- sa/4.0/
  • 22. Three Types of Licenses 2. Sharing with Rules: Share-alike, including derivatives. Respect the user, while allowing the copyright holder a privileged position (a competitive advantage). Often vendor driven. GPL, AGPL, CC-SA SSIMeetup.org https://creativecommons.org/licenses/by- sa/4.0/
  • 23. Three Types of Licenses 3. In-Between: Share-alike changes to the received work, but not to derivatives. Respect the user, retain product control, but allow adoption in a wide set of derivatives. LGPL, MPL SSIMeetup.org https://creativecommons.org/licenses/by- sa/4.0/
  • 25. Open Source and SSI SSIMeetup.org https://creativecommons.org/licenses/by- sa/4.0/
  • 26. Ten Principles of Self-Sovereign Identity 1. Users must have an independent existence. 2. Users must control their identities. 3. Users must have access to their own data. 4. Systems and algorithms must be transparent. 5. Identities must be long-lived. 6. Information and services about identity must be transportable. 7. Identities should be as widely used as possible. 8. Users must agree to the use of their identity. 9. Disclosure of claims must be minimized. 10. The rights of users must be protected. Christopher Allen, 2016 http://www.lifewithalacrity.com/2016/04/the-path-to-self-soverereign-identity.html
  • 28. Alice uses a proprietary SSI solution . . . Alice Bob Soul-less Mega-corp SSIMeetup.org https://creativecommons.org/licenses/by- sa/4.0/
  • 29. Alice uses a proprietary SSI solution . . . Alice Bob Soul-less Mega-corp $$ SSIMeetup.org https://creativecommons.org/licenses/by- sa/4.0/
  • 30. Alice uses a proprietary SSI solution . . . Alice Bob Soul-less Mega-corp $$$$$$ X SSIMeetup.org https://creativecommons.org/licenses/by- sa/4.0/
  • 31. Alice uses an open SSI solution . . . Alice Bob Soul-less Mega-corp SSIMeetup.org https://creativecommons.org/licenses/by- sa/4.0/
  • 32. Alice uses an open SSI solution . . . Alice Bob Soul-less Mega-corp $$ SSIMeetup.org https://creativecommons.org/licenses/by- sa/4.0/
  • 33. Alice uses an open SSI solution . . . Alice Bob Soul-less Mega-corp $$$$$$ SSIMeetup.org https://creativecommons.org/licenses/by- sa/4.0/
  • 34. Alice uses an open SSI solution . . . Alice Bob Soul-less Mega-corp $$$ $$$ Carol $$ SSIMeetup.org https://creativecommons.org/licenses/by- sa/4.0/
  • 36. Creating Trust Moral Pressure Reputational Pressure Institutional Pressure Security Systems Bruce Schneier, 2012 Liars and Outliers: Enabling the Trust that Society Needs to Thrive
  • 39. Evernym’s Design Requirements A reliable self-sovereign solution: ● Provides an open source option ● Implements open standards ● Is private by design ● And private by default ● Exists within a trust framework
  • 40. https://creativecommons.org/lic enses/by-sa/4.0/ Self-Sovereign Identity and Open Source Software Richard Esplin Product Manager Evernym Hyperledger Indy project and the Sovrin identity Network November 12, 2018