https://ssimeetup.org/did-report-1-first-official-w3c-did-working-group-meeting-japan-drummond-reed-webinar-36/
The DID Report 1 about the First Meeting of the New W3C DID Working Group with Drummond Reed, co-author of the W3C DID specification, and Markus Sabadello from Danube Tech. Headline news in SSI land: this month W3C members approved forming a full W3C Working Group for Decentralized Identifiers (DIDs).
DID spec co-author Drummond Reed has been in Fukuoka Japan for the first official meeting of this new Working Group and he will share highlights of the meeting and the roadmap for taking DIDs to a full Web standard.
OpenID for Verifiable Credentials is a family of protocols supporting implementation of applications with Verifiable Credentials, i.e. verifiable credential issuance, credential presentation, and pseudonyms authentication.
W3C - Web Authentication API by Korea ETRI (Electronics and Telecommunication Research Institute)
- Presented at FIDO Technical Seminar on July 16th, 2018
OpenID Connect 4 SSI is an initiative conducted at OpenID Foundation in liaison with the Decentralized Identity Foundation. It aims at specifying a set of protocols based on OpenID Connect to enable SSI applications.
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...SSIMeetup
Drummond Reed, Chief Trust Officer at Evernym, will explain in our second Webinar "Decentralized Identifiers (DIDs) - Building Block of Self-Sovereign Identity (SSI)" giving us the background on how DIDs work, where they come from and why they are important for Blockchain based Digital Identity.
This presentation gives an overview on the work that is going on at OpenID Foundation in Liaison with Decentralized Identity Foundation to enable SSI applications based on OpenID Connect.
OpenID for Verifiable Credentials is a family of protocols supporting implementation of applications with Verifiable Credentials, i.e. verifiable credential issuance, credential presentation, and pseudonyms authentication.
W3C - Web Authentication API by Korea ETRI (Electronics and Telecommunication Research Institute)
- Presented at FIDO Technical Seminar on July 16th, 2018
OpenID Connect 4 SSI is an initiative conducted at OpenID Foundation in liaison with the Decentralized Identity Foundation. It aims at specifying a set of protocols based on OpenID Connect to enable SSI applications.
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...SSIMeetup
Drummond Reed, Chief Trust Officer at Evernym, will explain in our second Webinar "Decentralized Identifiers (DIDs) - Building Block of Self-Sovereign Identity (SSI)" giving us the background on how DIDs work, where they come from and why they are important for Blockchain based Digital Identity.
This presentation gives an overview on the work that is going on at OpenID Foundation in Liaison with Decentralized Identity Foundation to enable SSI applications based on OpenID Connect.
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...Torsten Lodderstedt
This deck gives an overview of OpenID 4 Verifiable Credentials and shows how the specs can be tailored to the needs of a certain category of projects/ecosystems.
OpenID Connect 4 SSI aims at specifying a set of protocols based on OpenID Connect to enable SSI applications. The initiative is conducted at OpenID Foundation in liaison with the Decentralized Identity Foundation (DIF). One of the specifications is built up on DID-SIOP in DIDAuth WG in DIF and SIOP v1 in OIDC Core.
What is a Verifiable Credential, and Why Does it Matter?
https://identiverse.com/idv2022/session/841421/
"A verifiable credential (VC) is an assertion with a secret weapon – called a verifiable presentation (VP). VCs and VPs are unique in that they enable users to directly hold and present claims about themselves, issued by many different authorities. This is an important addition to the domain-relative credentials that are presented today as part of federated sign-in or SSO contexts. You may ask – why is that direct presentation important? Kristina Yasuda will talk through how VCs and VPs work, what makes VCs different from common federated credentials, and what VCs could change about how we interact with data in the future."
Slides from the session about the emerging work on extending OpenID Connect for requesting and presenting Verifiable Credentials and Verifiable Presentations
EUDI wallets with OpenID for verifiable credentials (OID4VCI/OID4VP)Lal Chandran
This is a paper presentation on EUDI wallets with OpenID for verifiable credentials (OID4VCI and OID4VP) published at https://igrant.io/papers/EUDI-Wallets-with-OID4VCI_OID4VP_v1.0.pdf. or https://docs.igrant.io/concepts/openID4vc/.
The paper extensively explores OpenID protocols harnessing the power of Verifiable Credentials, shedding light on the intricacies of these cutting-edge technologies. We delve into the realm of OpenID for Verifiable Credentials, delving into protocols such as Self-Issued OpenID Provider V2 (SIOPv2), Verifiable Credential Issuance (OID4VCI), and OpenID for Verifiable Presentations (OID4VP). These protocols are pivotal in bolstering privacy and strengthening digital identity in the modern age.
Throughout the paper, we showcase the transformative potential of these protocols, emphasising their crucial contributions to the ever-evolving landscape of digital wallets. Real-world scenarios are presented to illustrate the critical values of OID4VCI and OID4VP vividly. These scenarios serve as compelling examples of how these technologies can shape the future of digital identity, enhancing security and privacy while ensuring the seamless flow of information.
The paper spotlights the innovative European Union Digital Identity (EUDI) Wallets, a beacon of pioneering digital identity solutions. By bridging the gap between legacy eIDAS systems and SAML, EUDI Wallets pave the way for a secure and user-friendly digital identity ecosystem.
Key aspects covered in this paper include the authentication workflow, security measures like signatures and encryption, and the seamless passage of parameters within the EUDI Wallets ecosystem. By presenting these insights, we aim to highlight the substantial progress in digital identity and the role of OpenID protocols leveraging Verifiable Credentials in this ongoing revolution.
In summary, this paper serves as a comprehensive guide to understanding the significance of OpenID protocols in Verifiable Credentials. It explores their practical applications and transformative potential in shaping the future of digital identity. The research underscores the critical roles of OID4VCI and OID4VP in enhancing privacy and security while emphasising their vital contributions to the digital wallet landscape, specifically focusing on the innovative EUDI Wallets within the European Union.
Self-issued OpenID Provider_OpenID Foundation Virtual Workshop Kristina Yasuda
Presentation I gave on Self-Issued OpenID Provider during the second OpenID Foundation Virtual Workshop covering:
1. What is Self-Issued OpenID Provider (SIOP) ?
2. SIOP Requirements (draft)
3. Initial discussion points deep-dive
Self-Issued OpenID Providers are personal OpenID Providers that issue self-signed ID Tokens, enabling portability of the identities among providers
Verifiable Credentials for Travel & HospitalityEvernym
In this webinar, Evernym's Jamie Smith and Andrew Tobin discuss how verifiable credentials and digital wallets can reduce fraud, automate workflows, and transform customer experiences across the travel and hospitality industries.
Presented at GSMA Mobile Connect + FIDO Alliance: The Future of Strong Authentication
By: Rolf Lindemann, Senior Director of Technology and Products, Nok Nok Labs
Internet Identity Workshop #29 highlights with Drummond ReedSSIMeetup
https://ssimeetup.org/highlights-internet-identity-workshop-29-drummond-reed-autumn-2019-webinar-38/
SSI Meetup veteran Drummond Reed, Chief Trust Officer at Evernym and Trustee at the Sovrin Foundation, will cover the highlights of the latest edition of the longest-running conference in the Internet identity space—Internet Identity Workshop. Drummond has attended all 29 IIWs, and he will share his major takeaways from this gathering of the movers and shakers in SSI from around the world in the autumn of 2019.
Highlights of Internet Identity Workshop #28 with Drummond ReedSSIMeetup
https://ssimeetup.org/highlights-internet-identity-workshop-28-drummond-reed-ssi-meetup-one-year-anniversary-special-webinar-27/
SSI Meetup veteran Drummond Reed, Chief Trust Officer at Evernym and Trustee at the Sovrin Foundation, will cover the highlights of the latest edition of the longest-running conference in the Internet identity space—Internet Identity Workshop. Drummond has attended all 28 IIWs, and he will share his major takeaways from this gathering of the movers and shakers in SSI from around the world to celebrate SSIMeetup’s one year anniversary.
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...Torsten Lodderstedt
This deck gives an overview of OpenID 4 Verifiable Credentials and shows how the specs can be tailored to the needs of a certain category of projects/ecosystems.
OpenID Connect 4 SSI aims at specifying a set of protocols based on OpenID Connect to enable SSI applications. The initiative is conducted at OpenID Foundation in liaison with the Decentralized Identity Foundation (DIF). One of the specifications is built up on DID-SIOP in DIDAuth WG in DIF and SIOP v1 in OIDC Core.
What is a Verifiable Credential, and Why Does it Matter?
https://identiverse.com/idv2022/session/841421/
"A verifiable credential (VC) is an assertion with a secret weapon – called a verifiable presentation (VP). VCs and VPs are unique in that they enable users to directly hold and present claims about themselves, issued by many different authorities. This is an important addition to the domain-relative credentials that are presented today as part of federated sign-in or SSO contexts. You may ask – why is that direct presentation important? Kristina Yasuda will talk through how VCs and VPs work, what makes VCs different from common federated credentials, and what VCs could change about how we interact with data in the future."
Slides from the session about the emerging work on extending OpenID Connect for requesting and presenting Verifiable Credentials and Verifiable Presentations
EUDI wallets with OpenID for verifiable credentials (OID4VCI/OID4VP)Lal Chandran
This is a paper presentation on EUDI wallets with OpenID for verifiable credentials (OID4VCI and OID4VP) published at https://igrant.io/papers/EUDI-Wallets-with-OID4VCI_OID4VP_v1.0.pdf. or https://docs.igrant.io/concepts/openID4vc/.
The paper extensively explores OpenID protocols harnessing the power of Verifiable Credentials, shedding light on the intricacies of these cutting-edge technologies. We delve into the realm of OpenID for Verifiable Credentials, delving into protocols such as Self-Issued OpenID Provider V2 (SIOPv2), Verifiable Credential Issuance (OID4VCI), and OpenID for Verifiable Presentations (OID4VP). These protocols are pivotal in bolstering privacy and strengthening digital identity in the modern age.
Throughout the paper, we showcase the transformative potential of these protocols, emphasising their crucial contributions to the ever-evolving landscape of digital wallets. Real-world scenarios are presented to illustrate the critical values of OID4VCI and OID4VP vividly. These scenarios serve as compelling examples of how these technologies can shape the future of digital identity, enhancing security and privacy while ensuring the seamless flow of information.
The paper spotlights the innovative European Union Digital Identity (EUDI) Wallets, a beacon of pioneering digital identity solutions. By bridging the gap between legacy eIDAS systems and SAML, EUDI Wallets pave the way for a secure and user-friendly digital identity ecosystem.
Key aspects covered in this paper include the authentication workflow, security measures like signatures and encryption, and the seamless passage of parameters within the EUDI Wallets ecosystem. By presenting these insights, we aim to highlight the substantial progress in digital identity and the role of OpenID protocols leveraging Verifiable Credentials in this ongoing revolution.
In summary, this paper serves as a comprehensive guide to understanding the significance of OpenID protocols in Verifiable Credentials. It explores their practical applications and transformative potential in shaping the future of digital identity. The research underscores the critical roles of OID4VCI and OID4VP in enhancing privacy and security while emphasising their vital contributions to the digital wallet landscape, specifically focusing on the innovative EUDI Wallets within the European Union.
Self-issued OpenID Provider_OpenID Foundation Virtual Workshop Kristina Yasuda
Presentation I gave on Self-Issued OpenID Provider during the second OpenID Foundation Virtual Workshop covering:
1. What is Self-Issued OpenID Provider (SIOP) ?
2. SIOP Requirements (draft)
3. Initial discussion points deep-dive
Self-Issued OpenID Providers are personal OpenID Providers that issue self-signed ID Tokens, enabling portability of the identities among providers
Verifiable Credentials for Travel & HospitalityEvernym
In this webinar, Evernym's Jamie Smith and Andrew Tobin discuss how verifiable credentials and digital wallets can reduce fraud, automate workflows, and transform customer experiences across the travel and hospitality industries.
Presented at GSMA Mobile Connect + FIDO Alliance: The Future of Strong Authentication
By: Rolf Lindemann, Senior Director of Technology and Products, Nok Nok Labs
Internet Identity Workshop #29 highlights with Drummond ReedSSIMeetup
https://ssimeetup.org/highlights-internet-identity-workshop-29-drummond-reed-autumn-2019-webinar-38/
SSI Meetup veteran Drummond Reed, Chief Trust Officer at Evernym and Trustee at the Sovrin Foundation, will cover the highlights of the latest edition of the longest-running conference in the Internet identity space—Internet Identity Workshop. Drummond has attended all 29 IIWs, and he will share his major takeaways from this gathering of the movers and shakers in SSI from around the world in the autumn of 2019.
Highlights of Internet Identity Workshop #28 with Drummond ReedSSIMeetup
https://ssimeetup.org/highlights-internet-identity-workshop-28-drummond-reed-ssi-meetup-one-year-anniversary-special-webinar-27/
SSI Meetup veteran Drummond Reed, Chief Trust Officer at Evernym and Trustee at the Sovrin Foundation, will cover the highlights of the latest edition of the longest-running conference in the Internet identity space—Internet Identity Workshop. Drummond has attended all 28 IIWs, and he will share his major takeaways from this gathering of the movers and shakers in SSI from around the world to celebrate SSIMeetup’s one year anniversary.
Decentralized Identifier (DIDs) fundamentals deep diveSSIMeetup
https://ssimeetup.org/decentralized-identifiers-dids-fundamentals-identitybook-info-drummond-reed-markus-sabadello-webinar-46/
Decentralized identifiers (abbreviated as “DIDs”), are the cryptographic counterpart to verifiable credentials (VCs) that together are the “twin pillars” of SSI architecture. In this special IdentityBook.info webinar Markus Sabadello, Founder and CEO of Danube Tech, and Drummond Reed, Chief Trust Officer at Evernym, co-authors of the DID chapter of the “Self-Sovereign Identity:
Decentralized Digital Identity and Verifiable Credentials” book published by Manning will explain all the fundamentals of DIDs. Based on the did chapter of the book, you will learn how DIDs evolved from the work started with VCs, how they are related to URLs and URNs, why a new type of cryptographically-verifiable identifier is needed for SSI, and how DIDs are being standardized at World Wide Web Consortium (W3C). Your guides will be two of the editors of the W3C Decentralized Identifier 1.0 specification: Markus Sabadello and Drummond Reed.
Self Sovereign Identity (SSI) Open standards with Drummond Reed SSIMeetup
Drummond Reed, Chief Trust Officer at Evernym and Sovrin Foundation Trustee, features in our first Webinar "The Story of SSI Open Standards" by giving us the background on the foundation of Self Sovereign Identity. Drummond explains the technical and development aspects of DIDs, DKMS, DID Auth and Verifiable Credentials that will make Self Sovereign Identity possible.
The 2nd Official W3C DID Working Group Meeting (The Netherlands)SSIMeetup
https://ssimeetup.org/did-report-2-2nd-official-w3c-did-working-group-meeting-netherlands-drummond-reed-markus-sabadello-webinar-45/
The DID Report 2 about the Second Meeting of the W3C DID Working Group with Drummond Reed and Markus Sabadello from Danube Tech, co-authors of the W3C DID specification.
DID spec co-author Drummond Reed and Markus Sabadello will report back from Amsterdam (The Netherlands) for the second official meeting of the W3C DID Working Group taking place from January 29-31, 2020 to share highlights of the meeting and the roadmap for taking DIDs to a full Web standard.
This session will be followed one hour later by a full DID education session based on the DID chapter published with Manning by IdentityBook.info authors Drummond Reed, Markus Sabadello and Alex Preukschat. If you want to learn all the basics about DIDs please also join this session here: Webinar 46
Blockcerts: The Open Standard for Blockchain CredentialsSSIMeetup
https://ssimeetup.org/blockcerts-open-standard-blockchain-credentials-daniel-paramo-anthony-ronning-webinar-39/
Anthony Ronning, an engineer behind Blockcerts and backend dev at Learning Machine and Daniel Paramo, co-founder of swys and advisor at Xertify, explains how Blockcerts started, deep dive on how Blockcerts work, which institutions are implementing this solution and what companies have made a solution for the adoption of this standard. We will review the current Blockcerts roadmap and their pros and cons. What considerations do we need to take when developing a solution around Blockcerts?
Blockcerts is an open standard for creating, issuing, viewing, and verifying blockchain-based certificates. These digital records are registered on a blockchain, cryptographically signed, tamper-proof, and shareable. The goal is to enable a wave of innovation that gives individuals the capacity to possess and share their own official records.
The initial design was based on prototypes developed at the MIT Media Lab and by Learning Machine. The goal of this community is to create technical resources that other developers can utilize in their own projects. Rather than independently developing custom implementations.
Blockcerts consists of open-source libraries, tools, and mobile apps enabling a decentralized, standards-based, recipient-centric ecosystem, enabling trustless verification through blockchain technologies.
Blockcerts uses and encourages consolidation on open standards. Blockcerts is committed to self-sovereign identity of all participants, and enabling recipient control of their claims through easy-to-use tools such as the certificate wallet (mobile app). Blockcerts is also committed to availability of credentials, without single points of failure.
These open-source repos may be utilized by other research projects and commercial developers. It contains components for creating, issuing, viewing, and verifying certificates across any blockchain.
OSCON 2018 Getting Started with Hyperledger IndyTracy Kuhrt
Presented at OSCON 2018. Hyperledger Indy is a distributed ledger built for decentralized identity and is one of the open source frameworks hosted by Hyperledger. It provides tools, libraries, and reusable components for creating and using independent digital identities rooted on blockchains or other distributed ledgers. In this presentation, I introduce The Linux Foundation and Hyperledger. We look at Decentralized Identity Concepts -- identity models, decentralized identity, zero-knowledge proofs, and verifiable credentials. We look at a demo that utilizes Hyperledger Indy and these concepts. We then look at Hyperledger Indy's software stack and roadmap and touch on how you can get involved.
Learn about the Trust Over IP (ToIP) stackSSIMeetup
https://ssimeetup.org/trust-over-ip-toip-stack-webinar-54/
At SSI Meetup you’ve been hearing about the Trust over IP (ToIP) stack (originally called the “SSI stack”) since last September 2019. In this webinar, three pioneers of this new architecture for Internet-scaled digital trust infrastructure will share exciting news about where ToIP is going. We can’t reveal the details yet—it is under embargo until next Tuesday—but let’s just say you don’t want to miss it.
Bonjour à tous,
Pour ce meetup, nous avons la chance d'être reçu dans les locaux de Richemont.
Je remercie particulièrement Cédric Georg ainsi que l'équipe de Richemont pour leur accueil.
A ce meetup DevOps, nous aurons 2 Retours d'Expérience, voici l'agenda de la soirée:
18:30 - Ouverture des portes
(il faudra donner votre nom et prénom ainsi que votre numéro de plaque d'immatriculation si vous êtes venu en voiture, c'est pour la sécurité, et oui, on ne rigole pas ici :-))
18:50 - Introduction de Matthieu et de Cédric
19:00 - Richemont et sa transformation DevOps
Richemont, fort de sa transformation digitale, a dû s'adapter afin de faire travailler ensemble, avec des outils d'automatisation et de communication, les équipes de développeurs et les équipes opérationnelles.
Squad, DevOps, Tests, Sécurité, Agile et Scrum, comment tous ces termes ont sû devenir le quotidien de Richemont en seulement quelques années.
Nous verrons comment nous avons mis cela en place, quels ont été les points positifs et négatifs de cette transformation.
19:40 - SixSq et l'automatisation du docker sur des edge points (DEMO)
Edge computing is gaining in popularity to address the explosion of data produced by IoT sensors, and the need to better manage AI both in the cloud and at the edge. To address this paradigm shift, SixSq has launched two open source projects: Nuvla for managing applications, and NuvlaBox, a cloud-in-a-box edge solution.
Using these open source projects, in this session we'll demonstrate how edge computing can now be integrated to agnostically operate containerized applications on CaaS infrastructures anywhere, using a Raspberry Pi-based platform.
Kiva protocol: building the credit bureau of the future using SSISSIMeetup
https://ssimeetup.org/kiva-protocol-building-credit-bureau-future-using-ssi-alan-krassowski-webinar-37/
Alan Krassowski, VP of Technology & Blockchain at Kiva, will explain how the Kiva Protocol team is leveraging Self-Sovereign Identity (SSI) and related technologies to develop identity and credit solutions for traditionally underserved populations, starting with an implementation in concert with Sierra Leone’s government and banking systems, in partnership with the United Nations Development Programme (UNDP).
Alan will provide an overview of the project and its goals, including some of the challenges related to infrastructure, such as limited electricity, Internet bandwidth and penetration of smartphone devices — and how Kiva is overcoming those challenges. Alan will also explain how Kiva is leveraging various Hyperledger codebases related to verifiable credentials, decentralized identifiers, and distributed ledgers, as well as how Kiva is contributing back to the open-source community.
The audience will gain a better understanding of a real-world application of SSI technologies that will provide powerful benefits to citizens in the developing world. How is Kiva giving unbanked people digital identity and secure control over their own credit information? How can a systems-level change in identity and credit unlock capital and opportunity for millions of people?
Alan has been a professional software engineer, architect, and leader for over thirty years. After earning his B.S. in Computer Engineering from Rochester Institute of Technology, he worked as a software developer in a wide variety of domains including fintech, insurance, desktop publishing, point-of-sale, accounting, budgeting, video streaming, and narrative theory. He has also held technical leadership roles at various companies in the cybersecurity space, including Chief Architect at Cylance, Inc., Chief Architect & Senior Director at McAfee / Intel Security, and Architect in the Office of the CTO at Symantec. Prior to his role at Kiva, he was a Decentralization Architect at ConsenSys and CTO of ConsenSys Capital where he worked with Ethereum-based blockchain solutions. He has been a technical editor/reviewer on four software security books and one on Bitcoin, and is excited about how advances in cryptography have led to new solutions for people to communicate, collaborate and trade while minimizing the need to trust in centralized institutions.
DIDs Demystified: A hands-on intro to DIDs via the Bitcoin Reference (BTCR) D...SSIMeetup
This talk will demystify Decentralized Identifiers (DIDs) via the simple Bitcoin Reference (BTCR) DID Method. Kim will introduce the basics of DIDs and show how they work in action through demos of the creation/updating and resolution process in BTCR. We'll build on this knowledge by discussing advanced features enabled by DIDs, along with a brief survey of other DID methods. By the end of the talk, you'll be able to create and resolve your own BTCR DIDs through the live BTCR playground.
Blockchain R&D to Decentralized Identity DeploymentAnil John
DHS S&T SVIP Presentation on the DHS work using W3C Verifiable Credentials and W3C Decentralized Identifiers at the EU/EC NGI's ESSIF-Lab Final Event in Brussels on 12 Dec, 2022.
CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...sparkfabrik
In this talk I’ll explain what is the Software Supply Chain, common threats and mitigations and how they apply to IAC ecosystem too. I’ll show off security threats using Terraform and its ecosystem and finally i’ll talk about OCI images talking about digital signatures and SBOM using Sigstore and Syft. I’ll do a live coding session showing off how to deploy secure OCI images on K8S cluster with security policies built with Kyverno, the session includes also security scanning using the generated SBOM.
What are decentralized identifiers (DIDs), how do they enable self-sovereign identity, and what does W3C standardization mean for interoperability and adoption?
Evernym's Drummond Reed and Brent Zundel discussed all this and more on our Sep 26, 2019 webinar.
There are many ways to manage whether a service can talk to another service. It can be tempting to over-use one segmentation mechanism to implement policy when the real problem is how to coordinate and manage many mechanisms in the physical, cloud and container spaces. This talk summarizes the problem space and opportunities rather than offers solutions.
Presented at the Docker Palo Alto meetup Feb 16th 2016 http://www.meetup.com/Docker-Palo-Alto/events/228277181/
ZKorum: Building the Next Generation eAgora powered by SSISSIMeetup
The immense potential unlocked by SSI in content-centric social networks (forums) is largely unaddressed by the recent wave of decentralized social networks. Enter ZKorum - a network of verifiable communities where members create anonymous polls and discussions. In this episode, Nicolas Gimenez, the Co-Founder and CTO of ZKorum, unveils the Alpha version and delves into its architecture, drawing inspiration from SSI, DWeb, and Password Managers.
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...SSIMeetup
Lovesh Harchandani from Dock presents their approach to anonymous credentials and dives in on the various predicates that can be proven in zero knowledge. In over 90 minutes of discussion, we cover what these cryptographic techniques are, how they enable several important use cases for digital identity credentials, and we stretch James Monaghan's ability to keep up as interviewer by taking a look at the source code which makes it all possible! We show how various zero knowledge primitives we've built can be used in a modular fashion to solve real-world use cases. We cover privacy-preserving signature schemes, zero knowledge attribute equalities, range proofs, and verifiable encryption based on ZK-SNARKs, expressing arbitrary predicates as Circom programs and creating ZK proofs for them and blinded credentials (issuer is unaware of all attributes). For anyone interested in the technical underpinnings of this new frontier of digital identity, this episode is a must!
Value proposition of SSI tech providers - Self-Sovereign IdentitySSIMeetup
Talk with Vladimir Vujovic, Senior Digital Innovation Manager from SICPA about product definition and value proposition of Issuer/Holder/Verifier software of SSI tech providers. Why is it hard to convey the right message to the audience coming from outside of SSI domain. How different SSI tech providers define their offering and the language they use to convey the message. What is really the value proposition of SSI tech providers who are offering their Issuer/Verifier software to the market. How big regulation initiatives like the one in Europe for eIDAS v2 are driving the market and roadmaps for SSI tech providers and how will such initiative will have impact to the rest of the world in terms of regulation, but some of the underlying technical standards. What is the place of SSI platforms in the broader Identity landscape and when are we going to see more maturity from the market.
SSI Adoption: What will it take? Riley HughesSSIMeetup
Adoption: its the elephant in the room. SSI has so much potential, but the benefits are only realised once adoption happens at scale. In this webinar, Riley Hughes, CEO and Co-Founder of Trinsic, shares his 3 concrete recommendations for building products which are successful according to the most important metric - getting adopted!
Daniel Buchner is here to save the web. Not the web as we know it, full of closed platforms and intermediaries where both free choice and free speech are curtailed, but the web as it was intended to be: a thriving, open ecosystem of apps and protocols which put individuals at the center. To do this, he and the TBD team at Block are building what they call “Web5” which combines decentralized identifiers, verifiable credentials and personal datastores to create a platform for building truly self-sovereign apps on the web. In this webinar, we go beyond the controversial name to learn what the project is, why it is important, and what we can expect from the upcoming release this summer.
Portabl - The state of open banking, regulations, and the intersection of SSI...SSIMeetup
Complying with Know Your Customer and Anti Money Laundering regulations is hugely complicated and expensive for financial institutions, and burdensome for their customers. Nate Soffio, Co-Founder and CEO of Portabl, believes that the solution lies in secure, interoperable data - enabled by verifiable credentials. In this webinar, he explains why it is such a thorny problem, how open banking needs to evolve to more of a “tap to prove” model as organizations increasingly need continuous identity assurance, and why despite describing the task as “playing SSI on ‘hard mode’”, he believes building a “compound startup” is the best way to get the job done.
PharmaLedger: A Digital Trust Ecosystem for HealthcareSSIMeetup
Daniel Fritz, Executive Director of the PharmaLedger Association and Marco Cuomo, Director of Tech Products & Innovation at Novartis, will present their SSI journey from the initial ideas, through realization of several Proof of Concepts with DIDs and VCs, to the PharmaLedger initiative. PharmaLedger was a 29 member, 3-year, €22 million project under the EU and EFPIA Innovative Medicine Initiative pursued DIDs with external partners such as the global standards organization GS1 and the Global Legal Identifier Foundation (GLEIF). The project also resulted in the creation of the PharmaLedger Association in 2022, a non-profit Swiss association mandated to launch the first open-source product, electronic Product Information (eLeaflet). The webinar will review some of the use cases and dive a little into the technical architecture adopted in the project.
Cheqd: Making privacy-preserving digital credentials funSSIMeetup
Everyone is excited about SSI but there still aren’t any use cases that form part of people’s daily lives, so the team at Cheqd set out to change that. In this session, Ankur Banerjee walks through the research that led them to settle on social reputation in Web3 ecosystems as a use case that would be fun and drive daily usage. Find out more on creds.xyz.
Polygon ID offers tools that allow developers to build self-sovereign, decentralized and private identity solutions for users that leverage zero knowledge proofs. Polygon ID was released as open source last March 2023 at ETH Denver. In this presentation, Otto Mora, BD Lead for Americas, and Oleksander Brezhniev, Technical Lead at Polygon ID, will be covering aspects of the did:PolygonID method including: Verifiable presentations leveraging ZK Proofs; How the Proofs are generated; Credential Issuance Methods; and Identity Management Features.
Building SSI Products: A Guide for Product ManagersSSIMeetup
Self-sovereign identity, decentralised identity, web5… collectively “ID Tech” has become a much more mainstream topic in recent years, and we are seeing an increasing number of products being built using these new technologies. However, with all the hand-wringing about adoption that we hear in the industry, it can sometimes feel like a hammer looking for nails. Which specific and tangible benefits can ID Tech bring to its users, and what special considerations should a product manager have in mind when working in this space? James Monaghan has been a product leader for two decades and has worked on ID Tech projects in financial services, travel, healthcare, education and more. In this talk he will share his views on how to tell whether a customer problem might call for an ID Tech solution, and how to approach some of the product decisions which arise when applying these tools.
Solving compliance for crypto businesses using Decentralized Identity – Pelle...SSIMeetup
https://ssimeetup.org/solving-compliance-crypto-businesses-using-decentralized-identity-pelle-braendgaard-webinar-60/
A new global framework for regulating the crypto industry is coming into place this year. One of the most important new rules that businesses interacting with crypto has to implement is what is known as the Travel Rule. The Travel Rule, which is also known as The Wire Transfer rule, requires a business managing crypto on behalf of their user to transfer KYC’d (Know-Your-Customer) Identity Information to a receiving institution. Pelle Braendgaard, CEO of Notabene, will share his insights and explain how his company is tackling this business challenge for the industry.
Complying with this rule provides many challenges for the industry. Several industry groups have already started to invent several new protocols to solve this. Notabene helps financial companies be compliant with new, global anti-money laundering (AML) regulations for crypto transactions coming into effect right now. Pelle believes this is a critical use case for SSI (Self-Sovereign Identity). In this talk, he will go over the rule itself, industry protocols, how he sees SSI can help here, and how they are helping to solve it.
The Pan-Canadian Trust Framework (PCTF) for SSISSIMeetup
https://ssimeetup.org/pan-canadian-trust-framework-pctf-ssi-tim-bouma-webinar-59/
We are very proud to release a special webinar to introduce the next chapter of the “Self-Sovereign Identity Book” from two of the most eminent authorities on digital identity in government: Tim Bouma and Dave Roberts, senior public servants with the Government of Canada and major contributors to the Pan-Canadian Trust Framework (PCTF).
In this chapter, Tim and Dave explain the PCTF model and how it maps to the SSI model and the Trust over IP (ToIP) stack.
This webinar describes how a world leader in digital identity (which Canada has been for two decades) sees the opportunity in the new decentralized identity model represented by SSI (Self-Sovereign Identity).
Identity-centric interoperability with the Ceramic ProtocolSSIMeetup
https://ssimeetup.org/identity-centric-interoperability-ceramic-protocol-joel-thorstensson-webinar-57/
Ceramic is a new permissionless protocol for creating and accessing unstoppable documents that serve as the foundation for a connected, interoperable web without silos. Joel Thorstensson is the founder and CTO of 3Box and the primary author of the ceramic protocol as well as several Ethereum standards for identity and will provide a conceptual and technical intro to Ceramic.
At the root of many of the internet’s problems is that apps and services today are built primarily in silos. This includes identity registries and credentials, user data and access permissions, infrastructure, and services. It not only puts control over data and identities in the wrong hands, but it’s a fundamentally outdated and inefficient model for building digital products.
Ceramic unlocks information interoperability between all platforms and services across the web, allowing participants to create and resolve documents for any type of information without any centralized service. Ceramic uses DIDs (Decentralized Identifiers), IPLD (InterPlanetary Linked Data), signed messages, and blockchain anchoring to create a trusted and shared graph of verifiable documents. While flexible, these documents are especially well-suited for self-sovereign identity systems, user-centric data ecosystems, and open web services.
https://ssimeetup.org/ssi-ecosystem-south-korea-jaehoon-shim-webinar-56/
Jaehoon Shim, a blockchain researcher at LG CNS and the founder of SSIMeetup Korea, will introduce the Self-Sovereign Identity (SSI) ecosystem of South Korea. South Korea became a hotbed of Self Sovereign Identity in the last couple of years. The number of government-funded projects, including the mobile credential for government officials, requires using DIDs (Decentralized Identifiers). Also, hundreds of enterprises joined public/private consortia on decentralized identity to empower the digital transformation of the South Korean society. Jaehoon will explain in detail the current ecosystem and discuss opportunities for the future.
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloSSIMeetup
https://ssimeetup.org/introducing-ssi-eidas-legal-report-ignacio-alamillo-webinar-55/
The European Commission developed the SSI (Self-Sovereign Identity) eIDAS bridge, an ISA2 funded initiative, to promote eIDAS as a trust framework for the SSI ecosystem. It assists a VC (Verifiable Credential) issuer in the signing process, and helps the verifier to automate the identification of the organization behind the issuer’s DID (Decentralized Identifier). Simply by “crossing” the eIDAS Bridge, a Verifiable Credential can be proven trustworthy in the EU. Ignacio Alamillo will present at this SSI Meetup webinar the insights gained from this report.
In the context of the eIDAS bridge project, we performed an analysis on how eIDAS can legally support digital identity and trustworthy DLT-based transactions in the Digital Single Market, and this is reflected in the SSI eIDAS legal report, available at this link. The objective of this report is to evaluate the potential legal issues that are important to an SSI solution and make some recommendations to be used as policy input for the eIDAS 2020 review. The report outlines short-term objectives, where changes in the Regulation would not be necessary, but also mid to long-term scenarios requiring major changes in the Regulation to comply with the SSI design principles.
The different scenarios described in the report are aligned with the proposed architectural and procedural considerations designed in the SSI eIDAS Bridge project and the European Self Sovereign Identity Framework.
How to avoid another identity nightmare with SSI? Christopher AllenSSIMeetup
https://ssimeetup.org/how-avoid-another-identity-tragedy-with-ssi-christopher-allen-webinar-53/
Join the Dutch Self-Sovereign Identity community in a #Foremembrance for those who died by attempting to bomb the civil archives captured by the Nazis & those defending the vulnerable today. Christopher Allen will share with us the importance of this event for the self-sovereign identity community to build the future of identity on sunset Amsterdam time March 27th. We will also analyze the impact and risk of COVID-19 for privacy and identity systems.
March 27th is a Friday this year. Sunset in Amsterdam is at 19:06 CET, 2:06 pm EDT, 11:06 am PDT & is 1:06 am March 28 in Taipei & Hong Kong.
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSSIMeetup
https://ssimeetup.org/self-sovereign-identity-why-we-here-christopher-allen-webinar-51/
Internet cryptography and Self-sovereign identity (SSI) pioneer Christopher Allen talks about essential insights and reflections around historical, technological and ethical aspects of Self-Sovereign Identity at the 51st SSIMeetup.org webinar in collaboration with Rebooting the Web of Trust (RWOT) and Alianza Blockchain Iberoamérica as part of the events that took place at RWOT in Buenos Aires (Argentina).
Christopher is an entrepreneur and technologist who specializes in collaboration, security, and trust. As a pioneer in internet cryptography, he’s initiated cross-industry collaborations and co-created industry standards that influence the entire internet. Christopher’s focus on internet trust began as the founder of Consensus Development where he co-authored the IETF TLS internet-draft that is now at the heart of all secure commerce on the World Wide Web. Christopher is co-chair of the W3C Credentials CG working on standards for decentralized identity. Christopher has also been a digital civil liberties and human-rights privacy advisor, was part of the team that led the first UN summit on Digital Identity & Human Rights, and was the producer of a half-dozen iPhone and iPad games, and of Infinite PDF, a non-linear media app.
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemsSSIMeetup
https://ssimeetup.org/eidas-regulation-anchoring-trust-self-sovereign-identity-systems-ignacio-alamillo-webinar-49/
Ignacio Alamillo is a lawyer, PhD in eIDAS Regulation, CISA, CISM, and EU Commission legal expert for EBSI eSSIF and the EBSI eIDAS Bridge initiatives. Ignacio will introduce SSI solutions, using the Alastria ID reference model as an illustrative example, taking into account the need for trust management frameworks, and trust anchors. Secondly, he will introduce the eIDAS Regulation, currently the major electronic identification regulation in the European Union, supporting a pan-European identity federation system, and the legal framework for the so-called trust services.
The EU has developed some key proposals arising from the legal assessment of the EBSI ESSIF use case, oriented to extend the eIDAS Regulation to SSI solutions used with public sector bodies relationships and procedures. This results were publicly presented in the 2nd ESSIF Stakeholders Meeting that took place in Brussels mid-January 2020.
The objective of the ESSIF legal assessment is to evaluate the potential legal issues that are horizontal to an SSI solution, including:
DIDs: What is the legal nature and ownership of DIDs (asset vs a special kind of pseudonym), how should be DIDs managed in case of minors and incapable persons, if DID may be subject to seizure, when DIDs may be deactivated, what is the legal regime of keys and wallets, etc.
VCs: What are the duties and responsibilities of VCs issuers, holders and verifiers. How to model the contractual/non-contractual relations between issuers & verifiers, and set up liability models. We should pay special attention to the legal aspects of the VC lifecycle (issuance, suspension and revocation causes, etc).
Alignment of the SSI solution with the eIDAS Regulation: aligning VCs with eIDAS eID rules, but also linking VCs to eSeals or eSignatures.
Trust framework: legal input regarding LoAs, governance aspects, conformity, etc.
The use cases include:
Using eIDAS identification means (and qualified certificates?) to issue verifiable credentials.
Using qualified certificates to support verifiable claims (EBSI eIDAS bridge) and legal evidences with full legal value.
Using SSI VCs as an eIDAS identification means.
Using blockchain plus SSI as an electronic registered delivery service.
All content represent just the opinion of Ignacio Alamillo, and do not represent any official position from the EU Commission nor any of its officers
Explaining SSI to C-suite executives, and anyone else for that matterSSIMeetup
https://ssimeetup.org/explaining-ssi-c-suite-executives-anyone-else-john-phillips-webinar-48/
John Phillips from 460degrees in Australia has been exploring with his team for more than two years for a way to describe Self-Sovereign Identity (SSI) that was easy to understand. We think he has found a good method to make SSI easy to understand for any C-suite executive and business people that goes beyond the technology.
John published a video in late 2019 that we found deeply insightful and we have invited him to share this with the SSI Meetup audience. This demo has been going down amazingly well with audiences from c-suite technology execs to design students.
This approach quite literally animates the discussion. People add other objects into the mix, move things around, ask relevant, insightful, questions.
John will share the learnings he is gaining from University research, as well as the results of work in supporting capstone projects for higher education students, and how this has led us to a storytelling model to explain SSI.
The Hyperledger Indy Public Blockchain NodeSSIMeetup
https://ssimeetup.org/hyperledger-indy-public-blockchain-node-alexander-shcherbakov-webinar-43/
Alexander Shcherbakov is a software engineer at DSR working on the team at Evernym. He has a Ph.D. in Mathematics and is one of the maintainers of Hyperledger Indy and Hyperledger Plenum. In this presentation, he will explain the value of a decentralized ledger in an SSI ecosystem and examine Hyperledger Indy, which is the distributed ledger that has been powering the Sovrin Network for more than two years.
Our identities have to be trusted to be useful. When we meet strangers, we decide how much we trust them by what they tell us, and whether a trusted third party will vouch for them. In traditional identity systems, the trusted third party knows everything about everyone in the ecosystem. In Self-Sovereign Identity systems, we rely on a decentralized ledger to privately validate that the identity claims do in fact come from a trusted issuer.
Indy’s blockchain implementation is Plenum, which is a general purpose, public-permissioned, BFT distributed ledger. The presentation takes a technical look at the architecture, cryptography, transactions, data structures, and storage of the ledger including auditability, request processing, catch-up procedure, and support for custom plugins and custom transactions.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
test test test test testtest test testtest test testtest test testtest test ...
The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- Drummond Reed/Markus Sabadello
1. The DID Report—September 2019
First Meeting of the New W3C DID Working Group in Japan
Drummond Reed
W3C DID specification
co-author
Chief Trust Officer Evernym
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
Markus Sabadello
W3C DID specification
co-author
Founder Danube Tech
2. 1. Empower global SSI communities
2. Open to everyone interested in SSI
3. All content is shared with CC BY SA
SSIMeetup.org
Alex Preukschat @SSIMeetup @AlexPreukschat
Coordinating Node SSIMeetup.org
https://creativecommons.org/licenses/by-sa/4.0/
SSIMeetup objectives
3. Your Reporters
Drummond Reed
● 20 years in Internet ID
standards
● Co-Editor W3C DID Spec—
Initial spec author
● Sovrin Foundation Trustee
& Chair of Governance WG
● Evernym Chief Trust Officer
3
Markus Sabadello
● 15 years in Internet ID
standards
● Co-Editor W3C DID Spec
and DID Resolution Spec
● Sovrin Foundation
Technical Gov Board
● Danube Tech Founder
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
4. Where does the story start?
4
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
5. ● Work on DIDs began four years ago
● A first draft spec gained real momentum
● It was contributed to the W3C Credentials
Community Group for further incubation
● After two years, the W3C membership voted to
form a full W3C Working Group
○ https://www.w3.org/2019/did-wg/
● This is a report on the first meeting that just took
place at W3C TPAC in Fukuoka Japan
5
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
7. Let’s begin at the beginning:
What is a DID?
7
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
8. 8
A DID is a new type of globally
unique identifier (URI) that
does not require a centralized
registration authority because
control of the identifier can be
proved using cryptography
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
9. Where did the term “DID” come from?
9
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
10. 10
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
12. How long have you been working on
DIDs?
12
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
13. Timeline
13
2015 2016 2017 2018 2019
Spring IIW:
First
blockchain
identity
discussions
Fall IIW:
Decision to
begin
blockchain
ID projects
W3C VCTF:
A
Decentral-
ized Hash
Table for
the Web
DHS:
Awards 1st
blockchain
Identity
R&D
contracts
IIW+RWOT:
DID Spec
work fully
underway
IIW+RWOT:
First DID
Spec nearly
complete
DHS:
First DID
Spec
published &
contract
complete
DHS:
DKMS
contract
awarded;
work
begins
W3C CCG:
DID Spec
contributed
DHS:
DKMS
Design &
Architec-
ture V3
published
W3C CCG:
Second
draft of
DID Spec
W3C CCG:
Work on
DID WG
Charter
begins
W3C:
DID WG
Charter
approved
W3C CCG:
Community
Final
Draft of
DID Spec
DHS:
DKMS
Design &
Architec-
ture V4
published
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
14. How widely are DIDs in use today?
14
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
15. Some statistics
● There are currently 32 DID methods registered in the informal W3C
Credentials Community Group DID Method Registry
○ https://w3c-ccg.github.io/did-method-registry/
○ Three for Bitcoin
○ Six for Ethereum
● The Sovrin Foundation currently has 71 stewards around the world
hosting a public permissioned distributed ledger for DIDs
● The Canadian provinces of British Columbia and Ontario have issued
over 1.4 million verifiable business license credentials based on DIDs
15
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
17. Why did the U.S. Department of
Homeland Security fund the initial
development of the DID spec?
17
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
18. The four core properties of a DID
1. A permanent (persistent) identifier
It never needs to change
2. A resolvable identifier
You can look it up to discover metadata
3. A cryptographically-verifiable identifier
You can prove control using cryptography
4. A decentralized identifier
No centralized registration authority is required
18
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
19. What does a DID look like?
19
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
21. What is a DID method?
21
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
22. A DID Method...
Defines how to perform the four CRUD operations on a DID
1. Create: How to generate a new DID
2. Read: How to resolve a DID into a DID document
3. Update: How to write a new version of a DID document
4. De-activate: How to revoke (terminate) a DID so it no
longer functions
22
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
23. What is a DID document?
23
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
24. A DID Document...
Contains metadata for describing and interacting with the
DID subject (the entity identified by the DID)
1. Public keys or other cryptographic proof material
2. Service endpoints for engaging in trusted interactions
3. Authentication mechanisms for proving control of the
DID
4. Other metadata
24
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
26. What is DID resolution?
26
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
27. DID Resolution...
Is the process of using the DID to look up and retrieve a
copy of the DID document
● How this is done depends on the DID method
○ Defined by the Read operation
● Different DID methods do this in different ways
● DID Resolution is a separate specification
○ Not in scope for the W3C DID Working Group
27
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
28. Who is defining DID Resolution?
28
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
29. What will happen where?
DID Spec
(DID Working Group)
DID URI Scheme
DID Document Data Model
DID Document Syntax(es)
Requirements for DID Methods
Security+Privacy Considerations
DID Resolution Spec
(Credentials Community Group)
DID Resolution Algorithm
DID URL Dereferencing Algorithm
HTTP(S) Binding
Input Options
Result Metadata
DID Method Specs
(by anyone)
Method Name
Method-specific Identifier
Create, Read, Update, Deactivate
Security+Privacy Considerations
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
30. Part Three:
The W3C DID Working Group
30
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
31. Who is in the DID Working Group?
31
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
32. ● Chairs
○ Dan Burnett (ConsenSys), Brent Zundel (Evernym)
● Editors
○ Manu Sporny (Digital Bazaar), Drummond Reed (Evernym),
Markus Sabadello (Danube Tech)
● 54 participants from 18 member orgs
○ AKASHA, BrightLink, Conexxus, Credly, Etri, GS1, Microsoft,
Scottish Government, SecureKey, Sovrin Foundation, Surf
Net, Transmute, Universities Admissions Centre, Wiley
32
W3C DID Working Group
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
33. What are the deliverables of the WG?
33
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
34. Deliverables
● Recommendation-Track Specification
○ Decentralized Identifiers v1.0
● W3C Notes
○ Decentralized Identifier Use Cases v1.0
○ Decentralized Characteristics Rubric v1.0
● Other Deliverables
○ Test Suite and Implementation Report
34
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
35. What is the proposed schedule?
35
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
36. Aug 2021Jul 2021
March 2021
(CR2)
Nov 2020
(CR1) .
Nov 2019
(FPWD)
Timing of the DID 1.0 Spec
36
May 2020
(Feature freeze)
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
37. Part Four:
DID Deep Dive
37
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
38. How many types of DIDs are there?
38
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
39. There are at least four categories of DIDs
1. Ledger-based: DIDs that are registered and resolved using
blockchains or distributed ledgers
2. Peer-to-peer: DIDs that are shared directly peer-to-peer
and do not require a public ledger
3. Layer 2: DIDs that leverage a blockchain or DLT but are not
registered on it directly
4. Alternative: interesting new types of DIDs that do not meet
all four core properties
39
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
40. Aren’t most DIDs based on blockchains
and distributed ledgers?
40
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
41. Ledger-Based DIDs
● Over 90% of current DID methods are ledger-based
○ Based on those in the W3C DID Method Registry:
https://w3c-ccg.github.io/did-method-registry/
● Two basic subtypes
○ DID is based on a blockchain address
○ DID is derived from a public/private key pair and then
registered on the blockchain using the private key
41
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
42. How are peer DIDs different?
42
[Slides credit: Ken Ebert, Sovrin Foundation]
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
43. ● Anywise DID
○ Unknowable parties
○ Publicly resolveable
● N-wise DID
○ N enumerated parties
○ Privately resolveable
● Pairwise DID
○ 2 parties
○ Privately resolveable
...
DIDs Are About Relationships
Government DID Alice DID
Blockchain
Alice DID Bob DID
Carol DID
Alice DID Bob DID
Bob DID
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
45. ● Cheap: no transaction costs
● Fast
● Scalable: as a function of the participants
● Secure
● Reduced PI and privacy concerns
● Independent of any ledger: minimal political or technical baggage
● Graftable into other DID ecosystems
Benefits of Peer DIDs
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
46. What is a “public key DID”?
46
[Slides credit: Ken Ebert, Sovrin Foundation]
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
47. Sample (ed25519 public key)
did:key:z6MkpTHR8VNsBxYAAWHut2Geadd9jSwuBV8xRoAnwWsdvktH
ABNF
did-key = "did:key:" multibase( multicodec( public-key ) )
multibase = function(bytes) => [1-9A-Za-z]
multicodec = function(codec, bytes) => codec[ed25519publickey -> 0xed, …] bytes
public-key = [0x00-0xff]
What's a Public Key-based
DID Look Like?
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
48. Benefits of Public Key DIDs
● Self-describing
● Cheap: no transaction costs
● Fast
● Scalable: as a function of the participants
● Secure
● No PI and privacy concerns
● Independent of any ledger: minimal political or technical baggage
● Graftable into other DID ecosystems
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
49. What is a Layer 2 DID?
49
[Slides credit: Daniel Buchner, Microsoft]
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
50. Layer 2 DID Network
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
51. The Scale of Decentralized Identity:
Human Identity
There are 7.5 billion humans on Earth currently. At bare minimum, a
decentralized identity system must be capable of supporting identities for
all of them. Each person may have multiple Decentralized Identifiers, each
requiring their own PKI lineage.
Identity of All
Things.
Human identity is just the tip of the
iceberg – there is an entire world
containing hundreds of billions of
devices, machines, apps, and other
entities, both tangible and virtual.
51This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
52. Key Realization
Identifiers and PKI do not suffer from
the same double spend problem
money does, because DIDs do not need
to be transferred between parties like
assets. However, you must still prevent
double issuance and ensure all parties
on the DID network can derive a single
deterministic PKI state for an identifier.
How might these differences in
requirements affect how we approach
the architecture of a DID network?
52This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
53. What is ION?
ION is a public, permissionless, decentralized DID overlay
network that runs on Bitcoin, and leverages a deterministic
DPKI protocol, called Sidetree.
53This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
54. The path to a robust network - a three stage journey:
54
Stage 1
Larger entities run full nodes to
jumpstart the network
Stage 2
Entities with product needs
and early adopter hobbyists
start running full nodes ad
hoc
Stage 3
The long tail of developers, users,
and organizations run a mix of
light and full nodes to suit their
needs
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
55. What are “alternative DIDs”?
55
[Slides credit: Manu Sporny, Digital Bazaar]
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
56. Alternative DID
Methods...
Typically fall into at least one of
these categories.
● Based on deployed tech
● Utilize existing large networks
● May not be truly "decentralized"
● Doesn't use a cryptocurrency
● Bridge the old world to the new,
making the adjacent possible…
possible.
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
57. ● did:web:example.com/jdoe
● Pros
○ It's a resource on the Web
○ Works today, zero changes to Web
○ Uses existing CA system
● Cons
○ No revision control
○ No audit trail
○ Uses existing CA system
did:web
A DID Method for the Web
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
58. ● did:git:a7c...38a/b2f...9d1
● Pros
○ Blockchain-like version control
○ Digitally signed transaction history
○ Highly decentralized
● Cons
○ Undetectable "forking" possible
○ No single point of truth
○ High potential for DoS
did:git
A DID Method for developers
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
59. ● did:ipid:12D...y5w
● Pros
○ Cheap to create (self-hosted)
○ Possible to replicate
○ Network is fault-tolerant
● Cons
○ DIDs can disappear
○ Possibly expensive to maintain
did:ipid
A DID Method layered on top of
a DHT-based clustered file
system
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
60. did:PROPRIETARY
DID Methods where the
namespace is owned by an
organization.
● did:facebook:jdoe, did:gmail:jdoe,
did:linkedin:jdoe
● Pros
○ Cheap to create and maintain
○ Clear responsibilities
○ Extremely reliable network
● Cons
○ Centralized network
○ Centralized governance
○ Not portable
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
61. What is a “DID rubric”?
61
[Slides credit: Joe Andrieu, Legendary Requirements]
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
62. From the DID WG Charter
Provide a rubric of decentralized
characteristics for DID Method specifications.
This allows the DID Method specifications to
self-certify, or independent third parties to
evaluate, the DID Method specification's level
of adherence to principles of decentralization.
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
63. Why a Rubric for Decentralization
of DID Methods?
► “Decentralized” is a quagmire
► Requirements for DID Methods led to
passionate, intense debate:
► The DID community came together with several
subtly different meanings of decentralization.
► How can we evaluate DID Methods against
the criteria driving this work?
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
64. Intentions
► A tool for evaluating DID Methods
► Objective & non-judgmental
► Minimize bias. Avoid advocacy. Champion
characterization.
► Evaluation is in the eye of the beholder
► Weighting / Selection of criteria based on use case
under evaluation
► Evaluations / Responses up to evaluator
► No summary rating. No universal metric.
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
66. The DID Report—September 2019
First Meeting of the New W3C DID Working Group in Japan
Drummond Reed
W3C DID specification
co-author
Chief Trust Officer Evernym
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
Markus Sabadello
W3C DID specification
co-author
Founder Danube Tech