This talk discusses sovereignty as a foundational model for a new kind of identity system that not only establishes all entities as peers, but also provides the means of using verifiable claims to build trustworthy relationships. A self-soversign identity system with verifiable claims provides increased privacy and control for individuals, more transparent consent, opens new opportunities for relying parties and third party claims providers, and reduces or eliminates integration costs while making systems simpler.
Hyperledger Indy Platform - Privacy, Security and Power for Digital Identity ...Gokul Alex
Blockchain Engineering Workshop for World Blockchain Conclave organised by 1point2GWS. Session on Hyperledger Indy Framework, Architecture Model, Components, Modules, Workflows. Demonstrated Verifiable Organisation Networks and Decentralised Workflows on Hyperledger Indy. Demonstrated Hyperledger Indy CLI and Indy Sandbox. Deep Dive on Decentralised Identifiers ( DID ) and the goals of DID. An overview of Sovrin platform is included.
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/SovrinCalvin Cheng
How can we leverage on distributed ledger technology and cryptography to provide identity as a global, cross-jurisdiction and accessible utility for the world?
Part 1: Introduction to Self-Sovereing Identity (SSI), Verifiable Credentials, Standards defined by Decentralised Identity Foundation and W3C.
Part2: How to use it with Corda to develop scalable, decentralised applications that use smart contracts and SSI to orchestrate complex, multi-party processes.
The Future of Authentication - Verifiable Credentials / Self-Sovereign IdentityEvernym
What does a world without passwords and usernames look like? What would a truly secure single sign-on system mean for your customer and employee experiences? What if multi-factor authentication was consistent and interoperable across the Internet?
On our July 9th webinar, we were joined by our partners at Condatis to dive into these very questions around the future of authentication, covering:
◙ The four types of authentication supported by Evernym today
◙ The flaws in today’s password-based, security question, and social login models
◙ The benefits of using verifiable portable credentials for authentication
◙ Using self-sovereign identity for multi-factor authentication
◙ A showcase of live SSI-enabled authentication projects
Presenters:
◙ Andy Tobin, EMEA Managing Director, Evernym
◙ Chris Eckl, Chief Technology Officer, Condatis
◙ James Monaghan, VP Product, Evernym
Identity-centric interoperability with the Ceramic ProtocolSSIMeetup
https://ssimeetup.org/identity-centric-interoperability-ceramic-protocol-joel-thorstensson-webinar-57/
Ceramic is a new permissionless protocol for creating and accessing unstoppable documents that serve as the foundation for a connected, interoperable web without silos. Joel Thorstensson is the founder and CTO of 3Box and the primary author of the ceramic protocol as well as several Ethereum standards for identity and will provide a conceptual and technical intro to Ceramic.
At the root of many of the internet’s problems is that apps and services today are built primarily in silos. This includes identity registries and credentials, user data and access permissions, infrastructure, and services. It not only puts control over data and identities in the wrong hands, but it’s a fundamentally outdated and inefficient model for building digital products.
Ceramic unlocks information interoperability between all platforms and services across the web, allowing participants to create and resolve documents for any type of information without any centralized service. Ceramic uses DIDs (Decentralized Identifiers), IPLD (InterPlanetary Linked Data), signed messages, and blockchain anchoring to create a trusted and shared graph of verifiable documents. While flexible, these documents are especially well-suited for self-sovereign identity systems, user-centric data ecosystems, and open web services.
Hyperledger Indy Platform - Privacy, Security and Power for Digital Identity ...Gokul Alex
Blockchain Engineering Workshop for World Blockchain Conclave organised by 1point2GWS. Session on Hyperledger Indy Framework, Architecture Model, Components, Modules, Workflows. Demonstrated Verifiable Organisation Networks and Decentralised Workflows on Hyperledger Indy. Demonstrated Hyperledger Indy CLI and Indy Sandbox. Deep Dive on Decentralised Identifiers ( DID ) and the goals of DID. An overview of Sovrin platform is included.
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/SovrinCalvin Cheng
How can we leverage on distributed ledger technology and cryptography to provide identity as a global, cross-jurisdiction and accessible utility for the world?
Part 1: Introduction to Self-Sovereing Identity (SSI), Verifiable Credentials, Standards defined by Decentralised Identity Foundation and W3C.
Part2: How to use it with Corda to develop scalable, decentralised applications that use smart contracts and SSI to orchestrate complex, multi-party processes.
The Future of Authentication - Verifiable Credentials / Self-Sovereign IdentityEvernym
What does a world without passwords and usernames look like? What would a truly secure single sign-on system mean for your customer and employee experiences? What if multi-factor authentication was consistent and interoperable across the Internet?
On our July 9th webinar, we were joined by our partners at Condatis to dive into these very questions around the future of authentication, covering:
◙ The four types of authentication supported by Evernym today
◙ The flaws in today’s password-based, security question, and social login models
◙ The benefits of using verifiable portable credentials for authentication
◙ Using self-sovereign identity for multi-factor authentication
◙ A showcase of live SSI-enabled authentication projects
Presenters:
◙ Andy Tobin, EMEA Managing Director, Evernym
◙ Chris Eckl, Chief Technology Officer, Condatis
◙ James Monaghan, VP Product, Evernym
Identity-centric interoperability with the Ceramic ProtocolSSIMeetup
https://ssimeetup.org/identity-centric-interoperability-ceramic-protocol-joel-thorstensson-webinar-57/
Ceramic is a new permissionless protocol for creating and accessing unstoppable documents that serve as the foundation for a connected, interoperable web without silos. Joel Thorstensson is the founder and CTO of 3Box and the primary author of the ceramic protocol as well as several Ethereum standards for identity and will provide a conceptual and technical intro to Ceramic.
At the root of many of the internet’s problems is that apps and services today are built primarily in silos. This includes identity registries and credentials, user data and access permissions, infrastructure, and services. It not only puts control over data and identities in the wrong hands, but it’s a fundamentally outdated and inefficient model for building digital products.
Ceramic unlocks information interoperability between all platforms and services across the web, allowing participants to create and resolve documents for any type of information without any centralized service. Ceramic uses DIDs (Decentralized Identifiers), IPLD (InterPlanetary Linked Data), signed messages, and blockchain anchoring to create a trusted and shared graph of verifiable documents. While flexible, these documents are especially well-suited for self-sovereign identity systems, user-centric data ecosystems, and open web services.
Presentation by DHS S&T at the NY Blockchain 360 Conference regarding Blockchain's relevance to the Homeland Security Enterprise. Results of security and privacy research and development over the last 2+ years and next steps.
What are decentralized identifiers (DIDs), how do they enable self-sovereign identity, and what does W3C standardization mean for interoperability and adoption?
Evernym's Drummond Reed and Brent Zundel discussed all this and more on our Sep 26, 2019 webinar.
Decentralized identity uses standards to create an interoperable language for new identity products and services to be build. Using Verifiable Credentials and Decentralized Identifiers.
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply ChainHeather Vescent
Supply chain is a complex ecosystem with many participants, that may include governments, transnational companies, brokers and other middlemen, and local farms, factories, and other suppliers. Another reason supply chain is complex is because it cuts across borders, and must adhere to laws and regulations in multiple jurisdictions: global, national, and local.
This report researched the supply chain through the lens of digital identity for tracking and auditing.
Download the reports:
Gaps: bit.ly/NPEreport
Supply Chain: bit.ly/GSCreport
In May 2021, Evernym's Product team hosted a webinar to share:
• An overview of Evernym’s products: Verity, Connect.Me, and the Mobile SDK
• Recent changes and improvements, including Aries Out-Of-Band support and new developer resources
• A first-look at Verity Flow, a new no-code solution for issuing and verifying credentials
• A discussion of our product roadmap, including BBS+ support and a new Connect.Me demo experience
-What is a Blockchain
-Blockchain as a Technology
-Do you actually need a Blockchain?
-Critical Aspects of Ecosystems
-Building Blocks of Blockchain
-The architecture of Current Systems
-Get in Touch
In this whitepaper we are exploring how blockchain or a DLT can help banks, insurers and fintech companies solve KYC and AML related customer on-boarding hurdles. We are proposing a privacy focused Identity attributes and KYC checks sharing scheme that is compatible with existing processes and is also future proof.
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemsSSIMeetup
https://ssimeetup.org/eidas-regulation-anchoring-trust-self-sovereign-identity-systems-ignacio-alamillo-webinar-49/
Ignacio Alamillo is a lawyer, PhD in eIDAS Regulation, CISA, CISM, and EU Commission legal expert for EBSI eSSIF and the EBSI eIDAS Bridge initiatives. Ignacio will introduce SSI solutions, using the Alastria ID reference model as an illustrative example, taking into account the need for trust management frameworks, and trust anchors. Secondly, he will introduce the eIDAS Regulation, currently the major electronic identification regulation in the European Union, supporting a pan-European identity federation system, and the legal framework for the so-called trust services.
The EU has developed some key proposals arising from the legal assessment of the EBSI ESSIF use case, oriented to extend the eIDAS Regulation to SSI solutions used with public sector bodies relationships and procedures. This results were publicly presented in the 2nd ESSIF Stakeholders Meeting that took place in Brussels mid-January 2020.
The objective of the ESSIF legal assessment is to evaluate the potential legal issues that are horizontal to an SSI solution, including:
DIDs: What is the legal nature and ownership of DIDs (asset vs a special kind of pseudonym), how should be DIDs managed in case of minors and incapable persons, if DID may be subject to seizure, when DIDs may be deactivated, what is the legal regime of keys and wallets, etc.
VCs: What are the duties and responsibilities of VCs issuers, holders and verifiers. How to model the contractual/non-contractual relations between issuers & verifiers, and set up liability models. We should pay special attention to the legal aspects of the VC lifecycle (issuance, suspension and revocation causes, etc).
Alignment of the SSI solution with the eIDAS Regulation: aligning VCs with eIDAS eID rules, but also linking VCs to eSeals or eSignatures.
Trust framework: legal input regarding LoAs, governance aspects, conformity, etc.
The use cases include:
Using eIDAS identification means (and qualified certificates?) to issue verifiable credentials.
Using qualified certificates to support verifiable claims (EBSI eIDAS bridge) and legal evidences with full legal value.
Using SSI VCs as an eIDAS identification means.
Using blockchain plus SSI as an electronic registered delivery service.
All content represent just the opinion of Ignacio Alamillo, and do not represent any official position from the EU Commission nor any of its officers
Self-Sovereign Identity and the MyData model from Finland - Antti 'Jogi' PoikolaSSIMeetup
Antti 'Jogi' Poikola, Researcher at Aalto University and Sovrin Foundation Trustee, features in our third Webinar "SSI & MyData" by explaining how MyData is both an alternative vision and guiding technical principles for how we, as individuals, can have more control over the data trails we leave behind us in our everyday actions. The core idea of MyData is that we, you and I, should have an easy way to see where data about us goes, specify who can use it, and alter these decisions over time. Jogi explains how this pieces fit together and how data is merging into the SSI space.
Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, a...Evernym
In Evernym's November 2021 webinar, we discussed the current state of decentralized identifiers (DIDs), their role in a more trusted Web, and why three of the four largest browser vendors are trying to stop their approval at the W3C.
On March 19, 2020, Evernym's product team gave a webinar introducing several new features for Verity and Connect.Me and unveiling our embedded wallet SDK for the very first time.
Here are the slides.
Verifiable Credentials for Global Supply ChainsKaryl Fowler
Transmute hosted a discussion at the Internet Identity Workshop (IIW30, April 2020) about the use of verifiable credentials in global supply chains, emphasizing customer discovery and education approaches to emerging technology adoption.
This presentation gives an overview on the work that is going on at OpenID Foundation in Liaison with Decentralized Identity Foundation to enable SSI applications based on OpenID Connect.
Introduction to Blockchain-as-a-Service (BaaS)Cygnet Infotech
Blockchain-as-a-Service (BaaS) allows businesses to use cloud-based solutions to build, host and use their own blockchain apps. Supply Chain a crucial BaaS use case suffers a major issue of the lack of traceability. BaaS offers transparency and traceability to the Supply Chain. Get in touch with experts of Cygnet to know more.
In this May 2020 webinar, Evernym's Andy Tobin gives an overview of safe credentials and the five tests to determine whether or not a portable verifiable credential is safe.
Then, we invite panelists from CULedger and Mastercard to share what safe credentials mean for them and their organizations.
Panelists:
- Julie Esser, SVP Marketing & Comms, CULedger
- Bryn Robinson-Morgan, VP Digital Identity, Mastercard
- Daniel Hardman, Chief Architect, Evernym
Blockchain became a popular technology trend because of cryptocurrencies. But, this technology has its applications beyond the Bitcoin and other cryptocurrencies.
This presentation was presented as the pre-opening talk at Identity North 2016 in Toronto. It covers the big question - What is Identity? Key Concepts and Terms. Contextualizing Identity for Enterprise, Government and in the Commons.
Presentation by DHS S&T at the NY Blockchain 360 Conference regarding Blockchain's relevance to the Homeland Security Enterprise. Results of security and privacy research and development over the last 2+ years and next steps.
What are decentralized identifiers (DIDs), how do they enable self-sovereign identity, and what does W3C standardization mean for interoperability and adoption?
Evernym's Drummond Reed and Brent Zundel discussed all this and more on our Sep 26, 2019 webinar.
Decentralized identity uses standards to create an interoperable language for new identity products and services to be build. Using Verifiable Credentials and Decentralized Identifiers.
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply ChainHeather Vescent
Supply chain is a complex ecosystem with many participants, that may include governments, transnational companies, brokers and other middlemen, and local farms, factories, and other suppliers. Another reason supply chain is complex is because it cuts across borders, and must adhere to laws and regulations in multiple jurisdictions: global, national, and local.
This report researched the supply chain through the lens of digital identity for tracking and auditing.
Download the reports:
Gaps: bit.ly/NPEreport
Supply Chain: bit.ly/GSCreport
In May 2021, Evernym's Product team hosted a webinar to share:
• An overview of Evernym’s products: Verity, Connect.Me, and the Mobile SDK
• Recent changes and improvements, including Aries Out-Of-Band support and new developer resources
• A first-look at Verity Flow, a new no-code solution for issuing and verifying credentials
• A discussion of our product roadmap, including BBS+ support and a new Connect.Me demo experience
-What is a Blockchain
-Blockchain as a Technology
-Do you actually need a Blockchain?
-Critical Aspects of Ecosystems
-Building Blocks of Blockchain
-The architecture of Current Systems
-Get in Touch
In this whitepaper we are exploring how blockchain or a DLT can help banks, insurers and fintech companies solve KYC and AML related customer on-boarding hurdles. We are proposing a privacy focused Identity attributes and KYC checks sharing scheme that is compatible with existing processes and is also future proof.
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemsSSIMeetup
https://ssimeetup.org/eidas-regulation-anchoring-trust-self-sovereign-identity-systems-ignacio-alamillo-webinar-49/
Ignacio Alamillo is a lawyer, PhD in eIDAS Regulation, CISA, CISM, and EU Commission legal expert for EBSI eSSIF and the EBSI eIDAS Bridge initiatives. Ignacio will introduce SSI solutions, using the Alastria ID reference model as an illustrative example, taking into account the need for trust management frameworks, and trust anchors. Secondly, he will introduce the eIDAS Regulation, currently the major electronic identification regulation in the European Union, supporting a pan-European identity federation system, and the legal framework for the so-called trust services.
The EU has developed some key proposals arising from the legal assessment of the EBSI ESSIF use case, oriented to extend the eIDAS Regulation to SSI solutions used with public sector bodies relationships and procedures. This results were publicly presented in the 2nd ESSIF Stakeholders Meeting that took place in Brussels mid-January 2020.
The objective of the ESSIF legal assessment is to evaluate the potential legal issues that are horizontal to an SSI solution, including:
DIDs: What is the legal nature and ownership of DIDs (asset vs a special kind of pseudonym), how should be DIDs managed in case of minors and incapable persons, if DID may be subject to seizure, when DIDs may be deactivated, what is the legal regime of keys and wallets, etc.
VCs: What are the duties and responsibilities of VCs issuers, holders and verifiers. How to model the contractual/non-contractual relations between issuers & verifiers, and set up liability models. We should pay special attention to the legal aspects of the VC lifecycle (issuance, suspension and revocation causes, etc).
Alignment of the SSI solution with the eIDAS Regulation: aligning VCs with eIDAS eID rules, but also linking VCs to eSeals or eSignatures.
Trust framework: legal input regarding LoAs, governance aspects, conformity, etc.
The use cases include:
Using eIDAS identification means (and qualified certificates?) to issue verifiable credentials.
Using qualified certificates to support verifiable claims (EBSI eIDAS bridge) and legal evidences with full legal value.
Using SSI VCs as an eIDAS identification means.
Using blockchain plus SSI as an electronic registered delivery service.
All content represent just the opinion of Ignacio Alamillo, and do not represent any official position from the EU Commission nor any of its officers
Self-Sovereign Identity and the MyData model from Finland - Antti 'Jogi' PoikolaSSIMeetup
Antti 'Jogi' Poikola, Researcher at Aalto University and Sovrin Foundation Trustee, features in our third Webinar "SSI & MyData" by explaining how MyData is both an alternative vision and guiding technical principles for how we, as individuals, can have more control over the data trails we leave behind us in our everyday actions. The core idea of MyData is that we, you and I, should have an easy way to see where data about us goes, specify who can use it, and alter these decisions over time. Jogi explains how this pieces fit together and how data is merging into the SSI space.
Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, a...Evernym
In Evernym's November 2021 webinar, we discussed the current state of decentralized identifiers (DIDs), their role in a more trusted Web, and why three of the four largest browser vendors are trying to stop their approval at the W3C.
On March 19, 2020, Evernym's product team gave a webinar introducing several new features for Verity and Connect.Me and unveiling our embedded wallet SDK for the very first time.
Here are the slides.
Verifiable Credentials for Global Supply ChainsKaryl Fowler
Transmute hosted a discussion at the Internet Identity Workshop (IIW30, April 2020) about the use of verifiable credentials in global supply chains, emphasizing customer discovery and education approaches to emerging technology adoption.
This presentation gives an overview on the work that is going on at OpenID Foundation in Liaison with Decentralized Identity Foundation to enable SSI applications based on OpenID Connect.
Introduction to Blockchain-as-a-Service (BaaS)Cygnet Infotech
Blockchain-as-a-Service (BaaS) allows businesses to use cloud-based solutions to build, host and use their own blockchain apps. Supply Chain a crucial BaaS use case suffers a major issue of the lack of traceability. BaaS offers transparency and traceability to the Supply Chain. Get in touch with experts of Cygnet to know more.
In this May 2020 webinar, Evernym's Andy Tobin gives an overview of safe credentials and the five tests to determine whether or not a portable verifiable credential is safe.
Then, we invite panelists from CULedger and Mastercard to share what safe credentials mean for them and their organizations.
Panelists:
- Julie Esser, SVP Marketing & Comms, CULedger
- Bryn Robinson-Morgan, VP Digital Identity, Mastercard
- Daniel Hardman, Chief Architect, Evernym
Blockchain became a popular technology trend because of cryptocurrencies. But, this technology has its applications beyond the Bitcoin and other cryptocurrencies.
This presentation was presented as the pre-opening talk at Identity North 2016 in Toronto. It covers the big question - What is Identity? Key Concepts and Terms. Contextualizing Identity for Enterprise, Government and in the Commons.
Identity can seem deceptively simple. We know who we are. Sometimes we have to convince others of that fact and confirm other characteristics: our age, our qualifications, or our right to access some services or tools. This happens every day over the Internet, but in ways that are disorganized, redundant, and risky. The lack of reliable, universal standards puts our private information at risk of public dissemination, fraud or worse.
The pioneers developing the internet didn’t define nuanced standards for identity -- most everything was just username and passwords. Over the past 20 years we have seen a range of standards that solve some identity challenges, including SAML, LDAP, OpenID Connect, OAuth, SCIM, Information Cards, and FIDO. None of them have comprehensively addressed the challenge of identity at internet scale.
A new set of standards is emerging that creates an infrastructure for self-sovereign identity that can scale. This talk looks forward to help you think ahead and prepare for this new infrastructure. We will walk through standards that together create a new identity infrastructure that leverages the blockchain. This isn’t about what you can implement tomorrow to solve your employee identity challenges or manage customer accounts. It will instead prepare you for the coming changes and help you play a role in shaping them.
Blockchain-Anchored Identity -- Daniel Buchner, Microsoftbernardgolden
In this presentation, Daniel Buchner discusses the need and challenge of identity in the digital society. Particular interest is paid to technical challenges and supporting blockchain technologies
Open Standards for Trusted and Universal ID SystemsTRUSTECH Event
Presentation held by Debora Comparin, Chair of the OSIA workgroup Secure Identity Alliance at TRUSTECH at on 27 November 2019 as part of the track: "How African governments are facing Identity needs and challenges".
Self-Sovereign Identity technology has enormous potential to empower individuals and address privacy challenges globally. It uses shared ledgers (blockchain) to give individuals the power to create and manage their own identifiers, collect verified claims and interact with others on the network on their terms. This lighting talk by one of the pioneers working on this new emerging layer of the internet for 15 years will give a high level picture of how it works covering the core standards and technologies along with outlining some potential use-cases.
Taking a page from the work that Kim did with “The Laws of Identity,” I wanted to provide the starting point for the community to build a similar set of design constraints and considerations for relationships and relationship management technologies. Our current IAM methods will be insufficient in a near future in which we are dealing with an unreasonable number of people and things and the relationships between them. At the IRM Summit, I’ll be presenting a strawman set of laws for relationships to help us think about this coming future. To that end, here is a preview of the laws (and axioms and attributes) of relationships.
Avoiding Two-factor Authentication? You're Not AlonePortalGuard
The extra factors are implemented to prove the user’s identity beyond a simple password. The definition states that to be two-factor authentication it must require the user to provide at least two of the factors listed above.
http://www.portalguard.com
Mature Digital Trust Infrastructure - Are we there yet?sorenpeter
Presented at the European e-Identity Management Conference 2011 in Tallinn, Estonia:
Reflections on current Government approaches to Trust, federation and identity management. What needs to change as we move forward. We have come a long way with PKI, federation standards, trust frameworks, etc. but are we there yet? Where is there still work to be done and mindsets to be changed?
Lessons in privacy engineering from a nation scale identity system - connect idDavid Kelts, CIPT
Everybody wants to achieve privacy by design? But how do you do that? This slideshare will show you how. What is privacy? What thought processes will bring about understanding of the security measures to take in order to ensure your users privacy?
Validide is a Self Sovereign Identity company enabling individuals to have a digital wallet they control, not the TechGiants nor Gov't. We believe everyone should BE FUTURE PROOF and OWN THEIR IDENTITY
Similar to Trust, Blockchains, and Self-Soveriegn Identity (20)
The Internet of Things will require a different programming model than the one we've used to build Web 2.0. This presentation discusses a proposed architecture for connecting everything based on persistent compute objects, or picos. Picos naturally supporting building microservices. The presentation makes use of a connected-car platform called Fuse (http://joinfuse.com) to illustrate the use of microservices in picos and evented systems.
The internet of things requires a different architectural model than what we've used to build Web 2.0. This presentation makes a proposal for what that architecture could look like and presents a working example based on the connected car platform Fuse (http://joinfuse.com)
A discussion of the Internet of Things and how I explored the use of an event-based API and microservices inside a unique architecture based on persistent compute objects, or picos, in the connected car platform called Fuse.
The internet of things will lead to a computing experience that is vastly different from what we have today. What will this experience be like and what will the architecture of an internet with trillions of nodes be like? This talk combines a look at this inevitable future with a discussion of some very practical experiments going on right now.
Persistent Compute Objects and the Fabric of CyberspacePhil Windley
Persistent Computer Objects, or picos, give rise to a new way to build internet-based applications to separates app and user data. Users control their own picos and thus the data and processing on them. This presentation describes what picos are, the new programming model they support, and shows Fuse, a sample application built using this new model.
I gave this presentation at Defragcon on November 5 2013.
Personal Cloud Application ArchitecturesPhil Windley
ersistent compute objects, or PCOs, are light-weight, event-based, cloud-hosted virtual machines that persistently store data and provide a programming model. PCOs represent a possible post-web architecture that supports privacy-by-design, breaks down application silos, and models real-world circumstances. This talk will present a model for PCOs based on standard Web technologies.
The future of personal clouds will be very different from what you have imagined. As more and more of our interactions move online, we increasingly have need of an online place that operates for us. Personal clouds must become more than appliances to achieve their real potential.
The web is moving from the Dynamic Query/Static Data model that has characterized Web 2.0 sites to a Dynamic Data/Static Query model that characterizes many of today's most interesting Internet interactions. What does this mean for your organization and how can you take advantage of this shift?
Shaping Strategies and the Live Web - Kynetx Impact 2011Phil Windley
Shaping strategies are business strategies wherein companies shape a market rather than exploiting niches in existing markets. This talk explores shaping strategies and gives examples. Of particular interest is the description of the Kynetx strategy and why it's a shaping strategy.
A Programming Layer for the Internet from Kynetx Impact 2010Phil Windley
Programming on the Internet requires a different mental model than programming other types of applications. At the same time, most Web programming frameworks do a poor job of supporting this model. This presentation introduces events in KRL and discusses the language's design. Evented languages like KRL close this gap by supporting programming constructs that make creating applications that work across multiples protocols and APIs easy.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Trust, Blockchains, and Self-Soveriegn Identity
1. Self-Sovereign Identity (SSI)
as an Alternative to
Existing Trust Models
Phillip J. Windley, Ph.D.
Office of the CIO
Brigham Young University
@windley
8. Claim
Inspector
Verifiable Claims
When you can
instantly trust what
someone says about
themselves,
workflows and
integrations are
dramatically
simplified.
Claim
Holder
Claim
Issuer
9. Three Things Make Sovrin Work
Decentralized Identifiers
DIDs provide pairwise
identity for every
relationship to prevent
correlation.
DID Descriptor Objects
link DIDs to public keys
and end points
Verifiable Claims
Allow third parties to
provide identity
owners with
credentials they can
use just like they do
offline.
Distributed Ledger
Global and public:
• nobody owns it
• everybody can use it
• anybody can improve
it
16. Self-Sovereign Identity
(SSI)
as an Alternative to
Existing Trust Models
Phillip J. Windley, Ph.D.
Brigham Young University
http://www.windley.com
@windley
Editor's Notes
Hi, I’m Phil Windley.
I’m an enterprise architect at Brigham Young University and co-founder of the Internet Identity Workshop.
I’m also the chair of a non-profit foundation that is building a global, public, decentralized identity utility called Sovrin.
Today I’m going to speak about trust and it’s relation to trust.
Internet identity is broken. There are too many anti-patterns and too many privacy breaches. Too many legitimate business cases are poorly served by current solutions.
I’m going to explain why I think a decentralized identity utility is a better way of using identity to create trust than the systems we’ve built to date.
Why do we build identity systems? There are several reasons, but on of the most important is trust.
Authentication is about trust.
Authentication answers the questions “How can I trust the person at the other end of this connection is who they say they are?”
Trust has evolved form somethings that was local and based on who you know. Now we use institutions like banks, universities, and others to allow us to trust strangers.
Trust helps us believe what people say. We constantly evaluate information based on trust.
But believing people online is difficult because identifiers lack the surrounding trustworthy context that is necessary to provide the clues we need to establish trust. The best way to create context around an identifier is to link it to other information in a way we can trust.
A trust framework places identifiers in context so that people can believe in them.
--
Image: https://commons.wikimedia.org/wiki/File:Vegetable_Vending_-_Andul_Bazaar_-_Howrah_2012-03-25_2917.JPG (CC BY 3.0)
When a site like Amazon builds an identity system, they’re creating a trust framework.
Simple trust frameworks allow the owner (Amazon in this case) to know things about the subjects of the framework with some level of certainty,.
This trust framework is centralized, owned, private.
We call them “administrative” because they’re designed to administer identity and establish trust in a specific domain. Amazon, in this case.
The system, the identifiers, and how they work are owned and controlled by Amazon. They are subject to Amazon’s terms and conditions.
They are useful for establishing trust within that domain, but not across domains
More complicated trust frameworks federate to transfer trust between the participants and establish outside the context of a single domain
For example, Visa and other credit systems provide a framework that links banks together so that I can use a card from one bank to buy something from a merchant who uses a different bank.
These trust frameworks rely on a central, overarching administrator (Visa in this case) to establish context in the form of business processes, legal agreements, and technology (BLT).
Other examples of trust frameworks that link multiple parties are services like Uber and AirBnB.
Trust frameworks are a vital part of commerce since they allow us to work with strangers.
In the physical world, trust frameworks are often more ad hoc and rely on trustworthy credentials.
When you go into the pharmacy to purchase drugs, they might want to know you’re over 18. In the US, at least, it’s common for them to ask for a driver’s license for this purpose. Why?
[click] Driver’s license is an identity credential for use in a specific administrative domain: licensing drivers
Nevertheless, because of it’s implementation, it has uses outside the administrative domain for which it was designed.
A driver’s license is implemented as a decentralized, trustworthy credential that serves as a container for a specific set of attributes. Its veracity is easily checked by recipients.
Because of this implementation, people are the conveyors of trustworthy attestations (called claims).
You can start a business today and decide you want to use a DL for proof of address and start doing it immediately. No permission required. No integrations. No APIs.
-- Image: https://www.pexels.com/photo/colors-colours-health-medicine-143654/ (CC0)
DL: https://www.dot.nd.gov/divisions/driverslicense/dlrequirements.htm
None of the identity systems in popular use today offer support for the same kind of ad hoc attribute sharing that happens in the physical world
Consequently, entities who want to rely on attributes from many parties have to perform integrations with all of them.
This is slow, complex, and costly, so it typically happens only for high-value applications.
Sovrin has built-in support for third-party claims that work the same way as physical credentials: they’re presented directly by the identity owner.
A Sovrin identity owner can use a claim issued by her employer to [click] disclose information (such as her salary) to her bank without the employer or bank [click] even needing a relationship, much less a technical integration. [click]
Sovrin claims can be used in ad hoc situations, just like credentials in the physical world, allowing individuals to function as integration points.
Three things make it work:
Distributed Ledger
Public, Permissioned Distributed Ledger has same virtues as the Internet:
Sovrin’s purpose-built ledger was created to provide world-class security and performance.
By not using the Bitcoin blockchain, Sovrin is able to create identity records cheaply and quickly.
Decentralized Identifiers & DID Descriptor Objects
DIDs provide pairwise identifiers for every relationship to prevent correlation.
DDOs associate DIDs with public keys and agent URLs.
DIDs can be verified using cryptography, enabling a digital “web of trust.”
Verifiable Claims & Zero-Knowledge Proofs
Verifiable claims provide the means for third parties to provide identity owners with credentials they can use just like they do offline.
Zero-knowledge proofs ensure that identity owners never need share more information than is necessary for a given transaction.
--
Images:
https://en.wikipedia.org/wiki/Network_topology#/media/File:NetworkTopology-Mesh.svg
https://commons.wikimedia.org/wiki/File:Barcode_EAN8.svg
https://commons.wikimedia.org/wiki/File:Pennsylvania-Drivers-License-1.gif
Let’s talk about the term ”self-sovereign.” This is an idea that makes some people nervous. But I think many misunderstand what it means.
In 1648, the treaties of Westphalia were signed, ending several decades-long religious wars. More importantly, these treaties established the modern idea of state sovereignty and non-interference which gives states exclusive control over the areas within their borders.
But, the beauty of sovereignty isn't complete and total control, but rather the idea of borders—boundaries—that sustain a balance of power that leads to negotiations about the nature of the relationships between various entities.
Sovrin clearly defines the boundaries, within which the person has complete control, and outside of which people and institutions can negotiate about shared information.
Sovrin is designed to give identity owners independent control of their personal data and relationships. Sovrin is built so that the owner of the identity is structurally part of transactions made about that identity. Pairwise identifiers not only prevent correlation, but they stop third parties from transacting without the identity owner taking part since the identity owner is the only place pairwise identifiers can be correlated.
But, other participants in the network are free to make their own decisions as well. For example, the pharmacy may not be willing to accept my self-asserted claim about my age and insist that I provide them with a claim from someone they trust.
--
Image: https://en.wikipedia.org/wiki/Peace_of_Westphalia#/media/File:Westfaelischer_Friede_in_Muenster_(Gerard_Terborch_1648).jpg
Another vital feature of decentralized identity—especially for a public ledger—is privacy. Privacy by Design is baked deep into Sovrin’s architecture as reflected by three fundamental features:
First, identifiers on Sovrin are pairwise unique and pseudonymous by default to prevent correlation. Sovrin is the first distributed ledger to be designed around Decentralized Identifiers (DIDs) as the primary keys on the ledger. DIDs are a new type of digital identifier that were invented to enable long-term digital identities that don’t require centralized registry services. DIDs are the basis of Sovrin’s pairwise identifier architecture.
Second, personal data is never written to the ledger. Rather all private data is exchanged over peer-to-peer encrypted connections between off-ledger agents. The ledger is only used for anchoring rather than publishing encrypted data.
Third, Sovrin has built-in support for zero-knowledge proofs (ZKP) to avoid unnecessary disclosure of identity attributes—privacy preserving technology that has been long pursued by IBM Research (Idemix) and Microsoft (UProve), but which a public ledger for decentralized identity now makes possible at scale.
All of this makes Sovrin a universal trust framework—one that can be used in many different situations to solve a variety of problems.
Sovrin provides the benefits of a trustworthy identity platform without each participant having to build it themselves.
Sovrin provides accessible provenance for trust transactions. Provenance is the foundation of accountability through recourse. Not only can Sovrin support user-controlled exchange of verifiable claims about an identifier, it also has a rock-solid revocation model for cases where those claims are no longer true. Verifiable claims are a key component of Sovrin’s ability to serve as a universal platform for exchanging trustworthy claims about identifiers.
--
Photo Credit: Lorimerlite Framework from Astris1 (CC BY-SA 3.0)
Sovrin provides the means of securely sharing information through Sovrin Trustworthy claims. As part of this, Sovrin provides standard mechanisms for:
Using claims in ways that preserve privacy,
Recording consent on how information will be used, and
Recording consent on what was shared.
As more and more of our lives are mediated by computational services, these features will become increasingly important for preserving personal independence as well as protecting companies from liability.
--
Image: https://pixabay.com/p-2021308/?no_redirect
[click] Healthcare: Sovrin partner Doctor’s Link is testing Sovrin as a means of transferring trustworthy claims about healthcare professionals’ credentials.
[click] Education: Brigham Young University is conducting a proof of concept that uses Sovrin Trustworthy Claims to give students control over their personal information, including their learning activities, and demonstrate how other parties can trust learning records shared by the student.
[click] Finance: USAA (a large US-based bank) and CULedger (a consortium of credit unions) are conducting proofs of concept on Sovrin for their Call centers and KYC processes.
[click] Disadvantaged populations: Sovrin Partner iRespond is conducting a proof of concept to show how Sovrin Trustworthy Claims can be used with their biometric identification systems to record immunization and other health data for under-documented people in Africa and Asia.
[click] Login: Web sites and service providers can store much less personal information since they can easily get it from the user through a Sovrin Trustworthy Claim, increasing security by removing honey-pots of data.
Image credits:
https://commons.wikimedia.org/wiki/File:Doctor_takes_blood_pressure.jpg, public domain
Student in Class from Albert Herring (CC BY 2.0)
Customer in bank, Indonesia https://www.flickr.com/photos/imtfi/21467116550 (CC BY-SA 2.0)
https://pixabay.com/en/login-register-window-button-570317/, public domain
So, where is Sovrin?
We will launch the provisional network within the month. The provisional network has reduced features but operates on the production ledger with sufficient validator nodes (run by Sovrin Stewards) to achieve eventual consensus using Sovrin’s Byzantine Fault Tolerance algorithm.
The provisional network will allow people and institutions to begin working with the Sovrin network.
The full-featured, general availability network will be available in the early fall.
There are a half-dozen proof of concept projects underway in using Sovrin.
--
Image: https://www.flickr.com/photos/dvanzuijlekom/8521605119/