SlideShare a Scribd company logo
Evernym
@evernym | info@evernym.com | March 2020
Verifiable Credentials
Lessons from the physical world
On the agenda
What are verifiable credentials?
What lessons can we learn from the physical world?
How can we apply these lessons?
Conclusion
Q&A
LET’S GO BACK IN TIME
before the Internet...
We call these “credentials”
They answer the question:
“Says who?”
There is already a global standard for
credentials - paper.
But it doesn’t work
online
The digital world had no equivalent
for paper credentials… until now.
Introducing digital,
verifiable credentials
They’re a lot like the physical credentials we
know and love, with a few ‘cryptographic
superpowers’ that allows any relying party to
complete four checks:
✔ Who issued the credential?
✔ To whom?
✔ Has it been tampered with?
✔ Has it been revoked?
All without contacting the credential issuer.
And in November 2019, the
data model for verifiable
credentials became an
official W3C
recommendation.
https://www.w3.org/TR/2019/REC-vc-data-mod
el-20191119/
Lody’s Passport
Wikimedia Commons (public domain) Wikimedia Commons (public domain)
So what can we learn?
1. Just holding a credential
isn’t enough
You have to prove that you’re the legitimate
holder.
Maybe you should also have to prove that the
device doing the proving is authorized...
● Link secrets
● Biometrics
2. Revocation is a big deal
The US State Department needed a way to
revoke stolen passport. It needed to be timely,
and the revocation needed to propagate
everywhere, quickly.
3. Abuse by holders isn’t
the only risk
...what about the German Foreign Ministry, who
“verified” Lody’s passport to grant an exit
permit? What about malicious issuers? Etc.
See Aries RFC 0207 — Credential Fraud Threat
Model.
4. Diffuse trust is important
for high stakes
Naval yards shouldn’t have just challenged for
passport, but also for another form of ID.
Like guy wires — having just one is not enough.
Stephen Edmonds, Flickr, CC-BY 2.0
5. Planning and governance
matter
Clarify everbody’s rights and responsibilities.
Identify situations that are tricky.
Codify which proofs are needed in which
circumstances, for which levels of assurance.
Make the basis of reputation explicit.
6. Issuers need to have
robust processes
What does “Real ID” push in the US tell us?
Reputation attaches to more than just the
right to assert a fact (Oxford vs. Podunk U)
Stephen Edmonds, Flickr, CC-BY 2.0
TSA, public domain
How are we applying these learnings to
digital credentials?
We’re integrating advanced key
management
see http://bit.ly/dkms-v4, http://j.mp/2xvp3Wd, http://j.mp/38EEB6Z
Impersonating Alice
outside Sovrin
● Step 1: Steal the wallet (phone)
● Step 2: Hack it → credentials + DID keys
● Step 3: ✅ Use Stolen Identity
Impersonating Alice
on Sovrin
● Step 1: Steal the wallet (phone)
● Step 2: Hack it → credentials + DID keys +
(maybe) link secret
● Step 3: ✘ Fail. Go look for a better target.
We’re providing process and accountability
with governance frameworks
see http://bit.ly/32LRkD5, http://j.mp/33cA8XK
We’re making credentials more secure with
biometrics
see https://doi.org/10.1109/MCOMSTD.001.1900033
We’re categorizing fraud through risk scoring
Your feedback encouraged: http://j.mp/2VR09dz
We’re exploring proof of unique human, link
secret bonds, and other fraud preventers.
see http://bit.ly/2SQtbag
We’re enabling lighter-weight revocation with
Anoncreds 2.0
see http://j.mp/3aOj8di
In conclusion…
Verifiable credentials can take the pain out of
proving who we are in the digital world.
But, it’s a young technology and there are many different ways of
architecting a credential and applying these lessons—
some good, some bad.
We’ll address these issues in depth in future webinars.
Thank you
Questions? Please drop them in the chat!
Connect with us via Twitter or Email
@evernym
info@evernym.com

More Related Content

What's hot

OpenID 4 Verifiable Credentials + HAIP (Update)
OpenID 4 Verifiable Credentials + HAIP (Update)OpenID 4 Verifiable Credentials + HAIP (Update)
OpenID 4 Verifiable Credentials + HAIP (Update)
Torsten Lodderstedt
 
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
SSIMeetup
 
Overview of Decentralized Identity
Overview of Decentralized IdentityOverview of Decentralized Identity
Overview of Decentralized Identity
Jim Flynn
 
OpenID for Verifiable Credentials
OpenID for Verifiable CredentialsOpenID for Verifiable Credentials
OpenID for Verifiable Credentials
Torsten Lodderstedt
 
Decentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep diveDecentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep dive
SSIMeetup
 
Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, a...
Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, a...Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, a...
Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, a...
Evernym
 
OpenID for SSI
OpenID for SSIOpenID for SSI
OpenID for SSI
Torsten Lodderstedt
 
Introduction to Self Sovereign Identity - IIW October 2019
Introduction to Self Sovereign Identity - IIW October 2019Introduction to Self Sovereign Identity - IIW October 2019
Introduction to Self Sovereign Identity - IIW October 2019
Heather Vescent
 
OpenID for Verifiable Credentials
OpenID for Verifiable CredentialsOpenID for Verifiable Credentials
OpenID for Verifiable Credentials
Torsten Lodderstedt
 
Verifiable credentials explained by CCI
Verifiable credentials explained by CCIVerifiable credentials explained by CCI
Verifiable credentials explained by CCI
Kaliya "Identity Woman" Young
 
OpenID for Verifiable Credentials (IIW 35)
OpenID for Verifiable Credentials (IIW 35)OpenID for Verifiable Credentials (IIW 35)
OpenID for Verifiable Credentials (IIW 35)
Torsten Lodderstedt
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web Summit
Kaliya "Identity Woman" Young
 
Introduction to Self Sovereign Identity
Introduction to Self Sovereign IdentityIntroduction to Self Sovereign Identity
Introduction to Self Sovereign Identity
Heather Vescent
 
OpenID for Verifiable Credentials @ IIW 36
OpenID for Verifiable Credentials @ IIW 36OpenID for Verifiable Credentials @ IIW 36
OpenID for Verifiable Credentials @ IIW 36
Torsten Lodderstedt
 
Verifiable Credentials for Travel & Hospitality
Verifiable Credentials for Travel & HospitalityVerifiable Credentials for Travel & Hospitality
Verifiable Credentials for Travel & Hospitality
Evernym
 
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan GeorgeHyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
SSIMeetup
 
What makes a successful SSI strategy?
What makes a successful SSI strategy?What makes a successful SSI strategy?
What makes a successful SSI strategy?
Evernym
 
OpenID Connect 4 SSI
OpenID Connect 4 SSIOpenID Connect 4 SSI
OpenID Connect 4 SSI
Torsten Lodderstedt
 
Blockchain-based Solutions for Identity & Access Management
Blockchain-based Solutions for Identity & Access ManagementBlockchain-based Solutions for Identity & Access Management
Blockchain-based Solutions for Identity & Access Management
Prabath Siriwardena
 
OIDC4VP for AB/C WG
OIDC4VP for AB/C WGOIDC4VP for AB/C WG
OIDC4VP for AB/C WG
Torsten Lodderstedt
 

What's hot (20)

OpenID 4 Verifiable Credentials + HAIP (Update)
OpenID 4 Verifiable Credentials + HAIP (Update)OpenID 4 Verifiable Credentials + HAIP (Update)
OpenID 4 Verifiable Credentials + HAIP (Update)
 
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
 
Overview of Decentralized Identity
Overview of Decentralized IdentityOverview of Decentralized Identity
Overview of Decentralized Identity
 
OpenID for Verifiable Credentials
OpenID for Verifiable CredentialsOpenID for Verifiable Credentials
OpenID for Verifiable Credentials
 
Decentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep diveDecentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep dive
 
Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, a...
Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, a...Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, a...
Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, a...
 
OpenID for SSI
OpenID for SSIOpenID for SSI
OpenID for SSI
 
Introduction to Self Sovereign Identity - IIW October 2019
Introduction to Self Sovereign Identity - IIW October 2019Introduction to Self Sovereign Identity - IIW October 2019
Introduction to Self Sovereign Identity - IIW October 2019
 
OpenID for Verifiable Credentials
OpenID for Verifiable CredentialsOpenID for Verifiable Credentials
OpenID for Verifiable Credentials
 
Verifiable credentials explained by CCI
Verifiable credentials explained by CCIVerifiable credentials explained by CCI
Verifiable credentials explained by CCI
 
OpenID for Verifiable Credentials (IIW 35)
OpenID for Verifiable Credentials (IIW 35)OpenID for Verifiable Credentials (IIW 35)
OpenID for Verifiable Credentials (IIW 35)
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web Summit
 
Introduction to Self Sovereign Identity
Introduction to Self Sovereign IdentityIntroduction to Self Sovereign Identity
Introduction to Self Sovereign Identity
 
OpenID for Verifiable Credentials @ IIW 36
OpenID for Verifiable Credentials @ IIW 36OpenID for Verifiable Credentials @ IIW 36
OpenID for Verifiable Credentials @ IIW 36
 
Verifiable Credentials for Travel & Hospitality
Verifiable Credentials for Travel & HospitalityVerifiable Credentials for Travel & Hospitality
Verifiable Credentials for Travel & Hospitality
 
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan GeorgeHyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
 
What makes a successful SSI strategy?
What makes a successful SSI strategy?What makes a successful SSI strategy?
What makes a successful SSI strategy?
 
OpenID Connect 4 SSI
OpenID Connect 4 SSIOpenID Connect 4 SSI
OpenID Connect 4 SSI
 
Blockchain-based Solutions for Identity & Access Management
Blockchain-based Solutions for Identity & Access ManagementBlockchain-based Solutions for Identity & Access Management
Blockchain-based Solutions for Identity & Access Management
 
OIDC4VP for AB/C WG
OIDC4VP for AB/C WGOIDC4VP for AB/C WG
OIDC4VP for AB/C WG
 

Similar to Verifiable Credentials in Self-Sovereign Identity (SSI)

Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon
Kaliya "Identity Woman" Young
 
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
David Wood
 
The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018
Kaliya "Identity Woman" Young
 
Tony Nadalin' presentation at eComm 2008
Tony Nadalin' presentation at eComm 2008Tony Nadalin' presentation at eComm 2008
Tony Nadalin' presentation at eComm 2008eComm2008
 
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Kaliya "Identity Woman" Young
 
Validide Corporation Pitch Deck 20210617
Validide Corporation Pitch Deck 20210617Validide Corporation Pitch Deck 20210617
Validide Corporation Pitch Deck 20210617
Lifelog Health
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenience
Don Lovett
 
Identity 101: Boot Camp for Identity North 2016
Identity 101: Boot Camp for Identity North 2016Identity 101: Boot Camp for Identity North 2016
Identity 101: Boot Camp for Identity North 2016
Kaliya "Identity Woman" Young
 
Domains of Identity and Self-Sovereign Identity India talk
Domains of Identity and Self-Sovereign Identity India talk Domains of Identity and Self-Sovereign Identity India talk
Domains of Identity and Self-Sovereign Identity India talk
Kaliya "Identity Woman" Young
 
The future of digital identity 2019 future agenda
The future of digital identity 2019   future agendaThe future of digital identity 2019   future agenda
The future of digital identity 2019 future agenda
Future Agenda
 
The future of digital identity initial perspective
The future of digital identity   initial perspectiveThe future of digital identity   initial perspective
The future of digital identity initial perspective
Future Agenda
 
Defi MOOC Fa21 - Decentralized Identity.pptx.pdf
Defi MOOC Fa21 - Decentralized Identity.pptx.pdfDefi MOOC Fa21 - Decentralized Identity.pptx.pdf
Defi MOOC Fa21 - Decentralized Identity.pptx.pdf
ssuser00208b
 
Introduction to Self-Sovereign Identity
Introduction to Self-Sovereign IdentityIntroduction to Self-Sovereign Identity
Introduction to Self-Sovereign Identity
Karyl Fowler
 
Designing Your Product Vision
Designing Your Product VisionDesigning Your Product Vision
Designing Your Product Vision
Carina Ngai
 
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign IdentityThe Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
Evernym
 
Indjic fintech module 3
Indjic fintech module 3Indjic fintech module 3
Indjic fintech module 3
Drago Indjic
 
Crypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerCrypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedger
Darrell O'Donnell
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy Exam
Lisa Olive
 

Similar to Verifiable Credentials in Self-Sovereign Identity (SSI) (20)

Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon
 
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
 
The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018
 
Tony Nadalin' presentation at eComm 2008
Tony Nadalin' presentation at eComm 2008Tony Nadalin' presentation at eComm 2008
Tony Nadalin' presentation at eComm 2008
 
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
 
Validide Corporation Pitch Deck 20210617
Validide Corporation Pitch Deck 20210617Validide Corporation Pitch Deck 20210617
Validide Corporation Pitch Deck 20210617
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenience
 
Identity 101: Boot Camp for Identity North 2016
Identity 101: Boot Camp for Identity North 2016Identity 101: Boot Camp for Identity North 2016
Identity 101: Boot Camp for Identity North 2016
 
Domains of Identity and Self-Sovereign Identity India talk
Domains of Identity and Self-Sovereign Identity India talk Domains of Identity and Self-Sovereign Identity India talk
Domains of Identity and Self-Sovereign Identity India talk
 
Stu w25 a
Stu w25 aStu w25 a
Stu w25 a
 
The future of digital identity 2019 future agenda
The future of digital identity 2019   future agendaThe future of digital identity 2019   future agenda
The future of digital identity 2019 future agenda
 
The future of digital identity initial perspective
The future of digital identity   initial perspectiveThe future of digital identity   initial perspective
The future of digital identity initial perspective
 
Defi MOOC Fa21 - Decentralized Identity.pptx.pdf
Defi MOOC Fa21 - Decentralized Identity.pptx.pdfDefi MOOC Fa21 - Decentralized Identity.pptx.pdf
Defi MOOC Fa21 - Decentralized Identity.pptx.pdf
 
Introduction to Self-Sovereign Identity
Introduction to Self-Sovereign IdentityIntroduction to Self-Sovereign Identity
Introduction to Self-Sovereign Identity
 
Designing Your Product Vision
Designing Your Product VisionDesigning Your Product Vision
Designing Your Product Vision
 
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign IdentityThe Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
 
Hope x talk
Hope x talkHope x talk
Hope x talk
 
Indjic fintech module 3
Indjic fintech module 3Indjic fintech module 3
Indjic fintech module 3
 
Crypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerCrypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedger
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy Exam
 

More from Evernym

Evernym May 2021 Product Update
Evernym May 2021 Product UpdateEvernym May 2021 Product Update
Evernym May 2021 Product Update
Evernym
 
SSI & Healthcare: Lessons from the NHS
SSI & Healthcare: Lessons from the NHSSSI & Healthcare: Lessons from the NHS
SSI & Healthcare: Lessons from the NHS
Evernym
 
IATA Travel Pass - Evernym Webinar
IATA Travel Pass - Evernym WebinarIATA Travel Pass - Evernym Webinar
IATA Travel Pass - Evernym Webinar
Evernym
 
Meet Connect.Me & Evernym's Mobile SDK
Meet Connect.Me & Evernym's Mobile SDKMeet Connect.Me & Evernym's Mobile SDK
Meet Connect.Me & Evernym's Mobile SDK
Evernym
 
Open Source & What It Means For Self-Sovereign Identity (SSI)
Open Source & What It Means For Self-Sovereign Identity (SSI)Open Source & What It Means For Self-Sovereign Identity (SSI)
Open Source & What It Means For Self-Sovereign Identity (SSI)
Evernym
 
The Future of Digital Wallets - Evernym Webinar
The Future of Digital Wallets - Evernym WebinarThe Future of Digital Wallets - Evernym Webinar
The Future of Digital Wallets - Evernym Webinar
Evernym
 
Meet Verity, Evernym's Digital Credential Platform
Meet Verity, Evernym's Digital Credential PlatformMeet Verity, Evernym's Digital Credential Platform
Meet Verity, Evernym's Digital Credential Platform
Evernym
 
An Expert Panel on Safe Credentials
An Expert Panel on Safe CredentialsAn Expert Panel on Safe Credentials
An Expert Panel on Safe Credentials
Evernym
 
Verifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIF
Verifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIFVerifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIF
Verifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIF
Evernym
 
Enhancing Learner Mobility with SSI & Portable Digital Credentials
Enhancing Learner Mobility with SSI & Portable Digital CredentialsEnhancing Learner Mobility with SSI & Portable Digital Credentials
Enhancing Learner Mobility with SSI & Portable Digital Credentials
Evernym
 
Trust over IP (ToIP)
Trust over IP (ToIP)Trust over IP (ToIP)
Trust over IP (ToIP)
Evernym
 
Meet Evernym's SSI Platform
Meet Evernym's SSI PlatformMeet Evernym's SSI Platform
Meet Evernym's SSI Platform
Evernym
 
Getting Started With Self-Sovereign Identity (SSI) | Evernym Webinar
Getting Started With Self-Sovereign Identity (SSI) | Evernym WebinarGetting Started With Self-Sovereign Identity (SSI) | Evernym Webinar
Getting Started With Self-Sovereign Identity (SSI) | Evernym Webinar
Evernym
 
SSI & Digital Guardianship Webinar
SSI & Digital Guardianship WebinarSSI & Digital Guardianship Webinar
SSI & Digital Guardianship Webinar
Evernym
 
Digital Guardianship in Self-Sovereign Identity
Digital Guardianship in Self-Sovereign IdentityDigital Guardianship in Self-Sovereign Identity
Digital Guardianship in Self-Sovereign Identity
Evernym
 

More from Evernym (15)

Evernym May 2021 Product Update
Evernym May 2021 Product UpdateEvernym May 2021 Product Update
Evernym May 2021 Product Update
 
SSI & Healthcare: Lessons from the NHS
SSI & Healthcare: Lessons from the NHSSSI & Healthcare: Lessons from the NHS
SSI & Healthcare: Lessons from the NHS
 
IATA Travel Pass - Evernym Webinar
IATA Travel Pass - Evernym WebinarIATA Travel Pass - Evernym Webinar
IATA Travel Pass - Evernym Webinar
 
Meet Connect.Me & Evernym's Mobile SDK
Meet Connect.Me & Evernym's Mobile SDKMeet Connect.Me & Evernym's Mobile SDK
Meet Connect.Me & Evernym's Mobile SDK
 
Open Source & What It Means For Self-Sovereign Identity (SSI)
Open Source & What It Means For Self-Sovereign Identity (SSI)Open Source & What It Means For Self-Sovereign Identity (SSI)
Open Source & What It Means For Self-Sovereign Identity (SSI)
 
The Future of Digital Wallets - Evernym Webinar
The Future of Digital Wallets - Evernym WebinarThe Future of Digital Wallets - Evernym Webinar
The Future of Digital Wallets - Evernym Webinar
 
Meet Verity, Evernym's Digital Credential Platform
Meet Verity, Evernym's Digital Credential PlatformMeet Verity, Evernym's Digital Credential Platform
Meet Verity, Evernym's Digital Credential Platform
 
An Expert Panel on Safe Credentials
An Expert Panel on Safe CredentialsAn Expert Panel on Safe Credentials
An Expert Panel on Safe Credentials
 
Verifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIF
Verifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIFVerifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIF
Verifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIF
 
Enhancing Learner Mobility with SSI & Portable Digital Credentials
Enhancing Learner Mobility with SSI & Portable Digital CredentialsEnhancing Learner Mobility with SSI & Portable Digital Credentials
Enhancing Learner Mobility with SSI & Portable Digital Credentials
 
Trust over IP (ToIP)
Trust over IP (ToIP)Trust over IP (ToIP)
Trust over IP (ToIP)
 
Meet Evernym's SSI Platform
Meet Evernym's SSI PlatformMeet Evernym's SSI Platform
Meet Evernym's SSI Platform
 
Getting Started With Self-Sovereign Identity (SSI) | Evernym Webinar
Getting Started With Self-Sovereign Identity (SSI) | Evernym WebinarGetting Started With Self-Sovereign Identity (SSI) | Evernym Webinar
Getting Started With Self-Sovereign Identity (SSI) | Evernym Webinar
 
SSI & Digital Guardianship Webinar
SSI & Digital Guardianship WebinarSSI & Digital Guardianship Webinar
SSI & Digital Guardianship Webinar
 
Digital Guardianship in Self-Sovereign Identity
Digital Guardianship in Self-Sovereign IdentityDigital Guardianship in Self-Sovereign Identity
Digital Guardianship in Self-Sovereign Identity
 

Recently uploaded

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 

Recently uploaded (20)

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 

Verifiable Credentials in Self-Sovereign Identity (SSI)

  • 1. Evernym @evernym | info@evernym.com | March 2020 Verifiable Credentials Lessons from the physical world
  • 2. On the agenda What are verifiable credentials? What lessons can we learn from the physical world? How can we apply these lessons? Conclusion Q&A
  • 3. LET’S GO BACK IN TIME before the Internet...
  • 4.
  • 5.
  • 6. We call these “credentials”
  • 7. They answer the question: “Says who?” There is already a global standard for credentials - paper.
  • 8. But it doesn’t work online The digital world had no equivalent for paper credentials… until now.
  • 9. Introducing digital, verifiable credentials They’re a lot like the physical credentials we know and love, with a few ‘cryptographic superpowers’ that allows any relying party to complete four checks: ✔ Who issued the credential? ✔ To whom? ✔ Has it been tampered with? ✔ Has it been revoked? All without contacting the credential issuer.
  • 10. And in November 2019, the data model for verifiable credentials became an official W3C recommendation. https://www.w3.org/TR/2019/REC-vc-data-mod el-20191119/
  • 11. Lody’s Passport Wikimedia Commons (public domain) Wikimedia Commons (public domain)
  • 12. So what can we learn?
  • 13. 1. Just holding a credential isn’t enough You have to prove that you’re the legitimate holder. Maybe you should also have to prove that the device doing the proving is authorized... ● Link secrets ● Biometrics
  • 14. 2. Revocation is a big deal The US State Department needed a way to revoke stolen passport. It needed to be timely, and the revocation needed to propagate everywhere, quickly.
  • 15. 3. Abuse by holders isn’t the only risk ...what about the German Foreign Ministry, who “verified” Lody’s passport to grant an exit permit? What about malicious issuers? Etc. See Aries RFC 0207 — Credential Fraud Threat Model.
  • 16. 4. Diffuse trust is important for high stakes Naval yards shouldn’t have just challenged for passport, but also for another form of ID. Like guy wires — having just one is not enough. Stephen Edmonds, Flickr, CC-BY 2.0
  • 17. 5. Planning and governance matter Clarify everbody’s rights and responsibilities. Identify situations that are tricky. Codify which proofs are needed in which circumstances, for which levels of assurance. Make the basis of reputation explicit.
  • 18. 6. Issuers need to have robust processes What does “Real ID” push in the US tell us? Reputation attaches to more than just the right to assert a fact (Oxford vs. Podunk U) Stephen Edmonds, Flickr, CC-BY 2.0 TSA, public domain
  • 19. How are we applying these learnings to digital credentials?
  • 20. We’re integrating advanced key management see http://bit.ly/dkms-v4, http://j.mp/2xvp3Wd, http://j.mp/38EEB6Z
  • 21. Impersonating Alice outside Sovrin ● Step 1: Steal the wallet (phone) ● Step 2: Hack it → credentials + DID keys ● Step 3: ✅ Use Stolen Identity
  • 22. Impersonating Alice on Sovrin ● Step 1: Steal the wallet (phone) ● Step 2: Hack it → credentials + DID keys + (maybe) link secret ● Step 3: ✘ Fail. Go look for a better target.
  • 23. We’re providing process and accountability with governance frameworks see http://bit.ly/32LRkD5, http://j.mp/33cA8XK
  • 24. We’re making credentials more secure with biometrics see https://doi.org/10.1109/MCOMSTD.001.1900033
  • 25. We’re categorizing fraud through risk scoring Your feedback encouraged: http://j.mp/2VR09dz
  • 26. We’re exploring proof of unique human, link secret bonds, and other fraud preventers. see http://bit.ly/2SQtbag
  • 27. We’re enabling lighter-weight revocation with Anoncreds 2.0 see http://j.mp/3aOj8di
  • 28. In conclusion… Verifiable credentials can take the pain out of proving who we are in the digital world. But, it’s a young technology and there are many different ways of architecting a credential and applying these lessons— some good, some bad. We’ll address these issues in depth in future webinars.
  • 29. Thank you Questions? Please drop them in the chat! Connect with us via Twitter or Email @evernym info@evernym.com