SlideShare a Scribd company logo
Why The Web Needs
Decentralized Identifiers (DIDs)
—Even if Google, Apple, and Mozilla Disagree
November 3, 2021
@evernym | www.evernym.com
Andy Tobin
Managing Director, Europe,
Evernym
Drummond Reed
Chief Trust Officer,
Evernym
Co-Editor, DID Spec
Today’s presenters
James Monaghan
VP Product,
Evernym
On the agenda
The controversy at the W3C
Why the future of the Web is at stake
What are DIDs, and why do we need them?
The DID Spec 1.0 and the W3C’s DID Working Group
The path to becoming a W3C standard
Our response to the formal objections made by
Google, Apple, and Mozilla
Q&A
First, what is the controversy at the
World Wide Web Consortium (W3C)?
vs.
Web 3.0
Web 2.0
SSI & Decentralized Identifiers:
Reclaiming the soul of the web
Credit to Nick Price, Decentralized Identity Foundation
TCP / IP
HTTP /
Browser
GSM /
Mobile
Decentralization /
P2P
1974 - 1982 1989 - 1997 1993 - 2007 2018 -
You
You
DIDs put you in the center of your digital world
centralized decentralized
Why is the future of the Web at stake?
In a nutshell, it’s all about control:
● How much control will you have over your digital life?
● Your digital wallet?
● Your digital credentials?
● Your secure communications?
● Your privacy?
● Your personal data?
● Your ability to use the hardware and software of your choice?
What are DIDs
anyways?
Decentralized
Identifiers (DIDs)
A new type of globally unique
identifier (URI) that does not
require a centralized registration
authority because control of the
identifier can be proved using
cryptography.
For a more technical introduction to
DIDs, view our previous webinar:
https://vimeo.com/363406397
“DIDs are the atomic building
block of decentralized digital
trust infrastructure.”
Chapter 8:
Decentralized Identifiers
https://www.manning.com/books/self-sovereign-identity
In simple terms:
A DID is a digital control point.
Example: email address
Your
devices
Some server
at some service
provider
somewhere
Control point
You
Example: phone number
Control point
Your
devices
Some server
at some service
provider
somewhere
You
Example: domain name
Control point
Your
devices
Some server
at some service
provider
somewhere
You
Example: Decentralized Identifier
Your
devices
Some server
at some service
provider
somewhere
You
Control point
The “cryptographic triangle” behind all DIDs
DID
Public
Key
Private
Key
Control point
This never needs
to change
Even when these
need to change
(“key rotation”)
What are the benefits of
being in control?
With DIDs, you can:
Login without usernames and passwords
Digitally sign documents or transactions
Create persistent communications channels
Send encrypted private messages
Transfer value or assets
Authorize delegates or guardians
Consumer benefits:
● Control your data and online communications
● Create DIDs yourself; you don’t need to rely on anyone else and nobody can take
your DIDs away from you
● Have as many DIDs as you want to maintain your privacy
● Use your DIDs anywhere you want—they are fully portable
● Use your DIDs on your own terms—not anyone else's
● Choose which information your share with your DIDs
● All of this without surveillance or middlemen
Business benefits:
● Provide simple, secure, universal login for all your customers
● Digitally sign verifiable credentials that can be verified by anyone
● Create lifetime private channels with all your customers
● Make it nearly impossible for a phisher to spoof your business
● Prove the authenticity of your data, devices, people, & products
● Automate both internal and external business processes that require trust
● Benefit from entirely new business models, rooted in trusted data
● Connect and interact with your customers in a whole new way
What role do DIDs play in SSI,
and how are they being used today?
DIDs and VCs are the
twin pillars of self-sovereign identity
A global movement
>350 member organizations
Funding DID-based verifiable credentials
for use in supply chain verification
DID-based ‘staff passports’ for the world’s
third-largest employer
DID-based travel and health credentials,
in trial with 70+ major airlines
DID-based verifiable LEIs for businesses
and their representatives
DID-based KYC credentials for the
financial industry
DID-based portable patient records and
healthcare credentials
with production use
A (very) brief history of the ‘DID Spec’
A (very) brief history of the
‘DID Spec’
W3C Decentralized Identifiers (DIDs) 1.0
● Required syntax for all DIDs
● Required data model for all DID documents
● Required operations for all DID methods
● Security & Privacy Considerations
W3C DID Specification Registries
● Registry for DID methods, DID document
properties, key types, service types
● 112 DID methods currently registered
W3C DID Method Rubric 1.0
● Specifies suggested criteria and processes
for market evaluation of DID methods
W3C DID Implementation Guide
DID Spec 1.0
History of the DID spec prior to the
W3C Working Group
2015 2016 2017 2018 2019
Spring IIW: First
blockchain identity
discussions
W3C VCTF: A
Decentralized Hash
Table for the Web
Fall IIW: Decision to
begin blockchain ID
projects
DHS: Awards 1st
blockchain Identity
R&D contracts
IIW+RWOT: DID Spec
work fully underway
IIW+RWOT: First DID
Spec nearly complete
DHS: First DID Spec
published & contract
complete
DHS:
DKMS contract
awarded; work
begins
W3C CCG: DID Spec
contributed
DHS:
DKMS Design &
Architecture V3
published
W3C CCG: Second
draft of DID Spec
W3C CCG: Work on
DID WG Charter
begins
DHS:
DKMS Design &
Architecture V4
published
W3C CCG:
Community Final
Draft of DID Spec
W3C:
DID WG Charter
approved
W3C DID Working Group
begins Sept 2019
Work on DIDs
begins
The two-year path to becoming a W3C
standard (“REC”)
July 2021
May 2021
(CR2)
Nov 2020
(CR1)
Nov 2019
(FPWD)
May 2020
(Feature freeze)
August 2021
3 formal
objectors
So, what were these
formal objections?
Our Response:
Objection #1:
No practical
interoperability
of DID methods
1. It misses the point that the DID spec
establishes a baseline of interoperability
across ALL DID methods
○ It doesn’t matter how many DID methods
there are—they all produce the same result
2. Our WG Charter explicitly prohibited us
from specifying any DID methods
○ That is not our job—that is the job of each DID
method specification author
3. Each DID method spec establishes its
own interoperability requirements
○ Any DID method can and should have
multiple interoperable implementations
Objection #2:
Encourages
divergence
rather than
convergence of
DID methods
Our Response:
1. For the second time, this misses the
point of the DID spec: it specifies
interoperability for all DID methods
○ They all use a DID resolver to take a DID as
input and return a DID document as output
2. The market should determine the
success of DID methods—just as it has
with URI schemes and URN namespaces
○ There are 345 URI schemes and 70 URN
namespaces registered with IANA
3. URI schemes and URN namespaces are
all based on federated registries
○ DIDs are decentralized — each DID method
is a cryptographic solution to the DID triangle
Objection #3:
Centralized DID
methods are not
prohibited
Our Response:
1. “Decentralization” means “innovation at
the edges”
○ It would be a travesty if a centralized registry
controlled all innovation in DID methods
2. It is not the DID Working Group’s job—or
the W3C’s job—to judge DID methods
○ It is the market’s job—a job the market can do
much more efficiently and effectively
3. The whole purpose of the DID Method
Rubric is to facilitate market evaluations
○ It is a registry of recommended criteria and
processes for performing evaluations
Objection #4:
DID methods
using
proof-of-work
blockchains are
harmful for
environmental
sustainability
Our Response:
1. DID method implementations are
out-of-scope for the DID 1.0 spec
○ Each method makes its own choices about
how to implement a Verifiable Data Registry
2. Environmental sustainability is a perfect
example of a DID Method Rubric criteria
○ The Rubric is constantly being improved with
evaluation criteria for this and other factors
3. This is one more example of why the
market should choose DID methods
○ The DID 1.0 spec was explicitly designed to
encourage decentralized market competition
The Future of the Web Is
Decentralized
DIDs are inevitable
● Don’t panic — a lot of people are working really hard to get the DID spec approved
○ Very few W3C formal objections are sustained — it just takes some time to resolve
● The governmental, commercial, and social progress of DIDs is already unstoppable
○ The genie is not going back in the bottle
● This has no effect on Evernym’s products or customers
○ We are charging ahead with innovations in DID-based products and services
● The real lesson here is that decentralization means a shift in control
○ From large tech vendors (the “center”) to users (the “edges”)
● This is a strong signal that this shift is finally happening—for real
DIDs are the innovation that
democratizes cryptography so
that everyone can use it.
Thanks for joining us today!
For more content on decentralized identifiers and verifiable
credentials, please visit www.evernym.com/webinars/
November 3, 2021
@evernym | www.evernym.com

More Related Content

What's hot

What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?
Evernym
 
OpenID for Verifiable Credentials
OpenID for Verifiable CredentialsOpenID for Verifiable Credentials
OpenID for Verifiable Credentials
Torsten Lodderstedt
 
OpenID Connect 4 SSI
OpenID Connect 4 SSIOpenID Connect 4 SSI
OpenID Connect 4 SSI
Torsten Lodderstedt
 
Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs
Vasiliy Suvorov
 
Overview of Decentralized Identity
Overview of Decentralized IdentityOverview of Decentralized Identity
Overview of Decentralized Identity
Jim Flynn
 
Verifiable Credentials for Global Supply Chains
Verifiable Credentials for Global Supply ChainsVerifiable Credentials for Global Supply Chains
Verifiable Credentials for Global Supply Chains
Karyl Fowler
 
Hyperledger Indy tutorial
Hyperledger Indy tutorialHyperledger Indy tutorial
Hyperledger Indy tutorial
ssuser3993f3
 
OpenID 4 Verifiable Credentials + HAIP (Update)
OpenID 4 Verifiable Credentials + HAIP (Update)OpenID 4 Verifiable Credentials + HAIP (Update)
OpenID 4 Verifiable Credentials + HAIP (Update)
Torsten Lodderstedt
 
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
Torsten Lodderstedt
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web Summit
Kaliya "Identity Woman" Young
 
OpenID for SSI
OpenID for SSIOpenID for SSI
OpenID for SSI
Torsten Lodderstedt
 
Digital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksDigital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For Banks
Evernym
 
The Hyperledger Indy Public Blockchain Node
The Hyperledger Indy Public Blockchain NodeThe Hyperledger Indy Public Blockchain Node
The Hyperledger Indy Public Blockchain Node
SSIMeetup
 
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
Torsten Lodderstedt
 
OIDC4VP for AB/C WG
OIDC4VP for AB/C WGOIDC4VP for AB/C WG
OIDC4VP for AB/C WG
Torsten Lodderstedt
 
비트코인으로 이해하는 블록체인 기술
비트코인으로 이해하는 블록체인 기술비트코인으로 이해하는 블록체인 기술
비트코인으로 이해하는 블록체인 기술
Seong-Bok Lee
 
Verifiable Credentials for Travel & Hospitality
Verifiable Credentials for Travel & HospitalityVerifiable Credentials for Travel & Hospitality
Verifiable Credentials for Travel & Hospitality
Evernym
 
Decentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep diveDecentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep dive
SSIMeetup
 
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
SSIMeetup
 
What makes a successful SSI strategy?
What makes a successful SSI strategy?What makes a successful SSI strategy?
What makes a successful SSI strategy?
Evernym
 

What's hot (20)

What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?
 
OpenID for Verifiable Credentials
OpenID for Verifiable CredentialsOpenID for Verifiable Credentials
OpenID for Verifiable Credentials
 
OpenID Connect 4 SSI
OpenID Connect 4 SSIOpenID Connect 4 SSI
OpenID Connect 4 SSI
 
Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs
 
Overview of Decentralized Identity
Overview of Decentralized IdentityOverview of Decentralized Identity
Overview of Decentralized Identity
 
Verifiable Credentials for Global Supply Chains
Verifiable Credentials for Global Supply ChainsVerifiable Credentials for Global Supply Chains
Verifiable Credentials for Global Supply Chains
 
Hyperledger Indy tutorial
Hyperledger Indy tutorialHyperledger Indy tutorial
Hyperledger Indy tutorial
 
OpenID 4 Verifiable Credentials + HAIP (Update)
OpenID 4 Verifiable Credentials + HAIP (Update)OpenID 4 Verifiable Credentials + HAIP (Update)
OpenID 4 Verifiable Credentials + HAIP (Update)
 
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web Summit
 
OpenID for SSI
OpenID for SSIOpenID for SSI
OpenID for SSI
 
Digital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksDigital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For Banks
 
The Hyperledger Indy Public Blockchain Node
The Hyperledger Indy Public Blockchain NodeThe Hyperledger Indy Public Blockchain Node
The Hyperledger Indy Public Blockchain Node
 
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
 
OIDC4VP for AB/C WG
OIDC4VP for AB/C WGOIDC4VP for AB/C WG
OIDC4VP for AB/C WG
 
비트코인으로 이해하는 블록체인 기술
비트코인으로 이해하는 블록체인 기술비트코인으로 이해하는 블록체인 기술
비트코인으로 이해하는 블록체인 기술
 
Verifiable Credentials for Travel & Hospitality
Verifiable Credentials for Travel & HospitalityVerifiable Credentials for Travel & Hospitality
Verifiable Credentials for Travel & Hospitality
 
Decentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep diveDecentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep dive
 
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
 
What makes a successful SSI strategy?
What makes a successful SSI strategy?What makes a successful SSI strategy?
What makes a successful SSI strategy?
 

Similar to Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, and Mozilla Disagree

Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
Don’t Just Trust Cloud Providers - How To Audit Cloud ProvidersDon’t Just Trust Cloud Providers - How To Audit Cloud Providers
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
Michael Davis
 
Accelerate Self-service Analytics with Universal Semantic Model
Accelerate Self-service Analytics with Universal Semantic Model Accelerate Self-service Analytics with Universal Semantic Model
Accelerate Self-service Analytics with Universal Semantic Model
Denodo
 
SSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley HughesSSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley Hughes
SSIMeetup
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for value
Deloitte United States
 
A Walk through SSO
A Walk through SSOA Walk through SSO
A Walk through SSOWSO2
 
Self-Service Analytics with Guard Rails
Self-Service Analytics with Guard RailsSelf-Service Analytics with Guard Rails
Self-Service Analytics with Guard Rails
Denodo
 
OpenAthens Conference 2018 - Don Thibeau - OpenID Connect
OpenAthens Conference 2018 - Don Thibeau - OpenID ConnectOpenAthens Conference 2018 - Don Thibeau - OpenID Connect
OpenAthens Conference 2018 - Don Thibeau - OpenID Connect
OpenAthens
 
Securing The Reality of Multiple Cloud Apps: Pandora's Story
Securing The Reality of Multiple Cloud Apps: Pandora's StorySecuring The Reality of Multiple Cloud Apps: Pandora's Story
Securing The Reality of Multiple Cloud Apps: Pandora's Story
CloudLock
 
Cybersecurity Implementation and Certification in Practice for IoT Equipment
Cybersecurity Implementation and Certification in Practice for IoT EquipmentCybersecurity Implementation and Certification in Practice for IoT Equipment
Cybersecurity Implementation and Certification in Practice for IoT Equipment
Onward Security
 
SOA with Data Virtualization (session 4 from Packed Lunch Webinar Series)
SOA with Data Virtualization (session 4 from Packed Lunch Webinar Series)SOA with Data Virtualization (session 4 from Packed Lunch Webinar Series)
SOA with Data Virtualization (session 4 from Packed Lunch Webinar Series)
Denodo
 
Enabling Large-Scale Multi-Party Federations with OpenID Connect - OpenID Sum...
Enabling Large-Scale Multi-Party Federations with OpenID Connect - OpenID Sum...Enabling Large-Scale Multi-Party Federations with OpenID Connect - OpenID Sum...
Enabling Large-Scale Multi-Party Federations with OpenID Connect - OpenID Sum...
OpenID Foundation Japan
 
Achieving Self-Service Analytics with a Governed Data Services Layer
Achieving Self-Service Analytics with a Governed Data Services LayerAchieving Self-Service Analytics with a Governed Data Services Layer
Achieving Self-Service Analytics with a Governed Data Services Layer
Denodo
 
Medical Device UDI Compliance in the Cloud
Medical Device UDI Compliance in the CloudMedical Device UDI Compliance in the Cloud
Medical Device UDI Compliance in the Cloud
KPIT
 
IT Security: What an In-Plant Print Center Needs to Know
IT Security: What an In-Plant Print Center Needs to KnowIT Security: What an In-Plant Print Center Needs to Know
IT Security: What an In-Plant Print Center Needs to Know
Rochester Software Associates
 
How Personal Cloud Networks Enable New Business Models
How Personal Cloud Networks Enable New Business ModelsHow Personal Cloud Networks Enable New Business Models
How Personal Cloud Networks Enable New Business Models
drummondreed
 
Google peter logli & jake shea
Google   peter logli & jake sheaGoogle   peter logli & jake shea
Google peter logli & jake shea
ColloqueRISQ
 
Kantara Workshop at CIS
Kantara Workshop at CISKantara Workshop at CIS
Kantara Workshop at CIS
kantarainitiative
 
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Cloud Standards Customer Council
 
George Mokhbat V SCTC day cloud 24 feb16
George Mokhbat V SCTC day cloud 24 feb16George Mokhbat V SCTC day cloud 24 feb16
George Mokhbat V SCTC day cloud 24 feb16
Agustin Argelich Casals
 

Similar to Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, and Mozilla Disagree (20)

Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
Don’t Just Trust Cloud Providers - How To Audit Cloud ProvidersDon’t Just Trust Cloud Providers - How To Audit Cloud Providers
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
 
Accelerate Self-service Analytics with Universal Semantic Model
Accelerate Self-service Analytics with Universal Semantic Model Accelerate Self-service Analytics with Universal Semantic Model
Accelerate Self-service Analytics with Universal Semantic Model
 
SSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley HughesSSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley Hughes
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for value
 
Sso walk-through
Sso walk-throughSso walk-through
Sso walk-through
 
A Walk through SSO
A Walk through SSOA Walk through SSO
A Walk through SSO
 
Self-Service Analytics with Guard Rails
Self-Service Analytics with Guard RailsSelf-Service Analytics with Guard Rails
Self-Service Analytics with Guard Rails
 
OpenAthens Conference 2018 - Don Thibeau - OpenID Connect
OpenAthens Conference 2018 - Don Thibeau - OpenID ConnectOpenAthens Conference 2018 - Don Thibeau - OpenID Connect
OpenAthens Conference 2018 - Don Thibeau - OpenID Connect
 
Securing The Reality of Multiple Cloud Apps: Pandora's Story
Securing The Reality of Multiple Cloud Apps: Pandora's StorySecuring The Reality of Multiple Cloud Apps: Pandora's Story
Securing The Reality of Multiple Cloud Apps: Pandora's Story
 
Cybersecurity Implementation and Certification in Practice for IoT Equipment
Cybersecurity Implementation and Certification in Practice for IoT EquipmentCybersecurity Implementation and Certification in Practice for IoT Equipment
Cybersecurity Implementation and Certification in Practice for IoT Equipment
 
SOA with Data Virtualization (session 4 from Packed Lunch Webinar Series)
SOA with Data Virtualization (session 4 from Packed Lunch Webinar Series)SOA with Data Virtualization (session 4 from Packed Lunch Webinar Series)
SOA with Data Virtualization (session 4 from Packed Lunch Webinar Series)
 
Enabling Large-Scale Multi-Party Federations with OpenID Connect - OpenID Sum...
Enabling Large-Scale Multi-Party Federations with OpenID Connect - OpenID Sum...Enabling Large-Scale Multi-Party Federations with OpenID Connect - OpenID Sum...
Enabling Large-Scale Multi-Party Federations with OpenID Connect - OpenID Sum...
 
Achieving Self-Service Analytics with a Governed Data Services Layer
Achieving Self-Service Analytics with a Governed Data Services LayerAchieving Self-Service Analytics with a Governed Data Services Layer
Achieving Self-Service Analytics with a Governed Data Services Layer
 
Medical Device UDI Compliance in the Cloud
Medical Device UDI Compliance in the CloudMedical Device UDI Compliance in the Cloud
Medical Device UDI Compliance in the Cloud
 
IT Security: What an In-Plant Print Center Needs to Know
IT Security: What an In-Plant Print Center Needs to KnowIT Security: What an In-Plant Print Center Needs to Know
IT Security: What an In-Plant Print Center Needs to Know
 
How Personal Cloud Networks Enable New Business Models
How Personal Cloud Networks Enable New Business ModelsHow Personal Cloud Networks Enable New Business Models
How Personal Cloud Networks Enable New Business Models
 
Google peter logli & jake shea
Google   peter logli & jake sheaGoogle   peter logli & jake shea
Google peter logli & jake shea
 
Kantara Workshop at CIS
Kantara Workshop at CISKantara Workshop at CIS
Kantara Workshop at CIS
 
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
 
George Mokhbat V SCTC day cloud 24 feb16
George Mokhbat V SCTC day cloud 24 feb16George Mokhbat V SCTC day cloud 24 feb16
George Mokhbat V SCTC day cloud 24 feb16
 

More from Evernym

The Shift from Federated to Decentralized Identity
The Shift from Federated to Decentralized IdentityThe Shift from Federated to Decentralized Identity
The Shift from Federated to Decentralized Identity
Evernym
 
Evernym May 2021 Product Update
Evernym May 2021 Product UpdateEvernym May 2021 Product Update
Evernym May 2021 Product Update
Evernym
 
SSI & Healthcare: Lessons from the NHS
SSI & Healthcare: Lessons from the NHSSSI & Healthcare: Lessons from the NHS
SSI & Healthcare: Lessons from the NHS
Evernym
 
IATA Travel Pass - Evernym Webinar
IATA Travel Pass - Evernym WebinarIATA Travel Pass - Evernym Webinar
IATA Travel Pass - Evernym Webinar
Evernym
 
Meet Connect.Me & Evernym's Mobile SDK
Meet Connect.Me & Evernym's Mobile SDKMeet Connect.Me & Evernym's Mobile SDK
Meet Connect.Me & Evernym's Mobile SDK
Evernym
 
Open Source & What It Means For Self-Sovereign Identity (SSI)
Open Source & What It Means For Self-Sovereign Identity (SSI)Open Source & What It Means For Self-Sovereign Identity (SSI)
Open Source & What It Means For Self-Sovereign Identity (SSI)
Evernym
 
The Future of Digital Wallets - Evernym Webinar
The Future of Digital Wallets - Evernym WebinarThe Future of Digital Wallets - Evernym Webinar
The Future of Digital Wallets - Evernym Webinar
Evernym
 
Meet Verity, Evernym's Digital Credential Platform
Meet Verity, Evernym's Digital Credential PlatformMeet Verity, Evernym's Digital Credential Platform
Meet Verity, Evernym's Digital Credential Platform
Evernym
 
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign IdentityThe Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
Evernym
 
An Expert Panel on Safe Credentials
An Expert Panel on Safe CredentialsAn Expert Panel on Safe Credentials
An Expert Panel on Safe Credentials
Evernym
 
Verifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIF
Verifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIFVerifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIF
Verifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIF
Evernym
 
Enhancing Learner Mobility with SSI & Portable Digital Credentials
Enhancing Learner Mobility with SSI & Portable Digital CredentialsEnhancing Learner Mobility with SSI & Portable Digital Credentials
Enhancing Learner Mobility with SSI & Portable Digital Credentials
Evernym
 
Trust over IP (ToIP)
Trust over IP (ToIP)Trust over IP (ToIP)
Trust over IP (ToIP)
Evernym
 
Meet Evernym's SSI Platform
Meet Evernym's SSI PlatformMeet Evernym's SSI Platform
Meet Evernym's SSI Platform
Evernym
 
Getting Started With Self-Sovereign Identity (SSI) | Evernym Webinar
Getting Started With Self-Sovereign Identity (SSI) | Evernym WebinarGetting Started With Self-Sovereign Identity (SSI) | Evernym Webinar
Getting Started With Self-Sovereign Identity (SSI) | Evernym Webinar
Evernym
 
SSI & Digital Guardianship Webinar
SSI & Digital Guardianship WebinarSSI & Digital Guardianship Webinar
SSI & Digital Guardianship Webinar
Evernym
 

More from Evernym (16)

The Shift from Federated to Decentralized Identity
The Shift from Federated to Decentralized IdentityThe Shift from Federated to Decentralized Identity
The Shift from Federated to Decentralized Identity
 
Evernym May 2021 Product Update
Evernym May 2021 Product UpdateEvernym May 2021 Product Update
Evernym May 2021 Product Update
 
SSI & Healthcare: Lessons from the NHS
SSI & Healthcare: Lessons from the NHSSSI & Healthcare: Lessons from the NHS
SSI & Healthcare: Lessons from the NHS
 
IATA Travel Pass - Evernym Webinar
IATA Travel Pass - Evernym WebinarIATA Travel Pass - Evernym Webinar
IATA Travel Pass - Evernym Webinar
 
Meet Connect.Me & Evernym's Mobile SDK
Meet Connect.Me & Evernym's Mobile SDKMeet Connect.Me & Evernym's Mobile SDK
Meet Connect.Me & Evernym's Mobile SDK
 
Open Source & What It Means For Self-Sovereign Identity (SSI)
Open Source & What It Means For Self-Sovereign Identity (SSI)Open Source & What It Means For Self-Sovereign Identity (SSI)
Open Source & What It Means For Self-Sovereign Identity (SSI)
 
The Future of Digital Wallets - Evernym Webinar
The Future of Digital Wallets - Evernym WebinarThe Future of Digital Wallets - Evernym Webinar
The Future of Digital Wallets - Evernym Webinar
 
Meet Verity, Evernym's Digital Credential Platform
Meet Verity, Evernym's Digital Credential PlatformMeet Verity, Evernym's Digital Credential Platform
Meet Verity, Evernym's Digital Credential Platform
 
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign IdentityThe Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
 
An Expert Panel on Safe Credentials
An Expert Panel on Safe CredentialsAn Expert Panel on Safe Credentials
An Expert Panel on Safe Credentials
 
Verifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIF
Verifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIFVerifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIF
Verifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIF
 
Enhancing Learner Mobility with SSI & Portable Digital Credentials
Enhancing Learner Mobility with SSI & Portable Digital CredentialsEnhancing Learner Mobility with SSI & Portable Digital Credentials
Enhancing Learner Mobility with SSI & Portable Digital Credentials
 
Trust over IP (ToIP)
Trust over IP (ToIP)Trust over IP (ToIP)
Trust over IP (ToIP)
 
Meet Evernym's SSI Platform
Meet Evernym's SSI PlatformMeet Evernym's SSI Platform
Meet Evernym's SSI Platform
 
Getting Started With Self-Sovereign Identity (SSI) | Evernym Webinar
Getting Started With Self-Sovereign Identity (SSI) | Evernym WebinarGetting Started With Self-Sovereign Identity (SSI) | Evernym Webinar
Getting Started With Self-Sovereign Identity (SSI) | Evernym Webinar
 
SSI & Digital Guardianship Webinar
SSI & Digital Guardianship WebinarSSI & Digital Guardianship Webinar
SSI & Digital Guardianship Webinar
 

Recently uploaded

Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 

Recently uploaded (20)

Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 

Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, and Mozilla Disagree

  • 1. Why The Web Needs Decentralized Identifiers (DIDs) —Even if Google, Apple, and Mozilla Disagree November 3, 2021 @evernym | www.evernym.com
  • 2. Andy Tobin Managing Director, Europe, Evernym Drummond Reed Chief Trust Officer, Evernym Co-Editor, DID Spec Today’s presenters James Monaghan VP Product, Evernym
  • 3. On the agenda The controversy at the W3C Why the future of the Web is at stake What are DIDs, and why do we need them? The DID Spec 1.0 and the W3C’s DID Working Group The path to becoming a W3C standard Our response to the formal objections made by Google, Apple, and Mozilla Q&A
  • 4. First, what is the controversy at the World Wide Web Consortium (W3C)?
  • 6. SSI & Decentralized Identifiers: Reclaiming the soul of the web Credit to Nick Price, Decentralized Identity Foundation TCP / IP HTTP / Browser GSM / Mobile Decentralization / P2P 1974 - 1982 1989 - 1997 1993 - 2007 2018 -
  • 7. You You DIDs put you in the center of your digital world centralized decentralized
  • 8. Why is the future of the Web at stake? In a nutshell, it’s all about control: ● How much control will you have over your digital life? ● Your digital wallet? ● Your digital credentials? ● Your secure communications? ● Your privacy? ● Your personal data? ● Your ability to use the hardware and software of your choice?
  • 10. Decentralized Identifiers (DIDs) A new type of globally unique identifier (URI) that does not require a centralized registration authority because control of the identifier can be proved using cryptography. For a more technical introduction to DIDs, view our previous webinar: https://vimeo.com/363406397
  • 11. “DIDs are the atomic building block of decentralized digital trust infrastructure.” Chapter 8: Decentralized Identifiers https://www.manning.com/books/self-sovereign-identity
  • 12. In simple terms: A DID is a digital control point.
  • 13. Example: email address Your devices Some server at some service provider somewhere Control point You
  • 14. Example: phone number Control point Your devices Some server at some service provider somewhere You
  • 15. Example: domain name Control point Your devices Some server at some service provider somewhere You
  • 16. Example: Decentralized Identifier Your devices Some server at some service provider somewhere You Control point
  • 17. The “cryptographic triangle” behind all DIDs DID Public Key Private Key Control point This never needs to change Even when these need to change (“key rotation”)
  • 18. What are the benefits of being in control?
  • 19. With DIDs, you can: Login without usernames and passwords Digitally sign documents or transactions Create persistent communications channels Send encrypted private messages Transfer value or assets Authorize delegates or guardians
  • 20. Consumer benefits: ● Control your data and online communications ● Create DIDs yourself; you don’t need to rely on anyone else and nobody can take your DIDs away from you ● Have as many DIDs as you want to maintain your privacy ● Use your DIDs anywhere you want—they are fully portable ● Use your DIDs on your own terms—not anyone else's ● Choose which information your share with your DIDs ● All of this without surveillance or middlemen
  • 21. Business benefits: ● Provide simple, secure, universal login for all your customers ● Digitally sign verifiable credentials that can be verified by anyone ● Create lifetime private channels with all your customers ● Make it nearly impossible for a phisher to spoof your business ● Prove the authenticity of your data, devices, people, & products ● Automate both internal and external business processes that require trust ● Benefit from entirely new business models, rooted in trusted data ● Connect and interact with your customers in a whole new way
  • 22. What role do DIDs play in SSI, and how are they being used today?
  • 23. DIDs and VCs are the twin pillars of self-sovereign identity
  • 24. A global movement >350 member organizations Funding DID-based verifiable credentials for use in supply chain verification DID-based ‘staff passports’ for the world’s third-largest employer DID-based travel and health credentials, in trial with 70+ major airlines DID-based verifiable LEIs for businesses and their representatives DID-based KYC credentials for the financial industry DID-based portable patient records and healthcare credentials with production use
  • 25. A (very) brief history of the ‘DID Spec’ A (very) brief history of the ‘DID Spec’
  • 26. W3C Decentralized Identifiers (DIDs) 1.0 ● Required syntax for all DIDs ● Required data model for all DID documents ● Required operations for all DID methods ● Security & Privacy Considerations W3C DID Specification Registries ● Registry for DID methods, DID document properties, key types, service types ● 112 DID methods currently registered W3C DID Method Rubric 1.0 ● Specifies suggested criteria and processes for market evaluation of DID methods W3C DID Implementation Guide DID Spec 1.0
  • 27. History of the DID spec prior to the W3C Working Group 2015 2016 2017 2018 2019 Spring IIW: First blockchain identity discussions W3C VCTF: A Decentralized Hash Table for the Web Fall IIW: Decision to begin blockchain ID projects DHS: Awards 1st blockchain Identity R&D contracts IIW+RWOT: DID Spec work fully underway IIW+RWOT: First DID Spec nearly complete DHS: First DID Spec published & contract complete DHS: DKMS contract awarded; work begins W3C CCG: DID Spec contributed DHS: DKMS Design & Architecture V3 published W3C CCG: Second draft of DID Spec W3C CCG: Work on DID WG Charter begins DHS: DKMS Design & Architecture V4 published W3C CCG: Community Final Draft of DID Spec W3C: DID WG Charter approved W3C DID Working Group begins Sept 2019 Work on DIDs begins
  • 28. The two-year path to becoming a W3C standard (“REC”) July 2021 May 2021 (CR2) Nov 2020 (CR1) Nov 2019 (FPWD) May 2020 (Feature freeze) August 2021 3 formal objectors
  • 29. So, what were these formal objections?
  • 30. Our Response: Objection #1: No practical interoperability of DID methods 1. It misses the point that the DID spec establishes a baseline of interoperability across ALL DID methods ○ It doesn’t matter how many DID methods there are—they all produce the same result 2. Our WG Charter explicitly prohibited us from specifying any DID methods ○ That is not our job—that is the job of each DID method specification author 3. Each DID method spec establishes its own interoperability requirements ○ Any DID method can and should have multiple interoperable implementations
  • 31. Objection #2: Encourages divergence rather than convergence of DID methods Our Response: 1. For the second time, this misses the point of the DID spec: it specifies interoperability for all DID methods ○ They all use a DID resolver to take a DID as input and return a DID document as output 2. The market should determine the success of DID methods—just as it has with URI schemes and URN namespaces ○ There are 345 URI schemes and 70 URN namespaces registered with IANA 3. URI schemes and URN namespaces are all based on federated registries ○ DIDs are decentralized — each DID method is a cryptographic solution to the DID triangle
  • 32. Objection #3: Centralized DID methods are not prohibited Our Response: 1. “Decentralization” means “innovation at the edges” ○ It would be a travesty if a centralized registry controlled all innovation in DID methods 2. It is not the DID Working Group’s job—or the W3C’s job—to judge DID methods ○ It is the market’s job—a job the market can do much more efficiently and effectively 3. The whole purpose of the DID Method Rubric is to facilitate market evaluations ○ It is a registry of recommended criteria and processes for performing evaluations
  • 33. Objection #4: DID methods using proof-of-work blockchains are harmful for environmental sustainability Our Response: 1. DID method implementations are out-of-scope for the DID 1.0 spec ○ Each method makes its own choices about how to implement a Verifiable Data Registry 2. Environmental sustainability is a perfect example of a DID Method Rubric criteria ○ The Rubric is constantly being improved with evaluation criteria for this and other factors 3. This is one more example of why the market should choose DID methods ○ The DID 1.0 spec was explicitly designed to encourage decentralized market competition
  • 34. The Future of the Web Is Decentralized
  • 35. DIDs are inevitable ● Don’t panic — a lot of people are working really hard to get the DID spec approved ○ Very few W3C formal objections are sustained — it just takes some time to resolve ● The governmental, commercial, and social progress of DIDs is already unstoppable ○ The genie is not going back in the bottle ● This has no effect on Evernym’s products or customers ○ We are charging ahead with innovations in DID-based products and services ● The real lesson here is that decentralization means a shift in control ○ From large tech vendors (the “center”) to users (the “edges”) ● This is a strong signal that this shift is finally happening—for real
  • 36. DIDs are the innovation that democratizes cryptography so that everyone can use it.
  • 37. Thanks for joining us today! For more content on decentralized identifiers and verifiable credentials, please visit www.evernym.com/webinars/ November 3, 2021 @evernym | www.evernym.com