SlideShare uma empresa Scribd logo
1 de 21
Baixar para ler offline
Introduction to
Self-Sovereign Identity
INTERNET IDENTITY WORKSHOP | SPRING 2020
Nice to Meet You
WELCOME
AGENDAHOSTS
Karyl Fowler
CEO @Transmute
@TheKaryl
karyl@transmute.industries
Juan Caballero
Comms / Research @Spherity GmbH
@by_caballero
juan.caballero@spherity.com
1. Two Tales: Self-Sovereign Identity
2. SSI: The Movement
3. SSI: The Technology
4. Pairing the Two: Uses & Applications
5. Where to Learn More & Get Involved
6. Audience Q&A
2
Self-Sovereign Identity (SSI)
TWO PARTS
The Movement The Technology
3
The Movement
SELF – SOVEREIGN IDENTITY
Influential writers and essayists:
- Kim Cameron (“Laws of Identity”, 2005)
- Doc Searls (co-founded IIW in 2005 with...)
- Kaliya Young (...who gives this talk some years!)
- Christopher Allen (author of “10 principles” and of slide #6!)
4
Shared Ideals
THE MOVEMENT
Data Sovereignty
21st Century
Governance & Policy21st Century
Business Practices
Decentralized
Identity / SSI
Decentralization,
Shared data,
Open source
Open data,
Data rights
Privacy-by-design, Open standards
& protocols, Data unions, Rights to
Repair & Portability
Radical
Transparency
& Auditability,
Ecosystem design,
Mechanism design,
Incentive
engineering
Multi-stakeholder
data controls,
Differential privacy,
Data accountability,
revocable anonymity
Digital-first,
Trust economics
5
Key characteristics:
• Minimum Disclosure
• Full Control
• Necessary Proofs
• Legally-Enabled
6
Key characteristics:
• Anonymity
• Web of Trust
• Censorship Resistance
• Defend Human Rights vs. Powerful Actors
(nation states, multi-national corps,
mafias, etc.)
* Originally coined by Tim Bouma (@trbouma) https://medium.com/@trbouma/less-identity-65f65d87f56b
CC BY-SA 4.0
Less Identity + Trustless Identity
TWO MAJOR TRACKS
Or more properly
“Trust Minimized” Identity
“Legally-Enabled
Self-Sovereign” Identity*
SLIDE CREDIT: CHRISTOPHER ALLEN’S ODYSSEY PRESENTATION 2020
7
The Technology
SELF – SOVEREIGN IDENTITY
Identity is the gene of
software applications.
8
©TRANSMUTE | ALL RIGHTS RESERVED.
Centralized Identity
EXISTING WAY OF DOING THINGS
9
Our “identities” (assembling into “profiles”) are stored away
on the servers of identity providers, which own the structure,
the content, and the access rights to everything we do.
They lend us a key, but they can change the locks, or throw
away the contents. We are but lowly subjects of the data
barons.
Federated Identity
EXISTING WAY OF DOING THINGS 2.0
10
By linking together silos into a “federation,” managers of
businesses, platforms and services can outsource the “ID
checks” at the door, making them interchangeable and
interoperable. Authentication is tricky business, and most
relying parties are happy to offload this headache…
...onto ever more powerful middlemen who now hold richer,
multi-silo identities on all of us in exchange for this
convenience. Single-Sign On makes the data barons into
data emperors.
Today’s Problems
PAST WAY OF DOING THINGS CAUSED
11
• Usage data collected to create detailed profiles with all-or-nothing access
• Who owns user data & decides how it’s used?
• Difficult to delegate or attenuate access or privileges dynamically
• Users can’t control how their data is secured or shared
(or notified if there is a breach)
• Single points of failure and honeypots everywhere
• Usernames + Password databases are an attack surface
• Data bloat: businesses taking on liability for more data than they need
• There is no identity layer that persists across all systems
• Lacking data portability
SLIDE INSPIRATION: HEATHER VESCENT + KIM HAMILTON DUFFY + KALIYA YOUNG
Decentralized Identity
WEB 3.0 WAY OF DOING THINGS
Blockchains and DLTs aren’t perfect, but they’re the
best way currently stable and production-ready for
self-publishing and self-controlling the cryptographic
keys for our identity. Some work (such as KERI and
Sidetree) are pushing the envelope on other ways
of decentralizing public key infrastructure.
Tech Foundations
SELF – SOVEREIGN IDENTITY
Decentralized Identifiers (DIDs):
self-controlled, digital fingerprints assigned to
people, entities, or things
Verifiable Credentials (VCs): Like “files” but
with granular controls baked in
Resolvers (“Mini DNS”): can function as
local namespaces (or not)
Secure Data Storage (“lockers”): Extend
granular controls to underlying data
Cutting-edge Privacy-preserving Crypto:
Zero-Knowledge, Differential Privacy, MPC, etc
Wallets & Agents: Web interfaces beyond
the “browser”/”app” paradigm 13
A Decentralized Identifier (DID) is a new
type of identifier that is globally unique,
resolvable with high availability, and
cryptographically verifiable.
Decentralized Identifiers
DEFINITION
14
https://w3c-ccg.github.io/did-primer/
The purpose of the DID document is to
describe the public keys, authentication
protocols, and service endpoints necessary
to bootstrap cryptographically-verifiable
interactions with the identified entity.
>50 DID Methods Today
DIFFERENT STROKES FOR DIFFERENT FOLKS
15
https://w3c-ccg.github.io/did-method-registry/
A verifiable credential (VC) is a set of tamper-evident claims
and metadata about real life achievements, qualifications, or
attributes that includes a cryptographic proof about who
issued it.
Verifiable Credentials
DEFINITION
16
https://www.w3.org/TR/vc-data-model/#credentials
Examples of verifiable credentials include digital employee
identification cards, digital birth certificates, and digital
educational certificates, authentication and authorization
bearer tokens, logistics or shipping certifications.
• Reduce database security risks and business process risks
• Give users increased to total control over their identity data and credentials
• Increased data portability and near-global scope (for reputation and history)
• Increase business efficiency through streamlined onboarding & auditing
• Reduce fraud by confirming multiple data points
• Streamline confirmation of compliance data/documentation
• Increase trust of any verified data that must be shared downstream, in a form more
persistent than the legal persons involved
• Key use cases: Drug trials, Compliance documents, Provenance data
DIDs + VCs Can...
SO WHAT?
17
SLIDE INSPIRATION: HEATHER VESCENT + KIM HAMILTON DUFFY + KALIYA YOUNG
FRAMEWORK FOR ADOPTION
1. Is selective disclosure or privacy a priority?
2. Is there high coordination burden?
3. Is traceability or auditability important?
Application Areas
Chains of Custody
Commercial + Defense Supply Chain Logistics
Cold Chain (pharma to agriculture)
Contract Management (Legal, HR, Real Estate)
Software
Data Infrastructure & Governance_
Cloud roles + access management_
Microservices monitoring_
Telco
5G + IoT Enablement
Identity/Data-as-a-Service
Anti-Fraud (verification + roaming)
Healthcare_
Insurance + Billing_
Patient-centric data sharing + management_
18©TRANSMUTE | ALL RIGHTS RESERVED.
Ideas
(2-10 years)
Incubation
(6-18 months)
Refinement
(1-3 years)
Standardization
(~18-24 months)
Conversations
Whitepapers, position
papers
Experiments, Specifications,
Pilots
Standards
W3C Community Groups
Rebooting the Web
of Trust
19
SLIDE CREDIT: HEATHER VESCENT @ THE PURPLE TORNADO
Get Involved
RESOURCES
Primary Sources:
• W3C Credentials Community Group
• DIF Working Group Records
• Rebooting the Web of Trust Conference, Proceedings & Digests
• Internet Identity Workshop (You are here) Conf & Notes
Secondary Sources & Commentaries:
• 2019 IIW Intro to SSI Deck by Heather Vescent + Karyl Fowler + Lucas
Tétreault
• 2018 IIW Intro to SSI Deck by Heather Vescent + Kim Hamilton Duffy
• 2018 IIW Intro to SSI Deck by Drummond Reed +
• Infominer’s Resources: https://decentralized-id.com/
• The Purple Tornado reports for US DHS (2019)
• PSA (Privacy, Surveillance, Anonymity) Podcast (Kaliya Young, Seth
Goldstein)
• SSIMeetup Webinar series (Alex Preukschat)
• Definitely Identity podcast (Tim Bouma)
• One World Identity (“KNOW”) Podcast
• MyData Slack and Conference series
• CyberForge (includes some great posts by Anil John, US DHS S&T)
• Transmute TechTalk: On Enterprise Use + Integrations
Monographs:
• Comprehensive Guide to Self Sovereign Identity (2019) - Heather
Vescent / Kaliya Young
• Spherity’s SSI 101 Series on Medium (2020) - Juan Caballero
• Self Sovereign Identity (2021) - Alex Preukschat / Drummond Reed
Technical Resources:
• W3C DID Specification & Use Case guidance
• W3C VC Data Model Specification
• Digital Credential Consortium whitepaper (Kim Hamilton Duffy)
• Secure Data Storage Specification WG (DIF-W3C)
• Credential Handler API (CHAPI)
• Universal Resolver (Danube Tech)
• Trust Over IP Foundation (TBD)
• DIDcomm WG (DIF-W3C)
• Aries RFCs (Hyperledger)
20
Knowledge Bases + Education
REFERENCES
Thank You!QUESTIONS?

Mais conteúdo relacionado

Mais procurados

Blockchain Perspective - Internet of Memorable Things
Blockchain Perspective - Internet of Memorable ThingsBlockchain Perspective - Internet of Memorable Things
Blockchain Perspective - Internet of Memorable ThingsTim Lackey
 
What are Decentralized Identifiers (DIDs)?
What are Decentralized Identifiers (DIDs)?What are Decentralized Identifiers (DIDs)?
What are Decentralized Identifiers (DIDs)?Evernym
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to BlockchainJordan Harris
 
Blockchain
BlockchainBlockchain
BlockchainSai Nath
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain TechnologyNimmy Solomon
 
Overview of Decentralized Identity
Overview of Decentralized IdentityOverview of Decentralized Identity
Overview of Decentralized IdentityJim Flynn
 
An introduction to blockchain and hyperledger v ru
An introduction to blockchain and hyperledger v ruAn introduction to blockchain and hyperledger v ru
An introduction to blockchain and hyperledger v ruLennartF
 
Self Sovereign Identity (SSI) Open standards with Drummond Reed
Self Sovereign Identity (SSI) Open standards with Drummond Reed Self Sovereign Identity (SSI) Open standards with Drummond Reed
Self Sovereign Identity (SSI) Open standards with Drummond Reed SSIMeetup
 
Blockchain, Self-Sovereign Identity and Credentials
Blockchain, Self-Sovereign Identity and CredentialsBlockchain, Self-Sovereign Identity and Credentials
Blockchain, Self-Sovereign Identity and CredentialsStrategyWorks
 
Blockchain architected
Blockchain architectedBlockchain architected
Blockchain architectedIBM Sverige
 
Zero-Knowledge Proofs in Light of Digital Identity
Zero-Knowledge Proofs in Light of Digital IdentityZero-Knowledge Proofs in Light of Digital Identity
Zero-Knowledge Proofs in Light of Digital IdentityClare Nelson, CISSP, CIPP-E
 
OpenID 4 Verifiable Credentials + HAIP (Update)
OpenID 4 Verifiable Credentials + HAIP (Update)OpenID 4 Verifiable Credentials + HAIP (Update)
OpenID 4 Verifiable Credentials + HAIP (Update)Torsten Lodderstedt
 
Blockchain Introduction Presentation
Blockchain Introduction PresentationBlockchain Introduction Presentation
Blockchain Introduction PresentationAmr Alaa Yassen
 
Introduction to Self Sovereign Identity
Introduction to Self Sovereign IdentityIntroduction to Self Sovereign Identity
Introduction to Self Sovereign IdentityHeather Vescent
 
Masterclass on the DID Universal Resolver
Masterclass on the DID Universal ResolverMasterclass on the DID Universal Resolver
Masterclass on the DID Universal ResolverMarkus Sabadello
 
The European Union goes Decentralized
The European Union goes DecentralizedThe European Union goes Decentralized
The European Union goes DecentralizedTorsten Lodderstedt
 

Mais procurados (20)

Blockchain Perspective - Internet of Memorable Things
Blockchain Perspective - Internet of Memorable ThingsBlockchain Perspective - Internet of Memorable Things
Blockchain Perspective - Internet of Memorable Things
 
What are Decentralized Identifiers (DIDs)?
What are Decentralized Identifiers (DIDs)?What are Decentralized Identifiers (DIDs)?
What are Decentralized Identifiers (DIDs)?
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to Blockchain
 
Blockchain
BlockchainBlockchain
Blockchain
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
 
Overview of Decentralized Identity
Overview of Decentralized IdentityOverview of Decentralized Identity
Overview of Decentralized Identity
 
Blockchain
BlockchainBlockchain
Blockchain
 
An introduction to blockchain and hyperledger v ru
An introduction to blockchain and hyperledger v ruAn introduction to blockchain and hyperledger v ru
An introduction to blockchain and hyperledger v ru
 
Self Sovereign Identity (SSI) Open standards with Drummond Reed
Self Sovereign Identity (SSI) Open standards with Drummond Reed Self Sovereign Identity (SSI) Open standards with Drummond Reed
Self Sovereign Identity (SSI) Open standards with Drummond Reed
 
Blockchain, Self-Sovereign Identity and Credentials
Blockchain, Self-Sovereign Identity and CredentialsBlockchain, Self-Sovereign Identity and Credentials
Blockchain, Self-Sovereign Identity and Credentials
 
Blockchain architected
Blockchain architectedBlockchain architected
Blockchain architected
 
Zero-Knowledge Proofs in Light of Digital Identity
Zero-Knowledge Proofs in Light of Digital IdentityZero-Knowledge Proofs in Light of Digital Identity
Zero-Knowledge Proofs in Light of Digital Identity
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to Blockchain
 
OpenID 4 Verifiable Credentials + HAIP (Update)
OpenID 4 Verifiable Credentials + HAIP (Update)OpenID 4 Verifiable Credentials + HAIP (Update)
OpenID 4 Verifiable Credentials + HAIP (Update)
 
Blockchain Introduction Presentation
Blockchain Introduction PresentationBlockchain Introduction Presentation
Blockchain Introduction Presentation
 
Introduction to Self Sovereign Identity
Introduction to Self Sovereign IdentityIntroduction to Self Sovereign Identity
Introduction to Self Sovereign Identity
 
Verifiable credentials explained by CCI
Verifiable credentials explained by CCIVerifiable credentials explained by CCI
Verifiable credentials explained by CCI
 
Blockchain concepts
Blockchain conceptsBlockchain concepts
Blockchain concepts
 
Masterclass on the DID Universal Resolver
Masterclass on the DID Universal ResolverMasterclass on the DID Universal Resolver
Masterclass on the DID Universal Resolver
 
The European Union goes Decentralized
The European Union goes DecentralizedThe European Union goes Decentralized
The European Union goes Decentralized
 

Semelhante a Introduction to Self-Sovereign Identity

Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)Digipolis Antwerpen
 
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19Andrew Hughes
 
Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Kaliya "Identity Woman" Young
 
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign IdentityThe Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign IdentityEvernym
 
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...Kaliya "Identity Woman" Young
 
Blockchain R&D to Decentralized Identity Deployment
Blockchain R&D to Decentralized Identity DeploymentBlockchain R&D to Decentralized Identity Deployment
Blockchain R&D to Decentralized Identity DeploymentAnil John
 
The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018Kaliya "Identity Woman" Young
 
My Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and OpennessMy Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and OpennessKaliya "Identity Woman" Young
 
How Personal Cloud Networks Enable New Business Models
How Personal Cloud Networks Enable New Business ModelsHow Personal Cloud Networks Enable New Business Models
How Personal Cloud Networks Enable New Business Modelsdrummondreed
 
Crypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerCrypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerDarrell O'Donnell
 
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出すTrusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出すHyperleger Tokyo Meetup
 
Trusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research CollaborationsTrusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research Collaborationsjbasney
 
Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idDavid Kelts, CIPT
 
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized IdentityData Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized IdentityData Con LA
 
Web 3.0 – From Buzzword to Security with Schellman
Web 3.0 – From Buzzword to Security with SchellmanWeb 3.0 – From Buzzword to Security with Schellman
Web 3.0 – From Buzzword to Security with Schellmansaastr
 

Semelhante a Introduction to Self-Sovereign Identity (20)

Barcelona presentationv6
Barcelona presentationv6Barcelona presentationv6
Barcelona presentationv6
 
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)
 
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
 
Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon
 
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign IdentityThe Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
 
Compliance & Identity access management
Compliance & Identity access management Compliance & Identity access management
Compliance & Identity access management
 
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
 
Blockchain R&D to Decentralized Identity Deployment
Blockchain R&D to Decentralized Identity DeploymentBlockchain R&D to Decentralized Identity Deployment
Blockchain R&D to Decentralized Identity Deployment
 
The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018
 
My Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and OpennessMy Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and Openness
 
How Personal Cloud Networks Enable New Business Models
How Personal Cloud Networks Enable New Business ModelsHow Personal Cloud Networks Enable New Business Models
How Personal Cloud Networks Enable New Business Models
 
Crypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerCrypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedger
 
IAM
IAMIAM
IAM
 
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENTIDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
 
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出すTrusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
 
Hope x talk
Hope x talkHope x talk
Hope x talk
 
Trusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research CollaborationsTrusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research Collaborations
 
Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect id
 
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized IdentityData Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity
 
Web 3.0 – From Buzzword to Security with Schellman
Web 3.0 – From Buzzword to Security with SchellmanWeb 3.0 – From Buzzword to Security with Schellman
Web 3.0 – From Buzzword to Security with Schellman
 

Último

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Último (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Introduction to Self-Sovereign Identity

  • 1. Introduction to Self-Sovereign Identity INTERNET IDENTITY WORKSHOP | SPRING 2020
  • 2. Nice to Meet You WELCOME AGENDAHOSTS Karyl Fowler CEO @Transmute @TheKaryl karyl@transmute.industries Juan Caballero Comms / Research @Spherity GmbH @by_caballero juan.caballero@spherity.com 1. Two Tales: Self-Sovereign Identity 2. SSI: The Movement 3. SSI: The Technology 4. Pairing the Two: Uses & Applications 5. Where to Learn More & Get Involved 6. Audience Q&A 2
  • 3. Self-Sovereign Identity (SSI) TWO PARTS The Movement The Technology 3
  • 4. The Movement SELF – SOVEREIGN IDENTITY Influential writers and essayists: - Kim Cameron (“Laws of Identity”, 2005) - Doc Searls (co-founded IIW in 2005 with...) - Kaliya Young (...who gives this talk some years!) - Christopher Allen (author of “10 principles” and of slide #6!) 4
  • 5. Shared Ideals THE MOVEMENT Data Sovereignty 21st Century Governance & Policy21st Century Business Practices Decentralized Identity / SSI Decentralization, Shared data, Open source Open data, Data rights Privacy-by-design, Open standards & protocols, Data unions, Rights to Repair & Portability Radical Transparency & Auditability, Ecosystem design, Mechanism design, Incentive engineering Multi-stakeholder data controls, Differential privacy, Data accountability, revocable anonymity Digital-first, Trust economics 5
  • 6. Key characteristics: • Minimum Disclosure • Full Control • Necessary Proofs • Legally-Enabled 6 Key characteristics: • Anonymity • Web of Trust • Censorship Resistance • Defend Human Rights vs. Powerful Actors (nation states, multi-national corps, mafias, etc.) * Originally coined by Tim Bouma (@trbouma) https://medium.com/@trbouma/less-identity-65f65d87f56b CC BY-SA 4.0 Less Identity + Trustless Identity TWO MAJOR TRACKS Or more properly “Trust Minimized” Identity “Legally-Enabled Self-Sovereign” Identity* SLIDE CREDIT: CHRISTOPHER ALLEN’S ODYSSEY PRESENTATION 2020
  • 7. 7 The Technology SELF – SOVEREIGN IDENTITY
  • 8. Identity is the gene of software applications. 8 ©TRANSMUTE | ALL RIGHTS RESERVED.
  • 9. Centralized Identity EXISTING WAY OF DOING THINGS 9 Our “identities” (assembling into “profiles”) are stored away on the servers of identity providers, which own the structure, the content, and the access rights to everything we do. They lend us a key, but they can change the locks, or throw away the contents. We are but lowly subjects of the data barons.
  • 10. Federated Identity EXISTING WAY OF DOING THINGS 2.0 10 By linking together silos into a “federation,” managers of businesses, platforms and services can outsource the “ID checks” at the door, making them interchangeable and interoperable. Authentication is tricky business, and most relying parties are happy to offload this headache… ...onto ever more powerful middlemen who now hold richer, multi-silo identities on all of us in exchange for this convenience. Single-Sign On makes the data barons into data emperors.
  • 11. Today’s Problems PAST WAY OF DOING THINGS CAUSED 11 • Usage data collected to create detailed profiles with all-or-nothing access • Who owns user data & decides how it’s used? • Difficult to delegate or attenuate access or privileges dynamically • Users can’t control how their data is secured or shared (or notified if there is a breach) • Single points of failure and honeypots everywhere • Usernames + Password databases are an attack surface • Data bloat: businesses taking on liability for more data than they need • There is no identity layer that persists across all systems • Lacking data portability SLIDE INSPIRATION: HEATHER VESCENT + KIM HAMILTON DUFFY + KALIYA YOUNG
  • 12. Decentralized Identity WEB 3.0 WAY OF DOING THINGS Blockchains and DLTs aren’t perfect, but they’re the best way currently stable and production-ready for self-publishing and self-controlling the cryptographic keys for our identity. Some work (such as KERI and Sidetree) are pushing the envelope on other ways of decentralizing public key infrastructure.
  • 13. Tech Foundations SELF – SOVEREIGN IDENTITY Decentralized Identifiers (DIDs): self-controlled, digital fingerprints assigned to people, entities, or things Verifiable Credentials (VCs): Like “files” but with granular controls baked in Resolvers (“Mini DNS”): can function as local namespaces (or not) Secure Data Storage (“lockers”): Extend granular controls to underlying data Cutting-edge Privacy-preserving Crypto: Zero-Knowledge, Differential Privacy, MPC, etc Wallets & Agents: Web interfaces beyond the “browser”/”app” paradigm 13
  • 14. A Decentralized Identifier (DID) is a new type of identifier that is globally unique, resolvable with high availability, and cryptographically verifiable. Decentralized Identifiers DEFINITION 14 https://w3c-ccg.github.io/did-primer/ The purpose of the DID document is to describe the public keys, authentication protocols, and service endpoints necessary to bootstrap cryptographically-verifiable interactions with the identified entity.
  • 15. >50 DID Methods Today DIFFERENT STROKES FOR DIFFERENT FOLKS 15 https://w3c-ccg.github.io/did-method-registry/
  • 16. A verifiable credential (VC) is a set of tamper-evident claims and metadata about real life achievements, qualifications, or attributes that includes a cryptographic proof about who issued it. Verifiable Credentials DEFINITION 16 https://www.w3.org/TR/vc-data-model/#credentials Examples of verifiable credentials include digital employee identification cards, digital birth certificates, and digital educational certificates, authentication and authorization bearer tokens, logistics or shipping certifications.
  • 17. • Reduce database security risks and business process risks • Give users increased to total control over their identity data and credentials • Increased data portability and near-global scope (for reputation and history) • Increase business efficiency through streamlined onboarding & auditing • Reduce fraud by confirming multiple data points • Streamline confirmation of compliance data/documentation • Increase trust of any verified data that must be shared downstream, in a form more persistent than the legal persons involved • Key use cases: Drug trials, Compliance documents, Provenance data DIDs + VCs Can... SO WHAT? 17 SLIDE INSPIRATION: HEATHER VESCENT + KIM HAMILTON DUFFY + KALIYA YOUNG
  • 18. FRAMEWORK FOR ADOPTION 1. Is selective disclosure or privacy a priority? 2. Is there high coordination burden? 3. Is traceability or auditability important? Application Areas Chains of Custody Commercial + Defense Supply Chain Logistics Cold Chain (pharma to agriculture) Contract Management (Legal, HR, Real Estate) Software Data Infrastructure & Governance_ Cloud roles + access management_ Microservices monitoring_ Telco 5G + IoT Enablement Identity/Data-as-a-Service Anti-Fraud (verification + roaming) Healthcare_ Insurance + Billing_ Patient-centric data sharing + management_ 18©TRANSMUTE | ALL RIGHTS RESERVED.
  • 19. Ideas (2-10 years) Incubation (6-18 months) Refinement (1-3 years) Standardization (~18-24 months) Conversations Whitepapers, position papers Experiments, Specifications, Pilots Standards W3C Community Groups Rebooting the Web of Trust 19 SLIDE CREDIT: HEATHER VESCENT @ THE PURPLE TORNADO Get Involved RESOURCES
  • 20. Primary Sources: • W3C Credentials Community Group • DIF Working Group Records • Rebooting the Web of Trust Conference, Proceedings & Digests • Internet Identity Workshop (You are here) Conf & Notes Secondary Sources & Commentaries: • 2019 IIW Intro to SSI Deck by Heather Vescent + Karyl Fowler + Lucas Tétreault • 2018 IIW Intro to SSI Deck by Heather Vescent + Kim Hamilton Duffy • 2018 IIW Intro to SSI Deck by Drummond Reed + • Infominer’s Resources: https://decentralized-id.com/ • The Purple Tornado reports for US DHS (2019) • PSA (Privacy, Surveillance, Anonymity) Podcast (Kaliya Young, Seth Goldstein) • SSIMeetup Webinar series (Alex Preukschat) • Definitely Identity podcast (Tim Bouma) • One World Identity (“KNOW”) Podcast • MyData Slack and Conference series • CyberForge (includes some great posts by Anil John, US DHS S&T) • Transmute TechTalk: On Enterprise Use + Integrations Monographs: • Comprehensive Guide to Self Sovereign Identity (2019) - Heather Vescent / Kaliya Young • Spherity’s SSI 101 Series on Medium (2020) - Juan Caballero • Self Sovereign Identity (2021) - Alex Preukschat / Drummond Reed Technical Resources: • W3C DID Specification & Use Case guidance • W3C VC Data Model Specification • Digital Credential Consortium whitepaper (Kim Hamilton Duffy) • Secure Data Storage Specification WG (DIF-W3C) • Credential Handler API (CHAPI) • Universal Resolver (Danube Tech) • Trust Over IP Foundation (TBD) • DIDcomm WG (DIF-W3C) • Aries RFCs (Hyperledger) 20 Knowledge Bases + Education REFERENCES