Posts Archive

Recent posts


Web 3 and Self Sovereign Identity

Alice can have a credential issued for a particular purpose, store it in a personal data vault, and only authorize access to that credential when she consents to the interaction. Additionally, Alice controls this credential at all times and can present it to any requesting platform

Updated: 2023-06-27 9 minute read

Tags:
Atala PRISM
Citopia
Civic
Dominium
Elastos
Ethereum
Gitcoin
Web3

Web3 Explained

participation in governance, self-sovereign identity, content ownership and the freedom to build – are very appealing. In fact, it is hard to see how anybody (other than an incumbent with a turf to defend) could possible argue against any of them.

Updated: 2023-06-27 9 minute read

Tags:
Ethereum
Web3

Ethics, Human Rights, Sovereignty and Self Sovereign Identity

In a world that is becoming more digital, it is relevant to find some guidelines for organizations to design digital identity more ethically. A universal identity system on the internet is still missing and there are no clear standards for organizations to design digital identity.

Updated: 2023-06-23 8 minute read

Tags:
Ethics
Human Rights
Sovereignty

System Architecture and Self Sovereign Identity

In chaotic systems such as those that the discipline of physics seeks to describe, there is also the concept of the “self-organizing principle,” which dictates a tendency for chaotic systems to organize themselves. While this might be a tendency in physics, organization usually needs a nudge in t...

Updated: 2023-06-23 5 minute read

Tags:
Architecture

User Experience and Self Sovereign Identity

Lack of great user experiences is often raised as one of decentralized identity’s (and public blockchain’s) missing ingredients for ubiquitous adoption. However to arrive at usable experiences across the industry, we first need to reach consensus around basic user personas and mental models, then...

Updated: 2023-06-23 7 minute read

Tags:
Relationships
User Experience

Market signals, SSI trending, and the road to mainstream adoption.

Three years and one pandemic later, the demand for cryptographically secure, privacy-respecting and machine-verifiable electronic credentials has grown and, as a result, governments are starting to wake up to VC’s potential.

Updated: 2023-06-19 9 minute read

Tags:
Adoption
Trends

Guardianship

Applying the developed models of guardianship, using the flexibility of Verifiable Credentials and the trusted mechanisms of sharing VCs, can provide the ability to add guardianship credentials into the travel process (or not) without breaking the existing approach and complicating the technical ...

Updated: 2023-07-02 4 minute read

Tags:
Delegation
Guardianship
Sovrin Foundation
Trust over IP

Supply Chains and Self Sovereign Identity

The digital and physical world are merging more than ever before. As the supply chain becomes more ‘phygital,’ innovative ways of sharing data – like using verifiable credentials – are helping to build more trust with data along the supply chain.

Updated: 2023-06-18 4 minute read

Tags:
GS1
SAP
Supply Chain
Transmute
UNECE
USCBP

SSI Use-Cases

The general problem statement here is, as you will have noticed, not about proving who you are but about proving what you are. I need to know you have a line of credit, a pilot’s licence or a diploma from a top ten dental school. I do not care who you are

Updated: 2023-06-18 20 minute read

Tags:
Banking
Bots
Business
Career
Climate
Content Attribution
Energy Systems
Events
Gaming
IAM
Loyalty Programs
Property Management
Reputation
Security
Workplace

Covid-19, Vaccine Passports, Health Credentials, and Self Sovereign Identity

In a lot of places around the world, a COVID passport is simply a paper document. This has led to a couple of expected problems, one to mention is forgery. Paper documents can easily be forfeited, and paper-based COVID passports are no exception.

Updated: 2023-06-18 27 minute read

Tags:
CCI
Digi.me
EU Digital Green
Excelsior Pass Pluss
Good Health Pass
LFPH
Real World
SITA
Vaccine Credentials
WHO

Africa and Self Sovereign Identity

Three stages have been identified as necessities to accomplish the development of this system: 1. Biometric/demographic registration. 2. Interoperability and security hardening. 3. Biometric modality data analysis/organization/association.

Updated: 2023-06-27 7 minute read

Tags:
Africa
DIDx
Diwala
Farmer Connect
FlexID
GLEIF
Gravity Earth
Indy
Kiva
LEI
Onfido
Policy
Real World
Yoma

Travel and Self Sovereign Identity

Over time the evolution of DID/SSI is likely to be a travel industry game-changer, enabling travelers to manage their own personal information to maximize personal economic effect and protect personal privacy.

Updated: 2023-06-16 6 minute read

Tags:
Apple
IATA
TOIP
TSA
Travel