SlideShare a Scribd company logo
Decentralized Identifiers (DIDs)
fundamentals
IdentityBook.info special
twitter.com/IdentityBookHQ
SSIMeetup.orghttps://creativecommons.org/licenses/by-sa/4.0/
Drummond Reed
W3C DID specification
co-author
Chief Trust Officer Evernym
Markus Sabadello
W3C DID specification
co-author
Founder Danube Tech
1. Empower global SSI communities
2. Open to everyone interested in SSI
3. All content is shared with CC BY SA
SSIMeetup.org
Alex Preukschat @SSIMeetup @AlexPreukschat
Coordinating Node SSIMeetup.org
https://creativecommons.org/licenses/by-sa/4.0/
SSIMeetup objectives
17 May 2018
https://www.manning.com/books/self-sovereign-identity and IdentiyBook.info
Released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
Introduction
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
You can understand DIDs at four progressively deeper levels.
The Superficial Level:
What is a DID?
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
URIs, URLs, and URNs
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
● URLs locate resources on a network
● URNs are persistent names for a resource that
will never change no matter its location
● A DID is functionally a URN that in many cases
can be resolved into one or more URLs
The four core properties of a DID
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
The Functional Level:
How DIDs Work
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
"For digital identifiers, the usefulness
comes just not from the identifier
itself, but from how it can be used
by applications designed to consume
that particular type of identifier.”
DIDs, DID documents, and DID subjects
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
A typical DID document contains:
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
● One or more public keys (or other verification methods) that can be
used to authenticate the DID subject during an interaction
● One or more services associated with the DID subject that can be
used for interaction via protocols supported by those services
● Additional metadata such as timestamps, digital signatures and
other cryptographic proofs, or metadata related to delegation and
authorization
Example DID Document
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
{
"@context": "https://www.w3.org/ns/did/v1",
"id": "did:example:123456789abcdefghi",
"authentication": [{
"id": "did:example:123456789abcdefghi#keys-1",
"type": "Ed25519VerificationKey2018",
"controller": "did:example:123456789abcdefghi",
"publicKeyBase58" : "H3C2AVvLMv6gmMNam3uVAjZpfkcJCwDwnZn6z3wXmqPV"
}],
"service": [{
"id":"did:example:123456789abcdefghi#vcs",
"type": "VerifiableCredentialService",
"serviceEndpoint": "https://example.com/vc/"
}]
}
DID Methods
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
● DIDs are not created and maintained in a single type of database or network
like most other types of URIs
● DID methods all support the same basic functionality but they differ in how
that functionality is implemented
DID Resolution
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
● The process of obtaining the DID document associated with a DID
● Rather than thinking of DID resolution as a protocol, it should be considered
an abstract function or algorithm
DID URLs
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
● DIDs are powerful identifiers by themselves, but they can also be used as the
basis for constructing more advanced URLs rooted in a DID
● This is like how http/https URLs can consist of more than just a domain name
● DID URLs enable an "identifier space" for additional resources associated
with the DID
Example DID URLs
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
did:example:1234/
did:example:1234#keys-1
did:example:1234;version-id=4#keys-1
did:example:1234/my/path?query#fragment
did:example:1234;service=hub/my/path?query#fragment
Comparing DIDs with Domain Names
Decentralized Identifiers (DIDs) Domain Names
Globally unique Globally unique
Persistent Reassignable
Machine-friendly identifiers (i.e., long character
strings based on random numbers / cryptography)
Human-readable names
Resolvable using different mechanisms defined by
the applicable DID method
Resolvable using the standard DNS protocol
Associated data is expressed in DID documents Associated data is expressed in DNS zone files
Fully decentralized namespaces without delegation Hierarchical, delegatable namespaces based on
centralized root registries for top-level domain
names (TLDs)
Cryptographically-verifiable Verifiable using DNS security extensions (DNSSEC)
Fully under the control of the DID controller Ultimately controlled by ICANN and the registry
operator for each DNS TLD
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Comparison with other persistent identifiers
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Types of DIDs
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
● Ledger-based DIDs: The "original" category of DID methods involves
a blockchain or other DLT
● Ledger Middleware (“Layer 2”) DIDs: Adds an additional storage
layer “on top” of the base layer blockchain
● Peer DIDs: Exists only within a relationship between a limited number
of participants
● Static DIDs: Can only be created and resolved, but not updated or
deactivated
● Alternative DIDs: Do not fall into any of the other categories
The Architectural Level:
Why DIDs Work
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
“Since it was first conceived, PKI has one
hard problem at its very core. It is not a
problem with cryptography per se, i.e., with
the math involved with public/private keys or
encryption/decryption algorithms. Rather it is
a problem with cryptographic infrastructure,
i.e., how we can make public/private key
cryptography easy and safe for people and
organizations to use at scale.”
The following slides walk you
through the narrative we present
in this part of the chapter
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Decentralized Identifier (DIDs) fundamentals deep dive
24
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
The PKI Trust Triangle
25
Controller
Private
Key
Public Key
Controls Publishes
Cryptographic binding
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Public Half
MUST be shared
The PKI Trust Triangle
26
Controller
Private
Key
Public Key
Controls Publishes
Private Half
Must NOT be shared
Cryptographic binding
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
The problem lies right here
27
Controller
Private
Key
Public Key
Controls Problem spot
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
28
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
This half is NOT the problem
29
Controller
Private
Key
Public Key
Controls
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
30
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
This half is the problem
31
Controller
Private
Key
Public Key
Controls
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
32
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
33
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
The real PKI Trust Triangle
34
Identifier
Private
Key
Public Key
Controls Publishes
Controller
Identifies
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
35
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
36
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Problem Spot #1
37
Identifier
Private
Key
Public Key
Controls Publishes
Controller
Identifies
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
38
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Problem Spot #2
39
Identifier
Private
Key
Public Key
Controls Publishes
Controller
Identifies
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
40
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Decentralized Identifier (DIDs) fundamentals deep dive
42
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
43
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Digital Identifiers
Type Challenges with Strong Binding
Phone Number Reassignable, limited #, hard to register
IP Address Reassignable, spoofable, hard to register
Domain Name Reassignable, spoofable, DNS poisoning
Email Address Reassignable, spoofable, weak security
URL Dependent on a Domain Name
X.500 Dist. Name Hard to register
X.500 Certs
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
45
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
46
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
47
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
48
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
49
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
50
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
51
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Public Key Certificate Signed by a CA
52
Private
Key
Public Key
Controls Publishes
Controller
Identifies
Identifier
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
53
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Decentralized Identifier (DIDs) fundamentals deep dive
55
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Self-Certifying Identifiers
56
Private
Key
Public Key
Controls Publishes
Controller
Publishes
Identifier
Generates
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
57
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
58
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Public key-to-identifier binding
59
Identifier
Private
Key
Public Key
Controls Publishes
Controller
Publishes
Generates
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
60
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Identifier-to-controller binding
61
Identifier
Private
Key
Public Key
Controls Publishes
Controller
Publishes
Generates
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
62
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
63
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Decentralized Identifier (DIDs) fundamentals deep dive
65
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
66
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Generation of the original key pair and DID
67
DID
Private
Key1
Public Key1
Controls Publishes
Controller
Generates
Publishes
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
68
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Publishing the original DID document
DID
Private
Key1
Public Key1
Controls Publishes
Controller
Generates
Publishes
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
70
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Publishing the updated DID document
71
DID
Private
Key2
Public Key2
Controls Publishes
Controller
Publishes
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
72
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
73
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Decentralized Identifier (DIDs) fundamentals deep dive
75
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
76
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Example: a DID for a newborn
DID
Private Key Public Key
Controller
IdentifiesKnows
Publishes
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
78
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
79
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Discovery of service endpoint URLs
DID
Private Key Public Key
Controller
URL
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
The Semantic Level:
What DIDs Mean
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
A brief history of addresses
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
“What new communications network function-
ality do DIDs enable that could not be done
before? The short answer is that DIDs were
invented to support both the cryptographic
trust and the human trust required for the
four-layer architecture of any trust network
based on the Trust over IP stack introduced
in Chapter 5 and shown again here.”
Decentralized Identifier (DIDs) fundamentals deep dive
https://www.manning.com/books/self-sovereign-identity and IdentiyBook.info
Released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
Questions?
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).

More Related Content

What's hot (20)

Zero-Knowledge Proofs in Light of Digital Identity
Zero-Knowledge Proofs in Light of Digital IdentityZero-Knowledge Proofs in Light of Digital Identity
Zero-Knowledge Proofs in Light of Digital Identity
Clare Nelson, CISSP, CIPP-E
 
Overview of Decentralized Identity
Overview of Decentralized IdentityOverview of Decentralized Identity
Overview of Decentralized Identity
Jim Flynn
 
Introduction to Self Sovereign Identity
Introduction to Self Sovereign IdentityIntroduction to Self Sovereign Identity
Introduction to Self Sovereign Identity
Heather Vescent
 
What are Decentralized Identifiers (DIDs)?
What are Decentralized Identifiers (DIDs)?What are Decentralized Identifiers (DIDs)?
What are Decentralized Identifiers (DIDs)?
Evernym
 
OpenID for Verifiable Credentials
OpenID for Verifiable CredentialsOpenID for Verifiable Credentials
OpenID for Verifiable Credentials
Torsten Lodderstedt
 
OpenID for Verifiable Credentials (IIW 35)
OpenID for Verifiable Credentials (IIW 35)OpenID for Verifiable Credentials (IIW 35)
OpenID for Verifiable Credentials (IIW 35)
Torsten Lodderstedt
 
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
Torsten Lodderstedt
 
Introduction to Self Sovereign Identity - IIW October 2019
Introduction to Self Sovereign Identity - IIW October 2019Introduction to Self Sovereign Identity - IIW October 2019
Introduction to Self Sovereign Identity - IIW October 2019
Heather Vescent
 
Masterclass on the DID Universal Resolver
Masterclass on the DID Universal ResolverMasterclass on the DID Universal Resolver
Masterclass on the DID Universal Resolver
Markus Sabadello
 
OpenID for Verifiable Credentials
OpenID for Verifiable CredentialsOpenID for Verifiable Credentials
OpenID for Verifiable Credentials
Torsten Lodderstedt
 
IBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxIBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptx
FIDO Alliance
 
Troopers 19 - I am AD FS and So Can You
Troopers 19 - I am AD FS and So Can YouTroopers 19 - I am AD FS and So Can You
Troopers 19 - I am AD FS and So Can You
Douglas Bienstock
 
Digital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksDigital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For Banks
Evernym
 
OpenID Connect 4 SSI
OpenID Connect 4 SSIOpenID Connect 4 SSI
OpenID Connect 4 SSI
Torsten Lodderstedt
 
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan GeorgeHyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
SSIMeetup
 
Blockchain 101 | Blockchain Tutorial | Blockchain Smart Contracts | Blockchai...
Blockchain 101 | Blockchain Tutorial | Blockchain Smart Contracts | Blockchai...Blockchain 101 | Blockchain Tutorial | Blockchain Smart Contracts | Blockchai...
Blockchain 101 | Blockchain Tutorial | Blockchain Smart Contracts | Blockchai...
Edureka!
 
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemseIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
SSIMeetup
 
OpenID for SSI
OpenID for SSIOpenID for SSI
OpenID for SSI
Torsten Lodderstedt
 
The Shift from Federated to Decentralized Identity
The Shift from Federated to Decentralized IdentityThe Shift from Federated to Decentralized Identity
The Shift from Federated to Decentralized Identity
Evernym
 
OpenID for Verifiable Credentials @ IIW 36
OpenID for Verifiable Credentials @ IIW 36OpenID for Verifiable Credentials @ IIW 36
OpenID for Verifiable Credentials @ IIW 36
Torsten Lodderstedt
 
Zero-Knowledge Proofs in Light of Digital Identity
Zero-Knowledge Proofs in Light of Digital IdentityZero-Knowledge Proofs in Light of Digital Identity
Zero-Knowledge Proofs in Light of Digital Identity
Clare Nelson, CISSP, CIPP-E
 
Overview of Decentralized Identity
Overview of Decentralized IdentityOverview of Decentralized Identity
Overview of Decentralized Identity
Jim Flynn
 
Introduction to Self Sovereign Identity
Introduction to Self Sovereign IdentityIntroduction to Self Sovereign Identity
Introduction to Self Sovereign Identity
Heather Vescent
 
What are Decentralized Identifiers (DIDs)?
What are Decentralized Identifiers (DIDs)?What are Decentralized Identifiers (DIDs)?
What are Decentralized Identifiers (DIDs)?
Evernym
 
OpenID for Verifiable Credentials
OpenID for Verifiable CredentialsOpenID for Verifiable Credentials
OpenID for Verifiable Credentials
Torsten Lodderstedt
 
OpenID for Verifiable Credentials (IIW 35)
OpenID for Verifiable Credentials (IIW 35)OpenID for Verifiable Credentials (IIW 35)
OpenID for Verifiable Credentials (IIW 35)
Torsten Lodderstedt
 
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
Torsten Lodderstedt
 
Introduction to Self Sovereign Identity - IIW October 2019
Introduction to Self Sovereign Identity - IIW October 2019Introduction to Self Sovereign Identity - IIW October 2019
Introduction to Self Sovereign Identity - IIW October 2019
Heather Vescent
 
Masterclass on the DID Universal Resolver
Masterclass on the DID Universal ResolverMasterclass on the DID Universal Resolver
Masterclass on the DID Universal Resolver
Markus Sabadello
 
OpenID for Verifiable Credentials
OpenID for Verifiable CredentialsOpenID for Verifiable Credentials
OpenID for Verifiable Credentials
Torsten Lodderstedt
 
IBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxIBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptx
FIDO Alliance
 
Troopers 19 - I am AD FS and So Can You
Troopers 19 - I am AD FS and So Can YouTroopers 19 - I am AD FS and So Can You
Troopers 19 - I am AD FS and So Can You
Douglas Bienstock
 
Digital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksDigital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For Banks
Evernym
 
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan GeorgeHyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
SSIMeetup
 
Blockchain 101 | Blockchain Tutorial | Blockchain Smart Contracts | Blockchai...
Blockchain 101 | Blockchain Tutorial | Blockchain Smart Contracts | Blockchai...Blockchain 101 | Blockchain Tutorial | Blockchain Smart Contracts | Blockchai...
Blockchain 101 | Blockchain Tutorial | Blockchain Smart Contracts | Blockchai...
Edureka!
 
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemseIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
SSIMeetup
 
The Shift from Federated to Decentralized Identity
The Shift from Federated to Decentralized IdentityThe Shift from Federated to Decentralized Identity
The Shift from Federated to Decentralized Identity
Evernym
 
OpenID for Verifiable Credentials @ IIW 36
OpenID for Verifiable Credentials @ IIW 36OpenID for Verifiable Credentials @ IIW 36
OpenID for Verifiable Credentials @ IIW 36
Torsten Lodderstedt
 

Similar to Decentralized Identifier (DIDs) fundamentals deep dive (20)

Webinar 46 DIDs fundamentals - IdentityBook.pptx
Webinar 46 DIDs fundamentals - IdentityBook.pptxWebinar 46 DIDs fundamentals - IdentityBook.pptx
Webinar 46 DIDs fundamentals - IdentityBook.pptx
binibon124
 
The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...
The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...
The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...
SSIMeetup
 
Internet Identity Workshop #29 highlights with Drummond Reed
Internet Identity Workshop #29 highlights with Drummond ReedInternet Identity Workshop #29 highlights with Drummond Reed
Internet Identity Workshop #29 highlights with Drummond Reed
SSIMeetup
 
Self Sovereign Identity (SSI) Open standards with Drummond Reed
Self Sovereign Identity (SSI) Open standards with Drummond Reed Self Sovereign Identity (SSI) Open standards with Drummond Reed
Self Sovereign Identity (SSI) Open standards with Drummond Reed
SSIMeetup
 
Highlights of Internet Identity Workshop #28 with Drummond Reed
Highlights of Internet Identity Workshop #28 with Drummond ReedHighlights of Internet Identity Workshop #28 with Drummond Reed
Highlights of Internet Identity Workshop #28 with Drummond Reed
SSIMeetup
 
Blockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain CredentialsBlockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain Credentials
SSIMeetup
 
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
SSIMeetup
 
Schema Definitions and Overlays for Self-Sovereign Identity (SSI) - Paul Knowles
Schema Definitions and Overlays for Self-Sovereign Identity (SSI) - Paul KnowlesSchema Definitions and Overlays for Self-Sovereign Identity (SSI) - Paul Knowles
Schema Definitions and Overlays for Self-Sovereign Identity (SSI) - Paul Knowles
SSIMeetup
 
The 2nd Official W3C DID Working Group Meeting (The Netherlands)
The 2nd Official W3C DID Working Group Meeting (The Netherlands)The 2nd Official W3C DID Working Group Meeting (The Netherlands)
The 2nd Official W3C DID Working Group Meeting (The Netherlands)
SSIMeetup
 
OSCON 2018 Getting Started with Hyperledger Indy
OSCON 2018 Getting Started with Hyperledger IndyOSCON 2018 Getting Started with Hyperledger Indy
OSCON 2018 Getting Started with Hyperledger Indy
Tracy Kuhrt
 
Decentralized Identifiers
Decentralized IdentifiersDecentralized Identifiers
Decentralized Identifiers
Markus Sabadello
 
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
Adam Pennington
 
DID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
DID Resolution: Given a DID how do I retrieve its document? – Markus SabadelloDID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
DID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
SSIMeetup
 
Kiva protocol: building the credit bureau of the future using SSI
Kiva protocol: building the credit bureau of the future using SSIKiva protocol: building the credit bureau of the future using SSI
Kiva protocol: building the credit bureau of the future using SSI
SSIMeetup
 
Learn about the Trust Over IP (ToIP) stack
Learn about the Trust Over IP (ToIP) stackLearn about the Trust Over IP (ToIP) stack
Learn about the Trust Over IP (ToIP) stack
SSIMeetup
 
CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...
CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...
CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...
sparkfabrik
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
LabSharegroup
 
Cheqd: Making privacy-preserving digital credentials fun
Cheqd: Making privacy-preserving digital credentials funCheqd: Making privacy-preserving digital credentials fun
Cheqd: Making privacy-preserving digital credentials fun
SSIMeetup
 
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?
Hacken_Ecosystem
 
Spring boot-vault
Spring boot-vaultSpring boot-vault
Spring boot-vault
Jan Dittberner
 
Webinar 46 DIDs fundamentals - IdentityBook.pptx
Webinar 46 DIDs fundamentals - IdentityBook.pptxWebinar 46 DIDs fundamentals - IdentityBook.pptx
Webinar 46 DIDs fundamentals - IdentityBook.pptx
binibon124
 
The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...
The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...
The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...
SSIMeetup
 
Internet Identity Workshop #29 highlights with Drummond Reed
Internet Identity Workshop #29 highlights with Drummond ReedInternet Identity Workshop #29 highlights with Drummond Reed
Internet Identity Workshop #29 highlights with Drummond Reed
SSIMeetup
 
Self Sovereign Identity (SSI) Open standards with Drummond Reed
Self Sovereign Identity (SSI) Open standards with Drummond Reed Self Sovereign Identity (SSI) Open standards with Drummond Reed
Self Sovereign Identity (SSI) Open standards with Drummond Reed
SSIMeetup
 
Highlights of Internet Identity Workshop #28 with Drummond Reed
Highlights of Internet Identity Workshop #28 with Drummond ReedHighlights of Internet Identity Workshop #28 with Drummond Reed
Highlights of Internet Identity Workshop #28 with Drummond Reed
SSIMeetup
 
Blockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain CredentialsBlockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain Credentials
SSIMeetup
 
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
SSIMeetup
 
Schema Definitions and Overlays for Self-Sovereign Identity (SSI) - Paul Knowles
Schema Definitions and Overlays for Self-Sovereign Identity (SSI) - Paul KnowlesSchema Definitions and Overlays for Self-Sovereign Identity (SSI) - Paul Knowles
Schema Definitions and Overlays for Self-Sovereign Identity (SSI) - Paul Knowles
SSIMeetup
 
The 2nd Official W3C DID Working Group Meeting (The Netherlands)
The 2nd Official W3C DID Working Group Meeting (The Netherlands)The 2nd Official W3C DID Working Group Meeting (The Netherlands)
The 2nd Official W3C DID Working Group Meeting (The Netherlands)
SSIMeetup
 
OSCON 2018 Getting Started with Hyperledger Indy
OSCON 2018 Getting Started with Hyperledger IndyOSCON 2018 Getting Started with Hyperledger Indy
OSCON 2018 Getting Started with Hyperledger Indy
Tracy Kuhrt
 
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
Adam Pennington
 
DID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
DID Resolution: Given a DID how do I retrieve its document? – Markus SabadelloDID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
DID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
SSIMeetup
 
Kiva protocol: building the credit bureau of the future using SSI
Kiva protocol: building the credit bureau of the future using SSIKiva protocol: building the credit bureau of the future using SSI
Kiva protocol: building the credit bureau of the future using SSI
SSIMeetup
 
Learn about the Trust Over IP (ToIP) stack
Learn about the Trust Over IP (ToIP) stackLearn about the Trust Over IP (ToIP) stack
Learn about the Trust Over IP (ToIP) stack
SSIMeetup
 
CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...
CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...
CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...
sparkfabrik
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
LabSharegroup
 
Cheqd: Making privacy-preserving digital credentials fun
Cheqd: Making privacy-preserving digital credentials funCheqd: Making privacy-preserving digital credentials fun
Cheqd: Making privacy-preserving digital credentials fun
SSIMeetup
 
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?
Hacken_Ecosystem
 

More from SSIMeetup (20)

ZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSIZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSI
SSIMeetup
 
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
SSIMeetup
 
Value proposition of SSI tech providers - Self-Sovereign Identity
Value proposition of SSI tech providers - Self-Sovereign IdentityValue proposition of SSI tech providers - Self-Sovereign Identity
Value proposition of SSI tech providers - Self-Sovereign Identity
SSIMeetup
 
SSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley HughesSSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley Hughes
SSIMeetup
 
Web5 - Open to Build - Block-TBD
Web5 - Open to Build - Block-TBDWeb5 - Open to Build - Block-TBD
Web5 - Open to Build - Block-TBD
SSIMeetup
 
Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...
SSIMeetup
 
PharmaLedger: A Digital Trust Ecosystem for Healthcare
PharmaLedger: A Digital Trust Ecosystem for HealthcarePharmaLedger: A Digital Trust Ecosystem for Healthcare
PharmaLedger: A Digital Trust Ecosystem for Healthcare
SSIMeetup
 
PolygonID Zero-Knowledge Identity Web2 & Web3
PolygonID Zero-Knowledge Identity Web2 & Web3PolygonID Zero-Knowledge Identity Web2 & Web3
PolygonID Zero-Knowledge Identity Web2 & Web3
SSIMeetup
 
Building SSI Products: A Guide for Product Managers
Building SSI Products: A Guide for Product ManagersBuilding SSI Products: A Guide for Product Managers
Building SSI Products: A Guide for Product Managers
SSIMeetup
 
Solving compliance for crypto businesses using Decentralized Identity – Pelle...
Solving compliance for crypto businesses using Decentralized Identity – Pelle...Solving compliance for crypto businesses using Decentralized Identity – Pelle...
Solving compliance for crypto businesses using Decentralized Identity – Pelle...
SSIMeetup
 
The Pan-Canadian Trust Framework (PCTF) for SSI
The Pan-Canadian Trust Framework (PCTF) for SSIThe Pan-Canadian Trust Framework (PCTF) for SSI
The Pan-Canadian Trust Framework (PCTF) for SSI
SSIMeetup
 
Identity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic ProtocolIdentity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic Protocol
SSIMeetup
 
The SSI Ecosystem in South Korea
The SSI Ecosystem in South KoreaThe SSI Ecosystem in South Korea
The SSI Ecosystem in South Korea
SSIMeetup
 
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloIntroducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
SSIMeetup
 
How to avoid another identity nightmare with SSI? Christopher Allen
How to avoid another identity nightmare with SSI? Christopher AllenHow to avoid another identity nightmare with SSI? Christopher Allen
How to avoid another identity nightmare with SSI? Christopher Allen
SSIMeetup
 
Explaining SSI to C-suite executives, and anyone else for that matter
Explaining SSI to C-suite executives, and anyone else for that matterExplaining SSI to C-suite executives, and anyone else for that matter
Explaining SSI to C-suite executives, and anyone else for that matter
SSIMeetup
 
The Hyperledger Indy Public Blockchain Node
The Hyperledger Indy Public Blockchain NodeThe Hyperledger Indy Public Blockchain Node
The Hyperledger Indy Public Blockchain Node
SSIMeetup
 
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
SSIMeetup
 
Streetcred: Improving the Developer Experience in SSI – Michael Boyd
Streetcred: Improving the Developer Experience in SSI – Michael BoydStreetcred: Improving the Developer Experience in SSI – Michael Boyd
Streetcred: Improving the Developer Experience in SSI – Michael Boyd
SSIMeetup
 
SSI: The Trillion Dollar Business Opportunity
SSI: The Trillion Dollar Business OpportunitySSI: The Trillion Dollar Business Opportunity
SSI: The Trillion Dollar Business Opportunity
SSIMeetup
 
ZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSIZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSI
SSIMeetup
 
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
SSIMeetup
 
Value proposition of SSI tech providers - Self-Sovereign Identity
Value proposition of SSI tech providers - Self-Sovereign IdentityValue proposition of SSI tech providers - Self-Sovereign Identity
Value proposition of SSI tech providers - Self-Sovereign Identity
SSIMeetup
 
SSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley HughesSSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley Hughes
SSIMeetup
 
Web5 - Open to Build - Block-TBD
Web5 - Open to Build - Block-TBDWeb5 - Open to Build - Block-TBD
Web5 - Open to Build - Block-TBD
SSIMeetup
 
Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...
SSIMeetup
 
PharmaLedger: A Digital Trust Ecosystem for Healthcare
PharmaLedger: A Digital Trust Ecosystem for HealthcarePharmaLedger: A Digital Trust Ecosystem for Healthcare
PharmaLedger: A Digital Trust Ecosystem for Healthcare
SSIMeetup
 
PolygonID Zero-Knowledge Identity Web2 & Web3
PolygonID Zero-Knowledge Identity Web2 & Web3PolygonID Zero-Knowledge Identity Web2 & Web3
PolygonID Zero-Knowledge Identity Web2 & Web3
SSIMeetup
 
Building SSI Products: A Guide for Product Managers
Building SSI Products: A Guide for Product ManagersBuilding SSI Products: A Guide for Product Managers
Building SSI Products: A Guide for Product Managers
SSIMeetup
 
Solving compliance for crypto businesses using Decentralized Identity – Pelle...
Solving compliance for crypto businesses using Decentralized Identity – Pelle...Solving compliance for crypto businesses using Decentralized Identity – Pelle...
Solving compliance for crypto businesses using Decentralized Identity – Pelle...
SSIMeetup
 
The Pan-Canadian Trust Framework (PCTF) for SSI
The Pan-Canadian Trust Framework (PCTF) for SSIThe Pan-Canadian Trust Framework (PCTF) for SSI
The Pan-Canadian Trust Framework (PCTF) for SSI
SSIMeetup
 
Identity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic ProtocolIdentity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic Protocol
SSIMeetup
 
The SSI Ecosystem in South Korea
The SSI Ecosystem in South KoreaThe SSI Ecosystem in South Korea
The SSI Ecosystem in South Korea
SSIMeetup
 
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloIntroducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
SSIMeetup
 
How to avoid another identity nightmare with SSI? Christopher Allen
How to avoid another identity nightmare with SSI? Christopher AllenHow to avoid another identity nightmare with SSI? Christopher Allen
How to avoid another identity nightmare with SSI? Christopher Allen
SSIMeetup
 
Explaining SSI to C-suite executives, and anyone else for that matter
Explaining SSI to C-suite executives, and anyone else for that matterExplaining SSI to C-suite executives, and anyone else for that matter
Explaining SSI to C-suite executives, and anyone else for that matter
SSIMeetup
 
The Hyperledger Indy Public Blockchain Node
The Hyperledger Indy Public Blockchain NodeThe Hyperledger Indy Public Blockchain Node
The Hyperledger Indy Public Blockchain Node
SSIMeetup
 
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
SSIMeetup
 
Streetcred: Improving the Developer Experience in SSI – Michael Boyd
Streetcred: Improving the Developer Experience in SSI – Michael BoydStreetcred: Improving the Developer Experience in SSI – Michael Boyd
Streetcred: Improving the Developer Experience in SSI – Michael Boyd
SSIMeetup
 
SSI: The Trillion Dollar Business Opportunity
SSI: The Trillion Dollar Business OpportunitySSI: The Trillion Dollar Business Opportunity
SSI: The Trillion Dollar Business Opportunity
SSIMeetup
 

Recently uploaded (20)

The Internet Service Providers and Connectivity Providers of ICANN
The Internet Service Providers and Connectivity Providers of ICANNThe Internet Service Providers and Connectivity Providers of ICANN
The Internet Service Providers and Connectivity Providers of ICANN
Bangladesh Network Operators Group
 
5 Reasons cheap WordPress hosting is costing you more | Reversed Out
5 Reasons cheap WordPress hosting is costing you more | Reversed Out5 Reasons cheap WordPress hosting is costing you more | Reversed Out
5 Reasons cheap WordPress hosting is costing you more | Reversed Out
Reversed Out Creative
 
原版西班牙马拉加大学毕业证(UMA毕业证书)如何办理
原版西班牙马拉加大学毕业证(UMA毕业证书)如何办理原版西班牙马拉加大学毕业证(UMA毕业证书)如何办理
原版西班牙马拉加大学毕业证(UMA毕业证书)如何办理
Taqyea
 
Essential Tech Stack for Effective Shopify Dropshipping Integration.pdf
Essential Tech Stack for Effective Shopify Dropshipping Integration.pdfEssential Tech Stack for Effective Shopify Dropshipping Integration.pdf
Essential Tech Stack for Effective Shopify Dropshipping Integration.pdf
CartCoders
 
all Practical Project LAST summary note.docx
all Practical Project LAST summary note.docxall Practical Project LAST summary note.docx
all Practical Project LAST summary note.docx
seidjemal94
 
All-4 Chapters-Emerging-technology-ppt.pptx
All-4 Chapters-Emerging-technology-ppt.pptxAll-4 Chapters-Emerging-technology-ppt.pptx
All-4 Chapters-Emerging-technology-ppt.pptx
beletetesfaw1
 
Unlocking the Power of SIM Card IoT Connectivity.pdf
Unlocking the Power of SIM Card IoT Connectivity.pdfUnlocking the Power of SIM Card IoT Connectivity.pdf
Unlocking the Power of SIM Card IoT Connectivity.pdf
elite virtual staffing solutions
 
Fast Reroute in SR-MPLS by Md Abdullah Al Naser
Fast Reroute in SR-MPLS by Md Abdullah Al NaserFast Reroute in SR-MPLS by Md Abdullah Al Naser
Fast Reroute in SR-MPLS by Md Abdullah Al Naser
Bangladesh Network Operators Group
 
DATA COMMUNICATION components, modes of transmission & communication devices ...
DATA COMMUNICATION components, modes of transmission & communication devices ...DATA COMMUNICATION components, modes of transmission & communication devices ...
DATA COMMUNICATION components, modes of transmission & communication devices ...
samina khan
 
Transport Conjjjjjjjjjjjjjjjjjjjjjjjsulting by Slidesgo.pptx
Transport Conjjjjjjjjjjjjjjjjjjjjjjjsulting by Slidesgo.pptxTransport Conjjjjjjjjjjjjjjjjjjjjjjjsulting by Slidesgo.pptx
Transport Conjjjjjjjjjjjjjjjjjjjjjjjsulting by Slidesgo.pptx
ssuser80a7e81
 
Optics101 for non-Optical (IP) folks by Tashi Phuntsho
Optics101 for non-Optical (IP) folks by Tashi PhuntshoOptics101 for non-Optical (IP) folks by Tashi Phuntsho
Optics101 for non-Optical (IP) folks by Tashi Phuntsho
Bangladesh Network Operators Group
 
Paper: QFS: World Game (s) Great Redesign.pdf
Paper: QFS: World Game (s) Great Redesign.pdfPaper: QFS: World Game (s) Great Redesign.pdf
Paper: QFS: World Game (s) Great Redesign.pdf
Steven McGee
 
Networking concepts from zero to hero that covers the security aspects
Networking concepts from zero to hero that covers the security aspectsNetworking concepts from zero to hero that covers the security aspects
Networking concepts from zero to hero that covers the security aspects
amansinght675
 
DDoS Mitigation Strategies by Md. Abdul Awal
DDoS Mitigation Strategies by Md. Abdul AwalDDoS Mitigation Strategies by Md. Abdul Awal
DDoS Mitigation Strategies by Md. Abdul Awal
Bangladesh Network Operators Group
 
Mikotik_Load_Balancing_workshop_best_practice
Mikotik_Load_Balancing_workshop_best_practiceMikotik_Load_Balancing_workshop_best_practice
Mikotik_Load_Balancing_workshop_best_practice
davidarmandorodrigue
 
Bsjsudhjsidudjdudjdudidjjdjdkdel-se-br.ppt
Bsjsudhjsidudjdudjdudidjjdjdkdel-se-br.pptBsjsudhjsidudjdudjdudidjjdjdkdel-se-br.ppt
Bsjsudhjsidudjdudjdudidjjdjdkdel-se-br.ppt
ssuserb171f7
 
DNS & DNSSEC operational best practices - Sleep better at night with KINDNS i...
DNS & DNSSEC operational best practices - Sleep better at night with KINDNS i...DNS & DNSSEC operational best practices - Sleep better at night with KINDNS i...
DNS & DNSSEC operational best practices - Sleep better at night with KINDNS i...
Bangladesh Network Operators Group
 
Integration of AI and GenAI in Education and beyond
Integration of AI and GenAI in Education and beyondIntegration of AI and GenAI in Education and beyond
Integration of AI and GenAI in Education and beyond
Bangladesh Network Operators Group
 
Chapter 3: Data and Computer Communication
Chapter 3: Data and Computer CommunicationChapter 3: Data and Computer Communication
Chapter 3: Data and Computer Communication
HabtamuAbuneAbune
 
Presentation About The Buttons | Selma SALTIK
Presentation About The Buttons | Selma SALTIKPresentation About The Buttons | Selma SALTIK
Presentation About The Buttons | Selma SALTIK
SELMA SALTIK
 
The Internet Service Providers and Connectivity Providers of ICANN
The Internet Service Providers and Connectivity Providers of ICANNThe Internet Service Providers and Connectivity Providers of ICANN
The Internet Service Providers and Connectivity Providers of ICANN
Bangladesh Network Operators Group
 
5 Reasons cheap WordPress hosting is costing you more | Reversed Out
5 Reasons cheap WordPress hosting is costing you more | Reversed Out5 Reasons cheap WordPress hosting is costing you more | Reversed Out
5 Reasons cheap WordPress hosting is costing you more | Reversed Out
Reversed Out Creative
 
原版西班牙马拉加大学毕业证(UMA毕业证书)如何办理
原版西班牙马拉加大学毕业证(UMA毕业证书)如何办理原版西班牙马拉加大学毕业证(UMA毕业证书)如何办理
原版西班牙马拉加大学毕业证(UMA毕业证书)如何办理
Taqyea
 
Essential Tech Stack for Effective Shopify Dropshipping Integration.pdf
Essential Tech Stack for Effective Shopify Dropshipping Integration.pdfEssential Tech Stack for Effective Shopify Dropshipping Integration.pdf
Essential Tech Stack for Effective Shopify Dropshipping Integration.pdf
CartCoders
 
all Practical Project LAST summary note.docx
all Practical Project LAST summary note.docxall Practical Project LAST summary note.docx
all Practical Project LAST summary note.docx
seidjemal94
 
All-4 Chapters-Emerging-technology-ppt.pptx
All-4 Chapters-Emerging-technology-ppt.pptxAll-4 Chapters-Emerging-technology-ppt.pptx
All-4 Chapters-Emerging-technology-ppt.pptx
beletetesfaw1
 
DATA COMMUNICATION components, modes of transmission & communication devices ...
DATA COMMUNICATION components, modes of transmission & communication devices ...DATA COMMUNICATION components, modes of transmission & communication devices ...
DATA COMMUNICATION components, modes of transmission & communication devices ...
samina khan
 
Transport Conjjjjjjjjjjjjjjjjjjjjjjjsulting by Slidesgo.pptx
Transport Conjjjjjjjjjjjjjjjjjjjjjjjsulting by Slidesgo.pptxTransport Conjjjjjjjjjjjjjjjjjjjjjjjsulting by Slidesgo.pptx
Transport Conjjjjjjjjjjjjjjjjjjjjjjjsulting by Slidesgo.pptx
ssuser80a7e81
 
Paper: QFS: World Game (s) Great Redesign.pdf
Paper: QFS: World Game (s) Great Redesign.pdfPaper: QFS: World Game (s) Great Redesign.pdf
Paper: QFS: World Game (s) Great Redesign.pdf
Steven McGee
 
Networking concepts from zero to hero that covers the security aspects
Networking concepts from zero to hero that covers the security aspectsNetworking concepts from zero to hero that covers the security aspects
Networking concepts from zero to hero that covers the security aspects
amansinght675
 
Mikotik_Load_Balancing_workshop_best_practice
Mikotik_Load_Balancing_workshop_best_practiceMikotik_Load_Balancing_workshop_best_practice
Mikotik_Load_Balancing_workshop_best_practice
davidarmandorodrigue
 
Bsjsudhjsidudjdudjdudidjjdjdkdel-se-br.ppt
Bsjsudhjsidudjdudjdudidjjdjdkdel-se-br.pptBsjsudhjsidudjdudjdudidjjdjdkdel-se-br.ppt
Bsjsudhjsidudjdudjdudidjjdjdkdel-se-br.ppt
ssuserb171f7
 
DNS & DNSSEC operational best practices - Sleep better at night with KINDNS i...
DNS & DNSSEC operational best practices - Sleep better at night with KINDNS i...DNS & DNSSEC operational best practices - Sleep better at night with KINDNS i...
DNS & DNSSEC operational best practices - Sleep better at night with KINDNS i...
Bangladesh Network Operators Group
 
Chapter 3: Data and Computer Communication
Chapter 3: Data and Computer CommunicationChapter 3: Data and Computer Communication
Chapter 3: Data and Computer Communication
HabtamuAbuneAbune
 
Presentation About The Buttons | Selma SALTIK
Presentation About The Buttons | Selma SALTIKPresentation About The Buttons | Selma SALTIK
Presentation About The Buttons | Selma SALTIK
SELMA SALTIK
 

Decentralized Identifier (DIDs) fundamentals deep dive

  • 1. Decentralized Identifiers (DIDs) fundamentals IdentityBook.info special twitter.com/IdentityBookHQ SSIMeetup.orghttps://creativecommons.org/licenses/by-sa/4.0/ Drummond Reed W3C DID specification co-author Chief Trust Officer Evernym Markus Sabadello W3C DID specification co-author Founder Danube Tech
  • 2. 1. Empower global SSI communities 2. Open to everyone interested in SSI 3. All content is shared with CC BY SA SSIMeetup.org Alex Preukschat @SSIMeetup @AlexPreukschat Coordinating Node SSIMeetup.org https://creativecommons.org/licenses/by-sa/4.0/ SSIMeetup objectives 17 May 2018
  • 4. Introduction SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0). You can understand DIDs at four progressively deeper levels.
  • 5. The Superficial Level: What is a DID? SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 6. URIs, URLs, and URNs SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0). ● URLs locate resources on a network ● URNs are persistent names for a resource that will never change no matter its location ● A DID is functionally a URN that in many cases can be resolved into one or more URLs
  • 7. The four core properties of a DID SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 8. The Functional Level: How DIDs Work SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 9. SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0). "For digital identifiers, the usefulness comes just not from the identifier itself, but from how it can be used by applications designed to consume that particular type of identifier.”
  • 10. DIDs, DID documents, and DID subjects SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 11. A typical DID document contains: SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0). ● One or more public keys (or other verification methods) that can be used to authenticate the DID subject during an interaction ● One or more services associated with the DID subject that can be used for interaction via protocols supported by those services ● Additional metadata such as timestamps, digital signatures and other cryptographic proofs, or metadata related to delegation and authorization
  • 12. Example DID Document SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0). { "@context": "https://www.w3.org/ns/did/v1", "id": "did:example:123456789abcdefghi", "authentication": [{ "id": "did:example:123456789abcdefghi#keys-1", "type": "Ed25519VerificationKey2018", "controller": "did:example:123456789abcdefghi", "publicKeyBase58" : "H3C2AVvLMv6gmMNam3uVAjZpfkcJCwDwnZn6z3wXmqPV" }], "service": [{ "id":"did:example:123456789abcdefghi#vcs", "type": "VerifiableCredentialService", "serviceEndpoint": "https://example.com/vc/" }] }
  • 13. DID Methods SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0). ● DIDs are not created and maintained in a single type of database or network like most other types of URIs ● DID methods all support the same basic functionality but they differ in how that functionality is implemented
  • 14. DID Resolution SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0). ● The process of obtaining the DID document associated with a DID ● Rather than thinking of DID resolution as a protocol, it should be considered an abstract function or algorithm
  • 15. DID URLs SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0). ● DIDs are powerful identifiers by themselves, but they can also be used as the basis for constructing more advanced URLs rooted in a DID ● This is like how http/https URLs can consist of more than just a domain name ● DID URLs enable an "identifier space" for additional resources associated with the DID
  • 16. Example DID URLs SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0). did:example:1234/ did:example:1234#keys-1 did:example:1234;version-id=4#keys-1 did:example:1234/my/path?query#fragment did:example:1234;service=hub/my/path?query#fragment
  • 17. Comparing DIDs with Domain Names Decentralized Identifiers (DIDs) Domain Names Globally unique Globally unique Persistent Reassignable Machine-friendly identifiers (i.e., long character strings based on random numbers / cryptography) Human-readable names Resolvable using different mechanisms defined by the applicable DID method Resolvable using the standard DNS protocol Associated data is expressed in DID documents Associated data is expressed in DNS zone files Fully decentralized namespaces without delegation Hierarchical, delegatable namespaces based on centralized root registries for top-level domain names (TLDs) Cryptographically-verifiable Verifiable using DNS security extensions (DNSSEC) Fully under the control of the DID controller Ultimately controlled by ICANN and the registry operator for each DNS TLD SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 18. Comparison with other persistent identifiers SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 19. Types of DIDs SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0). ● Ledger-based DIDs: The "original" category of DID methods involves a blockchain or other DLT ● Ledger Middleware (“Layer 2”) DIDs: Adds an additional storage layer “on top” of the base layer blockchain ● Peer DIDs: Exists only within a relationship between a limited number of participants ● Static DIDs: Can only be created and resolved, but not updated or deactivated ● Alternative DIDs: Do not fall into any of the other categories
  • 20. The Architectural Level: Why DIDs Work SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 21. SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0). “Since it was first conceived, PKI has one hard problem at its very core. It is not a problem with cryptography per se, i.e., with the math involved with public/private keys or encryption/decryption algorithms. Rather it is a problem with cryptographic infrastructure, i.e., how we can make public/private key cryptography easy and safe for people and organizations to use at scale.”
  • 22. The following slides walk you through the narrative we present in this part of the chapter SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 24. 24 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 25. The PKI Trust Triangle 25 Controller Private Key Public Key Controls Publishes Cryptographic binding SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 26. Public Half MUST be shared The PKI Trust Triangle 26 Controller Private Key Public Key Controls Publishes Private Half Must NOT be shared Cryptographic binding SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 27. The problem lies right here 27 Controller Private Key Public Key Controls Problem spot SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 28. 28 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 29. This half is NOT the problem 29 Controller Private Key Public Key Controls SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 30. 30 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 31. This half is the problem 31 Controller Private Key Public Key Controls SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 32. 32 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 33. 33 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 34. The real PKI Trust Triangle 34 Identifier Private Key Public Key Controls Publishes Controller Identifies SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 35. 35 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 36. 36 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 37. Problem Spot #1 37 Identifier Private Key Public Key Controls Publishes Controller Identifies SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 38. 38 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 39. Problem Spot #2 39 Identifier Private Key Public Key Controls Publishes Controller Identifies SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 40. 40 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 42. 42 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 43. 43 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 44. Digital Identifiers Type Challenges with Strong Binding Phone Number Reassignable, limited #, hard to register IP Address Reassignable, spoofable, hard to register Domain Name Reassignable, spoofable, DNS poisoning Email Address Reassignable, spoofable, weak security URL Dependent on a Domain Name X.500 Dist. Name Hard to register X.500 Certs SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 45. 45 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 46. 46 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 47. 47 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 48. 48 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 49. 49 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 50. 50 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 51. 51 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 52. Public Key Certificate Signed by a CA 52 Private Key Public Key Controls Publishes Controller Identifies Identifier SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 53. 53 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 55. 55 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 56. Self-Certifying Identifiers 56 Private Key Public Key Controls Publishes Controller Publishes Identifier Generates SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 57. 57 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 58. 58 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 59. Public key-to-identifier binding 59 Identifier Private Key Public Key Controls Publishes Controller Publishes Generates SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 60. 60 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 61. Identifier-to-controller binding 61 Identifier Private Key Public Key Controls Publishes Controller Publishes Generates SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 62. 62 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 63. 63 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 65. 65 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 66. 66 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 67. Generation of the original key pair and DID 67 DID Private Key1 Public Key1 Controls Publishes Controller Generates Publishes SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 68. 68 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 69. Publishing the original DID document DID Private Key1 Public Key1 Controls Publishes Controller Generates Publishes SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 70. 70 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 71. Publishing the updated DID document 71 DID Private Key2 Public Key2 Controls Publishes Controller Publishes SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 72. 72 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 73. 73 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 75. 75 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 76. 76 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 77. Example: a DID for a newborn DID Private Key Public Key Controller IdentifiesKnows Publishes SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 78. 78 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 79. 79 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 80. Discovery of service endpoint URLs DID Private Key Public Key Controller URL SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 81. The Semantic Level: What DIDs Mean SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 82. A brief history of addresses SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 83. SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0). “What new communications network function- ality do DIDs enable that could not be done before? The short answer is that DIDs were invented to support both the cryptographic trust and the human trust required for the four-layer architecture of any trust network based on the Trust over IP stack introduced in Chapter 5 and shown again here.”
  • 86. Questions? SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).