Distributed ID System Patterns with Distributed Systems

From IIW
Jump to: navigation, search

Distributed ID System Patterns with Distributed Systems


Wednesday 1C

Convener: Dave Sanford

Notes-taker(s): Colin Jaccino


Discussion notes, key understandings, outstanding questions, observations, and, if appropriate to this discussion: action items, next steps:


Distributed ID: 

-> Anonymous

-> Anon-Verified

-> Pseudonymous

-> Real Name

——> Sovereign ID


Distributed System

Open, Permissioned, Private

Fat Protocols

Protocols that include a component that includes the payment for the use of the protocols

Zero Knowledge

- Consensus Algorithms

Validate & Choose

State == Truth


Continuum of autonomy for Human and Machine systems


<—————————————————————————————>

Full ConsensusLocal ConsensusTruly Decentralized Static


Human 

Totalitarianism or BetterRegional Autonomy——————


Machine

Blockchain to rule them all————All nodes maintain state.  no consensus


This conversation opened with a discussion of topics and technologies relating to distributed ledger-based identity systems. The conversation then moved to the continuum of freedom and control in human systems, and the similarity, or potential risk, human freedom has on the degree of control or independence inherent in digital knowledge systems on which we depend.


A number of questions emerged in the conversation:

1 – Will we eventually become so dependent on these systems that we cannot change them, even if there are problems with them?

2 – Will we enable strong non-repudiation in a way that has negative consequences for humanity? For example, in a punitive, self-destructive, or genocidal society, will these systems enable greater human harm?

3 – Have we assessed the potential negative outcomes of the introduction of strong, objective state and knowledge systems? Are we building safeguards into these new technologies?