Difference between revisions of "IIW 26 Proposed Topics"

From IIW
Jump to: navigation, search
 
(3 intermediate revisions by the same user not shown)
Line 5: Line 5:
 
*Pseudonymous Identity
 
*Pseudonymous Identity
 
*first time attending so planning see how it all works before presenting/leading
 
*first time attending so planning see how it all works before presenting/leading
 +
*Information Sharing Agreements, Consent Receipts, Privacy, GDPR
 +
*XDI, DIDs, Universal Resolver, Universal Registrar
 +
*Managing privacy and intention by understanding the relationship between human nature and I.T. forces.
 +
*BYOID - Bring Your Own IdentityThe Social Ledger and Identity
 +
*First time there!
 +
*Determining the identity of internet users
 +
*Off Chain/Side Chain Block Chain  Identity OIDC
 +
*W3C Verifiable Credentials Update, Decentralized Identifiers Comparison
 +
*ActivityPub
 +
*Microservices Security
 +
*Possible demo of movie rights stored and accessed on Sovrin platform
 +
*Decentrialized Identity, Amira 1.0.0, Lost Identity's Maria Sofia 1.0.0
 +
*The self-sovereign technology stack.
 +
*DevOps, docker
 +
*Enterprise IoT management Consent management
 +
*Listening
 +
*Testing related topics (automation, security, infrastructure)
 +
  
  
Line 11: Line 29:
 
*Sovrin, Everynym
 
*Sovrin, Everynym
 
*helping individuals take control of all their personal data stored in various corporate silos ... I own an HR company and want to basically turn all this on its head :)
 
*helping individuals take control of all their personal data stored in various corporate silos ... I own an HR company and want to basically turn all this on its head :)
 +
*Sovrin, Blockchain, Verified Identifies
 +
*Capabliities/Delegation
 +
*Latest developments with Sovrin and Indy.
 +
*From prior experience I know that by listening, and some osmosis, this crowd will lead me to better knowing about systems managing privacy and affecting intention.
 +
*Decentralized IdentifiersuPort
 +
*Identity as a ServicePrivacy and Policy Implications
 +
*I am hoping to learn about separate legitimate from illegitimate internet users
 +
*Block Chain OIDC
 +
*Open Standards for Biometrics, U2F
 +
*Blockchain
 +
*International identity approaches
 +
*Cooperation between UMA and decentralized identity (DID) standards.
 +
*Protocol implementations
 +
*What must be included in a post-Google Internet that respects anonymity, identity, privacy, and security, you own your own data, leave all the walled gardens and predatory surveillance behind.
 +
*What others are doing differently
  
  
Line 17: Line 50:
 
*Pseudonymous Identity
 
*Pseudonymous Identity
 
*learn more about sovrin
 
*learn more about sovrin
 +
*How to build independent apps and ecosystems on top of verified identies
 +
*What is "Self-Sovereign Privacy?"
 +
*What may threaten individual leverage in maintaining their "freedom" of movement or choice regarding privacy?
 +
*What role do existing identity provider enterprises (banks, ISPs, telcos, etc.) have to play in a user-centric identity paradigm?
 +
*Interoperable identity solutions
 +
*How can we make it possible to revoke access to idenity information?How can we make interactions online safer?
 +
*Why is the internet not a safe environment, especially for businesses
 +
*BlockChain Privacy
 +
*How do we decentralized attributes without sharing them everywhere?
 +
*Biometrics for identity recovery.
 +
*Tokens that allow creation of virtual Amazon -- buy anything from anyone with a token, end role of Amazon as an intermediary taking a 65% toll.
 +
*-2fa-blockchain based authentication

Latest revision as of 23:59, 21 February 2018

What topics are you planning to present about or lead a discussion about at this IIW?

  • User authentication
  • Blockchain democracy
  • The Horcrux protocol
  • Pseudonymous Identity
  • first time attending so planning see how it all works before presenting/leading
  • Information Sharing Agreements, Consent Receipts, Privacy, GDPR
  • XDI, DIDs, Universal Resolver, Universal Registrar
  • Managing privacy and intention by understanding the relationship between human nature and I.T. forces.
  • BYOID - Bring Your Own IdentityThe Social Ledger and Identity
  • First time there!
  • Determining the identity of internet users
  • Off Chain/Side Chain Block Chain Identity OIDC
  • W3C Verifiable Credentials Update, Decentralized Identifiers Comparison
  • ActivityPub
  • Microservices Security
  • Possible demo of movie rights stored and accessed on Sovrin platform
  • Decentrialized Identity, Amira 1.0.0, Lost Identity's Maria Sofia 1.0.0
  • The self-sovereign technology stack.
  • DevOps, docker
  • Enterprise IoT management Consent management
  • Listening
  • Testing related topics (automation, security, infrastructure)


What are you hoping to learn about or hear a presentation about at IIW?

  • DIF, Sovrin, DID Auth
  • Sovrin, Everynym
  • helping individuals take control of all their personal data stored in various corporate silos ... I own an HR company and want to basically turn all this on its head :)
  • Sovrin, Blockchain, Verified Identifies
  • Capabliities/Delegation
  • Latest developments with Sovrin and Indy.
  • From prior experience I know that by listening, and some osmosis, this crowd will lead me to better knowing about systems managing privacy and affecting intention.
  • Decentralized IdentifiersuPort
  • Identity as a ServicePrivacy and Policy Implications
  • I am hoping to learn about separate legitimate from illegitimate internet users
  • Block Chain OIDC
  • Open Standards for Biometrics, U2F
  • Blockchain
  • International identity approaches
  • Cooperation between UMA and decentralized identity (DID) standards.
  • Protocol implementations
  • What must be included in a post-Google Internet that respects anonymity, identity, privacy, and security, you own your own data, leave all the walled gardens and predatory surveillance behind.
  • What others are doing differently


What are the critical questions about user-centric identity and data you hope to discuss with peers at IIW?

  • WIll it replace KYC/AML processes on back-end?
  • Pseudonymous Identity
  • learn more about sovrin
  • How to build independent apps and ecosystems on top of verified identies
  • What is "Self-Sovereign Privacy?"
  • What may threaten individual leverage in maintaining their "freedom" of movement or choice regarding privacy?
  • What role do existing identity provider enterprises (banks, ISPs, telcos, etc.) have to play in a user-centric identity paradigm?
  • Interoperable identity solutions
  • How can we make it possible to revoke access to idenity information?How can we make interactions online safer?
  • Why is the internet not a safe environment, especially for businesses
  • BlockChain Privacy
  • How do we decentralized attributes without sharing them everywhere?
  • Biometrics for identity recovery.
  • Tokens that allow creation of virtual Amazon -- buy anything from anyone with a token, end role of Amazon as an intermediary taking a 65% toll.
  • -2fa-blockchain based authentication