4B/ IIW 101 Session: Self Sovereign & Decentralized Identity

From IIW

Decentralized Identity and Self Sovereign Identity 101

Tuesday 4B

Convener: Chris Kelly (DIF) and Karyl Fowler (DIF, Transmute)

Notes-taker(s): Chris Kelly

Tags for the session - technology discussed/ideas considered:

Identity, IoT, Decentralized Identity, Self Sovereign Identity (SSI), Decentralize Identity Documents (DIDs), DID methods, Data Sovereignty, Governance, GDPR, Legally-ENabled Self-Sovereign Identity (LESS Identity), Trustless Identity, Toxic Data, DIF, Working Groups, Standards Track

Discussion notes, key understandings, outstanding questions, observations, and, if appropriate to this discussion: action items, next steps

Link to full PDF of presentation - Here

Includes 3 Appendices w links to further resources and orgs

An Identity is information on an entity used by computer systems to represent an external agent. That agent may be a person, organization, application, or device, or even a digital artwork (eg NFTs)

  1. SSI

    1. 2 components - tech and social/mental/infrastructure - ‘movement’

    2. Movement - communities, orgs like DIF, but also end users, companies, legal frameworks, states and the general public

    3. Tech - the apps, services and platforms that are the mechanical parts of the system Infrastructure decisions, and commercial decisions can shape user expectations and behaviours, but legal requirements, customer demand and economic considerations also dictate the path of implementation

  2. Current State

    1. ‘Less identity’

    2. ‘Trustless identity’

    3. Toxic data

    4. The concept of toxic data is any data on your systems, whether live or legacy systems, that you don’t really need to conduct your business and that is potentially increasing your risk surface.

  3. How it Works: The Tech

    1. Centralized ID - existing way

    2. Federated ID -existing way 2.0

      1. Still ends up consolidating data and power

Presents various problems

Potential solution: decentralized models, including blockchain

  1. Tech basis for SSI

  2. DIDs

  3. Plurality of DID methods

  4. VCs

  5. Triangle of trust

  6. Benefits of DIDs and VCs

  7. Example applications

Overview of the communities, how and where to get involved

Explanation of ideation > incubation > refinement > standardization timeline

Q&A Session