IIW 29 Session Notes

From IIW
Jump to: navigation, search

Tuesday Oct 1, 2019

Session 1

11:00 - 12:00

1A/Hyperledger Aries Project Status + Intro

1B/Introduction to OAuth2 (a 101 Session)

1F/Me2B Relationship Management/Tech Archite

1J/DID + Trusted Hardware Agents! (yubico,hsm,enclave)

1L/Link Secret FUD and other VC Fraud Learnings

Session 2

12:00 - 1:00

2A/Hyperledger Aries Biometric Service Provider RFC 231

2B/Into to Open ID Connect (a 101 Session)

2C/What Does a Sustainable SSI Business Look Like? The Business of Self-Sovereign ID

2F/The DID SPEC is Perfect! Change my mind.

2G/5G, IOT, DLT, ML, and Other Buzzwords

2H/Machine Identities

2I/Selective Disclosure (w/o ZKP)

2J/Deepfakes: Tools + Rules to Save the Open Internet. What? How? Why?

2L/Open ID Connect 4 Indy Assurance

2M/Signln.Org What is it?

Session 3

2:00 - 3:00

3A/Beyond Bearer Tokens

3B/User Manage Access (UMA – a 101 Session)

3C/Seed Quest 3D Game Mnemonic Cryptographic Seed Recovery

3D/Identity CoOp

3E/Spirituality, Abundance, Mindset, Personal Identity, Role in Community

3F/Expanding Language… Digital HARMS Dictionary

3G/HYBRID Self – Sovereign Identity

3J/DIDComm Encryption Envelope Discussion

3L/Adam from ID @ Equifax: How can I help? What should I do? AAAAA!

3M/Open ID Connect Federation BoF

Session 4

3:00 - 4:00

4A/Calling All Actors! Help is shoot a demo on Guardianship with SSI in a Refugee Camp

4B/Introduction to WebAuthn /FIDO 2

4C/A Guide to Hyperledger Aries – Cloudagent Python architecture and implementation

4D/Cors On OAuth Token Endpoint NOT A BCP

4E/Job Shop

4F/DID Resolution

4H/Well-Known DID-Configuration – Connecting DID’s to Domains with an Emerging Standard

4I/Workday Credential Schemas (No LD)

4L/Truth or Dare Verifiable Credential Disclosure Patterns and Commitments

Session 5

4:00 - 5:00

5A/KERI: 1 Universal DKMI Root(s) of Trust Decentralized Systems Primitires & DKMI Last Mile of Trust

5B/SSI 101 (Self Sovereign Identity) (a 101 session)

5F/A Protocol for Decentralization – How Many Data Brokers Will We Need

5G/Online Access Refresh Tokens (2.0) & OAuth Browser (BCP)

5H/DIDs For Everyday People

5J/Secure Data Storage (The Hub HVBUB)

5L/Organizational Wallet?

5M/Learn Startup For SSI: How To Turn Your SSI Idea Into A Viable Business

Wednesday Oct 2, 2019

Session 6

9:30 - 10:30

6A/Verifiable Credential Based Authentication over OpenID Connect

6B/Identity in Sierra Leone – Ask us Anything

6C/Decentralized UX: Designing Around Decentralized Identities

6F/”Trust in Numbers” Ethical (and practical) Approach to Identity – Driven AI/Machine Learning

6H/Identity Standards: The Soap Opera (catch up on previous episodes + review major plot points

6I/Sovrin 101: Permissions, Codes Bases, Value TXfer, Issuing & Edge Agents

6J/Open Source Business Models

Session 7

10:30 - 11:30

7A/OAuth Pushed Authorization Requests

7B/Delegated Credentials = Guardians, Controllers, and Delegates with Any W3C Credential Type

7C/Aries Toolbox Demo + Feedback (tools to work with agents)

7F/@Me2B #SSI #VRM #IIW #Identity

7H/Identity for All – Refugees, Human Trafficking, Women, & Marginalized People = Tech Meets Real Life Experience & The Humans that DID + SSI Can Help Most, How & Why

7J/Gender Is Harder Than You Think

7L/What’s Going on With DID-Auth? & SSI + SIOP, OIDC DID Auth Demo

Session 8

11:30 - 12:30

8A/TXAuth (XYZ,RAR, JAR,JARM…)

8B/Issue A Verifiable Credential in 30min

8C/Problem of Provenance of Digital Content Roadmap to Solution

8F/Consent Receipts for Financial Services and more….

8G/Me2B Intro & Org Finder Wiki

8H/DOMI Digital Rental Passport Architecture & Data Workshop

8I/Freeclaims.org – Let’s Encrypt For Basic Verifiable Credentials

8J/DIDComm – Part 2

Session 9

2:30 - 3:30

9A/Highlights from 12 Months of Private Sector Research = Election Security, Supply Chain, Legal and IOT

9B/Proof-A-Palooza: Standardizing Presentation Request Language for Verifiable Credentials & VC’s in Application (Part 2)

9C/Privacy Chain Update

9F/Customer Commons – VRM MarketPlace FrameWork

9G/Financial-grade API & CIBA (Client Initiated Backchannel Authentication)

9H/Manifold: Identify and Manage All Your Things

9I/Mark of the Beast? Religion’s Impact on Identity

9J/Consent is Broken – Privacy Implications for SSI

9L/VC’s In The Supply Chain GSI

Session 10

3:30 - 4:30

10A/KERI: 2 Universal DKMI Events Witnesses Architecture

10B/Understanding and Implementing peer DID’s in 60 min or Less

10C/The Great Hub Hubbub

10D/Finish RWOT 6 Principles for Self-Sovereign Biometrics

10E/AMA w/Sovrin Exec Director

10F/Browser Changes (SameSite, ITP) Affecting Identity on the WEB

10G/A Machine Learning Perspective on Data About Me

10H/High Assurance OAuth/OIDC Profiles for Gov. use Cases

10I/Workshop – Universal URI For Deep Linking in All SSI Mobile APPS

10J/”I Am Spartacus” Privacy via Obfuscation for Vulnerable Populations

10L/The Trust Ove IP Stack – A Path to Global Interoperability for SSI and Verifiable Credentials

Thursday Oct 3, 2019

Session 11

9:30 - 10:30

11A/Are We Boiled Yet?

11B/Life Scope – Meet Your Digital Twin – Data Hub/DB/Wallet + Identity + Cred + Me2B

11G/Platform Architecture – Building the back ends and systems that support AS services. State? Scale? Price? Persistence?

11H/Aries Protocol Test Site

11J/Pico Agent in a Tab One Click to Identify?

Session 12

10:30 - 11:30

12A/Identity for All 2 – how can tech present at IIW help with digital identity for marginalized populations?

12B/XYZ & DID Deep Dive

12C/Seed Quest – Demo & Exploring Use Cases

12D/Verifiable Credentials for Mobile Skills Schemas & UX

12F/Me2B “Me” – side interoperability & integration (part 2)

12G/Retrofitting OpenID to Existing Apps BCP?

12H/DID:GIT: Where is it at?

12I/Life Scope.io Digital Self

Session 13

11:30 - 12:30

13A/Censorship Resistance and Permissioned Ledgers: Survivability Analysis

13F/ID4 Africa – Exploring Possibilities for how SSI Communities and Companies show up @ the event & surrounding weekends

13G/DeepFakes Part 3 – What Parts of the Identity Stack & Verifiable Credentials for Digital Provenance?

13H/Generic MFA Token Recovery – The good the bad and the ugly

Session 14

12:30 - 2:00

14A/CLAIMS Vis-à-vis Scopes in OAuth & Open ID

14E/Pico Agents for Communication (follow-up)

14F/Tracking for Good Pragmatic Privacy

14H/Product Roundtable – Bridging tech & business, connect and share challenges and resources

14J/Hush-A-Phone

14K/Self-Sovereign Human Rights Parallelism

Session 15

2:00 - 3:00

15A/Terminology – the Plan

15B/Card Against Identity

15F/Expanding Language = Systems / People = Osmosis & Opaqueness

15H/Sidetree did:ion + did:elem Roadmap + dev

15J/Building a Business Around Identity In Education (From a Colombian Perspective)