IIW 30 Proposed Topics

From IIW

Register here for IIW 30: https://iiw30.eventbrite.com

What topics are you planning to present about or lead a discussion about at this IIW?

  • open standards
  • PIMS adoption research; mapping personal information economy.
  • DIDs, DID Resolution
  • identity inoculation
  • Physician identity
  • deepfakes and content identity
  • SSI-based secure messaging
  • End-to-End Encrypted Messaging
  • Orchestrated gossip; cryptographic identification techniques and use cases
  • Habits and development of new habit loops
  • recent updates from Jolocom
  • Guardianship, delegation/mandates
  • biometrics
  • Self-sovereign identity in an enterprise and organizational wallets
  • SSI
  • Consumer Products & VCs Connecting legacy identifier systems with DIDs/VC
  • Self-Sovereign Identity
  • Dependent wallet
  • Privacy Engineering MyData Global Information Sharing Agreements
  • SSI Transitive Trust Re-decentralization
  • Using SSI for communications & customer service
  • Liveness Detection & Face Authentication
  • Decentralized identity, digital capabilities
  • "the authenticated net democracy tech designed for intrinsic trust"
  • Aries Agents and DIDComm-based interoperability around production use cases.
  • SSI, Aries, Indy
  • Possibly SSI and higher Ed
  • "Enterprise Identity and Access Management with SSI Promoting and establishing Sovrin in Europe"
  • Cloud Identity Wallets, SSI
  • Decentralized naming systems that prevent both impersonation and censorship.
  • Guardianship within Self-Sovereign Identity - DDE (Decentralized Data Economy) - Contextual Privacy-by-Design
  • "Bloom's VCs that combine JSONLD and Schema.org for storing data.
  • Bloom's BloomIQ VC aggredation"
  • Shared relationships using blockchain technology. Wearable identity devices.
  • Blockchain for Relationship sharing and Identity Management
  • "The Human Colossus Foundation Decentralized Nature of Identity Identity vs dataIdentity in of grid/critical situations
  • OpenID Federation


What are you hoping to learn about or hear a presentation about at IIW?

  • Everything!
  • New advancements
  • progress in identity tech
  • DIDComm, Verifiable Credentials, Aries
  • SSI use cases, technology advancements, interoperability between technologies, demos, etc. Sovrin and Hyperledger technologies
  • Verifiable credentials
  • How to be more involved in the growing tech communities and contribute to building a greater understanding for all around the topic "human"
  • DIDComms work and other community standardization work
  • More about digital identity and the technology behind it
  • blockchain interop
  • Self-Sovereign Identity and Internet of Things
  • Different approaches to enrollment and genesis
  • DID
  • Trust Network - actors and roles
  • Very interested in Sidetrees protocol - Interested in Presentation Request standards being carried out by the Claims and Credentials working group in the DIF - Very interested in zero-knowledge-proof technology, and how it can be applied to Verifiable Credentials in an interoperable way
  • Use cases that are being monetized Implementation/specifications that can be built upon today Considerations for future use cases & implementations
  • DIDs, VCs, EDVs etc.
  • Organizational wallets for self-sovereign identity
  • Trust Over IP, further development of the SSI protocols
  • Advances in SSI
  • State of the Union on DIDs and SSI
  • self-sovereign identity
  • More about Binding Credentials and Governance Certification Methods
  • New DID Methods
  • General interoperability and use cases related to improving conditions for marginalized communities.
  • "DID-Auth Passwordless / WebAuthn"
  • Exchange ideas and getting feedback from peers
  • SSI topics, WebAuthN, data privacy, key recovery, verifiable credential schema collaboration, and all the other interesting stuff :-)
  • Digital Identity architecture for a large enterprise in a multi-cloud environment.
  • "Promising SSI solutions and use cases Trust over IP Stack Hyperledger Indy ""competition"""
  • Access control in ecosystem implementation
  • Status Quo on SSI, adoption across industries
  • - Guardianship vs. Delegation - ToIP stack, use case and implementation status"
  • I want to lean about VC anchoring and VC anchor batching. I want to continue to learn about sidetree and element DID methods.
  • More insights about what identity is.
  • Interidentity management
  • "Identity in of grid/critical situations Identity vs data Identity in IoT"


What are the critical questions about user-centric identity and data you hope to discuss with peers at IIW?

  • immutability vs. right to be forgotten (or right to change identity), techno and non-techno solutions protecting analog identity
  • How to make to TRULY self sovereign (ie interoperable and portable)
  • integrations with IOT etc
  • Interoperability between SSI technology implementations.
  • where do others think we are headed in the current climate
  • Practical barriers to bootstrapping / getting critical mass for self-sovereign identity; security challenges with SSI (e.g., with recovery and delegation)
  • How can we prevent abuse of a vulnerable person with SSI?
  • How to realize identification and ownership of Internet of Things devices? - How to enable personal clouds?
  • Delegation of authority in hierarchical organizations
  • Cross system validation and transportability
  • Standardized format for Zero Knowledge Proofs and Verifiable Credentials Standards around requesting Verifiable Presentations / Selective Disclosures
  • How the privacy/crypto provisions and ML/agent-intelligence can safely be layered on top of end-user control+benefit
  • Data privacy
  • presenting organizational wallets and embedded credentials
  • The SSI ecosystem in industry and government.
  • The impact of DSARs on IAM systems
  • Binding Credentials using Biometrics, ways to ensure 1 User - 1 Account
  • Human dignity and basic human decency in a digital age
  • user friendly private key management and use cases
  • How to build on the momentum in the user-centric community to transition to uses outside of that community.
  • What’s the rationale for UCI in the enterprise?
  • "Regulatory vetting of SSI Interoperability"
  • Who controls your ability to use your name?
  • Preserving SSI essentials in real world applications. Interoperability of different decentralized identity solutions
  • Private key management
  • Sharing credentials or hierarchy of credentials
  • How to bridge current identity solutions towards decentralized?
  • use of biometrics in SSI