Sovereign Technology
From IIW
Sovereign Technology
Tuesday 1J Convener: Adrian Gropper
Notes-taker(s): Adrian Gropper
Tags for the session - technology discussed/ideas considered:
Discussion notes, key understandings, outstanding questions, observations, and, if appropriate to this discussion: action items, next steps:
Sovereign Technology (e.g.: has no privacy policy)
Components
- Policy Assertions (e.g.: DNT)
- Authentication (e.g.: FIDO)
- Longitudinal Notification Endpoint (e.g.: email address)
- Non-repudiable Link (e.g.: biometric )
- White-List of IDPs (for Requesting Party claims)
- Backup and Recovery (e.g.: m of n)
- Delegation (e.g. parent of a minor)
- Competence tests (e.g.: partial delegation to a minor)
Next step: Associate protocols with each of the 8 components.