SlideShare une entreprise Scribd logo
1  sur  41
Télécharger pour lire hors ligne
@evernym | www.evernym.com | November 2020
Open Source
& What It Means For
Self-Sovereign Identity
MODERATOR
Andy Tobin
Managing Director, Europe
PRESENTER
Richard Esplin
Director of Product
PRESENTER
James Monaghan
VP Product
On the agenda
Introduction
Open source culture
What this means for you
What this means for Evernym products
Getting started with open source and SSI
Q&A
Green Room: Networking and continued Q&A
Join us in two weeks for
our next product webinar
Tuesday, Dec 1 | 8am PT (same time block as this webinar)
We’ll cover:
• An overview of Connect.Me and our
Mobile SDK
• What's new in our Mobile SDK's General
Availability release and Connect.Me 1.4
• A sneak peek at our 2021 roadmap
Register at www.evernym.com/webinars
If you have questions….
Please write them in the Zoom Q&A, and we’ll
cover them after the presentation.
Please note, this webinar is being recorded
Open Source
Culture
FLOSS
Free / Libre Software
• Free as in Speech / Freedom.
• Sharing is a moral duty.
• Copyleft: hack copyright to enforce sharing.
Open Source
• Open is better engineering.
• With many eyes, all bugs are shallow.
• Scratch your own itch.
• Don’t reinvent the wheel.
• Collaboration is fun.
Open culture
● Maker movement
● Art and media
● Legal access
● Scientific data access
● Scientific hardware
● Bio-hacking
Open development
• Focus on building community.
• Communicate transparently.
• Products should be easy to adopt and
easy to contribute to.
• Public: source code, architecture,
documentation, tooling, roadmaps.
• Private: customer data.
TODO Group OSS
Code of Conduct
● Be friendly and patient.
● Be welcoming.
● Be considerate.
● Be respectful.
● Be careful in the words that
we choose.
● Try to understand why we
disagree.
The four freedoms
0. Run the program for any purpose.
1. Study how the program works.
2. Redistribute the program.
3. Improve the program, and
redistribute the improvements.
Open source
and SSI
The goals of Open Source and the mission
of Self-Sovereign Identity reinforce one
another.
● Decentralization
● User control
● Transparency in systems and algorithms
● Systems that are long lived and broadly
adopted
● Transportable information
● User rights
Related webinars
• SSI Meetup: Self Sovereign Identity and Open Source Software
• https://ssimeetup.org/self-sovereign-identity-ssi-open-source-richard-espli
n-webinar-16/
• Evernym: Open Source Product Strategy
• https://www.youtube.com/watch?v=Z43uDfEsVuk
What this means for you
Evernym works with lots of “you’s”
• Hyperledger Indy/Aries/Ursa
• Sovrin Foundation
• Trust over IP Foundation
• Verity users
• Mobile wallet users
• Evernym customers
• Evernym contributors
• Implementation partners
• Wider SSI community
○ DIF, IIW, RWOT
• Standards bodies
○ W3C
• Governments
• NGOs
• Cryptocurrency and blockchain
Secondary communitiesPrimary communities
Customer benefits
Customers are guaranteed:
● Vendor independence
● Vendor risk mitigation
● An improved negotiating position
● Compliance with policy
● An ancillary social benefit
And are likely to receive:
● A focus on support
● Faster adoption
● Increased security
● Innovation
● Transparency
● Interoperability
End user benefits
End users also benefit:
● Increased control over their
technology
● Can investigate and experiment
● Greater confidence in privacy and
security
● Faster adoption of SSI best practices
● Greater interoperability
● Greater data portability
Impactful decisions
The license1
2
3
The governance model
Standards
The license1
• Gift
• Apache
• Sharing with Rules
• GPL
• In-Between
• LGPL
• Time based
○ BSL
• All rights except . . .
○ CCL, SSPL
• Mixed open and closed
○ Elastic License
Source AvailableOpen Source
Bruce Perens, 2009
The license: Open business models1
Pure Play Source Available
Everything is open
source
Revenue comes
tangentially: support,
hosting, training
Source is available.
Development is public.
License is proprietary.
Open Core
Parts are open, parts
are closed.
Revenue comes from
upsell to proprietary
features.
The governance model2
No formal
governance
Vendor-
controlled
Most of GitHub
Be prepared to take
over.
Mongo, Elastic, JBoss
Focused on customer
needs, risk of lock-in.
Formal
community
Apache,
Hyperledger, Debian
Healthy project, hard
to influence.
The governance model2
Community governance Corporate governance
● Multiple copyright holders
● Anyone can merge
● Community consensus process
Pros:
● Broad adoption
Cons:
● Hard to achieve alignment
● Susceptible to “tragedy of the
commons” (lack of polish)
● Single copyright holder (CLA)
● Restricted merge rights
● Corporate vision
Pros:
● Customer focus
Cons:
● Often narrows use cases
● If you disagree, you have to
fork
Standards3
1. W3C DID Spec
https://w3c-ccg.github.io/did-spec/
2. W3C Verifiable Credentials
https://w3c.github.io/vc-data-model/
3. Agent to agent / DID Communications
https://trustoverip.org/blog/2020/10/19/trust-over-ip-foundation
-introduces-a-new-tool-for-interoperable-digital-trust/
What this means for
Evernym products
Evernym’s licensing goals
• Grow the ecosystem in which we sell.
• Drive adoption of best practices and
standards.
• Foster innovation by leveraging community
projects.
• Encourage 3rd party contributions to our
products.
• Gain brand recognition and community
marketing.
• Grow customer goodwill and loyalty.
• Be an on-ramp to paid offerings.
• Scale our business.
Evernym’s product
valueEvernym’s products combine the value of
• an open network of interoperable
credentials,
• and community-governed,
vendor-independent tools,
With
• easy to adopt solutions with advanced
capabilities designed around customer
needs,
• and support from the world’s experts in SSI.
We commit to:
We commit to:
1. Keeping customers free from vendor lock-in
We commit to:
1. Keeping customers free from vendor lock-in
2. Supporting open protocols and interoperability
We commit to:
1. Keeping customers free from vendor lock-in
2. Supporting open protocols and interoperability
3. Licensing the source code for all of our generally available products under a
permissive license within three years.
We commit to:
1. Keeping customers free from vendor lock-in
2. Supporting open protocols and interoperability
3. Licensing the source code for all of our generally available products under a
permissive license within three years.
Exceptions:
● Integrations with proprietary products.
● Infrastructure code.
● License enforcement code.
● Fixes to old code bases.
Additional commitments around
open development
• Collaborate with the broader community on foundational technologies.
• Be transparent about our policies and practices.
• Follow open development principles by hosting public source code, CI / CD, issue
tracking, documentation, and engaging with our user and developer communities.
• Exceptions will apply to proprietary integrations, customer data, niche use
cases, and security.
Licensing
Apache 2.0 License
• “Gift” style license, that allows reuse of
any kind.
• Used where we want broad adoption.
• Indy and Aries: Governed by the
community
• Verity SDK: Governed by Evernym
Licensing
Evernym Business Source License (EvBSL)
• Allows free usage of our commercial
products
• Code is publicly available and usable for any
purpose, within the following restrictions:
• No production use beyond 500 MAUs.
• Nor to provide commercial services to 3rd
parties.
• Non-production usage is always permitted.
• After 36 months from public access, each
commit will convert to the Apache 2.0
license.
Breakdown per product
Artifact Open License Governance Model
Verity (Server + Agency) Evernym BSL or Commercial Evernym
Verity SDK Apache 2.0 or Commercial Evernym
Connect.Me Evernym BSL or Commercial Evernym
Mobile SDK Evernym BSL or Commercial Evernym
Ev LibVCX Evernym BSL or Commercial Evernym
Indy, Aries, Ursa Apache 2.0 Community
Next steps in this
journey
DONE
• Verity SDK
• Verity
• MySQL Storage Plugin (part of EvLibVCX)
ON DECK
• Mobile SDK
• Connect.Me
• EvLibVCX
Improved contribution processes
• “Open source scaffolding” in each repo.
• Readme, License, Contributing, Security
• Improved distribution of support artifacts.
• Public CI / CD.
• Easy Contributor License Agreements.
• Public pull requests.
• Public issue tracker.
With special thanks to eSSIF-LAB
This effort is part of a project that has
received funding from the European
Union’s horizon 2020 research and
innovation program under grant
agreement No 871932 delivered
through our participation in the
eSSIF-LAB, which aims to advance the
broad adoption of self-sovereign
identity for the benefit of all.
Getting Started
Open Source vs SaaS
• Public repos.
• Self supported.
• You provide hosting.
• Great for learning the
internals.
• SaaS Verity.
• Evernym supported.
• Evernym hosts.
• Great for getting stuff
done.
Usage as
SaaS
Usage as Open Source /
Source Available
Next steps for you
• Review the documentation.
• Play with the Verity Sandbox.
• Check out the source code.
• PRs are welcome.
www.evernym.com/developers
Thanks for tuning in.
To register for upcoming webinars and ‘green room’ chats,
visit www.evernym.com/webinars/.
Connect with us via Twitter or Email
@evernym
info@evernym.com

Contenu connexe

Tendances

Blockchain With IoT - Top Blockchain IoT Use Cases
Blockchain With IoT - Top Blockchain IoT Use CasesBlockchain With IoT - Top Blockchain IoT Use Cases
Blockchain With IoT - Top Blockchain IoT Use Cases
101 Blockchains
 
Identity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic ProtocolIdentity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic Protocol
SSIMeetup
 
Blockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain CredentialsBlockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain Credentials
SSIMeetup
 
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemseIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
SSIMeetup
 
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloIntroducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
SSIMeetup
 
All you need to know about SSI for Corporates and IoT – Heather Vescent
All you need to know about SSI for Corporates and IoT – Heather VescentAll you need to know about SSI for Corporates and IoT – Heather Vescent
All you need to know about SSI for Corporates and IoT – Heather Vescent
Blockchain España
 

Tendances (20)

Meet Evernym's SSI Platform
Meet Evernym's SSI PlatformMeet Evernym's SSI Platform
Meet Evernym's SSI Platform
 
Dao - Mobiloitte
Dao - MobiloitteDao - Mobiloitte
Dao - Mobiloitte
 
An Expert Panel on Safe Credentials
An Expert Panel on Safe CredentialsAn Expert Panel on Safe Credentials
An Expert Panel on Safe Credentials
 
The Shift from Federated to Decentralized Identity
The Shift from Federated to Decentralized IdentityThe Shift from Federated to Decentralized Identity
The Shift from Federated to Decentralized Identity
 
Overview of Decentralized Identity
Overview of Decentralized IdentityOverview of Decentralized Identity
Overview of Decentralized Identity
 
Blockchain With IoT - Top Blockchain IoT Use Cases
Blockchain With IoT - Top Blockchain IoT Use CasesBlockchain With IoT - Top Blockchain IoT Use Cases
Blockchain With IoT - Top Blockchain IoT Use Cases
 
Identity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic ProtocolIdentity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic Protocol
 
Decentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep diveDecentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep dive
 
Blockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain CredentialsBlockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain Credentials
 
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
 
Introduction to Self Sovereign Identity
Introduction to Self Sovereign IdentityIntroduction to Self Sovereign Identity
Introduction to Self Sovereign Identity
 
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemseIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
 
Introduction to Self-Sovereign Identity
Introduction to Self-Sovereign IdentityIntroduction to Self-Sovereign Identity
Introduction to Self-Sovereign Identity
 
Streetcred: Improving the Developer Experience in SSI – Michael Boyd
Streetcred: Improving the Developer Experience in SSI – Michael BoydStreetcred: Improving the Developer Experience in SSI – Michael Boyd
Streetcred: Improving the Developer Experience in SSI – Michael Boyd
 
Polygon Presents "DeFi For All: Build DeFi For Mass Adoption"
Polygon Presents "DeFi For All: Build DeFi For Mass Adoption"Polygon Presents "DeFi For All: Build DeFi For Mass Adoption"
Polygon Presents "DeFi For All: Build DeFi For Mass Adoption"
 
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
 
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloIntroducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
 
Learn about the Trust Over IP (ToIP) stack
Learn about the Trust Over IP (ToIP) stackLearn about the Trust Over IP (ToIP) stack
Learn about the Trust Over IP (ToIP) stack
 
All you need to know about SSI for Corporates and IoT – Heather Vescent
All you need to know about SSI for Corporates and IoT – Heather VescentAll you need to know about SSI for Corporates and IoT – Heather Vescent
All you need to know about SSI for Corporates and IoT – Heather Vescent
 
Digital Credentials Enabling Mobility and Verification of Educational Achieve...
Digital Credentials Enabling Mobility and Verification of Educational Achieve...Digital Credentials Enabling Mobility and Verification of Educational Achieve...
Digital Credentials Enabling Mobility and Verification of Educational Achieve...
 

Similaire à Open Source & What It Means For Self-Sovereign Identity (SSI)

Best practices for using open source software in the enterprise
Best practices for using open source software in the enterpriseBest practices for using open source software in the enterprise
Best practices for using open source software in the enterprise
Marcel de Vries
 
Open source technology
Open source technologyOpen source technology
Open source technology
Rohit Kumar
 
Open soucre(cut shrt)
Open soucre(cut shrt)Open soucre(cut shrt)
Open soucre(cut shrt)
Shivani Rai
 
Speaker trung huynh opensource business model
Speaker trung huynh   opensource business modelSpeaker trung huynh   opensource business model
Speaker trung huynh opensource business model
AiTi Education
 

Similaire à Open Source & What It Means For Self-Sovereign Identity (SSI) (20)

Selecting an Open Source License and Business Model for Your Project to Have ...
Selecting an Open Source License and Business Model for Your Project to Have ...Selecting an Open Source License and Business Model for Your Project to Have ...
Selecting an Open Source License and Business Model for Your Project to Have ...
 
Best practices for using open source software in the enterprise
Best practices for using open source software in the enterpriseBest practices for using open source software in the enterprise
Best practices for using open source software in the enterprise
 
"Open Source licensing and software quality" by Monty Michael Widenius @ eLib...
"Open Source licensing and software quality" by Monty Michael Widenius @ eLib..."Open Source licensing and software quality" by Monty Michael Widenius @ eLib...
"Open Source licensing and software quality" by Monty Michael Widenius @ eLib...
 
Open Source All The Things
Open Source All The ThingsOpen Source All The Things
Open Source All The Things
 
[Workshop] Building an Integration Agile Digital Enterprise with Open Source ...
[Workshop] Building an Integration Agile Digital Enterprise with Open Source ...[Workshop] Building an Integration Agile Digital Enterprise with Open Source ...
[Workshop] Building an Integration Agile Digital Enterprise with Open Source ...
 
open_source_tools.pptx 4th sem bca......
open_source_tools.pptx 4th sem bca......open_source_tools.pptx 4th sem bca......
open_source_tools.pptx 4th sem bca......
 
Intro to open source - 101 presentation
Intro to open source - 101 presentationIntro to open source - 101 presentation
Intro to open source - 101 presentation
 
Open source in India
Open source in IndiaOpen source in India
Open source in India
 
OSS has taken over the enterprise: The top five OSS trends of 2015
OSS has taken over the enterprise: The top five OSS trends of 2015OSS has taken over the enterprise: The top five OSS trends of 2015
OSS has taken over the enterprise: The top five OSS trends of 2015
 
Open source technology
Open source technologyOpen source technology
Open source technology
 
Breaking Free from Proprietary Gravitational Pull
Breaking Free from Proprietary Gravitational PullBreaking Free from Proprietary Gravitational Pull
Breaking Free from Proprietary Gravitational Pull
 
Tracing the evolution - Open source & Embedded systems
Tracing the evolution - Open source & Embedded systemsTracing the evolution - Open source & Embedded systems
Tracing the evolution - Open source & Embedded systems
 
Managing the Software Supply Chain: Policies that Promote Innovation While Op...
Managing the Software Supply Chain: Policies that Promote Innovation While Op...Managing the Software Supply Chain: Policies that Promote Innovation While Op...
Managing the Software Supply Chain: Policies that Promote Innovation While Op...
 
Open source
Open sourceOpen source
Open source
 
Open Source Developer by Binary Semantics
Open Source Developer by Binary SemanticsOpen Source Developer by Binary Semantics
Open Source Developer by Binary Semantics
 
Open soucre(cut shrt)
Open soucre(cut shrt)Open soucre(cut shrt)
Open soucre(cut shrt)
 
Speaker trung huynh opensource business model
Speaker trung huynh   opensource business modelSpeaker trung huynh   opensource business model
Speaker trung huynh opensource business model
 
Open Source vs Proprietary
Open Source vs ProprietaryOpen Source vs Proprietary
Open Source vs Proprietary
 
Leverage the power of Open Source in your company
Leverage the power of Open Source in your company Leverage the power of Open Source in your company
Leverage the power of Open Source in your company
 
Open Source evaluation: A comprehensive guide on what you are using
Open Source evaluation: A comprehensive guide on what you are usingOpen Source evaluation: A comprehensive guide on what you are using
Open Source evaluation: A comprehensive guide on what you are using
 

Plus de Evernym

Plus de Evernym (12)

What makes a successful SSI strategy?
What makes a successful SSI strategy?What makes a successful SSI strategy?
What makes a successful SSI strategy?
 
Verifiable Credentials for Travel & Hospitality
Verifiable Credentials for Travel & HospitalityVerifiable Credentials for Travel & Hospitality
Verifiable Credentials for Travel & Hospitality
 
SSI & Healthcare: Lessons from the NHS
SSI & Healthcare: Lessons from the NHSSSI & Healthcare: Lessons from the NHS
SSI & Healthcare: Lessons from the NHS
 
IATA Travel Pass - Evernym Webinar
IATA Travel Pass - Evernym WebinarIATA Travel Pass - Evernym Webinar
IATA Travel Pass - Evernym Webinar
 
Meet Connect.Me & Evernym's Mobile SDK
Meet Connect.Me & Evernym's Mobile SDKMeet Connect.Me & Evernym's Mobile SDK
Meet Connect.Me & Evernym's Mobile SDK
 
The Future of Digital Wallets - Evernym Webinar
The Future of Digital Wallets - Evernym WebinarThe Future of Digital Wallets - Evernym Webinar
The Future of Digital Wallets - Evernym Webinar
 
Meet Verity, Evernym's Digital Credential Platform
Meet Verity, Evernym's Digital Credential PlatformMeet Verity, Evernym's Digital Credential Platform
Meet Verity, Evernym's Digital Credential Platform
 
Enhancing Learner Mobility with SSI & Portable Digital Credentials
Enhancing Learner Mobility with SSI & Portable Digital CredentialsEnhancing Learner Mobility with SSI & Portable Digital Credentials
Enhancing Learner Mobility with SSI & Portable Digital Credentials
 
Trust over IP (ToIP)
Trust over IP (ToIP)Trust over IP (ToIP)
Trust over IP (ToIP)
 
SSI & Digital Guardianship Webinar
SSI & Digital Guardianship WebinarSSI & Digital Guardianship Webinar
SSI & Digital Guardianship Webinar
 
Digital Guardianship in Self-Sovereign Identity
Digital Guardianship in Self-Sovereign IdentityDigital Guardianship in Self-Sovereign Identity
Digital Guardianship in Self-Sovereign Identity
 
What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Dernier (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Open Source & What It Means For Self-Sovereign Identity (SSI)

  • 1. @evernym | www.evernym.com | November 2020 Open Source & What It Means For Self-Sovereign Identity
  • 2. MODERATOR Andy Tobin Managing Director, Europe PRESENTER Richard Esplin Director of Product PRESENTER James Monaghan VP Product
  • 3. On the agenda Introduction Open source culture What this means for you What this means for Evernym products Getting started with open source and SSI Q&A Green Room: Networking and continued Q&A
  • 4. Join us in two weeks for our next product webinar Tuesday, Dec 1 | 8am PT (same time block as this webinar) We’ll cover: • An overview of Connect.Me and our Mobile SDK • What's new in our Mobile SDK's General Availability release and Connect.Me 1.4 • A sneak peek at our 2021 roadmap Register at www.evernym.com/webinars
  • 5. If you have questions…. Please write them in the Zoom Q&A, and we’ll cover them after the presentation. Please note, this webinar is being recorded
  • 7. FLOSS Free / Libre Software • Free as in Speech / Freedom. • Sharing is a moral duty. • Copyleft: hack copyright to enforce sharing. Open Source • Open is better engineering. • With many eyes, all bugs are shallow. • Scratch your own itch. • Don’t reinvent the wheel. • Collaboration is fun.
  • 8. Open culture ● Maker movement ● Art and media ● Legal access ● Scientific data access ● Scientific hardware ● Bio-hacking
  • 9. Open development • Focus on building community. • Communicate transparently. • Products should be easy to adopt and easy to contribute to. • Public: source code, architecture, documentation, tooling, roadmaps. • Private: customer data. TODO Group OSS Code of Conduct ● Be friendly and patient. ● Be welcoming. ● Be considerate. ● Be respectful. ● Be careful in the words that we choose. ● Try to understand why we disagree.
  • 10. The four freedoms 0. Run the program for any purpose. 1. Study how the program works. 2. Redistribute the program. 3. Improve the program, and redistribute the improvements.
  • 11. Open source and SSI The goals of Open Source and the mission of Self-Sovereign Identity reinforce one another. ● Decentralization ● User control ● Transparency in systems and algorithms ● Systems that are long lived and broadly adopted ● Transportable information ● User rights
  • 12. Related webinars • SSI Meetup: Self Sovereign Identity and Open Source Software • https://ssimeetup.org/self-sovereign-identity-ssi-open-source-richard-espli n-webinar-16/ • Evernym: Open Source Product Strategy • https://www.youtube.com/watch?v=Z43uDfEsVuk
  • 13. What this means for you
  • 14. Evernym works with lots of “you’s” • Hyperledger Indy/Aries/Ursa • Sovrin Foundation • Trust over IP Foundation • Verity users • Mobile wallet users • Evernym customers • Evernym contributors • Implementation partners • Wider SSI community ○ DIF, IIW, RWOT • Standards bodies ○ W3C • Governments • NGOs • Cryptocurrency and blockchain Secondary communitiesPrimary communities
  • 15. Customer benefits Customers are guaranteed: ● Vendor independence ● Vendor risk mitigation ● An improved negotiating position ● Compliance with policy ● An ancillary social benefit And are likely to receive: ● A focus on support ● Faster adoption ● Increased security ● Innovation ● Transparency ● Interoperability
  • 16. End user benefits End users also benefit: ● Increased control over their technology ● Can investigate and experiment ● Greater confidence in privacy and security ● Faster adoption of SSI best practices ● Greater interoperability ● Greater data portability
  • 17. Impactful decisions The license1 2 3 The governance model Standards
  • 18. The license1 • Gift • Apache • Sharing with Rules • GPL • In-Between • LGPL • Time based ○ BSL • All rights except . . . ○ CCL, SSPL • Mixed open and closed ○ Elastic License Source AvailableOpen Source Bruce Perens, 2009
  • 19. The license: Open business models1 Pure Play Source Available Everything is open source Revenue comes tangentially: support, hosting, training Source is available. Development is public. License is proprietary. Open Core Parts are open, parts are closed. Revenue comes from upsell to proprietary features.
  • 20. The governance model2 No formal governance Vendor- controlled Most of GitHub Be prepared to take over. Mongo, Elastic, JBoss Focused on customer needs, risk of lock-in. Formal community Apache, Hyperledger, Debian Healthy project, hard to influence.
  • 21. The governance model2 Community governance Corporate governance ● Multiple copyright holders ● Anyone can merge ● Community consensus process Pros: ● Broad adoption Cons: ● Hard to achieve alignment ● Susceptible to “tragedy of the commons” (lack of polish) ● Single copyright holder (CLA) ● Restricted merge rights ● Corporate vision Pros: ● Customer focus Cons: ● Often narrows use cases ● If you disagree, you have to fork
  • 22. Standards3 1. W3C DID Spec https://w3c-ccg.github.io/did-spec/ 2. W3C Verifiable Credentials https://w3c.github.io/vc-data-model/ 3. Agent to agent / DID Communications https://trustoverip.org/blog/2020/10/19/trust-over-ip-foundation -introduces-a-new-tool-for-interoperable-digital-trust/
  • 23. What this means for Evernym products
  • 24. Evernym’s licensing goals • Grow the ecosystem in which we sell. • Drive adoption of best practices and standards. • Foster innovation by leveraging community projects. • Encourage 3rd party contributions to our products. • Gain brand recognition and community marketing. • Grow customer goodwill and loyalty. • Be an on-ramp to paid offerings. • Scale our business.
  • 25. Evernym’s product valueEvernym’s products combine the value of • an open network of interoperable credentials, • and community-governed, vendor-independent tools, With • easy to adopt solutions with advanced capabilities designed around customer needs, • and support from the world’s experts in SSI.
  • 27. We commit to: 1. Keeping customers free from vendor lock-in
  • 28. We commit to: 1. Keeping customers free from vendor lock-in 2. Supporting open protocols and interoperability
  • 29. We commit to: 1. Keeping customers free from vendor lock-in 2. Supporting open protocols and interoperability 3. Licensing the source code for all of our generally available products under a permissive license within three years.
  • 30. We commit to: 1. Keeping customers free from vendor lock-in 2. Supporting open protocols and interoperability 3. Licensing the source code for all of our generally available products under a permissive license within three years. Exceptions: ● Integrations with proprietary products. ● Infrastructure code. ● License enforcement code. ● Fixes to old code bases.
  • 31. Additional commitments around open development • Collaborate with the broader community on foundational technologies. • Be transparent about our policies and practices. • Follow open development principles by hosting public source code, CI / CD, issue tracking, documentation, and engaging with our user and developer communities. • Exceptions will apply to proprietary integrations, customer data, niche use cases, and security.
  • 32. Licensing Apache 2.0 License • “Gift” style license, that allows reuse of any kind. • Used where we want broad adoption. • Indy and Aries: Governed by the community • Verity SDK: Governed by Evernym
  • 33. Licensing Evernym Business Source License (EvBSL) • Allows free usage of our commercial products • Code is publicly available and usable for any purpose, within the following restrictions: • No production use beyond 500 MAUs. • Nor to provide commercial services to 3rd parties. • Non-production usage is always permitted. • After 36 months from public access, each commit will convert to the Apache 2.0 license.
  • 34. Breakdown per product Artifact Open License Governance Model Verity (Server + Agency) Evernym BSL or Commercial Evernym Verity SDK Apache 2.0 or Commercial Evernym Connect.Me Evernym BSL or Commercial Evernym Mobile SDK Evernym BSL or Commercial Evernym Ev LibVCX Evernym BSL or Commercial Evernym Indy, Aries, Ursa Apache 2.0 Community
  • 35. Next steps in this journey DONE • Verity SDK • Verity • MySQL Storage Plugin (part of EvLibVCX) ON DECK • Mobile SDK • Connect.Me • EvLibVCX
  • 36. Improved contribution processes • “Open source scaffolding” in each repo. • Readme, License, Contributing, Security • Improved distribution of support artifacts. • Public CI / CD. • Easy Contributor License Agreements. • Public pull requests. • Public issue tracker.
  • 37. With special thanks to eSSIF-LAB This effort is part of a project that has received funding from the European Union’s horizon 2020 research and innovation program under grant agreement No 871932 delivered through our participation in the eSSIF-LAB, which aims to advance the broad adoption of self-sovereign identity for the benefit of all.
  • 39. Open Source vs SaaS • Public repos. • Self supported. • You provide hosting. • Great for learning the internals. • SaaS Verity. • Evernym supported. • Evernym hosts. • Great for getting stuff done. Usage as SaaS Usage as Open Source / Source Available
  • 40. Next steps for you • Review the documentation. • Play with the Verity Sandbox. • Check out the source code. • PRs are welcome. www.evernym.com/developers
  • 41. Thanks for tuning in. To register for upcoming webinars and ‘green room’ chats, visit www.evernym.com/webinars/. Connect with us via Twitter or Email @evernym info@evernym.com