This is a talk I was asked to give at the What is Universe? at the University of Oregon, (on their Portland Campus). I cover this history of the Internet Identity Workshop and talk about its core nature as a torus / bowl a feminine form and how this has resulted in the innovation of Self-Sovereign Identity
My Identiverse: The Evolution of Digital Identity and Openness
1. Plenary #3: Digital Identity and Embodied Practice
What is Universe?
University of Oregon, Portland
April 19, 2018
My Identiverse:
The Evolution of Digital Identity and Openness
Kaliya “Identity Woman” Young
6. Protocol is a universalism achieved
through negotiation, meaning that in the
future protocol can and will be different.
From Alexander Gallway’s book Protocol
7. The goal of protocol is totality. It must
accept everything, not matter what source,
sender, or destination. It consumes
diversity, aiming instead for university.
From Alexander Gallway’s book Protocol
8. Protocol’s virtues include robustness,
contingency, inter-operability, flexibility,
heterogeneity, an pantheism.
From Alexander Gallway’s book Protocol
9. Protocol is a system of distributed
management that facilitates peer-to-peer
relationships between autonomous
entities.
From Alexander Gallway’s book Protocol
10. Protocol is a type of controlling logic that
operates largely outside institutional,
government and corporate power.
From Alexander Gallway’s book Protocol
12. Internet protocols allow for
inter-operation between computers.
From Alexander Gallway’s book Protocol
13. Protocol is a language that regulates flow,
directs netspace, codes relationships, and
connects life forms. It is etiquette for
autonomous agents.
From Alexander Gallway’s book Protocol
27. Long Time Ago in a Far Far away
Planetwork convened 50
Environmental Groups
at the Presidio in SF in1999
They asked how can we use the internet
to work together to solve
our environmentalcrises.
33. Underlying this report is the assumption that every individual ought
to have the right to control his or her own online identity. You should
be able to decide what information about yourself is collected as part
of your digital profile, and of that information, who has access to
different aspects of it. Certainly, you should be able to read the
complete contents of your own digital profile at any time. An online
identity should be maintained as a capability that gives the user many
forms of control. Without flexible access and control, trust in the
system of federated network identity will be minimal.
34. A digital profile is not treated [by corporations who host
them] as the formal extension of the person it represents.
But if this crucial data about you is not owned by you,
what right do you have to manage its use?
A civil society approach to persistent identity is a
cornerstone of the Augmented Social Network project.
82. CREEPY NSA (and others) SPYING
Rules for Lawful Intercept
IN THIS BIGYELLOW BOX
What did NSTIC focus on?
83. CREEPY NSA (and others) SPYING
Rules for Lawful Intercept
NORMATIVE RULES
BUSINESS PRACTICES
TECHNOLOGIES
FOR EVERY DAY LIFE
Business - Business
Business - Consumer
Business - Government
Citizen/Person - Gov
96. Decentralized IDentifier - DID
did:sov:3k9dg356wdcj5gf2k9bw8kfg7a
Method
Scheme
Method-Specific Identifier
97. Decentralized IDentifier - DID
DID Document
1) DID (self-describing)
2) List of public keys (For the owner)
3) List of controlling DIDs (for key recovery)
4) List of service endpoints (for interaction)
5) Timestamps (for audit history)
6) Signature (for integrity)
108. Sovrin Verifiable Claims Ecosystem
HolderIssuer Verifier
Issues
Claim
Presents
Claim
Decentralized Identifiers (DIDs)
Public Blockchain or other Decentralized Network
Signs
Claim
Countersign
s Claim
Verifies
Signatures
Wallet
Pairwise
Unique
DID
Pairwise
Unique
DID
109. Sovrin Verifiable Claims Ecosystem
HolderIssuer Verifier
Issues
Claim
Presents
Claim
Decentralized Identifiers (DIDs)
Public Blockchain or other Decentralized Network
Signs
Claim
Countersign
s Claim
Verifies
Signatures
Wallet
Zero
Know-
ledge
Claim
Zero
Know-
ledge
Proof
Does not reveal pairwise
unique DID of Holder with
Issuer
Supports selective
disclosure
121. Protocol is a type of controlling logic that
operates largely outside institutional,
government and corporate power.
From Alexander Gallway’s book Protocol
122. The goal of protocol is totality. It must
accept everything, not matter what source,
sender, or destination. It consumes
diversity, aiming instead for university.
From Alexander Gallway’s book Protocol
123. Protocol is a universalism achieved
through negotiation, meaning that in the
future protocol can and will be different.
From Alexander Gallway’s book Protocol
124. It is essential that we change the culture around
how technology is built now:
• to put humanness first,
• to center communities that have been
marginalized in its creation to date
• to design with awareness of threat models
that have often been ignored until it’s too late.