SlideShare une entreprise Scribd logo
1  sur  29
Télécharger pour lire hors ligne
How to avoid another identity tragedy with SSI?
Why Are We Here? - #Foremembrance on 27 March 2020
Christopher Allen — Decentralized Identity & Blockchain Architect,
Co-Chair W3C Credentials Community Group
CC BY-SA 4.0
1. Empower global SSI communities
2. Open to everyone interested in SSI
3. All content is shared with CC BY SA
Alex Preukschat @SSIMeetup @AlexPreukschat
Coordinating Node SSIMeetup.org
SSIMeetup objectives
SSIMeetup.orgssimeetup.org · CC BY-SA 4.0 International
3
Sunset 19:06 March 27th – A Moment of Silence
CC BY-SA 4.0
4
Christopher Allen | Executive Director | Blockchain Commons
▪ Co-Chair W3C Credentials CG
▪ Co-Inventor & Architect of
Decentralized Identifiers
▪ Author Design Principles of
Self-Sovereign Identity
▪ Co-Author SSL/TLS
▪ Former Principal Architect, Blockstream
▪ Former CTO Certicom
▪ Former CEO Consensus Development
▪ Former Faculty Pinchot.edu
Email: ChristopherA@LifeWithAlacrity.com
Twitter: @ChristopherA
https://www.linkedin.com/in/ChristopherA/
SSIMeetup.orgssimeetup.org · CC BY-SA 4.0 International
LESS Identity & Trustless Identity
Two Major Tracks:
LESS Identity
“Legally-Enabled Self-Sovereign”
Identity*
Key characteristics:
● Minimum Disclosure
● Full Control
● Necessary Proofs
● Legally-Enabled
5
Trustless Identity
Or more properly “Trust
Minimized” Identity
Key characteristics:
● Anonymity
● Web of Trust
● Censorship Resistance
● Defend Human Rights vs. Powerful
Actors (nation states, multi-national
corps, mafias, etc.)
* Originally coined by Tim Bouma (@trbouma) https://medium.com/@trbouma/less-identity-65f65d87f56b
CC BY-SA 4.0
LESS Identity
“I want my identity to be digital, good and better, but in
the end, I want my identity to be less than the real me.”
— Tim Bouma (@trbouma)
“LESS Identity is for higher trust environments with
real-world identity verification, trust frameworks, privacy
with accountability and government acceptance”
— Christopher Allen (@ChristopherA)
6
CC BY-SA 4.0
Trustless Identity
“Identity is local, insecure, and labor-intensive…
Identity-based access will exclude at least a third of
world's future adults”
— Nick Szabo (@NickSzabo4)
“1.1 billion people have no legal identity, including tens
of millions of stateless refugees.”
— The World Bank
7
CC BY-SA 4.0
Trustless Identity
“And so tyranny naturally arises out of democracy, and the
most aggravated form of tyranny and slavery out of the most
extreme form of liberty.”
— Plato, from the “The Republic” Book VIII
“Identity can be a double-edged sword — usable for both
beneficial and maleficent purposes.”
— Christopher Allen (@ChristopherA)
8
CC BY-SA 4.0
Trustless Identity
“We desire to balance the need for fairness,
accountability and support of the commons in civil
society against the need to prevent human rights abuses
and the right to be able to freely associate.
When these needs conflict, we err to preserve the
freedom and rights of the individual over the needs of the
group. Put another way, we believe in accountability for
the powerful, and privacy for everyone else.”
— Christopher Allen (@ChristopherA)
9
CC BY-SA 4.0
Why do I care about Self-Sovereign Identity?
Last January 26th was the
75th anniversary of the
Liberation of Auschwitz.
I attended a moving ceremony
last week in Amsterdam,
where the Netherlands Prime
Minister apologized.
10
https://www.bbc.com/news/world-europe-51258081
CC BY-SA 4.0
An Apology
“When authority became a
threat, our government agencies
failed as guardians of law and
security.
…Now that the last survivors are
still among us, I apologize today
on behalf of the government for
government action then.”
— Mark Rutte (@minpres), Netherlands Prime
Minister on 75th Anniversary of the Liberation of
Auschwitz
11
https://www.rijksoverheid.nl/documenten/toespraken/2020/01/26/toespraak-van-minister-president-mark-rutte-bij-de-nationale-auschwitzherdenking-amsterdam
CC BY-SA 4.0
What Went Wrong?
Remember, more Jews died as
a percentage of population in
the Netherlands than in
Germany, France and other
countries.
Part of this is because the
Nazis took over civil
administration.
They had the data!
12
“Netherlands, Belgium and France…
The percentage of Jews of the total
population did not differ very much
and was low in all three countries:
0.75% of the French and Belgian
population, and 1.5% of the Dutch
population. …
Three quarters of the Dutch Jews
were murdered…
both in terms of percentages and in
absolute numbers”
https://www.annefrank.org/en/anne-frank/go-in-depth/netherlands-greatest-number-jewish-victims-western-europe/
CC BY-SA 4.0
How did this happen?
In 1932 JL Lentz become the head
of the “National Inspectorate of
Population Registers” in the Dutch
civil service.
In the 1930s much of the world
was in the grip of The Great
Depression. The efficiency of the
Dutch civil service ensured all
citizens had access to basic
services, and was among the best
in Europe.
13
http://www.persoonsbewijzen.nl/passie/sites/index.php?mid=226952&kid=4302
CC BY-SA 4.0
It worked!
Lentz was given the task of promoting
more unity in the population registers
of the municipalities
By 1936, he help establish a decree
that every resident in the Netherlands
must have a personal identity card in
the civil archives, and that these
cards must all be controlled from a
single office in each region.
Lentz won a Royal Award for this.
14
http://www.persoonsbewijzen.nl/passie/sites/index.php?mid=226952&ki
d=4302
CC BY-SA 4.0
The Civil Archives
These centralized civil archives were
one of the first targets captured by the
Nazis, and were considered a valuable
asset.
Almost immediately after capitulation,
Lentz was asked by the Nazi’s to create
difficult to forge National Identity Card.
Lentz literally wrote the book on personal
identity and “proof of inclusion in the
population ledger” in 1940.
15
https://en.wikipedia.org/wiki/1943_bombing_of_the_Amsterdam_civil_registry_office
CC BY-SA 4.0
Forgery by the Resistance
“Resistance members soon started to forge
identification cards at a large scale…
However, forged documents could be easily
detected because they could be compared
against the records in the civil registries…
Some civil servants were willing to falsify
records in the civil registry so that they
would match up with forged identification
cards. Nevertheless, the civil registries
remained a potent weapon in the hands of
the Nazis to identify…the population who
were Jewish”
— Wikipedia on “Bombing of the Amsterdam Civil Registry”
16
https://en.wikipedia.org/wiki/1943_bombing_of_the_Amsterdam_civil_registry_office
1942 Biometric Facial Authentication
CC BY-SA 4.0
Archives Become Target of the Resistance
Despite the efforts by the Resistance to
create forgeries, these archives were
used by the Nazis to check forged
identity cards using “proof of inclusion
in the registry”, in particular those with
the J on them against the civil records.
The Dutch resistance tried destroy the
civil archives on 28 March 1943.
Unfortunately only 15% of the records
were destroyed.
17
https://en.wikipedia.org/wiki/1943_bombing_of_the_Amsterdam_civil_registry_office
After the Bombing
CC BY-SA 4.0
Meanwhile in France
https://en.wikipedia.org/wiki/The_Holocaust_in_France
Like in the Netherlands, the French
“Vichy” government also assisted in
Nazi deportation of Jews and other
“undesirables”.
However, in 1942, the Vichy government
refused to continue to arrest Jews on a
large scale and send them for
deportation. The Nazi’s did not control
the civil archives as they did in the
Netherlands.
18
CC BY-SA 4.0
75%
104,000
Deaths
Jewish Deaths
19
Netherlands
23%
74,000
Deaths
https://www.annefrank.org/en/anne-frank/go-in-depth/netherlands-greatest-number-jewish-victims-western-europe/
France
CC BY-SA 4.0
A living history
After January’s Holocaust Memorial, I had
lunch with a child of two survivors of
Auschwitz, who was also very moved by
the the event and the Prime Minister’s
apology.
His mother had been rounded up using
this data in a razzia after protests &
strikes by sympathetic Dutch citizens.
His father fled and was hidden by the
resistance in Utrecht but was ultimately
betrayed, probably by Nazi’s using civil
data as an early social network analysis.
20
CC BY-SA 4.0
A living history being lost
When I first spoke to the Dutch Identity
community about this history, older
members of the community thanked me
for sharing, as they felt embarrassed by it.
Younger members of the community also
thanked me, but told me that though they
were taught about the Holocaust in
school, that they never heard this
particular story before.
21
CC BY-SA 4.0
Lessons for Today
Despite the trust in government
today, we never know what may
happen tomorrow.
Centralized architectures and
immutable proofs can be used for
both good and evil.
22
Archives are now the Amsterdam Zoo Cafe
CC BY-SA 4.0
An opinion
I believe that this living history from survivors of WWII is why Dutch
citizens & Netherlands government are so supportive of the
human-rights privacy aspects of GDPR, and I believe part of the
reason why Self-Sovereign Identity is on the agenda here before
many other countries.
But Remembrance is still needed — it has been 75 years since the
Holocaust. The passing of the old generations and ‘fake news’ are
fading these memories.
23
https://www.nytimes.com/2016/07/18/world/europe/beyond-anne-frank-the-dutch-tell-their-full-holocaust-story.html
CC BY-SA 4.0
How can we be heroes?
“Where are the false
identification cards and fake
baptismal certificates in a world
of immutable records? How can
honest to goodness hero fake
an ID in a world where IDs can’t
be faked?”
— Thomas J Rush (@quickblocks)
24
https://thefederalist.com/2020/01/27/meet-the-man-who-saved-62000-people-during-the-holocaust/
Carl Lutz forged documents saving 62,000 Jews
CC BY-SA 4.0
Still a need for Trustless Solutions
Nationalism, tribalism and xenophobia are on the rise across the world.
● In Russia (Putin) Brazil (Bolsonaro), Great Britain (Johnson), Poland
(Kaczynski), Turkey (Erdogan), the USA (Trump), and more.
● Normalization of xenophobia encourages violation of human rights
● Academics, critics, journalists, Muslims, and transgender people have
all been targeted.
● Facial recognition is becoming adopted worldwide
● Covid-19 pandemic is causing nation-states to collect location info
● These new dangers require new ways to protect human rights
25
CC BY-SA 4.0
But we need both!
The Netherlands today is a “high-trust” society. The citizens trust the
government, and the government trusts the citizens. This is good!
We want this! But this is not true everywhere.
And LESS Identity is where the money is — Self-Sovereign Identity
has deep “trustless” roots, but almost all the major advancements in
the last two years have been in projects for commerce and are to be
recognized as legal by governments.
But as standards emerge, don’t lock out the “trustless” solutions —
they serve different needs not served by LESS Identity.
26
CC BY-SA 4.0
An Identity Community Foremembrance
I would like to see at Sunset in Amsterdam on 27 March
that the self-sovereign and larger identity community
have a moment of silence. A Forward Rememberance, a
#Foremberance.
To remember sculptor Gerrit van der Veen who forged
80,000 Jewish civil records, and author and painter
Willem Arondeus and 11 others who were found guilty of
attempting to destroy the civil archives and thus were
executed by the Nazis.
To salute all those who died to protect the defenceless in
WWII, who eased suffering in genocides past, and fought
discrimination and totalitarianism.
27
CC BY-SA 4.0
An Identity Community Foremembrance
To foremember about those today at the front.
The protesters in Hong Kong, those trying to
discover details about the Xinjiang “re-education”
concentration camps in western China, the
government of Gambia taking Burmese Aung San
Suu Kyi to court here in the The Hague to demand
protection for the Rohingya, to those protecting
immigrant children on the US Mexico border or
protecting us against Cambridge Analytica-like
attacks this years elections, and to all those
protecting minority communities such as gays,
transexuals, and more.
And to salute all those defending the vulnerable.
28
CC BY-SA 4.0
29
Christopher Allen | Executive Director | Blockchain Commons
▪ Co-Chair W3C Credentials CG
▪ Co-Inventor & Architect of
Decentralized Identifiers
▪ Author Design Principles of
Self-Sovereign Identity
▪ Co-Author SSL/TLS
▪ Former Principal Architect, Blockstream
▪ Former CTO Certicom
▪ Former CEO Consensus Development
▪ Former Faculty Pinchot.edu
Email: ChristopherA@LifeWithAlacrity.com
Twitter: @ChristopherA
https://www.linkedin.com/in/ChristopherA/
SSIMeetup.orgssimeetup.org · CC BY-SA 4.0 International

Contenu connexe

Tendances

Privacy applications on blockchain
Privacy applications on blockchainPrivacy applications on blockchain
Privacy applications on blockchainWilson Bright
 
Decentralisation and Distributed Innovation: FinTech, Bitcoin and ICO's
Decentralisation and Distributed Innovation: FinTech, Bitcoin and ICO'sDecentralisation and Distributed Innovation: FinTech, Bitcoin and ICO's
Decentralisation and Distributed Innovation: FinTech, Bitcoin and ICO'sDavid Lee Kuo Chuen 李国权
 
When Ostrom Meets Blockchain: Exploring the Potentials of Blockchain for Comm...
When Ostrom Meets Blockchain: Exploring the Potentials of Blockchain for Comm...When Ostrom Meets Blockchain: Exploring the Potentials of Blockchain for Comm...
When Ostrom Meets Blockchain: Exploring the Potentials of Blockchain for Comm...David Rozas
 
IIW-11 NSTIC Update
IIW-11 NSTIC UpdateIIW-11 NSTIC Update
IIW-11 NSTIC UpdateJayUnger
 
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...Kaliya "Identity Woman" Young
 
Introduction to Self-Sovereign Identity
Introduction to Self-Sovereign IdentityIntroduction to Self-Sovereign Identity
Introduction to Self-Sovereign IdentityKaryl Fowler
 
Streetcred: Improving the Developer Experience in SSI – Michael Boyd
Streetcred: Improving the Developer Experience in SSI – Michael BoydStreetcred: Improving the Developer Experience in SSI – Michael Boyd
Streetcred: Improving the Developer Experience in SSI – Michael BoydSSIMeetup
 
Blockchain and Government: the Malta experience
Blockchain and Government: the Malta experienceBlockchain and Government: the Malta experience
Blockchain and Government: the Malta experienceStrategyWorks
 
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloIntroducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloSSIMeetup
 
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...gallowayandcollens
 
Decentralized internet
Decentralized  internet Decentralized  internet
Decentralized internet abhinavkeesari
 
Potential of blockchain into industry 4.0
Potential of blockchain into industry 4.0  Potential of blockchain into industry 4.0
Potential of blockchain into industry 4.0 TechXpla
 
Identity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic ProtocolIdentity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic ProtocolSSIMeetup
 
Identity and Privacy: Past, Present, and Digital - Brenda K. Leong
Identity and Privacy: Past, Present, and Digital - Brenda K. LeongIdentity and Privacy: Past, Present, and Digital - Brenda K. Leong
Identity and Privacy: Past, Present, and Digital - Brenda K. LeongSSIMeetup
 
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemseIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemsSSIMeetup
 
Building a user owned internet
Building a user owned internetBuilding a user owned internet
Building a user owned internetWilson Bright
 
The Pan-Canadian Trust Framework (PCTF) for SSI
The Pan-Canadian Trust Framework (PCTF) for SSIThe Pan-Canadian Trust Framework (PCTF) for SSI
The Pan-Canadian Trust Framework (PCTF) for SSISSIMeetup
 
Digital Assets and Estate Planning
Digital Assets and Estate Planning Digital Assets and Estate Planning
Digital Assets and Estate Planning Hull & Hull LLP
 
Decentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep diveDecentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep diveSSIMeetup
 
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...SSIMeetup
 

Tendances (20)

Privacy applications on blockchain
Privacy applications on blockchainPrivacy applications on blockchain
Privacy applications on blockchain
 
Decentralisation and Distributed Innovation: FinTech, Bitcoin and ICO's
Decentralisation and Distributed Innovation: FinTech, Bitcoin and ICO'sDecentralisation and Distributed Innovation: FinTech, Bitcoin and ICO's
Decentralisation and Distributed Innovation: FinTech, Bitcoin and ICO's
 
When Ostrom Meets Blockchain: Exploring the Potentials of Blockchain for Comm...
When Ostrom Meets Blockchain: Exploring the Potentials of Blockchain for Comm...When Ostrom Meets Blockchain: Exploring the Potentials of Blockchain for Comm...
When Ostrom Meets Blockchain: Exploring the Potentials of Blockchain for Comm...
 
IIW-11 NSTIC Update
IIW-11 NSTIC UpdateIIW-11 NSTIC Update
IIW-11 NSTIC Update
 
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
 
Introduction to Self-Sovereign Identity
Introduction to Self-Sovereign IdentityIntroduction to Self-Sovereign Identity
Introduction to Self-Sovereign Identity
 
Streetcred: Improving the Developer Experience in SSI – Michael Boyd
Streetcred: Improving the Developer Experience in SSI – Michael BoydStreetcred: Improving the Developer Experience in SSI – Michael Boyd
Streetcred: Improving the Developer Experience in SSI – Michael Boyd
 
Blockchain and Government: the Malta experience
Blockchain and Government: the Malta experienceBlockchain and Government: the Malta experience
Blockchain and Government: the Malta experience
 
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloIntroducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
 
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
 
Decentralized internet
Decentralized  internet Decentralized  internet
Decentralized internet
 
Potential of blockchain into industry 4.0
Potential of blockchain into industry 4.0  Potential of blockchain into industry 4.0
Potential of blockchain into industry 4.0
 
Identity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic ProtocolIdentity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic Protocol
 
Identity and Privacy: Past, Present, and Digital - Brenda K. Leong
Identity and Privacy: Past, Present, and Digital - Brenda K. LeongIdentity and Privacy: Past, Present, and Digital - Brenda K. Leong
Identity and Privacy: Past, Present, and Digital - Brenda K. Leong
 
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemseIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
 
Building a user owned internet
Building a user owned internetBuilding a user owned internet
Building a user owned internet
 
The Pan-Canadian Trust Framework (PCTF) for SSI
The Pan-Canadian Trust Framework (PCTF) for SSIThe Pan-Canadian Trust Framework (PCTF) for SSI
The Pan-Canadian Trust Framework (PCTF) for SSI
 
Digital Assets and Estate Planning
Digital Assets and Estate Planning Digital Assets and Estate Planning
Digital Assets and Estate Planning
 
Decentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep diveDecentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep dive
 
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
 

Similaire à How to avoid another identity nightmare with SSI? Christopher Allen

Is socialism the answer socialism is defined as a way of organi
Is socialism the answer socialism is defined as a way of organiIs socialism the answer socialism is defined as a way of organi
Is socialism the answer socialism is defined as a way of organissuser337fce
 
Response one-HUM-08The exclusions of groups of people to the soc.docx
Response one-HUM-08The exclusions of groups of people to the soc.docxResponse one-HUM-08The exclusions of groups of people to the soc.docx
Response one-HUM-08The exclusions of groups of people to the soc.docxronak56
 
Osterweil-Introduction.pdf
Osterweil-Introduction.pdfOsterweil-Introduction.pdf
Osterweil-Introduction.pdfJazFeliz
 
Ap World History Dbq Essay Prompts
Ap World History Dbq Essay PromptsAp World History Dbq Essay Prompts
Ap World History Dbq Essay PromptsVanessa Marin
 
D i s t ri bu t e d B l ac k n e s sC R I T I C A L
D i s t ri bu t e d  B l ac k n e s sC R I T I C A L  D i s t ri bu t e d  B l ac k n e s sC R I T I C A L
D i s t ri bu t e d B l ac k n e s sC R I T I C A L OllieShoresna
 
Reflective Essay Example University Telegraph
Reflective Essay Example University  TelegraphReflective Essay Example University  Telegraph
Reflective Essay Example University TelegraphApril Dillard
 
Dissertation
DissertationDissertation
DissertationMax Prais
 
Identity Wars: the End of Human Society
Identity Wars: the End of Human SocietyIdentity Wars: the End of Human Society
Identity Wars: the End of Human SocietyChristian Heller
 
Public/Private Spaces: Pulling things together
Public/Private Spaces: Pulling things togetherPublic/Private Spaces: Pulling things together
Public/Private Spaces: Pulling things togetherMathias Klang
 
Critical Thinking IATEFL pl 2016
Critical Thinking IATEFL pl 2016Critical Thinking IATEFL pl 2016
Critical Thinking IATEFL pl 2016Marcin Stanowski
 
Good Essay Words Use. Online assignment writing service.
Good Essay Words Use. Online assignment writing service.Good Essay Words Use. Online assignment writing service.
Good Essay Words Use. Online assignment writing service.Vanessa Perkins
 

Similaire à How to avoid another identity nightmare with SSI? Christopher Allen (14)

Is socialism the answer socialism is defined as a way of organi
Is socialism the answer socialism is defined as a way of organiIs socialism the answer socialism is defined as a way of organi
Is socialism the answer socialism is defined as a way of organi
 
Ancient Greek History Essay Example
Ancient Greek History Essay ExampleAncient Greek History Essay Example
Ancient Greek History Essay Example
 
Response one-HUM-08The exclusions of groups of people to the soc.docx
Response one-HUM-08The exclusions of groups of people to the soc.docxResponse one-HUM-08The exclusions of groups of people to the soc.docx
Response one-HUM-08The exclusions of groups of people to the soc.docx
 
Osterweil-Introduction.pdf
Osterweil-Introduction.pdfOsterweil-Introduction.pdf
Osterweil-Introduction.pdf
 
Ap World History Dbq Essay Prompts
Ap World History Dbq Essay PromptsAp World History Dbq Essay Prompts
Ap World History Dbq Essay Prompts
 
D i s t ri bu t e d B l ac k n e s sC R I T I C A L
D i s t ri bu t e d  B l ac k n e s sC R I T I C A L  D i s t ri bu t e d  B l ac k n e s sC R I T I C A L
D i s t ri bu t e d B l ac k n e s sC R I T I C A L
 
SGN Symposium 2023
SGN Symposium 2023SGN Symposium 2023
SGN Symposium 2023
 
Reflective Essay Example University Telegraph
Reflective Essay Example University  TelegraphReflective Essay Example University  Telegraph
Reflective Essay Example University Telegraph
 
Dissertation
DissertationDissertation
Dissertation
 
4. BIS 490 Pranking Essay
4. BIS 490 Pranking Essay4. BIS 490 Pranking Essay
4. BIS 490 Pranking Essay
 
Identity Wars: the End of Human Society
Identity Wars: the End of Human SocietyIdentity Wars: the End of Human Society
Identity Wars: the End of Human Society
 
Public/Private Spaces: Pulling things together
Public/Private Spaces: Pulling things togetherPublic/Private Spaces: Pulling things together
Public/Private Spaces: Pulling things together
 
Critical Thinking IATEFL pl 2016
Critical Thinking IATEFL pl 2016Critical Thinking IATEFL pl 2016
Critical Thinking IATEFL pl 2016
 
Good Essay Words Use. Online assignment writing service.
Good Essay Words Use. Online assignment writing service.Good Essay Words Use. Online assignment writing service.
Good Essay Words Use. Online assignment writing service.
 

Plus de SSIMeetup

ZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSIZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSISSIMeetup
 
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...SSIMeetup
 
Value proposition of SSI tech providers - Self-Sovereign Identity
Value proposition of SSI tech providers - Self-Sovereign IdentityValue proposition of SSI tech providers - Self-Sovereign Identity
Value proposition of SSI tech providers - Self-Sovereign IdentitySSIMeetup
 
SSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley HughesSSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley HughesSSIMeetup
 
Web5 - Open to Build - Block-TBD
Web5 - Open to Build - Block-TBDWeb5 - Open to Build - Block-TBD
Web5 - Open to Build - Block-TBDSSIMeetup
 
Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...SSIMeetup
 
PharmaLedger: A Digital Trust Ecosystem for Healthcare
PharmaLedger: A Digital Trust Ecosystem for HealthcarePharmaLedger: A Digital Trust Ecosystem for Healthcare
PharmaLedger: A Digital Trust Ecosystem for HealthcareSSIMeetup
 
Cheqd: Making privacy-preserving digital credentials fun
Cheqd: Making privacy-preserving digital credentials funCheqd: Making privacy-preserving digital credentials fun
Cheqd: Making privacy-preserving digital credentials funSSIMeetup
 
PolygonID Zero-Knowledge Identity Web2 & Web3
PolygonID Zero-Knowledge Identity Web2 & Web3PolygonID Zero-Knowledge Identity Web2 & Web3
PolygonID Zero-Knowledge Identity Web2 & Web3SSIMeetup
 
Building SSI Products: A Guide for Product Managers
Building SSI Products: A Guide for Product ManagersBuilding SSI Products: A Guide for Product Managers
Building SSI Products: A Guide for Product ManagersSSIMeetup
 
Solving compliance for crypto businesses using Decentralized Identity – Pelle...
Solving compliance for crypto businesses using Decentralized Identity – Pelle...Solving compliance for crypto businesses using Decentralized Identity – Pelle...
Solving compliance for crypto businesses using Decentralized Identity – Pelle...SSIMeetup
 
The SSI Ecosystem in South Korea
The SSI Ecosystem in South KoreaThe SSI Ecosystem in South Korea
The SSI Ecosystem in South KoreaSSIMeetup
 
Learn about the Trust Over IP (ToIP) stack
Learn about the Trust Over IP (ToIP) stackLearn about the Trust Over IP (ToIP) stack
Learn about the Trust Over IP (ToIP) stackSSIMeetup
 
Explaining SSI to C-suite executives, and anyone else for that matter
Explaining SSI to C-suite executives, and anyone else for that matterExplaining SSI to C-suite executives, and anyone else for that matter
Explaining SSI to C-suite executives, and anyone else for that matterSSIMeetup
 
The 2nd Official W3C DID Working Group Meeting (The Netherlands)
The 2nd Official W3C DID Working Group Meeting (The Netherlands)The 2nd Official W3C DID Working Group Meeting (The Netherlands)
The 2nd Official W3C DID Working Group Meeting (The Netherlands)SSIMeetup
 
The Hyperledger Indy Public Blockchain Node
The Hyperledger Indy Public Blockchain NodeThe Hyperledger Indy Public Blockchain Node
The Hyperledger Indy Public Blockchain NodeSSIMeetup
 
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...SSIMeetup
 
Blockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain CredentialsBlockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain CredentialsSSIMeetup
 
Internet Identity Workshop #29 highlights with Drummond Reed
Internet Identity Workshop #29 highlights with Drummond ReedInternet Identity Workshop #29 highlights with Drummond Reed
Internet Identity Workshop #29 highlights with Drummond ReedSSIMeetup
 
Kiva protocol: building the credit bureau of the future using SSI
Kiva protocol: building the credit bureau of the future using SSIKiva protocol: building the credit bureau of the future using SSI
Kiva protocol: building the credit bureau of the future using SSISSIMeetup
 

Plus de SSIMeetup (20)

ZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSIZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSI
 
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
 
Value proposition of SSI tech providers - Self-Sovereign Identity
Value proposition of SSI tech providers - Self-Sovereign IdentityValue proposition of SSI tech providers - Self-Sovereign Identity
Value proposition of SSI tech providers - Self-Sovereign Identity
 
SSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley HughesSSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley Hughes
 
Web5 - Open to Build - Block-TBD
Web5 - Open to Build - Block-TBDWeb5 - Open to Build - Block-TBD
Web5 - Open to Build - Block-TBD
 
Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...
 
PharmaLedger: A Digital Trust Ecosystem for Healthcare
PharmaLedger: A Digital Trust Ecosystem for HealthcarePharmaLedger: A Digital Trust Ecosystem for Healthcare
PharmaLedger: A Digital Trust Ecosystem for Healthcare
 
Cheqd: Making privacy-preserving digital credentials fun
Cheqd: Making privacy-preserving digital credentials funCheqd: Making privacy-preserving digital credentials fun
Cheqd: Making privacy-preserving digital credentials fun
 
PolygonID Zero-Knowledge Identity Web2 & Web3
PolygonID Zero-Knowledge Identity Web2 & Web3PolygonID Zero-Knowledge Identity Web2 & Web3
PolygonID Zero-Knowledge Identity Web2 & Web3
 
Building SSI Products: A Guide for Product Managers
Building SSI Products: A Guide for Product ManagersBuilding SSI Products: A Guide for Product Managers
Building SSI Products: A Guide for Product Managers
 
Solving compliance for crypto businesses using Decentralized Identity – Pelle...
Solving compliance for crypto businesses using Decentralized Identity – Pelle...Solving compliance for crypto businesses using Decentralized Identity – Pelle...
Solving compliance for crypto businesses using Decentralized Identity – Pelle...
 
The SSI Ecosystem in South Korea
The SSI Ecosystem in South KoreaThe SSI Ecosystem in South Korea
The SSI Ecosystem in South Korea
 
Learn about the Trust Over IP (ToIP) stack
Learn about the Trust Over IP (ToIP) stackLearn about the Trust Over IP (ToIP) stack
Learn about the Trust Over IP (ToIP) stack
 
Explaining SSI to C-suite executives, and anyone else for that matter
Explaining SSI to C-suite executives, and anyone else for that matterExplaining SSI to C-suite executives, and anyone else for that matter
Explaining SSI to C-suite executives, and anyone else for that matter
 
The 2nd Official W3C DID Working Group Meeting (The Netherlands)
The 2nd Official W3C DID Working Group Meeting (The Netherlands)The 2nd Official W3C DID Working Group Meeting (The Netherlands)
The 2nd Official W3C DID Working Group Meeting (The Netherlands)
 
The Hyperledger Indy Public Blockchain Node
The Hyperledger Indy Public Blockchain NodeThe Hyperledger Indy Public Blockchain Node
The Hyperledger Indy Public Blockchain Node
 
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
 
Blockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain CredentialsBlockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain Credentials
 
Internet Identity Workshop #29 highlights with Drummond Reed
Internet Identity Workshop #29 highlights with Drummond ReedInternet Identity Workshop #29 highlights with Drummond Reed
Internet Identity Workshop #29 highlights with Drummond Reed
 
Kiva protocol: building the credit bureau of the future using SSI
Kiva protocol: building the credit bureau of the future using SSIKiva protocol: building the credit bureau of the future using SSI
Kiva protocol: building the credit bureau of the future using SSI
 

Dernier

Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Standkumarajju5765
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 

Dernier (20)

Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 

How to avoid another identity nightmare with SSI? Christopher Allen

  • 1. How to avoid another identity tragedy with SSI? Why Are We Here? - #Foremembrance on 27 March 2020 Christopher Allen — Decentralized Identity & Blockchain Architect, Co-Chair W3C Credentials Community Group CC BY-SA 4.0
  • 2. 1. Empower global SSI communities 2. Open to everyone interested in SSI 3. All content is shared with CC BY SA Alex Preukschat @SSIMeetup @AlexPreukschat Coordinating Node SSIMeetup.org SSIMeetup objectives SSIMeetup.orgssimeetup.org · CC BY-SA 4.0 International
  • 3. 3 Sunset 19:06 March 27th – A Moment of Silence CC BY-SA 4.0
  • 4. 4 Christopher Allen | Executive Director | Blockchain Commons ▪ Co-Chair W3C Credentials CG ▪ Co-Inventor & Architect of Decentralized Identifiers ▪ Author Design Principles of Self-Sovereign Identity ▪ Co-Author SSL/TLS ▪ Former Principal Architect, Blockstream ▪ Former CTO Certicom ▪ Former CEO Consensus Development ▪ Former Faculty Pinchot.edu Email: ChristopherA@LifeWithAlacrity.com Twitter: @ChristopherA https://www.linkedin.com/in/ChristopherA/ SSIMeetup.orgssimeetup.org · CC BY-SA 4.0 International
  • 5. LESS Identity & Trustless Identity Two Major Tracks: LESS Identity “Legally-Enabled Self-Sovereign” Identity* Key characteristics: ● Minimum Disclosure ● Full Control ● Necessary Proofs ● Legally-Enabled 5 Trustless Identity Or more properly “Trust Minimized” Identity Key characteristics: ● Anonymity ● Web of Trust ● Censorship Resistance ● Defend Human Rights vs. Powerful Actors (nation states, multi-national corps, mafias, etc.) * Originally coined by Tim Bouma (@trbouma) https://medium.com/@trbouma/less-identity-65f65d87f56b CC BY-SA 4.0
  • 6. LESS Identity “I want my identity to be digital, good and better, but in the end, I want my identity to be less than the real me.” — Tim Bouma (@trbouma) “LESS Identity is for higher trust environments with real-world identity verification, trust frameworks, privacy with accountability and government acceptance” — Christopher Allen (@ChristopherA) 6 CC BY-SA 4.0
  • 7. Trustless Identity “Identity is local, insecure, and labor-intensive… Identity-based access will exclude at least a third of world's future adults” — Nick Szabo (@NickSzabo4) “1.1 billion people have no legal identity, including tens of millions of stateless refugees.” — The World Bank 7 CC BY-SA 4.0
  • 8. Trustless Identity “And so tyranny naturally arises out of democracy, and the most aggravated form of tyranny and slavery out of the most extreme form of liberty.” — Plato, from the “The Republic” Book VIII “Identity can be a double-edged sword — usable for both beneficial and maleficent purposes.” — Christopher Allen (@ChristopherA) 8 CC BY-SA 4.0
  • 9. Trustless Identity “We desire to balance the need for fairness, accountability and support of the commons in civil society against the need to prevent human rights abuses and the right to be able to freely associate. When these needs conflict, we err to preserve the freedom and rights of the individual over the needs of the group. Put another way, we believe in accountability for the powerful, and privacy for everyone else.” — Christopher Allen (@ChristopherA) 9 CC BY-SA 4.0
  • 10. Why do I care about Self-Sovereign Identity? Last January 26th was the 75th anniversary of the Liberation of Auschwitz. I attended a moving ceremony last week in Amsterdam, where the Netherlands Prime Minister apologized. 10 https://www.bbc.com/news/world-europe-51258081 CC BY-SA 4.0
  • 11. An Apology “When authority became a threat, our government agencies failed as guardians of law and security. …Now that the last survivors are still among us, I apologize today on behalf of the government for government action then.” — Mark Rutte (@minpres), Netherlands Prime Minister on 75th Anniversary of the Liberation of Auschwitz 11 https://www.rijksoverheid.nl/documenten/toespraken/2020/01/26/toespraak-van-minister-president-mark-rutte-bij-de-nationale-auschwitzherdenking-amsterdam CC BY-SA 4.0
  • 12. What Went Wrong? Remember, more Jews died as a percentage of population in the Netherlands than in Germany, France and other countries. Part of this is because the Nazis took over civil administration. They had the data! 12 “Netherlands, Belgium and France… The percentage of Jews of the total population did not differ very much and was low in all three countries: 0.75% of the French and Belgian population, and 1.5% of the Dutch population. … Three quarters of the Dutch Jews were murdered… both in terms of percentages and in absolute numbers” https://www.annefrank.org/en/anne-frank/go-in-depth/netherlands-greatest-number-jewish-victims-western-europe/ CC BY-SA 4.0
  • 13. How did this happen? In 1932 JL Lentz become the head of the “National Inspectorate of Population Registers” in the Dutch civil service. In the 1930s much of the world was in the grip of The Great Depression. The efficiency of the Dutch civil service ensured all citizens had access to basic services, and was among the best in Europe. 13 http://www.persoonsbewijzen.nl/passie/sites/index.php?mid=226952&kid=4302 CC BY-SA 4.0
  • 14. It worked! Lentz was given the task of promoting more unity in the population registers of the municipalities By 1936, he help establish a decree that every resident in the Netherlands must have a personal identity card in the civil archives, and that these cards must all be controlled from a single office in each region. Lentz won a Royal Award for this. 14 http://www.persoonsbewijzen.nl/passie/sites/index.php?mid=226952&ki d=4302 CC BY-SA 4.0
  • 15. The Civil Archives These centralized civil archives were one of the first targets captured by the Nazis, and were considered a valuable asset. Almost immediately after capitulation, Lentz was asked by the Nazi’s to create difficult to forge National Identity Card. Lentz literally wrote the book on personal identity and “proof of inclusion in the population ledger” in 1940. 15 https://en.wikipedia.org/wiki/1943_bombing_of_the_Amsterdam_civil_registry_office CC BY-SA 4.0
  • 16. Forgery by the Resistance “Resistance members soon started to forge identification cards at a large scale… However, forged documents could be easily detected because they could be compared against the records in the civil registries… Some civil servants were willing to falsify records in the civil registry so that they would match up with forged identification cards. Nevertheless, the civil registries remained a potent weapon in the hands of the Nazis to identify…the population who were Jewish” — Wikipedia on “Bombing of the Amsterdam Civil Registry” 16 https://en.wikipedia.org/wiki/1943_bombing_of_the_Amsterdam_civil_registry_office 1942 Biometric Facial Authentication CC BY-SA 4.0
  • 17. Archives Become Target of the Resistance Despite the efforts by the Resistance to create forgeries, these archives were used by the Nazis to check forged identity cards using “proof of inclusion in the registry”, in particular those with the J on them against the civil records. The Dutch resistance tried destroy the civil archives on 28 March 1943. Unfortunately only 15% of the records were destroyed. 17 https://en.wikipedia.org/wiki/1943_bombing_of_the_Amsterdam_civil_registry_office After the Bombing CC BY-SA 4.0
  • 18. Meanwhile in France https://en.wikipedia.org/wiki/The_Holocaust_in_France Like in the Netherlands, the French “Vichy” government also assisted in Nazi deportation of Jews and other “undesirables”. However, in 1942, the Vichy government refused to continue to arrest Jews on a large scale and send them for deportation. The Nazi’s did not control the civil archives as they did in the Netherlands. 18 CC BY-SA 4.0
  • 20. A living history After January’s Holocaust Memorial, I had lunch with a child of two survivors of Auschwitz, who was also very moved by the the event and the Prime Minister’s apology. His mother had been rounded up using this data in a razzia after protests & strikes by sympathetic Dutch citizens. His father fled and was hidden by the resistance in Utrecht but was ultimately betrayed, probably by Nazi’s using civil data as an early social network analysis. 20 CC BY-SA 4.0
  • 21. A living history being lost When I first spoke to the Dutch Identity community about this history, older members of the community thanked me for sharing, as they felt embarrassed by it. Younger members of the community also thanked me, but told me that though they were taught about the Holocaust in school, that they never heard this particular story before. 21 CC BY-SA 4.0
  • 22. Lessons for Today Despite the trust in government today, we never know what may happen tomorrow. Centralized architectures and immutable proofs can be used for both good and evil. 22 Archives are now the Amsterdam Zoo Cafe CC BY-SA 4.0
  • 23. An opinion I believe that this living history from survivors of WWII is why Dutch citizens & Netherlands government are so supportive of the human-rights privacy aspects of GDPR, and I believe part of the reason why Self-Sovereign Identity is on the agenda here before many other countries. But Remembrance is still needed — it has been 75 years since the Holocaust. The passing of the old generations and ‘fake news’ are fading these memories. 23 https://www.nytimes.com/2016/07/18/world/europe/beyond-anne-frank-the-dutch-tell-their-full-holocaust-story.html CC BY-SA 4.0
  • 24. How can we be heroes? “Where are the false identification cards and fake baptismal certificates in a world of immutable records? How can honest to goodness hero fake an ID in a world where IDs can’t be faked?” — Thomas J Rush (@quickblocks) 24 https://thefederalist.com/2020/01/27/meet-the-man-who-saved-62000-people-during-the-holocaust/ Carl Lutz forged documents saving 62,000 Jews CC BY-SA 4.0
  • 25. Still a need for Trustless Solutions Nationalism, tribalism and xenophobia are on the rise across the world. ● In Russia (Putin) Brazil (Bolsonaro), Great Britain (Johnson), Poland (Kaczynski), Turkey (Erdogan), the USA (Trump), and more. ● Normalization of xenophobia encourages violation of human rights ● Academics, critics, journalists, Muslims, and transgender people have all been targeted. ● Facial recognition is becoming adopted worldwide ● Covid-19 pandemic is causing nation-states to collect location info ● These new dangers require new ways to protect human rights 25 CC BY-SA 4.0
  • 26. But we need both! The Netherlands today is a “high-trust” society. The citizens trust the government, and the government trusts the citizens. This is good! We want this! But this is not true everywhere. And LESS Identity is where the money is — Self-Sovereign Identity has deep “trustless” roots, but almost all the major advancements in the last two years have been in projects for commerce and are to be recognized as legal by governments. But as standards emerge, don’t lock out the “trustless” solutions — they serve different needs not served by LESS Identity. 26 CC BY-SA 4.0
  • 27. An Identity Community Foremembrance I would like to see at Sunset in Amsterdam on 27 March that the self-sovereign and larger identity community have a moment of silence. A Forward Rememberance, a #Foremberance. To remember sculptor Gerrit van der Veen who forged 80,000 Jewish civil records, and author and painter Willem Arondeus and 11 others who were found guilty of attempting to destroy the civil archives and thus were executed by the Nazis. To salute all those who died to protect the defenceless in WWII, who eased suffering in genocides past, and fought discrimination and totalitarianism. 27 CC BY-SA 4.0
  • 28. An Identity Community Foremembrance To foremember about those today at the front. The protesters in Hong Kong, those trying to discover details about the Xinjiang “re-education” concentration camps in western China, the government of Gambia taking Burmese Aung San Suu Kyi to court here in the The Hague to demand protection for the Rohingya, to those protecting immigrant children on the US Mexico border or protecting us against Cambridge Analytica-like attacks this years elections, and to all those protecting minority communities such as gays, transexuals, and more. And to salute all those defending the vulnerable. 28 CC BY-SA 4.0
  • 29. 29 Christopher Allen | Executive Director | Blockchain Commons ▪ Co-Chair W3C Credentials CG ▪ Co-Inventor & Architect of Decentralized Identifiers ▪ Author Design Principles of Self-Sovereign Identity ▪ Co-Author SSL/TLS ▪ Former Principal Architect, Blockstream ▪ Former CTO Certicom ▪ Former CEO Consensus Development ▪ Former Faculty Pinchot.edu Email: ChristopherA@LifeWithAlacrity.com Twitter: @ChristopherA https://www.linkedin.com/in/ChristopherA/ SSIMeetup.orgssimeetup.org · CC BY-SA 4.0 International