SlideShare une entreprise Scribd logo
Why The Web Needs
Decentralized Identifiers (DIDs)
—Even if Google, Apple, and Mozilla Disagree
November 3, 2021
@evernym | www.evernym.com
Andy Tobin
Managing Director, Europe,
Evernym
Drummond Reed
Chief Trust Officer,
Evernym
Co-Editor, DID Spec
Today’s presenters
James Monaghan
VP Product,
Evernym
On the agenda
The controversy at the W3C
Why the future of the Web is at stake
What are DIDs, and why do we need them?
The DID Spec 1.0 and the W3C’s DID Working Group
The path to becoming a W3C standard
Our response to the formal objections made by
Google, Apple, and Mozilla
Q&A
First, what is the controversy at the
World Wide Web Consortium (W3C)?
vs.
Web 3.0
Web 2.0
SSI & Decentralized Identifiers:
Reclaiming the soul of the web
Credit to Nick Price, Decentralized Identity Foundation
TCP / IP
HTTP /
Browser
GSM /
Mobile
Decentralization /
P2P
1974 - 1982 1989 - 1997 1993 - 2007 2018 -
You
You
DIDs put you in the center of your digital world
centralized decentralized
Why is the future of the Web at stake?
In a nutshell, it’s all about control:
● How much control will you have over your digital life?
● Your digital wallet?
● Your digital credentials?
● Your secure communications?
● Your privacy?
● Your personal data?
● Your ability to use the hardware and software of your choice?
What are DIDs
anyways?
Decentralized
Identifiers (DIDs)
A new type of globally unique
identifier (URI) that does not
require a centralized registration
authority because control of the
identifier can be proved using
cryptography.
For a more technical introduction to
DIDs, view our previous webinar:
https://vimeo.com/363406397
“DIDs are the atomic building
block of decentralized digital
trust infrastructure.”
Chapter 8:
Decentralized Identifiers
https://www.manning.com/books/self-sovereign-identity
In simple terms:
A DID is a digital control point.
Example: email address
Your
devices
Some server
at some service
provider
somewhere
Control point
You
Example: phone number
Control point
Your
devices
Some server
at some service
provider
somewhere
You
Example: domain name
Control point
Your
devices
Some server
at some service
provider
somewhere
You
Example: Decentralized Identifier
Your
devices
Some server
at some service
provider
somewhere
You
Control point
The “cryptographic triangle” behind all DIDs
DID
Public
Key
Private
Key
Control point
This never needs
to change
Even when these
need to change
(“key rotation”)
What are the benefits of
being in control?
With DIDs, you can:
Login without usernames and passwords
Digitally sign documents or transactions
Create persistent communications channels
Send encrypted private messages
Transfer value or assets
Authorize delegates or guardians
Consumer benefits:
● Control your data and online communications
● Create DIDs yourself; you don’t need to rely on anyone else and nobody can take
your DIDs away from you
● Have as many DIDs as you want to maintain your privacy
● Use your DIDs anywhere you want—they are fully portable
● Use your DIDs on your own terms—not anyone else's
● Choose which information your share with your DIDs
● All of this without surveillance or middlemen
Business benefits:
● Provide simple, secure, universal login for all your customers
● Digitally sign verifiable credentials that can be verified by anyone
● Create lifetime private channels with all your customers
● Make it nearly impossible for a phisher to spoof your business
● Prove the authenticity of your data, devices, people, & products
● Automate both internal and external business processes that require trust
● Benefit from entirely new business models, rooted in trusted data
● Connect and interact with your customers in a whole new way
What role do DIDs play in SSI,
and how are they being used today?
DIDs and VCs are the
twin pillars of self-sovereign identity
A global movement
>350 member organizations
Funding DID-based verifiable credentials
for use in supply chain verification
DID-based ‘staff passports’ for the world’s
third-largest employer
DID-based travel and health credentials,
in trial with 70+ major airlines
DID-based verifiable LEIs for businesses
and their representatives
DID-based KYC credentials for the
financial industry
DID-based portable patient records and
healthcare credentials
with production use
A (very) brief history of the ‘DID Spec’
A (very) brief history of the
‘DID Spec’
W3C Decentralized Identifiers (DIDs) 1.0
● Required syntax for all DIDs
● Required data model for all DID documents
● Required operations for all DID methods
● Security & Privacy Considerations
W3C DID Specification Registries
● Registry for DID methods, DID document
properties, key types, service types
● 112 DID methods currently registered
W3C DID Method Rubric 1.0
● Specifies suggested criteria and processes
for market evaluation of DID methods
W3C DID Implementation Guide
DID Spec 1.0
History of the DID spec prior to the
W3C Working Group
2015 2016 2017 2018 2019
Spring IIW: First
blockchain identity
discussions
W3C VCTF: A
Decentralized Hash
Table for the Web
Fall IIW: Decision to
begin blockchain ID
projects
DHS: Awards 1st
blockchain Identity
R&D contracts
IIW+RWOT: DID Spec
work fully underway
IIW+RWOT: First DID
Spec nearly complete
DHS: First DID Spec
published & contract
complete
DHS:
DKMS contract
awarded; work
begins
W3C CCG: DID Spec
contributed
DHS:
DKMS Design &
Architecture V3
published
W3C CCG: Second
draft of DID Spec
W3C CCG: Work on
DID WG Charter
begins
DHS:
DKMS Design &
Architecture V4
published
W3C CCG:
Community Final
Draft of DID Spec
W3C:
DID WG Charter
approved
W3C DID Working Group
begins Sept 2019
Work on DIDs
begins
The two-year path to becoming a W3C
standard (“REC”)
July 2021
May 2021
(CR2)
Nov 2020
(CR1)
Nov 2019
(FPWD)
May 2020
(Feature freeze)
August 2021
3 formal
objectors
So, what were these
formal objections?
Our Response:
Objection #1:
No practical
interoperability
of DID methods
1. It misses the point that the DID spec
establishes a baseline of interoperability
across ALL DID methods
○ It doesn’t matter how many DID methods
there are—they all produce the same result
2. Our WG Charter explicitly prohibited us
from specifying any DID methods
○ That is not our job—that is the job of each DID
method specification author
3. Each DID method spec establishes its
own interoperability requirements
○ Any DID method can and should have
multiple interoperable implementations
Objection #2:
Encourages
divergence
rather than
convergence of
DID methods
Our Response:
1. For the second time, this misses the
point of the DID spec: it specifies
interoperability for all DID methods
○ They all use a DID resolver to take a DID as
input and return a DID document as output
2. The market should determine the
success of DID methods—just as it has
with URI schemes and URN namespaces
○ There are 345 URI schemes and 70 URN
namespaces registered with IANA
3. URI schemes and URN namespaces are
all based on federated registries
○ DIDs are decentralized — each DID method
is a cryptographic solution to the DID triangle
Objection #3:
Centralized DID
methods are not
prohibited
Our Response:
1. “Decentralization” means “innovation at
the edges”
○ It would be a travesty if a centralized registry
controlled all innovation in DID methods
2. It is not the DID Working Group’s job—or
the W3C’s job—to judge DID methods
○ It is the market’s job—a job the market can do
much more efficiently and effectively
3. The whole purpose of the DID Method
Rubric is to facilitate market evaluations
○ It is a registry of recommended criteria and
processes for performing evaluations
Objection #4:
DID methods
using
proof-of-work
blockchains are
harmful for
environmental
sustainability
Our Response:
1. DID method implementations are
out-of-scope for the DID 1.0 spec
○ Each method makes its own choices about
how to implement a Verifiable Data Registry
2. Environmental sustainability is a perfect
example of a DID Method Rubric criteria
○ The Rubric is constantly being improved with
evaluation criteria for this and other factors
3. This is one more example of why the
market should choose DID methods
○ The DID 1.0 spec was explicitly designed to
encourage decentralized market competition
The Future of the Web Is
Decentralized
DIDs are inevitable
● Don’t panic — a lot of people are working really hard to get the DID spec approved
○ Very few W3C formal objections are sustained — it just takes some time to resolve
● The governmental, commercial, and social progress of DIDs is already unstoppable
○ The genie is not going back in the bottle
● This has no effect on Evernym’s products or customers
○ We are charging ahead with innovations in DID-based products and services
● The real lesson here is that decentralization means a shift in control
○ From large tech vendors (the “center”) to users (the “edges”)
● This is a strong signal that this shift is finally happening—for real
DIDs are the innovation that
democratizes cryptography so
that everyone can use it.
Thanks for joining us today!
For more content on decentralized identifiers and verifiable
credentials, please visit www.evernym.com/webinars/
November 3, 2021
@evernym | www.evernym.com

Contenu connexe

Tendances

Digital Guardianship in Self-Sovereign Identity
Digital Guardianship in Self-Sovereign IdentityDigital Guardianship in Self-Sovereign Identity
Digital Guardianship in Self-Sovereign Identity
Evernym
 
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSelf-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
SSIMeetup
 
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan GeorgeHyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
SSIMeetup
 
Meet Verity, Evernym's Digital Credential Platform
Meet Verity, Evernym's Digital Credential PlatformMeet Verity, Evernym's Digital Credential Platform
Meet Verity, Evernym's Digital Credential Platform
Evernym
 
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
SSIMeetup
 
PolygonID Zero-Knowledge Identity Web2 & Web3
PolygonID Zero-Knowledge Identity Web2 & Web3PolygonID Zero-Knowledge Identity Web2 & Web3
PolygonID Zero-Knowledge Identity Web2 & Web3
SSIMeetup
 
R3 Corda Simple Tutorial
R3 Corda Simple TutorialR3 Corda Simple Tutorial
R3 Corda Simple Tutorial
Eric Lee
 
The European Union goes Decentralized
The European Union goes DecentralizedThe European Union goes Decentralized
The European Union goes Decentralized
Torsten Lodderstedt
 
The Shift from Federated to Decentralized Identity
The Shift from Federated to Decentralized IdentityThe Shift from Federated to Decentralized Identity
The Shift from Federated to Decentralized Identity
Evernym
 
Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs
Vasiliy Suvorov
 
An introduction to blockchain and hyperledger v ru
An introduction to blockchain and hyperledger v ruAn introduction to blockchain and hyperledger v ru
An introduction to blockchain and hyperledger v ru
LennartF
 
OpenID Connect 4 SSI (DIFCon F2F)
OpenID Connect 4 SSI (DIFCon F2F)OpenID Connect 4 SSI (DIFCon F2F)
OpenID Connect 4 SSI (DIFCon F2F)
Torsten Lodderstedt
 
OpenID for SSI
OpenID for SSIOpenID for SSI
OpenID for SSI
Torsten Lodderstedt
 
What makes a successful SSI strategy?
What makes a successful SSI strategy?What makes a successful SSI strategy?
What makes a successful SSI strategy?
Evernym
 
"Decentralized Finance (DeFi)" by Brendan Forster, Dharma | Fluidity 2019
"Decentralized Finance (DeFi)" by Brendan Forster, Dharma | Fluidity 2019"Decentralized Finance (DeFi)" by Brendan Forster, Dharma | Fluidity 2019
"Decentralized Finance (DeFi)" by Brendan Forster, Dharma | Fluidity 2019
Fluidity
 
Introducing FIDO Device Onboard (FDO)
Introducing  FIDO Device Onboard (FDO)Introducing  FIDO Device Onboard (FDO)
Introducing FIDO Device Onboard (FDO)
FIDO Alliance
 
Verifiable Credentials 101 for SSI and Decentralized Digital Identity - Tyler...
Verifiable Credentials 101 for SSI and Decentralized Digital Identity - Tyler...Verifiable Credentials 101 for SSI and Decentralized Digital Identity - Tyler...
Verifiable Credentials 101 for SSI and Decentralized Digital Identity - Tyler...
SSIMeetup
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
ReachLocal Services India
 
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
SSIMeetup
 
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
SSIMeetup
 

Tendances (20)

Digital Guardianship in Self-Sovereign Identity
Digital Guardianship in Self-Sovereign IdentityDigital Guardianship in Self-Sovereign Identity
Digital Guardianship in Self-Sovereign Identity
 
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSelf-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
 
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan GeorgeHyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
 
Meet Verity, Evernym's Digital Credential Platform
Meet Verity, Evernym's Digital Credential PlatformMeet Verity, Evernym's Digital Credential Platform
Meet Verity, Evernym's Digital Credential Platform
 
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
 
PolygonID Zero-Knowledge Identity Web2 & Web3
PolygonID Zero-Knowledge Identity Web2 & Web3PolygonID Zero-Knowledge Identity Web2 & Web3
PolygonID Zero-Knowledge Identity Web2 & Web3
 
R3 Corda Simple Tutorial
R3 Corda Simple TutorialR3 Corda Simple Tutorial
R3 Corda Simple Tutorial
 
The European Union goes Decentralized
The European Union goes DecentralizedThe European Union goes Decentralized
The European Union goes Decentralized
 
The Shift from Federated to Decentralized Identity
The Shift from Federated to Decentralized IdentityThe Shift from Federated to Decentralized Identity
The Shift from Federated to Decentralized Identity
 
Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs
 
An introduction to blockchain and hyperledger v ru
An introduction to blockchain and hyperledger v ruAn introduction to blockchain and hyperledger v ru
An introduction to blockchain and hyperledger v ru
 
OpenID Connect 4 SSI (DIFCon F2F)
OpenID Connect 4 SSI (DIFCon F2F)OpenID Connect 4 SSI (DIFCon F2F)
OpenID Connect 4 SSI (DIFCon F2F)
 
OpenID for SSI
OpenID for SSIOpenID for SSI
OpenID for SSI
 
What makes a successful SSI strategy?
What makes a successful SSI strategy?What makes a successful SSI strategy?
What makes a successful SSI strategy?
 
"Decentralized Finance (DeFi)" by Brendan Forster, Dharma | Fluidity 2019
"Decentralized Finance (DeFi)" by Brendan Forster, Dharma | Fluidity 2019"Decentralized Finance (DeFi)" by Brendan Forster, Dharma | Fluidity 2019
"Decentralized Finance (DeFi)" by Brendan Forster, Dharma | Fluidity 2019
 
Introducing FIDO Device Onboard (FDO)
Introducing  FIDO Device Onboard (FDO)Introducing  FIDO Device Onboard (FDO)
Introducing FIDO Device Onboard (FDO)
 
Verifiable Credentials 101 for SSI and Decentralized Digital Identity - Tyler...
Verifiable Credentials 101 for SSI and Decentralized Digital Identity - Tyler...Verifiable Credentials 101 for SSI and Decentralized Digital Identity - Tyler...
Verifiable Credentials 101 for SSI and Decentralized Digital Identity - Tyler...
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
 
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
 

Similaire à Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, and Mozilla Disagree

Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
Don’t Just Trust Cloud Providers - How To Audit Cloud ProvidersDon’t Just Trust Cloud Providers - How To Audit Cloud Providers
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
Michael Davis
 
Accelerate Self-service Analytics with Universal Semantic Model
Accelerate Self-service Analytics with Universal Semantic Model Accelerate Self-service Analytics with Universal Semantic Model
Accelerate Self-service Analytics with Universal Semantic Model
Denodo
 
SSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley HughesSSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley Hughes
SSIMeetup
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for value
Deloitte United States
 
Sso walk-through
Sso walk-throughSso walk-through
Sso walk-through
sureshattanayake
 
A Walk through SSO
A Walk through SSOA Walk through SSO
A Walk through SSO
WSO2
 
OpenAthens Conference 2018 - Don Thibeau - OpenID Connect
OpenAthens Conference 2018 - Don Thibeau - OpenID ConnectOpenAthens Conference 2018 - Don Thibeau - OpenID Connect
OpenAthens Conference 2018 - Don Thibeau - OpenID Connect
OpenAthens
 
Securing The Reality of Multiple Cloud Apps: Pandora's Story
Securing The Reality of Multiple Cloud Apps: Pandora's StorySecuring The Reality of Multiple Cloud Apps: Pandora's Story
Securing The Reality of Multiple Cloud Apps: Pandora's Story
CloudLock
 
Cybersecurity Implementation and Certification in Practice for IoT Equipment
Cybersecurity Implementation and Certification in Practice for IoT EquipmentCybersecurity Implementation and Certification in Practice for IoT Equipment
Cybersecurity Implementation and Certification in Practice for IoT Equipment
Onward Security
 
SOA with Data Virtualization (session 4 from Packed Lunch Webinar Series)
SOA with Data Virtualization (session 4 from Packed Lunch Webinar Series)SOA with Data Virtualization (session 4 from Packed Lunch Webinar Series)
SOA with Data Virtualization (session 4 from Packed Lunch Webinar Series)
Denodo
 
Enabling Large-Scale Multi-Party Federations with OpenID Connect - OpenID Sum...
Enabling Large-Scale Multi-Party Federations with OpenID Connect - OpenID Sum...Enabling Large-Scale Multi-Party Federations with OpenID Connect - OpenID Sum...
Enabling Large-Scale Multi-Party Federations with OpenID Connect - OpenID Sum...
OpenID Foundation Japan
 
Achieving Self-Service Analytics with a Governed Data Services Layer
Achieving Self-Service Analytics with a Governed Data Services LayerAchieving Self-Service Analytics with a Governed Data Services Layer
Achieving Self-Service Analytics with a Governed Data Services Layer
Denodo
 
Medical Device UDI Compliance in the Cloud
Medical Device UDI Compliance in the CloudMedical Device UDI Compliance in the Cloud
Medical Device UDI Compliance in the Cloud
KPIT
 
IT Security: What an In-Plant Print Center Needs to Know
IT Security: What an In-Plant Print Center Needs to KnowIT Security: What an In-Plant Print Center Needs to Know
IT Security: What an In-Plant Print Center Needs to Know
Rochester Software Associates
 
How Personal Cloud Networks Enable New Business Models
How Personal Cloud Networks Enable New Business ModelsHow Personal Cloud Networks Enable New Business Models
How Personal Cloud Networks Enable New Business Models
drummondreed
 
Google peter logli & jake shea
Google   peter logli & jake sheaGoogle   peter logli & jake shea
Google peter logli & jake shea
ColloqueRISQ
 
Kantara Workshop at CIS
Kantara Workshop at CISKantara Workshop at CIS
Kantara Workshop at CIS
kantarainitiative
 
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Cloud Standards Customer Council
 
George Mokhbat V SCTC day cloud 24 feb16
George Mokhbat V SCTC day cloud 24 feb16George Mokhbat V SCTC day cloud 24 feb16
George Mokhbat V SCTC day cloud 24 feb16
Agustin Argelich Casals
 
Some Internet Topics: Horizontals, the IETF, and IPv6
Some Internet Topics: Horizontals, the IETF, and IPv6Some Internet Topics: Horizontals, the IETF, and IPv6
Some Internet Topics: Horizontals, the IETF, and IPv6
Internet Society
 

Similaire à Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, and Mozilla Disagree (20)

Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
Don’t Just Trust Cloud Providers - How To Audit Cloud ProvidersDon’t Just Trust Cloud Providers - How To Audit Cloud Providers
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
 
Accelerate Self-service Analytics with Universal Semantic Model
Accelerate Self-service Analytics with Universal Semantic Model Accelerate Self-service Analytics with Universal Semantic Model
Accelerate Self-service Analytics with Universal Semantic Model
 
SSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley HughesSSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley Hughes
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for value
 
Sso walk-through
Sso walk-throughSso walk-through
Sso walk-through
 
A Walk through SSO
A Walk through SSOA Walk through SSO
A Walk through SSO
 
OpenAthens Conference 2018 - Don Thibeau - OpenID Connect
OpenAthens Conference 2018 - Don Thibeau - OpenID ConnectOpenAthens Conference 2018 - Don Thibeau - OpenID Connect
OpenAthens Conference 2018 - Don Thibeau - OpenID Connect
 
Securing The Reality of Multiple Cloud Apps: Pandora's Story
Securing The Reality of Multiple Cloud Apps: Pandora's StorySecuring The Reality of Multiple Cloud Apps: Pandora's Story
Securing The Reality of Multiple Cloud Apps: Pandora's Story
 
Cybersecurity Implementation and Certification in Practice for IoT Equipment
Cybersecurity Implementation and Certification in Practice for IoT EquipmentCybersecurity Implementation and Certification in Practice for IoT Equipment
Cybersecurity Implementation and Certification in Practice for IoT Equipment
 
SOA with Data Virtualization (session 4 from Packed Lunch Webinar Series)
SOA with Data Virtualization (session 4 from Packed Lunch Webinar Series)SOA with Data Virtualization (session 4 from Packed Lunch Webinar Series)
SOA with Data Virtualization (session 4 from Packed Lunch Webinar Series)
 
Enabling Large-Scale Multi-Party Federations with OpenID Connect - OpenID Sum...
Enabling Large-Scale Multi-Party Federations with OpenID Connect - OpenID Sum...Enabling Large-Scale Multi-Party Federations with OpenID Connect - OpenID Sum...
Enabling Large-Scale Multi-Party Federations with OpenID Connect - OpenID Sum...
 
Achieving Self-Service Analytics with a Governed Data Services Layer
Achieving Self-Service Analytics with a Governed Data Services LayerAchieving Self-Service Analytics with a Governed Data Services Layer
Achieving Self-Service Analytics with a Governed Data Services Layer
 
Medical Device UDI Compliance in the Cloud
Medical Device UDI Compliance in the CloudMedical Device UDI Compliance in the Cloud
Medical Device UDI Compliance in the Cloud
 
IT Security: What an In-Plant Print Center Needs to Know
IT Security: What an In-Plant Print Center Needs to KnowIT Security: What an In-Plant Print Center Needs to Know
IT Security: What an In-Plant Print Center Needs to Know
 
How Personal Cloud Networks Enable New Business Models
How Personal Cloud Networks Enable New Business ModelsHow Personal Cloud Networks Enable New Business Models
How Personal Cloud Networks Enable New Business Models
 
Google peter logli & jake shea
Google   peter logli & jake sheaGoogle   peter logli & jake shea
Google peter logli & jake shea
 
Kantara Workshop at CIS
Kantara Workshop at CISKantara Workshop at CIS
Kantara Workshop at CIS
 
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
 
George Mokhbat V SCTC day cloud 24 feb16
George Mokhbat V SCTC day cloud 24 feb16George Mokhbat V SCTC day cloud 24 feb16
George Mokhbat V SCTC day cloud 24 feb16
 
Some Internet Topics: Horizontals, the IETF, and IPv6
Some Internet Topics: Horizontals, the IETF, and IPv6Some Internet Topics: Horizontals, the IETF, and IPv6
Some Internet Topics: Horizontals, the IETF, and IPv6
 

Plus de Evernym

Verifiable Credentials for Travel & Hospitality
Verifiable Credentials for Travel & HospitalityVerifiable Credentials for Travel & Hospitality
Verifiable Credentials for Travel & Hospitality
Evernym
 
Evernym May 2021 Product Update
Evernym May 2021 Product UpdateEvernym May 2021 Product Update
Evernym May 2021 Product Update
Evernym
 
SSI & Healthcare: Lessons from the NHS
SSI & Healthcare: Lessons from the NHSSSI & Healthcare: Lessons from the NHS
SSI & Healthcare: Lessons from the NHS
Evernym
 
IATA Travel Pass - Evernym Webinar
IATA Travel Pass - Evernym WebinarIATA Travel Pass - Evernym Webinar
IATA Travel Pass - Evernym Webinar
Evernym
 
Meet Connect.Me & Evernym's Mobile SDK
Meet Connect.Me & Evernym's Mobile SDKMeet Connect.Me & Evernym's Mobile SDK
Meet Connect.Me & Evernym's Mobile SDK
Evernym
 
Open Source & What It Means For Self-Sovereign Identity (SSI)
Open Source & What It Means For Self-Sovereign Identity (SSI)Open Source & What It Means For Self-Sovereign Identity (SSI)
Open Source & What It Means For Self-Sovereign Identity (SSI)
Evernym
 
The Future of Digital Wallets - Evernym Webinar
The Future of Digital Wallets - Evernym WebinarThe Future of Digital Wallets - Evernym Webinar
The Future of Digital Wallets - Evernym Webinar
Evernym
 
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign IdentityThe Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
Evernym
 
An Expert Panel on Safe Credentials
An Expert Panel on Safe CredentialsAn Expert Panel on Safe Credentials
An Expert Panel on Safe Credentials
Evernym
 
Verifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIF
Verifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIFVerifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIF
Verifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIF
Evernym
 
Enhancing Learner Mobility with SSI & Portable Digital Credentials
Enhancing Learner Mobility with SSI & Portable Digital CredentialsEnhancing Learner Mobility with SSI & Portable Digital Credentials
Enhancing Learner Mobility with SSI & Portable Digital Credentials
Evernym
 
Trust over IP (ToIP)
Trust over IP (ToIP)Trust over IP (ToIP)
Trust over IP (ToIP)
Evernym
 
Meet Evernym's SSI Platform
Meet Evernym's SSI PlatformMeet Evernym's SSI Platform
Meet Evernym's SSI Platform
Evernym
 
Getting Started With Self-Sovereign Identity (SSI) | Evernym Webinar
Getting Started With Self-Sovereign Identity (SSI) | Evernym WebinarGetting Started With Self-Sovereign Identity (SSI) | Evernym Webinar
Getting Started With Self-Sovereign Identity (SSI) | Evernym Webinar
Evernym
 
SSI & Digital Guardianship Webinar
SSI & Digital Guardianship WebinarSSI & Digital Guardianship Webinar
SSI & Digital Guardianship Webinar
Evernym
 

Plus de Evernym (15)

Verifiable Credentials for Travel & Hospitality
Verifiable Credentials for Travel & HospitalityVerifiable Credentials for Travel & Hospitality
Verifiable Credentials for Travel & Hospitality
 
Evernym May 2021 Product Update
Evernym May 2021 Product UpdateEvernym May 2021 Product Update
Evernym May 2021 Product Update
 
SSI & Healthcare: Lessons from the NHS
SSI & Healthcare: Lessons from the NHSSSI & Healthcare: Lessons from the NHS
SSI & Healthcare: Lessons from the NHS
 
IATA Travel Pass - Evernym Webinar
IATA Travel Pass - Evernym WebinarIATA Travel Pass - Evernym Webinar
IATA Travel Pass - Evernym Webinar
 
Meet Connect.Me & Evernym's Mobile SDK
Meet Connect.Me & Evernym's Mobile SDKMeet Connect.Me & Evernym's Mobile SDK
Meet Connect.Me & Evernym's Mobile SDK
 
Open Source & What It Means For Self-Sovereign Identity (SSI)
Open Source & What It Means For Self-Sovereign Identity (SSI)Open Source & What It Means For Self-Sovereign Identity (SSI)
Open Source & What It Means For Self-Sovereign Identity (SSI)
 
The Future of Digital Wallets - Evernym Webinar
The Future of Digital Wallets - Evernym WebinarThe Future of Digital Wallets - Evernym Webinar
The Future of Digital Wallets - Evernym Webinar
 
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign IdentityThe Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
 
An Expert Panel on Safe Credentials
An Expert Panel on Safe CredentialsAn Expert Panel on Safe Credentials
An Expert Panel on Safe Credentials
 
Verifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIF
Verifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIFVerifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIF
Verifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIF
 
Enhancing Learner Mobility with SSI & Portable Digital Credentials
Enhancing Learner Mobility with SSI & Portable Digital CredentialsEnhancing Learner Mobility with SSI & Portable Digital Credentials
Enhancing Learner Mobility with SSI & Portable Digital Credentials
 
Trust over IP (ToIP)
Trust over IP (ToIP)Trust over IP (ToIP)
Trust over IP (ToIP)
 
Meet Evernym's SSI Platform
Meet Evernym's SSI PlatformMeet Evernym's SSI Platform
Meet Evernym's SSI Platform
 
Getting Started With Self-Sovereign Identity (SSI) | Evernym Webinar
Getting Started With Self-Sovereign Identity (SSI) | Evernym WebinarGetting Started With Self-Sovereign Identity (SSI) | Evernym Webinar
Getting Started With Self-Sovereign Identity (SSI) | Evernym Webinar
 
SSI & Digital Guardianship Webinar
SSI & Digital Guardianship WebinarSSI & Digital Guardianship Webinar
SSI & Digital Guardianship Webinar
 

Dernier

Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 

Dernier (20)

Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 

Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, and Mozilla Disagree

  • 1. Why The Web Needs Decentralized Identifiers (DIDs) —Even if Google, Apple, and Mozilla Disagree November 3, 2021 @evernym | www.evernym.com
  • 2. Andy Tobin Managing Director, Europe, Evernym Drummond Reed Chief Trust Officer, Evernym Co-Editor, DID Spec Today’s presenters James Monaghan VP Product, Evernym
  • 3. On the agenda The controversy at the W3C Why the future of the Web is at stake What are DIDs, and why do we need them? The DID Spec 1.0 and the W3C’s DID Working Group The path to becoming a W3C standard Our response to the formal objections made by Google, Apple, and Mozilla Q&A
  • 4. First, what is the controversy at the World Wide Web Consortium (W3C)?
  • 6. SSI & Decentralized Identifiers: Reclaiming the soul of the web Credit to Nick Price, Decentralized Identity Foundation TCP / IP HTTP / Browser GSM / Mobile Decentralization / P2P 1974 - 1982 1989 - 1997 1993 - 2007 2018 -
  • 7. You You DIDs put you in the center of your digital world centralized decentralized
  • 8. Why is the future of the Web at stake? In a nutshell, it’s all about control: ● How much control will you have over your digital life? ● Your digital wallet? ● Your digital credentials? ● Your secure communications? ● Your privacy? ● Your personal data? ● Your ability to use the hardware and software of your choice?
  • 10. Decentralized Identifiers (DIDs) A new type of globally unique identifier (URI) that does not require a centralized registration authority because control of the identifier can be proved using cryptography. For a more technical introduction to DIDs, view our previous webinar: https://vimeo.com/363406397
  • 11. “DIDs are the atomic building block of decentralized digital trust infrastructure.” Chapter 8: Decentralized Identifiers https://www.manning.com/books/self-sovereign-identity
  • 12. In simple terms: A DID is a digital control point.
  • 13. Example: email address Your devices Some server at some service provider somewhere Control point You
  • 14. Example: phone number Control point Your devices Some server at some service provider somewhere You
  • 15. Example: domain name Control point Your devices Some server at some service provider somewhere You
  • 16. Example: Decentralized Identifier Your devices Some server at some service provider somewhere You Control point
  • 17. The “cryptographic triangle” behind all DIDs DID Public Key Private Key Control point This never needs to change Even when these need to change (“key rotation”)
  • 18. What are the benefits of being in control?
  • 19. With DIDs, you can: Login without usernames and passwords Digitally sign documents or transactions Create persistent communications channels Send encrypted private messages Transfer value or assets Authorize delegates or guardians
  • 20. Consumer benefits: ● Control your data and online communications ● Create DIDs yourself; you don’t need to rely on anyone else and nobody can take your DIDs away from you ● Have as many DIDs as you want to maintain your privacy ● Use your DIDs anywhere you want—they are fully portable ● Use your DIDs on your own terms—not anyone else's ● Choose which information your share with your DIDs ● All of this without surveillance or middlemen
  • 21. Business benefits: ● Provide simple, secure, universal login for all your customers ● Digitally sign verifiable credentials that can be verified by anyone ● Create lifetime private channels with all your customers ● Make it nearly impossible for a phisher to spoof your business ● Prove the authenticity of your data, devices, people, & products ● Automate both internal and external business processes that require trust ● Benefit from entirely new business models, rooted in trusted data ● Connect and interact with your customers in a whole new way
  • 22. What role do DIDs play in SSI, and how are they being used today?
  • 23. DIDs and VCs are the twin pillars of self-sovereign identity
  • 24. A global movement >350 member organizations Funding DID-based verifiable credentials for use in supply chain verification DID-based ‘staff passports’ for the world’s third-largest employer DID-based travel and health credentials, in trial with 70+ major airlines DID-based verifiable LEIs for businesses and their representatives DID-based KYC credentials for the financial industry DID-based portable patient records and healthcare credentials with production use
  • 25. A (very) brief history of the ‘DID Spec’ A (very) brief history of the ‘DID Spec’
  • 26. W3C Decentralized Identifiers (DIDs) 1.0 ● Required syntax for all DIDs ● Required data model for all DID documents ● Required operations for all DID methods ● Security & Privacy Considerations W3C DID Specification Registries ● Registry for DID methods, DID document properties, key types, service types ● 112 DID methods currently registered W3C DID Method Rubric 1.0 ● Specifies suggested criteria and processes for market evaluation of DID methods W3C DID Implementation Guide DID Spec 1.0
  • 27. History of the DID spec prior to the W3C Working Group 2015 2016 2017 2018 2019 Spring IIW: First blockchain identity discussions W3C VCTF: A Decentralized Hash Table for the Web Fall IIW: Decision to begin blockchain ID projects DHS: Awards 1st blockchain Identity R&D contracts IIW+RWOT: DID Spec work fully underway IIW+RWOT: First DID Spec nearly complete DHS: First DID Spec published & contract complete DHS: DKMS contract awarded; work begins W3C CCG: DID Spec contributed DHS: DKMS Design & Architecture V3 published W3C CCG: Second draft of DID Spec W3C CCG: Work on DID WG Charter begins DHS: DKMS Design & Architecture V4 published W3C CCG: Community Final Draft of DID Spec W3C: DID WG Charter approved W3C DID Working Group begins Sept 2019 Work on DIDs begins
  • 28. The two-year path to becoming a W3C standard (“REC”) July 2021 May 2021 (CR2) Nov 2020 (CR1) Nov 2019 (FPWD) May 2020 (Feature freeze) August 2021 3 formal objectors
  • 29. So, what were these formal objections?
  • 30. Our Response: Objection #1: No practical interoperability of DID methods 1. It misses the point that the DID spec establishes a baseline of interoperability across ALL DID methods ○ It doesn’t matter how many DID methods there are—they all produce the same result 2. Our WG Charter explicitly prohibited us from specifying any DID methods ○ That is not our job—that is the job of each DID method specification author 3. Each DID method spec establishes its own interoperability requirements ○ Any DID method can and should have multiple interoperable implementations
  • 31. Objection #2: Encourages divergence rather than convergence of DID methods Our Response: 1. For the second time, this misses the point of the DID spec: it specifies interoperability for all DID methods ○ They all use a DID resolver to take a DID as input and return a DID document as output 2. The market should determine the success of DID methods—just as it has with URI schemes and URN namespaces ○ There are 345 URI schemes and 70 URN namespaces registered with IANA 3. URI schemes and URN namespaces are all based on federated registries ○ DIDs are decentralized — each DID method is a cryptographic solution to the DID triangle
  • 32. Objection #3: Centralized DID methods are not prohibited Our Response: 1. “Decentralization” means “innovation at the edges” ○ It would be a travesty if a centralized registry controlled all innovation in DID methods 2. It is not the DID Working Group’s job—or the W3C’s job—to judge DID methods ○ It is the market’s job—a job the market can do much more efficiently and effectively 3. The whole purpose of the DID Method Rubric is to facilitate market evaluations ○ It is a registry of recommended criteria and processes for performing evaluations
  • 33. Objection #4: DID methods using proof-of-work blockchains are harmful for environmental sustainability Our Response: 1. DID method implementations are out-of-scope for the DID 1.0 spec ○ Each method makes its own choices about how to implement a Verifiable Data Registry 2. Environmental sustainability is a perfect example of a DID Method Rubric criteria ○ The Rubric is constantly being improved with evaluation criteria for this and other factors 3. This is one more example of why the market should choose DID methods ○ The DID 1.0 spec was explicitly designed to encourage decentralized market competition
  • 34. The Future of the Web Is Decentralized
  • 35. DIDs are inevitable ● Don’t panic — a lot of people are working really hard to get the DID spec approved ○ Very few W3C formal objections are sustained — it just takes some time to resolve ● The governmental, commercial, and social progress of DIDs is already unstoppable ○ The genie is not going back in the bottle ● This has no effect on Evernym’s products or customers ○ We are charging ahead with innovations in DID-based products and services ● The real lesson here is that decentralization means a shift in control ○ From large tech vendors (the “center”) to users (the “edges”) ● This is a strong signal that this shift is finally happening—for real
  • 36. DIDs are the innovation that democratizes cryptography so that everyone can use it.
  • 37. Thanks for joining us today! For more content on decentralized identifiers and verifiable credentials, please visit www.evernym.com/webinars/ November 3, 2021 @evernym | www.evernym.com