Articles

Highlights of #IIW31
Highlights of #IIW31
Nader Helmy 6 Nov, 2020
Last month’s Internet Identity Workshop (IIW) was held entirely online for the second time in its history. This bi-annual unconference, typically hosted in Mountain View, CA at the Computer History Museum, connects a wide variety of people from across the globe focused on solving the hard problems around digital identity. As an unconference, the attendees set the agenda each day. The format is focused on open collaboration which creates a real and rare opportunity to organically discuss not only the latest technology developments, but also the surrounding social, political and legal implications.
Adding support for revocation of Verifiable Credentials
Adding support for revocation of Verifiable Credentials
Nader Helmy 21 Oct, 2020
The MATTR team is excited to announce a critical new addition to our product capabilities. We’re continuing to build out an extensive suite of features to support the exchange of Verifiable Credentials (VCs), leveraging the best efforts of the open-source community along with a number of distinct product innovations. These innovations include our recent work related to using BBS+ signatures for privacy-preserving selective disclosure and our earlier work on the OIDC Credential Provider spec. We’ve also been busy sharing new tools for checking the syntax of a JSON-LD credential during development.
New to JSON-LD? Introducing JSON-LD Lint
New to JSON-LD? Introducing JSON-LD Lint
Emily Fry and Tobias Looker 9 Oct, 2020
JSON-LD, based on the ubiquitous JSON technology, is rapidly gaining adoption on the web. JSON-LD is an innovation relevant to both business minds and developers alike. For those unfamiliar with this technology, this short video is a great introduction. At MATTR we use JSON-LD in a variety of ways. For example, the platform generates credentials using this technology so that they can be inherently understood and referenced.
DID Extensibility on the MATTR Platform
DID Extensibility on the MATTR Platform
Nader Helmy 7 Oct, 2020
At MATTR we’ve been busy building the next generation of solutions for verifiable data and digital trust. Earlier this month we introduced our platform and added experimental support for a new, privacy-preserving method for selective data disclosure.
Using privacy-preserving ZKP credentials on the MATTR Platform
Using privacy-preserving ZKP credentials on the MATTR Platform
Nader Helmy 18 Sep, 2020
MATTR is proud to announce we’ve added support for privacy-preserving verifiable credentials on our platform using BBS+ signatures. Using a technique to implement selective disclosure, we’ve added the ability to generate credentials that support zero knowledge proofs without revealing any unnecessary information about the end-user, or placing any added burden on issuers, in the process.
Introducing the MATTR Platform
Introducing the MATTR Platform
Luke McIntyre 17 Sep, 2020
Here at MATTR, we have been hard at work building a suite of products to serve the next generation of digital trust. We’ve designed our products based on a few key principles: extensible data formats, secure authentication protocols, a rigorous semantic data model, industry-standard cryptography, and the use of drivers and extensions to allow modular and configurable use of the platform over time. By combining our core capabilities with extensions and drivers, our platform offers developers convenience without compromising flexibility or choice.
If you build an island, you’ll need a boat
If you build an island, you’ll need a boat
Emily Fry & Tobias Looker 17 Jul, 2020
Emerging technology is incredibly stimulating, yet so often it is idealistic in nature and seemingly theoretical. The self sovereign identity (SSI) conceptual architecture has existed in the ‘idealistic’ bucket for some time.
Building interoperable ZKP credential systems
Building interoperable ZKP credential systems
Decentralized Identity Foundation 6 Jul, 2020
Verifiable credentials are a kind of signed, tamper-proof digital document that uses cryptography to strongly authenticate the information shared between participants. There are many design and behavioral considerations when building systems for digital information-sharing which affect the privacy and security guarantees between the parties which will exchange data.
KERI: a more Performant Ledger for Trusted Identities
KERI: a more Performant Ledger for Trusted Identities
Carsten Stöcker 3 Jul, 2020
One of the fundamental problems of blockchain-based business models is that there are inescapable technical complexities at the root of every business decision. The complex relationship between decentralized identity and blockchains is no exception.
The Business Case for Interoperability
The Business Case for Interoperability
Karyl Fowler 22 May, 2020
Transmute believes that cross-vendor interoperability is critical for commercialization of decentralized identifier (DID) and verifiable credential (VC) technology. To interoperate means that a computer system or software has the ability to exchange and make use of data from a different system or software “via a common set of exchange formats.”
JWT vs Linked Data Proofs: comparing Verifiable Credentials
JWT vs Linked Data Proofs: comparing Verifiable Credentials
Nader Helmy 8 May, 2020
Verifiable Credentials, a standard at the W3C as of late last year, is a verifiable data model which can be represented in multiple different assertion formats. Essentially, these formats, or ‘types’ of verifiable credentials, are just alternative ways to represent the same information.
A solution for privacy-preserving Verifiable Credentials
A solution for privacy-preserving Verifiable Credentials
Nader Helmy 8 May, 2020
The recent ratification of Verifiable Credentials (VCs) as a new standard at the W3C defines a powerful new data model for interoperability of identity technologies. As a standard it also represents a disruptive shift in the future design options of digital systems, towards ones that feature more portable and user-centric digital identity, often referred to as ‘self-sovereign’ or ‘decentralized identity’.
How Open Standards get made
How Open Standards get made
Juan Caballero 9 Apr, 2020
Having covered all the basic principles and building blocks of SSI, there is still one very delicate question I have studiously avoided answering directly until now: “says who?” Unlike other topics in software engineering and architecture, there is no definitive formula for how to build an SSI system, or even precise and authoritative definitions for most of the terms I’ve been defining for you in the least controversial way possible through these pages.
Redesigning Data Privacy: Reimagining Notice & Consent for human-technology interaction
Redesigning Data Privacy: Reimagining Notice & Consent for human-technology interaction
Anne Josephine Flanagan, Jen King, Sheila Warren 26 Mar, 2020
The way in which we as people interact with technology is continuously evolving. When the permissions people grant to companies and organizations at one point in time become the gateway for everything that happens to that data in the future, that moment becomes extremely important, perhaps far beyond what could be envisaged.
Known Traveller Digital Identity Specifications Guidance
Known Traveller Digital Identity Specifications Guidance
Christine Leong, Christoph Wolff, et al. 26 Mar, 2020
The Known Traveller Digital Identity (KTDI) concept relies upon a trusted, decentralized and interoperable identity platform enabled through technologies including blockchain, biometrics, mobile devices, and cryptography. The Forum and its partners are currently piloting components of the KTDI concept in a real-life, cross-border context to further enhance the concept and inform future pilots.
On JSON-LD and the semantics of identity
On JSON-LD and the semantics of identity
Orie Steele 7 Jan, 2020
In this post, we’ll explore how JSON-LD is used in a number of contexts including decentralized identity and verifiable credentials. We’ll also cover the basics of what you should know before using JSON-LD and how you can contribute to software and standards that rely on it.
Models for Platform Governance
Models for Platform Governance
Robery Fay, Taylor Owen, et al. 7 Jan, 2020
Over the past three years, the debate about the role of digital technology in our society, our economy and our democracies has gone through a remarkable transformation. Following two decades of techno-optimism, whereby digital technology generally, and social media specifically, was viewed as broadly aligned with democratic good and so left to be governed in a laissez-faire environment, we are now in the midst of what could be called a “techlash.”
The case for OAuth 3.0
The case for OAuth 3.0
Justin Richer 26 Nov, 2019
It’s been about a year since I proposed that we should move past OAuth 2.0, and a lot has happened since then to tackle some of the issues that I raised. I helped lead the TxAuth session at IETF 106 in Singapore last week, and we had a number of side meetings and follow ons from that to discuss the implications.
Meta-Platforms and Cooperative Network-of-Networks Effects
Meta-Platforms and Cooperative Network-of-Networks Effects
Samuel M. Smith 26 Mar, 2019
Blockchain technology has the potential to truly revolutionize network computing and associated markets such as finance, supply chain, social etc. One of its main attractions has been its promise of bringing more virtuous and trustworthy governance as a result of more decentralized control of the underlying systems.
The Sidetree Protocol: Scalable DPKI for Decentralized Identity
The Sidetree Protocol: Scalable DPKI for Decentralized Identity
Daniel Buchner 28 Feb, 2019
Back in 2017, a few members of the Decentralized Identity Foundation (DIF) began discussing how decentralized identity systems could achieve global scale. At the lowest layer of most decentralized identity systems is a blockchain/ledger (‘Layer 1’ or L1) that is used in some fashion to support a Decentralized Public Key Infrastructure and W3C Decentralized Identifiers (DIDs).
GDPR and Privacy by Design: what developers need to know
GDPR and Privacy by Design: what developers need to know
Sphere Identity 25 Jan, 2018
It’s estimated that 90% of the world’s data has been collected in the last two years, according to a recent report. By the year 2020, it’s expected that we will create 1.7 megabytes of new information every second for every human on the planet.
A Universal Resolver for self-sovereign identifiers
A Universal Resolver for self-sovereign identifiers
Markus Sabadello 2 Nov, 2017
DIF is introducing a community preview of the Universal Resolver — a core building block of a decentralized identity system. This is a first step in fulfilling DIF’s mission to help individuals and organizations to control their digital identity, without being dependent on any intermediary party.
The future of the open internet
The future of the open internet
Quincy Larson 17 Mar, 2017
There are a lot of scary things happening these days, but here’s what keeps me up late at night. A handful of corporations are turning our open internet into this: These corporations want to lock down the internet and give us access to nothing more than a few walled gardens. They want to burn down the Library of Alexandria and replace it with a magazine rack.