What's new in the MATTR universe: September 2023
MATTROur team has been hard at work alongside our customers, and we're thrilled to unveil the exciting product features and updates we've brought to life in the last few months.
8 mins |19 Sept 2023BBS Signatures - a building block for privacy-by-design
MATTRWe are thrilled to introduce a significant milestone in our journey – the implementation of the latest version of the BBS cryptographic scheme. This pivotal step not only unlocks new capabilities but also reinforces our unwavering commitment to a privacy-by-design approach across all MATTR products.
10 mins |19 Sept 2023Ready, set, GO
MATTRCustomers have been telling us they would like out of the box solutions to help them to get started and scale, bringing control, trust and convenience to issuers, holders and verifiers.
7 mins |28 Jul 2023Designing credential journeys your way: Enabling flexibility with OpenID4VCI
MATTRRead more about how our new OpenID Credential Issuance protocol allows customers to implement their unique requirements into user issuance journeys.
7 mins |What's new in the MATTR universe: April 2023 product update
MATTRThere is a lot to keep up with in the evolving world of digital trust, and MATTR is here to help you stay up to date. We've got a raft of new features and product updates available now and coming soon.
7 mins |Demystifying the EUDI ARF part two: Credential formats and MATTR's Credential Profiles
MATTRIn part two of our series, we will dive deeper into the standards that the EUDI ARF recommends for individual credentials and how MATTR is using our Credential Profiles to help customers like you navigate this ever-evolving standards landscape.
9 mins |6 Apr 2023Demystifying the EUDI ARF part one: Towards common credential issuance with OpenID4VCI
MATTRLast month, the European Commission published its draft European Digital Identity Architecture and Reference Framework (EUDI ARF) as a summary description of the eiDAS expert group’s recommendations for the EUDI wallet concept. Read about what's inside this document and how MATTR is working on open standards to enable interoperability.
16 mins |30 Mar 2023Introducing MATTR Pi: Flexible toolkits for evolving needs
Today we are excited to announce the launch of MATTR Pi. Designed for customers who want to build their own digital credential experiences from the ground up, MATTR Pi is our SDK-centric platform with toolkits and best in class documentation to unlock endless possibilities for your business.
1 min | MATTR |13 Feb 2023Wallets in the wild: Building digital trust that scales
Luke McIntyreAs the world shifts from paper-based systems and legacy solutions for sharing and verifying data, you might be wondering how to equip users with a wallet that works for them. Read our guide to implementing digital wallets for your business.
4 mins | MATTR |3 Feb 2023Creating wallets that work: Interoperability 101
What is interoperability when it comes to digital wallets and why do we need it?
4 mins | MATTR |27 Jan 2023Wallets for humans: Digital wallets 101
A lot of us think of payments, cryptocurrency or NFTs when we think of digital wallets. However, a good digital wallet extends well beyond this. Read our introduction to digital wallets and what makes a great digital wallet for humans.
4 mins | MATTR |20 Jan 2023What’s new in the MATTR universe: November 2022
Luke McIntyreRead about the exciting new product updates and features we've been working on at MATTR HQ – including new cloud deployment options, enhanced security features and a fully revamped digital wallet.
5 mins |29 Nov 2022Open sourcing our HTTP Signatures library
MATTRWe've released our HTTP Signatures library as open source, making this important, security-enhancing technology more accessible to all.
3 mins |29 Nov 2022NSF awards MATTR and partners grant to develop digital trust solution
Nader Helmy3 mins |15 Dec 2021Adding DID ION to MATTR VII
Nader HelmyWe have added support for DID ION to MATTR VII platform.
4 min read | MATTR |16 Sept 2021Issuing credentials directly to the MATTR mobile wallet
David RenwickWe explore an alternative method to issuing a credential without requiring the OIDC Bridge.
5 min read | MATTR |13 Aug 2021Rendering credentials in a human-friendly way
Nader Helmy4 min | MATTR |2 Jul 2021Adding support for Secure DID Messaging
Dylan Paul4 min | MATTR |7 May 2021IIW32: BBS+ and beyond
Nader Helmy4 min | MATTR |6 May 2021The benefits of decentralised identity for your organization
David RenwickBenefits of decentralized identity for your organization starting from single purpose credentials to cross-organizational business models.
4 min read | MATTR |30 Jul 2021Why we’re launching MATTR VII
Nader HelmyIt’s no secret we need a better web. The original vision of an open and decentralized network that’s universally accessible continues to be a north star to those working to design the future of digital infrastructure for everyday people. Read More↗
6 mins | MATTR |26 Mar 2021The State of Identity on the Web
Nader HelmyThe evolution of identity on the web is happening at a rapid pace, with many different projects and efforts converging around similar ideas with their own interpretations and constraints. It can be difficult to parse through all of these developments while the dust hasn’t completely settled, but looking at these issues holistically, we can see a much bigger pattern emerging. Read More↗
21 mins | MATTR |16 Mar 2021Highlights of #IIW31
Nader HelmyLast month’s Internet Identity Workshop (IIW) was held entirely online for the second time in its history. This bi-annual unconference, typically hosted in Mountain View, CA at the Computer History Museum, connects a wide variety of people from across the globe focused on solving the hard problems around digital identity. As an unconference, the attendees set the agenda each day. The format is focused on open collaboration which creates a real and rare opportunity to organically discuss not only the latest technology developments, but also the surrounding social, political and legal implications. Read More↗
8 minute read | MATTR |6 Nov 2020Adding support for revocation of Verifiable Credentials
Nader HelmyThe MATTR team is excited to announce a critical new addition to our product capabilities. We’re continuing to build out an extensive suite of features to support the exchange of Verifiable Credentials (VCs), leveraging the best efforts of the open-source community along with a number of distinct product innovations. These innovations include our recent work related to using BBS+ signatures for privacy-preserving selective disclosure and our earlier work on the OIDC Credential Provider spec. We’ve also been busy sharing new tools for checking the syntax of a JSON-LD credential during development. Read More↗
4 minute read | MATTR |21 Oct 2020New to JSON-LD? Introducing JSON-LD Lint
Emily Fry and Tobias LookerJSON-LD, based on the ubiquitous JSON technology, is rapidly gaining adoption on the web. JSON-LD is an innovation relevant to both business minds and developers alike. For those unfamiliar with this technology, this short video is a great introduction. At MATTR we use JSON-LD in a variety of ways. For example, the platform generates credentials using this technology so that they can be inherently understood and referenced. Read More↗
3 minute read | MATTR |9 Oct 2020DID Extensibility on the MATTR Platform
Emily Fry and Tobias LookerAt MATTR we’ve been busy building the next generation of solutions for verifiable data and digital trust. Earlier this month we introduced our platform and added experimental support for a new, privacy-preserving method for selective data disclosure. Read More↗
3 minute read | MATTR |9 Oct 2020Using privacy-preserving ZKP credentials on the MATTR Platform
Nader HelmyMATTR is proud to announce we’ve added support for privacy-preserving verifiable credentials on our platform using BBS+ signatures. Using a technique to implement selective disclosure, we’ve added the ability to generate credentials that support zero knowledge proofs without revealing any unnecessary information about the end-user, or placing any added burden on issuers, in the process. Read More↗
4 minute read | MATTR |18 Sept 2020Introducing the MATTR Platform
Luke McIntyreHere at MATTR, we have been hard at work building a suite of products to serve the next generation of digital trust. We’ve designed our products based on a few key principles: extensible data formats, secure authentication protocols, a rigorous semantic data model, industry-standard cryptography, and the use of drivers and extensions to allow modular and configurable use of the platform over time. By combining our core capabilities with extensions and drivers, our platform offers developers convenience without compromising flexibility or choice. Read More↗
3 minute read | MATTR |17 Sept 2020If you build an island, you’ll need a boat
Emily Fry & Tobias LookerEmerging technology is incredibly stimulating, yet so often it is idealistic in nature and seemingly theoretical. The self sovereign identity (SSI) conceptual architecture has existed in the ‘idealistic’ bucket for some time. Read More↗
7 minute read | MATTR |17 Jul 2020Introducing OIDC Credential Provider
Nader HelmyOpenID Connect (OIDC) is a hugely popular user authentication and identity protocol on the web today. It enables relying parties to verify the identity of their users and obtain basic profile information about them in order to create an authenticated user experience. Read More↗
6 minute read | MATTR |16 Dec 2020Building interoperable ZKP credential systems
Decentralized Identity FoundationVerifiable credentials are a kind of signed, tamper-proof digital document that uses cryptography to strongly authenticate the information shared between participants. There are many design and behavioral considerations when building systems for digital information-sharing which affect the privacy and security guarantees between the parties which will exchange data. Read More↗
4 minute read |6 Jul 2020KERI: a more Performant Ledger for Trusted Identities
Carsten StöckerOne of the fundamental problems of blockchain-based business models is that there are inescapable technical complexities at the root of every business decision. The complex relationship between decentralized identity and blockchains is no exception. Read More↗
11 minute read | Spherity |3 Jul 2020The Business Case for Interoperability
Karyl FowlerTransmute believes that cross-vendor interoperability is critical for commercialization of decentralized identifier (DID) and verifiable credential (VC) technology. To interoperate means that a computer system or software has the ability to exchange and make use of data from a different system or software "via a common set of exchange formats." Read More↗
3 minute read | Transmute |22 May 2020JWT vs Linked Data Proofs: comparing Verifiable Credentials
Nader HelmyVerifiable Credentials, a standard at the W3C as of late last year, is a verifiable data model which can be represented in multiple different assertion formats. Essentially, these formats, or ‘types’ of verifiable credentials, are just alternative ways to represent the same information. Read More↗
7 minute read | MATTR |8 May 2020A solution for privacy-preserving Verifiable Credentials
Nader HelmyThe recent ratification of Verifiable Credentials (VCs) as a new standard at the W3C defines a powerful new data model for interoperability of identity technologies. As a standard it also represents a disruptive shift in the future design options of digital systems, towards ones that feature more portable and user-centric digital identity, often referred to as ‘self-sovereign’ or ‘decentralized identity’. Read More↗
8 minute read | MATTR |8 May 2020How Open Standards get made
Juan CaballeroHaving covered all the basic principles and building blocks of SSI, there is still one very delicate question I have studiously avoided answering directly until now: “says who?” Unlike other topics in software engineering and architecture, there is no definitive formula for how to build an SSI system, or even precise and authoritative definitions for most of the terms I’ve been defining for you in the least controversial way possible through these pages. Read More↗
7 minute read | Spherity |9 Apr 2020Redesigning Data Privacy: Reimagining Notice & Consent for human-technology interaction
Anne Josephine Flanagan, Jen King, Sheila WarrenHaving covered all the basic principles and building blocks of SSI, there is still one very delicate question I have studiously avoided answering directly until now: “says who?” Unlike other topics in software engineering and architecture, there is no definitive formula for how to build an SSI system, or even precise and authoritative definitions for most of the terms I’ve been defining for you in the least controversial way possible through these pages. Read More↗
50 minute read | World Economic Forum |26 Mar 2020Known Traveller Digital Identity Specifications Guidance
Christine Leong, Christoph Wolff, et al.The Known Traveller Digital Identity (KTDI) concept relies upon a trusted, decentralized and interoperable identity platform enabled through technologies including blockchain, biometrics, mobile devices, and cryptography. The Forum and its partners are currently piloting components of the KTDI concept in a real-life, cross-border context to further enhance the concept and inform future pilots. Read More↗
25 minute read | World Economic Forum |26 Mar 2020On JSON-LD and the semantics of identity
Orie SteeleIn this post, we’ll explore how JSON-LD is used in a number of contexts including decentralized identity and verifiable credentials. We’ll also cover the basics of what you should know before using JSON-LD and how you can contribute to software and standards that rely on it. Read More↗
7 minute read | Transmute |7 Jan 2020Models for Platform Governance
Robery Fay, Taylor Owen, et al.Over the past three years, the debate about the role of digital technology in our society, our economy and our democracies has gone through a remarkable transformation. Following two decades of techno-optimism, whereby digital technology generally, and social media specifically, was viewed as broadly aligned with democratic good and so left to be governed in a laissez-faire environment, we are now in the midst of what could be called a "techlash." Read More↗
141 minute read | CIGI |7 Jan 2020The case for OAuth 3.0
Justin RicherIt’s been about a year since I proposed that we should move past OAuth 2.0, and a lot has happened since then to tackle some of the issues that I raised. I helped lead the TxAuth session at IETF 106 in Singapore last week, and we had a number of side meetings and follow ons from that to discuss the implications. Read More↗
6 minute read |26 Nov 2019Meta-Platforms and Cooperative Network-of-Networks Effects
Samuel M. SmithBlockchain technology has the potential to truly revolutionize network computing and associated markets such as finance, supply chain, social etc. One of its main attractions has been its promise of bringing more virtuous and trustworthy governance as a result of more decentralized control of the underlying systems. Read More↗
45 minute read | SelfRule |26 Mar 2019The Sidetree Protocol: Scalable DPKI for Decentralized Identity
Daniel BuchnerBack in 2017, a few members of the Decentralized Identity Foundation (DIF) began discussing how decentralized identity systems could achieve global scale. At the lowest layer of most decentralized identity systems is a blockchain/ledger (‘Layer 1’ or L1) that is used in some fashion to support a Decentralized Public Key Infrastructure and W3C Decentralized Identifiers (DIDs). Read More↗
5 minute read | DIF |28 Feb 2019GDPR and Privacy by Design: what developers need to know
Sphere IdentityIt’s estimated that 90% of the world’s data has been collected in the last two years, according to a recent report. By the year 2020, it’s expected that we will create 1.7 megabytes of new information every second for every human on the planet. Read More↗
7 minute read |28 Feb 2019A Universal Resolver for self-sovereign identifiers
Markus SabadelloDIF is introducing a community preview of the Universal Resolver — a core building block of a decentralized identity system. This is a first step in fulfilling DIF’s mission to help individuals and organizations to control their digital identity, without being dependent on any intermediary party. Read More↗
4 minute read | DIF |2 Nov 2017The future of the open internet
Quincy LarsonThere are a lot of scary things happening these days, but here’s what keeps me up late at night. A handful of corporations are turning our open internet into this: These corporations want to lock down the internet and give us access to nothing more than a few walled gardens. They want to burn down the Library of Alexandria and replace it with a magazine rack. Read More↗
27 minute read |17 Mar 2017