DIDisco - history-did

⧉infominer 17-Jun-19 03:29 AM
⧉infominer 17-Jun-19 06:14 AM
http://bit.ly/j80T3 Senator Kerry, Your IDENTITY is at the root of your relationship with any service providing company, including the ...
⧉infominer 03-Jul-19 04:15 AM
Indy isn’t just another blockchain identity application, but is born of a richly interwoven fabric stretching across the identity standards, cryptographic, blockchain, humanitarian, and enterprise ecosystems — similar to the network it was built to enable.
⧉infominer 03-Jul-19 08:15 AM
Today we communicate, share and transact digitally over the Internet. Individuals who make use of the Internet for these purposes should have control over their digital
HubID, (the self-sovereign digital identity system at the core of Hub Culture and the Ven currency) is the first consumer application to deploy the Windhover Principles and features new frameworks for digital identity, trust and open data. The core technology has been in deve...
LONDON, Sept. 29, 2016 /PRNewswire-USNewswire/ -- Evernym, Inc. announced today at the Ctrl-Shift Personal Information Economy conference that it has donated...
⧉infominer 03-Jul-19 08:43 AM
https://www.cs.ru.nl/~jhh/pub/secsem/chaum1985bigbrother.pdf - David Chaum, 1985. * The large-scale automated transaction systems of the near future can be designed to protect the privacy and maintain the security of both individuals and organizations. > Computerization is robbing individuals of the ability to monitor and control the ways information about them is used. As organizations in both the private and the public sectors routinely exchange such informa- tion, individ.uals have no way of knowing if the information is inaccurate, obsolete, or otherwise inap- propriate. The foundation is being laid for a dossier society, in which computers could be used to infer individuals’ life-styles, habits, whereabouts, and asso- ciations from data collected in ordinary consumer transactions. Uncertainty about whether data will re- main secure against abuse by those maintaining or tapping it can have a “chilling effect,” causing people to alter their observable activities. As computerization becomes mclre pervasive, the potential for these prob- lems will grow dramatically.
Public Key Cryptography infrastructure (PKI) has two main implementations. One is done using certificates and certificate authorities (CAs), and is described in the X.509 standard. It is best suited for structured organizational hierarchies with an implicitly trusted authorit...
The Augmented Social Network: Building identity and trust into the next-generation Internet
There’s been considerable conversation around identity on the Internet, or what some would call grassroots identity. Providing identity services between people, websites, and organizations that may or may not have any kind of formalized relationship is a different problem t...
Open-Source Sofware for Identity & Personal Data Services
Founded in 2011, the Personal Data Ecosystem Consortium advocates a user-centric approach to managing personal data. We believe that, in order for the Internet economy to continue delivering on its promise, the needs of individuals, companies, and governments must all be resp...
The term "user-centric" identity is getting bandied about a lot these days. It's generally understood to be a different way of expressing the entire identity transaction as opposed to what might be called the "enterprise-centric" approach traditionally used within provisionin...
My recent post on Google's identity silo was part of a hailstorm (pun intended) of comments that occurred on the email list over at the Identity Gang. All of those fast-flying emails unveiled what I'm now calling the "identity silo paradox."
Mountain View, CA (PRWEB) March 22, 2017 As Internet users realize their virtual activities have real-world consequences, a new film reveals the committed community of behind-the-scenes identity
My recent post on Google's identity silo was part of a hailstorm (pun intended) of comments that occurred on the email list over at the Identity Gang. All of those fast-flying emails unveiled what I'm now calling the "identity silo paradox."
https://www.forgerock.com/blog/who-are-the-identerati (a term for those working on identity standards for the purpose of breaking up id data silos, dating back to at least 2006). https://www.moxytongue.com/2012/02/what-is-sovereign-source-authority.html
You’re familiar with digital identity standards like OpenID Connect, OAuth, and User-Managed Access, fundamental elements of privacy and security on the internet. But have you ever wondered how they came to be? A lot of work on these protocols went on (and goes on) behind t...
What is an Individual Human Being prior to "identity registration" in Society? What is the data administration framework of default partic...
Today we communicate, share and transact digitally over the Internet. Individuals who make use of the Internet for these purposes should have control over their digital
HubID, (the self-sovereign digital identity system at the core of Hub Culture and the Ven currency) is the first consumer application to deploy the Windhover Principles and features new frameworks for digital identity, trust and open data. The core technology has been in deve...
The foundation of the Respect Network is the Respect Trust Framework, which was listed with the Open Identity Exchange in May 2011 and honored with the Privacy Award at the 2011 European Identity C...
Self-sovereign identity on the blockchain
Your Blockchain Jurisdiction

Leave a comment

Your email address will not be published. Required fields are marked *