← @ChristopherA Twitter archive

Christopher Allen

@ChristopherA

…use cases include “real-time vehicle value, dangerous driving, road and obstacle mapping, usage-based insurance (UBI), reliable feedback loops into driver assistance system (DAS) and autonomous driving infrastructures, V2V/V2I interactions and cooperative mobility systems.”

8/23/2019, 3:34:24 PM

Favs: 1

Retweets: 0

Christopher Allen

@ChristopherA

…”Digital twins can represent objects and entities as varied as IoT sensors, ECUs, spare parts, vehicles, traffic lights, access gates, human users, or a city…or represent intangible entities like services, code, data, processes and knowledge.”

8/23/2019, 3:36:05 PM

Favs: 1

Retweets: 0

Christopher Allen

@ChristopherA

Topic of decentralized identity for the refugee use case has long been of interest at #RWOT going back to the 1st #ID2020 at the UN. I know HTC will be at #RWOT9 & have announced a cheaper self-sovereign cell phone, but we have a way to go. Glad to see this topic re-emerging.

8/23/2019, 3:53:33 PM

Favs: 3

Retweets: 1

Christopher Allen

@ChristopherA

…a ”common attack is if the person having secured the pot doesn’t turn up next time. This is typically mitigated by having due diligence and KYC for every participant…(but) defaulter has to be sent a mail and then taken to court and legal proceedings take their own sweet time.”

8/23/2019, 4:01:35 PM

Favs: 1

Retweets: 0

Christopher Allen

@ChristopherA

…”attack could be from the organizer where the auctions…rigged by discounting too much by using proxies or agents…(such) that the participant who is actually needy and deserves money is not able to get the required amount which leads to more discount in subsequent turns.”

8/23/2019, 4:03:14 PM

Favs: 1

Retweets: 0

Christopher Allen

@ChristopherA

…“most rampant type of scam is similar to multi level marketing, having a hierarchy of agents to pool in people. In many cases, chit fund is simply a name to attract people which in reality is a ponzi scheme.”

8/23/2019, 4:04:04 PM

Favs: 1

Retweets: 0

Christopher Allen

@ChristopherA

…Requirements for a digital ROSCAS: “Anonymity: Not being able to know who the person is makes it highly unlikely that the auction or any process can be rigged through collusion.”…

8/23/2019, 4:06:03 PM

Favs: 0

Retweets: 0

Christopher Allen

@ChristopherA

…Requirement: ”One to One relationship: Being able to prove that a person owns the DID by giving a certificate of binding with some biometric (owned on the device by individual) without revealing the biometric.”…

8/23/2019, 4:07:12 PM

Favs: 1

Retweets: 0

Christopher Allen

@ChristopherA

…Requirement: ”Self Sovereign: the identifier should be owned by individuals and can’t be created by any other entity.”…

8/23/2019, 4:08:17 PM

Favs: 0

Retweets: 0

Christopher Allen

@ChristopherA

…DIDs ”provide all the requirement to be an effective identity layer for successfully running the ROSCAS digitally…The best of the scenario could be if a farmer from India is able to participate in a ROSCAS run in West Africa, thereby helping borrowers and in turn…earning.”

8/23/2019, 4:09:31 PM

Favs: 0

Retweets: 0

Christopher Allen

@ChristopherA

…The paper then goes into a number of potential solutions for those problems. “adding an acceptance step in the issuance process, the recipient has the choice to opt-in to storage of their certificate. They could request corrections or simply opt-out”

8/23/2019, 4:18:03 PM

Favs: 0

Retweets: 0

Christopher Allen

@ChristopherA

…”There is a debate over whether certificates should identify recipients using national identity, public key or some other variation of Decentralised Identity (DID). Our view is that national identity and DID will coexist but…”

8/23/2019, 4:19:03 PM

Favs: 0

Retweets: 0

Christopher Allen

@ChristopherA

…“…until the usability of wallet software improves and wallet use becomes mainstream, we have to make do with personal names as the recipient identifier for OpenCerts. The strength of the credential can be bolstered with additional attributes like national ID and birthdate.”

8/23/2019, 4:49:17 PM

Favs: 1

Retweets: 0

Christopher Allen

@ChristopherA

…”users tranport the encrypted data to smart contracts for storage via MAM channel, and simultaneously make a verifiable Auth-compliant request to the platform in claim of “being tradable.” Later, the verified data will enter data marketplace to be traded.”

8/23/2019, 5:01:56 PM

Favs: 1

Retweets: 0

Christopher Allen

@ChristopherA

…”a car equipped with LIDAR…a gyroscope & an accelerometer can accurately detect bumps and potholes on the road. Those data sets could be extremely useful for municipal governments as well as companies in fields such as car insurance, navigation applications & road maintenance”

8/23/2019, 5:03:54 PM

Favs: 1

Retweets: 0

Christopher Allen

@ChristopherA

…”Participant control means that participants may form customized or bespoke virtual platforms of their own choosing…Participant control better balances the interests of participants & platform operators.”

8/23/2019, 5:08:28 PM

Favs: 0

Retweets: 0

Christopher Allen

@ChristopherA

…”An early paper outlined the potential for identity to be a meta-system. The difference is that a meta-platform enables value transfer between platforms whereas a meta-system enables interoperability between systems.”

8/23/2019, 5:10:18 PM

Favs: 1

Retweets: 0

Christopher Allen

@ChristopherA

That’s my summary for today for the first 5 of 50 advance readings for #RWOT9. The point sharing these advance reading is to help the community understand emerging thoughts and trends of other participants, as well as help build a shared language before the event for everyone.

8/23/2019, 5:15:43 PM

Favs: 3

Retweets: 0