← @ChristopherA Twitter archive

Christopher Allen

@ChristopherA

Middle of the weekend, and people are starting to arrive in Prague for #RWOT9. Here are 5 more summaries of advance reading topics to help us prepare for our collaborations next week.

8/31/2019, 1:47:29 PM

Favs: 9

Retweets: 2

Christopher Allen

@ChristopherA

…"limiting factors…On the lesser end, there is the minutia of knitting both layers together. More standards, more software, more maintenance, and possibly more legal situations are required to knit both layers together. "

8/31/2019, 1:47:58 PM

Favs: 1

Retweets: 0

Christopher Allen

@ChristopherA

…"On the greater end, it limits the types of applications that may be run on such an infrastructure, since any application/feat of coordination requiring significant liveness will not be able to run."

8/31/2019, 1:48:08 PM

Favs: 1

Retweets: 0

Christopher Allen

@ChristopherA

…"serious liabilities—that of credential revocation. If an identity provider makes a mistake, or receives new information and must adjust the status of a particular claim, if they have already signed and circulated a claim, how are they to revoke it?"

8/31/2019, 1:48:20 PM

Favs: 1

Retweets: 0

Christopher Allen

@ChristopherA

…"for every scenario mentioned, this would entail another round trip to the issuer to check if they indeed were authorized, which would defeat the entire point of the signing process. It seems that liveness is a desirable property when considering mutating permission systems."

8/31/2019, 1:48:30 PM

Favs: 1

Retweets: 0

Christopher Allen

@ChristopherA

…"A solution to those complexities would be to have an inherently networked computational fabric that would consolidate both functions required for self sovereign identity to work"

8/31/2019, 1:48:43 PM

Favs: 1

Retweets: 0

Christopher Allen

@ChristopherA

…"The Gravity protocol is a language based on lambda calculus, prototypes, object capabilities and message passing to create distributed applications. Gravity nodes are isolated runtime processes connected through cryptographic capabilities."

8/31/2019, 1:48:53 PM

Favs: 1

Retweets: 0

Christopher Allen

@ChristopherA

"Gravity applications are: Persistent…Private…Transactional…Distribute…Secure…Safe…Redundant…Portable…Reflective…Gravity enables the creation of a new generation of distributed and resilient applications that are inherently networked."

8/31/2019, 1:49:15 PM

Favs: 1

Retweets: 0

Christopher Allen

@ChristopherA

…This paper implies that there are aren't any fit-for-purpose blockchains, whereas both Sovrin & http://Veres.One are exactly that. However, he is correct that none that I know of do as broad range of cryptographic functions at layer one as he proposes.

8/31/2019, 1:49:52 PM

Favs: 1

Retweets: 0

Christopher Allen

@ChristopherA

…"DID Communication (DIDComm) is used as the messaging protocol between the OP and IW. DIDComm, is an emerging messaging protocol…This messaging protocol is used as the medium for the OP to communicate with the IW."

8/31/2019, 1:50:22 PM

Favs: 1

Retweets: 0

Christopher Allen

@ChristopherA

…"There are two main ways the interactions between the actors of VC-AuthN will be used. The UserAgent and IdentityWallet are co-located on the same device…The UserAgent and IdentityWallet are not co-located"

8/31/2019, 1:50:39 PM

Favs: 1

Retweets: 0

Christopher Allen

@ChristopherA

…"Because this specification defines extending a valid OP to include VC-AuthN support, integration with many existing IAM solutions can be added without any major additional work…an IAM system simply assumes the role of a RP to the VC-AuthN compatible OP."

8/31/2019, 1:50:51 PM

Favs: 1

Retweets: 0

Christopher Allen

@ChristopherA

…"Un-Answered questions: SIOP instead of DIDComm for the requests…Should the verifiable credential presentation…be a valid JSON-LD object…Should the pres_req_conf_id instead be a URN so the OP does not necessarily have to host the additional configuration API?…"

8/31/2019, 1:51:02 PM

Favs: 1

Retweets: 0

Christopher Allen

@ChristopherA

…"…Perhaps seperate things out so we have two specs, one for the RP <--> OP integration the other for AD <--> OP"

8/31/2019, 1:51:12 PM

Favs: 1

Retweets: 0

Christopher Allen

@ChristopherA

…I'm pleased to see these efforts to leverage existing legacy identity protocols for use with DIDs and Verifiable Credentials. This one is looking well thought out.

8/31/2019, 1:51:25 PM

Favs: 1

Retweets: 0

Christopher Allen

@ChristopherA

…"It is the opinion of the authors that in order to have an interoperable VC flow the question of how to request Credential data must be addressed. We believe that leaving the solution out of the standards will result in competing formats which will reduce interoperability."

8/31/2019, 1:51:50 PM

Favs: 1

Retweets: 0

Christopher Allen

@ChristopherA

…"A Proof Request is here defined as a document produced by a Verifier which lists the data criteria for a verification event."

8/31/2019, 1:52:05 PM

Favs: 1

Retweets: 0

Christopher Allen

@ChristopherA

…"Similarly, Proof Response is the proposed format with which to respond to a Proof Request. By having Proof Request as part of the VC specification, software agents can have a common understanding of the data being requested."

8/31/2019, 1:52:18 PM

Favs: 2

Retweets: 0

Christopher Allen

@ChristopherA

…"Since enterprise use cases are less concerned with Zero Knowledge Proofs, we feel that individually signing attributes on a VC is sufficient for selective disclosure. This has the advantage of simpler crypto which anyone can reason about."

8/31/2019, 1:52:29 PM

Favs: 2

Retweets: 0

Christopher Allen

@ChristopherA

…"This document does not currently address Zero Knowledge Proofs. A later version of this document will describe how a Verifier requests a predicate proof."

8/31/2019, 1:52:44 PM

Favs: 1

Retweets: 0

Christopher Allen

@ChristopherA

…"Drawbacks/Limitations: Verbose
Issuers is a limited subset of DIDs. We should also allow for a Proof from all members of Issuer trusted by X."

8/31/2019, 1:52:58 PM

Favs: 1

Retweets: 0

Christopher Allen

@ChristopherA

…"Unresolved Questions: We are aware of the projects mentioned in above in Prior Art. Of these, we know that Sovrin is using Proof Requests in live systems. We do not know of other formats currently being used by live or nearly live implementations of VC."

8/31/2019, 1:53:09 PM

Favs: 1

Retweets: 0

Christopher Allen

@ChristopherA

…This is the third proposal I've seen for requesting VCs — it looks like it is time for these teams to sit down and see if they can puzzle through and make a protocol that will work for all of them.

8/31/2019, 1:53:20 PM

Favs: 1

Retweets: 0

Christopher Allen

@ChristopherA

…"A challenge often faced here was that partners were interested in different technologies. That is why we designed the universal ledger agent…We have a plugin for an ERC-780 contract on Ethereum, W3C verifiable credentials on Ethereum and a Sovrin plugin."

8/31/2019, 1:54:01 PM

Favs: 1

Retweets: 0

Christopher Allen

@ChristopherA

…"In the Netherlands, an income test is required in order to apply for social housing…we focused on a solution using self-sovereign identity, blockchain and zero knowledge proofs. Our main focus points were a customer centric approach and data minimalization."

8/31/2019, 1:54:22 PM

Favs: 1

Retweets: 0

Christopher Allen

@ChristopherA

…"The proof of concept covers the following process… Social housing corporation sends the income test to the identity wallet. User authenticates at government using DigID, an authentication method for Dutch residents for governmental websites…"

8/31/2019, 1:54:49 PM

Favs: 2

Retweets: 0

Christopher Allen

@ChristopherA

…"…The government offers an income statement to the identity wallet in the form of a W3C verifiable credential. A decentralized identifier (DID) is published to the blockchain
An answer to the income test is generated in the identity wallet using a zero-knowledge proof…"

8/31/2019, 1:55:13 PM

Favs: 1

Retweets: 0

Christopher Allen

@ChristopherA

…"…A cryptographically signed yes or no is shared with the housing corporation. The social housing corporation verifies proof and correctness in the blockchain"

8/31/2019, 1:55:28 PM

Favs: 1

Retweets: 0

Christopher Allen

@ChristopherA

…Last spring's Robobank demo at #RWOT8 in Barcelona got a lot of applause for its real world practice combined with real SSI architecture. A highlight in this paper was discussion of use of multiple DID methods, a critical challenge that few of us have made sufficient priority.

8/31/2019, 1:57:44 PM

Favs: 1

Retweets: 0

Christopher Allen

@ChristopherA

…"In order to promote scale with resilience, legibility with ephemerality, and transitivity with context, we begin by investigating how identity, trust, and reputation function at intimate scale and under organic constraints."

8/31/2019, 1:58:17 PM

Favs: 1

Retweets: 0

Christopher Allen

@ChristopherA

…"Identity is a function. An identity signifies, among other things, a specific behavioral function. Given these inputs, what are the outputs? When this happens, how will this individual react?"

8/31/2019, 1:58:29 PM

Favs: 1

Retweets: 0

Christopher Allen

@ChristopherA

…"Trust is a degree of certainty. Trust is the subjective certainty that an entity will behave predictably in response to specific circumstance…This certainty is cultivated through repeated interactions"

8/31/2019, 1:59:02 PM

Favs: 2

Retweets: 0

Christopher Allen

@ChristopherA

…"Reputation is a prediction. Reputation is a prediction of how an entity will behave. Reputation systems, therefor, are designed to foster trust where there is no prior data…"

8/31/2019, 1:59:25 PM

Favs: 2

Retweets: 0

Christopher Allen

@ChristopherA

…"…When participants in a system have some supplemental certainty of predictable interactions, they will tolerate larger risks and form larger structures in less time."

8/31/2019, 1:59:38 PM

Favs: 1

Retweets: 0

Christopher Allen

@ChristopherA

…"Identity is quantum. Identities are neither fixed nor independent…an entity changes both with time and within time, which is why the authors of Identity Crisis characterize identities as 'emergent phenomenon'"

8/31/2019, 1:59:50 PM

Favs: 1

Retweets: 0

Christopher Allen

@ChristopherA

…"Risks: Gaming…Falsification…Sybil Attack…Miscorrelation…Self-Fulfilling Prophecy"

8/31/2019, 2:00:02 PM

Favs: 1

Retweets: 0

Christopher Allen

@ChristopherA

…"Goal…Legibility…generate highly-legible reputation, like a credit score or product rating, while mitigating the risks of decontextualization such as gaming and falsification."

8/31/2019, 2:00:22 PM

Favs: 1

Retweets: 0

Christopher Allen

@ChristopherA

…"Goal…Transitivity…promote reputation transitivity while mitigating risks such as context collapse, miscorrelation, self-fulfilling prophesy, and high-velocity spirals."

8/31/2019, 2:00:35 PM

Favs: 1

Retweets: 0

Christopher Allen

@ChristopherA

…"Heresay operates as a distributed, fuzzy prediction market for reputation claims. Below, we outline the system in broad strokes."

8/31/2019, 2:00:51 PM

Favs: 2

Retweets: 0

Christopher Allen

@ChristopherA

That is all for tonight, just a few more papers to summarize tomorrow. Then onward to #RWOT9 for the real work of collaboration to advance our advocacy for human-rights centric digital identity.

8/31/2019, 2:08:48 PM

Favs: 3

Retweets: 0