Last Update 1:43 AM December 04, 2021 (UTC)

Company Feeds | Identosphere Blogcatcher

Brought to you by Identity Woman and Infominer.
Support this collaboration on Patreon!

Friday, 03. December 2021

FindBiometrics

Year in Review: Can Biometric Fingerprint Recognition Reclaim Its Position?

FindBiometrics Year in Review Survey for 2021 is now open, collecting responses from biometrics professionals and industry watchers in order to gain valuable insights into the most important trends in […] The post Year in Review: Can Biometric Fingerprint Recognition Reclaim Its Position? appeared first on FindBiometrics.

FindBiometrics Year in Review Survey for 2021 is now open, collecting responses from biometrics professionals and industry watchers in order to gain valuable insights into the most important trends in the space. There will be keen interest in a number of specific areas, with industry sentiment over fingerprint biometrics looking to be among the most intriguing.

Fingerprint biometrics was the modality that drove the mobile biometrics revolution over the past decade, with fingerprint sensors proliferating across smartphone models from various brands in the wake of Apple’s fingerprint-scanning iPhone launched in 2013. But while fingerprint sensors remain a fixture in contemporary smartphones, facial recognition has stolen much of the spotlight in recent years.

With its surging popularity for smartphone authentication and its increasing use in areas like passenger screening at airports, face biometrics has consistently been ranked as the top modality in FindBiometrics’ most recent Year in Review surveys. That having been said, fingerprint recognition has consistently ranked second – until the pandemic hit, that is.

During the first half of the pandemic, concerns about the transmissibility of COVID-19 through touching shared surfaces prompted many organizations to abandon their use of fingerprint scanning for things like access control and time and attendance tracking. Accordingly, the fingerprint modality was knocked into third place in 2020’s Year in Review, having been usurped by iris recognition – which, like facial recognition, is contactless.

A year later, there is much less concern about the transmissibility of COVID-19 through shared surfaces as a growing body of evidence has made it clear that airborne transmission is the primary vector. Meanwhile, enthusiasm about biometric payment cards has been on the rise, with 2021 having delivered some of the first major commercial launches of fingerprint-scanning credit cards. And in the mobile sector, in-display fingerprint sensors have become more commonplace as well (though not always to the benefit of end users). Could fingerprint recognition reclaim its position as the second-most popular modality? The results are still coming in – be sure to input your two cents, if you haven’t already.

Take the FindBiometrics Year in Review Survey Now: - Step 1 of 4 Which of the following areas of application for biometrics has been the most interesting to you in 2021? Financial services and payments Consumer device access Healthcare (including immunity passports) Enterprise (including remote work) Law Enforcement Border Control (including airports) Citizen ID (including mobile ID) Retail From your perspective, which biometric modalities have shown the strongest momentum in 2021? Please select your top three choices. Fingerprint Face Iris Voice Vein pattern Physiological (heart rate, brain activity, etc.) Behavioral Multimodal (solutions that leverage two or more biometric modalities) Which emerging application area do you believe will deliver the most growth for biometrics in the next five years? Biometric payment cards Mobile ID Biometric payments Automotive biometrics What is the biggest obstacle facing the biometrics industry? Privacy concerns Regulatory efforts Media scrutiny Unethical activity by vendors and clients When considering a new smartphone purchase, what is your personal preferred unlock method? Fingerprint sensor (rear mounted or side mounted) Fingerprint sensor (in-display or in home button) Face unlock Voice unlock PIN/passcode I keep my phone unlocked I have no preference Next By which of the following dates do you believe biometrics will have replaced the password as the primary method of user authentication online? 2022 2025 2027 After 2027 The password is already dead. Never. The security of the future will combine passwords and other strong authentication methods like biometrics. By which of the following dates will identity management standards require binding a biometric template to a true legal identity? 2023 2025 2027 After 2027 Never. I don’t believe identity management standards will ever require binding a biometric template to a true legal identity. What is your most common use case for biometric authentication in day-to-day life? Mobile payment authorization (ie. Apple Pay, Samsung Pay, Google Pay, etc.) Mobile banking app login Unlocking a smartphone Interacting with a biometric eGate or kiosk at the airport Logging in to a workstation at the office Logging in to a virtual workstation from home Have you used biometric onboarding to open a new account remotely? Yes, several times Yes, a few times Yes, once I have never used biometric remote onboarding technology How confident are you that your organization meets the applicable KYC (Know Your Customer) and AML (Anti-Money Laundering) regulations? Very confident Somewhat confident Not confident KYC and AML regulations do not apply to my organization Are you part of a biometrics-enabled expedited traveler screening program (ie. CLEAR, PreCheck, Nexus, etc.)? Yes No, but I intend to register No, and I don't intend to register Approximately how many virtual conferences with biometrics-related content have you attended in the past 12 months? More than five 5 4 3 2 1 0 Next Properly educating the public about the difference between biometric authentication and biometric surveillance is important for the future of the industry. Strongly agree Agree Disagree Strongly disagree I am comfortable with the government's use of biometrics in the country where I live. Strongly agree Agree Disagree Strongly disagree I value digital business processes for improved customer experience, like payment, digital media, or paper based tasks, and typically opt to participate when opportunities are presented. Strongly agree Agree Disagree Strongly disagree Privacy regulations like CCPA, BIPA and GDPR help to make consumers feel comfortable enrolling in biometric systems. Strongly agree Agree Disagree Strongly disagree The coronavirus pandemic has made me wary of using fingerprint biometrics. Strongly agree Agree Disagree Strongly disagree I am more likely to enter a public building if a wellness screening solution – such as fever detection, wellness declaration, or immunity passport – is required for access. Strongly agree Agree Disagree Strongly disagree When using biometrics in banking and financial services, I prefer a completely frictionless experience. Strongly agree Agree Disagree Strongly disagree Industry cooperation through partnerships and alliances is crucial in fuelling the biometrics industry’s growth. Strongly agree Agree Disagree Strongly disagree Improved liveness detection should be a priority for the consumer facing biometrics industry. Strongly agree Agree Disagree Strongly disagree Deepfake technology poses a serious threat to the security of facial recognition systems. Strongly agree Agree Disagree Strongly disagree Third party testing is critical to ensuring trust in biometric technology. Strongly agree Agree Disagree Strongly disagree With respect to biometrics and digital identity, privacy is a fundamental right. Strongly agree Agree Disagree Strongly disagree Biometrics are a controversial technology. Strongly agree Agree Disagree Strongly disagree Next Name * First Last Work Email Address * Title Company Country *Please Select Your CountryAfghanistanAlbaniaAlgeriaAmerican SamoaAndorraAngolaAnguillaAntarcticaAntigua and BarbudaArgentinaArmeniaArubaAustraliaAustriaAzerbaijanBahamasBahrainBangladeshBarbadosBelarusBelgiumBelizeBeninBermudaBhutanBolivia (Plurinational State of)Bonaire, Saint Eustatius and SabaBosnia and HerzegovinaBotswanaBouvet IslandBrazilBritish Indian Ocean TerritoryBrunei DarussalamBulgariaBurkina FasoBurundiCabo VerdeCambodiaCameroonCanadaCayman IslandsCentral African RepublicChadChileChinaChristmas IslandCocos (Keeling) IslandsColombiaComorosCongoCongo (Democratic Republic of the)Cook IslandsCosta RicaCroatiaCubaCuraçaoCyprusCzech RepublicCôte d'IvoireDenmarkDjiboutiDominicaDominican RepublicEcuadorEgyptEl SalvadorEquatorial GuineaEritreaEstoniaEswatini (Kingdom of)EthiopiaFalkland Islands (Malvinas)Faroe IslandsFijiFinlandFranceFrench GuianaFrench PolynesiaFrench Southern TerritoriesGabonGambiaGeorgiaGermanyGhanaGibraltarGreeceGreenlandGrenadaGuadeloupeGuamGuatemalaGuernseyGuineaGuinea-BissauGuyanaHaitiHeard Island and McDonald IslandsHondurasHong KongHungaryIcelandIndiaIndonesiaIran (Islamic Republic of)IraqIreland (Republic of)Isle of ManIsraelItalyJamaicaJapanJerseyJordanKazakhstanKenyaKiribatiKorea (Democratic People's Republic of)Korea (Republic of)KosovoKuwaitKyrgyzstanLao People's Democratic RepublicLatviaLebanonLesothoLiberiaLibyaLiechtensteinLithuaniaLuxembourgMacaoMadagascarMalawiMalaysiaMaldivesMaliMaltaMarshall IslandsMartiniqueMauritaniaMauritiusMayotteMexicoMicronesia (Federated States of)Moldova (Republic of)MonacoMongoliaMontenegroMontserratMoroccoMozambiqueMyanmarNamibiaNauruNepalNetherlandsNew CaledoniaNew ZealandNicaraguaNigerNigeriaNiueNorfolk IslandNorth Macedonia (Republic of)Northern Mariana IslandsNorwayOmanPakistanPalauPalestine (State of)PanamaPapua New GuineaParaguayPeruPhilippinesPitcairnPolandPortugalPuerto RicoQatarRomaniaRussian FederationRwandaRéunionSaint BarthélemySaint Helena, Ascension and Tristan da CunhaSaint Kitts and NevisSaint LuciaSaint Martin (French part)Saint Pierre and MiquelonSaint Vincent and the GrenadinesSamoaSan MarinoSao Tome and PrincipeSaudi ArabiaSenegalSerbiaSeychellesSierra LeoneSingaporeSint Maarten (Dutch part)SlovakiaSloveniaSolomon IslandsSomaliaSouth AfricaSouth Georgia and the South Sandwich IslandsSouth SudanSpainSri LankaSudanSurinameSvalbard and Jan MayenSwedenSwitzerlandSyrian Arab RepublicTaiwan, Province of ChinaTajikistanTanzania (United Republic of)ThailandTimor-LesteTogoTokelauTongaTrinidad and TobagoTunisiaTurkeyTurkmenistanTurks and Caicos IslandsTuvaluUgandaUkraineUnited Arab EmiratesUnited Kingdom of Great Britain and Northern IrelandUnited States Minor Outlying IslandsUnited States of AmericaUruguayUzbekistanVanuatuVatican City StateVenezuela (Bolivarian Republic of)VietnamVirgin Islands (British)Virgin Islands (U.S.)Wallis and FutunaWestern SaharaYemenZambiaZimbabweÅland Islands State *AlabamaAlaskaArizonaArkansasCaliforniaColoradoConnecticutDelawareDistrict of ColumbiaFloridaGeorgiaHawaiiIdahoIllinoisIndianaIowaKansasKentuckyLouisianaMaineMarylandMassachusettsMichiganMinnesotaMississippiMissouriMontanaNebraskaNevadaNew HampshireNew JerseyNew MexicoNew YorkNorth CarolinaNorth DakotaOhioOklahomaOregonPennsylvaniaRhode IslandSouth CarolinaSouth DakotaTennesseeTexasUtahVermontVirginiaWashingtonWest VirginiaWisconsinWyoming Province/Territory *AlbertaBritish ColumbiaManitobaNew BrunswickNewfoundland and LabradorNorthwest TerritoriesNova ScotiaNunavutOntarioPrince Edward IslandQuebecSaskatchewanYukon Zip/Postal Code * Phone What is your purchasing authority? (Select all that apply) I am a decision maker I am an influencer I specify or recommend products for purchase None Is your organization evaluating biometrics and identity technologies? We are actively looking for biometrics and identity solutions We are open to evaluating biometrics and identity solutions in the future Our organization has already deployed some biometrics and identity solutions Biometrics are not a fit at my organization Would you like a free, early-bird reservation to the 2022 line-up of FindBiometrics Virtual Events? (Select all that apply) Sign me up for the FindBiometrics Year in Review event on February 16, 2022. Sign me up for the FindBiometrics Travel & Hospitality event on May 18, 2022. Sign me up for the FindBiometrics Financial Services event on September 28, 2022. Sign me up for the FindBiometrics Enterprise Security event on December 14, 2022. No thanks, I do not want free access to the 2022 FindBiometrics Virtual Events. Join FindBiometrics throughout 2022 for our full-day virtual events, planned around the hottest identity verticals, featuring renowned industry experts in engaging and dynamic sessions, interactive panels, and dedicated virtual expo hall time.

We appreciate your participation in this survey! By submitting your information, you consent to share contact details with FindBiometrics (part of the ChannelPro Network, a division of EH Media, LLC.) and the survey sponsors, who may want to follow up with you via email or telephone to provide relevant news and special offers. You will be able to easily opt out any time.

The sponsors of this survey may want to follow up with you via email or telephone to provide relevant news and special offers. May we share your information with this survey's sponsors? * Yes, the information I am providing may be shared with the sponsors. I know I can opt out any time. No, I do not want the information I am providing to be shared with the sponsors. FindBiometrics is your source for the latest news from the global biometric and identity management business community, interviews with industry leaders, exclusive videos, links to biometric associations, and a calendar for the most important and current industry events and conferences. Would you like to receive email updates from FindBiometrics in your inbox? * Yes, I would like to receive FindBiometrics email updates on the latest news, event information, and special offers from select partners in my inbox. No, I do not want to receive emails providing the latest news, event information, and special offers from FindBiometrics.

FindBiometrics is part of the ChannelPro Network, a division of EH Media LLC, a leading U.S. business-to-business media company and conference producer.
20 Speen Street, Suite 403, Framingham, MA 01701
[Privacy Policy | CCPA | Contact Us]

Submit

The 19th Annual FindBiometrics Year in Review Survey is sponsored by:

More sponsors to be announced!

Dec. 3, 2021 – by Alex Perala

The post Year in Review: Can Biometric Fingerprint Recognition Reclaim Its Position? appeared first on FindBiometrics.


iDenfy Solution Can Now Read Biometric Data From ePassport, Smart Card Chips

iDenfy continues to enhance its identity verification platform. The Lithuania-based company has announced a new NFC tool to further enhance the platform’s identity document-reading capabilities. The new capability means that […] The post iDenfy Solution Can Now Read Biometric Data From ePassport, Smart Card Chips appeared first on FindBiometrics.

iDenfy continues to enhance its identity verification platform. The Lithuania-based company has announced a new NFC tool to further enhance the platform’s identity document-reading capabilities.

The new capability means that an NFC-enabled smartphone can be used to read data from a chip embedded in an ePassport or smart ID card. That can include personal information as well as biometric data stored in the chip.

Effectively, this means that iDenfy’s solution now supports all identity documents adhering to the global ICAO 9303 standard.

iDenfy’s platform is primarily based on facial recognition technology, which is used to compare an end user’s selfie image to pictures of their official IDs. With the new NFC capability, iDenfy says it can match biometric data extracted from a chip to a video selfie in order to detect potential fraud; and it can also match a chip’s Document Signer Certificate to a Country Signing certificate authority to ensure trust in the chip’s data.

“Near field communication technology opens new possibilities for businesses to deploy customs grade security to identify customers and keep the user experience intact during this crucial onboarding process,” commented iDenfy CEO Domantas Ciulde.

The NFC upgrade caps off a busy month of enhancements to iDenfy’s identity verification platform. November brought announcements about the integration of data from utilities records thanks to a partnership with Urjanet; the introduction of a risk scoring tool that assesses metrics like IP address and device data; and a new “Magic Link” system designed to help organizations to easily integrate iDenfy identity verification services, announced just this week.

This flurry of innovation helps to illustrate why iDenfy was selected to receive a Baltic Innovation Prize, a recognition that was bestowed by the Baltic Assembly earlier this month.

iDenfy says its new NFC capability is available on Android and iOS devices supporting NFC, starting with iOS 13 on Apple devices.

(Originally posted on Mobile ID World)

The post iDenfy Solution Can Now Read Biometric Data From ePassport, Smart Card Chips appeared first on FindBiometrics.


Shufti Pro to Provide Biometric Onboarding Tech for Opal

Opal is teaming up with Shufti Pro to mitigate the threat of fraud for its clients. The company provides businesses with a slew of financial and payment services, and will […] The post Shufti Pro to Provide Biometric Onboarding Tech for Opal appeared first on FindBiometrics.

Opal is teaming up with Shufti Pro to mitigate the threat of fraud for its clients. The company provides businesses with a slew of financial and payment services, and will now be adding Shufti Pro’s identity verification (IDV) technology to its portfolio to enable a fast and secure customer onboarding procedure.

Shufti Pro’s platform uses face and document recognition to match someone’s face to the image on a photo ID. Thanks to the new partnership, businesses that use Opal’s service will be able to register new customers remotely, through a simple process that asks people to take a selfie and picture of their ID. The Shufti Pro solution is compliant with various Know Your Customer (KYC) and Anti-Money Laundering (AML) regulations, which in turn helps guard against identity theft and prevent terrorist financing and other financial crimes.

Opal’s platform is geared primarily toward businesses that operate internationally. Its portfolio of financial services includes everything from cross-border payments and multicurrency accounts to a suite of financing and credit solutions.

“International businesses bring complexity when it comes to KYC,” said Opal CEO and Co-founder Lim Ming Wang. “Shufti Pro helps us ensure our customers experience a fuss-free experience at the onboarding stage. It set us up to provide our customers with additional positive experiences when they perform transactions with us.”

“Businesses like Opal that are committed to assisting SMEs in expediting business growth need IDV solutions to fulfill their business goals,” added Shufti Pro CEO Victor Fredung. “Our automated solution will enable Opal to mitigate identity frauds that often occur with fast-growing businesses.”

The news extends Shufti Pro’s string of success in the past few months. The company has signed five new clients in November alone, with Opal joining a list that already includes Vengo, Birka, Morpho Labs, and 99Starz. The company also formed a reseller arrangement with Open Systems Technologies at the tail end of October.

(Originally posted on Mobile ID World)

The post Shufti Pro to Provide Biometric Onboarding Tech for Opal appeared first on FindBiometrics.


Deloitte Anticipates More AI Regulations in 2022

Deloitte is gazing into its crystal ball with the release of its Technology, Media & Telecommunications (TMT) 2022 Predictions report. The TMT report details what Deloitte believes are likely to […] The post Deloitte Anticipates More AI Regulations in 2022 appeared first on FindBiometrics.

Deloitte is gazing into its crystal ball with the release of its Technology, Media & Telecommunications (TMT) 2022 Predictions report. The TMT report details what Deloitte believes are likely to be the biggest trends in the tech industry in the coming year, covering everything from hiring policies to consumer electronics.

The biggest takeaway may be Deloitte’s breakdown of the AI regulatory environment. Many jurisdictions (including the European Union) have introduced bills that would regulate various AI technologies, and some have even considered wholesale bans of select AI applications, such as facial recognition in public spaces. Deloitte is not expecting most of those bills to become law until 2023, but does believe 2022 will lay the groundwork for that legislation. In that regard, the company suggested that the discussion of AI regulation will intensify in the coming year.

The increased use of Al will also generate more interest in technologies that can protect the data that is used in AI applications. Deloitte placed a particular emphasis on homomorphic encryption and federated learning solutions, arguing that the market for the two technologies will exceed $250 million by the end of 2022, on its way to $500 million in 2025.

“AI has tremendous promise, but we’re likely to see more scrutiny in 2022 as regulators look to better understand the privacy and data security implications of emerging AI applications, and implement strategies to protect consumers,” said Deloitte Vice Chair Paul Silverglate. “What’s needed is a holistic approach to address ethical responsibility; companies that take this approach can expect greater acceptance, more trust and increased revenue.”

In other news, Deloitte argued that COVID-19 will continue to drive digital transformation all over the world. That will create an increased demand for connected devices, which will in turn be responsible for an anticipated chip shortage as equipment manufacturers struggle to keep pace. However, Deloitte suggested that the chip shortage will not be as bad in 2022 as it was in 2021, and that some types of chips may be more readily available than others.

Wi-Fi 6 devices are expected to outsell 5G devices in 2022, with the mobile tech industry shipping 2.5 billion of the former and only 1.5 billion of the latter in the next 12 months. Deloitte also believes that the smartphone industry will take steps to make mobile communication more sustainable, primarily by offering better app support for older handsets to extend the lifespan of those devices.

December 3, 2021 – by Eric Weiss

The post Deloitte Anticipates More AI Regulations in 2022 appeared first on FindBiometrics.


Clearview AI Could Face £17 Million Fine for Privacy Violations in the UK

The UK Information Commissioner’s Office (ICO) issued a preliminary decision in its investigation of Clearview AI. The ICO conducted its investigation in collaboration with the Office of the Australian Information […] The post Clearview AI Could Face £17 Million Fine for Privacy Violations in the UK appeared first on FindBiometrics.

The UK Information Commissioner’s Office (ICO) issued a preliminary decision in its investigation of Clearview AI. The ICO conducted its investigation in collaboration with the Office of the Australian Information Commissioner (OAIC), which issued its own decision earlier in the month.

At this stage, both the ICO and the OAIC have determined that Clearview’s biometric data collection practices violate their respective countries’ privacy laws. However, the ICO ruling could potentially carry a much stiffer financial penalty. The OAIC has ordered Clearview to cease its collection of biometric data in the country, and to delete any images of Australian citizens in its possession. The ICO will likely do the same for citizens in the UK, and plans to supplement that with a fine of slightly more than £17 million.

If it goes through, this would be the first time that Clearview has faced concrete financial repercussions for its many violations of international privacy law. A group of Canadian privacy commissioners ruled against the company in February, but that decision was comparable to that of the OAIC in terms of financial consequences.

The ICO decision is still provisional because Clearview has an opportunity to respond to the allegations. That response could change the ICO’s decision, or affect the size and scope of the potential penalties. The agency’s final decision is expected sometime in mid-2022.

Until then, the ICO did provide more details about what Clearview did wrong. The agency noted that the company’s database, which now includes more than 10 billion images, likely includes many images of UK civilians. Those images were pulled primarily from social media platforms, and usually without the knowledge of the people depicted in the photos.

As a result, the ICO determined that Clearview violated UK privacy law on several fronts. Most notably, Clearview did not have any lawful reason to collect people’s personal information. It then proceeded to process that information in a way that people would not ordinarily expect, and while failing to inform people about its use of private data. Clearview also failed to comply with the stricter GDPR laws for the handling of biometric data, and did not seem to have any plans to stop using or delete any of the information it collected.

Clearview has stopped offering services in the UK, but has previously offered free facial recognition trials to British law enforcement agencies. The company brought in $30 million in a round of Series B funding in July, though a £17 million judgement could effectively wipe out that entire sum. In the meantime, Clearview is facing separate privacy complaints in Europe.

December 3, 2021 – by Eric Weiss

The post Clearview AI Could Face £17 Million Fine for Privacy Violations in the UK appeared first on FindBiometrics.


Illegal SIM Cards Raise Concerns About Pakistan’s Biometric Register

Pakistan’s Federal Investigation Agency (FIA) has raised concerns about the country’s biometric database. However, there is some confusion as to the nature of the issue. The biometric database is maintained […] The post Illegal SIM Cards Raise Concerns About Pakistan’s Biometric Register appeared first on FindBiometrics.

Pakistan’s Federal Investigation Agency (FIA) has raised concerns about the country’s biometric database. However, there is some confusion as to the nature of the issue. The biometric database is maintained by the National Database and Registration Authority (NADRA), which has reported that its database is secure.

The FIA, on the other hand, told a National Assembly panel that the database had been hacked, and that the biometric data in it had been compromised. The agency has since revised that statement, while NADRA has asked the FIA to clarify its “wrong statement.”

The crux of the issue seems to stem from the ready availability of illegal SIM cards in Pakistan, and a vulnerability in the SIM verification process. Pakistan currently asks people to provide their fingerprints when registering for a SIM card. Fraudsters have managed to get their hands on the fingerprint data of real (and unknowing) victims, primarily through schemes that have targeted women and the elderly. The fraudsters have then used those fingerprint images to create silicone prints that are sophisticated enough to spoof the country’s registration system.

The silicone prints allow the fraudsters to obtain illegal SIM cards, which can in turn be used to perpetrate a range of other cybercrimes. The FIA recently seized 13,000 illegal SIMs during a raid in Faisalabad, and its cybercrime wing has received roughly 89,000 complaints from those who believe their data has been compromised. Even that does not capture the full scope of the problem. The Pakistan Telecommunications Authority (PTA) reported that 175,000 illegal SIM cards have been deactivated since November of 2020, while two mobile phone operators have received fines of Rs100 million and Rs50 million for failing to do their due customer diligence when issuing cards.

The PTA went on to state that more than half a million cards were shut down following a customer complaint, and that the sale of illegal SIMs is down 600 percent in the past year alone. It also suggested that mobile operators are planning to roll out a new liveness detection system that can thwart silicone spoofs. The FIA, meanwhile, claimed that it lacks the staff to address the full scope of the problem. The agency has 162 investigators tasked with resolving cybercrime complaints.

If the NADRA system has been compromised, it would likely make the public more wary of biometric databases, especially after Afghanistan’s biometric hardware was captured by the Taliban. Some members of the Pakistan National Assembly have argued that the country should implement stronger data protection and privacy laws. NADRA launched a mobile national ID app in September, while the country itself has previously used biometrics to distribute welfare, and to facilitate other social assistance programs.

Sources: The Nation, The Express Tribune

(Originally posted on Mobile ID World)

The post Illegal SIM Cards Raise Concerns About Pakistan’s Biometric Register appeared first on FindBiometrics.


Bloom

Bloom Integrates with Plaid to Enable Verifiable Credentials

Bloom recently launched OnRamp, a new DeFi-focused product that helps enterprises with KYC & AML compliance as well as enabling risk assessment via traditional and alternative financial data, all while preserving user privacy. By enabling access to reusable, verifiable credentials for ID verification, sanction screening, and PEP screening, as well

Bloom recently launched OnRamp, a new DeFi-focused product that helps enterprises with KYC & AML compliance as well as enabling risk assessment via traditional and alternative financial data, all while preserving user privacy. By enabling access to reusable, verifiable credentials for ID verification, sanction screening, and PEP screening, as well as other identity data such as phone number, email, and social accounts, OnRamp is a key piece for DeFi companies facing increased regulatory efforts.

Bloom Meets Plaid

Bloom is excited to announce an integration with Plaid, a data network that powers the digital financial ecosystem. The Plaid integration gives Bloom the ability to offer consumer-permissioned, traditional financial data for better risk assessment through OnRamp.

With OnRamp, enterprises can prioritize user privacy while still working towards compliance requirements. Bloom uses Plaid so that consumers can link  their bank accounts to verify their account information, all while keeping their information private, even from Bloom.   The Plaid integration provides users with the option to securely permission and confirm information used in enabling risk assessment by connecting their financial accounts.

In addition to bank balance data, the Bloom-Plaid integration opens the door to exciting future integrations, including salary verification. The opportunity for OnRamp to incorporate alternative signals like bank account balance and salary can not only expand financial inclusion, but they may, in fact, be more reliable indicators for creditworthiness than traditional metrics. Stay tuned for more updates on how Bloom is unlocking the full power of DeFi!

About OnRamp

Bloom plans for OnRamp to be a key piece of infrastructure for DeFi companies, whether they are in launch or growth mode. The developer-friendly application includes no integration fees, no monthly minimums, no long term contracts, and flexible pricing. OnRamp reduces the barrier to entry for new builders, allows growing companies to expand, and most importantly, opens the door a bit wider for those who deserve access to the decentralized finance markets. Beyond achieving compliance, the use of reusable, verifiable credentials will help DeFi companies enable risk assessment, transcending the collateralized lending structure that has limited growth in the sector up to this point. OnRamp offers reusable, verifiable credentials (VCs) for bank account activity, balances and other financial signals.


Coinfirm

[Webinar Replay] Centralised vs Decentralised Exchanges | DeFi Live

Watch the replay of the DeFi Live panel ‘Centralised vs Decentralized Exchanges’ with leading experts on crypto asset exchanges. Panelists; Tim Aron, Barrister at Minerva Chambers Timo Lehes, Co-Founder at Swam Markets Graham Rodford, CEO at Archax Moderator: Sachin Dutta, CMO at Coinfirm Date: November 10th 2021
Watch the replay of the DeFi Live panel ‘Centralised vs Decentralized Exchanges’ with leading experts on crypto asset exchanges. Panelists; Tim Aron, Barrister at Minerva Chambers Timo Lehes, Co-Founder at Swam Markets Graham Rodford, CEO at Archax Moderator: Sachin Dutta, CMO at Coinfirm Date: November 10th 2021

[Webinar Replay] How Digital Rights are Lost in Crypto | DeFi Live

Watch the replay of the webinar ‘How Digital Rights in Crypto are Lost’, a DeFi Live panel with leading experts on crypto crime. Panelists: Sachin Dutta, CMO of Coinfirm Erica Stanford, Founder of Crypto Curry Club Mat Stanley, Detective Sergeant at the Metropolitan Police Date: November 10th 2021
Watch the replay of the webinar ‘How Digital Rights in Crypto are Lost’, a DeFi Live panel with leading experts on crypto crime. Panelists: Sachin Dutta, CMO of Coinfirm Erica Stanford, Founder of Crypto Curry Club Mat Stanley, Detective Sergeant at the Metropolitan Police Date: November 10th 2021

Thursday, 02. December 2021

KuppingerCole

Urgent Need to Protect the Most Critical Business Assets: Data & People

Data is widely considered the “new oil" because data has great value and provides direct and secondary revenue streams. But, also like oil, data can leak from organizations that depend on it. Therefore, data security and the prevention of data leakage is imperative for business as well as regulatory compliance reasons.

Data is widely considered the “new oil" because data has great value and provides direct and secondary revenue streams. But, also like oil, data can leak from organizations that depend on it. Therefore, data security and the prevention of data leakage is imperative for business as well as regulatory compliance reasons.




FindBiometrics

BIO-key Delivers PortalGuard for Grand Rapids Community College

Another academic institution is using BIO-key’s PortalGuard IAM solution to simplify its access control operations. Grand Rapids Community College (GRCC) operates several campuses in western Michigan, and cited PortalGuard’s scalability, […] The post BIO-key Delivers PortalGuard for Grand Rapids Community College appeared first on FindBiometrics.

Another academic institution is using BIO-key’s PortalGuard IAM solution to simplify its access control operations. Grand Rapids Community College (GRCC) operates several campuses in western Michigan, and cited PortalGuard’s scalability, versatility, and ease of use as primary factors in its decision.

In that regard, GRCC noted that PortalGuard is compliant with the relevant security standards, and can handle logins for a user base of more than 400,000 individuals. The solution offers a simple onboarding process for new users, and will allow faculty and staff to gain remote access to multiple applications with a single login once they have been registered.

PortalGuard is able to do that without compromising on security. The platform enables multi-factor authentication (including biometric authentication), and is robust enough to guard against brute force attacks. It also provides coverage for people accessing applications like PeopleSoft and Blackboard while they are not on campus. GRCC is using PortalGuard to replace its previous Single Sign-On (SSO) solution.

“Organizations require a comprehensive IAM solution that will reduce risk, accelerate digital transformation, and free up IT staff to focus on core business initiatives,” said BIO-key President Mark Cochran. “Our customers are utilizing PortalGuard to strengthen security by eliminating risky password management practices and applying advanced adaptive authentication technology to reduce vulnerabilities and attack surfaces.”

GRCC is now one of the many academic institutions that has turned to BIO-key for identity services. The company outfitted Oklahoma Wesleyan University with the PortalGuard platform in early November, and it has previously done the same for the University of Denver, Rio Hondo College, and Barstow Community College, amongst several others.

BIO-key also showcased PortalGuard at the EDUCASE 2021 Conference in October. That, coupled with the GRCC news, suggests that the educational sector will continue to be a key part of the company’s growth strategy as it looks to build on its recent PortalGuard success.

December 2, 2021 – by Eric Weiss      

The post BIO-key Delivers PortalGuard for Grand Rapids Community College appeared first on FindBiometrics.


SFIO Partnership to Bring NeuroSky’s Biosensor Wearables to New Markets

NeuroSky, a Silicon Valley-based firm known for its development of brain-computer interface technology, will extend its global reach thanks to a new partnership with SFIO (“Starfleet Innotech”). The companies’ new […] The post SFIO Partnership to Bring NeuroSky’s Biosensor Wearables to New Markets appeared first on FindBiometrics.

NeuroSky, a Silicon Valley-based firm known for its development of brain-computer interface technology, will extend its global reach thanks to a new partnership with SFIO (“Starfleet Innotech”).

The companies’ new agreement grants SFIO exclusive rights to sell NeuroSky’s products in New Zealand and the United Arab Emirates, as well as non-exclusive distribution rights in the United States, Malaysia, Singapore, Thailand, and “other countries yet to be determined,” according to a statement announcing the partnership.

NeuroSky has garnered attention through its headsets equipped with EEG biosensors that are designed to essentially detect the wearer’s brainwaves. But the company also offers a number of other wearable products equipped with ECG sensors, such as wristbands and watches, that can track other health-related physiological metrics.

SFIO says it will initially rollout NeuroSky products in retirement communities, marketing them as solutions to track users’ wellbeing and alert medical professionals in emergency situations. SFIO aims to sell at least 100,000 units within the first eighteen months of the initial rollout, generating somewhere between $10 and $15 million in revenues.

More broadly, SFIO will market NeuroSky’s various wearables across multiple industries, including construction, education, and healthcare, “asa quantitative way to ensure community health in a post-pandemic world, focusing on the communities that have proven to be most vulnerable to communicable diseases,” the company explained.

Beyond that, SFIO plans to launch its own health-tracking wearables brand based on a collaboration between its software development teams and the engineers and developers at NeuroSky.

The distribution agreement reflects growing interest in health-tracking wearable devices, with venture capital pouring investment into the space over the past year. BioIntelliSense, for example, raised $45 million in a Series B funding round this past summer, and sports and athletics-focused WHOOP raised $200 million in a Series F round in September.

(Originally posted on Mobile ID World)

The post SFIO Partnership to Bring NeuroSky’s Biosensor Wearables to New Markets appeared first on FindBiometrics.


Identity North

Kim Cameron: A leader in the digital identity space

A letter from IdentityNORTH Co-Chair, Aran Hamilton This week we lost a giant in the digital identity space and a leader in the IdentityNORTH community. Kim Cameron was recognized in 2016 as a Founder of Canada's Digital Economy for his work in recognition of his foundational and groundbreaking work writing the "7 Laws of Identity" [...] The post Kim Cameron: A leader in the digital identity spa

A letter from IdentityNORTH Co-Chair, Aran Hamilton

This week we lost a giant in the digital identity space and a leader in the IdentityNORTH community. Kim Cameron was recognized in 2016 as a Founder of Canada’s Digital Economy for his work in recognition of his foundational and groundbreaking work writing the “7 Laws of Identity” (2005). 

Kim was the Chief Architect of Identity in the Identity and Access Division at Microsoft, where he championed the emergence of a privacy-enhancing Identity Metasystem reaching across technologies, industries, vendors, continents and cultures. Kim played a leading role in the evolution of Active Directory, Federation Services, Forefront Identity Manager, CardSpace and 

Microsoft’s other Identity Metasystem products. In 2009, he was appointed a Microsoft Distinguished Engineer.

A true friend and mentor to many of us, Kim spoke at IdentityNORTH on several occasions. His talk in 2012 was “Cloud Identity Aha Realizations”, Kim helped us kick off the public consultation for the BC Services Card in Vancouver in 2014, speaking with Don Thibeau as we worked to help the BC Government plan the roll-out of their digital ID program. 

Kim was actually the inspiration for the Award that we started in 2015 but we made him wait for it. He spoke to us twice in 2016, first as the Keynote for our Annual Summit “Beyond the Laws of Identity” referring to his ground-breaking work and taking us through what he felt he missed when he published his Laws. Kim spoke later on the importance of the community when he received recognition as a Founder of Canada’s Digital Economy

Kim joined us again in 2020, after he retired from Microsoft and gave a different sort of talk. His keynote at the IdentityNORTH Annual Summit was a sort of career retrospective, a humble recount of some regrets regarding his work and a call for us to pick up where he was leaving off. Always introspective, Kim wished he’d focused more on creating inclusive solutions for individual and enterprise identity challenges and he wanted us to learn from his mistakes. Once again Kim was ahead of his time, thoughtful, and thought-provoking with a large measure of humour and wit. 

It was an honour to learn from him, and our community will continue to drive forward his work in shaping and implementing meaningful digital identity solutions.

In our most recent chat over Zoom, Kim gave IdentityNORTH advice on a series of talks he thought we should host in the coming months and years. He spoke of his expectations of the world in covid, and after, and very eagerly of getting to spend virtual time with his very young grandchildren. He remarked at the resilience of children, and their ability to connect emotionally even when presented with technological barriers… and how much fun he was having getting to know them as real people. Our sincere condolences to Kim’s family, we will all miss Kim for his many contributions to our lives and the passion he brought to the IdentityNORTH community.

The post Kim Cameron: A leader in the digital identity space appeared first on IdentityNORTH.


FindBiometrics

FindBiometrics to Report Live From FTE 2021

The 15th annual Future Travel Experience conference is next week, and FindBiometrics will be reporting live from the show floor. It’s poised to be an important event for many in […] The post FindBiometrics to Report Live From FTE 2021 appeared first on FindBiometrics.

The 15th annual Future Travel Experience conference is next week, and FindBiometrics will be reporting live from the show floor.

It’s poised to be an important event for many in the biometrics industry, given the increasing use of such technologies in air travel and border security. A growing number of airports around the world are looking to biometrics like facial recognition in order to speed up passenger processing and boarding, while government authorities like US Customs and Border Protection are increasingly recognizing the security benefits of such biometric tech.

Interest in this kind of innovation has only amped up in the wake of the COVID-19 pandemic. Biometrics will therefore fit right in under this year’s theme for FTE, “New Approaches for a New World”.

That theme – and various pertaining solutions – will be explored through four specialized conference tracks: “Future Airports”, “Digital and Innovation”, “Air Mobility”, and “Ancillary”. There will also be a special briefing and tour, entitled “TSA Advancing the Checkpoint Environment”, at McCarran International Airport – one of the hotbeds of biometric airport innovation in recent years.

Among the sponsors of the event are some of the biggest names in the biometrics industry, including IDEMIA, Paravision, and NEC. And speakers for this year’s Future Travel Experience will include executives from United Airlines, Delta Air Lines, and Allegiant, among others.

FTE will run from December 7th to 9th at the ARIA Resort & Casino in Las Vegas. For those interested in attending, registration is still open.

The post FindBiometrics to Report Live From FTE 2021 appeared first on FindBiometrics.


Onfido Names Silicon Valley Vet as Chief Marketing Officer

A former Oracle executive is Onfido‘s new Chief Marketing Officer. Nate Skinner previously served as SVP of Global Marketing for Oracle’s Advertising and Customer Experience (CX) business, a position he […] The post Onfido Names Silicon Valley Vet as Chief Marketing Officer appeared first on FindBiometrics.

A former Oracle executive is Onfido‘s new Chief Marketing Officer.

Nate Skinner previously served as SVP of Global Marketing for Oracle’s Advertising and Customer Experience (CX) business, a position he held since February of 2020. Before that, he was Salesforce Pardot’s Global Head of Marketing from February of 2017 to January of 2020; and his resumé also includes prior senior marketing roles with Borland, Salesforce, and Amazon Web Services, where he served as Head of Enterprise Marketing & Executive Programs from 2014 to 2015.

Notably, Skinner was also highlighted by Business Insider last year in a list of 20 executives who were “shaping the future of marketing tech”.

With his experience accumulated in Silicon Valley, Skinner adds another dose of tech expertise to Onfido’s leadership team after the appointments of former HP executive Sue Barsamian and former Okta CFO Bill Losch to the company’s Board of Directors last month. The influx of talents reflects Onfido’s strong momentum as a provider of identity verification solutions in a booming market, with the company having reported a 93 percent year-to-date revenue increase in its recent Q3 update.

Commenting on his appointment, Skinner gestured to the headwinds that have helped to propel this growth, noting that since the onset of the COVID-19 pandemic in particular, “entire market segments have digitized in weeks instead of years,” while Onfido has stepped in to provide identity security for a growing number of online interactions.

“Onfido sits at this intersection of market demand and product fit, driven by a global transformation to digital first,” he said. “I’m excited to join Onfido as we power this trend to simplify digital identification and onboarding for our customers.”

Onfido CEO Mike Tuchen, meanwhile, emphasized the assets that Skinner brings to the table as Onfido seeks to maintain its momentum. “His broad range of experience, from sales engineering, product marketing, competitive intelligence, and demand gen across the world’s largest enterprise SaaS companies, will be invaluable to Onfido as we continue to scale and grow our technology into new markets,” he said.

December 2, 2021 – by Alex Perala

The post Onfido Names Silicon Valley Vet as Chief Marketing Officer appeared first on FindBiometrics.


Anonym

A Multi-Dimensional Privacy Definition from TROPT Ahead of Data Privacy Week 2022

Anonyome Labs is proud to be presenting at The Rise of Privacy Tech (TROPT) interactive forum during Data Privacy Week 2022. Data Privacy Week is an international effort to empower individuals and encourage businesses to respect privacy, safeguard data and enable trust. Data Privacy Week will run January 24–28, 2022. The TROPT interactive forum will be held on […] The post A Multi

Anonyome Labs is proud to be presenting at The Rise of Privacy Tech (TROPT) interactive forum during Data Privacy Week 2022. Data Privacy Week is an international effort to empower individuals and encourage businesses to respect privacy, safeguard data and enable trust. Data Privacy Week will run January 24–28, 2022. The TROPT interactive forum will be held on January 26–27 2022. 

Ahead of its interactive forum, the TROPT organization has released a whitepaper titled, Defining the Privacy Tech Landscape 2021: The Rise of Privacy Tech – A Foundational Whitepaper to Help Fuel Privacy Innovation. 

Importantly, the whitepaper puts forth a comprehensive definition of privacy and, since there’s much debate about what data privacy really means, we thought we’d share the definition with you here.

The TROPT definition of privacy 

First, as we’ve also reported in the past, TROPT acknowledges that privacy definitions and conceptualizations vary widely. To overcome this, TROPT has united the common principles into a multi-dimensional definition of privacy, as you can see here: 

TROPT believes this is “a multi-faceted understanding of privacy” which covers individual control and power over personal information (our priority at Anonyome Labs) and facilitating trust in personal information relationships. 

The definition embraces a “comprehensive taxonomical approach to conceptualizing privacy based on the activities that impinge upon privacy: information collection, information processing, information dissemination, and invasions.”

Significantly, this definition rejects “the limited conceptualization of privacy as secrecy, obscurity, or anonymity only.”

Going further, TROPT identifies 7 principles of privacy tech from among the existing privacy principles in privacy regulations:

TROPT then maps its 7 principles to the stages of the data life cycle:

What does all this mean?

TROPT agrees with us that “privacy is one of the most critical issues of our time.” Better defining and understanding it, particularly at the practical level of the data lifecycle for an organization, will boost development and uptake of innovations that will help solve the privacy problems we now face at crisis level. Enterprises are demanding more privacy tools in response to growing customer demand for better stewardship of their personal data, and it helps to see what exactly is required. 

As the 2020 PwC Trusted Tech report put it, brands that get consumer trust and safety right will disrupt the market. At Anonyome Labs, through our Sudo Platform business privacy toolkit, we help enterprises rapidly produce branded cybersafety solutions to get out in front of their competition. Through MySudo, the world’s only all-in-one privacy app, we’re putting the power to protect personal information directly into consumers’ hands.

Find out more.

Photo By vs148

The post A Multi-Dimensional Privacy Definition from TROPT Ahead of Data Privacy Week 2022 appeared first on Anonyome Labs.


KuppingerCole

New EIC Location Revealed!

by Jennifer Haas The European Identity & Cloud Conference 2022 is moving to Berlin! Get an exciting sneak peek tour from our Head of Events, Jennifer, of our new EIC 2022 location. Watch Now!

by Jennifer Haas

The European Identity & Cloud Conference 2022 is moving to Berlin! Get an exciting sneak peek tour from our Head of Events, Jennifer, of our new EIC 2022 location. Watch Now!


auth0

Create an API server with Clojure and Pedestal

Build your first web API in the functional programming world of Clojure with this step-by-step guide
Build your first web API in the functional programming world of Clojure with this step-by-step guide

Dock

Dock Collaborates with Transak to Open New Markets for Non-crypto Holders

Dock Tokens were only available for crypto to crypto buyers, thanks to Transak, Dock Tokens can now be bought via bank transfers and card payments.

We’re excited to announce Dock’s collaboration with Transak, a platform for onboarding global users from fiat to crypto and back using local payment methods. Previously, Dock Tokens were only available for crypto to crypto buyers, thanks to Docks Integration with Transak, Dock Tokens can now be bought via bank transfers and card payments.

To celebrate the collaboration, Dock will contribute $10,000 USD toward user transaction fees. This means that early users will get the convenience of Transak without the fees, but you’ll need to be quick, as once the budget is used up the full transaction fees will apply. A small exchange fee will still apply.

How It Works

Transak enables bank transfers and card payments in multiple international currencies in over 60 countries, including the UK, Europe and India. In a few simple steps, you’ll own DOCK tokens and will be able to participate in governance, staking, and transacting on the Dock Network.

Purchase DOCK via the widget on Dock’s website, sign up to Transak and follow the steps below.

Enter the amount you’d like to purchase in your local currency Pick your preferred payment method of bank transfer or card payment Click “Buy Now” Complete KYC

To ensure compliance, you’ll be asked to enter necessary details such as name, mobile number and DOB, Transak can then tailor your experience for an easy fiat payment the next time you purchase. Purchasing DOCK via Transak is not currently available in the United States, India, China and other select countries. View the full list of supported countries here.

Join the Dock Community

The Dock community expressed their trouble buying DOCK, with it only being available for crypto to crypto users. Taking on board their concerns, Dock engaged Transak to enable purchases via their fiat on/off-ramp. The integration went live on the 1st of December 2021.

Dock has a total supply of 1 Billion tokens, circa 750 Million are in circulating supply owned by DOCK token holders.

Transak has enabled non-crypto holders to purchase DOCK allowing more people to partake in governance, validating, and staking, while ensuring all KYC, AML, and fraud monitoring requirements are met.

Dock CEO Nick Lambert commented on the collaboration “We’re really excited to be working with Transak in opening up DOCK to a wider audience, enabling non-crypto users to enter our ecosystem”.

Alessandro Raboni, Head of Growth at Transak commented "At Transak we are early believers in the Polkadot ecosystem and we are thrilled to see it developing with such strong solutions and applications like Dock. Dock solves a very important problem in addressing inefficiencies in current data solutions, leveraging blockchain technology. We share with Dock the vision for decentralisation, as well as our developer-centric approach, perfect match!”

Head to dock.io and purchase your DOCK tokens today.


KuppingerCole

Atos DirX Access

by Martin Kuppinger Atos DirX Access is a mature solution for Access Management, covering the full range of targets from legacy web applications to modern SaaS services, and also supporting IoT environments. It comes with comprehensive support for modern standards, including FIDO 2.0 and W3C WebAuthn. A specific strength is the support for specific capabilities such as session state sharing across

by Martin Kuppinger

Atos DirX Access is a mature solution for Access Management, covering the full range of targets from legacy web applications to modern SaaS services, and also supporting IoT environments. It comes with comprehensive support for modern standards, including FIDO 2.0 and W3C WebAuthn. A specific strength is the support for specific capabilities such as session state sharing across servers, Dynamic Authorization Management, or integrated User Behavior Analytics. Atos DirX Access counts amongst the most feature-rich solutions on the market.

Rest in Peace, Kim Cameron

by Joerg Resch Digital identity thought leader Kim Cameron´s passion for fundamentally influencing the way we think about, and deal with privacy and digital identity, has brought us where we are today and will endure forever. On 30th November, 2021, Kim passed away after his courageous battle with cancer. We will continue to honor him by living by his ideals that he expressed back in 2005 with

by Joerg Resch

Digital identity thought leader Kim Cameron´s passion for fundamentally influencing the way we think about, and deal with privacy and digital identity, has brought us where we are today and will endure forever. On 30th November, 2021, Kim passed away after his courageous battle with cancer. We will continue to honor him by living by his ideals that he expressed back in 2005 with his 7 Laws of identity.

User Control and Consent, Minimal Disclosure for a Constrained Use, Justifiable Parties, Directed Identity, Pluralism of Technologies, Human Integration, Consistent Experience across Contexts -  Kim injected his 7 laws of identity into Microsoft´s DNA as their Chief Architect of Identity at a time, when Microsoft was still  “under the dark influence of Privacy is Dead”, and transformed that “big complicated place”, as he called it, into a modern and forward-thinking, privacy driven company that is respectful of the rights of individuals and organizations, and has become a strong contributor to the Identity Standards Community.

In his last two years at Microsoft, Kim paved its way into supporting Decentralized Identity as a new and sustainable way to balance privacy and state-of-the-art security. Gaining back more control over his time after leaving Microsoft in 2019, his interest in digital identity was “as keen as ever,” he wrote in an August 2020 blog post.

Kim attended nearly all the European Identity Conferences (EIC), from the very first one back in 2007, to 2019 and inspired us with his visionary, content-rich yet entertaining keynote talks and panel sessions. Have a look at his 2019 talk about privacy in the platform economy (“Turning the Web Right Side Up”), his 2018 talk on the “7 Laws of Identity on the Blockchain”, his visionary “Identity Services 2020” talk at EIC 2015, where he also reflected on 15 years of working together with Jackson Shaw in the same company and cited Berthold Brecht saying “Because things are the way they are, things won´t stay the way they are.” 

We all will miss you so much, Kim. Diving with your wife Adele, you and so many friends into the cultural life of Munich while we were there for EIC, enjoying Ingo Maurer´s Light Design Showroom and some delicious Italian food. Farewell, Kim, thank you for your guidance and advice. And thank you for being a friend.

Joerg Resch


OWI - State of Identity

Adopting eID in Europe and Beyond

Digital identity is now recognized as a key building block in digitizing public administration; however, it requires interoperability with private sector use cases to drive value for its citizens. In this week's State of Identity podcast, we're joined by Sebastian Manhart, Advisor on Digital Identity for the German Federal Chancellery to discuss recent developments in eIDAS application
Digital identity is now recognized as a key building block in digitizing public administration; however, it requires interoperability with private sector use cases to drive value for its citizens. In this week's State of Identity podcast, we're joined by Sebastian Manhart, Advisor on Digital Identity for the German Federal Chancellery to discuss recent developments in eIDAS applications, the potential for self-sovereign identity in government, and the outlook for digital identity infrastructure in Germany, Europe, and beyond.    

IDnow

Consumer Choice for Identity Verification

Why offering multiple identity verification options can become a competitive advantage. Like everything in life, there is rarely ever one solution that fits all. The same applies to identity verification. Even though automated solutions might offer your customers a fast and convenient way to get verified, some still prefer – or need – human guidance. […]

Why offering multiple identity verification options can become a competitive advantage.

Like everything in life, there is rarely ever one solution that fits all. The same applies to identity verification. Even though automated solutions might offer your customers a fast and convenient way to get verified, some still prefer – or need – human guidance. This gap can be fulfilled with semi-automated processes such as video-based solutions.

Video-based solutions have been used for almost a decade in countries such as Germany, Austria, and Luxembourg. Until very recently, this solution was the only accepted way to perform electronic identity verification for customer onboarding as it provides a higher level of assurance; according to some regulators, it is equivalent to face-to-face verification. Even though automated solutions are becoming available in some of these countries with strict regulations, video-based solutions are still widely used because of their ease of use as well as its efficiency to combat different types of fraud.

Providing options to customers not only protects the financial institution from fraud, but it can also improve customer engagement and conversion rates. It will ensure that the customer does not step away if they cannot go through the process with the primary method of verification, which converts into conversion rates. It will save time from customer success teams having to go into eternal email chains with customers. Most importantly, this will help businesses to demonstrate their efforts to become more inclusive.  

IDnow recognises the challenges of having only one method of identity verification. For this reason, IDnow has built a nimble identity verification platform that enables its customer to fulfil their regulatory requirements, combat fraud effectively and increase its conversion rates. All of the verification solutions are available in one joined platform, with one single API integration.

Want to learn more? Listen and watch (Webinar: The evolution of ID verification) our IDnow experts discussing IDnow’s journey from a pure Video-based ID Verification player towards a multi-solution platform provider.

The right method for each customer and for your business.

Offering multiple identity verification options provides benefits to both customers and businesses.

On one hand, there might be some customers that for any reason cannot get approved. They might not be tech-savvy or perhaps have other learning disabilities which impedes them to complete the automated verification process. By providing alternative ways to verify themselves makes the process more inclusive and enables more customers to successfully complete the process. Customers feel more comfortable and in control and will also build trust in the institution.

Alternative methods of verification can also be valuable for businesses as the level of assurance can be increased and can help to prevent fraud. For example, a video-based verification can provide a more robust verification compared to an automated solution, as it can prevent more sophisticated fraudulent attacks like money mulling or social engineering attacks. IDnow’s identity platform offers multiple solutions to verify the identity of individuals. Below we present two of these main solutions, VideoIdent and AutoIdent, which can help to start providing the benefits to organisations and we dig into how each of them can serve different customer segments.

AutoIdent for a fast and reliable onboarding process.

IDnow AutoIdent offers a state-of-the-art automated identity verification leveraging modern AI and machine learning technology. Automated identity verification allows customers to identify themselves on their own, anywhere, anytime, and within just a few minutes.

Because of the automated and self-service onboarding approach, AutoIdent offers high convenience and conversion rates. The convenient user experience and ease of use, makes it popular with young and tech-savvy customers. Especially, customers who have used digital identity verification solutions before are looking for the fastest way to identify themselves.

AutoIdent supports identity documents from 195 countries and is available in over 30 languages. Additionally, more and more regulators are approving automated identity verification methods for due diligence purposes. This enables businesses to onboard customers in a variety of markets.

Building a more exclusive and inclusive process with VideoIdent.

Even though today we live in a digital-first world, some individuals are still seeking personal customer service. That’s where VideoIdent shines. IDnow VideoIdent offers customers a video-chat-based process, that is guided by one of our many Ident Specialists. VideoIdent not only provides a very tailored experience to customers, but also allows to better serve the elderly and less technology, affine individuals, making the process more inclusive.

With IDnow, you benefit from 15 Ident Centres with hundreds of identity verification and fraud prevention specialists. All of IDnow’s Ident and data centres are located within the European Union to ensure a high level of data protection. Let your customers enjoy multi-language support and 24/7 service availability.

Optimise your conversion rates and save money with a fallback option.

Offering a selection of identity verification methods especially comes in handy when a customer is having issues with one of them. In these scenarios, it’s good to have an alternative solution as a fallback option.

For example, a customer might go through the onboarding journey with an automated identity verification method. However, the customer might struggle to navigate the process, and after a few attempts, they are not able to complete it. This can bring two consequences to the organisation: (1) the customer decides to contact the customer service team and ask for their assistance (2) lose the customer as they’ve given up completely.

None of the above consequences are ideal. The first one can represent a huge effort and cost for the organisation as they would require a dedicated team to solve these issues for customers. This can also be a lengthy process as instead of only taking a few minutes to get verified, it might now take days or weeks to be solved – another frustrating point for customers which might lead them to abandon the process.

Having a fallback option like VideoIdent provides instant guidance to customers and can save the organisation’s customer service team valuable time which could be used for other activities. Most importantly, providing options will ensure that customers go through one way of verification or another in only minutes, maximising the overall conversion rate and minimising the cost of verification.

About IDnow’s Identity Platform.

With IDnow, you can meet all your KYC identity verification requirements with one single platform.

IDnow’s platform is fully flexible and can be customized to your risk appetite and use cases. All IDnow solutions can be used via IDnow’s mobile App or be seamlessly integrated within your mobile application, or website with our SDK and API. Furthermore, organisations can save resources for additional third-party integrations by leveraging our selection of add-on solutions, such as address validation, AML screening and qualified electronic signatures. Each of the add-ons can be mixed and matched across the identity verification platform tailored to each organisation’s needs.

For more information visit IDnow’s  product page to learn more about our highly flexible identity verification solutions or contact us directly to discuss how we can optimise your onboarding journey!

Let’s talk!

By

Ana Lucia Salazar
Senior Sales Manager UK & I
Connect with Ana on LinkedIn


Aergo

TrustVerse and AERGO Signs a Partnership MOA

AERGO, blockchain platform, with TrustVerse, a digital financial solution company, officially announced on December 2nd that it plans to sign a business agreement (MOA) to add AERGO token and NFT features on TrustVerse’s digital wallet (MarS Wallet) as a representative 3rd Party Wallet of AERGO Mainnet. MarS Wallet, one of TrustVerse’s digital financial services, is a digital wallet that pro

AERGO, blockchain platform, with TrustVerse, a digital financial solution company, officially announced on December 2nd that it plans to sign a business agreement (MOA) to add AERGO token and NFT features on TrustVerse’s digital wallet (MarS Wallet) as a representative 3rd Party Wallet of AERGO Mainnet.

MarS Wallet, one of TrustVerse’s digital financial services, is a digital wallet that provides storage and remittance functions for ERC-20-based tokens and currently supports both Android and IOS versions. Through the signing of the MOA business agreement, AERGO will be provided with TrustVerse’s MarS Wallet as AERGO’s representative 3rd Party Wallet to help increase its blockchain ecosystem utilization and flexibility. MarS Wallet will add AERGO ERC20 token, AERGO Mainnet token, and AERGO Mainnet NFT assets storage, transmission, and viewing functions.

TrustVerse and AERGO Signs a Partnership MOA was originally published in Aergo blog on Medium, where people are continuing the conversation by highlighting and responding to this story.


Affinidi

Using Decentralized Identifiers (DIDs) Without a Digital Wallet

Decentralized Identifiers (DIDs) are unique identifiers that enable entities to generate and control their identifiers in the digital world. Within the SSI community, there are many known DID methods, but most of them require you to have a digital identity wallet 🔒, where you will keep a seed (private key) 🔑. While this may sound convenient for many of us, it comes with its shortcoming

Decentralized Identifiers (DIDs) are unique identifiers that enable entities to generate and control their identifiers in the digital world.

Within the SSI community, there are many known DID methods, but most of them require you to have a digital identity wallet 🔒, where you will keep a seed (private key) 🔑.

While this may sound convenient for many of us, it comes with its shortcomings as well.

Too Technical for New Users

Using digital wallets can be a hassle for someone who is trying them for the first time as they have to install the wallet software on their laptop or mobile. Furthermore, they have to go through the registration process, which will not be intuitive at all times.

Nature of Implementation

The other shortcoming from an implementation perspective is that issuers can’t issue a Verifiable Credential (VC) without knowing the holder’s DID, which until now, was stored only in a digital wallet. In other words, VCs can’t be issued without a wallet!

In short, digital wallets are not for everyone, still, they are an essential part of the VC issuance and storage process.

To enable everyone to get on the Web 3.0 bandwagon, we at Affinidi, decided to use some easy options that don’t require a digital wallet to store a DID.

Implementing DID Without a Wallet

Before we go into how you can use a DID without a wallet, let’s quickly understand why we need a private key in the first place.

The simple answer — to prove that you are the owner (holder) of the digital asset (Verifiable Credentials) in question.

So, how can you prove that you’re the owner without a private key?

Well, you would need

A unique id for your digital assets (VCs). Proof that you are the owner of that unique id.

And how can you do both?

With two DID methods — did:email ✉️ and did:phone 📞

Since both email and phone numbers are currently being used in web 2.0 for authentication, it is a simple way to prove that you are the owner of a VC that has a unique DID. You will get an OTP(One Time Password, which mostly is just random characters) on your email/phone, and sending it back will prove your ownership.

Also, you will have the DID and will be able to get digital assets with this DID.

Advantages of DID Methods

The biggest advantage of this method is that it is universal and straightforward and provides the same experience for users as Web 2.0.

The other advantage is that users don’t have to install any additional software and this can work well for users of all technical knowledge and experience.

Also, issuers (service providers) can issue VCs to their existing clients (holders) without workarounds on how to get their holders’ DID.

Limitations of DID Methods

Of course, these DID methods have some limitations as well. The most important is that the holder has to reveal his or her email/phone number to strangers, and this could be a spot of bother from a privacy standpoint.

Overall though, these methods are a great alternative to digital wallets and can be a good starting point for newcomers to embrace the world of VCs and web 3.0.

To know about more such interesting things that we do at Affinidi, reach out to us on Discord, join our mailing list, and follow us on Twitter, LinkedIn, and Facebook.

The information materials contained in this article are for general information and educational purposes only. It is not intended to constitute legal or other professional advice.

Written by Denys Popov

Using Decentralized Identifiers (DIDs) Without a Digital Wallet was originally published in Affinidi on Medium, where people are continuing the conversation by highlighting and responding to this story.


SelfKey

SelfKey Telegram AMA – POI, LOCK, Living Avatar NFT, Metaverse

Here is a summary of all the questions and answers that were received for the Telegram AMA. Covering POI Platform, LOCK Token, Living Avatar NFT, Metaverse The post SelfKey Telegram AMA – POI, LOCK, Living Avatar NFT, Metaverse appeared first on SelfKey.

Here is a summary of all the questions and answers that were received for the Telegram AMA. Covering POI Platform, LOCK Token, Living Avatar NFT, Metaverse

The post SelfKey Telegram AMA – POI, LOCK, Living Avatar NFT, Metaverse appeared first on SelfKey.


Okta

How to Secure Your Kubernetes Clusters With Best Practices

Kubernetes has become an unavoidable part of a software infrastructure these days. If you are an enterprise or medium/large company, chances are you are already running Kubernetes clusters for your workloads. If you are a DevOps engineer, there is a good chance you are maintaining either an on-prem Kubernetes cluster or a PaaS like Amazon EKS, Microsoft AKS, or GKE. But regardless of how you run y

Kubernetes has become an unavoidable part of a software infrastructure these days. If you are an enterprise or medium/large company, chances are you are already running Kubernetes clusters for your workloads. If you are a DevOps engineer, there is a good chance you are maintaining either an on-prem Kubernetes cluster or a PaaS like Amazon EKS, Microsoft AKS, or GKE. But regardless of how you run your Kubernetes clusters, you need to make sure that they are secure.

The Kubernetes API server has multiple layers of security.

Transport security: All API communication is done via TLS (transport layer security) using valid certificates. Authentication: All API requests are authenticated with one of the several authentication mechanisms supported by Kubernetes. Authorization: All authenticated requests are authorized using one or more of the supported authorization models. Admission control: All authorized requests, except read/get requests, are validated by admission control modules.

Kubernetes comes with many security options out of the box, but to bulletproof your infrastructure, you need to consider many more security best practices. Today we will look into some of the vital security best practices for Kubernetes.

1. Use Kubernetes Role-Based Access Control (RBAC)

Kubernetes supports multiple authorization models for its API server. These are ABAC (Attributed-Based Access Control), RBAC (Role-Based Access Control), Node authorization and the Webhook mode. Out of all these, RBAC is the more secure and most widely used and is ideal for enterprises and medium to large organizations. With RBAC, you can define role-based access control that closely resembles your organization’s business rules. RBAC also works great with OIDC authentication.

Most Kubernetes distributions have RBAC enabled by default. You can check this by running the command kubectl cluster-info dump | grep authorization-mode, which should have authorization-mode=RBAC in the output. If not, you can enable it using the --authorization-mode flag for the API server when creating or patching the cluster. For example, setting --authorization-mode=RBAC,Node will enable both RBAC and Node authorization on the cluster.

Once RBAC is enabled, you can create roles (Role/ClusterRole) and bindings (RoleBinding/ClusterRoleBinding) to control access to your resources. Here is an example of a role and role binding that lets users view pods and services.

apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: namespace: fancy-namespace name: pod-service-reader rules: - apiGroups: [""] # "" indicates the core API group resources: ["pods", "services] verbs: ["get", "watch", "list"]

The below binds the above role to a specific group of users.

apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: read-pods-services namespace: fancy-namespace roleRef: kind: Role #this must be Role or ClusterRole name: pod-service-reader # this must match the name of the Role or ClusterRole you wish to bind to apiGroup: rbac.authorization.k8s.io subjects: # subject can be individual users or a group of users. Group is defined in the external authentication service, in this case, an OIDC server - kind: Group name: k8s-restricted-users 2. Secure the API server with OpenID Connect

Kubernetes supports many authentication mechanisms. Some of the most common are:

Client certificates Basic authentication Tokens (Service account tokens, Bearer tokens, and so on) OpenID Connect (OIDC) Proxy

Out of all these authentication mechanisms, OIDC is the most secure and scalable solution. It is ideal for clusters accessed by large teams as it provides a single sign-on solution for all users and makes it easy to onboard and offboard users. It is also way more secure than other mechanisms as you don’t have to store any sensitive information on a user’s computer, like client secrets and passwords. You can also use features like MFA and Yubikey if supported by your OIDC provider.

OIDC combined with RBAC becomes necessary as more and more people start accessing the cluster. It becomes essential to create groups and roles and provide limited access to specific groups. You can read more about this in my previous post How to Secure Your Kubernetes Cluster with OpenID Connect and RBAC.

3. Use Secrets for all sensitive data with appropriate access

This one should be a no-brainer. Kubernetes has a Secret resource that can be used to store sensitive data. This is a great way to store passwords, keys, and other sensitive data. Secrets can be used for storing string data, docker config, certificates, tokens, files, and so on. Secrets can be mounted as data volumes or exposed as environment variables to be used in containers. Secrets can be plain text or encoded, but please don’t be that person who uses plain text secrets.

Secrets are flexible and native to Kubernetes, so there is no reason for you not to use them. Also, make sure to implement proper RBAC for secrets so that not everyone has access to them.

4. Keep Kubernetes version up to date

Like any other software, Kubernetes also has bugs and issues. And from time to time, there might be a high severity bug that calls for a CVE. Hence, it’s an excellent idea to keep the Kubernetes version up to date on the server and the CLI client. You can check the Kubernetes security and disclosure information website to see if there are known security vulnerabilities for your Kubernetes version. If you are using a managed PaaS, it should be pretty easy to upgrade, and for on-prem installations, there are tools like kOps, kubeadm, and so on, that makes it easy to upgrade clusters.

5. Restrict kubelet, API, and SSH access

kubelet is the primary “node agent” running on each node, and by default, a kubelet’s HTTP endpoints are not secured. This could allow unintended access and hence should be restricted.

When someone has access to a Kubernetes cluster, they can access the k8s API server and SSH into the cluster nodes themselves. To limit node access, cluster access should be limited as much as possible. Disable SSH access for non-admin users. Secure the API server using OIDC and RBAC, as we saw earlier, so that only authenticated users with sufficient roles can access the API.

6. Secure container images

Securing the container images that run on the cluster is as important as securing the cluster itself. A malicious image running on a cluster could wreak havoc. Follow these best practices for container image security.

Do not run containers as root as this would give the container unlimited access to the host. Always run the containers using a non-root user. Enable container image scanning in your CI/CD phase to catch known vulnerabilities using tools like clair or Anchore. Use minimal up-to-date official base images and remove all unwanted dependencies, packages, and debugging tools from the image as it will make it more secure and lightweight. Prevent loading unwanted kernel modules in the containers. These can be restricted using rules in /etc/modprobe.d/kubernetes-blacklist.conf of the node or by uninstalling the unwanted modules from the node. Use official verified images for popular software. Use a trusted registry for non-official images and always verify the image publisher Use Docker Bench for Security to audit your container images Use Pod security policies to limit a container’s access to the host further

You can read more about it in our “Container Security: A Developer Guide”.

7. Control traffic between pods and clusters

Generally, pods within the same cluster will be able to communicate with each other, and if you have multiple clusters in the same network, there may be traffic between them as well. Do not leave this all open, as it could lead to a compromised cluster when another in the network is affected. Use Kubernetes network policies to control traffic between pods and clusters and allow only necessary traffic.

8. Use namespaces to isolate workloads

Do not run all your workloads in a single namespace. Isolating workloads in different namespaces based on business needs is more secure and easier to manage with RBAC. This way, you can fine-tune RBAC even further to let users access only what they need to see. You can also use Kubernetes network policies to isolate traffic between namespaces where applicable.

9. Limit resource usages

As with securing APIs and the cluster itself, it is also essential to set resource limits on how much CPU, memory, and persistent disk space is used by namespaces and resources. This secures your cluster from denial of service attacks when a particular container uses up all the resources. Resources quotas and limit ranges can be used to set limits at the namespace level, and Requests and limits can be used to set resource limits at container level as well.

10. Use monitoring tools to monitor all traffic and enable audit logging

Finally, it is also extremely important to monitor and audit your clusters. Enable audit logging for the cluster and use monitoring tools to keep an eye on the networking traffic to, from and within a cluster. Monitoring can be done using open-source tools, like Prometheus, Grafana, or with proprietary tools.

Bonus

Furthermore, keep these infrastructure best practices also in mind when securing your Kubernetes cluster.

Ensure that all communication is done via TLS. Protect etcd with TLS, Firewall, and Encryption and restrict access to it using strong credentials. Set up IAM access policies in a supported environment like a PaaS. Secure the Kubernetes Control Plane. Rotate infrastructure credentials frequently. Restrict cloud metadata API access when running in a PaaS like AWS, Azure, or GCP. Learn more about Kubernetes and security

If you want to learn more about Kubernetes, OIDC, or using OIDC with Kubernetes, and security in general, check out these additional resources.

How to Secure Your Kubernetes Cluster with OpenID Connect and RBAC Securing a Cluster OpenID Connect Tokens RBAC vs. ABAC: Definitions & When to Use OAuth 2.0 and OpenID Connect Overview Secure Access to AWS EKS Clusters for Admins Managing Multiple Okta Instances with Terraform Cloud

If you liked this tutorial, chances are you’ll enjoy the others we publish. Please follow @oktadev on Twitter and subscribe to our YouTube channel to get notified when we publish new developer tutorials.


PingTalk

What you Need to Know about Centralized vs Decentralized Identity Management

The pandemic changed the way enterprises and people view identity ownership and security, as more people work from home on personal devices, shop online for everything and communicate digitally with family and friends. Control and protection of a user’s online identity and data is what drives both centralized and decentralized identity management. The end goal is the same, but the approaches are d

The pandemic changed the way enterprises and people view identity ownership and security, as more people work from home on personal devices, shop online for everything and communicate digitally with family and friends. Control and protection of a user’s online identity and data is what drives both centralized and decentralized identity management. The end goal is the same, but the approaches are different.

Wednesday, 01. December 2021

Finicity

HousingWire 2021 Tech Trendsetter Award Winner: Nick Baguley

Nick Baguley, V.P. of Data Science at Finicity, a Mastercard company, won the HousingWire 2021 Tech Trendsetter award. Nick and his team have improved income identification and categorization to better recognize all income streams. These new streams are key in the transforming the digital mortgage experience by helping reduce the complexity of the mortgage process […] The post HousingWire 2021 T

Nick Baguley, V.P. of Data Science at Finicity, a Mastercard company, won the HousingWire 2021 Tech Trendsetter award.

Nick and his team have improved income identification and categorization to better recognize all income streams. These new streams are key in the transforming the digital mortgage experience by helping reduce the complexity of the mortgage process using AI-powered digital verification for income, assets and employment. This enhances the entire lending process, delivering a more streamlined experience for borrowers and reducing risk, while increasing ROI for lenders through Finicity Mortgage Verification Services.

Congratulations to Nick! See his award and all of the other winners here.

The post HousingWire 2021 Tech Trendsetter Award Winner: Nick Baguley appeared first on Finicity.


Global ID

EPISODE 15 — Olympic hopeful Lila Lapanja is a GlobaliD ambassador

EPISODE 15 — Olympic hopeful Lila Lapanja is a GlobaliD ambassador We’re thrilled to be partnering with professional skier Lila Lapanja and supporting her on her Olympic journey. This is her story. Follow and support Lila: Instagram Facebook Twitter Past episodes: EPISODE 14 — What we learned at Solana Breakpoint EPISODE 13 — DeFi and Identity: Compliance in a decentralized wo
EPISODE 15 — Olympic hopeful Lila Lapanja is a GlobaliD ambassador

We’re thrilled to be partnering with professional skier Lila Lapanja and supporting her on her Olympic journey. This is her story.

Follow and support Lila:

Instagram Facebook Twitter Past episodes: EPISODE 14 — What we learned at Solana Breakpoint EPISODE 13 — DeFi and Identity: Compliance in a decentralized world EPISODE 12 — The future of GlobaliD Groups EPISODE 11 — The XRP Card and the future of communities EPISODE 10 — How to decentralize identity and empower individuals EPISODE 09 — Understanding GlobaliD’s identity platform EPISODE 08 — Owning your identity and data with VP of Design Antoine Bonnin EPISODE 07 — Understanding the future of fintech with Ayo Omojola EPISODE 06 — Establishing trust and safety in tomorrow’s networks EPISODE 05 — How ZELF combines the power of payments and messaging EPISODE 04 — The future of blockchain with the creator of Solana EPISODE 03 — Should we trust Facebook? EPISODE 02 — JP Thieriot on why Uphold isn’t delisting XRP EPISODE 01 — The SEC’s crypto turf war and why XRP isn’t a security

Have a question for us? A topic you’d like covered? A guest you’d like to see? Let us know!

GlobaliD on Twitter Greg Kidd on Twitter

EPISODE 15 — Olympic hopeful Lila Lapanja is a GlobaliD ambassador was originally published in GlobaliD on Medium, where people are continuing the conversation by highlighting and responding to this story.


auth0

Permissions, Privileges, and Scopes

What is the difference between permissions, privileges, and scopes in the authorization context? Let's find out together.
What is the difference between permissions, privileges, and scopes in the authorization context? Let's find out together.

Verus

November 2021 — Verus Monthly Recap

November 2021 — Verus Monthly Recap The latest Verus updates on development, community, ecosystem and more. Subscribe to the newsletter here. Next to the monthly recap on Medium, you can receive the exact same content through a newsletter. Subscribe here. I’ll keep things short and to the point. Successful Mainnet Upgrade! On Monday 29 November two new core protocol features suc
November 2021 — Verus Monthly Recap The latest Verus updates on development, community, ecosystem and more. Subscribe to the newsletter here.

Next to the monthly recap on Medium, you can receive the exact same content through a newsletter. Subscribe here. I’ll keep things short and to the point.

Successful Mainnet Upgrade!

On Monday 29 November two new core protocol features successfully activated on the Verus blockchain. You can now use VerusID (NFT) Marketplace to exchange VerusIDs publicly and privately. And use Verus Vault to lock funds for security, vesting, trusts, inheritance, and more. [read full article here]. To ensure smooth operations, please update your wallet as soon as possible [download here].

🔒 ℹ️ Learn how to set up Verus Vault [read tutorial here].

Exclusive Partnership Digital Nation Entertainment

Verus ecosystem company Arkeytyp signed an agreement with Digital Nation Entertainment concerning the creation of high-quality digital worlds. Digital Nation Entertainment has committed to exclusively working with Verus on the blockchain side of their metaverse environments. Arkeytyp donates 50% of the proceeds from this relationship to the Verus Coin Foundation.

Earlier this month Digital Nation Entertainment released a digital environment for the movie The Harder They Fall (on Netflix) and the Verus community helped with the testing of this metaverse. This exclusive and exciting partnership with Verus, Arkeytyp and Digital Nation Entertainment is the beginning of a combined effort to bring the metaverse into people’s lives.

$175,000 USD Coin Sale VerusGear.com!

VerusGear.com did an exclusive gold, silver and bronze physical coin sale. In this first successful round over $175,000 USD worth of physical coins were sold. All proceeds go to the Verus Coin Foundation. The coins are the first of their kind physical objects attached to VerusIDs. On top of that, the owners of gold coins are connected to a special Gold DAO. Right now you can not buy any physical coins anymore. There will be more sales in the future so keep an eye out!

Get your Verus t-shirts, sweaters, stickers, mousepad, hat, flag and face mask now! 20% or more of the profit is donated to the Verus Coin Foundation.

TO SHARE: Marketing Comparison Materials

Please share these images whenever you have the chance! Download comparison images here [Google Drive]

For Miners: SRBminer and Nanominer Problems

Since the VerusID Marketplace and Verus Vault mainnet upgrade there have been problems for miners using SRBminer and Nanominer. Please use alternatives such as CCminer, hellminer and nheqminer for now [download here].

Thanks for reading. That’s it from me. Until next month!

Please subscribe to the monthly recap so you’ll get it each month in your mailbox.

November 2021 — Verus Monthly Recap was originally published in Verus Coin on Medium, where people are continuing the conversation by highlighting and responding to this story.


Coinfirm

[Webinar] FATF’s Travel Rule: How can crypto transactions fulfill AML requirements?

Representatives from leading crypto service providers will discuss the challenge of remaining compliant under the FATF’s new Travel Rule. Virtual asset service providers, or VASPs, are scrambling to ensure they will be compliant under FATF’s upcoming Travel Rule Protocol (TRP). Ultimately this will depend on the progress of software companies 21 Analytics and Chainalysis and...
Representatives from leading crypto service providers will discuss the challenge of remaining compliant under the FATF’s new Travel Rule. Virtual asset service providers, or VASPs, are scrambling to ensure they will be compliant under FATF’s upcoming Travel Rule Protocol (TRP). Ultimately this will depend on the progress of software companies 21 Analytics and Chainalysis and...

IBM Blockchain

The internet’s next step: The era of digital credentials

Imagine being able to rid your wallet of a driver’s license, an insurance card, a student or employee ID and more. Imagine not having to worry about losing your passport and vaccination records on a trip abroad, or about the authenticity of the designer shoes you just purchased. This and much more is possible with […] The post The internet’s next step: The era of digital credentials appeared fir

Imagine being able to rid your wallet of a driver’s license, an insurance card, a student or employee ID and more. Imagine not having to worry about losing your passport and vaccination records on a trip abroad, or about the authenticity of the designer shoes you just purchased. This and much more is possible with […]

The post The internet’s next step: The era of digital credentials appeared first on IBM Supply Chain and Blockchain Blog.


Imageware

Imageware Provides Corporate Update and Plans for Conference Call

Imageware and Alutel Mobility, announced an agreement to embed Imageware’s market-leading biometric capabilities into Alutel’s AMS Suite 6.0 solutions. The post Imageware Provides Corporate Update and Plans for Conference Call appeared first on Imageware.

SelfKey

Living Avatar NFTs – The Identity Layer for the Metaverse

Living Avatar NFTs can form the identity layer that will be needed to make user interactions on the Metaverse credible. SelfKey’s contributions in this regard can hence prove pivotal in shaping the Metaverse future. The post Living Avatar NFTs – The Identity Layer for the Metaverse appeared first on SelfKey.

Living Avatar NFTs can form the identity layer that will be needed to make user interactions on the Metaverse credible. SelfKey’s contributions in this regard can hence prove pivotal in shaping the Metaverse future.

The post Living Avatar NFTs – The Identity Layer for the Metaverse appeared first on SelfKey.


Ontology

Ontology Monthly Report — November 2021

Ontology Monthly Report — November 2021 Ontology, the project bringing trust, privacy, and security to Web3 through decentralized identity and data solutions, has announced a partnership with bloXmove, a business-to-business mobility blockchain platform designed to simplify travel across multiple forms of transportation by connecting mobility apps and reducing the need for users to switch be
Ontology Monthly Report — November 2021

Ontology, the project bringing trust, privacy, and security to Web3 through decentralized identity and data solutions, has announced a partnership with bloXmove, a business-to-business mobility blockchain platform designed to simplify travel across multiple forms of transportation by connecting mobility apps and reducing the need for users to switch between them. bloXmove will integrate Ontology’s decentralized identity protocol to help make the urban transport app industry easier to use, more private, and more secure.

Developments/Corporate Updates Development Progress We have completed the launch of Ontology’s EVM TestNet and are 95% done with testing. At the same time, the “Security Vulnerabilities and Threat Intelligence Bounty Program’’ launched by Ontology and SlowMist is in progress. We have completed Ethereum RPC support and are 100% done with internal testing. The TestNet has been synchronized online; we are 95% done with testing. We have completed 100% of Ontology’s new Ethereum account system and the TestNet has been synchronized online; we are 96% done with testing. The EVM/OEP-4 asset seamless transfer technical solution is complete and the TestNet has been synchronized online; we are 98% done with testing. We are 100% done with the survey on the improvement of the decimals of ONT and ONG and we are 50% done with internal testing. The ontology-go-sdk and ontology-java-sdk support ONT and ONG decimals updates. We are 30% done with the survey on the RISCV’s simplified instruction set architecture. Product Development ONTO App v4.1.1 was released, adding support for the Harmony Chain, wallet switching function for dApps supporting multiple chains, and support for configuration of token unit. The ONTO NFT management function has been upgraded to support users to independently add NFTs on Ethereum, Ontology, Binance Smart Chain, and Polygon. Users can also link to various mainstream NFT markets. ONTO hosted a campaign with BabySwap. The first 100 participants, and top 20 participants who stake the most, will receive the highest tier of rewards. Voting for ONTO in BabySwap also has a chance to get extra rewards. At present, the number of participants has exceeded 1,000. ONTO hosted a campaign with MCDEX. The first 300 participants will receive rich rewards. The current number of participants is about 500. ONTO hosted a campaign with OCP Finance. The first 150 participants, and top 20 participants who stake the most, will receive the highest tier of rewards. Participants who meet certain conditions will have the chance to enter a lottery. The current number of participants is about 500. ONTO hosted a campaign with cBridge. The first 250 participants, and top 50 participants who stake the most, received the highest tier of rewards. Participants who meet certain conditions had the chance to enter a lottery to win ONG. The event successfully concluded, with more than 700 participants. ONTO hosted a campaign with ACryptoS (BSC). The first 75 participants, and top 20 participants who stake the most, received the highest tier of rewards. The first 100 new ONTO users participating in the event received additional rewards. ONTO hosted a campaign with Landshare. The first 200 participants, and top 10 participants who stake the most, received the most rewards. The top 100 new ONTO users who participated in the event also received additional rewards. The event successfully concluded, with more than 800 participants. ONTO hosted a campaign with CafeSwap (Polygon). Participants who meet certain conditions had the chance to enter a lottery to win ONG rewards.The event successfully concluded, with more than 800 participants. ONTO hosted a campaign with Wing and ApeSwap. The first 100 participants each won rewards and all eligible users can participate in a lottery. The event successfully concluded, with more than 1,400 participants. ONTO hosted a campaign with ButterSwap. The top 200 participants, and the 3 participants with the highest participation received rewards. The first 200 new ONTO users participating in the event also received additional rewards. The event successfully concluded, with more than 600 participants. ONTO hosted a campaign with O3 Swap. The first 300 users who use ONTO to participate received rewards. All participants who met the conditions had the opportunity to participate in the lottery. The event successfully concluded, with about 1,000 participants. On-Chain Activity As of November 24, 2021, there have been 121 dApps launched in total on MainNet. There have been a total of 6,823,269 dApp-related transactions completed on MainNet, an increase of 30,256 dApp-related transactions compared to the past month. There have been a total of 16,733,530 transactions completed on MainNet, an increase of 148,854 transactions compared to the past month. Community Growth & Bounty This month, Geoff Richards from the English community officially became an Ontology Harbinger. This excellent community member will bring more new energy to our community, and also welcome more new members to join us. Ontology published the next couple of interviews in its Harbinger Series. We invited John Francisco from our Spanish community, Munaj Hossan from our Bengali community, Andrey Sher from our Russian community, and Geoff Richards from our English community. These outstanding Harbingers are dedicated to helping local community members to further understand the various dynamics of Ontology. Ontology Harbinger Emilio, from our Spanish community, was invited to participate in an online interview organized by YouTube KOL, BCryptoDinero. He discussed how Ontology focuses on providing decentralized identity and data solutions for Web3, and shared Ontology’s vision, plan and future outlook. This month, Humpty Calderon, our Head of Community, held Ontology Community Call on Discord as always. He focused on topics such as “how to contribute to Ontology’s ecosystem”, “Let NFT return to the public”, and facilitated community members discussions and analysis about the possibility of participating in the Ontology ecosystem, the operating experience of Ontology nodes, and the importance of DID to the popularization of NFT. He also held our weekly DeID Summit, hosting a Q&A with Charles Wayn, co-founder of Project Galaxy, to discuss “NFTs as a service infrastructure”. We held our Telegram Staking Q&A, led by Humpty Calderon. He elaborated on the economic model of Ontology and answered staking-related questions so that interested members can participate more easily. We held our Telegram Community Call, led by Astro and Benny, Ontology Harbingers from our Asian community. They introduced Ontology’s Staking strategy and upcoming 4th anniversary NFT event; Community members expressed their great anticipation for this extraordinary commemorative event. As always, we’re active on Twitter and Telegram where you can keep up with our latest developments and community updates. To join Ontology’s Telegram group and keep up to date, click here. New Team Members

We are delighted to welcome our newest members of the Ontology team. This month, we welcomed a new Technical Support Intern, a new Ecosystem Growth Intern, a new Marketing Manager, a new Operation Associate, a new Solidity Engineer, a new Senior Java Software engineer, and a new blockchain senior researcher.

Recruitment

At Ontology, we are always looking to expand our team. We currently have a list of open roles and are looking to hire ambitious and hardworking individuals (see below). Check out our website for full details.

Global Marketing manager Solution Architect Europe DeFi Strategist Solution Consultant Test Engineer Senior Software Developer, Java Quantization Trader Senior Software developer, Java Engineer, iOS Engineer, Android Product Lead Blockchain Quality Assurance Engineer UI Designer Overseas community marketing Community operations associate Out & About — Event Spotlight

It was all hands on deck this month with a string of news and developments:

Ontology announced that it has further deepened its cooperation with ROCKI, a next-generation music streaming service and music NFT platform built on Binance Smart Chain. Ontology provides ROCKI with a decentralized identity-based batch verification solution. ONT TAG ensures ROCKI users’ data remains secure and artists are rewarded for the work they produce. Ontology founder Li Jun was interviewed by MarTech Series. He shared his views on the future development of Web3 and discussed the development of Ontology ecosystem. Since its establishment, Ontology’s decentralized identity protocol has been adopted by many companies around the world. In the future, we expect more and more users to adopt decentralized identity solutions to manage their digital identities. Ontology plans to introduce more innovative products in this regard, to meet the needs of more users. Ontology, Nervos and QuarkChain jointly organized the “EVM Autumn Concerto’’ blockchain technology seminar. Ontology Technical Director, Ning Hu, shared Ontology’s research on VM technology and the possibility of future development in the field of VM. Blockchain technology experts discussed the development and future of EVM together. Ontology Technical Director, Ning Hu, was invited to participate in the second hardcore technology sharing BeWater Live held by Bewater Community, the top developer community of China, sharing content on the theme “From 2D Social Network to 3D Social Network” for technology enthusiasts. Ontology’s Chief of Global Ecosystem Partnerships, Gloria Wu, shared her opinion in the article “Women and Web 3.0 — Experts Weigh-In On Community and Financial Freedom”, published in BeInCrypto. She said decentralized finance offers more opportunities for authentic creativity and boundary-breaking, and that the role of women in the redefinition of finance is key. Read this month’s report in your preferred language: 中文 繁體中文 日本語 한국어 Española Slovenčina Tiếng Việt Hindi русский Tagalog සිංහල Türk Italiano (coming soon) বাংলা

Learn more about our decentralized data and identity solutions on our website and official Twitter account. You can also chat with us on Telegram and keep up-to-date with the latest news via our Telegram Announcement account.

Other Resources

LinkedIn / Medium / Facebook / Reddit / DiscordYouTube

Ontology Monthly Report — November 2021 was originally published in OntologyNetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


SelfKey

Living Avatar NFT: Preparation For a Metaverse Future! 🔮

SelfKey Weekly Newsletter Date – 26 November, 2021 Living Avatar NFTs and how it could be potentially influential in a Metaverse future. The post Living Avatar NFT: Preparation For a Metaverse Future! 🔮 appeared first on SelfKey.

SelfKey Weekly Newsletter

Date – 26 November, 2021

Living Avatar NFTs and how it could be potentially influential in a Metaverse future.

The post Living Avatar NFT: Preparation For a Metaverse Future! 🔮 appeared first on SelfKey.


Let's Talk about Digital Identity

Identity’s role in cybersecurity with Swedish TV’s ethical hacker, Linus Kvarnhammar – Podcast Episode 56

Let's talk about digital identity with Linus Kvarnhammar, Cyber Security Consultant at Syneptic. Following his Swedish TV series, Hackad, professional hacker Linus discusses the biggest risks that insufficient identity management can create for individuals and organisations. Oscar and Linus explore the pitfalls of authentication, authorization (including MFA), and more – and how these lead to secur
Let’s talk about digital identity with Linus Kvarnhammar, Cyber Security Consultant at Syneptic.

Following his Swedish TV series, Hackad, professional hacker Linus discusses the biggest risks that insufficient identity management can create for individuals and organisations. Oscar and Linus explore the pitfalls of authentication, authorization (including MFA), and more – and how these lead to security incidents.

[Transcript below]

“We have a standard way of identifying a person in real life – passport, driver’s license, national identity card. But as far as I’m aware, we don’t have one that is universally accepted both by the individual and companies”

Linus is an independent cyber security consultant and professional hacker. He is also one of the hackers in the TV series “Hackad” on SVT. He has more than 20 years of experience working in the IT industry where the last 10 years have been spent exclusively doing penetration tests of applications and networks with a few social engineering assignments every now and then.

Find Linus on Twitter @lkvarnhammar and on LinkedIn.

Watch Hackad at www.svtplay.se/hackad. You can also find the English subtitles at hackad-english.blogspot.com/2021/11/hackad-tv-2021-english-subtitles.html.

We’ll be continuing this conversation on Twitter using #LTADI – join us @ubisecure!

 

 

Podcast transcript

Let’s Talk About Digital Identity, the podcast connecting identity and business. I am your host, Oscar Santolalla.

Oscar Santolalla: Hello and thanks for joining. And today, we’ll hear insights from the world of hackers. Of course, ethical hacking is what we’re talking about. And we have a very special guest with Linus Kvarnhammar. Linus is an independent cybersecurity consultant and professional hacker. He’s also one of the hackers in the TV series Hackad on the Swedish TV SVT. He has more than 20 years of experience working in the IT industry, where the last 10 years have been spent exclusively doing penetration tests of applications and networks with a few social engineering assignments every now and then.

Hello, Linus.

Linus Kvarnhammar: Hello.

Oscar: Very welcome. It’s nice being with you, Linus. And well, good to hear more about the interesting work you are doing there. So…

Linus: Oh, thank you.

Oscar: Please tell us a bit more about yourself and how was your journey to this world of cybersecurity and hackers.

Linus: Yeah. I- the last 10 years or so, I’ve been doing penetration testing as a security consultant. And yeah, my interest in computers started when I got my Commodore 64, I think it was 1987. And then I had an Amiga. And then I started working with computers directly after school and I’ve been doing that since. I also spent some time, some years doing development work, being a .NET programmer. So a quick bit about my background.

Oscar: You also worked as a developer at some point?

Linus: Yeah, yeah. I think my background as a developer, and an IT pro back in the early days, was a good way of getting into security. Because I think, for me, cybersecurity is about knowing how a computer system works and trying to break it, right. So if you know how the application is built, and if you know how operating systems and networks work, then I think you have a good chance of being good at cybersecurity, I think.

Oscar: Yeah. And I can imagine if you have had, since a child you had a computer at home, not many of the ones who are listening to this had that. And yeah, I’m sure you understand. You have time to understand quite well how the computer works exactly as you said and also in your perspective as a developer. So when you were, for instance, a developer, during time you were a developer, you had also this interest in trying to find the vulnerabilities or something that doesn’t work well, you had already this curiosity?

Linus: No, I don’t… Nah, not really, actually. I think I was mostly focused on – focusing on like writing good code for new and upcoming cool technologies. So I didn’t really… I wasn’t really that interested in security when I was a developer, actually. So it was first when I actually got a job at a security company doing development work. So there, as one of the few developers or maybe the only one, I saw what the security consultants were doing. I thought it was really cool that they could like break into systems and networks. It’s like being a thief, but being authorised to make burglaries, but in the cyber domain, I think it was really cool. And so I transitioned to that.

Oscar: OK, OK, that’s… yeah, that’s how you found this path. Fantastic. You have just said you have been working at least the last 10 years in penetration testing and these kind of activities. And you recently, you will tell us more, recently you have started to appear in a TV series called Hackad in the Swedish TV, please tell us a bit about that, especially how, yeah, how you were chosen, or, yeah.

Linus: Yeah, the TV series firstly is six episodes, and it’s broadcast on the Swedish Public Service television. And it can actually be viewed all over the world. But it’s in Swedish obviously. It’s six episodes with various themes, like private people, celebrities, companies, the smart home, etc. In each episode, we’re hacking different things, and showing what we’re doing and a lot of social engineering as well.

And I was approached by SVT, like maybe a year ago or a year before we started recording. And it was – we started, we recorded a pilot in December last year. And then we recorded the TV series in February, March. And a year approximately before that, I was approached by a person who was like working on developing the programme idea, and he got my name from another security consultant. And I, in turn, gave a few other names of security consultants that I knew were good at their jobs.

And in the beginning, the idea was that they were going to make a TV series about integrity and privacy and big data. So like Facebook, Google, what do they know about us, kind of thing. But me and a lot of other security consultants, I think told them that we can hack stuff. That’s what we do. And that’s pretty cool as well. I think they turned their attention or the focus of the TV series more, or not more, completely towards hacking things, both hacking private people and hacking companies.

In the pilot in December, we didn’t get any preparation, we were three people. And we showed up at a hotel and they said, “Hack this hotel.” And we went at it. We opened doors to try to find network connections, we attacked the WiFi, we did everything we could, but then eventually, we realised that this hotel is just one computer in the lobby, and the rest of the building is like a shared office space. So we failed miserably. But actually, for some reason, the pilot was, it turned out well anyway. And the managers at SVT they decided they wanted it so they ordered it and the production started two months later.

Oscar: Sounds super cool. And definitely, I watched some of the – some of the episode even though I don’t understand Swedish, but yes, it looked great, very interesting.

Linus: Yeah, actually, Jinny, one of the hackers in the TV series, she did an awesome job at actually translating all the episodes. So you can find English subtitles for the episodes out there.

Oscar: Oh, it’s already…

Linus: Yes.

Oscar: Wow. I have to come back and watch then.

Linus: I can provide you with the link where you can actually watch the streaming – but streaming from SVT and then adding English subtitles on top of it, it’s possible.

Oscar: OK, perfect. We’re going to share that information so everybody can watch them. Fantastic. All right, excellent. And, as you say, at least in this series, it’s super visual when someone says OK, you can hack a person, it’s a celebrity, big profile company, can have machines, particularly machines, and yeah, it’s super wide how you can be hacked. Let’s bring the attention a bit on identity, which is the main thing we talked about in this podcast. We know that identity is, of course, quite connected to security. What do you think are the biggest problems related to identity that you find or you have been finding through your work as a security consultant?

Linus: Yeah, there are obviously a lot of technical issues that can be connected to identity authentication more. But on a higher-level identity I’m thinking, a thing I have been talking with clients about recently is this issue of government issued identification – because when you log into a generic application, you can usually say, you can provide whatever identity. You can make up your name, you can make up your– you can register any Gmail or any email address. But what about these applications where you need to prove your real identity, like public service applications?

I think that’s something I don’t think we’ve solved in our business like, is it… what/ how do we identify to as like me with my social security number to an application? In Sweden, we have something called mobile BankID. In other countries, they have similar but is that something we can require or expect every user to have? I think that’s a problem. I’m not sure it’s the biggest problem we have but it is a problem. Because some people might say that, “Well, my mobile BankID that’s my private ID and I don’t want to share that with my employer, for instance.

That’s probably something that needs to be solved. Like, we have a standard way of identifying a person in real life – passport, driver’s license, national identity card. But as far as I’m aware, we don’t have one that is universally accepted both by the individual and companies. Do you have any take on that?

Oscar: Yeah, it’s true. As you said, in Sweden there is a solution, I think it works pretty well. In a few other countries there’s something similar. But yeah, in the vast majority of countries, there’s no – first of all, there’s no global, as you say, there’s not something universal. And such solutions as the Swedish BankID is not present in most countries.

Linus: Exactly. And I was talking to a customer yesterday about like drivers in a company and the drivers, like kind of taxi drivers, they need to prove their identity when they start the car, or start like a device inside the car. And the best way of proving their identity would be mobile BankID. But then the question comes up, like can we really require that everyone has a mobile BankID, which is a personal identification? I’m not sure. And I guess that’s more of a legal aspect, I guess, than cybersecurity. But it is interesting nonetheless.

Oscar: Yeah, it is a good question definitely. Do some places, like as you give this concrete example of a driver authenticating so to say, to a car? Yes. What is a reasonable way?

Linus: Yeah, exactly. Because if you don’t use that kind of identification, let’s say you use a regular login, register and login like you do online, then you would have drivers running around with nicknames as authentication. Or, if it’s username and password, yeah, what makes it not the case that you share your username and password with another driver. So, as far as the public authority is concerned, one guy is driving, but actually it was another guy. So he may be his subcontractor that’s driving – his contract to another guy, and he just shared his login.

Oscar: Oh, yeah, actually that’s a very good observation, because in some of those cases, like driving a taxi or a bus, yeah, there should be more security into how the personnel identifies himself there.

Linus: Yeah, exactly. Imagine if the real bus driver was sitting at home watching TV, and then his brother, who wasn’t a bus driver, he was logging into the bus and driving it around. That wouldn’t be very good from a public safety standpoint.

And I guess these challenges are coming more and more as we have digitalising society more and more. Because if now, this is a fictitious example, but when you get your bus in the old way, or probably the current way, then you go somewhere, and you maybe show your ID at the gate, and you get your key, and then you sit down in the bus. But let’s say you digitalise all that, then you need government-issued or government approved digital identification to prove your identity. And then we have BankID, but can we expect everyone to use that? Or is that perhaps not legal? I’m not sure. I think it’s an interesting question. That would be more important as we go further into the digitalisation of the society.

Oscar: Yeah, yeah it is. Yeah. So what else have you found related to identity on those activities? Obviously, I know that in the TV series already, you are hacking some person’s identity for instance, right? So what is typical? What situation is typical to find?

Linus: Yeah, I would… if you have only a password, so if you divide up like, it’s interesting to think of passwords as something you know, like a phone, something you have, and then your eye or your fingerprint as something you are. Let’s say you only have one factor, the password. Then we have a long list of different issues that can occur. And one of the most common ones that we abuse in the TV series is that users typically share passwords or use the same password on many sites. And then it’s enough that one of those sites is hacked and the database leaks. So I have terabyte of leaked databases on my computer, which I can search.

So that’s one of the first and most easy ways to do if you want to get into someone’s account, you search for their email address, and see what password they’ve been using previously, in other applications, and you try out those, that’s one.

Another one is that if I give my password to you, or to your application, then you have the password. And then if I share that password with another site, then you, with your application, can know my password and try it on other applications. That’s also I mean, a fundamental issue.

And then you have everything with password resets and password policies, there are loads of technical security issues that you can find. And it’s in applications that we penetration test. I think it’s our job to push the clients or we’d like to push them to increase security. So we often like add requirements as time progresses, up the requirement on password length, for instance.

But then, with multi-factor authentication, it’s interesting as well, because I think a lot of people think that if I have two-factor authentication, I have my SMS codes, for instance, I’m fine. Nothing can happen. Well, I think it’s, you’re way much better off compared to someone who doesn’t have it. But when it comes to the security of the application, then it becomes really important to secure this session. Because if you’re – once you are authenticated, there’s something proving that you continuously can access the application right – and that’s typically a session cookie or JWT token. And if someone can steal that, they have stolen your login without you actually giving up your password and the two-factor authentication code.

A good example of that I did an assessment years back of a medical application for the everyday person in the society. And they were logging on with BankID. So that worked really solid well. But then they had a vulnerability in the web application that disclosed the error log. And then the error log were errors from all the other users. And in the error log was also their session cookie. So if I looked at their log, and waited for another user to trigger some error in the application, their session cookie would be logged, and I could see it. And then I could take that cookie, put it into my browser, and boom! Now I’m logged in as them.

See, I think it’s a good example of how you think a web application that requires mobile BankID is like 100% secure, but it’s actually not if it has these kinds of vulnerabilities. So there are a lot of things to test with regards to session management, like cookies and stuff like that, where it can go wrong.

Oscar: Yeah, that’s on the application side, right, the application that is right after you authenticate.

Linus: Yeah, exactly. Yeah, and I’ve found vulnerabilities around 2FA, two-factor authentication as well, like, let’s say you implement it, and it’s working perfectly. It’s just that when you guess, or when you enter your 2FA code, you can do it unlimited amount of times. And often the 2-factor code is four to six digits and if you can guess that in a high speed, and there will never be anything that prevents you from guessing further, you can potentially guess the right code.

Oscar: So you have you have done that. You have managed to…

Linus: I have done that. Yes. Yes, absolutely. And also backup codes – so sometimes you have two-factor authentication code, but then you have a backup code in case you lose your device and you are supposed to write down the backup code. If the backup code, that basically becomes a password. So it must be strong enough to stand against, I guess. But I’ve seen backup codes that are weak. So if they’re weak enough for you to be able to guess it, and perhaps you can guess indefinitely, and as long as you don’t have an application that detects this – detects and/or blocks, then maybe I can guess for weeks. That’s some examples of technical vulnerabilities that can affect I mean, high security authentication mechanisms. I mean, seemingly high as in two-factor authentication.

Oscar: Yeah. So you were able to hack most of two-factor authentication methods.

Linus: Not most, not most. Some, some only.

Oscar: The weakest ones. Yeah. Yeah.

Linus: Yeah.

Oscar:  Like, for instance, ah, typical is the SMS OTP?

Linus: Yeah.

Oscar:  Yeah, that’s one of the weakest, yeah. Just guessing and guessing and you find out the…

Linus: Yeah, exactly. If you’ve not implemented it properly in the backend, I mean, in the application. And obviously, a problem with two-factor authentication via SMS is also that the code is actually displayed on the locked phone, typically.

Let’s say you and me work in the same office and I’ve searched database dumps online and found your password in one of them and I try it out and I get confirmation that the password works, but you have two-factor authentication connected to your phone, then probably I’ll just wait until you leave your phone. And most people don’t leave their phone. But if you leave your phone to go to the toilet or something, I can login and just look at your phone, enter the code into the web application and get in.

Oscar: The phone is locked but it shows them, yeah.

Linus: Exactly. Yeah, it shows at least the first line of the SMS, it will typically show.

Oscar: Yeah, very, very interesting, of course.

Linus: And I guess you probably talked or maybe you talked about SIM swapping attack. Have you done that?

Oscar: Yeah, tell us more if – what you have found out.

Linus: That’s another problem with SMS as a two – second factor is, you’re basically relying on your cell phone provider to not give anyone else your phone number. So you’ve outsourced your security to your mobile phone provider. So if someone and this has been done, it’s been written about online. If someone managed to go to the phone store and convinced them or over the phone, convinced them that they are you, get a new SIM card for your phone number, then for a brief period of time until you notice it, they will have access to your phone number. But during that window, they can log in as you.

Oscar: Yeah, exactly.

Linus: And it could be even the case that if you do issue a password reset, some applications will have a password reset functionality that only requires the user to have the phone available. So in that case, you don’t even need the password. You just have to do a password reset and confirm that you know you have the right number and then you’re in. That makes other types of two-factor solutions like a mobile app much, much better.

Oscar: And how often still this SIM swapping done nowadays?

Linus: I’m not so sure about that. I don’t have any updated data or news on that. It was long time since I heard about it. But it is, I mean, the principle is that you’re relying on your mobile phone provider. So it’s – in that sense, it will always be a viable attack. It will always be dependent upon them keeping your phone number secure.

Oscar: Yeah, it is definitely. And this is where mostly the attack is with the social engineering, correct?

Linus: Yeah, I would say so. But it’s not unreasonable in more sophisticated scenarios that you have an insider. So, if you look at these mobile phone shops, it’s typically young people that work there, they probably don’t have that much pay, so if you go to them, one of them, maybe take the one who’s mostly the least moral and the biggest amount of cash need, and you give them 1,000 Euro, maybe 10,000 Euro, I don’t know, they might be able to issue you on a new SIM card for that number.

And then that’s the cost of getting into that account. So if you have – if you consider you as, I mean, if you value your security high, maybe you are a person with additional requirements for some reason, or security, maybe this should be taken into consideration.

Oscar: Yeah, I can see that’s still a big threat. Yeah, absolutely, I guess.

Linus: I would expect the future to show us more cases of buying insider access and stuff like that, especially ransomware gangs, nowadays, they have so much money. So it’s not unreasonable for them to pay these kinds of amounts, I think for insider access.

Oscar: Yeah. Well, especially like a big target, right? Not unlike like a normal person but yeah, the big target.

Linus: Yeah, exactly. But let’s say you work at a big company, but you’re a regular person. If it’s enough to take over your account to get VPN access into this big company, that can then be ransomwared, then you are actually a pretty normal person. But your access is worth a lot to a ransomware gang.

Oscar: Exactly. So they gave a bigger target than the company that we get. Yeah, exactly.

Linus: It’s like, sometimes, you say you can hear people saying I think it’s valid, like the, one of the best key chains to get hold of is the cleaner in an office because he can access everything. I mean, if you want to pay someone to do something for you, he has access to everything. And he’s walking around the office space when everyone is not there. So it’s him or her as a person. It’s not a high value target but the access they have is high value.

Oscar: Something I remember now when we had a chat with you a few weeks ago before this interview is that, you show us on the on the TV series, I think you hacked one person, I don’t remember what you hacked exactly – either Facebook or some password. And because of that, thanks to the – well the single sign-on, for instance – by accessing one of these services, you were able to access many other services.

Linus: Yep, that’s right. And that’s – I think that’s episode one where we hack a private person’s Facebook account and then we can show him and the viewers that we had access to, I don’t know, 10, 20 applications, because he was using Facebook to authenticate to these applications.

That’s – I mean, that’s the nice thing with single sign-on, as in a Windows, typical Windows network but it’s also the downside. So in a Windows network, if you get hold of the identity of one person, you get access to all the resources this person has access to. So it’s, yeah, both pros and cons with that.

I understand why people use Google and Facebook to authenticate. And you have a lot of, what do you say, pros with that because you don’t have to manage a bunch of different websites or passwords. I mean, and you only need to trust that Google or Facebook is doing the authentication right. So there is a lot of good things with that. But then you should really keep that password and that account closely guarded. Because if you lose that it’s yeah, you have a lot of problems.

Oscar: Yeah, exactly. Yeah, it’s important to be aware of that. So the users see the benefits, the process you said, but also take it – yeah, keep it very secure, especially if it’s a main account, like Google or Facebook could be it’s a gate to other services as well.

In the side of, for instance, this case, we’re talking about authorisation because we are authorising via your access from Google, for instance, to some access to other applications. When you have, for instance, were able to hack some systems, bypass the authentication, have you found that the weaknesses in the authorisation that the systems are not properly configured or even designed to, to define well the authorisation of a user?

Linus: I think that’s one of the most common vulnerabilities we see because it’s complex. It’s typically more complex to get this right than other things. So an application typically has many, many different endpoints to get information, to change information, to add information. And every one of these needs to be configured properly usually in code. Like to access this endpoint, you need to be this role and this role. And it’s easy to miss that, to forget one or more of those, or configure them wrong. Maybe that’s one that should require a more strict role than another one. So I think the complexity there is working against developers. And we often see some mistakes in this area.

Oscar: And the mistakes goes more or both into designing the system and also configuring right, maybe in both, I think.

Linus: I would say it’s mostly implementing it, because when you design it, you can say that, well, the admin page should only be accessed by admins – administrators, for instance. But that requires that every admin action then is implemented such that it will deny a regular user access. So it’s up to the programmers often to do the right work to get this right.

And then it’s good to understand that, at least from my perspective, two main different types of access control mechanisms. It’s on a functional level, like role-based, you should have access to this area and not this. So let’s say you’re a regular user, you should not be able to access the admin page, or admin functionality. And then there’s an object-based, so I should be able to read my messages, not yours. And the latter one is typically the most difficult to get right because it might be that it’s built further down in deeper layers of the application where you need to actually check that the object that you’re trying to read and return is actually belonging to this user. That’s a typical vulnerability we find.

It’s actually something often pretty easy to test for regular people. If you’re browsing the web, and you– or you’re logged in somewhere and you’re maybe reading messages, downloading files, and you see the URL that has a number there, try changing the number to something else. And if you get someone else’s message, then maybe you committed a crime, I’m not sure. But at least you can report it to the company.

I did that for – you can say I can anonymise it a little bit, but privately I got, like I said, I got a certain kind of license, so I interacted with one government page. So I logged in, and I accessed like my test results on this license. And then I could see easily in the URL that there was a number there. So I just changed that number to another number, and I got someone else’s test results. And then I put that into a script. And I downloaded probably like 10,000 test results. And obviously I contacted them, found out who was responsible and told them about this, and they fixed it immediately. And they were really thankful. But it turned out that this database contains test results from I think back to the ‘90s.

Oscar: Did your service to the…

Linus: Yeah, exactly.

Oscar: …to the community. Fantastic. Yeah, it’s excellent that the power of people like you that have this amazing technical expertise and can help not only specific companies, but also to everybody like to the whole country, the whole community. Fantastic.

Super interesting hearing your stories and everything we have in here. And please, final question we’d like to ask you is for all business leaders, decision makers who are listening to this, what is the one actionable idea that they should write on their agendas today?

Linus: Business leaders should be aware of the risks that they are having. So if they are not talking to the IT department, IT manager or CISO, if they are not talking to them, asking them like what risks do we have? Are we doing – are we assessing security? Then they should do that, because otherwise, the risk is that security is something that is handled below like far down in the organisation. And then this need for budget and time and everything that is needed to invest in security is not getting addressed at the top.

So if the leaders asked their subordinates, “Tell me about the risks we are having.” and they – then they need to get these reports. And that’s I think, how you – how it should start, not start but if you know what I mean. I think typically or in many organisations, security is not addressed at the top. So it should be considered an investment in your company, in your solutions, not just a cost.

Oscar: Exactly. Yeah, I could not agree more with that. Thanks a lot Linus for this very interesting conversation. It’s been a pleasure. Let me know if people would like to see your work or get in touch with you, what are the best ways?

Linus: I think LinkedIn is the best. That’s where I’m pretty active. I answer messages and yeah, I publish some stuff there every now and then.

Oscar: Great. And of course, do watch the TV series Hackad on the Swedish TV, which I’m going to put the link on this episode. Again, thank you, Linus, what a pleasure talking with you and all the best.

Linus: Thank you very much.

Thanks for listening to this episode of Let’s Talk About Digital Identity produced by Ubisecure. Stay up to date with episodes at ubisecure.com/podcast or join us on Twitter @ubisecure and use the #LTADI. Until next time.

[End of transcript]

Tuesday, 30. November 2021

KuppingerCole

Frontier Talk #8 | Reinventing Government with Technology - Sebastian Manhart

Raj Hegde is joined by Sebastian Manhart - Technical Advisor on Digital Identity for the German Chancellery to explore governmental reform and understand stakeholder expectations behind the rollout of digital identity projects in the post-COVID era. Tune in to this episode to learn how governments can transition from risk-averse waterfall approaches, improve human f

Raj Hegde is joined by Sebastian Manhart - Technical Advisor on Digital Identity for the German Chancellery to explore governmental reform and understand stakeholder expectations behind the rollout of digital identity projects in the post-COVID era.

Tune in to this episode to learn how governments can transition from risk-averse waterfall approaches, improve human factors in public services and navigate through the government-private sector nexus to promote citizen access to essential services.




Global ID

GiD Report#188 — Square’s web3 identity ambitions

GiD Report#188 — Square’s web3 identity ambitions Welcome to The GiD Report, a weekly newsletter that covers GlobaliD team and partner news, market perspectives, and industry analysis. Check out last week’s report here. ICYMI: EPISODE 14 — What we learned at Solana Breakpoint This week: Square’s web3 vision A world full of credentials Chart of the week — 90s internet edition
GiD Report#188 — Square’s web3 identity ambitions

Welcome to The GiD Report, a weekly newsletter that covers GlobaliD team and partner news, market perspectives, and industry analysis. Check out last week’s report here.

ICYMI: EPISODE 14 — What we learned at Solana Breakpoint

This week:

Square’s web3 vision A world full of credentials Chart of the week — 90s internet edition Stuff happens 1. Square’s web3 vision

First, they published a white paper, as per their cheeky tweet (via /j and /gregkidd):

The paper was also published to Github (in case you want to contribute).

For context, TBD is a new division within Square focused on non-custodial and decentralized financial offerings.

The white paper’s vision is similarly straightforward — essentially a decentralized exchange with built in social trust (AKA identity). From the abstract:

The tbDEX protocol facilitates decentralized networks of exchange between assets by providing a framework for establishing social trust, utilizing decentralized identity (DID) and verifiable credentials (VCs) to establish the provenance of identity in the real world.

For the world of self-sovereign identity, Square’s entrance into the arena will be huge when it comes to the promotion of open, interoperable, and privacy preserving standards such as decentralized identity and verifiable credentials.

As GlobaliD co-founder and CTO Mitja Simcic noted:

Most interesting bit is that unlike traditional DEXs, Square doesn’t plan to use a trustless model, like atomic swaps, and instead uses decentralized identity and verifiable credentials

As their blog post explains, this was a natural solution.The real world, both social and economic, is still based on the notion of identity — not merely the ownership of cryptographic keys. In order to build those bridges, building trust and identity into decentralized frameworks is an inherent requirement. There’s also the question of regulations and compliance:

This means that such exchanges of value must necessarily be based on other means of governing social trust. Decentralized identifiers (DIDs) provide part of the solution by enabling verifiable digital identities that facilitate trustworthy exchanges between counterparties. But the main benefits are lost if the DID method is not implemented in an open, permissionless, and censorship resistant manner.
We propose a solution that does not rely on a federation to control permission or access to the network; nor does it dictate the level of trust required between counterparties. There is no governance token. Instead, the tbDEX protocol allows participants to negotiate trust directly with each other — or mutually and voluntarily rely on trusted third-parties to vouch for the counterparty. Transaction costs are ultimately driven by risk. At maximum anonymity, transaction costs will necessarily be higher; at maximum disclosure, they should be lower. This approach to price discovery allows the marketplace to find the right balance.
The tbDEX protocol also facilitates the secure exchange of the minimum necessary identity information acceptable to counterparties in order to satisfy requirements, be they legal, regulatory, or related to any other consideration of risk. The protocol itself neither collects nor records any personally identifiable information.

So there you have it.

It may or may not have been a coincidence that Jack Dorsey resigned as Twitter CEO this morning. We know that ideas of web3 have been percolating in Jack for some time. Back in December of 2019, he announced what would become Bluesky, an initiative to develop a decentralized social media protocol. We haven’t heard much since.

But dreams of a decentralized future continued. In August, Jack announced their latest plan — develop a decentralized Bitcoin exchange. This latest white paper is the culmination of that journey.

Relevant:

introducing tbDEX Square Releases White Paper Detailing Protocol for a Decentralized Bitcoin Exchange Jack Dorsey stepping down as Twitter CEO 2. A world full of credentials Image: iStock/gremlin

If you build it, they will come. (And we’re thrilled that Square is joining the party when it comes to the building part.)

Adam Davidson illustrates what a web3 identity world might look like when it comes to hiring (or in same cases, already is) — H/T Matt Levine’s excellent Money Stuff (via GlobaliD COO /rcb):

But resumes are, typically, works of creative aspirational fiction. With web3, people can share tokens showing someone’s crucial role on a project. This happens, now, on DAOs (more on those here), blockchain-based communities. I spend a lot of time at the Bankless DAO, where it is just a routine part of the daily flow for people to send tokens of gratitude to those who have been helpful in some project or other. People who attend meetings, get a POAP, a token of attendance. So, you can see at a glance if someone is an active member or an occasional lurker. Every day, people send “tips” of tokens of gratitude to others. One person giving a particularly helpful colleague a tip often leads to an avalanche of others doing the same. (Come to think of it, I really haven’t gotten a lot of tips. I should up my game.)
As web3 becomes more ubiquitous (as I expect it to), younger employees will ask their bosses and co-workers and, eventually, demand of them that they implement this kind of in-real-time, collaborative credentialing.
Similarly, people can build up a collection of immutable tokens showing the conferences they attended, the courses they took, the skills they proved, the books they read, the creators they supported.
I expect it to become routine — first among younger people in more technical fields — that recruitment will involve looking at someone’s blockchain-backed identity to see a richer picture of the person’s background. If a candidate with an unpromising resume can demonstrate an unusually large number of these Gold Star tokens — in which former bosses and colleagues sent digital expressions of gratitude — from their past, you might overlook the fact that they didn’t, quite, graduate college. Alternatively, if someone with pristine credentials has a dearth of such expressions of gratitude, you might look at them more critically.

Combining that with token issuance for specific projects:

If you want to achieve some quick result — design an app, create a conference, build a new kind of bicycle, whatever — that you couldn’t do on your own, you typically have to spend a ton of time and resources NOT doing the thing you care about. You probably need to hire people, which means you need to raise money, which means you need a business plan and have to spend most of your time pitching. …
With web3, you could announce your goal publicly. People who are interested will reach out. You can quickly see what they’ve done (see above) and choose the team that meets your requirements. You can create a coin or token and distribute it among the team members. You can have a system that grants more of these coins when someone is recognized by the rest of the team for a helpful contribution. Ownership, then, will be dynamic and will reflect real activity.
When the thing you all are building launches, the profits can be distributed through the coin system, and the people who added the most value will get the most reward.

As Matt points out, “the potential future [Davidson] describes is both intriguing and also horrifying.”

Which is par for the course when it comes to technological innovation and tools — it’s always a double edged sword.

Relevant:

Real world problems that web3 could solve — at least for me — Mirror Right-clickers vs. the monkey JPG owners Notes on Web3 What Web3 is and why everyone is talking about it How to Explain Web3 to Your Grandma This Thanksgiving — Blockworks 3. Chart of the week

Blockworks: “Crypto adoption = 90’s Internet adoption”

4. Stuff happens Via /vs — Apple digital IDs come with conditions and costs — BBC News Via /vs — Reddit wants to be an advertising platform. What if it has better options? Via /gregkidd — Solana founder unravels the Layer 1 Wars | Anatoly Yakovenko Ethereum’s Fees Are Too Damn High Crypto group tries to claw back fees after failed Constitution bid Imagine not living in Big Tech’s world Regulatory riddle: An investigation into the SEC v. Ripple case and its consequences for crypto DAO Aiming to Buy NBA Team Has Quickly Raised $1.7M in Ethereum — Decrypt Ripple seeing ‘good progress’ in SEC case over XRP, outcome expected next year China’s exiled crypto machines fuel global mining boom FTC Privacy Probe of Amazon Ring Puts Khan’s Agenda in the Spotlight

GiD Report#188 — Square’s web3 identity ambitions was originally published in GlobaliD on Medium, where people are continuing the conversation by highlighting and responding to this story.


Dock

Dock Co-Sponsor the World's Largest DAO Hackathon Series

Since the 22nd November, USDAO and Dock are on the hunt to find and fund the best solutions built on the Decentralized Autonomous Organization tech stack.

Dock is excited to announce our collaboration in the next DAO HACKATHON which is running in the US and India. All participants in the hackathon will be issued Verifiable Credentials by Dock. HackMania has organized and managed hundreds of hackathons across the globe for over 6 years, equating to over 500 hackathons, 1,500,000+ applicants, creating 30,000+ prototypes, and have distributed over USD 750,000 worth of prizes.

Since the 22nd November, USDAO and Dock are on the hunt to find and fund the best solutions built on the Decentralized Autonomous Organization tech stack. The sectors to innovate within Dock’s challenge include:

Self-Sovereign Identity Workforce Training Know Your Customer (KYC) Learning & Academia Health & Safety

The virtual hackathon, hosted by HackMania, co-sponsored by Dock, gained over 2,500 registrations before the official launch on the 22nd November.

Participants can form teams and start building their solutions, at every juncture of the hackathon, mentors will be available to help teams build their MVPs. The mentor sessions are available between the 22nd November and 5th December. The mentors, who are also the acting Jury include Andrea Frosinini from Hyperledger, Nick Lambert, Elina Cadouri, and Mike Parkhill from Dock, Julien Klepatch from Eat The Blocks, and Prasanna Lohar from DCB Bank.

The jury will evaluate all submissions from the 6th December and winners will be selected and announced on the 10th December. The top 3 teams who partake in Dock’s challenge will be provided USD 5000 worth of Dock tokens. Enter the Hackathon and take part in Dock’s challenge here.


auth0

Announcing Auth0.org’s Latest Cohort of Strategic Grant Partners

Auth0.org Welcomes 4 New Cohort Grant Partners
Auth0.org Welcomes 4 New Cohort Grant Partners

Elliptic

Elliptic’s Position on the US Infrastructure Investment and Jobs Act (‘Infrastructure bill’)

On November 15th 2021, the Infrastructure Investment and Jobs Act (PL 117-58) was signed into law by President Joe Biden. Section 80603 of this bill, titled “Information Reporting for Brokers and Digital Assets”, introduces new requirements for brokers in the Internal Revenue Service’s (IRS) Revenue Code. The Code’s definition of “broker” is supplemented by the following language fro

On November 15th 2021, the Infrastructure Investment and Jobs Act (PL 117-58) was signed into law by President Joe Biden. Section 80603 of this bill, titled “Information Reporting for Brokers and Digital Assets”, introduces new requirements for brokers in the Internal Revenue Service’s (IRS) Revenue Code. The Code’s definition of “broker” is supplemented by the following language from Section 80603: 


KuppingerCole

SailPoint Access Risk Management

by Martin Kuppinger SailPoint Access Risk Management is a solution for managing users, their access entitlements, and the related access risk across a range of Line of Business applications, including SAP. SailPoint Access Risk Management delivers in-depth control about these environments, but also integrates neatly with the IGA (Identity Governance & Administration) solutions provided by Sail

by Martin Kuppinger

SailPoint Access Risk Management is a solution for managing users, their access entitlements, and the related access risk across a range of Line of Business applications, including SAP. SailPoint Access Risk Management delivers in-depth control about these environments, but also integrates neatly with the IGA (Identity Governance & Administration) solutions provided by SailPoint for cross-system controls across the entire breadth of critical business applications.

Authenteq

Authenteq and Coinfirm Announce Strategic AML Partnership


Ocean Protocol

Stable asset H2O backed by $OCEAN is launched by New Order together with Reflexer Labs

Introduction: The team at Ocean is thrilled to announce that New Order and Reflexer Labs will launch H2O, an $OCEAN backed, non-pegged stable asset. It’s based on the RAI stable asset by Reflexer Labs. Like RAI, it is decentralized, permissionless, and minimizes governance. New Order DAO is driving this initiative. They are a community-driven venture DAO incubator for decentralized finance (DeFi
Introduction:

The team at Ocean is thrilled to announce that New Order and Reflexer Labs will launch H2O, an $OCEAN backed, non-pegged stable asset. It’s based on the RAI stable asset by Reflexer Labs. Like RAI, it is decentralized, permissionless, and minimizes governance.

New Order DAO is driving this initiative. They are a community-driven venture DAO incubator for decentralized finance (DeFi) projects. H2O will be available on New Order’s DeFi marketplace with strong benefits for the Ocean ecosystem, especially Ocean Market.

What is H2O?

Stable crypto assets help attract would-be users of Web3 applications who have shied away from cryptocurrency due to excessive volatility. They are growing in popularity with their market surging past $100 billion.

The H2O non-pegged stable asset is a friendly fork of RAI. Whereas RAI uses ether (ETH) as its asset for collateral, H2O uses OCEAN. The price of H2O is managed by an algorithm that rebalances to bring the redemption price close to the market price and participants are incentivized to aid in this process. Traditional stable assets are pegged to a price such as 1 USD. In contrast, RAI (and soon H2O) are free-floating but typically settle around a price; for RAI this has been ~$3.

The (un)governing token of the protocol will be AQUA. This token helps manage the initial parameters of the protocol, bootstrap ecosystem development, and incentivize the liquidity of the protocol. AQUA token emissions will be done fairly, with portions earmarked for the Ocean community.

The H2O token will bring two near-term benefits to the Ocean ecosystem.

First, OCEAN holders will be able to stake OCEAN in order to mint H2O tokens, similar to how ETH is staked to mint DAI or RAI. The OCEAN stakers can earn based on staking. Second, Ocean Market users are exposed to lower volatility data prices. Ocean Market is a decentralized data market powered by Ocean Protocol, which has been live since fall 2020. In it, people use $OCEAN to buy, sell, and stake in the OCEAN token. This adds liquidity to the Ocean ecosystem whilst generating demand for $OCEAN. With the launch of H2O, Ocean Market (V4) users will be able to price tokens and stake in data pools with H2O. Therefore, data prices do not fluctuate the way they would with changes in the price of $OCEAN. (Users will still have the option to use $OCEAN). This reduces the risk and increases the potential upside for Ocean Market users.

H2O Launch and Tokenomics

The project is overseen and executed by the New Order DAO which is a new permissionless incubation DAO, generating long-term value by building and launching early-stage financial protocols, applications, tools, and infrastructure. The DAO launches and supports projects across many layer one ecosystems, and explores DeFi & NFT markets surrounding new digital asset classes.

H2O is currently in the final stages of the initial deployment. Its official mainnet deployment will be lined up with the release of the Ocean V4. Expected to ship in Q1 2022, Ocean V4 includes Data NFTs and resolves rug pull challenges. Then, there will be work for support of H2O in Ocean Market.

The distribution of the AQUA un-governance token is planned to occur over 18 months via staking contracts. This includes 2.45% to single-sided FLX staking, 2.45% to FLX/ETH Uniswap V2 LP, 2.1% to RAI Curve LP (subject to change to Reflexer’s liquidity plans). Some AQUA will be distributed directly to the Ocean community.

Visit oceanprotocol.com to find out more.

Twitter | LinkedIn | Blockfolio | Blog | YouTube | Reddit | Telegram | Discord

Stable asset H2O backed by $OCEAN is launched by New Order together with Reflexer Labs was originally published in Ocean Protocol on Medium, where people are continuing the conversation by highlighting and responding to this story.


Civic

Introducing New Tools for Creators to Build Trusted Communities

Building trust within an NFT community is tough. The NFT world is rife with scam stories about bots, rug pulls and bad actors, making it hard for buyers to trust good projects. Even worse, there are only limited tools available to combat these threats. That’s why we’re proud to present an innovative suite of tools […] The post Introducing New Tools for Creators to Build Trusted Communities appea

Building trust within an NFT community is tough. The NFT world is rife with scam stories about bots, rug pulls and bad actors, making it hard for buyers to trust good projects. Even worse, there are only limited tools available to combat these threats.

That’s why we’re proud to present an innovative suite of tools as an end-to-end solution that takes every step of the NFT lifecycle into account, helping creators prove authorship, protect their mints against bots, build more reliable communities, and create members-only experiences. 

Creators can get started immediately by doxxing their identities, pseudonymous-identities, and projects — they may simply go to our Discord server to get verified through our new automated Civic Pass portal. With Civic Pass, creators are also able to confirm that participants are legitimate buyers, not bots. And coming soon, creators will also be able to verify that community members in their Discord servers hold certain NFTs in their wallet. This feature will allow creators to offer members-only experiences.

Our goal is to make the process of building trust easier and more effective for creators. With that in mind, we’re sharing an overview of our plan to address the pain points of creators and marketplaces in the NFT space using identity tools.

1.     Build trust: Get doxxed by Civic

The first step for NFT teams or creators is to get verified with the Verified by Civic Pass program.

Our NFT identity verification process includes biometric liveness checks, KYC and sanctions screening, Twitter handles and ownership of project websites. Once completed, Civic will announce that creators have been fully doxxed and verified. This helps establish trust with potential buyers and community members. We’ve verified over a dozen projects, and we’ll have more product developments in this area in 2022.

2.     Issue your NFT collection: Defeat bots and create member whitelists

Coming soon, Civic Pass will be integrated with Metaplex’s Candy Machine and Fair Launch Protocol (FLP), the leading Solana protocols for minting, to add on-chain real-person verification. Civic Pass TokenGuard is fully compatible with Metaplex’s Token Metadata standard, so tokens remain fully compatible with wallets and secondary marketplaces. Creators can use Civic Pass TokenGuard to confirm that mint participants are legitimate buyers, not bots.

Freedom and security shouldn’t just be limited to creators, so Civic is creating a Discord bot to keep the community spaces fair and secure by providing industry-leading whitelisting tools. Our Discord bot will offer a standardized process, including a liveness check, for verifying participants within the Discord community. 

3.      Create members-only experiences and gated experiences for DAOs

Soon, we will be enabling gated, members-only experiences with proof of NFT ownership. Using Civic Pass, community members will be able to enter Discord servers by holding certain NFTs in their wallets. And, the same NFT in combination with Civic Pass will enable a related decentralized autonomous organization (DAO) to prove that members meet its requirements. With these tools, community members can start shaping communities that feel more meaningful. 

We are excited to offer these tools to the NFT and DeFi communities because we believe identity verification is vital to safeguarding digital assets as they become more widely adopted.

Our Developer Hub is a great place for developers to start integrating Civic’s NFT solutions into their projects. And, verifying upcoming NFT drops and mints is easily started on Discord

The post Introducing New Tools for Creators to Build Trusted Communities appeared first on Civic Technologies, Inc..


Elliptic

Crypto Regulatory Affairs: US Federal Regulators Clarify Joint Approach to Cryptoasset Regulation

🇺🇸  US Federal Regulators Clarify Joint Approach to Cryptoasset Regulation In early November, we noted that the chairwoman of the US Federal Deposit Insurance Corporation (FDIC), Jelena McWilliams, made remarks on cryptoasset regulation and had previewed a collaboration with the Federal Reserve and the Office of the Comptroller of the Currency (OCC) on this issue. On November

🇺🇸  US Federal Regulators Clarify Joint Approach to Cryptoasset Regulation

In early November, we noted that the chairwoman of the US Federal Deposit Insurance Corporation (FDIC), Jelena McWilliams, made remarks on cryptoasset regulation and had previewed a collaboration with the Federal Reserve and the Office of the Comptroller of the Currency (OCC) on this issue. On November 23rd, the three regulatory agencies released a statement outlining their approach and plans to provide greater clarity on banks’ ability to offer crypto-asset related services. 

The cross-agency statement details the main focus points of the “policy sprints” it conducted:

Developing a commonly understood vocabulary using consistent terms regarding the use of crypto-assets by banking organizations.  

Identifying and assessing key risks, including those related to safety and soundness, consumer protection, and compliance, and considering legal permissibility related to potential crypto-asset activities conducted by banking organizations.

Analyzing the applicability of existing regulations and guidance and identifying areas that may benefit from additional clarification.

Based upon the above activities undertaken during the policy sprints, the agencies have identified five core activities in the cryptoasset space which may be of interest to banks:

Cryptoasset custody.  

Facilitation of customer purchases and sales of cryptoassets.  

Loans collateralized by cryptoassets.  

Activities involving payments, including stablecoins.

Activities that may result in the holding of crypto-assets on a banking organization’s balance sheet.

Throughout 2022, the agencies will work to give clarity on the legality of banks to provide cryptoasset services to consumers. According to their statement, the Fed, FDIC and OCC are especially interested in considering the regulatory implications of:

Crypto-asset safekeeping and traditional custody services.

Ancillary custody services.

Facilitation of customer purchases and sales of crypto-assets.

Loans collateralized by crypto-assets.

Issuance and distribution of stablecoins.

Activities involving the holding of crypto-assets on the balance sheet.

Additionally, the statement indicates that, “The authorities will also evaluate the applicability of capital and liquidity requirements and liaise on this subject with international and intergovernmental organizations.”

While the joint agency statement falls far short of providing actual regulatory guidance on any of these topics, it offers an important signal about where these agencies will be focusing attention over the coming months. Greater regulatory clarity on these topics will only boost the confidence and ability of banks to harness opportunities in the cryptoasset space, and will further spur banks to accelerate their offerings of related products and services. 

In a related move, also on November 18th, the OCC released a new interpretive letter clarifying the obligations of banks when launching cryptoasset services. Previously the OCC had clarified in guidance issued during the tenure of former Acting Comptroller Brian Brooks that banks can provide custody services for cryptoassets, hold reserves for stablecoin issuers, and engage in other blockchain and stablecoin-related activities.

According to its new interpretive letter, the OCC still asserts that banks have the authority to carry out these activities, but with an important caveat: they must now seek and obtain a non-objection letter from bank supervisors before engaging in those activities. As part of that process, according to the OCC, a bank needs to demonstrate “that it has controls in place to conduct the activity in a safe and sound manner . . . including, but not limited to, operational risk (eg, the risks related to new, evolving technologies, the risk of hacking, fraud, and theft, and third party risk management), liquidity risk, strategic risk, and compliance risk (including but not limited to compliance with the Bank Secrecy Act, anti-money laundering, sanctions requirements, and consumer protection laws).”

Hence, banks do not have an unfettered green light to engage in cryptoasset activities without regulatory permission,  as some may have interpreted the earlier interpretive letters. Rather, they’ve been given more of a flashing amber light: they need to put compliance and risk management considerations front of mind before launching cryptoasset products and services, and need to satisfy their regulators they have done so. 

Some observers may interpret this new clarification as likely to set back the crypto-banking convergence already underway. However, at Elliptic we believe that an emphasis on clarifying compliance and risk management considerations upfront will in fact ultimately nurture greater financial institution adoption of cryptoassets. 

Financial institutions are already highly sensitive to regulatory and compliance risks they could encounter in the process of launching cryptoasset services — and a lack of regulatory clarity can sometimes be a hindrance to them doing so. By providing a framework for banks to approach and discuss these issues with their supervisors prior to launching cryptoasset services, the OCC is letting banks know there is a pathway to offering these services in a sound and compliant manner. 

Contact us to learn more about how Elliptic can assist your financial institution in complying with regulatory requirements so you can engage the cryptoasset space confidently. You can also read our analysis of how banks can custody cryptoassets in a compliant manner here

 

🇰🇷South Korean Regulators Expand Cryptoasset Regulation Efforts to Market Manipulation

Last week, Elliptic commented on a South Korean legislative proposal to tighten the AML/CFT regime for cryptoasset businesses. On November 23rd 2021, a report from the South Korean Financial Services Commission (FSC) expanded the authorities’ efforts to regulate the cryptoasset industry by tackling market manipulation. The National Assembly mandated the FSC to draft a bill within one month which would address this issue. This announcement comes at a time when regulators are increasingly focusing on the financial stability risks of cryptoassets.

To learn more about how your business can use Elliptic’s tools to comply with evolving AML/CFT requirements in South Korea, schedule a demo.

 

🇳🇱The Netherlands’ Central Bank Clarifies Sanctions Regulations for Cryptoasset Business

On November 19th 2021, the Netherlands central bank released draft guidance on sanctions screening for cryptoasset transactions in the form of a question and answer document. It reminds Dutch businesses that under the Sanctions Act 1977 “the assets of individuals and legal entities on a sanctions list must be frozen and no financial services may be provided to such individuals and legal entities.” 

To that end, cryptoasset businesses must take measures to identify "anyone involved in a financial service or a financial transaction." This includes screening a transaction, whether inbound or outbound from the business’ perspective, to identify any counterparties and beneficiaries involved. If the identity of a counterparty is unknown then cryptoasset business must, at the minimum, verify that their wallet address is not sanctioned. The regulator states that compliance teams are responsible for putting in place the appropriate measures to complete these checks in accordance with their business model and risk exposure. This is in line with the Financial Action Task Force’s risk-based approach guidance on virtual assets.

Schedule a demo to learn how Elliptic can help you comply with these measures by leveraging our sanctions screening capabilities that can prevent your exposure to cryptoasset addresses maintained associated with sanctioned entities and countries. You can also download our report on sanctions compliance in cryptoassets for practical tips and examples of best practice.  

 

🇪🇺 EU Council Adopts Digital Finance Proposals 

On November 24th 2021, the Council of the European Union adopted the proposals for the “Regulation on Markets in Crypto Assets” (MiCA) and the “Digital Operational Resilience Act’ (DORA). This adoption paves the way for European legislators to negotiate the details of this framework and reach an agreement with the European Parliament. Both proposals are part of the European digital finance package to ensure competitive, innovative and digitally-resilient financial markets. MiCA will create a regulatory framework tailored to cryptoassets and related activities, with sweeping provisions that will impact stablecoins, decentralized finance (DeFi) token issuers, and other emerging technologies in the cryptoasset space. On top of this, the DORA sets new rules on cybersecurity for the financial sector to prevent and mitigate the impact of cyber attacks. Elliptic will provide ongoing regulatory updates on these measures as negotiations begin.

To learn how your business can comply with current EU legislation and prepare for upcoming requirements using our best-in-class cryptoasset risk management solutions, schedule a demo.

 

🇪🇺  ECB Details Tailored Payment System Oversight Framework for Cryptoassets

On November 22nd 2021, the European Central Bank (ECB) approved a new oversight framework to regulate electronic payments. The electronic payment instruments, schemes and arrangements (PISA) framework is targeted at the governance bodies of electronic payment schemes with the safety and efficiency of payment systems in mind. It supports governance bodies by providing an assessment methodology to define functions and arrangements of the electronic payment ecosystem. The PISA framework includes cryptoassets and related services. The methodology details the applicability of 24 principles ranging from legal basis to liquidity risk. The Eurosystem’s national central banks have the responsibility to implement measures which will meet the framework’s expectations. Companies that fall under the Eurosystem oversight of payment systems are expected to adhere to the PISA principles by November 15th 2022.


Coinfirm

Authenteq and Coinfirm Announce Strategic AML Partnership

BERLIN/LONDON, November 30, 2021 – Authenteq, a leader in the identity verification space, has announced a strategic partnership with Coinfirm, a leading blockchain AML and analytics firm, in a move to help increase the safety and security of crypto exchanges and platforms along with other key industries.  Authenteq offers an AI-powered identity verification system. Their eKYC...
BERLIN/LONDON, November 30, 2021 – Authenteq, a leader in the identity verification space, has announced a strategic partnership with Coinfirm, a leading blockchain AML and analytics firm, in a move to help increase the safety and security of crypto exchanges and platforms along with other key industries.  Authenteq offers an AI-powered identity verification system. Their eKYC...

ValidatedID

Implementation progress regarding the AS4EDI20

We will now be able to offer our clients eDelivery services that adhere to the eIDAS Regulations, a more secure and safe method of transferring and receiving electronic documents.
We will now be able to offer our clients eDelivery services that adhere to the eIDAS Regulations, a more secure and safe method of transferring and receiving electronic documents.

ShareRing

Keep Your Guard Up – Be Aware of Scammers 24/7

Online scams have seen a huge surge in the past year, with a reported number of identity thefts and digital fraud rising by 25.07% in 2021, compared to 2020, according to TransUnion. As our community may be aware, we have recently been targeted by scammers impersonating us, and offering ShareToken in exchange for your seed... The post Keep Your Guard Up – Be Aware of Scammers 24/7 appeared first

Online scams have seen a huge surge in the past year, with a reported number of identity thefts and digital fraud rising by 25.07% in 2021, compared to 2020, according to TransUnion.

As our community may be aware, we have recently been targeted by scammers impersonating us, and offering ShareToken in exchange for your seed phrases, and personal security information. Although not an uncommon circumstance within our industry, we would like to take this opportunity to remind our users about their digital safety, and what triggers to look for when identifying a potential scammer.

Imposter scams will mimic anything that entices you to engage with them. This could be the likeness of a company, such as ShareRing, to the impersonation of social media challenges such as that on Instagram, where participants are asked to share their personal information in response to a question on their stories.

A key characteristic of a scam is usually associated with unusual payment requests such as making a direct bank transfer, often with urgency. This is one of the most prevalent methods used. Scams tend to manipulate emotion by also impersonating authority from government officials to family members. To keep your privacy safe, here are three tips you should always keep in mind:

Never disclose passwords and seed phrases

Be alert while sharing your personal information. Do not save your credit/ debit card or personal details on a website. It is suggested to secure your privacy by using a code on every app & never provide any seed phrase, code or passcode to anyone. 

 Be careful of fake websites.

Always head to the official websites or accounts. Many accounts mirror the official websites and may disguise themselves with very similar URLs (G00gle.com) or redirect people to unofficial payment links. Always check the domain name to see whether there is an “s” in the URL, E. g. “https://”, or a lock on the address bar. 

 Avoid unknown caller or text messages. 

Do not respond to text messages or missed calls from unknown numbers. Never provide any personal details, security numbers, passwords and any personal identification to suspicious callers. If you receive emails with links and attachments, do not click on them to avoid phishing scams. 

Want to stay up to date with ShareRing’s latest news, tips and updates? Subscribe to our newsletter below.

Reference:

TransUnion, 2021, Rate of Suspected Financial Services Digital Fraud Attempts Rise Nearly 150% Worldwide as Digital Transactions Increase (online)

Available from: https://bit.ly/3xEAOVq ( accessed 30 November 2021)

The post Keep Your Guard Up – Be Aware of Scammers 24/7 appeared first on ShareRing.Network.


ValidatedID

ValidatedID is now part of the AS4EDI2020 consortium

Validated ID participates in the AS4EDI20 project for the implementation of the CEFeDelivery AS4 profile in Europe.
Validated ID participates in the AS4EDI20 project for the implementation of the CEFeDelivery AS4 profile in Europe.

MyDEX

Why is data valuable?

This series of blogs is prompted by the UK Government’s proposed reforms of data protection law contained in its consultation paper Data: A New Direction. The stated intention of these proposals is to unleash a new ‘golden age’ of innovation and growth. But the real effect of these reforms would be to: Under the banner of tackling ‘consent fatigue’, abolish citizens’ right to consent to the

This series of blogs is prompted by the UK Government’s proposed reforms of data protection law contained in its consultation paper Data: A New Direction. The stated intention of these proposals is to unleash a new ‘golden age’ of innovation and growth. But the real effect of these reforms would be to:

Under the banner of tackling ‘consent fatigue’, abolish citizens’ right to consent to the collection and use of their data: achieved by expanding the definition of organisations’ ‘legitimate interests’ (where they don’t have to seek consent) to cover almost every activity they would wish to undertake, thereby rendering consent irrelevant. Under the banner of helping organisations access more data for the purposes of research and innovation, abolish the core principle upon which data protection regulations have been built: that personal data should only be collected for specified, explicit and legitimate purposes and not further processed in a manner that is incompatible with those purposes. The Government’s proposals would do this by making ‘further processing’ of citizens’ data legal in so many additional circumstances (‘legitimate interests’, use in ‘research’, for AI, to improve ‘data sharing’, etc) that the core principle is rendered irrelevant.

These proposals represent the biggest attack on citizen rights seen in this country for generations. They would make new Cambridge Analyticas legal, and would put UK citizens’ data up for sale in global markets — the stated goal being to “secure the UK’s status as a global hub for the free and responsible flow of personal data” (where ‘responsible’ is never defined in over 50,000 words of argumentation, but where the door is opened to ‘irresponsible’ uses of data many times over).

This blog series explores the many mistaken assumptions that lie behind this disastrous initiative. The innovation and growth that Government promises its reforms will bring are a fantasy. They will not unleash a new ‘golden age’ they are based on deep misunderstandings of what makes data valuable in the first place and how to unleash this value. This, first, blog in the series looks at why data is valuable.

Where data’s value comes from

Given all the fuss that’s made about data, you’d think everyone would have an immediate answer to this question. But when you ask it strange things happen.

Some people immediately go off on a tangent, talking about how much money is being made out of data. But this begs the question: why are people prepared to pay so much for it? Others repeat catchphrases such as ‘data is the new oil’. Very soon people are embroiled in arguments about whether data is, or is not, ‘like oil’ — while the original question gets forgotten.

But the answer to this question matters, because it will inform all the policies and strategies that follow. If you get it wrong (as the UK Government is currently doing with their proposals to ‘reform’ data protection regulations ) you risk wasting huge amounts of time, money and effort chasing rainbows, while missing the opportunities that really matter.

Reliability and Surprise

So why is data valuable? Because of two things. Reliability and Surprise.

Reliability If we know a fact to be true, we can act on it without incurring the risks (and costs) of making a mistake. If the data you are working with is unreliable — if you don’t know if it is true or not — any decisions or actions you take on the basis of it risks being wrong. One of three things then happens.

You don’t dare making the decision or taking the action, in which case lots of things that could happen don’t. You make a wrong decision or take a wrong action and then have to incur the costs of cleaning up the mess. You invest significant amounts of time, money and effort trying to improve the reliability of your data (often paying external agencies exorbitant fees to confirm basic facts), so that you avoid the costs and lost opportunities of the first two.

Across the economy today, individuals’ and service providers’ inability to access and use the right, reliable data when and where they need it is a major cause of unnecessary cost and waste, fraud and of missed opportunities.

This lack of access to the right reliable data has deep structural causes. Usually somebody, somewhere has generated or checked that a piece of information is correct — that is indeed reliable. But because our data economy is currently organisation-centric (that is, organised around hundreds of different, isolated, separate data silos run by different, separate organisations), this data remains inaccessible.

What’s needed is a new personal data logistics infrastructure which enables individuals to get hold of certified data about themselves (verified attributes) and to share this data, under their control, as and when they need to. If such infrastructure were put in place, everyone would have access to reliable data when they need it, and everyone would be able to eliminate the friction, effort, risk and cost that pile up when it’s not available.

We estimate that over 95% of all data processing activities undertaken by British services providers in the private, public and third sectors (e.g. banking, insurance, retail, utilities, media and communication, local and central Government public administration, education, health, transportation, leisure, charities, etc) relate to the collection and use of data for the purposes of service provision: primarily administrative activities that depend on the availability of reliable data.

Yet nowhere in the 50,000-plus words of of the UK Government’s Data: A New Direction consultation does it even come close to recognising this fact. Which means its entire ‘data strategy’ is already missing the most fundamental point.

Surprise

The second reason why data can be valuable is the opposite of the first: it can surprise you by telling you something you didn’t know. It’s data as ‘surprise’ that helps people and organisations keep abreast of a fast changing world.

Data as ‘surprise’ is what fuels research and those innovations that are driven by insight into peoples’ behaviours. It’s a great thing. But we have to keep it in perspective. By definition, innovations are exceptions to the rule — the rule being the administration of existing services. And once an innovative product or service has been created to realise its value, it needs to be delivered to people, which requires the reliable data that drives these processes. In this situation, data’s two aspects of reliability and surprise work together, with ‘reliability’ still ensuring the actual delivery of value. For the ‘surprise’ side of data to generate value, the ‘reliability’ aspect is essential.

That’s why we say that at least 95% of data’s value comes from reliability. But unfortunately, as we’ve noted above, the UK Government’s proposed data protection reforms focus entirely on research and innovation: the 5%. A classic case of the tail wagging the dog.

Mixtures of reliability and surprise

Even though they are like chalk and cheese, often the biggest value is generated by mixing reliability and surprise. For surprises to be valuable they need to be reliable: fake news can be a very dangerous thing, Some things can be surprisingly reliable as we’ll see when we discuss artificial intelligence in a later blog.

Other things are ‘reliably surprising’: by which we are confronted by new information that changes what we do, but where the sorts of new information and the sorts of changes that result are part of a routine process.

Take your daily commute to work. You know exactly where you are going, what the route is, how long it should take, and so on. And yet, every journey you make is full of little surprises — little bits of new information that you need to respond to. A traffic light turns red. A child looks like they might run out into the road. A car suddenly turns right in front of you. In each case, you know how to deal with the situation. It’s happened many times before. But on each occasion, you still have to deal with the ‘surprise’.

In modern economies, a huge range of important value-adding activities fall into this category of managing ‘reliable surprises’. Take the health service which is largely organised around the management of ‘reliable surprises’: common ailments with well known symptoms and treatments but where, on each occasion, a diagnosis is still needed and a resulting set of actions planned and implemented.

Likewise financial services when deciding whether or not to give someone a loan or assessing an insurance risk, or public administrators deciding whether an individual is entitled to a benefit or service. And so on. A huge amount of the data that’s collected and used in our society today is devoted to the efficient management of such ‘reliable surprises’.

Implications

Talking about reliability and surprise as we’ve done here may seem simple and obvious. In a sense it is. But its implications are profound.

Practically speaking, for the full potential of data to be realised, individuals and service providers need to be able to access and use the right reliable data at the right time, on a mass scale. For this, we need new infrastructure. Just as the industrial age needed a national electricity grid to unleash electricity’s potential, so we need a new data ‘grid’ — a data logistics infrastructure that gets the right reliable data to (and from) the right people and places at the right times.

That’s what we at Mydex are working on — personal data logistics infrastructure that puts citizens at the heart of the process, including them in the workings of society and economy. The Scottish Government has begun to realise this with its decision to create its Scottish Attribute Provider Service. SAPS enables organisations to share verified (reliable data about their citizens) with the citizen so citizens, in turn, can share this data when and where they need to gain access to other services and eradicate things like form filling, delays and improve access, inclusion and outcomes.

Some of the work the UK Government is doing around personal data — its Identity and Attribute Trust Framework for example — has truly positive potential. But this Consultation and these proposals? Oh dear! They misunderstand where the real value of data lies and rely instead on a mythological narrative promoted mainly by Silicon Valley lobbyists. The next post in this series turns to this narrative.

Why is data valuable? was originally published in Mydex on Medium, where people are continuing the conversation by highlighting and responding to this story.


PingTalk

Ultimate Guide to Token-based Authentication

Identity management topics can be a bit abstract or in the clouds, literally. You may already be familiar with authentication, which I described in a prior blog. At its core, authentication is a method for verifying that a user is who they claim to be, and used to keep bad actors out of your network. Unlike passwords, which can be easily compromised and used by hackers for data breaches, tokens ar

Identity management topics can be a bit abstract or in the clouds, literally. You may already be familiar with authentication, which I described in a prior blog. At its core, authentication is a method for verifying that a user is who they claim to be, and used to keep bad actors out of your network. Unlike passwords, which can be easily compromised and used by hackers for data breaches, tokens are more secure.

 


Identosphere Identity Highlights

Identosphere #60 ∙ Respectful Use of Location Information ∙ Interop Demo ∙ Evolving Badges and Credentials Ecosystem

A weekly digest of upcoming events, company news, organizational updates, development in open standards and the latest headlines in self sovereign identity.
Thanks for reading!!! Consider supporting this publication with a monthly payment via Patreon

Read previous issues and Subscribe : newsletter.identosphere.net

Contact \ Content Submissions: newsletter [at] identosphere [dot] net

Coming Up

Driving Inclusion with Trusted Digital Ecosystems • 11/30 Indicio Meetup

COVID Health Credentials for International Travel Summits (by LFPH and Affinidi) • 12/1-2 CCI Newsletter - Kaliya will be there hosting

European Blockchain Convention Virtual • 12/13

Customer Service / Service NSW EOI - Digital Identity and Verifiable Credentials - DICT/8027 • Tenders (Closes 12/14)

Build Your Identity Solution Using Hyperledger Aries • 1/20

Hyperledger Indy Technical Deep Dive • 2/3

Data Space Launchpad MyData • Until 2/22

Explainer Decentralized Identity - Taking Back Control Madigan Solutions

By moving identity to effectively require just a digital device and some sort of connection to the internet, the barriers to these interactions are more easily bridged. Both access to a digital device and availability of an internet connection are increasing, even in new or emerging economies.

The Role of Identity in Creating a Better Internet with Kaliya Young — Structure 3C CoHere

Kaliya talking with a colleague from way back Bill Johnston. 

On this episode of the Cohere podcast, Kaliya joins Bill to discuss the history of online identity, what events led us to the consolidation of identity into a few centralized platforms, and what steps we need to take to recover and protect our online identities.

Self-Sovereign Identity Crisis Lionsgate

Through deceptive marketing practices the first-movers in the Digital ID market have done-away with the sovereignty. As a result a burgeoning new industry is experiencing a Self-Sovereign Identity Crisis.

SSI: self-sovereign identity explained Cheqd

Unlike the existing system, it’s a user-centric and user-controlled approach to exchanging authentic data in a much more secure way. Authentic data is information that’s source can be proven.

Company News Why Cheqd? ContinuumLoop

Kaliya is not a fan of introducing tokens into a the SSI ecosystem especially when so little is clear about how it is supposed to work.

We’ve already told many folks what we are advising cheqd and participating in the cheqd network as a node operator – but we wanted to provide more information for the community (clear disclosure – that means we will, or do – depending on when you are reading this article – hold cheqd tokens).

Use Cases Self-Sovereign IDENTITY and eID DOCUMENTS: Two worlds colliding? Cryptovision

At first view, the SSI approach is at odds with the electronic identity documents used in many states, as in the latter model it’s the state that has sovereignty over its citizens’ identity data. On closer inspection, however, SSI and electronic identity documents can complement and even benefit from each other.

SITA uses blockchain, decentralized identity for pilot license verification Ledgerinsights

Using the self-sovereign identity solution Hyperledger Aries, almost everything works peer to peer between the license issuer and the pilot and between the pilot and the verifier.

Impact of Self-Sovereign Identity in Real Estate Affinidi

Real estate is one of the sectors that has not completely embraced digitalization, and this means, there’s a lot of potential to bring about change in this sector.

The Internet of Trade - A vision: Building the nervous system of the world economy GLEIF

Many areas of production and trade have been digitized, but in the absence of a universal approach to digital networking, siloed systems have been implemented, creating countless ‘digital islands’. Data is still transferred between the participants’ computer systems on printed documents or as unstructured PDFs.

Organization On Forests, Emergence, and Expansive Trust: Why Trust Over IP is even more profound than we thought Daniel Hardman

I have been lucky enough to witness many of its milestones — the finalization of the VC and DID specifications, the launch of Sovrin and Hyperledger Indy, the advent of production deployments and serious interoperability, the invention of peer DIDs and KERI and BBS+ credentials, the implementation of the exciting communication technology now known as DIDComm…

What is Respectful Use of Location Information? New Me2BA Research

“Spotlight Report #3: Consumer Sensitivity to Location Tracking by Websites and Mobile Apps”. This research quantifies and qualifies public opinion of location tracking in a variety of different contexts within web and mobile technology. 

Gratitude: Internet Society Foundation Grant Award (Press Release) Me2Ba

The Internet Society Foundation recently granted the Me2B Alliance $100,000 to complete its “U.S. EdTech Industry Benchmark: Data Sharing in Primary & Secondary School Mobile Utility Apps.” The benchmark will build on previous findings about harmful data sharing practices by uncovering how sensitive student information is being treated by school utility apps in grades pre-k through 12 in schools across the nation.  

My Data Community Looks Outward and to the Future MyData Netherlands

Highlights include the keynote from Amsterdam’s chief technology officer, Ger Baron and the awarding of the MyData Operator 2021 Awards to 22 companies and organisations. 

ISSE 2021 - EEMA opening Plenary Is it all change for identity? Open Standards Reflecting on the Evolving Badges and Credentials Ecosystem

Recently, the WAO team took the opportunity to update the badge platforms page on Badge Wiki, a knowledgebase for the Open Badge community. As the ecosystem continues to evolve we’re seeing some early platforms fall by the wayside and new platforms emerge.

Let’s Go - Together!: Does international travel only ever involve independent adults? ToIP

Applying the developed models of guardianship, using the flexibility of Verifiable Credentials and the trusted mechanisms of sharing VCs, can provide the ability to add guardianship credentials into the travel process (or not) without breaking the existing approach and complicating the technical details defined in the Blueprint. 

The Perfect Signature Style is the Enemy of the One that Works Today Indicio

BBS+ signature styles are not going to be ready for deployment anytime soon. This is precisely why you should build today and in a way that allows you to add them later.

DIDComm Mythconceptions Daniel Hardman

DIDComm is a peer-to-peer communication technology for SSI (self-sovereign identity) with security and privacy properties rooted in DIDs (decentralized identifiers). Its core value proposition is often misunderstood or oversimplified. This webinar provides a proper mental model.

SSI Interoperability Demo – NB Orbit Mobile Wallet, PwC, Copper Mountain & BC Mines NorthernBlock (Video)

In collaboration with the BC Mines Trust Ecosystem, we demonstrate interoperability between organizations using the BC Gov Business Partner Agent and the NB Orbit Mobile Wallet for managing sustainable mining practices.

COVID-19 How to Prove You're Vaccinated for COVID-19 Consumer Reports Kaliya and other community members quoted 

You may need to prove your vaccination status for travel or work, or to attend an event. Paper credentials usually work, but a new crop of digital verification apps is adding confusion.

Thanks for Reading! Support this publication: patreon.com/identosphere Read more \ Subscribe: newsletter.identosphere.net Contact \ Submission: newsletter [at] identosphere [dot] net

Monday, 29. November 2021

IdRamp

IdRamp Passwordless Credential Orchestration Manager is Now Available in the Oracle Cloud Marketplace

IdRamp, a leading provider of Zero Trust identity orchestration services, today announced their new Passwordless Credential Orchestration Manager (PCO) service is now available on the Oracle Cloud Marketplace. The post IdRamp Passwordless Credential Orchestration Manager is Now Available in the Oracle Cloud Marketplace first appeared on IdRamp | Decentralized Identity Evolution.

IdRamp, a leading provider of Zero Trust identity orchestration services, today announced their new Passwordless Credential Orchestration Manager (PCO) service is now available on the Oracle Cloud Marketplace.

The post IdRamp Passwordless Credential Orchestration Manager is Now Available in the Oracle Cloud Marketplace first appeared on IdRamp | Decentralized Identity Evolution.

uPort

DIDComm Messaging through libp2p

by Oliver Terbu (ConsenSys Mesh), Alen Horvat (AceBlock) Introduction With InterPlanetary File System (IPFS) the Web3 community has established a critical piece of infrastructure that is used by the majority of web3 protocols to different degrees. Libp2p is part of the IPFS stack and is used for the underlying peer-to-peer network for discovery, routing and data exchange. Peers in the network ca

by Oliver Terbu (ConsenSys Mesh), Alen Horvat (AceBlock)

Introduction

With InterPlanetary File System (IPFS) the Web3 community has established a critical piece of infrastructure that is used by the majority of web3 protocols to different degrees. Libp2p is part of the IPFS stack and is used for the underlying peer-to-peer network for discovery, routing and data exchange. Peers in the network can dial other peers in the network to exchange messages using various transports, like QUIC, TCP, WebSocket, and Bluetooth. Modular design of the libp2p framework enables it to build drivers for other transports. Peers can run on any device, as a cloud service, mobile application or in the browser and talk to each other as long as they are connected through the same libp2p network.

A peer in a libp2p network is identified through its peer identity (peer ID). A peer ID is essentially derived from the public key (hash) of the peer’s key pair which can change over time, specifically when keys are rotated or revoked. For that reason, peer IDs are insufficient for building a stable fully-decentralized messaging framework. W3C Decentralized Identifiers (DIDs), on the other hand, were designed to support key rotation while keeping a stable identifier. Hence, DIDs should be used as the more permanent public identifier for peers in the network, which would hold information about the peer IDs, libp2p network and supported protocols. Peers would still use their peer ID for libp2p routing and authentication. Alice and Bob would exchange their DID out of band and will be able to find their counterparty’s peer ID via their DIDs. In this way, the DID acts as an indirection layer for the peer ID, thus allowing Alice and Bob to change their peer ID for practical reasons without the need to notify each other.

Note: A peer ID is a term defined by libp2p and is not the same as a peer DID although a peer ID can also be used with a peer DID by following the approach described in this article.

Libp2p is a modular system of protocols and specifications for building P2P applications. It can be also used to build P2P messaging applications. although messaging through libp2p has limitations. Peers in the network are usually not always online, especially if Bob is travelling a lot, lives in an area with limited connectivity, is actually an intelligent car, or has a monthly limit with his mobile data plan. When Alice wants to send Bob a message and Bob is not online, then the likelihood of Bob eventually receiving the message reduces dramatically. DIF DIDComm Messaging solves this problem by defining mediator nodes that can run in high-availability mode. Those mediators can act as Alice and Bob’s mailboxes where both use DID authentication to receive the latest messages from their mediators. Instead of associating Bob’s peer ID with his DID, Bob would associate his mediator’s peer ID with the DID, so Alice would dial-up Bob’s mailbox through the libp2p network and first forward the message to the mediator. DIDComm Messaging ensures that only Bob can decrypt the message and that Bob can verify Alice authenticated the message through authenticated encryption (authcrypt). Additional trust, security and access management can be added through W3C Verifiable Credentials (VCs) that counteract spam and fraud.

This article explains how two parties, Alice and Bob, can securely communicate using DIDComm Messaging through a libp2p network, where discovery, security and trust are rooted in Decentralized Identity technologies. First, we present how Alice and Bob prepare and exchange information about their peers, next we describe how peers establish secure P2P connections, and last we present DIDComm message exchange via the channels. We assume you are familiar with DIDs and VCs. If you are not, check out DIF FAQ for a great intro.

Exchanging information

To start messaging, Alice and Bob must exchange information about their peers and mediators. DIDs help to establish a trusted Decentralized Identity layer for the peers, where peers can always find the latest information about the active mediators, peer IDs, authentication, and encryption keys. This enables mutual peer authentication and end-to-end stream encryption. We use the DID service property to manage and share peer information as presented below.

DIDComm Messaging service section using libp2p transport

Thus Alice and Bob need to exchange their DID out-of-band and clients will be able to discover, authenticate and connect. The design is applicable to almost all DID methods.

Establishing secure streams

Now that Alice and Bob exchanged information about their peers, the peers establish authenticated and end-to-end encrypted P2P streams. If at least one of the peers has public endpoints or supports NAT transversal, peers can connect directly. Since most services are behind firewalls or don’t have public endpoints, P2P connection can be established only via relay or proxy nodes. These nodes either help with the NAT traversal or simply relay all the traffic. Libp2p has full support for relay nodes that can be hosted by anyone, i.e. self-hosted or hosted by a 3rd party provider. Furthermore, every client can select which relay node(s) can be used to establish a connection with it and every new connection can be established via different nodes. Such an open design enables us to build a fully decentralized mesh of relay nodes.

After discovery, peers mutually authenticate. Authentication can be performed using peer IDs or any other DID authentication key(s). DIDs ensure that keys are valid (not revoked) and are linked to the DID. Modular design enables plug in various mutual authentication protocols, like mutual TLS. After a successful mutual authentication, the streams are end-to-end encrypted either using TLSv1.3 or Noise Protocol, both supporting perfect forward secrecy. Note that other encryption protocols or frameworks can be plugged in. Only allow-listed peers, i.e., DIDs of Alice or Bob registered with their clients, are allowed to open a stream. W3C Verifiable Credentials (VC) can be used to define more granular identity and access management policies.

Libp2p supports establishing a connection on the network levels, like QUIC, TCP/UDP, WebSocket, client authentication and traffic encryption. DIDComm Messaging is introduced on top of libp2p to fill-in the missing messaging capabilities.

Messaging

DIDComm Messaging (aka DIDComm V2) provides a secure, private communication methodology built atop the decentralized design of DIDs. Version 1 of DIDComm was specified in the HyperLedger (HL) Aries project as a set of HL Aries RFCs. With governance and further development moved to DIF, the goal was to specify one core specification for DIDComm Messaging that addresses previously defined gaps and achieve better development experience. In particular V2 relies on better formalized methods, simpler message structures, has no requirement for DID exchange, treats ephemeral and full mode in the same way and has explicit support for all DID methods. Another goal was to address requirements beyond the HL Aries community.

In DIDComm Messaging trust is rooted in DIDs. Atop DIDComm Messaging defines a set of methodologies to send messages between DIDs or more specifically their agents. Messages can be extended through specific DIDComm Messaging protocols. At a glance, DIDComm Messaging entails the following:

Defines a data model for a common plaintext messages structure i.e. headers, body. JOSE-based authn and encryption between DIDs with repudiation by default. Defines a methodology for DID rotation. Defines a methodology for (onion-)routing for various network architectures. Defines core protocols such as invitations and feature discovery. Defines core transport protocols for HTTP(S) and WebSockets. Defines an extensibility model for adding new sub-protocols (e.g., VC Exchange) and new transports (e.g., libp2p).

The following diagram shows the DIDComm Messaging mental model.

DIDComm Messaging Mental Model

Typically, if Alice wants to send a message to Bob, Bob sends Alice an explicit invitation or Bob gives her his public DID (implicit invitation through Bob’s DID Document). Alice would then extract the service endpoint and recipient/routing keys from the invitation and can start sending messages to Bob. The first message could already contain a DIDComm Messaging protocol message, since Alice can encrypt the message to Bob. After Bob receives the message, Bob can create a new DID for Alice and indicate the change through DID rotation.

DIDComm Messaging is transport-agnostic and DID Documents can be extended to support various transport mechanisms. The community developed approaches for HTTP(S) and WebSockets primarily, other transports such as Bluetooth are also under development.

Putting all together

DIDComm Messaging running on top of a libp2p overlay network enables us to build a next generation decentralized messaging framework. Libp2p enables establishing secure connections between peers regardless of their transport and IP properties (public, local, static, dynamic). Once peers establish secure connections with the help of DIDs, they can authenticate (DID Authentication) and exchange DIDComm Messaging protocol messages. Using a libp2p overlay network doesn’t require any changes to the DIDComm Messaging protocol as libp2p clients can support multiple messaging protocols and multiple different libp2p networks (private or public) — it can work via existing public IPFS network, private AceBlock network, and others. Layered architecture and clear separation of the P2P network from the messaging protocols, in our case DIDComm Messaging, enables us to design and develop the P2P network and DIDComm Messaging independently. Namely, the libP2P network doesn’t need to know anything about the DIDComm Messaging and vice versa. Using such a setup, anyone can build edge agents and mediator nodes. Maintenance of such a P2P network is inexpensive. It is built using open source components.

The proposed solution supports

direct communication (both clients have public IPs) indirect communication (communication is relayed via libp2p relay nodes; messages can be relayed via random relay nodes or pre-defined ones) synchronous message exchange (if both clients are online) asynchronous message exchange via mediator nodes (if one of the clients is offline) Sending Messages through DIDComm Messaging and libp2p Conclusion and outlook

We outlined the next generation decentralized messaging solution built on top of DIDComm Messaging, DIDs and VCs and a libp2p overlay network. We presented how Alice and Bob establish a connection, exchange messages and demonstrated what connection types are supported.

We are currently working to demonstrate different setups and scenarios (using Veramo and AceBlock libp2p client), we are adding libp2p transport to the DIDComm Messaging specs and are working on the full framework design.

Stay tuned for more updates and join our Discord if you want to get involved!

DIDComm Messaging through libp2p was originally published in uPort on Medium, where people are continuing the conversation by highlighting and responding to this story.


Indicio

Indicio Leads Hyperledger Foundation Community Training

The post Indicio Leads Hyperledger Foundation Community Training appeared first on Indicio Tech.
Accelerate your decentralized identity skills with two free Hyperledger Indy and Hyperledger Aries workshops

Hyperledger Indy and Hyperledger Aries are two of the popular open source repositories that can help propel development of decentralised identity products and services. Aries is a toolbox of several blockchain-agnostic repositories that allow for trusted online peer-to-peer interactions based on decentralized identities and verifiable credentials. The project grew out of work that was happening in Indy to create technologies for managing decentralized identity. Aries was moved to graduated status by the TSC in February 2021. Indy graduated in 2019 and provides a specific blockchain purpose-built for identity. 

Seeing the growth in interest for these two projects, Hyperledger Foundation has partnered with member company Indicio and its team of deeply experienced developers and architects to develop this free, multi-course curriculum to help developers and architects gain a deeper understanding of decentralized identity, with a deep dive into Aries and Indy. Registration and preparation information can be found on this Workshops page

These two four-hour, beginning level, hands-on workshops provide opportunities to install and run the Indy and Aries components just like you would if you were making a real Indy-based network or Aries-based application. They introduce the necessary Git repos as well as how to use the Indy Command Line Interface (Indy CLI), run the Aries toolbox and create and issue a verifiable credential. They also introduce some current projects using Aries and Indy to help you accelerate your understanding of decentralized identity and build the skills necessary to successfully make changes to the underlying code with hands-on guidance to develop your own projects.

About the courses

Build Your Identity Solution Using Hyperledger Aries

Thursday, January 20, 2022

8 AM to noon Pacific 

Register for free

The first in the Hyperledger Foundation Community Workshop series, Intro to Decentralized Identity is a four hour online course to introduce the core concepts and principles of decentralized identity. As you progress, you’ll learn how to use a Hyperledger Indy-based network, be introduced to the Indy CLI, and install and run the Aries toolbox to create, issue, and verify a verifiable credential.

Topics also include:

Decentralized identity concepts and principles The verifiable credential data model Decentralized identity ecosystem Introduction to network tools indyscan and SelfServe Intro to Indy CLI and how to use the CLI to access a network What Aries is Install and run Aries Toolbox Create connections and issue a credential How to verify credential

Hyperledger Indy Technical Deep Dive

February 3, 2022

8:00 AM to noon Pacific

Register for free

The second in the series is a four-hour course that advances your skills related to Hyperledger Indy node code and the Indy SDK. It also covers the commonly used cryptography libraries contained in Hyperledger Ursa, the Plenum ledger and how to interact with and change the repositories and code.

Topics also include:

Install and build with Indy SDK Introduction to libindy, indycli etc Indy VDR (replacement for Indy-SDK) Making changes to Indy node code Build and IndyTest the changes locally How to get involved in the community further with chats, helplines, and meetings

Both courses do have several must-have prerequisites, including the installation of docker, installation of Indy-CLI, installation of rust, and the download of important repositories. This can be done independently, or you will have the opportunity to connect with instructors during pre-course office hours on a dedicated helpline. 

These new courses are the first community workshops offered by the Hyperledger Foundation for free in an effort to expand the use, contributions, and maintainer community of Hyperledger Indy and Aries. Recordings of the courses will be made available at the conclusion of the instructor-led events.

Registration for the free course is limited to 100. Registration links and further information about the prerequisites and course materials can be found at https://wiki.hyperledger.org/display/events/Workshops.

The post Indicio Leads Hyperledger Foundation Community Training appeared first on Indicio Tech.


auth0

Get Started with iOS Authentication using Swift and UIKit

A step-by-step tutorial on using Auth0 and Swift to implement login/logout and use user metadata in iOS apps.
A step-by-step tutorial on using Auth0 and Swift to implement login/logout and use user metadata in iOS apps.

KuppingerCole

Dec 07, 2022: Access Management: Managing Your Risk

For many businesses, Access Management still remains a big challenge. Not only should we control who has access to our systems, but we should also know where people are accessing this information from, and what exactly they are doing with it. This is particularly challenging when working in the cloud, as well as having customers, employees and other external sources accessing applications remotely
For many businesses, Access Management still remains a big challenge. Not only should we control who has access to our systems, but we should also know where people are accessing this information from, and what exactly they are doing with it. This is particularly challenging when working in the cloud, as well as having customers, employees and other external sources accessing applications remotely and with multiple devices. Multiple devices mean more access points to manage which create a higher risk to your business.

Oct 06, 2022: Driving Innovation With Identity Fabrics

Digital Transformation has put businesses under a lot of pressure, not only with regards to compliance but also through a high demand for customer privacy and improved user experience. With too much security, e.g., through Authentication, users are scared off, whereas having too little security is risky. How do we find the right balance?
Digital Transformation has put businesses under a lot of pressure, not only with regards to compliance but also through a high demand for customer privacy and improved user experience. With too much security, e.g., through Authentication, users are scared off, whereas having too little security is risky. How do we find the right balance?

IDnow

UAE accelerates use for automated identity verification

As the world moves towards digitization, financial institutions are looking to adopt identity verification solutions that verify and validate in near real time the identity of the customer. The UAE Central Bank along with the Securities and Commodities Authority, Dubai Financial Services Authority, and the Abu Dhabi Global Market Financial Services Regulatory Authority recently issued […]

As the world moves towards digitization, financial institutions are looking to adopt identity verification solutions that verify and validate in near real time the identity of the customer.

The UAE Central Bank along with the Securities and Commodities Authority, Dubai Financial Services Authority, and the Abu Dhabi Global Market Financial Services Regulatory Authority recently issued guidelines for those financial institutions adopting such technologies. Within these guidelines, the UAE governing authorities have approved the usage of facial verification to identify banking customers at the time of onboarding.

This growing trend of regulatory approved biometric solutions that rely on Artificial Intelligence (AI) to onboard clients is spreading across Europe, Asia, and the Middle East. And with the rise of cybercrime – cyber-attacks occurring every 11 seconds, regulators and authorities looking to solutions that are in compliant with the highest security standards.

IDnow, a leading expert for digital identities and identity verification welcomes these new guidelines. With extensive expertise serving Germany’s and Switzerland’s highly regulated markets, IDnow has always focused on striking a balance between security and user experience.

IDnow’s regulatory affairs team is part of several regulatory working groups like ETSI, FIDO Alliance, W3C, and Hyperledger and consults authorities worldwide that are working on digital identity verification and authentication standards.

Being an expert has allowed IDnow to develop financial regulatory compliant products, notably, BankIdent. This completely AML-compliant online identification solution utilizes the users’ current online bank account to create an easy and secure identity verification service that effortlessly combines technology with existing identity and banking data. All that is required of the user is a valid photo ID, an active online bank account, and valid login credentials.

In addition, IDnow is looking closely into the latest developments around digital identity wallets in Europe and, is supporting different expert- and working groups with their expertise. The new law will allow people to have their official documents, such as their drivers’ license or ID card in one central place on their smartphone with easy access to it and, the assurance that their information is securely stored.

Looking to the future, IDnow is expanding its global footprint. It recently opened two offices in the United Kingdom and one in the United Arab Emirates and is also looking to set up a call centre in the Middle East to comply with regional data residency laws.

This benefits every party involved in the process, from making consumers’ lives easier, to reducing waiting times and increasing conversion rates, while keeping a high level of security.

By

Basil Macklai
Head of Middle East
Connect with Basil on LinkedIn


KuppingerCole

Jul 06, 2022: The Future of Identity & Access Management

There are so many factors that have recently had a dramatic impact on how we do business. COVID-19 has forced us into a new era of remote working and a massive cloud-first trend has provided us with complex multi-cloud, multi-hybrid infrastructures and a new level of attack landscapes. On the other side of the coin, we are seeing a massive shift to doing business online. Digital transformation has
There are so many factors that have recently had a dramatic impact on how we do business. COVID-19 has forced us into a new era of remote working and a massive cloud-first trend has provided us with complex multi-cloud, multi-hybrid infrastructures and a new level of attack landscapes. On the other side of the coin, we are seeing a massive shift to doing business online. Digital transformation has become a reality and the ability to provide a seamless digital experience to our customers and prospects has a direct impact on our revenues. The enterprise has become a virtual place without a physical „inside“ and this is why traditional Identity & Access Management has come to its limits.

KYC Chain

PropTech: Why tokenized real estate needs KYC

By tokenizing real estate assets on the blockchain, the real estate industry can become more accessible to millions of potential investors. But as the PropTech industry grows, so too does the need for effective and efficient KYC process. The post PropTech: Why tokenized real estate needs KYC appeared first on KYC-Chain.

Ockto

Hypotheekbeheer is een leidersweg

Uitkomsten rondetafelgesprek hypotheekbeheer Toen het allemaal even weer kon, organiseerden we bij Ockto snel een rondetafelgesprek over hypotheekbeheer. Want over 1 ding is iedereen het wel eens: dit onderwerp verdient meer aandacht dan het nu krijgt. Maar wat zijn nu de uitdagingen? En waar zit de oplossing? Samen met specialisten uit de branche staken we The post Hypotheekbeheer is een leider
Uitkomsten rondetafelgesprek hypotheekbeheer

Toen het allemaal even weer kon, organiseerden we bij Ockto snel een rondetafelgesprek over hypotheekbeheer. Want over 1 ding is iedereen het wel eens: dit onderwerp verdient meer aandacht dan het nu krijgt.

Maar wat zijn nu de uitdagingen? En waar zit de oplossing? Samen met specialisten uit de branche staken we een middag de koppen bij elkaar om dit thema verder af te pellen.

De uitkomsten hiervan delen we graag in een artikel, te lezen via onderstaande button.

Lees: Hypotheekbeheer is een leidersweg

Met speciale dank aan alle deelnemers voor hun waardevolle input:

Carla Hidding – Aegon Neriman Polat – ING Suzanne Kriele-van Zee – de Volksbank John Smulders – Quion Stephan de Jongh – RNHB Arjan Hessels – Stater Maaikel Bremmer – ING Gerben Neven – HDN Jochem Kapteijn – ING Bob de Leede – Allianz Jan Verstegen – Eerstestap.nl Rick te Molder – NHG Robert Harreman – Ockto Auke Dirkmaat – Ockto Gert Vasse – Ockto

We hopen dat dit een goede voedingsbodem mag zijn voor vele succesvolle verbeteringen in hypotheekbeheer-processen.

The post Hypotheekbeheer is een leidersweg appeared first on Ockto.


PingTalk

Ping is Planting Trees under the Ping4Good program

Here at Ping Identity, we’ve been grateful for the opportunity to work with customers and partners for 19 years and counting. Every year, we’re able to help you achieve your unique identity management goals, and in doing so, you’ve helped us reach our goals too.  

Here at Ping Identity, we’ve been grateful for the opportunity to work with customers and partners for 19 years and counting. Every year, we’re able to help you achieve your unique identity management goals, and in doing so, you’ve helped us reach our goals too.

 

Sunday, 28. November 2021

KuppingerCole

Analyst Chat #104: Edge Computing

Senior Analyst Graham Williamson joins Matthias from down under to talk about edge computing. Starting from the definition and relevant use cases, they focus on where the edge brings value. They discuss what the key criteria for a successful deployment are and what needs to be looked at to do edge computing while preserving security and privacy.

Senior Analyst Graham Williamson joins Matthias from down under to talk about edge computing. Starting from the definition and relevant use cases, they focus on where the edge brings value. They discuss what the key criteria for a successful deployment are and what needs to be looked at to do edge computing while preserving security and privacy.




Jolocom

Flashback of 2021: Events

2021 saw a diverse range of events in which Jolocom could participate in. From debates about the future of seIf-sovereign identity (SSI) to the role of trust in the age of AI (Artificial Intelligence) – there were many important take-home messages and ways for us to contribute in discussions. A brief overview of the events ... The post Flashback of 2021: Events appeared first on Jolocom.

2021 saw a diverse range of events in which Jolocom could participate in. From debates about the future of seIf-sovereign identity (SSI) to the role of trust in the age of AI (Artificial Intelligence) – there were many important take-home messages and ways for us to contribute in discussions. A brief overview of the events we participated in in 2021 also offers a good insight into our goals, values, and projects.  

February 2021  

Jolocom took part in a virtual meeting of the International Association for Trusted Blockchain Applications (INATBA) back in February. Also included: the position paper of the organization, which was published in 2020: “Decentralized Identity: What’s at Stake?”. One of the founding principles of Jolocom is the mission to promote the establishment and maintenance of standards in our industry. We were therefore very pleased that Kai led the discussion as an active board member of INATBA and as co-chair of the organization’s Identity Working Group. Together with four stakeholders, he discussed the current role of decentralized identities and how they should shape in the future.  

Keryl Folwer from Transmute, Anil John, Director of the Silicon Valley Innovation Program, Dr. Loretta Anania, Research Associate at GD Connect of the European Commission, and Daniel Du Seuil, Belgian Project Leader for Self-Sovereign Identity (SSI) formed the discussion group.  

The position paper was drawn up by INATBA with the aim of defining the expectations of an open and innovative market in a decentralized identity. It analyzes the current status of SSI developments and opens discussions about the next steps, makes demands on the most important stakeholder groups and sets goals for the future of SSI. Kai asked about the first reactions of the participants to the content of the paper.  

Karyl highlighted the role and importance of interoperability. Interoperability is the ability to interact with different systems. If two systems are compatible with each other, they are also called interoperable.  

Anil, in turn, spoke out against a “techno-utopianism of a self-sovereign identity”, but made it clear that he believes in personal freedom of choice and control. This is also supported by Jolocom and is one of our basic standards. Using a digital self-sovereign identity (SSI), we are always working on being able to manage the control and security of their own data independently for the individual.  

Loretta praised the European Commission’s plan to make the next decade a double transition, with green and digital going into everything. She argued that it is good and important to be there now, at the beginning, especially when the standards are being set. Founded in 2014, Jolocom is very committed to the development of SSI standards. We are always working on building more trust in a decentralized network and protecting the digital autonomy of our own data.  

Daniel saw SSI as the answer to the new demand for a European digital ID. If the European digital ID is about empowerment, data protection and new models of data sovereignty, it must be technology-neutral. In the end, says Daniël, the question is always the same: How can we empower citizens?  

The discussion between the participants was very lively and underlined, despite different opinions and backgrounds, common values. There was agreement on the increasing importance of digital decentralization, which can be described as a global trend. Furthermore, everyone agreed that this is an interesting time. Both industry and the public sector are more interested in decentralized identities and what they can offer them. Jolocom agreed with the general opinion that working together can also create interoperability.  

May 2021  

Since 2019, Jolocom has been a partner to three out of four winning teams in the German innovation competition for setting up Secure Digital Identites (SDI) projects.  

At the DWeb Meetup in May 2021, Jolocom was invited to explain its role at ONCE, ID-Ideal and SDIKA in more detail, which Kai Wagner did as our representative. His key message was: The challenges that lie ahead of us also offer great opportunities.  

The four projects must be harmonized with EU directives, W3C and the global community in general; this requires coherent concepts and an interoperability infrastructure. SSI and decentralized identities are booming: that’s why it is important to keep pace with market dynamics. The DWeb community can benefit greatly from the projects; However, this requires a coherent infrastructure and uniform concepts. In this way, as many EU citizens as possible are reached, who then get the chance to manage their identity independently.  

Kai also presented the background to the projects and their goal. The digital identity card is officially on the market, but it is only actively used by 0.5% of the population. Kai pointed out that Germany does not have a leading role in the field of digital identities. At the end of 2019, four projects were then selected to address these problems.  

October 2021  

The topic of “digital identities” is also more up-to-date than ever, especially driven by the corona pandemic and the associated increasing digitization in almost all areas of life. The online event “Digital Identity” of the BFM (Business Research Center) also took place on October 20, 2021 under this topic.  

During a lively discussion, the main topics were data security, dealing with skeptics and the costs of a wallet. The group of experts included Irene Adamski as a representative for Jolocom, as well as Fabiane Völter as a research assistant at the University of Bayreuth, Thomas Ruch as the person responsible for credit management at BAUR GmbH and Boris Lingl as Head of Blockchain at DATEV, who tried to answer questions from the audience .  

Above all, Irene presented the idea of a wallet and presented SSI as a global trend, which is, however, still a developing market in Germany. Therefore, the questions about the costs of a wallet could not be answered specifically, but it could still be said with certainty: There are no costs for the end user. In addition, the use of a wallet should be voluntary. However, EU citizens must be able to have a wallet made available.  

Therefore the term of a transition period came up, which can definitely be expected. Data security is always in the hands of the user. In the event of a request to identify something, they can select and deselect which information they want to share or even reject it completely.  

Your own data is encrypted on your own wallet. You only pull out the information that you want to share.  

November 2021  

Also in dealing with the future of Artificial Intelligence (AI), Irene presented the role of SSI as a possible solution. The specialist conference “Trust in the Age of AI-Supported Bots and Fakes: Challenges and Possible Solutions‘ on November 4th included some keynote speeches on the topics of fake reviews, deep fakes, and possible solutions.  

Exciting examples of the use of artificial intelligence in everyday life make it clear that this is a global trend. At this lively conference, the dark side of AI was also highlighted. Identity theft, manipulation of politics, dissemination of pornographic content … dangers that arise from AI cannot be ruled out and lead to growing distrust in the digital space. How is this to be dealt with?  

This is where the role of SSI comes into play. It is one of Jolocom’s basic principles to maintain and protect the autonomy of citizens. Irene was happy to explain this in more detail.  

The basic idea: control your own data. Broken down: selectively choose who has access to his and her data and reject who should not have access. This is well expressed when using a digital wallet: I can prove that I am over 18 years old without having to share my personal date of birth. This selective transfer of data also brings more trust in the digital space with it. A secure wallet provides the opportunity to retain and protect autonomy over your own data in the early days of AI and automated bots.  

2021 once again underlined the importance of of SSI is and how it is widely discussed. The team behind Jolocom is very happy to have attended such interesting events and looks forward to many more exciting discussions and meetups in 2022.

The post Flashback of 2021: Events appeared first on Jolocom.


2021 Flashback: Events

Vielfältig waren die Events, Diskussionen und Meetups an denen Jolocom dieses Jahr teilnehmen durfte. Von Debatten über die Zukunft von Self-Sovereign Identity (SSI) bis zur Rolle des Vertrauens im Zeitalter von KI (Künstlicher Intelligenz) – Jolocom konnte viel beitragen und viel mitnehmen. Ein kleiner Überblick über die Events, an denen wir 2021 teilnahmen, gibt auch ... The post 2021 Flashbac

Vielfältig waren die Events, Diskussionen und Meetups an denen Jolocom dieses Jahr teilnehmen durfte. Von Debatten über die Zukunft von Self-Sovereign Identity (SSI) bis zur Rolle des Vertrauens im Zeitalter von KI (Künstlicher Intelligenz) – Jolocom konnte viel beitragen und viel mitnehmen. Ein kleiner Überblick über die Events, an denen wir 2021 teilnahmen, gibt auch einen guten Einblick in unsere Ziele, Werte und Projekte. 

Februar 2021 

Bereits im Februar nahm Jolocom an einem virtuellen Meeting der International Association for Trusted Blockchain Applications (INATBA) teil. Mit dabei: das Positionspapier der Organisation, das bereits 2020 veröffentlicht worden war:,,Decentralised Identity: What’s at Stake?‘’. Eines der Gründungsprinzipien von Jolocom ist die Mission, die Etablierung und Aufrechterhaltung von offenen Standards in unserer Branche voranzutreiben. Daher freuten wir uns sehr, dass Kai als aktives Vorstandsmitglied der INATBA sowie als Co-Vorsitzender der Identity Working Group der Organisation die Diskussion leitete. 

Gemeinsam mit vier Interessensgruppen diskutierte er die aktuelle Rolle dezentraler Identitäten, und wie sich diese in Zukunft gestalten sollten. Keryl Folwer als DIF Steering Committee Member, Anil John, Direktor des Silicon Valley Innovation Programme, Dr. Loretta Anania, Wissenschaftliche Mitarbeiterin bei der GD Connect der Europäischen Kommission, und Daniel Du Seuil, der belgische Projektleiter für selbstsouveräne Identität (SSI) bildeten die Diskussionsgruppe. Das Positionspapier wurde von INATBA mit dem Ziel erstellt, die Erwartungen an einen offenen und innovativen Markt in dezentraler Identität zu definieren. Es analysiert den aktuellen Stand der SSI-Entwicklungen und eröffnet Diskussionen über die nächsten Schritte, stellt Forderungen an die wichtigsten Anspruchsgruppen und setzt Ziele für die Zukunft von SSI. 

Kai fragte nach den ersten Reaktionen der Teilnehmenden auf den Inhalt des Papieres. Karyl stellte die Rolle und Wichtigkeit von Interoperabilität heraus. Als Interoperabilität bezeichnet man die Fähigkeit zum Zusammenspiel verschiedener Systeme.  Wenn zwei Systeme miteinander vereinbar sind, nennt man sie auch interoperabel. 

Anil wiederum sprach sich gegen einen ,,Techno-Utopismus einer selbstsouveränen Identität’’ aus, verdeutlichte jedoch, dass er an persönliche Entscheidungsfreiheit und Kontrolle glaubt. Dies wird auch von Jolocom unterstützt und gehört zu unseren grundlegenden Standards. Anhand einer digitalen selbstsouveränen Identität (SSI) arbeiten wir stets daran, dem Individuum die Kontrolle und Sicherheit zu geben, die eigenen selbstbestimmt verwalten zu können. 

Loretta lobte den Plan der Europäischen Kommission, das nächste Jahrzehnt zu einem doppelten Übergang zu machen, bei dem Grün und Digital in alles integriert werden sollen. Sie argumentierte, dass es gut und wichtig ist, bereits jetzt, am Anfang, dabei zu sein, insbesondere wenn die Standards festgelegt werden. Gegründet 2014, ist Jolocom sehr engagiert in der Entwicklung von SSI Standards. Wir arbeiten stets daran, mehr Vertrauen in ein dezentrales Netzwerk auszubauen und die digitale Autonomie der eigenen Daten zu schützen. 

Daniel sah SSI als Antwort auf die neue Forderung nach einer europäischen digitalen ID. Wenn es bei der europäischen digitalen ID um Empowerment, Datenschutz und neue Modelle der Datenhoheit geht, muss sie technologieneutral sein. Am Ende, so Daniël, sei die Frage immer dieselbe: Wie können wir die Bürger stärken? 

Die Diskussion zwischen den Teilnehmenden war sehr angeregt und zeigte, trotz verschiedener Meinungen und Hintergründe, auch gemeinsame Werte auf. Einigkeit herrschte über den steigenden Stellenwert von digitaler Dezentralisierung, die als globaler Trend bezeichnet werden kann.  Weiterhin stimmten alle zu, dass dies eine interessante Zeit ist. Sowohl die Industrie als auch der öffentliche Sektor interessieren sich mehr für dezentrale Identitäten und was sie ihnen bieten können. Jolocom stimmte der allgemeinen Meinung zu, dass nur durch enge Zusammenarbeit die dringend erforderliche Interoperabilität entstehen kann. 

Mai 2021 

Seit 2019 gehört Jolocom zu drei von vier Gewinnerteams des deutschen Innovationswettbewerbs zum Aufbau von Sicheren Digitalen Identitäten (SDI)-Projekten. Beim DWeb-Meetup im Mai 2021 wurde Jolocom eingeladen, seine Rolle bei ONCE, ID-Ideal und SDIKA näher zu erläutern, was Kai Wagner gerne tat. 

Seine Kernaussage war dabei: Die Herausforderungen, die vor uns liegen, bieten gleichzeitig große Chancen. Die vier Projekte müssen mit EU-Richtlinien, W3C und generell der weltweiten Gemeinschaft harmonisiert werden; dazu braucht es kohärente Konzepte und Interoperabilitätsinfrastruktur. SSI und dezentrale Identitäten sind am boomen: deswegen gilt es, mit der Marktdynamik Schritt zu halten. Die DWeb Gemeinschaft kann von den Projekten sehr profitieren; Voraussetzung hierfür sind jedoch eine kohärente Infrastruktur und einheitliche Konzepte. So werden auch möglichst viele EU Bürger:innen erreicht, die dann die Chance erhalten, ihre Identität selbstständig zu verwalten. 

Außerdem präsentierte Kai den Hintergrund zu den Projekten und ihrem Ziel. Offiziell ist der digitale Personalausweis auf dem Markt, wird aber nur von 0.5% der Bevölkerung aktiv genutzt. Deutschland hat, so stellte Kai heraus, keine führende Rolle im Bereich digitaler Identitäten. Ende 2019 wurden dann vier Projekte ausgewählt, die diese Probleme angehen wollen. 

Oktober 2021 

Auch das Thema ,,Digitale Identitäten’’ ist so aktuell wie nie zuvor, besonders vorangetrieben durch die Corona-Pandemie und die damit verbundene zunehmende Digitalisierung in nahezu allen Lebensbereichen. Unter diesem Thema fand auch die online Veranstaltung ,,Digitale Identität’’ des BFM (Betriebswirtschaftliches Forschungszentrum) am 20. Oktober 2021 statt. Während einer angeregten Diskussionsrunde stellten sich vor allem die Themen der Datensicherheit, Umgang mit Skeptiker:innen und Kosten für eine Wallet in den Mittelpunkt. Unter der Expertengruppe befanden sich Irene Adamski als Vertreterin für Jolocom, sowie Fabiane Völter als Wissenschaftliche Mitarbeiterin der Uni Bayreuth, Thomas Ruch als Zuständiger für die Kreditsteuerung der BAUR GmbH und Boris Lingl als Head of Blockchain bei DATEV, welche die Fragen des Publikums zu beantworten suchten. 

Dabei stellte Irene vor allem die Idee einer Wallet vor und präsentierte SSI als einen globalen Trend, der jedoch in Deutschland noch ein Markt im Werden ist. Daher waren die Fragen nach den Kosten einer Wallet nicht konkret zu beantworten, dennoch konnte sicher gesagt werden: Für die Endnutzer kommen keine Kosten auf. Außerdem soll das Nutzen einer Wallet freigestellt werden. EU Bürger:innen müssen aber die Möglichkeit haben, eine Wallet zur Verfügung gestellt bekommen zu haben. Daher kam der Begriff einer Übergangszeit auf, mit der definitiv zu rechnen sei. Die Datensicherheit liegt immer in den Händen der Nutzer:innen. Im Falle einer Anfrage, etwas auszuweisen, können diese selbst an- und abwählen, welche Informationen sie teilen, oder es sogar komplett ablehnen. Die eigenen Daten liegen dabei allesamt verschlüsselt auf der eigenen Wallet. Ähnlich wie bei einer Brieftasche zieht man nur jene Informationen heraus, die man auch teilen möchte.   

November 2021 

Ebenfalls im Umgang mit der Zukunft von Künstlicher Intelligenz (KI) stellte Irene die Rolle von SSI als möglichen Lösungsweg vor. Die Fachkonferenz ,,Vertrauen im Zeitalter KI-gestützter Bots und Fakes: Herausforderungen und mögliche Lösungen‘‘ am 4. November beinhaltete einige Impulsvorträge über die Themenbereiche Fake Reviews, Deep Fakes, und Lösungsmöglichkeiten. Spannende Beispiele vom Einsatz künstlicher Intelligenz im Alltag verdeutlichten, dass es sich um einen globalen Trend handelt.  

Bei dieser angeregten Fachkonferenz wurden auch die Schattenseiten von KI beleuchtet. Identitätsklau, Manipulation der Politik, Verbreitung pornografischer Inhalte…Gefahren, die durch KI entstehen, sind nicht auszuschließen und führen zu wachsendem Misstrauen in den digitalen Raum. Wie ist hiermit umzugehen? Just an dieser Stelle kommt die Rolle von SSI ins Spiel. Es gehört zu Jolocom’s Grundprinzipien, die Autonomie von Bürger:innen im Netz zu wahren und zu schützen. Irene freute sich, dies näher erläutern zu können. 

Der Grundgedanke: die eigenen Daten kontrollieren. Aufgeschlüsselt: selektiv auswählen, wer Zugang zu ihren und seinen Daten hat, und ablehnen, wer keinen Zugang bekommen soll. Beim Nutzen einer digitalen Wallet kommt dies gut zum Ausdruck: Ich kann ausweisen, dass ich über 18 Jahre alt bin, ohne mein persönliches Geburtsdatum teilen zu müssen. Diese selektive Weitergabe von Daten bringt auch wieder mehr Vertrauen in den digitalen Raum mit sich. So liefert eine sichere Wallet die Möglichkeit, im beginnenden Zeitalter von KI und automatisierter Bots die Autonomie über die eigenen Daten zu behalten und zu schützen. 

2021 zeigte erneut, wie aktuell das Thema SSI ist und wie es vielseitig diskutiert wird. Das Team hinter Jolocom freut sich sehr, bei so anregenden Events dabei gewesen zu sein und bedankt sich bei den Organisatoren und anderen Teilnehmenden. Auf das 2022 noch viel weiteren spannenden Austausch bieten wird. – 

The post 2021 Flashback: Events appeared first on Jolocom.

Saturday, 27. November 2021

Ontology

Fours Years Since Launch: Ontology’s Journey To Web3 Infrastructure Status

With a continued focus on decentralized identity and data solutions, Ontology has worked to bring better trust, privacy, and security to the new web In a relatively new industry like blockchain, change is a constant state. When Ontology launched at the end of 2017, Bitcoin was putting crypto on the map through continuous price surges, before crashing at the end of 2018. Since this time, in a

With a continued focus on decentralized identity and data solutions, Ontology has worked to bring better trust, privacy, and security to the new web

In a relatively new industry like blockchain, change is a constant state. When Ontology launched at the end of 2017, Bitcoin was putting crypto on the map through continuous price surges, before crashing at the end of 2018. Since this time, in an uncharted landscape that at times seemed dominated by speculation, Ontology strove to be a lighthouse in a sea of confusion, providing clear and reliable blockchain use cases that put users’ interests first.

As the industry has progressed and the world has increasingly embraced decentralized solutions, privacy and security issues associated with Web2 and Big Tech have been exposed. Looking to facilitate a more secure and private internet in Web3, Ontology has been working hard to build out its public chain infrastructure, decentralized identity, and data solutions to support the transition to the new web.

As well as a more private and secure internet, Web3 offers the potential for fascinating use cases as the web becomes more integrated. The metaverse, an all-encompassing digital landscape populated by virtual people, places and things, will eventually see separate virtual worlds interlink and overlap the real world. To get there, we need a public chain that puts users’ security and privacy front and center, whilst also allowing for an interoperable virtual world. Over the last four years, Ontology has been working to create an infrastructure for just that and we are delighted to now be facilitating this vision of a better internet.

As we look to the future, we are excited to onboard new partnerships and make technological advancements that contribute to our vision of Web3, as well as to the growth of our global community.

Year 1: Laying The Foundations

The launch of Ontology’s MainNet 1.0 served to position us as a high-performance public blockchain. In a significant move for the wider industry, Ontology 1.0 was the first public chain capable of executing smart contracts with identity, setting the stage for our vision for decentralized identity solutions. To lay the foundations for the open governance model which has become a key aspect of Ontology, we introduced a new consensus algorithm, VBFT, for the Ontology framework and the Triones Consensus System.

Year 2: Building Out Our Infrastructure

Year 2 saw Ontology crystallize our vision and mark out our position within the broader blockchain ecosystem. Gaining traction, we were able to supplement our MainNet by building on it with further enterprise projects that were focused on decentralized identity and data privacy. Broadening the technical applications of our chain, we launched Wasm TestNet in May, as well as the first-ever cross-chain TestNet. We didn’t stop there; in fact, it was a Multi-VM launch that year, with the launch of our Sharding Design launching in October, which provided linear stability and support for cross-shard transaction processing.

Year 3: Global Expansion

Having made our mark on the industry through technical prowess, the Ontology mission for our third year was to become a cross-chain, global network that would expand our vision of decentralized identity and data through a host of fascinating partnerships.

Throughout the year, we improved our infrastructure through the roll-out of the Ontology Layer 2.0. Additionally, ONT ID was upgraded, which served to combine users’ decentralized identity with their ONTO Wallet with one single login, while providing a framework that helps users control their identity and data. This was a huge step towards interoperability and provided an interlinked suite of products to our users.

We introduced a new governance and staking model in July, affecting both our ONT and ONG tokens, complete with a node and yield calculator allowing users to easily estimate how much they could potentially earn from staking via ONTO. Excitingly, ONG also launched on Uniswap at the end of the summer, bringing Ontology’s token to a whole new user base. As the year developed, we deployed our cross-chain decentralized identity solution on Ethereum, Near, Neo, TRON, Klaytn, Binance Smart Chain, and Polkadot. We also partnered with Patract Labs in November to accelerate smart contract ecosystem development. Finally, we joined forces with Daimler Mobility AG’s Blockchain Factory to develop MoveX, a first-of-its-kind blockchain-based mobility platform for the automotive and mobility industry.

Towards the end of the year, our focus turned to the world of decentralized finance (DeFi). In September 2020, we launched Wing.Finance, a credit-based, cross-chain DeFi lending platform. Since then Wing has seen significant growth, with increased engagement in its DAO, and has also incorporated credit-based lending through Ontology’s unique OScore credit scoring solution. The Wing Inclusive Pool, a first mover in the industry, also allows users to under-collateralize assets and lower their interest rates.

Year 4: Web3 and Interoperability

This year, Ontology has honed our existing products to match our wider vision of Web3 and position ourselves as the public chain capable of moving towards a better, decentralized, interoperable internet that places user privacy and data security at the heart of its priorities.

To facilitate this vision, our technical team began developing the Ontology Ethereum Virtual Machine (EVM) at the start of 2021. Now on TestNet, our EVM will help us establish seamless interoperability between Ontology and the Ethereum platform, offering an inclusive experience to developers and users. This development will also help to cement Ontology’s position as a cross-chain interoperable blockchain, adding to its existing virtual machines; NeoVM, Native (Ontology) VM, and WasmVM.

Reflecting a major endorsement for decentralized identity, ONT ID surpassed 1.5 million users in September. Companies across the globe have also embraced the application this year, most notably through a social good partnership announced in March with global freelancing marketplace leader, MicroWorkers, where it is being used to assist workers to receive rewards and gain greater access to capital. To facilitate its ever-expanding user base, ONT ID underwent an upgrade that will improve user experience, while also making it easier for developers to build sophisticated applications and real-world use cases through ONT ID. The Ontology products now integrated with ONT ID include:

ONT Login, a new feature that makes trustless universal authentication for websites and applications possible, allowing users to log into multiple platforms without having to remember passwords. ONT TAG, Ontology’s new decentralized solution for online identity verification, which helps applications access users’ verifiable credentials, such as KYC verification, whilst also allowing users to protect their privacy by authorizing information independently. OScore, a DeFi credit score, used to measure creditworthiness, which is calculated using different types of on-chain transaction data.

Other partnerships have also contributed to Ontology’s arsenal. Most recently, we partnered with bloXmove, a business-to-business mobility blockchain platform designed to simplify travel across multiple forms of transportation, to bring decentralized identity to urban transport apps. In May, we partnered with ROCKI, a next-generation music streaming service and NFT platform. ROCKI will use Ontology’s decentralized identity solutions to prevent bad actors from impersonating artists and peddling inauthentic NFTs. In June, we also announced a partnership with ZAICO, a real-time cloud storage inventory management application based in Japan. We also partnered with AP.LLC, a private Japanese IT consultancy firm and hired a new Japanese advisor, Matsuyama Kitao Takayuki.

Ontology’s growth in the Japanese market has accelerated following a string of announcements, including the news that ONT would be listed on the Japanese registered crypto exchange, Decurret. This marked the first listing of ONT in Japan, a huge milestone for Ontology and our growing Japanese community. The ONT/JPY trading pair went live in July, with over 40,000 ONT trading volume taking place. In August, ONT was listed on Huobi Japan, another FSA-licensed Japanese exchange.

In January, we were delighted to announce the launch of a web-based ONTO wallet to bring additional accessibility to millions of users through their web browser. Incredibly, this was the first-ever web wallet to support cross-chain assets and dApps while also addressing the growing demand for decentralized identity and data amongst users. We also ​​launched ONTO Anydrop, a decentralized airdrop distribution tool, that allows assets to be sent to up to 100 addresses in one transaction in a fast and secure manner across multiple mainstream blockchains. These significant achievements have led to a massive increase in users and community members of ONTO Wallet. The ONTO Wallet Twitter channel now has over 100K followers.

Wing, Ontology’s DeFi lending platform, also turned one this year. Over the past year, Wing has lived up to its title of a cross-chain platform through launching on Ethereum, OKExChain and most recently, Binance Smart Chain. It also launched a new DeFi product, “Any Pool,” which allows for the contractualization and lending of any asset.

Looking Ahead

As we have seen, the last four years have been full of incredible achievements. Undoubtedly, our community is the support system that drives this success at Ontology. As we step forward into the next era of our future, we are proud to be a well-established blockchain that has stood the test of time. Moving into Web3, we believe we are the chain that can facilitate the needs of the new web. Not only do we expect our protocols and products to continue to facilitate this shift, but we also look forward to welcoming more people to the decentralized identity and data revolution.

Want more Ontology?

Learn more about our decentralized data and identity solutions on our website and official Twitter account. You can also chat with us on Telegram and keep up-to-date with the latest news via our Telegram Announcement account.

Fours Years Since Launch: Ontology’s Journey To Web3 Infrastructure Status was originally published in OntologyNetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.

Friday, 26. November 2021

Ontology

Cyberspace 4 Philosophers

Supercharge your staking with Ontology’s Limited Edition NFT: Multiply your yield by 9000X! To celebrate Ontology’s 4th anniversary, we have made 10,000 limited edition NFT’s available for minting. Not only do they look great, but they will also be used to establish a special NFT Ontology Node where NFT holders benefit from the staking rewards. Minting takes place between November 27th

Supercharge your staking with Ontology’s Limited Edition NFT: Multiply your yield by 9000X!

To celebrate Ontology’s 4th anniversary, we have made 10,000 limited edition NFT’s available for minting. Not only do they look great, but they will also be used to establish a special NFT Ontology Node where NFT holders benefit from the staking rewards.

Minting takes place between November 27th 0:00 UTC and December 7th 0:00 UTC. However, minting will close when all 10,000 NFTs have been minted. Each NFT will cost 10 ONT to mint, with a unique ONT address able to mint a maximum of 10 NFTs.

Stake NFTs and Earn ONG

When you mint your first NFT, you have helped to establish special NFT node owners. Congratulations!

NFT staking has significantly reduced the barrier of entry to establishing a node, by allowing you to do it together with your NFTs. A node owner requires a minimum of 10,000 ONT and pays fees of 500 ONG to establish the node. The special NFT node is established with the ONT used during the minting event and Ontology is covering the 500 ONG in fees as a part of the 4th anniversary celebrations.

90% of the ONG rewards earned by the node will be distributed between the NFT owners, with the remaining 10% being used, in the first instance, as a fund for those who choose to burn their NFTs (see below). When the NFT burning fund is full, the remaining 10% will be used to fund future Ontology events.

Redeem ONT

Should an NFT owner wish to do so, they can burn their NFT and redeem 10 ONT.

Burning NFTs does not reduce the size of the stake in the node. Great news for those that don’t burn their NFTs, as their share of ONG rewards increases for every NFT burned.

Burning NFTs can increase rewards up to 9000 times for the remaining holder. Should all NFTs be burned, the ONG generated by the node will be used by Ontology for future community development.

More

NFTs feature additional use cases — stay tuned for more details!

Guide 1. Download the ONTO Wallet and Create an ONT ID Wallet

Click on the link to view the relevant guide.

Skip this step if you already have an ONT ID wallet.

2. Prepare ONT and ONG

The minting fee of each NFT is 10 ONT, and all transactions on the Ontology blockchain require a small amount of ONG as fees. If ONG balance is insufficient, navigate to ONTO’s Assets page and click the ONT details page. Here, you can click on the upper right button to swap ONT for ONG.

3. Mint NFT

Navigate to ONTO’s Discover page, search “Cyberspace 4 Philosophers” and open it.

Tap on the “Mint” button at the bottom left of the homepage to open the “Mint” page, then tap on the “Mint” button at the bottom. In the pop-up window, enter the mint number, then tap on the “Mint” button to finish the process.

Minted NFTs can be viewed and sent on the ONTO Assets — Collectibles page.

4. Stake NFT and Claim ONG Reward

To earn ONG rewards, NFTs must be staked. The staking feature will be available after the minting is complete and the node has been established, which is 12/7 0:00 UTC or when all 10,000 NFTs have been minted.

Tap on the “Stake/Redeem” button at the bottom right of the homepage to open the “Stake/Redeem” page, then tap on the “Stake” button to stake ONT or the “Unstake” button to unstake ONT.

ONG rewards are distributed at the end of each consensus round. Tap on the “Claim” button to claim the ONG reward.

5. Burn NFTs and Redeem ONT

Only unstaked NFTs can be burned. On the “Stake/Redeem” page, tap on the “Burn” button at the bottom left to burn NFTs. Then wait until the current consensus round ends, and then tap on the “Redeem” button at the bottom right to redeem ONT.

Please note that, Redeem will only be available when there is enough balance in the NFT burning fund.

The Ontology team will reserve the final rights of interpretation of this event.

Want more Ontology?

Learn more about our decentralized data and identity solutions on our website and official Twitter account. You can also chat with us on Telegram and keep up-to-date with the latest news via our Telegram Announcement account.

Other Resources

LinkedIn / Medium / Facebook / Reddit / DiscordYouTube

Cyberspace 4 Philosophers was originally published in OntologyNetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


Shyft Network

Shyft Network: Summer-Fall 2021 Recap

From open-sourcing our Veriscope travel rule solution to partnerships with industry players like Tether and Panther Protocol, our team has been busy building the future of trust and compliance in blockchain. What a few months it’s been for Shyft Network! We want to extend a big thanks to our entire community and partners who’ve contributed to many of our recent partnerships, updates, and key anno
From open-sourcing our Veriscope travel rule solution to partnerships with industry players like Tether and Panther Protocol, our team has been busy building the future of trust and compliance in blockchain.

What a few months it’s been for Shyft Network! We want to extend a big thanks to our entire community and partners who’ve contributed to many of our recent partnerships, updates, and key announcements. We have many exciting things — from long-awaited partnerships to product upgrades, DAO, and community campaigns — that will wrap up the year and take us into the next chapter of our journey building trust and validation into blockchain data.

To mark the end of the quarter, we’re taking some time to recap what’s happened since the summer, plus a tease of what’s to come. Thanks for being here!

The Shyft Federation Deploys the Shyft Bridge — and Signed the Constitution!

The Shyft Node Federation, our collective of Shyft Network validator nodes, has been hard at work since its official deployment in July of 2021. In early September, we announced the Fed had officially deployed the Shyft Bridge, a secure and efficient cross-blockchain asset transfer mechanism. The collaboration between the Shyft Node Federation and Chainsafe offers users the ability to deploy the Shyft Bridge between the Shyft Network and Ethereum to support minimal cross-asset transmission and minimal cost cross-chain smart-contract operations. Read more about the Shyft Bridge.

Earlier in the month, the Shyft Node Federation, including CoinShares, Maven11, Fabric, ClicketyClack, Connect Capital, AD Node, Staking Team, Merkle Trading, BlockUnity, Paycase Financial, DeFi Technologies, Mempool Partners, Nodebased, NP IR, and others, publicly signed off on voting guidelines and node rights and responsibilities. This document included many of the ground rules that would enable improvement protocols and a framework for new nodes to enter the Network.

We’d like to again recognize and thank the entire Node Federation member network for their commitment to the highest level of trust in blockchain, our Network, and community.

Read more about the Node Federation Constitution.

Tether Is Testing and Integrating Veriscope — Now Open-Sourced and Free to Use!​​

On November 18, we shared the incredibly exciting news that leading stablecoin Tether (owned by Bitfinex) had begun testing and integrating Versicope. Tether’s integration kicks off the first stage in their trial of Veriscope, which will allow them to offer their customers a privacy-focused experience while also solving global compliance requirements for all participants across the ecosystem. Read more here.

Tether’s Veriscope testing follows our announcement (and FATF’s latest regulatory guidance) from earlier in November that Shyft Network has officially open-sourced the Versicope technology, making it free and simpler than ever for people to use. This update, which serves to democratize access to compliance technology for the entire blockchain community, came only two months after we shared the latest list of exchanges involved in the phased deployment of Veriscope on our Network. Participating exchanges included Binance, Tether, Deribit, Bitmex, and Huobi.

Read more about Veriscope Open Sourcing.

Shyft Network Partners with Panther Protocol to Advance Privacy Tech and Data Protection.

Our team has been busy planning and deploying partnerships with some of the top names across crypto and DeFi this quarter, including Panther Protocol, the end-to-end blockchain solution developing the privacy layer for Web3 and DeFi. In early November, Yahoo News got the scoop about our strategic partnership with the Panther team to accelerate the development of privacy-enhancing technologies, data protection tooling, and mission-critical data attestation services.

On the Shyft Network side, we’ll provide value to Panther Protocol through enterprise and government compliance and data attestation services, resulting from deploying Panther to Shyft Network’s Layer 1. This update is a direct solution for ensuring that institutional dark pools remain compliant while also private — a significant win for addressing issues of front-running and algorithm obfuscation amidst mass adoption in DeFi. Through this partnership and integrations, Shyft Network and Panther will continuously work together to advance privacy tech and collectively raise the bar on the state of data protection tools.

Read the full Panther Announcement.

The Panther news followed August’s partnership announcement with Kylin Network, who we’re working alongside to deploy data oracles for complaint DeFi Infrastructure for Financial Institutions. Our Network’s opt-in compliance infrastructure, including whitelist addresses and Anti-Money-Laundering (AML) and GDPR compliant systems, will be further strengthened by Kylin Network’s data infrastructure and oracle systems.

Speaking of Compliant DeFi, we shared a deep-dive blog post on this subject in October, giving our followers a look into how we’re ensuring compliance without removing the “De” from DeFi.

Read the full Guide to Complaint DeFi.

Compliant DeFi, Tokenomics, & Solving the Internet’s Identity Problem

For those looking for more insight into our technology and our mission to build the most secure future for trust and identity in blockchain, be sure to check out our blog post on how we’re solving The Internet’s Identity Problem.

Following our long-awaited mainnet launch, we shared Part 3 in a series on The Shyft Network Token ($SHFT), including a complete overview of our token distribution and economics. From insight into inflation and DAO-related asserts to a full economics breakdown — read this blog post to get fully up to speed on our tokenomics.

What’s Next

As we move into the end of the year, Shyft Network looks forward to sharing news of a significant exchange announcing live testing of our Veriscope travel rule solution. Also, stay tuned for details on a major industry player joining our Node Federation to help push complaint DeFi products.

As crypto, DeFi, NFTs, and various digital assets experience increased growth, volatility, and regulation, there’s never been a more critical time to develop compliant solutions and build out robust communities that are engaged and aligned with our mission. Watch this space for more updates as we near the end of this monumental year.

— The Shyft Network Team

About Shyft Network

The Shyft Network aggregates and embeds trust into data stored on public and private ecosystems, allowing an opt-in compliance layer across all systems. The key pillar for Shyft is user consent, allowing users to track the usage of their data. Therefore, no one can use personal data without consent from the owner. Shift Network allows and gives incentives to individuals and enterprises to work together to add context to data, unlocking the ability to build authentic digital reputation, identity, and credibility frameworks.

Website / Telegram / Twitter / MediumDiscord


Coinfirm

Webinar: Coinfirm’s CMO, Sachin Dutta, Joins Archax’s CCO, Alexander Royle on Crypto Exchange Regulation

Alexander Royle, Chief Compliance Officer and Head of Regulation at Archax together with Sachin Dutta, Chief Marketing Officer of Coinfirm share their unique viewpoints on the webinar ‘Crypto Exchanges: Government, Regulation and Crime’ at the Crypto Curry Club, hosted by founder Erica Stanford.
Alexander Royle, Chief Compliance Officer and Head of Regulation at Archax together with Sachin Dutta, Chief Marketing Officer of Coinfirm share their unique viewpoints on the webinar ‘Crypto Exchanges: Government, Regulation and Crime’ at the Crypto Curry Club, hosted by founder Erica Stanford.

KuppingerCole

Feb 16, 2022: Becoming a Better Privileged Access Manager

Organizations across the world are plagued by limited visibility of privileged accounts, users, and credentials. This creates a host of security and audibility issues, with former employees retaining access to sensitive information - a dangerous backdoor for attackers. As organizations accelerate towards the cloud, it is critical to have a strategic privileged access approach in place to ensure sec
Organizations across the world are plagued by limited visibility of privileged accounts, users, and credentials. This creates a host of security and audibility issues, with former employees retaining access to sensitive information - a dangerous backdoor for attackers. As organizations accelerate towards the cloud, it is critical to have a strategic privileged access approach in place to ensure secure onboarding and management of new privileged accounts at scale.

Tokeny Solutions

Daniel Coheur

The post Daniel Coheur appeared first on Tokeny Solutions.
Biography Daniel Coheur

Co-Founder and Chief Commercial Officer (CCO) – Tokeny Solutions

Daniel Coheur is the co-founder and Chief Commercial Officer (CCO) of Tokeny Solutions. In this role he can lever the experience of his corporate background, which centered around the global growth of transactional based enterprises. In capital markets (Clearstream Banking owned by Deutsche Boerse), and telecommunication (Syniverse owned by The Carlyle Group). He is a genuine entrepreneur who mentored and funded several start-ups before creating his own investment boutique. Today, Daniel is working with investment banks, funds, assets managers and distributors to educate these actors on the digital era of finance and accelerate their adoption of distributed ledger technology. Download Photo and Logo Company Introduction Tokeny Solutions

The Compliance Infrastructure for Digital Assets

Tokeny Solutions allows financial actors operating in private markets to compliantly issue, transfer and manage securities using distributed ledger technology, enabling them to improve asset liquidity. Tokeny Solutions is recognized as the leader in its field by KPMG, CB Insights and PwC. They are backed by the Euronext, the biggest stock exchange in Europe.

The post Daniel Coheur appeared first on Tokeny Solutions.


Affinidi

Webinar Recap: How digital credentials can help unlock safe travels beyond COVID?

Click here to watch the recording of this webinar. On November 25th, 2021 Affinidi’s Global Developer Ecosystem (GDE) hosted its second webinar titled “How digital credentials can help unlock safe travels beyond COVID?” This one-hour session had Toby Berger, the Director of Travel Affinidi and Shankar Pillai, the Director of Engineering, Health/Travel Affinidi as speakers. The host fo

Click here to watch the recording of this webinar.

On November 25th, 2021 Affinidi’s Global Developer Ecosystem (GDE) hosted its second webinar titled “How digital credentials can help unlock safe travels beyond COVID?”

This one-hour session had Toby Berger, the Director of Travel Affinidi and Shankar Pillai, the Director of Engineering, Health/Travel Affinidi as speakers.

The host for this event was Kamal Laungani, the Global Developer Ecosystem Manager. He introduced the guests and talked briefly about the concepts of Self-Sovereign Identity (SSI) and Verifiable Credentials (VCs), and the role of Affinidi in this space.

COVID Verification Solutions by Toby Berger

Toby Berger started by reminding us of the COVID pandemic in the early 2020s and how it impacted people and disrupted industries and businesses. He opined that this also pushed businesses to explore new horizons, especially those involved in the travel industry, as the complexity of operations increased with quarantines and vaccinations.

He explained that this situation also brought up the need for a verification solution that enabled verifiers like government and airport authorities to safely and securely check the vaccination status of travelers, so steps can be taken accordingly to prevent the spread of COVID.

After detailed discussions with governments and other stakeholder, Affinidi Travel identified a bunch of common considerations that included:

Interoperability across global standards and formats. A competitive and unified pricing Ease of integration with existing solutions A flexible rules engine that supports global safe travel regulations A simple and intuitive UI An underlying trust network that connects to a global support group of industry peers.

Based on these inputs, the CommonCheck solution was built, and it offered the following benefits for users.

With these thoughts on how Affinidi’s verifiable solution is shaping the travel industry, Toby ended his session.

Affinidi Travel Demo — Shankar Pillai

Shankar started his interesting session by explaining the in-depth architecture of the system to give the audience an idea of how the common considerations mentioned by Toby earlier were integrated into the system to give all users the benefits of a verification solution.

Here’s a look at the architecture.

This explanation was followed by a demo of the live system.

The CommonCheck application of the Affinidi Travel Ecosystem comes with a simple UI that takes information from users and creates a VC that can be shared with anyone as a QR code. This VC is trusted as it is issued by a company that is authorized to test for COVID and also, it is tamper-proof, so the results can’t be changed by the holder.

Shankar showcased the simplicity and ingenuity of the application and ended his session by saying that this product can be used as an API as well.

Walkthrough of the Affinidi Tech Stack — Kamal Laungani

The last part of the webinar was handled by Kamal where he walked the attendees through the Affinidi tech stack and how it can be leveraged to build VC-based applications. He also did a demo of Affinidi’s Schema Manager and how it can be integrated with any application.

He even showed the audience how to issue a VC for attending the webinar!

Q&A Session

The webinar ended with a Q&A session that saw some interesting questions from the participants.

Some of the questions that were asked were,

Does Affinidi support the Good Health Pass Collaborative standard? How are you managing integration with Gvt systems for verification / entry / exit Recently tried issuing a VC via YourEdge app. Aside from Email Addresses, are there any other means to write and deliver a VC to someone without knowing their email address? Is Affinidi launching any token? How can we invest in affinidi?

Toby, Shankar, and Kamal came together to answer these questions.

Overall, it was an insightful session that showed a practical implementation of verifiable credentials. We are confident that this webinar will enthuse more developers and businesses to integrate a verifiable solution into their operations.

If you’re a developer or someone who wants to build an SSI application, reach out to us on Discord to explore how the Affinidi tech stack can ease your development process.

Also, join our mailing list and follow us on Twitter, LinkedIn, and Facebook for more such exciting events.

Webinar Recap: How digital credentials can help unlock safe travels beyond COVID? was originally published in Affinidi on Medium, where people are continuing the conversation by highlighting and responding to this story.

Thursday, 25. November 2021

KuppingerCole

Combatting Fraud Proactively With Behavioral Biometrics

Digital businesses are facing an increasing onslaught of fraud enabled by malware, social engineering, and other cyber criminal activities. Strong authentication is essential, especially in the context of PSD2, but it can be challenging to achieve without adding friction to the user experience.Join security experts Martin Kuppinger, Principal Analyst at KuppingerCole and Olov Renberg Co-founder an

Digital businesses are facing an increasing onslaught of fraud enabled by malware, social engineering, and other cyber criminal activities. Strong authentication is essential, especially in the context of PSD2, but it can be challenging to achieve without adding friction to the user experience.Join security experts Martin Kuppinger, Principal Analyst at KuppingerCole and Olov Renberg Co-founder and ​VP Business Development & Strategic Partner at BehavioSec​ as they discuss the security and regulatory challenges faced by financial institutions and other organizations doing business in the digital era, and explore the value of behavioral biometrics in addressing them.

Martin Kuppinger explains the importance of identity verification and why fraud detection needs to be fast and accurate. He also shows the importance to business of continuous, zero-friction authentication, and how this can be achieved in a reliable and trustworthy way. Olov Renberg explains how behavioral biometrics is being used to prevent banking trojans in Switzerland and how the technology can be used to find malware and spot fraud within Open Banking Payments Initiation Service Providers (PISPs) in a GDPR-compliant way. 




Northern Block

SSI Interoperability Demo – NB Orbit Mobile Wallet, PwC, Copper Mountain & BC Mines

The Province of British Columbia is committed to increased transparency and trust related to where raw materials come from and how they are produced. BC’s Ministry of Energy, Mines, and Low Carbon Innovation (EMLI) is convening a digital trust ecosystem to pilot and test technology in support of this initiative. In this demonstration, our Identity Architect Dave McKay […] The post

The Province of British Columbia is committed to increased transparency and trust related to where raw materials come from and how they are produced. BC’s Ministry of Energy, Mines, and Low Carbon Innovation (EMLI) is convening a digital trust ecosystem to pilot and test technology in support of this initiative.

In this demonstration, our Identity Architect Dave McKay showcases interoperability between organizations using the BC Gov Business Partner Agent (BPA) and the NB Orbit Mobile Wallet for managing these sustainable mining practices.

All of this is running on the BCovrin Test Network.

Check out the video and let us know your thoughts!

Want to quickly launch a Verifiable Credential product of your own? Check out to see if our Accelerated Development Program is a good fit for you!

The post SSI Interoperability Demo – NB Orbit Mobile Wallet, PwC, Copper Mountain & BC Mines appeared first on Northern Block | Self Sovereign Identity Solution Provider.


Ontology

Ontology Harbinger Interview Series: Polaris

This is an ongoing series featuring Ontology’s Harbingers. Harbingers are exceptional leaders that help Ontology grow its community and ecosystem, making it an ever-stronger blockchain, and decentralized identity and data leader. In the 14th interview in this series, Ontology speaks with Polaris, administrator of our English community. 1. How did you hear about Ontology? What drew you to On
This is an ongoing series featuring Ontology’s Harbingers. Harbingers are exceptional leaders that help Ontology grow its community and ecosystem, making it an ever-stronger blockchain, and decentralized identity and data leader.

In the 14th interview in this series, Ontology speaks with Polaris, administrator of our English community.

1. How did you hear about Ontology? What drew you to Ontology?

I have been a Neo supporter, and from the Neo reddit group I found out about Ontology and the airdrop which was given to Neo holders. Unfortunately, I left it very late to sign up for the newsletter, so I missed the 1000 ONT airdrop and only got a small amount of ONT from holding my NEO’s. I was fascinated when I looked at Ontology’s whitepaper, and how they envision an extremely fast blockchain for businesses and identity as the main USP. I think after reading the whitepaper, I was convinced that the way Ontology envision the future is the right way, andthat drew me towards Ontology

2. Why did you become a supporter of Ontology and a champion of its brand?

The ever-evolving blockchain industry is still at an early stage where a combination of many variables make up the whole industry. We have managed to understand how a decentralized distributed ledger works, how to create smart contracts on that distributed ledger, and to create content and immortalize it on the blockchain. However, identity is not something which the industry is fully focused on, instead a more anarchical utopia is often created where no one has a connection to identity and these ideologies iterate that somehow the worlds economy will run fine with a rogue infrastructure. I think the fact that Ontology has focused on identity and decentralized trust from the very beginning gives me a clear indicator that the theme is to bring real use cases from the technology, and that’s what really excites me because real use cases of the blockchain will promote a smart economy, a fairer and more transparent economy, while not having to compromise our privacy. This eventually will translate to an economy which will run on centralized and decentralized platforms, and being part of that future is something I always wanted to do. The fact that my understanding of technology usage is aligned with Ontologies vision, makes me want to be a champion of the brand.

3. What’s the key role of a Harbinger? What’s your favorite thing about being a Harbinger?

I love the word Harbinger, it means someone who initiates changes. Being given the freedom to bring ideas to the table, while receiving all the support I need, is something I cherish greatly. The key role, from my point of view, is to represent Ontology and bridge the gap between the community and the team. To establish deeper connections with the community. To be able to get the general sentiment from the community about the project and be able to relay that onto the team. To think of innovative idea to further drive user/community engagement. To think of innovative ideas to educate about the industry and the eco system in general.

4. Why is being part of the Ontology community important to you?

Being part of any community is something we as humans have been deeply ingrained to do. We have always been very tribal towards our culture, geographical location, genetics etc. Now, we are beginning to realize that those things don’t matter and the only way forward is to be as one. We need to be more integrated towards how we do business and how we interact. Ontology’s vision and global community gives me that feeling of belonging, where my understanding of the future is the same as a lot of others. That is why this community is important for me.

5. How is Ontology’s community different from other blockchain communities, is there anything that makes it stand out?

Well, we all want a decentralized future but we all also want our assets to be pegged with real life identity so that there is some sort of legal connection with the asset. If the future will be using blockchain technology, then I cannot see that happening without identity and trust. Without these two factors, future adoption will be halted. I think a lot of members from the community agree on this. So having realistic expectation of the future is what makes this community stand out. They support decentralized identity and having full control of one’s data.

6. What do you use as your key channels for engagement with the Ontology community and why? Would you like to see any others?

Currently I am using real life interactions with business owners and corporations. I’m trying to make them understand the benefits of using blockchain, not just as a store of value but as a precursor towards a completely new, fairer industry. I also use telegram, discord, and twitter spaces for my socials. Absolutely I would like to see more educational videos on YouTube and all other platforms.

7. Can you share a memorable experience or something you’ve learned from being a Harbinger? What advice would you give to someone looking to become a Harbinger?

I have had many memorable experiences being part of the eco system, I have been part of the community in all the ups and downs and to be honest it’s been a great journey so far. I remember not seeing my tokens on my wallet once and being supported by the community, it was a UI problem which eventually got sorted. Along the journey I have learnt so much from all the other admins/harbingers, and without their support I don’t think I would be a harbinger today. So my advice to all new community members/potential harbingers would be to not be afraid to ask and learn, we are here to support everyone and equip them with the correct knowledge and support so they can resonate on that with others.

8. How would you describe the Ontology community in three words?

Global, Passionate, Loyal

9. How do you think Ontology could expand its community going forward? What would you like to see more/less of? What kinds of things do you see community members do that you think help our community grow?

I am quite happy with the way the current community engagement works. To improve it even further, we might need to think about more innovative ways. Things like a NFT marketplace, where artist and musicians mint their work using Ontology’s blockchain, or having a monthly roundup on twitter spaces.

10. What do you see as the key milestones for Ontology and how can the community help with achieving these?

The completion of EVM would be a huge milestone for Ontology, and with that the eco system will attract a lot of developers and blockchain enthusiasts. The community needs to be ready to help and educate the new members about the benefits of DID, OSCORE, and cheap transaction costs, all while controlling their privacy. If all the Harbingers and members of the community keep the user engagement high, that will ensure that this technology can be widely accepted by the globe.

To learn more about Ontology’s Harbinger Program and how you can get involved, check out our updated GUIDE.

Want more Ontology?

Learn more about our decentralized data and identity solutions on our website and official Twitter account. You can also chat with us on Telegram and keep up-to-date with the latest news via our Telegram Announcement account.

Ontology Harbinger Interview Series: Polaris was originally published in OntologyNetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


Imageware

Biometric Voice Recognition – Everything You Should Know

With advancing technology, many companies have switched from orthodox authentication methods to cutting-edge biometric authentication and its components. The post Biometric Voice Recognition – Everything You Should Know appeared first on Imageware.

With advancing technology, many companies have switched from orthodox authentication methods to cutting-edge biometric authentication and its components. Fingerprint, facial, and palm recognition remain the most common types, biometric voice recognition has seen a rise. 

What is Biometric Voice Recognition?

Biometric Voice Recognition is the use of the human voice to uniquely identify biological characteristics to authenticate an individual unlike passwords or tokens that require physical input.

Massive advances in neural network technology have led to the development of voice biometrics that are faster and more accurate than other methods. These biometric voice recognition systems have access to larger use cases and can identify an individual with less amount of speech samples. 

Where is the Voice Biometric Market Heading? The market size of biometric voice recognition is expected to grow from $1.1 billion USD in 2020 to $3.9 billion USD by 2026, at a Compound Annual Growth Rate (CAGR) of 22.8% during the forecast period.  Due to insufficient security features, device interactions in the finance sector are limited. Fraud attacks against financial institutions have increased by 269% over the previous four years, more than most other industries investigated.  Financial institutions are likely to employ voice recognition in combination with their speech-recognition applications in the future. How Does Biometric Voice Recognition Work?

Voice biometric recognition works by inputting the the voice of the individual whose identity has to be stored in the system. This input is kept as a print for authentication. The input print is made with software that can split the voice statement into multiple frequencies. 

Behavioral attributes are identified at this stage that work mutually to make up the voice print. Voice recognition is much like iris or fingerprint recognition. Each one is unique to an individual and cannot be duplicated. These prints are stored in the database for further authentication.

Meanwhile, a text independent system focuses and matches unfamiliar speech with previously stored voice information. 

There are two types of voice authentication:

Text-independent recognition: The system does not keep any pre-recorded audio to compare with the input in this case. It’s a voice authentication approach that doesn’t require any prior speech material to be entered into the biometric system. It is far more practical because it allows for free speech.

Text-dependent recognition: This necessitates the repetition of a previously delivered sentence that has been stored in the system, posing a speech content limitation.

Voice Biometrics Use-Cases

Voice biometric recognition has multiple use cases. Some of them are:

Contact Centre

The contact center industry is perhaps the most common application of speech biometrics. By avoiding the laborious security questions at the start of every customer service interaction, using voice to verify and authenticate callers saves time and effort for both the consumer and the agent.

Fraud Detection

Voice biometrics is a powerful fraud-detection tool. Multi-factor authentication is increasingly being used to prevent unauthorised access to client data or financial resources, since identity theft is on the rise. Voice biometrics offers a safe, spoof-resistant authentication mechanism.

Financial Services

In recent years, the global financial services market has seen significant changes. Customers’ lives have been made easier by mobile banking and other FinTech alternatives, but there has also been an increase in danger. Thousands of verifications a day, in many languages, are processed using voice biometrics.

Digital Signatures

Voice biometrics can be used to establish voice signatures, which are a legally binding means of underwriting documents like life insurance contracts. Financial transactions can also be authorised using voice signatures.

Workforce Management

The use of voice biometrics in workforce management apps is currently commonplace. Speech verification is a secure alternative to badging systems for organisations with a big, scattered workforce.

Advantages of Biometric Voice Recognition 1. Low Operational Costs

Call centres and even banks can save money by using voice authentication. It saves them millions of dollars by eliminating many of the steps necessary in traditional verification methods. It can recognise the customer’s voice during an end-to-end chat to authenticate their identity without the need for customary inquiries.

2.Enhanced User Experience

Another advantage of voice biometric systems that is often neglected is that they have the ability to greatly improve customer experiences. Callers no longer need to offer passcodes, PINs, or answer challenge questions to verify their identity. 

This makes speech biometrics perfect for omnichannel and multichannel deployments, as a customer’s voiceprint can be used across all of your company’s support channels once they’ve been enrolled.

3. Increased Accuracy

Voice authentication is more accurate and trustworthy than passwords, which are easy to forget, modify, or guess. It’s similar to fingerprints, which no one else can have. In other words, unlike passwords, you cannot forget or reproduce a voice. Despite the fact that the sound may be impacted by a variety of things, it is far more reliable and convenient.

4. Easy to Implement Technology

Many businesses value the simplicity of voice recognition biometrics in terms of use and implementation. Some biometric technology can be challenging to integrate into a business and to get started with. However, voice biometric systems can usually be implemented without additional equipment or systems because they require so little.

Because this technology is so simple to use, companies can often reassign personnel elsewhere in the organisation to boost performance and customer satisfaction.

Conclusion

Voice authentication is a great way to verify a user’s identification since it adds additional layers of protection that manual pass codes might not provide. Voice authentication is beneficial for both customers and the business as it removes frustration associated with cumbersome login processes. 

The post Biometric Voice Recognition – Everything You Should Know appeared first on Imageware.

Wednesday, 24. November 2021

KuppingerCole

Risky business - Verifying identities in a digital world

Knowing who you are doing business with online has been and still is a major challenge. But why do you really need to know, and what are the pitfalls? The presentation will look at some of the important challenges of identifying, validating and authenticating people online.

Knowing who you are doing business with online has been and still is a major challenge. But why do you really need to know, and what are the pitfalls? The presentation will look at some of the important challenges of identifying, validating and authenticating people online.




Panel | Digital ID Best Practices Discussion




Passwordless update - News from FIDO

Inconvenient and weak digital identity affects our digital economy.  Adding more band-aids to the legacy knowledge-based digital identity infrastructure isn’t effective anymore.   The FIDO Alliance introduced standards for possession backed authentication which are now supported by all major platforms.  Additionally,  the Alliance is developing new standards for document

Inconvenient and weak digital identity affects our digital economy.  Adding more band-aids to the legacy knowledge-based digital identity infrastructure isn’t effective anymore.  

The FIDO Alliance introduced standards for possession backed authentication which are now supported by all major platforms.  Additionally,  the Alliance is developing new standards for document based ID verification and passwordless device onboarding.

With standardized approaches supported by the ecosystem, we have all ingredients for a wholesale upgrade to the “fabric of identity” in our hands.  It is on us to use them.




Global ID

EPISODE 14 — What we learned at Solana Breakpoint

EPISODE 14 — What we learned at Solana Breakpoint GlobaliD co-founder and CEO Greg Kidd and Jun Hiraga talk about their learnings from Solana Breakpoint and beyond — from DeFi to identity to web3. Greg and Jun are founding partners of Hard Yaka Ventures. Past episodes: EPISODE 13 — DeFi and Identity: Compliance in a decentralized world EPISODE 12 — The future of GlobaliD Groups EPISODE
EPISODE 14 — What we learned at Solana Breakpoint

GlobaliD co-founder and CEO Greg Kidd and Jun Hiraga talk about their learnings from Solana Breakpoint and beyond — from DeFi to identity to web3. Greg and Jun are founding partners of Hard Yaka Ventures.

Past episodes: EPISODE 13 — DeFi and Identity: Compliance in a decentralized world EPISODE 12 — The future of GlobaliD Groups EPISODE 11 — The XRP Card and the future of communities EPISODE 10 — How to decentralize identity and empower individuals EPISODE 09 — Understanding GlobaliD’s identity platform EPISODE 08 — Owning your identity and data with VP of Design Antoine Bonnin EPISODE 07 — Understanding the future of fintech with Ayo Omojola EPISODE 06 — Establishing trust and safety in tomorrow’s networks EPISODE 05 — How ZELF combines the power of payments and messaging EPISODE 04 — The future of blockchain with the creator of Solana EPISODE 03 — Should we trust Facebook? EPISODE 02 — JP Thieriot on why Uphold isn’t delisting XRP EPISODE 01 — The SEC’s crypto turf war and why XRP isn’t a security

Have a question for us? A topic you’d like covered? A guest you’d like to see? Let us know!

GlobaliD on Twitter Greg Kidd on Twitter Jun Hiraga on LinkedIn

EPISODE 14 — What we learned at Solana Breakpoint was originally published in GlobaliD on Medium, where people are continuing the conversation by highlighting and responding to this story.


Anonym

Why Data Privacy Experts Urge Businesses to Proactively Protect Customer Data

Forbes Technology Council has said a national data privacy regulation could save companies time and money and help them focus on business success and customer satisfaction rather than get lost in the maze of privacy regulation and compliance. We completely agree. Most commentators agree the US data privacy regulatory landscape is shambolic. Only California, Colorado and Vi
Forbes Technology Council has said a national data privacy regulation could save companies time and money and help them focus on business success and customer satisfaction rather than get lost in the maze of privacy regulation and compliance.

We completely agree.

Most commentators agree the US data privacy regulatory landscape is shambolic. Only CaliforniaColorado and Virginia have passed state laws, while a raft of other state regulations are on the table but not yet passed. A national data privacy law was looking promising earlier this year but is now widely considered a way off.

But the Forbes Technology Council points out the already heavy compliance burden (financial and operational) on businesses will only increase when these laws pass. Compliance with the CCPAand the GDPR is proving hugely costly, according to PwC, since laws worldwide differ just enough to demand businesses stay aware of their obligations and implement the systems they think will be protective enough across all regulations or at least the most challenging one. 

Forbes says the hardest hit will be the mid-market enterprises and non-profit organizations that don’t have the resources to keep up.

Forbes rightly asks: “How will businesses manage the nuanced differences among them, and how much time will this take? Will they face multiple fines for the same incident? What happens if the regulations have conflicting provisions? Does any company really want to restrict business activity while it wastes time in court defending how it struggled to resolve conflicts between different privacy regulations?”

Everything points to the solution being a unified, national data privacy law, to bring cohesion to an otherwise time-consuming and resource-intensive mess.

We are seeing some data privacy progress in the US, such as President Biden’s cybersecurity executive orders and more privacy-oriented commissioners appointed to the Federal Trade Commission.

Forbes says businesses are suffering dreadful inertia and doing nothing or very little while they wait for a national law, which will hurt both the business and its customers in the long term, especially via major data breaches which aren’t reducing in size or frequency. Data breaches not only put consumers at risk; they make consumers doubt companies and governments and increasingly reject the data surveillance business model and data access consumers don’t like or trust.

Forbes says businesses that do try to do the right thing pay for it in development costs and legal fees as they flounder around trying to work out which requirements are important to their business.

It’s a no-brainer then when Forbes concludes “… only a sensible national privacy regulation” can help businesses to see which technologies and processes they need to protect both their business and their customers. 

And, as we do here at Anonyome Labs, Forbes reminds companies it’s still up to them to stay vigilant and proactive in protecting their customers’ data privacy while the country waits for the national data privacy law saga to come to a successful end.

One of Forbes’ suggestions is for companies to “build a top-down, data-driven culture of privacy based on zero trust, data encryption and the ethical use of data.”

And that’s where Sudo Platform can help. Sudo Platform is the complete privacy and cybersafety toolkit for integrating next generation identity protection and privacy into your brand’s products and services. 

By leveraging Sudo Platform, you can:

Put market-leading privacy and cybersafety tools for communications, collaboration, and commerce right into your customers’ hands.  Give your customers control over their personal data and empower them with unprecedented privacy and safety.

Talk to us today.

Photo By Andrii Yalanskyi

The post Why Data Privacy Experts Urge Businesses to Proactively Protect Customer Data appeared first on Anonyome Labs.


Evernym

Celebrating the Launch of the cheqd Network

We’d like to congratulate our friends at cheqd on launching a production token-enabled network for verifiable identity that supports W3C standards for decentralized identifiers and verifiable credentials! The cheqd network allows for the exchange of identity credentials in a decentralized and self-sovereign manner. This puts individuals in control of their digital information, with the ability […]

We’d like to congratulate our friends at cheqd on launching a production token-enabled network for verifiable identity that supports W3C standards for decentralized identifiers and verifiable credentials! The cheqd network allows for the exchange of identity credentials in a decentralized and self-sovereign manner. This puts individuals in control of their digital information, with the ability […]

The post Celebrating the Launch </br>of the cheqd Network appeared first on Evernym.


auth0

Securing ASP.NET Minimal Web APIs with Auth0

Learn about the new ASP.NET minimal Web APIs introduced in .NET 6.0 and how to secure them with Auth0.
Learn about the new ASP.NET minimal Web APIs introduced in .NET 6.0 and how to secure them with Auth0.

Infocert

Digital Identity evolution in the Financial Service Industry, what’s next? Download the Paper by InfoCert and Tinexta Cyber.

Is now available the Paper published on “Journal of Digital Banking” Vol. 6, 1 by Henry Stewart Publications. Download it now for free. Is now available for download the paper wrote by a team made up of experts form InfoCert, the largest European Certification Authority and Qualified Digital Trust Services Provider and Tinexta Cyber, company […] The post Digital Identity evolution in the Financi
Is now available the Paper published on “Journal of Digital Banking” Vol. 6, 1 by Henry Stewart Publications. Download it now for free.

Is now available for download the paper wrote by a team made up of experts form InfoCert, the largest European Certification Authority and Qualified Digital Trust Services Provider and Tinexta Cyber, company leader in Cybersecurity. The article has been recently published on Journal of Digital Banking Vol. 6, 1 by Henry Stewart Publications.

Download the full Paper

This paper aims to illustrate how digital identity has become an essential element of business transformation in the financial sector and how it is evolving from an asset to support business in a new revenue stream.

A new approach that will links needs of Trust and Cybersecurity, in a complex framework as Financial Services Market is.

Self-sovereign identity, a new paradigm in the Financial Services framework

Digital Identity is moving to a new paradigm that will revolutionize the approach to digital identity management, ensured by the security of blockchain technologies.

In the self-sovereign identity (SSI) framework, digital identities will no longer be merely an element to support commercial transactions but become a new strategic asset around which financial institutions must leverage to create new value, develop new business models, and generate new revenue streams.

A new approach that will allow financial market players to capitalize on the large amount of data at their disposal in full compliance with regulations.

If you want to know more, download the full paper on https://infocert.digital/the-development-of-digital-identity-in-the-financial-service-industry/

Authors Michele Guido Lavizzari – Chief International Development Officer at InfoCert Marco Di Luzio – Chief Marketing Officer at Tinexta Cyber Claudio Tommasino – Digital Communication Specialist at InfoCert

The post Digital Identity evolution in the Financial Service Industry, what’s next? Download the Paper by InfoCert and Tinexta Cyber. appeared first on InfoCert.


ValidatedID

With Clinics we drive the digitalisation in the dental industry

Collaborating to simplify the procedures and management of dental centers while eliminating paper in the process of signing documents.
Collaborating to simplify the procedures and management of dental centers while eliminating paper in the process of signing documents.

Ready for INATBA’S World Blockchain Congress

After joining the INATBA we’re preparing to be part of a forum that will highlight the great work done together with companies, universities, and organizations.
After joining the INATBA we’re preparing to be part of a forum that will highlight the great work done together with companies, universities, and organizations.

How to implement digital signatures in your company?

If you are evaluating electronic signature solutions for your company, keep in mind these 5 steps to implement a digital signature solution.
If you are evaluating electronic signature solutions for your company, keep in mind these 5 steps to implement a digital signature solution.

What kinds of digital signatures can be used under the eIDAS?

Qualified signatures have very clear requirements: advanced signature + qualified certificate + secure signature creation device
Qualified signatures have very clear requirements: advanced signature + qualified certificate + secure signature creation device

The digital signature in HR: the success story of PSSJD

By implementing the digital signature, Parc Sanitari Sant Joan de Déu has managed to have 95% of its documentation signed remotely in less than 48 hours.
By implementing the digital signature, Parc Sanitari Sant Joan de Déu has managed to have 95% of its documentation signed remotely in less than 48 hours.

Self-Sovereign Identity: fasten your seatbelts

Identity has been an unresolvable issue that wandered since the beginnings of the Internet. With the explosion of Social Media, the user's digital activity has been exponential, building a new digital identity
Identity has been an unresolvable issue that wandered since the beginnings of the Internet. With the explosion of Social Media, the user's digital activity has been exponential, building a new digital identity

Digital signature for informed consent

Advantages of electronically signing informed consent and sensitive documents and how to choose a valid signature system
Advantages of electronically signing informed consent and sensitive documents and how to choose a valid signature system

Validated ID, first Spanish company to become Sovrin Steward

The Sovrin Foundation has announced our incorporation as partner and Steward member of the Sovrin network
The Sovrin Foundation has announced our incorporation as partner and Steward member of the Sovrin network

Security and hidden costs of digital signature pads

The use of digital signature services instead of digital signature pads is not only a technological or price decision, but also one of guarantees.
The use of digital signature services instead of digital signature pads is not only a technological or price decision, but also one of guarantees.

Validated ID raises € 2M in financing round

The new financing is led by Randstad Innovation Fund, Caixa Capital Risc, and Cuatrecasas Ventures
The new financing is led by Randstad Innovation Fund, Caixa Capital Risc, and Cuatrecasas Ventures

We are new members of Lab Santé France

Lab Santé is a cooperation structure between those who offer innovative solutions and their future users, connects public-private entities.
Lab Santé is a cooperation structure between those who offer innovative solutions and their future users, connects public-private entities.

The validity of handwritten signatures  

The handwritten electronic signature does not cease to be a handwritten signature no matter if it is made on a signature tablet, on an Ipad or on other support
The handwritten electronic signature does not cease to be a handwritten signature no matter if it is made on a signature tablet, on an Ipad or on other support

Awarded as Top 10 Patient Engagement Solution Provider in Europe

Validated ID’s efforts to improve the doctor-patient relationship through the electronic signature service VIDsigner have been recognized with the award
Validated ID’s efforts to improve the doctor-patient relationship through the electronic signature service VIDsigner have been recognized with the award

See you at MWC2019 and 4YFN!

In this edition, we’d be presenting our services for electronic signature and digital identity. Latest developments among the worldwide leaders in innovation.
In this edition, we’d be presenting our services for electronic signature and digital identity. Latest developments among the worldwide leaders in innovation.

e-Signatures: product or service? Responsibility is the key

From a technical point of view, the difference between service and IT product could be summarised as cloud and on-premise software.
From a technical point of view, the difference between service and IT product could be summarised as cloud and on-premise software.

Different types of electronic signatures, breaking myths

Types of electronic signatures: biometric signature, remote signature and centralised signature; their legal status and correct name.
Types of electronic signatures: biometric signature, remote signature and centralised signature; their legal status and correct name.

Sign your documents from Dynamics 365 with VIDSigner

If you are a Microsoft Dynamics 365 user, from now on you can send PDF documents and sign them digitally thanks to the our VIDsigner connector
If you are a Microsoft Dynamics 365 user, from now on you can send PDF documents and sign them digitally thanks to the our VIDsigner connector

Validated ID wins the second edition of Cuatrecasas Acelera

Winner of the second edition of Cuatrecasas Acelera with the project VIDchain, a decentralized self-sovereign digital solution based on Blockchain.
Winner of the second edition of Cuatrecasas Acelera with the project VIDchain, a decentralized self-sovereign digital solution based on Blockchain.

GDPR capture of consent using Biometric and Advanced Signature

At Validated ID we offer a set of options to enable signing GDPR consent that range from the biometric signature for face to face scenarios to remote solutions
At Validated ID we offer a set of options to enable signing GDPR consent that range from the biometric signature for face to face scenarios to remote solutions

VIDchain, the future of digital identity

VIDchain's blockchain-based approach is based on aggregating different digital identity sources into a dentity wallet of identity attributes.
VIDchain's blockchain-based approach is based on aggregating different digital identity sources into a dentity wallet of identity attributes.

Sponsors at the IV Ibero-American Congress of Public Innovation

Validated ID sponsors the IV Ibero-American Congress of Public Innovation (NovaGob 2017) to be held between October 18th and 20th in La Laguna (Tenerife).
Validated ID sponsors the IV Ibero-American Congress of Public Innovation (NovaGob 2017) to be held between October 18th and 20th in La Laguna (Tenerife).

Awarded with an exhibitor place at Mobile World Congress Americas

We are selected by the Spanish Ministry of Energy, Tourism and Digital affairs to present our e-Signature and Digital Identity services internationally at MWCA
We are selected by the Spanish Ministry of Energy, Tourism and Digital affairs to present our e-Signature and Digital Identity services internationally at MWCA

New free service for mobile signature with the Spanish ID card

Validated ID develops new service to sign easily, safely and free with the new Spanish ID card, the DNI 3.0
Validated ID develops new service to sign easily, safely and free with the new Spanish ID card, the DNI 3.0

Validated ID now a member of BITKOM

The BITKOM membership brings us decisive advantages as an international supplier of electronic signature services and a digital identity verification solution
The BITKOM membership brings us decisive advantages as an international supplier of electronic signature services and a digital identity verification solution

Blockchers contest finalists, Validated ID and Factory Matters

Our project about the use of Blockchain in the education sector is now classified in the final of the European competition Blockchers
Our project about the use of Blockchain in the education sector is now classified in the final of the European competition Blockchers

New strategic partnership agreement with DocVisie

This collaboration has allowed DocVisie to develop an integration that facilitates and simplifies the signature processes, getting better control of documents
This collaboration has allowed DocVisie to develop an integration that facilitates and simplifies the signature processes, getting better control of documents

Strategic partnership agreement with Saqqara Informatic

This collaboration has allowed Saqqara Informatic to facilitate to its clients the signature of the documents managed from the ERP of Sage
This collaboration has allowed Saqqara Informatic to facilitate to its clients the signature of the documents managed from the ERP of Sage

Validated ID and m.Doc GmbH enter into a strategic partnership

Digital health document management becomes easy and secure thanks to digital signature integration that simplifies analogue signature processes.
Digital health document management becomes easy and secure thanks to digital signature integration that simplifies analogue signature processes.

Validated ID and DocuWare sign strategic cooperation agreement

DocuWare, provider of cloud-based solutions for document management and workflow automation, introduces new electronic signature service
DocuWare, provider of cloud-based solutions for document management and workflow automation, introduces new electronic signature service

Agreement with Gestiona Espúblico, electronic signature for Public Administration

This collaboration has enabled Gestiona esPublico's clients to simplify the signature processes at the Registry Assistance Offices.
This collaboration has enabled Gestiona esPublico's clients to simplify the signature processes at the Registry Assistance Offices.

More than 100 trees were planted for our partners

More than 3M documents were digitally signed this 2019. We are making a difference and we decided to plant 100 new trees, one for each partner to...
More than 3M documents were digitally signed this 2019. We are making a difference and we decided to plant 100 new trees, one for each partner to...

Validated ID has a new worldwide client: United VARs

This collaboration will help United VARs to digitally sign all the annual contracts among their 50 partners and over 90 countries.
This collaboration will help United VARs to digitally sign all the annual contracts among their 50 partners and over 90 countries.

Agreement with Meta4 to drive the digitization of HR

Thanks to this agreement, Validated ID becomes part of the "Meta4 HR Digital" portfolio of solutions aimed at providing innovative solutions
Thanks to this agreement, Validated ID becomes part of the "Meta4 HR Digital" portfolio of solutions aimed at providing innovative solutions

We works at EBSI for sovereign digital identity in Europe

The aim is to make Sovereign Identity part of the legal framework that enables the use of digital identity at European level.
The aim is to make Sovereign Identity part of the legal framework that enables the use of digital identity at European level.

Working from home with digital signatures

The integration of an electronic signature service allows your team and customers to sign and send documents conveniently from anywhere.
The integration of an electronic signature service allows your team and customers to sign and send documents conveniently from anywhere.

Free digital signatures VIDsigner, our commitment during COVID-19

We have created the VIDsigner freemium service to help people in a more agile and effective way, giving away unlimited signatures.
We have created the VIDsigner freemium service to help people in a more agile and effective way, giving away unlimited signatures.

SSI in the age of a global pandemic: Covid Credentials Initiative

At Validated ID we are developing privacy and data protection technologies through the Covid Credential Initiative.
At Validated ID we are developing privacy and data protection technologies through the Covid Credential Initiative.

We are accredited as eIDAS Qualified Trust Service Provider

Qualified Trust Service Provider reinforces the legal validity of VIDsigner's electronic signatures for the whole European Union territory.
Qualified Trust Service Provider reinforces the legal validity of VIDsigner's electronic signatures for the whole European Union territory.

VIDsigner electronic signatures integrated with Sage

Available for Sage X3, Sage Accounting, and Sage 200cloud. VIDsigner electronic signatures allow to send documents to be signed without leaving Sage.
Available for Sage X3, Sage Accounting, and Sage 200cloud. VIDsigner electronic signatures allow to send documents to be signed without leaving Sage.

Improve productivity with electronic signatures and SAP

The integration of VIDsigner e-signatures with SAP allows you to sign your documents within SuccessFactors, Business One, By Design, S/4HANA and ECC.
The integration of VIDsigner e-signatures with SAP allows you to sign your documents within SuccessFactors, Business One, By Design, S/4HANA and ECC.

Shorten sales cycles with e-signature in Salesforce

‍Thanks to the integration of VIDsigner's electronic signatures with Salesforce, you can obtain the signature of your documents from the same Salesforce ecosystem
‍Thanks to the integration of VIDsigner's electronic signatures with Salesforce, you can obtain the signature of your documents from the same Salesforce ecosystem

The tourism sector opts to use electronic signatures

Electronic signatures are the most efficient solution to the traditional operational problems of tourism companies
Electronic signatures are the most efficient solution to the traditional operational problems of tourism companies

Boosting companies potential using electronic signatures in Human Resources

Digital signature in Human Resources
Digital signature in Human Resources

Digital signatures, a fast track to digital transformation in the real estate sector

The latest real estate trend reports show how the pandemic has accelerated the use of technology and the implementation of trends such as teleworking and digitisation of processes. Find out how digital signatures are revolutionising the industry.
The latest real estate trend reports show how the pandemic has accelerated the use of technology and the implementation of trends such as teleworking and digitisation of processes. Find out how digital signatures are revolutionising the industry.

Improve the patient experience with electronic signatures

Electronic signatures are the perfect solution for compliance-based information processing.
Electronic signatures are the perfect solution for compliance-based information processing.

Electronic signatures for hospitality

Using e-signatures in hotels adds extra brand value, cuts costs and facilitates guest check-in.
Using e-signatures in hotels adds extra brand value, cuts costs and facilitates guest check-in.

The importance of the legal evidence in electronic signatures

A court in California has ruled a document signed by a large eSignature company inadmissible. Validated ID collects evidence so that this doesn't happen.
A court in California has ruled a document signed by a large eSignature company inadmissible. Validated ID collects evidence so that this doesn't happen.

The digital transformation of the education sector

The electronic signature improves the experience in education for students, teachers, parents, guardians and other school staff.
The electronic signature improves the experience in education for students, teachers, parents, guardians and other school staff.

Electronic signatures with DocuWare

With the advent of remote work, we need a better way to manage documents. We propose the Docuware platform integrated with VIDsigner.
With the advent of remote work, we need a better way to manage documents. We propose the Docuware platform integrated with VIDsigner.

Coinfirm

WEF’s Digital Currency Governance Consortium White Paper Series

The World Economic Forum’s (WEF) Digital Currency Governance Consortium (DCGC) has released a series of 8 whitepapers on Friday that takes a look at the regulatory landscape, future options and privacy concerns for national governments. The 8 whitepapers are as follows and can be downloaded below; The Role of the Public Sector and Public-Private Cooperation...
The World Economic Forum’s (WEF) Digital Currency Governance Consortium (DCGC) has released a series of 8 whitepapers on Friday that takes a look at the regulatory landscape, future options and privacy concerns for national governments. The 8 whitepapers are as follows and can be downloaded below; The Role of the Public Sector and Public-Private Cooperation...

Ontology

Ontology Weekly Report (November 16–22, 2021)

Highlights The Ontology global community is constantly growing, with membership now close to 110,000. More and more Ontology contributors are working together for the long-term, healthy development of Ontology projects. This week, another Ontology member from the English community became an Ontology Harbinger. We currently have 14 enthusiastic Ontology Harbingers, who come from all over the world
Highlights

The Ontology global community is constantly growing, with membership now close to 110,000. More and more Ontology contributors are working together for the long-term, healthy development of Ontology projects. This week, another Ontology member from the English community became an Ontology Harbinger. We currently have 14 enthusiastic Ontology Harbingers, who come from all over the world and work in different fields. They are active in different language communities of Ontology, including English, Filipino, Hindi, etc. They share their ideas, organize various community activities, and are committed to building a better Ontology ecosystem.

Latest Developments Development Progress We have completed the launch of Ontology’s EVM TestNet and are 93% finished with testing. At the same time, a large number of community developers are actively participating in the “Security Vulnerabilities and Threat Intelligence Bounty Program”, launched by Ontology and SlowMist. We have finalized Ethereum RPC support and have fully completed internal testing. The TestNet has been synchronized online; we are 93% done with testing. We have completed 100% of Ontology’s Ethereum account system development and the TestNet has been synchronized online; we are 94% done with testing. The EVM/OEP-4 asset seamless transfer technical solution, which facilitates the efficient conversion between OEP-4 assets and EVM assets, is complete and the TestNet has been synchronized online; we are 95% done with testing. We are 100% done with the survey on the improvement of the decimals of ONT and ONG and we are in the process of internal testing. The ontology-go-sdk and ontology-java-sdk support ONT and ONG decimals updates. We are 10% done with the survey on the RISCV’s simplified instruction set architecture. Product Development ONTO App v4.1.1 was released, adding support for the Harmony Chain, wallet switching function for dApps supporting multiple chains, and support for configuration of token unit. ONTO hosted a campaign with BabySwap, the first 100 participants, and top 20 participants who stake the most will receive the highest tier of rewards. Voting for ONTO in BabySwap also has a chance to get extra rewards. The event is in progress, and will end at 07:59 (Singapore time) on November 27th. ONTO hosted a campaign with MCDEX, the first 300 participants will receive rich rewards. The event is in progress, and will end at 17:00 (Singapore time) on November 26th. ONTO hosted a campaign with OCP Finance, the first 150 participants, and top 20 participants who stake the most will receive the highest tier of rewards. Participants who meet certain conditions will have the chance to enter a lottery. The event is in progress, and will end at 17:00 (Singapore time) on November 24th. On-Chain Activity 121 total dApps on MainNet as of November 22th, 2021. 6,823,269 total dApp-related transactions on MainNet, an increase of 6,162 from last week. 16,733,530 total transactions on MainNet, an increase of 26,331 from last week. Community Growth 1,295 new members joined our global community this week, and Geoff Richards from the English community officially became a Ontology Harbinger. This excellent community member will bring more new energy to our community, and also welcome more new members to join us. Ontology published the next couple of interviews in its Harbinger Series. Geoff Richards from our English community said that compared with other blockchain communities, members of the Ontology community are more willing to help people by sharing their own experiences. The community also attaches great importance to the voice of each member, and can listen to their problems, suggestions and various solutions in time. We held our weekly Discord Community Call, led by Humpty Calderon, our Head of Community. He focused on how decentralized identity empowers the metaverse; The metaverse requires the unity and integrity of our identities. Ontology’s decentralized identity solution can be seamlessly integrated into metaverse games to generate a unified identity based on the user’s behavior, which is convenient for users to use in various games. We held our Telegram weekly Community Call, led by Benny, an Ontology Harbinger from our Asian community. He discussed with community members about Ontology’s Staking strategy and upcoming 4th anniversary NFT event; Community members expressed their great anticipation for this extraordinary commemorative event. As always, we’re active on Twitter and Telegram where you can keep up with our latest developments and community updates. Ontology in the Media

Forbes — Crypto Is The Key To The Metaverse

The promise of the metaverse is that it will provide users an augmented reality experience that — in many ways — might exceed physical reality in terms of the experiences and opportunities therein. What is oftentimes missing from the discussions around the potential of the metaverse is how all of this information will be secured and protected. Specifically, if an individual or group of individuals are going to be engaging with other people in a virtual environment there needs to be some form of assurance that these transactions are secure.
Hacks and data breaches occur on a frequent basis, but if people are going to be expected to engage in a wholly online and virtual environment, the underlying platform on which they are going to be using needs to be secure.

After long-term practice, the Ontology Decentralized Identity (DID) solution has been proven to be able to achieve strong privacy protection, and can seamlessly integrate various applications and platforms. This means that applications in the field of Metaverse can make up for their own deficiencies in privacy protection by integrating Ontology DID solutions, and attract more users to join them.

Want more Ontology?

Learn more about our decentralized data and identity solutions on our website and official Twitter account. You can also chat with us on Telegram and keep up-to-date with the latest news via our Telegram Announcement account.

Ontology Weekly Report (November 16–22, 2021) was originally published in OntologyNetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.

Tuesday, 23. November 2021

Identosphere Identity Highlights

Identosphere #59 • Spruce raised $7.5m • Web3 Mental Models • Social Media Architecture

A weekly review of the latest news and events related to the ecosystem and developments surrounding self sovereign identity technologies.
Consider paying us a small amount each month via Patreon

Read previous issues and Subscribe : newsletter.identosphere.net

Contact \ Content Submissions: newsletter [at] identosphere [dot] net

COMING UP

Unlocking Safe Travels Beyond COVID with Digital Credentials • 11/25 Affinidi

Self-Sovereign Identities in Productive Systems - A Reality Check (11\25)

The Frankfurt School Blockchain Center will host a panel discussion together with d-fine on self-sovereign identity (SSI).

Driving Inclusion with Trusted Digital Ecosystems • 11/30 Indicio Meetup

COVID Health Credentials for International Travel Summits (by LFPH and Affinidi) • 12/1-2 CCI Newsletter [APAC and EU friendly times] - Kaliya will be there hosting

European Blockchain Convention Virtual • 12/13

Data Space Launchpad MyData (Until 2/22)

Customer Service / Service NSW EOI - Digital Identity and Verifiable Credentials - DICT/8027 Tenders (Closes 12/14)

This EOI invite’s expressions of interest for the provision of customer digital identity and verifiable credential capabilities to the Principal, for the purposes of credential validation and securely sharing identity across a variety of services

Explainer Self-Sovereign Identity: The Ultimate Beginners Guide! 101 Blockchains

Apart from addressing the pitfalls in conventional identity management systems, SSI allows better functionalities for all users. With a wide range of benefits and the self-sovereign identity blockchain applications, it is important to take a step towards adopting SSI solutions.

Zero Knowledge Proofs Phil Windley

This problem was first explored by MIT researchers Shafi Goldwasser, Silvio Micali and Charles Rackoff in the 1980s as a way of combatting information leakage. The goal is to reduce the amount of extra information the verifier, Victor, can learn about the prover, Peggy.

Understanding the SSI Identity Model with Verifiable Credentials Manning  Badges and Credentials – A new currency for the digital world? Speexx Exchange

Listen to this episode for an entertaining deep dive into the topic of badges and credentials, as Donald Taylor sits down with Dr. Doug Belshaw to discuss the importance, various fields of application

SSI Essentials: What are Decentralized Identifiers (DIDs) & Verifiable Credentials (VCs)? Gataca

The public keys of the user and the third-party organization for verifying the digital signature are recorded in a distributed ledger, and the user of the identity information verifies the provided information using them

Beyond The Device With Self-Sovereign Identities Forbes

In 2021, the average cost of a data breach reached an all-time high of $4.24 million, even though businesses are already spending millions more to combat financial crime and meet their regulatory and compliance responsibilities.

Evolution of Self-Sovereign Identity (SSI) Lionsgate

Very few people trust the intent or purpose for collecting data because they don’t trust the people mandating the collection. However, the pandemic caused the necessity of better digital identification systems, and almost like it had been planned all along, it’s now impossible to travel without Self-sovereign Identity.

OLDIE but GOODIE Self-sovereign identity: Why blockchain? Dan Gisolfi, IBM

blockchain provides a transparent, immutable, reliable and auditable way to address the seamless and secure exchange of cryptographic keys. To better understand this position, let us explore some foundational concepts.

Company News The SSI Kit Walt ID

The SSI Kit bundles three components, one for each functionality profile:

Signatory ™ for Issuers enables organisations to transform any identity-related information into digital credentials in order to replace paper documents and automate data provision to stakeholders.

Custodian ™ for Holders enables individuals and organisations to securely store, manage and share keys and identity data via data hubs (“wallets”). (Web-Based wallet)

Auditor ™ for Verifiers enables organisations to verify identity data in order to authenticate or identify stakeholders and offer frictionless access to services or products. 

Self-Sovereign Identities (SSI) – user-focused concept for data-efficient identity management Bosch

Since offering users control and sovereignty over their own data is a highly desirable goal, we are working with innovation partners to establish an identity system that works without any central data collector and is operated equally by many participants

Spruce sets the bar for sovereign identity storage options, secures $7.5M

Spruce, a service that allows users to control their data across the web, has raised $7.5 million. The company builds open source, open standard developer tools helping users collect and control their data across the web. It helps prevent NFT frauds and defines access rules for decentralized finance pools and decentralized autonomous organizations (DAOs).

Hyland, Dataswift and Case Western Reserve University partner to advance web-based verifiable credential storage Hyland Credentials

The initial phase of the partnership involved building a web-based interface that enables users to easily store and manage their verifiable credentials by uploading them to a user-owned, encrypted personal data account (PDA), an innovative privacy-preserving solution developed by Dataswift, another strategic partner of xLab.

ID-Ideal as an integrated solution Jolocom

The starting point is the fact that every user has 70 digital identities online. Why not introduce one single secure digital ID solution to merge all of those identities? ID-Ideal is one way of many, offering an integrated solution or a middle way so that many identities can be supplemented by a single, secure digital ID solution.

Organization The Digital Identity Card TI8M

Currently, over 40 applications have been implemented in the IDunion project. These are used in a wide variety of sectors, such as public administration, the financial sector, IoT and industry, the healthcare sector, mobility sector and e-commerce.

Public Sector Your digital identity and credentials New South Wales

Help us make it easier for you to do things like open a bank account, buy a phone, start a new job, prove your age or enrol to study.

Logging Off Facebook: What comes Next?  Social Media Architectures and Their Consequences reb00ted Web3 Metaverses are coming, but who owns your avatar? Disruptive Asia

When you create your metaverse avatar, who owns it? Is it yours, or does the platform own it? This question is very fundamental for the future of digital services and human rights.

Why Microsoft may beat Zuckerberg to the metaverse VentureBeat

Although Meta currently leads in the provision of virtual reality (VR) devices (through its ownership of what was previously called Oculus), Microsoft is adapting technologies that are currently more widely used. 

5 Mental Models for Web3 Bankless Chris Dixon

Web3 has begun to impact all corners of digital culture, from media to finance, art and gaming, and even identity. Mental models allow for digestible thinking patterns to understand and predict the world, and Chris lays out how these new digital primitives are changing everything. 

Decentralization may be key to protecting our digital identities VentureBeat

introducing decentralization, there is an opportunity for dApp developers to uphold strong, secure data privacy protections for users across the board.  By offering strong privacy defaults and more user-centric options, decentralized data solutions will enable individuals to make informed decisions about their data. 

MyData 22 Companies and Organizations Receive the MyData Operator 2021 Award MyData

To show their commitment to ethical personal data management, participating organisations are required to disclose information about their operations. The MyData Operator Award shows that ethical alternatives exist and provide value for companies and users alike. 

Co-managing My Data JLinc

This post sets out a vision for what could become a sustainable set of human-centric processes around the sourcing, management and use of personal data. Our context for doing so is that the current model for personal data management on The Internet is badly broken and has architectural limitations that are largely un-resolvable.

Most People Feel Negatively About Location Tracking in Websites and Apps Me2Ba.org

The Spotlight Report, “Consumer Sensitivity to Location Tracking by Websites and Mobile Apps”, was developed to validate the Location Commitment scoring criteria in the Me2B Alliance Safe & Respectful Technology Specification.

Me2B Alliance Validation Research: Consumer Sensitivity to Location Tracking by Websites and Mobile Apps

At the core of our work is our Respectful Technology Specification4, currently in development, which provides an objective standard for measuring safe and ethical technology behavior.

COVID COVID & Travel Resources for Phocuswright IdentityWoman.net

the travel industry is working hard to catch up on their technology to meet the evolving travel requirements. However, there is still no shortage of complaints from travelers about their cumbersome international travel experiences. 

Digital identity is critical in the new world since covid DigitalID NZ

Their recent survey found 85 percent of respondents said there was a lack of transparency, as well as concern in having to share data with so many organisations.

COVID-19 as a Catalyst for the Advancement of Digital Identity Perkins Cole

our goal is to address some of the legal considerations that health certificates raise with respect to, and in the context of, the development of a comprehensive system of digital identity management.

What is happening in the world? Singapore’s tech-utopia dream is turning into a surveillance state nightmare RestofWorld

“What [technology] will do for people is make our lives a hell of a lot easier, more convenient, more easily able to plug into the good life,” said Monamie Bhadra Haines, […] “But … the surveillance is what is here, now.”

Standards Working Group for Privacy Enhancing Mobile Credentials Kantara Initiative

Clearly the use of a driver’s license goes well beyond proving eligibility to drive a vehicle. It has become the de-facto standard for proving that you are who you say you are – and are entitled to the product or service requested

Discover Open Badges 3.0! Keep Badges Weird

Check out the (accepted) Open Badges 3.0 proposal

Watch a video from the ePIC conference giving an overview of what Open Badges 3.0 will enable (or view the slide deck)

Discuss what this means for you, your organisation, or your community in this thread

Use Case Verifiable Credentials are Coming to Card Payment Rails Indicio

Liquid Avatar Technologies’ PassmateTM shows how decentralized identity will transform the world: by easily integrating into systems that already exist. The soon-to-be-launched Software as a Service — conceived by Liquid Avatar’s David Lucatch, enables verifiable credentials to run on existing payment rails.

CONNECTED IMPACT Unlocking Education and Workforce Opportunity Through Blockchain ACE

intended to inform policymakers, technology developers, education practitioners, and workforce entities about the state of and potential of interoperable digital credentials anchored on blockchains. This report also provides guidance to these stakeholders on the effective implementation of blockchain-based digital credentials infrastructure.

Development The Journey of an SSI Developer Affinidi Webinar Recap Is Self-Sovereign Identity Going Exponential? Sybrin

Together with Andrew Baker, Head of EC2 Engineering at AWS, and Lohan Spies, Chair of the Sovrin Steward Council, they explore the concept of Self-Sovereign Identity (SSI) in detail, discussing what profound implications SSI will have and whether it is indeed the next game changer?

Identity Not SSI How to Choose the Right Single Sign-On (SSO) Solution for your Enterprise Ping The business of Privacy is Booming

Investors and consumers show growing enthusiasm for privacy-focused alternatives to Google and Facebook amid renewed scrutiny over the real cost of their "free" services.

The Rising Consumer Demand for Data Privacy and Autonomy Sequoia

Increased supply of user-friendly private tech and increased demand for privacy have converged, creating a moment of unprecedented opportunity for founders with a vision for privacy-first online experiences.

Honouring Te Tiriti in our work DigitalNZ

We understand that our responsibility to guide conversations and decisions relating to digital identity means that we must acknowledge and understand Māori perspectives of identity. […] Draft Statement of Intent; Te Tiriti o Waitangi at DINZ

Thanks for Reading!

Read more \ Subscribe: newsletter.identosphere.net

Support this publication: patreon.com/identosphere

Contact \ Submission: newsletter [at] identosphere [dot] net


KuppingerCole

How to create decentralized trust around decentralized applications

It is no surprise that decentralization is key player in blockchain's role in disrupting every industry requiring trust. But how to do create trust around decentralised solutions? Creating 'Decentralised Trust' is how we solve this. Through Decentralised Name Systems, Decentralised Certificates, Decentralised Bots and more can we enable decentralised trust around decentralised solutions. Such solu

It is no surprise that decentralization is key player in blockchain's role in disrupting every industry requiring trust. But how to do create trust around decentralised solutions? Creating 'Decentralised Trust' is how we solve this. Through Decentralised Name Systems, Decentralised Certificates, Decentralised Bots and more can we enable decentralised trust around decentralised solutions. Such solutions are key in embracing a truly digital society where this 'trustlessness' is key in the greater security, efficiency and trust of the public sector and all industries requiring trust.




Digital Identity Wallets – How To Evolve SSI To Meet eIDAS 2.0 Regulations

The presentation will give context on the EU commission announcement of European Digital Wallets and explains what eIDAS 2.0 defines for member states when it comes to digital identities. SSI can be a potential solution, but currently does not meet the eIDAS 2.0 regulation fully. We will explain why and give an idea on how to evolve SSI and create an ecosystem that is compliant with eIDAS 2.0.

The presentation will give context on the EU commission announcement of European Digital Wallets and explains what eIDAS 2.0 defines for member states when it comes to digital identities. SSI can be a potential solution, but currently does not meet the eIDAS 2.0 regulation fully. We will explain why and give an idea on how to evolve SSI and create an ecosystem that is compliant with eIDAS 2.0.




Expert Chat | Interview with Kay Chopard




Identity Management Protocols




Verification as Fraud Prevention

Cybercrime, often driven by fraud, continues to plague organizations leading to data breaches and loss of revenue. Account takeovers and account opening fraud contribute to this. But as organizations transition to heavier dependence on digital identities, how do we deal with the rising and changing stakes? In this session, Anne Bailey will discuss the intersection of digital identity a

Cybercrime, often driven by fraud, continues to plague organizations leading to data breaches and loss of revenue. Account takeovers and account opening fraud contribute to this. But as organizations transition to heavier dependence on digital identities, how do we deal with the rising and changing stakes?

In this session, Anne Bailey will discuss the intersection of digital identity and fraud prevention: identity verification. Listen in to hear how identity verification can be integrated into digital identity management as a preventative measure against fraud.




Engineering Successful IAM Projects to Support Digital Business

In the digital era, traditional approaches to Identity and Access Management (IAM) are ineffective. IAM is no longer just about managing employee identities, but about managing all kinds of identities across a wide variety of use cases. This requires a comprehensive and agile approach.

In the digital era, traditional approaches to Identity and Access Management (IAM) are ineffective. IAM is no longer just about managing employee identities, but about managing all kinds of identities across a wide variety of use cases. This requires a comprehensive and agile approach.




IBM Blockchain

Crowding into stores and malls for Black Friday is now a ghost of Christmas past

Vaccinations have been rolled out, lockdowns have been lifted, and workers are returning to offices, but 2021 is starting to feel like 2020 all over again, bah humbug! There is reason to be concerned when consumers are seeing fewer options in the grocery aisles, local shops are closing earlier due to labor shortages, and a […] The post Crowding into stores and malls for Black Friday is now a gho

Vaccinations have been rolled out, lockdowns have been lifted, and workers are returning to offices, but 2021 is starting to feel like 2020 all over again, bah humbug! There is reason to be concerned when consumers are seeing fewer options in the grocery aisles, local shops are closing earlier due to labor shortages, and a […]

The post Crowding into stores and malls for Black Friday is now a ghost of Christmas past appeared first on IBM Supply Chain and Blockchain Blog.


auth0

State Management in Angular Using NgRx: Pt. 2

See how it's easy to manage your Angular application's state using NgRx and learn how you can use NgRx with Auth0's SDK to handle user-related functionalities.
See how it's easy to manage your Angular application's state using NgRx and learn how you can use NgRx with Auth0's SDK to handle user-related functionalities.

State Management in Angular Using NgRx: Pt. 1

See how it's easy to manage your Angular application's state using NgRx and learn how you can use NgRx with Auth0's SDK to handle user-related functionalities.
See how it's easy to manage your Angular application's state using NgRx and learn how you can use NgRx with Auth0's SDK to handle user-related functionalities.

IDnow

IDnow reveals first UK channel partner

Sphonic partners with identity verification platform to offer complete suite of regulatory technology for multi-jurisdicational compliance London and Manchester, November 23, 2021: Leading Platform-as-a-Service provider for identity verification, IDnow, has announced its first UK channel partner, Sphonic. The partnership will enable Sphonic to offer a suite of RegTech that meets different global co
Sphonic partners with identity verification platform to offer complete suite of regulatory technology for multi-jurisdicational compliance

London and Manchester, November 23, 2021: Leading Platform-as-a-Service provider for identity verification, IDnow, has announced its first UK channel partner, Sphonic. The partnership will enable Sphonic to offer a suite of RegTech that meets different global compliance standards via a single API.

The partnership comes at a pivotal time for the industry; according to Gartner’s Market Guide for Identity Proofing and Affirmation, by 2023, 75% of organisations will be using a single vendor with strong identity orchestration capabilities and connections to many other third parties for identity proofing and affirmation, an increase from fewer than 15% currently.

“Given the importance placed on orchestration technology in the overall area of compliance, and the regulatory requirements that continue to drive the agenda when it comes to identity and fraud, it was vital we partnered with an identity verification provider that could vigorously meet the varying obligations that exist right across Europe,” explains Andy Lee, Founder of Sphonic.

“By partnering with IDnow, we are able to offer an ever-more integrated solution that brings all identity profiles into one place for more intelligent identity scoring. And when combined with its enviable relationships with European regulators, IDnow was the ideal choice as we continue to deliver great customer experiences to the highest standards of regulatory compliance.”

Known for its pioneering Know Your Customer (KYC) / Know Your Business (KYB) orchestration technology, Sphonic recently launched its real-time Transactional Monitoring System, which allows fintechs, banks and gaming operators to monitor fraud, Anti-Money Laundering (AML) and affordability data in a single integrated platform. Its suite of RegTech, including KYC, KYB and Fraud and Risk Management also helps compliance teams to build a complete digital picture of each customer in order to fast-track customer onboarding.

James Hudson-Dale, Partnerships Manager at IDnow, adds: “Anti-impersonation and identity fraud is on a worrying upward trend, making it more important than ever for businesses to ensure they are compliant beyond simply box ticking. Our leading identity verification technology will provide Sphonic customers with the option of imposing additional verification methods to ensure the threshold is high quality and the person is who they say they are.

“As our first channel partner, we’re excited to be working with Sphonic to build a truly unique suite of products, that will bring together multiple data sources to ensure clients can accurately verify identities, combat fraud and meet European-wide regulatory requirements while maintaining flexibility of choice.”

IDnow launched into the UK in 2019 and recently announced eightfold year-on-year growth in the region, with demand for its services rising significantly as industries accelerated digitisation in response to the Covid pandemic. This growth is aligned with the global demand the firm is experiencing, with more and more companies around the world deciding to switch to fully digital application processes.

As part of its high-growth strategy, IDnow has expanded its role far beyond offering specific identity verification products and has become recognised as an overarching platform for digital identities with several million transactions per year, used by over 900 customers worldwide, including Canopy, MyCDD, Entain and ICICI.


Global ID

GiD Report#187 — What is a DAO and why does it matter?

GiD Report#187 — What is a DAO and why does it matter? Welcome to The GiD Report, a weekly newsletter that covers GlobaliD team and partner news, market perspectives, and industry analysis. Check out last week’s report here. ICYMI: EPISODE 13 — DeFi and Identity: Compliance in a decentralized world This week: What is a DAO and why does it matter? Tweet of the week — web2 
GiD Report#187 — What is a DAO and why does it matter?

Welcome to The GiD Report, a weekly newsletter that covers GlobaliD team and partner news, market perspectives, and industry analysis. Check out last week’s report here.

ICYMI: EPISODE 13 — DeFi and Identity: Compliance in a decentralized world

This week:

What is a DAO and why does it matter? Tweet of the week — web2 edition Regulating stablecoins Stuff happens 1. What is a DAO and why does it matter?

Last week, we talked about web3 — what it is and how it’s different from web1 and web2 (with a little help from Chris Dixon).

This week, we’re talking about DAOs and why they might be crucial to the development of web3. DAO stands for decentralized autonomous organization. Really, it’s just another framework for running and managing an organization — powered by tools for governance, collective wallets, and identity.

I remember people talking about the concept as early as 2013 (although the conversation probably started even before then). Mike Hearn was sort of the smart contracts guru back then and one of the leading voices on the subject — here’s a talk he gave at the Turing Festival that year.

A DAO owning a copy of the U.S. Constitution? Why not. (Besides Ken Griffin.)

Fast forward 8 years and what was once a concept is now a reality. DAOs are a thing now — like this organization that recently made headlines for raising money and attempting to buy a copy of the American Constitution.

One of the central features of web2 is corporation controlled, closed and proprietary networks — maybe not so different from the early days of the internet when you logged onto AOL or Compuserve.

There’s nothing inherently wrong with a public corporation that reports to shareholders. It’s been a wildly successful framework ever since it was developed by the Dutch, underpinning our modern financial system.

But there might be an inherent conflict when it comes to data and profit hungry corporations running our networks. Chris Dixon has been on a tear lately when it comes to talking about the next chapter of the internet so I’ll let him take it from here:

My conclusion after observing and participating in this over roughly 20 years is that it’s not a problem with the people but a problem with the model. The core issue is there is a fundamental misalignment between the needs of a corporation and the needs of a network. Corporate-owned networks follow a predictable life cycle. When they start out, they try to attract users and 3rd-party complements like software developers and creative people. As they grow in popularity and move up the adoption S-curve, their power over users and 3rd parties steadily grows.
When they hit the top of the S-curve, their relationships with network participants change from positive-sum to zero-sum. The easiest way to continue growing involves extracting money and data from users and complements. The most famous historical examples of this are Microsoft vs. Netscape, Google vs. Yelp, Facebook vs. Zynga, and Twitter vs. its 3rd-party clients, but it happens at a smaller scale everyday, with almost every company that operates a network. (I wrote an essay a few years ago that goes into more detail on the topic).
A company can try to resist this logic but it’s extremely difficult. The reality is that if your goal is to optimize revenue to the company, shutting down APIs, algorithmically manipulating users, harvesting personal information for better ad targeting, reducing revenue shares, and all the things people don’t like about internet companies is the optimal strategy. If you don’t behave this way, your competitors will, and they’ll make more money, the stock market will reward them with a higher market cap, they’ll attract the best talent, will reinvest more money back into the product and datacenters and marketing and so forth, and they’ll win.

Which leads us to DAOs:

The word DAO is probably overloaded at this point, but in short refers to a new kind of organization that uses blockchains in the way I alluded to above. In some loose sense open source software projects ranging from Linux to Ethereum are DAOs. They make decisions about software and network upgrades via roaming groups of users and developers on various websites discussing and arguing over things. It’s chaotic but mostly works. These systems use “off-chain” governance in which network participants “vote” by deciding whether and how to upgrade the software they are running.

DeFi is a hot topic here at GlobaliD and Hard Yaka. It also happens that many DeFi projects are already formed as DAOs. Here’s Dixon again:

A few years ago, people started asking whether these governance systems could be improved by using “on-chain” governance, which basically means giving network participants a more formal way to vote using tokens. Probably the first and most important on-chain DAO is called MakerDAO. MakerDAO is a complex system for generating what are known as stablecoins (it’s a fascinating system — here’s the whitepaper that describes it). I won’t go into the details but the key idea is the system has a governance token which lets the holders propose and vote on decisions including system upgrades. Maker has weekly community calls and a rotating group of core members who do the heavy lifting. It has generally worked quite well both as a product and as a community. Maker’s model has become the standard in an area known as decentralized finance (DeFi). Uniswap, Compound, and Aave are other examples of popular protocols that employ that DAO model. In my view this experiment has been a success so far, although it’s still very early.

Dixon also discusses the domain name system (DNS) — an inspiration for the GlobaliD namespace — as another DAO opportunity. (Apparently, the company that manages dot org domains was almost bought out by a private equity firm.)

The central point here for Dixon is that DAOs address that central conflict between corporations and networks:

The other appealing thing about DAOs — and what makes them superior to the web2 model I discussed above — is they remove the misalignment between the company and the network by eliminating the company altogether and shifting the economic and governance rights to the network. (For tax purposes there will likely need to be legal entities, at least in the US, but these will have a limited, administrative role). A properly constructed DAO does this by memorializing the rules around economics and governance from the very start, using smart contracts on blockchains like Ethereum. As the networks grow, and move up the adoption S-curve, they might be drawn toward consolidating power but they’ll be prevented from doing so by the blockchain-enforced rules. We like to say instead of “don’t be evil” it’s “can’t be evil.” Instead of relying on human nature improving, we are baking the rules into the code.

For Chris, “web3 generally and DAOs more specifically can help course correct the internet back to its original, idealistic vision: power and money pushed to the edges, networks growing and flourishing together, a level playing field for talent anywhere in the world, a thriving creative middle class, and a generally diverse and interesting place.”

That’s the next chapter and we’re right at the start.

Check out the full conversation. Check out part1 of the series — Is The Blockchain Delivering On The Promise of Web3?

Relevant:

“Let’s Run The Experiment”: A conversation with Chris Dixon about DAOs and the future of organizations online Twitter Forms Team to Shape the Future of Decentralized Social Media — Blockworks Will the craze for crypto startups ever produce the next tech giant? The Metaverse Is Coming. What Happens Next? Turing-Complete Governance — Mirror ConstitutionDAO Raises $27M on Eve of Sotheby’s Auction. $PEOPLE Could Be the Reason 2. Tweet of the week — web2 edition

Matt Huang:

3. Regulating stablecoins

Crafting smart regulations is hard. Trying to apply traditional models to new disruptive frameworks is even harder. We know that the powers that be want to regulate stablecoins. Anyone who has ever read anything about Tether and how it operates probably understands why that might be necessary.

But again, crafting smart regulations is hard.

Matt Levine has a good overview of the current situation:

But here is a memo from Davis Polk & Wardwell LLP that points out something even stranger: Under the proposed rules, it would be impossible to do stablecoins the good simple way. If you wanted to set up a stablecoin under these proposed rules, you’d need to do it in a bank. So you set up Stablecoin Bank Corp. You issue $1 billion of stablecoins and invest the money in $1 billion of extremely safe stuff, Treasury bills expiring tomorrow or whatever. And then the banking regulators would come to you and say: No, this doesn’t work, if you have $1 billion of Treasuries you need $40 million of equity; that is a central rule of bank capital regulation, that you need equity alongside your deposits. And then as you issue more stablecoins you have to raise more equity, and it is hard to get a decent return on equity if you’re investing in only the very safest things. 7 So you are forced to reach for yield, to buy riskier things with higher yields in order to make a return on equity — you know, like banks do.

Relevant:

U.S. regulators speak on stablecoin and crypto regulation Let Crypto Regulate Itself President Biden Signs Infrastructure Bill Containing Crypto Broker Reporting Requirement Into Law India to Ban Crypto as Payment Method but Regulate as Asset: Report The SEC Crackdown on DeFi is Imminent Stablecoins, Stability, and Financial Inclusion — Future Biden’s top bank regulator nomination at risk after tense hearing China catches fraudsters using central bank digital currency for money laundering — Ledger Insights — enterprise blockchain WSJ News Exclusive | Business Group Challenges Lina Khan’s Agenda at Federal Trade Commission 4. Stuff happens Coinbase Reports Q3 Net Revenue Dropped 39% to $1.234B — Blockworks The ‘Solana Summer’ Never Ends — Blockworks Coinbase is looking at support for third-party DeFi apps on its platform, says CFO Valkyrie to Launch $100M DeFi-focused Hedge Fund — Blockworks Apple is sticking taxpayers with part of the bill for rollout of tech giant’s digital ID card Twilight of China’s super app era as WeChat Pay cooperates with state-backed banks — Verdict The delicate balance of getting a big crypto airdrop right Solana NFT Projects Cancel Holder Royalties After FTX US Launch — Decrypt 91 — CEO Brian Armstrong and The Future of Coinbase Taking a closer look at cryptocurrency | Penn Today TIME Magazine to Hold ETH on Balance Sheet as Part of Galaxy Digital Metaverse Deal NFT makers are trying to build the next Disney NFL and Ticketmaster Launch Ticket Stub NFTs on Polygon — Decrypt NFT Marketplace OpenSea Offered $10 Billion Valuation WSJ News Exclusive | Instagram’s Effects on Children Are Being Investigated by Coalition of States MetaMask Surpasses 21 Million MAUs as ConsenSys Raises $200 Million to Make Web3 Universally Easy to Use, Access, and Build On | ConsenSys Paradigm Breaks Records With a $2.5 Billion Crypto Fund The Crypto Company Behind the Renaming of the Los Angeles Staples Center

GiD Report#187 — What is a DAO and why does it matter? was originally published in GlobaliD on Medium, where people are continuing the conversation by highlighting and responding to this story.


Ontology

Ontology Partners with Decentralized Mobility Platform bloXmove To Bring Interoperable…

Ontology Partners with Decentralized Mobility Platform bloXmove To Bring Interoperable Decentralized Identity To Urban Transport Apps bloXmove will integrate Ontology’s decentralized identity protocol to help make the urban transport app industry easier to use, more private, and more secure Ontology, the project bringing trust, privacy, and security to Web3 through decentralized identity an
Ontology Partners with Decentralized Mobility Platform bloXmove To Bring Interoperable Decentralized Identity To Urban Transport Apps

bloXmove will integrate Ontology’s decentralized identity protocol to help make the urban transport app industry easier to use, more private, and more secure

Ontology, the project bringing trust, privacy, and security to Web3 through decentralized identity and data solutions, has announced a partnership with bloXmove, a business-to-business mobility blockchain platform designed to simplify travel across multiple forms of transportation by connecting mobility apps and reducing the need for users to switch between them.

The rapid increase in the digitization of transport and emergence of digital mobility apps enabling individuals to avail of cars, scooters, bikes, flight and train tickets, and more has resulted in a fragmented infrastructure that requires users to sign-up to various applications over and over again. This has led to a proliferation of data exchange, as users are increasingly required to hand over sensitive data.

Addressing these problems, this partnership will see bloXmove integrate Ontology’s decentralized digital identity protocol (DID) into its platform, providing users with a decentralized identifier that will allow them to share their verifiable credentials, such as driving licenses, in a way that is totally private, secure and encrypted. It will also allow them to store a host of identifiers securely in one place, enabling reuse of the same identifier for multiple modes of transport, whilst remaining assured that their private information is safe.

Li Jun, Founder of Ontology said: “The fragmentation of the urban transport industry means there is a great need to fortify user security and data through decentralized technologies. bloXmove is doing amazing work to streamline the user journey and now, by integrating Ontology’s DID and data solutions, the whole ecosystem will be made easier to navigate, more private, and more secure. Following on from our previous partnership with bloXmove incubator and Mercedes parent Daimler Mobility to develop Welcome Home, we are proud to be continuing to bring tangible use cases for blockchain and decentralized identity to the transport industry. We look forward to supporting bloXmove in creating the biggest global mobility alliance connecting bikes, scooters, car-sharing, trains and more.”

With bloXmove, settlements can be automated and secured via BLXM, the bloXmove token. Ontology will support token generation for bloXmove, whose access token smart contracts will be deployed on the Ontology chain. In addition, by leveraging Ontology’s blockchain technology, bloXmove will also achieve interoperability with other public blockchains while improving efficiency and lowering costs.

Dr. Harry Behrens, CTO and Co-Founder of bloXmove, said, “We are honored to partner with Ontology to combine bloXmove Mobility Blockchain Platform with their state-of-the-art DID Technology. Decentralized Identifiers (DID) are the crucial addition to Blockchain to create real-world business applications. This collaboration will bring us to the next level of mobility service roaming and decentralization. Easy access to mobility should not mean a compromise on privacy and data security for our users, which is why we have partnered with Ontology to strengthen our offering and provide our users with new, even more secure ways to share their information when using mobility apps.”

Want more Ontology?

Learn more about our decentralized data and identity solutions on our website and official Twitter account. You can also chat with us on Telegram and keep up-to-date with the latest news via our Telegram Announcement account.

Other Resources

LinkedIn / Medium / Facebook / Reddit / DiscordYouTube

Ontology Partners with Decentralized Mobility Platform bloXmove To Bring Interoperable… was originally published in OntologyNetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


KuppingerCole

Engineering Successful IAM Projects to Support Digital Business

by Martin Kuppinger Success in IAM projects is not a given. It requires careful planning, change management, expectation management, and many more - including sufficient budgets. This whitepaper gives recommendations from the practical experience of both KuppingerCole Analysts and iC Consult on how to make IAM projects a success.

by Martin Kuppinger

Success in IAM projects is not a given. It requires careful planning, change management, expectation management, and many more - including sufficient budgets. This whitepaper gives recommendations from the practical experience of both KuppingerCole Analysts and iC Consult on how to make IAM projects a success.

Northern Block

NB Orbit Mobile Wallet Demonstrates AIP 1.0 Compliance with Digital Identity Laboratory of Canada

As Canadian and European governments prepare to issue digital identities to their citizens (e.g., passports, driver’s licences, health cards), ensuring ownership, control and interoperability of data is paramount. Gatineau, Québec and Toronto, Ontario In February 2021, Northern Block released a suite of self-sovereign identity products (branded as NB Orbit) to facilitate the adoption of digital […
As Canadian and European governments prepare to issue digital identities to their citizens (e.g., passports, driver’s licences, health cards), ensuring ownership, control and interoperability of data is paramount.

Gatineau, Québec and Toronto, Ontario

In February 2021, Northern Block released a suite of self-sovereign identity products (branded as NB Orbit) to facilitate the adoption of digital trust ecosystems. Knowing that government digital identity initiatives require the use of open source code, specifications and standards, Northern Block ensured its products were architected around them. They also continued contributing in the open source at the Trust over IP Foundation, the DIACC and in Hyperledger Aries.

Hyperledger Aries is a toolkit aimed to provide a shared, reusable, interoperable tool kit designed for initiatives and solutions focused on creating, transmitting and storing verifiable digital credentials. It includes a shared cryptographic storage for blockchain clients as well as a communications protocol for allowing off-ledger interactions between those clients. In order to kickstart their decentralized identity initiatives, Canadian and European governments (example) have selected Hyperledger Aries as their technology stack of choice.


Check out this podcast episode to learn about Open Data and Tech Standards, and to better understand Why Governments Are Choosing Aries and Indy.

“Northern Block has committed itself to compliance with open source projects which lead to the interoperability of verifiable credentials. We are part of a vibrant digital identity ecosystem that knows that digital sovereignty can only be achieved through open sourced auditable systems. We’re proud to support and contribute to it,” says Mathieu Glaude, CEO of Northern Block.

The Digital Identity Laboratory of Canada (“IDLab”) evaluates conformance of wallet technology providers to the Hyperledger Aries Interoperability Profile. The IDLab is an independent Canadian non-profit entity dedicated to advancing digital trust by breaking down barriers to digital ID adoption. The IDLab team conducted the testing of the NB Orbit mobile wallet on both iOS and Android devices, running testing within the IDLab’s technology environment.

Pierre Roberge, general manager of the Digital Identity Laboratory of Canada:

“The IDLab plays a critical role in scaling and facilitating interoperability of digital trust ecosystems. Acting as a neutral and trusted third party, the IDLab confirms conformity to technology and standards. Northern Block, an early user of the IDLab has successfully demonstrated the conformance of the NB Orbit mobile wallet with AiP v1, which many governments are asking for as a starting point.”

With the mission to unlock digital trust for the public and private sector, Northern Block will continue to collaborate with industry partners such as the IDLab to further the maturity of critical frameworks.

The post NB Orbit Mobile Wallet Demonstrates AIP 1.0 Compliance with Digital Identity Laboratory of Canada appeared first on Northern Block | Self Sovereign Identity Solution Provider.


IDnow

How ID Verification boosts the conversion rate for financial services

Conversion rate is crucial for financial institutions. Having an onboarding process that maximizes this is increasingly important in a digitised world. Getting the balance right between security and customer experience, however, is essential. A recent webinar from IDnow looked at this concept. Having the right level of friction in your solutions is vital in achieving […]

Conversion rate is crucial for financial institutions. Having an onboarding process that maximizes this is increasingly important in a digitised world. Getting the balance right between security and customer experience, however, is essential.

A recent webinar from IDnow looked at this concept. Having the right level of friction in your solutions is vital in achieving the best possible conversion rates while also keeping fraudsters at bay and avoiding fines from regulators.

IDnow’s products are designed with this in mind. The company offers a full set of solutions to efficiently onboard users and to combat fraud. These are delivered through a common platform, with a well-developed focus on the user experience.

The digital onboarding process in banking

Digital onboarding has become much more important in banking over the past years. The number of adults accessing finances online increased from 35% to 69% over the ten years to 2018. This has only increased further due to the COVID-19 pandemic. A recent study by consultancy McKinsey suggested that the pandemic has pushed us seven years ahead in digital transformation.

This increase brings challenges with it. Customers expect to be verified and accepted quickly, with a streamlined and bug-free onboarding process. At the same time, it is increasingly important to carry out security and identity checks to meet updated regulations and protect against rising levels of fraud and financial crime.

Many financial institutions in Europe and the UK are struggling with this. Onboarding and KYC processes are often old and inefficient, perhaps having evolved from previous manual processes. A refresh of these can offer better security as well as an improved customer experience.

IDnow’s identity verification solution is designed to prevent fraud

A well-designed and feature-rich solution is needed to meet this balance between security and user friction. IDnow’s AI-powered solution AutoIdent aims to offer just this.

AutoIdent developed from earlier methods of video-based identification (see IDnow VideoIdent) to offer an automated AI-based verification solution. This will carry out a series of automated checks on users’ identity documents and appearance via a biometric selfie. Differently from other vendors, our platform is a natively video-based solution and never relies on a static picture alone. We extract hundreds of frames on both document and biometric verification.

It also offers a hybrid approach with the backup of manual verification. If the AI is not confident on a particular case, or the user is waiting too long for results, it can fall back to a manual verification where an agent will decide if it`s a pass or fraud. The same checks can then be carried out this way, without further inconvenience to the user. These can be handled by IDnow specialists or routed to our clients` internal staff.

A combined approach like this ensures the highest security for identity verification and causes the least hassle for the user.

Identity verification is not enough on its own in many cases – including areas of financial services. IDnow’s single platform also has other anti-fraud solutions built in. This includes document hologram checking capabilities, NFC verification and video liveness detection.

Solutions comply with the latest regulations

KYC and AML are highly regulated areas. Such regulation has increased over the past decades to keep pace with the changes in financial crime and terrorism.

IDnow’s solutions are fully compliant with European and UK regulations. One single platform that complies with regulations in the UK and across Europe is increasingly valuable since Brexit. Solutions meet the latest 6AMLD regulations and fully conform with European eIDAS standards for Qualified Electronic Signatures. IDnow offers full AML screening (PEPs, Sanctions, Adverse Media checking, Watch-list, etc.) together with on-going monitoring for a compliant KYC process in multiple jurisdictions.

Verification with the most advanced technologies – and this continues to develop

AI-based verification makes the process straightforward and seamless for the user but with plenty of advanced methods in use.

IDnow’s AI and machine learning-based system runs various text and visual checks on documents. This includes automated hologram protection by checking reflections at different angles of the identity document. Video and biometric check ownership of identities. These are well-developed solutions able to combat known fraud techniques, such as lookalike images or the use of silicone masks.

NFC functionality has been added recently. This is currently used to read German identity cards, but the solution can be easily expanded as it fully meets the global ICAO 9303 standard.

These technologies meet top security regulations. Image and video likeness technologies, for example, meet the highest NIST standards for anti-spoofing.

Ensuring the best user experience

Security is vital, but to get top conversion rates, you need to focus as well on the customer experience. If onboarding takes too long or the experience is not a good one, you risk losing customers.

Reducing friction points and understanding exactly what users are prepared to deal with is a key part of this. Onboarding is possibly the users’ first experience of your brand, and it should feel seamless and straightforward.

There is more to the user experience than just speed and branding, though. Customers want to feel safe and have a verification process that completes accurately and automatically. IDnow’s products have been developed with extensive feedback collected from end-users incorporated into the processes to make them as intuitive as possible.

AutoIdent provides users with real-time feedback during the verification process. Users are guided through overcoming issues that are impacting verification. This could be things such as document position or lighting conditions.

Fallback methods also help the user experience and conversion rate. If the AI does not succeed, users can be verified via an agent. Companies that only offer an AI-based solution will struggle to retain customers when verification fails, or users need more support. Bear in mind that not all users are fully tech-savvy!

Read more on: Why offering multiple identity verification options can become a competitive advantage.

In Conclusion – get the balance between security and user experience right

Advanced security features and methods, regulation compliance, and a seamless customer experience come together in creating a great onboarding and identity verification solution. Getting the balance right is essential in achieving the best possible customer conversion rate.

I believe that IDnow has developed a solution that gets this balance between security and user friction right. In doing so, it helps businesses boost their conversion rate while also meeting regulations and protecting them from financial crime

You can find out more by viewing our full webinar. This looks in more detail at the journey of identity verification to today’s solutions and the important balance achieved. It also shows the AutoIdent platform in action and discusses some examples of its implementation.

By

Francisco Martins
Senior Identity Consultant, Financial Sector UK/I at IDnow
Connect with Francisco on LinkedIn


KuppingerCole

Jan 20, 2022: New Methods to Accelerate Endpoint Vulnerability Remediation

IT endpoints are no longer just workstations and servers confined to corporate headquarters, branch offices, customer sites, and data centers, they can now be just about anything located anywhere, from employee homes to airports, hotels and in the cloud. But every endpoint represents a potential entry point for cyber attackers, and needs to be managed.
IT endpoints are no longer just workstations and servers confined to corporate headquarters, branch offices, customer sites, and data centers, they can now be just about anything located anywhere, from employee homes to airports, hotels and in the cloud. But every endpoint represents a potential entry point for cyber attackers, and needs to be managed.

Indicio

Newsletter Vol 15

The post Newsletter Vol 15 appeared first on Indicio Tech.
Covid 19 as a Catalyst for Advancement of Digital Identity

 

Read the latest white paper from Charlyn Ho, Partner at Perkins Coie, where she discusses how COVID 19 brought digital identity into the spotlight and how it has so many more uses past the pandemic. The paper also specifically discusses the Indicio approach to digital identity. 

Read the comprehensive paper The Perfect Signature Style is the Enemy of the One that Works Today

 

Indicio Senior Architect Sam Curren talks about how BBS+ signature styles are not going to be ready for deployment anytime soon, but that shouldn’t stop you from building today in a way that allows you to add them later. He also touches on the pros and cons of waiting when it comes to the newest technologies, and why its usually better not to wait.

Read the Blog WINNER: Ken Ebert, Entrepreneurial Leadership Award, Enterprise Blockchain Awards

Congratulations to Ken Ebert, our CTO, for winning the Entrepreneurial Leadership Award at the Enterprise Blockchain Awards! Learn more about the awards and their significance here:

EBA Awards Verifiable Credentials are Coming to Card Payment Rails

 

Liquid Avatar Technologies announced Passmate. Learn how decentralized identity will transform the world by easily integrating into payment systems that already exist. In this blog we will take a deep dive into the technology and how these integrations will look for the end user.

Read the Blog Phocuswright panel on SSI and the future of identity and travel

 

Last week Heather C Dahl, CEO of Indicio participated on an executive round table panel discussion at The Phocuswright Conference 2021, titled SSI-The Future of Identity and Travel, along with Filipe Pereira dos Reis, Director Airports, Americas, IATA and Kaliya Young, Ecosystems Director, COVID Credentials Initiative, Linux Foundation Public Health. 

Watch the recording Indicio November Meetup: Driving Inclusion with Trusted Digital Ecosystems

 

In our next Meetup we will be bringing together John Ainsworth, CEO, Bonifii, Greg Kidd, CEO/Co-founder, GlobaliD ,Katrie Lowe, CEO/Co-founder, Domi Labs, Keela Rose Shatzkin, Healthcare IT Consultant, Shatzkin Systems Inc to discuss how to best drive greater digital inclusion including verifiable identity for government services, financial, healthcare, cross-border travel and more.

Register Today Upcoming Events

 

Here are a few events in the decentralized identity space to look out for.

Cardea Community Meeting 12/02 Aries Bifold 12/07 Hyperledger Aries Working group 12/01

The post Newsletter Vol 15 appeared first on Indicio Tech.

Monday, 22. November 2021

Infocert (IT)

Partner Day InfoCert 2021. Grande successo per l’evento tornato in presenza.

Si è svolto lo scorso 8 novembre il Partner Day 2021, l’evento esclusivo dedicato alla rete di Partner InfoCert. Dopo l’edizione 2020 svolta completamente in digitale, il Partner Day 2021 è stato realizzato in modalità ibrida con partner connessi da remoto e ospiti in presenza, accolti nella splendida cornice della Sala della Musica di Palazzo […] The post Partner Day InfoCert 2021. Grande succe

Si è svolto lo scorso 8 novembre il Partner Day 2021, l’evento esclusivo dedicato alla rete di Partner InfoCert. Dopo l’edizione 2020 svolta completamente in digitale, il Partner Day 2021 è stato realizzato in modalità ibrida con partner connessi da remoto e ospiti in presenza, accolti nella splendida cornice della Sala della Musica di Palazzo Turati a Milano.

L’evento si è confermato un grande successo in termini di presenze e partecipazione. Durante la mattinata si sono alternati gli esperti InfoCert che hanno illustrato tutte le principali novità dedicate al mondo dei Partner e dei principali servizi, tra cui GoSign, Legalmail e SPID Professionale.

Premio Best Business Partner 2021

Anche quest’anno il Partner Day ha fatto da cornice al premio Best Business Partner.

Il premio, giunto alla seconda edizione, è il riconoscimento dedicato ai Partner InfoCert che si sono distinti nel corso dell’anno per iniziative di business di rilievo. Quest’anno hanno ricevuto la targa di Best Business Partner:

Openapi Linkverse  U.NA.P.P.A. – Unione Nazionale Professionisti Pratiche Amministrative Servizi CGN GFX srl

Vuoi saperne di più sull’InfoCert Partner Program e partecipare al Partner Day 2022?

Scrivici qui

The post Partner Day InfoCert 2021. Grande successo per l’evento tornato in presenza. appeared first on InfoCert.


Indicio

The Perfect Signature Style is the Enemy of the One that Works Today

The post The Perfect Signature Style is the Enemy of the One that Works Today appeared first on Indicio Tech.
BBS+ signature styles are not going to be ready for deployment anytime soon. This is precisely why you should build today and in a way that allows you to add them later.

Sam Curren, Senior Architect

New technology is inevitable: some of it will be evolutionary, some of it will be revolutionary; some of it will eat your business, and some of it might change the world and make life better. 

How do you know when to wait and when to jump?

This is the dilemma for many people looking at decentralized identity right now. Is it ready to be implemented, are there “off-the-shelf” products I can use—or will it all be so much better next week or in a month or in a year?

The dilemma seems to divide the decentralized identity community. Standards groups and initiatives advocate for the best possible solution, in the hope that it will eventually exist, while companies building solutions—like Indicio—say “build now because what we have works and works well and can be added to later. The ‘better’ may never come but the good—especially if open source—will continually get better and be relatively easy to upgrade.” 

But we believe our position is not just a matter of business logic: There’s a massive downside to letting failing technology—our current centralized and federated ways of managing identity—continue to fail businesses and consumers, citizens and governments. 

This downside is vastly greater than any of the differences between decentralized identity technologies that can be used today, those in development, and those hypothesized as being available sometime in the future.

Don’t turn BBS+ into a minus
This issue is not abstract. Right now, there is much discussion around JSON-LD BBS+ being “the” standard for managing verifiable credential key signatures in decentralized identity systems. The Good Health Pass, for example, recommends BBS+ for Covid digital credentials.

BBS+ is good and Indicio is excited about adding it to its options for customers building decentralized solutions. But we can’t do so because BBS+  is still under development and it’s unclear when the final version will be available. Meanwhile, we have JSON-ZKP-CL Signatures that provide the ingredient BBS+ is working to add: privacy preserving predicate (zero-knowledge)  proofs and blinded identity binding. 

Predicate proofs mean that you are able to generate a proof of something—such as age—without having to disclose the actual information, and they are a boon to preserving privacy.

When thinking about BBS+, it is important to remember that credential format is just one part of a larger system that must be developed. Governance, Issuance and Verification agents, Holder apps, and more all need to be implemented; user experience must be developed; business relationships created: Decentralized identity is an ecosystem of infrastructure, software and governance working together as a product. All of these things can be deployed using existing production-ready credential formats. And the gains made now will translate into the future adoption of BBS+. 

The bigger point is this: Decentralized identity is at a breakthrough point. Governments in Canada and Germany have decided that verifiable credentials are the way forward; pilots and consumer products are being unveiled on a weekly basis. This is not the moment to say, “let’s wait;”  this is the moment to say “let’s scale.” 

At Indicio, we’ve shown how to make decentralized ecosystems work to solve real problems for lots of customers. In building, we’ve advanced the tech. In advancing the tech, we’ve built more solutions. This is the virtuous cycle of innovation and scale that we’re creating. We will add BBS+ into our products when it is available. But until then, we’re going to build solutions that BBS+ can be added to—and we think you should too.

 

The post The Perfect Signature Style is the Enemy of the One that Works Today appeared first on Indicio Tech.


Tokeny Solutions

Are you ready to digitize yourself in the metaverse?

The post Are you ready to digitize yourself in the metaverse? appeared first on Tokeny Solutions.
November 2021 Are you ready to digitize yourself in the metaverse?

The metaverse has been a hot topic of late. As Facebook rebranded to Meta, a lot of attention has turned towards projects focused on this alternate reality. Decentraland’s MANA token reached a new all-time high, and companies such as Roblox saw big increases in share prices.

As is always the case with nascent technologies, the rise of metaverse platforms has brought some issues. Here are a few:

Unfiltered content – anyone can access any type of content, and considering a large amount of the user base are teenagers, this is concerning. Accessibility problems – gaining access to metaverse platforms is a pain when you consider how many accounts you need for various web services. Loss of virtual assets – anything purchased in the metaverse can simply be lost, and the tokens representing these assets can never be recovered. Privacy concerns – users are increasingly concerned about privacy issues and protecting their data, with this not being helped by Facebook throwing their hat in the virtual ring.

The key to solving these issues is abundantly clear: digital identities. Here’s how:

Age restricted content – users log into the metaverse with identities, allowing platforms to appropriately filter certain content and environments. Universal login – like Google authentication, onchain digital identities enable users to log in to different virtual venues in the metaverse via one click. Asset recovery – onchain identities guarantees ownership of virtual assets because tokens can be linked to the identity and not to the wallet. Privacy protected – service providers only need to see the proof of verified information, instead of the actual data, thus alleviating privacy concerns.

As the metaverse gets more and more popular, and with more virtual assets being viewed, bought and sold in this environment, identity will become a core component of this world. Users will need to know who they are dealing with, they will need easy recovery processes in the case of lost wallets. This will be key as the metaverse matures and its ties with digital assets continue to strengthen.

What do you think? Join the ONCHAINID Telegram chat group to discuss digital identity: click here.

Tokeny Spotlight PRESS RELEASE

$28 Billion Company Migrates Its Security Tokens From Ethereum To Polygon

Read More Case Studies

Enegra’s tokenized equity improves the liquidity of its $28Bn balance sheet via T-REX Platform

Read More TOKENY’S TALENT

Full-Stack Developer Eloi’s Story

Read More RECOGNITION

TADS Awards – The Best Tokenization Solution Provider

Read More Market Insights

Enegra migrates digitized equity tokens from Ethereum to Polygon blockchain

The firm selected the Polygon blockchain for its low transaction fees and fast transaction time.

Cointelegraph

Read More

A Crypto Guide to the Metaverse

Verifiable, immutable ownership of digital goods and currency will be an essential component of the metaverse.

Coindesk

Read More

The Metaverse + Security Tokens

A use case that’s possible right now is tokenizing the virtual real estate. You can buy and sell land just like you would in real life which makes this another already-available monetization route.

STO Market

Read More

Security tokens are back with a boom

Security tokens are back with a boom after a regulatory hibernation since 2018 has paved a pathway for securities and tokenised assets.

Coin Rivet

Read More

Prelude to the future of finance? SocGen is raising a loan from a DeFi protocol to refinance tokenized bonds

If materialized, SocGen’s financing from MakerDAO will be the first time a major bank borrows from decentralized finance, or DeFi protocols.

Market Watch

Read More

Amid regulatory woes, Binance CEO details France HQ ambitions

Binance co-founder and CEO Changpeng Zhao has said that he hopes to obtain digital asset service provider status in France in 2022.

The Block

Read More

ECB announces members of Digital Euro Market Advisory Group

ECB appoints 30 senior business professionals with proven experience to advise Eurosystem on design and distribution of potential digital euro

ECB

Read More

Compliance In Focus

European Commission Urges Members to Agree on Crypto Regulations

The commission is hoping to finalize its proposed regulatory sandbox for financial products based on distributed ledger technology by the end of the year.

Coindesk

Read More

Dubai Issues Rules for Security, Derivatives Tokens

The regulator also plans to roll out rules for exchange and utility tokens as well as stablecoins.

Coindesk

Read More

The draft regulation MiCAR – and its effects

It is important to prepare for the changes coming with MiCAR, the question is how crypto businesses already authorized under national law will be affected once MiCAR comes into force.

Bird & Bird

Read More

Subscribe Newsletter

A monthly newsletter designed to give you an overview of the key developments across the asset tokenization industry.

Previous Newsletter  Nov22 Are you ready to digitize yourself in the metaverse? November 2021 Are you ready to digitize yourself in the metaverse? The metaverse has been a hot topic of late. As Facebook rebranded to Meta,… Oct25 Guarantee Asset Ownership with Blockchain Passports October 2021 Guarantee Asset Ownership with Blockchain Passports In the DeFi world, digital assets are stored in blockchain wallets. Obviously, wallets are not identities, they… Sep13 How Fractionalization of NFTs Enables Co-Ownership September 2021 How Fractionalization of NFTs Enables Co-Ownership For months, non-fungible tokens (NFTs) are making headlines in the blockchain space. NFTs are supposed to be… Aug16 DeFi vs Regulation: Round One August 2021 DeFi vs Regulation: Round One Due to their decentralized nature, the crypto and DeFi markets have always been complicated subjects when it comes…

The post Are you ready to digitize yourself in the metaverse? appeared first on Tokeny Solutions.


KILT

Announcing Sporran and Stakeboard: Storing and Staking for KILT!

We are delighted to introduce two new additions to the KILT ecosystem: the Sporran browser extension — the wallet for KILT Coins and credentials — and Stakeboard, the staking platform for KILT. Sporran The Sporran wallet can be used to hold KILT Coins and provides a way for users to sign and submit KILT blockchain transactions. And in early December, users will also be able to use Sporran t

We are delighted to introduce two new additions to the KILT ecosystem: the Sporran browser extension — the wallet for KILT Coins and credentials — and Stakeboard, the staking platform for KILT.

Sporran

The Sporran wallet can be used to hold KILT Coins and provides a way for users to sign and submit KILT blockchain transactions. And in early December, users will also be able to use Sporran to store credentials and create a digital identity — similar to the real world when you add credentials like your driver’s license to your physical wallet.

You could also build several identities — for example, your work identity with all your qualifications, your gaming identity with your rankings, etc. Sporran provides a way to manage and sign transactions with these digital identities on the KILT blockchain. This is designed to restore your control over your own data when you are providing your information to online services.

Currently, Sporran is available for use as a browser extension on Google Chrome and Firefox. See our guide to creating a Sporran identity here.

Stakeboard

Stakeboard is a web application that allows you to interact directly with the KILT blockchain to stake your KILT Coins.

To participate in staking on Stakeboard you need a KILT Identity (wallet address) with at least 1,001 KILT Coins (1,000 for staking; 1 to cover any transaction costs). Each Identity with this minimum can choose one collator to delegate their coins to. Collators hold the data of the KILT blockchain, collect transactions and build blocks. You can find the list of collators here and on community sites like StakeKILT.com.

When the chosen collator successfully produces blocks, their delegator can receive a reward of up to 8% per annum in the first year after launch; 6% in the second year. See our “How to stake on KILT” guide for more details on navigating Stakeboard.

Sporran and Stakeboard were developed by B.T.E. BOTLabs Trusted Entity GmbH, a subsidiary of BOTLabs GmbH, the entity that initially developed KILT Protocol.

For any questions about these services, go to our Tech Support site. To keep up with developments on KILT as they happen, follow our official Twitter and Telegram channels.

About BOTLabs GmbH

BOTLabs GmbH is a Berlin-based research and development company focusing on blockchain. It was founded in January 2018 by Ingo Rübe and German publishing house Burda GmbH, for whom he served as CTO from 2012 to 2017; Swiss publisher Ringier AG later joined as a shareholder. BOTLabs is the initial developer of KILT Protocol, which is now a fully decentralized blockchain network. The Sporran wallet and SocialKYC identity verification service were developed by a subsidiary of BOTLabs called B.T.E. BOTLabs Trusted Entity GmbH. BOTLabs is a founding member of the International Association for Trusted Blockchain Applications (INATBA) and a member of the Decentralized Identity Foundation (DIF) and Blockchain for Europe.

About KILT Protocol

KILT is a fully decentralized blockchain identity protocol for issuing self-sovereign, anonymous and verifiable credentials. KILT’s mission is to return control over personal data to its owner, restoring privacy to the individual. Developers can use KILT’s open-source Javascript SDK to quickly build applications for issuing, holding and verifying credentials and create businesses around identity and privacy. KILT Protocol was initially developed by BOTLabs GmbH.

Announcing Sporran and Stakeboard: Storing and Staking for KILT! was originally published in kilt-protocol on Medium, where people are continuing the conversation by highlighting and responding to this story.


51 Nodes

Das Potenzial von Selbstsouveränen Identitäten am Beispiel der Energiewirtschaft

Bisherige Lösungen für das Managen von Identitäten sind gekennzeichnet von Datensilos, die einerseits jeder Diensteanbieter mit hohem Aufwand selbst betreibt — oder andererseits von globalen Identitätsanbietern, die den Diensteanbietern diesen Aufwand abnehmen können. Das Problem des isolierten Identitätsmanagements ist, dass der durchschnittliche Internetnutzer über 20 verschiedene Identitäten ha

Bisherige Lösungen für das Managen von Identitäten sind gekennzeichnet von Datensilos, die einerseits jeder Diensteanbieter mit hohem Aufwand selbst betreibt — oder andererseits von globalen Identitätsanbietern, die den Diensteanbietern diesen Aufwand abnehmen können. Das Problem des isolierten Identitätsmanagements ist, dass der durchschnittliche Internetnutzer über 20 verschiedene Identitäten hat, die separat angelegt und gewartet werden müssen — mit entsprechendem Aufwand und daraus resultierend Inkonsistenzen zwischen den Datensilos. Globale Identitätsmanager wie Google helfen, diese Probleme mit Hilfe des Single-Sign-On unter Nutzung einer Google-ID zu überwinden. Für den Nutzer ist dies bequem und einfach. Jedoch wird die Hoheit über persönliche Daten und deren kommerzielle Verwertung aus der Hand gegeben.

Vor diesem Hintergrund streben Selbstsouveräne Identitäten (SSI) die Verknüpfung der Nutzerfreundlichkeit einer Google-ID mit einem hohen Grad an Nutzerkontrolle und Privatsphäre an.

Was genau ist SSI?

SSI bilden die neueste Entwicklungsstufe digitaler Identitäten. Eine Identität meint alle Attribute einer Person, Organisation, oder Gegenstands, die dieses Subjekt definieren. Attribute beschreiben die Charakteristika eines Subjekts. Eine digitale Identität meint hier die digitale Repräsentation dieser Attribute. Je nach Verwendungskontext können verschiedene Teilidentitäten benötigt werden, die nur einen Teil der Attribute umfassen.

Ein Credential ist ein fälschungssicherer und überprüfbarer Nachweis von Attributen eines Subjekts. Credentials werden in einem persönlichen digitalen Wallet gehalten. Das Subjekt ist der Holder der Nachweise, nachdem es diese von einem Issuer beschafft hat. Ein Issuer stellt Credentials nach einem Schema aus, das eine übergreifende Verwendung und allgemeingültige Interpretation erlaubt. Ein Verifier fordert, z.B. für den Zugriff auf einen Dienst, einen Nachweis einer Berechtigung (ein Credential) von dem zugreifenden Subjekt. Über ein Verifiable Data Registry werden dazu Identifikatoren ausgetauscht, die auf Subjekte, deren Credentials und deren Issuer verweisen können. Das Verifiable Data Registry enthält keine subjektbezogenen Daten.

Rollen und Informationsflüsse beim Identitätsmanagement mit SSI (Quelle: https://www.w3.org/TR/vc-data-model/#roles) Welchen Mehrwert bringt SSI?

SSI überwindet das inkonsistente und — für Nutzer als auch Diensteanbieter — aufwändige Identitätsmanagement in isolierten Datensilos und gleichzeitig die Abhängigkeit von bisherigen Single-Sign-On-Identitätsmanagern wie Google und Twitter, die die Anmeldevorgänge der Nutzer kontrollieren, auswerten und verwerten. Mit SSI haben Subjekte wie Personen oder Maschinen eine einzige Identitätsverwaltung (zumindest für einen gewissen Namensraum). Die einer Identität zugeordneten Berechtigungsnachweise müssen nur einmal eingeholt werden und können dann nach Bedarf passgenau für beliebig viele Anmelde- und Nachweisprozesse eingesetzt werden. Analog zur Plastikkärtchen-Identität können die Nachweise geprüft werden, ohne den Herausgeber zu involvieren.

Heutiges Identitätsmanagement in Silos vs. Selbstsouveränes Identitätsmanagement (Adaptiert von: https://digitaleweltmagazin.de/2019/08/12/chancen-der-self-sovereign-identities-ssi-aus-sicht-von-unternehmen-fuer-das-identity-access-management-iam/)

Für Diensteanbieter vereinfachen sich Onboardingprozesse, das sogenannte Know-your-Customer und die Compliance zu den damit verbundenen Regularien. Zudem sind die bereitgestellten Identitätsinformationen aktuell. Durch die Vereinfachung der Onboardingprozesse werden diese auch mit einer höheren Wahrscheinlichkeit als bislang von den Nutzern abgeschlossen.

Nutzer von Diensten (beliebige Subjekte, auch Maschinen) können ihre Identität in Plug-and-Play-Manier einsetzen und ihre Identität einfach zwischen verschiedenen Diensten portieren. Das Verwalten und Aktuellhalten von dutzenden Nutzerkonten und das Merken der zugehörigen Passwörter entfällt, da nur noch ein Zugang zum persönlichen Wallet erforderlich ist. Konsequenterweise reduzieren sich auch IT-Sicherheitsprobleme, die durch die Verwendung des gleichen Passworts für verschiedene Nutzerkonten entstehen.

Welche Herausforderungen gibt es?

Einschränkend kann vermerkt werden, dass die Vorzüge und Nutzbarkeit einer selbstsouveränen Identität sich zunächst auf diejenigen Dienstanbieter beziehen, die auf einer Verifiable Data Registry präsent sind — ähnlich den mobilen Anwendungen auf den App Stores. In Analogie dazu ist ein SSI-Netzwerk umso wertvoller für seine Nutzer, je mehr Dienste darüber nutzbar sind. Schließlich ist hier ein Wachstums- und Konsolidierungsprozess zu erwarten, der über die Durchsetzung von bestimmten Angeboten entscheidet.

Ein kritischer Gedanke ist, dass mit dem Verifiable Data Registry eine ähnliche Abhängigkeit der Identitäts-Subjekte wie bislang zu den Single-Sign-On-Anbietern aus den Sozialen Medien entstünde. Dieser Gedanke führt jedoch in die Irre, denn das Verifiable Data Registry kann mit Hilfe von Distributed Ledger-Technologie in einem Blockchain-basierten Netzwerk betrieben werden. Mehrere dezentrale Rechenknoten, die von unterschiedlichen Akteuren betrieben werden können, würden das Netzwerk bilden. Oftmals sind hier auch Non-Profit-Organisationen wie Sovrin oder die Energy Web Foundation aktiv. Ein deutlicher Kontrast zu den bisherigen Single-Sign-On-Anbietern.

Ein ausschlaggebender Faktor für den Erfolg von SSI wird sein, dass die Issuer von Credentials das erforderliche Vertrauen herstellen können. Weiterhin wird, wie so oft, die Nutzererfahrung und die daraus resultierende Akzeptanz entscheidend sein. Lösungsanbieter wie Spherity nutzen eine Cloud, um ein nutzerfreundliches Identitätswallet bieten zu können, das auch Private Keys verwahrt und vor dem ungewollten Verlust der Identität schützt.

Wer treibt SSI voran?

Die Bundesregierung und die Europäische Union sind unter anderem Treiber von SSI. Sie fördern das Entwickeln der Konzepte, Technologie, Standards und Regulierungen bis hin zu Pilotierungen in verschiedensten Branchen und Bereichen.

Das Bundesministerium für Wirtschaft und Energie fördert z.B. das „Schaufenster sichere digitale Identitäten“. Eines der Schaufensterprojekte ist IDunion. IDunion arbeitet an der Schaffung eines offenen Ökosystems für dezentrale, selbstsouveräne Identitäten. Dazu wird mit Blockchain-Technologie ein verteiltes Identitätsnetzwerk aufgebaut. Das Projekt wird von 47 namhaften Forschungs- und Industriepartnern vorangetrieben. 51nodes ist Partner von IDunion.

Schaufensterprojekte Digitale Identitäten (Quelle: https://digitale-identitaeten.de/schaufensterprojekte/)

Die Europäische Union finanziert z.B. das „European Self-Sovereign Identity Framework Lab“. 20 Teilprojekte kümmern sich um die Schaffung und Erweiterung eines Open Source-Softwareframeworks für SSI. Weitere 42 Teilprojekte entwickeln kommerzielle Komponenten and Dienste unter Nutzung des SSI-Frameworks.

Anwendungsbeispiel: Wie kann SSI der Energiewirtschaft helfen?

Vor dem Hintergrund der Energiewende stehen die Betreiber von Übertragungs- und Verteilnetzen für elektrischen Strom vor großen Herausforderungen und neuen gesetzlichen Pflichten. Über eine Million (privater) dezentraler Stromerzeuger müssen effizient und effektiv in bestehende energiewirtschaftliche Prozesse (z.B. der Regelleistung und des Engpassmanagements im Redispatch 2.0) integriert werden.

Leistungen und Prozesse der Energiewirtschaft (Quelle: https://www.next-kraftwerke.de/wissen/systemdienstleistungen)

Aktuell sind energiewirtschaftliche Prozesse gekennzeichnet durch produktspezifische und teilweise aufwendige Registrierungsprozesse an verschiedenen Stellen. Beispielsweise kann man hier das Marktstammdatenregister der Bundesnetzagentur, die Regelleistungsplattform der Übertragungsnetzbetreiber und die Plattform connect+ zur Kooperation und zum Datenaustausch der Netzbetreiber nennen. Hinzu kommt eine geringe Motivation der Betreiber von kleinen Energieerzeugungsanlagen und der Sicherung der Aktualität der Daten an den unterschiedlichen Registrierungsorten.

Die Frage von erforderlichen Nachweisen betrifft z.B. die Art der Stromerzeugung (z.B. EEG-Anlage) bzw. für welches energiewirtschaftliche Produkt die Anlage eingesetzt werden darf und kann. Die Identifikatoren (Energy Identification Code) für Anlagen werden zentral durch den BDEW vergeben. Weiterhin gibt es Vorgaben zur Marktkommunikation durch den Regulator, die mit Hilfe einer Zertifikatinfrastruktur für Signierung und Verschlüsselung erfolgt. D.h. die Zertifikate müssen bei allen genannten Stellen eingepflegt und aktuell gehalten werden. In einem “Internet of Energy”, wenn Millionen von Endkunden mit ihren dezentralen Flexibilitätsanlagen (z.B. Elektromobilität, Heimspeicher, Wärmepumpen, etc.) auf den Energiemarkt drängen, kommen diese Systeme zur Abwicklung der Massenprozesse für Registrierungs- und Veränderungsanforderungen in der notwendigen Geschwindigkeit an ihre Grenzen.

Der Ansatz von SSI verspricht demgegenüber die Vision der Integration von Millionen von dezentralen Anlagen in die Prozesse und IT-Systeme der Netzwirtschaft in unaufwändiger Plug-and-Play-Manier, ohne dass Mehrfachanmeldungen und parallele Konsistenzhaltung in redundanten isolierten Identitätsmanagementsystemen weiter erforderlich wären. Damit sollten Hürden für Anlagenbetreiber sinken und die Prozesse der Netzwirtschaft können schlanker und reibungsärmer aufgestellt werden. Schließlich würde ein wichtiger Beitrag für das Gelingen der Energiewende geleistet.

Aktuell arbeitet 51nodes gemeinsam mit dem Übertragungsnetzbetreiber TransnetBW an der Erörterung von SSI im Kontext der Energiewirtschaft. Bislang konnten schon mehr als zehn potenzielle Anwendungsfälle für SSI identifiziert werden.

Interesse an SSI?

51nodes ist ein Anbieter von Lösungen für die Crypto Economy. 51nodes unterstützt Unternehmen und andere Organisationen bei der Umsetzung ihrer SSI- und Blockchain-Projekte. Sie haben Fragestellungen zu digitalen Identitäten und Anknüpfungspunkte zur Nutzung von SSI? Kommen Sie gerne auf uns zu!

Weiterführende Informationen zu SSI

(1) Self-Sovereign Identity: The Ultimate Beginners Guide (Webseite)
(2) Self-Sovereign Identity: Grundlagen, Anwendungen und Potenziale portabler digitaler Identitäten (Whitepaper des Fraunhofer FIT)
(3) Chancen der Self-Sovereign Identities aus Sicht von Unternehmen für das Identity & Access Management (Webseite)
(4) Ein Überblick über das SSI-Ökosystem (wissenschaftlicher Artikel)
(5) Eine technische Umsetzungsplattform für SSI in der Energiewirtschaft: Energy Web Decentralized Operating System (Technische Konzeptdokumentation)

Das Potenzial von Selbstsouveränen Identitäten am Beispiel der Energiewirtschaft was originally published in 51nodes on Medium, where people are continuing the conversation by highlighting and responding to this story.


Elliptic

Crypto Regulatory Affairs: US Infrastructure Bill’s Cryptoasset Reporting Requirements Seen as Overreach

🇺🇸 US Infrastructure Bill’s Cryptoasset Reporting Requirements Seen as Overreach On November 15th 2021, President Joe Biden signed a bipartisan infrastructure bill. The bill includes new taxation reporting requirements for cryptoasset brokers. Observers are concerned with the open-languaged “broker” definition used in the bill which could be interpreted as including any blockchain

🇺🇸 US Infrastructure Bill’s Cryptoasset Reporting Requirements Seen as Overreach

On November 15th 2021, President Joe Biden signed a bipartisan infrastructure bill. The bill includes new taxation reporting requirements for cryptoasset brokers. Observers are concerned with the open-languaged “broker” definition used in the bill which could be interpreted as including any blockchain network participant. Indeed, the “broker” definition of the Internal Revenue Code is supplemented by: ‘‘any person who (for consideration) is responsible for regularly providing any service effectuating transfers of digital assets on behalf of another person.’’

In the infrastructure bill, any person or entity which falls under the definition above will have to comply with the following reporting requirements: “[A]ny broker, with respect to any transfer (which is not part of a sale or exchange executed by such broker) during a calendar year of a covered security which is a digital asset from an account maintained by such broker to an account which is not maintained by, or an address not associated with, a person that such broker knows or has reason to know is also a broker, shall make a return for such calendar year, in such form as determined by the Secretary, showing the information otherwise required to be furnished with respect to transfers subject to subsection (a).’’ 

Industry participants were quick to react accusing the government of regulatory overreach. Charles Hoskinson, the founder of Cardano, reacted to the bill stating that:  “we are in a slightly bad position today, because the Infrastructure Bill was passed. If it's left to its own devices, by 2023 when these mandates come into place...depending on how they are interpreted and what the IRS does with it, it can cause catastrophic damage.”

House Representatives, including Patrick McHenry from the House Financial Services Committee, introduced a bipartisan bill titled “Keep Innovation in America Act” to clarify the reporting requirements of “brokers” following the changes made to the Internal Revenue Code. The proposed legislation would amend the supplement to the “broker” definition cited above to: ‘‘any person who (for consideration) stands ready in the ordinary course of a trade or business to effect sales of digital assets at the direction of their customers.’’ 

The reporting requirements cited above are also amended to include the following sentence at the end of the paragraph: “Information reported by brokers under this section shall be limited to customer information that is voluntarily provided by the customer and held by the broker for a legitimate business purpose.”

The changes in the “Keep Innovation in America Act” ensure that the reporting requirements are limited to cryptoasset businesses rather than individuals interacting with the blockchain to validate transactions. The bill proposes to push back the date some of these new requirements come into force to 2026.

 

🇮🇳 India Continues Exploring Cryptoasset regulation

Details have emerged regarding a cryptoasset regulation bill which is due to be presented to the Indian parliament this winter. The bill will reportedly ban payments using cryptoassets but allow users to trade their assets. Authorities are expected to ban active solicitation, such as advertisements, from cryptoasset business. These reports follow India’s Standing Committee on Finance inaugural hearing with industry stakeholders on “CryptoFinance: Opportunities and Challenges”' on November 15th 2021. These developments illustrate the government's willingness to move rapidly on cryptoasset regulation as Elliptic covered announcements by the Ministry of Finance earlier this month.

To learn more about how your business can use Elliptic’s tools to comply with AML/CFT requirements in anticipation of new requirements in India, schedule a demo.

 

🇮🇱 Israel is Adopting New AML Laws for Cryptoassets

The Israeli’s government new anti-money laundering (AML) order for cryptoasset businesses took effect on November 14th 2021. The updated regulation includes a licensing requirement for cryptoasset businesses. According to The Jerusalem Post, the director of the Authority for Combating Terror Financing and Money Laundering, Shlomit Wagman, said this new framework will reduce criminal activity in the cryptoasset ecosystem while increasing the legitimacy of the industry. Members of the industry hoped that these new rules will facilitate their relationship with local banks. As Israel ramps up its efforts to regulate the cryptoasset industry, the US Department of the Treasury issued a press release detailing a partnership with the Israeli Minister of Finance to combat ransomware on November 15th 2021.

 

🇰🇷 South Korea is Looking to Tighten Cryptoasset Regulation

South Korean regulators were criticised by cryptoasset businesses following a hearing on new bills set to regulate the industry. One of the bills would introduce a "know-the-sender" rule. As such, cryptoasset businesses would be obliged to gather information on the identity of the issuer of each transaction they receive. Stakeholders remarked that this rule would be impractical and severely limit the transactions which take place locally. These requirements are akin to the Financial Action Task Force’s “Travel Rule” (Recommendation 16).

To learn more about the “Travel Rule”, its impact on the industry and how your business can comply, download Elliptic’s Travel Rule Toolkit.

 

🇺🇸 US Department of Justice to Sell Cryptoassets Linked to Fraud

The US Department of Justice is set to liquidate $56 million in fraud proceeds of a cryptoasset project named BitConnect. This is the largest seizure of cryptoassets by US authorities. BitConnect’s main promoter, Glenn Arcaro, was charged with conspiracy to defraud investors using a Ponzi scheme which gathered more than $2 billion.  When ordered by the court, the government will start selling the seized cryptoassets to restitute these funds to the victims. The Department of Justice encourages victims of the fraud to reach out.


SWN Global

More commitment towards a Zero CO2 emission: Sovereign Wallet Network established a joint venture…

More commitment towards a Zero CO2 emission: Sovereign Wallet Network established a joint venture corporation, “CO2 Network LLC” We are thrilled to announce that Sovereign Wallet Network (SWN), a blockchain company that has jointly developed the world’s first identity-based blockchain, “MetaMUI Blockchain,” with the University of Southern California, has established CO2 Network LLC, a joint
More commitment towards a Zero CO2 emission: Sovereign Wallet Network established a joint venture corporation, “CO2 Network LLC”

We are thrilled to announce that Sovereign Wallet Network (SWN), a blockchain company that has jointly developed the world’s first identity-based blockchain, “MetaMUI Blockchain,” with the University of Southern California, has established CO2 Network LLC, a joint venture in Hawaii, the U.S.

CO2 Network is a company that develops and provides blockchain-based Certified Emission Reduction (CER) issuance and its trading platform. The company is also preparing to build a differentiated marketplace where users can trade various digital assets such as digital art and webtoons of NFT.

Exceptionally, Professor Yu Hua An, well known as Korea’s top Chinese economic expert, was appointed as the Chief Strategic Officer (CSO) and participated in the stake, while Phantom Seokgu Yun, CEO of Sovereign Wallet Network, was appointed as the CTO of the CO2 Network LLC.

It’s TCC America, a U.S. subsidiary of TCC Group, a Korean domestic listed company, and individual investors from China and South Korea participated in funding Series A of $3 million.

Certified Emission Reduction issuance and its trading platform conducted on the CO2 Network will run on the MetaMUI Blockchain and the NFT Us Marketplace, which will open later and use the MetaMUI Blockchain technology early as the first half of next year.

Regarding the establishment of CO2 Network, Phantom Seokgu Yun, CEO of Sovereign Wallet Network, said, “Interest and investment in the CER trading market around the world are increasing significantly. MetaMUI Blockchain, a blockchain-based on identity authentication, is essential for transparent and legal CER trading, CER, and digital asset issuance in the era of Metaverse.”

After completing Series A funding, CO2 Network announced that it is set to fund Series B for institutions in the future.

Looking forward to that amazing journey for the sake of our planet!


Okta

Full Stack Java with React, Spring Boot, and JHipster

If you search for “Full Stack Java” on the internet, you’ll likely find a lot of recruiting, courses, and jobs. Being a full stack developer can be exciting because you can create the backend and frontend of an app all by yourself. There is business logic and algorithms as well as styling, making things look good, and securing everything. It also pays pretty well. Today, I’m going to show you how

If you search for “Full Stack Java” on the internet, you’ll likely find a lot of recruiting, courses, and jobs. Being a full stack developer can be exciting because you can create the backend and frontend of an app all by yourself. There is business logic and algorithms as well as styling, making things look good, and securing everything. It also pays pretty well. Today, I’m going to show you how you can be a full stack Java developer with Spring Boot, React, and JHipster.

Prerequisites:

Node.js 14+ Java 11+ Docker Compose

If you’re on Windows, you may need to install the Windows Subsystem for Linux for some commands to work.

I recommend using SDKMAN to manage your OpenJDK installations. Just run sdk install java 11.0.2-open to install Java 11 and sdk install java 17-open for Java 17.

This tutorial won’t provide the nitty-gritty details on how to write code in Java, React, or Spring Boot. That’s because JHipster will write most of the code for you! However, if you’re brand new to programming with these technologies, I recommend the following resources:

Oracle’s Learn Java Tutorials Spring Guides Tutorial: Intro to React

You can skip around between sections of this tutorial using the table of contents below.

Table of Contents

Full Stack Development with React and Spring Boot Get Started with JHipster 7 Verify Everything Works with Cypress and Keycloak Change Your Identity Provider to Auth0 Create an OpenID Connect App on Auth0 Run Your JHipster App with Auth0 Test Your Full Stack Java App with Cypress Create Entities to allow CRUD on Photos Add Image EXIF Processing in Your Spring Boot API Add a React Photo Gallery Make Your Full Stack Java App Into a PWA Deploy Your React + Spring Boot App to Heroku Configure for Auth0 and Analyze Your PWA Score with Lighthouse Learn More About Full Stack Java Development

You can also clone the completed example and following along that way.

git clone https://github.com/oktadev/auth0-full-stack-java-example Full Stack Development with React and Spring Boot

One of the easiest ways to get started with React is by using Create React App (CRA). You install it locally, then run create-react-app <project> to generate a React application with minimal dependencies. It uses webpack under-the-covers to build the project, launch a web server, and run its tests.

Spring Boot has a similar tool called Spring Initializr. Spring Initializer is a bit different than CRA because it’s a website (and API) that you can create applications with.

Today, I’ll show you how to build a Flickr clone with React and Spring Boot. However, I’m going to cheat. Rather than building everything using the aforementioned tools, I’m going to use JHipster. JHipster is an application generator that initially only supported Angular and Spring Boot. Now it supports Angular, React, and Vue for the frontend. JHipster also has support for Kotlin, Micronaut, Quarkus, .NET, and Node.js on the backend.

In this tutorial, we’ll use React since it seems to be the most popular frontend framework nowadays.

Get Started with JHipster 7

If you haven’t heard of JHipster, boy do I have a treat for you! JHipster started as a Yeoman application generator back in 2013 and has grown to become a development platform. It allows you to quickly generate, develop, and deploy modern web apps and microservice architectures. Today, I’ll show you how to build a Flickr clone with JHipster and lock it down with OAuth and OpenID Connect (OIDC).

To get started with JHipster, you’ll need a fast internet connection and Node.js installed. The project recommends you use the latest LTS (Long Term Support) version, which is 14.7.6 at the time of this writing. To run the app, you’ll need to have Java 11 installed. If you have Git installed, JHipster will auto-commit your project after creating it. This will allow you to upgrade between versions.

Run the following command to install JHipster:

npm i -g generator-jhipster@7

To create a full-stack app with JHipster, create a directory, and run jhipster in it:

mkdir full-stack-java cd full-stack-java jhipster

JHipster will prompt you for the type of application to create and what technologies you’d like to include. For this tutorial, make the following choices:

Question Answer Type of application? Monolithic application Name? flickr2 Spring WebFlux? No Java package name? com.auth0.flickr2 Type of authentication? OAuth 2.0 / OIDC Type of database? SQL Production database? PostgreSQL Development database? H2 with disk-based persistence Which cache? Ehcache Use Hibernate 2nd level cache? Yes Maven or Gradle? Maven Use the JHipster Registry? No Other technologies? <blank> Client framework? React Admin UI? Yes Bootswatch theme? United > Dark Enable i18n? Yes Native language of application? English Additional languages? Your choice! Additional testing frameworks? Cypress Install other generators? No

Press Enter and JHipster will create your app in the current directory and run npm install to install all the dependencies specified in package.json.

Verify Everything Works with Cypress and Keycloak

When you choose OAuth 2.0 and OIDC for authentication, the users are stored outside of the application rather than in it. You need to configure an identity provider (IdP) to store your users and allow your app to retrieve information about them. By default, JHipster ships with a Keycloak file for Docker Compose. A default set of users and groups is imported at startup, and it has a client registered for your JHipster app.

Here’s what the keycloak.yml looks like in your app’s src/main/docker directory:

# This configuration is intended for development purpose, it's **your** responsibility # to harden it for production version: '3.8' services: keycloak: image: jboss/keycloak:15.0.2 command: [ '-b', '0.0.0.0', '-Dkeycloak.migration.action=import', '-Dkeycloak.migration.provider=dir', '-Dkeycloak.migration.dir=/opt/jboss/keycloak/realm-config', '-Dkeycloak.migration.strategy=OVERWRITE_EXISTING', '-Djboss.socket.binding.port-offset=1000', '-Dkeycloak.profile.feature.upload_scripts=enabled', ] volumes: - ./realm-config:/opt/jboss/keycloak/realm-config environment: - KEYCLOAK_USER=admin - KEYCLOAK_PASSWORD=admin - DB_VENDOR=h2 # If you want to expose these ports outside your dev PC, # remove the "127.0.0.1:" prefix ports: - 127.0.0.1:9080:9080 - 127.0.0.1:9443:9443 - 127.0.0.1:10990:10990

Start Keycloak with the following command in your project’s root directory.

docker-compose -f src/main/docker/keycloak.yml up -d

You can verify everything works by starting your app with Maven:

./mvnw

Open another terminal to run your new app’s Cypress tests:

npm run e2e

You should see output like the following:

(Run Finished) Spec Tests Passing Failing Pending Skipped ┌────────────────────────────────────────────────────────────────────────────────────────────────┐ │ ✔ administration/administration.spec. 00:12 5 5 - - - │ │ ts │ └────────────────────────────────────────────────────────────────────────────────────────────────┘ ✔ All specs passed! 00:12 5 5 - - - Change Your Identity Provider to Auth0

JHipster uses Spring Security’s OAuth 2.0 and OIDC support to configure which IdP it uses. When using Spring Security with Spring Boot, you can configure most settings in a properties file. You can even override properties with environment variables.

To switch from Keycloak to Auth0, you only need to override the default properties (for Spring Security OAuth). You don’t even need to write any code!

To see how it works, create a .auth0.env file in the root of your project, and fill it with the code below to override the default OIDC settings:

export SPRING_SECURITY_OAUTH2_CLIENT_PROVIDER_OIDC_ISSUER_URI=https://<your-auth0-domain>/ export SPRING_SECURITY_OAUTH2_CLIENT_REGISTRATION_OIDC_CLIENT_ID=<your-client-id> export SPRING_SECURITY_OAUTH2_CLIENT_REGISTRATION_OIDC_CLIENT_SECRET=<your-client-secret> export JHIPSTER_SECURITY_OAUTH2_AUDIENCE=https://<your-auth0-domain>/api/v2/

WARNING: Modify your existing .gitignore file to have *.env so you don’t accidentally check in your secrets!

You’ll need to create a new web application in Auth0 and fill in the <...> placeholders before this works.

Create an OpenID Connect App on Auth0

Log in to your Auth0 account (or sign up if you don’t have an account). You should have a unique domain like dev-xxx.eu.auth0.com.

Press the Create Application button in Applications section. Use a name like JHipster Baby!, select Regular Web Applications, and click Create.

Switch to the Settings tab and configure your application settings:

Allowed Callback URLs: http://localhost:8080/login/oauth2/code/oidc Allowed Logout URLs: http://localhost:8080/

Scroll to the bottom and click Save Changes.

In the roles section, create new roles named ROLE_ADMIN and ROLE_USER.

Create a new user account in the users section. Click on the Role tab to assign the roles you just created to the new account.

Make sure your new user’s email is verified before attempting to log in!

Next, head to Auth Pipeline > Rules > Create. Select the Empty rule template. Provide a meaningful name like Group claims and replace the Script content with the following.

function(user, context, callback) { user.preferred_username = user.email; const roles = (context.authorization || {}).roles; function prepareCustomClaimKey(claim) { return `https://www.jhipster.tech/${claim}`; } const rolesClaim = prepareCustomClaimKey('roles'); if (context.idToken) { context.idToken[rolesClaim] = roles; } if (context.accessToken) { context.accessToken[rolesClaim] = roles; } callback(null, user, context); }

This code is adding the user’s roles to a custom claim (prefixed with https://www.jhipster.tech/roles). This claim is mapped to Spring Security authorities in SecurityUtils.java.

public static List<GrantedAuthority> extractAuthorityFromClaims(Map<String, Object> claims) { return mapRolesToGrantedAuthorities(getRolesFromClaims(claims)); } @SuppressWarnings("unchecked") private static Collection<String> getRolesFromClaims(Map<String, Object> claims) { return (Collection<String>) claims.getOrDefault( "groups", claims.getOrDefault("roles", claims.getOrDefault(CLAIMS_NAMESPACE + "roles", new ArrayList<>())) ); } private static List<GrantedAuthority> mapRolesToGrantedAuthorities(Collection<String> roles) { return roles.stream().filter(role -> role.startsWith("ROLE_")).map(SimpleGrantedAuthority::new).collect(Collectors.toList()); }

The SecurityConfiguration.java class has a bean that calls this method to configure a user’s roles from their OIDC data.

@Bean public GrantedAuthoritiesMapper userAuthoritiesMapper() { return authorities -> { Set<GrantedAuthority> mappedAuthorities = new HashSet<>(); authorities.forEach(authority -> { // Check for OidcUserAuthority because Spring Security 5.2 returns // each scope as a GrantedAuthority, which we don't care about. if (authority instanceof OidcUserAuthority) { OidcUserAuthority oidcUserAuthority = (OidcUserAuthority) authority; mappedAuthorities.addAll(SecurityUtils.extractAuthorityFromClaims(oidcUserAuthority.getUserInfo().getClaims())); } }); return mappedAuthorities; }; }

Click Save changes to continue.

NOTE: Want to have all these steps automated for you? Vote for this issue in the Auth0 CLI project.

Want to use Okta for your identity provider? That’s possible too! See JHipster’s documentation.

Run Your JHipster App with Auth0

Stop your JHipster app using Ctrl+C, set your Auth0 properties in .auth0.env, and start your app again.

source .auth0.env ./mvnw

Voilà - your full stack app is now using Auth0! Open your favorite browser to http://localhost:8080.

You should see your app’s homepage with a link to sign in. Click sign in and you’ll be redirected to Auth0 to log in.

After entering your credentials, you’ll be redirected back to your app.

Test Your Full Stack Java App with Cypress

JHipster has Auth0 support built-in, so you can specify your credentials for Cypress tests and automate your UI testing!

To do this, open a new terminal window, specify the credentials for the Auth0 user you just created and run npm run e2e.

export CYPRESS_E2E_USERNAME=<new-username> export CYPRESS_E2E_PASSWORD=<new-password> npm run e2e

TIP: If you want to use a .env file for your environment variables, you can use cypress-dotenv. You can also put these values in cypress.json, but since this file will be in source control, it’s a bad practice to put your secrets in it.

Everything should pass in around a minute.

Spec Tests Passing Failing Pending Skipped ┌────────────────────────────────────────────────────────────────────────────────────────────────┐ │ ✔ administration/administration.spec. 00:31 5 5 - - - │ │ ts │ └────────────────────────────────────────────────────────────────────────────────────────────────┘ ✔ All specs passed! 00:31 5 5 - - - Execution time: 44 s.

Shut down the process running your JHipster app - it’s time to create some data handling for your Flickr clone!

Create Entities to allow CRUD on Photos

I’ve talked a lot about how to secure your application, but we haven’t done anything with photos! JHipster has a JDL (JHipster Domain Language) feature that allows you to model the data in your app, and generate entities from it. You can use the JDL Studio to do this online and save it locally once you’ve finished.

My data model for this app has Album, Photo, and Tag entities and sets up relationships between them. Below is a screenshot of what it looks like in JDL Studio.

Copy the JDL below and save it in a flickr2.jdl file in the root directory of your project.

entity Album { title String required description TextBlob created Instant } entity Photo { title String required description TextBlob image ImageBlob required height Integer width Integer taken Instant uploaded Instant } entity Tag { name String required minlength(2) } relationship ManyToOne { Album{user(login)} to User Photo{album(title)} to Album } relationship ManyToMany { Photo{tag(name)} to Tag{photo} } paginate Album with pagination paginate Photo, Tag with infinite-scroll

You can generate entities and CRUD code (Java for Spring Boot; TypeScript and JSX for React) by using the following command:

jhipster jdl flickr2.jdl

When prompted, type a to allow overwriting of existing files.

This process will create Liquibase changelog files (to create your database tables), entities, repositories, Spring MVC controllers, and all the React code necessary to create, read, update, and delete your entities. It’ll even generate JUnit unit tests, Jest unit tests, and Cypress end-to-end tests!

After the process completes, you can restart your app, log in, and browse through the Entities menu. Try adding some data to confirm everything works.

By now, you can see that JHipster is pretty powerful. It recognized that you had an image property of ImageBlob type and created the logic necessary to upload and store images in your database! Booyah!

Add Image EXIF Processing in Your Spring Boot API

The Photo entity has a few properties that can be calculated by reading the uploaded photo’s EXIF (Exchangeable Image File Format) data. You might ask, how do you do that in Java?

Thankfully, Drew Noakes created a metadata-extractor library to do just that. Add a dependency on Drew’s library to your pom.xml:

<dependency> <groupId>com.drewnoakes</groupId> <artifactId>metadata-extractor</artifactId> <version>2.16.0</version> </dependency>

Then modify the PhotoResource#createPhoto() method to set the metadata when an image is uploaded.

import com.drew.imaging.ImageMetadataReader; import com.drew.imaging.ImageProcessingException; import com.drew.metadata.Metadata; import com.drew.metadata.MetadataException; import com.drew.metadata.exif.ExifSubIFDDirectory; import com.drew.metadata.jpeg.JpegDirectory; import javax.xml.bind.DatatypeConverter; import java.io.BufferedInputStream; import java.io.ByteArrayInputStream; import java.io.IOException; import java.io.InputStream; import java.time.Instant; import java.util.Date; public class PhotoResource { ... public ResponseEntity<Photo> createPhoto(@Valid @RequestBody Photo photo) throws Exception { log.debug("REST request to save Photo : {}", photo); if (photo.getId() != null) { throw new BadRequestAlertException("A new photo cannot already have an ID", ENTITY_NAME, "idexists"); } try { photo = setMetadata(photo); } catch (ImageProcessingException ipe) { log.error(ipe.getMessage()); } Photo result = photoRepository.save(photo); return ResponseEntity .created(new URI("/api/photos/" + result.getId())) .headers(HeaderUtil.createEntityCreationAlert(applicationName, true, ENTITY_NAME, result.getId().toString())) .body(result); } private Photo setMetadata(Photo photo) throws ImageProcessingException, IOException, MetadataException { String str = DatatypeConverter.printBase64Binary(photo.getImage()); byte[] data2 = DatatypeConverter.parseBase64Binary(str); InputStream inputStream = new ByteArrayInputStream(data2); BufferedInputStream bis = new BufferedInputStream(inputStream); Metadata metadata = ImageMetadataReader.readMetadata(bis); ExifSubIFDDirectory directory = metadata.getFirstDirectoryOfType(ExifSubIFDDirectory.class); if (directory != null) { Date date = directory.getDateDigitized(); if (date != null) { photo.setTaken(date.toInstant()); } } if (photo.getTaken() == null) { log.debug("Photo EXIF date digitized not available, setting taken on date to now..."); photo.setTaken(Instant.now()); } photo.setUploaded(Instant.now()); JpegDirectory jpgDirectory = metadata.getFirstDirectoryOfType(JpegDirectory.class); if (jpgDirectory != null) { photo.setHeight(jpgDirectory.getImageHeight()); photo.setWidth(jpgDirectory.getImageWidth()); } return photo; } ... }

Since you’re extracting the information, you can remove the fields from the UI and tests so the user cannot set these values.

In src/main/webapp/app/entities/photo/photo-update.tsx, hide the metadata so users can’t edit it. Rather than displaying the height, width, taken, and uploaded values, hide them. You can do this by searching for photo-height, grabbing the elements (and its following three elements) and adding them to a metadata constant just after defaultValues() lambda function.

const defaultValues = () => ... const metadata = ( <div> <ValidatedField label={translate('flickr2App.photo.height')} id="photo-height" name="height" data-cy="height" type="text" /> <ValidatedField label={translate('flickr2App.photo.width')} id="photo-width" name="width" data-cy="width" type="text" /> <ValidatedField label={translate('flickr2App.photo.taken')} id="photo-taken" name="taken" data-cy="taken" type="datetime-local" placeholder="YYYY-MM-DD HH:mm" /> <ValidatedField label={translate('flickr2App.photo.uploaded')} id="photo-uploaded" name="uploaded" data-cy="uploaded" type="datetime-local" placeholder="YYYY-MM-DD HH:mm" /> </div> ); const metadataRows = isNew ? '' : metadata; return ( ... );

Then, in the return block, remove the JSX between the image property and album property and replace it with {metadataRows}.

<ValidatedBlobField label={translate('flickr2App.photo.image')} id="photo-image" name="image" data-cy="image" isImage accept="image/*" validate={{ required: { value: true, message: translate('entity.validation.required') }, }} /> {metadataRows} <ValidatedField id="photo-album" name="albumId" data-cy="album" label={translate('flickr2App.photo.album')} type="select"> <option value="" key="0" /> {albums ? albums.map(otherEntity => ( <option value={otherEntity.id} key={otherEntity.id}> {otherEntity.title} </option> )) : null} </ValidatedField>

In src/test/javascript/cypress/integration/entity/photo.spec.ts, remove the code that sets the data in these fields:

cy.get(`[data-cy="height"]`).type('99459').should('have.value', '99459'); cy.get(`[data-cy="width"]`).type('61514').should('have.value', '61514'); cy.get(`[data-cy="taken"]`).type('2021-10-11T16:46').should('have.value', '2021-10-11T16:46'); cy.get(`[data-cy="uploaded"]`).type('2021-10-11T15:23').should('have.value', '2021-10-11T15:23'););

Stop your Maven process, run source .auth0.env, then ./mvwn again. Open a new terminal window, set your Auth0 credentials, and run npm run e2e to make sure everything still works.

export CYPRESS_E2E_USERNAME=<auth0-username> export CYPRESS_E2E_PASSWORD=<auth0-password> npm run e2e

NOTE: If you experience authentication errors in your Cypress tests, it’s likely because you’ve violated Auth0’s Rate Limit Policy. As a workaround, I recommend you use Keycloak for Cypress tests. You can do this by opening a new terminal window and starting your app there using ./mvnw. Then, open a second terminal window and run npm run e2e.

If you upload an image you took with your smartphone, the height, width, and taken values should all be populated. If they’re not, chances are your image doesn’t have the data in it.

Need some sample photos with EXIF data? You can download pictures of my 1966 VW Bus from an album on Flickr.

Add a React Photo Gallery

You’ve added metadata extraction to your backend, but your photos still display in a list rather than in a grid (like Flickr). To fix that, you can use the React Photo Gallery component. Install it using npm:

npm i react-photo-gallery@8

In src/main/webapp/app/entities/photo/photo.tsx, add an import for Gallery:

import Gallery from 'react-photo-gallery';

Then add the following just after const { match } = props;. This adds the photos to a set with source, height, and width information.

const photoSet = photoList.map(photo => ({ src: `data:${photo.imageContentType};base64,${photo.image}`, width: photo.height > photo.width ? 3 : photo.height === photo.width ? 1 : 4, height: photo.height > photo.width ? 4 : photo.height === photo.width ? 1 : 3 }));

Next, add a <Gallery> component right after the closing </h2>.

return ( <div> <h2 id="photo-heading" data-cy="PhotoHeading"> ... </h2> <Gallery photos={photoSet} /> ... );

Save all your changes and restart your app.

source .auth0.env ./mvnw

Log in and navigate to Entities > Photo in the top nav bar. You will see a plethora of photos loaded by Liquibase and faker.js. To make a clean screenshot without this data, I modified src/main/resources/config/application-dev.yml to remove the “faker” context for Liquibase.

liquibase: # Append ', faker' to the line below if you want sample data to be loaded automatically contexts: dev

Stop your Spring Boot backend and run rm -r target/h2db to clear out your database (or just delete the target/h2db directory). Restart your backend.

Now you should be able to upload photos and see the results in a nice grid at the top of the list.

You can also add a “lightbox” feature to the grid so you can click on photos and zoom in. The React Photo Gallery docs shows how to do this. I’ve integrated it into the example for this post, but I won’t show the code here for the sake of brevity. You can see the final photo.tsx with Lightbox added on GitHub or a diff of the necessary changes.

Make Your Full Stack Java App Into a PWA

Progressive Web Apps, aka PWAs, are the best way for developers to make their webapps load faster and more performant. In a nutshell, PWAs are websites that use recent web standards to allow for installation on a user’s computer or device, and deliver an app-like experience to those users. To make a web app into a PWA:

Your app must be served over HTTPS Your app must register a service worker so it can cache requests and work offline Your app must have a webapp manifest with installation information and icons

For HTTPS, you can set up a certificate for localhost or (even better), deploy it to production! Cloud providers like Heroku will provide you with HTTPS out-of-the-box, but they won’t force HTTPS. To force HTTPS, open src/main/java/com/auth0/flickr2/config/SecurityConfiguration.java and add a rule to force a secure channel when an X-Forwarded-Proto header is sent.

@Override protected void configure(HttpSecurity http) throws Exception { http ... .and() .frameOptions() .deny() .and() .requiresChannel() .requestMatchers(r -> r.getHeader("X-Forwarded-Proto") != null) .requiresSecure() .and() .authorizeRequests() ... }

The workbox-webpack-plugin is configured already for generating a service worker, but it only works when running your app with a production profile. This is nice because it means your data isn’t cached in the browser when you’re developing.

To register a service worker, open src/main/webapp/index.html and uncomment the following block of code.

<script> if ('serviceWorker' in navigator) { window.addEventListener('load', function () { navigator.serviceWorker.register('/service-worker.js').then(function () { console.log('Service Worker Registered'); }); }); } </script>

The final feature — a webapp manifest — is included at src/main/webapp/manifest.webapp. It defines an app name, colors, and icons. You might want to adjust these to fit your app.

Deploy Your React + Spring Boot App to Heroku

To deploy your app to Heroku, you’ll first need to install the Heroku CLI. You can confirm it’s installed by running heroku --version.

If you don’t have a Heroku account, go to heroku.com and sign up. Don’t worry, it’s free, and chances are you’ll love the experience.

Run heroku login to log in to your account, then start the deployment process with JHipster:

jhipster heroku

This will start the Heroku sub-generator that asks you a couple of questions about your app: what you want to name it and whether you want to deploy it to a US region or EU. Then it’ll prompt you to choose between building locally or with Git on Heroku’s servers. Choose Git, so you don’t have to upload a fat JAR. When prompted to use Okta for OIDC, select No. Then, the deployment process will begin.

You’ll be prompted to overwrite pom.xml. Type a to allow overwriting all files.

If you have a stable and fast internet connection, your app should be live on the internet in around six minutes!

remote: -----> Compressing... remote: Done: 120.9M remote: -----> Launching... remote: Released v7 remote: https://flickr-2.herokuapp.com/ deployed to Heroku remote: remote: Verifying deploy... done. To https://git.heroku.com/flickr-2.git * [new branch] HEAD -> main Your app should now be live. To view it run heroku open And you can view the logs with this command heroku logs --tail After application modification, redeploy it with jhipster heroku Congratulations, JHipster execution is complete! Sponsored with ❤️ by @oktadev. Execution time: 6 min. 19 s. Configure for Auth0 and Analyze Your PWA Score with Lighthouse

To configure your app to work with Auth0 on Heroku, run the following command to set your Auth0 variables on Heroku.

heroku config:set \ SPRING_SECURITY_OAUTH2_CLIENT_PROVIDER_OIDC_ISSUER_URI="https://<your-auth0-domain>/" \ SPRING_SECURITY_OAUTH2_CLIENT_REGISTRATION_OIDC_CLIENT_ID="<your-client-id>" \ SPRING_SECURITY_OAUTH2_CLIENT_REGISTRATION_OIDC_CLIENT_SECRET="<your-client-secret>" \ JHIPSTER_SECURITY_OAUTH2_AUDIENCE="https://<your-auth0-domain>/api/v2/"

Then, log in to your Auth0 account, navigate to your app, and add your Heroku URLs as valid redirect URIs:

Allowed Callback URLs: https://flickr-2.herokuapp.com/login/oauth2/code/oidc Allowed Logout URLs: https://flickr-2.herokuapp.com

After Heroku restarts your app, open it with heroku open, and log in.

Then, test it with Lighthouse (using the Lighthouse tab in Chrome developer tools). Looks pretty good, eh?! 💯

It’s pretty darn secure too, at least according to securityheaders.com.

Learn More About Full Stack Java Development

This tutorial shows you how to streamline full-stack Java development with JHipster. You developed a working application with a React frontend and a Spring Boot backend. You can find the app created in this tutorial on GitHub, in the auth0-full-stack-java-example repository.

You might also enjoy these related blog posts:

Learning Java as a First Language Reactive Java Microservices with Spring Boot and JHipster Build and Secure an API with Spring Boot and Kotlin The Complete Guide to React User Authentication with Auth0

To see when we publish more developer topics on Auth0 and the Okta developer blog, follow Auth0 and OktaDev on Twitter.

Sunday, 21. November 2021

KuppingerCole

Analyst Chat #103: Data-Centric Security

Lead analyst Alexei Balaganski joins Matthias for an episode on Data-Centric Security. Starting with a definition behind that term, they look at relevant technologies and market segments and discuss adequate ways of adding Data-Centric Security to an organization's cybersecurity strategy.

Lead analyst Alexei Balaganski joins Matthias for an episode on Data-Centric Security. Starting with a definition behind that term, they look at relevant technologies and market segments and discuss adequate ways of adding Data-Centric Security to an organization's cybersecurity strategy.




Ockto

Blog: Wat is digitale identiteit en hoe check je die van je klanten?

Banken en hypotheekverstrekkers zijn verplicht om de identiteit van hun klanten te controleren. Dit geldt tijdens de onboarding van nieuwe klanten, maar ook voor bestaande klanten. Maar wat betekent identiteit in deze context? Wat verstaan we onder digitale identiteit? En hoe controleer je die van je klanten op een veilige en eenvoudige manier? Ilyan Tonneman, productspecialist The post Blo

Banken en hypotheekverstrekkers zijn verplicht om de identiteit van hun klanten te controleren. Dit geldt tijdens de onboarding van nieuwe klanten, maar ook voor bestaande klanten. Maar wat betekent identiteit in deze context? Wat verstaan we onder digitale identiteit? En hoe controleer je die van je klanten op een veilige en eenvoudige manier? Ilyan Tonneman, productspecialist bij Ockto, legt uit.

Lees het hele blog hier

The post Blog: Wat is digitale identiteit en hoe check je die van je klanten? appeared first on Ockto.

Friday, 19. November 2021

IdRamp

Dr Zero Trust Podcast – IdRamp Self Sovereign ID for consumer and business

DrZeroTrust podcast host Chase Cunningham talks with Mike Vesey, CEO and President of IdRamp, about the state of digital identity and the field of self-sovereign identity (SSI), verifiable credentials, password elimination, identity orchestration, and Zero Trust. The post Dr Zero Trust Podcast – IdRamp Self Sovereign ID for consumer and business first appeared on IdRamp | Decentralized Identity E

DrZeroTrust podcast host Chase Cunningham talks with Mike Vesey, CEO and President of IdRamp, about the state of digital identity and the field of self-sovereign identity (SSI), verifiable credentials, password elimination, identity orchestration, and Zero Trust.

The post Dr Zero Trust Podcast – IdRamp Self Sovereign ID for consumer and business first appeared on IdRamp | Decentralized Identity Evolution.

Finicity

With Great Open Banking Innovation Comes Great Responsibility for Consumer Data

Mastercard’s EVP of Technology Development, New Digital Infrastructure & Fintech Bob Schukai lays out the landscape of emerging data privacy technologies in the Mastercard Developers portfolio of programs. Next-gen Privacy Enhancing Technologies like data masking, homomorphic encryption and differential privacy create the secure environment that powers new open banking innovation. Read more he

Mastercard’s EVP of Technology Development, New Digital Infrastructure & Fintech Bob Schukai lays out the landscape of emerging data privacy technologies in the Mastercard Developers portfolio of programs. Next-gen Privacy Enhancing Technologies like data masking, homomorphic encryption and differential privacy create the secure environment that powers new open banking innovation.

Read more here.

The post With Great Open Banking Innovation Comes Great Responsibility for Consumer Data appeared first on Finicity.


auth0

.NET 6 Highlights

What's new in .NET 6? What are the main relevant features brought by the new version of the .NET platform? Let's take a quick look.
What's new in .NET 6? What are the main relevant features brought by the new version of the .NET platform? Let's take a quick look.

KuppingerCole

Dec 20, 2021: Identity & Access Management Predictions 2022

Increased remote working, a dramatically increased digital customer interaction landscape, the hyperconnected industry 4.0 enterprise, an increasingly complex multi-cloud multi-hybrid infrastructure - much of what we based our past strategic assumptions on has developed faster and with a different emphasis.
Increased remote working, a dramatically increased digital customer interaction landscape, the hyperconnected industry 4.0 enterprise, an increasingly complex multi-cloud multi-hybrid infrastructure - much of what we based our past strategic assumptions on has developed faster and with a different emphasis.

Northern Block

Turning the Web’s Data Layer into a Public Utility (with Lauren Feld)

 Listen to this Episode On Spotify Listen to this Episode On Apple Podcasts Filling holes in the web3 stack This was a very fun and interesting conversation with Lauren Feld, Head of Growth at 3Box Labs, a company building the Ceramic Network. The Ceramic Network in my opinion is one the most exciting projects […] The post <strong>Turning the Web’s Data Layer into a Public Utility</st

Listen to this Episode On Spotify

Listen to this Episode On Apple Podcasts

Filling holes in the web3 stack

This was a very fun and interesting conversation with Lauren Feld, Head of Growth at 3Box Labs, a company building the Ceramic Network.

The Ceramic Network in my opinion is one the most exciting projects in the web3 space. Ceramic is a decentralized, open source platform for creating, hosting, and sharing streams of data.

This is interesting to consider in a decentralized identity context. As we all know, we leave massive traces of ourselves in the digital world. The products that have enabled user generated content in the web2 world have dramatically increased the volume of data we leave behind. If this data is valuable, which social media companies can attest is true, then how could this data be returned to the rightful generator/owner of it. How can it also be made portable across different applications?

On this podcast we often talk about Verifiable Credentials and recently a bit more about government issued digital IDs. I hope this conversation gives listeners some excitement about what’s now being made possible with some exciting bottom-up approaches and how turning the data layer of applications into a public utility is the logical evolution of the web.

About Episode
During this conversation, we discuss:

What excites Lauren about web3 applications? What is the pulse on DAOs to incorporate Decentralized ID into them? The importance of Mutability An overview of Decentralized Data Storage Ecosystems, in particular IPFS, one of first protocols in the web3 space What makes Data Composability important for open data layers? How to go about building Distributed Data Models? Key considerations when Selling to Developers rather than to enterprises How to think about Verifiable Credentials in a context of your online data Some Exciting Use Cases happening using Ceramic (you can find more use cases here: https://blog.ceramic.network/) Can older business models use Ceramic to decentralize their data layer?

 

About Guest

Lauren Feld, Head of Growth 3Box Labs, building The Ceramic Network


You can find Lauren on Twitter here: https://twitter.com/laurenfeld629; and on LinkedIn here: https://www.linkedin.com/in/lauren-feld-5b04249b/.

 

The post <strong>Turning the Web’s Data Layer into a Public Utility</strong> (with Lauren Feld) appeared first on Northern Block | Self Sovereign Identity Solution Provider.


Dock

The Growing Team at Dock

With business going well and moving at a fast pace, Dock went on the search for great talent to help achieve their goals. Looking for like-minded people who were a perfect fit for the team and had exceptional skills in their chosen field, Dock was able to fill the roles of Project Manager and Cryptographic Advisor.

With business going well and moving at a fast pace, Dock went on the search for great talent to help achieve their goals. Looking for like-minded people who were a perfect fit for the team and had exceptional skills in their chosen field, Dock was able to fill the roles of Project Manager and Cryptographic Advisor.

We’re pleased to introduce:

Adil Javed - Project Manager
Errol Drummond - Cryptographic Advisor

Joining at a crucial time as Dock reaches a busy point in it's development roadmap, Errol and Adil jumped straight into the on-going projects, helping out with the final stages of upcoming launches.

Being in the centre of the crypto world for the best part of 13 months, Errol came from a background of researching zero knowledge proofs as an Applied Cryptographer. His focus was specifically on PLONK and how it could be used to achieve recursion for scalability. Errol joined Dock as a Cryptographic Advisor mid-September and helped review the implementations of the signatures and accumulator schemes. With two months of exposure to Verifiable Credentials, he is now researching new avenues for Dock in verifiable encryption.

Our Project Manager, Adil, worked with several custom development teams for almost 6 years as an Agile Project Manager and JIRA Administrator. His previous role prior to joining Dock consisted of working for a Bank in the US, offering crypto services to its commercial and retail customers. Adil has now been a part of the Dock team for over 2 months as a Project Manager, working closely with the development team on the planning and execution of the roadmap, while ensuring key agile practices.

If you’d like to join the Dock team, you’re in luck! Our growing company is hiring for a Rust/Substrate Blockchain Developer. If you think you’d be a great fit for the role, apply here, we'd love to speak with you!


Ontology

Ontology Harbinger Interview Series: Geoff

This is an ongoing series featuring Ontology’s Harbingers. Harbingers are exceptional leaders that help Ontology grow its community and ecosystem, making it an ever-stronger blockchain, and decentralized identity and data leader. In the 13th interview in this series, Ontology speaks with Geoff Richards, administrator of our English and Wing DAO communities. 1. How did you hear about Ontolog
This is an ongoing series featuring Ontology’s Harbingers. Harbingers are exceptional leaders that help Ontology grow its community and ecosystem, making it an ever-stronger blockchain, and decentralized identity and data leader.

In the 13th interview in this series, Ontology speaks with Geoff Richards, administrator of our English and Wing DAO communities.

1. How did you hear about Ontology? What drew you to Ontology?

I was initially drawn to the staking opportunities provided by Ontology. I was reading about staking and right in front of me was this established project, with a clear vision for the future, and excellent rewards for people backing the vision.

2. Why did you become a supporter of Ontology and a champion of its brand?

I never needed to ask, ‘Why Ontology?’. The team has identified a clear need for solutions around data and identity. The current and future requirement for decentralized, trustless solutions to data and identity security is without question. As more projects launch in the Web3 space, this need only becomes greater. So, for me, Ontology is an enabler; a solution that will make other projects better. It’s not about competing in the Web3 space, it’s about making the experience better and more secure for everyone involved.

3. What’s the key role of a Harbinger? What’s your favorite thing about being a Harbinger?

I’m a huge fan of the community around Ontology. If you look back at previous Harbinger interviews, all these people have answered my questions, solved my confusions, and generally made me feel welcome in the space. I hope I do the same for others.

I like to be the first to receive information. And the opportunity to do what I like, which is helping people! Although, I began doing this long before I became Harbinger.

4. Why is being part of the Ontology community important to you?

At times, the crypto space can feel a little like the Wild West. There are bad actors and people looking to take advantage of new users. A strong community is our best solution to this problem.

5. How is Ontology’s community different from other blockchain communities, is there anything that makes it stand out?

If you hang around the Telegram channel for any amount of time, you’ll see people helping by sharing their own experiences. We have regular calls to discuss the project, as well as the Web3 and blockchain space in general. I honestly don’t know of another community that engages with its members in such a way. If you have a question, a problem, an idea, or a solution, then there is always an opportunity to be heard.

6. What do you use as your key channels for engagement with the Ontology community and why? Would you like to see any others?

I mainly hang out in the Telegram rooms; I guess it’s become my natural environment. However, I’ve recently spent more time on Discord, where there are some excellent opportunities to share ideas. We even have dedicated channels to throw your ideas around in. Rather than seeing other channels, I’d really like to see the Discord community grow.

7. Can you share a memorable experience or something you’ve learned from being a Harbinger? What advice would you give to someone looking to become a Harbinger?

Being a Harbinger means that you really believe in the aims and goals of the project. If you want to be a Harbinger, the first step is to be a positive force in the community. Understand what Ontology is about and share that understanding.

8. How would you describe the Ontology community in three words?

Altruistic, Thoughtful, Passionate.

9. How do you think Ontology could expand its community going forward? What would you like to see more/less of? What kinds of things do you see community members do that you think help our community grow?

The answer to all these questions is the same. I’d like to see more opportunities to use ONT ID, and for the community to tell people that they are using it.

10. What do you see as the key milestones for Ontology and how can the community help with achieving these?

Ontology has a fantastic vision for the future. The technology is excellent, and the community is supportive. Next is the expansion of dApps on the ecosystem, and people using the opportunities Ontology provides to be creative. With the upcoming EVM launch, this feels more achievable than ever. Once that happens, the community can help by using the things that people build and telling everyone how cool they are.

To learn more about Ontology’s Harbinger Program and how you can get involved, check out our updated GUIDE.

Want more Ontology?

Learn more about our decentralized data and identity solutions on our website and official Twitter account. You can also chat with us on Telegram and keep up-to-date with the latest news via our Telegram Announcement account.

Ontology Harbinger Interview Series: Geoff was originally published in OntologyNetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


Europechain

NFTs For The Gaming Industry

When it comes to tokenized gaming, the possibilities are endless. In this article we discuss how NFTs are transforming the gaming industry.

Gaming is Big (yes, with a capital B) business. In 2020, the videogame industry was worth almost $160bn. To put this figure into perspective, the music industry was worth just under $62bn in the same year, and the global film industry was an estimated $136bn in 2018. People love gaming, you see, and gaming they do, in their millions, every day. By the end of 2020 for example, Xbox Live had over...

Source


SWN Global

New Listing: AAX Exchange

Dear MetaMUI community, We are delighted to announce that MMUI will be listed on AAX exchange next Monday with MMUI/USDT trading pair. Listing Time: Time of opening deposit: 12:00 (UTC+8) on Nov 22, 2021 Time of opening withdrawal: 17:00 (UTC+8) on Nov 23, 2021 Time of opening trading: 17:00 (UTC+8) on Nov 22 2021 We are doing our best and keep working on introducing and listing MetaM

Dear MetaMUI community,

We are delighted to announce that MMUI will be listed on AAX exchange next Monday with MMUI/USDT trading pair.

Listing Time:
Time of opening deposit: 12:00 (UTC+8) on Nov 22, 2021
Time of opening withdrawal: 17:00 (UTC+8) on Nov 23, 2021
Time of opening trading: 17:00 (UTC+8) on Nov 22 2021

We are doing our best and keep working on introducing and listing MetaMUI all around the world. We always appreciate your support and interest in our project.

Thank you.

About AAX Exchange

AAX Exchange was launched on 16 September, 2019. AAX is a centralized exchange with offices in Europe and Asia. It claims to be the first cryptocurrency exchange to be powered by London Stock Exchange Group’s LSEG Technology. Currently, AAX Exchange has more than 2 million registered users, 100k daily active users, 1 million social media users and 1 billion daily trading volume. AAX Exchange is the top 50 exchange among other crypto exchanges on the CoinMarketCap and reaches $2 billion trading volume as of today.


Okta

Getting to Know GooseClip: Interview with an Okta Hackathon Winner

Okta Early Access Hackathon revisited In August, Okta’s developer relations team invited intrepid developers to participate in the virtual Okta Identity Engine Early Access Hackathon, and challenged them to build a working app with our limited availability new customer identity and access management (CIAM) platform. A month or so after, judges convened, winners were announced, and thousands of
Okta Early Access Hackathon revisited

In August, Okta’s developer relations team invited intrepid developers to participate in the virtual Okta Identity Engine Early Access Hackathon, and challenged them to build a working app with our limited availability new customer identity and access management (CIAM) platform. A month or so after, judges convened, winners were announced, and thousands of dollars in prizes were distributed. Kudos to hundreds of participants, and props to all involved.

In October, we sat down with UK-based developer Matthew McKenzie, the creator of GooseClip, our first prize winner.

Introducing peer-to-peer GooseClip

GooseClip is an authenticated peer-to-peer communication platform, rooted in the Go programming language, and inspired by “a frustration at the lack of interoperability of our modern devices.” As Matt describes it, “GooseClip obscures the complexity of peer-to-peer networking by presenting a simple 2-route API, /attach and /connect.” This becomes the base upon which he builds various example mini-products, which demonstrate the versatility and simplicity of the underlying p2p platform.

Developer advocates Heather Downing and Brian Demers spoke with Matt about peer-to-peer technology, his vision for GooseClip, and his experience hacking Okta and building auth. Matt shared some insights about building leading edge applications and launching new tech products as an independent developer and technical founder.

Stay in touch with OktaDev

If you enjoyed this video interview, be sure to subscribe to the OktaDev YouTube channel! Got questions or constructive comments? Feel free to drop us a comment below. You may also want to stay in touch by following @oktadev on twitter, OktaDev on Twitch, and Okta for Developers on LinkedIn.

Thursday, 18. November 2021

Shyft Network

Tether Begins Testing and Integration of Veriscope, Shyft Network’s Solution to the Travel Rule

Leading stablecoin commences active testing of the public utility and application stack for solving the Financial Action Task Force (FATF) Travel Rule. British Virgin Islands, November 18, 2021, 12:00 PM BST — Tether Operations Limited (“Tether”), the company operating the blockchain-enabled platform tether.to, that powers the largest stablecoin by market capitalization, announced today that
Leading stablecoin commences active testing of the public utility and application stack for solving the Financial Action Task Force (FATF) Travel Rule.

British Virgin Islands, November 18, 2021, 12:00 PM BST — Tether Operations Limited (“Tether”), the company operating the blockchain-enabled platform tether.to, that powers the largest stablecoin by market capitalization, announced today that it has commenced operations with Shyft Network starting with active testing of Veriscope, its decentralized compliance framework and smart-contract solution to the Financial Action Task Force’s (FATF) Travel Rule.

Veriscope links user consent-permissioning with VASP-to-VASP data transmission and ensures VASPs can determine between honest transactions and data attacks. It was designed to act as a decentralized coordination and discovery system, open for any VASP or intermediary as a public utility for data attestation and routing. The platform provides a decentralized compliance framework and a smart contract platform for VASPs to enable Travel Rule compliance and aims to meet meets the growing demands of the rising regulatory efforts that have commanded attention and action across cryptocurrency, DeFi, NFTs, stablecoins, and many other elements of blockchain technology.

This integration marks the initial phases of Tethers’ trial of Veriscope which may allow Tether to offer its customers an experience that both promotes privacy while also solving global compliance requirements for all participants across the ecosystem. The goal of this trial is to create an experience for customers that maintains openness and ensures peer-to-peer transaction discovery that is compliant with the new FATF Travel Rule requirement.

“We built Shyft to ensure that the ethos of digital asset networks was maintained regardless of the regulatory requirements that would come,” said Joseph W. of Shyft Network. “We are excited to see this public system be put to work by the largest players globally, and are proud to see leading stablecoins, like Tether, maintain decentralization while allowing the ecosystem to meet regulations. We see systems like Veriscope, and networks like Shyft, as critical infrastructure layers to the future of decentralized data coordination and transmission.”

In August of this year, Shyft Network, in collaboration with Tether, Bitfinex and other exchanges, key industry players, and liquidity providers announced the global deployment of Veriscope, a public utility and application stack for solving the Financial Action Task Force (FATF) Travel Rule. Just a few days ago, Shyft Core, the development team behind Veriscope, announced the open-source release of the infrastructure to enable developers and other VASPs to freely integrate with the platform, Tether will be one of the first to put this infrastructure to the test.

“Veriscope’s opensource solution to discovering VASPs and transmitting customer information is an interesting use case that’s in line with the ethos of Bitcoin” said, Leonardo Real, CCO of Tether. We look forward to continuing to lead the charge”.

To learn more about Tether, please visit, https://tether.to/.

About Shyft Network

The Shyft Network aggregates and embeds trust into data stored on public and private ecosystems, allowing an opt-in compliance layer across all systems. The key pillar for Shyft is user consent, allowing users to track the usage of their data. Therefore, no one can use personal data without consent from the owner. Shift Network allows and gives incentives to individuals and enterprises to work together to add context to data, unlocking the ability to build authentic digital reputation, identity, and credibility frameworks.

Website / Telegram / Twitter / Medium / Discord

About Tether

Tether is the preeminent stablecoin with the biggest market capitalization, surpassing that of all rival offerings combined. Created in October 2014, Tether has grown to become the most traded cryptocurrency. Tether is disrupting the legacy financial system by offering a more modern approach to money. By introducing fiat currency denominated-digital cash to the Bitcoin, Ethereum, EOS, Liquid Network, Omni, Tron, Algorand, and Solana blockchains, Tether makes a significant contribution to a more connected ecosystem. Tether combines digital currency benefits, such as instant global transactions, with traditional currency benefits, such as price stability. With a commitment to transparency and compliance, Tether is a fast and low-cost way to transact with money.


Tokeny Solutions

Tokeny’s Talent|Tony’s Story

The post Tokeny’s Talent|Tony’s Story appeared first on Tokeny Solutions.
Tony Malghem is Tech Lead at Tokeny Solutions.  Who are you?

Hello! I am Tony, 29, TechLead for Tokeny. I graduated as a Software Engineer from Université de Technologie de Compiègne in France. After spending some time in Paris and discovering the start-up world, I followed my girlfriend to Luxembourg when she landed a more interesting job in one of the many banks here 🙂

How did you land at Tokeny Solutions?

I absolutely loved the job I had in Paris in the startup. The pressure, the smaller team, the « family business » kind of feeling. When I moved to Luxembourg, I decided to try something different, but I was missing all of this too much. I lost myself working in banks and it got too much. One of the person I worked with told me about Tokeny, and I was very interested in this new challenge. So I wrote an email to our amazing HR Radka, and the rest is history 🙂 

How would you describe working at Tokeny Solutions?

It’s amazing! I know, you must be thinking to yourself: ”Of course he’s lobbying for his company”, but honestly, it’s one of the best companies I’ve ever worked with. The team is incredible, with people from so many different backgrounds and experiences, with great ideas, a big commitment and a strong team spirit. We all stick together in the ups and the downs, we lose together and we win together. I am proud to be a member of this company.

What are you most passionate about in life?

Too many things! I love learning new stuff, so I always end up finding a new passion and throwing myself in it. The latest one is baking! I started writing a few years ago, and created a writing community to make progress. We even self published a compilation of short stories last year 🙂 Anything I can share with my friends and family, really.

What is your ultimate dream?

To make this planet a better place to live for my son. I would love to break this cycle of previous generations making the next one’s life more difficult, by fighting climate change for example.

What would you change in the world if you could?

It’s pretty cliché, but to make everyone accept their differences so we can all live together without fighting. Difference is a strength, not a curse 🙂

He prefers: check

Coffee

Tea

check

Book

Movie

Work from the office

check

Work from home

check

Dogs

Cats

check

Text

Call

check

Burger

Salad

check

Ocean

Mountains

Wine

check

Beer

check

Countryside

City

check

Slack

Emails

check

Casual

Formal

check

Crypto

Fiat

Morning

check

Night

More Stories  Tokeny’s Talent|Barbora’s Story 28 May 2021 Tokeny’s Talent|Nida’s Story 15 January 2021 Tokeny’s Talent|Cyrille’s Story 17 September 2021 Tokeny’s Talent|Joachim’s Story 23 April 2021 Tokeny’s Talent|Shurong’s Story 20 November 2020 Tokeny’s Talent|Luis’s Story 16 July 2021 Tokeny’s Talent|Eva’s Story 19 February 2021 Tokeny’s Talent|Eloi’s Story 21 October 2021 Tokeny’s Talent|Mario’s Story 25 June 2021 Tokeny’s Talent|José’s Story 19 August 2021 Join Tokeny Solutions Family We are looking for talents to join us, you can find the opening positions by clicking the button. Available Positions

The post Tokeny’s Talent|Tony’s Story appeared first on Tokeny Solutions.


Dock

Dock's Roadmap

After achieving many major milestones in 2021 including the Token migration, the release of Dock’s API, and launching Ledger Wallet support, the Dock team is proud and excited to make some new additions to the roadmap that will take us into 2022.

After achieving many major milestones in 2021 including the Token migration, the release of Dock’s API, and launching Ledger Wallet support, the Dock team is proud and excited to make some new additions to the roadmap that will take us into 2022.

We will continue to strive to build innovative solutions, drive adoption, and engage with our community. Below, you’ll find high-level descriptions of the upcoming milestones.

Anonymous Credentials (Q4 2021)

We’re working on launching anonymous credentials and BBS+ Signatures to further protect our users' right to privacy. Currently, if an individual wishes to share an accreditation, they must share the entire credential. Anonymous credentials are an enhancement to privacy meaning individuals can select certain parts of a credential to share as well as prove information contained in the credential without exposing any of the information.

As an example, a credential holder will be able to prove their educational qualifications without the verifier knowing the date they attended and graduated from university. The credential holder will have complete control over the specifics of what data they wish to share.

Self-Serve Issuer Console (Q1 2022)

Dock is working on a Self-Serve Issuer Console which will allow any organization to issue credentials without having to write a single line of code. The console will enable organizations to issue and verify credentials, enabling rapid prototyping and pilots to prove the benefits of verifiable credentials without having to hire developers.

Digital credentials remove any risk of fraudulent activity; credentials are issued by an educational or training body, and these can be optionally anchored to the Dock blockchain which serves as a timestamp for the credential. By simply signing up with an email address in their internet browser, organizations can design and issue their verifiable credentials to their users via email.

V2 Dock Mobile App (Q1 2022)

We understand the trouble and delay verifying a person’s credentials can cause, and the worry for the individual of not having ownership of their credentials. We plan to release an additional feature to our Mobile App in Q1 of 2022 giving users the ability to store and manage digital credentials. Credential holders can take back control of their data as they receive verifiable credentials from issuers and have control over who sees them.

Dock will embed a verifiable credentials wallet into the existing Dock Mobile App allowing users to receive, store and manage their data. Please note that the first version of this wallet will be published in the app stores in the next couple of weeks.

Wallet SDK (Q1 2022)

Many SMEs and large organizations want to offer storage and functionality of digital credentials in their applications but don’t have the resources to make this happen. For organizations that want to offer digital credentials, the holders of these credentials often have to download a third-party app to store and manage their data. This disconnect means the user is working across multiple apps and managing their own data can become troublesome. Dock’s Wallet SDK can significantly improve the user experience by allowing organizations to embed an identity wallet into their own, existing React Native apps and can be deployed rapidly. A credential holder will be in control over their data and who sees it.

Enabling digital credentials to be stored in a crypto wallet can take months of development, meaning more money and time being spent from the already scarce resources of a developer's time. Dock will provide support for other languages based on market demand in the near future.

Our team is looking forward to achieving these significant milestones, continuing to grow Dock, and engaging with the community. We will continue to keep everyone updated through our blog and social channels, subscribe to our blog below.


Elliptic

Conti Ransomware Nets at Least $25.5 Million in Four Months

Elliptic’s analysis of newly-uncovered ransomware transactions has revealed that Conti’s illicit activities have netted the group at least $25.5 million since July 2021, which includes one ransom payment of over $7 million in November 2021.

Elliptic’s analysis of newly-uncovered ransomware transactions has revealed that Conti’s illicit activities have netted the group at least $25.5 million since July 2021, which includes one ransom payment of over $7 million in November 2021.


KuppingerCole

Hybrid Cloud Backup and Disaster Recovery

by Mike Small This Buyer's Compass covers solutions that provide backup and restoration of IT service data into the cloud in the context of the hybrid IT service delivery environment that is now commonly found in medium to large organizations. These solutions provide the capability to backup IT service data together with all the necessary meta data required to make it possible to restore an exact

by Mike Small

This Buyer's Compass covers solutions that provide backup and restoration of IT service data into the cloud in the context of the hybrid IT service delivery environment that is now commonly found in medium to large organizations. These solutions provide the capability to backup IT service data together with all the necessary meta data required to make it possible to restore an exact copy of the application and its data together with its structure and permissions to achieve given Recovery Point and Recovery Time Objectives.

IBM Blockchain

Navigating the broader digital asset and cryptocurrency markets

The cryptocurrency and broader digital assets evolution has continued to grow in earnest, showing promising signs of maturity through 2021 as industry-wide regulatory bills have reached the Senate floor in Washington D.C. while prices have appreciated to new all-time highs. Although price appreciation tends to lure attention, price has become an increasingly less significant metric […] The post

The cryptocurrency and broader digital assets evolution has continued to grow in earnest, showing promising signs of maturity through 2021 as industry-wide regulatory bills have reached the Senate floor in Washington D.C. while prices have appreciated to new all-time highs. Although price appreciation tends to lure attention, price has become an increasingly less significant metric […]

The post Navigating the broader digital asset and cryptocurrency markets appeared first on IBM Supply Chain and Blockchain Blog.


Bloom

Bloom Partners With Teller Finance To Help Bring Credit To DeFi

We are excited to announce our partnership with Teller Finance!  Hot off the release of Bloom’s innovative new DeFi-focused platform, OnRamp, we are teaming up with Teller, assisting them as they bring their algorithmic credit risk profile to the DeFi space.   Teller is a perfect fit


We are excited to announce our partnership with Teller Finance!  Hot off the release of Bloom’s innovative new DeFi-focused platform, OnRamp, we are teaming up with Teller, assisting them as they bring their algorithmic credit risk profile to the DeFi space.  

Teller is a perfect fit for Bloom, and we are excited about the potential this partnership represents.  By utilizing Bloom’s verifiable credentials (VCs) that can be easily permissioned, Teller is able to confidently focus on their mission to enable the creation of decentralized lending markets that can offer loans without the need for collateral. Their cloud-based protocol was designed to function as a decentralized non-custodial liquidity pool where users can participate as depositors or borrowers. Bloom’s VCs become part of a risk assessment algorithm which allows Teller’s protocol to interact with undercollateralized loans.

“This partnership with Teller Finance represents an exciting venture for Bloom, as both companies share a common vision to expand undercollateralized lending within the DeFi arena.  We feel that, together, the possibilities are limitless with Teller’s protocol easily integrating with Bloom’s solution.” - Ben DiScipio, Bloom CSO

OnRamp is a key piece of infrastructure for DeFi companies, providing access to reusable VCs that were previously only available to the traditional finance sector.  This means that enterprises now have an elegant solution within the undercollateralized market as we assist them with KYC, sanction screening, and other financial verifications.  Beyond that, we see a real opportunity to dramatically increase participation in the DeFi space with Teller, as we work together to incorporate alternative signals to determine creditworthiness and enable risk assessment.  We share the same passion for decentralized identity and believe that decentralized lending can be executed securely and efficiently.

"We at Teller are thrilled to partner with Bloom to use their secure identity and credit scoring solutions on our decentralized lending platform. Bloom’s cost-efficiency and risk reduction when it comes to identity theft and fraud prevention perfectly aligns with our mission to provide users peace of mind when borrowing and lending."  Ryan Berkun, Teller CEO

At the heart of the Teller Protocol are the main contracts, including their ATM contracts.  ATM, or Autonomous Teller Machine, is a decentralized money market smart contract that is connected to a Credit Risk Algorithm (CRA), through which users can request loans using personal consumer data that is computed by Teller's open-source CRA. By integrating Bloom’s innovative platform into their process, Teller is emphasizing the importance of enabling secure, reusable VCs while maintaining user privacy.  Our hope is that the scope of our partnership will continue to expand and open doors to all of the verifications OnRamp can provide.

We are proud to partner with Teller and are thrilled to share with them all that OnRamp and the BloomID can offer within the DeFi sector. Learn more about OnRamp and Teller and stay tuned for future integrations as we continue to unlock the full potential of DeFi.









KuppingerCole

Jun 22, 2022: Managing Complexity: How to Define an Enterprise Cybersecurity Fabric That Delivers

Cyber-Attacks are increasing in frequency and they are getting smarter at an amazing pace, with each successful hit being potentially more disastrous than the last, causing greater destruction and incurring higher recovery costs.
Cyber-Attacks are increasing in frequency and they are getting smarter at an amazing pace, with each successful hit being potentially more disastrous than the last, causing greater destruction and incurring higher recovery costs.

OWI - State of Identity

The Verification Standard: A Look at What's to Come

The past 10 years have introduced and welcomed mobile wallets, digital assistants, and the adoption of digital identity verification. With the intricacies of our online lives, the notion of tying verification to a credential is slowly dissipating. In this week's State of Identity podcast, join host, Cameron D'Ambrosi, and Rick Song, Co-founder, and CEO of Persona. They break down Persona's recent

The past 10 years have introduced and welcomed mobile wallets, digital assistants, and the adoption of digital identity verification. With the intricacies of our online lives, the notion of tying verification to a credential is slowly dissipating. In this week's State of Identity podcast, join host, Cameron D'Ambrosi, and Rick Song, Co-founder, and CEO of Persona. They break down Persona's recent $150MM raise, what the next 10 years pose for identity verification, and a few expected challenges we can anticipate along the way.


Ocean Protocol

Here’s why you should monetize your data over the blockchain

A step-by-step guide on publishing your first dataset on Ocean Market Have you ever wondered how to make money over the blockchain? If you have datasets to sell, you will be amazed at how simple the process is. The blockchain often sounds like a complex and abstract concept that requires a lot of technical knowledge. In reality, interacting and selling datasets over the blockchain is an incr
A step-by-step guide on publishing your first dataset on Ocean Market

Have you ever wondered how to make money over the blockchain? If you have datasets to sell, you will be amazed at how simple the process is. The blockchain often sounds like a complex and abstract concept that requires a lot of technical knowledge. In reality, interacting and selling datasets over the blockchain is an incredibly straightforward process that only has a couple of unfamiliar steps.

In this article, we will walk you through the steps to publish and sell your datasets via Ocean Protocol, which is a World Economic Forum Technology Pioneer.

Ocean puts you in control

We understand that many companies don’t feel comfortable sharing or selling data. This is because sharing data is perceived to be a risk — the risk of either losing your competitive advantage or violating strict data privacy regulations. This is why we have been driven to build you the tools so that sharing data means gaining control and preserving privacy.

Ocean Protocol gives you complete control of your data by removing any third parties from the process, selling data over the blockchain is completely decentralised. As we will demonstrate below, Ocean also gives you a super easy-to-use marketplace for selling your data. This reduces the barriers to entry and brings you customers for your data assets.

From the very beginning, Ocean has strived to put you in control of your data, we are on a mission to break the black-box data selling model of Facebook and others. We achieve this through the core concepts of access control, orchestration and decentralization. With access control and orchestration, any data or AI service can be shared under the conditions set by the owner of data. There is no central intermediary, which ensures no one can interfere with the transaction and both the publisher and user have transparency.

So much more than a typical data market

By leveraging the capabilities of blockchain, Ocean Protocol offers you so much more control than a typical data market. The gatekeeper to accessing your data is a smart contract, which is an immutable piece of code running on the blockchain that no one is able to change. You can have confidence that the terms and conditions to access your dataset can never be altered by an intermediary.

While Ocean Market is a great place for selling data, we also understand that some data is too sensitive to be shared — potentially due to GDPR or other reasons. For these types of datasets, we offer a unique service called compute-to-data. This enables you to monetise the dataset that sits behind a firewall without ever revealing the raw data to the consumer. Researchers and data scientists pay to run their algorithms on the data set and the computation is performed behind a firewall, all they receive is the results generated by the algorithm.

How to publish a dataset on Ocean Market Tutorial Sections 1. Introduction
2. Setup Your Wallet
3. Add Ether cryptocurrency to your wallet
4. Publish your data asset on Ocean Market
4.1 Connect your account
4.2 Enter your dataset information into the publish form
4.3 Sign the transactions & publish your dataset
5. Decide on pricing type
5.1 Fixed pricing
5.2 Dynamic pricing
6. Create fixed pricing for a data set
7. All done! 1. Introduction

Ocean Market provides a convenient and familiar interface for you to publish and sell your data. If you haven’t seen it before, now is a good time to have a look at the site. You’ll find it looks a lot like any other data marketplace — running the blockchain doesn’t compromise usability.

What you decide to sell via Ocean is entirely up to you. The dataset can comprise images, location information, audio, video, sales data, or combinations of them all. There is no exhaustive list of what type of data can be published, you can be as creative as you want. Just make sure that the data you’re selling is legal and not in breach of copyright or other regulations, our policies can be found here.

There are only a few unfamiliar things you need to get used to when selling data over the blockchain:

Every interaction with the blockchain costs money. There is no centralised company controlling the system that is going to pay for computation and server costs, so the user must pay. This is called the gas fee — it’s basically like putting gas into your car to make it run. You need to have a wallet to store the cryptocurrency that you will be paying for these gas fees. This can easily be set up as a browser extension. Each time you interact with the blockchain, you will be asked to “sign” a transaction. This is the process where you pay the gas fees and verify the origin of the transaction. It is equivalent to being asked to enter your pin when you pay with a credit card.

If you’re familiar with the blockchain space, you may be wondering which blockchain Ocean Protocol uses. It was originally deployed on Ethereum but we have since deployed to four other chains, and there will be more to come in the future.

It is important to note that the gas cost associated with signing transactions on different blockchains varies significantly. For the purpose of this guide, we will be focusing on how to publish datasets on the Ethereum blockchain, as it is the most ubiquitous. However — it is also the most expensive. If you would like to explore a cheaper option, we would recommend reading our blog post on using Polygon. We also have instructions in our documentation on how to transfer funds from Ethereum to Polygon (via a bridge).

2. Setup Your Wallet

Let’s start with getting your wallet set up to interact with the blockchain. After this, the process of publishing a dataset is very familiar — it just requires filling out a form.

Go to your browser’s web store for extensions and search for MetaMask.

2. Install MetaMask. The wallet provides a friendly user interface that will help you through each step. MetaMask gives you two options: importing an existing wallet or creating a new one. Choose to Create a Wallet:

3. In the next step create a new password for your wallet. Read through and accept the terms and conditions.

4. Once your wallet is set up, MetaMask will show your Secret Backup Phrase. It is very important that you write this down (ideally more than once) on paper (don’t save it on your computer) and store it somewhere safe. If you forget your password or lose access to your computer, this is the only way to regain access to your cryptocurrency.

5. Continue forward. On the next page, MetaMask will ask you to confirm the backup phrase — this phase is very important so they’re checking you’ve actually written it down. Select the words in the correct sequence.

6. Voila! Your account setup is complete. You can access MetaMask via the browser extension in the top right corner of your browser.

7. You can now manage Ether and Ocean Tokens with this wallet. You can copy your account address to the clipboard from the options. When you want someone to send Ether or Ocean Tokens to you, you will have to give them that address.

If you feel you need some more help setting up your MetaMask wallet, you can also watch our tutorial video snippets and view these instructions on our documentation.

3. Add Ether cryptocurrency to your wallet

There are many places where you can purchase cryptocurrency and you may have used some of them before. To keep things simple, we will purchase Ether from within MetaMask. It’s easy to buy cryptocurrency in MetaMask with your credit card or Apple/Android pay. Here are the steps:

Open Metamask and click “Buy”

2. MetaMask gives you a few different options, which you’ll see here. Wyre (the first option on the list) is fast and easy to use so let’s click “Continue with Wyre”

3. Now enter the amount of Ether that you would like to purchase and the currency that you will be paying in. At this point, you will also need to tick to accept the terms and conditions.

4. Now you need to enter your personal payment details — name, address, credit card number etc.

5. All you have to do is click “Accept” and Wyre will process the payment and send you your cryptocurrency.

Once the payment processing is complete you will now see that your balance in MetaMask is no longer zero.

4. Publish your data asset on Ocean Market

Great — so you’ve got your wallet set up and you’ve bought some cryptocurrency. You are now ready to publish your dataset on Ocean Market. Head on over to the site and let’s get going!

4.1 Connect your account

The first step is to connect your wallet to the site. This is the equivalent of logging in on a traditional site. This lets Ocean Market know the public address that’s associated with your Ethereum account.

You’ll see that Ocean Market gives you a few different options for the type of wallet that you want to connect. In our case, we will click MetaMask as that is the wallet that we have set up.

MetaMask will now ask you to select the account that you would like to connect to Ocean Market — this is only relevant if you have more than one.

Now we need to click “Connect” to confirm that we want MetaMask to connect our account to Ocean Market. You can see here that MetaMask helpfully explains that this site is requesting to “View the addresses of your permitted accounts (required)”.

Now that your wallet is connected, you will see that your wallet address is shown in the top right-hand corner.

Click “Publish” from the top of the site and let’s start filling out the publish form.

4.2 Enter your dataset information into the publish form

The publish form is nice and straightforward and most of the fields are obvious (title, description, author etc) — they also all have descriptions of what’s expected underneath in case they’re not clear.

The link to your dataset should be entered into the “file” field. You need to take responsibility for hosting your dataset — this can be on Google Drive, Dropbox, or AWS — anywhere that it can be downloaded from. For the access type, you need to decide if customers will be allowed to buy your raw dataset or if you only want them to run computations on it behind a firewall (Compute-to-Data). It’s also advisable to enter some tags — these are keywords that help customers discover your dataset, try to think of words that people will be searching for.

The only blockchain-specific field is the datatoken name and symbol. The datatoken is the token on the blockchain that grants access to your dataset — consumers have to purchase the datatoken to have access. The name of the datatoken doesn’t really matter, it’s just important it’s unique, so it’s fine to keep the default or click refresh a couple of times until you see something you like.

You can also decide how long you would like users to have access to the dataset after their initial purchase by choosing the timeout. If you’re constantly updating your dataset you may wish to have a shorter timeout so that customers come back to purchase the latest copy.

4.3 Sign the transactions & publish your dataset

When you finish filling out the form and click submit, you will see a series of pop-ups from Metamask. This is the process of signing the transactions and paying the gas fees that were mentioned above. There are two transactions that you need to sign.

In each of these pop-ups, MetaMask shows you an estimate of how much the gas fee is likely to be. It also gives an estimate of how long the transaction is likely to take. It also shows you the functions that the transaction is carrying out. The first one is “Create Token” and the second is “Contract Interaction”. Click “confirm” on each pop-up.

Awesome — your dataset is now published! Now you see that using the blockchain isn’t so difficult after all.

5. Decide on pricing type

Once the dataset is published, you can think about how you want to set the pricing for your asset. The pricing can only be set from the Ethereum account that published the dataset. If you have multiple accounts, you need to ensure you’re still connected with the same one you used to do the publishing.

There are 2 options for setting the price of an asset on Ocean Marketplace. It is important to think carefully about which one is appropriate for your data asset. Once you set the pricing type you will not be able to change it, although you will still be able to change the price.

5.1 Fixed pricing

Fixed pricing is fairly self-explanatory — you set the price and that’s what customers pay to access your data. You can change the price at any time and customers will always have to pay the amount that you set.

5.2 Dynamic pricing

Dynamic pricing is a little more complicated as the price is determined by an automated version of an order book. This concept is called an Automated Market Marker (AMM). Under the hood, Ocean uses the Balancer AMM.

If you would like to create dynamic pricing you will need to purchase Ocean tokens so that you can provide liquidity to the AMM pool. The price that the customer pays is set by the ratio of Ocean tokens to datatokens within the pool. As more people purchase the datatokens, the ratio changes and the price increases. If you remove Ocean tokens from the pool the ratio changes in the other direction and the datatoken price goes down.

Anyone can add liquidity to the pool you have created — they are known as liquidity providers. Liquidity providers earn a share of the transaction fees when the datatoken is purchased.

6. Create fixed pricing for a data set

To keep things simple, let’s use fixed pricing for the dataset that we have just published. From the publish success page that you are on, click “Go to Data set”

Now click on “Create pricing”. This takes you to the section where you can choose either dynamic or fixed pricing.

Click on the “Fixed Price” tab at the top. Now there is a simple form for you to enter the price of your data asset. The price that you set is in Ocean tokens — this is the cryptocurrency that your customers will use to purchase your asset.

Once you have entered the price and clicked “Create Pricing” you will, once again, be presented with a series of MetaMask pops. There are three pop-ups that you need to confirm in this case: Creating the pricing, minting the datatokens, and then allowing Ocean Market to spend them (i.e. selling them on your behalf).

Once you have confirmed each of these transactions you will see the success message explaining that fixed pricing has been set.

After reloading the page you will see that your dataset is now for sale at the fixed price which you set.

7. All done!

Excellent — you’re all done! We have covered a lot in this article so well done for making it all the way to the end. You have set up your MetaMask wallet, bought Ether, published your first dataset, set the pricing and signed all of the transactions along the way.

Hopefully, now you see that publishing and selling data on the blockchain doesn’t require any advanced technical knowledge. Once you have got your MetaMask wallet set up, it is a fairly straightforward process. You have to fill out a form and click confirm on a couple of pop-ups — that’s pretty much it. Now all you need to do is notify your potential customers and start earning money from the sales!

Let’s also not lose sight of why we’re doing this — Ocean Protocol is significantly better than any centralised data exchange. It is completely decentralized and puts you in complete control. It is completely unique in enabling you to sell access to sensitive data sets without exposing the raw data (Compute-to-Data).

We are always happy to answer any questions that you may have after reading this article, the best way to get in touch is discord. We will also publish more blog posts on the advanced topics that weren’t covered here — so make sure you follow us to get the latest articles.

Follow Ocean Protocol on Twitter, Telegram, LinkedIn, Reddit, GitHub & Newsletter for project updates and announcements. And chat directly with other developers on Discord.

Here’s why you should monetize your data over the blockchain was originally published in Ocean Protocol on Medium, where people are continuing the conversation by highlighting and responding to this story.


Imageware

Behavioral Biometrics – Types, Use Cases, Benefits

The use of mobile technology and continuous exchange of data has raised privacy and security concerns for businesses and individuals. The post Behavioral Biometrics – Types, Use Cases, Benefits appeared first on Imageware.

IdRamp

Public Sector Identity Orchestration with Mike Vesey

Identity At The Center podcast hosts Jim McDonald and Jeff Steadman talk with Mike Vesey, CEO & President at IdRamp, about the challenges and opportunities with increasing demand for digital touchless services and how they converge with traditional physical services. The post Public Sector Identity Orchestration with Mike Vesey first appeared on IdRamp | Decentralized Identity Evolution.

Identity At The Center podcast hosts Jim McDonald and Jeff Steadman talk with Mike Vesey, CEO & President at IdRamp, about the challenges and opportunities with increasing demand for digital touchless services and how they converge with traditional physical services.

The post Public Sector Identity Orchestration with Mike Vesey first appeared on IdRamp | Decentralized Identity Evolution.

Wednesday, 17. November 2021

Indicio

COVID-19 as a Catalyst for Advancement of Digital Identity

Perkins Coie The post COVID-19 as a Catalyst for Advancement of Digital Identity appeared first on Indicio Tech.

Global ID

EPISODE 13 — DeFi and Identity: Compliance in a decentralized world

EPISODE 13 — DeFi and Identity: Compliance in a decentralized world DeFi is here, but what does that mean for compliance in a decentralized world? GlobaliD director of the credentials platform Vadim Slavin and senior ACFCS director and ex-Coinbase investigations manager Erin O’Loughlin chat about their recent DeFi retreat — “compliance is sexy again” — and delve into what the future of DeFi and
EPISODE 13 — DeFi and Identity: Compliance in a decentralized world

DeFi is here, but what does that mean for compliance in a decentralized world?

GlobaliD director of the credentials platform Vadim Slavin and senior ACFCS director and ex-Coinbase investigations manager Erin O’Loughlin chat about their recent DeFi retreat — “compliance is sexy again” — and delve into what the future of DeFi and identity might look like.

Past episodes: EPISODE 12 — The future of GlobaliD Groups EPISODE 11 — The XRP Card and the future of communities EPISODE 10 — How to decentralize identity and empower individuals EPISODE 09 — Understanding GlobaliD’s identity platform EPISODE 08 — Owning your identity and data with VP of Design Antoine Bonnin EPISODE 07 — Understanding the future of fintech with Ayo Omojola EPISODE 06 — Establishing trust and safety in tomorrow’s networks EPISODE 05 — How ZELF combines the power of payments and messaging EPISODE 04 — The future of blockchain with the creator of Solana EPISODE 03 — Should we trust Facebook? EPISODE 02 — JP Thieriot on why Uphold isn’t delisting XRP EPISODE 01 — The SEC’s crypto turf war and why XRP isn’t a security

Have a question for us? A topic you’d like covered? A guest you’d like to see? Let us know!

GlobaliD on Twitter Vadim on Twitter Erin on Linkedin

EPISODE 13 — DeFi and Identity: Compliance in a decentralized world was originally published in GlobaliD on Medium, where people are continuing the conversation by highlighting and responding to this story.


auth0

Using Next.js and Auth0 with Supabase

Learn how to integrate Auth0 authentication with database storage and row-level security authorization in Supabase.
Learn how to integrate Auth0 authentication with database storage and row-level security authorization in Supabase.

Indicio

Verifiable Credentials are Coming to Card Payment Rails

The post Verifiable Credentials are Coming to Card Payment Rails appeared first on Indicio Tech.
A ground-breaking development in decentralized fintech from Liquid Avatar Technologies, Dynamics Inc., and Indicio — and what it means for the future.

Liquid Avatar Technologies’ PassmateTM shows how decentralized identity will transform the world: by easily integrating into systems that already exist. The soon-to-be-launched Software as a Service — conceived by Liquid Avatar’s David Lucatch, enables verifiable credentials to run on existing payment rails.

It was the kind of insight that seems obvious after someone points it out: Businesses already have the infrastructure to handle debit and credit card payments and PassmateTM simply uses these to deploy verifiable credentials. They will be used, first, to deal with age verification for proof of purchases — a non-trivial risk for small businesses in Liquid Avatar’s home province of Ontario, Canada, where merchants can be hit with costly, livelihood-destroying fines if they fail to verify the age of their customers. But more importantly, it provides a simple and powerful deterrent to something far worse: the poor choices underage purchasers can make when they succeed in fooling retail clerks.

PassmateTM will enable a verifiable credential to be used at point-of-sale without the business having to add costly new infrastructure or requiring sales clerks to discern valid from fraudulent IDs — and the purchaser will be able to prove they are of legal age without having to divulge personal details like their exact date of birth or home address.

It doesn’t stop there. PassmateTM can handle all sorts of “proofs” without having to reveal their full content—such as Covid test status or any other qualification that might be necessary to access or purchase a product or service. It will be piloted in early 2022 in Ontario, then the rest of Canada, before an expected broader geographic rollout.

But it’s the ability to use verifiable credentials at point-of-sale card payment terminals and devices that sets up a paradigm change for identity in the marketplace. A financial institution, payment processor or card issuer can now think about adding a verifiable credential to manage proof of identity in a low-cost, frictionless way, and do so without a customer having to reveal unnecessary personally identifying information (PII). This has the potential to alleviate the pain of credit card fraud while avoiding complex data privacy compliance.

While the current pace of innovation in decentralized identity reveals its protean capacity to solve long-standing problems around authentication, compliance, and security, there is also the opportunity that the technology itself creates by doing things differently and enabling things that were not previously possible.

This is where we turn to DIDComm, one of the key technical elements of decentralized identity and one that makes PassmateTM possible. DIDComm is a decentralized communications protocol for peer-to-peer communication that can run over any existing transport but also function offline. DIDComm is where decentralized identity gets really exciting.

DIDComm is the next phase of Social
The ability to generate secure relationships and rich communication through DIDComm will have a profound effect on the way brands and businesses engage with consumers and consumers engage with brands and businesses.

As one marketing report into emergent behavior put it, “we’re entering a consumer-first landscape where relationships with brands are symbiotic, not top-down, and based on a system of shared ideals, values and mutually beneficial interactions.”

This is where DIDComm is a game-changer. By enabling rich “consumer-first” interaction in a privacy-preserving and secure way, DIDComm is the evolutionary path for social media. Instead of the one or the few speaking to the many and interaction mediated by an algorithm, it’s going to also be about the one-to-one. Instead of broadcasting for influence, it will also be about creating authentic relationships. Given current trends, this is going to be huge. Organizations and brands that master this technology are going to turn consumers into collaborators, stakeholders, and advocates.

And that’s not all…

The DIDComm of Things
With the proliferation of sensors and cameras, digital objects will be able to engage with non digital objects. This is the foundation of the spatial web and it will enable the creation of digital twins, smart factories, and smart cities. To work, all the connected “things” in the spatial web will need verifiable identities and to be able to communicate with each other offline in secure, peer-to-peer ways. Verifiable credentials and DIDComm make this possible.

Crash—crush?—the future
PassmateTM is a signpost for the near future. The ability to authenticate and trust data and relationships and communicate in new ways is going to change everything, slowly at first, then swiftly like a flood.

Indicio is incubating this future. We love working with visionary companies and organizations to make their visions of a better digital world come to life. You can contact us here.

The post Verifiable Credentials are Coming to Card Payment Rails appeared first on Indicio Tech.


auth0

Auth0 Expands Reach to Mexico with TEC360 Partnership

Leading LATAM identity providers support Mexico’s top companies with identity management and security needs
Leading LATAM identity providers support Mexico’s top companies with identity management and security needs

Jolocom

ID-Ideal as an integrated solution

In the ID-Ideal project, Jolocom brings sovereign identities and SSI into a single wallet. To improve efficiency and interoperability in the digital space, Jolocom presents the ID-Ideal project. The starting point is the fact that every user has 70 digital identities online. Why not introduce one single secure digital ID solution to merge all of ... The post ID-Ideal as an integrated solution ap

In the ID-Ideal project, Jolocom brings sovereign identities and SSI into a single wallet.

To improve efficiency and interoperability in the digital space, Jolocom presents the ID-Ideal project. The starting point is the fact that every user has 70 digital identities online. Why not introduce one single secure digital ID solution to merge all of those identities? ID-Ideal is one way of many, offering an integrated solution or a middle way so that many identities can be supplemented by a single, secure digital ID solution.

The project is part of the competitive innovation program “Showcase Secure Digital Identities” (SSDI) funded by Germany’s Federal Ministry for Economic Affairs and Energy (BMWi) and one of four projects that qualified for the implementation phase.

Jolocom is a partner in three of the four SDI implementation projects, to which it will lend its expertise in self-sovereign identity and years of experience in developing digital identity wallets. Other projects include “ONCE” and the “SDIKA” project. The SDI projects are special because they bring competitors around the table who are working together on one solution. In addition, they achieve interoperability, so that the use of digital identification no longer remains inefficient.

ID-Ideal’s implementation phase began in May 2021. Current developments relating to the European eIDAS regulation are also taken into account, with the clear aim of providing future-orientated solutions on the subject of digital identities. Citizens should be able to act from the comfort of their home – be it when changing their place of residence, applying for a care center or other notifications of changes. The solution should not be used regionally but across Germany and Europe.

Based on the so-called ID-Ideal Trust Framework, the technical, legal, and semantic interoperability of services and applications is regulated. The aim is to stimulate the creation of an ID ecosystem. If many ID services can coexist, the overarching exchange of digital evidence becomes possible. This is how we actively create trust between actors inside the digital space – one of the basic principles of Jolocom.

The idea behind ID-Ideal is to create a basis for existing and future identity services. To achieve this, interoperability between the individual ecosystems is necessary. For this reason, the project mainly focuses on key aspects:

A) Trust Framework: harmonize various ID services and create standards for secure digital identities

B) High relevance to everyday life and very good usability to increase the incentive

C) Establishing a TrustNest initiative: an open community that promotes certification, exchange, and further development

Would you like to find out more about the ID-Ideal project? You can findits official homepage here: https://id-ideal.hs-mittweida.de/ and more information at the BMWi: https://www.digitale-technologien.de/DT/Navigation/DE/ProgrammeProjekte/AktuelleTechnologieprogramme/Sichere_Digitale_Identitaeten/Projekte_Umsetzungsphase/IDideal/IDideal.html   

Partner  

HTW Dresden, Hochschule Mittweida, Landeshauptstadt Dresden, Stadtverwaltung Leipzig,  Stadtverwaltung Mittweida, Jungheinrich AG, EXXETA AG, EECC GmbH, Fraunhofer FIT, Jolocom GmbH, AUTHADA GmbH, evan GmbH, KAPRION Technologies GmbH, Stromdao GmbH, SQL Projekt AG  

The post ID-Ideal as an integrated solution appeared first on Jolocom.


Ontology

Ontology Weekly Report (November 9–15, 2021)

Highlights Recently, Ontology founder Li Jun was interviewed by MarTech Series. He shared his views on the future development of Web3 and discussed the development of Ontology ecosystem. Since its establishment, Ontology’s decentralized identity protocol has been adopted by many companies around the world. In the future, we expect more and more users to adopt decentralized identity solutions to m
Highlights

Recently, Ontology founder Li Jun was interviewed by MarTech Series. He shared his views on the future development of Web3 and discussed the development of Ontology ecosystem. Since its establishment, Ontology’s decentralized identity protocol has been adopted by many companies around the world. In the future, we expect more and more users to adopt decentralized identity solutions to manage their digital identities Ontology plans to introduce more innovative products in this regard to meet the needs of more users.

Latest Developments Development Progress We have completed the launch of Ontology’s EVM TestNet and are 90% done with testing. At the same time, a large number of community developers are actively participating in the “Security Vulnerabilities and Threat Intelligence Bounty Program”, launched by Ontology and SlowMist. We have completed Ethereum RPC support and are 100% done with internal testing. The TestNet has been synchronized online; we are 90% done with testing. We have completed 100% of Ontology’s Ethereum account system development and the TestNet has been synchronized online; we are 91% done with testing. The EVM/OEP-4 asset seamless transfer technical solution, which facilitates the efficient conversion between OEP-4 assets and EVM assets, is complete and the TestNet has been synchronized online; we are 92% done with testing. We are 100% done with the survey on the improvement of the decimals of ONT and ONG and we are in the process of internal testing. The ontology-go-sdk and ontology-java-sdk support ONT and ONG decimals updates. We are 10% done with the survey on the RISCV’s simplified instruction set architecture. Product Development ONTO hosted a campaign with cBridge. The first 250 participants and top 50 participants who stake the most will receive the highest tier of rewards. Participants who meet certain conditions will have the chance to enter a lottery to win ONG. The event is in progress, and will end at 11:00 (Singapore time) on November 18th. ONTO hosted a campaign with ACryptoS (BSC). The first 75 participants and top 20 participants who stake the most will receive the highest tier of rewards. The first 100 new ONTO users participating in the event will receive additional rewards. The activity is in progress and will end at 17:00 (Singapore time) on November 16th. ONTO hosted a NFT lottery campaign with Samurai. Participants who meet certain conditions will have the chance to win NFTs. The event is in progress with over 1,000 participants, and will end at 21:00 (Singapore time) on November 16th. ONTO hosted a campaign with Plato Farm. Participants who complete a series of tasks such as downloading the ONTO App will receive rewards. The number of submitted forms currently exceeds 260,000, and this campaign will end at 21:00 (Singapore time) on November 17th. On-Chain Activity 121 total dApps on MainNet as of November 15th, 2021. 6,817,107 total dApp-related transactions on MainNet, an increase of 4,275 from last week. 16,707,199 total transactions on MainNet, an increase of 32,714 from last week. Community Growth 1,843 new members joined our global community this week. The active community has attracted a large number of new members to join us. Ontology published the next couple of interviews in its Harbinger Series. Andrey Sher from our Russian community said that Ontology has made progress in the Web3 field and created a unique decentralized identity solution. He hopes to help more community members learn about privacy protection through Ontology. We held our weekly Discord Community Call, led by Humpty Calderon, our Head of Community. He focused on “Let NFT return to the public.”; with the emergence of more and more DeFi+NFT projects, Ontology’s DID solution and OScore provide them with a solution for identity verification. Through on-chain and off-chain data, users will have accurate identity and reputation information to trade NFTs with each other. We held our DeID Summit: Humpty Calderon, our Head of Community, invited Charles Wayn, co-founder of Project Galaxy, to discuss “NFTs as a service infrastructure”. Charles said: Project Galaxy is providing services related to on-chain certificates (NFTs) for communities and enterprises. These certificates (NFTs) contain a lot of user data and provide users with credibility in the network. We held our Telegram weekly Community Call, led by Astro, an Ontology Harbinger from our Asian community. He discussed with community members about Ontology’s upcoming 4th anniversary NFT event; community members provided many novel ideas for this program. As always, we’re active on Twitter and Telegram where you can keep up with our latest developments and community updates. Ontology in the Media

VentureBeat — Decentralization may be key to protecting our digital identities

Researchers around the world are working to create alternatives to our existing digital identities through the decentralized web, or Web 3.0. These alternatives use new protocols that remove the need for intermediaries during transactions, while further democratizing the web and bringing value back to creators and participants. The goal is to enable internet users to verify their credentials without the dependence of intermediaries while managing their own identities. This will create a fair, secure, fast, and scalable new internet with a stronger focus on security and privacy.

With Ontology’s ONT ID and OScore technologies, users can manage decentralized digital identities and reputation scores. ONT ID is Ontology’s decentralized identity framework that enables users to control their data and decide whether a third-party can access a particular piece of information about them. It protects user privacy and ensures data security, enabling trusted collaboration. Ontology uses technical means to provide trust guarantees between unfamiliar users, combines a decentralized credit system with traditional finance, has created a credit-based cross-chain decentralized asset management platform (Wing Finance), and realizes Web 3.0 peer-to-peer transactions and disintermediation.

Want more Ontology?

Learn more about our decentralized data and identity solutions on our website and official Twitter account. You can also chat with us on Telegram and keep up-to-date with the latest news via our Telegram Announcement account.

Ontology Weekly Report (November 9–15, 2021) was originally published in OntologyNetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


Jolocom

ID-Ideal als eine ganzheitliche Lösung

Jolocom bringt im ID-Ideal Projekt hoheitliche Identitäten sowie SSI in eine Wallet. Um Effizienz und Interoperabilität im digitalen Raum einzuführen, stellt Jolocom das Projekt ID-Ideal vor. Ausgangspunkt ist die Tatsache, dass jeder Nutzer und jede Nutzerin über 70 digitale Identitäten online verfügt. Wieso nicht viele Identitäten durch eine einzige, sichere digitale ID Lösung ergänzen?&nbs

Jolocom bringt im ID-Ideal Projekt hoheitliche Identitäten sowie SSI in eine Wallet.

Um Effizienz und Interoperabilität im digitalen Raum einzuführen, stellt Jolocom das Projekt ID-Ideal vor. Ausgangspunkt ist die Tatsache, dass jeder Nutzer und jede Nutzerin über 70 digitale Identitäten online verfügt. Wieso nicht viele Identitäten durch eine einzige, sichere digitale ID Lösung ergänzen? ID-Ideal ist ein Weg von vielen, eine ganzheitliche Lösung oder einen Mittelweg anzubieten, damit so viele Identitäten durch eine einzige, sichere digitale ID Lösung ergänzt werden können. 

Das Projekt ist Teil des Innovationswettbewerbs „Schaufenster Sichere Digitale Identitäten” (SDI), gefördert durch das Bundesministerium für Wirtschaft und Energie (BMWi). Es ist eines von insgesamt vier Projekten, die es in die dreijährige Umsetzungsphase geschafft haben. Weitere Projekte sind u.a. ,,ONCE’’ und das Projekt ,,SDIKA’’. Die Jolocom GmbH bringt ihre Expertise aus der Entwicklung der selbst-souveränen Wallet in insgesamt drei Umsetzungsprojekte von sicheren Digitalen Identitäten ein. Die SDI Projekte sind besonders, weil sie Mitbewerber:innen an einen Tisch bringen, die gemeinsam an einer Lösung arbeiten. Außerdem bemühen sie sich um Interoperabilität, damit die Nutzung digitaler Nachweise eben nicht mehr ineffizient bleibt. 

Das Projekt ID-Ideal startete im Mai 2021 in die Umsetzungsphase. Dabei werden auch derzeitige Entwicklungen rund um die europäische eIDAS-Verordnung berücksichtigt, mit dem klaren Ziel, zukunftsfähige Lösungen zum Thema Digitale Identitäten bereitzustellen. Bürger:innen sollen bequem von zu Hause agieren können – sei es bei der Ummeldung des Wohnsitzes, dem Antrag auf einen Kita-Platz oder andere Veränderungsmitteilungen. Die zu erarbeitende Lösung soll nicht regional bleiben, sondern eine deutschland- und europaweite Anwendung finden.  

Basierend auf dem sogenannten ID-Ideal Trust Framework wird die technische, rechtliche und semantische Interoperabilität von Diensten und Anwendungen geregelt. Ziel ist es, die Entstehung eines ID-Ökosystems anzuregen. Wenn viele ID-Dienste koexistieren können, wird der übergreifende Austausch digitaler Nachweise möglich. So wiederum schaffen wir aktiv Vertrauen zwischen den Akteur:innen im digitalen Raum – eines der Grundprinzipien von Jolocom.   

Die Idee hinter ID-Ideal besteht darin, eine Basis für bestehende und zukünftige Identitätsdienste bereitzustellen. Um das zu erreichen, ist Interoperabilität zwischen den einzelnen Ökosystemen nötig. Aus diesem Grund fokussiert sich das Projekt vor allem auf drei zentrale Aspekte:  

A) Trust Framework: verschiedene ID-Dienste harmonisieren und Standards für sicheren Austausch von Nachweisen schaffen  

B) Hohe Alltagsrelevanz und sehr gute Nutzbarkeit, damit der Anreiz größer wird  

C) Aufbau einer TrustNest Initiative: eine offene Community, die Zertifizierung, Austausch und Weiterentwicklung vorantreibt  

Weiterlesen über das Projekt ID-Ideal? Hier findet sich die offizielle Homepage: https://id-ideal.hs-mittweida.de/ und weitere Informationen beim BMWi: https://www.digitale-technologien.de/DT/Navigation/DE/ProgrammeProjekte/AktuelleTechnologieprogramme/Sichere_Digitale_Identitaeten/Projekte_Umsetzungsphase/IDideal/IDideal.html   

Partner  

HTW Dresden, Hochschule Mittweida, Landeshauptstadt Dresden, Stadtverwaltung Leipzig,  Stadtverwaltung Mittweida, Jungheinrich AG, EXXETA AG, EECC GmbH, Fraunhofer FIT, Jolocom GmbH, AUTHADA GmbH, evan GmbH, KAPRION Technologies GmbH, Stromdao GmbH, SQL Projekt AG  

The post ID-Ideal als eine ganzheitliche Lösung appeared first on Jolocom.


Let's Talk about Digital Identity

Evolution of a verified identity provider with Freja eID’s Kristofer von Beetzen – Podcast Episode 55

Let's talk about digital identity with Kristofer von Beetzen, Chief Product Officer at Freja eID. In episode 55, Oscar speaks to Kristofer about Swedish verified identity provider, Freja eID. They discuss why Freja was created; how it works; where it can be used; how it compares with BankID; how it ties in with European identity schemes; the importance of organisation identity and Freja's plans for
Let’s talk about digital identity with Kristofer von Beetzen, Chief Product Officer at Freja eID.

In episode 55, Oscar speaks to Kristofer about Swedish verified identity provider, Freja eID. They discuss why Freja was created; how it works; where it can be used; how it compares with BankID; how it ties in with European identity schemes; the importance of organisation identity and Freja’s plans for the future.

[Scroll down for transcript]

“Everything becomes related to your identity as things become digital.”

Kristofer von Beetzen is the Chief Product Officer at Freja eID. He joined the company in 2012 and was part of the transformation from a technology-centric IT security company to the cloud-based, user-oriented identity service that is offered with Freja eID today. Kristofer previously worked in media production and advertising and studied marketing at the University of Växjö. His interest, aside from bringing Freja to the world, is writing and he has published several books and columns, among them a crime novel and a book on poker strategy.

Find Kristofer on LinkedIn and Twitter @KvonBeetzen.

Find out more about Freja at frejaeid.com.

We’ll be continuing this conversation on Twitter using #LTADI – join us @ubisecure!

 

 

Podcast transcript

Let’s Talk About Digital Identity, the podcast connecting identity and business. I am your host, Oscar Santolalla.

Oscar Santolalla: Hello, and thanks for joining for a new episode of Let’s Talk About Digital Identity. As you may have heard before that Sweden is one of the countries that has one of the best electronic identifications in the world. And we are going to hear specifically one of these systems, which is Freja eID.

So our guest today is Kristofer von Beetzen. He is the Chief Product Officer at Freja eID. He joined the company in 2012 and was part of the transformation from a technology-centric IT security company to the cloud-based user-oriented identity service that is offered with Freja eID today. Kristofer was previously working with media production and advertising, and has studied marketing at the University of Vaxjo. His interest aside from bringing Freja to the world is writing, and he has published several books and columns – among them are a crime novel and a book on poker strategy.

Hello, Kristofer.

Kristofer von Beetzen: Hello. Thanks for inviting me.

Oscar: It’s a pleasure, super interested in hearing about Freja eID, which a few years ago- Ubisecure started work more and more in Sweden, and then I start hearing this name Freja eID. So you will tell us for everybody how exactly this system works, this service. But please, first, we would like to hear from you a bit your personal side. Tell us about yourself, and how was your journey to this world of digital identity.

Kristofer: Yes. So, I started out in the industry, actually, as I said, I came from media production and advertising. I was working with this company, back then was called Verisec. And I was working with their communication and PR and so on. And they were working a lot with the traditional digital identity things like hardware tokens for banks, establishing trust on a pretty high level so that banks could migrate from bank offices to online banking. So this company was actually started already in 2002. And then they also started with some initial product development with an authentication server, and had some plans of going international with this product. So I actually went from being a consultant to the company to joining them in 2012, as a part of their expansion.

And along the way, we kind of figured out that the proprietary solutions, that was kind of the name of the game back then, where you had an authentication server placed in your server room, and then issuing identities from your own organisations to your customers. We saw that, particularly in Sweden, and in the Nordic countries, the use of these kind of communities, such as BankID and similar, were taking a lot of ground. And we didn’t really see this coming in other countries at the same pace and speed. So we thought that if this is the future of identity, that you have this kind of cloud service and Identity-as-a-Service, rather than having your own, each company having their own identity systems, then we can actually do something and create something in Sweden, and then take it to the rest of the world.

So that was kind of how I came into this. And then somewhere around 2016, we started the work to focus on these Freja eID products. And then we actually transformed the whole company and change the name and so on from Verisec to Freja eID group. And now we’re totally focused on this service and sold off the legacy products that actually was in place when I started.

Oscar: So Verisec became Freja. And Verisec was always a Swedish company?

Kristofer: Oh, yes, yeah. And Verisec still exists, so the legacy part we sold is now in a new company called Verisec International. And they are still doing a lot of good things and working on those solutions that we developed back then. But we felt that we needed to focus, which is one of the hardest things when it comes, especially in this technology era where you can do almost anything and it’s tempting to do anything and everything. But we felt like we really need to focus on this Freja eID order to make it successful. Because we really felt that we had such a strong drive and we had such a strong support from users and from relying parties that this was needed. So we took the decision. And actually last year we changed the name to Freja eID Group and now we’re solely focused on the Freja eID product.

Oscar Santolalla And I guess you joined the company in a more advertising or marketing role and then you move to innovation.

Kristofer: Yeah, I started out as the VP Marketing and was looking after the communications and all the things related to how we established ourselves as a brand and so on. And then when we came to doing this kind of consumer-oriented product which Freja eID is, we realised, OK, we need some product management here. We need to think totally different, because our main target group is the users, not the IT security director and such, which were the previous.

And I was fortunate enough to have a couple of colleagues that worked as product designers in the company. And they were actually much more knowledgeable and had ideas around product management in this new evolving tech era than any of us had in the company. So as it happened, they took me to a conference in London, which was called Leading Design. And that was for the purpose of inspiring me and the management to understand how to build the company as a product and user-oriented company rather than a technology-oriented company.

And that’s maybe the total opposite of how it’s normally done, I guess, when the management is trying to inspire employees, here it goes the other way around. So thanks to designers, we actually realised that we need to make a shift in how we organise development, how we organise ourselves within product design, and so on. And that turned out really well. So I’m grateful for that inspiration. And now we have a totally different organisation than before.

And actually, at that conference, there was an American product specialist, who had – the topic of his presentation was, “Is it product or marketing? Yes.” And I think that was kind of interesting. And when you have a product that is continuously developed, you have an interaction with your users, and the product becomes what the user needs, if you see what I mean, then the kind of limits between marketing and product disappears in a way. So we have organised ourselves now as a company without a marketing director in the traditional sense. The product organisation takes care of what we’re going to develop, and the sales process of it and the marketing. So it’s one big unit doing this in a very integrated and agile way. So it’s completely different from how it was organised before.

Oscar: Very, very interesting. Please tell us how the product or service Freja ID was created.

Kristofer: So we had- and it’s no secret that we saw how it grew and grew with this BankID community here in Sweden to begin with. We saw that it was almost impossible for us to sell our authentication servers, which was very successful in Latin America, in Spain, in other countries, and they were serving banking customers in the volumes of I think it was as much as 50 million users for that product.

And when we tried to pitch this authentication service here in Sweden, it was more or less impossible, because everyone was in the next generation. They were looking at Identity-as-a-Service and with pre-established identities, which is something that’s pretty unique, I think, for the Nordic countries, which means that we as a company, we kind of vouch for the identities. We make sure that the users come into our ecosystem into our community, we check their identities, we make all the identity checks, and document checks with the issuer, and so on. So when you have registered with Freja, then you have an electronic identity that can be reused to many places, all the way from tax authority to gambling services, to healthcare, and so on.

So there was no competition in this area. It was BankID, and nothing else, basically. And in all the other business areas in the world, in history where one company has taken such a dominant position that it’s more or less a monopoly, then there is room for innovation and there’s room for improvement. And to be honest, in the beginning, the most common question we’d had the first couple of years was why do we need Freja? What is Freja good for when we have BankID? And then I always answered, “Well, did you remember back in the ‘70s when we had one TV channel?” Oh, and people just like, understand that competition is something good. And what we have built over these years is something that has been differentiated a lot from BankID.

So, I think there’s room for a couple or two or three identities on a national scale and on a European scale, I think we will see quite a few solutions. But it’s kind of like we tried to look at it from the user perspective. And the thing with identity, and that’s a discussion that’s becoming more and more relevant now when we have the discussion of self-sovereign identities and so on, is that everything becomes related to your identity as things become digital. In one way or the other, you need to identify yourself online and in all the services that are some way digitalised, right?

So, we wanted to give the user back the control of this. So we wanted to create something that was both kind of met all the compliance and regulatory measurements that we could test Freja against, but also something that really was user-centric in a way that you, as a user, can really control your identity. And that was kind of the starting point rather than having an identity that is controlled by the government or controlled by your bank or someone else, open it up for the user to call the shots I would say.

Oscar: Yeah, so please tell us how Freja eID works for an individual.

Kristofer: So what you do is you start to register for the service. And you do that by downloading the app. And then you register on your own, so to say. So you take a selfie, and you register your ID document, and you register your email address, and set the pin and so on. And then we make all these checks, make sure that the face is the same on the selfie as on the ID document and check the validity of the documents. And up until now, that’s kind of similar to what you see on identity verification services that are offered everywhere.

So, the difference is that we then bring you in safely into our database and to our community. And you can then reuse Freja to a lot of services. So currently we have, and this is mostly in Sweden, because this is where the focus has been up until now. So you have around 350 plus services that we have agreements with. And then you can use Freja to access those services by logging in or making electronic signatures. And that’s kind of what’s expected from an electronic identity.

But we’ve taken this one step further. So since we have the face and the selfie of the user, we have created in the app a physical ID document. So you can use Freja instead of your physical ID document in many places in Sweden. For example, when you pick up a parcel at the post, or when you go to a pharmacy and things like that.

Oscar: People just show it or there’s a… it has to be scanned or just shown to the person?

Kristofer: Well, it’s both, either you can show it and then they have the information that is the same things that’s presented in your physical ID document. But there’s also a QR code so they can scan it, and they can get the information that way. Or they can make a transaction all the way to our backend, which means that if you have a transaction that is of high value, then you make an electronic signature in a physical context, which means that they are the same level of assurance as when you do an online transaction with an electronic signature. We offer the whole range of that.

So, that’s kind of the starting point of what we’re doing. But we also see that there is kind of interesting way forward here. So if you think about everything that is required, in terms of KYC, in terms of digital identification, in all sorts of areas, primarily, I mean, we’re talking about payments, we’re talking about gambling, we’re talking about other regulated industries. If you have control over the digital identity ecosystem as we have, I mean in Sweden, there are BankID, and there are Freja eID. So either one of these two needs to be – you need to be connected to one of these in order to make payments, for example.

And the interesting thing with one of these systems is controlled by the few large banks. And then you have all the FinTech companies that’s trying to challenge these big banks, right? But the interesting thing is what happens when these FinTech companies eventually challenge the big banks, to the extent that the big banks feel threatened. And the FinTech companies are dependent on the very infrastructure that the FinTech companies need, namely, the identities.

So I think if you construct and build an infrastructure of identities, which is, you know, in Sweden, we’re government approved. We have now been approved by EU in the pre-registration to eIDAS from the Swedish government. If you have such an infrastructure, then you can build upon that payment services, you can build everything that actually needs this regulatory compliance.

And I’m not saying that we’re going to do it, but we can offer this to all these FinTech companies who don’t want to be dependent on their competitors. And I think it’s the same wherever you go in different countries, a lot of the FinTech companies are dependent on ID methods issued by the banks. So we’re building kind of a parallel infrastructure here that is open for competition in a way that the bank-controlled identities are not.

Oscar: Yeah, definitely. What type of services already, you mentioned around 300, right, already services that are using? Tell me the types, just to have an idea what type of services are already using today Freja eID.

Kristofer: Yeah, we started out by trying to get a lot of these well-known and well-used public services such as the tax authority, the insurance authority, the unemployment agency, and healthcare services, digital healthcare services, because partly they have a big reach. Everyone in Sweden uses them at one point or another, and it’s also about credibility. So even if we’re governmentally approved, it’s so much more easy to say to the next customer, “The tax authority trusts us. Oh, so it’s pretty easy for you to trust us as well.”

So we have a large chunk of the public sector, its municipalities and government agencies. But now we’re kind of shifting focus towards the commercial side of things, e-commerce and payments, as I mentioned, gambling, and the whole kind of private sector. And the thing with the private sector, perhaps not the banks then but it has not been regulated. In Sweden, it became regulated with gambling that you need an eID in order to register an account and so on.

But for e-commerce and so on, it’s not like they have regulatory demands to have a Level of Assurance 3 identity to onboard a user. So they have been using things like Facebook and Google and things like that. But I think we’re seeing a shift now towards the benefits of having a better interaction with your users with a proper eID rather than these solutions that I mentioned.

Oscar: Yeah, absolutely, I would rather if – prefer my customer of an e-commerce site to use something like Freja eID as the identification definitely.

Kristofer: And one more thing that I mean, to comment on the e-commerce, what is happening there? I mean, if you think about if I may make an analogy of how Google was perceived in the media industry. So you had all of these big media houses all the way from New York Times to every other media outlet in the world, they were like, “OK, should we accept Google as the advertising engine, or we lose out on a big chunk of advertising money? So should we let them into our house and have them as kind of the advertising agency for our own media outlets?” And they were like “Yeah, what could possibly go wrong?” And as we’ve seen, Google has taken a huge chunk of that advertising revenue.

So basically, it’s Google, rather than New York Times, to take one example, that’s controlling the flow of the advertising money for their own media outlet, OK? And this is nothing new, you know about the story. But the same thing is actually happening with all these checkout companies. You have in e-commerce, you have these payment checkout companies that’s taking a big chunk, and that they’re providing a lovely and brilliant service, makes it easier for you as a customer to check out when you pay for your goods and so on. But what happens is that most users have a relation with the checkout company, not with the e-commerce operator.

So what happens then is that it’s the checkout company that owns the customer relation, not the e-commerce company that’s actually selling the goods. So we’re having the same thing over again, as Google had with the media outlets. It’s now happening with the checkout companies and e-commerce companies. And here, we’re saying to them, “Why would you give away your core assets, which is the relation to your users? You could offer your users to identify to your service rather than the users identifying to the checkout service.” And that’s where Freja comes in. And slowly, I think this is starting to dawn on them that if they do the same mistakes as the media outlets were doing with Google, then they might not have a long-term profitability, at least on that side.

Oscar: Yeah, it makes sense. Just to clarify also, can Freja eID be used outside Sweden in some way or another?

Kristofer: Yeah, that’s the whole concept of what we’re trying to build here. We’re focusing on Freja to build a strong position here. And we actually have already released Freja for other countries, so Finland, Norway, Denmark, and the UK. But we’re not kind of focusing there to bring in relying parties as it is today. But we have some Swedish customers who have users in these countries. So they can onboard users from different countries. And if we have some customers saying, “Ah, we actually need you to open up Poland, Germany, and France and whatever” then we can do that. And that’s just a matter of adding international ID documents and doing some testing.

So then when we have built this service and become stronger in Sweden, then we can take the next step. And our goal is to make this a European eID, and we very much look forward to the EU identity wallet development, because we think Freja is basically a blueprint of what they’ve been discussing, or rather, their kind of presentation of the wallet is a blueprint of Freja, I don’t know. But we’ve been around for a while. And we have this whole wallet concept. And we think it’s something that we can scale up on a European level. We’re not there yet. But I think we have a good position to do that.

Oscar: So the authentication/identification is the main service that Freja eID offers. You also mentioned signatures, you also mentioned compliance with eIDAS so tell me if there is something else that Freja eID offers right now.

Kristofer: Yeah, and one thing that’s very interesting, and I was actually looking at when you, in Ubisecure on your webpage, you describe customer identity management, and then the traditional identity management for employees as two different categories. And that’s, I totally agree on that description. And what we have done with Freja is that we have made it possible to add your own organisation eID in Freja. So if you’re an organisation and you want to issue employee identification to these employees, you can do that in the Freja ecosystem and you have the whole lifecycle management within Freja and you onboard and offboard users and so on. And you pass along whatever attributes that you as an organisation need to have in order for your employees to login to this cloud service or open doors with Freja or whatever.

So we’re both this consumer-oriented identity, but also this organisation identity. And that’s also really growing fast here in Sweden. Because it’s been – traditionally, it’s been a lot of either you have some kind of proprietary system for employee authentication, or you ask your users to utilise your private eID to log in to your workplace. That’s not a good idea. But it’s been the way it’s been done here because it’s easy, it’s simple for the organisation to just ask employees, “Hey, use your private eID.” And then we don’t have to worry about it.

So, we kind of combined these worlds. So we issue the identity. We make sure that this person, who is your employee, we have the fundamental identity verification of the individual. And on top of that you can manage your own identity lifecycle, and connect to all the services that’s in your organisation.

Oscar: Please tell us what are your plans for the future of Freja eID?

Kristofer: The next big thing I would say that we’re planning, and we did some test pilots around this, and that is to expand the concept of what is possible, what kind of value we can provide for our users. So if you think about an electronic identity, it’s probably one of the most used apps on your phone, at least if you have a system like we have in Sweden, where you use eID to everything. So you use your eID many times a day perhaps or at least many times a week. So then you have a trusted relation with your electronic identity. And we try to utilise that.

So we have a section in Freja eID, in the app, that’s called Explore. And here we present interesting services and new services that’s suitable for this particular user. And then in that way, we can offer our relying parties to connect with our users. So it becomes more of a relation where if you are searching for something and you want to have a trusted connection to that company, we can offer… well, I wouldn’t say that we would offer a search engine, but in the same way, as Google can add value by connecting an end user with a service, we can do the same thing here. And on top of that, we can actually add the KYC process and everything.

So let’s say you’re applying for a loan, you find within Freja that, oh, here’s the different financial companies that’s connected to Freja. And they have an offer that suits you, you can click on that. And then you can pass along your regulatory KYC, or a lot of the KYC and identity data and become a customer in a click. And that’s something that Google cannot do. And that’s something that Facebook and others cannot do either. So we kind of shortcut this user acquisition, user journey by adding KYC and having users explore and discover services via Freja eID rather than from other sources.

Oscar: Indeed, and that sounds definitely very powerful. Yes, absolutely.

Kristofer: So that’s kind of what we’re developing in this moment right now. And then, when the time comes, and when we have built the strongholds here in Sweden, we’re looking to take this outside of Sweden. We were, as I mentioned, you know, pre-approved in the EU a couple of weeks ago, we’re looking at what’s happening in the UK with their certification process for electronic identities. So Europe is – it’s a big market, and that’s the next step. And we’re not really looking outside of that for now. But who knows what happens in the future?

Oscar: OK, excellent. So Freja eID is coming to the rest of Europe, at least for now.

Kristofer: Yes, that’s our plan at some point. And I think it’s also a timing aspect of it. I mean, if you think about- I mean, here in Sweden, our challenge is to convince people that that OK, so there’s a new kid in town. They have BankID. But with Freja, you can have this and this and this and this, so… but you have an incumbent that you’re trying to challenge. So that’s a challenge of its own.

If you go to a country like the UK, where identity is something that’s perhaps a bit you know, they don’t have identity cards in the same way, they don’t have a personal identifier as we have in the Nordic countries. So, a totally different challenge to convince someone from England to start using an electronic identity everywhere and trust that. It’s totally different challenges. I think the analogy with streaming music a lot. Spotify was obviously also a Swedish company. And it took a while for them to convince the world that streaming music was better than alternatives. And there are still people don’t think, they’d find the records on CD or pay by song or whatever is a better solution. But I think streaming music, and that’s pretty obvious maybe. But a few years ago, it wasn’t that obvious that streaming music would be the answer to that particular industry challenge.

And I think it’s also pretty obvious to see, at least if you look in the Nordic countries, an electronic identity of the sort that we have here in the Nordics, I think that would be the norm in the rest of the world. But that will take time. It will take time before this spreads and you have to fit all the – before even countries have frameworks that you can get compliance against, it will take time. So I don’t really feel the stress in that regard. I think time is on our side in this case.

Oscar: Yeah, but I’m sure that you will come definitely. Kristofer, to finalise, could you leave us with one idea for all business leaders who are listening to this conversation, what is the one actionable idea that they should write on their agendas today?

Kristofer: Yeah. And that would be to see identity as a core asset. And if you leave that asset in the hands of the banks, or if you leave that asset in the hands of checkout companies, or anyone else that controls your main relation to your users, I think you will have a brutal wake up down the line. And there are not many providers of this open solution that Freja is, but I think that is the future because users do want to control their identities. And they can do it in a direct relation with your company. And I think you will benefit from that on the long-term, even if it’s perhaps easier in the short-term to take the solutions available today. But then you lock yourself into something that will be very difficult to get out of in the long run.

Oscar: Yeah, I couldn’t agree more. Kristofer, could you tell us for the ones who like to follow the conversation with you, what are the best way to find you on the net?

Kristofer: First of all, if you have any direct questions, you can write to info@frejaeid.com and I’ll respond to that email address. And you can find me on Twitter and on LinkedIn, search my name Kristofer von Beetzen and hopefully I’ll pop up in that search and just connect and I’ll be happy to continue the conversation.

Oscar: Fantastic. Thanks a lot. Again, it was a pleasure talking with you, Kristofer. And all the best.

Kristofer: Thank you so much.

Thanks for listening to this episode of Let’s Talk About Digital Identity produced by Ubisecure. Stay up to date with episodes at ubisecure.com/podcast or join us on Twitter @ubisecure and use the #LTADI. Until next time.

[End of transcript]


Affinidi

The Journey of an SSI Developer

“A Journey of a Thousand Miles Begins with One Step” — Lao Tzu, a renowned Chinese philosopher. Every long journey begins with the first step, and we at Affinidi, welcome you to take this first step in the journey towards becoming an accomplished Self-Sovereign identity (SSI) developer. While every individual’s journey is unique, we have put together a series of steps that can make your journey

“A Journey of a Thousand Miles Begins with One Step” — Lao Tzu, a renowned Chinese philosopher.

Every long journey begins with the first step, and we at Affinidi, welcome you to take this first step in the journey towards becoming an accomplished Self-Sovereign identity (SSI) developer.

While every individual’s journey is unique, we have put together a series of steps that can make your journey fulfilling.

Learn the Concepts and Benefits of SSI

The first step is to understand the concepts of SSI and Verifiable Credentials (VCs), so you can know their benefits, where they can be most effective, and how they can impact the future of digital identity.

Browse through our 101 articles and FAQs to get a good grasp of the concepts.

Identify Use-cases

Once you understand the concepts, you can identify the business use-cases that are most conducive for VCs and work on developing them.

The good news is VCs can be used for developing a wide range of use-cases. In fact, any application that requires a digital identity and authentication is a good fit for SSI. Here are some PoCs that our Hackathon participants developed using our tech stack.

Compute the Cost of Development

The next step is to estimate the overall cost of development.

To do this, you must come up with a high-level technical architecture of your solution, so you can determine the resources you’ll need for its development, and also estimate the duration by which it will be ready. Based on these estimates, determine the overall cost of development.

Armed with the technical architecture and budget, you can convince the stakeholders to buy into your use case.

Expand your Architecture Diagram

Once you have the buy-in, it’s time to work towards developing a pilot solution.

Start with your architecture and build on it. Break it down into small modules and create architecture diagrams for each module.

Also, design the business flow for your system, so there’s high-level visibility into your system’s architecture and functionality.

Build a VC Schema

Next, come up with the different types of VC schemas your application would need.

Browse through our VC-Generator app to get an idea of what schemas you’ll need for your application and make a list accordingly.

Once you have the list, it’s time to build the different VC schemas using our Schema Manager. You can use the Schema Manager to build new schemas or to reuse the existing ones.

Seed Verifiable Data

With the schemas in place, it’s time to start seeding the schemas with verifiable data.

You can seed the digital identity of the issuers and verifiers to anchor them and give control of their respective Decentralised Identifiers (DIDs). Next, generate the metadata of both the parties of the trust triangle and establish the public key of the issuer.

Build the Issuance Tool

Now, it’s time to build the issuance tool based on the type of issuances in your proposed application.

The type of issuance will depend to a large extent on whether you are building a generic portal, an on-prem app, API, or a plugin for an existing tool.

Build or Integrate the Edge Agent and Storage

Your next step is to build or integrate both the edge agent and the storage.

The edge agent can be a white-label web or mobile wallet that your end customer already uses. For new users, consider/recommend Affinidi’s web and mobile wallet as it can be easily integrated with the rest of your application.

You can use the Affinidi vault for storage.

Create the Verification Tool

With the credentials ready, you need a way to verify them.

For this, build a verification tool using a generic portal, a gateway API, or an SDK, as required.

Build the UI for Presentation and Exchange

Next, create a visually appealing and intuitive UI for information exchange.

If you’re using an API for verification, you may want to create an API for this presentation exchange.

In both cases, you may want to create a protocol for verifiers to request a verifiable presentation or a partial VC (in the case of selective disclosure) from the holder.

Create the Issuer/Verifier Registry

Finally, build a verifier or issuer registry along with tools to edit them.

As a part of this tool, you must generate an entity VC, which is a VC that authorizes an issuer to issue certain types of VCs. You can also work on publishing the metadata in this stage.

With this, you have built a pilot solution for your SSI application.

Do a Test Run

It’s now time to do a test run of your application. Make sure your application issues VCs and stores them in the holder’s wallet. It should also enable the holder to create a verifiable presentation and share it with a verifier when needed.

Collect and analyze the report of your test runs and present them to the stakeholders involved.

Based on the reports and test runs, make the necessary changes to your application to ensure that it meets your business goals. Test the application iteratively to ensure that it works the way you want.

Deploy in Production

After making the necessary changes, deploy it in production. Add VC revocation capabilities if you have not done it already.

Maintain and Scale

Lastly, stay on top of the usage analytics and create a commercial model that will generate revenue for you. Continuously monitor user behavior and make the necessary updates to your product.

Once you have scaled the application, think about opening the ecosystem and creating a marketplace around it.

Thus, this is the journey of an SSI developer using Affinidi’s tech stack.

Example Use Case

To understand this journey, let’s take our driving license example.

To build an app that issues, stores, and verifies the driving license verifiable credential, you must,

Know the concepts of VCs and the advantages of building a VC-based application. Identify a use-case. For example, you can integrate this driver’s license VC with an auto insurance app to determine the yearly premium of the holder. Calculate the cost of development including the time and resources required. Create an architecture diagram of the implementation and include its integration with the wider use-case, which in this example, can be the premium computation app. This article contains the technical implementation using Affinidi’s tech stack. Next, build the UI for presentation, create a registry, and do a test run. Based on the test results, make changes if needed, and deploy it in production.

We hope this use-case gives you an idea of the developer journey and where you are in it, and we look forward to seeing your SSI apps built using our tech stack.

Please reach out to us on Discord if you have any questions, join our mailing list, and follow us on LinkedIn, Twitter, and Facebook.

The information materials contained in this article are for general information and educational purposes only. It is not intended to constitute legal or other professional advice.

The Journey of an SSI Developer was originally published in Affinidi on Medium, where people are continuing the conversation by highlighting and responding to this story.


Finicity

Finicity Mourns Passing of MX Co-Founder and CTO

I am saddened today to learn that MX co-founder and CTO Brandon Dewitt passed away after a five-year battle with cancer. I’ve always enjoyed competing in the marketplace, but I’ve enjoyed the people much more. At Finicity, we have known Brandon for a long time. We enjoyed talking with him about his unique entrepreneurial ideas […] The post Finicity Mourns Passing of MX Co-Founder and CTO appeare

I am saddened today to learn that MX co-founder and CTO Brandon Dewitt passed away after a five-year battle with cancer. I’ve always enjoyed competing in the marketplace, but I’ve enjoyed the people much more. At Finicity, we have known Brandon for a long time. We enjoyed talking with him about his unique entrepreneurial ideas and passion for helping others through financial inclusion.

His role as a member of the Silicon Slopes community and his impact, not only on MX but on emerging founders and startups, truly shows how much he cared about others. He was well-known for his love of the MX team and their goals and dreams. Brandon clearly demonstrated a desire to help people easily understand and manage their finances so they could meet their goals and focus on the important things in life. We also now see that he modeled perseverance, determination and an example of helping others all while he was in his own major battle.

As he said, “I feel it’s crucial that those in a position of experience and success turn around and pay it forward to those who are just starting out―just like we all once were.”

We are genuinely sorry for the loss. Our heartfelt condolences and prayers go out to his family, friends and everyone at MX in this time of grief.

In lieu of flowers, MX has asked that people donate to St. Jude Children’s Research Hospital. For donations made in Brandon’s name, MX will be matching all donations dollar-for-dollar. To donate, visit Gift Funds: Brandon Dewitt – Gift Funds for St. Jude.

The post Finicity Mourns Passing of MX Co-Founder and CTO appeared first on Finicity.

Tuesday, 16. November 2021

Indicio

Enterprise Blockchain Awards Names Ken Ebert Winner in Blockchain Leadership Award Category

The post Enterprise Blockchain Awards Names Ken Ebert Winner in Blockchain Leadership Award Category appeared first on Indicio Tech.
Indicio CTO regarded for vision and leadership in developing interoperable blockchain-based Trusted Data Ecosystems

SEATTLE — November 16, 2021 — Indicio, the world’s leading provider of decentralized identity and hosting solutions is pleased to announce that company Chief Technology Officer Ken Ebert has been named winner in the Blockchain Leadership Award category in the Enterprise Blockchain Awards (EBAs) presented by the Blockchain Research Institute. Ebert was recognized for his long-lasting vision for open-source identity technology anchored on a blockchain network to solve some of our most pressing online problems — verification, privacy, security, and user experience.

Ebert is one of the co-founders of Indicio.tech and a pivotal force in nurturing the company from its launch at the start of the COVID pandemic to its position today as the global leader in developing decentralized identity infrastructure and software for building Trusted Data Ecosystems. He built a virtual team of highly-skilled developers that is diverse in gender and nationality, and he developed an intern and mentoring program to create the needed skills in new recruits as the company took on more and more customers’ projects.

With Ebert’s team-focused leadership, Indicio was able to successfully create and deploy a complete decentralized identity based data ecosystem, weaving together health agencies, global technology suppliers in the travel industry, and national governments. The company’s continuing success reflects on Ebert’s extraordinary ability to bring parties together and drive ideas and projects forward into workable technology that solves real-world problems. And, as a passionate advocate for interoperability in the open-source identity communities, Ebert isn’t just driving Indicio’s success, he’s helping to drive the adoption and evolution of blockchain technologies that promise transformative change and opportunity for everyone. 

“Indicio’s success and its position as a global leader in the development of Trusted Data Ecosystems is a testimony to Ken’s seemingly boundless skill and wisdom. It’s not just his ability to analyze and clarify problems and guide our own team, it’s his tireless capacity to do so for all the companies who support the Indicio Network as well as our customers,” said Heather Dahl, CEO, Indicio. “That’s what makes him an outstanding leader. Part of that comes from character; part from experience; but a part of it is also a philosophy of ‘build now, build more, build better.’  When you think about the problems we’re trying to solve, they’re huge. Ken is always the one to remind us — and our collaborators and customers—that we build solutions step by step. Let’s solve this bit first. And when you do this, and do it relentlessly, you’ll feel like you’re running, and you can achieve anything.” 

“I want to thank BRI for its dedication to helping enterprise leaders understand and implement blockchain within their industries. This is a technology that has enormous potential to rewrite the way we do so many things in business and society,” said Ebert. “It’s exciting to be the CTO of a company that is driving that transformation through the Indicio Network—a distributed blockchain for identity—and through designing solutions that give people the ability to prove identity and share data in a way that preserves their privacy, in a way that improves their security, and, above all, in a way that can be trusted. All this would be impossible without blockchain. I’m honored to be a finalist for this award; but I’m more excited by what we—Indicio, our clients, the identity community—can do for the world with this technology. That’s the excitement that greets me every day — and I want to share it with everyone.” 

The Blockchain Leadership awards honor people who have shown exceptional leadership in a blockchain collaboration or implementation within an enterprise, an industry, a government, or a multi stakeholder organization. The nominees are those that have gone above and beyond the job description to spearhead blockchain initiatives within an enterprise or ecosystem.

The post Enterprise Blockchain Awards Names Ken Ebert Winner in Blockchain Leadership Award Category appeared first on Indicio Tech.


Ken Ebert takes home the Entrepreneurial Leadership Enterprise Blockchain Award

Enterprise Blockchain Awards The post Ken Ebert takes home the Entrepreneurial Leadership Enterprise Blockchain Award appeared first on Indicio Tech.

Global ID

GiD Report#186 — What is web3?

GiD Report#186 — What is web3? Welcome to The GiD Report, a weekly newsletter that covers GlobaliD team and partner news, market perspectives, and industry analysis. Check out last week’s report here. This week: What is web3? This week in web2 The problem with inflation Stuff happens 1. What is web3? You’ve likely seen the term web3 or Web 3.0 bandied about latel
GiD Report#186 — What is web3?

Welcome to The GiD Report, a weekly newsletter that covers GlobaliD team and partner news, market perspectives, and industry analysis. Check out last week’s report here.

This week:

What is web3? This week in web2 The problem with inflation Stuff happens 1. What is web3?

You’ve likely seen the term web3 or Web 3.0 bandied about lately. There’s plenty of chatter about the next chapter of the internet, but what exactly is it?

Here’s Chris Dixon on web1:

The internet, I think, has kind of had four important, distinct phases. There was web1 — this explosion of stuff in the nineties — and the key feature there was that it was governed by open protocols, and because they were open protocols, Sergei and Larry and other entrepreneurs — all the main names, Pierre Omidyar’s eBay, Google, Amazon — they could build internet services that they would truly own and control that no one could rug pull them the way you get rug pulled on a platform like the iPhone or on Facebook.
That first wave, those applications were what I call skeuomorphic. They took things that were from the offline world, like magazines, and put them on the internet. It’s a lot of websites where we were just reading stuff.

Then came web2:

Then there was this next period of the 2000s, where a new wave of entrepreneurs came along and they said, wait a second. No, these are computers. You can read and write and put code and do all sorts of other things. During this early phase, you had — you probably never heard of them — things like Flickr and Delicious and the whole six degrees early social networking — people were building the early primitives and the early ideas. Then you had Mark Zuckerburg and Ev Williams and Jack Dorsey and other people take those and package them up really beautifully. And boom, that was web2. Then web2 got accelerated by mobile, which was another layer of interesting stuff that happened on top.

Web2 peaking and consolidating — and transitioning to web3:

Web2 is like TV in the 70s according to Chris Dixon. Photo: asbe
Then we had a period of incumbent domination between 2012 and 2020 with Apple and Google, etc. These companies get bigger and bigger, and the internet is now at a precarious point where it could turn into TV where you have four channels like CBS and NBC — like TV in the 70s.
That’s the great cause that we’re all fighting for here — to keep the internet open and interesting and not like that. But then you had this counter-trend that began to develop, obviously originally with Satishi, and then very importantly with Vitalik and Ethereum. That’s led to this explosion of innovation.
“These companies get bigger and bigger, and the internet is now at a precarious point where it could turn into TV where you have four channels like CBS and NBC — like TV in the 70s.”

The beginning of web3:

I think we could be in that moment, that golden period moment that I remember very much in mobile. I was there — we knew mobile was a big deal, but it’s very hard to know when you’re in the process. Is it linear, exponential? Because you’re sitting on one point, and you don’t really know how fast it’s going.
A big part is having credibly neutral platforms upon which to build. If you build an application on top of Ethereum — whether it be a game or an NFT experience or a DeFi protocol — you do not have to worry about the protocol deciding to kick you off later or charge you 30% of your take rate or whatever. So you can invest and spend your life as an entrepreneur betting on that platform and building around it in the same way as in web1 — you knew that you could do that around HTTP and SMTP.
The inherent problems of web2:
A very formative moment in my experience — I don’t know if you were both in tech then — was the Facebook/Twitter API massacre. Essentially, there was this huge wave of people that built startups on Facebook and Twitter and they were all just summarily shut off. I had a lot of friends who had startups that were built on the Twitter API. Twitter was an ecosystem. It was a developer platform for many years. Yes, it had users using it directly, but it actually didn’t even have an app for a long time. It was all third-party apps, and those were all companies, and there were people who’d spent their lives on it. I don’t blame Twitter. I’m friends with a lot of these people at these web2 companies. I don’t think they have ill intent. I think the problem is the model.
Like I like to say, in web3, it’s “can’t be evil.” In web2, it’s “don’t be evil.” So with web2, you’re depending on the good intentions of the founders and part of its architecture. You don’t have a blockchain; you don’t have code that locks them into it. If you build on Ethereum, the code is locking you into certain commitments. If you build a smart contract, it’s there — it’s immutable like everything else. Maybe if you’re an ultra-founder, Jack Dorsey or something, you can resist this, but for almost everybody else, you ultimately report to shareholders and those shareholders want you to maximize profits. That, I believe, is fundamentally inconsistent with maximizing the health of the networks built on top.
I think that corporations and networks are fundamentally misaligned. A corporation is going to want to grab more and more of the money and close off the network when what the people in the network want is openness and low take rates and open permissionless access. Those two things are fundamentally misaligned in the last 10 years. We’ve seen how that misalignment playsout. A lot of the reason people are unhappy on these networks is that they feel this viscerally.
A lot of these creators who were early to build YouTube up are now at the whims of the algorithm, at the whims of the company. The company gets to monetize, get the take rates changed, and the creators feel that viscerally. They were part of this network creation, and they should have been part of the governance and economics of the network.
But they aren’t.

Check out Dixon’s full chat — 5 Mental Models for Web 3.0.

Or an edited, truncated version (16 min.) from GEOPOP — What is Web 3.0?

Relevant:

90–5 Mental Models for Web3 | Chris Dixon What is Web 3.0? | Chris Dixon How NFTs Create Value Microsoft’s Blockchain Director: Major Brands Embracing NFTs Will Drive Mainstream Adoption — Blockworks Microsoft and the Metaverse Reddit Co-Founder, Solana Ventures Launch $100M Initiative for Web 3 Social Media The World’s Largest Record Company Is Creating an NFT Super Group Via /pstav — Coinbase launches its wallet as a standalone browser extension 2. This week in web2 Discord pushes pause on exploring crypto and NFTs amidst user backlash — TechCrunch Changes to Apple’s App Store could come fast Robinhood breach leaks information of 7 million people | ZDNet Exclusive: New bipartisan bill aims to reduce sway of “opaque algorithms” Inside Facebook’s Struggles to Attract Creators and Their Young Fans The business of privacy is booming Google to allow third party app payments for first time in S.Korea The internet needs better rules, not stricter referees 3. The problem with inflation

The other topic that’s getting plenty of chatter is inflation. Is it transitory, having shocked out supply chains after the pandemic shut down the economy? Or is it our comeuppance for printing so much money since 2008?

We’ve seen asset values — from real estate to equities to crypto — explode in price in a period of extremely easy money. Rising inflation will put a quick end to that story. With the Fed planning beginning to taper its buying program and looking to raise rates multiple times next year, the pendulum is starting to swing the other way.

(And just how much DeFi-fueled leverage is in the crypto space when a big correction comes?)

Anyway, we’re not here to make predictions. Instead, we have Ray Dalio break down the fundamentals inflation, wealth, and power (in the context of big cycles):

Yesterday’s inflation report showed inflation raging so you are now seeing inflation erode your wealth. That is no surprise. At this time 1) the government is printing a lot more money, 2) people are getting a lot more money, and 3) that is producing a lot more buying that is producing a lot more inflation. Some people make the mistake of thinking that they are getting richer because they are seeing their assets go up in price without seeing how their buying power is being eroded. The ones most hurt are those who have their money in cash.
Here are the key principles to keep in mind:
Wealth = Buying Power
Wealth ≠ Financial Wealth
Making Wealth = Being Productive
Wealth Decline = Power Decline
The United States now is spending a lot more money than it’s earning and paying for it by printing money that is being devalued. To improve we have to raise productivity and cooperation. Right now we are on the wrong path.

Check out his full post here.

Relevant:

Dollar climbs as U.S. inflation surge fuels rate hike speculation The first Fed rate hike is now expected as early as July following the hot CPI data Ray Dalio: On Inflation and Wealth An extra surreal Money Stuff: Doing Fraud on Securities Fraud Crypto is Creating Newfound Wealth — and Job Freedom — for Many Americans — CivicScience Miami to Give ‘Bitcoin Yield’ From MiamiCoin to Its Citizens New York Mayor-elect Eric Adams says schools should teach about cryptocurrency 4. Stuff happens Via /coddsquad — Ripple to launch crypto service for financial companies amid legal battle with the SEC Via /antoine — Doctors Without Borders is now using blockchain tech for medical record storage What We Learned From The Information’s 50 Most Promising Startups of 2021 FTX US Reports 512% Increase in Average Daily Volume in Q3 — Blockworks A ‘whole new class’ of consumers is entering the crypto space, says Visa executive How African refugees used bitcoin to build their own grassroots economy — TechCrunch ConsenSys Tool Infura’s User Numbers Grow 250% in Under a Year Via /jvs — To Combat Solana’s Bot Problem, Civic Unveils Free Digital ID for NFTs — Decrypt Via /vs: “some good market insights” — Digital by default: how are we facing up to building trust with today’s customers? | Webinar

GiD Report#186 — What is web3? was originally published in GlobaliD on Medium, where people are continuing the conversation by highlighting and responding to this story.


KuppingerCole

Network Detection & Response (NDR)

by John Tolbert This report provides an overview of the market for Network Detection and Response tools (NDR) and provides you with a compass to help you to find the solution that best meets your needs. We examine the market segment, vendor service functionality, relative market share, and innovative approaches to providing NDR solutions.

by John Tolbert

This report provides an overview of the market for Network Detection and Response tools (NDR) and provides you with a compass to help you to find the solution that best meets your needs. We examine the market segment, vendor service functionality, relative market share, and innovative approaches to providing NDR solutions.

OWI - State of Identity

Digital Identity for the Meta Verse

In this month's Investing in Identity series, we break down the latest industry trends including: Movers & Shakers: Socure's $450MM raise at a $4.5B valuation in identity verification, Permutive's $75MM raise in privacy-first infrastructure for advertising, Neuro-ID's $35MM for behavioral analytics, and more M&A Activity: McAfee's going private in a $14B deal and Secur

In this month's Investing in Identity series, we break down the latest industry trends including:

Movers & Shakers: Socure's $450MM raise at a $4.5B valuation in identity verification, Permutive's $75MM raise in privacy-first infrastructure for advertising, Neuro-ID's $35MM for behavioral analytics, and more M&A Activity: McAfee's going private in a $14B deal and SecureAuth acquires Acceptto to fuel additional action in passwordless solutions Musings of the Month: The internet was built without an identity layer. Will the metaverse? Here are our predictions on how governments, eIDs, and self-sovereign identity will play a role in building verifiable credentials for virtual reality. 

KuppingerCole

Simeio Identity Orchestrator

by Richard Hill Simeio Identity Orchestrator (IO) is a solution that helps integrate and orchestrate other IAM solutions while also adding a series of own capabilities. Simeio IO allows customers to connect and direct their existing IAM infrastructure in a modern and more efficient way. Using Simeio IO, customers can converge existing IAM siloed solutions that Simeio can then operate as an MSP or

by Richard Hill

Simeio Identity Orchestrator (IO) is a solution that helps integrate and orchestrate other IAM solutions while also adding a series of own capabilities. Simeio IO allows customers to connect and direct their existing IAM infrastructure in a modern and more efficient way. Using Simeio IO, customers can converge existing IAM siloed solutions that Simeio can then operate as an MSP or IDaaS. Simeio IO offers improved application onboarding, IAM analytics, with a unified single pane of glass and mobile application.

Tokeny Solutions

White-label Digital Asset Marketplace

The post White-label Digital Asset Marketplace appeared first on Tokeny Solutions.

Product Focus

Digital Asset Marketplace

A turnkey and multi-asset solution for securities distributors

This content is taken from the monthly Product Focus newsletter in November 2021.

This month, we’ll take a look at our product Marketplace platform: a turnkey and multi-asset solution for securities distributors to quickly launch their own branded digital asset marketplace with built-in compliance.

The Marketplace platform covers:

• Primary market: Marketplace operators can easily list financial instruments and automate the onboarding of eligible investors via the platform.

• Secondary market: A venue for investors to connect with other eligible counterparts and trade security tokens peer-to-peer thanks to automated compliance. The transaction and settlement are fast (<3 seconds)* and automated, and can be monetized by the issuer and/or the marketplace operators.

• Lifecycle management: Investors can efficiently manage their portfolio with a multi-asset view and access the investor portal of each token they own.

 *If issuers choose to use Polygon and under normal network conditions

A use case:

Inverpriban is an alternative investment management company. They plan to issue 50-100 mortgage loans per month. With the Marketplace platform, they can benefit from:

1.improved liquidity;

2.streamlined and automated processes;

3.the ability to reach a broader audience.

Check the product Subscribe Newsletter

This monthly Product Focus newsletter is designed to give you insider knowledge about the development of our products. Fill out the form below to subscribe to the newsletter.

Other Product Focus Blogs White-label Digital Asset Marketplace 16 November 2021 T-REX Protocol Recognized as ERC3643 11 October 2021 Gas Tank on Polygon 10 September 2021 DvD Transfers 29 June 2021 Blockchain Layer Enhancement 8 June 2021 T-REX Factory Enhancements 29 March 2021 Security Tokens Conditional Transfer 1 March 2021 Messaging 25 January 2021 ONCHAINID Notifications 30 November 2020 Tokens Recovery 2 November 2020

The post White-label Digital Asset Marketplace appeared first on Tokeny Solutions.


Metadium

Metadium Technology Update Schedule: Ethereum Berlin and London Hard Fork Applied

Hello Metadium community, After the stability of the Ethereum Berlin hard fork (April 2021) and the London hard fork (in August, 2021) were verified, the Metadium team decided to reflect the updates in the Metadium blockchain. The schedule of the metadium hard fork is as follows: Code upgrade for Metadium Berlin and London hardfork applications: August to December 2021. Berlin Hard F

Hello Metadium community,

After the stability of the Ethereum Berlin hard fork (April 2021) and the London hard fork (in August, 2021) were verified, the Metadium team decided to reflect the updates in the Metadium blockchain.

The schedule of the metadium hard fork is as follows:

Code upgrade for Metadium Berlin and London hardfork applications: August to December 2021.

Berlin Hard Fork EIP Application and Development: August to September 2021
London Hard Fork EIP Application and Development: September to October, 2021
Testnet applied: November, 2021
Mainnet application: December 2021 to January 2022

Through this hard fork, the revision of gas cost requirements, which are characteristics of the Berlin and London hard forks, and the improvement of mutual operability of transactions will also be applied to the Metadium blockchain.

The details of the development are as follows:

Berlin Fork EIPs

EIP-2929: gas cost increases for state access opcodes
EIP-2315: simple subroutines for the EVM
EIP-2565: modexp precompile gas cost changes
EIP-2718: typed transaction envelope EIP-2930: access list transactions

London Fork EIPs

EIP-1559: Fee market change for ETH 1.0 chain (inactive)
EIP-3198: BASEFEE opcode (inactive)
EIP-3529: Reduction in refunds
EIP-3541: Reject new contracts starting with the 0xEF byte
EIP-3554: Difficulty Bomb Delay to December 1st 2021 (inactive)

Based on this hard fork, the Metadium team will work hard to create services in various areas like DID, NFT, and DeFi.

Thank you,

Metadium Team

Metadium Technology Update Schedule: Ethereum Berlin and London Hard Fork Applied was originally published in Metadium on Medium, where people are continuing the conversation by highlighting and responding to this story.


PingTalk

How to Choose the Right Single Sign-on (SSO) Solution for your Enterprise

When it comes to selecting a single sign-on (SSO) solution for your organization, not all solutions are created equal. Choosing the best workforce SSO solution depends on your IT environment and user base. Some SSO solutions control authentication for users accessing resources from desktops in a single security domain. Others provide universal SSO across complex hybrid environments that include le

When it comes to selecting a single sign-on (SSO) solution for your organization, not all solutions are created equal. Choosing the best workforce SSO solution depends on your IT environment and user base. Some SSO solutions control authentication for users accessing resources from desktops in a single security domain. Others provide universal SSO across complex hybrid environments that include legacy on-premises, cloud-based and software-as-a-service (SaaS) applications. There are also SSO solutions capable of acting as an authentication authority across multiple identity types and broad use cases from cloud to on-premises.

 


Identosphere Identity Highlights

Identosphere #58 • SSI ≠ Blockchain • FIDO Dev Challenge Winners • Concluding GLIEF's Financial Inclusion Series

Your weekly guide to the latest news and updates in self-sovereign identity. Upcoming events, use-cases, regulations, governance, and standards\development.
This weekly newsletter is possible thanks to readers like you! Consider paying us a small amount each month via Patreon

Support our work on Patreon — Get Exclusive Content!!

Read previous issues and Subscribe : newsletter.identosphere.net

Contact \ Content Submissions: newsletter [at] identosphere [dot] net

Upcoming

Don’t miss our next speech at the ISSE Conference 2021 by EEMA • 11/16-18 Infocert

Unlocking Safe Travels Beyond COVID with Digital Credentials • 11/25 Affinidi

Driving Inclusion with Trusted Digital Ecosystems • 11/30

COVID Health Credentials for International Travel Summits (by LFPH and Affinidi) • 12/1-2 CCI Newsletter [APAC and EU friendly times]

European Blockchain Convention Virtual • 12/13

Web3 Self-Sovereign Data (SoDa): The New Web3 Data Economy Craig Danton

In Stephenson’s “Snowcrash” Hiro Protagonist, the aptly named protagonist of the book, side hustles as a “Stringer for CIC”; essentially a gig economy worker collecting digital intelligence and posting it to a massive data marketplace. Users of the metaverse can then access this library to search for any information they want.

Unlocking Identity and Data Across the Web 3 Spruce ID

In recognition of our extensive experience with decentralized identity, Spruce was chosen in September to work with the Ethereum Foundation and ENS to develop Sign-In with Ethereum. This is meant to let users access online services by using their Ethereum accounts as an identifier, rather than an account owned by large corporations like Facebook or Google.

Explainer Really Good: Self Sovereign Identity ≠ Blockchain Jolocom

Due to the ID-Wallet project in Germany, some articles and comments have equated Self Sovereign Identity (SSI) with blockchain technology in the last few weeks. The impression is given that SSI only works in conjunction with a blockchain. Spoiler, that’s not the case.

What Is Self-Sovereign Identity? Trinsic 

Self-sovereign identity is the marriage of real identity with the digital world that will ultimately make people’s lives better.² It’s still in its infancy, and there is a long road ahead to truly make digital identity as legitimate and nuanced as a real-world identity.

Explaining SSI to C-suite executives, and anyone else for that matter – John Phillips SSIMeetup Passwordless Authentication – Everything You Need to Know

When it comes to authentication, passwords were once the safest and most used methods of authentication

Public Sector Catalonia launches a project for Self-Sovereign Identity to empower citizens in the digital world Politiques Digitales

The Government will only act as a validator, giving the tools and a secure legal framework, but it will not in any case have the custody of the data.

The Government of Catalonia has presented IdentiCAT, the new decentralized and self-sovereign digital identity model, which aims to become the first public digital identity at a European level and it will be self-managed by the citizen with the absolute legal guarantee and validity to operate with the public administration and the private sector.

Me2BA provides human-centered recommendations to the California Privacy Protection Agency

The California Privacy Rights Act of 2020 (“CPRA”) established the California Privacy Protection Agency (“CPPA”). The CPPA has full administrative power and authority to implement the CCPA and CPRA, which basically means that the CPPA will be in charge of updating regulations and adopting new regulations, while enforcement of these regulations will be done by both the CPPA and the Attorney General

Automating workplace vaccination verification — a path out of the pandemic IBM

The Department of Labor’s Occupational Safety and Health Administration (OSHA) recently released a rule on requiring all employers with 100 or more employees to ensure their workforce is fully vaccinated or require any workers who remain unvaccinated to produce a negative test result on at least a weekly basis before coming to work.

This rule impacts ~80 million workers — every company in the S&P 500 

Company News Hello World. It’s Walt.id 

It is our goal to make SSI simple and accessible: to enable every developer and organisation to build identity and trust into the web and their applications. Ultimately, this will transform every digital interaction into an effortless and worry-free experience. 

Bonfii announces partnership with Finclusive CU Ledger

FinClusive’s AML/KYC capabilities create verified identity credentials that will be incorporated into MemberPass – Bonifii’s digital identity solution for Credit Unions       Through this partnership, U.S. Credit Union members can now establish and maintain verifiable digital identities that enable safe, secure, and touchless experiences for many credit union service

The Lissi Wallet now supports additional cards and convenience features

The Lissi Wallet now supports additional cards and convenience features. Import of additional cards The Lissi Wallet does supports verified credentials, custom cards and pk.pass files The Lissi Wallet now supports .pkpass files, as well as other custom cards, in addition to verifiable credentials (first screen). Any card in the wallet that has a bar code or QR code can now be easi

KYC-Chain Join Hands with enVoy

KYC-Chain will enter a partnership with enVoy. enVoy offers sustainable DeFi, tokenized letters of credit, realtime x border payments, and tokenized documentation for the supply chain removing risk and creating trust for third-party trade on an end to end ESG and sustainable supply chain journey.

Development Issue Azure AD Verifiable Credentials from an application Microsoft

learn how to:

Set up Azure Blob Storage for storing your Azure AD Verifiable Credentials configuration files.

Create and upload your Verifiable Credentials configuration files.

Create the verified credential expert card in Azure.

Gather credentials and environment details to set up the sample application.

Download the sample application code to your local computer.

Update the sample application with your verified credential expert card and environment details.

Run the sample application and issue your first verified credential expert card.

Verify your verified credential expert card.

Issuing a verifiable credential in 7 easy steps Amino

First we’re going to create a holder Agent, this will be the Agent that receives the membership credential. During their life, the holder will collect many different verifiable credentials. Memberships, ID-cards, even purchasing records.

Welcome to Dock’s API - Testnet Sandbox

You can test our API in the sandbox testnet by simply switching the toggle to test mode. To get started; create a free account, log into your dashboard and acquire your API key.

Identity not SSI 2021 FIDO Developer Challenge: Outcomes and Winners

Gold Winner – Lockdrop

Silver Winner – Shaxware

Bronze Winner – SoundAuth (Trillbit)

This year’s FIDO Developer Challenge reached a successful conclusion, with a ceremonial event during Authenticate 2021 in Seattle. The recorded video of the ceremony is available now, and we’re pleased to share more detailed stories of the three finalists as well as the rest of the teams that made it to the final stage.

Governance ToIP Releases Additional Tools for Governance and Trust Assurance in Digital Trust Ecosystems

Following the September announcement of its first tools for managing risk in digital trust ecosystems, today the ToIP Foundation announced three more pairs of tools to assist in the task of generating digital governance and trust assurance schemes

Research 3 Stages of a Pan-African Identity Framework for Establishing Self-Sovereign Identity With Blockchain Solomon Darnell, Joseph Sevilla

Three stages have been identified as necessities to accomplish the development of this system before opening it further beyond the pan-African worldwide community. The three stages are defined by systems that allow for biometric/demographic registration (stage 1), interoperability and security hardening (stage 2), and biometric modality data analysis/organization/association (stage 3).

User Experience Identity and Consistent User Experience Phil Windley

There's a saying in security: "Don't roll your own crypto." I think we need a corollary in identity: "Don't roll your own interface." But how do we do that? And what should the interface be? One answer is to adopt the user experience people already understand from the physical world: connections and credentials.

Use-cases #5 in the Financial Inclusion Interview Series – Concluding Remarks from GLEIF CEO, Stephan Wolf

Throughout the financial inclusion interview series, we caught up with key partners to discuss the launch of GLEIF’s digital business identity initiative in Africa and how it is bringing about greater financial inclusion for African SMEs. Stephan Wolf, CEO of GLEIF, concludes the series by accentuating the immeasurable opportunities and transparency this initiative will bring to the global supply chain

How large is the market for Energy Web DIDs? EnergyWeb

At Energy Web, we understand that in order to have any meaningful adoption of enterprise applications using decentral technology, a DID-based tech stack has to be offered in a convenient and reliable way as well. This is why we’re developing the Decentralized Service Level Assurance (DLSA) solution. 

Thanks for Reading!

Read more \ Subscribe: newsletter.identosphere.net

Support this publication: patreon.com/identosphere

Contact \ Submission: newsletter [at] identosphere [dot] net

Monday, 15. November 2021

Shyft Network

Shyft Network Core Team Open Sources Veriscope, Makes Travel Rule Compliance Open, Free, and…

Shyft Network Core Team Open Sources Veriscope, prepares to enable cross solution discovery to Make Travel Rule Compliance Open, Free, and Simpler than Ever Following the FATF’s latest regulatory guidance, we’re making our decentralized compliance framework including dashboards, admin tooling, and Shyft Attestation architecture completely free and available for anyone to use. In August
Shyft Network Core Team Open Sources Veriscope, prepares to enable cross solution discovery to Make Travel Rule Compliance Open, Free, and Simpler than Ever Following the FATF’s latest regulatory guidance, we’re making our decentralized compliance framework including dashboards, admin tooling, and Shyft Attestation architecture completely free and available for anyone to use.

In August, Shyft Network announced Veriscope, the first public utility and application stack for solving the Financial Action Task Force (FATF) travel rule. In collaboration with some of the world’s top cryptocurrency exchanges, such as Binance, Deribit, Bitfinex, BitMEX, Tether, and Huobi, Veriscope provides a decentralized compliance web framework and a smart contract platform for Virtual Asset Service Providers (VASPs) to enable travel rule compliance. Veriscope meets the growing demands of the rising regulatory efforts that have commanded attention and action across cryptocurrency, DeFi, NFTs, stablecoins, and many other elements of blockchain.

Now, two months later, following exchanges collectively initiating the phased deployment of Veriscope on the Shyft Network, we’re proud to share that we will be open-sourcing Veriscope. This deployment makes Veriscope available for free, so that any project can connect to the Veriscope Network and the Shyft Attestation architecture.

See Open Source Repo equipped with dashboard’s and setup guides here: https://github.com/shyftnetwork/veriscope
Screenshot demo’s for the Front end web framework can be found here: https://docs.veriscope.network/docs/vasp-demo/

As early adopters of crypto, we at Shyft Core believe that it’s essential that the sector maintains openness. We also believe that compliance should not have to force the ecosystem to rebuild the existing financial system & risk user safety. To maintain decentralization, we need to promote open-source software to solve new regulatory challenges. Veriscope is that solution — and it’s ready for the world.

Shyft Network acts as layer 0 to travel rule aggregators, protocols, and data transmission services & the Veriscope framework provides an open system for anyone to leverage to enhance security guarantees, universalize the discovery and coordination processes required for cross entity data transmission, and dashboards to manage all travel rule data.

We built this system to ensure that any entity can maintain the highest level of data security, while also enabling automated discovery across any crypto transactions.

FATF: Explained

In February of 2019, the Financial Action Task Force (FATF) released guidance designed to mitigate risks around virtual assets. In section 7B of the guidance, the FATF recommends the application of the Travel Rule to virtual assets. This rule requires Virtual Asset Service Providers (VASPs), such as cryptocurrency exchanges, custodial wallets, and OTC desks to share sender and receiver information ahead of processing inter-VASP transactions on behalf of users.

FATF helps address Anti-Money Laundering (AML), a set of policies and guidelines laid out in every country’s framework to fight black money and counter terrorist financing.

As a result, it promotes KYC (Know Your Customer), a tool that acts as the first line of defense to support AML. In its most general sense, KYC is a questionnaire wherein the customer is asked certain questions and required to share personal data which is used for identification and verification purposes. Data commonly shared includes: name, address, and employment details, etc.

Suppose you’re a business, crypto exchange, governmental body, or consumer who engages with crypto or the exchange of virtual assets. In that case, it’s critical you know and understand the FATF Travel Rule — and the nuances of compliance, so that KYC can be upheld. Recent FATF guidance from back in March requires those who shepherd the transfer of assets, including cryptocurrency, to share data from senders and receivers. FATF deems these exchanges as Virtual Asset Service Providers (VASPs). Shyft Network is the first platform to create technology (Veriscope) that enables VASPs to seamlessly comply with FATF rules, partnering with ten of the top crypto exchanges to implement an industry-wide solution using our database bridging and data attestation infrastructure.

Why Is an Open Source Veriscope So Important?

Following FATF’s guidance in March of 2021, the Versicope governance team participated in a consultation where we provided comments to their proposed guidance, a decision we made because we understand the value and opportunity we have to act as a bridge between governing bodies like FATF and crypto at large. FATF released their latest guidance on October 28, 2021, an eagerly-awaited moment that we shared feedback on in a Twitter thread and will create regulatory situations that open-sourcing Veriscope will help solve.

From the definition of stablecoins to whether NFTs are VA (Virtual Assets) and therefore subject to regulation, FATF’s guidance will inevitably impact how users of the blockchain ecosystem will function moving forward, especially when considering the nuances of how we define different sectors and their function. Veriscope gives businesses and users the infrastructure to keep up with changes and optimize their actions, regardless of the size of their operation.

Open source Veriscope allows VASPs large and small to utilize its infrastructure to onboard, write, send and receive regulatory data sets over Shyft Network. This update allows for unlimited extensions, such as third-party tools and apps, into the system, including monitoring and analytical tools with aggregation to be embedded and utilizable. Veriscope’s infrastructure can also be repurposed and extended by any other teams who would like to use it for their internal dashboarding requirements — and they will be able to do this quickly; admin tools and setup scripts make implementation possible in less than a day.

Taking an open-source approach to building a solution for FATF is essential if we’re to ensure that we don’t gate keep systems that should remain inherently open for everyone. Shyft Network took the dated approach of many closed source companies and flipped the script (and code) to provide front ends and web frameworks for free to anyone who wants to use them. This architecture allows people to specifically implement aggregation services for the Travel Rule and enable entirely new systems to be built using the Shyft Core attestation architecture and discovery layer.

This is only the beginning of a much larger set of products and services that will span other verticals across the industry utilizing this open source infrastructure and framework.

By open sourcing Versicope, Shyft Network is democratizing Travel Rule compliance for a varied set of businesses, exchanges, technologies, and their communities. We know that together crypto is stronger and that if mainstream adoption of blockchain is to become reality, we must evolve so that institutions, exchanges, and individuals can function together and comply with any incoming regulation.

About Shyft Network

The Shyft Network aggregates and embeds trust into data stored on public and private ecosystems, allowing an opt-in compliance layer across all systems. The key pillar for Shyft is user consent, allowing users to track the usage of their data. Therefore, no one can use personal data without consent from the owner. Shift Network allows and gives incentives to individuals and enterprises to work together to add context to data, unlocking the ability to build authentic digital reputation, identity, and credibility frameworks.

Website / Telegram / Twitter / MediumDiscord


Ocean Protocol

Introducing OceanDAO Working Groups

A softer, gentler DAO that gives more space and freedom for experimentation 1. Overview OceanDAO’s social layer is getting developed further, as part of a broader shift to embrace and leverage the growing number of participants inside the Ocean Ecosystem. Specifically: we are introducing OceanDAO Working Groups (WGs) [1]. Each WG has stewards (who’s accountable to run the group), and membe

A softer, gentler DAO that gives more space and freedom for experimentation

1. Overview

OceanDAO’s social layer is getting developed further, as part of a broader shift to embrace and leverage the growing number of participants inside the Ocean Ecosystem. Specifically: we are introducing OceanDAO Working Groups (WGs) [1].

Each WG has stewards (who’s accountable to run the group), and members (people who participate). This organizational and coordination structure is inspired by the Token Engineering Commons (TEC).

Here are the initial WGs, and their initial stewards.

Parameters & Roadmap WG — [Roberto, Trent] Project-Guiding WG — [Razvan, AlexN] Core Tech WG — [Trent, AlexC] OceanDAO Engineering WG — [Roberto] Data Consume Volume WG — [Sheridan, Razvan]

The Parameters & Roadmap WG focuses on immediate and macro level discussions that may cover all other WGs. Most stewards should be in attendance of this WG, and we welcome everyone to join.

Basic WG organization:

Every WG will discuss and meet openly inside of our Discord. Each WG has 2 public Discord sub-channels: WG Channel, WG Voice Channel (and video) Each group has its own onboarding process. It’s up to the WG to decide. Each group has a 30 or 60 min call, typically weekly. Meetings will be recorded and shared async.

We expect more WGs to emerge over time.

Details on each WG can be found below.

2. “Value Add” Rather than “ROI > 1”

OceanDAO’s emphasis on ROI > 1 was a useful construct from a purely mechanical perspective. But in practice it focused too much on a stark, objective ROI number that could be very hard to measure. How do you measure ROI for improving documentation? Yet there is value being created. Projects shouldn’t need a business orientation.

So we have shifted OceanDAO focus away from “ROI > 1”, and towards “value add” with a larger emphasis on community. It’s a softer, gentler DAO that gives more space and freedom for experimentation.

To reflect this shift, here is an updated criteria for projects around “value add” and community.

Project Criteria

Ways that a team might add value:

Usage of Ocean — how well might the project drive usage of Ocean? Viability — what is the chance of success of the project? Community active-ness — how active is the team in the community? Adding value to the overall community — how well does the outcome of the project add value to the Ocean community / ecosystem?

This is a short list, on purpose. It balances tech & viability, with community.

3. Details on Each WG 3.1 Parameters & Roadmap WG

Mission: Decide each funding round’s parameters (short term), and update roadmap (med term). Overall, to improve the funding process for projects getting funding from OceanDAO.

Criteria include “feeling of safety” for teams, promoting community, and more. (Details below)

Stewards: Roberto Alcantara, Trent McConaghy

Meetings: Tuesdays 10.00 ET, 16.00 CET, 17.00 EET (60 min)

Criteria on this WG’s Decision-Making

Promote “feeling of safety” for teams Promote community Increase # voters, and quality of voter decision-making Increase # projects, and value-add of projects (ref project criteria) Increase OceanDAO (including WGs) transparency, visibility, openness Identify ways for OceanDAO to scale further 3.2 Project-Guiding WG

Mission: To help guide OceanDAO grant proposers and recipients to add value via: discussions, project assessments, ways to leverage the network, and candid feedback. In turn, we hope that a decentralized review and guidance process may lead to many teams that are more effective, as a key part of growing the Ocean ecosystem. The project-guiding WG should help promote a “feeling of safety” for teams. Not gatekeepers.

Stewards: Razvan Olteanu, Alex Napheys

Meetings: Mondays 10.00 ET, 16.00 CET, 17.00 EET

(plus meetings with individual teams by members of WG)

3.3 Core Tech WG

Mission: Steward community initiatives towards high-impact technical outcomes. Near-term mandate: for each grants round, provide 3–10 target tech projects for “earmarks”.

Stewards: Trent McConaghy, Alex Coseru

Meetings: Tuesdays 15.30 CET, 16.30 EET

Responsibilities of Group: Document tech opportunities to improve Ocean product ecosystem, which can be readily done outside OPF core team. These can be improvements to core tech, integrations, or potentially apps on top. Turn top-ranking ones into earmarks and more.

3.4 OceanDAO Engineering WG

Mission: To align internal and external contributors, and improve overall technical output towards OceanDAO Engineering roadmap deliverables. To help identify opportunities and solutions that deliver an efficient DAO-stack across all verticals (grants execution, funding, voting, delegation, UX, treasury management, working groups, etc).

Stewards: Roberto Alcantara

Meetings

Every Mon, Wed, Thurs 15:45 CET, 16:45 EET (15 min) Every Tue 17.00 CET, 18.00 EET (60 min) 3.5 Data Consume Volume WG

Mission: To define best practices, build processes, and increase alignment across all participants within the Ocean Ecosystem towards Data Set supply, liquidity, and most importantly Data Consume Volume.

Stewards: Razvan Olteanu, Sheridan Johns

Meetings: Every 2nd Mon 11.00 ET, 17.00 CET, 18.00 EET. First mtg is Nov 22, 2021.

4. Town Halls

We are updating our Town Hall agenda to improve the UX of every participant, and coordination around every engagement inside OceanDAO.

We will be covering: Grants Program, WGs, Deep Dives, and Dockside.

The Grants Program section will talk about where we are in the funding process, provide visibility into the program, and celebrate each step of the way. The WG section will have each steward present 1–3 slides that cover what each WG is up to. Deep Dive will be presented by both Core & DAO contributors, taking us further into their journeys and providing deep insights into their progress. Dockside will be a period where we invite all Core & DAO participants to share updates, talk about their projects, their proposals, and general updates behind their progress.

Here is the outline for our Nov 10, 2021 Town Hall zoom session which we’ll be using into the future. You can view the TEC Community Call to get an idea of the structure for increased visibility across all WGs.

5. Looking Ahead

Our goal is to continue expanding DAO-first initiatives that facilitate coordination and outcomes towards key organizational pillars. Every WG is aligned with a pivotal mission that will help realize the goals of Ocean Protocol.

Working Groups have been developed around evergreen initiatives that will forever benefit from contributions. There are more WGs that are currently being considered, such as those that involve Outreach:

Awareness & Community Grant Proposal & Referral Business Development

We will continue to reflect on key organizational initiatives and how we can all benefit from increased transparency, coordination, and decentralization.

6. Conclusion

This article introduces OceanDAO Working Groups (WGs). They are a development of OceanDAO’s social layer, as part of a broader shift to embrace and leverage the growing number of participants inside the Ocean Ecosystem.

We have shifted OceanDAO focus away from “ROI > 1”, and towards “value add” with a larger emphasis on community. It’s a softer, gentler DAO that gives more space and freedom for experimentation.

There are WGs for guiding projects, parameters & roadmap, engineering, and more. We invite you to join us on Discord, attend our meetings, and become a WG member!

7. Notes

[1] Working Groups were first announced at the Nov 10, 2021 OceanDAO Town Hall.

Introducing OceanDAO Working Groups was originally published in Ocean Protocol on Medium, where people are continuing the conversation by highlighting and responding to this story.


Coinfirm

FATF’s Updated Guidance for an RBA to VAs and VASPs

On the 28th of October, the Financial Action Task Force (FATF) – the global intergovernmental AML watchdog organization – published its Updated Guidance for a Risk-Based Approach to Virtual Assets and Virtual Asset Service Providers. Coinfirm’s Head of Regulatory Affairs, Barbara Halasek, explains what has changed on the FATF’s stance on Virtual Assets (VAs) and...
On the 28th of October, the Financial Action Task Force (FATF) – the global intergovernmental AML watchdog organization – published its Updated Guidance for a Risk-Based Approach to Virtual Assets and Virtual Asset Service Providers. Coinfirm’s Head of Regulatory Affairs, Barbara Halasek, explains what has changed on the FATF’s stance on Virtual Assets (VAs) and...

Verus

Verus Vault & VerusID (NFT) Marketplace Mainnet Upgrade

Buy and sell VerusIDs in a completely decentralized way without any intermediaries. It’s the next step in the evolution of VerusID, the most powerful self-sovereign identity and secure storage for funds in the digital world. Version 0.9.0 also enables Verus Vault on mainnet, the world’s first solution to truly securing your blockchain funds. Use Vault to lock funds for security, vesting, trusts, i
Buy and sell VerusIDs in a completely decentralized way without any intermediaries. It’s the next step in the evolution of VerusID, the most powerful self-sovereign identity and secure storage for funds in the digital world. Version 0.9.0 also enables Verus Vault on mainnet, the world’s first solution to truly securing your blockchain funds. Use Vault to lock funds for security, vesting, trusts, inheritance, and more. ⏰ VerusID (NFT) Marketplace and Verus Vault activate on block 1,796,400 (expected on Monday, 29 November 2021). Update your wallets to v0.9.0 before the activation blockheight to ensure smooth staking, mining, and general operation. 🏆 Use VerusID (NFT) Marketplace to exchange VerusIDs publicly and privately. 🔒 Use Verus Vault to lock funds for security, vesting, trusts, inheritance, and more. 🏆 A Marketplace for Anything

VerusIDs are much more than a typical digital identity. And once you own one on the Verus blockchain or a compatible PBaaS blockchain, it’s yours forever, rent-free, fully under your control. Until the moment you decide to pass it on.

VerusIDs can be anything you want. They can be bound digitally to many things. They can be bound to you, or other VerusIDs they have authority or ownership of. They can be bound to an unlimited amount of content, data, and provable information, both public and private. Including provable contracts and rights that can be bound to ownership of the VerusID itself.

Each VerusID on the Verus blockchain can even be used with Public Blockchains as a Service (PBaaS — currently on testnet) to launch a token or DeFi currency, and even an interoperable blockchain. These blockchains inherit all features as they are on the Verus blockchain.

VerusIDs can hold funds. They can be personal profiles, corporate websites, or government portals. VerusIDs are much more than identities or today’s NFTs. They are owned assets of all kinds on the Verus blockchain. And now those assets can be exchanged easily.

With the VerusID Marketplace protocol, anyone is able to buy and sell VerusIDs. You can look for offers on any VerusID (buy or sell offers). If you like the best offer on your VerusID, or if someone likes an offer you made on theirs, the deal is made 100% peer-to-peer, decentralized on the blockchain, without any middleman or contract controller.

For total payment privacy, you can even pay or receive payment using private addresses and zero knowledge transactions based on the Zcash Sapling protocol.

Exchanging in Private

In addition to advertising worldwide on the blockchain to buy or sell VerusIDs, you can also make an exchange with the Marketplace without ever posting the offer on the blockchain until it is agreed and signed by all parties. Combine that with zero knowledge transactions, and it’s a great way to transact worldwide, escrow-free in private.

A powerful use case example: A business sells subscriptions for exclusive content. They make VerusIDs with contracts that give access to the exclusive content. They now create a transaction that would pay for the VerusID. They give the transaction to the buyer who then executes it. The buyer now owns the VerusID that gives access to the exclusive content.

Now imagine how you can do this for a VerusID that can be any kind of asset. A new way for everyone to engage in peer-to-peer, escrow-free commerce has arrived.

Five New APIs

VerusID Marketplace introduces five new RPC APIs and CLI commands for this major upgrade: makeoffer, takeoffer, getoffers, closeoffers and listopenoffers.

makeoffer: define what you offer and for what. What you offer can be funds, VerusIDs, or when PBaaS goes live even other currencies. What you want in return can also be funds, VerusIDs or currencies. In exchange for what you offer, you also define what VerusID or how much you want for it and in what currency. takeoffer: take a specific offer in exchange for its request. getoffers: specify which VerusID or currency you want to see offers for or on offer, and it returns all offers (buy and sell) in all currencies, sorted by highest to lowest price. closeoffers: close expired or unexpired offers which you opened with makeoffer. listopenoffers: list all offers that you have opened with makeoffer. 🔒 Protect Your Funds with Verus Vault

The new mainnet upgrade enables a completely new level of security and safety for all your funds. Verus Vault allows you to lock any VerusID under your control, while still using its funds to actively stake and earn on the network.

When you lock a VerusID, its funds can not be spent anymore. All locking and unlocking are visible on the blockchain.

Two Lock Mechanisms

You can lock a VerusID in two different ways that cannot be circumvented by anyone, except the revocation and recovery authorities together.

Locked and unlocked until number of blocks passed: funds can not be spent until a predetermined number of blocks have passed. Locked and unlocked with a delay: funds can not be spent until an unlock has been requested + a predetermined number of blocks have passed Powerful Use Cases Safe staking: put funds to stake with on a VerusID. Use Vault to lock the identity with a delay of 10,080 blocks ( ~1 week). Now whenever someone gains access to the private keys of the locked VerusID, they have to unlock the identity in order to spend the funds. When someone makes an unlock request that isn’t you, you are warned. The intruder has to wait 10,080 blocks before he can spend the funds. If you have set up revocation and recovery authorities, you now have one week to safeguard your funds away from prying hands, back into your control. Trusts: setting up a trust fund for your children. Give your child a time locked VerusID with funds on them. When he or she turns 18, the VerusID unlocks and the funds can be spent. Keep revocation and recovery authorities with yourself or a trustee. Vesting period: when doing a currency or chain launch, development funds can be diverted to a locked VerusID. After two years the VerusID unlocks and the funds can only be spent with signatures of other developers. You can also spread the funds across multiple identities with different unlock periods.

These are just a few examples on how the powerful Verus Vault can be used. VerusID can store any asset on the Verus network, including those bridged from other blockchains. When PBaaS is on mainnet, the first bridged asset is Ethereum.

⏰ VerusID (NFT) Marketplace and Verus Vault activate on block 1,796,400 (expected on Monday, 29 November 2021). Update your wallets to v0.9.0 before the activation blockheight to ensure smooth staking, mining, and general operation. 🏆 Use VerusID (NFT) Marketplace to exchange VerusIDs publicly and privately. 🔒 Use Verus Vault to lock funds for security, vesting, trusts, inheritance, and more. 🔥 Visit verus.io for more information on Verus

Verus Vault & VerusID (NFT) Marketplace Mainnet Upgrade was originally published in Verus Coin on Medium, where people are continuing the conversation by highlighting and responding to this story.


Elliptic

Crypto Regulatory Affairs: SEC Shares Views on DeFi Risks, Regulation and Opportunities

  SEC Shares Views on DeFi Risks, Regulation and Opportunities On November 9th 2021, Commissioner Caroline A. Crenshaw of the US Securities and Exchange Commission (SEC) offered views on the status of decentralized finance (DeFi) regulation in an article published in The International Journal of Blockchain Law. While DeFi has the potential to optimise transaction speed, cost,
  SEC