<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Decentralized Identity Foundation - Medium]]></title>
        <description><![CDATA[DIF is building decentralized identity technology and standards - Medium]]></description>
        <link>https://medium.com/decentralized-identity?source=rss----7762224fe580---4</link>
        <image>
            <url>https://cdn-images-1.medium.com/proxy/1*TGH72Nnw24QL3iV9IOm4VA.png</url>
            <title>Decentralized Identity Foundation - Medium</title>
            <link>https://medium.com/decentralized-identity?source=rss----7762224fe580---4</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Sun, 19 Apr 2026 23:22:45 GMT</lastBuildDate>
        <atom:link href="https://medium.com/feed/decentralized-identity" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[DIF Grant #1: JWS Test Suite]]></title>
            <link>https://medium.com/decentralized-identity/dif-grant-1-jws-test-suite-a26cc4a95540?source=rss----7762224fe580---4</link>
            <guid isPermaLink="false">https://medium.com/p/a26cc4a95540</guid>
            <category><![CDATA[grant]]></category>
            <category><![CDATA[test-suite]]></category>
            <category><![CDATA[claims-and-credentials-wg]]></category>
            <category><![CDATA[dif-working-groups]]></category>
            <category><![CDATA[verifiable-credentials]]></category>
            <dc:creator><![CDATA[Decentralized Identity Foundation]]></dc:creator>
            <pubDate>Mon, 23 Aug 2021 16:22:45 GMT</pubDate>
            <atom:updated>2021-08-23T16:22:45.842Z</atom:updated>
            <content:encoded><![CDATA[<p>The Decentralized Identity Foundation announced recently a new mechanism for rewarding and funding work in the common interest of its membership, the <a href="https://blog.identity.foundation/introducing-dif-grants/">DIF Grants Program</a>. The Steering Committee ratified an addendum defining these collaborations between a specific DIF working group and a grant sponsor, and this shiny new tool sits ready to be debuted in the toolkit available to DIF community work. DIF’s work is leveling up with this new mechanism for transparently funding work that supports DIF’s mission and benefits the membership as a whole.</p><p>The first such grant was initiated by Microsoft, which has a long history of collaborations in DIF. Of the various modalities described by the grant program, The Claims and Credentials Working Group will be overseeing a new work item open to all DIF members that creates and harden a JWS test suite, with this grant funding a lead editor to drive the work and keep it to a pre-determined timeline, paid upon stable and complete release.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*NDS9xnnWsf8itmUr.png" /><figcaption>Photo by <a href="https://unsplash.com/@natasyachen">Natasya Chen</a></figcaption></figure><h3>History</h3><p>Pamela Dingle, co-chair of the Interoperability WG, identified a recurring theme in conversations about interoperability across the great “JSON”/”JSON-LD” divide: while considerable cross-vendor, cross-stack alignment had happened over the last years to address many other aspects of credential exchange and identifier resolution, “translation issues” and varying interpretations of the JSON sections of the VC data model specification lead to divergent ways of structuring, defining, signing, and parsing VCs in JWT form. The kinds of signature suite definitions that define Linked Data Proofs made strange bedfellows with the in-built mechanisms of JWT, which were hardened and commoditized earlier. This results in a slightly “balkanized” landscape of VC-JWTs that make different concessions to the expectations of JSON-LD-native parsers and systems.</p><p>Initially, the idea of iterating one or more foundational specifications seemed a natural solution: a few key sections of any specification could be made more explicit, more normative, or less ambiguous. But just as the plural of anecdote is not data, so too is the plural of specifications not disambiguation. Another tack was chosen: implementers of the existing specification would come together and compare their running code to identify every difference and incompatibility, defining a test suite that interpreted the <em>current </em>specification. They might still produce a list of changes they would like to see in a future specification, and that list might contain some contentious items that take a long time to align. But in the meantime, they would have a practical roadmap to alignment and a benchmark for conformance to drive interoperability amongst each other and clarity for external interoperability.</p><h3>A signature suite that spans two worlds</h3><p>The specification under test in this new work item is <a href="https://w3c-ccg.github.io/lds-jws2020/">Json Web Signature 2020 </a>(“JWS2020” for short), a CCG signature suite that defines how the signature mechanisms and data structures native to “detached signature” JWS tokens can be parsed as <a href="https://w3c-ccg.github.io/ld-proofs/">Linked Data Proofs</a>. The signature mechanisms of the <a href="https://medium.facilelogin.com/jwt-jws-and-jwe-for-not-so-dummies-b63310d201a3">JWT world</a> and the <a href="https://lists.w3.org/Archives/Public/public-credentials/2021Feb/att-0130/VerifiableTrustStandards.png">LDP world</a> are quite different– bridging them requires a deep understanding of both: differing security models, canonization and serialization complexities, explicit reliance on <a href="https://www.iana.org/protocols">IANA registries</a>, <a href="https://json-ld.github.io/rdf-dataset-canonicalization/spec/">URDNA dataset normalization</a>, and the like. Advanced topics, even for this blog!</p><p>Understanding such a specification on a deep intellectual level and understanding its design decisions requires a firm grasp on all these complexities spanning two very different engineering traditions. <strong>Implementing the specification, however, should not</strong>; to be blunt, our community cannot afford such understanding gating off successful implementation, particularly if industrial adoption of decentralized identity is a shared goal. Before the specification gets iterated, it needs to be testable, and even more implementable than it already is.</p><p>This is where a test suite offers pedagogical tool for first-time implementers, as well as a negotiation tool for seasoned veterans and large corporations managing vast roadmaps and production development pipelines. While many DIF members do not encode VCs in JWT form, this grant is clearly in the common interest because mainstream adoption will indisputably benefit from a clearer, more explicitly-defined, and definitively-testable “<strong>normative VC-JWT</strong>”.</p><h3>Selection Process</h3><p>From 26 July 2021 to 9 August 2021, the chairs fielded applications through a google <a href="https://forms.gle/hPCNWaAQZpLFZyXd7">form</a>, and submitted all valid application to <a href="https://github.com/decentralized-identity/claims-credentials/tree/main/grants/grant_1/applications">github</a> for posterity. The selection criteria for the work item lead is as follows:</p><ol><li>familiarity with JWS mechanics and common JOSE libraries/best-practices</li><li>experience with automated testing, vector design, and test scripts/suites</li><li>familiarity with LD Proofs and signature suites generally</li><li>familiarity with JSON/JSON-LD interop problems, at the semantic, signature-verification, and representation/parsing levels</li></ol><h3>Grantee Announcement</h3><p>On 12 August 2021, The Claims &amp; Credential (C&amp;C) Working Group at DIF gladly announced Transmute Industries as the recipient of the first DIF Grant to provide a JWS Test Suite for Verifiable Credentials. One of the chairs, Martin Riedel, summarized the chairs’ decision thusly:Transmute has been a thought leader in the SSI space for years and uniquely fits the requirement profile laid out in the <a href="https://blog.identity.foundation/dif-grant-1-jws-test-suite/">Grant announcement</a>.</p><ol><li>Orie Steele, the CTO of Transmute, is the initiating author of, lead editor of, and main contributor to <a href="https://w3c-ccg.github.io/lds-jws2020/">the (LD-) JSON Web Signature 2020</a>.</li><li>Transmute has a strong background in TDD and is a strong proponent of delivering test vectors with specifications in order to achieve greater implementation-level interoperability. Examples include Test Vectors in <a href="https://github.com/transmute-industries/sidetree.js/tree/main/packages/test-vectors">Sidetree.js</a> and <a href="https://github.com/transmute-industries/did-key.js/tree/main/packages/did-key-test-vectors">did-key.js</a>.</li><li>The company already provides integrated libraries to support (LDS)-VC and JWT-VC side-by-side, demonstrating their familiarity with both representations. See <a href="https://github.com/transmute-industries/verifiable-data/blob/c61c2eeff859a902cfbaf375424b3b5cfa519ea6/packages/vc.js/README.md">vc.js</a>.</li><li>Lastly, Transmute has a strong track record of making specifications and libraries accessible to the general public in a variety of deployed web-projects (<a href="https://did.key.transmute.industries/">https://did.key.transmute.industries/</a>, <a href="https://wallet.interop.transmute.world/">https://wallet.interop.transmute.world/</a> and others…)</li></ol><p>Therefore we regard Transmute Industries as the ideal candidate to provide a comprehensive JWS test suite for LDS-VC and JWT-VC and support the community interactions around this project within DIF’s C&amp;C Group.</p><h3>Next Steps</h3><p>The new work item will be announced and regular meetings initiated at the 23 August meeting of C&amp;C– if you are interested in participating, please attend and/or drop a note in the C&amp;C slack channel.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=a26cc4a95540" width="1" height="1" alt=""><hr><p><a href="https://medium.com/decentralized-identity/dif-grant-1-jws-test-suite-a26cc4a95540">DIF Grant #1: JWS Test Suite</a> was originally published in <a href="https://medium.com/decentralized-identity">Decentralized Identity Foundation</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Setting Interoperability Targets Part 2 of 2]]></title>
            <link>https://medium.com/decentralized-identity/setting-interoperability-targets-part-2-of-2-671f8faa8ecb?source=rss----7762224fe580---4</link>
            <guid isPermaLink="false">https://medium.com/p/671f8faa8ecb</guid>
            <category><![CDATA[interoperability]]></category>
            <category><![CDATA[standards]]></category>
            <category><![CDATA[framework]]></category>
            <category><![CDATA[dif-working-groups]]></category>
            <category><![CDATA[decentralization]]></category>
            <dc:creator><![CDATA[Decentralized Identity Foundation]]></dc:creator>
            <pubDate>Tue, 10 Aug 2021 08:44:47 GMT</pubDate>
            <atom:updated>2021-08-10T08:44:47.452Z</atom:updated>
            <content:encoded><![CDATA[<p><em>Having shown in our last piece how interoperability “profiles” are designed, we now tackle some key technical problem areas ripe for this kind of profile-first interoperability work across stacks.</em></p><p>In our <a href="https://blog.identity.foundation/setting-interoperability-targets/">last essay</a>, we explored the means and ends of interoperability targets and roadmapping across stacks and markets. “Interoperability,” like “standardization,” can be a general-purpose tool or an umbrella of concepts, but rarely works from the top-down. Instead, specific use-cases, consortia, contexts, and industries have to take the lead and prototype something more humble and specific like an “<strong>interoperability profile</strong>” — over time, these propagate, get extended, get generalized, and congeal into a more universal and stable standard. Now, we’ll move on to some technical problem areas ripe for this kind of profile-first interoperability work across stacks.</p><p>&gt; <em>What makes sense to start aligning now? What are some sensible scopes for interoperating today, or yesterday, to get our fledgling market to maturity and stability as soon as safely possible?</em></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*5EN1bYj3NDrRA80q.png" /><figcaption>Ponte Vecchio, Fiorenze, by <a href="https://unsplash.com/photos/GHoX7zFRMMU">Ray Harrington</a></figcaption></figure><h3>From testable goals to discrete scopes</h3><p>The last few months have seen a shift in terminology and approach, as many groups turn their attention from broad “interoperability testing” to more focused “profiles” that test one subset of the optionalities and capabilities in a larger test suite or protocol definition. This decoupling of test suites from multiple profiles each suite can test helps any one profile from ossifying into a “universal” definition of decentralized identity’s core featureset.</p><p>As with any other emerging software field, <strong>every use case and context has its own interoperability priorities</strong> and constraints that narrow down the technological solution space into a manageable set of tradeoffs and decisions. For instance, end-user identification at various levels of assurance is often the most important implementation detail for, say, a retail bank, and DID-interoperability (which is not always the same thing!) might be a hardware manufacturer’s primary concern in being able to secure hardware supply chains.</p><p>Every industry has its unique set of minimum security guarantees, and VC-interoperability is obviously front-of-mind for credentialing use-cases. For example, in the medical data space, “Semantics” (data interpretation and metadata) might be a harder problem (or a more political one) than the mechanics of identity assurance, since high standards of end-user privacy and identity assurance have already made for a relatively interoperable starting points. Which exact subset of the many possible interoperability roadmaps is safest or most <strong>mission-critical </strong>for a given organization depends on many factors: the regulatory context, the culture of the relevant sectors, its incentive-structures, and its <a href="https://www.eff.org/de/deeplinks/2019/10/adversarial-interoperability">business models</a>.</p><p>Cross-cutting industry verticals, however, are structural issues with how decentralized identity stacks and architecture vary, which can already been seen today. By applying “<strong>first principles</strong>,” (or in our case, the “<a href="https://github.com/WebOfTrustInfo/rwot9-prague/blob/master/topics-and-advance-readings/functional-identity-primer.md"><strong>functions</strong></a>” of a decentralized identity system and its many moving parts) across use-cases and industrial contexts, certain shared problems arise. As is our default approach in DIF Interop WG, we applied DIF’s in-house <a href="https://github.com/decentralized-identity/interoperability/raw/master/assets/interop-mapping-version-by-Hakan-Yildiz(TUB).pdf"><strong>mental model</strong></a><strong> of the “5 layers” of decentralized identity systems</strong>, sometimes called “the 4+1 layers”. (See also the <a href="https://github.com/decentralized-identity/decentralized-identity.github.io/raw/master/assets/crosscommunity-architecture-survey-oct-2020.pdf">more detailed version</a>).</p><p>We call these the “4+1” layers because our group agreed that a strict layering was not possible, and that all the architectures we compared for using verifiable credentials and decentralized identifiers had to make major architectural decisions with consequences across all four of the more properly “layered” categories. This fifth category we named “<strong>transversal considerations</strong>,” since they traverse the layers and often come from architectural constraints imposed by regulation, industrial context, etc. Foremost among these are storage and authorization, the two most <strong>vexing </strong>and cross-cutting problems in software generally; these would justify an entirely separate article.</p><p>In a sense, none of the topics from this transversal category are good candidates for specification in the medium-term across verticals and communities — they are simply too big as problems, rarely specific to identity issues, and being addressed elsewhere. These include “storage” (subject of our newest <a href="https://identity.foundation/working-groups/secure-data-storage.html">working group</a>), “authorization” (debatably the core problem of all computer science!), “cryptographic primitives”, and “compliance.” <em>(These last two are each the subject of a new working group, </em><a href="https://identity.foundation/working-groups/crypto.html"><em>Applied Cryptography</em></a><em> and </em><a href="https://identity.foundation/working-groups/wallet-security.html"><em>Wallet Security</em></a><em>!)</em>. These interoperability scopes are <strong>quite difficult </strong>to tackle quickly, or without a strong standards background. Indeed, these kinds of foundational changes require <a href="https://mattrglobal.github.io/oidc-client-bound-assertions-spec/">incremental advances</a> and <a href="https://medium.com/decentralized-identity/dif-oidf-9753b9bd0093">broad cooperation</a> with large community organizations. This is slow, foundation work that needs to connect parallel work across data governance, authentication/authorization, and storage in software more generally.</p><p>Similarly, the fourth layer, where ecosystem-, platform-, and industry-specific considerations constrain application design and business models, is unlikely to crystallize into a problem space calling out for a single specification or prototype in the medium-term future. Here, markets are splintered and it is unclear what can be repurposed or recycled outside of its original context. Even if there were cases where specification at this later would be timely, DIF members might well choose to discuss those kinds of governance issues at our sister-organizations in the space that more centrally address data governance at industry-, ecosystem-, or national- scale: <a href="http://trustoverip.org/">Trust over IP</a> was chartered to design large-scale governance processes, and older organizations like <a href="https://mydata.org/">MyData.org</a> and the <a href="https://kantarainitiative.org/">Kantara Initiative</a> also have working groups and publications on vertical-specific and jurisdiction-specific best practices for picking interoperable protocols and data formats.</p><p>That still leaves three “layers”, each of which has its own interoperability challenges that seem most urgent. It is our contention that each of these could be worked on in parallel and independently of the other two to help arrive at a more interoperable community — and we will be trying to book presentation and discussion guests in the coming months to advance all three.</p><h3>Scope #1: Verifiable Credential Exchange</h3><p>The most clear and consensus-building, even <em>urgent </em>way forward is to bring clarity to Verifiable Credential exchange across stacks. This has been the primary focus of our WG for the last year. Given that most of the early ecosystem-scale interest in SSI revolves around <a href="https://identity.foundation/faq/#vc-infrastructure-layer-3">credentialing</a> (educational credentials, employment credentials, health records), it is highly strategic to get translation and unified protocols into place soon for the interoperable verification and cross-issuance of credentials.</p><p>In fact, there has actually been a lot of good progress made since Daniel Hardman wrote an <a href="https://www.evernym.com/blog/getting-to-practical-interop-with-verifiable-credentials/">essay</a> on the Evernym blog making a pragmatic case for sidestepping differences in architecture and approach to exchange VCs sooner. This aligned with much of our group’s work in recent months, which has included a <a href="https://hackmd.io/t1cotiReTXCnkpDG8k2tVA#THE-MAIN-EVENT">survey of VC formats</a> among organizations producing “wallets” for verifiable credentials (be they “edge” wallets or otherwise). Our group has also sought to <a href="https://youtube.com/playlist?list=PL8j6niRuFWTjVMIXqmw3zX-4KkLt-sli8">assist educational efforts</a> at the <a href="https://w3c-ccg.github.io/">CCG</a>, in the Claims and Credentials <a href="https://identity.foundation/working-groups/claims-credentials.html">working group</a>, and elsewhere to make wallet-producing organizations aware of the relevant <a href="https://github.com/decentralized-identity/vc-spec-map">specifications</a> and <a href="https://www.notion.so/dif/be6763341a014d248f655aea187d7890?v=c9ac48a07f3d411c9a1bea32b55f7e76">other references</a> needed to make their wallets multi-format sooner and less painfully. Much of this work was crystalized into an <a href="https://www.lfph.io/wp-content/uploads/2021/02/Verifiable-Credentials-Flavors-Explained.pdf">article</a> by co-chair Kaliya Young and crowd-edited by the whole group; this work was a major guiding structure for the Good Health Pass work that sought to make a common health record format (exported from FHIR systems) equally holdable and presentable across all of today’s VC systems.</p><p>One outgrowth of this effort and other alignments that have taken place since Hardman’s and Young’s article is the work of prototyping a multi-community exchange protocol that allow a subset of each stack’s capabilities and modes to interoperate. This tentative, “minimum viable profile” is called <a href="https://github.com/decentralized-identity/waci-presentation-exchange">WACI-PEx</a> and is currently a work item of the Claims and Credentials working group. Work is ongoing on v0.1, and an ambitious, more fully-featured v1 is planned for after that. This profile acts as an “extension” of the broader Presentation Exchange protocol, giving a handy “cheat sheet” for cross-stack wallet-to-issuer/verifier handshakes so that developers not familiar with all the stacks and protocols being spanned have a starting point for VC exchanges. Crucially, the results of this collaborative prototype will be taken as inputs to future versions of the DIDComm protocols and the WACI specification for Presentation Exchange.</p><p><em>Note: There has been some discussion of a OIDC-Presentation Exchange profile at some point in the future, but given that the alignment of DIDComm and Presentation Exchange started over a year ago, the most likely outcome is that work on this would not start until after v1 has been released of the “WACI-PEx” profile for DIDComm has been released.</em></p><h3>Scope #2: Anchoring layer</h3><p>Of course, <strong>other forms of alignment are </strong>possible as well in the “bottom 3” layers of the traditional stack, while we wait on the ambitious transversal alignment specifications and the ongoing work to align and simplify cross-format support for VCs (and perhaps even multi-format VCs, as Hardman points out in the essay above).</p><p>The <a href="https://identity.foundation/working-groups/identifiers-discovery.html">Identifiers and Discovery</a> WG at DIF has long housed many <strong>work items</strong> to align on the lowest level of stack, including general-purpose <a href="https://github.com/decentralized-identity/jsonld-common-java">common libraries</a> and <a href="https://github.com/decentralized-identity/secret-recovery-methods">recovery mechanisms</a>. It has also received many donations that contribute to method-level alignment, including a recent <a href="https://medium.com/decentralized-identity/trinsic-donates-did-key-rs-to-i-d-wg-8a278f37bcd0?source=friends_link&amp;sk=dbd175f5db9107ed1e9d953a386441a4">DID-Key implementation</a> and a linked-data <a href="https://github.com/decentralized-identity/jsonld-document-loader">document loader</a> donated by Transmute. The group has also served as a friendly gathering point for discussing calls for input from the DID-core working group at W3C and for proposing W3C-CCG work items.</p><p>One particularly noteworthy initiative of the group has been the <a href="https://medium.com/decentralized-identity/the-universal-resolver-infrastructure-395281d2b540?source=friends_link&amp;sk=306a37f289dcf61a89d19cd11f5be04e">Universal Resolver</a> project, which offers a kind of “trusted middleware” approach to DID resolution across methods. This prototype of a general-use server allows any SSI system (or non-SSI system) to submit a DID and get back a trustworthy DID Document, without needing any knowledge of or access to (much less <em>current </em>knowledge of or <em>authenticated </em>access to) the “black box” of the participating DID methods. While this project only extends “<em>passive </em>interoperability” to DIDs, i.e., only allowing DID document querying, a more ambitious sister project, the <a href="https://github.com/decentralized-identity/universal-registrar">Universal Registrar</a>, strives to bring a core set of CRUD capabilities to DID documents for DID methods willing to contribute drivers. Both projects have dedicated weekly calls on the DIF calendar, for people looking to submit drivers or get otherwise involved.</p><h3>Scope #3: “Agent”/Infrastructure Layer</h3><p>There is another layer, however, in between DIDs and VCs, about which we haven’t spoken yet: the crucial “agent layer” in the ToIP/Aries mental model, which encompasses trusted infrastructure whether in or outside of conventional clouds. The Aries Project has scaled up an impressively mature ecosystem of companies and experimenters, largely thanks to the robust infrastructure layer it built (and abstracting away from application-layer developers and experimenters).</p><p>Until now, differences of strategy with respect to conventional clouds and infrastructures have prevented large-scale cooperation and standardization at this layer outside of Aries and the DID-Comm project. Partly, this has been a natural outgrowth of the drastically different infrastructural needs and assumptions of non-human, enterprise, and consumer-facing/individual use cases, which differ more at this level than above or below. Partly, this is a function of the economics of our sector’s short history, largely influenced by the infrastructure strategies of cloud providers and telecommunication concerns.</p><p>This is starting to change, however, now that agent frameworks inspired by the precedent set by the Aries frameworks have come into maturity. Mattr’s <a href="https://auth0.com/blog/verifiable-credentials-with-auth0-and-mattr/">VIII Platform</a>, the Affinidi framework SDK (including open-source <a href="https://docs.affinidi.com/interop">components by</a> DIF members Bloom, Transmute, and Jolocom), ConsenSys’ own modular, highly <a href="https://veramo.io/docs/veramo_agent/plugins">extensible</a> and interoperable <a href="https://veramo.io/">Veramo</a> platform, and most recently Spruce ID’s very <a href="https://github.com/spruceid/ssi">DID-method-agnostic</a> <a href="https://spruceid.dev/docs/didkit/">DIDKit</a>/<a href="https://spruceid.dev/docs/credible/">Credible</a> SDK all offer open-source, extensible, and scalable infrastructure layers that are driving the space towards greater modularity and alignment at this layer.</p><p>As these platforms and “end-to-end stacks” evolve into frameworks extensible and capacious enough to house ecosystems, DIF expects alignment and harmonization to develop. This could mean standardization of specific components at this layer, for example:</p><ul><li>The DIDComm protocol could expand into new <a href="https://tools.ietf.org/id/draft-looker-jwm-01.html">envelopes</a> and transports</li><li><a href="https://github.com/decentralized-identity/secret-recovery-methods">Control recovery</a> mechanisms could be specified across implementations or even standardized on a technical and/or UX level</li><li>Auditing or historical-query requirements could be specified to form a cross-framework protocol or primitive</li><li>Common usages of foreign function interfaces, remote procedure calls like gRPC and JSON-RPC, or other forms of “glue” allowing elements to be reused or mixed and matched across languages and architectures could be specified as a community</li></ul><p>We are very much in early days, but some see on the horizon a day when frameworks that don’t cooperate with one another can’t compete with the ones that join forces. After all, adoption brings growing pains, particularly for the labor market — aligning on architectures and frameworks makes onboarding developers and transferring experience that much easier to do!</p><h3>Next Steps</h3><p>I would encourage anyone who has read this far to pick at least one of the three scopes mentioned above and ask themselves how they are helping along this alignment process in their day-to-day work, and if they truly understand what major players at that level are doing. Often large for-profit companies pay the most attention to what their competitors are doing, but here it is important to think outside of competition and look instead at non-profit organizations, regulators, and coalitions of various kinds to really see where the puck is heading. Sometimes consensus on one level is blocking compromise somewhere else. It can be pretty hard to follow!</p><p>In recent articles, DIF has encouraged its members to think about an open-source strategy as comparably important to a business plan, a living document and guiding philosophy. I would like to suggest that the subset of DIF companies working with VCs and DIDs should also think of interoperability strategy and conformance testing as the most crucial pillar of that strategy — if you cannot <strong>demonstrate </strong>interoperability, you might be asking people to take that strategy on faith!</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=671f8faa8ecb" width="1" height="1" alt=""><hr><p><a href="https://medium.com/decentralized-identity/setting-interoperability-targets-part-2-of-2-671f8faa8ecb">Setting Interoperability Targets Part 2 of 2</a> was originally published in <a href="https://medium.com/decentralized-identity">Decentralized Identity Foundation</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Setting Interoperability Targets Part 1 of 2]]></title>
            <link>https://medium.com/decentralized-identity/setting-interoperability-targets-part-1-of-2-c6cbeaf82e98?source=rss----7762224fe580---4</link>
            <guid isPermaLink="false">https://medium.com/p/c6cbeaf82e98</guid>
            <category><![CDATA[standards]]></category>
            <category><![CDATA[interoperability]]></category>
            <category><![CDATA[decentralization]]></category>
            <category><![CDATA[dif-working-groups]]></category>
            <category><![CDATA[strategy]]></category>
            <dc:creator><![CDATA[Decentralized Identity Foundation]]></dc:creator>
            <pubDate>Mon, 05 Jul 2021 15:28:41 GMT</pubDate>
            <atom:updated>2021-08-10T08:35:03.182Z</atom:updated>
            <content:encoded><![CDATA[<p><em>Conformance Testing for Measurable Goals</em></p><p><em>[Written in consultation with the</em><a href="https://github.com/decentralized-identity/interoperability"><em> Interoperability Working Group</em></a><em> chairs]</em></p><p>A recurring topic in the Interoperability Working Group is that of defining short-, medium- and long-term goals or “<strong>targets</strong>” for interoperability. The topic comes up again every few months, and each time it does, the chairs try to tackle it head-on for a full meeting or two, some emails, and various off-line discussions, but doing so never seems to arrive at a satisfactory or definitive answer. Each time, what feels a Herculean outlay of effort only gets us a tentative resolution, as if we’d deflected a debt collector with a minimum payment. Dear reader, we would like to refinance, or at least <em>restructure</em>, this debt to our community!</p><p>In this two-part overview of our goals for 2021, we would like to survey the landscape of “provable,” testable interoperability targets and give some guidance on what we would like to see happen next in the testable interop world. Then, in a companion article, we will lay out clear proposal for parallel, <strong>distributed </strong>work on multiple fronts, such that progress can be distributed across various subcommunities and hubs of open cooperation, each reasonably confident that they are helping the big picture by “zooming in” on one set of problems.</p><figure><img alt="Strategy board game artfully photographed" src="https://cdn-images-1.medium.com/max/1024/1*_zbMB0h-5dgKu1RyMcw3Zg.jpeg" /><figcaption>Photo by <a href="https://unsplash.com/@christopherphigh">Christopher Paul High</a></figcaption></figure><h3>A seemingly uncontroversial target state</h3><p>Interoperation is a deceptively transparent etymology: any two things that perform a function are inter-operating if they can perform their operation together and mutually. Two fax machines interoperate if one sends a fax and the other receives it, which is a far more impressive feat if the two machines in question were designed and built by different companies on different continents, fifteen years apart. This is the kind of target state people usually have in mind when they imagine interoperability for an emerging technology.</p><p>This everyday example glosses over a lot of <strong>complexity and history</strong>, however. Standards bodies had already specified exact definitions of how the “handshake” is established between two unfamiliar fax machines before either model of fax machine was a twinkle in a design team’s eye. In addition to all the plodding, iterative standardization, there has also been a lot of economic trial and error and dead-ends we never heard about. Even acceptable margins of error and variance from the standards have been prototyped, refined, socialized, and normalized, such that generations of fax machines have taken them to heart, while entire factories have been set up to produce standard components like white-label fax chips and fax boards that can be used by many competing brands. On a software level, both design teams probably recycled some of the same libraries and low-level code, whether open-source or licensed.</p><p>Decomposing this example into its requirements at various levels shows how many interdependent and complex subsystems have to achieve internal maturity and sustainable relationships. A time-honored strategy is to treat each of these subsystems in a distinct, parallel <strong>maturation process </strong>and combine them gradually over time. The goal, after all, is not a working whole, but a working ecosystem. Architectural alternatives, for example, have to be debated carefully, particularly for disruptive and emerging technologies that redistribute power within business processes or ecosystems. Sharing (or better yet, responsibly open-sourcing and governing) <strong>common </strong>software libraries and low-level hardware specifications is often a “stitch in time” that saves nine later stitches, since it gives coordinators a stable baseline to work from, sooner.</p><p>Naturally, from even fifty or a hundred organizations committed to this target state, a thousand different (mostly sensible) strategies can arise. “How to proceed?” becomes a far-from-trivial question, even when all parties share many <strong>common goals and incentives</strong>. For instance, almost everyone:</p><ul><li>Wants to grow the pie of adoption and market interest</li><li>Holds privacy and decentralization as paramount commitments</li><li>Strives to avoid repeating the mistakes and assumptions of previous generations of internet technology</li></ul><p>And yet, all the same… both strategic and tactical differences arise, threatening to entrench themselves into camps or even <em>schools of thought</em>. How to achieve the same functional consensus on strategy as we have on principles? Our thesis here is that our short-term roadmaps need testable, provable alignment goals that we can all agree on for our little communities and networks of technological thinking to converge gradually. Simply put, we need a few checkpoints and short-term goals, towards which we can all work together.</p><h3>Today’s test suites and interoperability profiles</h3><p>Perhaps the biggest differences turn out not to be about target state or principles, but about what exactly “conformance” means relative to what has already been specified and standardized. Namely, the core specifications for DIDs and VCs are both <strong>data models </strong>written in the Worldwide Web Consortium (W3C)<strong>, </strong>which put protocols out of scope. This stems partly from the decisions of the groups convened in the W3C, and partly from a classic division of labor in the internet standards world between W3C, which traditionally governs the data models of web browser and servers, and a distinct group, the Internet Engineering Task Force (IETF).</p><p>VCs were specified first, with a preference (but not a requirement) for DIDs, with exact parameters for DIDs and DID systems deferred to a separate data model. Then, to accommodate entrenched and seemingly irreconcilable ideas about how DIDs could best be expressed, the DID data model was made less representationally-explicit and turned into an <em>abstract</em> data model. This shift to a representation-agnostic definition of DIDs, combined with the still-tentative and somewhat representation-specific communication and signing protocols defined to date, makes truly agnostic and cross-community data model conformance somewhat difficult to test. This holds back interoperability (and objective claims to conformance)!</p><h3>W3C: Testing the core specifications</h3><p>The only test suite associated with the core W3C specifications is the <a href="https://github.com/w3c-ccg/vc-http-api/tree/main/packages/vc-http-api-test-server"><strong>VC-HTTP-API test suite </strong></a>for VC data model conformance and the fledgling <a href="https://w3c.github.io/did-test-suite/"><strong>DID-core test suite</strong></a>, both worked on in the W3C-CCG. The former tests implementations of VC-handling systems against some pre-established sample data and test scripts through a deliberately generalized API interface that <strong>strives to be minimally opinionated</strong> with respect to context- and implementation-specific questions like API authentication. The latter is still taking shape, given that the DID spec has been very unstable in the home stretch of its editorial process arriving at CR this last week.</p><p>The VC-HTTP-API interface, specified collectively by the first <a href="https://www.dhs.gov/science-and-technology/svip">SVIP</a> funding cycle cohort for use in real-world VC systems, has been used in some contexts as a <strong><em>de facto </em>general-purpose architecture profile</strong>, even if it is very open-ended on many architectural details traditionally specified in government or compliance profiles. Its authors and editors did not intend it to be <em>the </em>general-purpose profile for the VC data model generally, but in the absence of comparable alternatives, it is sometimes taken as one; it has perhaps taken on more of a definitive role than originally intended.</p><p>Following the second iteration of the SVIP program and the expansion of the cohort, the API and its test suite are poised to accrue features and coverage to make it more useful outside of its original context. Core participants have established a <a href="https://w3c-ccg.github.io/meetings/">weekly public call</a> at the CCG and a lively re-scoping/documentation process is currently underway to match the documentation and rationale documents to the diversity of contexts deploying the API.</p><h3>Aries: End-to-end conformance testing</h3><p>Other profiles, like <strong>the Aries interoperability profile</strong>, serve an important role, but it would be misleading to call it a VC data model test suite — it is more like an end-to-end test harness for showing successful implementation of the Aries protocols and architecture. Here “interoperability” means interoperability with other Aries systems, and conformance with <em>the shared Aries interpretation</em> of the standard VC data model and the protocols this community has defined on the basis of that interpretation.</p><p>Many matters specified by the W3C data model are abstracted out or addressed by shared libraries in Ursa, so its scope is not exactly coterminous with the W3C data model. Instead, the Aries interoperability profile has its own <strong>infrastructural </strong>focus, which focuses on scaling the privacy guarantees of blockchain-based ZKP systems. In many ways, this focus <em>complements</em> rather than supplants that of the W3C test suites.</p><p>Many of the trickiest questions on which SSI systems differ are rooted in what the Aries and Trust-over-IP communities conceptualize as “<a href="https://github.com/hyperledger/aries-rfcs/tree/master/concepts/0289-toip-stack"><strong>layer 2</strong></a>,” the connective infrastructural building-blocks connecting end-users to VCs and DIDs. As more and more features get added to be testable across language implementations, and as feature-parity is achieved with other systems (such as <a href="https://youtu.be/LC0OXAir3Qw">support for LD VCs</a>), the case for productive complementarity and deep interoperability gets easier and easier to make.</p><h3>The first wave of local profiles and guidelines</h3><p>Other specifications for decentralized-identity APIs and wallets, modelled on that W3C CCG and/or extending the work of Aries-based infrastructures, are starting to crop up around the world. So far these have all arisen out of ambitious government-funded programs to build infrastructure, often with an eye to local governance or healthy competition. Canada and the European Commission are the most high-profile ones to date, building on earlier work in Spain, the UK, and elsewhere; Germany and other countries funding next-generation trust frameworks may soon follow suit.</p><p>It is important, however, to <strong>avoid </strong>framing these tentative, sometimes cautious attempts at bridging status quo and new models as <strong>universal </strong>standards. If anything, these frameworks tend to come with major caveats and maturity disclaimers, on top of having carefully narrowed scopes. After all, they are generally the work of experienced regulators, inheriting decades of work exploring identity and infrastructural technologies through a patchwork of requirements and local profiles that tend to align over time. If they are designed with enough circumspection and dialogue, conformance with one should never make conformance with another impossible. (The authors would here like to extend heartfelt sympathy to all DIF members currently trying to conform to multiple of these at once!)</p><p>These profiles test <strong>concrete </strong>and <strong>specific interpretations </strong>of a shared data model that provide a testing benchmark for regulatory “green lighting” of specific implementations and perhaps even whole frameworks. Particularly when they specify best practices or requirements for security and API design, they create testable standardization by making explicit their opinions and assumptions about:</p><ul><li>approved cryptography,</li><li>auditing capabilities,</li><li>privacy requirements, and</li><li>API access/authentication</li></ul><p>These will probably always differ and make a universal abstraction impossible; and that’s not a bad thing! These requirements are always going to be <strong>specific </strong>to each regulatory context, and without them, innovation (and large-scale investment) are endangered by regulatory uncertainty. Navigating these multiple profiles is going to be a challenge in the coming years, as more of them come online and their differences come into relief as a stumbling block for widely-interoperable protocols with potentially global reach.</p><p>The Interoperability working group will be tracking them and providing guidance and documentation where possible. Importantly, though, there is a new DIF Working Group coming soon, the <strong>Wallet Security WG</strong>, which will dive deeper into these profiles and requirements, benefiting from a narrow scope and IPR protection, allowing them to speak more bluntly about the above-mentioned details.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=c6cbeaf82e98" width="1" height="1" alt=""><hr><p><a href="https://medium.com/decentralized-identity/setting-interoperability-targets-part-1-of-2-c6cbeaf82e98">Setting Interoperability Targets Part 1 of 2</a> was originally published in <a href="https://medium.com/decentralized-identity">Decentralized Identity Foundation</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Bloom donates WACI]]></title>
            <link>https://medium.com/decentralized-identity/bloom-donates-waci-790f902ac9bd?source=rss----7762224fe580---4</link>
            <guid isPermaLink="false">https://medium.com/p/790f902ac9bd</guid>
            <category><![CDATA[dif-ccwg]]></category>
            <category><![CDATA[code-donation]]></category>
            <category><![CDATA[dif-working-groups]]></category>
            <category><![CDATA[decentralized-identity]]></category>
            <category><![CDATA[user-experience]]></category>
            <dc:creator><![CDATA[Decentralized Identity Foundation]]></dc:creator>
            <pubDate>Mon, 21 Jun 2021 10:46:58 GMT</pubDate>
            <atom:updated>2021-06-21T21:47:35.728Z</atom:updated>
            <content:encoded><![CDATA[<p><em>A simple starting point for cross-stack Wallet-Credential Interactions</em></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/271/0*Mvcu3tMuHxcjU2lv.png" /></figure><h3>WACI = Wallet And Credential Interactions</h3><p>WACI was introduced at the <a href="https://github.com/windley/IIW_homepage/raw/gh-pages/assets/proceedings/IIW_32_Book_of_Proceedings_Final%20A%201.pdf">annual IIW32 Workshop</a>, where it was received quite warmly as a step forward for open specification. Its goal is simple: to specify interactions between a wallet and a Relying Party (RP) such as an issuer or a verifier, in an ergonomic and agnostic way.</p><blockquote><em>At its core, WACI can be thought of as a handshake using classic, industry-standard </em><a href="https://datatracker.ietf.org/doc/html/rfc7519"><em>JWT</em></a><em>s: the “Relying Party” signs a token given to the end-user’s wallet, and the wallet signs over a “challenge” contained within it, proving ownership of a DID.</em></blockquote><p>From there, credentials can be issued or exchanged on the basis of the resulting channel. This channel can also double as a secure authentication, an application “log in” (for DID-based accounts), and a WACI is to offer a way to log into an application without a password with Verified Credential (VC) based authentication that cannot be faked.</p><p>Here’s lead editor Jace Henley giving a demo of Bloom’s sample implementation, demostrating the flows being specified further at DIF:</p><h3>WACI at DIF</h3><p>Bloom has been a core member of DIF’s <a href="https://identity.foundation/working-groups/claims-credentials.html">Claims and Credentials WG</a> for years, and a core contributor to many of its work items, which focus on specifying and standardizing protocols and libraries that create, exchange, and verify what the SSI community calls “[verifiable] credentials,” and what other sectors of the software industry call “claims” [about a subject]. In fact, WACI evolved out of the earlier, more foundational <a href="https://identity.foundation/presentation-exchange/">Presentation Exchange</a> specification, and like its sister specification, the Credential Manifest, its primarily function is to extend the functionality of PE and create an onramp to adoption and implementation of it as a protocol. In a nutshell, Presentation Exchange’s scope ends at how the data is sent between the holder and issuer/verifier, which is where WACI’s begins.</p><p>WACI isn’t being donated as a snapshot or as a reference implementation of a finished protocol, however; it’s being donated as a starting point for an ongoing <a href="https://github.com/decentralized-identity/wallet-and-credential-interactions">work item</a> in C&amp;C WG that will round out the spec to be more robust and flexible. A first application of this set of interactions is a complex interoperability exercise, developing an interoperability profile for quickly achieving tentative wallet-credential interactions between systems that have implemented all of Presentation Exchange OR all of DIDComm– without having to implement all of both. On the basis of this prototyping experiment, the WACI group expects to fold some extensions and refinements back into the next generation of the WACI specification.</p><h3>Next Steps for Bloom and C&amp;C collaborators</h3><ol><li>Achieve v1 release of WACI-Presentation-Exchange <a href="https://github.com/decentralized-identity/wallet-and-credential-interactions">specification</a>.</li><li>Fold back in lessons and extensions from #1 and then flush out remaining sections to achieve v1 feature-completeness for v1 of the WACI specification and sample implementation</li><li>Potentially, work on a new profile (“WACI-OIDC”?) when the next-generation of specifications currently being incubated with DIF participation at the OIDF AB/Connect working group are published</li><li>Register a custom URI schema (waci://)</li></ol><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=790f902ac9bd" width="1" height="1" alt=""><hr><p><a href="https://medium.com/decentralized-identity/bloom-donates-waci-790f902ac9bd">Bloom donates WACI</a> was originally published in <a href="https://medium.com/decentralized-identity">Decentralized Identity Foundation</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Sidetree Protocol reaches V1]]></title>
            <link>https://medium.com/decentralized-identity/sidetree-protocol-reaches-v1-9b565cf92db3?source=rss----7762224fe580---4</link>
            <guid isPermaLink="false">https://medium.com/p/9b565cf92db3</guid>
            <category><![CDATA[layer-2]]></category>
            <category><![CDATA[protocol-design]]></category>
            <category><![CDATA[sidetree]]></category>
            <category><![CDATA[fediverse]]></category>
            <category><![CDATA[ion]]></category>
            <dc:creator><![CDATA[Decentralized Identity Foundation]]></dc:creator>
            <pubDate>Tue, 20 Apr 2021 23:46:38 GMT</pubDate>
            <atom:updated>2021-04-20T23:46:37.965Z</atom:updated>
            <content:encoded><![CDATA[<p><em>The DIF Steering Committee has approved the first major release of the Sidetree Protocol specification, “v1” so to speak. Here is a snapshot of the four companies and four implementations that stretched and built the specification.</em></p><h4><strong>Scalable, Flexible Infrastructure for Decentralized Identity</strong></h4><p>This week, the DIF Steering Committee officially approved the first major release of the Sidetree Protocol specification, “v1” so to speak. This protocol has already been implemented, and four of its implementers have been collaborating intensively for over a year on expanding and extending this specification together.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/299/0*cysEhEOxWEKa1unB.png" /></figure><h4>What exactly is a “Sidetree”?</h4><p>Sidetree is a protocol that extends “decentralized identifiers” (DIDs), one of the core building blocks of decentralized identity. Decentralized identifiers (DIDs) enable a person or entity to securely and directly “<strong>anchor” </strong>their data-sharing activities to a shared ledger, secured by cryptography. The first generation of DID systems accomplished this with a 1-to-1 relationship between “blockchain addresses” (cryptographic identities) and the more flexible, powerful addresses called DIDs. These latter functioned as privacy-preserving extensions of the blockchain addresses to which they were closely coupled. In this way, each DID effortlessly inherited the formidable security guarantees of those blockchains — but in many cases, they also inherited scalability problems and economic models that were a bad fit for many DID use-cases.</p><p>Sidetree is a systematic, carefully-engineered protocol that <strong>loosens that coupling </strong>between anchor-points on a distributed data system (usually a blockchain) and the DID networks anchored to them. Crucially, it replaces the 1-to-1 relationship with a 1-to-many relationship, pooling resources and security guarantees. Depending on the use-case and implementation strategies chosen, the protocol can optimize for scalable performance, for developer-friendly ergonomics and SDKs, for the portability of DIDs and networks of DIDs across multiple anchoring systems, and even for high-availability in low-connectivity contexts where a global blockchain cannot be relied upon directly.</p><p>The name “sidetree” combines two hints as to its early technical inspirations and superpowers. Each Sidetree network functions as a kind of identity-specific “Layer 2” overlay network where participating nodes root aggregated operational data into transactions of the underlying chain. This mechanism has many high-level conceptual similarities with the “sidechains” of other “Layer 2” systems, such as the Lightning network running atop Bitcoin or state channel implementations on Ethereum. It also shares with merkle “trees” (and <a href="https://docs.ipfs.io/concepts/merkle-dag/#further-resources">DAGs</a> like IPFS) the self-certifying property of <em>content-addressability</em>, a core building block of decentralized and distributed systems.</p><p>Leveraging concepts from sidechains and “Layer 2” network protocols, Sidetree was first <a href="https://github.com/decentralized-identity/did-methods/blob/master/sidetrees/explainer.md">proposed</a> by Microsoft’s Daniel Buchner and has been incubated in the DIF community, evolving along the way with major contributions from a growing list of DIF members.</p><h4>The team that delivered the specification</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/899/0*wUfSSNr7QOoJLok6.png" /><figcaption><a href="https://www.microsoft.com/ownyouridentity"><strong>Microsoft</strong></a> (Redmond, WA, USA)</figcaption></figure><p>A global consumer and enterprise app, service, hardware, and cloud infrastructure provider whose mission is to empower every person to achieve more. Microsoft is proud to have worked on Sidetree and implemented the Sidetree protocol via its contributions to ION. As a key piece of infrastructure that is foundational to its Decentralized Identity work, Microsoft is committed to the continued development of Sidetree and ION in DIF.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/949/0*Jo55UgLDe0bD5BmL.png" /><figcaption><a href="https://securekey.com/"><strong>SecureKey</strong></a> (Toronto, ON, Canada)</figcaption></figure><p>SecureKey is a leading digital identity and authentication provider, and is a champion of the ecosystem approach to decentralized identity and verifiable credentials, revolutionizing the way consumers and organizations approach identity and attribute sharing in the digital age. This ecosystem-first philosophy informs our investment in Sidetree as a protocol for extensibility and scalability, which can evolve its featureset, and its network model over time. Of particular <em>technological </em>interest to us is how Sidetree can be overlaid on a wide variety of ledger and propagation systems. This will enable identity systems that span many use cases and work across public blockchains, federation and witness protocols, and permissioned blockchains without being locked to any particular ledger technology.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*L_LVM8Oao4YnF9kv.png" /><figcaption><a href="https://www.transmute.industries/"><strong>Transmute Industries</strong></a> (Austin, TX, USA)</figcaption></figure><p>Transmute uses decentralized identifiers (DIDs) and verifiable credentials (VCs) to secure critical trade data by digitizing key trade documents so that they’re traceable and verifiable anywhere in the world, easily accessible and selectively shareable, searchable and auditable, and impossible to forge or alter. Transmute contributed to Sidetree’s development because it leverages batch processing capabilities to achieve enterprise scale and retains maximum optionality for our customers, allowing their business to span many blockchains and trust frameworks. Transmute sees Sidetree-based networks as necessary for scaling up decentralized identity capabilities to a global enterprise scale, where thousands of verifiable transactions per second can be processed at an unbeatable price.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1000/0*5sEKxI8agVLJa5VI.png" /><figcaption><a href="https://mattr.global/"><strong>MATTR Global</strong></a> (Auckland, New Zealand)</figcaption></figure><p>Mattr works with communities and a growing network of companies to shift industries like digital identity towards a more equitable future, providing tools to support digital inclusion, privacy and end-user control. Sidetree represents a significant leap forward in thinking around how to create truly decentralized infrastructure for resilient identifiers. We welcome the agnostic and extensible approach not just to distributed ledgers but also to content addressable storage and other building-blocks of flexible infrastructure. We look forward to integrating many of the DID systems coming out of the Sidetree standardization effort.</p><h4>The first generation of Sidetree Systems</h4><p>Transmute maintains Sidetree ledger adapters for Ethereum, Amazon QLDB, Bitcoin and Hyperledger Fabric. We also support interoperability tests with DID Key, the Universal Wallet Interop Spec, the VC HTTP API, and Traceability Vocabulary. Transmute has built Sidetree.js, an implementation of the Sidetree protocol based on the DIF’s codebase that focuses on modularity: it is a Typescript monorepo where each component of a Sidetree node (Ledger, Content Addressable Storage, Cache database) can be substituted with different implementations that use a common interface.</p><p>SecureKey has created a <em>ledger-agnostic</em> <a href="https://github.com/trustbloc/sidetree-core-go">Go implementation</a> of Sidetree along with <a href="https://github.com/trustbloc/orb">Orb</a> and <a href="https://github.com/trustbloc/sidetree-fabric">Hyperledger Fabric</a> variations built on top. The <a href="https://trustbloc.github.io/did-method-orb/">did:orb</a> method enables independent organizations to create decentralized identifiers that are propagated across a shared decentralized network without reliance on a common blockchain. By extending Sidetree into a Fediverse of interconnected registries, Orb provides the foundation for building digital ecosystems on top of decentralized identifiers using a federated, replicated and scalable approach.</p><p>Microsoft is a primary contributor to <a href="https://identity.foundation/ion/">ION</a>, an open source, public, permissionless implementation of Sidetree on the Bitcoin ledger. There are several repositories and public utilities that make working with ION easier, including:</p><ul><li><a href="https://github.com/decentralized-identity/ion">ION GitHub repo</a>: the main repository for the code that powers ION nodes</li><li><a href="https://www.npmjs.com/package/@decentralized-identity/ion-tools">ION Tools</a>: JavaScript libraries for Node.js and browser environments that makes using DIDs and interacting with the ION network easier for web developers</li><li><a href="https://identity.foundation/ion/install-guide/">ION Install Guide</a>: A step-by-step guide for installing an ION node</li><li><a href="https://identity.foundation/ion/explorer/">ION Explorer</a>: A graphical interface for viewing DIDs and auditing other data transactions published to the public ION network.</li></ul><h4>What’s next for Sidetree</h4><p>One significant feature on the horizon is to add support for <strong>pruning </strong>of verbose lineage data (which is no longer needed to maintain the secure backbone of DIDs in a Sidetree implementation) at Sidetree’s anchor points. This addition will allow Sidetree-based networks to purge upwards of 95% of legacy operation data in a decentralized way that maintains all of the security guarantees the protocol currently makes.</p><p>Another near-future feature is the so-called “<strong>DID Type Table</strong>.” DIDs in various DID Method implementations may be typed to provide an indication as to what they DID might represent. The Sidetree WG will publish a table of types (not including human-centric types) that stand for organizations, machines, code packages, etc., which DID creators can use if they want to tag a DID with a given type.</p><p>The medium-term roadmap is up for discussion, so if you have ideas <a href="https://identity.foundation/working-groups/sidetree.html">get involved</a>!</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=9b565cf92db3" width="1" height="1" alt=""><hr><p><a href="https://medium.com/decentralized-identity/sidetree-protocol-reaches-v1-9b565cf92db3">Sidetree Protocol reaches V1</a> was originally published in <a href="https://medium.com/decentralized-identity">Decentralized Identity Foundation</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Drilling Down: [Co-]Development in the Open]]></title>
            <link>https://medium.com/decentralized-identity/drilling-down-co-development-in-the-open-765a86ab153f?source=rss----7762224fe580---4</link>
            <guid isPermaLink="false">https://medium.com/p/765a86ab153f</guid>
            <category><![CDATA[open-source]]></category>
            <category><![CDATA[membership]]></category>
            <category><![CDATA[dif]]></category>
            <dc:creator><![CDATA[Decentralized Identity Foundation]]></dc:creator>
            <pubDate>Mon, 29 Mar 2021 19:28:01 GMT</pubDate>
            <atom:updated>2021-04-06T20:38:39.898Z</atom:updated>
            <content:encoded><![CDATA[<h3>Drilling down: Co-development</h3><p><em>Competitors working together in the open</em></p><p><em>Having gone over the subtleties and complexities of </em><a href="https://medium.com/decentralized-identity/drilling-down-open-source-f50d1a4f2a76?source=friends_link&amp;sk=c61c55cdec30169ea99471b9bd09e81b"><em>open-source software</em></a><em> and </em><a href="https://medium.com/decentralized-identity/drilling-down-open-standards-e745d84d0495?source=friends_link&amp;sk=971c11824b0023758c34114cffc6c339"><em>open standards</em></a><em> in general, we will now drill down into how exactly DIF advances both, in the form of a “Frequently Asked Questions” (FAQ) document. Topics covered include:</em></p><ul><li><em>What “standardization” means to DIF and what DIF means to standardization.</em></li><li><em>A newbie-friendly survey of how DIF relates to nearby organizations with overlapping or related foci.</em></li><li><em>What “co-development” and “coöpetition” really mean, concretely</em></li></ul><p><em>The next installment in this series will offer some concrete steps that a DIF member organization (or even a non-member organization) can take to roll up their sleeves and get involved.</em></p><p>We can start with this 2020 diagram of how specific specifications fit in the landscape of open-source and open-standards organizations. Click on the image below to download a clickable PDF file.</p><figure><a href="https://github.com/decentralized-identity/interoperability/raw/master/assets/ssi-architectural-stack--and--community-efforts-overview.pdf"><img alt="Link-heavy diagram of specifications across organizations" src="https://cdn-images-1.medium.com/max/1024/0*ZRmxIahFG1wOs4ZK" /></a><figcaption>Src: E.D. Rouven Heck 2019, updated by Interoperability Working Group, 2020</figcaption></figure><h3>What is DIF’s role in “standardizing” decentralized identity?</h3><p>The governance of the decentralized identity standards space is, by design, <strong>decentralized</strong>: many different complementary organizations make steady, focused progress on specifications and codebases. In these coextensive communities, each garners consensus and buy-in for a focused set of data models and protocols with overlapping scopes and functions. Claiming the mantle of central authority for decentralization would be a pyrrhic victory for any Standards Development Organization (SDO).</p><p>Having been founded as a joint development project, DIF’s guiding <strong>mission </strong>is to effect harmonization, interoperability, and usability among early adopters, growing rather than controlling the development community. This nurtures <strong>healthy competition </strong>in the market growing around these technologies and provides a space for competitors to work together openly but safely, balancing “code-first” open source approaches and “standards-first” or protocol-driven ones. Allowing any single standards body (even DIF itself) to set the tone for all of decentralized identity or speak on its behalf would run counter to this mission.</p><p>Instead, the DIF exists to support, promote and facilitate two processes that seem to contradict each other at first blush. On the one hand, DIF accelerates the advance of <strong>standards </strong>and pre-standard <strong>specifications and libraries</strong> for emerging, decentralized identity systems. On the other hand, DIF strives to <strong>decentralize </strong>the landscape of identity technology and encourage new forms of data governance, new business models, and meaningful competition in our corner of the sector.</p><p>We unite these two processes with a pragmatic, considered, and adoption-ready strategy that is grounded in cooperation with external stakeholders and adjacent organizations. Most of these focus more squarely on technical standards or industry coordination and development, or some narrower set of technologies or protocols; decentralizing identity requires a both/and approach, which is deeply encoded in the DNA of DIF as an organization.</p><h3>Who are the other major organizations in decentralized identity?</h3><p>Of the various standards development organizations with which DIF cooperates closely, the <strong>World-Wide Web Consortium </strong>clearly has pride of place. The core specifications of decentralized identity were incubated there. The verifiable credential <a href="https://www.w3.org/TR/vc-data-model/">specification</a> was ratified (or in W3C parlance, moved to “candidate recommendation” status) over a year ago, and the decentralized identifier <a href="https://www.w3.org/TR/did-core/">specification</a> joined it <a href="https://twitter.com/DecentralizedID/status/1372480031184842753">two weeks ago</a>. As its name would imply, the WWW consortium is squarely focused on the standards structuring the WWW: browsers, cookies, web servers, and other “agents” in the topology of public web browsing.</p><p>Many important standards and specifications for data formats outside of the web problem space take place at the <strong>Internet Engineering Task Force </strong>(<a href="https://www.ietf.org/">IETF</a>), particularly around data representations, transports, and security engineering. This includes many primitives and building blocks of modern programming, like JSON representations, cryptographic primitives, and universal tokens and authentication standards, usage of which extends far beyond the public web. There is a traditional division of labor according to which the web’s data models are standardized at W3C and its protocols are standardized in the IETF, leading to a kind of odd-couple dynamic whereby two very different cultures have grown up around these specialties.</p><p>Another major site of coordination for primitives and building blocks is the more constitutively open-source-focused <strong>Organization for the Advancement of Structured Information Standards</strong> (<a href="https://www.oasis-open.org/">OASIS</a>). Originally a governance group for XML and the earliest forms of what we now call “Big Data”, OASIS saw its purview and power extended when various global trade and messaging standards were built extending XML. To this day, the Open Office document standards and much of the open-source tooling for PDF, DITA, and other non-proprietary document standards are still governed and advanced through OASIS.</p><p>DIF supports decentralized identity by <strong>incubating and co-developing </strong>prototypes and specifications, some of which are handed off to these more deliberative organizations for formal review and standardization where appropriate. Importantly, though, not all “pre-standards” work has as its goal a standardized or universalized version of that work. In many cases, a specification that was good enough to guide an experimental or contingent implementation making its way to market might serve its purpose well enough without further hardening.</p><p>These “<strong>DIF-terminal</strong>” specifications and sample implementations are apt contributions to the field and the market without going on to formal review. They serve to bootstrap and jumpstart other development by getting more credentials or identifiers into circulation, while growing the pool of developers experienced and excited about the technology and the community. This “build early” approach is crucial to refining and hardening other parts of the stack, as well as building up a market and its workforce.</p><h3>How does DIF work together with these organizations?</h3><p>DIF is not the only pre-standards organization in which specifications and implementations are co-developed by early adopters and explorers of this family of technologies and applications. Anywhere companies and individual experimenters collaborate on open-source projects, <strong>“co-development”</strong> is happening, but these too vary in the kinds of collaboration for which they have designed and optimized their processes.</p><p>The earliest work in this space, as well as much of the long-view-oriented work developing tooling for open-world data models and Linked Data tooling, takes place in the <strong>Credentials Community Group</strong> (<a href="https://w3c-ccg.github.io/">CCG</a>) of the W3C. The CCG is a community group operated through the W3C but open to participants that do not pay W3C dues. It promotes and hosts pre-standards work and maintains dialogue with various other W3C groups, not just those chartered to work on the VC and DID specifications. Since the CCG is hosted by the W3C, it inherits many of the procedures and specification publication processes from the members-only processes of the Consortium. The <a href="https://identity.foundation/working-groups/secure-data-storage.html"><strong>Secure Data Storage</strong></a><strong> working group </strong>is cosponsored by the CCG and DIF to maximize the community-wide participation creating a pre-standards specification for <a href="https://github.com/decentralized-identity/confidential-storage">Confidential Storage</a> structures that can serve many different kinds of decentralized identity and data systems.</p><p>The Linux Foundation houses a complex family of <strong>Hyperledger projects</strong>, which coordinate global contributors to massive open-source codebases that power blockchains and other decentralized data and identity systems. <a href="https://www.hyperledger.org/use/hyperledger-indy"><strong>Indy</strong></a>, the first major fit-for-purpose permissioned distributed ledger optimized for decentralized identity applications, is the oldest and most high-profile of the identity-focused projects in Hyperledger, designed to anchor decentralized identities and governed by the Sovrin Foundation.</p><p>Another major Hyperledger project is the modular and progressively more blockchain-agnostic <a href="https://www.hyperledger.org/use/aries"><strong>Aries </strong></a><strong>community</strong>, which evolved out of Indy-specific open-source systems. The Aries Project offers many common libraries, entire single-language frameworks, and cross-framework protocols so that small companies can quickly build into an ecosystem of interoperable service providers and business models. The <a href="https://identity.foundation/working-groups/did-comm.html"><strong>DID-Communications</strong></a><strong> working group </strong>is co-sponsored by Aries and DIF, allowing members of either group to participate directly in the specification of a DID-based communications protocol for the entire decentralized identity community, not just the ecosystem built around the Aries codebases.</p><p>Other groups also overlap and coordinate with DIF in their development of implementations and specifications in advance of formal standards. One of these is the <strong>OpenID Foundation</strong> (<a href="https://openid.net/foundation/">OIDF</a>), which governs increasingly widespread standards for authentication that federate identity systems across most of the commercial consumer internet. As with Hyperledger Aries and CCG, this <a href="https://medium.com/decentralized-identity/dif-oidf-9753b9bd0093?source=friends_link&amp;sk=ae0719a23e9405c6d61fc19c8b938277">relationship is formalized</a> as a “liaison agreement” between the two organizations, and also entails a Liaison Officer to coordinate the relationship; DIF’s DID Auth WG was put on pause in mid 2020 to focus on work happening in OIDF working groups, and hopes to re-open regular meetings to work on items on the DIF side again soon.</p><p>Another is the Linux Foundation’s first project devoted exclusively to data governance and related legal and ecosystem management issues, the <strong>Trust-over-IP Foundation</strong> (<a href="https://trustoverip.org/">ToIP</a>), where many DIF members work on task forces and working groups on compliance issues, consent tracking, data-capture best practices, and industry-specific governance issues. The decentralization-friendly but wider-scoped <a href="https://kantarainitiative.org/"><strong>Kantara Initiative</strong></a>, which promotes user-centricity and data subject rights in legacy identity systems, is also an important touchstone for regulatory and legal issues. The <a href="http://sovrin.org"><strong>Sovrin Foundation</strong></a><strong> </strong>continues to maintain the active Indy production network and house many important <a href="https://sovrin.org/interoperability-series-linking-and-exchanging-attachments-with-verifiable-credentials/">collaborations</a> and <a href="https://sovrin.org/the-sovrin-community-releases-new-ssi-iot-whitepaper/">working groups</a>, and are represented in many DIF working groups.</p><h3>Coöpetition and DIF’s particular brand of co-development</h3><p>The way DIF relates to other organizations working in the same space arose naturally from DIF optimizing its processes for neutrality and collaboration between companies of different sizes and market positions. DIF’s culture is one of business collaboration aligned with the increasingly buzzy term “<strong>co-opetition</strong>” (sometimes spelled “coöpetition” to emphasize the pronunciation). The term is a portmanteau combining cooperation and competition, but the clearest definition might be “coöperation between competitors, who remain competitors before and after coöperating”.</p><p>“Coöpeting” early in the design process makes for a unique <strong>pact </strong>between competitors, one that is crucial to the DNA of DIF: it is a forward commitment, before the design process, to cooperate through and after release of an open standard or codebase. This kind of pact makes the most sense in situations where <strong>network effects </strong>and <strong>portability </strong>of data and users matter more than <strong>platform </strong>control and vendor lock-in. Indeed, when your business plan is to maximize openness and interoperability, you end up cooperating earlier and more deeply than in more siloed forms of “open source” development. After all, much of what we consider open-source wasengineered for a single vendor’s business goals and opened up after release, once all the major design decisions had been made and tested. The difference of timeline and design process is hard to overstate!</p><p>Put bluntly, committing to coöpetitive development of common standards and protocols is <strong>committing in advance </strong>to a truly open standard, rather than one which advantages its designers on its path to general adoption. This kind of pact is particularly useful when forged between companies that are direct competitors or companies of vastly different sizes.</p><h3>Cooperating in the patent-free zone</h3><p>In large part, competitors and companies of different sizes find it far easier to work together substantively on new ideas once a safe space has been established for new ideas. Startups stay up at night worrying that their best ideas could be patented out from beneath them by collaborators with well-staffed legal departments, and large enterprises hesitate to do any work in the open that might endanger their R&amp;D inventions. The solution for both is often coming together openly on a precisely-scoped working group or project with proper “IPR protections.”</p><blockquote><em>Put in plain language, the IPR agreements protecting DIF’s work prevent all contributors from taking legal action against the results of the group, whether on the basis of previously-held patents, or the new ideas originating in the group.</em></blockquote><p>The terms of these IPR agreements can seem cumbersome to people coming from non-profit or academic research, but in the private sector and particularly at industrial or global scale, the enforceability in global courts of ownership over ideas and patents is absolutely essential to software investments, infrastructural governance, and even geopolitics. The protocols, specifications, and libraries co-authored in an IPR-protected group can be thought of as <strong>safe dependencies</strong>, which cannot have their open-source status (i.e., their <strong>royalty-free </strong>status!) endangered by the current or pre-existing intellectual property of any of its contributors. The relative degree of this safety is of huge importance to infrastructural decision-making and long-term planning. These assurances can be an important insurance policy against one major risk in software development — patent action against code or its dependencies.</p><p>Another crucial way in which this kind of “co-development” <strong>protects participants </strong>from the risks inherent in cooperating with competitors is that DIF, not the contributing member organizations, “owns” the products of its members’ collective labors. In concrete terms, this means the ongoing governance, maintenance, and licensing of the products of working groups, often referred to as “technical control” of resulting code or specifications, stays with the Foundation rather than with any of the legal entities contributing. The risk that a trusted co-development partner will change its strategy, its culture, or its ownership and thus its governance structure is only one of the many unsavory surprises a product or a company can meet on the road to market.</p><p>This means that if the <strong>relationship sours </strong>between two parties collaborating on a standard or a reference implementation, the work might “fork” and take on two different future paths, but the version ratified by DIF stays open to the public under DIF’s management. In such a case, any DIF member can join the relevant group and maintain the project’s main branch, or influence future versions if the group continues the open work. In fact, DIF’s licensing even imposes some restrictions on contributing organizations forking a DIF collaboration to continue the work elsewhere, whether further development is carried out in the open or not.</p><p>It is important to note that DIF is not original here, but rather, standing on the shoulders of giants. We were founded within the <strong>Joint Development Foundation</strong>, now part of the Linux Foundation, and inherits not only their licenses and legal structures but also their culture of co-development and IPR protection. While the staff of DIF is happy to help socialize, navigate, and enforce these structures, none of us are lawyers and we defer to the professionals (including those available to DIF through the JDF) for all serious matters and conflict resolution on the subject of intellectual property.</p><h3>Drilling further down</h3><p><em>We’ve sketched out the different kinds of open source development and the many ways variously-open standards can structure markets, and positioned DIF among all these concepts and its neighbors in the community. There’s not much further down we can drill in general terms: it’s time to get particular and start positioning you and your organization in this landscape! In our next piece, we’ll sketch out how you can get strategic about open source, roll up your sleeves, and get your hands dirty at DIF.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=765a86ab153f" width="1" height="1" alt=""><hr><p><a href="https://medium.com/decentralized-identity/drilling-down-co-development-in-the-open-765a86ab153f">Drilling Down: [Co-]Development in the Open</a> was originally published in <a href="https://medium.com/decentralized-identity">Decentralized Identity Foundation</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[DIF Face to Face Jan 2021 Highlights]]></title>
            <link>https://medium.com/decentralized-identity/dif-face-to-face-jan-2021-highlights-89e78cb80f54?source=rss----7762224fe580---4</link>
            <guid isPermaLink="false">https://medium.com/p/89e78cb80f54</guid>
            <category><![CDATA[did]]></category>
            <category><![CDATA[blockchain]]></category>
            <category><![CDATA[decentralized-identity]]></category>
            <dc:creator><![CDATA[Decentralized Identity Foundation]]></dc:creator>
            <pubDate>Wed, 27 Jan 2021 12:09:22 GMT</pubDate>
            <atom:updated>2021-01-27T12:09:22.717Z</atom:updated>
            <content:encoded><![CDATA[<p><em>Come for the summaries, stay for the clip reel, bookmark for the links!</em></p><p>DIF held its semiannual “Face-to-Face” community’ event this week, and man what an event it was! For obvious reasons, it was virtual for the second time, and for the first time, it spanned both Zoom and the interactive social platform <a href="http://gather.town">gather.town</a>, giving a more intimate atmosphere and allowing for more organic networking than often happens at “tele-conferences.” If you missed it in part or in full, you’ll find below summaries and recordings of the main events.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*hPXjFHq1oJBTgx0ZlSOsPQ.png" /></figure><h4>1# Opening remarks, and an update on DIF-OIDF Collaboration</h4><p>Executive Director Rouven Heck got us started on a warm and welcoming note, bringing the largely unfamiliar audience up to date on DIF’s member-driven nature and its goals for 2021. These include a more engaged membership, more co-development at various scales, and more work items reaching stable specifications and publicly going from community incubation to commercial production.</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2Fa-ViTf671DI%3Ffeature%3Doembed&amp;display_name=YouTube&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3Da-ViTf671DI&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2Fa-ViTf671DI%2Fhqdefault.jpg&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/f2ebdb09bd2f238ebf737f173420f45c/href">https://medium.com/media/f2ebdb09bd2f238ebf737f173420f45c/href</a></iframe><p>Then, presenting from Tokyo (actually a little before the opening remarks, as is our asynchronous way here at DIF) Kristina Yasuda (<a href="https://online2020.mydata.org/presenter/kristina-yasuda/"><em>Microsoft</em></a><em>, </em><a href="http://mydata.org"><em>Mydata</em></a><em>)</em> gave an update on her new role as the liaison between DIF and the OpenID Foundation. Joined by <strong>DID Authentication WG</strong> chair Oliver Terbu (<a href="https://mesh.xyz/"><em>Consensys Mesh</em></a>), Kristina gave an overview not only of the ongoing SIOP work in the AB/Connect WG at OIDF, but also other identity-related efforts that might be of interest to DIF members, including the <a href="https://openid.net/wg/mobile/">MODRNA</a> and <a href="https://openid.net/wg/ekyc-ida/">KYC-IDA</a> working groups.</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FXXuhiPg2qOs%3Ffeature%3Doembed&amp;display_name=YouTube&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DXXuhiPg2qOs&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FXXuhiPg2qOs%2Fhqdefault.jpg&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/41133076885d2b7bf61912e20350dc0a/href">https://medium.com/media/41133076885d2b7bf61912e20350dc0a/href</a></iframe><h4>2# Interoperability and DIDComm working group</h4><p>The “main stage” working group presentations started with the <strong>Interoperability Working Group</strong>, which has taken a break from its test-harness/test-suite role under its new chairs to concentrate on educational materials that support broader interoperability among verifiable credential protocols… and a better understanding of those protocols among decision-makers on the business side of the decentralized-identity business.</p><p>The chairs (Pam, Kaliya, and Juan) gave an overview of the last 6 months of their group, its publications and maps, and other products, an overview of their invited guests (and handy recordings), as well as the “parking lot” for future discussion/research topics for Q1.</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2Ff1lz7PSfl5k%3Ffeature%3Doembed&amp;display_name=YouTube&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3Df1lz7PSfl5k&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2Ff1lz7PSfl5k%2Fhqdefault.jpg&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/0cd64c521ee41a0a64b436540021a829/href">https://medium.com/media/0cd64c521ee41a0a64b436540021a829/href</a></iframe><p>The <strong>DID Communications Working Group</strong>, energetically presented by Chair Sam Curren (<a href="http://indic.io"><em>Indicio</em></a><em>, </em><a href="http://mattr.global"><em>Mattr</em></a>), got the ball rolling with a swift and accessible overview of the group’s rapid progress from ambitious roadmap to the sophisticated draft specification since the last conference. In addition to the specification reaching its final rounds of editorial clean-up, many “nice to have” protocols that were put out of scope while the group focused on the specification alignment process (specifically a Bluetooth implementation and an NFC implementation) have spun out into parallel work items, which are already underway. In other DIDComm news, DIF member <a href="http://jolocom.com"><em>Jolocom</em></a><em> </em>announced this week a DIDComm v2 sample implementation in Rust, built for the company’s [otherwise completely non-Aries!] wallet. It seems 2021 will be the year of DIDComm!</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2F8c7yRTENqSc%3Ffeature%3Doembed&amp;display_name=YouTube&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D8c7yRTENqSc&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2F8c7yRTENqSc%2Fhqdefault.jpg&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/2d9249a5a5a00f6e92b9b1ede013e5bf/href">https://medium.com/media/2d9249a5a5a00f6e92b9b1ede013e5bf/href</a></iframe><h4>3# Claims and Credentials, Presentation Exchange, and Sidetree</h4><p>The <strong>Claims and Credentials</strong> group’s co-chair Wayne Chang (<a href="http://spruceid.com"><em>Spruce Systems</em></a>) took a quick stroll through the new work item initiation process (currently being extended to other WGs DIF-wide) and the other major work items: the paused Credential Taxonomy, the work item formerly known as Credential Manifest, the new VC Marketplace.</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FV-FHUQ2EWLc%3Ffeature%3Doembed&amp;display_name=YouTube&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DV-FHUQ2EWLc&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FV-FHUQ2EWLc%2Fhqdefault.jpg&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/5d013a46f38f2b4b32b112266ddcb47a/href">https://medium.com/media/5d013a46f38f2b4b32b112266ddcb47a/href</a></iframe><p>DIF’s first Executive Director, Daniel Bucher (<a href="https://www.microsoft.com/en-us/research/"><em>Microsoft Research</em></a>), gave a quick overview of the <strong>Presentation Exchange spec</strong>, an ambitious specification for scaffolding credential requests and presentations between unfamiliar systems. After months of collaboration with core architects of the Aries ecosystem from DIF member <a href="https://www.evernym.com/"><em>Evernym</em></a>, the presentation and request mechanics have been aligned with the upcoming iteration of the relevant Aries “Present Proof” RFCs, making this a major interoperability win that bridges the largest production ecosystems the decentralized identity space has yet seen. The <a href="https://identity.foundation/presentation-exchange/">specification</a> is in the very home stretch of reaching 1.0 status and in the last weeks of a period of public comment, so give it a read and leave some <a href="https://github.com/decentralized-identity/presentation-exchange/issues">issues</a> soon if you have any!</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FZ3NqMn0EIEo%3Ffeature%3Doembed&amp;display_name=YouTube&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DZ3NqMn0EIEo&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FZ3NqMn0EIEo%2Fhqdefault.jpg&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/d4ef58556b1226c2e8b4f79e0cb4d040/href">https://medium.com/media/d4ef58556b1226c2e8b4f79e0cb4d040/href</a></iframe><p>Daniel also presented the other specification he has been tirelessly driving for even longer than the Presentation Exchange work item at Claims and Credentials — the <strong>Sidetree </strong>specification, which reached v1.0 this week. In this quick, extemporaneous video, Daniel runs through some common misconceptions and relates the overarching Sidetree Layer-2 architecture to Microsoft’s specific Ion implementation, the work of DIF members <a href="https://securekey.com/"><em>SecureKey</em></a><em> </em>on a Hyperledger Fabric implementation, DIF members <a href="https://transmute.industries"><em>Transmute</em></a>’s Ethereum implementation, and even the affinities with DIF’s next working group to spin out of I&amp;D, KERI.</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FdZTmGPiLBv8%3Ffeature%3Doembed&amp;display_name=YouTube&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DdZTmGPiLBv8&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FdZTmGPiLBv8%2Fhqdefault.jpg&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/8bbf470b5f77ec5abe3cc50ec92b23fd/href">https://medium.com/media/8bbf470b5f77ec5abe3cc50ec92b23fd/href</a></iframe><h4>4# Secure Data Storage WG, Identifiers and Discovery WG, and KERI</h4><p>From potentially universal specifications for presenting credentials, we jumped straight to potentially universal specifications for storing credentials and other confidential data. The Secure Data Storage working group co-chair Dmitry Zangadulin (<a href="https://digitalbazaar.com/"><em>Digital Bazaar</em></a>) talked about the group’s first and flagship specification, <a href="https://github.com/decentralized-identity/confidential-storage">Confidential Storage</a>, which is designing a modular and DID-controlled storage protocol that would allow so-called “encrypted data vaults” (with or without a coupled authorization server called an “identity hub”) to create a portable, secure, redundant, and replicable storage layer for the decentralized identity world. In addition to bringing the audience up to speed on the current status of the specification work and prototyping, the group also gave a quick overview of the many <a href="https://github.com/decentralized-identity/confidential-storage">guest presentations</a> since the last F2F, spanning the cutting edge of decentralized storage and next-generation database projects.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/960/1*6QZmkvgf62TLWoxGEt63NQ.png" /><figcaption>The architecture of the Confidential Storage draft <a href="https://identity.foundation/confidential-storage/">specification</a></figcaption></figure><p>Identifiers and Discovery WG, the oldest continuously-active group at DIF, gave a detailed overview of its impressive roster of donations, work items, and updates since the last F2F. Chair Markus Sabadello (<a href="http://danubetech.com"><em>DanubeTech</em></a>) ran through this long list. These include research on WebID and key recovery/roll-over systems, the evolving WebID pre-standard being discussed in some browser groups of W3C, new common libraries in <a href="https://github.com/decentralized-identity/did-common-dotnet/branches">.NET</a> and <a href="https://github.com/decentralized-identity/did-key.rs">Rust</a>. Markus also explained to those new to the space the group’s broader mission of supporting the DID ecosystem and DID methods in particular as they experiment with decentralized governance and infrastructure. <em>(Of particular interest to close watchers of the space was his update about the Universal Resolver project offering up very high-level analytics (privacy-preserving, of course!) about resolution activity on the public “testnet” service.)</em></p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FTw04ufxNdtQ%3Ffeature%3Doembed&amp;display_name=YouTube&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DTw04ufxNdtQ&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FTw04ufxNdtQ%2Fhqdefault.jpg&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/2163f96d1890fe31fbb37bff43a26b08/href">https://medium.com/media/2163f96d1890fe31fbb37bff43a26b08/href</a></iframe><p>Markus’ co-chair, Sam Smith (<a href="https://prosapien.com/"><em>ProSapien</em></a><em>, </em><a href="https://digitaltrust.vc/"><em>Digital Trust Ventures</em></a>) talked about his passion-project, soon to become its own DIF WG: Key Event Receipt Infrastructure, or “<strong>KERI</strong>.” <a href="https://medium.com/decentralized-identity/keri">KERI</a> offers a new way of thinking of the “layers” of decentralized identity infrastructure, focusing doggedly on the “bottom half” of the concerns of a traditional DID method and separating itself entirely from the “top half,” including method-specific namespacing and all [clear-text] data. After months of honing the skill, Sam impressively conveys a considerable portion of the core concepts in this complex and nuanced system in a record-setting fifteen minutes!</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2F8XrxbBUDtto%3Ffeature%3Doembed&amp;display_name=YouTube&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D8XrxbBUDtto&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2F8XrxbBUDtto%2Fhqdefault.jpg&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/6f21a9867659d172e2b80e5246e2e35b/href">https://medium.com/media/6f21a9867659d172e2b80e5246e2e35b/href</a></iframe><h4>5# Special Interest Groups: Product Managers, Banking and Finance, and Healthcare</h4><p><a href="http://transmute.industries"><em>Transmute</em></a>’s Margo Johnson, co-chair of the <strong>Product Managers</strong>’ community of practice, gave a quick overview of their very generative and generous non-technical working group. In addition to producing a useful <a href="https://github.com/decentralized-identity/product-managers/blob/main/agenda.md">open-source corpus</a> of discussion notes, presentations, and UX blotters, and the like, the group is also an important watering hole for product and user interface design <em>thinking, </em>covering such topics as accessibility, ethics, and adoption strategies, for products but also for new concepts of software (and better user interface patterns) more generally.</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FX4rKTyyK8i0%3Ffeature%3Doembed&amp;display_name=YouTube&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DX4rKTyyK8i0&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FX4rKTyyK8i0%2Fhqdefault.jpg&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/67cbb53443a32c53b2c16e6c185777fc/href">https://medium.com/media/67cbb53443a32c53b2c16e6c185777fc/href</a></iframe><p>Co-chairs Paul Dunphy (<a href="http://onespan.com"><em>OneSpan</em></a>) and Isaac Patka (<a href="http://bloom.co"><em>Bloom</em></a>) gave a fascinating overview of the activity of their fast-moving and diligent <strong>Banking and Finance </strong>open group. Paul introduces the philosophy, focus, and working methods of the group, then Isaac overviews the invited guests to date. In addition to hearing reports from SSI researchers in the financial services space, the group is also building out a wiki of relevant regulatory events in the space, as well as opportunities in the space like the UK’s financial regulatory sandbox, the subject of their next meeting with <a href="http://evernym.com"><em>Evernym</em></a>’s Andy Tobin.</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FdcVVNlsh5wM%3Ffeature%3Doembed&amp;display_name=YouTube&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DdcVVNlsh5wM&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FdcVVNlsh5wM%2Fhqdefault.jpg&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/913d0e8011b5684a0b75d823553503f8/href">https://medium.com/media/913d0e8011b5684a0b75d823553503f8/href</a></iframe><p>Interim Chair Juan Caballero (<a href="http://learningproof.xyz"><em>LearningProof</em></a>) gave a brief overview of the discussion group’s intentions and format. These could respectively be summarized as exploring the opportunities and access points for innovations in the healthcare space, and a recorded invited-guest series where researchers from the space offer “reverse pitches” about pain points and problems that decentralized identity might be uniquely suited to solve. As with all of DIF’s special-interest groups, the group is open to DIF non-members and interested parties can reach the chairs through the group’s <a href="https://github.com/decentralized-identity/healthcare/blob/main/agenda.md">repository</a>, where they can also find notes and recordings of all guests to date.</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2F8fNvC-ddFnA%3Ffeature%3Doembed&amp;display_name=YouTube&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D8fNvC-ddFnA&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2F8fNvC-ddFnA%2Fhqdefault.jpg&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/c544e1982fda168961339faf49608dd9/href">https://medium.com/media/c544e1982fda168961339faf49608dd9/href</a></iframe><h4>Stay Tuned and Get Involved</h4><p>As you can see, the DIF community has grown considerably since the last F2F, and keeps expanding into new terrains and modalities. If you work in the decentralized identity space or are trying to move your work into it, please consider <a href="https://identity.foundation/join">joining </a>the foundation, joining one of these working groups and special-interest groups, or even bringing a future project into DIF as a work item. <br>Or <a href="https://foundation.us3.list-manage.com/subscribe?u=7d1001f187a746b68d2ea0d28&amp;id=866a6c17be">subscribe </a>to our monthly newsletter.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=89e78cb80f54" width="1" height="1" alt=""><hr><p><a href="https://medium.com/decentralized-identity/dif-face-to-face-jan-2021-highlights-89e78cb80f54">DIF Face to Face Jan 2021 Highlights</a> was originally published in <a href="https://medium.com/decentralized-identity">Decentralized Identity Foundation</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Trinsic donates did-key.rs to I&D WG]]></title>
            <link>https://medium.com/decentralized-identity/trinsic-donates-did-key-rs-to-i-d-wg-8a278f37bcd0?source=rss----7762224fe580---4</link>
            <guid isPermaLink="false">https://medium.com/p/8a278f37bcd0</guid>
            <category><![CDATA[code-donation]]></category>
            <category><![CDATA[dif]]></category>
            <category><![CDATA[dif-id-wg]]></category>
            <category><![CDATA[dif-working-groups]]></category>
            <category><![CDATA[did-key]]></category>
            <dc:creator><![CDATA[Decentralized Identity Foundation]]></dc:creator>
            <pubDate>Mon, 25 Jan 2021 16:48:02 GMT</pubDate>
            <atom:updated>2021-01-25T16:48:02.090Z</atom:updated>
            <content:encoded><![CDATA[<p><em>This marks the first donation of a Rust “crate” (package) to the group</em></p><p>Over the years, the Identifiers and Discovery WG at the DIF has received many donations that form a vital resource for developers of DID-based systems: recently, a flotilla of complementary <a href="https://medium.com/decentralized-identity/dif-id-wg-starting-work-on-cryptographic-secret-recovery-204117b6a2ab">secret recovery mechanisms</a>, a command-line tool for handling Verifiable Credentials that was the foundation for years of JWT work in the Ethereum community, the <a href="https://github.com/decentralized-identity/.well-known">.well-known</a> specification, and the <a href="https://github.com/decentralized-identity/did-common-java">/did-common-{language}/</a> series of basic libraries and tooling in various popular languages, to say nothing of the donations of drivers for the open-ended <a href="https://medium.com/decentralized-identity/the-universal-resolver-infrastructure-395281d2b540?">Universal Resolver</a> project.</p><p>The newest donation to the I&amp;D WG archive is an implementation of <a href="https://github.com/decentralized-identity/did-key.rs">did:key</a> built in the Rust language by long-time active DIF members, <a href="https://trinsic.id/">Trinsic</a>. In addition to being great news for the I&amp;D WG itself, it is also great news for the “target audience” of the WG: developers trying to smoothly and efficiently extend the domain of DID-based systems to new programming languages, use cases, and contexts.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/967/0*aL2hJWOoSvOHN0zI" /><figcaption>Photo by <a href="https://unsplash.com/@only1simonharmer">Simon Harmer</a></figcaption></figure><h4><strong><em>Don’t all DIDs contain keys?</em></strong></h4><p><a href="https://w3c-ccg.github.io/did-method-key/">DID:Key</a>, originally specified in the W3C Credentials Community Group (<a href="https://w3c-ccg.github.io/">CCG</a>), is a DID “pseudo-method” that allows static, pre-existing, and/or pre-published public keys to function like traditional DIDs — they can be queried, stored, issued against, and resolved to return valid DID documents. These DID documents, or “pseudo-documents” if you prefer, are generated deterministically from their public keys, allowing the integration of complex key management systems involving cold storage, hardware security modules, etc.</p><p>This “masquerade” of wrapping external or pre-existing keypairs in the form of a valid DID is crucial to many kinds of interoperability, legacy integration, and testing. It can be a life-saver in both the early days and the home-stretch of moving to production in the messy real world of legacy systems and interoperability stress-testing.</p><p>Like the /did-common-{language}/ series, a plug-and-play library that handles all the transformations between different kinds of key and their “DID-ification” is a huge time-saver for people working in new contexts, or contexts where prior art has not yet been open-sourced. In addition to these advantages, the unique design of did:key has also been valuable in demonstrating the flexibility and universality of the DID concept itself — and that DIDs can seamlessly interoperate with systems that do require a blockchain or similar technologies.</p><h4><strong><em>Rust and DIF</em></strong></h4><p>Rust has earned a reputation among contemporary blockchain and web developer communities, in large part because it is so performant, controllable, and <a href="https://rustwasm.github.io/book/why-rust-and-webassembly.html">versatile</a> across in-browser, server-side, and cloud environments. It plays nicely with widely different programming languages as well.</p><p>In particular, it has also been designed to be <a href="https://rustwasm.github.io/book/reference/js-ffi.html">smoothly integrated</a> into JavaScript systems, for decades the most common language in most kinds of web development. In fact, many of today’s JS developers consume Rust/WASM libraries without even knowing they’re doing so. The libraries from Hyperledger <a href="https://www.hyperledger.org/use/aries">Aries</a>, for instance, use Rust cryptographic libraries <a href="https://crates.io/crates/ursa">packaged</a> and managed by the Hyperledger <a href="https://www.hyperledger.org/use/ursa">Ursa</a> project.</p><p>One crucial distinction, however, between Rust and Javascript is that the former has a drastically different way of managing dependencies and packages. In addition to being very resource-conscious in their assembly, “crates” (as the packages are called in Rust’s native “cargo” package management system) can be imported and compiled <em>selectively</em>, using only what each project needs “at build”. For in-browser, edge-device, and other resource-constrained environments, this makes a world of difference compared to traditional JS frameworks like Node or Angular.</p><p>While the authoritative branch of the source code is being donated to DIF where it will stay open to new issues and pull requests from the DIF community, the “crate” is already available at <a href="https://crates.io/crates/did-key">crates.io</a>, and can be used directly in your project’s Cargo.toml file:</p><blockquote>did-key = “*”</blockquote><h4><strong><em>Extending the library</em></strong></h4><p>Like all code donations to DIF, there are many ways in which this library can be extended. GitHub issues and pull requests are open! So far, the key formats currently supported are:</p><ul><li>BLS12381 (G1 &amp; G2 derivations)</li><li>Ed25519</li><li>X25519</li><li>NIST P256</li><li>Secp256k1</li></ul><p>If you find this project useful in your own development, whether for compliance-testing, for supporting new verifiable credential formats like BBS+, or for extending your interoperability and compatibility reach, please leave an issue describing future features you might find useful. Better still, if you have experience with Rust/WASM, please consider getting involved and contributing features, leaving constructive feedback, or extending the specification’s documentation and implementation guidance notes.</p><p>We also welcome you to join and participate in the <a href="https://github.com/decentralized-identity/identifiers-discovery/">I&amp;D Working Group</a>, regarding any questions or contributions to the Rust did:key implementation or one of the other work items!</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=8a278f37bcd0" width="1" height="1" alt=""><hr><p><a href="https://medium.com/decentralized-identity/trinsic-donates-did-key-rs-to-i-d-wg-8a278f37bcd0">Trinsic donates did-key.rs to I&amp;D WG</a> was originally published in <a href="https://medium.com/decentralized-identity">Decentralized Identity Foundation</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[DIF & OIDF]]></title>
            <link>https://medium.com/decentralized-identity/dif-oidf-9753b9bd0093?source=rss----7762224fe580---4</link>
            <guid isPermaLink="false">https://medium.com/p/9753b9bd0093</guid>
            <category><![CDATA[openid-foundation]]></category>
            <category><![CDATA[openid-connect]]></category>
            <category><![CDATA[dif-did-auth-wg]]></category>
            <category><![CDATA[dif-working-groups]]></category>
            <category><![CDATA[dif]]></category>
            <dc:creator><![CDATA[Decentralized Identity Foundation]]></dc:creator>
            <pubDate>Sun, 08 Nov 2020 18:54:06 GMT</pubDate>
            <atom:updated>2021-01-31T18:31:17.552Z</atom:updated>
            <content:encoded><![CDATA[<p><em>Collaborating on next-generation standards</em></p><p>DIF is proud to announce that it has entered into a liaison agreement with the OpenID Foundation (<a href="https://openid.net/foundation/">OIDF</a>). This provides a mechanism for both parties to work together on areas of mutual interest, allowing working groups to align and coordinate through dual-members. The first major collaboration, which has already been underway for weeks, is a process for revising the Self-Issued OpenID Connect (SIOP) <a href="https://openid.net/specs/openid-connect-core-1_0.html#SelfIssued">chapter</a> of the OpenID Connect (OIDC) <a href="https://openid.net/specs/openid-connect-core-1_0.html#SelfIssued">specification</a>. This revision takes place in the AB/Connect working group of OIDC, which focuses at any given time on extending the core OIDC specification.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/900/1*TeoUhc_XrAUgJQQ8ajCj2w.png" /></figure><p>Given the foundational nature of this collaboration (and the potential for breaking changes or mental-model shifts in the next major version), the work on DIF’s <strong>Self-Issued OpenID Connect Provider DID Profile working draft, </strong>referred to colloquially as “did-siop,” has been paused. It is expected to resume, still housed as a work item in DIF’s DID Authentication<a href="https://identity.foundation/working-groups/authentication.html"> Working Group</a>, after the work on the new SIOP specification in AB/C is finalized. Other collaborations on OIDF work items are also expected.</p><p>DIF members from the group are actively contributing to the new version of SIOP specification through OIDF’s structure and channels. If you are interested in advancing or contributing to this work substantially, you are very welcome to join the calls, details of which you can find <a href="https://openid.net/wg/connect/">here</a>. If you are not a member of OIDF, you may contact the chairs of the DID Auth working group, or the DIF’s Liaison Officer to OIDF, which are listed at the bottom of the working group’s<a href="https://identity.foundation/working-groups/authentication.html"> webpage</a>.</p><p><em>NOTE: The latest version of the “did-siop” specification has not been approved by the DIF steering committee; it is currently paused at v0.1 and remains an unofficial Working Group Draft at time of press.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=9753b9bd0093" width="1" height="1" alt=""><hr><p><a href="https://medium.com/decentralized-identity/dif-oidf-9753b9bd0093">DIF &amp; OIDF</a> was originally published in <a href="https://medium.com/decentralized-identity">Decentralized Identity Foundation</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[KERI: For every DID, a microledger]]></title>
            <link>https://medium.com/decentralized-identity/keri-for-every-did-a-microledger-f9457fa80d2d?source=rss----7762224fe580---4</link>
            <guid isPermaLink="false">https://medium.com/p/f9457fa80d2d</guid>
            <category><![CDATA[dif-working-groups]]></category>
            <category><![CDATA[dif]]></category>
            <category><![CDATA[keris]]></category>
            <category><![CDATA[dif-id-wg]]></category>
            <category><![CDATA[did-method]]></category>
            <dc:creator><![CDATA[Decentralized Identity Foundation]]></dc:creator>
            <pubDate>Mon, 19 Oct 2020 22:48:55 GMT</pubDate>
            <atom:updated>2020-10-19T23:00:09.734Z</atom:updated>
            <content:encoded><![CDATA[<p>The world of digital identifiers (DIDs) and verifiable credentials (VCs) is evolving quickly, giving much cause for optimism. Standards are starting to connect and move towards functional interoperability, governed by testable protocols. Most of this work is happening on the level of VCs. However, DIDs and their infrastructure are also starting to converge and mature as an extensible-yet-interoperable technology.</p><p>Adoption by markets, standards bodies and regulators is largely contingent upon provable security and provable interoperability, so these promising developments cannot come soon enough.</p><p>The Digital Identity Foundation (DIF) is very proud to be hosting one particular research and development project that could prove pivotal in this process. It is currently a work item of DIF’s <a href="https://identity.foundation/working-groups/identifiers-discovery.html">Identifiers and Discovery Working Group</a>. However, a charter for an autonomous working group will be available for review at <a href="https://internetidentityworkshop.com/">#IIW31</a> this week (20–22 October 2020) to facilitate broader participation. The project is called KERI and it is a project that could only be developed in the open, for the public good and for the widest, quickest adoption.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1000/0*ZdrUkaJCemaCIBAw" /><figcaption>Photo by <a href="https://unsplash.com/@pucelano">Fernando Santander</a></figcaption></figure><h3>But first, what is KERI?</h3><p>KERI stands for Key Event Receipt Infrastructure. A “key event” is a discrete event in time that involves public/private keypairs, often called blockchain identities or cryptographic identities. These events can be generalized as inceptions (creations), rotations, and signing events: the three kinds of events for which KERI generates and handles receipts. In other words, key events are cryptographic events in the <strong>history of an identifier</strong>.</p><p>Importantly, everything <em>else </em>a decentralized identifier says, does, or refers to is not a key event. As KERI is deliberately laser-focused on key events only, we can call these other events non-KERI events. The real world consequences of a signature or rotation are out of scope and method-specific to boot. KERI is only interested in the most universal aspect of interactions between keys and cryptographic systems, i.e. the cryptography that allows drastically different DID systems to trust each other’s security guarantees.</p><blockquote><em>“DID Methods exist to solve a trust issue. This does it in a different way.”</em></blockquote><blockquote>Charles Cunningham (Jolocom GmbH, Rust development lead for KERI)</blockquote><p>Each key event produces a receipt containing only checkable signatures of key event information. <strong>Nothing more</strong>. Receipts are threaded into logs tracking the history of each identifier, which is similar to a traceable audit trail of hashes — useful for confirming but not for deducing the underlying key material. These threads are compiled into logs that are shared and replicated according to a consensus algorithm and a logic of trust thresholds that creates a fabric of shared history between nodes.</p><h3>Is KERI a blockchain or a DLT? No. Does it replace blockchains? Also no.</h3><p>The trust fabric created when KERI nodes share and propagate key material records might</p><p>sound redundant to the blockchains where all of today’s DID methods store their key material chronologically. To a degree, this is true: each log containing the history of one key is a “microledger,” like a blockchain with only one participant. Inception and rotation events in all of today’s DID methods are stored in a chronological distributed ledger which can be crawled to create a log of these key events by DID. So, why the redundancy? Why replicate a subset of the blockchain’s capabilities and features in a distinct blockchain-like infrastructure just for key material?</p><p>The answer is simple and manifold: blockchains enable many features <strong>outside the scope </strong>of KERI. These features bring with them complexity, diversity, scale costs, and trust issues. Within KERI’s scope, however, only some of a blockchain or distributed ledger technology’s (DLT’s) features are necessary. Total ordering and double-spend protection, for instance, are hallmarks of distributed ledgers, but hardly justify the added complexity here.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*YU3CNlSL6IxJgGC7" /><figcaption>Subset of blockchain/DLT capabilities required by KERI (<a href="https://github.com/SmithSamuelM/Papers/blob/master/presentations/KERI2_Overview.web.pdf">Dr Sam Smith</a>, 2019)</figcaption></figure><p>Working backwards from a short list of security features, KERI infrastructure can be a much more <strong>performant, minimalist </strong>distributed ledger system. It is still in the family tree of blockchain, DLTs and directed acyclic graphs (DAGs), but it is closer to a sidechain or a trans-blockchain interoperability mechanism. In use cases where all that is needed is a self-certifying, widely-portable identifier, KERI can stand alone as a lightweight DID method. In combination with a traditional DID Method, KERI can increase key management options and strengthen security guarantees by raising a red flag at the first discrepancy between the two parallel and redundant systems.</p><p>As a <strong>scaling mechanism</strong>, KERI can also take away some of the traffic and complexity from the underlying blockchain. In implementations where key management and state maintenance (record keeping about keys that rotate over time) are entrusted directly to the KERI mechanism, these functions can be operated much closer to the edge and replicate after a slight delay. This might be a totally acceptable trade-off of efficiency for latency in many use cases. For example, a roundtrip write-and-wait-for-finality transaction on a global blockchain makes no sense in a low-connectivity Internet of things (IoT) use case, where double-spend is a non-issue.</p><h3>KERI is both an interoperability mechanism and a standardization incentive</h3><p>More importantly for the DIF, however, is another major feature of KERI: it could become the foundation of massive interoperability and portability at the infrastructure layer. What’s more, if adopted by enough major players, it could even speed up the standardization process of DIDs themselves. By offering a minimum level of security guarantees shared across all participating methods, it would simplify the security review process for both individual DID methods and for interoperable DIDs as a whole.</p><p>By abstracting out the universal, minimal set of key functions, a KERI log that spans multiple ledgers or methods is just as <strong>verifiable </strong>as one that does not. This means that anywhere</p><p>self-certifying KERI identifiers are accepted, an identifier’s history can stretch back further than the existence of KERI. Plus, that history can include so-called “portability events”, where an identifier is deactivated on one ledger and re-activated on another. Method-specific features or records might still need to be exported and imported. The core proof of control function of a DID, however, would be universalized in a way that enabled massive portability.</p><p>This same <strong>universalizing effect </strong>of sharing a security vocabulary across all participating DID methods has the added benefit of being able to guarantee certain <strong>security features </strong>in any KERI-compliant system. Since KERI also lends itself to simple compliance tests, and since KERI logs give a benchmark against which to test method-specific and blockchain-specific security, this is a small leap for each DID method and a giant leap for standardization and security engineering.</p><h3>KERI’s history: from whitepaper to community incubation</h3><p>So far we have been highly technical in our explanation of the project. A careful reader, however, may already have caught the <strong>community commitment </strong>implicit in phrases such as “KERI-compliant” and “participating DID methods.” KERI is only useful if the major DID methods incorporate it, or if the set of participating DID methods becomes congruous over time with the set of major DID methods.</p><p>It is, in a nutshell, a <strong>community project</strong> of alignment as much as a technological innovation: an agreement on the security model for the common core functionality shared across all DID methods, allowing much variety and extensibility to be preserved by the participating DID methods. Decentralized identifiers have been very decentralized in their design and governance from the beginning, with a high degree of extensibility and flexibility within the fiefdom of each DID method and its governance. KERI has been gathering steam for over a year as a countervailing force, potentially making all DIDs function in an end-verifiable and thus universal way.</p><blockquote><em>“Investing in KERI is investing in interoperability, standardization, and cross-community security guarantees.”</em></blockquote><blockquote>Dr Sam Smith, author of the KERI whitepaper and project lead</blockquote><p>In large part, the roots of KERI lie in debates within the World Wide Web Consortium’s (W3C’s) <a href="https://www.w3.org/2019/did-wg/">Decentralized Identifier Working Group</a>. For years it has been discussing the “shalls” and “mays” that define a W3C-compliant DID method (and thus a DID system). In practical terms, this process specifies what each DID method can and must assume about <em>other </em>DID methods for such a decentralized and open system to make appropriate security guarantees.</p><p>KERI’s creator and the author of its whitepaper is <strong>Samuel M Smith </strong>PhD., a pioneering technologist in multiple fields, including automated reasoning, distributed systems, autonomous vehicles and blockchain protocol design. Dr. Smith has been refining and experimenting with such a cross-method mechanism since 2019, presenting at every meeting of the biannual Internet Identity Workshop. First came some core principles and requirements of a key infrastructure at <a href="https://iiw.idcommons.net/OffChain_(PKI)_Key_Management_%E2%80%93_Revocation_Rotation">IIW28</a>, then at <a href="https://iiw.idcommons.net/KERI:_1_Universal_DKMI_Root(s)_of_Trust_Decentralized_Systems_Primitires_%26_DKMI_Last_Mile_of_Trust">IIW29</a> a series of sessions about different aspects of a hypothetical system of witnesses that could replicate logs. For <a href="https://iiw.idcommons.net/KERI_(C)_KACE_Agreement_Algorithm_Recoveryhttps://github.com/SmithSamuelM/Papers/blob/master/whitepapers/KERI_WP_2.x.web.pdf%22">IIW30</a>, Dr Smith brought more concrete sessions on finer points and even the roadmapping session that became the DIF working group. Along the way, he has iterated an ever-growing <a href="https://github.com/decentralized-identity/keri/blob/master/kids/KERI_WP.pdf">whitepaper</a> describing and explaining all of this.</p><p>Now, however, Dr Smith has moved the project into the DIF under the auspices of its <a href="https://identity.foundation/working-groups/identifiers-discovery.html">Identifiers and Discovery Working Group</a> where he sits as co-chair. Asked about the decision, Dr Smith said, “DIF was a natural choice because I wanted the work to happen quickly but in the open, with participation from the greatest number of companies and innovators across various communities.”</p><h3>KERI’s contributors: join us!</h3><p>Foremost among DIF contributors is, of course, Dr Smith, who brings to his KERI design work more than a decade of engineering experience with scale and high-performance systems. Much of this work, focusing largely on AI and streaming/scaling projects, was done through his Python-centric consulting company <a href="http://prosapien.com">Prosapien.com</a>. He has also worked with Consensys, contributing to the <a href="https://github.com/reputage/seedQuest">Seed Quest</a> project among others, soon to be donated to DIF.</p><p>Berlin-based <a href="https://jolocom.io/">Jolocom GmbH</a> has been a major interlocutor in the early development of KERI, since before the creation of the working group at DIF. Jolocom’s Charles Cunningham is the working group’s lead Rust developer, who has written a highly interesting post about mental models of <a href="https://jolocom.io/blog/how-keri-tackles-the-problem-of-trust/"><em>How KERI tackles the problem of trust</em></a> from a developer’s point of view for the Jolocom logbook.</p><p>Representing <a href="https://www.spherity.com">Spherity GmbH are the working group’s lead </a>JavaScript developer and note-taker. Spherity’s founder, Carsten Stöcker, has written a detailed piece for his company’s blog which called KERI “<a href="https://medium.com/spherity/introducing-keri-8f50ed1d8ed7">a more performant ledger for trusted identities</a>.”</p><p>The Human Colossus Foundation, a Swiss-based non-profit, has been co-developing on the Rust side as well, working in parallel and providing input on the design considerations. The Human Colossus Foundation has also put substantial energy into promoting and socializing KERI in the Trust-over-IP Foundation, the MyData community and in the Sovrin community, including featuring an hour-long KERI <a href="https://vimeo.com/459348260">session</a> prominently in a half-day <a href="https://humancolossus.foundation/blog/invitation-core-public-utility-technologies-for-a-next-generation-internet">mini-conference</a> it organized.</p><p>At IIW31, the KERI developers will be demonstrating their initial work to date while there is still the opportunity to get involved and determine the course of KERI as the project moves from direct mode (two-party) to witness mode (multi-party, distributed consensus). Many sessions are planned for IIW, ranging from introductions to technical discussions to use-case and requirements gathering for KERI-based ideas. Additionally there will be a live demo of the working direct-mode prototype.</p><p>Introductory reading and video materials are collected at the main DIF <a href="https://github.com/decentralized-identity/keri">repository</a>, but even if you don’t watch them in advance (or fully understand them if you do), there are many ways to get involved and make this community project stronger and more diverse.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=f9457fa80d2d" width="1" height="1" alt=""><hr><p><a href="https://medium.com/decentralized-identity/keri-for-every-did-a-microledger-f9457fa80d2d">KERI: For every DID, a microledger</a> was originally published in <a href="https://medium.com/decentralized-identity">Decentralized Identity Foundation</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
    </channel>
</rss>