<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[MATTR - Medium]]></title>
        <description><![CDATA[We are creating a new type of freedom through digital trust and verifiable data, built for interoperability, security &amp; scalability. More information at https://mattr.global - Medium]]></description>
        <link>https://medium.com/mattr-global?source=rss----387236551c3e---4</link>
        <image>
            <url>https://cdn-images-1.medium.com/proxy/1*TGH72Nnw24QL3iV9IOm4VA.png</url>
            <title>MATTR - Medium</title>
            <link>https://medium.com/mattr-global?source=rss----387236551c3e---4</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Sat, 07 Mar 2026 20:33:44 GMT</lastBuildDate>
        <atom:link href="https://medium.com/feed/mattr-global" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[What’s new in the MATTR universe]]></title>
            <link>https://medium.com/mattr-global/whats-new-in-the-mattr-universe-ae55af5f1312?source=rss----387236551c3e---4</link>
            <guid isPermaLink="false">https://medium.com/p/ae55af5f1312</guid>
            <category><![CDATA[security]]></category>
            <category><![CDATA[wallet]]></category>
            <category><![CDATA[decentralized-identity]]></category>
            <category><![CDATA[privacy]]></category>
            <dc:creator><![CDATA[Luke McIntyre]]></dc:creator>
            <pubDate>Tue, 29 Nov 2022 02:12:13 GMT</pubDate>
            <atom:updated>2022-12-14T21:15:55.585Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*FMVN2mMH5eceOgCXIx3JuA@2x.png" /></figure><p>The MATTR teams have been hard at work adding new capabilities and additional features to our MATTR VII platform, SDKs and MATTR Wallet.</p><p>We’ve spent a lot of time collaborating with customers to better understand their needs and expectations when it comes to data security, auditability and user experience.</p><p>Here’s a walkthrough of what’s new in the MATTR universe — including new cloud deployment options, enhanced security features and a fully revamped digital wallet.</p><h3>Introducing event logs to the MATTR VII platform</h3><p>We have added enhanced logging for all key API calls (platform events logs) to the MATTR VII platform. Over 130 different types of events are now logged!</p><p>There are three different levels of logging that can be configured:</p><ul><li>Level 1 — Basic information such as the API name, date, time, request ID</li><li>Level 2 — Basic information + metadata</li><li>Level 3 — Basic information + metadata + full API payload information</li></ul><p>All MATTR VII public cloud deployments are set to Level 1, which excludes any personally identifiable information (PII).</p><p>In MATTR VII private cloud deployments, the logging level is configurable based on the customer’s audit, user privacy and operational requirements. Private cloud users can also leverage our integration adaptor to extract the platform event logs to their systems, e.g., centralised audit logging stores, SIEM, billing capability or data warehouses.</p><h3>Get notified of event updates automatically with webhooks</h3><p>MATTR VII now supports webhooks, a standard design pattern that allows subscription to specific MATTR VII platform events in real time. Customers can be automatically notified of these platform events and either integrate that information into specific workflows or store additional information.</p><p>The first webhook that customers can subscribe to will notify them each time a credential is issued by the MATTR VII OIDC bridge. This enables ongoing credential lifecycle management activities with the information returned in the webhook, such as sending additional communications to the holder or augmenting end user records.</p><p>We’ll be adding additional webhooks in the future to give MATTR’s customers even more flexibility in integrating their systems with the MATTR VII platform.</p><h4>Use our HTTP Signatures Library</h4><p>To provide customers with confidence in the integrity and validity of webhook events, we’ve open-sourced our HTTP signatures library — anyone can now integrate it with their own applications.</p><p>HTTP message signatures are a way of digitally signing an HTTP request to give the receiving party assurance of the integrity of the message, and that the party sending the information is who they say they are.</p><p>Though this mechanism can be applied to any HTTP request, it’s particularly effective when used with MATTR VII webhook events. It allows the subscriber to authenticate that the signed request is, in fact, coming from MATTR VII. We’ve also published:</p><ul><li>An <a href="https://www.npmjs.com/package/@mattrglobal/http-signatures">NPM library</a> to allow for easier software integration of this capability.</li><li>A <a href="https://github.com/mattrglobal/sample-apps/tree/master/verify-webhook-http-signature">sample app</a> to demonstrate how to use the open-source library in your implementation.</li></ul><p><a href="https://learn.mattr.global/tutorials/webhooks/overview">Read the technical tutorials about implementing webhooks on MATTR Learn.</a></p><p><a href="https://medium.com/@mattrglobal/open-sourcing-our-http-signatures-library-821c04a640ec">Read more about how we’re enhancing the security of webhooks with HTTP signatures</a>.</p><h4>Meet the new MATTR Wallet</h4><p>We’re thrilled to announce we’ve re-released the MATTR Wallet — our digital wallet app that helps showcase to developers and ecosystem pilot partners how verifiable credentials can work in the real world, in real-time.</p><p>The latest release has been designed with end users in mind, accessibility tested and informed by in-depth customer insight.</p><p>It includes a fresh onboarding flow, which reduces friction for first-time end users, and a new home screen that consolidates important information. Improved navigation and powerful new search capabilities make it easier and faster for users to find what they need.</p><p>An interactive activity tab has been introduced. It lists all interactions and highlights items that need attention. End users can view their history and filter interactions quickly. Clearer transaction screens make it easier to review what’s being received and give consent for sharing.</p><p>Our research has shown that end users trust digital credentials that mimic their real-life cards and certificates more readily, so issuers can now customise their credentials. Customers can add logos, choose background colours and create watermarks on digital credentials to make them feel more like real-world versions.</p><p><a href="https://mattr.global/contact">Get in touch with us</a> to explore how the MATTR can accelerate your project’s time to market and how MATTR’s wallet capabilities (including SDKs, white-label options) can be used to support your proof-of-concept phase and beyond.</p><p>For those who want to see the MATTR Wallet showcase these new features in action, download and prototype with our latest tech by visiting the <a href="https://apps.apple.com/us/app/mattr-wallet/id1518660243">App Store</a>, or <a href="https://play.google.com/store/apps/details?id=global.mattr.wallet&amp;pli=1">Google Play store</a>. Remember, this product may only be used in production by pre-approved pilot partners.</p><h3>Security and deployment to meet enterprise-level needs</h3><p>One of our top priorities at MATTR is offering the right options when it comes to how and where our platform is deployed, and meeting our customers’ availability, security, efficiency and privacy needs.</p><p>MATTR VII is now live in two additional AWS regions — Frankfurt, Germany and Montréal, Canada — which gives our European and North American customers enhanced platform support and options to meet their data sovereignty and compliance requirements.</p><p><a href="https://mattr.global/platform/deployment-options">Find out more about how the MATTR VII platform can be deployed.</a></p><p>We’re committed to providing high-quality enterprise and government-grade solutions with our SOC2 and Cyber Essentials Certified Plus compliance. Additionally, security firm Trail of Bits has completed an independent audit of the key code libraries that power the MATTR VII platform.</p><p>We take customer data very seriously and continue to uphold the highest possible standards for confidentiality and integrity throughout our organisation, including our processes, our people and our systems.</p><p><a href="https://mattr.global/platform/security">Read more about how the MATTR Security Framework supports diverse compliance and safety needs</a>.</p><h3>More options for OIDC bridge issuances and configurations</h3><p>For customers, integration with existing infrastructure eases the burden of adopting the new tools and capabilities MATTR provides. In particular, the use of OpenID Connect as a common protocol for credential exchange has been a very effective pattern for our customers and continues to gain traction in the broader internet standards community.</p><p>We’ve enhanced our OIDC bridge extension to support additional identity providers like Okta, ForgeRock and AzureB2C. Customers can now easily integrate credential issuing capabilities with more of the identity providers they already use.</p><p>Additional OIDC configuration options are also now available to help customers customise and simplify the user experience of collecting credentials.</p><p>— —</p><p>MATTR helps organisations and governments incorporate verifiable credentials into their operations in a secure, simple and accessible way. If you’re interested in learning how MATTR products can make yours better, <a href="https://mattr.global/contact/">get in touch with us today</a>.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=ae55af5f1312" width="1" height="1" alt=""><hr><p><a href="https://medium.com/mattr-global/whats-new-in-the-mattr-universe-ae55af5f1312">What’s new in the MATTR universe</a> was originally published in <a href="https://medium.com/mattr-global">MATTR</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Open sourcing our HTTP Signatures library]]></title>
            <link>https://medium.com/mattr-global/open-sourcing-our-http-signatures-library-821c04a640ec?source=rss----387236551c3e---4</link>
            <guid isPermaLink="false">https://medium.com/p/821c04a640ec</guid>
            <category><![CDATA[open-source]]></category>
            <dc:creator><![CDATA[MATTR]]></dc:creator>
            <pubDate>Tue, 29 Nov 2022 00:03:21 GMT</pubDate>
            <atom:updated>2023-04-12T23:55:30.331Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*ayNXLQ0iC0DMVEVfj1hNgg.jpeg" /></figure><p>An important part of creating a future where digital trust is embedded into business practices is creating tools to strengthen secure communication across systems and applications.</p><p>Part of this effort for our products at MATTR includes implementing standards that make our API communications more secure. We recently announced that we’re introducing the use of HTTP message signatures to our flagship MATTR VII platform, which enhance data security and make the interactions between different parties on the web safer.</p><p>We also champion open and interoperable standards across the internet and web applications in our mission to make a safer internet for all. To aid both our customers and others in the community in this, we’ve made our HTTP Signatures library fully open-sourced and publicly accessible.</p><h3>HTTP message signatures</h3><p>Hypertext Transfer Protocol, more commonly known as HTTP, is a core technology that underpins the internet. As it enables global systems to communicate with each other, it’s critical to secure HTTP messages as much as possible.</p><p>Much like an artist’s signature on a painting in the real world, a digital signature assures a verifying party that information:</p><ul><li>has integrity — it hasn’t been tampered with</li><li>originated from an authentic source — it’s from where it says it’s from.</li></ul><p>HTTP message signatures apply the power of digital signatures to HTTP, providing integrity and origin authenticity properties to the message or request.</p><p>Other digital security methods like OAuth and shared secrets, used to implement authentication and access control on APIs and web applications, require a round-trip to confirm the client. The HTTP Signatures scheme doesn’t. The integrity of a message sent can be verified independently and directly by the receiver and both parties can be confident that information has not been tampered with.</p><p>The use of HTTP message signatures is currently a draft standard incubating at the Internet Engineering Task Force (IETF) [<a href="https://datatracker.ietf.org/doc/draft-ietf-httpbis-message-signatures/">Read the draft IETF standard]</a>. If the draft is progressed to a finalised standard, this technology could become more commonly utilised across applications.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*BJVUqIcmJaYDj316j8To8w.jpeg" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*yzQnlIMjzqi3xMl9KDG1XA.jpeg" /></figure><p>HTTP signatures have broader benefits for the community. There are various use cases where security features can be applied to different kinds of interactions. Examples include:</p><ul><li>Authorising access to a secure storage backend</li><li>Filtering spam and other messages sent to a communication endpoint</li><li>Allowing ecosystems to authenticate access to permissioned APIs</li><li>And many more</li></ul><h3>How we use HTTP message signatures with webhooks</h3><p>Within our MATTR VII platform, we’re using HTTP message signatures to help customers verify the authenticity and integrity of webhooks sent by the platform. A webhook is a standard design pattern that enables a party to “subscribe” to one or more events on a system by supplying a callback URL. The URL is used to communicate with another party when a certain condition or event occurs.</p><p>With a “publish and subscribe” model, MATTR VII customers can be set up to be notified that the specific event has been triggered, such as a credential issuance events or configuration updates –they then use those to take further action based on business needs.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*61j-vYDCrciu0_j6Bc1ejQ.png" /></figure><h3>What HTTP message signatures do for webhooks</h3><p>Using webhooks on the MATTR VII platform requires customers to set up an endpoint to receive information, and that endpoint must be open to the public internet.</p><p>Because of this, there needs to be a way for the subscribed system to authenticate that the request is coming from MATTR VII and that the request is valid and not being spoofed, intercepted or modified in any way by malicious actors.</p><p>We sign the outbound webhook events with HTTP message signatures so our customers can safely call MATTR VII APIs from webhooks, and any subscriber can confidently verify the received requests are coming from us.</p><p>HTTP message signatures provide an easy and scalable way for our customers to authenticate messages or requests from our platform. The same pattern can be used to provide authenticity for any kind of web interaction or event trigger.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*Qpg-nYHgB7cRS31UVGcqUw.png" /></figure><h3>Leverage the technology for your own implementations</h3><p>The application of the HTTP Signatures library in the context of webhooks is one of many implementation examples.</p><p>Broader implementation of the HTTP message signatures scheme will lead to more secure digital interactions and a safer internet for all, so we have open-sourced our HTTP Signatures library for both MATTR customers and for the community at large.</p><p>The library is permissively open-source, and we believe it will help the community establish higher levels of security between web services and applications.</p><p>Open-sourcing the library also encourages interoperability and integration with the MATTR VII platform, making it more accessible for businesses of all shapes and sizes.</p><h3>Get started</h3><p>It’s easy to get started today. You can:</p><ul><li>Access the open-source <a href="https://github.com/mattrglobal/http-signatures">HTTP Signatures library</a> on GitHub</li><li>Check out the <a href="https://www.npmjs.com/package/@mattrglobal/http-signatures">HTTP Signatures NPM package</a> for easier integration</li><li>See an <a href="https://github.com/mattrglobal/sample-apps/tree/master/verify-webhook-http-signature">example implementation</a> of how to verify a webhook that was generated by MATTR VII</li></ul><p><em>This article first appeared on </em><a href="https://mattr.global/resources/articles/open-sourcing-our-http-signatures-library"><em>mattr.global</em></a><em>.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=821c04a640ec" width="1" height="1" alt=""><hr><p><a href="https://medium.com/mattr-global/open-sourcing-our-http-signatures-library-821c04a640ec">Open sourcing our HTTP Signatures library</a> was originally published in <a href="https://medium.com/mattr-global">MATTR</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Adding DID ION to MATTR VII]]></title>
            <link>https://medium.com/mattr-global/adding-did-ion-to-mattr-vii-d56bdb7a2fde?source=rss----387236551c3e---4</link>
            <guid isPermaLink="false">https://medium.com/p/d56bdb7a2fde</guid>
            <category><![CDATA[bitcoin]]></category>
            <category><![CDATA[blockchain]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[identity]]></category>
            <category><![CDATA[decentralization]]></category>
            <dc:creator><![CDATA[Nader Helmy]]></dc:creator>
            <pubDate>Thu, 16 Sep 2021 00:57:46 GMT</pubDate>
            <atom:updated>2021-09-17T01:39:29.539Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*OdRfGraUNfWJXJtwv9a2BA.png" /></figure><p>Since <a href="https://medium.com/mattr-global/intro-to-dids-for-people-5ebe620b5a15">the beginning</a> of our journey here at MATTR, decentralization and digital identity have been central to our approach to building products. As part of this, we’ve supported Decentralized Identifiers (or <a href="https://learn.mattr.global/docs/platform/core/dids/overview">DIDs</a>) since the <a href="https://medium.com/mattr-global/introducing-the-mattr-platform-91db4925c773">earliest launch of our platform</a>. We’ve also considered how we might give you more options to <a href="https://medium.com/mattr-global/did-extensibility-on-the-mattr-platform-14c73c7a798e">expand the utility</a> of these identities over time.</p><h3>An important milestone</h3><p>The W3C working group responsible for Decentralized Identifiers <a href="https://www.w3.org/blog/news/archives/9179">recently published</a> the DID v1.0 specification under “Proposed Recommendation” status. This is a significant milestone as DIDs approach global standardization with the pending approval of the W3C Advisory Committee.</p><p>DIDs are maturing, but so is the environment and context in which they were originally designed. With a complex ecosystem consisting of dozens of different methodologies and new ones emerging on a regular basis, it’s important to balance the potential of this decentralized approach with a realistic approach for defining the real utility and value of each <a href="https://www.w3.org/TR/did-core/#methods">DID method</a>. For example, the <a href="https://www.w3.org/TR/2021/NOTE-did-rubric-20210826/">DID Method Rubric</a> provides a good frame of reference for comparing different approaches.</p><p>Different types of DIDs can be registered and anchored using unique rules specific to the set of infrastructure where they’re stored. Since DIDs provide provenance for keys which are controlled by DID owners, the rules and systems that govern each kind of DID method have a significant impact on the trust and maintenance model for these identifiers. This is the key thing to remember when choosing a DID method that makes sense for your needs.</p><h3>Our supported DID methods</h3><p>In MATTR VII, by supporting a variety of DID methods — deterministic or key-based DIDs, domain-based DIDs, and ledger-based DIDs — we are able to provide tools which can be customized to fit the needs of individual people and organizations.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*2CoaB-lwEJl5hRQ5XWKe5g.jpeg" /></figure><ul><li>Key-based DIDs — Largely static, easy to create, and locally controlled. This makes them a natural choice for applications where there’s a need to manage connections and interactions with users directly.</li><li>DIDs anchored to web domains — These have a different trust model, where control over the domain can bootstrap a connection to a DID. This makes a lot of sense for organizations with existing domain names that already transact and do business online, and can extend their brand and reputation to the domain of DIDs.</li><li>Ledger-based DIDs — These offer a distributed system of public key infrastructure which is not centrally managed or controlled by a single party. While ledgers differ in their governance and consensus models, they ultimately provide a backbone for anchoring digital addresses in a way which allows them to be discovered and used by other parties. This can be a useful feature where a persistent identifier is needed, such as in online communication and collaboration.</li></ul><p>There is no single DID method or type of DID (which at the moment) should be universally applied to every situation. However, by using the strengths of each approach we can allow for a diverse ecosystem of digital identifiers enabling connections between complex networks of people, organizations and machines.</p><p>To date, we’ve provided support for three main DID methods in our platform: <a href="https://w3c-ccg.github.io/did-method-key/">DID Key</a>, <a href="https://w3c-ccg.github.io/did-method-web/">DID Web</a>, and <a href="https://sovrin-foundation.github.io/sovrin/spec/did-method-spec-template.html">DID Sovrin</a>. These align with three of the central types of infrastructure outlined above.</p><h3>Introducing DID ION</h3><p>We’re proud to announce that as of today we’ve added support for <a href="https://identity.foundation/ion/">DID ION</a>, a DID method which is anchored to IPFS and Bitcoin. We’ve <a href="https://medium.com/decentralized-identity/sidetree-protocol-reaches-v1-9b565cf92db3">supported the development of the Sidetree protocol</a> that underpins DID ION for some time as it has matured in collaboration with working group members at the Decentralized Identity Foundation.</p><p>With contributions from organizations such as Microsoft, Transmute, and SecureKey, <a href="https://identity.foundation/sidetree/spec/">Sidetree</a> and DID ION have emerged as a scalable and enterprise-ready solution for anchoring DIDs. The <a href="https://academy.affinidi.com/decoding-the-sidetree-protocol-18d8bfa39257">core idea</a> behind the Sidetree protocol is to create decentralized identifiers that can run on any distributed ledger system. DID ION is an implementation of that protocol which backs onto the Bitcoin blockchain, one of the largest and most used public ledger networks in the world.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*l_Co-2H9Xe0JKuhMg1k6Bw.jpeg" /></figure><p>Sidetree possesses some unique advantages not readily present in other DID methods, such as low cost, high throughput, and built-in portability of the identifier. This provides a number of benefits to people and organizations, especially in supporting a large volume of different kinds of connections with the ability to manage and rotate keys as needed. We have added end-to-end capabilities for creating and resolving DIDs on the ION network across our platform and wallet products.</p><p>Although DID ION is just one implementation of the Sidetree protocol, we see promise in other DID methods using Sidetree and will consider adding support for these over time as and when it makes sense. We’ll also continue to develop Sidetree in collaboration with the global standards community to ensure that this protocol and the ION Network have sustainable futures for a long time to come.</p><p>At the same time, the community around DID Sovrin is developing a new kind of interoperability by designing a <a href="https://hackmd.io/@icZC4epNSnqBbYE0hJYseA/S1eUS2BQw">DID method</a> that can work for vast networks of Indy ledgers, rather than focusing on the Sovrin-specific method that’s been used to date. As DID Sovrin gets phased out of adoption, we’re simultaneously deprecating standard support for DID Sovrin within MATTR VII. We’ll be phasing this out shortly with upcoming announcements for customers building on our existing platform.</p><p>If you’ve got any use cases that utilize DID Sovrin or want to discuss extensibility options, please reach out to us on any of our social channels or at info@mattr.global and we’ll be happy to work with you.</p><h3>Looking ahead</h3><p>We believe this a big step forward in providing a better set of choices when it comes to digital identity for our customers. From the start, we have designed our platform with flexibility and extensibility in mind, and will continue to support different DID methods as the market evolves.</p><p>We look forward to seeing how these new tools can be used to solve problems in the real world and will keep working to identify better ways to encourage responsible use of digital identity on the web.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=d56bdb7a2fde" width="1" height="1" alt=""><hr><p><a href="https://medium.com/mattr-global/adding-did-ion-to-mattr-vii-d56bdb7a2fde">Adding DID ION to MATTR VII</a> was originally published in <a href="https://medium.com/mattr-global">MATTR</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Issuing credentials directly to the MATTR mobile wallet]]></title>
            <link>https://medium.com/mattr-global/issuing-credentials-directly-to-the-mattr-mobile-wallet-8e8cab931e2e?source=rss----387236551c3e---4</link>
            <guid isPermaLink="false">https://medium.com/p/8e8cab931e2e</guid>
            <category><![CDATA[openid-connect]]></category>
            <category><![CDATA[digital-identity]]></category>
            <category><![CDATA[decentralized-identity]]></category>
            <category><![CDATA[verifiable-credentials]]></category>
            <category><![CDATA[digital-trust]]></category>
            <dc:creator><![CDATA[David Renwick]]></dc:creator>
            <pubDate>Thu, 12 Aug 2021 04:07:02 GMT</pubDate>
            <atom:updated>2021-08-13T03:33:41.387Z</atom:updated>
            <content:encoded><![CDATA[<p><em>Summary: We explore how to issue credentials using secure messaging.</em></p><p>At MATTR, we’ve pioneered a way to request and receive credentials using <a href="https://medium.com/mattr-global/introducing-oidc-credential-provider-7845391a9881">OpenID Connect (OIDC)</a> capability.</p><p>However, if you already have a robust mechanism in place to authenticate users, then setting up additional OIDC capability is unnecessary. Sending credentials using secure Decentralized Identifier (DID) messaging or directly with a QR code is a safe, convenient alternative. In this article, we’ll explore this alternative method in more detail.</p><p>The MATTR mobile wallet supports two main channels for issuing a credential:</p><ul><li>OpenID Credential Provider</li><li>Secure DID messaging</li></ul><p>Note: We’re building DID messaging on the JOSE stack to facilitate signing and encryption.</p><p><strong>OpenID Credential Provider</strong></p><p>If you haven’t yet authenticated a user, using OpenID Credential Provider offers a secure way to authenticate a user at the point of credential creation. It involves setting up and configuring an OpenID Provider to work alongside the MATTR VII OIDC Bridge Extension — simple if you’re already using OIDC infrastructure, but more complex to set up from scratch.</p><p><strong>Secure DID messaging</strong></p><p>If you’ve already authenticated a user through another method, issuing a credential through a secure DID message is a reliable alternative to OIDC. This approach works well if you’re authenticating users through a website login or even in person (like a classroom or training centre).</p><p>Let’s see how this might work in practice.</p><p><strong>1. Authentication</strong></p><p>Before issuing a credential, you need to authenticate the user. The most common way to do this is having a user login to a session on your website.</p><p><strong>2. Linking</strong></p><p>Now that you’ve authenticated the user, you need to link their DID to the session of the user. This DID will be generated by the wallet they are using to hold the credential. You can obtain it in a few different ways:</p><ul><li>If the user already has a credential you’ve issued, and you trust they are still in control of the subject DID in the credential, you can create a new credential based off the DID inside the credential.</li><li>If the user needs to link their DID from their mobile wallet, you can use a <a href="https://learn.mattr.global/tutorials/dids/did-auth-oidc">DID Auth</a> flow to make sure you’re obtaining a validated DID that the user can prove they own.</li><li>If you needed to verify credential data from the user as part of the transaction anyway, you’ll need to use the Holder DID from the Verifiable Presentation as the determining DID.</li></ul><p>For very simple use cases like demo and testing, if a user has the MATTR mobile wallet they can use a Public DID — they can simply copy the DID and pass it to you out-of-band.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*z6TKITrPaZYjVjeJ3gQZJA.png" /></figure><p><strong>3. Constructing the credential and message</strong></p><p>Now that the DID is ‘known’ and we’ve authenticated the user, a Verifiable Credential is <a href="https://learn.mattr.global/tutorials/issue/issue-basic">created</a> using the MATTR VII platform. This credential is then packaged into a secure DID message format to be delivered to the recipient. Because the subject DID is known, the DID message can be encrypted to ensure the data is safe in transit. Use the <a href="https://learn.mattr.global/api-reference/v1.0.1#operation/encryptMessage">messaging endpoints</a> to easily perform this step.</p><p><strong>4. Delivery</strong></p><p>The MATTR mobile wallet can read DID messages in either a secure DID message, QR code or deep-link.</p><p>Sending a secure DID message is an easy way to push messages to mobile wallet holders. Once the message has been encrypted, it can be <a href="https://learn.mattr.global/tutorials/messaging/messaging-send">sent to the subject DID</a> and the MATTR VII platform will route the encrypted message to the holder.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*xUsVKuu5OorNJIhBxiUb6Q.png" /></figure><p>QR codes and deep-links typically make the messages too large to be reliably read by most smartphones. To solve this, we embed a URL to an endpoint hosting the DID message. Then, the MATTR mobile wallet simply follows a redirect to obtain the message.</p><p><strong>5. Storing the credential</strong></p><p>Once the MATTR mobile wallet receives the message, the user can view the credential to make sure it’s correct, then store the credential in the wallet.</p><p>At this stage, the wallet will also perform some checks to verify the credential, including:</p><ul><li>Validation of the credential proof</li><li>Resolving the issuer DID document</li><li>Checking that the issuer is publishing a valid DID-to-Domain linkage credential.</li></ul><p>The checks are clearly visible to the user, and there’s assurance that when it comes time for a user to present their credential, it’ll be accepted by trusted verifiers.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*VGmzGzuGQ5BSzHQS7QRqlQ.png" /></figure><p><strong>Wrap up</strong></p><p>If you’re already using a secure mechanism to authenticate your users, then setting up OIDC capability isn’t necessary. As we’ve explored, sending credentials using secure DID messaging directly or via a QR code or deep-link is safe, convenient and allows users to obtain their credentials directly.</p><p>Try this out for yourself now on the MATTR VII platform and in the MATTR mobile wallet.</p><p><strong>MATTR VII trial</strong></p><p>Sign up today for a <a href="https://mattr.global/get-started/">free trial of our MATTR VII platform</a> to experience the powerful capabilities that can be deployed in the context of your organization.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=8e8cab931e2e" width="1" height="1" alt=""><hr><p><a href="https://medium.com/mattr-global/issuing-credentials-directly-to-the-mattr-mobile-wallet-8e8cab931e2e">Issuing credentials directly to the MATTR mobile wallet</a> was originally published in <a href="https://medium.com/mattr-global">MATTR</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Rendering credentials in a human-friendly way]]></title>
            <link>https://medium.com/mattr-global/rendering-credentials-in-a-human-friendly-way-e47f4a32fd4b?source=rss----387236551c3e---4</link>
            <guid isPermaLink="false">https://medium.com/p/e47f4a32fd4b</guid>
            <category><![CDATA[digital-wallet]]></category>
            <category><![CDATA[verifiable-credentials]]></category>
            <category><![CDATA[digital-trust]]></category>
            <category><![CDATA[digital-identity]]></category>
            <category><![CDATA[accessibility]]></category>
            <dc:creator><![CDATA[Nader Helmy]]></dc:creator>
            <pubDate>Thu, 01 Jul 2021 21:44:55 GMT</pubDate>
            <atom:updated>2021-07-01T21:44:55.875Z</atom:updated>
            <content:encoded><![CDATA[<p>At MATTR we’re always dreaming up ways to make decentralized identity and verifiable credentials easy and intuitive to use for as many people as possible.</p><p>From the start, it’s been a core part of our mission to make sure that end users understand the implications of decentralized identity and the control it affords them over their data and their privacy. This model offers users greater sovereignty over their own information by empowering individuals as both the holder and subject of information that pertains to them. Users are able to exercise their new role in this ecosystem by utilizing a new class of software known as <a href="https://learn.mattr.global/concepts/digital-wallets">digital wallets</a>.</p><p>We first released our <a href="https://learn.mattr.global/onboarding/install/wallet">Mobile Wallet</a> for smartphones in June 2020, with a simple user interface to allow people to interact with and receive credentials from issuers as well as present credentials to relying parties. In the interim, we have developed a number of improvements and features to the Mobile Wallet to support advanced capabilities such as:</p><ul><li>Authenticating to Identity Providers over OpenID Connect to receive credentials via OIDC Bridge</li><li>Deriving privacy-preserving selective disclosure presentations from credentials using BBS+ signatures</li><li>Establishing a secure DID messaging inbox for users to receive encrypted messages and push notifications</li></ul><p>These changes have not only made the wallet more functional; they’ve also evolved to better protect users’ best interests — giving them privacy-by-design and surfacing the information and context that they need to confidently make decisions underpinned by the security of decentralized identity.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/604/1*tkpWlj3IspCf0T62Xcjctg.png" /><figcaption><em>Timeline of MATTR wallet development</em></figcaption></figure><p>This journey has led us to realize the importance of creating a wallet experience that places users front and center. As these systems create more opportunity for user-driven consent and identity management, they’ve simultaneously created a demand for a wallet that can not only perform the technical operations required, but do so in a user-friendly way that surfaces the information that truly matters to people. Our latest feature release to the MATTR Mobile Wallet is a step in this direction.</p><p>With Human-Friendly Credentials, we have added the capability to render different kinds of credentials uniquely in the wallet interface according to the information they contain. Until now, the end user experience for verifiable credentials has been largely consistent across different categories of credentials and issuers. In other words, a credential containing medical data from your doctor looks exactly the same as an education credential from your university or a concert ticket from a music venue: they all appear to the user as a long list of claims.</p><p>In this release we change that. Thanks to the semantic information encoded in verifiable credentials, the wallet is now able to understand and interpret certain kinds of credentials to render them to the user in a way that makes the data easier to understand.</p><p><a href="https://learn.mattr.global/concepts/semantic-web#json-ld">JSON-LD</a> verifiable credentials have the ability to support common data vocabularies and schemas which are published on the web. For example, if a credential contains a claim describing the name of an individual, the claim can be defined via reference to an existing data vocabulary found here: <a href="https://schema.org/Person">https://schema.org/Person</a></p><p>Human-Friendly Credentials allow the wallet to start intelligently displaying known credential types and data types. This shows up in a variety of different ways in a user’s dataset.</p><p>For example, this update formats address fields to make them more readable; formats names and proper nouns where possible; makes URLs, telephone numbers and email addresses clickable; highlights images and icons for better trust and brand signaling; and creates basic rules for language localization that adjust to a user’s device settings. This logic allows the wallet to create a kind of information hierarchy that starts to draw out the important aspects of data included in a credential, so users can make trust-based decisions using this information.</p><p>These rules are applied to any kind of credential the wallet encounters. Whilst all of this is incredibly helpful for users, we have gone a step further: displaying entire credentials in a completely unique UI according to their type. The ‘type’ property of a credential expresses what kind of information is in the credential — is it a degree, a medical record, a utility bill? The usage of common credential types across different implementations and ecosystems is necessary for semantic interoperability on the broader scale. The wallet should be able to recognize these common credential types and display them to the user in a friendly way.</p><p>In this update, we have added custom rendering for both Personal Identity Credentials as well as Education Courses. These are common types we see occurring naturally across the decentralized identity landscape, and now the MATTR Mobile Wallet is able to recognize and display them properly.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*jPa_U6-yQ0qEMuLtmZzfXQ.png" /><figcaption><em>Personal Identity Credentials and Education Course credentials</em></figcaption></figure><p>An important note to consider is that Human-Friendly Credentials only work for known data and credential types. As the ecosystem matures, we expect to add more data types and credential types in the future to support an even broader set of human-related processes and actions. In a general sense, we will also continue to iterate on our digital wallet offerings to provide a greater degree of flexibility and control for end users. We believe it’s a vital component to a healthy digital trust ecosystem.</p><p>To check out these changes yourself, download the latest version of our <a href="https://learn.mattr.global/onboarding/install/wallet">Mobile Wallet</a> to get started.</p><p>For more information on Human-Friendly Credentials, check out our tutorials and video content on MATTR Learn.</p><p>For everything else related to MATTR, visit <a href="https://mattr.global">https://mattr.global</a> or follow <a href="https://twitter.com/mattrglobal">@MattrGlobal on Twitter</a>.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=e47f4a32fd4b" width="1" height="1" alt=""><hr><p><a href="https://medium.com/mattr-global/rendering-credentials-in-a-human-friendly-way-e47f4a32fd4b">Rendering credentials in a human-friendly way</a> was originally published in <a href="https://medium.com/mattr-global">MATTR</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Adding support for Secure DID Messaging]]></title>
            <link>https://medium.com/mattr-global/adding-support-for-secure-did-messaging-befb75a72feb?source=rss----387236551c3e---4</link>
            <guid isPermaLink="false">https://medium.com/p/befb75a72feb</guid>
            <category><![CDATA[secure-did-messaging]]></category>
            <category><![CDATA[jwm]]></category>
            <category><![CDATA[verifiable-data]]></category>
            <category><![CDATA[decentralized-identity]]></category>
            <category><![CDATA[verifiable-credentials]]></category>
            <dc:creator><![CDATA[Dylan Paul]]></dc:creator>
            <pubDate>Thu, 06 May 2021 21:24:53 GMT</pubDate>
            <atom:updated>2021-05-06T21:24:53.236Z</atom:updated>
            <content:encoded><![CDATA[<p>We are excited to announce a new addition to our MATTR VII platform capabilities. As we continue to build out an extensive suite of features to support the exchange of data such as <a href="https://www.w3.org/TR/vc-data-model/">Verifiable Credentials</a>, we have now added secure <a href="https://www.w3.org/TR/did-core/">Decentralized Identifier</a> (DID) messaging capabilities to enable entirely new ways to communicate using our platform.</p><p>The common and well-understood ways to interact with verifiable credentials have typically been mechanisms such as scanning QR codes or sharing deep links. In this release, we have focused on adding an option to these approaches that provides an even greater level of transparency and user control. With this new capability, you will be able to facilitate more intuitive user flows that make issuing, verifying, and communicating around verifiable credentials a seamless and efficient process for users. While utilizing existing frameworks like push notifications, secure DID messaging maintains a high level of privacy-preserving security. It does this by leveraging a decentralized ecosystem that ensures control of the data in a message remains solely with the participants exchanging the information, and no one else.</p><p>Utilizing the JSON Web Message (JWM) specification, this new capability allows for encrypted messages to be sent and received in a way that hides their content from all but the cryptographically authorized recipients of the message. That way, the sender of the message can be confident they are only disclosing their details and message with the intended parties.</p><p>There are two key pieces of information about a recipient that are fundamental to facilitating secure DID-based messaging on the platform. The first of these is the same as any messaging framework, in that <strong>an address or endpoint is needed to understand where to send the message</strong>. Unlike traditional messaging capabilities that require you to utilize centralized, service provider created, and controlled identifiers such as email and phone numbers, our DID-based messaging solution allows you to facilitate interactions between parties simply by using a Decentralized Identifier and its associated DID Document. The second piece of information you need is the <strong>recipient’s public key</strong>, which the platform obtains from the resolved DID document. This public key is then used to encrypt a message to the recipient.</p><p>These capabilities ensure that:</p><ul><li>a message is delivered to the correct recipient, and</li><li>only the intended recipient can view the content and other metadata of the message.</li></ul><p>A unique DID is also created by the wallet specifically for each unique interaction with a particular party or organization — further preserving a wallet holder’s privacy and anonymity between the various interactions they may have with issuers and relying parties alike.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*2z8PG4efK8nsoxByaVCoMg.jpeg" /></figure><p>Once the recipient’s DID is known, a message is formatted as a <a href="https://medium.com/mattr-global/jwm-a-new-standard-for-secure-messaging-a21d3daa4403">JSON Web Message (JWM)</a>. In this release, we have focused on adding support for 3 main types of messages:</p><ul><li><strong>Offering a credential</strong> — rather than the user having to scan a QR code, a message can be sent directly to them that will initiate the credential offer flow within their wallet.</li><li><strong>Notification about a change in the revocation status of a credential </strong>— a mechanism to ensure wallet holders are proactively informed about any status changes for credentials they hold in their wallet, even if they’re not online when the status update occurs.</li><li><strong>Starting a credential verification flow (presentation request)</strong> — allows a holder to present a credential to a verifier directly, particularly useful in situations where there isn’t a co-location of parties present in the interaction.</li></ul><p>To take advantage of this capability as a wallet user, all you need to do is opt into receiving messages by enabling notifications in your wallet. At this point, a private cloud-based inbox will be created to store messages that are sent to your device.</p><p>Messages remain encrypted in the inbox and are only persisted in storage while they are in an unread state. Once the user views the message and its payload is extracted into their wallet, the encrypted message is removed from the inbox and only the payload itself is retained in the user’s wallet.</p><p>To give an example, let’s say you call up your bank and they are required to sight a form of government-issued identification in order to revalidate their anti-money laundering (AML) records. Given the bank already has an established relationship with you from your prior communications, they will likely have your DID stored in their system. Using this information, they push a message containing a presentation request to you. This request is then processed by the wallet on your phone and triggers a push notification to make you aware of the update.</p><p>Upon receiving the push notification containing the message, the wallet app will decrypt and extract the payload. In this instance, it contains a presentation request that asks you to select the credential to share back to the bank as proof of your identity. Once you have shared the credential presentation to match their request, the bank verifies that it satisfies their requirements giving them assurance that they are talking to the correct person and that they have met their audit requirements from an AML perspective. This allows them to continue the call with you.</p><p>Bringing secure messaging into our platform helps facilitate a more intuitive user experience with mobile wallets and helps simplify some of the otherwise complex issuance and verification flows that might otherwise involve scanning multiple QR codes or accessing different embedded links.</p><p>We look forward to continuing our collaboration with the community on the underlying messaging and security standards as well as gathering feedback from our customers and the broader ecosystem around ways to enhance and extend the different types of messages, along with ways to digest them into different kinds of interactions and experiences.</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FcpIipwG8DIo&amp;display_name=YouTube&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DcpIipwG8DIo&amp;image=http%3A%2F%2Fi.ytimg.com%2Fvi%2FcpIipwG8DIo%2Fhqdefault.jpg&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/34a9407814083238cda2e404e38915d4/href">https://medium.com/media/34a9407814083238cda2e404e38915d4/href</a></iframe><p><a href="https://mattr.global/get-started/">Sign up</a> on our website today to get access to MATTR VII and check out <a href="http://learn.mattr.global/tutorials/revocation/revocation-overview">MATTR Learn</a> for a detailed walkthrough to start utilizing messaging as part of a verifiable credential flow.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=befb75a72feb" width="1" height="1" alt=""><hr><p><a href="https://medium.com/mattr-global/adding-support-for-secure-did-messaging-befb75a72feb">Adding support for Secure DID Messaging</a> was originally published in <a href="https://medium.com/mattr-global">MATTR</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[IIW32: BBS+ and beyond]]></title>
            <link>https://medium.com/mattr-global/iiw32-bbs-and-beyond-1a41634c15b0?source=rss----387236551c3e---4</link>
            <guid isPermaLink="false">https://medium.com/p/1a41634c15b0</guid>
            <category><![CDATA[identity]]></category>
            <category><![CDATA[cryptography]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[digital-identity]]></category>
            <category><![CDATA[privacy]]></category>
            <dc:creator><![CDATA[Nader Helmy]]></dc:creator>
            <pubDate>Wed, 05 May 2021 20:19:05 GMT</pubDate>
            <atom:updated>2021-05-05T20:24:21.848Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*XaAkx-GKx4gmpj3ksM5tFA.png" /></figure><p>The <a href="https://internetidentityworkshop.com/">Internet Identity Workshop</a> continues to be a central nucleus for thoughtful discussion and development of all things related to digital identity. The most recent workshop, which was held in mid-April, was no exception. Despite the lack of in-person interaction due to the ongoing global pandemic, this IIW was as lively as ever, bringing together a diverse set of stakeholders from across the globe to share experiences, swap perspectives, and engage in healthy debates.</p><p>One common theme this year was the continued development and adoption of BBS+ signatures, a type of multi-message cryptographic digital signature that enables selective disclosure of verifiable credentials. We first <a href="https://iiw.idcommons.net/ZKPs_for_JSON-LD">introduced</a> this technology at IIW30 in April 2020, and have been inspired and delighted by the community’s embrace and contribution to this effort across the board. In the year since, progress has been made in a variety of areas, from standards-level support to independent implementations and advanced feature support.</p><p>We thought we’d take a moment to round up some of the significant developments surrounding BBS+ signatures and highlight a few of the top items to pay attention to going forward.</p><p>Over the past few months, the linked data proofs <a href="https://github.com/mattrglobal/jsonld-signatures-bbs">reference implementation</a> of BBS+ published a new release that introduces a variety of improvements in efficiency and security, including formal alignment to the W3C CCG <a href="https://w3c-ccg.github.io/security-vocab/">Security Vocab</a> v3 definitions. In addition, support for JSON-LD BBS+ signatures was added to the <a href="https://github.com/w3c-ccg/vc-http-api/">VC HTTP API</a>, making it possible to test this functionality in an interoperable way with other vendors participating in an open environment.</p><p>An important element in enabling BBS+ signatures is using what’s known as a <a href="https://tools.ietf.org/html/draft-irtf-cfrg-pairing-friendly-curves-09">pairing-friendly curve</a>; for our purposes we use <a href="https://tools.ietf.org/html/draft-irtf-cfrg-pairing-friendly-curves-02#section-2.4">BLS12–381</a>. We have seen some promising signs of adoption for this key pair, with multiple Decentralized Identifier (DID) methods — both <a href="https://hackmd.io/@icZC4epNSnqBbYE0hJYseA/S1eUS2BQw">did:indy</a> from <a href="https://www.hyperledger.org/">Hyperledger</a> and <a href="https://github.com/decentralized-identity/ion">did:ion</a> from <a href="https://identity.foundation/">DIF</a> — indicating they intend to add or already have support for these keys, allowing BBS+ signatures to be issued across a variety of decentralized networks and ecosystems. This development is possible due to the fact that BBS+ signatures is a ledger-independent approach to selective disclosure, effectively no custom logic or bespoke infrastructure is needed for these digital signatures to be created, used and understood.</p><p>In addition, the Hyperledger Aries project has been hard at work developing interoperable and ledger-agnostic capabilities in open source. The method used to track interop targets within the cohort and ultimately measure conformance against Aries standards is what’s known as an <a href="https://github.com/hyperledger/aries-rfcs/tree/master/concepts/0302-aries-interop-profile">Aries Interop Profile (AIP)</a>. A major upcoming update to AIP will add support for additional DID methods, key types and credential formats, as well as introducing Aries support for JSON-LD BBS+ signatures as part of <a href="https://github.com/hyperledger/aries-rfcs/pull/579">AIP 2.0</a>. This will allow Aries-driven credential issuance and presentation protocols to work natively with BBS+ credentials, making that functionality broadly available for those in the Aries community and beyond.</p><p>There have also been a number of exciting developments when it comes to independent implementations of BBS+ signatures. <a href="https://animo.id/">Animo Solutions</a> has recently implemented JSON-LD BBS+ signatures support into the popular open-source codebase <a href="https://github.com/hyperledger/aries-cloudagent-python">Hyperledger Aries Cloud Agent Python</a> (ACA-Py). In another independent effort, <a href="https://trinsic.id/">Trinsic</a> has contributed an <a href="https://github.com/trinsic-id/ld-proofs-dotnet">implementation</a> of JSON-LD BBS+ credentials which they have demonstrated to be working in tandem with <a href="https://github.com/trinsic-id/didcomm-v2">DIDComm v2</a>, a secure messaging protocol based on DIDs. Implementations such as these help to demonstrate that open standards are transparent, can be understood and verified independently, and can be implemented with separate languages and tech stacks. They also set the groundwork for demonstrating real testing-driven interoperability via mechanisms such as the VC HTTP API and AIP 2.0. We are continuously looking to improve the documentation of these specs and standards so that their implications and nuances can be more broadly understood by builders and developers looking to engage with the technology.</p><p>On the cryptographic side of things, progress is also being made in hardening the existing BBS+ specification as well as expanding BBS+ to support more advanced privacy-preserving features. A significant development in this area is the work of cryptographer Michael Lodder who has been actively conducting research on an enhanced credential revocation mechanism using <a href="https://github.com/mikelodder7/accumulator-rs">cryptographic accumulators</a> with BBS+. This approach presents a promising alternative to existing solutions that allow authoritative issuers to update the status of issued credentials without compromising the privacy of the credential holder or subject who may be presenting the credential. We see this as another application of BBS+ signatures in the context of verifiable credentials that carries a lot of potential in pushing this technology to an even more robust state.</p><p>There was also initial discussion and tacit agreement to create a new cryptography-focused working group at Decentralized Identity Foundation. As the new WG drafts its charter, the first work item of this group will be the <a href="https://mattrglobal.github.io/bbs-signatures-spec/">BBS+ Signatures</a> spec which defines the cryptographic scheme known as BBS+ agnostic of its application in areas such as linked data signatures or verifiable credentials. In the future, this WG will likely evolve to include other crypto-related work items from the community.</p><p>This is just the tip of the iceberg when it comes to the momentum and development building around this technology in the community. We couldn’t be more excited about the future of BBS+ signatures, especially as we gear up to tackle the next set of hard problems in this area including privacy-preserving subject authentication and revocation using cryptographic accumulators. If you’re interested we encourage you to get involved, either by contributing to the <a href="https://github.com/w3c-ccg/ldp-bbs2020">Linked Data Proofs specification</a>, checking out our <a href="https://github.com/mattrglobal/bbs-signatures">reference</a> <a href="https://github.com/mattrglobal/jsonld-signatures-bbs">implementations</a>, or participating in the new WG at DIF, to name but a few of the many ways to engage with this work. We look forward to doing this retrospective at many IIWs to come, documenting the ever-growing community that continues to champion this technology in dynamic and interesting ways.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=1a41634c15b0" width="1" height="1" alt=""><hr><p><a href="https://medium.com/mattr-global/iiw32-bbs-and-beyond-1a41634c15b0">IIW32: BBS+ and beyond</a> was originally published in <a href="https://medium.com/mattr-global">MATTR</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Why we’re launching MATTR VII]]></title>
            <link>https://medium.com/mattr-global/launching-mattr-vii-4e11bcb9aaef?source=rss----387236551c3e---4</link>
            <guid isPermaLink="false">https://medium.com/p/4e11bcb9aaef</guid>
            <category><![CDATA[security]]></category>
            <category><![CDATA[privacy]]></category>
            <category><![CDATA[identity]]></category>
            <category><![CDATA[web3]]></category>
            <category><![CDATA[decentralization]]></category>
            <dc:creator><![CDATA[Nader Helmy]]></dc:creator>
            <pubDate>Thu, 25 Mar 2021 21:53:38 GMT</pubDate>
            <atom:updated>2021-03-25T21:53:38.858Z</atom:updated>
            <content:encoded><![CDATA[<p>It’s no secret we need a better web. The original vision of an open and decentralized network that’s universally accessible continues to be a north star for those working to design the future of digital infrastructure for everyday people. Despite the progress that has been made in democratising access to massive amounts of information, the dire state of cybersecurity and privacy on the internet today present significant barriers to access for too many of our most vulnerable populations. We started MATTR because we believe that standards, transparency, and openness are not only better for users; they make for stronger systems and more resilient networks. We recognize that a decentralized web of digital trust, based on transparency, consent, and verifiable data, can help us address critical challenges on a global scale. It represents a significant opportunity to give people real agency and control over their digital lives.</p><h3>Our story</h3><p>At its inception, we chose “MATTR” as a moniker because we strongly believed that the movement towards more decentralized systems will fundamentally change the nature of data and privacy on the internet. Matter, in its varying states, forms the building blocks of the universe, symbolically representing the capacity for change and transformation that allows us all to grow and adapt. In another sense, people matter, and the impact of decisions we make as builders of technology extend beyond ourselves. It’s a responsibility we take seriously, as Tim Berners Lee puts it, “to preserve new frontiers for the common good.” We proudly bear the name MATTR and the potential it represents as we’ve built out our little universe of products.</p><p>In September 2020, we <a href="https://medium.com/mattr-global/introducing-the-mattr-platform-91db4925c773">introduced</a> our decentralized identity platform. Our goal was to deliver standards-based digital trust to developers in a scalable manner. We designed our platform with a modular security architecture to enable our tools to work across many different contexts. By investing deeply in open standards and open source communities as well as developing insights through collaboration and research, we realized that developers want to use something that’s convenient without compromising on flexibility, choice, or security. That’s why we launched our platform with standards-based cryptography and configurable building blocks to suit a broad array of use cases and user experiences in a way that can evolve as technology matures.</p><p>At the same time, we’ve continued to work in open source and open standards communities with greater commitment than ever to make sure we’re helping to build a digital ecosystem that can support global scale. We launched <a href="https://learn.mattr.global/">MATTR Learn</a> and <a href="https://mattr.global/resources/">MATTR Resources</a> as hubs for those interested in these new technologies, developing educational content to explore concepts around decentralized identity, offering guided developer tutorials and videos, and providing documentation and API references. We also unveiled a <a href="https://mattr.global/">new website</a>, introduced a novel approach to <a href="https://medium.com/mattr-global/a-solution-for-privacy-preserving-verifiable-credentials-f1650aa16093">selective disclosure of verifiable credentials</a>, built and defined a <a href="https://medium.com/mattr-global/jwm-a-new-standard-for-secure-messaging-a21d3daa4403">new secure messaging standard</a>, developed a prototype for <a href="https://www.youtube.com/watch?v=EXvWxFjHvdY">paper-based credentials</a> to cater for low-tech environments, and made a bridge to <a href="https://medium.com/mattr-global/introducing-oidc-credential-provider-7845391a9881">extend OpenID Connect with verifiable credentials</a>. We’ve consistently released tools and added features to make our products more secure, extensible, and easy to use. In parallel, we also <a href="https://www.dhs.gov/science-and-technology/news/2020/10/09/news-release-dhs-st-svip-makes-new-phase-1-awards-five-blockchain-companies">joined the U.S. Department of Homeland Security’s SVIP program</a> in October to help advance the goals of decentralized identity and demonstrate provable interoperability with other vendors in a transparent and globally-visible manner. Zooming out a bit, our journey at MATTR is part of a much larger picture of passionate people working in collaborative networks across the world to make this happen.</p><h3>The bigger picture</h3><p>It has been an incredible year for decentralized and self-sovereign identity as a whole. In light of the global-scale disruption of COVID-19, the demand for more secure digital systems became even more critical to our everyday lives. Start-ups, corporations, governments, and standards organizations alike have been heavily investing in building technology and infrastructure to support an increasingly digital world. We’re seeing this innovation happen across the globe, from the work being done by the <a href="https://www.dhs.gov/science-and-technology/svip">DHS Silicon Valley Innovation Program</a> to the <a href="https://diacc.ca/trust-framework/">Pan-Canadian Trust Framework</a> and <a href="https://www.digital.govt.nz/news/development-of-digital-identity-trust-framework-confirmed/">New Zealand Digital Identity Trust Framework</a>. Many global leaders are stepping up to support and invest in more privacy-preserving digital security, and for good reason. Recent legislation like <a href="https://gdpr-info.eu/">GDPR</a> and <a href="https://oag.ca.gov/privacy/ccpa">CCPA</a> have made the role of big tech companies and user data rights increasingly important, providing a clear mandate for a wave of change that promises to strengthen the internet for the public good. This provides an incredible catalyst for all the work happening in areas such as cryptography, decentralized computing and digital governance. Just in the last year, we’ve seen the following advancements:</p><ul><li><a href="https://identity.foundation/working-groups/secure-data-storage.html">Secure Data Storage WG</a> created at <a href="https://identity.foundation/">DIF</a> and <a href="https://www.w3.org/">W3C</a> to realize an interoperable technology for encrypted and confidential data storage</li><li><a href="https://www.w3.org/TR/did-core/">Decentralized Identifiers</a> v1.0 specification reached “Candidate Recommendation” stage at the W3C, establishing stability in anticipation of standardization later this year</li><li><a href="https://identity.foundation/sidetree/spec/">Sidetree protocol</a> v1.0 released at DIF, providing a layer-2 blockchain solution for scalable Decentralized Identifiers built on top of ledgers such as Bitcoin and Ethereum</li><li><a href="https://identity.foundation/didcomm-messaging/spec/">DIDComm Messaging v2.0</a> specification launched at DIF, a new protocol for secure messaging based on Decentralized Identifiers and built on JOSE encryption standards</li><li><a href="https://identity.foundation/did-siop/">Self-Issued OpenID</a> (SIOP) became an official working group item at the <a href="https://openid.net/foundation/">OpenID Foundation</a>, advancing the conversation around the role of identity providers on the web</li><li>Google’s <a href="https://github.com/WICG/WebID">WebID project</a> started developing features to allow the browser to mediate interactions between end-users and identity providers in a privacy-preserving way</li></ul><p>For more information on how all of these technologies are interconnected, read our latest paper, <a href="https://medium.com/mattr-global/the-state-of-identity-on-the-web-cffc392bc7ea"><em>The State of Identity on the Web</em></a><em>.</em></p><p>In addition, as part of our involvement with the DHS SVIP program, in March of this year we participated in the DHS SVIP Interoperability Plugfest. This event saw 8 different companies, representing both human-centric identity credentials as well as asset-centric supply chain traceability credentials, come together to showcase standards-compliance and genuine cross-vendor and cross-platform interoperability via testing and live demonstrations. The full presentation, including demos and videos from the public showcase day, can be found <a href="https://docs.google.com/presentation/d/1MeeP7vDXb9CpSBfjTybYbo8qJfrrbrXCSJa0DklNe2k/edit?usp=sharing">here</a>.</p><p>These are just a handful of the significant accomplishments achieved over the last year. It’s been incredibly inspiring to see so many people working towards a common set of goals for the betterment of the web. As we’ve built our products and developed alongside the broader market, we’ve learned quite a bit about how to solve some of the core business and technical challenges associated with this new digital infrastructure. We’ve also gained a lot of insight from working directly with governments and companies across the globe to demonstrate interoperability and build bridges across different technology ecosystems.</p><h3>Launching MATTR VII</h3><p>We’ve been hard at work making our decentralized identity platform better than ever, and we’re proud to announce that as of today, we’re ready to support solutions that solve real-world problems for your users, in production — and it’s open to everybody.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*7sO40__c6YSLJdkK" /></figure><p>That’s why we’re rebranding our platform to MATTR VII. Inspired by the <a href="https://en.wikipedia.org/wiki/State_of_matter">seven states of matter</a>, our platform gives builders and developers all the tools they need at their fingertips to create a whole new universe of decentralized products and applications. We provide all the raw technical building blocks to allow you to create exactly what you have in mind. MATTR VII is composable and configurable to fit your needs, whether you’re a well-established business with legacy systems or a start-up looking to build the next best thing in digital privacy. Best of all, MATTR VII is use-case-agnostic, meaning we’ve baked minimal dependencies into our products so you can use them the way that makes the most sense for you.</p><p>Starting today, we’re opening our platform for general availability. Specifically, that means if you’re ready to build a solution to solve a real-world problem for your users, we’re ready to support you. Simply <a href="https://mattr.global/contact/">contact us</a> to get the ball rolling and to have your production environment set up. Of course, if you’re not quite ready for that, you can still test drive the platform by signing up for a <a href="https://mattr.global/get-started/">free trial</a> of MATTR VII to get started right away. It’s an exciting time in the MATTR universe, and we’re just getting started.</p><p>We’re continuing to build-out features to operationalize and support production use cases. To this end, in the near future we will be enhancing the sign-up and onboarding experience as well as providing tools to monitor your usage of the platform. Please <a href="https://mattr.global/contact/">reach out</a> to give us feedback on how we can improve our products to support the solutions you’re building.</p><p>We’re excited to be in this new phase of our journey with MATTR VII. It will no doubt be another big year for decentralized identity, bringing us closer to the ultimate goal of bringing cryptography and digital trust to every person on the web.</p><p>Follow us on <a href="https://github.com/mattrglobal">GitHub</a>, <a href="https://medium.com/mattr-global">Medium</a> or <a href="https://twitter.com/mattrglobal">Twitter</a> for further updates.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=4e11bcb9aaef" width="1" height="1" alt=""><hr><p><a href="https://medium.com/mattr-global/launching-mattr-vii-4e11bcb9aaef">Why we’re launching MATTR VII</a> was originally published in <a href="https://medium.com/mattr-global">MATTR</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[The State of Identity on the Web]]></title>
            <link>https://medium.com/mattr-global/the-state-of-identity-on-the-web-cffc392bc7ea?source=rss----387236551c3e---4</link>
            <guid isPermaLink="false">https://medium.com/p/cffc392bc7ea</guid>
            <category><![CDATA[web-development]]></category>
            <category><![CDATA[identity]]></category>
            <category><![CDATA[privacy]]></category>
            <category><![CDATA[web3]]></category>
            <category><![CDATA[security]]></category>
            <dc:creator><![CDATA[Nader Helmy]]></dc:creator>
            <pubDate>Mon, 15 Mar 2021 02:14:11 GMT</pubDate>
            <atom:updated>2021-03-25T02:16:32.430Z</atom:updated>
            <content:encoded><![CDATA[<p>The evolution of identity on the web is happening at a rapid pace, with many different projects and efforts converging around similar ideas with their own interpretations and constraints. It can be difficult to parse through all of these developments while the dust hasn’t completely settled, but looking at these issues holistically, we can see a much bigger pattern emerging. In fact, many of the modern innovations related to identity on the web are actually quite connected and build upon each other in a myriad of complementary ways.</p><p><strong>The rise of OpenID Connect</strong></p><p>The core of modern identity is undoubtedly <a href="https://openid.net/connect/">OpenID Connect</a> (OIDC), the de-facto standard for user authentication and identity protocol on the internet. It’s a protocol that enables developers building apps and services to verify the identity of their users and obtain basic profile information about them in order to create an authenticated user experience. Because OIDC is an identity layer built on top of the OAuth 2.0 framework, it can also be used as an authorization solution. Its development was significant for many reasons, in part because it came with the realization that identity on the web is fundamental to many different kinds of interactions, and these interactions need simple and powerful security features that are ubiquitous and accessible. Secure digital identity is a problem that doesn’t make sense to solve over and over again in different ways with each new application, but instead needs a standard and efficient mechanism that’s easy to use and works for the majority of people.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*CHdJ4OMZlITf1Lzt" /></figure><p>OpenID Connect introduced a convenient and accessible protocol for identity that required less setup and complexity for developers building different kinds of applications and programs. In many ways, protocols like OIDC and <a href="https://oauth.net/2/">OAuth 2.0</a> piggy-backed on the revolution that was underfoot in the mid 2000’s as developers fled en-mass from web based systems heavily reliant on technologies like XML (and consequently identity systems built upon these technologies like SAML), for simpler systems based on JSON. OpenID built on the success of OAuth and offered a solution that improved upon existing identity and web security technologies which were vulnerable to attacks like <a href="https://en.wikipedia.org/wiki/Web_scraping">screen scraping</a>. This shift towards a solution built upon modern web technologies with an emphasis on being easy-to-use created ripe conditions for adoption of these web standards.</p><p>OIDC’s success has categorically sped up both the web and native application development cycle when it comes to requiring the integration of identity, and as a result, users have now grown accustomed to having sign-in options aplenty with all their favorite products and services. It’s not intuitively clear to your average user <em>why</em> they need so many different logins and it’s up to the user to manage which identities they use with which services, but the system works and provides a relatively reliable way to integrate identity on the web.</p><p><strong>Success and its unintended consequences</strong></p><p>While OIDC succeeded in simplicity and adoption, what has emerged over time are a number of limitations and challenges that have come as a result of taking these systems to a global scale.</p><p>When it comes to the market for consumer identity, there are generally three main actors present:</p><ol><li>Identity Providers</li><li>Relying Parties</li><li>End-Users</li></ol><p>The forces in the market that cause their intersection to exist are complex, but can be loosely broken down into the interaction between each pair of actors.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/596/0*AyfubdLek-YVdB15" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*Cd-oQSU37iWIt4nx" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*AEuynkLqUuhNhcIy" /></figure><p>In order for an End-User to be able to “login” to a website today, the “sweet spot” must exist where each of these sets of requirements are met.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*Peec8Bqz4r8ycKWp" /></figure><p>The negotiation between these three parties usually plays out on the relying party’s login page. It’s this precious real-estate that drives these very distinct market forces.</p><p><strong>Anti-competitive market forces</strong></p><p>In typical deployments of OIDC, in order for a user to be able to “login” to a relying party or service they’re trying to access online, the relying party must be in direct contact with the Identity Provider (IdP). This is what’s come to be known as the <a href="https://github.com/WICG/WebID#the-idp-tracking-problem">IdP tracking problem</a>. It’s the IdP that’s responsible for performing end-user authentication and issuing end-user identities to relying parties, not the end-users themselves. Over time, these natural forces in OIDC have created an environment that tends to favour the emergence and continued growth of a small number of very large IdPs. These IdPs wield a great deal of power, as they have become a critical dependency and intermediary for many kinds of digital interactions that require identity.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*XtvPY370IAeEXfut" /></figure><p>This environment prevents competition and diversity amongst IdPs in exchange for a convenience-driven technology framework where user data is controlled and managed in a few central locations. The market conditions have made it incredibly difficult for new IdPs to break into the market. For example, when Apple unveiled their “Sign in with Apple” service, they used their position as a proprietary service provider to mandate their inclusion as a third party sign in option for any app or service that was supporting federated login on Apple devices. This effectively guaranteed adoption of their OpenID-based solution, allowing them to easily capture a portion of the precious real-estate that is the login screen of thousands of modern web apps today. This method of capturing the market is indicative of a larger challenge wherein the environment of OIDC has made it difficult for newer and smaller players in the IdP ecosystem to participate with existing vendors on an equal playing field.</p><p><strong>Identity as a secondary concern has primary consequences</strong></p><p>Another key issue in the current landscape is that for nearly all modern IdPs, being an identity provider is often a <em>secondary</em> function to their primary line of business. Though they have come to wear many different hats, many of the key IdPs’ primary business function is offering some service to end-users (e.g. Facebook, Twitter, Google, etc.). Their role as IdPs is something that emerged over time, and with it has surfaced a whole new set of responsibilities whose impact we are only just beginning to grapple with.</p><p>Due to this unequal relationship, developers and businesses who want to integrate identity in their applications are forced to choose those IdPs which contain user data for their target demographics, instead of offering options for IdP selection based on real metrics around responsible and privacy-preserving identity practices for end-users.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*wEqeJ2Ono8j8j7T2" /></figure><p>This cycle perpetuates the dominance of a few major IdPs and likewise forces users to keep choosing from the same set of options or risk losing access to all of their online accounts. In addition, many of these IdPs have leveraged their role as central intermediaries to increase surveillance and user behavior tracking, not just across their proprietary services, but across a user’s entire web experience. The net result of this architecture on modern systems is that IdPs have become a locus for centralized data storage and processing.</p><p>The privacy implications associated with the reliance on a central intermediary who can delete, control, or expose user data at any time have proven to be no small matter. New regulations such as <a href="https://gdpr-info.eu/">GDPR</a> and <a href="https://oag.ca.gov/privacy/ccpa">CCPA</a> have brought user privacy to the forefront and have spurred lots of public discourse and pressure for companies to manage their data processing policies against more robust standards. The regulatory and business environment that is forming around GDPR and CCPA is pushing the market to consider better solutions that may involve decentralizing the mode of operation or separating the responsibilities of an IdP.</p><p><strong>Identity Provider lock-in</strong></p><p>Lastly, in today’s landscape there is an inseparable coupling between an End-User and the IdP they use. This effectively means that, in order to transfer from say “Sign In With Google” to “Sign In With Twitter,” a user often has to start over and build their identity from scratch. This is due to the fact that users are effectively borrowing or renting their identities from their IdPs, and hence have little to no control in exercising that identity how they see fit. This model creates a pattern that unnecessarily ties a user to the application and data ecosystem of their IdP and means they must keep an active account with the provider to keep using their identity. If a user can’t access to their account with an IdP, say by losing access to their Twitter profile, they can no longer login to any of the services where they’re using Twitter as their IdP.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*kaKl-HyUNET16xXN" /></figure><p>One of the problems with the term Identity Provider itself is that it sets up the assumption that the end-user is being provided with an identity, rather than the identity being theirs or under their control. If end-users have no real choice in selecting their IdP, then they are ultimately subject to the whims of a few very large and powerful companies. This model is not only antithetical to <a href="https://www.nytimes.com/2020/10/06/technology/congress-big-tech-monopoly-power.html">anti-trust</a> policies and legislation, it also prevents data portability between platforms. It’s made it abundantly clear that the paradigm shift on end-user privacy practices needs to start by giving users a baseline level of choice when it comes to their identity.</p><p><strong>A nod to an alternative model</strong></p><p>Fundamentally, when it comes to identity on the web, users should have choice; choice about which services they employ to facilitate the usage of their digital identities along with being empowered to change these service providers if they so choose.</p><p>The irony of OpenID Connect is that the original authors did actually consider these problems, and evidence of this can be found in the original OIDC specification: in chapter 7, entitled “<a href="https://openid.net/specs/openid-connect-core-1_0.html#SelfIssued">Self Issued OpenID Provider</a>” (SIOP).</p><p>Earning its name primarily from the powerful idea that users could somehow be their own identity provider, SIOP was an ambitious attempt at solving a number of different problems at once. It raises some major questions about the future of the protocol, but it stops short of offering an end-to-end solution to these complex problems.</p><p>As it stands in the core specification, the SIOP chapter of OIDC was really trying to solve 3 significant, but distinct problems, which are:</p><ol><li>Enabling portable/transferable identities between providers</li><li>Dealing with different deployment models for OpenID providers</li><li>Solving the <a href="https://indieweb.org/NASCAR_problem">Nascar Problem</a></li></ol><p>SIOP has recently been of strong interest to those in the decentralized or self-sovereign identity community because it’s been identified as a <a href="https://medium.com/mattr-global/if-you-build-an-island-youll-need-a-boat-537f48525edc">potential pathway</a> to transitioning existing deployed digital infrastructure towards a more decentralized and user-centric model. As discussion is ongoing at the <a href="https://openid.net/foundation/">OpenID Foundation</a> to evolve and reboot the work around SIOP, there are a number of interesting questions raised by this chapter that are worth exploring to their full extent. For starters, SIOP questions some of the fundamental assumptions around the behaviour and deployment of an IdP.</p><p>OpenID and OAuth typically use a redirect mechanism to relay a request from a relying party to an IdP. OAuth supports redirecting back to a native app for the end-user, but it assumes that the provider itself always takes the form of an HTTP server, and furthermore it assumes the request is primarily handled server-side. SIOP challenged this assumption by questioning whether the identity provider has to be entirely server-side, or if the provider could instead take the form of a Single-Page Application (SPA), Progressive Web Application (PWA), or even a native application. In creating a precedent for improving upon the IdP model, SIOP was asking fundamental questions such as: who gets to pick the provider? What role does the end-user play in this selection process? Does the provider always need to be an authorization server or is there a more decentralized model available that is resilient from certain modes of compromise?</p><p>Although some of these questions remain unanswered or are early in development, the precedent set by SIOP has spurred a number of related developments in and around web identity. Work is ongoing at the OpenID Foundation to flesh out the implications of SIOP in the emerging landscape.</p><p><strong>Tech giants capitalize on the conversation</strong></p><p>Although OIDC is primarily a web-based identity protocol, it was purposefully designed to be independent of any particular browser feature or API. This separation of concerns has proved incredibly useful in enabling adoption of OIDC outside of web-only environments, but it has greatly limited the ability for browser vendors to facilitate and mediate web-based login events. A number of large technology and browser vendors have picked up on this discrepancy, and are starting to take ownership of the role they play in web-based user interactions.</p><p>Notably, a number of new initiatives have been introduced in the last few years to address this gap in user privacy on the web. An example of this can be found in the <a href="https://tag.w3.org/">W3C Technical Architecture Group</a> (TAG), a group tasked with documenting and building consensus around the architecture of the World Wide Web. Ahead of the 2019 <a href="https://www.w3.org/2019/09/TPAC/">W3C TPAC</a> in Japan, Apple proposed an initiative called <a href="https://lists.w3.org/Archives/Public/public-webappsec/2019Sep/0004.html">IsLoggedIn</a>, effectively a way for websites to tell the browser whether the user was logged in or not in a trustworthy way. What they realized is that the behavior of modern web architecture results in users being “logged in by default” to websites they visit, even if they only visit a website once. Essentially as soon as the browser loads a webpage, that page can store data about the user indefinitely on the device, with no clear mechanism for indicating when a user has logged out or wishes to stop sharing their data. They introduced an API that would allow browsers to set the status of user log-ins to limit long term storage of user data. It was a vision that required broad consensus among today’s major web browsers to be successful. Ultimately, the browsers have taken their own approach in trying to mitigate the issue.</p><p>In 2019, Google created their <a href="https://www.blog.google/products/chrome/building-a-more-private-web/">Privacy Sandbox</a> initiative to advance user privacy on the web using open and transparent standards. As one of the largest web browsers on the planet, Google Chrome seized the opportunity provided by an increased public focus on user privacy to work on limiting cross-site user tracking and pervasive incentives that encourage surveillance. Fuelled by the Privacy Sandbox initiative, they created a project called <a href="https://wicg.github.io/WebID/README.html">WebID</a> to explore how the browser can mediate between different parties in a digital identity transaction. WebID is an early attempt to get in the middle of the interaction that happens between a relying party and an IdP, allowing the browser to facilitate the transaction in a way that provides stronger privacy guarantees for the end-user.</p><p>As an overarching effort, it’s in many ways a response to the environment created by CCPA and GDPR where technology vendors like Google are attempting to enforce privacy expectations for end-users while surfing the web. Its goal is to keep protocols like OIDC largely intact while using the browser as a mediator to provide a stronger set of guarantees when it comes to user identities. This may ultimately give end-users more privacy on the web, but it doesn’t exactly solve the problem of users being locked into their IdPs. With the persistent problem of data portability and limited user choices, simply allowing the browser to mediate the interaction is an important piece of the puzzle but does not go far enough on its own.</p><p><strong>Going beyond the current state of OpenID Connect</strong></p><p>Though it is a critical component of modern web identity, OIDC is not by any means the only solution or protocol to attempt to solve these kinds of problems.</p><p>A set of emerging standards from the W3C Credentials Community Group aim to look at identity on the web in a very different way, and, in fact, are designed to consider use cases outside of just consumer identity. One such standard is <a href="https://www.w3.org/TR/did-core/">Decentralized Identifiers</a> (DIDs) which defines a new type of identifier and accompanying data model featuring several novel properties not present in most mainstream identifier schemes in use today. Using DIDs in tandem with technologies like <a href="https://www.w3.org/TR/vc-data-model/">Verifiable Credentials</a> (VCs) creates an infrastructure for a more distributed and decentralized layer for identity on the web, enabling a greater level of user control. VCs were created as the newest in a long line of cryptographically secured data representation formats. Their goal was to provide a standard that improves on its predecessors by accommodating formal data semantics through technologies like JSON-LD and addressing the role of data subjects in managing and controlling data about themselves.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*DWfeYdKW8RnEnfF2" /></figure><p>These standards have emerged in large part to address the limitations of federated identity systems such as the one provided by OIDC. In the case of DIDs, the focus has been on creating a more resilient kind of user-controllable identifier. These kinds of identifiers don’t have to be borrowed or rented from an IdP as is the case today, but can instead be directly controlled by the entities they represent via cryptography in a consistent and standard way. When combining these two technologies, VCs and DIDs, we enable verifiable information that has a cryptographic binding to the end-user and can be transferred cross-context while retaining its security and semantics.</p><p>As is the case with many emerging technologies, in order to be successful in an existing and complicated market, these new standards should have a cohesive relationship to the present. To that end, there has been a significant push to bridge these emerging technologies with the existing world of OIDC in a way that doesn’t break existing implementations and encourages interoperability.</p><p>One prominent example of this is a new extension to OIDC known as <a href="https://mattrglobal.github.io/oidc-client-bound-assertions-spec/">OpenID Connect Credential Provider</a>. Current OIDC flows result in the user receiving an identity token which is coupled to the IdP that created it, and can be used to prove the user’s identity within a specific domain. OIDC Credential Provider allows you to extend OIDC to allow IdPs to issue reusable VCs about the end-user instead of simple identity tokens with limited functionality. It allows end-users to request credentials from an OpenID Provider and manage their own credentials in a <a href="https://learn.mattr.global/concepts/digital-wallets">digital wallet</a> under their control. By allowing data authorities to be the provider of reusable digital credentials instead of simple identity assertions, this extension effectively turns traditional <em>Identity Providers </em>into <em>Credential Providers</em>.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*72OiGpOXg9vvlB52" /></figure><p>The credentials provided under this system are cryptographically bound to a public key controlled by the end-user. In addition to public key binding, the credential can instead be bound to a DID, adding a layer of indirection between a user’s identity and the keys they use to control it. In binding to a DID, the subject of the credential is able to maintain ownership of the credential on a longer life cycle due to their ability to manage and rotate keys while maintaining a consistent identifier. This eases the burden on data authorities to re-issue credentials when the subject’s keys change and allows relying parties to verify that the credential is always being validated against the current public key of the end-user. The innovations upon OIDC mark a shift from a model where relying parties request claims from an IdP, to one where they can request claims from specific issuers or according to certain <a href="https://learn.mattr.global/concepts/trust-frameworks">trust frameworks</a> and evaluation metrics appropriate to their use case. This kind of policy-level data management creates a much more predictable and secure way for businesses and people to get the data they need.</p><p>OIDC Credential Provider, a new spec at the OpenID Foundation, is challenging the notion that the identity that a user receives has to be an identity entirely bound to its domain. It offers traditional IdPs a way to issue credentials that are portable and can cross domains because the identity/identifier is no longer coupled to the provider as is the case with an identity token. <a href="https://medium.com/mattr-global/introducing-oidc-credential-provider-7845391a9881">This work</a> serves to further bridge the gap between existing digital identity infrastructure and emerging technologies which are more decentralized and user-centric. It sets the foundation for a deeper shift in how data is managed online, whether it comes in the form of identity claims, authorizations, or other kinds of <a href="https://learn.mattr.global/concepts/verifiable-data">verifiable data</a>.</p><p><strong>Broadening the landscape of digital identity</strong></p><p>OIDC, which is primarily used for identity, is built upon OAuth 2.0, whose primary use is authorization and access. If OIDC is about who the End-User is, then OAuth 2.0 is about what you’re allowed to do on behalf of and at the consent of the End-User. OAuth 2.0 was built prior to OIDC, in many ways because authorization allowed people to accomplish quite a bit without the capabilities of a formalized and standardized identity protocol. Eventually, it became obvious that identity is an integral and relatively well-defined cornerstone of web access that needed a simple solution. OIDC emerged as it increasingly became a requirement to know who the end-user (or resource owner) is and for the client to be able to request access to basic claims about them. Together, OIDC and OAuth2.0 create a protocol that combines authentication and authorization. While this allows them to work natively with one another, it’s not always helpful from an infrastructure standpoint to collapse these different functions together.</p><p>Efforts like WebID are currently trending towards the reseparation of these concepts that have become married in the current world of OpenID, by developing browser APIs that are specifically geared towards identity. However, without a solution to authorization, it could be argued that many of the goals of the project will remain unsatisfied whenever the relying party requires both authentication <em>and</em> authorization in a given interaction.</p><p>As it turns out, these problems are all closely related to each other and require a broad and coordinated approach. As we step into an increasingly digital era where the expectation continues to evolve around what’s possible to do online, the role of identity becomes increasingly complex. Take, for example, sectors such as the financial industry dealing with increased requirements around electronic Know-Your-Customer (KYC) policies. In parallel with the innovation around web identity and the adoption of emerging technologies such as VCs, there has been a growing realization that the evolution of digital identity enables many opportunities that extend far beyond the domain of identity. This is where the power of verifiable data on the web really begins, and with it an expanded scope and structure for how to build digital infrastructure that can support a whole new class of applications.</p><p>A new proposed browser API called <a href="https://w3c-ccg.github.io/credential-handler-api/">Credential Handler API</a> (CHAPI) offers a promising solution to browser-mediated interactions that complements the identity-centric technologies of OIDC and WebID. It currently takes the form of a <a href="https://developer.mozilla.org/en-US/docs/Glossary/Polyfill">polyfill</a> to allow these capabilities to be used in the browser today. Similar to how SIOP proposes for the user to be able pick their provider for identity-related credentials, CHAPI allows you to pick your provider, but not just for identity — for any kind of credential. In that sense, OIDC and CHAPI are solving slightly different problems:</p><ul><li>OIDC is primarily about requesting authentication of an End-User and receiving some limited identity claims about them, and in certain circumstances also accessing protected resources on their behalf.</li><li>CHAPI is about requesting credentials that may describe the End-user or may not. Additionally, credentials might not even be related to their identity directly and instead used for other related functions like granting authorization, access, etc.</li></ul><p>While OIDC offers a simple protocol based upon URL redirects, CHAPI pushes for a world of deeper integration with the browser that affords several useability benefits. Unlike traditional implementations of OIDC, CHAPI does not start with the assumption that an identity is fixed to the provider. Instead, the end-user gets to register their preferred providers in the browser and then select from this list when an interaction with their provider is required. Since CHAPI allows for exchanging credentials that may or may not be related to the end-user, it allows for a much broader set of interactions than what’s provided by today’s identity protocols. In theory, these can work together rather than as alternative options. You could, for instance, treat CHAPI browser APIs as a client to contact the end-user’s OpenID Provider and then use CHAPI to exchange and present additional credentials that may be under the end-user’s control.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/681/0*xFThIUPXg3n50R9-" /></figure><p>CHAPI is very oriented towards the “credential” abstraction, which is essentially a fixed set of claims protected in a cryptographic envelope and often intended to be long lived. A useful insight from the development of OIDC is that it may be helpful to separate, at least logically, the presentation of identity-related information from the presentation of other kinds of information. To extend this idea, authenticating or presenting a credential is different from authenticating that you’re the subject of a credential. You may choose to do these things in succession, but they are not inherently related.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*P7511vG5rfN5rAHY" /></figure><p>The reason this is important has to do with privacy, data hygiene, and best security practices. In order to allow users to both exercise their identity on the web and manage all of their credentials in one place, we should be creating systems that default to requesting specific information about an end-user as needed, not necessarily requesting credentials when what’s needed is an authentic identity and vice versa.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*U32lahMIznYdDYBY" /></figure><p>Adopting this kind of policy would allow configurations where the identifier for the credential subject would not be assumed to be the identifier used to identify the subject with the relying party. Using this capability in combination with approaches to <a href="https://learn.mattr.global/concepts/selective-disclosure">selective disclosure</a> like <a href="https://medium.com/mattr-global/a-solution-for-privacy-preserving-verifiable-credentials-f1650aa16093">VCs with JSON-LD BBS+ signatures</a> will ensure not only a coherent system that can separate identity and access, but also one that respects user privacy and provides a bridge between existing identity management infrastructure and emerging technologies.</p><p><strong>An emergent user experience</strong></p><p>Using these technologies in tandem also helps to bridge the divide between native and web applications when it comes to managing identity across different modalities. Although the two often get conflated, a digital wallet for holding user credentials is not necessarily an application. It’s a service to help users manage their credentials, both identity-related and otherwise, and should be accessible wherever an end-user needs to access it. In truth, native apps and web apps are each good at different things and come with their own unique set of trade-offs and implementation challenges. Looking at this emerging paradigm where identity is managed in a coherent way across different types of digital infrastructure, “web wallets” and “native wallets” are not necessarily mutually exclusive — emerging technologies can leverage redirects to allow the use of both.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*SbH4XK_H6WkCcpFY" /></figure><p>The revolution around digital identity offers a new paradigm that places users in a position of greater control around their digital interactions, giving them the tools to exercise agency over their identity and their data online. Modern legislation focused on privacy, portability, security and accessible user experience is also creating an impetus for the consolidation of legacy practices. The opportunity is to leverage this directional shift to create a network effect across the digital ecosystem, making it easier for relying parties to build secure web experiences and unlocking entirely new value opportunities for claims providers and data authorities.</p><p>Users shouldn’t have to manage the complexity left behind by today’s outdated identity systems, and they shouldn’t be collateral damage when it comes to designing convenient apps and services. Without careful coordination, much of the newer innovation could lead to even more fragmentation in the digital landscape. However, as we can see here, many of these technology efforts and standards are solving similar or complementary problems.</p><p>Ultimately, a successful reinvention of identity on the web should make privacy and security <em>easy</em>; easy for end-users to understand, easy for relying parties to support, and easy for providers to implement. That means building bridges across technologies to support not only today’s internet users, but enabling access to an entirely new set of stakeholders across the globe who will finally have a seat at the table, such as those without access to the internet or readily available web infrastructure. As these technologies develop, we should continue to push for consolidation and simplicity to strike the elusive balance between security and convenience across the ecosystem for everyday users.</p><p><strong>Where to from here?</strong></p><p>Solving the challenges necessary to realize the future state of identity on the web will take a collective effort of vendor collaboration, standards contributions, practical implementations and education. In order to create adoption of this technology at scale, we should consider the following as concrete next steps we can all take to bring this vision to life:</p><p><strong>Continue to drive development of bridging technologies that integrate well with existing identity solutions and provide a path to decentralized and portable identity</strong></p><ul><li>E.g. formalization of OIDC Credential Provider to extend existing IdPs</li></ul><p><strong>Empower users to exercise autonomy and sovereignty in selecting their service provider, as well as the ability to change providers and manage services over time</strong></p><ul><li>E.g. selection mechanisms introduced by SIOP and WebID</li></ul><p><strong>Adopt a holistic approach to building solutions that recognizes the role of browser-mediated interactions in preserving user privacy</strong></p><ul><li>E.g. newer browser developments such as CHAPI and WebID</li></ul><p><strong>Build solutions that make as few assumptions as necessary in order to support different types of deployment environments that show up in real-world use cases</strong></p><ul><li>E.g. evolution of SIOP as well as supporting web and native wallets</li></ul><p><strong>Ensure that the development of decentralized digital identity supports the variety and diversity of data that may be managed by users in the future, whether that data be identity-related or otherwise</strong></p><p>Taking these steps will help to ensure that the identity technologies we build to support the digital infrastructure of tomorrow will avoid perpetuating the inequalities and accessibility barriers we face today. By doing our part to collaborate and contribute to solutions that work for everybody, building bridges rather than building siloes, we can create a paradigm shift that has longevity and resilience far into the future. We hope you join us.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=cffc392bc7ea" width="1" height="1" alt=""><hr><p><a href="https://medium.com/mattr-global/the-state-of-identity-on-the-web-cffc392bc7ea">The State of Identity on the Web</a> was originally published in <a href="https://medium.com/mattr-global">MATTR</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Intro to MATTR Learn Concepts]]></title>
            <link>https://medium.com/mattr-global/intro-to-mattr-learn-concepts-dd50d6653f14?source=rss----387236551c3e---4</link>
            <guid isPermaLink="false">https://medium.com/p/dd50d6653f14</guid>
            <category><![CDATA[identity]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[web-development]]></category>
            <category><![CDATA[privacy]]></category>
            <category><![CDATA[data]]></category>
            <dc:creator><![CDATA[Nader Helmy]]></dc:creator>
            <pubDate>Wed, 23 Dec 2020 19:29:03 GMT</pubDate>
            <atom:updated>2020-12-23T19:29:03.665Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*6Ob6252y1B7k5H1ALFZ9Hg.jpeg" /></figure><p>In the world of decentralized identity and digital trust, there are a variety of new concepts and topics that are frequently referenced, written, and talked about, but rarely is there a chance to introduce these concepts formally to audiences who aren’t already familiar with them.</p><p>For this reason, we have created a new “Learn Concepts” series to outline the the fundamental building blocks needed to understand this new technology paradigm and explore the ways that MATTR thinks about and understands the critical issues in the space.</p><p>Over on our <a href="https://learn.mattr.global/">MATTR Learn</a> site, we have been building out a variety of resources to assist developers and architects with understanding the MATTR universe of tools and products. We are happy to announce we have updated the site to include this new educational content series alongside our existing resources.</p><p>Our Learn Concepts series covers the following topics:</p><ul><li><a href="https://medium.com/mattr-global/learn-concepts-web-of-trust-101-77120941ea6c">Web of Trust 101</a></li><li><a href="https://medium.com/mattr-global/learn-concepts-digital-wallets-c88318055e42">Digital Wallets</a></li><li><a href="https://medium.com/mattr-global/learn-concepts-verifiable-data-4515a62c8e40">Verifiable Data</a></li><li><a href="https://medium.com/mattr-global/learn-concepts-semantic-web-250784d6a49f">Semantic Web</a></li><li><a href="https://medium.com/mattr-global/learn-concepts-selective-disclosure-4b9bf4e5c887">Selective Disclosure</a></li><li><a href="https://medium.com/mattr-global/learn-concepts-trust-frameworks-ad96a4427991">Trust Frameworks</a></li></ul><p>To facilitate context sharing, each of these Learn Concepts has a distinct Medium post with a permanent URL in addition to being published on our MATTR Learn site. We will keep these resources up to date to make sure they remain evergreen and relevant to newcomers in the space.</p><p>We are excited to share what we’ve learned on our journey, and we look forward to adapting and expanding this knowledge base as standards progress and technologies mature.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=dd50d6653f14" width="1" height="1" alt=""><hr><p><a href="https://medium.com/mattr-global/intro-to-mattr-learn-concepts-dd50d6653f14">Intro to MATTR Learn Concepts</a> was originally published in <a href="https://medium.com/mattr-global">MATTR</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
    </channel>
</rss>