How do you prevent DIDs methods to become unsupported/dead wood? It seems that the methods approach will create an incredible number of broken identifiers. More methods that will become unsupported will make DIDs mostly a broken system. The Sovrin Ledger will persist for how long? Who is running it, who is maintaining it? Will is last 10 years, 50 years, 1000 years? The architecture works but there are no clear ways that the social contracts needed to maintain the system behind each method will persist. The reason DNS works is because of ICANN. Most method will not have a similar persistent organization behind it and most of them will disappear.
@luckyguy6007 ай бұрын
5-year-old Sheeple indoctrination.
@diligentsun115410 ай бұрын
Who stands against the technology and why? Are there any viable threats to this system? What about mistakes, failures or revocations, denouncements, disagreements, disavowals or claims of harm/injury/damage/loss? Complaints?
@junilkim890110 ай бұрын
exactly what i wanted thx
@nicolasgimenez226510 ай бұрын
Nicolas from ZKorum here. Erratum in the presentation: application-level auth does not prevent DDoS. All the content in ZKorum will be anonymously browsable without log-in (and without anonymous pseudonyms), easily discoverable via simple Google search, and sharable via links.
@codex853810 ай бұрын
Does this ensure a user voted only once?
@nicolasgimenez226510 ай бұрын
Yes it does. Not fully trustlessly, but trust (in ZKorum) is still minimized. For the email-based functionality: - 1 community email address (= "uid") = 1 community credential issued by ZKorum. For the external community credential (e.g,: issued by your college or company): - your credential's unique college/company ID ("uid") can only be registered to one unique ZKorum account. You'd generate a proof with a deterministic pseudonym (Pedersen commitment) based on your "uid" attribute when associating the credential to your User Profile. Note that the User Profile is unlinkable with the user posts. For both use-cases: - One and only one "timebound" Secret Credential is issued to each user. Each poll expects a pseudonym generated from {scope+secret+uid}. Scope is a public value that's specific to each poll. "secret" is an attribute of the Secret Credential, and "uid" is an attribute of the community credential. Both are unique per user. A unique set {scope+secret+uid} deterministically generates the same pseudonym. So there is only one pseudonym per user per poll. That's how the server counts results to a poll. Note that knowledge of a pseudonym does not give knowledge of "secret" or "uid". And "secret" is only known by the user's device, so even the Issuer that knows "uid" cannot know who's behind the pseudonym. That's why it's anonymous, with privacy in the hand of the user. So long as the "secret" remains private in the user's device, anonymity is guaranteed, even when the proof is made public. - in case of revocation of "timebound" Secret credential on recovery when the user devices are lost, the user cannot respond to polls that were created before the recovery was initiated. That's because the user lost the unique "secret" attribute together with the credential, so the user's new "timebound" Secret Credential won't hold the same "secret" as attribute. This mechanism prevents malicious users from responding multiple times to the same poll after they recovered their account. That's why there are two "Secret Credential" per user: the "timebound" is only used for responding to polls or votes, and the "unbound" is used for everything else. The "unbound" Secret Credential is not subject to this condition on recovery. Feel free to join our Discord community if you have more questions.
@zhan2ar10 ай бұрын
thanks for posting this webinar. Very insightful discussion
@akintobby11 ай бұрын
Great interview. Now I have a better understanding regarding web5👍
@parv08888 Жыл бұрын
great video
@VolodymyrPavlyshyn Жыл бұрын
my try to explain dwns kzbin.info/www/bejne/eKuTm3eAi7ObiZY
@pohjanvanamo Жыл бұрын
What is this, and why youtube recommended it to me? It's not about the adoption (of children) apparently? 🤣 This is business stuff, is it? (Sorry, Idk if I'm gonna watch the whole video). I gathered that much that it's about technologal inventions and applications...? 🤔
@pohjanvanamo Жыл бұрын
So, I listened about 20 minutes or so. Sorry, it's not a business thing, it is technology thing. I still don't fully understand what SSI is, but apparently it's like when we get identified online by our bank sign up process, and then get to do all kind of stuff, like taxes and wellfare applications or change adresses online 😅 Like that, but just an identification tool and nothing else? About things being or not being useful if they don't get implemented in practice: I think history (and life) shows that we need to have pre-waves before the breakthrough. So sometimes, new things are forgotton in the history, but make way to next wave, that will change everything. And that change can't come without the preparation, which will seem like was in vain. I think it's how humans and humankind works on this part. Aah, anyway, I hope you get what you are working towards, not sure if I support the idea, or even understand it, but I wouldn't wish a failure to someone trying to make world work better.
@folextux2 жыл бұрын
How do you make sure rotation events aren't censored? e.g. imagine that my key got compromised, and I publish "rotate" event, how do I make sure that this information gets to all relevant places?
@OliverHirstsLife Жыл бұрын
I'm looking into probably using MACI to safeguard against censorship of key events
@folextux Жыл бұрын
@@OliverHirstsLife what is MACI? google doesn't give anything relevant
@andrewzhurov51236 ай бұрын
That's a good question. Been wondering about it as well. Didn't see the direct answer, but have some guesses. A bit of context first. Embracing non-extractable keys (keys that can't be shared, stay on your device) would limit the damage done by having device lost (key exposed).This way there seem to be no need for "rotation". Device got comporimesed - unlink it / revoke the key. Sam showed how one can create identity with multiple keys from the start. Additionally one could authorize other devices as they acquire them. This way management of identity becomes decentralized, across your linked diveces. In another vid Sam showed that one can set up complex rules on how management of linked devices works. E.g., require 2 out of 4 linked devices to authorize removal of a device. This way, when device gets lots, you can revoke from your other devices. And malicious guy that got ahold of your device can't do that (2 authzorazations are required, he got only 1). Ookay, that's been a bit lengthy.:) Now onto your question. One can revoke authZ of a lost decive. But the malicious guy may not wish to adopt it as part of device's log. So how could a party that contacts a device be sure that its authZ hasn't been revoked? One way would be to have the log replicated in a publicly-known place. E.g., Doug. This may not be best as you would need to trust Doug. Although if you would communicate with Doug and others who communicate with Doug you would have a DAG and it'll be easy to detect duplicity. Yet Doug is not incentivized. He would be doing it for "public good". As an alternative, perhaps, you could define your "friends" (their DIDs), this way you'd be helping each other. At around 1:22:0 Sam showed how peers can back each other, interlinking logs, forming a DAG. Alternatively, third-party could contact many of your devices to get the latest version of your identity log. Contacting many devices and/or friends seems good in that it's grassroots - local-first, independent, all you need is p2p. Let me know any concerns of the approaches.
@hamidfazli69362 жыл бұрын
Nice talk! Thanks after 3 years :)
@nationbuilding53192 жыл бұрын
Excellent
@nationbuilding53192 жыл бұрын
Another excellent video. I'm late but better late than never.
@nationbuilding53192 жыл бұрын
Excellent!!
@denizesebit45642 жыл бұрын
Thank you for this webinar. It helped me differentiating between certain buzzwords and de-mistified a few things at the same time. Clearly explained.
@georgelza2 жыл бұрын
curious, looking at what level Aries sits and Indy, is it not more correct that Aries is interface layer on top of the actual HyperLedger implemented at the Indy layer ?
@moyura22 жыл бұрын
@20:44 "did:web:" is not on the list.
@paone9851 Жыл бұрын
There are so many at this point
@Azzyinc2 жыл бұрын
What is the best token to align with DID? EWT? IOEN? Tia
@benjaminmartin76202 жыл бұрын
Thank you for sharing these webinars!
@mrinalbhakuni39893 жыл бұрын
best video on SSI on the internet so far!
@gary.richardson3 жыл бұрын
I like how this was broken down into real world examples that ordinary people can understand.
@Freddy-5993 жыл бұрын
Great presentation!
@iceyred66683 жыл бұрын
ly:web^2[marketing'G'values'd]Cm^2deductibales'D functional level' d = cm ///?.,<Nd.D
@iceyred66683 жыл бұрын
ly:web^2[marketing'G'values'd]Cm^2deductibales'D functional level' d = cm ///?.,< Nd.D
@iceyred66683 жыл бұрын
Basic Definitions: Web 1.0, Web. 2.0, Web 3.0 | Practical ... >.,/Nd.D
@iceyred66683 жыл бұрын
>.,/Nd.D
@globalrodicagazii74903 жыл бұрын
THANK YOU SSI GLOBALL FOR ALL YOURS DEVOTMENT &GREAT WORK WARM BLESS
@globalrodicagazii74903 жыл бұрын
Thank you Netherland i am very pride of all of yours excellent work Bless from me GR
@globalrodicagazii74903 жыл бұрын
THANK YOU MR TYLER RUFF DO YOU KNOW I AM AUSTRALIAN THANK YOU
@globalrodicagazii74903 жыл бұрын
Thank you &warm Bless from GR
@globalrodicagazii74903 жыл бұрын
THANK YOU KOREEA SOUTH BLESS YOU FROM GR
@globalrodicagazii74903 жыл бұрын
HERZLICH DANK GR
@cloudysky823 жыл бұрын
So DID focuses only on authentication, but the app should handle authorization and claims to the identity. Correct?
@chiro-hiro3 жыл бұрын
55:52 I think, something possible wrong here: "a new public key signed by the previous public key". Did you mean "signed by previous private key"?.
@jopucayjopucay76122 жыл бұрын
Yes, you are correct that he misspoke.
@yili2419 Жыл бұрын
@@jopucayjopucay7612 the reason of key rotation is when user lost the control of current private key. or hacker stole the private key. the process of key rotation here is using stolen private key to sign the new DIDDocument? then attacker can sign that too with his own public key.
@avinashjadhav9863 жыл бұрын
Thank you for explaining in simple terms
@rameshsubramanyamvari45433 жыл бұрын
thanks tyler ruff for very clear explanation:)
@adeolaoluokun16013 жыл бұрын
Insightful presentation. I found this channel helpful during my study on Digital Identity
@abhikbanerjee37193 жыл бұрын
Could a list of references be shared?
@jonarmani86543 жыл бұрын
Distrust clouds
@BraIncNet3 жыл бұрын
This is so huge! Most of the people cannot even start understanding what kind of revolution this will kick off in so many areas.
@DorinCiobanu0073 жыл бұрын
Around 47:00 I've started questioning no blockchain idea
@andrewzhurov51236 ай бұрын
It's more like a mirror node. That I think is meant to hold _disjoined_ logs. And yeah, having such "public good" service raises questions. A more grassroots/p2p alternative would be nice.
@DorinCiobanu0073 жыл бұрын
Very curious why not sov://1234567 ethr://121234234234 and so on
@abdulhamitkumru4 жыл бұрын
1.25 speed
@eriklintsev4 жыл бұрын
Amazing elaborate explanation! Thanks a lot!
@robinrhee80554 жыл бұрын
Good tutorial while the tone causes me to snooze
@tripmehard4 жыл бұрын
Where do these verifiable claims being stored? Is it in a centralized database?
@zapdelivery51693 жыл бұрын
It is stored in a ledger as a DID. And the ledger is distributed so it is not centralized.
@ruifenghu31164 жыл бұрын
Is DKMS just to backup your keys on cloud? Most advanced tech is SSS algo back to 70's?
@ruifenghu31164 жыл бұрын
When the verifier is verifying a credential, how does it know whether the credential is still valid or revoked?
@leonardman5935 Жыл бұрын
By checking a revocation services which is also connect to the DLT. On creation you list your credential expiration in the service.