Web5: Open to Build - Block/TBD
55:28
The SSI Ecosystem in South Korea
42:08
Пікірлер
@christopheblanchi4777
@christopheblanchi4777 3 ай бұрын
How do you prevent DIDs methods to become unsupported/dead wood? It seems that the methods approach will create an incredible number of broken identifiers. More methods that will become unsupported will make DIDs mostly a broken system. The Sovrin Ledger will persist for how long? Who is running it, who is maintaining it? Will is last 10 years, 50 years, 1000 years? The architecture works but there are no clear ways that the social contracts needed to maintain the system behind each method will persist. The reason DNS works is because of ICANN. Most method will not have a similar persistent organization behind it and most of them will disappear.
@luckyguy600
@luckyguy600 7 ай бұрын
5-year-old Sheeple indoctrination.
@diligentsun1154
@diligentsun1154 10 ай бұрын
Who stands against the technology and why? Are there any viable threats to this system? What about mistakes, failures or revocations, denouncements, disagreements, disavowals or claims of harm/injury/damage/loss? Complaints?
@junilkim8901
@junilkim8901 10 ай бұрын
exactly what i wanted thx
@nicolasgimenez2265
@nicolasgimenez2265 10 ай бұрын
Nicolas from ZKorum here. Erratum in the presentation: application-level auth does not prevent DDoS. All the content in ZKorum will be anonymously browsable without log-in (and without anonymous pseudonyms), easily discoverable via simple Google search, and sharable via links.
@codex8538
@codex8538 10 ай бұрын
Does this ensure a user voted only once?
@nicolasgimenez2265
@nicolasgimenez2265 10 ай бұрын
Yes it does. Not fully trustlessly, but trust (in ZKorum) is still minimized. For the email-based functionality: - 1 community email address (= "uid") = 1 community credential issued by ZKorum. For the external community credential (e.g,: issued by your college or company): - your credential's unique college/company ID ("uid") can only be registered to one unique ZKorum account. You'd generate a proof with a deterministic pseudonym (Pedersen commitment) based on your "uid" attribute when associating the credential to your User Profile. Note that the User Profile is unlinkable with the user posts. For both use-cases: - One and only one "timebound" Secret Credential is issued to each user. Each poll expects a pseudonym generated from {scope+secret+uid}. Scope is a public value that's specific to each poll. "secret" is an attribute of the Secret Credential, and "uid" is an attribute of the community credential. Both are unique per user. A unique set {scope+secret+uid} deterministically generates the same pseudonym. So there is only one pseudonym per user per poll. That's how the server counts results to a poll. Note that knowledge of a pseudonym does not give knowledge of "secret" or "uid". And "secret" is only known by the user's device, so even the Issuer that knows "uid" cannot know who's behind the pseudonym. That's why it's anonymous, with privacy in the hand of the user. So long as the "secret" remains private in the user's device, anonymity is guaranteed, even when the proof is made public. - in case of revocation of "timebound" Secret credential on recovery when the user devices are lost, the user cannot respond to polls that were created before the recovery was initiated. That's because the user lost the unique "secret" attribute together with the credential, so the user's new "timebound" Secret Credential won't hold the same "secret" as attribute. This mechanism prevents malicious users from responding multiple times to the same poll after they recovered their account. That's why there are two "Secret Credential" per user: the "timebound" is only used for responding to polls or votes, and the "unbound" is used for everything else. The "unbound" Secret Credential is not subject to this condition on recovery. Feel free to join our Discord community if you have more questions.
@zhan2ar
@zhan2ar 10 ай бұрын
thanks for posting this webinar. Very insightful discussion
@akintobby
@akintobby 11 ай бұрын
Great interview. Now I have a better understanding regarding web5👍
@parv08888
@parv08888 Жыл бұрын
great video
@VolodymyrPavlyshyn
@VolodymyrPavlyshyn Жыл бұрын
my try to explain dwns kzbin.info/www/bejne/eKuTm3eAi7ObiZY
@pohjanvanamo
@pohjanvanamo Жыл бұрын
What is this, and why youtube recommended it to me? It's not about the adoption (of children) apparently? 🤣 This is business stuff, is it? (Sorry, Idk if I'm gonna watch the whole video). I gathered that much that it's about technologal inventions and applications...? 🤔
@pohjanvanamo
@pohjanvanamo Жыл бұрын
So, I listened about 20 minutes or so. Sorry, it's not a business thing, it is technology thing. I still don't fully understand what SSI is, but apparently it's like when we get identified online by our bank sign up process, and then get to do all kind of stuff, like taxes and wellfare applications or change adresses online 😅 Like that, but just an identification tool and nothing else? About things being or not being useful if they don't get implemented in practice: I think history (and life) shows that we need to have pre-waves before the breakthrough. So sometimes, new things are forgotton in the history, but make way to next wave, that will change everything. And that change can't come without the preparation, which will seem like was in vain. I think it's how humans and humankind works on this part. Aah, anyway, I hope you get what you are working towards, not sure if I support the idea, or even understand it, but I wouldn't wish a failure to someone trying to make world work better.
@folextux
@folextux 2 жыл бұрын
How do you make sure rotation events aren't censored? e.g. imagine that my key got compromised, and I publish "rotate" event, how do I make sure that this information gets to all relevant places?
@OliverHirstsLife
@OliverHirstsLife Жыл бұрын
I'm looking into probably using MACI to safeguard against censorship of key events
@folextux
@folextux Жыл бұрын
@@OliverHirstsLife what is MACI? google doesn't give anything relevant
@andrewzhurov5123
@andrewzhurov5123 6 ай бұрын
That's a good question. Been wondering about it as well. Didn't see the direct answer, but have some guesses. A bit of context first. Embracing non-extractable keys (keys that can't be shared, stay on your device) would limit the damage done by having device lost (key exposed).This way there seem to be no need for "rotation". Device got comporimesed - unlink it / revoke the key. Sam showed how one can create identity with multiple keys from the start. Additionally one could authorize other devices as they acquire them. This way management of identity becomes decentralized, across your linked diveces. In another vid Sam showed that one can set up complex rules on how management of linked devices works. E.g., require 2 out of 4 linked devices to authorize removal of a device. This way, when device gets lots, you can revoke from your other devices. And malicious guy that got ahold of your device can't do that (2 authzorazations are required, he got only 1). Ookay, that's been a bit lengthy.:) Now onto your question. One can revoke authZ of a lost decive. But the malicious guy may not wish to adopt it as part of device's log. So how could a party that contacts a device be sure that its authZ hasn't been revoked? One way would be to have the log replicated in a publicly-known place. E.g., Doug. This may not be best as you would need to trust Doug. Although if you would communicate with Doug and others who communicate with Doug you would have a DAG and it'll be easy to detect duplicity. Yet Doug is not incentivized. He would be doing it for "public good". As an alternative, perhaps, you could define your "friends" (their DIDs), this way you'd be helping each other. At around 1:22:0 Sam showed how peers can back each other, interlinking logs, forming a DAG. Alternatively, third-party could contact many of your devices to get the latest version of your identity log. Contacting many devices and/or friends seems good in that it's grassroots - local-first, independent, all you need is p2p. Let me know any concerns of the approaches.
@hamidfazli6936
@hamidfazli6936 2 жыл бұрын
Nice talk! Thanks after 3 years :)
@nationbuilding5319
@nationbuilding5319 2 жыл бұрын
Excellent
@nationbuilding5319
@nationbuilding5319 2 жыл бұрын
Another excellent video. I'm late but better late than never.
@nationbuilding5319
@nationbuilding5319 2 жыл бұрын
Excellent!!
@denizesebit4564
@denizesebit4564 2 жыл бұрын
Thank you for this webinar. It helped me differentiating between certain buzzwords and de-mistified a few things at the same time. Clearly explained.
@georgelza
@georgelza 2 жыл бұрын
curious, looking at what level Aries sits and Indy, is it not more correct that Aries is interface layer on top of the actual HyperLedger implemented at the Indy layer ?
@moyura2
@moyura2 2 жыл бұрын
@20:44 "did:web:" is not on the list.
@paone9851
@paone9851 Жыл бұрын
There are so many at this point
@Azzyinc
@Azzyinc 2 жыл бұрын
What is the best token to align with DID? EWT? IOEN? Tia
@benjaminmartin7620
@benjaminmartin7620 2 жыл бұрын
Thank you for sharing these webinars!
@mrinalbhakuni3989
@mrinalbhakuni3989 3 жыл бұрын
best video on SSI on the internet so far!
@gary.richardson
@gary.richardson 3 жыл бұрын
I like how this was broken down into real world examples that ordinary people can understand.
@Freddy-599
@Freddy-599 3 жыл бұрын
Great presentation!
@iceyred6668
@iceyred6668 3 жыл бұрын
ly:web^2[marketing'G'values'd]Cm^2deductibales'D functional level' d = cm ///?.,<Nd.D
@iceyred6668
@iceyred6668 3 жыл бұрын
ly:web^2[marketing'G'values'd]Cm^2deductibales'D functional level' d = cm ///?.,< Nd.D
@iceyred6668
@iceyred6668 3 жыл бұрын
Basic Definitions: Web 1.0, Web. 2.0, Web 3.0 | Practical ... >.,/Nd.D
@iceyred6668
@iceyred6668 3 жыл бұрын
>.,/Nd.D
@globalrodicagazii7490
@globalrodicagazii7490 3 жыл бұрын
THANK YOU SSI GLOBALL FOR ALL YOURS DEVOTMENT &GREAT WORK WARM BLESS
@globalrodicagazii7490
@globalrodicagazii7490 3 жыл бұрын
Thank you Netherland i am very pride of all of yours excellent work Bless from me GR
@globalrodicagazii7490
@globalrodicagazii7490 3 жыл бұрын
THANK YOU MR TYLER RUFF DO YOU KNOW I AM AUSTRALIAN THANK YOU
@globalrodicagazii7490
@globalrodicagazii7490 3 жыл бұрын
Thank you &warm Bless from GR
@globalrodicagazii7490
@globalrodicagazii7490 3 жыл бұрын
THANK YOU KOREEA SOUTH BLESS YOU FROM GR
@globalrodicagazii7490
@globalrodicagazii7490 3 жыл бұрын
HERZLICH DANK GR
@cloudysky82
@cloudysky82 3 жыл бұрын
So DID focuses only on authentication, but the app should handle authorization and claims to the identity. Correct?
@chiro-hiro
@chiro-hiro 3 жыл бұрын
55:52 I think, something possible wrong here: "a new public key signed by the previous public key". Did you mean "signed by previous private key"?.
@jopucayjopucay7612
@jopucayjopucay7612 2 жыл бұрын
Yes, you are correct that he misspoke.
@yili2419
@yili2419 Жыл бұрын
@@jopucayjopucay7612 the reason of key rotation is when user lost the control of current private key. or hacker stole the private key. the process of key rotation here is using stolen private key to sign the new DIDDocument? then attacker can sign that too with his own public key.
@avinashjadhav986
@avinashjadhav986 3 жыл бұрын
Thank you for explaining in simple terms
@rameshsubramanyamvari4543
@rameshsubramanyamvari4543 3 жыл бұрын
thanks tyler ruff for very clear explanation:)
@adeolaoluokun1601
@adeolaoluokun1601 3 жыл бұрын
Insightful presentation. I found this channel helpful during my study on Digital Identity
@abhikbanerjee3719
@abhikbanerjee3719 3 жыл бұрын
Could a list of references be shared?
@jonarmani8654
@jonarmani8654 3 жыл бұрын
Distrust clouds
@BraIncNet
@BraIncNet 3 жыл бұрын
This is so huge! Most of the people cannot even start understanding what kind of revolution this will kick off in so many areas.
@DorinCiobanu007
@DorinCiobanu007 3 жыл бұрын
Around 47:00 I've started questioning no blockchain idea
@andrewzhurov5123
@andrewzhurov5123 6 ай бұрын
It's more like a mirror node. That I think is meant to hold _disjoined_ logs. And yeah, having such "public good" service raises questions. A more grassroots/p2p alternative would be nice.
@DorinCiobanu007
@DorinCiobanu007 3 жыл бұрын
Very curious why not sov://1234567 ethr://121234234234 and so on
@abdulhamitkumru
@abdulhamitkumru 4 жыл бұрын
1.25 speed
@eriklintsev
@eriklintsev 4 жыл бұрын
Amazing elaborate explanation! Thanks a lot!
@robinrhee8055
@robinrhee8055 4 жыл бұрын
Good tutorial while the tone causes me to snooze
@tripmehard
@tripmehard 4 жыл бұрын
Where do these verifiable claims being stored? Is it in a centralized database?
@zapdelivery5169
@zapdelivery5169 3 жыл бұрын
It is stored in a ledger as a DID. And the ledger is distributed so it is not centralized.
@ruifenghu3116
@ruifenghu3116 4 жыл бұрын
Is DKMS just to backup your keys on cloud? Most advanced tech is SSS algo back to 70's?
@ruifenghu3116
@ruifenghu3116 4 жыл бұрын
When the verifier is verifying a credential, how does it know whether the credential is still valid or revoked?
@leonardman5935
@leonardman5935 Жыл бұрын
By checking a revocation services which is also connect to the DLT. On creation you list your credential expiration in the service.