IIW 26 Proposed Topics

From IIW
Jump to: navigation, search

What topics are you planning to present about or lead a discussion about at this IIW?

  • User authentication
  • Blockchain democracy
  • The Horcrux protocol
  • Pseudonymous Identity
  • first time attending so planning see how it all works before presenting/leading
  • Information Sharing Agreements, Consent Receipts, Privacy, GDPR
  • XDI, DIDs, Universal Resolver, Universal Registrar
  • Managing privacy and intention by understanding the relationship between human nature and I.T. forces.
  • BYOID - Bring Your Own IdentityThe Social Ledger and Identity
  • First time there!
  • Determining the identity of internet users
  • Off Chain/Side Chain Block Chain Identity OIDC
  • W3C Verifiable Credentials Update, Decentralized Identifiers Comparison
  • ActivityPub
  • Microservices Security
  • Possible demo of movie rights stored and accessed on Sovrin platform
  • Decentrialized Identity, Amira 1.0.0, Lost Identity's Maria Sofia 1.0.0
  • The self-sovereign technology stack.
  • DevOps, docker
  • Enterprise IoT management Consent management
  • Listening
  • Testing related topics (automation, security, infrastructure)


What are you hoping to learn about or hear a presentation about at IIW?

  • DIF, Sovrin, DID Auth
  • Sovrin, Everynym
  • helping individuals take control of all their personal data stored in various corporate silos ... I own an HR company and want to basically turn all this on its head :)
  • Sovrin, Blockchain, Verified Identifies
  • Capabliities/Delegation
  • Latest developments with Sovrin and Indy.
  • From prior experience I know that by listening, and some osmosis, this crowd will lead me to better knowing about systems managing privacy and affecting intention.
  • Decentralized IdentifiersuPort
  • Identity as a ServicePrivacy and Policy Implications
  • I am hoping to learn about separate legitimate from illegitimate internet users
  • Block Chain OIDC
  • Open Standards for Biometrics, U2F
  • Blockchain
  • International identity approaches
  • Cooperation between UMA and decentralized identity (DID) standards.
  • Protocol implementations
  • What must be included in a post-Google Internet that respects anonymity, identity, privacy, and security, you own your own data, leave all the walled gardens and predatory surveillance behind.
  • What others are doing differently


What are the critical questions about user-centric identity and data you hope to discuss with peers at IIW?

  • WIll it replace KYC/AML processes on back-end?
  • Pseudonymous Identity
  • learn more about sovrin
  • How to build independent apps and ecosystems on top of verified identies
  • What is "Self-Sovereign Privacy?"
  • What may threaten individual leverage in maintaining their "freedom" of movement or choice regarding privacy?
  • What role do existing identity provider enterprises (banks, ISPs, telcos, etc.) have to play in a user-centric identity paradigm?
  • Interoperable identity solutions
  • How can we make it possible to revoke access to idenity information?How can we make interactions online safer?
  • Why is the internet not a safe environment, especially for businesses
  • BlockChain Privacy
  • How do we decentralized attributes without sharing them everywhere?
  • Biometrics for identity recovery.
  • Tokens that allow creation of virtual Amazon -- buy anything from anyone with a token, end role of Amazon as an intermediary taking a 65% toll.
  • -2fa-blockchain based authentication