IIW 33 Proposed Topics
From IIW
Register here for IIW 33: https://iiw33.eventbrite.com
What topics are you planning to present about or lead a discussion about at this IIW?
- KERI ACDC VerifiableCredentials
- Verifiable LEIs
- Self Sovereign Identity and Voting at the precinct level
- Verifiable LEIs and KERI
- A slightly extended JSON-LD ZKP BBS+ (TBD)
- Semantics, semantic interoperability
- Personal Identity
- OpenID Connect
- Delivering digital sovereignty to Sovereigns who battle digital colonialization.
- DIDComm and UX
- DIDComm & Crypto & Threat modelling
- DIDComm, discovery, SSI and money
- not yet sure - maybe the same things I'd like to learn about? :)
- Data interop, VCs in complex Verifier environments, Governance at the machine level
- I want to propose a discussion on the interoperability of decentralized identity/verifiable credentials - it's come up as a vital piece in maturing the technology, but I'm fuzzy about details and want to learn more.
- Conceptual ideas around Identity in general, not only SSI - What are the current limits of SSI
- Management of our intention in view of our human nature and the challenges brought about by our eventual relationships with connected systems, services and data streams. The digital *martial art of Real-ITdo "Be water my friend." BL
- Role of self-sovereign data in new healthcare market places.
- Rubric for digital wallets
- What are the online privacy options for minors?
- Self Sovereign Identity, specifically the ideas of an SSI Gateway and a Credential Catalog
- anomaly tickets and adoption specifications, synthetic intelligence
- PIMS & SSI individual adoption study, consumer's attitudes at the intersection of privacy, personal information and trust
- authentic data, zero architecture
- Guardianship
- Decentralized identity for financial inclusion
- Cryptography
- Dynamic Data Economy
- Privacy Preserving mobile credentials Does the GDPR and the focus on faux consent breed monopolies and dark patterns?
- Tech and standards for self-sovereign communities Authorization post OAuth to GNAP
- Identity and domain names
- Credential Exchange protocols, DeFi use cases
- Verifiable LEIs
- maybe....sociocentric and egocentric identity - beyond the individual how can groups help us with privacy, security and identity systems design? decentralized identity and the gig economy a code of practice - for Identity for All (addressing ethical questions, managing and understanding special risks, the problem of digital imperialism)
- Verifiable LEIs and KERI
- Diversity in user-centric identity and data -- the people behind the tech
- Identity management.
- secure scuttlebutt and identity, privacy preserving contact matching, bluesky
- Potentially
- How identity and fraud
- Filling gaps between preexisting technology/frameworks with decentralized (identifier) systems
- DiD in the Enterprise SSI and Enterprise Workflow
- Integration, SSI, VC, VP
- digital identity projects linked to the blockchain - discuss pros and cons of these projects, such as idena, proof of humanity, 3blocks
- Trustworthy AI: software, data, models
- OpenID Connect
- GS1's findings when exploring DIDs and VCs
- OIDC4VP, SIOP v2, OIDC4SSI, mDL
- Reference implementation of DIDComm V2 specification in multiple languages; Reference implementation of peerdid specification in multiple languages
- Enabling Credentials
- Credential issuance protocols.
- VC/DID pilots with GS1
- Verifiable Credentials, interoperability, Hyperledger Aries, Aries Cloud Agent Python, Aries Wallets.
- Aries/Indy, Aries Framework JavaScript, Mobile Wallet Development
- DIF WACI PEx implementation in Open Source TrustBloc platform https://github.com/trustbloc/wallet
- Attending with an ear to the ground and possibly create a discussions based on one of the sessions I attend
- "- Me2B Attributes of Respectful Commitments - MeB Safety Spec for Websites"
- DID Resolution, DID Registration
- Layer 1 identity networks Token incentivized identity use cases Compliance with credential standards Real-world interoperability SSI application demos
- Anonymous credential and revocation implementation in Rust and its usage in JS library
- Supporting Workplace Credentials using Verifiable Credentials with the Dock API
- Hellō
- ToIP stack, DIDComm, GLEIF vLEIs, governance frameworks
- Dangers of SSI
- Exchanging medical data over DIDComm
- WACI-PEx (formerly Killer Whale Jello Salad)
- DIDComm and DIDComm Protocols
- Machine-readable governance, passwordless login
- Aries Bifold, an open source digital identity wallet
- Machine-readable governance framework
- Responsible AI and specifically the intersection of AI and identity
- Introduction to the Trust Over IP Foundation -Taize of Trust
- Advocacy for general, hardware backed cryptographic signatures on the web, through W3C standards
- Exclusive Self-Ownership
- Potentially participate in a session that is an update on CCI.
- Identity Ownership, Self Sovereign Identity, via a personally owned colorized avatar that is your own private authorization and authentication data key. Personality science + blockchain = customized avatar that the user owns and profits from their personal data, with a new scientific color layer connection, avatar used as your invisibility cloak and money maker for your data.
- Challenges and issues with user-centric identity
What are you hoping to learn about or hear a presentation about at IIW?
"Standards, Interop, Adoption.
- Not possible to attend in 2022 if online attendance is not offered."
- Use cases for digital legal entity identification and user roles
- SSI
- How to provide a SSI-based data privacy, control, and monetization experience to citizens, political opinion leaders, and political parties and organizations from the precinct level on up.
- Conceptual ideas around Identity in general, not only SSI - What are the current limits of SSI
- Verifiable Credentials use-cases
- Use cases for digital legal entity identification and user roles
- Current and future specs/implementations of Verifiable Credentials with digital signatures and zero-knowledge proofs
- Self-sovereign identity and enabling a fully trustless interchanges to achieve the promise of the trust protocol which is the blockchain
- More about ssi
- How to get from UN/PW to elegantly simple identity authentication
- DID/VC systems engineering
- Learn the best practices around self-sovereign identity.
- DIDComm v2, KERI
- Verifiable requests and presentations
- Anything related to SSI or CBDC
- SSI use cases that involve NFC, BlueTooth, and other transports besides HTTP
- the people side of identity - the end-using people's needs and interests around it, what it really means for them, how to meet them there instead of attempting to force interest in high tech concepts, etc.
- decentralizing SSI and similar at every link in the value chain
- most current interoperability efforts and their results"
- Data interop, VCs in complex Verifier environments, Governance at the machine level
- Meet with others on majority-world ("developing country") issues*Verifiable LEIs and KERI
- Everything I can regarding systems and connected services and the way they exist in the space of people.
- How tokenizing personal health expression can track individual contributions to collective health intelligence which drives economic expansion across populations
- The different SSI-related protocols that are being worked on (and their pros and cons)
- Current state of SSI standards, Applications of SSI
- Latest trends and concerns
- Business models, adoptions strategies, industry ecosystem and landscape mapping
- ACDC and ledgerless SSI
- Everything! :)
- Interoperability, Business models
- Catch up with the latest technological developments
- Current state of HL Aries for implementors
- Startup platforms (SaaS) for fast development
- Latest on SSI, DIDs, and VCs
- SSI Consumer Applications SSI Business Models Personal Data Rights and Duties
- Notarization with digital credentials and standards
- business models for SSI
- personal identity identitiy curation
- DID authentication and DID services in general
- Credential Exchange protocols, wallets
- Use cases for digital legal entity identification and user roles
- How to ascertain trust levels for SSI providers (e.g., DID Methods) in order to know which DIDs / Verifiable Credentials (i.e., by their implementations) to accept or connect with.
- Ethics & identity interoperability decentralized governance
- Use cases for digital legal entity identification and user roles
- ADP/BBS+/KERI
- About Open Space and how to be release myself from what a "conference" should be and learn more about the importance of data
- Diverse identity needs and scaling systems to meet those needs.
- Innovation
- How to leverage SSI for fraud prevention
- The latest on SSI and Web Access specifications
- Latest on-going discussions on the identity
- How can we apply SSI to our customers How can I participate in this field"
- Integration, SSI, VC, VP
- learn about the latest innovation and future use cases for digital identiy
- Identity Management innovations/latest mechanisms/approaches
- Sybil-resistant identity. Ethical concerns about digital identity
- Interoperability
- Other people's experiences, opportunities for collaborations and standardization efforts.
- Recent use cases for digital identity and verifiable credentials; how to embed biometric into verifiable credentials; BBS+; KERI
- SSI in general
- Who are we in terms of the law?
- Credential presentation and issuance protocols.
- Zero Knowledge Proofs and Verifiable Credentials.
- Convergence of Indy and SVIP ecosystems.
- Alternatives to JSON-LD Verifiable Credentials, interoperability, wallets.
- KERI, GHP, BBS+
- Oauth2, OpenID, SAML, FIDO, JWT, Identity Threats
- Keri, Identity Hubs, Ethics and Human Rights
- Keri, Identity Hubs, Key recovery, Cryptography
- UX for credentials
- Future of Digital Identity
- Continuous learning about SSI in the different spaces and eager to hear about any and all production use cases and how they have evolved.
- Alignment between VC and US mDL
- Feedback on the library’s API
- What’s happening with SSI, Verifiable Credentials and DIDs Strategies for popularizing these technologies to a broader audience
- GAIN
- mDLs, CBDC
- DI based messaging, DIDComm, Mobile Edge Agents
- SSI, OIDC & Verifiable Presentations, Revocation
- Current pain points from Tech providers
- DIDComm with Hyperledger Aries; DIDComm and data protection
- Hoping to learn more about standards convergence for credential exchange
- DID Exchange, DIF Presentation Exchange
- Really interested to dig further into JSON-LD with BBS+ Credential exchange, UI/UX discussions, interoperability discussions, and Machine Readable Governance
- Credential guardianship
- Generative Identity
- Just attend as many sessions as possible! There will be too many good ones to pick.
- Whether ZKP systems are ready for production use
- FIDO, RISC, CAE, Identity, Developer relations
- Public Health privacy related issues.
- Other action and leaders in the Identity Space
- The possible impact of digital identity on the future, especially anything new and surprising. Interested to hear any ideas or standards that would make sense to use in our DSNP work.
- What are the solutions that are being deployed for decentralized digital identity. Some examples of successful implementation.
What are the critical questions about user-centric identity and data you hope to discuss with peers at IIW?
- Use cases for digital legal entity identification and user roles
- What makes it fly?
- What is the most practical way to put an SSI wallet into the hands of busy, yet politically minded citizens who want to participate in modern, sovereign governance?
- Use cases for digital legal entity identification and user roles
- How can we verify the validity of verification? How do we trust complicated-looking algorithms and products? (They are probably broad questions about cryptography and digital identities rather than SSI-specific ones)
- How close are we to achieving the reality of self-sovereign identity?
- How wide is the gap between self-sovereign identity and general access to user-friendly mechanisms to take advantage of this concept?
- I am most keen to learn from the forum regarding regulatory hurdles; inter-country obstacles and related use cases that push for self-sovereign identity and individuals taking back their identity
- How do we overcome the technology debt of existing centralized system to bring about decentralized solutions to ensure user-centric identity?
- How Governments are getting involved and how they plan to bridge the gap between centralised and decentralized identity.
- How to drive adoption by improving user experience
- How to drive adoption when people are seemingly seeing SSI as a bad thing controlled by companies that don’t have their users’ rights or privacy in mind? (I’m thinking about how people are complaining about how SSI is (not) helping with discrimination, racism and so on.)
- How are we going to interoperate with the Europe Green Certificate initiative?
- Data interop, VCs in complex Verifier environments, Governance at the machine level
- How to manage communications channels & social interactions that preserve SSI?
- Use cases for digital legal entity identification and user roles
- How to mange respectful relationships between people's HumanOS (aka human nature) and IT Systems and the game spaces and suasion therein?
- What would be the preferred architecture for using SSI controlled data sets in commercial settings?
- How to make VCs invisible without losing their functionality
- What subelements of Identity systems are amenable to large scale infrastructure, and what elements are local/adaptable?
- Why do individuals care? What will help them understand to care enough to take proactive action? How to we help enterprises to care enough to invest and make it easy for people?
- Consent Management
- Improve UX
- How wallets/personal key management will continue to evolve: personally hosted, digital services, captured by Apple/Google?
- What is difference between user centric and user empowering?
- How can we enable people to have the rights and tools to control their personal data (data created by and about them)?
- Is it possible to start a SSI identity system with secondary attributes like proof-of-address
- limits and ethical applications of emerging standards
- Use cases for digital legal entity identification and user roles
- I'm interested in discussion interoperability methods between SSI standards and how that affects security.
- Identity done badly is very dangerous, there are worrying and emerging examples of where so-called ""datification"" has created harms. We need some sort of code of practice/ ethical checklist. not sure, IIW will answer!
- Use cases for digital legal entity identification and user roles
- Interop and concerns about the prevalence of did:web
- Why is this important and how do we effectively educate others?
- How to leverage user-centric identity to combat fraud
- Wallet UI/UX for elder person.
- I believe the shift to user-centric identity in the Enterprise must be driven by the consumer, just like when most people start demanding to use their own personal devices.
Data privacy
- sybil resistance first and foremost and how digital identity works for specific use cases (voting vs. social media)
- Make passwordless ubiquitous
- User experience, interoperability, infrastructure
- SSI 's influence on politics and legislation
- Bridging the mobile divide.
- SSI and GDPR conformity, SSI with cross Blockchain Infrastructure.
- How to use W3C Verifiable Credentials using JSON.
- Reverse proxy and Token Binding, Oauth proxy, Oauth federation, Oauth Logout, Offline Oauth Authentication, Session Assurance
- How can we make it easy?
- How do we fix the interop struggles that exist, even between implementations of the same standards?
- How do we demonstrate SSI usage to non-tech stakeholders?
- SSI's challenge of adopting protocols and standards such that we have created an environment where seemingly we are choosing between interoperability vs time to market
- The W3C DID WG drama
- Ideas for the workflow of connecting an individual with an issuer for VC’s
- DIDComm for advanced messaging applications
- Interop
- Are there new standards developing for advanced end to end encrypted messaging area
- Are DIDComm and its implementations ready for production?
- I need to know how the community is going to handle very complicated proof requests
- I am particularly interested in the UI/UX surrounding the user data & identity.
- Get feedback on Machine Readable Governance and presentation exchange. It's interoperability and scalability.
- How do we empower people to have more agency and power over the ways in which their identity is threatened? What is the impact of mis/disinformation on identity?
- How best to get traction for real world implementations into the market place and how to educate decision makers at all levels.
- How to organize community effort around pushing WebAuthn and WebCrypto W3C standards
- What does it take to trust?
- How can we identify and resolve ethical questions of digital identity, of digital privacy in a decentralized system/platform
- What are the bottleneck to widescale adoption for user-centric identity