SlideShare a Scribd company logo
1 of 78
Download to read offline
Explaining SSI to C-suite execs,
and anyone else for that matter
John Phillips Partner | Innovation | Self-Sovereign Identity
Email: john.phillips@460degrees.com
LinkedIn: https://www.linkedin.com/in/johnphillips11kps
Twitter: @11dot2john
SSIMeetup.org
1. Empower global SSI communities
2. Open to everyone interested in SSI
3. All content is shared with CC BY SA
SSIMeetup.org
Alex Preukschat @SSIMeetup @AlexPreukschat
Coordinating Node SSIMeetup.org
https://creativecommons.org/licenses/by-sa/4.0/
SSIMeetup objectives
We’ve been trying
to find better ways
to explain SSI to
people and
organisations for
over 3 years
“We” is me, and for the last year and
more, my fellow teammates at
460degrees.
“We” is also the global SSI
community.
My guess is that “we” includes you
too.
SSIMeetup.org
Recently, we think
we’ve found a way
that works
This deck tells the journey we’ve
taken so far, what we’ve learnt (and
are learning) along the way, where we
are now, and where we want to get to
next….
SSIMeetup.org
Like most, we
started by learning
the technology and
explaining how it
works
We learnt about DIDs, DIDdocs,
Verifiable Credentials, Hyperledger
(Indy, Aries and Ursa), Byzantine
Consensus Algorithms, Zero
Knowledge Proofs, Sovrin, W3C, DIF,
IETF, Edge devices, Agents, Wallets,
uPort, etc. etc.
We connected with everyone we
could. And we would explain what we
learnt.
[And we need to keep learning and
sharing today]
SSIMeetup.org
During 2018 we
finessed our
approach,
borrowing from
those around us
We created presentations that
followed familiar paths: the internet
was made without an identity layer,
that cartoon image of a dog at a
keyboard, digital identity is a problem
for people and organisations, toxic
data, history and principles, building
blocks, standards and open-source
software, and operational examples.
We have over 60 presentations and
our master deck has over 200 slides
[not including these ones]
- we never use it in full!
SSIMeetup.org
In 2019, we started
our investment in
SSI technology
We wanted to prove that the
technology was real, that we could
put it in the hands of people in the
audience and show them it working.
So we invested (and still invest) in
the technology, building client
focused demos, putting wallets in
people’s hands, and exploring the
technical angles that we’re interested
in….
SSIMeetup.org
The thing was,
tech-led wasn’t
working very well
… for us at least...
SSIMeetup.org
We were “solving
for the wrong
problem”
It wasn’t the best way to explain SSI
for our audiences.
It was as if we were trying to explain
the internet by describing each RFC
of the TCP/IP suite, to a bunch of
AOL engineers…
[When did you last try to explain how
the internet works? How did that
work out for you?]
SSIMeetup.org
Intermission:
SSIMeetup is a
brilliant, and
growing, source of
material
I’m presenting to an SSIMeetup
audience, flattered by Alex’s request
to present, and grateful for his help in
making this work.
If you want to learn about SSI and its
practitioners, SSIMeetup is a great
place to begin your journey, and to
revisit.
BUT while SSIMeetup is already a
great resource, I think there is a gap
in the material to date...
SSIMeetup.org
Observation:
Lots of technical
explanation of how
SSI works.
Few simple
explanations of the
SSI experience
My premise is that we all want SSI to
succeed.
To do that SSI needs to work
technically AND we need to be able
explain it. We need to win people,
organisations and businesses over.
To do that, we need to get better at
explaining SSI, we need to share
ideas on what’s working and what’s
not.
SSIMeetup.org
Why doesn’t
starting with the
tech work? Think
about your
audience
If they are a technologist with
experience in Digital Identity, they are
most likely experienced in traditional
IdAM
If they’re a blockchain fan, then
they’re looking for crypto and smart
contracts everywhere
If they’re a business executive, then
they’re wondering whether this is
worth listening to, is it a threat or
opportunity for them in their role and
for their business...
SSIMeetup.org
Observation: If you
start with the
technology,
attention drifts and
the conversation
loses focus
Technologists with many years of
mostly the same experience see
everything through their own lens.
Blockchain people keep talking about
“crypto wallets” and keep thinking
that we’re writing PII to the
blockchain and/or monetising
personal data.
Business people get bored. You have
6 seconds to get their attention.
SSIMeetup.org
[Oh the irony of writing that
statement in a deck to be presented
in a webinar. While I didn’t have a
choice on this occasion, it still feels
like I’m shooting in the dark]
Unless the format demands that you
have to, don’t start with a deck.
If you do have to start with a deck,
make sure you have room to tailor
the story for the audience.
Observation: If you
start with a slide
deck, you’re
imposing a fixed
story, with fixed
content, on people
you don’t know yet
SSIMeetup.org
I really enjoy Philip Sheldrake’s
contributions (webinar 24). He and
others make important points and
ask challenging questions.
I also know that I (and others) can be
easily distracted by considerations of
the words “self”, “sovereign”, and
“identity”.
So for now I’m focused on how we
might use SSI, for the good of all...
Observation: If you
start by trying to
explain “self”,
“sovereign”, and
“identity”, you’ll
likely never finish
SSIMeetup.org
We wanted to
humanise the
conversation, to
simplify and
demystify SSI
We wanted to avoid being derailed by
questions before our audience had
even understood the basic premise.
We wanted to make sure that we had
a common framework, and shared
mental model, before encouraging
questions.
We wanted to distinguish clean and
simple SSI from “SSI-washing”
SSIMeetup.org
So in 2019 we did
two things in
parallel
1. External Research. We explored
our contacts with Universities,
looking to see how their
students and academics might
help us.
2. Internal Workshops. We did a
retrospective on our own
approach and thinking.
SSIMeetup.org
With Universities,
we explored
projects with
students and
research with
academics
We completed capstone projects
with two Universities, one with a
group of Cybersecurity students, and
one with a group of Design Students.
We learnt lots from both.
We also started a co-investment
research program with the Smart
Cities Research Institute team of
Swinburne University to consider
Digital Wallets in Smart Cities.
SSIMeetup.org
These two areas
are worth their
own, separate,
explanation
From the University capstone
projects, we gained some great
insights about what works, and what
doesn’t work, when explaining SSI.
[I’ll happily share the excellent
Swinburne University design
students’ work separately.]
With the Smart Cities team we have
just finished our first workshops with
members of the general public and
we’re learning LOTS more.
SSIMeetup.org
Today I want to
focus on the story
that got the
attention of Alex
(and a few others)
We were looking for a way to explain
SSI to the UX design students at
Swinburne and played with some
concepts we had used in other
sectors...
SSIMeetup.org
We used a
mash-up of Human
Centred Design,
Innovation and
Google Ventures
“Sprint”
And we looked in our
stationary and craft drawer
for inspiration...
SSIMeetup.org
And we wrote a
simple story
SSIMeetup.org
Australia is home to
(arguably) the oldest
civilisations in the world.
These are peoples whose
culture was maintained for
over 40,000 years by
storytelling.
Stories are powerful
Why Stories?
Because people, all
people, all of us [you
included], remember
things best when told as
a story
SSIMeetup.org
Critically, and very
deliberately, we
give our story a
human angle
We give the characters in
our story a name and a
back story.
“Meet Jackie, she’s a
successful young adult
living in an apartment.
Jackie has just got a new
job and wants to move
nearer to work.”
SSIMeetup.org
Think of this as
mixing the
[anodyne] use-case
model with
personas and
Human Centred
Design
[In My Opinion]
The way we normally
present Use-Cases is an
almost completely useless
way to explain something to
an audience.
SSIMeetup.org
Human Centred
Design gives us a
framework to test
and explore
“wicked” problems
[In My Opinion]
Digital Identity is a “wicked
problem”.
It is technically
complicated, and socially /
politically complex.
SSIMeetup.org
This is an example
of storytelling in a
business context...
Business Stories are short and have
a structure along the lines of:
• This used to be the case
• Then this happened
• So we’re doing this
• So that we can achieve this
Our story structure is a little different,
but shares much of the DNA.
SSIMeetup.org
You might
recognise the
similarity with
“Situation;
Complication;
Resolution”
Often attributed to McKinsey and
related to the Minto Pyramid, you can
find lots of material about this
pattern on line.
You’ll see that we use
Situation; Resolution; Complication
We put the complication last? Why?
Well let’s see...
SSIMeetup.org
Important Point:
Ask permission to
tell the story first…
“We’d like to explain SSI in a way that
will help us all get on the same page
and provide a framework for our
conversation.
It will take about 7 minutes.
After that we can demonstrate the
technology and discuss business
models and any technical questions
you may have.
Is that OK?”
SSIMeetup.org
We introduce the
story as having
three parts
Part 1 - The current, physical, world
Why? To establish a shared experience
Part 2 - The SSI world
Why? To demonstrate how similar SSI is to the
shared experience of the physical world
Part 3 - The current digital world
Why? To show the broken nature of centralised
and federated systems - to give a “call for
action”
SSIMeetup.org
So THIS is our SSI
demo kit...
SSIMeetup.org
Let’s see it in
action...
SSIMeetup.org
Part 1: The world
we live in now
What’s it like to rent a new
apartment, now?
SSIMeetup.org
Meet Jackie, she’s a
successful young adult
living in an apartment.
Jackie has just got a new
job and wants to move
nearer to work.
SSIMeetup.org
Jackie has a driving licence
and pays one of the utility
bills for the apartment.
She keeps her driving
licence in her wallet and the
bills in a drawer of a desk at
her apartment
SSIMeetup.org
These are physical
“credentials”, they state
• who issued them
• who they were sent to,
• and other information
relevant to their purpose
SSIMeetup.org
Jackie has found an
apartment she likes
managed by “Highly Rated
Rentals”
SSIMeetup.org
Highly Rated Rentals tell
Jackie that they’d love to
rent the apartment to her,
and that she’ll need to
provide some identity
information, and her bank
account details.
SSIMeetup.org
Jackie has just opened a
new account at a bank, so
she asks them for an
account statement
SSIMeetup.org
Jackie takes the three
documents with her to the
rental agency...
SSIMeetup.org
And they take copies of
everything.
[… Jackie hopes they keep
the copies very securely….]
SSIMeetup.org
Sometime (days) later, the
rental agency call Jackie
and tell her that everything
went through OK, and can
she come back to the office
to sign the agreement, pay
the bond, and pick up the
keys?
SSIMeetup.org
Jackie goes back to Highly
Rated Rentals and
completes the transaction
So now Jackie has keys to
her new apartment and a
new document to store
SSIMeetup.org
And that’s the world that
most of us live in right now.
We use physical documents
to prove things, and we
receive physical documents
in return.
SSIMeetup.org
Part 2: The SSI
world
It’ll be quite like the current
experience, but a bit
better...
SSIMeetup.org
First we give Jackie a
digital wallet.
This is usually an app on
Jackie’s phone but it can be
any SSI capable secure
storage device.
SSIMeetup.org
Now the physical
documents are Verifiable
Credentials.
The digital credential and
its contents are
cryptographically signed by
the issuer and addressed to
Jackie
SSIMeetup.org
Jackie can share the
credentials with whoever
she chooses, in whole or in
part, or even by proving that
she has the credential (and
that’s all they need to
know).
SSIMeetup.org
Highly Rated Rentals tell
Jackie they’d love to rent
the flat to her, and they can
do all the checks in
seconds, but they still need
the same information.
SSI doesn’t change the law,
nor does it need to.
SSIMeetup.org
Highly Rated Rentals send a
“Proof Request” to Jackie’s
wallet.
Her wallet tells her what
they want to know, and
which of her verifiable
credentials can answer
those questions.
SSIMeetup.org
Jackie still needs to
confirm her bank account
details, so she connects
with her new bank and gets
them to send her a
verifiable credential of her
account.
SSIMeetup.org
Now she can use her
Verifiable Credentials to
respond to Highly Rated
Rentals with a Proof
Response
SSIMeetup.org
The proof response is
cryptographically signed by
Jackie, sent to Highly Rated
Rentals, and contains the
three things they asked
about.
SSIMeetup.org
For each credential, Highly
Rated Rentals can do four
checks:
• Who issued the credential
(do they know and trust them?)
• Was it issued to Jackie
(is this hers?)
• Has it been changed in any way?
(has she changed the details?)
• Has it been revoked?
(important for some things)
SSIMeetup.org
They do this by checking
the signatures of each
issuing authority and any
revocation lists.
Importantly, they can do
this without contacting the
issuing authority as this
would be a breach of
privacy.
This is our “ledger” - labelled lollipop sticks
SSIMeetup.org
The public signatures of
issuing authorities, and
other information that they
choose to share, are stored
in a trusted place.
There are already 32
different places (methods)
to write the information.
SSIMeetup.org
The verifiable credential
includes a pointer to public
information about the issuer,
including the public keys they
use for signatures.
Issuers can choose where to
store their information, so
long as that location is
trustworthy and a verifying
party can find it and open it.
SSIMeetup.org
Jackie’s credentials pass
the tests, and Highly Rated
Rentals offer Jackie a
Rental Agreement.
This arrives at Jackie’s
wallet as a new credential
offered by Highly Rated
Rentals.
SSIMeetup.org
Jackie accepts the offer,
and the new credential is
stored in her wallet along
with her other exchanges
with Highly Rated Rentals.
Highly Rated Rentals get a
confirmation that Jackie
has accepted the offer.
SSIMeetup.org
Jackie pays the bond and
picks up her keys.
As you can see, SSI is pretty
much like the current world
Just more secure, more
private, more efficient….
... BETTER
SSIMeetup.org
Part 3: The broken
promise of current
digital identity
models
That’s all very cool, but
that’s not the digital world
we currently live in...
SSIMeetup.org
This “Sparkly Ball” was what we found in the craft
drawer and decided to use as a prop for current digital
identity systems.
It stuck, and we’re fond of it, even if its sparkles are
beginning to fall out!
Introducing the
sparkly ball
SSIMeetup.org
When we describe the
sparkly ball in Australia, we
use examples such as the
“login with” systems of
Facebook and Google, and
the “identity systems” of
AppleID, AusPost Digital ID,
MyGovID, etc.
SSIMeetup.org
We explain that the Sparkly
Ball is our euphemism for
current centralised identity
and federated identity
systems
SSIMeetup.org
Each of these systems
allocates you with an
“identity” that you can use
to authenticate yourself to
other organisations in the
network.
Back to Jackie...
SSIMeetup.org
In return for telling the
sparkly ball a bunch of stuff
about herself, Jackie gets
allocated an identifier...
SSIMeetup.org
When Jackie uses this
identifier with her bank, the
bank asks the Sparkly Ball
to authenticate it…
And the Sparkly Ball learns
that Jackie is talking to the
bank...
SSIMeetup.org
When Jackie uses this
identifier with Highly Rated
Rentals, they ask the
Sparkly Ball to authenticate
it…
And the Sparkly Ball learns
that Jackie is talking to the
Highly Rated Rentals...
SSIMeetup.org
Everytime Jackie uses the
identifier, the Sparkly Ball
knows.
Some Sparkly balls go to
considerable efforts to try
not to notice and to forget
what they learn.
Apple for example
promises to forget after 30
days [page 6, here].
SSIMeetup.org
Some try to “blind”
themselves, covering their
digital eyes and ears.
But others don’t, and use
the data they gain about
you for their own reasons.
Good or bad intentions, the
architecture means that
they are always in the loop
SSIMeetup.org
So we don’t like
Sparkly Balls
SSIMeetup.org
The END
SSIMeetup.org
[of the Jackie demo]
Typical next steps
in our
conversations...
At this point we usually offer to run
one of our software demos.
Then we start to explore their
technical and business questions…
“What’s on the ledger? [again]
“How do we make money/reduce
risk/improve our customer
experience?”
etc.
SSIMeetup.org
So there you have
it, our simple way
to demo SSI...
The original LinkedIn Post and video
that attracted Alex’s attention is on
LinkedIn here
We’ve since made a (slightly)
improved recording of this approach
here
And we’ve built cartoon versions and
even role played this with real people
at meetups…
And we’re writing other stories for
Jackie...
SSIMeetup.org
We continue to
look for new ways
to support the
adoption of SSI
• Continue to sponsor research
and student projects with
Universities
• Co-Chairs (APAC) for the Sovrin
Guardianship Working Group
• Actively explaining SSI to
government and industry bodies
• Promoting the commercial trial
and adoption of SSI.
[we’re not a charity!]
SSIMeetup.org
We’re still learning.
We would be very
interested to hear
what’s working, or
not, when you
explain SSI.
We’d be happy to connect!
The last slide in this deck
has the team’s full contact
details...
SSIMeetup.org
Finally, I was asked to add a list
of any books that have helped
me understand identity better.
I’m an avid reader. ALL stories
explore identity in one way or
another. This is a big and
growing list...
Here are some of the non-fiction
and fiction books that have
shaped my thinking
Philosophy
• Kwame Anthony Appiah - The Ethics of Identity [or listen to his
excellent BBC Radio 4 Reith Lecture podcasts on identity]
• AC Grayling - lots, but a nice introduction is “Thinking of
Answers: Questions in the Philosophy of Everyday Life”
• I’ve also struggled through others such as Kirkegaard,
Wittgenstein, Kant and Russell
• And I had the usual youthful fascination with existentialism
[Sartre, Camus, Goethe, de Beauvoir, Kundera etc.]
Non-Fiction
• Rachel Botsman - Who Can you Trust
• Soshana Zuboff - The Age of
Surveillance Capitalism
• Yuval Noah Hurari - Sapiens, Homo Deus,
Lessons for the 21st Century
• Hans Rosling - Factfulness
• Richard H. Thaler - Misbehaving: How
Economics Became Behavioural
• Daniel Kahneman - Thinking, Fast and Slow
• Dan Ariely: Predictably Irrational
• Randall Munroe - Thing Explainer
• Nassim Nicholas Taleb - Antifragile
Fiction:
• Ben Elton - Identity Crisis
• Philip K Dick - Flow My Tears, The
Policeman Said [and other titles]
• Daniel Suarez - Daemon
• Richard Morgan - Altered Carbon
• Pretty well everything by William Gibson
SSIMeetup.org
The SSI team at 460degrees are John Phillips, Jo
Spencer and Jack Dwyer. We are passionate
students, evangelists, and enablers of
Self-Sovereign Identity.
We believe that Self-Sovereign Identity is a better
model for digital privacy, security and trust for
people, organisations, and things on a global
scale.
We see SSI as a disruptive but positive force, a
change for good. We want to be a catalyst for that
change, helping people and organisations
navigate their way to a better digital future.
Thanks for
the chance to
share John Phillips Partner | Innovation | Self-Sovereign Identity
Email: john.phillips@460degrees.com
LinkedIn: https://www.linkedin.com/in/johnphillips11kps
Twitter: @11dot2john
Jo Spencer Champion | Payments | Self-Sovereign Identity
Email: jo.spencer@460degrees.com
LinkedIn: https://www.linkedin.com/in/jospencer-1pg
Twitter: @spencerjed
Jack Dwyer Development Lead | Self-Sovereign Identity
Email: jack.dwyer@460degrees.com
SSIMeetup.org

More Related Content

What's hot

SSI: The Trillion Dollar Business Opportunity
SSI: The Trillion Dollar Business OpportunitySSI: The Trillion Dollar Business Opportunity
SSI: The Trillion Dollar Business OpportunitySSIMeetup
 
Internet Identity Workshop #29 highlights with Drummond Reed
Internet Identity Workshop #29 highlights with Drummond ReedInternet Identity Workshop #29 highlights with Drummond Reed
Internet Identity Workshop #29 highlights with Drummond ReedSSIMeetup
 
Solving compliance for crypto businesses using Decentralized Identity – Pelle...
Solving compliance for crypto businesses using Decentralized Identity – Pelle...Solving compliance for crypto businesses using Decentralized Identity – Pelle...
Solving compliance for crypto businesses using Decentralized Identity – Pelle...SSIMeetup
 
The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...
The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...
The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...SSIMeetup
 
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...SSIMeetup
 
The State of Digital Identity Wallets – Darrell O’Donnell
The State of Digital Identity Wallets – Darrell O’DonnellThe State of Digital Identity Wallets – Darrell O’Donnell
The State of Digital Identity Wallets – Darrell O’DonnellSSIMeetup
 
Learn about the Trust Over IP (ToIP) stack
Learn about the Trust Over IP (ToIP) stackLearn about the Trust Over IP (ToIP) stack
Learn about the Trust Over IP (ToIP) stackSSIMeetup
 
DID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
DID Resolution: Given a DID how do I retrieve its document? – Markus SabadelloDID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
DID Resolution: Given a DID how do I retrieve its document? – Markus SabadelloSSIMeetup
 
All you need to know about SSI for Corporates and IoT – Heather Vescent
All you need to know about SSI for Corporates and IoT – Heather VescentAll you need to know about SSI for Corporates and IoT – Heather Vescent
All you need to know about SSI for Corporates and IoT – Heather VescentBlockchain España
 
Identity and Privacy: Past, Present, and Digital - Brenda K. Leong
Identity and Privacy: Past, Present, and Digital - Brenda K. LeongIdentity and Privacy: Past, Present, and Digital - Brenda K. Leong
Identity and Privacy: Past, Present, and Digital - Brenda K. LeongSSIMeetup
 
The 2nd Official W3C DID Working Group Meeting (The Netherlands)
The 2nd Official W3C DID Working Group Meeting (The Netherlands)The 2nd Official W3C DID Working Group Meeting (The Netherlands)
The 2nd Official W3C DID Working Group Meeting (The Netherlands)SSIMeetup
 
Schema Definitions and Overlays for Self-Sovereign Identity (SSI) - Paul Knowles
Schema Definitions and Overlays for Self-Sovereign Identity (SSI) - Paul KnowlesSchema Definitions and Overlays for Self-Sovereign Identity (SSI) - Paul Knowles
Schema Definitions and Overlays for Self-Sovereign Identity (SSI) - Paul KnowlesSSIMeetup
 
Decentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep diveDecentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep diveSSIMeetup
 
Introduction to Self Sovereign Identity
Introduction to Self Sovereign IdentityIntroduction to Self Sovereign Identity
Introduction to Self Sovereign IdentityHeather Vescent
 
Decentralized Identifiers DIDs and W3C with Manu Sporny and Drummond Reed
Decentralized Identifiers DIDs and W3C with Manu Sporny and Drummond ReedDecentralized Identifiers DIDs and W3C with Manu Sporny and Drummond Reed
Decentralized Identifiers DIDs and W3C with Manu Sporny and Drummond ReedSSIMeetup
 
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...SSIMeetup
 
Self Sovereign Identity (SSI) Open standards with Drummond Reed
Self Sovereign Identity (SSI) Open standards with Drummond Reed Self Sovereign Identity (SSI) Open standards with Drummond Reed
Self Sovereign Identity (SSI) Open standards with Drummond Reed SSIMeetup
 
Introduction to Self Sovereign Identity - IIW October 2019
Introduction to Self Sovereign Identity - IIW October 2019Introduction to Self Sovereign Identity - IIW October 2019
Introduction to Self Sovereign Identity - IIW October 2019Heather Vescent
 
Verifiable Credentials 101 for SSI and Decentralized Digital Identity - Tyler...
Verifiable Credentials 101 for SSI and Decentralized Digital Identity - Tyler...Verifiable Credentials 101 for SSI and Decentralized Digital Identity - Tyler...
Verifiable Credentials 101 for SSI and Decentralized Digital Identity - Tyler...SSIMeetup
 
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...SSIMeetup
 

What's hot (20)

SSI: The Trillion Dollar Business Opportunity
SSI: The Trillion Dollar Business OpportunitySSI: The Trillion Dollar Business Opportunity
SSI: The Trillion Dollar Business Opportunity
 
Internet Identity Workshop #29 highlights with Drummond Reed
Internet Identity Workshop #29 highlights with Drummond ReedInternet Identity Workshop #29 highlights with Drummond Reed
Internet Identity Workshop #29 highlights with Drummond Reed
 
Solving compliance for crypto businesses using Decentralized Identity – Pelle...
Solving compliance for crypto businesses using Decentralized Identity – Pelle...Solving compliance for crypto businesses using Decentralized Identity – Pelle...
Solving compliance for crypto businesses using Decentralized Identity – Pelle...
 
The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...
The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...
The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...
 
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
 
The State of Digital Identity Wallets – Darrell O’Donnell
The State of Digital Identity Wallets – Darrell O’DonnellThe State of Digital Identity Wallets – Darrell O’Donnell
The State of Digital Identity Wallets – Darrell O’Donnell
 
Learn about the Trust Over IP (ToIP) stack
Learn about the Trust Over IP (ToIP) stackLearn about the Trust Over IP (ToIP) stack
Learn about the Trust Over IP (ToIP) stack
 
DID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
DID Resolution: Given a DID how do I retrieve its document? – Markus SabadelloDID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
DID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
 
All you need to know about SSI for Corporates and IoT – Heather Vescent
All you need to know about SSI for Corporates and IoT – Heather VescentAll you need to know about SSI for Corporates and IoT – Heather Vescent
All you need to know about SSI for Corporates and IoT – Heather Vescent
 
Identity and Privacy: Past, Present, and Digital - Brenda K. Leong
Identity and Privacy: Past, Present, and Digital - Brenda K. LeongIdentity and Privacy: Past, Present, and Digital - Brenda K. Leong
Identity and Privacy: Past, Present, and Digital - Brenda K. Leong
 
The 2nd Official W3C DID Working Group Meeting (The Netherlands)
The 2nd Official W3C DID Working Group Meeting (The Netherlands)The 2nd Official W3C DID Working Group Meeting (The Netherlands)
The 2nd Official W3C DID Working Group Meeting (The Netherlands)
 
Schema Definitions and Overlays for Self-Sovereign Identity (SSI) - Paul Knowles
Schema Definitions and Overlays for Self-Sovereign Identity (SSI) - Paul KnowlesSchema Definitions and Overlays for Self-Sovereign Identity (SSI) - Paul Knowles
Schema Definitions and Overlays for Self-Sovereign Identity (SSI) - Paul Knowles
 
Decentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep diveDecentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep dive
 
Introduction to Self Sovereign Identity
Introduction to Self Sovereign IdentityIntroduction to Self Sovereign Identity
Introduction to Self Sovereign Identity
 
Decentralized Identifiers DIDs and W3C with Manu Sporny and Drummond Reed
Decentralized Identifiers DIDs and W3C with Manu Sporny and Drummond ReedDecentralized Identifiers DIDs and W3C with Manu Sporny and Drummond Reed
Decentralized Identifiers DIDs and W3C with Manu Sporny and Drummond Reed
 
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
 
Self Sovereign Identity (SSI) Open standards with Drummond Reed
Self Sovereign Identity (SSI) Open standards with Drummond Reed Self Sovereign Identity (SSI) Open standards with Drummond Reed
Self Sovereign Identity (SSI) Open standards with Drummond Reed
 
Introduction to Self Sovereign Identity - IIW October 2019
Introduction to Self Sovereign Identity - IIW October 2019Introduction to Self Sovereign Identity - IIW October 2019
Introduction to Self Sovereign Identity - IIW October 2019
 
Verifiable Credentials 101 for SSI and Decentralized Digital Identity - Tyler...
Verifiable Credentials 101 for SSI and Decentralized Digital Identity - Tyler...Verifiable Credentials 101 for SSI and Decentralized Digital Identity - Tyler...
Verifiable Credentials 101 for SSI and Decentralized Digital Identity - Tyler...
 
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
 

Similar to Explaining SSI to C-suite executives, and anyone else for that matter

How to Entertain audiences using data led content - Trend Report Spring 2015
How to Entertain audiences using data led content - Trend Report Spring 2015How to Entertain audiences using data led content - Trend Report Spring 2015
How to Entertain audiences using data led content - Trend Report Spring 2015infogr8
 
LAST Conference 2017 All projects are red until they deliver something work...
LAST Conference 2017   All projects are red until they deliver something work...LAST Conference 2017   All projects are red until they deliver something work...
LAST Conference 2017 All projects are red until they deliver something work...Phillip Gadzinski
 
Skip Cole, USIP, techatstate
Skip Cole, USIP, techatstateSkip Cole, USIP, techatstate
Skip Cole, USIP, techatstatetechatstate
 
SpringOne Tour: The Influential Software Engineer
SpringOne Tour: The Influential Software EngineerSpringOne Tour: The Influential Software Engineer
SpringOne Tour: The Influential Software EngineerVMware Tanzu
 
Zilino NCDD Tech Tuesday presentation
Zilino NCDD Tech Tuesday presentationZilino NCDD Tech Tuesday presentation
Zilino NCDD Tech Tuesday presentationIntellitics, Inc.
 
Web 2.0 Expo Ny--How to Submit a Winning Proposal
Web 2.0 Expo Ny--How to Submit a Winning ProposalWeb 2.0 Expo Ny--How to Submit a Winning Proposal
Web 2.0 Expo Ny--How to Submit a Winning ProposalO'Reilly Media
 
OpenUI: Integrating Usage Data?
OpenUI: Integrating Usage Data?OpenUI: Integrating Usage Data?
OpenUI: Integrating Usage Data?Igalia
 
Owning the Interaction in Dynamic Environments
Owning the Interaction in Dynamic EnvironmentsOwning the Interaction in Dynamic Environments
Owning the Interaction in Dynamic EnvironmentsFergus Roche
 
Owning the Interaction in Dynamic Environments
Owning the Interaction in Dynamic EnvironmentsOwning the Interaction in Dynamic Environments
Owning the Interaction in Dynamic Environmentsguestf4f7a4b38
 
Is Content Strategy About To Overtake Interaction Design? (2014 WIAD)
Is Content Strategy About To Overtake Interaction Design? (2014 WIAD)Is Content Strategy About To Overtake Interaction Design? (2014 WIAD)
Is Content Strategy About To Overtake Interaction Design? (2014 WIAD)Joe Hass
 
Museum Website Best Practices for the 21st Century
Museum Website Best Practices for the 21st CenturyMuseum Website Best Practices for the 21st Century
Museum Website Best Practices for the 21st CenturyDana Mitroff Silvers
 
Reporting Out: xAPI, Internet of Things, Gnomes, and a Learning Experience Ch...
Reporting Out: xAPI, Internet of Things, Gnomes, and a Learning Experience Ch...Reporting Out: xAPI, Internet of Things, Gnomes, and a Learning Experience Ch...
Reporting Out: xAPI, Internet of Things, Gnomes, and a Learning Experience Ch...TorranceLearning
 
Ictangels@nghs
Ictangels@nghsIctangels@nghs
Ictangels@nghsJoanne Day
 
Service Design Network Global Conference 2014 report
Service Design Network Global Conference 2014 reportService Design Network Global Conference 2014 report
Service Design Network Global Conference 2014 reportErik Roscam Abbing
 
How To Write Film Analysis Essay
How To Write Film Analysis EssayHow To Write Film Analysis Essay
How To Write Film Analysis EssayLaura Martin
 
Web2 And Distributed Services
Web2 And Distributed ServicesWeb2 And Distributed Services
Web2 And Distributed ServicesMike Ellis
 
Experience Probes for Exploring the Impact of Novel Products
Experience Probes for Exploring the Impact of Novel ProductsExperience Probes for Exploring the Impact of Novel Products
Experience Probes for Exploring the Impact of Novel ProductsMike Kuniavsky
 

Similar to Explaining SSI to C-suite executives, and anyone else for that matter (20)

How to Entertain audiences using data led content - Trend Report Spring 2015
How to Entertain audiences using data led content - Trend Report Spring 2015How to Entertain audiences using data led content - Trend Report Spring 2015
How to Entertain audiences using data led content - Trend Report Spring 2015
 
LAST Conference 2017 All projects are red until they deliver something work...
LAST Conference 2017   All projects are red until they deliver something work...LAST Conference 2017   All projects are red until they deliver something work...
LAST Conference 2017 All projects are red until they deliver something work...
 
Skip Cole, USIP, techatstate
Skip Cole, USIP, techatstateSkip Cole, USIP, techatstate
Skip Cole, USIP, techatstate
 
SpringOne Tour: The Influential Software Engineer
SpringOne Tour: The Influential Software EngineerSpringOne Tour: The Influential Software Engineer
SpringOne Tour: The Influential Software Engineer
 
Zilino NCDD Tech Tuesday presentation
Zilino NCDD Tech Tuesday presentationZilino NCDD Tech Tuesday presentation
Zilino NCDD Tech Tuesday presentation
 
Web 2.0 Expo Ny--How to Submit a Winning Proposal
Web 2.0 Expo Ny--How to Submit a Winning ProposalWeb 2.0 Expo Ny--How to Submit a Winning Proposal
Web 2.0 Expo Ny--How to Submit a Winning Proposal
 
OpenUI: Integrating Usage Data?
OpenUI: Integrating Usage Data?OpenUI: Integrating Usage Data?
OpenUI: Integrating Usage Data?
 
Owning the Interaction in Dynamic Environments
Owning the Interaction in Dynamic EnvironmentsOwning the Interaction in Dynamic Environments
Owning the Interaction in Dynamic Environments
 
Owning the Interaction in Dynamic Environments
Owning the Interaction in Dynamic EnvironmentsOwning the Interaction in Dynamic Environments
Owning the Interaction in Dynamic Environments
 
2015 Arts Midwest Workshop: Embracing the Digital Age
2015 Arts Midwest Workshop: Embracing the Digital Age2015 Arts Midwest Workshop: Embracing the Digital Age
2015 Arts Midwest Workshop: Embracing the Digital Age
 
Is Content Strategy About To Overtake Interaction Design? (2014 WIAD)
Is Content Strategy About To Overtake Interaction Design? (2014 WIAD)Is Content Strategy About To Overtake Interaction Design? (2014 WIAD)
Is Content Strategy About To Overtake Interaction Design? (2014 WIAD)
 
Museum Website Best Practices for the 21st Century
Museum Website Best Practices for the 21st CenturyMuseum Website Best Practices for the 21st Century
Museum Website Best Practices for the 21st Century
 
Reporting Out: xAPI, Internet of Things, Gnomes, and a Learning Experience Ch...
Reporting Out: xAPI, Internet of Things, Gnomes, and a Learning Experience Ch...Reporting Out: xAPI, Internet of Things, Gnomes, and a Learning Experience Ch...
Reporting Out: xAPI, Internet of Things, Gnomes, and a Learning Experience Ch...
 
Ictangels@nghs
Ictangels@nghsIctangels@nghs
Ictangels@nghs
 
Service Design Network Global Conference 2014 report
Service Design Network Global Conference 2014 reportService Design Network Global Conference 2014 report
Service Design Network Global Conference 2014 report
 
Museum Marketing and Digital Strategy
Museum Marketing and Digital StrategyMuseum Marketing and Digital Strategy
Museum Marketing and Digital Strategy
 
How To Write Film Analysis Essay
How To Write Film Analysis EssayHow To Write Film Analysis Essay
How To Write Film Analysis Essay
 
Web2 And Distributed Services
Web2 And Distributed ServicesWeb2 And Distributed Services
Web2 And Distributed Services
 
Experience Probes for Exploring the Impact of Novel Products
Experience Probes for Exploring the Impact of Novel ProductsExperience Probes for Exploring the Impact of Novel Products
Experience Probes for Exploring the Impact of Novel Products
 
Foundations of IA
Foundations of IAFoundations of IA
Foundations of IA
 

More from SSIMeetup

ZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSIZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSISSIMeetup
 
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...SSIMeetup
 
Value proposition of SSI tech providers - Self-Sovereign Identity
Value proposition of SSI tech providers - Self-Sovereign IdentityValue proposition of SSI tech providers - Self-Sovereign Identity
Value proposition of SSI tech providers - Self-Sovereign IdentitySSIMeetup
 
SSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley HughesSSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley HughesSSIMeetup
 
Web5 - Open to Build - Block-TBD
Web5 - Open to Build - Block-TBDWeb5 - Open to Build - Block-TBD
Web5 - Open to Build - Block-TBDSSIMeetup
 
Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...SSIMeetup
 
PharmaLedger: A Digital Trust Ecosystem for Healthcare
PharmaLedger: A Digital Trust Ecosystem for HealthcarePharmaLedger: A Digital Trust Ecosystem for Healthcare
PharmaLedger: A Digital Trust Ecosystem for HealthcareSSIMeetup
 
Cheqd: Making privacy-preserving digital credentials fun
Cheqd: Making privacy-preserving digital credentials funCheqd: Making privacy-preserving digital credentials fun
Cheqd: Making privacy-preserving digital credentials funSSIMeetup
 
PolygonID Zero-Knowledge Identity Web2 & Web3
PolygonID Zero-Knowledge Identity Web2 & Web3PolygonID Zero-Knowledge Identity Web2 & Web3
PolygonID Zero-Knowledge Identity Web2 & Web3SSIMeetup
 
Building SSI Products: A Guide for Product Managers
Building SSI Products: A Guide for Product ManagersBuilding SSI Products: A Guide for Product Managers
Building SSI Products: A Guide for Product ManagersSSIMeetup
 
Identity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic ProtocolIdentity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic ProtocolSSIMeetup
 
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloIntroducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloSSIMeetup
 
How to avoid another identity nightmare with SSI? Christopher Allen
How to avoid another identity nightmare with SSI? Christopher AllenHow to avoid another identity nightmare with SSI? Christopher Allen
How to avoid another identity nightmare with SSI? Christopher AllenSSIMeetup
 
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSelf-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSSIMeetup
 
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemseIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemsSSIMeetup
 
The Hyperledger Indy Public Blockchain Node
The Hyperledger Indy Public Blockchain NodeThe Hyperledger Indy Public Blockchain Node
The Hyperledger Indy Public Blockchain NodeSSIMeetup
 
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...SSIMeetup
 
Indirect Identity Control: delegation, guardianship, and controllership – Dan...
Indirect Identity Control: delegation, guardianship, and controllership – Dan...Indirect Identity Control: delegation, guardianship, and controllership – Dan...
Indirect Identity Control: delegation, guardianship, and controllership – Dan...SSIMeetup
 

More from SSIMeetup (18)

ZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSIZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSI
 
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
 
Value proposition of SSI tech providers - Self-Sovereign Identity
Value proposition of SSI tech providers - Self-Sovereign IdentityValue proposition of SSI tech providers - Self-Sovereign Identity
Value proposition of SSI tech providers - Self-Sovereign Identity
 
SSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley HughesSSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley Hughes
 
Web5 - Open to Build - Block-TBD
Web5 - Open to Build - Block-TBDWeb5 - Open to Build - Block-TBD
Web5 - Open to Build - Block-TBD
 
Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...
 
PharmaLedger: A Digital Trust Ecosystem for Healthcare
PharmaLedger: A Digital Trust Ecosystem for HealthcarePharmaLedger: A Digital Trust Ecosystem for Healthcare
PharmaLedger: A Digital Trust Ecosystem for Healthcare
 
Cheqd: Making privacy-preserving digital credentials fun
Cheqd: Making privacy-preserving digital credentials funCheqd: Making privacy-preserving digital credentials fun
Cheqd: Making privacy-preserving digital credentials fun
 
PolygonID Zero-Knowledge Identity Web2 & Web3
PolygonID Zero-Knowledge Identity Web2 & Web3PolygonID Zero-Knowledge Identity Web2 & Web3
PolygonID Zero-Knowledge Identity Web2 & Web3
 
Building SSI Products: A Guide for Product Managers
Building SSI Products: A Guide for Product ManagersBuilding SSI Products: A Guide for Product Managers
Building SSI Products: A Guide for Product Managers
 
Identity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic ProtocolIdentity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic Protocol
 
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloIntroducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
 
How to avoid another identity nightmare with SSI? Christopher Allen
How to avoid another identity nightmare with SSI? Christopher AllenHow to avoid another identity nightmare with SSI? Christopher Allen
How to avoid another identity nightmare with SSI? Christopher Allen
 
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSelf-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
 
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemseIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
 
The Hyperledger Indy Public Blockchain Node
The Hyperledger Indy Public Blockchain NodeThe Hyperledger Indy Public Blockchain Node
The Hyperledger Indy Public Blockchain Node
 
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
 
Indirect Identity Control: delegation, guardianship, and controllership – Dan...
Indirect Identity Control: delegation, guardianship, and controllership – Dan...Indirect Identity Control: delegation, guardianship, and controllership – Dan...
Indirect Identity Control: delegation, guardianship, and controllership – Dan...
 

Recently uploaded

AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneCall girls in Ahmedabad High profile
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663Call Girls Mumbai
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一3sw2qly1
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 

Recently uploaded (20)

Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 

Explaining SSI to C-suite executives, and anyone else for that matter

  • 1. Explaining SSI to C-suite execs, and anyone else for that matter John Phillips Partner | Innovation | Self-Sovereign Identity Email: john.phillips@460degrees.com LinkedIn: https://www.linkedin.com/in/johnphillips11kps Twitter: @11dot2john SSIMeetup.org
  • 2. 1. Empower global SSI communities 2. Open to everyone interested in SSI 3. All content is shared with CC BY SA SSIMeetup.org Alex Preukschat @SSIMeetup @AlexPreukschat Coordinating Node SSIMeetup.org https://creativecommons.org/licenses/by-sa/4.0/ SSIMeetup objectives
  • 3. We’ve been trying to find better ways to explain SSI to people and organisations for over 3 years “We” is me, and for the last year and more, my fellow teammates at 460degrees. “We” is also the global SSI community. My guess is that “we” includes you too. SSIMeetup.org
  • 4. Recently, we think we’ve found a way that works This deck tells the journey we’ve taken so far, what we’ve learnt (and are learning) along the way, where we are now, and where we want to get to next…. SSIMeetup.org
  • 5. Like most, we started by learning the technology and explaining how it works We learnt about DIDs, DIDdocs, Verifiable Credentials, Hyperledger (Indy, Aries and Ursa), Byzantine Consensus Algorithms, Zero Knowledge Proofs, Sovrin, W3C, DIF, IETF, Edge devices, Agents, Wallets, uPort, etc. etc. We connected with everyone we could. And we would explain what we learnt. [And we need to keep learning and sharing today] SSIMeetup.org
  • 6. During 2018 we finessed our approach, borrowing from those around us We created presentations that followed familiar paths: the internet was made without an identity layer, that cartoon image of a dog at a keyboard, digital identity is a problem for people and organisations, toxic data, history and principles, building blocks, standards and open-source software, and operational examples. We have over 60 presentations and our master deck has over 200 slides [not including these ones] - we never use it in full! SSIMeetup.org
  • 7. In 2019, we started our investment in SSI technology We wanted to prove that the technology was real, that we could put it in the hands of people in the audience and show them it working. So we invested (and still invest) in the technology, building client focused demos, putting wallets in people’s hands, and exploring the technical angles that we’re interested in…. SSIMeetup.org
  • 8. The thing was, tech-led wasn’t working very well … for us at least... SSIMeetup.org
  • 9. We were “solving for the wrong problem” It wasn’t the best way to explain SSI for our audiences. It was as if we were trying to explain the internet by describing each RFC of the TCP/IP suite, to a bunch of AOL engineers… [When did you last try to explain how the internet works? How did that work out for you?] SSIMeetup.org
  • 10. Intermission: SSIMeetup is a brilliant, and growing, source of material I’m presenting to an SSIMeetup audience, flattered by Alex’s request to present, and grateful for his help in making this work. If you want to learn about SSI and its practitioners, SSIMeetup is a great place to begin your journey, and to revisit. BUT while SSIMeetup is already a great resource, I think there is a gap in the material to date... SSIMeetup.org
  • 11. Observation: Lots of technical explanation of how SSI works. Few simple explanations of the SSI experience My premise is that we all want SSI to succeed. To do that SSI needs to work technically AND we need to be able explain it. We need to win people, organisations and businesses over. To do that, we need to get better at explaining SSI, we need to share ideas on what’s working and what’s not. SSIMeetup.org
  • 12. Why doesn’t starting with the tech work? Think about your audience If they are a technologist with experience in Digital Identity, they are most likely experienced in traditional IdAM If they’re a blockchain fan, then they’re looking for crypto and smart contracts everywhere If they’re a business executive, then they’re wondering whether this is worth listening to, is it a threat or opportunity for them in their role and for their business... SSIMeetup.org
  • 13. Observation: If you start with the technology, attention drifts and the conversation loses focus Technologists with many years of mostly the same experience see everything through their own lens. Blockchain people keep talking about “crypto wallets” and keep thinking that we’re writing PII to the blockchain and/or monetising personal data. Business people get bored. You have 6 seconds to get their attention. SSIMeetup.org
  • 14. [Oh the irony of writing that statement in a deck to be presented in a webinar. While I didn’t have a choice on this occasion, it still feels like I’m shooting in the dark] Unless the format demands that you have to, don’t start with a deck. If you do have to start with a deck, make sure you have room to tailor the story for the audience. Observation: If you start with a slide deck, you’re imposing a fixed story, with fixed content, on people you don’t know yet SSIMeetup.org
  • 15. I really enjoy Philip Sheldrake’s contributions (webinar 24). He and others make important points and ask challenging questions. I also know that I (and others) can be easily distracted by considerations of the words “self”, “sovereign”, and “identity”. So for now I’m focused on how we might use SSI, for the good of all... Observation: If you start by trying to explain “self”, “sovereign”, and “identity”, you’ll likely never finish SSIMeetup.org
  • 16. We wanted to humanise the conversation, to simplify and demystify SSI We wanted to avoid being derailed by questions before our audience had even understood the basic premise. We wanted to make sure that we had a common framework, and shared mental model, before encouraging questions. We wanted to distinguish clean and simple SSI from “SSI-washing” SSIMeetup.org
  • 17. So in 2019 we did two things in parallel 1. External Research. We explored our contacts with Universities, looking to see how their students and academics might help us. 2. Internal Workshops. We did a retrospective on our own approach and thinking. SSIMeetup.org
  • 18. With Universities, we explored projects with students and research with academics We completed capstone projects with two Universities, one with a group of Cybersecurity students, and one with a group of Design Students. We learnt lots from both. We also started a co-investment research program with the Smart Cities Research Institute team of Swinburne University to consider Digital Wallets in Smart Cities. SSIMeetup.org
  • 19. These two areas are worth their own, separate, explanation From the University capstone projects, we gained some great insights about what works, and what doesn’t work, when explaining SSI. [I’ll happily share the excellent Swinburne University design students’ work separately.] With the Smart Cities team we have just finished our first workshops with members of the general public and we’re learning LOTS more. SSIMeetup.org
  • 20. Today I want to focus on the story that got the attention of Alex (and a few others) We were looking for a way to explain SSI to the UX design students at Swinburne and played with some concepts we had used in other sectors... SSIMeetup.org
  • 21. We used a mash-up of Human Centred Design, Innovation and Google Ventures “Sprint” And we looked in our stationary and craft drawer for inspiration... SSIMeetup.org
  • 22. And we wrote a simple story SSIMeetup.org
  • 23. Australia is home to (arguably) the oldest civilisations in the world. These are peoples whose culture was maintained for over 40,000 years by storytelling. Stories are powerful Why Stories? Because people, all people, all of us [you included], remember things best when told as a story SSIMeetup.org
  • 24. Critically, and very deliberately, we give our story a human angle We give the characters in our story a name and a back story. “Meet Jackie, she’s a successful young adult living in an apartment. Jackie has just got a new job and wants to move nearer to work.” SSIMeetup.org
  • 25. Think of this as mixing the [anodyne] use-case model with personas and Human Centred Design [In My Opinion] The way we normally present Use-Cases is an almost completely useless way to explain something to an audience. SSIMeetup.org
  • 26. Human Centred Design gives us a framework to test and explore “wicked” problems [In My Opinion] Digital Identity is a “wicked problem”. It is technically complicated, and socially / politically complex. SSIMeetup.org
  • 27. This is an example of storytelling in a business context... Business Stories are short and have a structure along the lines of: • This used to be the case • Then this happened • So we’re doing this • So that we can achieve this Our story structure is a little different, but shares much of the DNA. SSIMeetup.org
  • 28. You might recognise the similarity with “Situation; Complication; Resolution” Often attributed to McKinsey and related to the Minto Pyramid, you can find lots of material about this pattern on line. You’ll see that we use Situation; Resolution; Complication We put the complication last? Why? Well let’s see... SSIMeetup.org
  • 29. Important Point: Ask permission to tell the story first… “We’d like to explain SSI in a way that will help us all get on the same page and provide a framework for our conversation. It will take about 7 minutes. After that we can demonstrate the technology and discuss business models and any technical questions you may have. Is that OK?” SSIMeetup.org
  • 30. We introduce the story as having three parts Part 1 - The current, physical, world Why? To establish a shared experience Part 2 - The SSI world Why? To demonstrate how similar SSI is to the shared experience of the physical world Part 3 - The current digital world Why? To show the broken nature of centralised and federated systems - to give a “call for action” SSIMeetup.org
  • 31. So THIS is our SSI demo kit... SSIMeetup.org
  • 32. Let’s see it in action... SSIMeetup.org
  • 33. Part 1: The world we live in now What’s it like to rent a new apartment, now? SSIMeetup.org
  • 34. Meet Jackie, she’s a successful young adult living in an apartment. Jackie has just got a new job and wants to move nearer to work. SSIMeetup.org
  • 35. Jackie has a driving licence and pays one of the utility bills for the apartment. She keeps her driving licence in her wallet and the bills in a drawer of a desk at her apartment SSIMeetup.org
  • 36. These are physical “credentials”, they state • who issued them • who they were sent to, • and other information relevant to their purpose SSIMeetup.org
  • 37. Jackie has found an apartment she likes managed by “Highly Rated Rentals” SSIMeetup.org
  • 38. Highly Rated Rentals tell Jackie that they’d love to rent the apartment to her, and that she’ll need to provide some identity information, and her bank account details. SSIMeetup.org
  • 39. Jackie has just opened a new account at a bank, so she asks them for an account statement SSIMeetup.org
  • 40. Jackie takes the three documents with her to the rental agency... SSIMeetup.org
  • 41. And they take copies of everything. [… Jackie hopes they keep the copies very securely….] SSIMeetup.org
  • 42. Sometime (days) later, the rental agency call Jackie and tell her that everything went through OK, and can she come back to the office to sign the agreement, pay the bond, and pick up the keys? SSIMeetup.org
  • 43. Jackie goes back to Highly Rated Rentals and completes the transaction So now Jackie has keys to her new apartment and a new document to store SSIMeetup.org
  • 44. And that’s the world that most of us live in right now. We use physical documents to prove things, and we receive physical documents in return. SSIMeetup.org
  • 45. Part 2: The SSI world It’ll be quite like the current experience, but a bit better... SSIMeetup.org
  • 46. First we give Jackie a digital wallet. This is usually an app on Jackie’s phone but it can be any SSI capable secure storage device. SSIMeetup.org
  • 47. Now the physical documents are Verifiable Credentials. The digital credential and its contents are cryptographically signed by the issuer and addressed to Jackie SSIMeetup.org
  • 48. Jackie can share the credentials with whoever she chooses, in whole or in part, or even by proving that she has the credential (and that’s all they need to know). SSIMeetup.org
  • 49. Highly Rated Rentals tell Jackie they’d love to rent the flat to her, and they can do all the checks in seconds, but they still need the same information. SSI doesn’t change the law, nor does it need to. SSIMeetup.org
  • 50. Highly Rated Rentals send a “Proof Request” to Jackie’s wallet. Her wallet tells her what they want to know, and which of her verifiable credentials can answer those questions. SSIMeetup.org
  • 51. Jackie still needs to confirm her bank account details, so she connects with her new bank and gets them to send her a verifiable credential of her account. SSIMeetup.org
  • 52. Now she can use her Verifiable Credentials to respond to Highly Rated Rentals with a Proof Response SSIMeetup.org
  • 53. The proof response is cryptographically signed by Jackie, sent to Highly Rated Rentals, and contains the three things they asked about. SSIMeetup.org
  • 54. For each credential, Highly Rated Rentals can do four checks: • Who issued the credential (do they know and trust them?) • Was it issued to Jackie (is this hers?) • Has it been changed in any way? (has she changed the details?) • Has it been revoked? (important for some things) SSIMeetup.org
  • 55. They do this by checking the signatures of each issuing authority and any revocation lists. Importantly, they can do this without contacting the issuing authority as this would be a breach of privacy. This is our “ledger” - labelled lollipop sticks SSIMeetup.org
  • 56. The public signatures of issuing authorities, and other information that they choose to share, are stored in a trusted place. There are already 32 different places (methods) to write the information. SSIMeetup.org
  • 57. The verifiable credential includes a pointer to public information about the issuer, including the public keys they use for signatures. Issuers can choose where to store their information, so long as that location is trustworthy and a verifying party can find it and open it. SSIMeetup.org
  • 58. Jackie’s credentials pass the tests, and Highly Rated Rentals offer Jackie a Rental Agreement. This arrives at Jackie’s wallet as a new credential offered by Highly Rated Rentals. SSIMeetup.org
  • 59. Jackie accepts the offer, and the new credential is stored in her wallet along with her other exchanges with Highly Rated Rentals. Highly Rated Rentals get a confirmation that Jackie has accepted the offer. SSIMeetup.org
  • 60. Jackie pays the bond and picks up her keys. As you can see, SSI is pretty much like the current world Just more secure, more private, more efficient…. ... BETTER SSIMeetup.org
  • 61. Part 3: The broken promise of current digital identity models That’s all very cool, but that’s not the digital world we currently live in... SSIMeetup.org
  • 62. This “Sparkly Ball” was what we found in the craft drawer and decided to use as a prop for current digital identity systems. It stuck, and we’re fond of it, even if its sparkles are beginning to fall out! Introducing the sparkly ball SSIMeetup.org
  • 63. When we describe the sparkly ball in Australia, we use examples such as the “login with” systems of Facebook and Google, and the “identity systems” of AppleID, AusPost Digital ID, MyGovID, etc. SSIMeetup.org
  • 64. We explain that the Sparkly Ball is our euphemism for current centralised identity and federated identity systems SSIMeetup.org
  • 65. Each of these systems allocates you with an “identity” that you can use to authenticate yourself to other organisations in the network. Back to Jackie... SSIMeetup.org
  • 66. In return for telling the sparkly ball a bunch of stuff about herself, Jackie gets allocated an identifier... SSIMeetup.org
  • 67. When Jackie uses this identifier with her bank, the bank asks the Sparkly Ball to authenticate it… And the Sparkly Ball learns that Jackie is talking to the bank... SSIMeetup.org
  • 68. When Jackie uses this identifier with Highly Rated Rentals, they ask the Sparkly Ball to authenticate it… And the Sparkly Ball learns that Jackie is talking to the Highly Rated Rentals... SSIMeetup.org
  • 69. Everytime Jackie uses the identifier, the Sparkly Ball knows. Some Sparkly balls go to considerable efforts to try not to notice and to forget what they learn. Apple for example promises to forget after 30 days [page 6, here]. SSIMeetup.org
  • 70. Some try to “blind” themselves, covering their digital eyes and ears. But others don’t, and use the data they gain about you for their own reasons. Good or bad intentions, the architecture means that they are always in the loop SSIMeetup.org
  • 71. So we don’t like Sparkly Balls SSIMeetup.org
  • 73. Typical next steps in our conversations... At this point we usually offer to run one of our software demos. Then we start to explore their technical and business questions… “What’s on the ledger? [again] “How do we make money/reduce risk/improve our customer experience?” etc. SSIMeetup.org
  • 74. So there you have it, our simple way to demo SSI... The original LinkedIn Post and video that attracted Alex’s attention is on LinkedIn here We’ve since made a (slightly) improved recording of this approach here And we’ve built cartoon versions and even role played this with real people at meetups… And we’re writing other stories for Jackie... SSIMeetup.org
  • 75. We continue to look for new ways to support the adoption of SSI • Continue to sponsor research and student projects with Universities • Co-Chairs (APAC) for the Sovrin Guardianship Working Group • Actively explaining SSI to government and industry bodies • Promoting the commercial trial and adoption of SSI. [we’re not a charity!] SSIMeetup.org
  • 76. We’re still learning. We would be very interested to hear what’s working, or not, when you explain SSI. We’d be happy to connect! The last slide in this deck has the team’s full contact details... SSIMeetup.org
  • 77. Finally, I was asked to add a list of any books that have helped me understand identity better. I’m an avid reader. ALL stories explore identity in one way or another. This is a big and growing list... Here are some of the non-fiction and fiction books that have shaped my thinking Philosophy • Kwame Anthony Appiah - The Ethics of Identity [or listen to his excellent BBC Radio 4 Reith Lecture podcasts on identity] • AC Grayling - lots, but a nice introduction is “Thinking of Answers: Questions in the Philosophy of Everyday Life” • I’ve also struggled through others such as Kirkegaard, Wittgenstein, Kant and Russell • And I had the usual youthful fascination with existentialism [Sartre, Camus, Goethe, de Beauvoir, Kundera etc.] Non-Fiction • Rachel Botsman - Who Can you Trust • Soshana Zuboff - The Age of Surveillance Capitalism • Yuval Noah Hurari - Sapiens, Homo Deus, Lessons for the 21st Century • Hans Rosling - Factfulness • Richard H. Thaler - Misbehaving: How Economics Became Behavioural • Daniel Kahneman - Thinking, Fast and Slow • Dan Ariely: Predictably Irrational • Randall Munroe - Thing Explainer • Nassim Nicholas Taleb - Antifragile Fiction: • Ben Elton - Identity Crisis • Philip K Dick - Flow My Tears, The Policeman Said [and other titles] • Daniel Suarez - Daemon • Richard Morgan - Altered Carbon • Pretty well everything by William Gibson SSIMeetup.org
  • 78. The SSI team at 460degrees are John Phillips, Jo Spencer and Jack Dwyer. We are passionate students, evangelists, and enablers of Self-Sovereign Identity. We believe that Self-Sovereign Identity is a better model for digital privacy, security and trust for people, organisations, and things on a global scale. We see SSI as a disruptive but positive force, a change for good. We want to be a catalyst for that change, helping people and organisations navigate their way to a better digital future. Thanks for the chance to share John Phillips Partner | Innovation | Self-Sovereign Identity Email: john.phillips@460degrees.com LinkedIn: https://www.linkedin.com/in/johnphillips11kps Twitter: @11dot2john Jo Spencer Champion | Payments | Self-Sovereign Identity Email: jo.spencer@460degrees.com LinkedIn: https://www.linkedin.com/in/jospencer-1pg Twitter: @spencerjed Jack Dwyer Development Lead | Self-Sovereign Identity Email: jack.dwyer@460degrees.com SSIMeetup.org