ITP Camp 2018
154

Self Sovereign Identity & Web 3.0 First Principles: Create your own Meta-Identity w/ uPort, Keybase, Blockstack & Magic Words!

Web3.0 development nears a tipping point, as civil society finally gets the bill for all our "free" social media accounts, email, search and other basic web platforms. We are giving away the single most valuable asset remaining on Earth, our personal data, and we recieve little to none of the transformative AI insights and business process recommendations that are generated by carefully analyzing each user's every word, using sentiment analysis and other semantic web tools. In giving away free and total access to our online behaviors and every word we type, we have helped power a juggernaut AI training framework for Google, Fb, Amazon, etc. who continuously fail to protect this precious resource, as evidenced by the Cambridge Analytica/FB scandal, and associated social engineering, meant to disrupt the very fabric of our political process. Had enough? Want to understand alternative options and learn how to build the future? The future web will be decentralized, and likely see the decoupling of data from the application layer. Self-sovereign identity is an essential aspect of designing a better data model. So how can we rebuild "The Web of Trust" using Self-Soverign Identity?

As a very basic starting point, identity is the human capacity – rooted in language – to know ‘who’s who’ (and hence ‘what’s what’) Identity is hard to pin down... A Concept

A physical card

A range of alternatives

Always Evolving

Self-Sovereign Identity

Every individual human being is the original source of their own identity

Identity is not an administrative mechanism for others to control

No one may charge rent or be able revoke another's identity

Each individual is the root of their own identity, and central to its administration

The role of names, citizenship, licenses & other credentials should be distinct as "verified claims" offered by their issuers, not as identifiers of a human being

We need Self-Soverign Identity

IN ORDER TO FORM ACCESSIBLE PATHWAYS BETWEEN:

LOCAL COMMUNITIES

LEADING RESEARCH INSTITUTES

DOMAIN EXPERTS, SCIENTISTS, POLICY MAKERS

ARTISTS AND INFLUENCERS

ECO­FEEDBACK SYSTEMS AND SENSE INTERFACES

& COLLECTIVE INTELLIGENCE, AI & GOVERNANCE Frameworks.

This workshop and talk will provide an opportunity to dive right in and create your self-sovereign identity using a number of free and open source software (Keybase.io, UPort, Civic, Blockstack)

We will create a working Self Sovereign Identity dApp (decentralized application) that allows users to generate their identity, and to prove ownership of other social profiles using social proofs and linked hashes. You will end the workshop with the ability to say to someone, hey- send a pile of btc to myname.id We will utilize blockchain protocols such as Bitcoin and Ethereum, but no prior technical knowledge is necessary.

We will touch on distributed file systems such as Keybase which use this identity model to coordinate content addressable namespaces to facilitate content rich communication networks that include customizable permissions for social interactions with extended privacy, security and portability across multiple platforms. .

Reclaim your data, as the entry point into Web3.0 Interaction Design, Incentive Management for Crowd Sourcing and P2P business models, and Blockchain applications where the user controls their data, which stands apart from the application layer. Coordination of complex networks requires a user-centric data and identity model and the addition of cryptoeconomics and other cryptographic primitives, such as homomorphic encryption and zero knowledge proofs, and other trustless coordination and consensus mechanisms introduce new superpowers for building increased user agency online. The workshop will focus on generic use-cases, and high-level abstractions of the self sovereign identity concept, and then we will dive into specific use cases that utilize specific products and protocols. The focus will be on conveying a general understanding of how powerful this concept will be in future web technologies, and within the context of current cloud.

This workshop outline is a living draft and additional links and info is forthcoming.


Comments

You must be signed in to comment.

diana s June 4, 2018, 7:42 pm

ah i can\'t make this one but sounds interesting!

jonnydubowsky June 5, 2018, 2:43 am

If I change it to 6:30-8pm would that be better for anyone? I plan on giving several talks, but please let me know if you have time requests.

June 6, 2018, 11:29 am

@jonnydubowsky Would love to come - I could come after 7pm

jonnydubowsky June 8, 2018, 10:28 am

Thanks for coming to the session! Our round-table portion was full of great questions and comments, and I look forward to hacking away with you (and anyone who wants to join us) on an implementation of Self-Soverign Identity that uses the Colony.io hackathon as a target for our brainstorming. I will post a Project on the camp site, detailing what we discussed, and outlining a few high-level examples of dApps we can make together. I will create a Keybase group, and help anyone who isn\'t able to get their Keybase profile setup. I\'ll also share instructions for how to connect to the group and use the chatroom to host our conversations. We can then create a basic survey to select a single project to work on together, before the June 24th deadline. I will clean up this slide deck, but here is the draft I was using for the presentation: https://docs.google.com/presentation/d/1PsjidI_uXhKhGeGSmUe5smMl7Qh_jXbITicuQ499X1Y/edit?usp=sharing
Here is a link to the Colony.io hackathon: https://github.com/JoinColony/colonyHackathon/blob/master/docs/project-brainstorming.md
and their main website:
https://colony.io/

Colony\'s Consensus and Corporate/Organization Governance platform is a great example of the type of framework which is based on a self-soverign identity model, and extends the value stream of this identity model to provide some pretty useful and effective tools that are not possible (to the same degree of effectiveness) without this identity model, and a tokenized incentive and validation infastructure. More links to follow.