1 of 40

Self-Sovereign Identity and Open Source Software

Richard Esplin�Product Manager Evernym�Hyperledger Indy project and the Sovrin identity Network

November 12, 2018

2 of 40

  • Empower global SSI communities
  • Open to everyone interested in SSI
  • All content is shared with CC BY SA

SSIMeetup objectives

Alex Preukschat @SSIMeetup @AlexPreukschat

Coordinating Node SSIMeetup.org

https://creativecommons.org/licenses/by-sa/4.0/

SSIMeetup.org

3 of 40

4 of 40

What is Self Sovereign Identity?

SSIMeetup.org

5 of 40

Carriers of Identity

6 of 40

Digital Identity

7 of 40

Also Known As

User-Centric Identity

User-Controlled Identity

User-Owned Identity

Bring Your Own Identity

SSIMeetup.org

8 of 40

A Brief History of Open Source

SSIMeetup.org

9 of 40

Sharing Early Software

The money is in the hardware, so why bother protecting software?

SSIMeetup.org

10 of 40

Unix Culture

Software isn’t our business.

Unix is academic.

Sharing gets things done.

11 of 40

Homebrew

Hobbyist exploring the limits of computing.

Bill Gates:�Sharing software is theft.

12 of 40

Free Software

Free as in Freedom. (Free as in Speech.)

Sharing is a moral duty.

Proprietary software keeps users divided and helpless.

Proprietary software does not allow users to have control of their computing.

Copyleft: hack copyright to enforce sharing.

13 of 40

Open Source

Open source is better engineering.

With many eyes, all bugs are shallow.

Scratch your own itch.

Don’t reinvent the wheel.

Collaboration is fun.

14 of 40

Open Culture

Art and media

Legal access

Scientific data access

Scientific hardware

Bio-hacking

Maker movement

SSIMeetup.org

15 of 40

Principles of FLOSS

SSIMeetup.org

16 of 40

Free Software

Open Source Software

Libre Software

SSIMeetup.org

17 of 40

The Four Freedoms

0. Run the program for any purpose.

1. Study how the program works.

2. Redistribute the program.

3. Improve the program, and redistribute the improvements.

18 of 40

Open Source Definition

  • Free Redistribution
  • Source Code Availability
  • Derived Works Allowed
  • Integrity of the Author’s Source Code
  • No Discrimination Against Persons or Groups
  • No Discrimination Against Fields of Endeavor
  • Distribution of License
  • License Must Not Be Specific to a Product
  • License Must Not Restrict Other Software
  • License Must Be Technology-Neutral

SSIMeetup.org

19 of 40

Commercial Open Source

Provides customers with:

  • A focus on support
  • Vendor independence
  • Vendor risk mitigation
  • An improved negotiating position
  • Compliance with policy
  • Fast adoption (no purchase necessary!)
  • An ancillary social benefit

And has a reputation for:

  • Low price
  • Security
  • Innovation
  • Transparency
  • Interoperability

SSIMeetup.org

20 of 40

Three Types of Licenses

  • Gift:� Apache
  • Sharing with Rules:� GPL
  • In-Between:� LGPL

Bruce Perens, 2009�https://www.datamation.com/osrc/article.php/3803101/Bruce-Perens-How-Many-Open-Source-Licenses-Do-You-Need.htm

21 of 40

Three Types of Licenses

1. Gift:

Maximize adoption, standards, and collaboration.

Usually community governed.

Apache, CC0, BSD, MIT,�Public Domain, Artistic

SSIMeetup.org

22 of 40

Three Types of Licenses

2. Sharing with Rules:

Share-alike, including derivatives.

Respect the user, while allowing the copyright holder a privileged position (a competitive advantage).

Often vendor driven.

GPL, AGPL, CC-SA

SSIMeetup.org

23 of 40

Three Types of Licenses

3. In-Between:

Share-alike changes to the received work, but not to derivatives.

Respect the user, retain product control, but allow adoption in a wide set of derivatives.

LGPL, MPL

SSIMeetup.org

24 of 40

Good Reads

25 of 40

Open Source and SSI

SSIMeetup.org

26 of 40

Ten Principles of Self-Sovereign Identity

  • Users must have an independent existence.
  • Users must control their identities.
  • Users must have access to their own data.
  • Systems and algorithms must be transparent.
  • Identities must be long-lived.
  • Information and services about identity must be transportable.
  • Identities should be as widely used as possible.
  • Users must agree to the use of their identity.
  • Disclosure of claims must be minimized.
  • The rights of users must be protected.

Christopher Allen, 2016�http://www.lifewithalacrity.com/2016/04/the-path-to-self-soverereign-identity.html

27 of 40

A Brief Story

SSIMeetup.org

28 of 40

Alice uses a proprietary SSI solution . . .

Alice

Bob

Soul-less Mega-corp

SSIMeetup.org

29 of 40

Alice uses a proprietary SSI solution . . .

Alice

Bob

Soul-less Mega-corp

$$

SSIMeetup.org

30 of 40

Alice uses a proprietary SSI solution . . .

Alice

Bob

Soul-less Mega-corp

$$$$$$

X

SSIMeetup.org

31 of 40

Alice uses an open SSI solution . . .

Alice

Bob

Soul-less Mega-corp

SSIMeetup.org

32 of 40

Alice uses an open SSI solution . . .

Alice

Bob

Soul-less Mega-corp

$$

SSIMeetup.org

33 of 40

Alice uses an open SSI solution . . .

Alice

Bob

Soul-less Mega-corp

$$$$$$

SSIMeetup.org

34 of 40

Alice uses an open SSI solution . . .

Alice

Bob

Soul-less Mega-corp

$$$$$$

Carol

$$

SSIMeetup.org

35 of 40

More Than Code

SSIMeetup.org

36 of 40

Creating Trust

Moral Pressure

Reputational Pressure

Institutional Pressure

Security Systems

Bruce Schneier, 2012�Liars and Outliers: Enabling the Trust that Society Needs to Thrive

37 of 40

The BLT

Business

Legal

Technical

38 of 40

Sovrin Trust Framework

39 of 40

Evernym’s Design Requirements

A reliable self-sovereign solution:

  • Provides an open source option
  • Implements open standards
  • Is private by design
  • And private by default
  • Exists within a trust framework

40 of 40

Self-Sovereign Identity and Open Source Software

Richard Esplin�Product Manager Evernym�Hyperledger Indy project and the Sovrin identity Network

November 12, 2018