Decentralized Identifiers (DIDs)�& Self-Sovereign Identity (SSI)
A Non Technical Discussion�
Helen Garneau
Vice President of Marketing
helen@sovrin.org
CCG Call�October 8, 2019
Session Objectives
Audience Segmentation�Segment the nontechnical audience and determine their needs and ideal outcomes for the interaction
Simplify Key Terms �Identify examples of problematic language in the decentralized identity community space and why
Connecting the dots�Libraries, tools and resources to help articulate and educate
Objective 1
Audience Segmentation
Identify your Audience first
Each audience has a different knowledge base, �different needs and different expectations. �
Omit Irrelevant Detail
Readers of the Lord of the Rings don’t need to know which finger of which hand the ring goes on. It is just not critical to the plot.
What are the critical plot elements to this technology? �What can be left out and for which audience?
“Develop empathy.�A focus on operational efficiency incentivizes employees to obsess over what is good for the company and ignore how policies and processes irritate the customer. Sadly, few companies consistently practice the steps they need to build and apply empathy: Most employees never learn to dismantle judgment; ask good questions; listen actively; integrate what they hear into understanding; and then imagine new solutions.”
Ignite Customer-Centric Thinking Companywide��Advanced Level: Mindset Practices For Marketing Innovation��
-Laura Ramos and Jim Nail� Forrester� July 26, 2019
Definitions
Key Use Cases
Features
Objective 2
Simplify Key Terms
Key Terms
Sovrin Foundation - Word Soup��public | proprietary | unanchored | resolvable | decentralized identifiers | DID | decentralized digital identities | ID | identity | identifications | identifiers | identities | keys | discoverability | private DIDs | peer DIDs | DID Documents | DID Methods | DID resolution | Resolver | Protocol | schemas | your own identity | owning your identity | control your identity | governance | standards | open source | self-sovereign identity | blockchain | distributed ledger technology | multisource identity | Metasystem | agents | hubs | DIF | ID2020 | Veres One | Sovrin Foundation | Sovrin Network | MyData | IIW | TPAC | W3C Working Group | W3C Community Groups | Verifiable Credential | Zero Knowledge Proof | Hyperledger | Indy | Aries | Ursa |
………….
Problems of Online Digital Identity
The Proximity Problem—The proximity problem is as old as the familiar cartoon with the caption "On the Internet, nobody knows you're a dog." Because we're not interacting with people physically, our traditional means of knowing who we are dealing with are useless. In their place, we've substituted username/password-based authentication schemes. The result is that people's identity information is replicated in multiple identity silos around the internet.
�The Scale Problem—Digital identity currently relies on hubs of identity information. We login using Facebook or Google—huge identity providers—to gain access to many other sites and services. But for every place that uses one of these big identity providers, there are dozens that will never be part of the social login system. Many businesses are leery of giving up control of their customer information to another business that might decide to change things up next week. This is the same concern that was holding back online services in the days of CompuServe during the 1980s.
�The Flexibility Problem—Many of the so-called "identity solutions" in play today are limited by fixed schema or attribute sets. For example, GOV.UK Verify is a universal identity assurance system for UK citizens, but it has a limited data set. And it's unlikely that it could reasonably expand whatever schema it has to cover all use cases, even if they were inclined to do so.
�The Privacy Problem—Current digital identity solutions rely on collections of data which are often collected without the data subject's knowledge. The data is replicated over and over again in different systems. Third parties use universal identifiers like Social Security Numbers or phone numbers to correlate identity information, again without the subject's knowledge.
�The Consent Problem—Worse still, the data in these thousands of identity silos is often shared with other companies or organizations without the data subject’s consent. Sometimes this is done in the service of the subject, but more often it's done in the service of the bottom line of the organization who controls the silo. Selling data is big business.
Phil Windley, Windley.com, �Fixing the 5 problems of digital identity, 10/31/2017�http://www.windley.com/archives/2017/10/fixing_the_five_problems_of_internet_identity.shtml
Simplified
Verifiable Credentials
Verifiable Credentials Data Model 1.0
Expressing verifiable information on the Web
W3C Proposed Recommendation 05 September 2019
Use Metaphors
As Aristotle tells us, metaphor “delights.” It also helps us to visualize complex concepts.���“The likelihood of transforming matter into energy is something akin to shooting birds in a dark country where there are only a few birds.”�� - Albert Einstein, � AAAS winter meeting� Pittsburg 1935
Simplified
DIDs - W3C Definitions
Decentralized Identifier (DID): A globally unique identifier that does not require a centralized registration authority because it is registered with distributed ledger technology or other form of decentralized network. The generic format of a DID is defined in this specification. A specific DID scheme is defined in a DID method specification.
Decentralized Identifiers (DIDs) allow for exceptional user-driven control and overall reliability of publicly resolvable, provable identifiers. While DIDs share many features with extant identity systems, no other system combines all the features designed into DIDs.
Decentralized Identifiers (DIDs) v0.13�Data Model and Syntaxes �Final Community Group Report �13 August 2019
What �DIDs Do
What �DIDs Do
Use Cases for Decentralized Identifiers �Draft Community Group Report 11 February 2019 �W3C Editor's Draft 02 July 2019
User Passwordless Authentication
Legal Entity Authentication
Remote Onboarding
Physical Credential Verification
Digital Signatures
Costly Regulatory Data Compliance Policies
Use �Benefits
Fintech
Government
Know Your Customer (KYC)
Banking
NGO
Healthcare
Enterprise
Law
Security
Education
Use �Cases
Some Sources*������*not all
Objective 3
Connecting the Dots with Style
Embrace a Less Formal Register
Which would you prefer to read?
“Inhalation of vapor phase particulate matter chemical contaminants from biomass combustion in domestic settings is a significant contributor to local disease burden.”
“Domestic wood smoke causes local health problems.”
Use Graphics to Explain Complex Processes
What does a DID �look like
Explain the relationship between parties visually
Use Graphics to Explain Complex Processes
General Tips for Writing
Summary
Don’t be �this guy