Photo by Chris Barbalis on Unsplash
Laurent Hardy
do research, learn the technology,
test the product, engage with the community, compare with other projects, read the documentation, look for red flags
personal
legal
digital
Privacy | Increase the level of privacy of our identity with enough flexibility in establishing our identity |
Context | Keep the identity system compatible with its context |
Practicality | Identity must be helpful for everyday activities |
Provenance | Preserve the provenance of identifiers |
Risks | Lower the risks attached to establishing an identity |
Intermediaries | The dilemma of Distributed Ledger Technologies in the case of identity |
source: consensys podcast
Photo by Mike Enerio on Unsplash
Photo by Noah Silliman on Unsplash
infrastructure
identity
I'm 32
I have 1.764€ on my bank account
I know who Satoshi Nakamoto is
identifiers
verifiable claims
Identity rooted in Ethereum blockchain | User reputation system | |
Passwordless, Single Sign-On | Browser to mobile app communication | |
Simplified user centric keys management | Identity verification / KYC | |
Binding digital signatures | Private chain support |
source: Self Sovereign Identity in Zug