-
(If this is more suited to some ActivityPub forum, I can take it there instead. I broach it here because I think standards ultimately need to be steered by implementations, and I think this implementa…
-
A wealth of applications require strong authentication and long-lived secure identities. The Internet requires a common continuously evolving strong identity layer. This would make the Internet safer,…
-
Can we use uport for contributor identity management?
Do we then still need metamask - is it an alternative?
https://developer.uport.me/
-
Survey Q1 + Starting thesis ```10 jan``` {job next to thesis}
Also interested in the problem of _online trust_. General intro and overview by Bruce {rockstar of security research} [Ten Risks of PKI…
-
Create a section that speaks directly to all ten principles from [TPTSSI](https://www.lifewithalacrity.com/2016/04/the-path-to-self-soverereign-identity.html).
If various principles are represented…
-
In this bounty, we'd like to award the most innovative and promising projects that utilize Tezos-based self-sovereign identity in a well-designed game.
Blockchains and asymmetric cryptography have …
-
**As a** Cleargraph user
**I want to** create ERC 725 identity contracts
**So that I** can use a persistent, self-sovereign identity in decentralized applications
-
[This is a follow-up to the conversation that started here: [https://github.com/solid/specification/issues/217#issuecomment-761859764](https://github.com/solid/specification/issues/217#issuecomment-76…
-
Survey plus thesis placeholder. Still exploring directions for research. _starting survey today_ :joy_cat: Due to permanent job msc time is limited to 4 hours/workday. (part-time not allowed US cultur…
-
# Owned vs. Unowned Claims and Self-Sovereign Identity
Natalie Smolenski
Cultural Anthropologist and Business Development
Learning Machine
When Christopher Allen presented ten principles o…