A protocol for decentralized identities & reputations which requires security-by-design & privacy-by-design. The protocol should provide a whole solution, while remaining Blockchain-agnostic.
All participants on the network should fully control identities they create. Each identity should be a First Class Person, supposed for humans, machines, and/or miscellaneous entities (e.g., organization, corporation, country, computer, fridge, phone, drone, etc.).
All identities should be able to make statements about any other identity within their network. Also, they should be able to decide for themselves which other identities they want to communicate with.
The purpose of such a protocol would be to create and organize reliable electronic trust networks, without the system deciding for any party which other parties are trustworthy or not.
It should be fully distributed both in its network topology and power mechanism. The least amount of sensitive information should have to be processed, or sent, in order to reliably verify statements from other (trusted) parties. This will help both humans and entities in weighing risks for themselves, before participating in any kind of interaction on a network.
Tasks:
The purpose of this WG is to identify and research techniques (ideally automated techniques) for detecting suspicious activities, one-way authentication models, a privacy-friendly identity & reputation methodology, and to come up with the best Blockchain-agnostic solutions;
Describe an automated, decentralized system or set of tools that market participants will be able to use to quickly determine whether they'd want to interact with any other party. Investigate what other projects can do to help the eco-system. Standardize these solutions and come up with a name (i.e. "User-in-Control IDs") for the standard so that developers can code their identity & reputation systems to conform to it (giving the market confidence in decentralized identities).
A protocol for decentralized identities & reputations which requires security-by-design & privacy-by-design. The protocol should provide a whole solution, while remaining Blockchain-agnostic.
All participants on the network should fully control identities they create. Each identity should be a First Class Person, supposed for humans, machines, and/or miscellaneous entities (e.g., organization, corporation, country, computer, fridge, phone, drone, etc.).
All identities should be able to make statements about any other identity within their network. Also, they should be able to decide for themselves which other identities they want to communicate with. The purpose of such a protocol would be to create and organize reliable electronic trust networks, without the system deciding for any party which other parties are trustworthy or not.
It should be fully distributed both in its network topology and power mechanism. The least amount of sensitive information should have to be processed, or sent, in order to reliably verify statements from other (trusted) parties. This will help both humans and entities in weighing risks for themselves, before participating in any kind of interaction on a network.
Tasks:
All thoughts are welcome.