Remove tags decentralized identifiers
article thumbnail

Using X.509 Certs for DID Provenance

Phil Windley

When you used a verifiable credential to prove something about yourself, the verifier can know cryptographically: (1) the identifiers for the issuer, (2) the credential hasn't been tampered with, (3) the credential was issued to you, and (4) the credential hasn't been revoked. Summary: The abundance of X.509

Data 69
article thumbnail

Cloudless: Computing at the Edge

Phil Windley

Cloudless computing uses cryptographic identifiers, verifiable data, and location-independent compute 1 to move apps to the data wherever it lives, to perform whatever computation needs to be done, at the edge. The future world will be more decentralized than the current one. DEED - cropped) Tags: cloudless picos iot tesla

Internet 115
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Web3: Self-Sovereign Authority and Self-Certifying Protocols

Phil Windley

First, her tweet about the article said "You might notice I wrote this whole post on the 'decentralized web' without using the words 'decentralized' or 'distributed' even once. Decentralization is a good way to achieve these things, but I can imagine decentralized services (in the technical sense) that don’t achieve either of these.

article thumbnail

The Case for Decentralized Identity

Phil Windley

Summary: We cannot decentralize many interesting systems without also decentralizing the identity systems upon which they rely. We're finally in a position to create truly decentralized systems for digital identity. I go back and forth between thinking decentralization is inevitable and thinking it's just too hard.

System 92
article thumbnail

Comparing X.509 Certificates with SSI

Phil Windley

509 certificates also bind the public key (as an identifier) to real-world attributes. Rather SSI uses verifiable credentials to assert information about a decentralized identifier in a trustworthy way. The identifier lives as long as Alice needs it to. 509 pki decentralized+identifiers. They should.

Banking 137
article thumbnail

Seeing Like the TSA

Phil Windley

Universities are decentralized places with lots of innovative people pursuing their own goals. Building systems that support decentralized workflows and individual decisions, without getting in the way, is hard. Tags: legibility decentralization security flying identity university. They are more feudal than corporate.

System 90
article thumbnail

Secure Pico Channels with DIDs

Phil Windley

Summary: Decentralized identifiers are a perfect complement to the event channels in picos and provide the means of performing secure messaging between picos with little effort on the developer's part. Picos are Internet-first actors that are well suited for use in building decentralized soutions on the Internet of Things.