article thumbnail

The Self-Sovereign Internet

Phil Windley

I spoke on DIDComm and the Self-Sovereign Internet. The foundation of the self-sovereign internet is built on autonomic identifiers. Alice) who, by virtue of knowing the authentication factors (e.g. Alice uses her private key to sign statements that authenticate herself and authorize use of the identifier.

article thumbnail

DIDComm and the Self-Sovereign Internet

Phil Windley

Because of its general nature and inherent support for self-sovereign relationships, DIDComm provides a basis for a self-sovereign internet much more private, enabling, and flexible than the one we've built using Web 2.0 Once Bob's agent receives the message, it authenticates that it came from Alice and decrypts it. technologies.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Three Impediments to the Internet of Things

The Investing Edge

This post is the final installment of a three-part series on the Internet of Things, along with What Nest Just Did for the Internet of Things and Why the Internet of Things is also Industry 4.0. Also, existing Internet connections provide for transactions, not negotiation. Security needs to improve.

Internet 151
article thumbnail

The Self-Sovereign Internet of Things

Phil Windley

While decentralized identifiers and verifiable credentials have much to offer the Internet of Things (IoT), the secure messaging subsystem promises an IoT that goes well beyond those initial scenarios. The follow-on post goes deeper into what a true Internet of Things founded on SSI can provide. Updating Firmware.

article thumbnail

Using X.509 Certs for DID Provenance

Phil Windley

For that, they need to take the issuer's decentralized identifier (DID) that they got from credential presentation and determine who it belongs to. At the most recent Internet Identity Workshop , Drummond Reed gave a session on how X.509 At some later time, Alice presents the credential to the verifier (Certiphi).

Data 69
article thumbnail

The LLM Misinformation Problem I Was Not Expecting

SecureWorld News

The prolific use of Artificial Intelligence (AI) Large Language Models (LLMs) present new challenges we must address and new questions we must answer. In that particular case, however, they sought supporting materials in a manner similar to the use of an internet search engine. It is not an authentication protocol.

article thumbnail

Nintendo Resurrects N64 and Sega Genesis Controllers for the Switch

Gizmodo

While tonight’s Nintendo Direct presentation was all about games—and a questionable Super Mario movie casting decisions—Nintendo also announced a new expansion pack for the Nintendo Switch Online’s all-you-can-play retro gaming collection that adds N64 and Sega Genesis games. For those who want a more authentic retro… Read more.