Remove tags didcomm
article thumbnail

DIDComm and the Self-Sovereign Internet

Phil Windley

Summary: DIDComm is the messaging protocol that provides utility for DID-based relationships. DIDComm is more than just a way to exchange credentials, it's a protocol layer capable of supporting specialized application protocols for specific workflows. Comparing DIDComm to the venerable TCP/IP protocol suite does not go too far.

article thumbnail

The Self-Sovereign Internet

Phil Windley

I spoke on DIDComm and the Self-Sovereign Internet. If you're not up to speed with DIDComm and how it creates a secure overlay network on TCP/IP, you should be. But, because of it's flexibility and the ability to define protocols on top of DIDComm messaging, it promises to be as important as the identity layer it enables.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Learning Digital Identity Podcasts

Phil Windley

Other topics include the relationship between DIDComm and identity, how self-sovereign identity relates to IoT, and the relationship between trust, confidence, and governance. Tags: ldid podcast identity ssi We also talked about Kim Cameron's Laws of Identity and how they help analyze identity systems and their features.

CTO 52
article thumbnail

The Self-Sovereign Internet of Things

Phil Windley

But I left out things because I hadn't yet provided a foundational discussion of DIDComm-enabled digital relationships that's necessary to really understand how SSI can transform IoT. But the ability of DIDComm messaging to support higher-level application protocols means that the experience can be much richer. Here's s simple example.

article thumbnail

Leveraging the Identity Metasystem

Phil Windley

Similarly, in the identity metasystem, knowing how DIDs, DID Registries, DIDComm, and verifiable credential exchange protocols function means that we can more easily understand the behavior of a system built on top of it, like the health pass ecosystem. Tags: identity metasystem nft security ssi fidelity verifiable+credentials.

System 52
article thumbnail

Operationalizing Digital Relationships

Phil Windley

Further, these relationships create a secure communications channel using the DIDComm protocol. Because of the built-in mutual authentication, DIDComm messaging creates a batphone-like experience wherein each participant knows they are communicating with the right party without the need for further authentication.

article thumbnail

Alternatives to the CompuServe of Things

Phil Windley

Tags: identity ssi didcomm ssiot. Alternate architectures can give us all the benefits of connected devices without the specter of Big Tech intermediating every aspect of our lives. Photo Credit: modem and phone from Bryan Alexander (CC BY 2.0).