Awesome
Rebooting the Web of Trust V: Boston (October 2017)
This repository contains documents related to RWOT5, the fifth Rebooting the Web of Trust design workshop, which is to run in Boston, Massachusetts, on October 3rd-5th, 2017. The goal of the workshop was to generate five technical white papers and/or proposals on topics decided by the group that would have the greatest impact on the future.
Please see the Web of Trust Info website for more information about our community, including upcoming events.
Topics & Advance Readings
In advance of the design workshop, all participants produced a one-or-two page topic paper to be shared with the other attendees on either:
- A specific problem that they wanted to solve with a web-of-trust solution, and why current solutions (PGP or CA-based PKI) can't address the problem?
- A specific solution related to the web-of-trust that you'd like others to use or contribute to?
Please see the Advance Readings README for a listing of all of the papers.
Completed Papers
The design workshop exceeded its goal of three to five white papers with a total of eight publications:
ActivityPub: From Decentralized to Distributed Social Networks (Text)
by Christine Lemmer-Webber & Manu Sporny
An overview of the W3C ActivityPub protocol.
Amira 1.0.0 (Text)
by Joe Andrieu & Team
This paper reinterprets Christopher Allen’s Rebooting the Web of Trust user story through the lens of the Information Lifecycle Engagement Model. It presents a human-centric illustration of an individual’s experience in a self-sovereign, decentralized realization of the Web of Trust as originally conceived by Phil Zimmerman for PGP.
The DCS Theorem
by Greg Slepak & Anya Petrova
A probability proof of the DCS Triangle. Why can't decentralized consensus systems have all three of decentralization, consensus, and scale? Plus, two methods for getting around these limitations.
A Decentralized Approach to Blockcerts Credential Revocation (Text)
by João Santos & Kim Hamilton Duffy
Blockcerts are blockchain-anchored credentials with a verification process designed to be decentralized and trustless. This proposal describes an alternate method of issuing Blockcerts using Ethereum, which allows for a new form of revocation by either the issuer or the recipient.
Engineering Privacy for Verified Credentials: In Which We Describe Data Minimization, Selective Disclosure, and Progressive Trust (Text)
by Lionel Wolberger, Brent Zundel, Zachary Larson, Irene Hernandez & Katryna Dow
We often share information on the World Wide Web, though some of it is private. The W3C Credentials Community Group focuses on how privacy can be enhanced when attributes are shared electronically. In the course of our work, we have identified three related but distinct privacy enhancing strategies: "data minimization," "selective disclosure," and "progressive trust." These enhancements are enabled with cryptography. The goal of this paper is to enable decision makers, particularly non-technical ones, to gain a nuanced grasp of these enhancements along with some idea of how their enablers work. We describe them below in plain English, but with some rigor. This knowledge will enable readers of this paper to be better able to know when they need privacy enhancements, to select the type of enhancement needed, to assess techniques that enable those enhancements, and to adopt the correct enhancement for the correct use case.
Identity Hubs Capabilities Perspective (Text)
by Adrian Gropper, Drummond Reed & Mark S. Miller
Identity Hubs as currently proposed in the Decentralized Identity Foundation (DIF) are a subset of a general Decentralized Identifier (DID) based user-controlled agent, based on ACLs rather than an object-capabilities (ocap) architecture. Transitioning the Hubs design to an ocap model can be achieved by introducing an UMA authorization server as the control endpoint.
Linked Data Capabilities (Text)
Christine Lemmer-Webber & Mark S. Miller
Linked Data Signatures enable a method of asserting the integrity of linked data documents that are passed throughout the web. The object capability model is a powerful system for ensuring the security of computing systems.
Veres One DID Method (Text)
by Manu Sporny & Dave Longley
The Veres One Ledger is a permissionless public ledger designed specifically for the creation and management of decentralized identifiers (DIDs). This specification defines how a developer may create and update DIDs in the Veres One Ledger.
When GDPR becomes real, and Blockchain is no longer Fairy Dust (Text)
by Marta Piekarska, Michael Lodder, Zachary Larson & Kaliya Young (Identity Woman)
This document describes the GDPR requirements and the different approaches to digital identity solutions and finally explains why distributed ledger technology may offer an opportunity for enterprises to simplify data management solutions that are GDPR compliant.
Complete Rebooting the Web of Trust Listing
A different repository is available for each of the Rebooting the Web of Trust design workshops:
- Rebooting the Web of Trust I: San Francisco (November 2015)
- Rebooting the Web of Trust II: ID2020 (May 2016)
- Rebooting the Web of Trust III: San Francisco (October 2016)
- Rebooting the Web of Trust IV: Paris (April 2017)
- Rebooting the Web of Trust V: Boston (October 2017)
- Rebooting the Web of Trust VI: Santa Barbara (March 2018)
- Rebooting the Web of Trust VII: Toronto (September 2018)
- Rebooting the Web of Trust VIII: Barcelona (March 2019)
- Rebooting the Web of Trust IX: Prague (September 2019)
- Rebooting the Web of Trust X: Buenos Aires (March 2020)
- Rebooting the Web of Trust XI: Netherlands (September 2022)
License
All of the contents of this directory are licensed Creative Commons CC-BY their contributors.