Skip to content
RWOT5 in Boston, Massachusetts (October 2017)
Branch: master
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
draft-documents Update README.md Aug 22, 2018
event-documents Update final-debriefing.md Oct 18, 2017
final-documents
supporting-files DID Primer Sep 22, 2017
topics-and-advance-readings Deprecated Notice posted Sep 25, 2018
.DS_Store
README.md

README.md

Rebooting the Web of Trust V: Boston (October 2017)

This repository contains documents related to RWOT5, the fifth Rebooting the Web of Trust design workshop, which is to run in Boston, Massachusetts, on October 3rd-5th, 2017. The goal of the workshop was to generate five technical white papers and/or proposals on topics decided by the group that would have the greatest impact on the future.

Please see the Web of Trust Info website for more information about our community, including upcoming events.

Topics & Advance Readings

In advance of the design workshop, all participants produced a one-or-two page topic paper to be shared with the other attendees on either:

  • A specific problem that they wanted to solve with a web-of-trust solution, and why current solutions (PGP or CA-based PKI) can't address the problem?
  • A specific solution related to the web-of-trust that you'd like others to use or contribute to?

Please see the Advance Readings README for a listing of all of the papers.

Completed Papers

The design workshop exceeded its goal of three to five white papers with a total of eight publications:

ActivityPub: From Decentralized to Distributed Social Networks (Text)

by Christopher Lemmer Webber & Manu Sporny

An overview of the W3C ActivityPub protocol.

Amira 1.0.0 (Text)

by Joe Andrieu & Team

This paper reinterprets Christopher Allen’s Rebooting the Web of Trust user story through the lens of the Information Lifecycle Engagement Model. It presents a human-centric illustration of an individual’s experience in a self-sovereign, decentralized realization of the Web of Trust as originally conceived by Phil Zimmerman for PGP.

The DCS Theorem

by Greg Slepak & Anya Petrova

A probability proof of the DCS Triangle. Why can't decentralized consensus systems have all three of decentralization, consensus, and scale? Plus, two methods for getting around these limitations.

A Decentralized Approach to Blockcerts Credential Revocation (Text)

by João Santos & Kim Hamilton Duffy

Blockcerts are blockchain-anchored credentials with a verification process designed to be decentralized and trustless. This proposal describes an alternate method of issuing Blockcerts using Ethereum, which allows for a new form of revocation by either the issuer or the recipient.

Engineering Privacy for Verified Credentials: In Which We Describe Data Minimization, Selective Disclosure, and Progressive Trust (Text)

by Lionel Wolberger, Brent Zundel, Zachary Larson, Irene Hernandez & Katryna Dow

We often share information on the World Wide Web, though some of it is private. The W3C Credentials Community Group focuses on how privacy can be enhanced when attributes are shared electronically. In the course of our work, we have identified three related but distinct privacy enhancing strategies: "data minimization," "selective disclosure," and "progressive trust." These enhancements are enabled with cryptography. The goal of this paper is to enable decision makers, particularly non-technical ones, to gain a nuanced grasp of these enhancements along with some idea of how their enablers work. We describe them below in plain English, but with some rigor. This knowledge will enable readers of this paper to be better able to know when they need privacy enhancements, to select the type of enhancement needed, to assess techniques that enable those enhancements, and to adopt the correct enhancement for the correct use case.

Identity Hubs Capabilities Perspective (Text)

by Adrian Gropper, Drummond Reed & Mark S. Miller

Identity Hubs as currently proposed in the Decentralized Identity Foundation (DIF) are a subset of a general Decentralized Identifier (DID) based user-controlled agent, based on ACLs rather than an object-capabilities (ocap) architecture. Transitioning the Hubs design to an ocap model can be achieved by introducing an UMA authorization server as the control endpoint.

Linked Data Capabilities (Text)

Christopher Lemmer Webber & Mark S. Miller

Linked Data Signatures enable a method of asserting the integrity of linked data documents that are passed throughout the web. The object capability model is a powerful system for ensuring the security of computing systems.

Veres One DID Method (Text)

by Manu Sporny & Dave Longley

The Veres One Ledger is a permissionless public ledger designed specifically for the creation and management of decentralized identifiers (DIDs). This specification defines how a developer may create and update DIDs in the Veres One Ledger.

When GDPR becomes real, and Blockchain is no longer Fairy Dust (Text)

by Marta Piekarska, Michael Lodder, Zachary Larson & Kaliya Young (Identity Woman)

This document describes the GDPR requirements and the different approaches to digital identity solutions and finally explains why distributed ledger technology may offer an opportunity for enterprises to simplify data management solutions that are GDPR compliant.

Complete Rebooting the Web of Trust Listing

A different repository is available for each of the Rebooting the Web of Trust design workshops:

License

All of the contents of this directory are licensed Creative Commons CC-BY their contributors.

You can’t perform that action at this time.