What is Bitcoin? How does blockchain work? The fashion to mine cryptocurrency? We are pleased to mark you how to answer these questions with our like a flash guides in Explained allotment.
rn”,”seo_description”:”What is Bitcoin? How does blockchain work? The fashion to mine cryptocurrency? We are pleased to mark you how to answer these questions with our like a flash guides in Explained allotment.”},”words_count”: 1350,”description”:”What is a decentralized identification, and why does it topic? On this manual, we destroy it down for you”,”writer”:{“identity”: 1391,”title”:”Sasha Shilina”,”url”:”sasha-shilina”,”twitter”:””,”google_plus”:””,”listing”:”https://s3.cointelegraph.com/storage/uploads/see/5d1d60470a33cd5268c8885651d3f5cc.jpg”,”gender”:”female”,”description”:”Sasha Shilina is the managing partner and chief review officer of Paradigm and a core researcher at Humanode. A Ph.D. graduate from Moscow Affirm College, Sasha is a disbursed abilities analyst and researcher by vocation who is drawn to all practices rooted in up-to-the-minute science, abilities and philosophy, and the synergetic relationship between them.”,”fb”:””,”e-mail”:””,”linkedin”:””,”created_at”:”2021-10-15 12: 04: 11″,”updated_at”:”2022-05-04 15: 57: 53″,”deleted_at”:null,”avatar”:”https://photos.cointelegraph.com/photos/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy81ZDFkNjA0NzBhMzNjZDUyNjhjODg4NTY1MWQzZjVjYy5qcGc=.jpg”,”hash”:”aHR0cHM6Ly9jb2ludGVsZWdyYXBoLmNvbS9hdXRob3JzL3Nhc2hhLXNoaWxpbmE=”,”relativeUrl”:”https://cointelegraph.com/authors/sasha-shilina”,”user_id”: 1391,”language_id”:1,”name”:”Sasha Shilina”,”desc”:”Sasha Shilina is the managing partner and chief review officer of Paradigm and a core researcher at Humanode. A Ph.D. graduate from Moscow Affirm College, Sasha is a disbursed abilities analyst and researcher by vocation who is drawn to all practices rooted in up-to-the-minute science, abilities and philosophy, and the synergetic relationship between them.”,”seo_title”:””,”seo_description”:””,”enabled”:1,”show_in_authors”:0,”show_in_experts”:0},”category_id”: 65,”audio”:”https://s3.cointelegraph.com/audio/92527.306732ee-9d4c-45b7-8e01-1df8983d8265.mp3″,”tags”: [{“name”:”Blockchain”,”uri”:”/tags/blockchain”,”super”:1,”page_title”:”Blockchain News”},{“name”:”Security”,”uri”:”/tags/security”,”super”:0,”page_title”:”Security News”},{“name”:”Decentralization”,”uri”:”/tags/decentralization”,”super”:0,”page_title”:”Decentralization News”},{“name”:”Privacy”,”uri”:”/tags/privacy”,”super”:0,”page_title”:”Privacy News”},{“name”:”Identity”,”uri”:”/tags/identity”,”super”:0,”page_title”:”Identity News”},{“name”:”Data”,”uri”:”/tags/data”,”super”:0,”page_title”:””},{“name”:”Web3″,”uri”:”/tags/web3″,”super”:0,”page_title”:””}],”tag_title”:”Blockchain”,”date”:”SEP 03, 2022″,”badge”:{“title”:”Explained”,”be conscious”:”default”},”qty”: 276,”stats_pixel”:”“,”stats_pixel_url”:”https://zoa.cointelegraph.com/pixel?postId=92527®ionId=1″,”shares”: 39,”infographic”:faux,”backed”:faux,”explained”:unbiased,”press_release”:faux,”show_referral”:faux,”social_description”:””,”social_translators”:{“clipboard_popup_label”:”Link copied”,”socialWechatFooterError”:”WeChat error”,”socialWechatFooterText”:”WeChat share”,”socialWechatHeaderText”:”WeChat share”},”social_shares”:{“post_id”: 92527,”post_url”:”https://cointelegraph.com/explained/what-is-decentralized-identification-in-blockchain”,”post_titles”:{“same previous”:”What is decentralized identification in blockchain?”,”twitter”:”What is decentralized identification in blockchain?”},”post_text”:{“same previous”:”What is decentralized identification in blockchain?”,”twitter”:”What is decentralized identification in blockchain? https://cointelegraph.com/explained/what-is-decentralized-identification-in-blockchain by @cointelegraph”},”accounts”:{“twitter”:”@cointelegraph”}},”socials”:{“fb”:{“url”:”https://www.fb.com/sharer/sharer.php?u=https%3A%2F%2Fcointelegraph.com%2Fexplained%2Fwhat-is-decentralized-identification-in-blockchain”,”depend”:null,”short”:”fb”,”fa”:”fb”},”twitter”:{“url”:”https://twitter.com/intent/tweet?textual affirm material=What+is+decentralized+identification+in+blockchain%3F https%3A%2F%2Fcointelegraph.com%2Fexplained%2Fwhat-is-decentralized-identification-in-blockchain by @cointelegraph”,”depend”:null,”short”:”tw”,”fa”:”twitter”},”telegram”:{“url”:”https://telegram.me/share/url?url=https%3A%2F%2Fcointelegraph.com%2Fexplained%2Fwhat-is-decentralized-identification-in-blockchain &textual affirm material=What+is+decentralized+identification+in+blockchain%3F”,”depend”:null,”short”:”tg”,”fa”:”paper-aircraft”},”whatsapp”:{“url”:”https://api.whatsapp.com/send?textual affirm material=What+is+decentralized+identification+in+blockchain%3F&href=https%3A%2F%2Fcointelegraph.com%2Fexplained%2Fwhat-is-decentralized-identification-in-blockchain”,”depend”:null,”short”:”wu”,”fa”:”whatsapp”},”gplus”:{“url”:”https://plus.google.com/share?url=https%3A%2F%2Fcointelegraph.com%2Fexplained%2Fwhat-is-decentralized-identification-in-blockchain”,”depend”:null,”short”:”gplus”,”fa”:”google-plus”},”reddit”:{“url”:”https://www.reddit.com/post?url=https%3A%2F%2Fcointelegraph.com%2Fexplained%2Fwhat-is-decentralized-identification-in-blockchain&title=What+is+decentralized+identification+in+blockchain%3F”,”depend”:null,”short”:”reddit”,”fa”:”reddit-alien”},”linkedin”:{“url”:”https://www.linkedin.com/shareArticle?mini=unbiased&url=https%3A%2F%2Fcointelegraph.com%2Fexplained%2Fwhat-is-decentralized-identification-in-blockchain&title=What+is+decentralized+identification+in+blockchain%3F”,”depend”:null,”short”:”li”,”fa”:”linkedin”}},”hide_disclaimer”:faux,”elink”:”https://cointelegraph.com”,”etitle”:”Cointelegraph”,”elogo_x2″:”https://photos.cointelegraph.com/photos/528_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9hYjAzYTJhMmNlOWEyMWRjMWYwOTYxZDkxNzMxYzhiYS5wbmc=.png”,”elogo_x1″:”https://photos.cointelegraph.com/photos/260_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9hYjAzYTJhMmNlOWEyMWRjMWYwOTYxZDkxNzMxYzhiYS5wbmc=.png”,”elogo_svg”:faux,”affirm material”: [{“id”:3666,”post_id”:92527,”title”:”What is a decentralized identity?”,”content”:”
A decentralized identity is a self-owned, independent identity that enables trusted data exchange.
nn
Decentralized identity is an emerging Web3 concept based on a trust framework for identity management. Such decentralized identity management includes an approach to identity and access administration that allows people to generate, manage and control their personally identifiable information (PII) without a centralized third party like a registry, identity provider or certification authority.
nn
Considered to be private and sensitive data, PII refers to the body of information about specific individuals that directly or indirectly identifies them. Usually, it combines name, age, address, biometrics, citizenship, employment, credit card accounts, credit history, et cetera. In addition to PII, information that forms a decentralized digital identity includes data from online electronic devices, such as usernames and passwords, search history, buying history and others.
nn
With a decentralized identity, users can control their own PII and provide only the information that is required to be verified. Decentralized identity management supports an identity trust framework where users, organizations and things interact with each other transparently and securely.
nnn”,”created_at”:”2022-08-31 16:18:55″,”updated_at”:”2022-08-31 16:31:59″,”sort”:1,”translations”:{“id”:3659,”explained_post_id”:3666,”title_en”:”What is a decentralized identity?”,”content_en”:”
A decentralized identity is a self-owned, independent identity that enables trusted data exchange.
nn
Decentralized identity is an emerging Web3 concept based on a trust framework for identity management. Such decentralized identity management includes an approach to identity and access administration that allows people to generate, manage and control their personally identifiable information (PII) without a centralized third party like a registry, identity provider or certification authority.
nn
Considered to be private and sensitive data, PII refers to the body of information about specific individuals that directly or indirectly identifies them. Usually, it combines name, age, address, biometrics, citizenship, employment, credit card accounts, credit history, et cetera. In addition to PII, information that forms a decentralized digital identity includes data from online electronic devices, such as usernames and passwords, search history, buying history and others.
nn
With a decentralized identity, users can control their own PII and provide only the information that is required to be verified. Decentralized identity management supports an identity trust framework where users, organizations and things interact with each other transparently and securely.
nnn”,”title_es”:””,”content_es”:”n”,”title_cn”:””,”content_cn”:”n”,”title_de”:””,”content_de”:”n”,”title_fr”:””,”content_fr”:”n”,”title_it”:””,”content_it”:”n”,”title_ar”:””,”content_ar”:”n”,”title_br”:””,”content_br”:”n”,”title_jp”:””,”content_jp”:”n”,”created_at”:”2022-08-31 16:18:55″,”updated_at”:”2022-08-31 16:31:59″,”title_kr”:””,”content_kr”:”n”,”title_tr”:””,”content_tr”:”n”}},{“id”:3667,”post_id”:92527,”title”:”Why does decentralized identity matter?”,”content”:”
A decentralized identity aims to give people official proof of identity and complete ownership and control over their identities in a secure and user-friendly way.
nn
A verifiable proof of existence is often needed for citizens to access essential services like healthcare, banking and education. Unfortunately, according to Worldbank data, 1 billion people on our planet still do not have an official proof of identity. A considerable part of the population is in a precarious position, unable to vote, open a bank account, own property or find a job. The inability to obtain identification documents limits people’s freedom.
nn
What’s more, traditional centralized identification systems are insecure, fragmented and exclusionary. Centralized identity databases are at risk as they often become prime targets for hackers. From time to time, we hear about hacks and attacks on centralized identity solutions in which thousands and millions of customer records are being stolen from major retailers.
nn
The ownership issues remain as well. Users who have traditional forms of digital identity still don’t have complete ownership and control over them and are usually unaware of the value their data generates. In a centralized scenario, PII is stored and managed by others. Thus, it becomes more challenging, if not impossible, for users to claim ownership of their identities.
nn
Decentralized digital identity addresses these issues by providing a way for digital identity to be used across multiple participating platforms without sacrificing security and the user’s experience. In a decentralized identity framework, users need only an internet connection and a device to access it.
nn
Furthermore, in decentralized identity systems, distributed ledger technologies and blockchain, in particular, validate the existence of a legitimate identity. By providing a consistent, interoperable and tamper-proof architecture, blockchains enable the secure management and storage of PII, with significaant benefits for organizations, users, developers and Internet of Things (IoT) management systems.
nn
nnn”,”created_at”:”2022-08-31 16:20:51″,”updated_at”:”2022-08-31 16:31:59″,”sort”:2,”translations”:{“id”:3660,”explained_post_id”:3667,”title_en”:”Why does decentralized identity matter?”,”content_en”:”
A decentralized identity aims to give people official proof of identity and complete ownership and control over their identities in a secure and user-friendly way.
nn
A verifiable proof of existence is often needed for citizens to access essential services like healthcare, banking and education. Unfortunately, according to Worldbank data, 1 billion people on our planet still do not have an official proof of identity. A considerable part of the population is in a precarious position, unable to vote, open a bank account, own property or find a job. The inability to obtain identification documents limits people’s freedom.
nn
What’s more, traditional centralized identification systems are insecure, fragmented and exclusionary. Centralized identity databases are at risk as they often become prime targets for hackers. From time to time, we hear about hacks and attacks on centralized identity solutions in which thousands and millions of customer records are being stolen from major retailers.
nn
The ownership issues remain as well. Users who have traditional forms of digital identity still don’t have complete ownership and control over them and are usually unaware of the value their data generates. In a centralized scenario, PII is stored and managed by others. Thus, it becomes more challenging, if not impossible, for users to claim ownership of their identities.
nn
Decentralized digital identity addresses these issues by providing a way for digital identity to be used across multiple participating platforms without sacrificing security and the user’s experience. In a decentralized identity framework, users need only an internet connection and a device to access it.
nn
Furthermore, in decentralized identity systems, distributed ledger technologies and blockchain, in particular, validate the existence of a legitimate identity. By providing a consistent, interoperable and tamper-proof architecture, blockchains enable the secure management and storage of PII, with significaant benefits for organizations, users, developers and Internet of Things (IoT) management systems.
nn
nnn”,”title_es”:””,”content_es”:”n”,”title_cn”:””,”content_cn”:”n”,”title_de”:””,”content_de”:”n”,”title_fr”:””,”content_fr”:”n”,”title_it”:””,”content_it”:”n”,”title_ar”:””,”content_ar”:”n”,”title_br”:””,”content_br”:”n”,”title_jp”:””,”content_jp”:”n”,”created_at”:”2022-08-31 16:20:51″,”updated_at”:”2022-08-31 16:31:59″,”title_kr”:””,”content_kr”:”n”,”title_tr”:””,”content_tr”:”n”}},{“id”:3668,”post_id”:92527,”title”:”What is self-sovereign identity?”,”content”:”
Self-sovereign identity is a concept that refers to the use of distributed databases to manage PII.
nn
The notion of self-sovereign identity (SSI) is core to the idea of decentralized identity. Instead of having a set of identities across multiple platforms or a single identity managed by a third party, SII users have digital wallets in which various credentials are stored and accessible through reliable applications.
nn
Experts distinguish three main components known as the three pillars of SSI: blockchain, verifiable credentials (VCs) and decentralized identifiers (DIDs).
nn
nn
Blockchain is a decentralized digital database, a ledger of transactions duplicated and distributed among network computers that record information in a way that makes it difficult or impossible to change, hack or cheat.
nn
Second, there are VCs referred to as tamper-proof cryptographically-secured and verified credentials that implement SSI and protect users’ data. They can represent information found in paper credentials, such as a passport or license and digital credentials with no physical equivalent, such as, for instance, ownership of a bank account.
nn
And last but not least, SSI includes DIDs, a new type of identifier that enables users to have a cryptographically verifiable, decentralized digital identity. A DID refers to any subject like a person, organization, data model, abstract entity, et cetera, as determined by the controller of the DID. They are created by the user, owned by the user and independent of any organization. Designed to be decoupled from centralized registries, identity providers and certificate authorities, DIDs enable users to prove control over their digital identity without requiring permission from any third party.
nn
Alongside SII, which is rooted in blockchain, DIDs and VCs, decentralized identity architecture also embraces four more elements. They are a holder who creates a DID and receives the verifiable credential, an issuer that signs a verifiable credential with their private key and issues it to the holder, and a verifier that checks the credentials and can read the issuer’s public DID on the blockchain. Moreover, a decentralized identity architecture encompasses special decentralized identity wallets that fuel the whole system.
nn
How decentralized identity works
nn
The basis for decentralized identity management is the use of decentralized encrypted blockchain-based wallets.
nn
In a decentralized identity framework, users utilize decentralized identity wallets — special apps that allow them to create their decentralized identifiers, store their PII and manage their VCs —instead of keeping identity information on numerous websites controlled by intermediaries.
nn
Besides distributed architecture, these decentralized identity wallets are encrypted. Passwords to access them are replaced by non-phishable cryptographic keys that do not represent a single weakness in the case of a breach. A decentralized wallet generates a pair of cryptographic keys: public and private. The public key distinguishes a concrete wallet, while the private one, which is stored in the wallet, is needed during the authentication process.
nn
While decentralized identity wallets transparently authenticate users, they also protect users’ communications and data. Decentralized apps (DApps) store PII, verified identity details and the information needed to establish trust, prove eligibility or just complete a transaction. These wallets help users give and revoke access to identity information from a single source, making it faster and easier.
nn
On top of that, this information in the wallet is signed by multiple trusted parties to prove its accuracy. For example, digital identities can get approval from issuers such as universities, employers, or government structures. Using a decentralized identity wallet, users can present proof of their identity to any third party.
nnn”,”created_at”:”2022-08-31 16:27:27″,”updated_at”:”2022-08-31 16:31:58″,”sort”:3,”translations”:{“id”:3661,”explained_post_id”:3668,”title_en”:”What is self-sovereign identity?”,”content_en”:”
Self-sovereign identity is a concept that refers to the use of distributed databases to manage PII.
nn
The notion of self-sovereign identity (SSI) is core to the idea of decentralized identity. Instead of having a set of identities across multiple platforms or a single identity managed by a third party, SII users have digital wallets in which various credentials are stored and accessible through reliable applications.
nn
Experts distinguish three main components known as the three pillars of SSI: blockchain, verifiable credentials (VCs) and decentralized identifiers (DIDs).
nn
nn
Blockchain is a decentralized digital database, a ledger of transactions duplicated and distributed among network computers that record information in a way that makes it difficult or impossible to change, hack or cheat.
nn
Second, there are VCs referred to as tamper-proof cryptographically-secured and verified credentials that implement SSI and protect users’ data. They can represent information found in paper credentials, such as a passport or license and digital credentials with no physical equivalent, such as, for instance, ownership of a bank account.
nn
And last but not least, SSI includes DIDs, a new type of identifier that enables users to have a cryptographically verifiable, decentralized digital identity. A DID refers to any subject like a person, organization, data model, abstract entity, et cetera, as determined by the controller of the DID. They are created by the user, owned by the user and independent of any organization. Designed to be decoupled from centralized registries, identity providers and certificate authorities, DIDs enable users to prove control over their digital identity without requiring permission from any third party.
nn
Alongside SII, which is rooted in blockchain, DIDs and VCs, decentralized identity architecture also embraces four more elements. They are a holder who creates a DID and receives the verifiable credential, an issuer that signs a verifiable credential with their private key and issues it to the holder, and a verifier that checks the credentials and can read the issuer’s public DID on the blockchain. Moreover, a decentralized identity architecture encompasses special decentralized identity wallets that fuel the whole system.
nn
How decentralized identity works
nn
The basis for decentralized identity management is the use of decentralized encrypted blockchain-based wallets.
nn
In a decentralized identity framework, users utilize decentralized identity wallets — special apps that allow them to create their decentralized identifiers, store their PII and manage their VCs —instead of keeping identity information on numerous websites controlled by intermediaries.
nn
Besides distributed architecture, these decentralized identity wallets are encrypted. Passwords to access them are replaced by non-phishable cryptographic keys that do not represent a single weakness in the case of a breach. A decentralized wallet generates a pair of cryptographic keys: public and private. The public key distinguishes a concrete wallet, while the private one, which is stored in the wallet, is needed during the authentication process.
nn
While decentralized identity wallets transparently authenticate users, they also protect users’ communications and data. Decentralized apps (DApps) store PII, verified identity details and the information needed to establish trust, prove eligibility or just complete a transaction. These wallets help users give and revoke access to identity information from a single source, making it faster and easier.
nn
On top of that, this information in the wallet is signed by multiple trusted parties to prove its accuracy. For example, digital identities can get approval from issuers such as universities, employers, or government structures. Using a decentralized identity wallet, users can present proof of their identity to any third party.
nnn”,”title_es”:””,”content_es”:”n”,”title_cn”:””,”content_cn”:”n”,”title_de”:””,”content_de”:”n”,”title_fr”:””,”content_fr”:”n”,”title_it”:””,”content_it”:”n”,”title_ar”:””,”content_ar”:”n”,”title_br”:””,”content_br”:”n”,”title_jp”:””,”content_jp”:”n”,”created_at”:”2022-08-31 16:27:27″,”updated_at”:”2022-08-31 16:31:58″,”title_kr”:””,”content_kr”:”n”,”title_tr”:””,”content_tr”:”n”}},{“id”:3669,”post_id”:92527,”title”:”The pros and cons of decentralized identity”,”content”:”
The four main benefits of decentralized identity management include control, security, privacy and ease of use. However, the main concerns are a low level of adoption, the lack of regulation and interoperability.
nn
Control gives identity owners and digital devices power over their digital identifiers. Because users have complete control and ownership of their identities and credentials, they can decide which information they want to reveal and can prove their claims without depending on any other party.
nn
Security reduces attack surfaces by storing PII. Blockchain is an encrypted decentralized storage system that is safe, flexible and impenetrable by design, reducing the risk of an attacker gaining unauthorized access to steal or monetize user data.
nn
Decentralized identity management also helps organizations reduce security risks. Based on how organizations collect, process and store users’ data, they are subject to regulations. Organizations face sanctions and fines even for unintentional rule violations or data breaches. With decentralized identity management, they have an opportunity to collect and store less identity data, simplifying their compliance responsibilities and reducing the risks of cyberattacks and information being misused.
nn
Privacy enables entities to use the principle of least privilege (PoLP) to designate minimal or selective access for identity credentials. PoLP is a term correlated with information security. It states that any person, gadget or process should only have the minimal rights necessary to execute the considered task.
nn
And last but not least, decentralized identity technology gives users the advantage of easily creating and managing their identities with user-friendly neoteric decentralized identity apps and platforms.
nn
As for flaws and drawbacks, there are a bunch of them, primarily — adoption. Governments and organizations are still attempting to figure out how to deploy the decentralized identity technology at scale, while most non-tech users have not even heard of this phenomenon.
nn
Overcoming the legacy systems and regulations and creating interoperable global standards and governance are also important issues. While a secondary issue, identity data fragility, which refers to duplication, confusion, and inaccuracy in identity management, remains.
nnn”,”created_at”:”2022-08-31 16:28:30″,”updated_at”:”2022-08-31 16:31:58″,”sort”:4,”translations”:{“id”:3662,”explained_post_id”:3669,”title_en”:”The pros and cons of decentralized identity”,”content_en”:”
The four main benefits of decentralized identity management include control, security, privacy and ease of use. However, the main concerns are a low level of adoption, the lack of regulation and interoperability.
nn
Control gives identity owners and digital devices power over their digital identifiers. Because users have complete control and ownership of their identities and credentials, they can decide which information they want to reveal and can prove their claims without depending on any other party.
nn
Security reduces attack surfaces by storing PII. Blockchain is an encrypted decentralized storage system that is safe, flexible and impenetrable by design, reducing the risk of an attacker gaining unauthorized access to steal or monetize user data.
nn
Decentralized identity management also helps organizations reduce security risks. Based on how organizations collect, process and store users’ data, they are subject to regulations. Organizations face sanctions and fines even for unintentional rule violations or data breaches. With decentralized identity management, they have an opportunity to collect and store less identity data, simplifying their compliance responsibilities and reducing the risks of cyberattacks and information being misused.
nn
Privacy enables entities to use the principle of least privilege (PoLP) to designate minimal or selective access for identity credentials. PoLP is a term correlated with information security. It states that any person, gadget or process should only have the minimal rights necessary to execute the considered task.
nn
And last but not least, decentralized identity technology gives users the advantage of easily creating and managing their identities with user-friendly neoteric decentralized identity apps and platforms.
nn
As for flaws and drawbacks, there are a bunch of them, primarily — adoption. Governments and organizations are still attempting to figure out how to deploy the decentralized identity technology at scale, while most non-tech users have not even heard of this phenomenon.
nn
Overcoming the legacy systems and regulations and creating interoperable global standards and governance are also important issues. While a secondary issue, identity data fragility, which refers to duplication, confusion, and inaccuracy in identity management, remains.
nnn”,”title_es”:””,”content_es”:”n”,”title_cn”:””,”content_cn”:”n”,”title_de”:””,”content_de”:”n”,”title_fr”:””,”content_fr”:”n”,”title_it”:””,”content_it”:”n”,”title_ar”:””,”content_ar”:”n”,”title_br”:””,”content_br”:”n”,”title_jp”:””,”content_jp”:”n”,”created_at”:”2022-08-31 16:28:30″,”updated_at”:”2022-08-31 16:31:58″,”title_kr”:””,”content_kr”:”n”,”title_tr”:””,”content_tr”:”n”}},{“id”:3670,”post_id”:92527,”title”:”Decentralized identity protocols”,”content”:”
Several identity protocols, from crypto startups to big tech solutions, deal with decentralized identification, and each has its specifics and features.
nn
Though the decentralized identity technology is fairly new, initiatives and players in the decentralized identity space, software for implementing decentralized identity wallets and supporting services are plentiful. They range from the Hyperledger open-source developing community, through a range of decentralized identity protocols and startups, to some of the biggest names in the industry.
nn
Decentralized identity protocols and private identity stores such as uPort or 3Box are called identity hubs. Recently, the Ethereum-based uPort platform split into two new projects: Veramo, an open source framework for identifiers and credentials, and Serto – both of which carry on the mission of decentralizing the internet. 3Box Labs, in turn, went headlong into the development of Ceramic Network, a decentralized data network that brings unlimited data composability to Web3 apps, and Identity Index (IDX), a cross-chain protocol for decentralized identity and interoperable data.
nn
Other DID platforms are ION, an open public layer-2 decentralized identity network that runs atop the Bitcoin (BTC) blockchain based on the purely deterministic Sidetree protocol. The notable Polkadot (DOT) ecosystem player Dock protocol enables everyone to issue and build solutions for decentralized identity and verifiable credentials that are instantly verifiable using blockchain. The Sovrin Network is an open-source, decentralized, public identity network metasystem to create, manage and control self-sovereign digital identity. ORE ID is the universal authentication and authorization platform for blockchain that functions cross-chain.
nn
Connecting blockchain with crypto-biometrics, the Humanode project enables liveness detection checks that help identify real and unique human beings while accessing wallets and platforms and provide Sybil-resistance to any decentralized identity network.
nn
Moreover, in the background, many vendors that provide decentralized identity wallets or help organizations incorporate the technology into their apps are members of the Decentralized Identity Foundation and the Trust Over IP Foundation. The World Wide Web Consortium provides standards for identity technologies and interoperability via the W3C-DID and VC projects. These organizations are working tirelessly to standardize and shape decentralized identity.
nn
The future of decentralized identity
nn
The decentralized identity space is still in its infancy; however, it is clear that it has the potential to change existing identity management for the better.
nn
The world moves more toward Web3, the next evolution of the internet. Through decentralization and blockchain technology, an increasing number of people are taking back control of their data.
nn
The digital identity space is still in its inception; however, from all the above discussion, it is obvious that decentralized identity with blockchain has the potential to make identity management decentralized, simplified and seamless, completely transforming the landscape.
nn
While startups and DID initiatives continue to develop proofs of concepts for decentralized identity in government, finance, healthcare and other fields, the opportunities for decentralized identity continue to grow.
nn
Overall, the goal is to make users feel more empowered online and build up and share a verifiable reputation and proof of existence. Analysts predict that one of the latest hottest trends in the tech industry — the Metaverse — may become a key initiator for decentralized identity spread.
nn
With the advancement of avatars in the form of nonfungible tokens serving as users’ digital identities within virtual spaces, soulbound tokens, blockchain, biometrics and related cutting-edge technologies, decentralized identity will soon reach the masses in the flourishing Web3 ecosystem, which will boom in the coming years.
nn
Purchase a licence for this article. Powered by SharpShark.
nnn”,”created_at”:”2022-08-31 16:29:46″,”updated_at”:”2022-08-31 16:31:58″,”sort”:5,”translations”:{“id”:3663,”explained_post_id”:3670,”title_en”:”Decentralized identity protocols”,”content_en”:”
Several identity protocols, from crypto startups to big tech solutions, deal with decentralized identification, and each has its specifics and features.
nn
Though the decentralized identity technology is fairly new, initiatives and players in the decentralized identity space, software for implementing decentralized identity wallets and supporting services are plentiful. They range from the Hyperledger open-source developing community, through a range of decentralized identity protocols and startups, to some of the biggest names in the industry.
nn
Decentralized identity protocols and private identity stores such as uPort or 3Box are called identity hubs. Recently, the Ethereum-based uPort platform split into two new projects: Veramo, an open source framework for identifiers and credentials, and Serto – both of which carry on the mission of decentralizing the internet. 3Box Labs, in turn, went headlong into the development of Ceramic Network, a decentralized data network that brings unlimited data composability to Web3 apps, and Identity Index (IDX), a cross-chain protocol for decentralized identity and interoperable data.
nn
Other DID platforms are ION, an open public layer-2 decentralized identity network that runs atop the Bitcoin (BTC) blockchain based on the purely deterministic Sidetree protocol. The notable Polkadot (DOT) ecosystem player Dock protocol enables everyone to issue and build solutions for decentralized identity and verifiable credentials that are instantly verifiable using blockchain. The Sovrin Network is an open-source, decentralized, public identity network metasystem to create, manage and control self-sovereign digital identity. ORE ID is the universal authentication and authorization platform for blockchain that functions cross-chain.
nn
Connecting blockchain with crypto-biometrics, the Humanode project enables liveness detection checks that help identify real and unique human beings while accessing wallets and platforms and provide Sybil-resistance to any decentralized identity network.
nn
Moreover, in the background, many vendors that provide decentralized identity wallets or help organizations incorporate the technology into their apps are members of the Decentralized Identity Foundation and the Trust Over IP Foundation. The World Wide Web Consortium provides standards for identity technologies and interoperability via the W3C-DID and VC projects. These organizations are working tirelessly to standardize and shape decentralized identity.
nn
The future of decentralized identity
nn
The decentralized identity space is still in its infancy; however, it is clear that it has the potential to change existing identity management for the better.
nn
The world moves more toward Web3, the next evolution of the internet. Through decentralization and blockchain technology, an increasing number of people are taking back control of their data.
nn
The digital identity space is still in its inception; however, from all the above discussion, it is obvious that decentralized identity with blockchain has the potential to make identity management decentralized, simplified and seamless, completely transforming the landscape.
nn
While startups and DID initiatives continue to develop proofs of concepts for decentralized identity in government, finance, healthcare and other fields, the opportunities for decentralized identity continue to grow.
nn
Overall, the goal is to make users feel more empowered online and build up and share a verifiable reputation and proof of existence. Analysts predict that one of the latest hottest trends in the tech industry — the Metaverse — may become a key initiator for decentralized identity spread.
nn
With the advancement of avatars in the form of nonfungible tokens serving as users’ digital identities within virtual spaces, soulbound tokens, blockchain, biometrics and related cutting-edge technologies, decentralized identity will soon reach the masses in the flourishing Web3 ecosystem, which will boom in the coming years.
nn
Purchase a licence for this article. Powered by SharpShark.
nnn”,”title_es”:””,”content_es”:”n”,”title_cn”:””,”content_cn”:”n”,”title_de”:””,”content_de”:”n”,”title_fr”:””,”content_fr”:”n”,”title_it”:””,”content_it”:”n”,”title_ar”:””,”content_ar”:”n”,”title_br”:””,”content_br”:”n”,”title_jp”:””,”content_jp”:”n”,”created_at”:”2022-08-31 16:29:46″,”updated_at”:”2022-08-31 16:31:58″,”title_kr”:””,”content_kr”:”n”,”title_tr”:””,”content_tr”:”n”}}],”is_partner_material”:faux,”commentsSection”:{“schemaEntityUrl”:”//cointelegraph.com/explained/what-is-decentralized-identification-in-blockchain”,”checklist”: [],”amount”:0,”i18n”:{“addComment”:”Add a comment…”,”amountOnePostfix”:”Commentary”,”amountPostfix”:”Comments”,”destroy”:”Extinguish”,”delete”:”Delete”,”edit”:”Edit”,”errorBig”:”Commentary textual affirm material can’t be longer than 2000 characters”,”errorDuplicate”:”Duplicate comment”,”errorSmall”:”Commentary textual affirm material needs to be as a minimum 2 characters prolonged”,”hideButton”:”Mask comments”,”noComments”:” “,”commentOnModeration”:”Commentary on moderation”,”postComment”:”Publish”,”reply”:”Reply”,”showAllComments”:”Show All Comments”,”showButtonPostfix”:”comments”,”showButtonPrefix”:”Show”,”signIn”:”Signal in”,”exchange”:”Substitute comment”,”commentWasDeleted”:”This comment has been deleted”}},”associated”: [{“id”:82667,”retina”:”https://images.cointelegraph.com/images/1480_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDMvMTE3YjRlM2QtYTgwMS00ODIwLWI0MjYtNjYyNzdjZDlmOGVlLmpwZw==.jpg”,”img”:”https://images.cointelegraph.com/images/740_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDMvMTE3YjRlM2QtYTgwMS00ODIwLWI0MjYtNjYyNzdjZDlmOGVlLmpwZw==.jpg”,”thumb”:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDMvMTE3YjRlM2QtYTgwMS00ODIwLWI0MjYtNjYyNzdjZDlmOGVlLmpwZw==.jpg”,”thumb370″:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDMvMTE3YjRlM2QtYTgwMS00ODIwLWI0MjYtNjYyNzdjZDlmOGVlLmpwZw==.jpg”,”amp_thumb”:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDMvMTE3YjRlM2QtYTgwMS00ODIwLWI0MjYtNjYyNzdjZDlmOGVlLmpwZw==.jpg”,”thumb150″:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDMvMTE3YjRlM2QtYTgwMS00ODIwLWI0MjYtNjYyNzdjZDlmOGVlLmpwZw==.jpg”,”url”:”https://cointelegraph.com/news/how-do-you-assess-the-value-of-an-nft”,”title”:”How do you assess the value of an NFT?”,”lead”:”To assess the value of an NFT, consider looking at various factors like ownership, utility, rarity and social proof.”,”leadfull”:””,”category_id”:19,”category_url”:”https://cointelegraph.com/category/analysis”,”category_title”:”Analysis”,”author_url”:”https://cointelegraph.com/authors/dilip-kumar-patairya”,”author_hash”:”aHR0cHM6Ly9jb2ludGVsZWdyYXBoLmNvbS9hdXRob3JzL2RpbGlwLWt1bWFyLXBhdGFpcnlh”,”author_title”:”Dilip Kumar Patairya”,”author_img”:”https://images.cointelegraph.com/images/32_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy8xY2ZjNWQ3NGM3YjAyY2UzYmZhNTkyMzkzNmU5MGFkYi5qcGc=.jpg”,”date”:”MAR 12, 2022″,”flash_date”:”MAR 12, 2022″,”sponsored”:false,”press_release”:false,”sponsored_label”:”Sponsored”,”explained”:false,”badge”:{“title”:”How to crypto”,”label”:”default”},”published”:{“date”:”2022-03-12 12:03:00.000000″,”timezone_type”:3,”timezone”:”Europe/London”},”stat_uniqs”:31689,”rss_date”:”Sat, 12 Mar 2022 12:03:00 +0000″,”publishedW3″:”2022-03-12T12:03:00+00:00″,”show_referral”:true,”isMagazine”:false},{“id”:93379,”retina”:”https://images.cointelegraph.com/images/1480_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9lOWE4Y2NmZmFkMWUzZDIwM2RhYjY5ZGE4MDZhZTA5Ni5qcGc=.jpg”,”img”:”https://images.cointelegraph.com/images/740_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9lOWE4Y2NmZmFkMWUzZDIwM2RhYjY5ZGE4MDZhZTA5Ni5qcGc=.jpg”,”thumb”:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9lOWE4Y2NmZmFkMWUzZDIwM2RhYjY5ZGE4MDZhZTA5Ni5qcGc=.jpg”,”thumb370″:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9lOWE4Y2NmZmFkMWUzZDIwM2RhYjY5ZGE4MDZhZTA5Ni5qcGc=.jpg”,”amp_thumb”:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9lOWE4Y2NmZmFkMWUzZDIwM2RhYjY5ZGE4MDZhZTA5Ni5qcGc=.jpg”,”thumb150″:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9lOWE4Y2NmZmFkMWUzZDIwM2RhYjY5ZGE4MDZhZTA5Ni5qcGc=.jpg”,”url”:”https://cointelegraph.com/news/music-is-an-essential-part-of-our-lives-and-its-now-going-to-thrive-in-this-nft-marketplace”,”title”:”Music is an essential part of our lives — and it’s now going to thrive in this NFT marketplace”,”lead”:”A new music-focused NFT marketplace wants to bring fans closer to artists, clamp down on ticket touting and throw extravagant, immersive concerts in the metaver…”,”leadfull”:””,”category_id”:62,”category_url”:”https://cointelegraph.com/category/sponsored”,”category_title”:”Sponsored”,”author_url”:”https://cointelegraph.com/authors/chris-jones”,”author_hash”:”aHR0cHM6Ly9jb2ludGVsZWdyYXBoLmNvbS9hdXRob3JzL2NocmlzLWpvbmVz”,”author_title”:”Chris Jones”,”author_img”:”https://cointelegraph.com/assets/img/icons/author_male.jpg”,”date”:”SEP 15, 2022″,”flash_date”:”SEP 15, 2022″,”sponsored”:true,”press_release”:false,”sponsored_label”:”Sponsored”,”explained”:false,”badge”:{“title”:”Sponsored”,”label”:”default”},”published”:{“date”:”2022-09-15 10:57:00.000000″,”timezone_type”:3,”timezone”:”Europe/London”},”stat_uniqs”:945,”rss_date”:”Thu, 15 Sep 2022 10:57:00 +0100″,”publishedW3″:”2022-09-15T10:57:00+01:00″,”show_referral”:true,”isMagazine”:false},{“id”:91948,”retina”:”https://images.cointelegraph.com/images/1480_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvYzhkMzA3NzctMzA0My00YTM2LTgxNzAtNjY1MGMxOGI3NzU1LmpwZw==.jpg”,”img”:”https://images.cointelegraph.com/images/740_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvYzhkMzA3NzctMzA0My00YTM2LTgxNzAtNjY1MGMxOGI3NzU1LmpwZw==.jpg”,”thumb”:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvYzhkMzA3NzctMzA0My00YTM2LTgxNzAtNjY1MGMxOGI3NzU1LmpwZw==.jpg”,”thumb370″:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvYzhkMzA3NzctMzA0My00YTM2LTgxNzAtNjY1MGMxOGI3NzU1LmpwZw==.jpg”,”amp_thumb”:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvYzhkMzA3NzctMzA0My00YTM2LTgxNzAtNjY1MGMxOGI3NzU1LmpwZw==.jpg”,”thumb150″:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvYzhkMzA3NzctMzA0My00YTM2LTgxNzAtNjY1MGMxOGI3NzU1LmpwZw==.jpg”,”url”:”https://cointelegraph.com/news/web3-games-incorporate-features-to-drive-female-participation”,”title”:”Web3 games incorporate features to drive female participation”,”lead”:”Web3 games are focusing on community building, aesthetics, customization and representation to attract female users — but is this enough? “,”leadfull”:””,”category_id”:19,”category_url”:”https://cointelegraph.com/category/analysis”,”category_title”:”Analysis”,”author_url”:”https://cointelegraph.com/authors/rachel-wolfson”,”author_hash”:”aHR0cHM6Ly9jb2ludGVsZWdyYXBoLmNvbS9hdXRob3JzL3JhY2hlbC13b2xmc29u”,”author_title”:”Rachel Wolfson”,”author_img”:”https://images.cointelegraph.com/images/32_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy81OGI2YmIyMjI0MGRjOGI5M2UxYTUxYzMzZTMzNjY2Mi5qcGc=.jpg”,”date”:”AUG 20, 2022″,”flash_date”:”AUG 20, 2022″,”sponsored”:false,”press_release”:false,”sponsored_label”:”Sponsored”,”explained”:false,”badge”:{“title”:”Analysis”,”label”:”info”},”published”:{“date”:”2022-08-20 15:45:00.000000″,”timezone_type”:3,”timezone”:”Europe/London”},”stat_uniqs”:4155,”rss_date”:”Sat, 20 Aug 2022 15:45:00 +0100″,”publishedW3″:”2022-08-20T15:45:00+01:00″,”show_referral”:true,”isMagazine”:false},{“id”:92079,”retina”:”https://images.cointelegraph.com/images/1480_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9kZDg2YmU3NGRjYjFhNTZkMmFlOTY1ZTM0MmI0ZGFhYS5qcGc=.jpg”,”img”:”https://images.cointelegraph.com/images/740_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9kZDg2YmU3NGRjYjFhNTZkMmFlOTY1ZTM0MmI0ZGFhYS5qcGc=.jpg”,”thumb”:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9kZDg2YmU3NGRjYjFhNTZkMmFlOTY1ZTM0MmI0ZGFhYS5qcGc=.jpg”,”thumb370″:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9kZDg2YmU3NGRjYjFhNTZkMmFlOTY1ZTM0MmI0ZGFhYS5qcGc=.jpg”,”amp_thumb”:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9kZDg2YmU3NGRjYjFhNTZkMmFlOTY1ZTM0MmI0ZGFhYS5qcGc=.jpg”,”thumb150″:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9kZDg2YmU3NGRjYjFhNTZkMmFlOTY1ZTM0MmI0ZGFhYS5qcGc=.jpg”,”url”:”https://cointelegraph.com/news/frictionless-staking-addressing-lock-in-periods-and-rewards-payout-is-here”,”title”:”Frictionless staking addressing lock-in periods and rewards payout is here”,”lead”:”The world is now entering a Web2.5 limbo, where staking, like other processes, must evolve to cater to wider crypto communities or risk being abandoned altogeth…”,”leadfull”:””,”category_id”:62,”category_url”:”https://cointelegraph.com/category/sponsored”,”category_title”:”Sponsored”,”author_url”:”https://cointelegraph.com/authors/sarah-jansen”,”author_hash”:”aHR0cHM6Ly9jb2ludGVsZWdyYXBoLmNvbS9hdXRob3JzL3NhcmFoLWphbnNlbg==”,”author_title”:”Sarah Jansen”,”author_img”:”https://images.cointelegraph.com/images/32_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy84N2IwYjRjMzkyZjlhYmM4ZjlhZDNiZTU3Y2FjZGJmZC5qcGc=.jpg”,”date”:”AUG 23, 2022″,”flash_date”:”AUG 23, 2022″,”sponsored”:true,”press_release”:false,”sponsored_label”:”Sponsored”,”explained”:false,”badge”:{“title”:”Sponsored”,”label”:”default”},”published”:{“date”:”2022-08-23 16:25:00.000000″,”timezone_type”:3,”timezone”:”Europe/London”},”stat_uniqs”:3094,”rss_date”:”Tue, 23 Aug 2022 16:25:00 +0100″,”publishedW3″:”2022-08-23T16:25:00+01:00″,”show_referral”:true,”isMagazine”:false},{“id”:92280,”retina”:”https://images.cointelegraph.com/images/1480_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9lZTAxZjk5Y2EzMzc2ZTBiMGFkNTA1YzQ2YzVlMzY0Ni5qcGVn.jpeg”,”img”:”https://images.cointelegraph.com/images/740_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9lZTAxZjk5Y2EzMzc2ZTBiMGFkNTA1YzQ2YzVlMzY0Ni5qcGVn.jpeg”,”thumb”:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9lZTAxZjk5Y2EzMzc2ZTBiMGFkNTA1YzQ2YzVlMzY0Ni5qcGVn.jpeg”,”thumb370″:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9lZTAxZjk5Y2EzMzc2ZTBiMGFkNTA1YzQ2YzVlMzY0Ni5qcGVn.jpeg”,”amp_thumb”:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9lZTAxZjk5Y2EzMzc2ZTBiMGFkNTA1YzQ2YzVlMzY0Ni5qcGVn.jpeg”,”thumb150″:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9lZTAxZjk5Y2EzMzc2ZTBiMGFkNTA1YzQ2YzVlMzY0Ni5qcGVn.jpeg”,”url”:”https://cointelegraph.com/explained/what-is-a-seed-phrase-and-why-is-it-important”,”title”:”What is a seed phrase and why is it important?”,”lead”:” It’s crucial to remember your seed phrase, which is a string of random words produced by your cryptocurrency wallet when you initially s…”,”leadfull”:””,”category_id”:65,”category_url”:”https://cointelegraph.com/explained”,”category_title”:”Explained”,”author_url”:”https://cointelegraph.com/authors/arnold-kirimi”,”author_hash”:”aHR0cHM6Ly9jb2ludGVsZWdyYXBoLmNvbS9hdXRob3JzL2Fybm9sZC1raXJpbWk=”,”author_title”:” Arnold Kirimi “,”author_img”:”https://images.cointelegraph.com/images/32_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy8wNWMyODg3ZTczYWZlMmE0NDhkNzg2N2NjMjk5MDg5My5qcGc=.jpg”,”date”:”AUG 27, 2022″,”flash_date”:”AUG 27, 2022″,”sponsored”:false,”press_release”:false,”sponsored_label”:”Sponsored”,”explained”:true,”badge”:{“title”:”Explained”,”label”:”default”},”published”:{“date”:”2022-08-27 15:00:00.000000″,”timezone_type”:3,”timezone”:”Europe/London”},”stat_uniqs”:263,”rss_date”:”Sat, 27 Aug 2022 15:00:00 +0100″,”publishedW3″:”2022-08-27T15:00:00+01:00″,”show_referral”:false,”isMagazine”:false},{“id”:92686,”retina”:”https://images.cointelegraph.com/images/1480_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDkvNTg3NTlkYzEtNzJiZC00NjRmLWFkOTAtOWEyMDAwODM4ZGI3LmpwZw==.jpg”,”img”:”https://images.cointelegraph.com/images/740_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDkvNTg3NTlkYzEtNzJiZC00NjRmLWFkOTAtOWEyMDAwODM4ZGI3LmpwZw==.jpg”,”thumb”:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDkvNTg3NTlkYzEtNzJiZC00NjRmLWFkOTAtOWEyMDAwODM4ZGI3LmpwZw==.jpg”,”thumb370″:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDkvNTg3NTlkYzEtNzJiZC00NjRmLWFkOTAtOWEyMDAwODM4ZGI3LmpwZw==.jpg”,”amp_thumb”:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDkvNTg3NTlkYzEtNzJiZC00NjRmLWFkOTAtOWEyMDAwODM4ZGI3LmpwZw==.jpg”,”thumb150″:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDkvNTg3NTlkYzEtNzJiZC00NjRmLWFkOTAtOWEyMDAwODM4ZGI3LmpwZw==.jpg”,”url”:”https://cointelegraph.com/news/nft-steez-and-lukso-co-founder-explore-the-implications-of-digital-self-sovereignty-in-web3″,”title”:”NFT Steez and Lukso co-founder explore the implications of digital self-sovereignty in Web3 “,”lead”:”NFT Steez chats with Lukso co-founder Marjorie Hernandez about how Universal Profiles onboard and empower users with digital self-sovereignty”,”leadfull”:””,”category_id”:86,”category_url”:”https://cointelegraph.com/category/interview”,”category_title”:”Interview”,”author_url”:”https://cointelegraph.com/authors/alyssa-exposito”,”author_hash”:”aHR0cHM6Ly9jb2ludGVsZWdyYXBoLmNvbS9hdXRob3JzL2FseXNzYS1leHBvc2l0bw==”,”author_title”:”Alyssa Exposito”,”author_img”:”https://images.cointelegraph.com/images/32_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9iMTBhYmU4NjAzM2NkZDkyMjE3ZTJkZDdiNDQxMzIyNi5qcGc=.jpg”,”date”:”SEP 02, 2022″,”flash_date”:”SEP 02, 2022″,”sponsored”:false,”press_release”:false,”sponsored_label”:”Sponsored”,”explained”:false,”badge”:{“title”:”Interview”,”label”:”default”},”published”:{“date”:”2022-09-02 21:30:00.000000″,”timezone_type”:3,”timezone”:”Europe/London”},”stat_uniqs”:1854,”rss_date”:”Fri, 02 Sep 2022 21:30:00 +0100″,”publishedW3″:”2022-09-02T21:30:00+01:00″,”show_referral”:true,”isMagazine”:false}]}” :shares=”{“fb”:{“url”:”https://www.fb.com/sharer/sharer.php?u=%URL%”,”icon”:”fb”,”title”:”Fb”,”sizesAllowed”: [{“size”:”lg”,”label”:”Large devices”,”breakpoint”:”> 1200px”},{“size”:”md”,”label”:”Medium devices”,”breakpoint”:”> 992px”},{“size”:”sm”,”label”:”Small tablets”,”breakpoint”:”> 768px”},{“size”:”xs”,”label”:”Smartphones”,”breakpoint”:”> 480px”},{“size”:”xxs”,”label”:”Extra small devices”,”breakpoint”:”< 480px"}],"location":1,"space":unbiased},"twitter":{"url":"https://twitter.com/intent/tweet?textual affirm material=%TEXT%","icon":"twitter","title":"Twitter","location":2,"space":unbiased,"sizesAllowed": [{"size":"xxs","label":"Extra small devices","breakpoint":"< 480px"},{"size":"xs","label":"Smartphones","breakpoint":"> 480px”},{“size”:”sm”,”label”:”Small tablets”,”breakpoint”:”> 768px”},{“size”:”md”,”label”:”Medium devices”,”breakpoint”:”> 992px”},{“size”:”lg”,”label”:”Large devices”,”breakpoint”:”> 1200px”}]},”telegram”:{“url”:”https://t.me/share/url?url=%URL%&textual affirm material=%TEXT%”,”icon”:”telegram”,”title”:”Telegram”,”location”:3,”space”:unbiased,”sizesAllowed”: [{“size”:”xxs”,”label”:”Extra small devices”,”breakpoint”:”< 480px"},{"size":"xs","label":"Smartphones","breakpoint":"> 480px”},{“size”:”sm”,”label”:”Small tablets”,”breakpoint”:”> 768px”},{“size”:”md”,”label”:”Medium devices”,”breakpoint”:”> 992px”},{“size”:”lg”,”label”:”Large devices”,”breakpoint”:”> 1200px”}]},”linkedin”:{“url”:”https://www.linkedin.com/shareArticle?mini=unbiased&url=%URL%&title=%TITLE%”,”icon”:”linked-in”,”title”:”LinkedIn”,”location”:5,”space”:unbiased,”sizesAllowed”: [{“size”:”xxs”,”label”:”Extra small devices”,”breakpoint”:”< 480px"},{"size":"xs","label":"Smartphones","breakpoint":"> 480px”},{“size”:”sm”,”label”:”Small tablets”,”breakpoint”:”> 768px”},{“size”:”md”,”label”:”Medium devices”,”breakpoint”:”> 992px”},{“size”:”lg”,”label”:”Large devices”,”breakpoint”:”> 1200px”}]},”reproduction”:{“url”:”%URL%”,”icon”:”reproduction”,”location”:7,”title”:”Duplicate Link”,”sizesAllowed”: [{“size”:”xxs”,”label”:”Extra small devices”,”breakpoint”:”< 480px"},{"size":"xs","label":"Smartphones","breakpoint":"> 480px”},{“size”:”sm”,”label”:”Small tablets”,”breakpoint”:”> 768px”},{“size”:”md”,”label”:”Medium devices”,”breakpoint”:”> 992px”},{“size”:”lg”,”label”:”Large devices”,”breakpoint”:”> 1200px”}],”space”:unbiased},”whatsapp”:{“url”:”https://wa.me/?textual affirm material=%TITLE% %URL%”,”icon”:”whats-app”,”title”:”Whatsapp”,”sizesAllowed”: [{“size”:”xxs”,”label”:”Extra small devices”,”breakpoint”:”< 480px"},{"size":"xs","label":"Smartphones","breakpoint":"> 480px”},{“size”:”sm”,”label”:”Small tablets”,”breakpoint”:”> 768px”},{“size”:”md”,”label”:”Medium devices”,”breakpoint”:”> 992px”},{“size”:”lg”,”label”:”Large devices”,”breakpoint”:”> 1200px”}],”location”:6,”space”:unbiased},”reddit”:{“url”:”https://www.reddit.com/post?url=%URL%&title=%TITLE%”,”icon”:”reddit”,”title”:”Reddit”,”sizesAllowed”: [{“size”:”xxs”,”label”:”Extra small devices”,”breakpoint”:”< 480px"},{"size":"xs","label":"Smartphones","breakpoint":"> 480px”},{“size”:”sm”,”label”:”Small tablets”,”breakpoint”:”> 768px”},{“size”:”md”,”label”:”Medium devices”,”breakpoint”:”> 992px”},{“size”:”lg”,”label”:”Large devices”,”breakpoint”:”> 1200px”}],”location”:4,”space”:unbiased}}” is=”ExplainedPostPage”>
A decentralized identification is a self-owned, unbiased identification that allows depended on files commerce.
Decentralized identification is an rising Web3 belief according to a belief framework for identification administration. Such decentralized identification administration comprises an means to identification and discover admission to administration that allows of us to generate, space up and alter their in my notion identifiable files (PII) with out a centralized third celebration love a registry, identification supplier or certification authority.
Thought of as to be internal most and sensitive files, PII refers to the body of facts about particular people that straight or circuitously identifies them. On the final, it combines name, age, handle, biometrics, citizenship, employment, bank card accounts, credit rating ancient past, et cetera. To boot to PII, files that kinds a decentralized digital identification comprises files from on-line electronic gadgets, reminiscent of usernames and passwords, search ancient past, purchasing ancient past and others.
With a decentralized identification, users can alter their have PII and supply most attention-grabbing the files that’s required to be verified. Decentralized identification administration helps an identification belief framework the set users, organizations and issues interact with each other transparently and securely.
A decentralized identification targets to present of us official proof of identification and whole possession and alter over their identities in a get and person-pleasant plan.
A verifiable proof of existence is continually wished for voters to discover admission to wanted companies love healthcare, banking and training. Sadly, according to Worldbank files, 1 billion of us on our planet peaceful construct not bask in an official proof of identification. A in fact broad allotment of the population is in a precarious location, unable to vote, beginning a financial institution story, have property or salvage a job. The incapacity to originate identification documents limits of us’s freedom.
What’s more, venerable centralized identification programs are paralyzed, fragmented and exclusionary. Centralized identification databases are in anxiety as they regularly turn out to be top targets for hackers. Every so continuously, we hear about hacks and attacks on centralized identification alternatives by which thousands and hundreds of thousands of buyer records are being stolen from main outlets.
The possession points remain as neatly. Users who bask in venerable kinds of digital identification peaceful don’t bask in whole possession and alter over them and are most regularly ignorant of the value their files generates. In a centralized scenario, PII is kept and managed by others. Thus, it becomes more hard, if not very not going, for users to assert possession of their identities.
Decentralized digital identification addresses these points by offering a means for digital identification to be extinct someday of more than one taking part platforms without sacrificing security and the person’s journey. In a decentralized identification framework, users need most attention-grabbing an net connection and a instrument to discover admission to it.
Furthermore, in decentralized identification programs, disbursed ledger applied sciences and blockchain, in verbalize, validate the existence of a official identification. By offering a fixed, interoperable and tamper-proof structure, blockchains enable the get administration and storage of PII, with significaant advantages for organizations, users, developers and Records superhighway of Issues (IoT) administration programs.
Self-sovereign identification is a belief that refers to the consume of disbursed databases to set an eye on PII.
The notion of self-sovereign identification (SSI) is core to the root of decentralized identification. In its set of having a local of identities someday of more than one platforms or a single identification managed by a third celebration, SII users bask in digital wallets by which rather about a credentials are kept and accessible thru legitimate applications.
Consultants distinguish three main parts known because the three pillars of SSI: blockchain, verifiable credentials (VCs) and decentralized identifiers (DIDs).
Blockchain is a decentralized digital database, a ledger of transactions duplicated and disbursed among community computers that narrative files in a implies that makes it complicated or very not going to commerce, hack or cheat.
2nd, there are VCs most regularly known as tamper-proof cryptographically-secured and verified credentials that put in power SSI and give protection to users’ files. They are able to signify files discovered in paper credentials, reminiscent of a passport or license and digital credentials with no physical identical, reminiscent of, for event, possession of a financial institution story.
And closing but not least, SSI comprises DIDs, a peculiar form of identifier that allows users to bask in a cryptographically verifiable, decentralized digital identification. A DID refers to any topic love a person, organization, files model, abstract entity, et cetera, as determined by the controller of the DID. They are created by the person, owned by the person and unbiased of any organization. Designed to be decoupled from centralized registries, identification services and certificate authorities, DIDs enable users to elucidate alter over their digital identification without requiring permission from any third celebration.
Alongside SII, which is rooted in blockchain, DIDs and VCs, decentralized identification structure moreover embraces four more parts. They are a holder who creates a DID and receives the verifiable credential, an issuer that indicators a verifiable credential with their internal most key and points it to the holder, and a verifier that tests the credentials and can read the issuer’s public DID on the blockchain. Furthermore, a decentralized identification structure encompasses particular decentralized identification wallets that gasoline your complete plot.
How decentralized identification works
The foundation for decentralized identification administration is the consume of decentralized encrypted blockchain-based mostly wallets.
In a decentralized identification framework, users originate the most of decentralized identification wallets — particular apps that allow them to construct their decentralized identifiers, store their PII and space up their VCs —as an substitute of keeping identification files on a couple of net sites controlled by intermediaries.
Besides disbursed structure, these decentralized identification wallets are encrypted. Passwords to discover admission to them are changed by non-phishable cryptographic keys that construct not signify a single weak point in the case of a breach. A decentralized wallet generates a pair of cryptographic keys: public and internal most. The general public key distinguishes a concrete wallet, whereas the internal most one, which is kept in the wallet, is wished for the length of the authentication course of.
While decentralized identification wallets transparently authenticate users, they moreover give protection to users’ communications and files. Decentralized apps (DApps) store PII, verified identification shrimp print and the files wished to set belief, clarify eligibility or unbiased whole a transaction. These wallets encourage users give and revoke discover admission to to identification files from a single source, making it sooner and fewer complicated.
On high of that, this files in the wallet is signed by more than one depended on parties to elucidate its accuracy. For instance, digital identities can discover approval from issuers reminiscent of universities, employers, or authorities constructions. The consume of a decentralized identification wallet, users can present proof of their identification to any third celebration.
The four main advantages of decentralized identification administration encompass alter, security, privacy and ease of consume. On the opposite hand, the main concerns are a low stage of adoption, the shortcoming of legislation and interoperability.
Encourage watch over affords identification householders and digital gadgets strength over their digital identifiers. Because users bask in whole alter and possession of their identities and credentials, they are able to think which files they want to elucidate and can clarify their claims without reckoning on any other celebration.
Security reduces assault surfaces by storing PII. Blockchain is an encrypted decentralized storage plot that’s get, flexible and impenetrable by design, lowering the anxiety of an attacker gaining unauthorized discover admission to to hang or monetize person files.
Decentralized identification administration moreover helps organizations gash security risks. Basically based totally totally on how organizations obtain, course of and store users’ files, they’re topic to regulations. Organizations face sanctions and fines even for unintentional rule violations or files breaches. With decentralized identification administration, they’ve a possibility to obtain and store much less identification files, simplifying their compliance responsibilities and lowering the risks of cyberattacks and files being misused.
Privateness permits entities to make consume of the belief of least privilege (PoLP) to designate minimal or selective discover admission to for identification credentials. PoLP is a time length correlated with files security. It states that someone, plot or course of would possibly well perchance unbiased peaceful most attention-grabbing bask in the minimal rights mandatory to achieve the regarded as job.
And closing but not least, decentralized identification abilities affords users the good thing about without distress creating and managing their identities with person-pleasant neoteric decentralized identification apps and platforms.
As for flaws and downsides, there are a bunch of them, essentially — adoption. Governments and organizations are peaceful making an try to determine how to deploy the decentralized identification abilities at scale, whereas most non-tech users bask in not even heard of this phenomenon.
Overcoming the legacy programs and regulations and creating interoperable global standards and governance are moreover crucial points. While a secondary snarl, identification files fragility, which refers to duplication, confusion, and inaccuracy in identification administration, remains.
Various identification protocols, from crypto startups to sizable tech alternatives, form out decentralized identification, and each has its specifics and parts.
Though the decentralized identification abilities is reasonably unusual, initiatives and avid gamers in the decentralized identification dwelling, tool for enforcing decentralized identification wallets and supporting companies are distinguished. They differ from the Hyperledger beginning-source creating community, thru a differ of decentralized identification protocols and startups, to about a of the most sensible possible names in the industry.
Decentralized identification protocols and internal most identification stores reminiscent of uPort or 3Box are called identification hubs. Currently, the Ethereum-based mostly uPort platform nick up into two unusual projects: Veramo, an beginning source framework for identifiers and credentials, and Serto – each of which follow it the mission of decentralizing the online. 3Box Labs, in flip, went headlong into the issue of Ceramic Community, a decentralized files community that brings limitless files composability to Web3 apps, and Identity Index (IDX), a homely-chain protocol for decentralized identification and interoperable files.
Diversified DID platforms are ION, an beginning public layer-2 decentralized identification community that runs atop the Bitcoin (BTC) blockchain according to the purely deterministic Sidetree protocol. The essential Polkadot (DOT) ecosystem participant Dock protocol permits each person to snarl and form alternatives for decentralized identification and verifiable credentials which can perchance perchance be instantly verifiable using blockchain. The Sovrin Community is an beginning-source, decentralized, public identification community metasystem to construct, space up and alter self-sovereign digital identification. ORE ID is the universal authentication and authorization platform for blockchain that functions homely-chain.
Connecting blockchain with crypto-biometrics, the Humanode mission permits liveness detection tests that encourage name valid and queer human beings whereas having access to wallets and platforms and supply Sybil-resistance to any decentralized identification community.
Furthermore, in the background, many vendors that provide decentralized identification wallets or encourage organizations incorporate the abilities into their apps are contributors of the Decentralized Identity Foundation and the Belief Over IP Foundation. The World Broad Web Consortium affords standards for identification applied sciences and interoperability by the W3C-DID and VC projects. These organizations are working tirelessly to standardize and shape decentralized identification.
The fashion forward for decentralized identification
The decentralized identification dwelling remains to be in its infancy; on the opposite hand, it is clear that it has the attainable to commerce existing identification administration for the better.
The field moves more in direction of Web3, the next evolution of the online. Through decentralization and blockchain abilities, an growing choice of of us are taking back alter of their files.
The digital identification dwelling remains to be in its inception; on the opposite hand, from the final above discussion, it is clear that decentralized identification with blockchain has the attainable to originate identification administration decentralized, simplified and seamless, entirely reworking the panorama.
While startups and DID initiatives proceed to design proofs of ideas for decentralized identification in authorities, finance, healthcare and other fields, the opportunities for decentralized identification proceed to develop.
General, the goal is to originate users feel more empowered on-line and form up and share a verifiable recognition and proof of existence. Analysts predict that one in all the most up-to-the-minute most up-to-the-minute tendencies in the tech industry — the Metaverse — would possibly well perchance unbiased turn out to be a key initiator for decentralized identification unfold.
With the issue of avatars in the originate of nonfungible tokens serving as users’ digital identities within digital spaces, soulbound tokens, blockchain, biometrics and associated lowering-edge applied sciences, decentralized identification will quickly attain the loads in the flourishing Web3 ecosystem, which is able to enhance in the impending years.
Rep a licence for this article. Powered by SharpShark.