<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/">
    <channel>
        <title>sottosale.eth</title>
        <link>https://paragraph.com/@mrnmrc</link>
        <description>I'm learning blockchain</description>
        <lastBuildDate>Thu, 07 May 2026 11:23:02 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>https://github.com/jpmonette/feed</generator>
        <language>en</language>
        <image>
            <title>sottosale.eth</title>
            <url>https://storage.googleapis.com/papyrus_images/05675c65f1c5912433176a4671415558320931ed4b561705a3e1b228b65fef79.png</url>
            <link>https://paragraph.com/@mrnmrc</link>
        </image>
        <copyright>All rights reserved</copyright>
        <item>
            <title><![CDATA[Digital Identities: where are we and what next? - Marco Marinelli - Medium]]></title>
            <link>https://paragraph.com/@mrnmrc/digital-identities-where-are-we-and-what-next-marco-marinelli-medium</link>
            <guid>C3c3tpr9WdmOZdiUPGoI</guid>
            <pubDate>Fri, 07 Jan 2022 22:05:34 GMT</pubDate>
            <description><![CDATA[In 2001 Richard Smith published his book “Authentication: From Passwords to Public Keys”, giving readers a clear understanding of what an organization needs to reliably identify its users and how different techniques for verifying identity are put in place.Peter Steiner’s cartoon, as published in The New YorkerThe cover of his book featured the famous cartoon “On the internet, nobody knows you’re a dog”, originally published by The New Yorker in 1993. So, it is clear that since the dawn of th...]]></description>
            <content:encoded><![CDATA[<p>In 2001 Richard Smith published his book “<em>Authentication: From Passwords to Public Keys</em>”, giving readers a clear understanding of what an organization needs to reliably identify its users and how different techniques for verifying identity are put in place.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/da553a68c7df688c9076e8816ca00624a8ad2903aa8ed1a5fdbd602434dca3f7.jpg" alt="Peter Steiner’s cartoon, as published in The New Yorker" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="">Peter Steiner’s cartoon, as published in The New Yorker</figcaption></figure><p>The cover of his book featured the famous cartoon “<em>On the internet, nobody knows you’re a dog</em>”, originally published by The New Yorker in 1993.</p><p>So, it is clear that since the dawn of the Internet, the conversion of identity from physical to digital has posed itself as a problem.</p><h2 id="h-but-what-is-a-digital-identity" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">But what is a Digital Identity?</h2><p>An identity is defined as a “<em>set of attributes related to an entity</em>” [ISO/IEC 24760–1]. Less formally, it is a combination of attributes that belong to an individual.</p><p>Hence, a digital identity is the transposition of this combination of attributes in a digital system, used to identify a defined subject.</p><h2 id="h-types-of-digital-identity" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Types of Digital Identity</h2><h2 id="h-model-1-traditional-centralized-model" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Model #1: Traditional Centralized Model</strong></h2><p>In this model, the simplest one, the trust between the user and the organization is proved through the use of a <strong>combination of username and password</strong> stored in an organization’s database, and a new combination of username + password is required for each different website, app or service that requires a login.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/3243fde0232edc4c96852ce752220120975b462e33ac44cca82aa9c161a7f57a.png" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>Siloed centralized model</p><p>As result, it is necessary to create and manage as many different credentials as the number of services you want to access.</p><h2 id="h-model-2-federated-identity-third-party-idp" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Model #2: Federated Identity / Third-Party IDP</h2><p>In this model, users can use identity information established in a previous domain, to access another. The domain where the identity is originally created acts as Identity Provider (IDP) between the user and the organization that the user is trying to access. The IDP issues the digital credential, providing a Single Sign-On (SSO) experience.</p><p>The main point of strength of this model is that reduces the number of credentials to be maintained, giving a great amount of identity portability. However, this model is still centralized and poses no regard to the user’s privacy, since social login allows tech giants to <strong>track, target and monetize</strong> the online behaviour of their users.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/f7e25c56f85b493a072537153f699148a794f0bbb3274c4a8f971f4ae4de5714.png" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>This model introduces a third party: the Identity Provider (IDP)</p><p>Some well-known examples of such model are Google, Facebook, or SPID, and the most common standards used in the industry are OAuth2, SAML and OpenID.</p><h2 id="h-issues-with-the-current-models" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Issues with the current models:</h2><p>The underlying problem with this system is that Digital Identity has always been treated from the perspective of the managing organization and not from the user’s perspective.</p><p>Consequently, these models have some downsides to be considered:</p><ul><li><p>Data stored in a centralized database can be tampered or stolen.</p></li><li><p>The centralized model implies high costs to store and manage data.</p></li><li><p>Users are not in control of their identities.</p></li><li><p>Missing standardization of digital claims.</p></li><li><p>User’s privacy is at risk.</p></li></ul><h2 id="h-alternative-models" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Alternative models:</h2><p>The NFT industry, one of the trends that emerged in 2021, brought into the industry a lot of innovation: <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.cnbc.com/2021/08/23/people-are-paying-millions-of-dollars-for-digital-pictures-of-rocks.html">.jpeg of stones sold for millions of dollars</a>. Jokes apart, the underlying technology such as Blockchain and Smart Contracts, is something intended to last and to radically change the way we think and interact with Web and Digital Identity.</p><p>Particularly interesting, is how NFTs changed the concept of ownership. What is the value of owning NFTs? Can’t I just screenshot an image? <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.nytimes.com/2021/04/23/style/emily-ratajkowski-nft-christies.html">Or when does a model own her image</a>? In our case, when does an individual own his identity?</p><p>NFTs brought mainstream the concept of <strong>user-based ownership</strong>, which represents the non-revocable ownership right for digital assets. This, in the context of digital identity, means that the user owns each aspect of its digital identity.</p><p>A new approach to digital identity comes with the concept of <strong>decentralized identity</strong>, which aims at giving back to the user full control over it. This model relies on the blockchain’s characteristics of cryptography, decentralization and immutability, which enables digital trust.</p><h2 id="h-model-3-decentralized-identity" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Model #3: Decentralized Identity</h2><p>This model allows the creation of a system in which digital identity is given back to the user through the use of an <strong>identity wallet</strong> that contains its related verifiable credentials from certified issuers (such as the Government).</p><p>Those credentials in the digital identity wallet are the equivalent of the cards in a physical wallet. Each one is issued by an entity and reveals some information about the owner.</p><p>Verifiable credentials are composed of 3 basic parts:</p><ul><li><p>**Metadata **describes the properties of the credential, such as the issuer, the expiry date, a public key to use for the verification process and so on (W3C).</p></li><li><p>**Claims **are statements made about a subject, for example, “Mario’s date of birth is 01/01/1990”.</p></li><li><p>**Proofs **are data about the identity holder that allows others entities to verify the origin of the data.</p></li></ul><p>To each verifiable credential is attached a so-called <strong>Decentralized Identifier (DID)</strong>. The DID is then stored on the blockchain, which acts as a distributed ledger that anyone can consult to verify those credentials. DIDs are what enables verified credentials to be verified anywhere and at any time, establishing trust between the parties and guaranteeing the authenticity of the data and attestations, without actually storing any personal data on the blockchain. On the blockchain are stored only the DIDs, which do not provide any kind of information about the DID owner.</p><p>From a high-level perspective, this model’s architecture can be summarized as down below:</p><h2 id="h-but-what-about-privacy" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">But what about privacy?</h2><p>In the real world, if I want to order a beer at the bar, I have to show my ID card proving that I am over 18 years old. Assuming I show my ID to the bartender, he will know all my personal information such as my first and last name, as well as my date of birth.</p><p>For digital identity, you can implement <strong>Selective Disclosure</strong>, which means generating individual proofs from a credential.</p><p>This means that I can choose to show only my date of birth, and skip all the other non-necessary personal data for the age confirmation.</p><p>But there is something else, which seems <strong>almost like magic</strong>, that allows you to prove an attribute from a credential without actually revealing its value.I’m talking about** Zero-Knowledge Proofs**, which allow us to have digital privacy for the first time since the Internet was born. How does it work?</p><blockquote><p>Through the use of cryptography one entity can prove to another entity that they know certain information or meet a certain requirement without having to disclose any of the actual information that supports that proof. The entity that verifies the proof has “zero knowledge” about the information supporting the proof but is “convinced” of its validity. This is especially useful when and where the prover entity does not trust the verifying entity but still has to prove to them that he knows a specific information. (source: tykn.tech)</p></blockquote><p>For example, I could prove that I am over 18, without showing my exact date of birth.</p><h2 id="h-real-world-examples" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Real-world examples:</h2><p>The <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://identity.foundation/">Decentralized Identity Foundation</a> and <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.w3.org/TR/did-core/">Decentralized Identifiers working group of W3C </a>are developing standards in this field.</p><p>The Turkish Ministry of Foreign Affairs, together with the United Nations Development Programme and the Instanbul Chamber of Commerce wants to implement a functioning model of Self-Sovereign Identity (a.k.a. Decentralized Identity) to <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://tykn.tech/turkey/">help refugees in the country to find employment and gain financial independence.</a></p><p>In the Education field, the <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://digitalcredentials.mit.edu/">Digital Credentials Consortium</a> was created by a dozen of Universities, including Harvard, Berkeley and MIT to reduce resume fraud and develop “<em>infrastructure for issuing, sharing, and verifying digital credentials of academic achievement</em>”.</p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://berkeley-defi.github.io/assets/material/CanDID.pdf">CanDID</a> is a platform for the implementation of decentralized identity that leverages already existing credentials from legacy authorities. Moreover, relieves the user from the burden of managing their own keys with the consequent possible key loss. Other challenges addressed (and solved) by this system are the <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://en.wikipedia.org/wiki/Sybil_attack">Sybil attack</a> resistance (i.e. how to issue one credential per user) and compliance with regulations like <em>Know-Your-Customer</em> (KYC) and <em>Anti-Money-Launderin</em>g (AML) while, at the same time, preserving user’s privacy.</p><h2 id="h-conclusion" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Conclusion:</h2><p>The siloed digital identity model may have been appropriated for the early days of the Internet but today this model is showing its downsides and limitations.</p><p>Tech giants have saved us the hassle of remembering dozens of passwords for as many accounts, but at the cost of losing possession and control over our identities.</p><p>As the internet of value grows in popularity, the emergence of robust decentralized identity solutions is only a matter of when. It is clear that only by charting a future that returns control of identity to the individual, we can pioneer the challenges and opportunities that Web3 has to offer.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/1e5a86c0a862602ef5351c50d830e750825645a84057d3113073757ee785ab9c.jpg" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>[Credits: Blockworks.co]</p>]]></content:encoded>
            <author>mrnmrc@newsletter.paragraph.com (sottosale.eth)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/195cdd969d8c366ae2aff8361ae0a5dce70548fe373e073d0e2957e141ff2d01.jpg" length="0" type="image/jpg"/>
        </item>
    </channel>
</rss>