Content-type: text/html ~ Stephen's Web ~ Acceptance Networks for Self-Sovereign Identity

Stephen Downes

Knowledge, Learning, Community

"We can't have broad adoption of verifiable credentials until we find a way to scale their presentation by providing tooling that credential verifiers can use to reduce their risk and gain confidence in the facts presented to them." This summary captures the essence of the article but not the depth of it. Phil Windley explores the mechanisms of both trust (which involves risk) and confidence (which doesn't) and traces the genesis of the latter in acceptance networks. We have such a system for financial transactions, but identity systems aren't there yet. "We have identity providers (IdPs) like Google and Apple who control a closed ecosystem of relying parties (with a lot of overlap)... Fixing this requires the equivalent of an acceptance network for digital identity." This article looks at what's required, the principles that make it possible, and centralized and decentraized models.

Today: 0 Total: 49 [Direct link] [Share]

Stephen Downes Stephen Downes, Casselman, Canada

Copyright 2024
Last Updated: Jun 14, 2024 02:06 a.m.

Canadian Flag Creative Commons License.