Skip to content

hoola-inc/xDemic-Specs

Repository files navigation

Note:

  • USE MOURO (uPort) FOR v1
  • Switch to portable ID-HUB ASAP

Protocols and Tech

Since the emergence of the Decentralized Identifier (DID) specification at the Fall 2016 Rebooting the Web of Trust [1], numerous DID method specifications have appeared. Each DID method specification defines how to resolve a cryptographically-tied DID document given a method-specific identifier. In this paper, we describe a way to represent the DID document as a content-addressed Merkle Directed Acyclic Graph (DAG) using Interplanetary Linked Data (IPLD). This technique enables more cost-efficient, scaleable creation of DIDs and can be applied across different DID method specifications.

Aunthenticity is a challenge for any identity solution. In the physical world, at least in America, it is not difficult to change one's identity. In the digital world, there is the problem of bots. The botnet detection market is expected to be worth over one billion USD by 2023, in a landscape where most digital activity is still heavily centralized. These centralized digital solutions have the advantage of being able to track IP addresses, request phone verification, and present CAPTCHAs to users in order to authenticate them. If this problem is so difficult to solve in the centralized world, how much more challenging will it be in the decentralized world, where none of these techniques are available?

Sean Gilligan, Peg, Adin Schmahmann, Andrew Hughes, Christopher Allen

As systems where people are required to manage their own cryptographic keys become more popular, social recovery or reissuance of keys increases in importance. Such systems are inherently empowering to users but safeguarding keys is a hard problem.

We focus on the social recovery of control of an identifier. There are several techniques to re-assert control over identifiers including key recovery and issuance of a new key. In many situations it is preferrable to establish a new key than recover the old one.

We propose a rubrik for evaluating such schemes, and give a brief overview of possible schemes to consider.

In this paper, we explore the idea of using a web of trust as a tool to add authenticity to decentralized identifiers (DIDs). We define a framework for deriving relative trust degrees using a given trust metric: a "trustworthiness" score for a given identity from the perspective of another identity. It is our intent that this framework may be used as a starting point for an ongoing exploration of graph-based, decentralized trust. We believe this approach may ultimately be used as a foundation for decentralized reputation.

Flows

Selective Disclosure Request

App

//To do
Onboarding Flow
    Recovery Flow
    Getting Data From 3rd Party Source

School Dashboard

Walkthrough: https://www.youtube.com/watch?v=2foX8NbVQJw

Setup School Dashboard - First Identity Registeration
Adding Delegates

Automated Selective Disclousure
    OpenID Connect and OAuth Considerations

Recieving Student Requests
    Check Against Database
    Responses

Issue Credentials
    

Generate Badges

Messaging Flows

Server Side Flows and Specs

About

Documentation, Specs and Flows

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published