Identity

From OVN wiki
Revision as of 06:49, 13 April 2022 by TiberiusB (talk | contribs) (Created page with "Definition : Please propose a definition of digital identity. Invite others to collaborate =Framework to consider identity in OVN= Note that most ideas that are vehiculate...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Definition

Please propose a definition of digital identity. Invite others to collaborate


Framework to consider identity in OVN

Note that most ideas that are vehiculated about identity are construed in a paradox of control and domination. Birth certificate, passport, social security number, driver’s license are instruments used to link the physical you to actions that are in the interest of the government, for various purposes such as paying your taxes and accessing benefits provided by the governmental institutions. At the opposite of this is the anarchist thinking or paradigm. But the important thing to consider here is that these instruments are mistaken for identity. Identity is not to be understood from a bureaucratic perspective, but from a psychological and social perspective - see Wikipedia.

In the context of OVN / OVNi identity should be understood as access. The question is how do we provide access to an individual to economic activity. What does it take to make this economic activity efficient and effective, and at the same time humane, rewarding, enriching.

For example, partaking in the activities of the Bitcoin Network doesn’t require one to provide information about one’s life. I just need to buy a piece of hardware, install the software in it and plug it into the wall. It is irrelevant who I am, where I live, what culture I partake in, etc. Sensorica, the OVN model, is built on the same principle of minimal information. OVN is not about control, but about maximizing economic freedom.

To contribute to an open venture you only don’t even need to show credentials. Benefits are distributed based on work done, not based on a promise of work, with a peer review process in place for validating the pertinent of the work done. You don’t need to demonstrate that you can do something, doing it right it’s all that counts. That’s how open source development and Wikipedia work, that’s also the case in an OVN.

There are some descriptions about you that emerge from your contributions in an OVN, which form your identity as an affiliate. These are dimensions of reputation, based on the quality of your work, your commitment, your regularity, etc. These emergent properties of you in an OVN context are used by other peers and by automated agents to improve / smooth economic activity. For example, you can be asked to contribute to a task because your record shows that you have performed this task well in the past. To be true to our principles, you should decide if you want information about your participation to be accrued and made available, or if you want every one of your interactions with the system to be like a fresh, new one. In other words, you need to decide if you allow a digital identity to be formed from your activity or not, weighing the pros and cons, the benefits and the potential harm.

Note that anonymity and digital identity formation through records of your activity are separate things. You can have an identity as a contributor to the project by remaining anonymous, meaning not linking the emerging digital identity to the physical you.

Some rants about identity

Most people today mistake credentials and access for identity. You don't necessarily need to identify yourself to perform an action. In the real world, when I take the bus I don’t need to tell the driver all about myself before I get in. Identification means revealing one's identity and we often mistake credentials for identity. When I go into the bus I just need to show my ticket, which is essentially saying that I paid for my ride, a credential that is required for this service.

No one really has access to our identities. People have multiple identities and they are all shifting in time: one can be a father at home, an employee at work, a friend, an artist, etc.

We also need to make a distinction between identity and persona, which is a semiotic construct, a system of symbols that we provide to others so that they can formulate an idea (a model) about “who we are”. The persona is fabricated by us and can be misinterpreted.

What about the physical you? When strangers see you on the street they don't identify you, they just see your body and can associate the effects of your actions with the physical you, as causation, you being the cause of these effects. They also have access to symbols that surround your physical body, your dress code, hair cut, accessories, which tells them something about you, which composes your persona. But they don't necessarily know that you are a father, you live in a given community and share particular values with your community members, etc. So there is the physical you, the genuine you, based on the life you live and on circumstances, there is your different persona, at home, at work, at the store, online, etc. Then there are your credentials, or features about you that male people trust you in a given situation. For example, you're allowed to enter a building because people trust that you cannot do property damage, or to drive a car responsibly and safely. Your culture, family situation and profession are irrelevant when it comes to you driving a car.

Your passport has a dual function, to let the authorities know where to find the physical you (your address) and to provide you access to services and benefits in a given national context. Furthermore, your passport is construed in such a way that it is unique and associated only with the physical you. That's why there is a photo of you on it, your signature and perhaps biometric data. The passport also serves you to attest that you are the physical you. So there is a one-to-one relation here, authorities can find you and you can attest that that physical being that lives there is the physical you present at that moment.

Technology cannot have a single point of authority or dependency. We should be able to manage and switch between multiple digital identities, each with their own context-sensitive necessary capabilities.”

Current work on digital identity

NOTE: Do not take the following for cash. Adapt it to our context.

Each agent in the environment possesses an identity that is unique with a very high level of confidence - Proof of identity - proof that we are entitled to do something, that we can be made accountable. Connect to our digital traces. This leads to improved governance. Decentralized identity management tools. Eliminate the need of a single credential issuer. Can work with anonymous pep networks.

Identity (you are who you say you are) and credentials (now you can do what you are asking to do - about access), entitlement.

See also about Universal Wallets.

Explore secure biometric key solutions.

Privacy: provide total control over data to agents.

On permissionless blockchains ephemeral signing keys are used, but that hinders auditability and transparency purposes (track back a user). Explore cryptographic tools such as anonymous credentials (e.g. Idemixer) to allow users to sign transactions without disclosing their actual identity and to prevent any two different transactions from being linked.

Allow smart contracts to verify strongly encrypted transactions. Explore zero-knowledge proofs and multi-party computation to enable verifiability without hindering privacy. Make trade-offs between efficiency and privacy and the possibility of relying on SGX technology (description only at the CPU level) when cryptographic solutions fall short.

Self sovereign identity: see also Decentralized Identifiers (DIDs), supported by W3C. Use public/private keys and zero-knowledge proofs. Implementations: Sovrin and uPort.

Identity (unique) vs member (location based).

identity free approaches to every-day tasks, automatic anonymisation of data and strengthening identity management systems.

Give users more control of their own data. User control to ease the decision making and customisation of settings to give the user a role in their internet. Portability of personal data-sets, transfer or share such data based on user choice.

Three digital ID systems being actively used: (a) centralized; (b) third-party based; (c) and self-sovereign ID systems. One of the fundamental requirements is, in fact, that identities remain portable, and that people retain control over their personal data by choosing with whom it can be shared and for what purposes. A true decentralized solution would enable people to maintain full control over their personal data (with a real self-sovereign identity solution). Need to guarantee the 'unicity' and 'singularity' of these identities. As digital identifiers can be in a variety of formats, an important requirement for a global identity system is the establishment of technical standards for interoperability like the Decentralized Identifier (DID) - supported by the Decentralized Identity Foundation. Challenges Challenge: Control of individual identity ability to always refer to it, update it, hide it, prevent others to claim it. Use it to access to all individual data, retrieve claims when needed; Open and transparent systems and algorithms used to administer and operate digital identities, relevant information and services must be transportable, and not be held by a single third-party entity Wide adoption of the identity platform, easily accessible and connected services, scalable and real time services Automated data governance to reduce costs. Appropriate metadata and data quality definition methods; Define the appropriate data cataloguing system to offer search and retrieval capabilities.

How can numerous datasets and requests for processing can be managed effectively while securing privacy and having users as the owners of their data.

Decentralised identifiers (DIDs), help build a direct, encrypted channel for p2p communication. DIDs also make these channels portable from one transport or one security context to another.

Verifiable credentials (VCs), sets of claims about an agent (individual or organizations) of which the provenance and immutability can be proved and that can optionally come with additional assurances. “zero-knowledge proofs” can be used.

Self-sovereign identity (SSI) can be implemented through DIDs and VCs. It can facilitate an infrastructure for the exchange of 'qualified data', i.e. data must be sufficiently qualified for making the transaction commitment decision; parties can create their own policies about which data is needed for making a particular decision, and what assurances are required to make that data qualify for doing so.

Roles in the SSI ecosystem: issue (issuer), store and provide (wallet), request and obtain (validation), and revoke (revocation) 'qualified data'. Also, digital battlers that respect (machine readable) policies, that provide the guidance needed to issue, store, provide, request, obtain, validate, revoke all kinds of data on behalf of their user, and even to negotiate transactions and make commitment decisions.

Possible outcomes using SSI Convenience Automatically fill webforms No more passwords for login, which is a form Reduce bureaucracy (processes and time) More accurate processes. Security, privacy and inclusion No login form and password - no spoofing and phishing. No smap Mutual authentication, user and service matched, both ways More privacy Efficiency and effectiveness operational savings with lower validation costs and time - paper attestation, scanning and uploading documents is no longer needed, and form processors no longer need to check data, request updates etc. Better user experience, because only qualified data is exchanged.

Distributed digital identity management

Data sovereignty & self-sovereign digital identities management - it must be irreversibly impossible to identify an individual through any of the means “reasonably likely to be used”

Agent Anything that can perform an action Has agency

Agents can be individuals, groups, projects, networks Agents can also be bots, machines (IoT)

Are verified, unique, secure, private, portable, … Identities for individuals, Identities for resources (equipment, tools, physical spaces, ...), Identity for AI agents.