{"id":2410,"date":"2019-08-30T16:56:25","date_gmt":"2019-08-30T16:56:25","guid":{"rendered":"https:\/\/digitalhumanrights.blog\/?p=2410"},"modified":"2022-11-22T13:22:37","modified_gmt":"2022-11-22T13:22:37","slug":"self-sovereign-identities","status":"publish","type":"post","link":"https:\/\/digitalhumanrights.blog\/en\/self-sovereign-identities\/","title":{"rendered":"Reinventing the wheel: How self-sovereign identities could help to fix the internet"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.19&#8243; custom_padding=&#8221;0|0px|43px|0px|false|false&#8221;][et_pb_row _builder_version=&#8221;3.19&#8243; custom_padding=&#8221;14.859375px|0px|14px|0px|false|false&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.19&#8243; parallax=&#8221;off&#8221; parallax_method=&#8221;on&#8221;][et_pb_text _builder_version=&#8221;3.19&#8243;]<\/p>\n<p>The German Minister of the Interior, Mr. Zimmermann, just couldn\u2019t believe it. There were really &#8220;adult judges&#8221; who adopted the &#8220;marginal concerns&#8221; of a radical minority against the census. And worse: only months later, constitutional judges formulated in a landmark decision what would prove to be visionary in the long run:<\/p>\n<blockquote>\n<p>\u201cUnder the modern conditions of data processing, the free development of personality presupposes the protection of the individual against unlimited collection, storage, use and disclosure of his or her personal data. (&#8230;) In this respect, the fundamental right guarantees the right of the individual to determine the disclosure and use of his or her personal data on his or her own.\u201d<br \/> <em>From the census decision of the Federal Constitutional Court, December 1983<\/em><\/p>\n<\/blockquote>\n<p>But who would have thought in those days that we would one day live in a world in which people would <em>unlimitedly<\/em> make their data available themselves? Which wouldn\u2019t be a problem if it weren\u2019t <em>personal<\/em> data. As soon as data can be traced back to a person, the interest in profiling begins to grow. The difficulty of effectively anonymizing data and the lack of awareness of why one should protect one\u2019s identity is one reason why the Internet could be described as \u201cbroken\u201d. It&#8217;s time to fix it and reinvent the wheel that\u2019s rolling over us.<\/p>\n<p>&nbsp;<\/p>\n<h4>Digital self-determination stands and falls with the concept of identity<\/h4>\n<p>&nbsp;<\/p>\n<p>How do we verify an identity? Our everyday proof of identity functions via a <em>marker<\/em> that is as unique as possible: name, mobile number, passport, a signature, a familiar face. How unique and verifiable these markers must be, depends on the requirements. At the airport, of course, they are more strict than in the coffee shop on the corner.<\/p>\n<p>Increasingly, we are also clearly recognizable for computers. Our mobile phone scans our fingerprint to unlock. At authorities or in hospitals, in everyday contracts or customer relationships \u2014 everywhere it is interesting to know exactly who is who. This creates trust or entitles you to benefits. And while we are there, we increasingly (and often carelessly) link our digital self with all kinds of features. For example, many people log on to websites with their Facebook account. Others use a health app.<\/p>\n<p>Clothing sizes, creditworthiness, daily traffic routes, search queries \u2014 all this helps the algorithms to make us personalized offers or predict our behavior. From the data points that we leave behind on an hourly basis, omniscient computers could calculate an extremely comprehensive model of our characteristics, preferences and habits.<\/p>\n<p>They could? They are actually doing it, since quite some time. At least, as long as we tell them who we are.<\/p>\n<p>The only way to escape this system so was to avoid these conjunctions, e.g. keep away from social media, use discrete browsers and exercise data minimizastion. With increasing linkage, this idea is just doesn\u2019t apply any more. This creates a great demand in techniques that enable us to prove our identity selectively and reliably without becoming highly profiled \u201ctransparent citizens\u201d. There are promising approaches that are currently being developed and tested. One of the buzzwords is <em>Self-Sovereign Identities (SSI)<\/em>.<\/p>\n<p>&nbsp;<\/p>\n<h4>Reclaiming the digital me<\/h4>\n<p>&nbsp;<\/p>\n<blockquote>\n<p>\u201cIdentity is at the core of each and every interaction. While the required level of trust between identities can vary from one interaction to another, the necessity to exchange it in a secure and privacy preserving manner is universal.<span class=\"Apple-converted-space\">\u201d<\/span><\/p>\n<p><em><a href=\"https:\/\/www.bundesblock.de\/wp-content\/uploads\/2019\/01\/ssi-paper.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Position paper of bundesblock.de<\/a><\/em><\/p>\n<\/blockquote>\n<p>The <a href=\"https:\/\/www.w3.org\/Jigsaw\/Doc\/Programmer\/SSI.html\" target=\"_blank\" rel=\"noopener noreferrer\">W3C<\/a> and the <a href=\"https:\/\/sovrin.org\" target=\"_blank\" rel=\"noopener noreferrer\">Sovrin network<\/a>\u00a0and others are currently developing standards\u00a0to create anonymous yet reliable interactions in the digital world. The basis for this should be a system of digital identity markers (\u201cDID\u201d) which are unique and eternally valid and can be created for each individual interaction. With the help of a <a href=\"https:\/\/en.wikipedia.org\/wiki\/Public-key_cryptography\" target=\"_blank\" rel=\"noopener noreferrer\">key pair<\/a> and a publicly accessible <a href=\"https:\/\/en.wikipedia.org\/wiki\/Blockchain\" target=\"_blank\" rel=\"noopener noreferrer\">blockchain<\/a>, it is possible to verify that the DID in question is authentic.<\/p>\n<p>It does not matter if the issuer is the registry office or my grandmother. The occasion can be minor \u2014 there are enough DIDs for everyone. DIDs can say for example \u201cThis person &#8230;<\/p>\n<ul>\n<li>&#8230; is in our yoga studio customer no. 123 with a bonus credit.\u201d<\/li>\n<li>&#8230; is our employee and is allowed to enter the house.\u201d<\/li>\n<li>&#8230; has a press card.\u201d<\/li>\n<li>&#8230; was vaccinated against measles.\u201d<\/li>\n<li>&#8230; has a valid driving license and is over 21 years old.\u201d<\/li>\n<li>&#8230; has paid for the book shipment XY and may receive the parcel.\u201d<\/li>\n<\/ul>\n<p>Linked, the information leads us to an increasingly complex picture of the person \u2014 separately, it only delivers the relevant information. The only thing that really matters is that the DID reliably guarantees the property in question. And not whether the other person is also interested in cats or dogs. At a bank, e.g., we can simply release exactly the set of information from our wallet that they really need. And they can verify this information absolutely reliably.<\/p>\n<p>&nbsp;<\/p>\n<h4>We must understand that anonymity is not for criminals, but the crucial building block for our free future<\/h4>\n<p>&nbsp;<\/p>\n<p>The term \u201canonymous\u201d rises fears \u2014 and some politicians are doing their best to stir them up. Meanwhile, we have long since surrendered our digital sovereignty to dubious hands. <em>Abuse of power comes as no surprise<\/em> \u2014 The world\u2019s governments as well as the overpowering Internet monopolies each pursue their own interests. A clear name obligation on Facebook, a state backdoor for news apps, Payback cards or the custom officers checking your Amazon account \u2014 we are slowly learning that being anonymous in cyberspace must not be the exception, but must become the rule.<\/p>\n<p>So how are the requirements for advanced DID infrastructure formulated?<\/p>\n<ul>\n<li>It must be interoperable, i.e. open to everyone.<\/li>\n<li>It must be decentralised, not controlled by a single authority.<\/li>\n<li>It must be verifiable, i.e. incorruptible and always accessible for everyone.<\/li>\n<li>It must preserve the anonymity of the participants \u2014 only I control my wallet.<\/li>\n<\/ul>\n<p>The Blockchain Bundesverband writes about this in its position paper:<\/p>\n<blockquote>\n<p>\u201cIn the self-sovereign identity paradigm, individuals and entities are enabled to create and manage their identifiers in a decentralized fashion, without relying on a third-party identity provider. Unlike existing identity solutions that are structured from the perspective of the organization that provided an identifier, self-sovereign identities are structurally set out to work from the perspective of the individual or entity that is the subject of a given identifier.\u201d<\/p>\n<\/blockquote>\n<p>&nbsp;<\/p>\n<h4>So, how does this thing work \u2014 and why only now?<\/h4>\n<p>&nbsp;<\/p>\n<p>Often, fast technical solutions have prevailed over sustainable ones. The issue of identity on the Internet was thought about early on, but it was only damage that made us wise. The blockchain has also spread surprisingly slowly as a technology (Bitcoin has been around for 10 years), but is now the basis of many digital practices such as <em>smart contracts<\/em> or auditing. Explaining self-sovereign identities in their entirety goes beyond the scope here (and others can do it better: <a href=\"https:\/\/vimeo.com\/323738760\" target=\"_blank\" rel=\"noopener noreferrer\">here in brief<\/a>\u00a0and <a href=\"https:\/\/www.youtube.com\/watch?v=Jcfy9wd5bZI\" target=\"_blank\" rel=\"noopener noreferrer\">here\u00a0in a longer keynote<\/a>).<\/p>\n<p>So here a brief summary of the essential points:<\/p>\n<p>In contrast to \u201cnormally\u201d assigned identity markers (passport, log-in etc.) or IDs managed by third parties (<em>federated ID<\/em>), Self-Sovereign Identity does not have a server controlled by anyone. All IDs are written into a blockchain which is shared between several servers (<em>Distributed Ledger<\/em>) and thus protected against individual manipulations. It is used to verify the DIDs which are being created in any number and anonymous using encryption. Nobody knows to whom a snippet of a blockchain is assigned, but everyone can check that it is there. There is no longer an opportunity to associate all the information about a person with each other. And all actors are just peers in a network accessible to all.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/digitalhumanrights.blog\/wp-content\/uploads\/SSI_1-300x188.jpg\" width=\"536\" height=\"336\" alt=\"\" class=\"wp-image-2386 alignnone size-medium\" srcset=\"https:\/\/digitalhumanrights.blog\/wp-content\/uploads\/SSI_1-300x188.jpg 300w, https:\/\/digitalhumanrights.blog\/wp-content\/uploads\/SSI_1-768x480.jpg 768w, https:\/\/digitalhumanrights.blog\/wp-content\/uploads\/SSI_1-1024x640.jpg 1024w, https:\/\/digitalhumanrights.blog\/wp-content\/uploads\/SSI_1-400x250.jpg 400w, https:\/\/digitalhumanrights.blog\/wp-content\/uploads\/SSI_1-1080x675.jpg 1080w\" sizes=\"(max-width: 536px) 100vw, 536px\" \/><\/p>\n<p><em>The principle of Self-Sovereign Identity is that both partners of the interaction are peers on a forgery-proof basis.<\/em><\/p>\n<p><em><\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/digitalhumanrights.blog\/wp-content\/uploads\/SSI_2-300x188.jpg\" width=\"530\" height=\"332\" alt=\"\" class=\"wp-image-2389 alignnone size-medium\" srcset=\"https:\/\/digitalhumanrights.blog\/wp-content\/uploads\/SSI_2-300x188.jpg 300w, https:\/\/digitalhumanrights.blog\/wp-content\/uploads\/SSI_2-768x480.jpg 768w, https:\/\/digitalhumanrights.blog\/wp-content\/uploads\/SSI_2-1024x640.jpg 1024w, https:\/\/digitalhumanrights.blog\/wp-content\/uploads\/SSI_2-400x250.jpg 400w, https:\/\/digitalhumanrights.blog\/wp-content\/uploads\/SSI_2-1080x675.jpg 1080w\" sizes=\"(max-width: 530px) 100vw, 530px\" \/><\/p>\n<p><em>The principle of DID forms the basis for an infrastructure of anonymous but verifiable identity snippets.<\/em><\/p>\n<p><em><\/em><\/p>\n<p>DIDs are collected in digital wallets and transferred like passwords when needed \u2014 only they don\u2019t have to be remembered. Apps, authorities, messenger services, social networks and anyone else can build their security architectures on this technical basis without having to fear manipulation. In this way, higher-level contracts can be addressed that take place on a different layer than the blockchain. This provides exactly the degree of anonymity or disclosure that both actors agree to. Monopolizing standards of state or private bodies become unnecessary.<\/p>\n<p>&nbsp;<\/p>\n<h4>The Pros \u2014 and cons?<\/h4>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>The effects of such an infrastructure are incalculable. What Bitcoin is to the financial system \u2014 a currency whose rules are not controlled, but set in code \u2014 Self-Sovereign Identities can soon become to the rest of the digital cosmos. This toolbox moves the constitutionally guaranteed but lost\u00a0<em>informational self-determination<\/em> back into the realm of the feasible. In the future, we will be more often free to decide in whom we trust. Which politician would not want to welcome and support this?<\/p>\n<p>Well, it doesn\u2019t take much imagination to think that Self-Sovereign Identities will not only have friends. Various actors profit from the traces that we leave in our technical communication and from which they form profiles. This includes marketing strategists as well as troll factories, the political or religious police in totalitarian states as well as the local criminal police, who now will have to come up with new methods. How could e.g. China maintain its policy of surveillance and popular education\u00a0on this basis? Perhaps we will even see campaining against SSI or doubts being spread that the method really works.<\/p>\n<p>Yet, a campaign against SSI would make just as little sense as a campaign against Bitcoin or the Darknet. Even the strongest actors are powerless against the development itself. Even influencing, e.g. by secret services, is unlikely to be successful in view of open source codes. And to which solutions citizens, entrepreneurs or consumers will turn in the end, is up to them.<\/p>\n<p>\/\/<\/p>\n<p>&nbsp;<\/p>\n<p>Cartoon with kind permission of Ian Baker<\/p>\n<p>[\/et_pb_text][et_pb_divider _builder_version=&#8221;3.19&#8243;][\/et_pb_divider][et_pb_text _builder_version=&#8221;3.19&#8243;]<\/p>\n<h4>Deepening links<\/h4>\n<p><a href=\"https:\/\/vimeo.com\/323738760\" target=\"_blank\" rel=\"noopener noreferrer\">Introduction video (5 Min.)<\/a><\/p>\n<p><a href=\"https:\/\/www.youtube.com\/watch?v=7blFckPJcCQ\" target=\"_blank\" rel=\"noopener noreferrer\">Video on DID (10 Min.)<\/a><\/p>\n<p><a href=\"https:\/\/bitsonblocks.net\/2017\/05\/17\/gentle-introduction-self-sovereign-identity\/\" target=\"_blank\" rel=\"noopener noreferrer\">Longer article on bitcoinblocks.net<\/a><\/p>\n<p><a href=\"https:\/\/www.youtube.com\/watch?v=Jcfy9wd5bZI\" target=\"_blank\" rel=\"noopener noreferrer\">Keynote of a developer (1 h)<\/a><\/p>\n<p>&nbsp;<\/p>\n<p><b>New vokabulary to look up: <\/b><\/p>\n<p>Anonymous Attribute Systems<\/p>\n<p>Blockchain<\/p>\n<p>Curated Identities<\/p>\n<p>DDI (Decentralised Digital Identity)<\/p>\n<p>DID = Decentralised Identifier (SSI stadard being developped by W3C)<\/p>\n<p>DID Auth (SSI stadard on authetification\u00a0being developped by DIF \/ IETF)<\/p>\n<p>DKMS = interoperable key management (SSI stadard being developped by OASIS)<\/p>\n<p>Digital Wallet<\/p>\n<p>Distributed Ledgers<\/p>\n<p>Etherium (blockchain application)<\/p>\n<p>Federated identity<\/p>\n<p>IAM (Identity and Access Management)<\/p>\n<p>KNY (Know your customer)<\/p>\n<p>PKI (Public Key Infrastructure)<\/p>\n<p>Smart Contracts (technically applicable rules)<\/p>\n<p>SSO (Single Sign-on)<\/p>\n<p>SSI (Self-Sovereign Identities)<\/p>\n<p>Token (transmitted valuable item)<\/p>\n<p>Veryfiable Credentials (SSI stadard on verifiable credentials, being developped by W3C)<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The German Minister of the Interior, Mr. Zimmermann, just couldn\u2019t believe it. There were really &#8220;adult judges&#8221; who adopted the &#8220;marginal concerns&#8221; of a radical minority against the census. And worse: only months later, constitutional judges formulated in a landmark decision what would prove to be visionary in the long run: \u201cUnder the modern conditions [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2344,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[10,11],"tags":[369,367,370,363,365,364,366,368,362],"class_list":["post-2410","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-essentials","tag-blockchain","tag-credit-score","tag-distributed-ledger","tag-id","tag-identity-markers","tag-ids","tag-passport","tag-payments","tag-self-sovereign-identities"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Reinventing the wheel: How self-sovereign identities could help to fix the internet - digital human rights blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/digitalhumanrights.blog\/en\/self-sovereign-identities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Reinventing the wheel: How self-sovereign identities help fix the internet\" \/>\n<meta property=\"og:description\" content=\"Digital self-determination stands and falls with the central concept of identity. SSI are a promising approach to prove our identity selectively and reliably, without it allowing to model a \u201ctransparent citizen\u201d.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/digitalhumanrights.blog\/en\/self-sovereign-identities\/\" \/>\n<meta property=\"og:site_name\" content=\"digital human rights blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-30T16:56:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-22T13:22:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/digitalhumanrights.blog\/wp-content\/uploads\/Cartoon_Wheel_f.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Peder\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Reinventing the wheel: How self-sovereign identities help fix the internet\" \/>\n<meta name=\"twitter:description\" content=\"Digital self-determination stands and falls with the central concept of identity. SSI are a promising approach to prove our identity selectively and reliably, without it allowing to model a \u201ctransparent citizen\u201d.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/digitalhumanrights.blog\/wp-content\/uploads\/Cartoon_Wheel_t.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@digihumanrights\" \/>\n<meta name=\"twitter:site\" content=\"@digihumanrights\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peder\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/digitalhumanrights.blog\\\/en\\\/self-sovereign-identities\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/digitalhumanrights.blog\\\/en\\\/self-sovereign-identities\\\/\"},\"author\":{\"name\":\"Peder\",\"@id\":\"https:\\\/\\\/digitalhumanrights.blog\\\/#\\\/schema\\\/person\\\/9ea26e39ca79d247d75ce8faa910fae0\"},\"headline\":\"Reinventing the wheel: How self-sovereign identities could help to fix the internet\",\"datePublished\":\"2019-08-30T16:56:25+00:00\",\"dateModified\":\"2022-11-22T13:22:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/digitalhumanrights.blog\\\/en\\\/self-sovereign-identities\\\/\"},\"wordCount\":1858,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/digitalhumanrights.blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/digitalhumanrights.blog\\\/en\\\/self-sovereign-identities\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/digitalhumanrights.blog\\\/wp-content\\\/uploads\\\/Cartoon_Wheel_q.jpg\",\"keywords\":[\"blockchain\",\"credit score\",\"distributed ledger\",\"ID\",\"identity markers\",\"IDs\",\"passport\",\"payments\",\"self-sovereign identities\"],\"articleSection\":[\"Blog\",\"Essentials\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/digitalhumanrights.blog\\\/en\\\/self-sovereign-identities\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/digitalhumanrights.blog\\\/en\\\/self-sovereign-identities\\\/\",\"url\":\"https:\\\/\\\/digitalhumanrights.blog\\\/en\\\/self-sovereign-identities\\\/\",\"name\":\"Reinventing the wheel: How self-sovereign identities could help to fix the internet - digital human rights blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/digitalhumanrights.blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/digitalhumanrights.blog\\\/en\\\/self-sovereign-identities\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/digitalhumanrights.blog\\\/en\\\/self-sovereign-identities\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/digitalhumanrights.blog\\\/wp-content\\\/uploads\\\/Cartoon_Wheel_q.jpg\",\"datePublished\":\"2019-08-30T16:56:25+00:00\",\"dateModified\":\"2022-11-22T13:22:37+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/digitalhumanrights.blog\\\/en\\\/self-sovereign-identities\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/digitalhumanrights.blog\\\/en\\\/self-sovereign-identities\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/digitalhumanrights.blog\\\/en\\\/self-sovereign-identities\\\/#primaryimage\",\"url\":\"https:\\\/\\\/digitalhumanrights.blog\\\/wp-content\\\/uploads\\\/Cartoon_Wheel_q.jpg\",\"contentUrl\":\"https:\\\/\\\/digitalhumanrights.blog\\\/wp-content\\\/uploads\\\/Cartoon_Wheel_q.jpg\",\"width\":1200,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/digitalhumanrights.blog\\\/en\\\/self-sovereign-identities\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/digitalhumanrights.blog\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Reinventing the wheel: How self-sovereign identities could help to fix the internet\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/digitalhumanrights.blog\\\/#website\",\"url\":\"https:\\\/\\\/digitalhumanrights.blog\\\/\",\"name\":\"digital human rights blog\",\"description\":\"Blog f\u00fcr digitale Menschenrechte\",\"publisher\":{\"@id\":\"https:\\\/\\\/digitalhumanrights.blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/digitalhumanrights.blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/digitalhumanrights.blog\\\/#organization\",\"name\":\"Giordano-Bruno-Stiftung \\\/ Digital Human Rights Blog\",\"url\":\"https:\\\/\\\/digitalhumanrights.blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/digitalhumanrights.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/digitalhumanrights.blog\\\/wp-content\\\/uploads\\\/gbs_dhrb_quadrat.jpg\",\"contentUrl\":\"https:\\\/\\\/digitalhumanrights.blog\\\/wp-content\\\/uploads\\\/gbs_dhrb_quadrat.jpg\",\"width\":1200,\"height\":1200,\"caption\":\"Giordano-Bruno-Stiftung \\\/ Digital Human Rights Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/digitalhumanrights.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/digihumanrights\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/digitalhumanrights.blog\\\/#\\\/schema\\\/person\\\/9ea26e39ca79d247d75ce8faa910fae0\",\"name\":\"Peder\",\"url\":\"https:\\\/\\\/digitalhumanrights.blog\\\/en\\\/author\\\/peder\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Reinventing the wheel: How self-sovereign identities could help to fix the internet - digital human rights blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/digitalhumanrights.blog\/en\/self-sovereign-identities\/","og_locale":"en_US","og_type":"article","og_title":"Reinventing the wheel: How self-sovereign identities help fix the internet","og_description":"Digital self-determination stands and falls with the central concept of identity. SSI are a promising approach to prove our identity selectively and reliably, without it allowing to model a \u201ctransparent citizen\u201d.","og_url":"https:\/\/digitalhumanrights.blog\/en\/self-sovereign-identities\/","og_site_name":"digital human rights blog","article_published_time":"2019-08-30T16:56:25+00:00","article_modified_time":"2022-11-22T13:22:37+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/digitalhumanrights.blog\/wp-content\/uploads\/Cartoon_Wheel_f.jpg","type":"image\/jpeg"}],"author":"Peder","twitter_card":"summary_large_image","twitter_title":"Reinventing the wheel: How self-sovereign identities help fix the internet","twitter_description":"Digital self-determination stands and falls with the central concept of identity. SSI are a promising approach to prove our identity selectively and reliably, without it allowing to model a \u201ctransparent citizen\u201d.","twitter_image":"https:\/\/digitalhumanrights.blog\/wp-content\/uploads\/Cartoon_Wheel_t.jpg","twitter_creator":"@digihumanrights","twitter_site":"@digihumanrights","twitter_misc":{"Written by":"Peder","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/digitalhumanrights.blog\/en\/self-sovereign-identities\/#article","isPartOf":{"@id":"https:\/\/digitalhumanrights.blog\/en\/self-sovereign-identities\/"},"author":{"name":"Peder","@id":"https:\/\/digitalhumanrights.blog\/#\/schema\/person\/9ea26e39ca79d247d75ce8faa910fae0"},"headline":"Reinventing the wheel: How self-sovereign identities could help to fix the internet","datePublished":"2019-08-30T16:56:25+00:00","dateModified":"2022-11-22T13:22:37+00:00","mainEntityOfPage":{"@id":"https:\/\/digitalhumanrights.blog\/en\/self-sovereign-identities\/"},"wordCount":1858,"commentCount":0,"publisher":{"@id":"https:\/\/digitalhumanrights.blog\/#organization"},"image":{"@id":"https:\/\/digitalhumanrights.blog\/en\/self-sovereign-identities\/#primaryimage"},"thumbnailUrl":"https:\/\/digitalhumanrights.blog\/wp-content\/uploads\/Cartoon_Wheel_q.jpg","keywords":["blockchain","credit score","distributed ledger","ID","identity markers","IDs","passport","payments","self-sovereign identities"],"articleSection":["Blog","Essentials"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/digitalhumanrights.blog\/en\/self-sovereign-identities\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/digitalhumanrights.blog\/en\/self-sovereign-identities\/","url":"https:\/\/digitalhumanrights.blog\/en\/self-sovereign-identities\/","name":"Reinventing the wheel: How self-sovereign identities could help to fix the internet - digital human rights blog","isPartOf":{"@id":"https:\/\/digitalhumanrights.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/digitalhumanrights.blog\/en\/self-sovereign-identities\/#primaryimage"},"image":{"@id":"https:\/\/digitalhumanrights.blog\/en\/self-sovereign-identities\/#primaryimage"},"thumbnailUrl":"https:\/\/digitalhumanrights.blog\/wp-content\/uploads\/Cartoon_Wheel_q.jpg","datePublished":"2019-08-30T16:56:25+00:00","dateModified":"2022-11-22T13:22:37+00:00","breadcrumb":{"@id":"https:\/\/digitalhumanrights.blog\/en\/self-sovereign-identities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/digitalhumanrights.blog\/en\/self-sovereign-identities\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/digitalhumanrights.blog\/en\/self-sovereign-identities\/#primaryimage","url":"https:\/\/digitalhumanrights.blog\/wp-content\/uploads\/Cartoon_Wheel_q.jpg","contentUrl":"https:\/\/digitalhumanrights.blog\/wp-content\/uploads\/Cartoon_Wheel_q.jpg","width":1200,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/digitalhumanrights.blog\/en\/self-sovereign-identities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/digitalhumanrights.blog\/en\/"},{"@type":"ListItem","position":2,"name":"Reinventing the wheel: How self-sovereign identities could help to fix the internet"}]},{"@type":"WebSite","@id":"https:\/\/digitalhumanrights.blog\/#website","url":"https:\/\/digitalhumanrights.blog\/","name":"digital human rights blog","description":"Blog f\u00fcr digitale Menschenrechte","publisher":{"@id":"https:\/\/digitalhumanrights.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/digitalhumanrights.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/digitalhumanrights.blog\/#organization","name":"Giordano-Bruno-Stiftung \/ Digital Human Rights Blog","url":"https:\/\/digitalhumanrights.blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/digitalhumanrights.blog\/#\/schema\/logo\/image\/","url":"https:\/\/digitalhumanrights.blog\/wp-content\/uploads\/gbs_dhrb_quadrat.jpg","contentUrl":"https:\/\/digitalhumanrights.blog\/wp-content\/uploads\/gbs_dhrb_quadrat.jpg","width":1200,"height":1200,"caption":"Giordano-Bruno-Stiftung \/ Digital Human Rights Blog"},"image":{"@id":"https:\/\/digitalhumanrights.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/digihumanrights"]},{"@type":"Person","@id":"https:\/\/digitalhumanrights.blog\/#\/schema\/person\/9ea26e39ca79d247d75ce8faa910fae0","name":"Peder","url":"https:\/\/digitalhumanrights.blog\/en\/author\/peder\/"}]}},"_links":{"self":[{"href":"https:\/\/digitalhumanrights.blog\/en\/wp-json\/wp\/v2\/posts\/2410","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/digitalhumanrights.blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/digitalhumanrights.blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/digitalhumanrights.blog\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/digitalhumanrights.blog\/en\/wp-json\/wp\/v2\/comments?post=2410"}],"version-history":[{"count":18,"href":"https:\/\/digitalhumanrights.blog\/en\/wp-json\/wp\/v2\/posts\/2410\/revisions"}],"predecessor-version":[{"id":5694,"href":"https:\/\/digitalhumanrights.blog\/en\/wp-json\/wp\/v2\/posts\/2410\/revisions\/5694"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/digitalhumanrights.blog\/en\/wp-json\/wp\/v2\/media\/2344"}],"wp:attachment":[{"href":"https:\/\/digitalhumanrights.blog\/en\/wp-json\/wp\/v2\/media?parent=2410"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/digitalhumanrights.blog\/en\/wp-json\/wp\/v2\/categories?post=2410"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/digitalhumanrights.blog\/en\/wp-json\/wp\/v2\/tags?post=2410"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}