Skip to content

Key Points from the 37th Internet Identity Workshop (IIW) Event

Evolution of the web landscape underscored, focusing on essential factors for constructing secure, user-centric digital web ecosystems.

Redefining the Digital Landscape: Critical Components for Crafting Secure and User-Oriented Website...
Redefining the Digital Landscape: Critical Components for Crafting Secure and User-Oriented Website Ecosystems, as Discussed in IIW.

Rockin' the Digital Identity World: IIW's Unleashed Vision

Key Points from the 37th Internet Identity Workshop (IIW) Event

Get ready to dive into the rip-roaring world of the Internet Identity Workshop (IIW)! This bi-annual event, electrifying our online discussions since 2005, takes place at the Computer History Museum in Mountain View, CA. IIW's "Open Space un-Conference" format ignites natural conversations, network building, and collaborative learning, where attendees customize its format to share and vibe on all things related to digital identity.

The IIW is your go-to spot to stay ahead of the curve on digital identity trends and technological advancements. And the best part? No boring presentations here!

Jammin' Discussion Board at IIW

Major Themes

collaboration and harmony

Collaboration was the name of the game, with discussions zeroing in on unifying the digital identity scene. The goal? A cohesive global digital identity infrastructure that smoothly intertwines various technologies and platforms. This requires maturing protocols, aligning them with fresh standards, and ensuring compatibility between different digital identity solutions. Mega plus? Improved interoperability between Verifiable Credential (VC) providers and digital wallets!

User-Focused Approach

The user was the star of the show, with the focus squarely on consequential end-user experience. The consensus? Future digital identity systems should dazzle users, leaving them in control of their digital identities, offering a smooth experience without compromising security or privacy.

Building on foundations

Big-name companies rocked up, signaling interest in adopting evolving digital identity protocols onto existing Web2 infrastructures. This sets the stage for incorporating brand-spankin' new digital identity protocols onto existing foundations. Bonus points for education across various industries, from university-level gurus to introductions to next-gen concepts like Web3, DIDs, and decentralized technologies such as blockchain-based ledgers.

Key Discussions at IIW

Harmonious Discussion Circle at IIW

The Future of Identity Protocols: OpenID4VC and DIDComm

The IIW was all about the latest in digital identity protocols, featuring OpenID4VC and DIDComm.

OpenID4VC is gaining serious momentum, especially with EU support. Made specifically for presenting Verifiable Credentials, this protocol is closely related to other popular OpenID protocols. Now, get this—the EU is super into it and issued guidelines advocating OpenID4VC for verifiable credential issuance and presentation.

DIDComm, rooted in Decentralized Identifiers (DIDs), is a versatile solution for secure and private communication within the digital identity realm. Sam Curren's session sparked visions of DIDComm serving as the future partner to OpenID4VC. Its design makes it compatible with diverse use cases, supporting directpeer-to-peer communication with Bluetooth and NFC coming soon!

Digital Security and Verification

Digital security and verification were hot topics at IIW.

BIP32, which enhances digital transaction security and flexibility via the creation of multiple cryptographic keys from a single seed, moon rocked the talks. BIP32 pairs wonderfully with FIDO keys, which set the gold standard for enhanced authentication processes, safeguarding users' digital identities from adversaries.

The eIDAS requirements, setting European Single Market standards for electronic identification, made a splash. eIDAS requirements emphasize security and secure communication in digital identity, promoting hardware-based keys seamlessly integrated into devices to provide robust protection.

Discussions also emphasized the importance of secure protocols surrounding digital identity documents. These protect documents during creation, issuance, and verification, upholding integrity and confidentiality. Digital signatures and encryption are prime examples of such protocols.

Lastly, there were discussions on various assurance levels in verifiable credentials (VCs). VCs use these levels to indicate the confidence that can be placed in the verification of an individual's digital identity. For instance, a VC with a high assurance level may require users to prove their identity through government-issued ID and biometric authentication scans.

Deep Dive on User Binding by IDunion

Collaboration and Standardization in Digital Identity

With collaboration and standardization as priorities, the IIW covered the W3C CCG DID Method Registry, chaired by our team member, Martin Riedel. Discussions touched on potential DID method deprecation, regular liveliness checks, and multiple registrations under a single namespace, highlighting our passion for fostering a dependable digital identity framework.

Additionally, we partook in the "Verifiable Government through Citizen-Controlled Digital Identity" session. Presentations pondered innovative digital identity strategies that sidestep blockchain. The main focus was achieving smooth interoperability among diverse state regulators. An eye-catching idea that emerged was the autonomic identifier, a form of digital identity owned by citizens through private key possession. This ingenious concept paves the way for states to validate specific aspects of a user's digital identity, such as age and driver's license status, without revealing unnecessary personal details.

Our Take

At our website, we're on a mission to build a digital ID app—our Identity App. This app empowers users to request, save, and share verifiable credentials in a confidential fashion, bypassing sensitive personal information. Insights and discussions from the IIW have sharpened our understanding of the evolving digital identity landscape and user needs. Our vision is to create an Identity App and technology championing trust, privacy, and convenience.

Wrapping Up

The 37th IIW positioned the digital identity landscape, underscoring the significance of collaboration, innovation, and standardization in constructing a secure, user-friendly digital identity ecosystem. We're psyched about the future of digital identity, where technology and user experience complement each other to create a secure, seamless, and user-centric universe. Rock on!

Contextual Deep Dives (Optional)

Overview of DID Method Registry

The W3C CCG DID Method Registry, championed by our team member, Martin Riedel, aims to standardize the way Decentralized Identifiers (DIDs) are formed and verified within the digital identity ecosystem. At IIW, discussions revolved around refining the registry to ensure compatibility and interoperability among various DID methods.

The Potential of Autonomic Identifiers

The concept of autonomic identifiers came up during the "Verifiable Government through Citizen-Controlled Digital Identity" session. Autonomic identifiers, owned by citizens, allow them to control access to specific aspects of their digital identity. The potential of autonomic identifiers can pave the way for privacy-preserving digital identity solutions that meet the diverse needs of users.

Cybersecurity and Data-and-Cloud-Computing

with Digital Security and Verification as key components, discussions at IIW emphasized the importance of secure protocols and solutions to safeguard personal data in the digital identity realm.

Education and Self-Development through Learning

Attendees had the opportunity to attend sessions on various next-gen concepts like Web3, DIDs, and decentralized technologies such as blockchain-based ledgers, empowering individuals to learn and grow in the realm of digital identity.

Personal-Growth and Technology Alignment

IIW provided a platform for attendees to collaborate and learn about cutting-edge digital identity technologies, enabling them to stay ahead of the curve and enhance their personal growth in the technology industry.

Read also:

    Latest