Item 23. Personal Agent to Local EDV Server Instance Communications. Added.
Version 0.26
Item 48. Like a Tweet. Fixed typo.
Version 0.25
Item 14. Tweet Like Counter and Tweet Like Account List. Added.
Item 48. Like a Tweet. Updated.
Version 0.24
Items 3.5-3.7. Additional clarification added with respect to an account (Identity) having a Neighborhood of Followers and a Following.
Added Item 15. Stream Key. A Stream Key is a Tweet Key (for this version of the app scenario). Made appropriate changes where needed elsewhere in the document.
Item 29. Query a Personal Local EDV Service Instance for a Stream Item. Updated to reference the Generic Replication Pipeline pattern.
Item 30. Query Another Personal Agent or List of Personal Agents for a Stream Item. Updated to reference the Generic Replication Pipeline pattern.
Sovrin has many mission statements. The following is a summary of the Sovrin Foundation Mission Statement related text found on the Sovrin Foundation website.
The mission of the Sovrin Foundation is to create the Internet’s long-missing identity layer and provide a global public utility for digital identity to people, organizations, and things. The Sovrin Network enables you to personally curate and control your own collection of identity credentials by letting you selectively disclose your identity in a verifiable way.
Marketplace Solution The Sovrin Network enables people, organizations or IoT devices to prove things about themselves to anyone or anything, peer-to-peer, using data that the other party can verify. When anyone or anything is able to trust who or what it is dealing with online, massive amounts of friction can be removed, user experience can improve, and the transaction processes can be simplified.
Neutral Governance The Sovrin Foundation is a 501(c)(4) nonprofit entity that provides the business, legal, and technical support for the Sovrin Network. Charged with administering the publicly created Governance Framework for the Sovrin Network, the Foundation is committed to transparency and neutrality.
Breakthrough Technology Using the latest identity technology standards called Decentralized Identifiers (DIDs), the Sovrin Network allows for digital credentials to be privately issued, controlled, managed, and shared using a security standard called Zero Knowledge Proofs. The growth of the Sovrin Network partly depends on contributions from an active and supportive open-source development community.
Identity For All Integral to the mission of the Sovrin Foundation, is to ensure everyone — regardless of circumstance — has access to the Sovrin Network. The Sovrin Foundation’s I4A council partners with NGOs, civil society organizations, and other groups promoting more inclusive identification systems to help bring identity network technology to populations who may not otherwise be served.
Mission The Sovrin Foundation is a nonprofit organization established to promote the concept of internet identity for all and to administer the Governance Framework governing the Sovrin Network, a decentralized global public network enabling self-sovereign identity on the internet. The Sovrin Network is operated by independent Stewards and uses the power of a distributed ledger to give every person, organization, and thing the ability to own and control their own permanent digital identity.
Ensure everyone, regardless of circumstance, has access to the Sovrin Network and the utility it entails.
Support the infrastructure of the Sovrin Network by administering the Sovrin Trust Framework
Lead the open-source community effort that develops and builds the Sovrin protocol and the code that embodies it.
Recruit and assist Sovrin Stewards in operating the network
Lead thought and action in the advancement and acceptance of self-sovereign identity and the network on which it is built.
The Sovrin Foundation’s mission is to provide people and organizations with access to self-sovereign digital identity, and it does this by building, administering, and promoting a global, decentralized, public identity utility called the Sovrin Network.
The technical note proposes the addition of an operation attribute to the XML emitted for each exported item by the SPS2003 Upgrade.exe tool. The schema for the operation attribute would include the following operations:
Delete deletes an existing item imported into SPS2003 during a previous execution of the Import tool; or fails if the item doesn’t exist.
No
No
operation=”remove”
Delete deletes an existing item imported into SPS2003 during a previous execution of the Import tool, if it exists.
No
No
operation=”create”
Create creates a new instance of the exported item; or fails if the item already exists (see replace, update and add)
No
Yes
operation=”replace”
Replace replaces an existing item imported intoSPS2003 during a previous execution of the Import tool by executing a Delete followed by a Create; or fails if the item doesn’t exit.
Yes
Yes
operation=”add”
Add a) creates a new instance of the exported item if the item does *not* exist; or b) replaces an item if the item was imported into SPS2003 during a previous execution of the Import tool. This operation shouldn’t fail based on previous import operations
a) No b) Yes
a) Yes b) Yes
operation=”merge”
Add a) creates a new instance of the exported item if the item does *not* exist; or b) updates an item if the item was imported into SPS2003 during a previous execution of the Import tool. This operation shouldn’t fail based on previous import operations
a) No b) No
a) Yes b) No
operation=”update”
Update adds or replaces the values of selected attributes of an existing item imported intoSPS2003 during a previous execution of the Import tool; or fails if the item doesn’t exit.
No
No
operations=”ignore”
Processing for this item is skipped. The contents of the item are ignored.
Cover PageSDS Layers ModelSDS Layers Model: Red Line of Confidentiality/Self-SovereigntyCS-FARMs Abstract Model and Architecture VariationsCS-FARMs Architecture Variations and Red Line of Confidentiality/Self-SovereigntySample Confidential Storage Functional Architecture Reference Model (CS-FARM)
Almost 2 years ago when I created and documented the Social Evolution models for Technology Adoption, I never dreamed that I would be writing an article with the above title.
Paraphrasing, the Social Evolution model states:
A #wanderer is someone who leaves their tribe to share their knowledge and wisdom with others; to later form a party of explorers to explore and conquer a common set of goals; and, even further on, create a clan, a band, a tribe, and a tribal society, a group of people who live and work together – a group of tribes organized around kinships.
Model 2a: Social Evolution: Creation of Nation State, and
Model 2b. Social Evolution: Defining Principles.
Model 2a appears below followed by Model 2b.
Model 2a: Social Evolution: Creation of a Nation StateModel 2b: Social Evolution: Defining Principles
What I didn’t realize is that I was also defining a framework for a new political spectrum:
True decentralization/self-sovereignty on the far left
Complete authoritarian centralization on the far right
…and hence, a new Social Evolution model.
Model 2c. Social Evolution: Self-Sovereignty Political Spectrum
Is the Social Evolution model harmful? No, not at all …as long as it remains helpful in illuminating new concepts like the Self-Sovereignty Political Spectrum.
What is your self-sovereignty political affiliation? Are you:
A decentralized/self-sovereign sheep (that needs to be protected by default), or
An authoritarian centralizationist wolf (ready to devour your sheep mates)?
…or are you a centrist?
Have a great day.
“The mind once enlightened, cannot be darkened” – Thomas Paine
Self-Sovereign Identity, as a standalone phrase or as an acronym (SSI), is a very confusing, overloaded, ambiguous term whose use should be avoided in all situations[1]. In a conversation, a blog post, an article, or a standards document, it could mean any of the uncontracted terms in the following figure.
[1] The most recent example of SSI confusion is the Principles of SSI document published by the Sovrin Foundation (https://sovrin.org/principles-of-ssi/). The document makes no attempt to define SSI nor state what SSI is intended to be an acronym for. Principles of SSI has resulted in a lot of confudsion (https://hyperonomy.com/2018/12/18/definition-confuding/) in the decentralized identifier communities as different working groups try to apply the Principles in new domains without first discerning: a) precisely which definition/application of SSI should be used and b) the types or categories of principles being represented in the document. Without first having a clear and precise definition for (a), successfully achieving (b) is almost impossible.
Figure 1. SSI: Unconscious Contractions
The term Self-Sovereign Identity (or its acronym SSI) could refer to any or all of the uncontracted terms in the above figure – unless an author has taken great care to be clear and precise with respect to every occurrence/usage of the term and/or its acronym.
What is Self-Sovereign Identity (SSI)? …really
To understand, in plain English, what a Self-Sovereign Identity (SSI) is, one must first recognize that “Self-Sovereign” is an adjective applied to the noun “Identity”. The TDW Glossary derivation of Self- Sovereign Identity is depicted in the model below.
Figure 2. TDW Glossary: Digital Identity Neighborhood
Narration
Decentralized Identity is derived from (or is a specialization of) the term Digital Identity.
Self-Sovereign Identity, in turn, is derived from (or is a specialization of) the term Decentralized Identity.
In addition, Anonymous Self-Sovereign Identity and Non-anonymous Self-Sovereign Identity are derived from (or are a specialization of) the term Self-Sovereign Identity.
Key Definitions
Digital Identity
A Digital Identity aggregates:
A Digital Identifier, and
Associated Digital Identity Data.
Decentralized Identity
A Decentralized Identity is a Digital Identity that is Verifiable.
A Decentralized Identity is often persisted in a Verifiable Data Register.
Self-Sovereign Identity
A Self-Sovereign Identity is a Digital Identity whose Digital Identity Owner has the right to exclusively and permanently exert control over the usage of one or more associated Personal Digital Identifiers and, independently, the usage of any associated Personal Identity Data associated with each Personal Digital Identifier.
Because a Self-Sovereign Identity is a specialization of Decentralized Identity, a Self-Sovereign Identity is also Verifiable.
Digital Identity Owner
A Digital Identity Owner is an entity that may be held legally accountable. Digital Identity Owners includes Persons and Organizations but does not include Things. The actual legal accountability of an Identity Owner for any particular action depends on many contextual factors including the laws of the applicable jurisdiction, etc. [Sovrin Glossary]
Anonymous Self-Sovereign Identity
An Anonymous Self-Sovereign Identity is a Self-Sovereign Identity whose Personal Digital Identifier is associated with (or governed by) an Anonymous Digital Identifier Method.
Non-anonymous Self-Sovereign Identity
A Non-anonymous Self-Sovereign Identity is a Self-Sovereign Identity whose Personal Digital Identifier is associated with (or governed by) a Non-anonymous Digital Identifier Method.
Personal Digital Identifiers
A Personal Digital Identifiers is a Digital Identifier associated with a Person as the Subject of the identifier.
Personal Digital Data
Personal Digital Data is Digital Identity Data associated with a Personal Digital Identifier; and hence, a Person as the subject of the identifier.
Anonymous Digital Identifier Method
An Anonymous Digital Identifier Method is a Digital Identifier Method designed to guarantee anonymity and privacy for the Subject of a conforming Digital Identifier.
Non-anonymous Digital Identifier Method
A Non-anonymous Digital Identifier Method is a Digital Identifier Method that does not guarantee anonymity nor privacy for the Subject of a conforming Digital Identifier.
Self-Sovereign Identity Model (SSI Model)
The next most commonly (and generically) used term is Self-Sovereign Identity Model (SSI Model).
The Self-Sovereign Identity Model (SSI Model) is an identity system architecture based on the core principle that Identity Owners have the right to permanently exert control over the usage of one or more of their Personal Digital Identifiers and, independently, the usage of any associated Personal Identity Data. [inspired by the Sovrin Glossary]
PLEASE POST A COMMENT ABOUT WHY THIS PAGE IS IMPORTANT TO YOU. This particular page is 1 of my top 5 most viewed pages (ever) and I’d like to understand why. Thank you!