- A response to Identity Woman's recent blog post about Anoncreds
Kaliya has done a great job of honestly and fairly distilling a nuanced technical discussion about the Hyperledger SSI stack
Read More
- Convergent Wisdom
Convergent Wisdom is utilizing the knowledge gained from studying multiple solutions that approach a similar outcome in different ways in order to choose the appropriate solution for the problem at hand.
Read More
- Financing Open Source Software Development with DAO Governance Tokens
Is it possible to fix the tragedy of the commons problem with a DAO Governance Token?
Read More
- My Take on the Misframing of the Authentication Problem
First off, the user experience of authenticating on the web has to be joyful first and foremost. Secondly, I think it's important that we recognize that the security of any authentication system is probabilistic, not deterministic.
Read More
- Comparing VCs to ZCAP-LD
Verifiable Credentials are well suited for provenanced statements. ZCAP-LD is great for distributed authorization systems.
Read More
- Example Design of an Authorization System with Verifiable Credentials and the Tradeoffs
I'll cover an example design which relies upon verifiable credentials for an authorization system and the tradeoffs faced.
Read More
- Common Delegation Patterns in the Verifiable Credential Ecosystem
Here's 3 ways you can utilize VCs and DIDs to enable delegation and attenuated delegation for more complex scenarios.
Read More
- Theory of Making a Private Internet
Privacy is made possible when all actions appear to be random.
Read More
- Why I Decided to Remove Google Analytics from my Blog
I want to see a world where people can use technology privately each and everyday
Read More
- Tech isn't a Tool to Impose Values
Technologies should adapt to the people rather than users adapting to their technologies.
Read More
- A thought experiment on free will
An experiment on testing free will
Read More
- The Case for Off-Chain Data Storage
Lets use blockchain smart contracts to act as a trusted database administrator and log management system.
Read More
- Quantifying Trust: Is it possible?
If we can build a system that has guarantees of identity verifiability and immutability than how do we quantify trust?
Read More
- ID2020-Summit-Review
it's important that organizations like ID2020 host these events to bring key stakeholders together to share experiences and form coalitions
Read More
- Cryptonomics Equilibrium
Economic equilibrium means that cryptocurrency has tangible value to all involved parties therefore increasing the demand and flow of the tokens.
Read More
- Personal Privacy in the Wake of Reoccurring Data Breaches
It seems like every other week there is a new data breach in the news.
Read More