<style> .reveal { font-size: 32px; } .reveal h1, .reveal h2 { font-family: "League Gothic", Impact, sans-serif; line-height: 0.9em; } .reveal ul { font-size: 1.1em; line-height: 1.3em; } .reveal p { line-height: 1.3em; } </style> # Sad State of Decentralized Identity ## and What To Do About It * Host: * Christopher Allen * Panelists: * Ryan Grant --- ## The Bad News * eIDAS captured by Apple & Google (mDL) * US states following suit _(its cheap)_ * DHS funding for DID/VC has collapsed, team resigned * KYC everywhere but insecure * Web3/Nostr: progress but no key rotation --- ## Why Decentralized Identity is Losing * Technical standards met geopolitical reality * Corporate capture of "decentralization" * Builder's Dilemma: pure but irrelevant vs. adopted but compromised --- ## Most Dangerous When systems **succeed** while **inverting their purpose** Infrastructure for sovereignty becomes infrastructure for control --- ## What We Haven't Addressed * **Property → Privilege**: You don't own your credentials * **Contract → Coercion**: Accept terms or be excluded * **Justice → Absolutism**: Algorithmic decisions without appeal * **Transparency → Invisibility**: Can't see who controls you * **Exit → Erasure**: Can't leave without losing everything * **Identity → Commodity**: Your identity becomes a product --- ## Some Hope * **Swiss e-ID**: Referendum passed, uses SSI DID/VS tech stack, potential transition path to LESS (legally enabled self-sovereign) Identity * **Utah**: State Endorsed Identity experiments * **Wyoming**: Law protecting private keys --- ## The Dilemma **Technology alone?** Not enough (failure of DID/VC proof) **Legislation alone?** Not enough (failure of eIDAS proof) --- ## So You Think You Have a Solution? ### Don't Waste My Time <font size=5.5> * Persistent keys as identifiers * Keys that can't rotate * Using same key material for different purposes * Naive BIP32 derivation tricks * Rely on DNS or X.509 * KYC-centric strategies * Global names or Global Proof-of-Personhood * Monetization via tokens * Over-identification (passports as root-of-trust, etc.) * VCs that phone home * Other solutions depending on centralized entities </font> <p/> ### DO YOUR HOMEWORK! --- ## These Might Impress Me <font size=5.5> * Self-revokable psuedoanonymity * Authorization strategies over identification strategies - Such as object capabilities (not ACLs) * Leverage multi-party computation (MuSIG2, FROST, FHE) * Leverage BitTorrent mainline DHT * Demonstrate understanding of Proof-of-Personhood (not a bot) vs Proof of Unique Personhood (not a bot and only represented once in this contextual domain) * Incorporate Progressive Trust (reveal over time) </font> --- ## Questions for the Panel * What's the path forward? * Build alternatives or constrain platforms? * Both? --- ## Resources **Musings of a Trust Architect:** https://www.blockchaincommons.com/musings/gdc25/ **The Path to Self-Sovereign Identity:** https://www.lifewithalacrity.com/article/the-path-to-self-soverereign-identity/ **Origins of Self-Sovereign Identity:** https://www.lifewithalacrity.com/article/origins-SSI/
{"title":"Sad State of Decentralized Identity, and What To Do About It (slides Tabconf)","description":"View the presentation with \"Slide Mode\"","robots":"noindex, nofollow","slideOptions":"{\"theme\":\"black\",\"transition\":\"fade\",\"controls\":true,\"progress\":true,\"slideNumber\":true,\"center\":true}","contributors":"[{\"id\":\"408a260c-90cf-4399-836c-fa045d136c3f\",\"add\":5573,\"del\":2204,\"latestUpdatedAt\":1759861493617},{\"id\":\"0b0d4b7e-e9c8-49f0-9ef4-13bc8cb215c4\",\"add\":131,\"del\":2,\"latestUpdatedAt\":1759878025683}]"}
    120 views
   owned this note