or
or
By clicking below, you agree to our terms of service.
New to HackMD? Sign up
Syntax | Example | Reference | |
---|---|---|---|
# Header | Header | 基本排版 | |
- Unordered List |
|
||
1. Ordered List |
|
||
- [ ] Todo List |
|
||
> Blockquote | Blockquote |
||
**Bold font** | Bold font | ||
*Italics font* | Italics font | ||
~~Strikethrough~~ | |||
19^th^ | 19th | ||
H~2~O | H2O | ||
++Inserted text++ | Inserted text | ||
==Marked text== | Marked text | ||
[link text](https:// "title") | Link | ||
 | Image | ||
`Code` | Code |
在筆記中貼入程式碼 | |
```javascript var i = 0; ``` |
|
||
:smile: | ![]() |
Emoji list | |
{%youtube youtube_id %} | Externals | ||
$L^aT_eX$ | LaTeX | ||
:::info This is a alert area. ::: |
This is a alert area. |
On a scale of 0-10, how likely is it that you would recommend HackMD to your friends, family or business associates?
Please give us some advice and help us improve HackMD.
Do you want to remove this version name and description?
Syncing
xxxxxxxxxx
Connecting IPFS users and permissions to DIDs with UCAN

IPFS þing - July 13, 2022Note:
How many of you know UCAN and DIDs?
How can we bridge dids and ipfs data (CIDs) with UCANs
Hugo Dias
@hugomrdias
DID
Identity
Note:
Who you are
DID 1.0 just got the 👍🏼 to advance to W3C Recommendation after years of effort from many contributing organizations.
https://www.w3.org/2022/06/DIDRecommendationDecision.html
Note:
Sir Tim Berners-Lee AKA The Director (Ralph Swick)
The did:key Method
A DID Method for Static Cryptographic Keys
https://w3c-ccg.github.io/did-method-key/
Note:
most of security and privacy considerations can be addressed but UCANs
UCAN
User Controlled Authorization Networks
Transfer authority without transferring keyshttps://github.com/ucan-wg
https://ucan.xyz/
Note:
What you can do
Note:
Achieve Inversion of Control back to the user.
UCANs are all that we need to sign into multiple machines, delegate access for service providers to do things while we’re offline, securely collaborate on documents with a team, and more. We get the flexibility of fine- or coarse-grained control, all controlled by the one who cares about the data the most: the user.
UCANs achieve public verifiability with chained certificates and decentralized identifiers (DIDs). Verifiable chain compression is enabled via content addressing.
Permission delegation is something traditional centralized services can’t easily offer.
But UCAN !
DID + UCAN
💞
Note:
who you are
what you can do
Note:
ucan.storage prototype, kinda centralized all capabilities are issued by the service.
signature chain
direct upload from Alice to Service
dag-ucan
https://github.com/ipld/js-dag-ucan
IPLD schema encoded as DAG-CBOR
Note:
With schema we can encode to JWT and others.
Also supports raw JWT to DAG-UCAN with some whitespaces and key order magic.
Export full UCAN chain into a CAR file.
ucanto - framework for UCAN based RPC
(you can too)
oh yeah we can 💪🏼
Note:
2. Capability routing and execution - A system for binding capability handles (a.k.a providers) to form services with built-in routing.
4. it can work over pubsub, libp2p etc with pluggable codecs for request/response.
DIDs + DAG-UCAN + UCANTO
=
Identity + Permissions + Operations
Packaged as CAR files
Note:
Services/Actors then are just interpreters of these operations.
Because all of the information is captured in the IPLD structure in the CAR, HTTP is just dumb pipe and any other transport could be used in it’s place.
We are already using this to build up protocols to upload data to Elastic IPFS.
w3name with UCAN
Delegated "IPNS" mutation
Note:
How can we make it really IPNS !?!?
What if IPFS could talk UCAN 🫶🏼
What else ?
Note:
we find UCANs really useful but they would be even more cool if ipfs could understand them.
Future Work
Thank you! 🙏🏼
Note:
UCAN Join
Building Apps on IPFS track, 01:00pm Subconscious & Noosphere: WWW over IPFS