bc-bizdev
      • Sharing URL Link copied
      • /edit
      • View mode
        • Edit mode
        • View mode
        • Book mode
        • Slide mode
        Edit mode View mode Book mode Slide mode
      • Customize slides
      • Note Permission
      • Read
        • Owners
        • Signed-in users
        • Everyone
        Owners Signed-in users Everyone
      • Write
        • Owners
        • Signed-in users
        • Everyone
        Owners Signed-in users Everyone
      • Engagement control Commenting, Suggest edit, Emoji Reply
    • Invite by email
      Invitee

      This note has no invitees

    • Publish Note

      Share your work with the world Congratulations! 🎉 Your note is out in the world Publish Note No publishing access yet

      Your note will be visible on your profile and discoverable by anyone.
      Your note is now live.
      This note is visible on your profile and discoverable online.
      Everyone on the web can find and read all notes of this public team.

      Your account was recently created. Publishing will be available soon, allowing you to share notes on your public page and in search results.

      Your team account was recently created. Publishing will be available soon, allowing you to share notes on your public page and in search results.

      Explore these features while you wait
      Complete general settings
      Bookmark and like published notes
      Write a few more notes
      Complete general settings
      Write a few more notes
      See published notes
      Unpublish note
      Please check the box to agree to the Community Guidelines.
      View profile
    • Commenting
      Permission
      Disabled Forbidden Owners Signed-in users Everyone
    • Enable
    • Permission
      • Forbidden
      • Owners
      • Signed-in users
      • Everyone
    • Suggest edit
      Permission
      Disabled Forbidden Owners Signed-in users Everyone
    • Enable
    • Permission
      • Forbidden
      • Owners
      • Signed-in users
    • Emoji Reply
    • Enable
    • Versions and GitHub Sync
    • Note settings
    • Note Insights New
    • Engagement control
    • Make a copy
    • Transfer ownership
    • Delete this note
    • Insert from template
    • Import from
      • Dropbox
      • Google Drive
      • Gist
      • Clipboard
    • Export to
      • Dropbox
      • Google Drive
      • Gist
    • Download
      • Markdown
      • HTML
      • Raw HTML
Menu Note settings Note Insights Versions and GitHub Sync Sharing URL Help
Menu
Options
Engagement control Make a copy Transfer ownership Delete this note
Import from
Dropbox Google Drive Gist Clipboard
Export to
Dropbox Google Drive Gist
Download
Markdown HTML Raw HTML
Back
Sharing URL Link copied
/edit
View mode
  • Edit mode
  • View mode
  • Book mode
  • Slide mode
Edit mode View mode Book mode Slide mode
Customize slides
Note Permission
Read
Owners
  • Owners
  • Signed-in users
  • Everyone
Owners Signed-in users Everyone
Write
Owners
  • Owners
  • Signed-in users
  • Everyone
Owners Signed-in users Everyone
Engagement control Commenting, Suggest edit, Emoji Reply
  • Invite by email
    Invitee

    This note has no invitees

  • Publish Note

    Share your work with the world Congratulations! 🎉 Your note is out in the world Publish Note No publishing access yet

    Your note will be visible on your profile and discoverable by anyone.
    Your note is now live.
    This note is visible on your profile and discoverable online.
    Everyone on the web can find and read all notes of this public team.

    Your account was recently created. Publishing will be available soon, allowing you to share notes on your public page and in search results.

    Your team account was recently created. Publishing will be available soon, allowing you to share notes on your public page and in search results.

    Explore these features while you wait
    Complete general settings
    Bookmark and like published notes
    Write a few more notes
    Complete general settings
    Write a few more notes
    See published notes
    Unpublish note
    Please check the box to agree to the Community Guidelines.
    View profile
    Engagement control
    Commenting
    Permission
    Disabled Forbidden Owners Signed-in users Everyone
    Enable
    Permission
    • Forbidden
    • Owners
    • Signed-in users
    • Everyone
    Suggest edit
    Permission
    Disabled Forbidden Owners Signed-in users Everyone
    Enable
    Permission
    • Forbidden
    • Owners
    • Signed-in users
    Emoji Reply
    Enable
    Import from Dropbox Google Drive Gist Clipboard
       Owned this note    Owned this note      
    Published Linked with GitHub
    • Any changes
      Be notified of any changes
    • Mention me
      Be notified of mention me
    • Unsubscribe
    --- robots: noindex, nofollow --- # Revisiting the Ten Principles of Self-Sovereign Identity (part one) (see [Overview](https://hackmd.io/oUIM9j8TTa-wvhBvvO5vZA)) # Outline ## I. Introduction - **The challenge:** - Today’s identity systems too often treat identifiers and credentials as commodities to be owned, traded, or controlled like property. - This “ownership” framing undermines user empowerment, allows exclusionary gatekeeping, and repeats the same ad-tech abuses we see in data markets. - **Link to original essay:** - [Path to Self-Sovereign Identity (2016)](https://www.blockchaincommons.com/articles/Path-to-SSI/) - **Key quote:** > “For Self-Sovereign Identity (aka #SSI) to truly achieve international success, it needs…to have a basis under law.” > — Christopher Allen, “[Principal Authority](https://www.blockchaincommons.com/articles/Principal-Authority/)” --- ## II. From 10 Principles to Principal Authority - **Recap of the original ten principles:** 1. **Existence** – Every person has an identity. 2. **Control** – Users must control their identities. 3. **Persistence** – Identities must outlive ephemeral sessions. 4. **Consent** – No use without explicit user permission. 5. **Access** – Users see all data about themselves. 6. **Transparency** – Issuance and verification must be visible. 7. **Portability** – Data moves under user direction. 8. **Interoperability** – Systems work across contexts. 9. **Minimization** – Only the necessary data is shared. 10. **Protection** – Credentials must be cryptographically secure. - **Why they needed a stronger legal backbone:** - Shortcomings in enforcement: principles alone lack teeth when challenged by powerful intermediaries. - Ambiguity in delegation: who legally owes duties to the user when identity is shared? - **Key quote:** > “The use of Principal Authority to empower self-sovereign identity provides a legal foothold for many of my original 10 principles…” > — Christopher Allen, “[Principal Authority](https://www.blockchaincommons.com/articles/Principal-Authority/)” --- ## III. Why Property Law Misframes Identity 1. **Elizabeth M. Renieris (2018)** - **Quote:** > “A property law–based, ownership model of our data risks extending this broken ad tech model of the Internet to all other facets of our digital identity…” - **Link:** [Do We Really Want to Sell Ourselves?](https://www.linkedin.com/pulse/do-we-really-want-sell-ourselves-risks-property-law-data-greenwood) - **Implication:** Commodifying identity invites the same surveillance and exploitation we castigate in social media. 2. **Margaret Jane Radin (1982)** - **Quote:** > “Some objects are so bound up with our personhood that they should not be alienable commodities.” - **Link:** [Property and Personhood](https://law.stanford.edu/publications/property-and-personhood/) - **Implication:** Core identity attributes must be recognized as inherently non-tradeable. 3. **Cheryl I. Harris (1993)** - **Quote:** > “Through slavery, race and economic domination were fused; whiteness became a form of property.” - **Link:** [Whiteness as Property](https://harvardlawreview.org/wp-content/uploads/1993/06/1707-1791_Online.pdf) - **Implication:** Property models can cement systemic bias and exclusion. 4. **Helen Nissenbaum (2010)** - **Quote:** > “Information flows must obey the norms of each social context, not blanket ownership rules.” - **Link:** [Privacy in Context](https://crypto.stanford.edu/portia/papers/privacy_in_context.pdf) - **Implication:** Identity governance needs context-specific norms, not one-size-fits-all. 5. **Julie E. Cohen (2019)** - **Quote:** > “Code and law co-construct the resource that is personal data—transforming identity into capital.” - **Link:** [Between Truth and Power](https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2346459) - **Implication:** We must resist turning identity into a marketable asset subject to speculative extraction. 6. **Nadezhda Purtova (2015)** - **Quote:** > “Personal data already lies within overlapping property regimes; the question is whose rights prevail.” - **Link:** [Illusion of Personal Data as No One’s Property](https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2346693) - **Implication:** Absent clear legal defaults, corporate interests will dominate. --- ## IV. Principal Authority & Wyoming’s SF0039 - **Summary:** - Wyoming’s SF0039 (effective July 1, 2021) is the first U.S. law to define “personal digital identity” by **Principal Authority** rather than property. - **Statutory definition:** > “‘Personal digital identity’ means the intangible digital representation of…a natural person, over which he has principal authority…” > — Wyoming SF0039 - **Key features:** - **Delegation:** Principals can appoint agents under established agency law. - **Fiduciary duties:** Agents must act with loyalty, care, and full accounting. - **Non-alienability:** Identity cannot be sold or transferred as property. - **Link:** [Principal Authority article](https://www.blockchaincommons.com/articles/Principal-Authority/) --- ## V. Integrating Critiques into a Revised SSI Framework - **Market-Inalienability** *(Principle 11)* > “Identity attributes cannot be sold, leased, or assigned—ever.” *(Radin & Renieris)* - **Equity** *(Principle 12)* > “No credential framework may entrench systemic bias.” *(Harris)* - **Contextual Integrity** *(Principle 13)* > “Data flows must match the social norms of each context.” *(Nissenbaum)* - **Agency & Accountability** *(Principle 14)* > “Issuers and verifiers owe fiduciary-style duties.” *(Cohen & Purtova)* - **Mapping back:** - Show how each new principle augments or replaces one of the original ten. --- ## VI. Layering Legal Safeguards 1. **Human-Rights-First Governance** *(Principle 15)* - **Quote:** > “Our obsession with data has failed and distracted us…we need to return to the pillars of basic human rights law.” - **Link:** [How Data Distracts Us From Human Rights](https://www.su.org/resources/how-data-distracts-us-from-human-rights) - **Approach:** Anchor SSI in UDHR, ICCPR non-derogable rights. 2. **Statutory Data-Protection Regime** *(Principles 9 & 13)* - **Quote:** > “Information flows must obey the norms of each social context, not blanket ownership rules.” - **Link:** [Privacy in Context](https://crypto.stanford.edu/portia/papers/privacy_in_context.pdf) - **Approach:** Embed GDPR’s purpose limitation, minimization, consent. 3. **Trust & Fiduciary Law Models** *(Principles 5–10)* - **Quote:** > “Between truth and power is the code… and the code has fractal effects on both power and truth.” - **Link:** [Between Truth and Power](https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2346459) - **Approach:** Legally define issuers/verifiers as fiduciaries with duties of loyalty, care, accounting. 4. **Contract & Consumer-Protection Defaults** *(Principles 4 & 6)* - **Quote:** > “Personal data already lies within overlapping property regimes; the question is whose rights prevail.” - **Link:** [Illusion of Personal Data as No One’s Property](https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2346693) - **Approach:** Use unfair-terms prohibitions to mandate clear, revocable consent and forbid hidden clauses. 5. **Anti-Discrimination & Equity Mandates** *(Principle 12)* - **Quote:** > “Through slavery, race and economic domination were fused; whiteness became a form of property.” - **Link:** [Whiteness as Property](https://harvardlawreview.org/wp-content/uploads/1993/06/1707-1791_Online.pdf) - **Approach:** Mirror Title VII/ADA to ban SSI designs causing disparate impact. 6. **Tort Remedies for Identity Harms** *(Principle 10)* - **Quote:** > “Between truth and power is the code… and the code has fractal effects on both power and truth.” - **Link:** [Between Truth and Power](https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2346459) - **Approach:** Establish torts for negligent issuance, misrepresentation, unauthorized disclosure. --- ## VII. Policy Roadmap for DC - **Federal adoption:** - Draft model language to insert SF0039’s Principal Authority definition into REAL ID and e-ID statutes. - **Regulatory duties:** - Mandate that all identity issuers/verifiers operate under fiduciary and data-protection standards. - **Human-rights overlay:** - Codify inalienable identity rights in new federal guidelines (e.g., NIST SP 800-63 update). - **Equity safeguards:** - Require automated disparate-impact assessments and independent anti-bias audits. - **Immediate next step:** - Commission a joint NIST–DHS working group to draft and pilot the model language. --- ## VIII. Conclusion - **Reiterate:** - Moving beyond property metaphors to a Principal Authority core, bolstered by layered legal regimes, is how we deliver durable, equitable SSI. - **Call to action:** - Urge policy-makers to adopt this comprehensive rights-and-duties framework as the national standard.

    Import from clipboard

    Paste your markdown or webpage here...

    Advanced permission required

    Your current role can only read. Ask the system administrator to acquire write and comment permission.

    This team is disabled

    Sorry, this team is disabled. You can't edit this note.

    This note is locked

    Sorry, only owner can edit this note.

    Reach the limit

    Sorry, you've reached the max length this note can be.
    Please reduce the content or divide it to more notes, thank you!

    Import from Gist

    Import from Snippet

    or

    Export to Snippet

    Are you sure?

    Do you really want to delete this note?
    All users will lose their connection.

    Create a note from template

    Create a note from template

    Oops...
    This template has been removed or transferred.
    Upgrade
    All
    • All
    • Team
    No template.

    Create a template

    Upgrade

    Delete template

    Do you really want to delete this template?
    Turn this template into a regular note and keep its content, versions, and comments.

    This page need refresh

    You have an incompatible client version.
    Refresh to update.
    New version available!
    See releases notes here
    Refresh to enjoy new features.
    Your user state has changed.
    Refresh to load new user state.

    Sign in

    Forgot password
    or
    Sign in via Google Sign in via Facebook Sign in via X(Twitter) Sign in via GitHub Sign in via Dropbox Sign in with Wallet
    Wallet ( )
    Connect another wallet

    New to HackMD? Sign up

    By signing in, you agree to our terms of service.

    Help

    • English
    • 中文
    • Français
    • Deutsch
    • 日本語
    • Español
    • Català
    • Ελληνικά
    • Português
    • italiano
    • Türkçe
    • Русский
    • Nederlands
    • hrvatski jezik
    • język polski
    • Українська
    • हिन्दी
    • svenska
    • Esperanto
    • dansk

    Documents

    Help & Tutorial

    How to use Book mode

    Slide Example

    API Docs

    Edit in VSCode

    Install browser extension

    Contacts

    Feedback

    Discord

    Send us email

    Resources

    Releases

    Pricing

    Blog

    Policy

    Terms

    Privacy

    Cheatsheet

    Syntax Example Reference
    # Header Header 基本排版
    - Unordered List
    • Unordered List
    1. Ordered List
    1. Ordered List
    - [ ] Todo List
    • Todo List
    > Blockquote
    Blockquote
    **Bold font** Bold font
    *Italics font* Italics font
    ~~Strikethrough~~ Strikethrough
    19^th^ 19th
    H~2~O H2O
    ++Inserted text++ Inserted text
    ==Marked text== Marked text
    [link text](https:// "title") Link
    ![image alt](https:// "title") Image
    `Code` Code 在筆記中貼入程式碼
    ```javascript
    var i = 0;
    ```
    var i = 0;
    :smile: :smile: Emoji list
    {%youtube youtube_id %} Externals
    $L^aT_eX$ LaTeX
    :::info
    This is a alert area.
    :::

    This is a alert area.

    Versions and GitHub Sync
    Get Full History Access

    • Edit version name
    • Delete

    revision author avatar     named on  

    More Less

    Note content is identical to the latest version.
    Compare
      Choose a version
      No search result
      Version not found
    Sign in to link this note to GitHub
    Learn more
    This note is not linked with GitHub
     

    Feedback

    Submission failed, please try again

    Thanks for your support.

    On a scale of 0-10, how likely is it that you would recommend HackMD to your friends, family or business associates?

    Please give us some advice and help us improve HackMD.

     

    Thanks for your feedback

    Remove version name

    Do you want to remove this version name and description?

    Transfer ownership

    Transfer to
      Warning: is a public team. If you transfer note to this team, everyone on the web can find and read this note.

        Link with GitHub

        Please authorize HackMD on GitHub
        • Please sign in to GitHub and install the HackMD app on your GitHub repo.
        • HackMD links with GitHub through a GitHub App. You can choose which repo to install our App.
        Learn more  Sign in to GitHub

        Push the note to GitHub Push to GitHub Pull a file from GitHub

          Authorize again
         

        Choose which file to push to

        Select repo
        Refresh Authorize more repos
        Select branch
        Select file
        Select branch
        Choose version(s) to push
        • Save a new version and push
        • Choose from existing versions
        Include title and tags
        Available push count

        Pull from GitHub

         
        File from GitHub
        File from HackMD

        GitHub Link Settings

        File linked

        Linked by
        File path
        Last synced branch
        Available push count

        Danger Zone

        Unlink
        You will no longer receive notification when GitHub file changes after unlink.

        Syncing

        Push failed

        Push successfully