If you will be attending Rebooting the Web of Trust Fall 2018 in Toronto, Canada, please upload your topic papers and advanced readings to this directory with a pull request (or, if you don't know how, post an issue).
Please see the Web of Trust Info website for more information about our community. Go to Eventbrite to register for this event.
In advance of the design workshop, all participants produced a one-or-two page topic paper to be shared with the other attendees on either:
- A specific problem that they wanted to solve with a web-of-trust solution, and why current solutions (PGP or CA-based PKI) can't address the problem?
- A specific solution related to the web-of-trust that you'd like others to use or contribute to?
Here are the advanced readings to date:
- Addressing Global/Local Barriers to Adoption of Decentralized Identity Systems by Eric Brown
- Agent to Agent Communication Protocol Overview by Kyle Den Hartog
- Blockcerts -- Where we are and what's next by Kim Hamilton Duffy, Anthony Ronning, Lucas Parker, and Peter Scott
- Can Curation Markets Establish a Sustainable Technology Commons by Sam Chase
- CapAuth by Manu Sporny, Dave Longley, Chris Webber, and Ganesh Annan
- A Concept Diagram For RWOT Identity Terms by Andrew Hughes
- Cryptocurrency Wallets as a Form of Functional Identity by Mikerah Quintyne-Collins and Abdulwasay Mehar
- Decentralized Error Reporting by Jack Poole
- Decentralized Identities and eIDAS by Oliver Terbu
- Decentralized Identity: Hub Authentication & Message Encryption by Daniel Buchner
- DIDDoc Conventions for Interoperability by Stephen Curran & Olena Mitovska
- DIDs In DPKI by Greg Slepak
- DID Resolution Topics by Markus Sabadello
- Digital Identity for the Homeless by Matthew Wong, T. Tian & CG Chen
- Exploring Browser Web of Trust Use Cases by Peter Snyder and Ben Livshits
- Five Mental Models of Identity by Joe Andrieu
- Identity Hub Permissions / Authorization by Daniel Buchner
- IPLD as a general pattern for DID Documents by Christian Lundkvist
- Is a Decentralized Collective Identity Possible? by Heather Vescent
- Magenc Magnet URIs: Secure Object Permanence for the Web by Christopher Lemmer Webber
- Measuring Trust by Tyler Yasaka
- More Control for Identity Holders by Arturo Manzaneda and Ismenia Galvao
- Nobody REALLY Trusts the Blockchain by Dan Burnett, Shahan Khatchadourian, and Chaals Nevile
- Not-a-Bot: A Use Case for Decentralized Identity using Proximity Verification to generate a Web of Trust by Moses Ma & Claire Rumore
- The Political Economy of Naming by Kate Sills
- A Public Web of Trust of Public Identities by Ouri Poupko and Ehud Shapiro
- Resource Integrity Proofs by Ganesh Annan, Manu Sporny, Dave Longley, and David Lehn
- RWoT Tribal Knowledge: Cryptographic and Data Model Requirements by Manu Sporny, Dave Longley, and Chris Webber
- The Role of Standards in Accelerating Innovation by Michael B. Jones
- Scoped Presentation Request on Verifiable Credentials by Martin Riedel
- Secure Crypto-Wallet Introductions by Wolf McNally, Ryan Grant
- Standards for Agency and Decentralized Information Governance - Early Experience by Adrian Gropper, MD, Michael Chen, MD, and Lydia Fazzio, MD
- Towards Proof of Person by Peter Watts
- A Trustless Web-of-Trust by Ouri Poupko
- The United Humans by Bohdan Andriyiv
- Verifiable Displays by Kim Hamilton Duffy, Bohdan Andriyiv, and Lucas Parker
- Verifiable Offline Credentials by Michael Lodder
- What (and Who) Is In Your Wallet by Darrell O'Donnell
- Digital Identity for the Homeless by Matthew Wong, T. Tian & CG Chen
- Zero Trust Computing with DIDs and DADs by Samuel M. Smith
These primers overview major topics which are likely to be discussed at the design workshop. If you read nothing else, read these. (But really, read as much as you can!)
- DID Primer — Decentralized Identifiers (extended version also available)
- Functional Identity Primer — A different way to look at identity
- Verifiable Credentials Primer — the project formerly known as Verifiable Claims
- DIDs In DPKI - how DIDs fit into Decentralized Public-key Infrastructure