<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Authenticity &#8211; Strategy Hubb | Global Business Consulting</title>
	<atom:link href="https://www.strategyhubb.com/topics/authenticity/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.strategyhubb.com</link>
	<description>Business Gateway Between Australasia, Asia and The U.A.E.</description>
	<lastBuildDate>Fri, 28 May 2021 06:36:10 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.5.1</generator>

<image>
	<url>https://www.strategyhubb.com/assets/uploads/2020/09/cropped-Strategy-Hubb-Facebook-Logo-Transparent-1-32x32.png</url>
	<title>Authenticity &#8211; Strategy Hubb | Global Business Consulting</title>
	<link>https://www.strategyhubb.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Decentralised Identity Management: A New Way to Own and Share Your Identity and Interact on Web 3.0 Infrastructure in a Trusted and Seamless Manner</title>
		<link>https://www.strategyhubb.com/decentralised-identity-management-a-new-way-to-own-and-share-your-identity-and-interact-in-web-3-0-infrastructure-in-a-trusted-and-seamless-manner/</link>
					<comments>https://www.strategyhubb.com/decentralised-identity-management-a-new-way-to-own-and-share-your-identity-and-interact-in-web-3-0-infrastructure-in-a-trusted-and-seamless-manner/#respond</comments>
		
		<dc:creator><![CDATA[Ryan Babbage]]></dc:creator>
		<pubDate>Fri, 28 May 2021 05:48:49 +0000</pubDate>
				<category><![CDATA[Article]]></category>
		<category><![CDATA[Authenticity]]></category>
		<category><![CDATA[Decentralisation]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[Distributed Ledger]]></category>
		<category><![CDATA[Identity Management]]></category>
		<category><![CDATA[Smart Contracts]]></category>
		<category><![CDATA[Trust]]></category>
		<guid isPermaLink="false">https://www.strategyhubb.com/?p=2138</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[<div class="vc_row wpb_row vc_row-fluid"><div class="a-vc-container container"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left;font-family:Source Sans Pro;font-weight:600;font-style:normal" class="vc_custom_heading" >Why do we need digital identities?</h4>
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p><span data-preserver-spaces="true">In the current internet era, web 2.0, by default, provides our personal data to the service providers. We provide credentials to access these services. </span><span data-preserver-spaces="true">Often much more is provided than necessary. Your data is used as well outside of the original service provider and on-sold by organisations. We have completely lost control of where our data ends up. </span><span data-preserver-spaces="true">As we know, there have been massive data breaches and misuse of our data across the board, and it is entirely out of our control….but this may be changing and sooner.</span></p>
<p><strong><img class="a-progressive-image a-js-progressive-image alignnone wp-image-2145 size-full" src="https://www.strategyhubb.com/assets/uploads/2021/05/Identity-Management-Strategyhubb-20x8.jpg" data-progressive-image-src="https://www.strategyhubb.com/assets/uploads/2021/05/Identity-Management-Strategyhubb.jpg" alt="" width="1736" height="680" data-progressive-image-srcset="https://www.strategyhubb.com/assets/uploads/2021/05/Identity-Management-Strategyhubb.jpg 1736w, https://www.strategyhubb.com/assets/uploads/2021/05/Identity-Management-Strategyhubb-300x118.jpg 300w, https://www.strategyhubb.com/assets/uploads/2021/05/Identity-Management-Strategyhubb-1024x401.jpg 1024w, https://www.strategyhubb.com/assets/uploads/2021/05/Identity-Management-Strategyhubb-768x301.jpg 768w, https://www.strategyhubb.com/assets/uploads/2021/05/Identity-Management-Strategyhubb-1536x602.jpg 1536w, https://www.strategyhubb.com/assets/uploads/2021/05/Identity-Management-Strategyhubb-20x8.jpg 20w" data-progressive-image-sizes="(max-width: 1736px) 100vw, 1736px" /></strong></p>

		</div>
	</div>
<h4 style="text-align: left;font-family:Source Sans Pro;font-weight:600;font-style:normal" class="vc_custom_heading" >So what do we need?</h4>
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p><span data-preserver-spaces="true">We need our identity to be self-owned and digital.</span></p>
<p><span data-preserver-spaces="true">Digital Identity means that instead of providing our data and credentials each time we interact with a web service, an identity service will provide these credentials. In web 2.0, this is similar to using Google ID across multiple platforms. Moreover, many forms of identity, such as a driver&#8217;s license, are not digital and must be provided in person or scanned into a digital document. </span><span data-preserver-spaces="true">Microsoft provides identity services for corporate customers so that each time a different corporate tool is used, the credentials are obtained from a central place. </span><span data-preserver-spaces="true">Nevertheless, these approaches put the onus on the enterprise and service provider to manage authentication and security. They are still centralised, so we do not control our data, and you still have a central store of identity data that will attract hackers – sometimes called a &#8216;honey pot&#8217;.</span></p>

		</div>
	</div>
<h4 style="text-align: left;font-family:Source Sans Pro;font-weight:600;font-style:normal" class="vc_custom_heading" >What does decentralisation give us?</h4>
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p><span data-preserver-spaces="true">In short, decentralisation gives us self-ownership of our identity and the ability to share different parts of our identity with different services as we see fit.</span></p>
<p><span data-preserver-spaces="true">If you have ever held cryptocurrency and stored your own crypto in a wallet, you would understand this impact. It is quite an experience to hold your own access to your own &#8216;money in your possession. No banks. No intermediary. You have the keys to move your digital assets and value. You become your own bank.</span></p>
<p><span data-preserver-spaces="true">This self-owned identity provides control over what we share and with and whom we share it, in addition—when necessary—provide the ability to take it back. Consider instead not to grant broad consent to countless apps and services that spread identity data across numerous providers. Individuals would have a secure, encrypted digital hub where they can store their identity. </span><span data-preserver-spaces="true">So with decentralised digital identity (DDID), it is an entirely different paradigm to identity management. </span><span data-preserver-spaces="true">Digital Identifiers credentials are supplied to third party service that we interact with. An identity owner would store many different digital identifiers in your own electronic wallet attested from different &#8216;issuers&#8217; (see more on issuers later). </span></p>
<p><span data-preserver-spaces="true">These identifiers are claims provided about your identity, validated by a trusted issuer such as the government for passport, driver&#8217;s license, and educational establishments for pass marks, attendance, and qualifications attained, who certify that you own the credential and its validity. </span><span data-preserver-spaces="true">The credentials are backed by the Blockchain, where the entire record has complete transparency and is supported by cryptographic, immutable proofs. For instance, an education establishment will digitally sign the identity&#8217;s credential legitimising the proof. This proof is tamper-resistant, meaning no one can alter the record. </span><span data-preserver-spaces="true">There is much evidence of how job applicants self-certify their credentials, and it is well known that there is a sizeable quantity of applicants who lie on their resume. Furthermore, it is challenging for an employer to check every credential.</span></p>

		</div>
	</div>
<h4 style="text-align: left;font-family:Source Sans Pro;font-weight:600;font-style:normal" class="vc_custom_heading" >How does Blockchain help?</h4>
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p><span data-preserver-spaces="true">Blockchain helps by providing a cryptographic block database with trusted network verifiers or nodes who are incentivised to act within a protocol, brings trust between the various parties in identity management. </span></p>
<p><em>Decentralised identity was proposed before Blockchain even existed, but Blockchain provides the backbone for security and privacy so that verifiers can be sure of the authenticity of the claim of identity.</em></p>
<p><span data-preserver-spaces="true">It is sometimes taken for granted the security and trust that Blockchain brings through immutably recording data and its various interactions. The paradigm shift of providing a trusted service is a complete game-changer; it allows users to self-own their identity along with decentralisation.</span></p>

		</div>
	</div>
<h4 style="text-align: left;font-family:Source Sans Pro;font-weight:600;font-style:normal" class="vc_custom_heading" >The three actors in identity management</h4>
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p><span data-preserver-spaces="true">When discussing identity management, it is essential to understand the three actors: Issuer, Owner/Entity, Verifier.</span></p>
<p><span data-preserver-spaces="true">The issuer is a trusted third party such as the government or educational institute. By issuing a credential, the identity issuer attests to the validity of the personal data, e.g. drivers license detail. The identity owner can then store the credential in their personal identity wallet and use them later to prove statements about their identity to a third party (the verifier). </span></p>
<p><em><span data-preserver-spaces="true">Authenticity and accuracy of claims are stored on the Blockchain, which provides a transparent means for a third party to validate the reliability of the claims.</span></em><span data-preserver-spaces="true"> This statement is essential and requires deconstruction of how a verifying party can assess the identity. When the identity owner (can be human or machine) presents their credentials, the verifier will validate the proof by assessing the validity of the issuer. </span><span data-preserver-spaces="true">In this way, the validation of proof is based on the verifier&#8217;s judgment of the issuer&#8217;s reliability. Hence third party verifiers do not need to validate the actual identity credential but only validate the provided proof of the attesting party, e.g. the government or institution.</span></p>

		</div>
	</div>
<h4 style="text-align: left;font-family:Source Sans Pro;font-weight:600;font-style:normal" class="vc_custom_heading" >Benefits</h4>
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>A service provider can independently verify claims of, for example, an education institute about a student. This unlocks access for identity interactions within the third party, allows access to sensitive disclosures based on the level of trust delivered through DID – this is a game-changer for many industries. Over time, identity can accrue greater legitimacy, gain endorsements from trust attestations from independent verification of who issued an endorsement and accumulate attestations from multiple trust systems. This provides greater confidence over time. Enabling trust in this way provides seamless and frictionless interaction with web services without needing a third party or middleman to enable trust.</p>
<p>This is a foundational element of web 3.0.</p>

		</div>
	</div>
</div></div></div></div></div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.strategyhubb.com/decentralised-identity-management-a-new-way-to-own-and-share-your-identity-and-interact-in-web-3-0-infrastructure-in-a-trusted-and-seamless-manner/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
