Add identity draft

This commit is contained in:
Jay Graber 2020-06-16 13:45:41 -07:00
parent d955b62a1d
commit 30338f4e39
1 changed files with 30 additions and 11 deletions

View File

@ -1,8 +1,6 @@
# Identity
Centralized identities are tied to a single service. Decentralized identity . Identity needs to be communicable across interoperable systems. Ideally, a user's identity would be detached from any particular service, allowing them to authenticate and migrate seamlessly across services.
# Purpose of Identity
Centralized identities are tied to a single service. Decentralized identity is not.
We will call entities with identities "actors", because non-human entities such as companies, organizations, and bots may have identities on a social network.
@ -14,28 +12,43 @@ Identity allows an actor to:
Desirable qualities for decentralized identities:
- Interoperable or portable between services
- Allow authentication and migration between services
- Allow communication across services
- Unique, global, and memorable
## Decentralized Identity
OAuth is currently the most successful identity standard. OAuth was created to securely transfer user credentials from one site to another. OAuth identity providers became centralized because users could not run or choose their own identity providers.
### Federated identity:
### Identity in federated applications:
- email
- XMPP
- Matrix
- Diaspora: User identities in Diaspora are tied to their pod, and cannot be migrated. Diaspora uses the Webfinger protocol to discover users from other pods. User information is returned via hCard, an open microformat standard for identity.
- Webfinger
- Mastodon:
- Solid
### P2p identity:
### Identity in p2p applications:
P2p systems key management, key verification, key backup. Account recovery.
- IPFS
- Peergos
- Hypercore
- Gun
- Ssb
- Aether
- Iris
### Blockchain identity
Namecoin
Handshake
- Namecoin
- Handshake
Lots of them.
Microsoft
IBM
### Decentralized Identifiers (DIDs)
@ -43,7 +56,11 @@ Handshake
The format of a DID is: a scheme identifier, followed by the DID method, followed by a method-specific identifier. A simple example: `did:example:123456789abcdefghi`
## Reputation, Trust
## Reputation & Trust
Web-of-trust
P2p network can ban, but cannot take away identity
## Social graph proof
@ -51,7 +68,9 @@ The format of a DID is: a scheme identifier, followed by the DID method, followe
## Fail cases
Account recovery. Sybils
Account recovery.
Sybils and spam
Impersonation
## Links