Self-Sovereign Identity (SSI)


sharon.leu@...
 

Hi All,

Thanks for sharing these resources.  Identity and privacy are two interrelated topics that are of critical importance in thinking about learner agency and promoting opportunity.  One of the key questions that the Department wants to explore is how the 10 SSI principles are applicable to the discussion of identity in the education use case.  For example, what are the different meanings those 10 principles have in the education-specific regulatory environment, whether the applications of these principles are constrained by different assumptions in the current operational dynamics, and what community values will guide design decisions across the various blockchain implementations so that we achieve student success.

I am excited to kick off this great conversation on Friday and to continue it with this group moving forward!

sharon


Taylor Kendal
 

Thanks, Feng, and Happy new year/decade :)

On a related note, if anyone wants to dive deeper down the SSI rabbit hole, get involved in the T3 Innovation Network --> Pilot Projects related to Empowering Learners and Workers in particular.


Here are a few resources from Project 10:

Lastly, here's an upcoming webinar (Jan 23) looking at Self-Sovereign Identity for Higher Education


Hou, Feng
 

Happy New Year, Everyone!

Thanks to Sharon, US Department of Education will hold the 2nd Summit on Education Blockchain. The summit will focus on identity and privacy in the context of the education use case.

Speaking of identity, many of you may have heard or read about Self-Sovereign Identity (SSI). Christopher Allen, who is credited as the architect of SSI, has created Christopher Allen’s Ten Principles of SSI:
  1.  Existence — Users must have an independent existence.
  2. Control — Users must control their identities.
  3. Access — Users must have access to their own data
  4. Transparency — Systems and algorithms must be transparent.
  5. Persistence — Identities must be long-lived.
  6. Portability — Information and services about identity must be transportable
  7. Interoperability — Identities should be as widely usable as possible.
  8. Consent — Users must agree to the use of their identity.
  9. Minimization — Disclosure of claims must be minimized
  10. Protection — The rights of users must be protected
He also says that “when properly designed and implemented, self-sovereign identity can offer these benefits while also protecting individuals from the ever-increasing control of those in power, who may not have the best interests of the individual at heart.”

Thanks!

Feng