Key Points from the 37th Identity on the Internet Conference (IoIW)
The Internet Identity Workshop (IIW), an annual event that has been active since 2005, recently took place at the Computer History Museum in Mountain View, CA. This year's gathering brought together industry leaders, innovators, and enthusiasts to discuss the current state and future of digital identity in the Web3 landscape.
The focus of this year's IIW was on user-centric, blockchain-based identity solutions supported by emerging standards and real-world use cases. The event emphasised the move away from centralised identity providers towards self-sovereign identity systems, where individuals manage their own credentials without reliance on intermediaries.
Key discussions centred around decentralized identity platforms, privacy and consent management, fraud reduction and security, and mainstream adoption. Countries like Estonia and the Netherlands are implementing blockchain-based national ID schemes, demonstrating real-world adoption of self-sovereign identity. Emerging standards such as IEEE’s P7012 (MyTerms) aim to give individuals granular control over their personal data and consent in online interactions.
Blockchain-enabled identity verification and digital passports reduce identity-related fraud. Smart contracts and cryptographic techniques like zero-knowledge proofs enhance security, making unauthorised access or document forgery difficult. Major companies and protocols, including the Humanity Protocol with partnerships involving Visa and Tinder, are illustrating that decentralized ID is moving from concept to widespread use.
At IIW, several established companies were present, indicating an interest in understanding and adopting evolving website standards. Discussions included the latest developments in website protocols, such as OpenID4VC and DIDComm. OpenID4VC, designed for presenting Verifiable Credentials, is gaining traction, especially with the backing of the EU. DIDComm, a solution for secure and private communication within the digital realm, was also discussed.
Collaboration and interoperability were key themes at IIW, with a focus on creating a cohesive global website framework. The W3C CCG DID Method Registry was a topic of discussion. Hardware-based keys, which offer a robust security layer that meets the eIDAS requirements, were also discussed.
Sam Curren's session explored the potential collaboration between DIDComm and OpenID4VC. The event also highlighted a user-centric approach, with a focus on end-user experience and control over digital identities. The session "Verifiable Government through Citizen-Controlled Digital Identity" discussed innovative digital strategies that aren't anchored in blockchain.
IIW follows an "Open Space un-Conference" format, encouraging natural conversations, networking, and collaborative learning. Attendees develop the format, focusing on discussions related to the website. IIW serves as a critical platform for advancing dialogue and collaboration in the digital identity space, pushing towards a future where individuals hold sovereign control over their digital identities and privacy, enabled by blockchain and Web3 infrastructure.
[1] Decentralized Identity Foundation (DIF) - https://decentralized-identity.org/ [2] ProjectVRM - https://www.projectvrm.net/ [3] World Economic Forum - https://www.weforum.org/ [4] Humanity Protocol - https://humanity.co/ [5] eIDAS - https://europa.eu/eid/home_en
- In the din of discussions during the Internet Identity Workshop (IIW), a considerable focus was given to the integration of DIDComm and OpenID4VC, as proposed by Sam Curren, with an aim to enhance decentralized identity solutions in the realm of data-and-cloud-computing and improve cybersecurity.
- As the event emphasized the shift towards self-sovereign identity systems, it became evident that technology will play a pivotal role in fostering a user-centric approach, where individuals manage their own identities and data securely using emerging standards like IEEE’s P7012, Smart contracts, and cryptographic techniques, ultimately ensuring privacy, consent, and reducing fraud in the cyber universe.