#41 - Converging Towards a Common Trust Spanning Protocol (with Drummond Reed)
Drummond Reed has spent a quarter-century in Internet identity, security, privacy, and trust infrastructure. He is Director, Trust Services at Avast after their acquisition of Evernym, where he was Chief Trust Office. He is co-author of the book, Self-Sovereign Identity (Manning Publications, 2021), and co-editor of the W3C Decentralized Identifiers (DID) 1.0 specification. At the Trust over IP Foundation, Drummond is a member of the Steering Committee and co-chair of the Governance Stack Working Group and the Concepts and Terminology Working Group. At the Sovrin Foundation, he served as co-chair of the Sovrin Governance Framework Working Group for five years.
About Podcast Episode
Digital Trust Infrastructure is quickly becoming essential from an economic, political and security standpoint.
Much of the infrastructure today is controlled and owned by device OS providers such as Apple and Google.
It’s important that digital trust infrastructure providers can compete with the device OS providers.
To produce a level playing field, we must have open standards and open access to the infrastructure. This applies to both to Governments and Private Sector digital trust providers.
Some of the key topics covered during this episode with Drummond are:
- Wallets vs Agents – their differences, their relationship and how agents will use more and more contextual intelligence to help you make decisions according to your preferences.
- Can non-OS digital trust infrastructure providers compete with the device OS providers? (e.g., Apple owns the OS for mobile/desktops/tablets/smart watches)
- Comparing DIDComm to NFC – if NFC really facilitates security and trust for close distance, do the combinations of digital wallets, digital agents and protocols (like DIDComm) do the same for trust at distance?
- Trust Spanning Protocol – establishing authentic connections where both parties can authenticate each other (using the same hourglass model as TCP/IP). What are the architectural requirements for this protocol? And how can various protocols (e.g., DIDComm, KERI) converge into a trust spanning protocol?
- What does DIDComm do better/different than other data exchange protocols? (such as OAuth2 and OpenID Connect)
- Can the Trust over IP stack be used outside of Identity use cases? (e.g., payments, data sharing, social media)
- Comparing SSI to Email – similarities in protocol design, asynchronous or synchronous UX, simplicity and generality
Where to find Drummond?
- LinkedIn: https://www.linkedin.com/in/drummondreed/
- Twitter: https://twitter.com/drummondreed
Follow Mathieu Glaude
- Twitter: https://twitter.com/mathieu_glaude
- LinkedIn: https://www.linkedin.com/in/mathieuglaude/
- Website: https://northernblock.io/
Information
- Show
- PublishedOctober 21, 2022 at 9:16 a.m. UTC
- Length52 min
- Episode41
- RatingClean