The SSI Orbit Podcast – Self-Sovereign Identity, Decentralization and Digital Trust cover image

The SSI Orbit Podcast – Self-Sovereign Identity, Decentralization and Digital Trust

#41 - Converging Towards a Common Trust Spanning Protocol (with Drummond Reed)

Oct 21, 2022
52:18

Drummond Reed has spent a quarter-century in Internet identity, security, privacy, and trust infrastructure. He is Director, Trust Services at Avast after their acquisition of Evernym, where he was Chief Trust Office. He is co-author of the book, Self-Sovereign Identity (Manning Publications, 2021), and co-editor of the W3C Decentralized Identifiers (DID) 1.0 specification. At the Trust over IP Foundation, Drummond is a member of the Steering Committee and co-chair of the Governance Stack Working Group and the Concepts and Terminology Working Group. At the Sovrin Foundation, he served as co-chair of the Sovrin Governance Framework Working Group for five years.

About Podcast Episode

Digital Trust Infrastructure is quickly becoming essential from an economic, political and security standpoint.

Much of the infrastructure today is controlled and owned by device OS providers such as Apple and Google.

It’s important that digital trust infrastructure providers can compete with the device OS providers.

To produce a level playing field, we must have open standards and open access to the infrastructure. This applies to both to Governments and Private Sector digital trust providers.

Some of the key topics covered during this episode with Drummond are:

  • Wallets vs Agents – their differences, their relationship and how agents will use more and more contextual intelligence to help you make decisions according to your preferences.
  • Can non-OS digital trust infrastructure providers compete with the device OS providers? (e.g., Apple owns the OS for mobile/desktops/tablets/smart watches)
  • Comparing DIDComm to NFC – if NFC really facilitates security and trust for close distance, do the combinations of digital wallets, digital agents and protocols (like DIDComm) do the same for trust at distance?
  • Trust Spanning Protocol – establishing authentic connections where both parties can authenticate each other (using the same hourglass model as TCP/IP). What are the architectural requirements for this protocol? And how can various protocols (e.g., DIDComm, KERI) converge into a trust spanning protocol?
  • What does DIDComm do better/different than other data exchange protocols? (such as OAuth2 and OpenID Connect)
  • Can the Trust over IP stack be used outside of Identity use cases? (e.g., payments, data sharing, social media)
  • Comparing SSI to Email – similarities in protocol design, asynchronous or synchronous UX, simplicity and generality

Where to find Drummond?

Follow Mathieu Glaude

Get the Snipd
podcast app

Unlock the knowledge in podcasts with the podcast player of the future.
App store bannerPlay store banner

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode

Save any
moment

Hear something you like? Tap your headphones to save it with AI-generated key takeaways

Share
& Export

Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode