The SSI Orbit Podcast – Self-Sovereign Identity, Decentralization and Digital Trust

Mathieu Glaude
undefined
Nov 3, 2023 • 1h 5min

#62 - The Bhutan National Digital Identity (NDI): What it takes for a Nationwide Launch (with Kumar Gajmer and Pallavi Sharma)

Kumar Gajmer is the Product Manager and the Technical Lead for the Bhutan National Digital Identity (NDI) Project. He started his career in IT in 2008 as a Software Engineer. After completion of his high school in Bhutan, he did his bachelor's in Information Technology from Anna University, India. Pallavi Sharma leads Marketing and Communications for the Bhutan National Digital Identity (NDI) Project. As part of the role, she drives media, public relations, and education campaigns to accelerate adoption of the Bhutan NDI digital wallet. She also works in close liaison with national and international stakeholders for enhanced product positioning and visibility.About Podcast EpisodeRead more about the episode by heading to ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://northernblock.io/podcasts/bhutan-national-digital-identity-ndi-what-it-takes-for-a-nationwide-launch⁠⁠⁠⁠⁠⁠The full list of topics discussed between Kumar, Pallavi and Mathieu in this podcast episode include, Project Goals and Context - What were the overall goals of the Bhutan NDI project, and how do they relate to the specific context and needs of Bhutan? Financial Inclusion and Digital Identity - How does focusing on financial inclusion as a starting point influence the approach to digital identity in Bhutan? Decentralized Architecture Decision - What research and considerations led to the choice of a decentralized architecture for Bhutan's digital identity program? Legal Framework and Privacy - How is privacy integrated into Bhutan's legislation, and what legal adjustments were made to accommodate digital identity? Legislative Process Duration and Challenges - What was the timeline and were there any significant challenges in developing the National Digital Identity Act? Governance and Public-Private Partnership - What does the governance body for the NDI look like, and how does the public-private partnership model function? Business Strategy and Ecosystem Growth - How were use cases developed, and what strategies were employed to grow the ecosystem and foster public-private partnerships? Voluntary Participation - Is participation in the digital ID system optional for Bhutanese citizens? Use Case Categorization - How are use cases categorized and prioritized within the digital identity framework? Foundational Identity Credential - What does the foundational identity credential look like, and what government records form its basis? Private Sector Collaboration - What challenges were faced in educating and gaining buy-in from the private sector for the new digital identity infrastructure? Private Sector as Credential Issuers - Are there concerns from the private sector about the risks associated with becoming credential issuers? Technology and Wallet Infrastructure - Why was a decision made to develop a specific wallet for Bhutan's NDI instead of using existing wallet infrastructures like Apple or Google Wallet? International Standards and Compatibility - How were international standards considered in the development of Bhutan's digital identity infrastructure to accommodate foreigners?Where to find Kumar? LinkedIn: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.linkedin.com/in/kumar-gajmer-b8195024/ ⁠⁠Where to find Pallavi? LinkedIn: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.linkedin.com/in/pallavi-sharma-4302a737/Follow Mathieu Glaude X/Twitter: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/mathieu_glaude⁠⁠ LinkedIn:⁠⁠ ⁠⁠⁠⁠https://www.linkedin.com/in/mathieuglaude/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Website:⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://northernblock.io/
undefined
Oct 20, 2023 • 1h 15min

#61 - How Digital Credentials are Transforming Learning Data (with Kate Giovacchini & Andrew A. Johnson)

Kate Giovacchini (Arizona State University) and Andrew Johnson (Fluree, PBC) are both working on The Trusted Learner Network (TLN) initiative, a new, secure, and decentralized approach to recording, curating, and sharing learner data on abilities and skills across the learner’s lifespan. Kate Giovacchini is a higher education technology leader who passionately believes in the power of education to change lives and change the world. She has nearly a decade of experience working at Arizona State University where she has spent her time working in the areas of online education technology, business intelligence, ERP delivery, and large initiative execution. Andrew Johnson is a lead software engineer at Fluree, PBC where he leads architecture and implementation for client projects. He's worked on software development solutions for projects that include university student information systems, patent publication records, consumer data ownership, and federal public housing policy.About Podcast EpisodeRead more about the episode by heading to ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://northernblock.io/podcasts/how-digital-credentials-are-transforming-learning-data⁠⁠⁠⁠⁠The full list of topics discussed between Kate, Andrew and Mathieu in this podcast episode include, Impact of freely available online information on higher education - How has the trend of easily accessible online information, such as courses and certificates, influenced the strategies of universities and higher education institutions? Value of diplomas and other credentials in the modern age - With the rise of various credentials and certificates, is the traditional university diploma still as valuable? What other credentials might a learner want to accumulate? Modernizing systems of records and the role of issuers - How are systems of records being modernized to make credentials more mobile and trusted? Who are the potential issuers beyond traditional universities? Value of personal references and incentives for issuers - Is there value in making it easier for individuals, like professors, to provide references or credentials? How do incentives differ for various types of issuers? Importance of governance in the context of digital credentials - With the growing focus on governance over technology, how is the authenticity and trustworthiness of digital credentials being ensured? User experience (UX) and wallet infrastructure for digital credentials - How is the user experience being optimized for digital credential wallets? Where will learner credentials be stored, and how will they be accessed? Role of verifiers in the TLN digital credential ecosystem - How are verifiers being integrated into the network, and how does their role tie into the prioritization of use cases? How will the adoption of digital credentials be spurred among verifiers?Where to find Kate? LinkedIn: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.linkedin.com/in/kategio/ X/Twitter: ⁠⁠⁠⁠https://twitter.com/KateGiovacchiniWhere to find Andrew? LinkedIn: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.linkedin.com/in/andrew-johnson-web-dev/ X/Twitter: ⁠⁠⁠⁠⁠⁠⁠https://twitter.com/Andere_AndrewFollow Mathieu Glaude X/Twitter: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/mathieu_glaude⁠ LinkedIn:⁠ ⁠⁠https://www.linkedin.com/in/mathieuglaude/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Website:⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://northernblock.io/
undefined
Oct 6, 2023 • 1h 18min

#60 - Trust Spanning Protocol: Seven Key Pillars (with Drummond Reed)

Drummond Reed has spent a quarter-century in Internet identity, security, privacy, and trust infrastructure. He is Director, Trust Services at Gen Digital, previous Avast after their acquisition of Evernym, where he was Chief Trust Office. He is co-author of the book, Self-Sovereign Identity (Manning Publications, 2021), and co-editor of the W3C Decentralized Identifiers (DID) 1.0 specification. At the Trust over IP Foundation, Drummond is a member of the Steering Committee and co-chair of the Governance Stack Working Group and the Concepts and Terminology Working Group.About Podcast EpisodeRead more about the episode by heading to ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://northernblock.io/podcasts/trust-spanning-protocol-seven-key-pillars⁠⁠⁠⁠The full list of topics discussed between Drummond and Mathieu in this podcast episode include: Internet's Broken State: Is the internet considered broken due to issues with security, privacy, authenticity, and confidentiality (SPAC)? How does this relate to the work in the digital trust space, especially with Trust over IP? Trust over IP's Role: How does the Trust over IP technology architecture address the internet's shortcomings? Is the SPAC acronym a good framework for understanding the Trust over IP's approach? Design Principles of Trust Finding Protocol: During the design phase of the trust spanning protocol, were there any trade-offs or concessions made, especially in terms of security, privacy, authenticity, or confidentiality? Pillar 1: Verifiable Identifiers: Explaining the importance of verifiable identifiers as the first key pillar in the design of the trust spanning protocol. Interoperability and Identifiers: Will endpoints need to support the same types of identifiers for interoperability? How does one endpoint evaluate another's capability to support a particular identifier? Pillar 2: End-to-End Authenticity & Confidentiality: How does the trust spanning protocol ensure both authenticity and confidentiality in communications? Pillar 3: Direct Connections: How does the trust spanning protocol handle direct connections between endpoints using different types of channels? Pillar 4: Routing via Intermediaries: How does the protocol handle routing through intermediaries to ensure privacy and security? What might a practical implementation of this look like in the future? Pillar 5: Relationship Context Channels: How does the trust spanning protocol handle changes in the context of interactions between endpoints? Pillar 6: Text and Binary Encoding: How does the trust spanning protocol standardize the way endpoints communicate using text and binary encoding? Pillar 7: Trust Task Protocol Framework: What is the trust task protocol framework, and how does it relate to specific protocols for different types of trust tasks? Conclusion and Future: What's next for the trust spanning protocol? Are there any regulatory movements, like the Digital Markets Act, that might influence its development and adoption?Where to find Drummond? LinkedIn: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.linkedin.com/in/drummondreed/ X/Twitter: ⁠https://twitter.com/drummondreedFollow Mathieu Glaude X/Twitter: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/mathieu_glaude LinkedIn: https://www.linkedin.com/in/mathieuglaude/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Website:⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://northernblock.io/
undefined
Sep 22, 2023 • 60min

#59 - The Future of Digital Customer Relationships (with Jamie Smith)

Jamie Smith, digital technology expert, discusses the future of digital customer relationships. Topics include customer engagement channels, maintaining a human touch in digital interactions, intermediaries' influence on interactions, shifting focus from quantity to quality, and the evolution of identifiers.
undefined
Sep 8, 2023 • 59min

#58 - Developing Effective UX & Messaging Strategies for SSI Products (with Irene Hernández & Esther Saurí)

Irene Hernández is the founder and CEO of Gataca, and Esther Saurí is the Head of Marketing at Gataca. Gataca is a cybersecurity company leader in decentralized identity management technology in Europe. It has developed a decentralized identity solution that streamlines the issuance, verification, and management of identity credentials in a simple, compliant, and secure manner, positioning itself as the most mature full-stack platform and interoperable infrastructure provider.About Podcast EpisodeRead more about the episode by heading to ⁠⁠⁠⁠⁠⁠⁠⁠https://northernblock.io/podcasts/developing-effective-ux-and-messaging-strategies-for-ssi-products⁠⁠The full list of topics discussed between Irene, Esther and Mathieu in this podcast include: [00:25] Defining Adoption: How do we define adoption in the context of Self-Sovereign Identity, and what lens should we use when examining its various aspects and dimensions? [02:21] Measuring Adoption: When measuring adoption, should we start within specific geographical contexts or industries? What key performance indicators (KPIs) and signals should we consider? [08:30] Transitioning to Open Standards: We discuss the evolution of SSI adoption and how private-sector entities can shift towards using open standards and technologies. The role of public sector involvement in fostering adoption is also examined. [12:07] Communication Challenges: Communication plays a vital role in SSI adoption. We explore why it's challenging to communicate and market SSI compared to more straightforward technologies, like generative AI products. What are the unique hurdles in conveying the value of SSI? [18:24] Simplifying Terminology: The conversation continues with a focus on the use of technical jargon and terminology that can bewilder potential adopters. How can we transition from technical discussions to emphasizing business solutions? [23:17] Targeting Adopters: Is it more effective to target entities that serve as both issuers and verifiers or to focus on specific roles within the SSI ecosystem? What are the trade-offs? [27:56] Building Brand Recognition: Given the open nature of the SSI ecosystem, how can organizations build strong brand recognition, and what role do trust marks and certifications play? [31:47] Navigating Political Terminology: How do you address concerns surrounding the term "digital identity" being weaponized in political discourse when communicating about your SSI products? [37:44] Learning from European Adoption: What lessons can be learned from early adoption of digital identity programs in Europe, and how does it compare to the North American market? [47:29] UX Challenges: What are some of the key user experience (UX) challenges in the SSI space, and how can they be addressed to enhance usability and security? [50:59] Interoperability Impact: How does user experience impact interoperability in the SSI ecosystem, and vice versa? What collaborative efforts are needed? [53:22] Balancing Usability and Security: Balancing usability with security is a common challenge. How can the SSI community find the right equilibrium and enhance user adoption?Where to find Irene? LinkedIn: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.linkedin.com/in/irenehernandez/Where to find Esther? LinkedIn: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.linkedin.com/in/esther-sauri-carbonell/Follow Mathieu Glaude Twitter: ⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/mathieu_glaude  ⁠⁠⁠⁠⁠⁠⁠⁠ LinkedIn:⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.linkedin.com/in/mathieuglaude/⁠⁠⁠⁠⁠⁠⁠⁠ Website:⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://northernblock.io/
undefined
Jul 28, 2023 • 1h 8min

#57 - eIDAS 2.0 & the EU Digital Identity Wallet [Part 2] (with Dr. André Kudra)

Dr. André Kudra, CIO of esatus AG, discusses the success of eIDAS 1.0 and the purpose of eIDAS 2.0. He explores the future of existing EU-based digital ID systems and the interoperability goals of eIDAS 2.0. The podcast also discusses the choice of formats and protocols for mobile driving licenses and decentralized identity. Dr. Kudra highlights the role of regulatory bodies and the Open Wallet Foundation in creating the European Identity Wallet. The integration of payment functionalities into identity wallets and misconceptions surrounding blockchain in digital identity are also explored. The podcast concludes by discussing the large-scale pilots and the potential of decentralized identity.
undefined
Jul 14, 2023 • 1h 5min

#56 - DIDComm and OpenID for Verifiable Credentials (with Sam Curren & Darrell O'Donnell)

Sam Curren is the Senior Systems Architect and Deputy Chief Technology Officer for Indicio. Sam has been involved in the Identity Community for over 12 years, working and researching on personal data, distributed systems, supply chain digital birth certificates, and Decentralized Identifiers (DIDs). Sam is a pioneer in decentralized identifier communication protocol (DIDComm) and open source technologies for verifiable credentials, such as Hyperledger Aries and Hyperledger Indy.Darrell O'Donnell (Continuum Loop) is a technology company founder, executive, investor, and advisor. He helps large and small companies to operationally deploy emerging technologies. He is focused on solving problems of mission-critical systems and interoperability, especially where there are many players and no clear central authority. He advises numerous startups, senior government leaders, and investors.About Podcast EpisodeRead more about the episode by heading to ⁠⁠⁠⁠⁠⁠https://northernblock.io/podcasts/didcomm-and-openid-for-verifiable-credentialsThe full list of topics discussed between Sam, Darrell and I in this podcast conversation include: Session-Based vs Non-Session-Based Activities - discussed the differences between session-based activities (like logging into a website or video conferencing) and non-session-based activities (like sending an email or downloading a file). Verifiable Credentials in Different Activities - discussed the adoption of verifiable credentials across session-based and non-session-based activities, and the potential restrictions and opportunities in both models. Alternatives to Session-Based and Non-Session-Based Activities - explored potential alternatives to the common ways of looking at session-based and non-session-based activities. Understanding DIDComm - delved deeper into what DIDComm is, its properties, and how it would fit within our everyday lives and on the web. Momentum Behind Client-Server Architecture-Based Protocols - discussed the momentum behind client-server architecture-based protocols for exchanging verifiable credentials, specifically OpenID for verifiable credentials. Benefits of OpenID for Verifiable Credentials - discussed the benefits of using OpenID for verifiable credentials, including injecting integrity into wallets and signed payloads. Importance of Other Aspects Beyond Verifiable Credentials - explored why a digital identity program should care about aspects beyond verifiable credentials. Impact of Government Recommendations on Digital Identity - discussed how government recommendations can have a significant impact on the direction of digital identity initiatives. Coexistence of Different Protocols - explored the idea that different protocols, like DIDComm and OpenID, could coexist and complement each other. Shifting Focus from Wallets and VCs to User Journeys - discussed the need to shift focus from wallets and verifiable credentials to user journeys and how having more integrity in the journey can help reduce fraud or cost. Business Perspective on Choosing Protocols - discussed the need to look at choosing protocols from a business perspective, considering what would be most beneficial for the specific use case.Where to find Sam? LinkedIn: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.linkedin.com/in/samcurren/ Twitter: ⁠https://twitter.com/TelegramSamWhere to find Darrell? LinkedIn: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.linkedin.com/in/darrellodonnell/ Twitter: https://twitter.com/darrelloFollow Mathieu Glaude Twitter: ⁠⁠⁠⁠⁠⁠https://twitter.com/mathieu_glaude  ⁠⁠⁠⁠⁠⁠ LinkedIn:⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.linkedin.com/in/mathieuglaude/⁠⁠⁠⁠⁠⁠ Website:⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://northernblock.io/
undefined
Jun 16, 2023 • 1h 13min

#55 - Exploring Commercial Data Ecosystems (with Antti Kettunen & Kai Kuikkaniemi)

Antti Kettunen is the leading Digital Identity Consultant at Tietoevry, specializing in Decentralized Identity and Trust Ecosystems. He is an active contributor and Task Force lead in Trust over IP, technology working group member in the Finnish FindyNet cooperative, and contributing member in other domain expert groups.Dr. Kai Kuikkaniemi is and enterprise architect, an advocate for open ecosystems and human-centric digitalization, and a Senior Advisor at MyData, having done lots of work around ‘data spaces’.About Podcast EpisodeRead more about the episode by heading to ⁠⁠⁠⁠⁠https://northernblock.io/podcasts/exploring-commercial-data-ecosystems⁠⁠The full list of topics discussed between Antti, Kai and I in this podcast conversation include: How do concepts of digital trust apply or differ in organizations versus individuals? How is trust achieved differently by organizations in organization-to-organization relationships versus organization-to-people relationships? Are data spaces a new type of role within this digital ecosystem? Can risk or liabilities be shared within these areas? Are there historical examples of organizations serving similar purposes for different ecosystems? Why is liability more important in this digital space, when the issuing authority or the party attesting to the authenticity of a document don't necessarily take liability if something goes wrong? How is liability managed in this open ecosystem space, particularly when interactions don't necessitate a legal relationship between parties? How can risk be managed to ensure enough rewards and shared risk that organizations will want to switch over and engage in the new model? Could consumers manage their possible vendors through a similar scenario by owning their own data, as suggested by Doc Searls's writings on vendor relationship management (VRM)? (Recommended book: https://www.amazon.com/Intention-Economy-When-Customers-Charge/dp/1422158527) Can the introduction of these digital ecosystems allow for earlier development of relationships in the customer acquisition cycle? How can these ecosystems enable trust-based marketing? How can new data ecosystems for commercial use cases be incubated and developed based on government digital identity or credentialing programs? What would be some recommendations for forming governance bodies for data ecosystems and the incentives for organizations to form and deploy services within these ecosystems?Where to find Antti? LinkedIn: ⁠⁠⁠⁠⁠https://www.linkedin.com/in/anttikettunen/ Twitter: https://twitter.com/anttikettunen Blog: https://identifinity.net/Where to find Kai? LinkedIn: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.linkedin.com/in/kai-kuikkaniemi-84388/ Twitter: ⁠https://twitter.com/kaikuikkaniemiFollow Mathieu Glaude Twitter: ⁠⁠⁠⁠⁠https://twitter.com/mathieu_glaude  ⁠⁠⁠⁠⁠ LinkedIn:⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.linkedin.com/in/mathieuglaude/⁠⁠⁠⁠⁠ Website:⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://northernblock.io/
undefined
May 19, 2023 • 1h 11min

#54 - Digital Trust in the Age of Generative AI (with Wenjing Chu)

Wenjing is a senior director of technology strategy at Futurewei leading initiatives focused on trust in the future of computing. His long career encompasses early Internet Routing development, optical Internet backbones, security operating system, Wi-Fi and 5G mobile networks, cloud native services and responsible artificial intelligence.He is a founding Steering Committee member of the Trust over IP Foundation. He contributed as the primary author of the Trust over IP Technology Architecture specification in which he articulated the layered approach to decompose the trust protocol stack and defined the core requirements of the trust spanning layer. Following that work, he is currently a co-Chair of the Trust Spanning Protocol task force  proposing the Inter-Trust Domain Protocol (ITDP) as the trust spanning protocol bridging different trust domains across the Internet. He is also a co-Chair of the AI and Metaverse task force currently drafting the white paper “Digital Trust in the Age of Generative AI”.Wenjing is a founding Board Member of the newly launched OpenWallet Foundation with a mission to enable a trusted digital future with interoperability for a wide range of wallet use cases and also serves in its Technical Advisory Council (TAC). He is a strong advocate of  human-centric digital trust as a foundation to responsible deployment of advanced artificial intelligence technologies.About Podcast EpisodeRead more about the episode by heading to ⁠⁠⁠⁠https://northernblock.io/podcasts/digital-trust-in-the-age-of-generative-ai/⁠Some of the topics discussed between Wenjing and I in this podcast conversation include: Exponential Data Growth and AI Systems: Discussion centered around how the volume of data, particularly from AI systems like GPT-4, is exponentially increasing. As AI starts generating more content, this could create a feedback loop leading to astronomical levels of content. Interaction with LLM as Protocol: The question arose whether the pre-trained Language Model (LLM) could be equated to a protocol and if individuals might interact directly with the LLM in the future. Digital Identity and Trust in the Age of AI and Deepfakes: Concerns were discussed regarding the rise of AI and deepfakes, particularly their implications for digital identity and trust. The challenges of bi-directional authentication and the potential risk to content-based authentication methods were highlighted. Future of Digital Trust Protocols and Authentication: The potential of AI to generate content was related to the future of digital trust protocols. The necessity of digital signatures for authentication was suggested as a possible direction for the future. Reframing Identity: A broader understanding of identity was proposed, questioning whether a reframing of identity could influence our understanding of concepts like authentication. Trust in AI Bots vs. Humans: Personal observations on the level of trust in AI bots vs. humans were shared, suggesting a quicker formation of trust with bots. The implications for future human-bot relationships were considered. Potential Risks and Benefits of Technological Advancements: The discussion acknowledged both potential risks and substantial benefits of technological advancements. A greater level of trust in bots due to perceived lesser risk was noted, along with a significant move towards open source models in the digital trust space. Open-source Model for LLMs and Other Systems: The pros and cons of adopting an open-source model for Large Language Models (LLMs) and other complex systems were questioned.Where to find Wenjing? LinkedIn: ⁠⁠https://www.linkedin.com/in/wenjingchu/⁠⁠Follow Mathieu Glaude Twitter: ⁠⁠⁠⁠https://twitter.com/mathieu_glaude  ⁠⁠⁠⁠ LinkedIn:⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠https://www.linkedin.com/in/mathieuglaude/⁠⁠⁠⁠ Website:⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠https://northernblock.io/
undefined
May 5, 2023 • 55min

#53 - Thinking Beyond Client-Server Architectures (with Daniel Hardman)

Daniel has been doing software engineering and architecture for about 30 years. He has formal education in linguistics, business, and cybersecurity. He  contributed to SSI standards such as W3C's DID core and VC specs, DIDComm 1 and 2, DIF's peer DID spec, and numerous RFCs from Hyperledger Aries. He also helped launch Sovrin and Trust Over IP. Daniel currently works as the CTO and CISO of Provenant, which is focused on authentic digital communication for organizations.About Podcast EpisodeRead more about the episode by heading to ⁠⁠⁠https://northernblock.io/thinking-beyond-client-server-architectures-with-daniel-hardman/Some of the topics discussed between Daniel and Mathieu in this podcast conversation include: The Centralization vs. Decentralization Continuum and the role of client-server architectures - weighing different forms of centralization and their impact on other architectural goals. Protocol design and its relationship to consolidation - How do we determine trade-offs between centralization and decentralization in various components within a system? Balancing architectural goals - is it more of an art or a science when making these decisions - do trade-offs happen at protocol or application layers? Protocol design for digital identity, digital trust, and user categorization - Achieving self-sovereignty, control, and authenticity - Confidentiality and privacy. How do protocol choices affect power dynamics and trust relationships and interactions between different parties? How can we drive the right standards or protocols for more flexible interactions? Incentives for organizations to support standards that facilitate interactions between individuals - Balancing short-term sacrifices for long-term gains - The role of an ecosystem in driving change. Can all human-driven protocols be codified, and is 'workflow' flexibility more important than achieving authenticity, confidentiality, and privacy? The challenge of replicating human interactions in digital protocols - The importance of flexible workflows - Balancing security and privacy with the ability to express nuance and adaptability.Where to find Daniel? LinkedIn: ⁠https://www.linkedin.com/in/danielhardman/ Twitter: ⁠⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/dhh1128Follow Mathieu Glaude Twitter: ⁠⁠⁠https://twitter.com/mathieu_glaude  ⁠⁠⁠ LinkedIn:⁠⁠⁠ ⁠⁠⁠⁠⁠⁠https://www.linkedin.com/in/mathieuglaude/⁠⁠⁠ Website:⁠⁠⁠ ⁠⁠⁠⁠⁠⁠https://northernblock.io/

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app