To explain this concept, let me first ask you: Who are you and where are you from?
If you get the answer from your boss, your doctor, or vehicle management office, Facebook, Twitter, or Google, you will find that they are all administrative identities administrative identifiers-these organizations set these identities and positions for their own convenience. As Timothy Ruff of Evernym, A blockchain technology company, said, "You do not exist because of organizations, but because of your identity ." Identity is a dependent variable. The independent variable, that is, the variable controlling the identity, is the organization where you are located.
If your answer comes from yourself, we will have a vast space to develop a new field in which we are completely free.
Devon Loffreto's explanation of autonomous identityAs far as I know, the first person who explains this is Devon Loffreto. In February 2012, he wrote in his blog Moxy Tongue: "What is 'sovereign Source Authority '?". In his article "Self-Sovereign Identity" published in February 2016, he wrote: autonomous identities must be proposed by independent individuals and do not contain social factors ...... Autonomous identity is derived from each individual's understanding of its own origins. An independent identity can bring a new social outlook to an individual. Each individual can generate an autonomous identity for himself, and this does not change the inherent human rights. The use of autonomous identity mechanisms is the cornerstone of participation by all participants and can still maintain relationships with various forms of human society. In the field of Linux, only an individual can set his or her own open-source community identity. In practice, this is just a very normal event. For example, my identity includes:
- David Allen Searls, my parents call me this way.
- David Searls, which I will officially call myself.
- Dave, my relatives and friends call me this way.
- Doc, which is what most people call me.
As an autonomous identity source for recognizing the above terms, I can easily switch between different scenarios. However, this is only in the real world. In the virtual world, this becomes very difficult. In addition to the above identity, I can also be @ dsearls (my twitter account) and dsearls (other network accounts ). However, I am overwhelmed to remember the login names and passwords of hundreds of different accounts.
You can feel this bad experience on your browser. On Firefox, I have hundreds of users and passwords. Many have been abandoned (many have been left behind by the Netscape era), but I think there will be a lot of work accounts to handle. I am only a passive recipient. There are no other solutions. Even some low-security user authentication has become an indispensable part of the real world.
Now, the easiest way to contact your account is to use "Log in with Facebook" or "Login with Twitter" for identity authentication. In this case, each of us is not even a real self, or even (if we want to be known by others) lack control over how other entities know us.
From the very beginning, we needed a personal system that could protect and present our own identity and communication. We are in chaos because we lack this capability. Shoshana Zuboff called it "monitoring capitalism", and she said:
... It is hard to imagine, behind the scenes of Google, which witnessed the Internet and achieved great success. The world is closely linked by Apple and the FBI. To put it bluntly, every national security institution is eager to develop a surveillance system developed by the capitalist keen on monitoring. Then she asked, "How can we protect ourselves from the influence of others? "
We recommend that you use your identity. I believe this is the only way we can ensure that we can escape from surveillance and make us have an orderly world. On this basis, we can communicate with people in society, politics, and commerce without any scrubs.
I summarized this interim conclusion at the ID2020 meeting held by the United Nations on May. I'm glad that Devon Loffreto is also there. In 2013, he promoted the creation of his own identity. This is some of the articles I wrote at that time, citing Devon's early blog (such as the original article above ).
There are three principles in this field:
- "Self-Sovereign Identity"-Devon Loffreto.
- "System or Human First"-Devon Loffreto.
- "The Path to Self-Sovereign Identity"-Christopher Allen.
Digi. me, iRespond, and Respect Network are also included in Evernym's brief description. The comparison between autonomous identity and social identity (also known as the current model) is shown in figure 2.
Figure 2. Current Mode Identity vs. autonomous identity
Sovrin is a platform born for this purpose. It describes itself as a "fully open-source, logo-based, authenticated, and distributed platform based on advanced, dedicated, authorized, and distributed platforms ". At the same time, there is also a White Paper. Its code is named plenum and published on Github.
Here -- or elsewhere -- we can reproduce what we have done in kernel space over the past 25 years in user space.
From: http:// OS .51cto.com/art/201608/515763.htm
Address: http://www.linuxprobe.com/linux-kernel-space.html