At Identiverse in 2022 I presented this paper about Understanding SSI in historical context.
The Presentation’s Key Highlights
- Developers and policymakers often overlook the historical context of social and technological systems. They perceive them as fixed and granted in the present moment.
- The presentation highlights the historical trajectory of two distinct identity systems: computer-based systems and state-issued administrative identities in Europe.
- Starting with computers, the presentation traces the development of identity systems from mainframes to the present day. It showcases the advancements in technology and the changing paradigms of digital identity.
- Throughout this historical journey, it becomes evident that computer-based identity systems have been influenced by technological capabilities, market demands, and user requirements, which results in diverse system designs and approaches.
- On the other hand, the presentation explores the history of state-issued administrative identities in Europe. It emphasizes how these systems have evolved and the principles underlying their design.
- State-issued administrative identities have typically been based on centralized, hierarchical models, where the government plays a central role in issuing and managing identities for its citizens.
- These administrative identities have often been tied to specific rights, privileges, and responsibilities within a nation-state, reflecting historical norms and legal frameworks.
- The presentation acknowledges that the designs and principles of computer-based identity systems and state-issued administrative identities are not necessarily comparable due to their distinct historical trajectories.
- However, the presentation’s conclusion argues that Self-Sovereign Identity (SSI) technologies offer a digital identity system that aligns with the historical norms of state-issued administrative identities.
- SSI technologies empower individuals with control over their digital identities and allow them to manage and share their personal information securely and selectively.
To see the full video of the session, click here.
To read out the full relevant paper, click here.
