What IIW Participants Value Most
Attendees at Internet Identity Workshop (IIW) value it for its strong sense of community, open collaboration, and participant-driven unconference format. They highlight the opportunity to connect with peers and industry leaders while exploring the latest developments in digital identity. Many see IIW as a unique space where meaningful progress is made on standards, technologies, and shared ideas.
Continue reading...
Internet Identity Workshop XL Report
IIW XL brought together over 300 participants from 27 countries, highlighting the growing global momentum behind decentralized identity, digital wallets, and agent-based architectures.
Continue reading...
Why Do Policy Languages Feel So Hard?
Policy languages can feel intimidating due to unfamiliar syntax, poor tooling, and the high stakes of getting access control wrong. But once understood, they simplify application logic and make security more reliable and maintainable.
Continue reading...
Establishing First Person Digital Trust
Key signing parties attempted to establish decentralized trust but they ultimately failed due to poor usability, lack of incentives, and shallow trust models. Verifiable Relationship Credentials (VRCs) provide a modern, peer-to-peer approach that enables actionable, contextual trust built on decentralized identifiers, and secure messaging. First-person identity emerges from direct connections that form relationships, mutual authentication, and portable, verifiable trust.
Continue reading...
Establishing First Person Digital Trust
Key signing parties attempted to establish decentralized trust but they ultimately failed due to poor usability, lack of incentives, and shallow trust models. Verifiable Relationship Credentials (VRCs) provide a modern, peer-to-peer approach that enables actionable, contextual trust built on decentralized identifiers, and secure messaging. First-person identity emerges from direct connections that form relationships, mutual authentication, and portable, verifiable trust.
Continue reading...
First Person Identity
Listening to Drummond Reed at VRM Day, I was struck by how “first person”—a term that resonates more intuitively than “self-sovereign”—captures the essence of empowering individuals to build digital relationships rooted in personal agency, without intermediaries.
Continue reading...
Long Live RSS
I've stopped using social media apps as much and have started using RSS again. I'm wasting less time scrolling past stuff I don't care about and more time reading things I enjoy. Try it.
Continue reading...
First Person Identity
Listening to Drummond Reed at VRM Day, I was struck by how “first person”—a term that resonates more intuitively than “self-sovereign”—captures the essence of empowering individuals to build digital relationships rooted in personal agency, without intermediaries.
Continue reading...
Long Live RSS
I've stopped using social media apps as much and have started using RSS again. I'm wasting less time scrolling past stuff I don't care about and more time reading things I enjoy. Try it.
Continue reading...
Zero Trust, Least Privilege, and Just-in-Time Access
When dynamic access control with JIT access is thoughtfully implemented, you shift the burden of security from employees to systems that automate protection, making it proactive and intelligent.
Continue reading...
Zero Trust, Least Privilege, and Just-in-Time Access
When dynamic access control with JIT access is thoughtfully implemented, you shift the burden of security from employees to systems that automate protection, making it proactive and intelligent.
Continue reading...