SlideShare a Scribd company logo
Kevin Goldsmith

Chief Technology Officer
Do I Know
You?

Identity on
the Internet
@kevingoldsmith#doiknowyou
Or am I?
@kevingoldsmith#doiknowyou
@kevingoldsmith#doiknowyou
@kevingoldsmith#doiknowyou
@kevingoldsmith#doiknowyou
@kevingoldsmith#doiknowyou
@kevingoldsmith#doiknowyou
@kevingoldsmith#doiknowyou
@kevingoldsmith#doiknowyou
thispersondoesnotexist.com
@kevingoldsmith#doiknowyou
@kevingoldsmith#doiknowyou
The internet has an identity
problem
@kevingoldsmith#doiknowyou
143 Million Americans were
affected by the Equifax data
breach
@kevingoldsmith#doiknowyou
16.8 Billion dollars were stolen
by fraudsters in the US in 2017
@kevingoldsmith#doiknowyou
● What is digital identity?
● How has digital identity evolved?
● How can we use Identity in our products?
● Protecting our customers’ identity
Do I Know You?
What is Digital
Identity?
@kevingoldsmith#doiknowyou
Digital Identity is the sum of
your characteristics and your
interactions.
The Internet Society
@kevingoldsmith#doiknowyou
Browser
Cookies
IP Address
Reverse Geo IP
e-mail/pass User details
Federated Acct
Validated ID
Biometric auth
continuous auth
Certainty
Difficulty
Linked Accts
tracking pixel/script
2FA
@kevingoldsmith#doiknowyou
Browser
Cookies
IP Address
Reverse Geo IP e-mail/pass User details
Federated Acct
Validated ID
Biometric auth
continuous auth
Linked Accts
tracking pixel/script
Validated ID
You look familiar I think I know you If that is you, I
know you
I know that
it is you
2FA
@kevingoldsmith#doiknowyou
Good digital ID is identification that is verified and
authenticated to a high degree of assurance over
digital channels, is unique, is established with
individual consent, and protects user privacy and
ensures control over personal data.
McKinsey Global Institute - April 2019 Report on Digital
Identity
@kevingoldsmith#doiknowyou
Identity Proofing
Do you have a
genuine ID?
1
Does your face
match your ID?
2
Are you a real-life
human?
3
@kevingoldsmith#doiknowyou
It’s not easy!
Original
Font Verification Pixel Tampering
Invalid ID Number Security Feature
Image Editing
@kevingoldsmith#doiknowyou
It’s not easy!
Accept Reject
@kevingoldsmith#doiknowyou
Understand how well you need
to know your customer based
on what they want to do.
Evolution of
Digital Identity
@kevingoldsmith#doiknowyou
Evolution of Digital Identity
● 1960 Time-sharing systems: Fernando CorbatΓ³ at MIT creates passwords for logins
to protect sensitive documents on a shared filesystem
● 1969 Arpanet: Your identity could now be a unique identifier in a network of
systems
● 1993 PKI: establishment of the X.509 certificate standard with RFC 1422. Created
first β€œsecure” Digital ID.
● 2000 Estonian e-ID: One of the first large-scale government digital ID launches
● 2003 Swedish BankID: Private-sector federated solution, now with government
support
● 2005 OpenID: First broadly successful federated identity solution
● 2006 OAuth: Authentication protocol to support OpenID
● 2009 Aadhaar: Indian government biometric ID extended to 90% of Indian
population (currently 1.2B people)
● 2012 FIDO Alliance: Establishing biometric-based authentication protocols
● 2017 Decentralized Identity Foundation: Leading effort to create distributed
identity solutions
@kevingoldsmith#doiknowyou
@kevingoldsmith#doiknowyou
Federated Identity Management
Service Provider /
Relying Party (RP)
Identity Provider (IdP) /
Credential Service
Provider (CSP)
Relies upon
AuthenticatesAccesses
@kevingoldsmith#doiknowyou
Distributed Identity Management
● Users get attestations of identity from various trusted organizations
(trust anchors)
● These attestations are kept on a distributed ledger and are
referenced by Decentralized Identifiers (DIDs) and stored in DID
Documents
● If a user controls access to the attestations (usually stored in a
digital wallet), this is a self-sovereign identity
● A self-sovereign identity is a lifetime portable digital identity for any
person, organization, or thing that does not depend on any
centralized authority and can never be taken away.
How can you
use digital
identity?
@kevingoldsmith#doiknowyou
Industries that use identity today
Transportation
Hotels Airlines
Financial Services
Gaming
Cryptocurrencies
Telecoms
Healthcare
Marketplaces E-commerce
Government
@kevingoldsmith#doiknowyou
Other needs
How do you
protect
identity?
@kevingoldsmith#doiknowyou
Know what you need
@kevingoldsmith#doiknowyou
Store as little as you need for a
short a time period as you can
@kevingoldsmith#doiknowyou
Control access to personal data
and log when it happens
@kevingoldsmith#doiknowyou
Minimize

disclosures / supply chain
@kevingoldsmith#doiknowyou
Vet your vendors
@kevingoldsmith#doiknowyou
Minimize data-linking
@kevingoldsmith#doiknowyou
consider where to store
your data
@kevingoldsmith#doiknowyou
Be aware of legislation
Conclusion
@kevingoldsmith#doiknowyou
The internet has an identity
crisis
@kevingoldsmith#doiknowyou
Make sure you know who you
are talking to and when you
need to validate them.
@kevingoldsmith#doiknowyou
Be responsible about how your
product uses and protects
identity.
@kevingoldsmith#doiknowyou
Questions?

More Related Content

PDF
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
PDF
Verifiable Credentials in Self-Sovereign Identity (SSI)
ODP
Overview of Decentralized Identity
PPTX
Emerging Applications of Blockchain for Supply Chains
PPTX
An Expert Panel on Safe Credentials
PDF
Why The Web Needs Decentralized Identifiers (DIDs) β€” Even if Google, Apple, a...
PDF
Evernym May 2021 Product Update
PDF
Barcelona presentationv6
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
Verifiable Credentials in Self-Sovereign Identity (SSI)
Overview of Decentralized Identity
Emerging Applications of Blockchain for Supply Chains
An Expert Panel on Safe Credentials
Why The Web Needs Decentralized Identifiers (DIDs) β€” Even if Google, Apple, a...
Evernym May 2021 Product Update
Barcelona presentationv6

What's hot (11)

PDF
What are Decentralized Identifiers (DIDs)?
PDF
Getting Started With Self-Sovereign Identity (SSI) | Evernym Webinar
PDF
Self-Sovereign Identity for the Decentralized Web Summit
PDF
Open Source & What It Means For Self-Sovereign Identity (SSI)
PDF
Meet Evernym's SSI Platform
PPTX
Enhancing Learner Mobility with SSI & Portable Digital Credentials
PPTX
Introduction to blockchain
PPTX
Cisco on Distributed Ledgers & Blockchain
PDF
A framework for improving the efficiency of the transparency in financial dom...
PDF
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
PDF
Hyperledger development & smart contract development
What are Decentralized Identifiers (DIDs)?
Getting Started With Self-Sovereign Identity (SSI) | Evernym Webinar
Self-Sovereign Identity for the Decentralized Web Summit
Open Source & What It Means For Self-Sovereign Identity (SSI)
Meet Evernym's SSI Platform
Enhancing Learner Mobility with SSI & Portable Digital Credentials
Introduction to blockchain
Cisco on Distributed Ledgers & Blockchain
A framework for improving the efficiency of the transparency in financial dom...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Hyperledger development & smart contract development
Ad

Similar to Do I Know You? Identity on the Internet and the Question of Trust (20)

PDF
Identity 101: Boot Camp for Identity North 2016
PDF
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity
PPTX
Jan Keil - Identity and access management Facts. Challenges. Solution
PDF
Future of digital identity programme summary - 19 mar 2019 lr
PDF
What is self-sovereign identity (SSI)?
PDF
Introduction to Self-Sovereign Identity
PPTX
Identity Management for Web Application Developers
Β 
PDF
Identity progress-linked-digital-world
PDF
Digital Identities
PDF
[WSO2Con USA 2018] Identity is Eating the World!
Β 
PDF
Identity Trust Framework Survey
PDF
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
PPT
Mature Digital Trust Infrastructure - Are we there yet?
PDF
Digital Identity:Threats and Prevention
PDF
Identity is Eating the World!
PDF
Understanding Identity Management and Security.
PPTX
The Role of Government in Identity Management
PPTX
Digital Identity by Roxana Nasoi Transylvania Crypto Conference #TCConf
PDF
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)
PPTX
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Identity 101: Boot Camp for Identity North 2016
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity
Jan Keil - Identity and access management Facts. Challenges. Solution
Future of digital identity programme summary - 19 mar 2019 lr
What is self-sovereign identity (SSI)?
Introduction to Self-Sovereign Identity
Identity Management for Web Application Developers
Β 
Identity progress-linked-digital-world
Digital Identities
[WSO2Con USA 2018] Identity is Eating the World!
Β 
Identity Trust Framework Survey
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
Mature Digital Trust Infrastructure - Are we there yet?
Digital Identity:Threats and Prevention
Identity is Eating the World!
Understanding Identity Management and Security.
The Role of Government in Identity Management
Digital Identity by Roxana Nasoi Transylvania Crypto Conference #TCConf
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Ad

More from Kevin Goldsmith (20)

PDF
The Director to CTO Path: How to follow it, or how to mentor it
PDF
It's teams all the way down - Design patterns for technology organizations
PDF
What Vulnerabilities? How and why to secure your ML/AI Solutions
PDF
Raising the subject of raises
PDF
Managing partly distributed teams
PDF
Steal from the best
PDF
What is Agile?
PDF
The (near) future of personal computers
PDF
Pixel Bender - 2011 AMD Fusion Conference
PDF
It Is All About the Benjamins: the Real World Economics of HPC
PDF
Parallelism, the Cloud, and the Tools of the Future for the next generation o...
PDF
Innovation and organization
PDF
Image and Video Processing Using Adobe Image Foundation's Toolkit For Flash -...
PDF
My CMU alumni journey
PDF
Building Lean
PDF
A Software Career (2017)
PDF
When why and how to stop coding as your day job
PDF
Presenting to executives
PDF
Crafting a Mission and Vision For Your Team
PDF
You Are Doing Autonomy Wrong
The Director to CTO Path: How to follow it, or how to mentor it
It's teams all the way down - Design patterns for technology organizations
What Vulnerabilities? How and why to secure your ML/AI Solutions
Raising the subject of raises
Managing partly distributed teams
Steal from the best
What is Agile?
The (near) future of personal computers
Pixel Bender - 2011 AMD Fusion Conference
It Is All About the Benjamins: the Real World Economics of HPC
Parallelism, the Cloud, and the Tools of the Future for the next generation o...
Innovation and organization
Image and Video Processing Using Adobe Image Foundation's Toolkit For Flash -...
My CMU alumni journey
Building Lean
A Software Career (2017)
When why and how to stop coding as your day job
Presenting to executives
Crafting a Mission and Vision For Your Team
You Are Doing Autonomy Wrong

Recently uploaded (20)

PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
Β 
PDF
The Internet -By the Numbers, Sri Lanka Edition
Β 
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PPTX
presentation_pfe-universite-molay-seltan.pptx
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PDF
Sims 4 Historia para lo sims 4 para jugar
PPTX
Introuction about WHO-FIC in ICD-10.pptx
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PPTX
Introduction to Information and Communication Technology
PDF
πŸ’° π”πŠπ“πˆ πŠπ„πŒπ„ππ€ππ†π€π πŠπˆππ„π‘πŸ’πƒ π‡π€π‘πˆ 𝐈𝐍𝐈 πŸπŸŽπŸπŸ“ πŸ’°
Β 
PPTX
artificial intelligence overview of it and more
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PPTX
Internet___Basics___Styled_ presentation
RPKI Status Update, presented by Makito Lay at IDNOG 10
Β 
The Internet -By the Numbers, Sri Lanka Edition
Β 
PptxGenJS_Demo_Chart_20250317130215833.pptx
Slides PDF The World Game (s) Eco Economic Epochs.pdf
Module 1 - Cyber Law and Ethics 101.pptx
The New Creative Director: How AI Tools for Social Media Content Creation Are...
presentation_pfe-universite-molay-seltan.pptx
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
introduction about ICD -10 & ICD-11 ppt.pptx
INTERNET------BASICS-------UPDATED PPT PRESENTATION
Sims 4 Historia para lo sims 4 para jugar
Introuction about WHO-FIC in ICD-10.pptx
Unit-1 introduction to cyber security discuss about how to secure a system
Job_Card_System_Styled_lorem_ipsum_.pptx
Introduction to Information and Communication Technology
πŸ’° π”πŠπ“πˆ πŠπ„πŒπ„ππ€ππ†π€π πŠπˆππ„π‘πŸ’πƒ π‡π€π‘πˆ 𝐈𝐍𝐈 πŸπŸŽπŸπŸ“ πŸ’°
Β 
artificial intelligence overview of it and more
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Internet___Basics___Styled_ presentation

Do I Know You? Identity on the Internet and the Question of Trust