Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Who Owns Your Digital Identity 誰掌握你的數位身分?

denkeni
November 23, 2024

Who Owns Your Digital Identity 誰掌握你的數位身分?

denkeni

November 23, 2024
Tweet

More Decks by denkeni

Other Decks in Technology

Transcript

  1. A Brief of Public-Key Cryptography Digital Credentials API Digital Identity

    Models Who Owns Your Identity? Who Owns Your Private Keys? Agenda
  2. Use Cases of Public-Key Cryptography Public-Key Cryptography 1976 2020s Digital

    Identities 1990s PGP (Pretty Good Privacy) SSL (Secure Sockets Layer) Diffie-Hellman key exchange 2008 Bitcoin & Blockchain RSA, Elliptic Curve
  3. Introducing the Digital Credentials API origin trial (2024-11-22) This app

    won’t open. > Download a demo wallet application to your Android device. The source code can be found at the OpenWallet Foundation's Identity Credentials repository.
  4. Introducing the Digital Credentials API origin trial (2024-09-04) Use this

    instead. > Download a demo wallet application to your Android device.
  5. • mDL: mobile Driver License (ISO 18013-5) • Secure Area:

    Android Keystore Secure Area • EcCurve (Elliptic Curve): P256
  6. Digital Credentials Demo https://digital-credentials.dev Tap “Request Credentials” > Request verified

    identity documents such as Mobile Driving Licenses or National ID cards.
  7. • DNS: denkeni.org • (Google Account) • ENS: denkeni.eth •

    DID / VC: ? decentralized decentralized decentralized federated (E-mail)
  8. ISO/IEC 24760-1:2019(en) IT Security and Privacy — A framework for

    identity management — Part 1: Terminology and concepts What is an identity? • Identity: a set of attributes related to an entity. • Entity: a person, an organization, a device… • Attributes: characteristic or property of an entity. We present credentials to claim our identities (authentication).
  9. Android Keystore system > The Android Keystore system lets you

    store cryptographic keys in a container to make them more difficult to extract from the device. Once keys are in the keystore, you can use them for cryptographic operations, with the key material remaining non-exportable.
  10. BIP 39 Mnemonic code for generating deterministic keys BIP 32

    Hierarchical Deterministic Wallets "Not your keys, Not your Bitcoin." "legal winner thank year wave sausage worth useful legal winner thank yellow" + m/44'/0'/0'/0/0 ↓ 1EBuf21icKTE5m3HWVndKx2bTxvqrWCqV6 (Bitcoin wallet address) Bitcoin Q&A: How Do I Secure My Bitcoin?
  11. Who Owns Your Identity? 1. Google / Trusted Identity Model

    2. Keystore 3. Private Key Kaohsiung
  12. Q&A