Register to receive our newsletter and join in the conversation on our message boards!
REGISTER NOW
Comments
Newest First | Oldest First | Threaded View
dcawrey
dcawrey
12/3/2016 9:42:10 PM
User Rank
IoT Visionary
Re: Bah.
Sovrin looks interesting. I think IoT will be looking for sources of immutabie data, and these devices on their own won't be able to do that. This is where blockchain platforms like these are expected to come in and offer value. 

50%
50%
Co-Found91443
Co-Found91443
12/2/2016 12:36:09 AM
User Rank
IoT Novice
Re: Bah.
To answer your question about "unification": what the Sovrin ledger provides for your "army of identities" (since you can have as many as you want) is a public key discovery service. Each contextual identity (i.e., each DID—decentralized identifier) has an associated JSON file called a DDO (DID descriptor object). That's how you find the current public key for doing encrypted communications with the identity owner.

For the full details, see the DID Implementer's Draft 01 spec (which can work with any suitable distributed ledger, including Bitcoin and Ethereum, not just Sovrin).

Hope this helps.

100%
0%
Joe Stanganelli
Joe Stanganelli
12/1/2016 8:18:16 AM
User Rank
IoT Visionary
Re: Bah.
I was able to read between the lines to understand it's not the same blockchain as Bitcoin, but we've seen that even distributed ledgers aren't hackproof.

That said, I see what you are saying (the lede through me off).  But at the same time, the concept of "identity" implies unification.  I don't particularly want my smart home devices and other online accounts or devices to be linked.  Sure, I have "control," and can decide to have more than one identity, but then why am I using a ledger to begin with in that case?  What's my get?  (Asking in earnest -- not rhetorically.)

100%
0%
Co-Found91443
Co-Found91443
11/30/2016 9:33:35 PM
User Rank
IoT Novice
Re: Bah.
@Joe Stanganelli Self-sovereign identity works exactly the opposite of what you said. No one "assigns" you an identity. You generate your own and "assign" them to others when you decide to have a relationship with them. You can have as many anonymous or pseudonymous identities as you need.

Even though people call it "blockchain for identity", Sovrin is a distributed ledger, and has no connection with the Bitcoin blockchain. It's designed from the ground up for privacy-respecting self-sovereign identity.

100%
0%
Co-Found68997
Co-Found68997
11/30/2016 9:18:31 PM
User Rank
IoT Novice
Re: Bah.
What the article didn't convey, is the fact that Sovrin was designed from the ground up for someone to act anonymously, or pseudonymously with unlimited identities.

There is no registry that someone can look up someone else's identity, it simply doesn't exist, the only way someone can find and decrypt something is if they've been given explicit permission by the holder of the associated private key to do so. And even then it's a onesy-twosey relationship, no way to open some door to a pile of your information.

In fact, it's an ideal way to manage your Joe Stanganelli (pseudonymous) identity in the same place that you manage your true legal identity, and no one has any way to correlate the two identities when you use them, because Sovrin uses "pairwise" identifiers under the hood for every relationship.

So if you're focused on privacy you should appreciate Sovrin, it offers the most advanced privacy enhancing technologies currently in existence.

100%
0%
Joe Stanganelli
Joe Stanganelli
11/30/2016 8:26:33 PM
User Rank
IoT Visionary
Bah.
Blockchain-encrypted or not, I'm vehemently opposed to this kind of thing for the very reason I'm opposed to NSTIC.  It fundamentally flies in the face of true privacy to "assign" identities--and I tend to think that just because the word "Blockchain" is attached that that doesn't mean all the Blockchain/Bitcoin fanboys and fangirls will go along with it.

Sure, I'm "Joe Stanganelli" here, but I'd prefer to keep my right to be pseudonymous/anonymous elsewhere.

0%
100%


Latest Articles
What is Blockchain? How can we solve IoT's cybersecurity issues? Can Blockchain help to make the internet of things secure?
Scott Amyx points to key industrial IoT case studies to watch out for in 2017, and explains why new environments spell new challenges for the IIoT this year.
The global IT, BPM and consulting company Wipro has announced that it has joined the Industrial Internet Consortium, the "global, member-supported organization that promotes the accelerated growth of the industrial internet of things (IIoT)".
The internet of things market is growing exponentially, in value as well as size, and the value of the smart building market is growing in tandem. How can companies on the buy and sell sides take advantage?
D-day has arrived. How kind will Donald Trump's presidency be to smart cities in the United States? And will his presidency impact urban IoT that's further afield?
Upcoming Live Events
May 16-18, 2017, Santa Clara Convention Center
May 16-18, 2017, Santa Clara Convention Center
May 16-18, 2017, Millennium Gloucester Hotel, London
June 13-15, 2017, ExCeL, London
June 13-15, 2017, ExCeL, London
All Upcoming Live Events
Flash Poll
Video
Wilhelm Nehring, CEO of ThyssenKrupp Elevator UK, talks through his favorite applications of IoT in buildings and cities with IoT World News.
David Holecek, Director of Connected Products & Services at Volvo Car Group , speaks with IoT World News on Volvo's moves in the connected car ...
Liat Ben-Zur, SVP and digital technology leader at Philips, describes the plethora of ways IoT will be used to transform healthcare via hospitals, ...
Richard Corbridge, CIO at Health Service Executive, explains how IoT is already impacting digital healthcare in Ireland and where he sees the ...
Mimmis Cleeren, Global Director of marketing (IoT BU) at MediaTek, covers some of the special IoT projects that have emerged from MediaTek's ...
All Videos
Webinars
Tuesday, March 14, 2017
1:00 p.m. EST

Identifying and solving the practical security challenges encountered by businesses embarking on an Internet of Things deployment.

Realizing your company's IoT vision starts with connecting and securing your infrastructure. IoT infrastructures require organizations to collect and transmit commands and data from devices, applications and people -- securing all of this is a sizeable challenge.

Our expert panelists will identify and solve the key issues that arise during this process, enabling a safe and steady beginning to your organization's IoT journey.

The webinar will cover:

  • Identity Issuance: Security at Scale
  • Identity Management: Authentication and Authorization
  • Identity and Data Security: Data Integrity and Granular Policy Definition

Webinar attendees will learn:

  • How to ensure that data is only accessed by authorized devices, applications and users in an IoT setting
  • Methods for transmitting data from devices in the field to value engines securely and efficiently
  • Best practice for implementing tried-and-trusted IoT ecosystems and safeguarding data flow across your company's entire infrastructure
  • How to create a holistic and protected IoT ecosystem for your company

Information Resources
All resources
Twitter Feed
like us on facebook
IoT World News
About Us     Contact Us     Help     Register     Twitter     Facebook     RSS
Copyright © 2017 Light Reading - an Informa business, trading within KNect365 US, Inc. All rights reserved. Privacy Policy | Terms of Use
in partnership with