Adam Larter

Break the Chain: Decentralized solutions for today’s Web2.0 privacy problems

The best way to prevent a data breach is to never store PII. This talk introduces the decentralized stack that makes this a practical reality.

Break the Chain: Decentralized solutions for today’s Web2.0 privacy problems
#1about 2 minutes

The developer's responsibility as a custodian of user data

Centralized Web2.0 architectures create data honeypots that lead to frequent and costly breaches, highlighting the developer's role in protecting user information.

#2about 3 minutes

Rethinking data ownership beyond centralized systems and blockchain

Users should own their data, and while blockchain is a decentralized technology, it is not suitable for storing private, personally identifiable information.

#3about 2 minutes

Understanding the financial and compliance risks of data breaches

Data breaches result in significant financial costs, reputational damage, and steep fines under regulations like GDPR.

#4about 1 minute

Shifting from centralized databases to personal data stores

The proposed architectural shift moves user data from a central server to a personal data store where applications "log into the user" with consent.

#5about 4 minutes

Introducing Decentralized Identifiers and Verifiable Credentials

Decentralized Identifiers (DIDs) provide a unique identity, while Verifiable Credentials (VCs) are cryptographically secure, tamper-evident claims about that identity.

#6about 2 minutes

How to present and query verifiable data securely

Verifiable Presentations (VPs) are used to share selected data from VCs, and Presentation Exchange (PEX) provides a standard query language for requesting it.

#7about 5 minutes

Bridging Web2.0 and Web3 with OpenID Connect standards

OpenID Connect extensions for Verifiable Credential Issuance and Verifiable Presentations allow existing identity protocols to work with decentralized data.

#8about 6 minutes

An overview of the Affinity decentralized identity platform

The Affinity platform provides tools like the Affinity Vault for personal data storage, Affinity Login for authentication, and Affinity Elements as a control plane.

#9about 3 minutes

Announcing the Affinity IOTA framework for developers

The IOTA framework is an end-to-end orchestration layer that simplifies decentralized data access by moving queries to the user's front-end data store.

#10about 1 minute

Implementing the IOTA framework with a simple SDK

Developers can integrate decentralized data requests into their applications with just a few lines of code using the Affinity SDK.

#11about 1 minute

Building an Internet of Trust with a new architecture

The Affinity Trust Network provides the tools to build applications where the user controls the consent boundary, with future plans for open-sourcing components.

Related jobs
Jobs that call for the skills explored in this talk.

job ad

Saby Company
Delebio, Italy

Intermediate

d

Saby Company
Delebio, Italy

Junior

Featured Partners

Related Articles

View all articles
CH
Chris Heilmann
Dev Digest 134 - Where pixels sing?
News and ArticlesWeAreDevelopers LIVE Data and Security Day is on Wednesday, 25/09/2024. Learn about OPC UA Updates, Best Practices for Using GitHub Secrets, Passwordless Web 1.5, Emerging AI Security Risks, Data Privacy in LLMs and get a chance to t...
Dev Digest 134 - Where pixels sing?
CH
Chris Heilmann
Dev Digest 129 - Now that's what I call private data!
News and ArticlesAfter declaring Google a monopoly there are now considerations to force it to break up - isn't that what the whole Alphabet thing was about? In the last act of Crowdstrike coverage here, they released a deep analysis of the outage th...
Dev Digest 129 - Now that's what I call private data!

From learning to earning

Jobs that call for the skills explored in this talk.

Data Security

Data Security

Extia

Linux
Elasticsearch
Microsoft SQL Server
Identity Engineer

Identity Engineer

Technopride Ltd

81K
DevOps
Terraform
Continuous Integration