Muutke küpsiste eelistusi

E-raamat: Self-Sovereign Identity

  • Formaat: 504 pages
  • Ilmumisaeg: 10-Aug-2021
  • Kirjastus: Manning Publications
  • Keel: eng
  • ISBN-13: 9781638351023
  • Formaat - EPUB+DRM
  • Hind: 43,42 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 504 pages
  • Ilmumisaeg: 10-Aug-2021
  • Kirjastus: Manning Publications
  • Keel: eng
  • ISBN-13: 9781638351023

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

"This book is a comprehensive roadmap to the most crucial fix for today's broken Internet." - Brian Behlendorf, GM for Blockchain, Healthcare and Identity at the Linux Foundation

In a world of changing privacy regulations, identity theft, and online anonymity, identity is a precious and complex concept. Self-Sovereign Identity (SSI) is a set of technologies that move control of digital identity from third party identity providersdirectly to individuals, and it promises to be one of the most important trendsfor the coming decades. Now in Self-Sovereign Identity, privacy and personal data experts Drummond Reed and Alex Preukschat lay out a roadmap for a futureof personal sovereignty powered by the Blockchain and cryptography. Cutting through the technical jargon with dozens of practical use cases from experts across all major industries, it presents a clear and compelling argument for why SSI is a paradigm shift, and shows how you can be ready to be prepared forit.

about the technology

Trust onthe internet is at an all-time low. Large corporations and institutions control our personal data because we've never had a simple, safe, strong way to prove who we are online. Self-sovereign identity (SSI) changes all that.

about the book

In Self-Sovereign Identity: Decentralized digital identity and verifiable credentials, you'll learn how SSI empowers us to receive digitally-signed credentials, store them in private wallets, and securely prove our online identities. It combines a clear, jargon-free introduction to this blockchain-inspired paradigm shift with interesting essays written by its leading practitioners. Whether for property transfer, ebanking, frictionless travel, or personalized services, the SSI model for digital trust will reshape our collective future.

what's inside

·       The architecture of SSI software and services

·       The technical, legal, and governance concepts behind SSI

·       How SSI affects global business industry-by-industry

·       Emerging standards for SSI

about the reader

For technology and business readers. No prior SSI, cryptography, or blockchain experience required.

aboutthe author

Drummond Reed is the Chief Trust Officer at Evernym, a technology leader in SSI. Alex Preukschat is the co-founder of SSIMeetup.org and AlianzaBlockchain.org.

Arvustused

This book is a comprehensive roadmap to the most crucial fix for today's broken Internet. Brian Behlendorf, GM for Blockchain, Healthcare and Identity at the Linux Foundation

If trusted relationships over the Internet are important to youor your business, this book is for you. John Jordan, Executive Director,Trust over IP Foundation

Decentralized identity represents not only a wide range of trust-enabling technologies, but also a paradigm shift in our increasingly digital-first world. Rouven Heck, Executive Director, Decentralized Identity Foundation

Foreword xxi
Preface xxiii
Acknowledgments xxvii
About this book xxix
About the authors xxxiv
About the cover illustration xxxvi
Part 1 An introduction to SSI
1(84)
1 Why the internet is missing an identity layer--and why SSI can finally provide one
3(18)
Alex Preukschat
Drummond Reed
1.1 How bad has the problem become?
5(1)
1.2 Enter blockchain technology and decentralization
5(1)
1.3 The three models of digital identity
6(4)
The centralized identity model
7(1)
The federated identity model
8(1)
The decentralized identity model
9(1)
1.4 Why "self-sovereign"?
10(2)
1.5 Why is SSI so important?
12(1)
1.6 Market drivers for SSI
13(4)
E-commerce
14(1)
Banking and finance
15(1)
Healthcare
15(1)
Travel
16(1)
1.7 Major challenges to SSI adoption
17(4)
Building out the new SSI ecosystem
17(1)
Decentralized key management
18(1)
Offline access
18(1)
References
19(2)
2 The basic building blocks of SSI
21(18)
Drummond Reed
Rieks Joosten
Oskar Van Deventer
2.1 Verifiable credentials
22(2)
2.2 Issuers, holders, and verifiers
24(2)
2.3 Digital wallets
26(3)
2.4 Digital agents
29(1)
2.5 Decentralized identifiers (DIDs)
30(3)
2.6 Blockchains and other verifiable data registries
33(1)
2.7 Governance frameworks
34(2)
2.8 Summarizing the building blocks
36(3)
References
38(1)
3 Example scenarios showing how SSI works
39(19)
Drummond Reed
Alex Preukschat
Daniel Hard Man
3.1 A simple notation for SSI scenario diagrams
40(1)
3.2 Scenario 1: Bob meets Alice at a conference
41(5)
3.3 Scenario 2: Bob meets Alice through her online blog
46(2)
3.4 Scenario 3: Bob logs in to Alice's blog to leave a comment
48(1)
3.5 Scenario 4: Bob meets Alice through an online dating site
49(2)
3.6 Scenario 5: Alice applies for a new bank account
51(1)
3.7 Scenario 6: Alice buys a car
52(2)
3.8 Scenario 7: Alice sells the car to Bob
54(2)
3.9 Scenario summary
56(2)
Reference
57(1)
4 SSI Scorecard: Major features and benefits of SSI
58(27)
Drummond Reed
Alex Preukschat
4.1 Feature/benefit category 1: Bottom line
60(2)
Fraud reduction
60(1)
Reduced customer onboarding costs
60(1)
Improved e-commerce sales
61(1)
Reduced customer service costs
61(1)
New credential issuer revenue
62(1)
4.2 Feature/benefit category 2: Business efficiencies
62(6)
Auto-authentication
63(1)
Auto-authorization
63(2)
Workflow automation
65(1)
Delegation and guardianship
66(1)
Payment and value exchange
67(1)
4.3 Feature/benefit category 3: User experience and convenience
68(4)
Auto-authentication
68(1)
Auto-authorization
68(1)
Workflow automation
69(1)
Delegation and guardianship
70(1)
Payment and value exchange
71(1)
4.4 Feature/benefit category 4: Relationship management
72(5)
Mutual authentication
72(1)
Permanent connections
73(1)
Premium private channels
74(1)
Reputation management
75(1)
Loyalty and rewards programs
76(1)
4.5 Feature/benefit category 5: Regulatory compliance
77(8)
Data security
77(1)
Data privacy
78(1)
Data protection
79(1)
Data portability
80(1)
RegTech (Regulation Technology)
81(1)
References
82(3)
Part 2 SSI technology
85(190)
5 SSI architecture: The big picture
87(24)
Daniel Hardman
5.1 The SSI stack
88(1)
5.2 Layer 1: Identifiers and public keys
88(6)
Blockchains as DID registries
89(1)
Adapting general-purpose public blockchains for SSI
90(1)
Special-purpose blockchains designed for SSI
91(1)
Conventional databases as DID registries
92(1)
Peer-to-peer protocols as DID registries
93(1)
5.3 Layer 2: Secure communication and interfaces
94(7)
Protocol design options
94(1)
Web-based protocol design using TLS
95(1)
Message-based protocol design using DIDComm
95(2)
Interface design options
97(1)
API-oriented interface design using wallet Dapps
97(1)
Data-oriented interface design using identity hubs (encrypted data vaults)
98(1)
Message-oriented interface design using agents
99(2)
5.4 Layer 3: Credentials
101(6)
JSON Web Token (JWT) format
102(1)
Blockcerts format
103(3)
W3C verifiable credential formats 104 - Credential exchange protocols
106(1)
5.5 Layer 4: Governance frameworks
107(2)
5.6 Potential for convergence
109(2)
References
109(2)
6 Basic cryptography techniques for SSI
111(15)
Brent Zundel
Sajida Zouarhi
6.1 Hash functions
112(2)
Types of hash functions
113(1)
Using hash functions in SSI
113(1)
6.2 Encryption
114(2)
Symmetric-key cryptography
114(1)
Asymmetric-key cryptography
115(1)
6.3 Digital signatures
116(1)
6.4 Verifiable data structures
116(4)
Cryptographic accumulators
117(1)
Merkle trees
117(2)
Patricia tries
119(1)
Merkle-Patricia trie: A hybrid approach
120(1)
6.5 Proofs
120(6)
Zero-knowledge proofs
120(1)
ZKP applications for SSI
121(3)
A final note about proofs and veracity
124(1)
References
125(1)
7 Verifiable credentials
126(31)
David W. Chad Wick
Daniel C. Burnett
7.1 Example uses of VCs
127(1)
Opening a bank account
127(1)
Receiving a free local access pass
127(1)
Using an electronic prescription
128(1)
7.2 The VC ecosystem
128(3)
7.3 The VC trust model
131(3)
Federated identity management vs. VCs
131(1)
Specific trust relationships in the VC trust model
132(1)
Bottom-up trust
133(1)
7.4 W3C and the VC standardization process
134(1)
7.5 Syntactic representations
135(4)
JSON
135(1)
Beyond JSON: Adding standardized properties
136(1)
JSON-LD
136(1)
JWT
137(2)
7.6 Basic VC properties
139(3)
7.7 Verifiable presentations
142(1)
7.8 More advanced VC properties
143(7)
Refresh service
143(1)
Disputes
144(1)
Terms of use
145(1)
Evidence
145(2)
When the holder is not the subject
147(3)
7.9 Extensibility and schemas
150(1)
7.10 Zero-knowledge proofs
151(2)
7.11 Protocols and employments
153(2)
7.12 Security and privacy evaluation
155(1)
7.13 Hurdles to adoption
155(2)
References
156(1)
8 Decentralized identifiers
157(32)
Drummond Reed
Markus Sabadello
8.1 The conceptual level: What is a DID?
158(3)
URIs
158(1)
URLs
158(1)
URNs
159(1)
DIDs
160(1)
8.2 The functional level: How DIDs work
161(10)
DID documents
161(2)
DID methods
163(1)
DID resolution
164(2)
DID URIs
166(2)
Comparison with the Domain Name System (DNS)
168(1)
Comparison with URNs and other persistent Identifiers
169(1)
Types of DIDs
170(1)
8.3 The architectural level: Why DIDs work
171(8)
The core problem of Public Key Infrastruct ure (PK1)
172(2)
Solution 1 The conventional PKI model
174(2)
Solution 2 The web-of-trust model
176(1)
Solution 3 Public key-based identifiers
176(2)
Solution 4 DIDs and DID documents
178(1)
8.4 Four benefits of DIDs that go beyond PKI
179(4)
Beyond PKI benefit 1 Guardianship and controllership
179(1)
Beyond PKI benefit 2 Service endpoint discovery
180(1)
Beyond PKI benefit 3 DID-to-DID connections
181(1)
Beyond PKI benefit 4 Privacy by design at scale
182(1)
8.5 The semantic level: What DIDs mean
183(6)
The meaning of an address
183(1)
DID networks and digital trust ecosystems
184(1)
Why isn't a DID human-meaningful?
185(1)
What does a DID identify?
186(3)
9 Digital wallets and digital agents
189(31)
Darrell O'Donnell
9.1 What is a digital wallet, and what does it typically contain?
190(1)
9.2 What is a digital agent, and how does it typically work with a digital wallet?
191(1)
9.3 An example scenario
192(1)
9.4 Design principles for SSI digital wallets and agents
193(3)
Portable and Open-By-Default
193(1)
Consent-driven
194(1)
Privacy by design
194(1)
Security by design
195(1)
9.5 Basic anatomy of an SSI digital wallet and agent
196(1)
9.6 Standard features of end-user digital wallets and agents
197(5)
Notifications and user experience
198(1)
Connecting: Establishing new digital trust relationships
198(1)
Receiving, offering, and presenting digital credentials
199(1)
Revoking and expiring digital credentials
200(1)
Authenticating: Logging you in
201(1)
Applying digital signatures
202(1)
9.7 Backup and recovery
202(3)
Automatic encrypted backup
202(1)
Offline recovery
203(1)
Social recovery
204(1)
Multi-device recovery
205(1)
9.8 Advanced features of wallets and agents
205(5)
Multiple-device support and wallet synchronization
205(1)
Offline operations
205(1)
Verifying the verifier
206(1)
Compliance and monitoring
207(1)
Secure data storage (vault) support
207(1)
Schemas and overlays
208(1)
Emergencies
209(1)
Insurance
209(1)
9.9 Enterprise wallets
210(2)
Delegation (rights, roles, permissions)
210(1)
Scale
210(1)
Specialized wallets and agents
211(1)
Credential revocation
211(1)
Special security considerations
211(1)
9.10 Guardianship and delegation
212(2)
Guardian wallets
212(1)
Guardian delegates and guardian credentials
213(1)
9.11 Certification and accreditation
214(1)
9.12 The Wallet Wars: The evolving digital wallet/agent marketplace
214(6)
Who
215(1)
What
216(1)
How
216(3)
Reference
219(1)
10 Decentralized key management
220(28)
Dr. Sam Smith
10.1 Why any form of digital key management is hard
221(1)
10.2 Standards and best practices for conventional key management
222(1)
10.3 The starting point for key management architecture: Roots of trust
223(2)
10.4 The special challenges of decentralized key management
225(2)
10.5 The new tools that VCs, DIDs, and SSI bring to decentralized key management
227(3)
Separating identity verification from public key verification
227(1)
Using VCs for proof of identity
228(1)
Automatic key rotation
229(1)
Automatic encrypted backup with both offline and social recovery methods
229(1)
Digital guardianship
229(1)
10.6 Key management with ledger4oased DID methods (algorithmic roots of trust)
230(1)
10.7 Key management with peer-based DID methods (self-certifying roots of trust)
231(2)
10.8 Fully autonomous decentralized key management with Key Event Receipt Infrastructure (KERI)
233(13)
Self-certifying identifiers as a root of trust
234(1)
Self-certifying key event logs
235(1)
Witnesses for key event logs
236(1)
Pre-rotation as simple, safe, scalable protection against key compromise
236(2)
System-independent validation (ambient verifiability)
238(1)
Delegated self-certifying identifiers for enterprise-class key management
239(2)
Compatibility with the GDPR "right to be forgotten"
241(1)
KERI standardization and the KERI DID method
242(1)
A trust-spanning layer for the internet
242(4)
10.9 Key takeaways
246(2)
References
247(1)
11 SSI governance frameworks
248(27)
Drummond Reed
11.1 Governance frameworks and trust frameworks: Some background
248(2)
11.2 The governance trust triangle
250(2)
11.3 The Trust over IP governance stack
252(9)
Layer 1 Utility governance frameworks
253(2)
Layer 2 Provider governance frameworks
255(1)
Layer 3 Credential governance frameworks
256(2)
Layer 4 Ecosystem governance frameworks
258(3)
11.4 The role of the governance authority
261(1)
11.5 What specific problems can governance frameworks solve?
262(3)
Discovery of authoritative issuers and verified members
262(1)
Anti-coercion
263(1)
Certification, accreditation, and trust assurance
263(1)
Levels of assurance (LOAs)
264(1)
Business rules
264(1)
Liability and insurance
264(1)
11.6 What are the typical elements of a governance framework?
265(4)
Master document
265(1)
Glossary
266(1)
Risk assessment, trust assurance, and certification
266(1)
Governance rules
267(1)
Business rules
267(1)
Technical rules
267(1)
Information trust rules
268(1)
Inclusion, equitability, and accessibility rules
268(1)
Legal agreements
268(1)
11.7 Digital guardianship
269(1)
11.8 Legal enforcement
270(1)
11.9 Examples
271(4)
References
273(2)
Part 3 Decentralization as a model for life
275(56)
12 How open source software helps you control your self-sovereign identity
277(10)
Richard Esplin
12.1 The origin of free software
278(2)
12.2 Wooing businesses with open source
280(1)
12.3 How open source works in practice
281(2)
12.4 Open source and digital identities
283(4)
References
285(2)
13 Cypherpunks: The origin of decentralization
287(6)
Daniel Paramo
Alex Preukschat
13.1 The origins of modern cryptography
287(2)
13.2 The birth of the cypherpunk movement
289(1)
13.3 Digital freedom, digital cash, and decentralization
290(1)
13.4 From cryptography to cryptocurrency to credentials
291(2)
References
292(1)
14 Decentralized identity for a peaceful society
293(7)
Markus Sabadello
14.1 Technology and society
294(1)
14.2 A global civil society
295(2)
14.3 Identity as a source of conflict
297(1)
14.4 Identity as a source of peace
298(2)
References
299(1)
15 Belief systems as drivers for technology choices in decentralization
300(10)
Alex Preukschat
15.1 What is a belief system?
300(1)
15.2 Blockchain and DLT as belief systems
301(2)
Blockchain "believers"
303(1)
DLT "believers"
303(1)
15.3 How are blockchains and DLTs relevant to SSI?
303(1)
15.4 Characterizing differences between blockchain and DLT
304(2)
Governance: How open is the network to open participation?
305(1)
Censorship resistance: How centralized is trust?
305(1)
Openness: Who can run a node?
306(1)
15.5 Why "believers" and not "proponents" or "partisans"?
306(2)
How do we measure decentralization?
307(1)
15.6 Technical advantages of decentralization
308(2)
References
309(1)
16 The origins of the SSI community
310(13)
Infominer
Kaliya
16.1 The birth of the internet
311(1)
16.2 Losing control over our personal information
311(1)
16.3 Pretty Good Privacy
312(1)
16.4 International Planetwork Conference
312(1)
16.5 Augmented Social Network and Identity Commons
313(1)
16.6 The Laws of Identity
313(1)
16.7 Internet Identity Workshop
314(1)
16.8 Increasing support of user control
314(1)
16.9 Rebooting the Web of Trust
314(1)
16.10 Agenda for Sustainable Development and ID2020
315(1)
16.11 Early state interest
316(1)
16.12 MyData and Learning Machine
317(1)
16.13 Verifiable Claims Working Group, Decentralized Identity Foundation, and Hyperledger Indy
318(1)
16.14 Increasing state support for SSI
318(1)
16.15 Ethereum identity
319(1)
16.16 World Economic Forum reports
319(1)
16.17 First production government demo of an SSI-supporting ledger
319(1)
16.18 SSI Meetup
320(1)
16.19 Official W3C standards
320(1)
16.20 Only the beginning
320(3)
References
321(2)
17 Identity is money
323(8)
Alex Preukschat
17.1 Going back to the starting point
323(2)
17.2 Identity as the source of relationships and value
325(1)
17.3 The properties of money
325(1)
17.4 The three functions of money
326(1)
17.5 The tokenization of value with identity
327(4)
References
329(2)
Part 4 How SSI will change your business
331(9)
18 Explaining the value of SSI to business
333(7)
John Phillips
18.1 How might we best explain SSI to people and organizations?
334(3)
Failed experiment 1 Leading with the technology
335(1)
Failed experiment 2 Leading with the philosophy
335(1)
Failed experiment 3 Explaining by demonstrating the tech
336(1)
Failed experiment 4 Explaining the (world's) problems
337(1)
18.2 Learning from other domains
337(1)
18.3 So how should we best explain the value of SSI?
338(1)
18.4 The power of stories
339(1)
18.5 Jackie's SSI story
339(1)
Part 1 The current physical world
340(2)
Part 2 The SSI world--like the current physical world, but better
342(2)
Part 3 Introducing the Sparkly Ball--or, what's wrong with many current digital identity models
344(63)
18.6 SSI Scorecard for apartment leasing
345(2)
Reference
346(1)
19 The Internet of Things opportunity
347(9)
Oscar Lage
Santiago De Diego
Michael Shea
19.1 IoT: Connecting everything safely
347(1)
19.2 How does SSI help IoT?
348(1)
19.3 The business perspective for SSI and IoT
349(1)
19.4 An SSL-based IoT architecture
350(2)
19.5 Tragic story: Bob's car hacked
352(1)
19.6 The Austrian Power Grid
353(1)
19.7 SSI Scorecard for IoT
354(2)
References
355(1)
20 Animal care and guardianship just became crystal clear
356(9)
Dr. Andrew Rowan
Chris Raczkowski
Liwen Zhang
20.1 Enter Mei and Bailey
357(6)
Bailey gets aleif-sovereign identity
357(1)
Guardianship transfer
358(1)
Vacation for Mei and Bailey
358(2)
A storm and separation
360(1)
Lost and found at your fingertips
361(2)
20.2 Digital identity unlocks opportunities for the well-being of animals and people
363(1)
20.3 SSI for animals reaffirms their inherent worth
363(1)
20.4 SSI Scorecard for pets and other animals
364(1)
21 Open democracy, voting, and SSI
365(9)
Shannon Appelcline
21.1 The problems with postal voting
366(1)
21.2 The problems with e-voting
367(1)
21.3 Estonia: A case study
367(1)
21.4 The three pillars of voting
368(1)
A state's bill of needs
368(1)
A voter's bill of rights
368(1)
21.5 The advantages of SSI
369(5)
SSI Scorecard for voting 3
70(302)
References
372(2)
22 Healthcare supply chain powered by SSI
374(9)
Daniel Fritz
Marco Cuomo
22.1 Emma's story
375(1)
22.2 Supply chain transparency and efficiency through SSI
376(1)
22.3 Industry ecosystem efficiency powered by SSI
377(2)
22.4 Future supply chain transformation across industries: The big picture
379(1)
22.5 Eliminating waste
379(1)
22.6 Authentication and quality
380(1)
22.7 SSI Scorecard for the pharma supply chain
380(3)
References
382(1)
23 Canada: Enabling self-sovereign identity
383(11)
Tim Bouma
Dave Roberts
23.1 The Canadian context
384(1)
23.2 The Canadian approach and policy framework
384(1)
23.3 The Pan-Canadian Trust Framework
385(2)
23.4 The normative core
387(1)
23.5 Mutual recognition
388(1)
23.6 Digital ecosystem roles
388(2)
23.7 Supporting infrastructure
390(1)
23.8 Mapping the SSI stack to the PCTF model
391(1)
23.9 Using the Verifiable Credentials Model
391(1)
23.10 Enabling Self-Sovereign Identity
392(1)
23.11 SSI Scorecard for the Pan-Canadian Trust Framework
392(2)
24 From elDAS to SSI in the European Union
394(13)
Dr. Ignacio Alamillo-Domingo
24.1 PKI: The first regulated identity service facility in the EU
395(1)
24.2 The EU legal framework
396(2)
24.3 The EU identity federation
398(4)
The legal concept of electronic identification (eID)
398(2)
The scope of the eIDAS FIM Regulation and its relationship with national law
400(2)
24.4 Summarizing the value of eIDAS for SSI adoption
402(1)
24.5 Scenarios for the adoption of SSI in the EU identity metasystem
403(3)
24.6 SSI Scorecard for the EBSI
406(1)
References 407(2)
Appendix A Additional Livebook chapters 409(5)
Appendix B Landmark essays on SSI 414(3)
Appendix C The path to self-sovereign identity 417(8)
Christopher Allen
Appendix D Identity in the Ethereum blockchain ecosystem 425(9)
Fabian Vogelsteller
Oliver Terbu
Appendix E The principles of SSI 434(3)
Contributing authors 437(12)
Index 449
Drummond Reed has spent over two decades in Internet identity, security, privacy, and trust frameworks. He is the Chief Trust Officer at Evernym and co-author of the Respect Trust Framework, which was honored with the Privacy Award at the 2011 European Identity Conference. Drummond is a Trustee and Secretary of the Sovrin Foundation, where he servesas chair of the Sovrin Governance Framework Working Group, and has served as co-chairof the OASIS XDI Technical Committee since 2004.

Alex Preukschat is Global Head of Strategic Blockchain Projects with Evernym. Alex has been active in the Bitcoin space since 2013 and leads SSIMeetup.org, a global SSI community to share knowledge in the identity space. He is a co-founder of Blockchain España and Alianza Blockchain Iberoamérica, and author of multiple reports and books about Blockchain and identity.