Adam Larter

Break the Chain: Decentralized solutions for today’s Web2.0 privacy problems

The best way to prevent a data breach is to never store PII. This talk introduces the decentralized stack that makes this a practical reality.

Break the Chain: Decentralized solutions for today’s Web2.0 privacy problems
#1about 2 minutes

The developer's responsibility as a custodian of user data

Centralized Web2.0 architectures create data honeypots that lead to frequent and costly breaches, highlighting the developer's role in protecting user information.

#2about 3 minutes

Rethinking data ownership beyond centralized systems and blockchain

Users should own their data, and while blockchain is a decentralized technology, it is not suitable for storing private, personally identifiable information.

#3about 2 minutes

Understanding the financial and compliance risks of data breaches

Data breaches result in significant financial costs, reputational damage, and steep fines under regulations like GDPR.

#4about 1 minute

Shifting from centralized databases to personal data stores

The proposed architectural shift moves user data from a central server to a personal data store where applications "log into the user" with consent.

#5about 4 minutes

Introducing Decentralized Identifiers and Verifiable Credentials

Decentralized Identifiers (DIDs) provide a unique identity, while Verifiable Credentials (VCs) are cryptographically secure, tamper-evident claims about that identity.

#6about 2 minutes

How to present and query verifiable data securely

Verifiable Presentations (VPs) are used to share selected data from VCs, and Presentation Exchange (PEX) provides a standard query language for requesting it.

#7about 5 minutes

Bridging Web2.0 and Web3 with OpenID Connect standards

OpenID Connect extensions for Verifiable Credential Issuance and Verifiable Presentations allow existing identity protocols to work with decentralized data.

#8about 6 minutes

An overview of the Affinity decentralized identity platform

The Affinity platform provides tools like the Affinity Vault for personal data storage, Affinity Login for authentication, and Affinity Elements as a control plane.

#9about 3 minutes

Announcing the Affinity IOTA framework for developers

The IOTA framework is an end-to-end orchestration layer that simplifies decentralized data access by moving queries to the user's front-end data store.

#10about 1 minute

Implementing the IOTA framework with a simple SDK

Developers can integrate decentralized data requests into their applications with just a few lines of code using the Affinity SDK.

#11about 1 minute

Building an Internet of Trust with a new architecture

The Affinity Trust Network provides the tools to build applications where the user controls the consent boundary, with future plans for open-sourcing components.

Related jobs
Jobs that call for the skills explored in this talk.
SabIna compys

SabIna compys
Vienna, Austria

Remote
20-100K
Intermediate
JavaScript
.NET
+1

Featured Partners

Related Articles

View all articles
CH
Chris Heilmann
WWC24 Talk - Scott Hanselman - AI: Superhero or Supervillain?
Join Scott Hanselman at WWC24 to explore AI's role as a superhero or supervillain. Scott shares his 32 years of experience in software engineering, discusses AI myths, ethical dilemmas, and tech advancements. Engage with his live demos and insights o...
WWC24 Talk - Scott Hanselman - AI: Superhero or Supervillain?
CH
Chris Heilmann
Dev Digest 116 - WWWAI?
This time, learn how to un-AI Google's search results, what's new on the web, avoid a new security hole and go back to BASICS with us. News and ArticlesWhat a week. Google, Microsoft, OpenAI and many others had their big flagship events announcing th...
Dev Digest 116 - WWWAI?

From learning to earning

Jobs that call for the skills explored in this talk.