SSI
Self Sovereign Identity is a new cryptographic technology that enables individuals and organizations to assert their own identity. The self sovereign identity is private and not disclosed.
DID
Decentralized Identifiers are identifiable endpointsbelonging to a SSI, and can be shared with the world. For example documents, wallets, smart contracts or programmable agents.
The BASIC
Timothy Ruff
GP, Digital Trust Ventures
SELF-SOVEREIGN IDENTITY CHANGES THE GAME
Digital identity is an infrastructure necessary to do most everything on the Internet. And while there have been many solutions through the years, It remains a problem.
Companies own the digital identities of the people that use their services. Centralized databases are a security risk for cyberattacks; not to mention the low integrity of stored data, and users have little to no control of how their data is secured. From business perspective digital identities are a huge administrative overhead, highly costly and a permanent potential risk (in case of data breach).
Self-Sovereign Identity technologies give individuals and companies the ability to control and manage their own digital identifiers. This technology is gaining momentum as it solves previously unsolvable challenges. With the emergence SSI open standards, a new layer of the internet emerges for the identity of people and organizations. SSI represents a new paradigm — it changes the identity game completely.
Any company that collects, stores or sells personal information can potentially be revolutionized using SSI technology.
SSI builds on the past, while solving for the future
Digital identity has been a problem from the beginning of the internet. Kim Cameron of Microsoft, one of the pioneers of user-centric identity efforts over the past 10 years said “The internet was not built with an identity layer.” The Internet Identity Workshop began convening about user-centric identity and the potential for an identity layer as early as in 2005.
Over a decade of work has gone into trying to solve the challenge of making a real working identity layer that doesn’t outsource digital identity provision to a corporation and is built on a set of standards not owned by any organization. The Hydraledger’s breakthrough in SSI in 2020 mean that individuals can be in control of their own identifiers that are resolvable at internet scale.
Introducing a new technology layer of the internet
The current Open Systems Interconnection model (OSI) of the internet stack has 7 layers:
1) Physical
2) Data Link
3) Network
4) Transport
5) Session
6) Presentation
7) Application
Hydraledger Stack technologies are so fundamentally new that they create a whole new layer for individuals and users. In this layer, identifiers are managed and owned by individuals and companies. Verifiable credentials can be issued to the identifiers, which can then be shared with any number of services they might interact with.
Open Standards make it true Self-Sovereign Identity
There are more than 10 emerging standards that enable true SSI. The most important standard, at the center of all others, is the Decentralized Identifiers (DID) Standard. It’s critical that companies use DIDs as described in the standard to ensure interoperability. Any organization not using standardized DIDs cannot leverage the power of the interoperable standards. Protocols are both freeing and constraining.
Hydra’s DID standard is W3C conform and our accompanying format for DID Documents clearly state how to format a DID Doc and support universal resolution. At the same time the DID standard allows newly documented methods to be added. This supports innovation in how to Create, Read, Update, Delete (CRUD) operations on target systems.

Blockchains are used, but in not the way you know
Blockchains used for cryptocurrency exchanges solve the double spend problem. Their simple system of identifiers is a ledger of public keys.
Decentralized Identifiers (DIDs) and the accompanying DID Documents enable individuals to share abstract identifiers (DIDs) with an associated public key and a resolution end-point. This supports the ability to message and transact with the DID owner. The transacted data (like a passport copy for example) is unlikely put on blockchain (although you could). DIDs are hashed references to your data, that only you can fully operate.
Potential to reduce Data Security Risk
The Public Key Infrastructure that underlies SSI provides a significant improvement by providing a secure encrypted tunnel of communication between an institution and its customers.
Banks, Insurances and Governments are some of the early adopters of SSI not because they want to support “individuals owning their own identity” but because the security profile of the technology is so much higher than the current technology available to them with various forms of two factor authentication.
