Adam Larter
Break the Chain: Decentralized solutions for today’s Web2.0 privacy problems
#1about 2 minutes
The developer's responsibility as a custodian of user data
Centralized Web2.0 architectures create data honeypots that lead to frequent and costly breaches, highlighting the developer's role in protecting user information.
#2about 3 minutes
Rethinking data ownership beyond centralized systems and blockchain
Users should own their data, and while blockchain is a decentralized technology, it is not suitable for storing private, personally identifiable information.
#3about 2 minutes
Understanding the financial and compliance risks of data breaches
Data breaches result in significant financial costs, reputational damage, and steep fines under regulations like GDPR.
#4about 1 minute
Shifting from centralized databases to personal data stores
The proposed architectural shift moves user data from a central server to a personal data store where applications "log into the user" with consent.
#5about 4 minutes
Introducing Decentralized Identifiers and Verifiable Credentials
Decentralized Identifiers (DIDs) provide a unique identity, while Verifiable Credentials (VCs) are cryptographically secure, tamper-evident claims about that identity.
#6about 2 minutes
How to present and query verifiable data securely
Verifiable Presentations (VPs) are used to share selected data from VCs, and Presentation Exchange (PEX) provides a standard query language for requesting it.
#7about 5 minutes
Bridging Web2.0 and Web3 with OpenID Connect standards
OpenID Connect extensions for Verifiable Credential Issuance and Verifiable Presentations allow existing identity protocols to work with decentralized data.
#8about 6 minutes
An overview of the Affinity decentralized identity platform
The Affinity platform provides tools like the Affinity Vault for personal data storage, Affinity Login for authentication, and Affinity Elements as a control plane.
#9about 3 minutes
Announcing the Affinity IOTA framework for developers
The IOTA framework is an end-to-end orchestration layer that simplifies decentralized data access by moving queries to the user's front-end data store.
#10about 1 minute
Implementing the IOTA framework with a simple SDK
Developers can integrate decentralized data requests into their applications with just a few lines of code using the Affinity SDK.
#11about 1 minute
Building an Internet of Trust with a new architecture
The Affinity Trust Network provides the tools to build applications where the user controls the consent boundary, with future plans for open-sourcing components.
Related jobs
Jobs that call for the skills explored in this talk.
aedifion GmbH
Köln, Germany
€30-45K
Intermediate
Network Security
Security Architecture
+1
Matching moments
02:39 MIN
Establishing a single source of truth for all data
Cat Herding with Lions and Tigers - Christian Heilmann
03:17 MIN
Selecting strategic partners and essential event tools
Cat Herding with Lions and Tigers - Christian Heilmann
01:32 MIN
Organizing a developer conference for 15,000 attendees
Cat Herding with Lions and Tigers - Christian Heilmann
04:57 MIN
Increasing the value of talk recordings post-event
Cat Herding with Lions and Tigers - Christian Heilmann
04:49 MIN
Using content channels to build an event community
Cat Herding with Lions and Tigers - Christian Heilmann
03:39 MIN
Breaking down silos between HR, tech, and business
What 2025 Taught Us: A Year-End Special with Hung Lee
02:44 MIN
Rapid-fire thoughts on the future of work
What 2025 Taught Us: A Year-End Special with Hung Lee
03:48 MIN
Automating formal processes risks losing informal human value
What 2025 Taught Us: A Year-End Special with Hung Lee
Featured Partners
Related Videos
Refactoring the Web
Angie Jones
Giving the individual control of their data: Open Source Decentralized Web Nodes
Angie Jones, Mike Brock, Daniel Buchner, Markus Sabadello & Nalin Mittal
Web3: Embracing the Next Era of the Internet Within a Web2 Landscape
Darrel Idiagbor
Demystifying Crypto & Web3: A Technical Journey Through 15 Years of Innovation
Ed Marquez
Trust as the Key Concept in Future Mobility
Peter Busch
Overcome your trust issues! In a world of fake data, Data Provenance FTW
Jon Geater
How to Build for Decentralized Systems
Alessandro Cappellato Ferrari
Debunking the Top 10 Myths about Web 3
Ed Marquez
Related Articles
View all articles



From learning to earning
Jobs that call for the skills explored in this talk.






Strada Inc.
Municipality of Madrid, Spain
Senior
Azure
![Test Engineer II"}}]},{"@context":"https://schema.org/","@type":"JobPosting","@id":"#jobPosting","title":"Test Engineer II](https://wearedevelopers.imgix.net/public/default-job-listing-cover.png?w=400&ar=3.55&fit=crop&crop=entropy&auto=compress,format)
Entrust's Identity
Java
Ruby
RSpec
Swift
Python
+11

