Break the Chain: Decentralized solutions for today’s Web2.0 privacy problems
The best way to prevent a data breach is to never store PII. This talk introduces the decentralized stack that makes this a practical reality.
#1about 2 minutes
The developer's responsibility as a custodian of user data
Centralized Web2.0 architectures create data honeypots that lead to frequent and costly breaches, highlighting the developer's role in protecting user information.
#2about 3 minutes
Rethinking data ownership beyond centralized systems and blockchain
Users should own their data, and while blockchain is a decentralized technology, it is not suitable for storing private, personally identifiable information.
#3about 2 minutes
Understanding the financial and compliance risks of data breaches
Data breaches result in significant financial costs, reputational damage, and steep fines under regulations like GDPR.
#4about 1 minute
Shifting from centralized databases to personal data stores
The proposed architectural shift moves user data from a central server to a personal data store where applications "log into the user" with consent.
#5about 4 minutes
Introducing Decentralized Identifiers and Verifiable Credentials
Decentralized Identifiers (DIDs) provide a unique identity, while Verifiable Credentials (VCs) are cryptographically secure, tamper-evident claims about that identity.
#6about 2 minutes
How to present and query verifiable data securely
Verifiable Presentations (VPs) are used to share selected data from VCs, and Presentation Exchange (PEX) provides a standard query language for requesting it.
#7about 5 minutes
Bridging Web2.0 and Web3 with OpenID Connect standards
OpenID Connect extensions for Verifiable Credential Issuance and Verifiable Presentations allow existing identity protocols to work with decentralized data.
#8about 6 minutes
An overview of the Affinity decentralized identity platform
The Affinity platform provides tools like the Affinity Vault for personal data storage, Affinity Login for authentication, and Affinity Elements as a control plane.
#9about 3 minutes
Announcing the Affinity IOTA framework for developers
The IOTA framework is an end-to-end orchestration layer that simplifies decentralized data access by moving queries to the user's front-end data store.
#10about 1 minute
Implementing the IOTA framework with a simple SDK
Developers can integrate decentralized data requests into their applications with just a few lines of code using the Affinity SDK.
#11about 1 minute
Building an Internet of Trust with a new architecture
The Affinity Trust Network provides the tools to build applications where the user controls the consent boundary, with future plans for open-sourcing components.
Related jobs
Jobs that call for the skills explored in this talk.
5 Reasons Why Attending Conferences in 2026 Matters More Than You ThinkIt’s 2026, and the “remote vs. office” debate has finally settled into a high-tech hybrid reality. While we’ve perfected the art of shipping production-grade code from decentralized hubs and home setups, something shifted. We realized that while AI c...
Christina Schaireiter
Why Attend a Developer Event?Modern software engineering moves too fast for documentation alone. Attending a world-class event is about shifting from tactical execution to strategic leadership.
Skill Diversification: Break out of your specific tech stack to see how the industry...
Chris Heilmann
With AIs wide open - WeAreDevelopers at All Things Open 2025Last week our VP of Developer Relations, Chris Heilmann, flew to Raleigh, North Carolina to present at All Things Open . An excellent event he had spoken at a few times in the past and this being the “Lucky 13” edition, he didn’t hesitate to come and...