Adam Larter

Break the Chain: Decentralized solutions for today’s Web2.0 privacy problems

The best way to prevent a data breach is to never store PII. This talk introduces the decentralized stack that makes this a practical reality.

Break the Chain: Decentralized solutions for today’s Web2.0 privacy problems
#1about 2 minutes

The developer's responsibility as a custodian of user data

Centralized Web2.0 architectures create data honeypots that lead to frequent and costly breaches, highlighting the developer's role in protecting user information.

#2about 3 minutes

Rethinking data ownership beyond centralized systems and blockchain

Users should own their data, and while blockchain is a decentralized technology, it is not suitable for storing private, personally identifiable information.

#3about 2 minutes

Understanding the financial and compliance risks of data breaches

Data breaches result in significant financial costs, reputational damage, and steep fines under regulations like GDPR.

#4about 1 minute

Shifting from centralized databases to personal data stores

The proposed architectural shift moves user data from a central server to a personal data store where applications "log into the user" with consent.

#5about 4 minutes

Introducing Decentralized Identifiers and Verifiable Credentials

Decentralized Identifiers (DIDs) provide a unique identity, while Verifiable Credentials (VCs) are cryptographically secure, tamper-evident claims about that identity.

#6about 2 minutes

How to present and query verifiable data securely

Verifiable Presentations (VPs) are used to share selected data from VCs, and Presentation Exchange (PEX) provides a standard query language for requesting it.

#7about 5 minutes

Bridging Web2.0 and Web3 with OpenID Connect standards

OpenID Connect extensions for Verifiable Credential Issuance and Verifiable Presentations allow existing identity protocols to work with decentralized data.

#8about 6 minutes

An overview of the Affinity decentralized identity platform

The Affinity platform provides tools like the Affinity Vault for personal data storage, Affinity Login for authentication, and Affinity Elements as a control plane.

#9about 3 minutes

Announcing the Affinity IOTA framework for developers

The IOTA framework is an end-to-end orchestration layer that simplifies decentralized data access by moving queries to the user's front-end data store.

#10about 1 minute

Implementing the IOTA framework with a simple SDK

Developers can integrate decentralized data requests into their applications with just a few lines of code using the Affinity SDK.

#11about 1 minute

Building an Internet of Trust with a new architecture

The Affinity Trust Network provides the tools to build applications where the user controls the consent boundary, with future plans for open-sourcing components.

Related jobs
Jobs that call for the skills explored in this talk.

Featured Partners

From learning to earning

Jobs that call for the skills explored in this talk.