Adam Larter
Break the Chain: Decentralized solutions for today’s Web2.0 privacy problems
#1about 2 minutes
The developer's responsibility as a custodian of user data
Centralized Web2.0 architectures create data honeypots that lead to frequent and costly breaches, highlighting the developer's role in protecting user information.
#2about 3 minutes
Rethinking data ownership beyond centralized systems and blockchain
Users should own their data, and while blockchain is a decentralized technology, it is not suitable for storing private, personally identifiable information.
#3about 2 minutes
Understanding the financial and compliance risks of data breaches
Data breaches result in significant financial costs, reputational damage, and steep fines under regulations like GDPR.
#4about 1 minute
Shifting from centralized databases to personal data stores
The proposed architectural shift moves user data from a central server to a personal data store where applications "log into the user" with consent.
#5about 4 minutes
Introducing Decentralized Identifiers and Verifiable Credentials
Decentralized Identifiers (DIDs) provide a unique identity, while Verifiable Credentials (VCs) are cryptographically secure, tamper-evident claims about that identity.
#6about 2 minutes
How to present and query verifiable data securely
Verifiable Presentations (VPs) are used to share selected data from VCs, and Presentation Exchange (PEX) provides a standard query language for requesting it.
#7about 5 minutes
Bridging Web2.0 and Web3 with OpenID Connect standards
OpenID Connect extensions for Verifiable Credential Issuance and Verifiable Presentations allow existing identity protocols to work with decentralized data.
#8about 6 minutes
An overview of the Affinity decentralized identity platform
The Affinity platform provides tools like the Affinity Vault for personal data storage, Affinity Login for authentication, and Affinity Elements as a control plane.
#9about 3 minutes
Announcing the Affinity IOTA framework for developers
The IOTA framework is an end-to-end orchestration layer that simplifies decentralized data access by moving queries to the user's front-end data store.
#10about 1 minute
Implementing the IOTA framework with a simple SDK
Developers can integrate decentralized data requests into their applications with just a few lines of code using the Affinity SDK.
#11about 1 minute
Building an Internet of Trust with a new architecture
The Affinity Trust Network provides the tools to build applications where the user controls the consent boundary, with future plans for open-sourcing components.
Related jobs
Jobs that call for the skills explored in this talk.
Matching moments
07:37 MIN
Solving for data sovereignty and identity control
Giving the individual control of their data: Open Source Decentralized Web Nodes
00:19 MIN
The vision for a user-centric web called Web5
Giving the individual control of their data: Open Source Decentralized Web Nodes
18:04 MIN
Answering questions on data, scalability, and accessibility
Web3: Embracing the Next Era of the Internet Within a Web2 Landscape
13:42 MIN
The critical role of open standards and protocols
Giving the individual control of their data: Open Source Decentralized Web Nodes
32:36 MIN
Q&A on data ownership, monetization, and competing tools
A Data Mesh needs Open Metadata
09:04 MIN
The core technical components for asset tokenization
Tokenization of Everything: Where the Real World Meets Blockchain
05:22 MIN
Defining Web3 as a new era of user empowerment
Web3: Embracing the Next Era of the Internet Within a Web2 Landscape
01:55 MIN
The problem of centralized platforms and data sovereignty
Trust as the Key Concept in Future Mobility
Featured Partners
Related Videos
Refactoring the Web
Angie Jones
Giving the individual control of their data: Open Source Decentralized Web Nodes
Angie Jones, Mike Brock, Daniel Buchner, Markus Sabadello & Nalin Mittal
Web3: Embracing the Next Era of the Internet Within a Web2 Landscape
Darrel Idiagbor
Demystifying Crypto & Web3: A Technical Journey Through 15 Years of Innovation
Ed Marquez
Going Beyond Passwords: The Future of User Authentication
Gift Egwuenu
Overcome your trust issues! In a world of fake data, Data Provenance FTW
Jon Geater
Trust as the Key Concept in Future Mobility
Peter Busch
Debunking the Top 10 Myths about Web 3
Ed Marquez
From learning to earning
Jobs that call for the skills explored in this talk.
![Senior Software Engineer [TypeScript] (Prisma Postgres)](https://wearedevelopers.imgix.net/company/283ba9dbbab3649de02b9b49e6284fd9/cover/oKWz2s90Z218LE8pFthP.png?w=400&ar=3.55&fit=crop&crop=entropy&auto=compress,format)
Senior Software Engineer [TypeScript] (Prisma Postgres)
Prisma
Remote
Senior
Node.js
TypeScript
PostgreSQL





Consultant Identity & Access Management (IAM) / One Identity Manager
Devoteam
Remote
API
.NET
Microsoft Office
Microsoft Active Directory



AI Governance Consultant
TRUSTEQ GmbH