IIW 38 KERI & ACDC Session List

Internet Identity Workshop Logo
IIW Logo

It's been two weeks since the 38th bi-annual Internet Identity Workshop. The KERI community had a big showing with 19 sessions across three days.

This included a variety of sessions on the vLEI ecosystem, the Trust Over IP (ToIP) Foundation, the Trust Spanning Protocol, KERI basics, CESR 2.0, new Witness infrastructure, and business-focused sessions. A developing tradition of the "Bearer Tokens are bad, don't use them" session was held this year as well by Sam Smith titled "I don't sign my credentials and neither should you!"

See the list below for a complete reference of KERI sessions and their meeting notes.

IIW 38 – 19 KERI and ACDC Sessions

Day 1 – Apr 16

  • The Hitchhiker's Guide To KERI / Nuttawut Kongsuwan
  • Trust Over IP (ToIP) Foundation / Judith Fleenor
  • Organizational Identity & Verifiable Authority / Timothy Ruff
  • EBA Pilot Using the vLEI / Karla McKenna & Lance Byrd
  • Simple SSI – How to make the SSI Codebase attractive for devs to use? / Jonathan Rayback
  • The Business of SSI & Authentic Data / Timothy Ruff
  • TSP draft Part I / Wenjing Chu

Day 2 – Apr 17

  • KERI for Dummies / Timothy Ruff, Phil Feairheller
  • The 5 Rights of Secure Health Data = a Proof of Concept – KERI-ACDC / Jared J and Phil Feairheller
  • TSP Part II / Wenjing Chu
  • (notes missing/blank) CESR 2.0 Performance features – Deep dive annotation – Comparison to JSON CBOR and more / Sam Smith

Day 3 – Apr 18

  • Deploying Multi Tenant Secure Witnesses for KERI / Phil Feairheller
  • TSP Draft Part III Implementation / Wenjing Chu
  • Running Lean w/SSI The business model to go from Idea to Company / Jared J & Timothy Ruff
  • Five Failed Blockchains – Why Trade Needs Protocols, Not Platforms / Timothy Ruff
  • Cardano Transactions and KERI / Can a Cardano Tx be affected based on AID's current keys? / Ed Eykholt
  • vLEI (verified Legal Entity Identifier) Demystified / Nuttawut Kongsuwan
  • (notes missing/blank) I don't sign my credentials and neither should you! Why unbound signatures (tokens) are insecure and how to use KERI instead. KERI for Enterprise / Sam Smith

For more sessions come to the next Internet Identity Workshop in Fall of 2024 from OCTOBER 29, 2024 – OCTOBER 31, 2024.

Table of Contents