fbpx
Connect with us

Bit Coin

What is decentralized identity in blockchain?

Published

on

What is decentralized identity in blockchain?
You must confirm the subscription in your inbox.”,”subscribe_email_required”:”Email required”,”subscribe_email_invalid”:”A valid email address must be provided. “,”shares”:”Total shares”,”views”:”Total views”,”sponsoredBadge”:”stretch_banners.sponsored.badge”}” :post=”{“id”:92527,”seo_title”:”What is decentralized identity in blockchain?”,”seo_description”:”What is a decentralized identity, and why does it matter? In this guide, we break it down for you”,”keywords”:”Blockchain,Decentralization,Identity,Security,Privacy,Web3,Data”,”canonical”:”https://cointelegraph.com/explained/what-is-decentralized-identity-in-blockchain”,”thumb”:”https://images.cointelegraph.com/images/1024_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9hOTVhN2NlZTg0N2NlMDIzZWRlNjQyZjljNGQwNWM0ZC5qcGc=.jpg”,”img”:”https://images.cointelegraph.com/images/2048_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9hOTVhN2NlZTg0N2NlMDIzZWRlNjQyZjljNGQwNWM0ZC5qcGc=.jpg”,”youtube”:””,”og_title”:”What is decentralized identity in blockchain?”,”og_description”:”What is a decentralized identity, and why does it matter? In this guide, we break it down for you.”,”twitter_title”:”What is decentralized identity in blockchain?”,”twitter_description”:”What is a decentralized identity, and why does it matter? In this guide, we break it down for you.”,”published”:”2022-09-03T21:00:00+01:00″,”noindex”:0,”modified”:”2022-08-31T16:31:55+01:00″,”title”:”What is decentralized identity in blockchain?”,”leadtext”:”What is a decentralized identity, and why does it matter? In this guide, we break it down for you.”,”amp”:”https://cointelegraph.com/explained/what-is-decentralized-identity-in-blockchain/amp”,”alternates”:[],”alternatesLinks”:[],”url”:”what-is-decentralized-identity-in-blockchain”,”url_full”:”/explained/what-is-decentralized-identity-in-blockchain”,”category”:{“id”:65,”url”:”explained”,”priority”:0,”created”:null,”modified”:null,”parent_id”:0,”is_hidden”:0,”created_at”:”-0001-11-30 00:00:00″,”updated_at”:”2022-02-22 18:25:15″,”deleted_at”:null,”admin_weight”:30,”enabled”:1,”is_blog”:0,”relevant”:0,”category_id”:65,”language_id”:1,”title”:”Explained”,”alt”:””,”keywords”:””,”seo_title”:”Explained: articles for beginners about cryptocurrency and blockchain.”,”description”:”

What is Bitcoin? How does blockchain work? How to mine cryptocurrency? We are glad to help you answer these questions with our quick guides in Explained section.

rn”,”seo_description”:”What is Bitcoin? How does blockchain work? How to mine cryptocurrency? We are glad to help you answer these questions with our quick guides in Explained section.”},”words_count”:1350,”description”:”What is a decentralized identity, and why does it matter? In this guide, we break it down for you”,”author”:{“id”:1391,”title”:”Sasha Shilina”,”url”:”sasha-shilina”,”twitter”:””,”google_plus”:””,”photo”:”https://s3.cointelegraph.com/storage/uploads/view/5d1d60470a33cd5268c8885651d3f5cc.jpg”,”gender”:”female”,”description”:”Sasha Shilina is the managing partner and chief research officer of Paradigm and a core researcher at Humanode. A Ph.D. graduate from Moscow State University, Sasha is a distributed technology analyst and researcher by vocation who is interested in all practices rooted in modern science, technology and philosophy, and the synergetic relationship between them.”,”facebook”:””,”email”:””,”linkedin”:””,”created_at”:”2021-10-15 12:04:11″,”updated_at”:”2022-05-04 15:57:53″,”deleted_at”:null,”avatar”:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy81ZDFkNjA0NzBhMzNjZDUyNjhjODg4NTY1MWQzZjVjYy5qcGc=.jpg”,”hash”:”aHR0cHM6Ly9jb2ludGVsZWdyYXBoLmNvbS9hdXRob3JzL3Nhc2hhLXNoaWxpbmE=”,”relativeUrl”:”https://cointelegraph.com/authors/sasha-shilina”,”user_id”:1391,”language_id”:1,”name”:”Sasha Shilina”,”desc”:”Sasha Shilina is the managing partner and chief research officer of Paradigm and a core researcher at Humanode. A Ph.D. graduate from Moscow State University, Sasha is a distributed technology analyst and researcher by vocation who is interested in all practices rooted in modern science, technology and philosophy, and the synergetic relationship between them.”,”seo_title”:””,”seo_description”:””,”enabled”:1,”show_in_authors”:0,”show_in_experts”:0},”category_id”:65,”audio”:”https://s3.cointelegraph.com/audio/92527.306732ee-9d4c-45b7-8e01-1df8983d8265.mp3″,”tags”:[{“name”:”Blockchain”,”uri”:”/tags/blockchain”,”super”:1,”page_title”:”Blockchain News”},{“name”:”Security”,”uri”:”/tags/security”,”super”:0,”page_title”:”Security News”},{“name”:”Decentralization”,”uri”:”/tags/decentralization”,”super”:0,”page_title”:”Decentralization News”},{“name”:”Privacy”,”uri”:”/tags/privacy”,”super”:0,”page_title”:”Privacy News”},{“name”:”Identity”,”uri”:”/tags/identity”,”super”:0,”page_title”:”Identity News”},{“name”:”Data”,”uri”:”/tags/data”,”super”:0,”page_title”:””},{“name”:”Web3″,”uri”:”/tags/web3″,”super”:0,”page_title”:””}],”tag_title”:”Blockchain”,”date”:”10 HOURS AGO”,”badge”:{“title”:”Explained”,”label”:”default”},”qty”:127,”stats_pixel”:”“,”stats_pixel_url”:”https://zoa.cointelegraph.com/pixel?postId=92527&regionId=1″,”shares”:23,”infographic”:false,”sponsored”:false,”explained”:true,”press_release”:false,”show_referral”:false,”social_description”:””,”social_translators”:{“clipboard_popup_label”:”Link copied”,”socialWechatFooterError”:”WeChat error”,”socialWechatFooterText”:”WeChat share”,”socialWechatHeaderText”:”WeChat share”},”social_shares”:{“post_id”:92527,”post_url”:”https://cointelegraph.com/explained/what-is-decentralized-identity-in-blockchain”,”post_titles”:{“normal”:”What is decentralized identity in blockchain?”,”twitter”:”What is decentralized identity in blockchain?”},”post_text”:{“normal”:”What is decentralized identity in blockchain?”,”twitter”:”What is decentralized identity in blockchain? https://cointelegraph.com/explained/what-is-decentralized-identity-in-blockchain via @cointelegraph”},”accounts”:{“twitter”:”@cointelegraph”}},”socials”:{“facebook”:{“url”:”https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fcointelegraph.com%2Fexplained%2Fwhat-is-decentralized-identity-in-blockchain”,”count”:null,”short”:”fb”,”fa”:”facebook”},”twitter”:{“url”:”https://twitter.com/intent/tweet?text=What+is+decentralized+identity+in+blockchain%3F https%3A%2F%2Fcointelegraph.com%2Fexplained%2Fwhat-is-decentralized-identity-in-blockchain via @cointelegraph”,”count”:null,”short”:”tw”,”fa”:”twitter”},”telegram”:{“url”:”https://telegram.me/share/url?url=https%3A%2F%2Fcointelegraph.com%2Fexplained%2Fwhat-is-decentralized-identity-in-blockchain &text=What+is+decentralized+identity+in+blockchain%3F”,”count”:null,”short”:”tg”,”fa”:”paper-plane”},”whatsapp”:{“url”:”https://api.whatsapp.com/send?text=What+is+decentralized+identity+in+blockchain%3F&href=https%3A%2F%2Fcointelegraph.com%2Fexplained%2Fwhat-is-decentralized-identity-in-blockchain”,”count”:null,”short”:”wu”,”fa”:”whatsapp”},”gplus”:{“url”:”https://plus.google.com/share?url=https%3A%2F%2Fcointelegraph.com%2Fexplained%2Fwhat-is-decentralized-identity-in-blockchain”,”count”:null,”short”:”gplus”,”fa”:”google-plus”},”reddit”:{“url”:”https://www.reddit.com/submit?url=https%3A%2F%2Fcointelegraph.com%2Fexplained%2Fwhat-is-decentralized-identity-in-blockchain&title=What+is+decentralized+identity+in+blockchain%3F”,”count”:null,”short”:”reddit”,”fa”:”reddit-alien”},”linkedin”:{“url”:”https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fcointelegraph.com%2Fexplained%2Fwhat-is-decentralized-identity-in-blockchain&title=What+is+decentralized+identity+in+blockchain%3F”,”count”:null,”short”:”li”,”fa”:”linkedin”}},”hide_disclaimer”:false,”elink”:”https://cointelegraph.com”,”etitle”:”Cointelegraph”,”elogo_x2″:”https://images.cointelegraph.com/images/528_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9hYjAzYTJhMmNlOWEyMWRjMWYwOTYxZDkxNzMxYzhiYS5wbmc=.png”,”elogo_x1″:”https://images.cointelegraph.com/images/260_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9hYjAzYTJhMmNlOWEyMWRjMWYwOTYxZDkxNzMxYzhiYS5wbmc=.png”,”elogo_svg”:false,”content”:[{“id”:3666,”post_id”:92527,”title”:”What is a decentralized identity?”,”content”:”

A decentralized identity is a self-owned, independent identity that enables trusted data exchange.

nn

Decentralized identity is an emerging Web3 concept based on a trust framework for identity management. Such decentralized identity management includes an approach to identity and access administration that allows people to generate, manage and control their personally identifiable information (PII) without a centralized third party like a registry, identity provider or certification authority.

nn

Considered to be private and sensitive data, PII refers to the body of information about specific individuals that directly or indirectly identifies them. Usually, it combines name, age, address, biometrics, citizenship, employment, credit card accounts, credit history, et cetera. In addition to PII, information that forms a decentralized digital identity includes data from online electronic devices, such as usernames and passwords, search history, buying history and others.

nn

With a decentralized identity, users can control their own PII and provide only the information that is required to be verified. Decentralized identity management supports an identity trust framework where users, organizations and things interact with each other transparently and securely.

nnn”,”created_at”:”2022-08-31 16:18:55″,”updated_at”:”2022-08-31 16:31:59″,”sort”:1,”translations”:{“id”:3659,”explained_post_id”:3666,”title_en”:”What is a decentralized identity?”,”content_en”:”

A decentralized identity is a self-owned, independent identity that enables trusted data exchange.

nn

Decentralized identity is an emerging Web3 concept based on a trust framework for identity management. Such decentralized identity management includes an approach to identity and access administration that allows people to generate, manage and control their personally identifiable information (PII) without a centralized third party like a registry, identity provider or certification authority.

nn

Considered to be private and sensitive data, PII refers to the body of information about specific individuals that directly or indirectly identifies them. Usually, it combines name, age, address, biometrics, citizenship, employment, credit card accounts, credit history, et cetera. In addition to PII, information that forms a decentralized digital identity includes data from online electronic devices, such as usernames and passwords, search history, buying history and others.

nn

With a decentralized identity, users can control their own PII and provide only the information that is required to be verified. Decentralized identity management supports an identity trust framework where users, organizations and things interact with each other transparently and securely.

nnn”,”title_es”:””,”content_es”:”n”,”title_cn”:””,”content_cn”:”n”,”title_de”:””,”content_de”:”n”,”title_fr”:””,”content_fr”:”n”,”title_it”:””,”content_it”:”n”,”title_ar”:””,”content_ar”:”n”,”title_br”:””,”content_br”:”n”,”title_jp”:””,”content_jp”:”n”,”created_at”:”2022-08-31 16:18:55″,”updated_at”:”2022-08-31 16:31:59″,”title_kr”:””,”content_kr”:”n”,”title_tr”:””,”content_tr”:”n”}},{“id”:3667,”post_id”:92527,”title”:”Why does decentralized identity matter?”,”content”:”

A decentralized identity aims to give people official proof of identity and complete ownership and control over their identities in a secure and user-friendly way.

nn

A verifiable proof of existence is often needed for citizens to access essential services like healthcare, banking and education. Unfortunately, according to Worldbank data, 1 billion people on our planet still do not have an official proof of identity. A considerable part of the population is in a precarious position, unable to vote, open a bank account, own property or find a job. The inability to obtain identification documents limits people’s freedom.

nn

What’s more, traditional centralized identification systems are insecure, fragmented and exclusionary. Centralized identity databases are at risk as they often become prime targets for hackers. From time to time, we hear about hacks and attacks on centralized identity solutions in which thousands and millions of customer records are being stolen from major retailers.

nn

The ownership issues remain as well. Users who have traditional forms of digital identity still don’t have complete ownership and control over them and are usually unaware of the value their data generates. In a centralized scenario, PII is stored and managed by others. Thus, it becomes more challenging, if not impossible, for users to claim ownership of their identities.

nn

Decentralized digital identity addresses these issues by providing a way for digital identity to be used across multiple participating platforms without sacrificing security and the user’s experience. In a decentralized identity framework, users need only an internet connection and a device to access it.

nn

Furthermore, in decentralized identity systems, distributed ledger technologies and blockchain, in particular, validate the existence of a legitimate identity. By providing a consistent, interoperable and tamper-proof architecture, blockchains enable the secure management and storage of PII, with significaant benefits for organizations, users, developers and Internet of Things (IoT) management systems.

nn

Centralized identity vs. Decentralized identity

nnn”,”created_at”:”2022-08-31 16:20:51″,”updated_at”:”2022-08-31 16:31:59″,”sort”:2,”translations”:{“id”:3660,”explained_post_id”:3667,”title_en”:”Why does decentralized identity matter?”,”content_en”:”

A decentralized identity aims to give people official proof of identity and complete ownership and control over their identities in a secure and user-friendly way.

nn

A verifiable proof of existence is often needed for citizens to access essential services like healthcare, banking and education. Unfortunately, according to Worldbank data, 1 billion people on our planet still do not have an official proof of identity. A considerable part of the population is in a precarious position, unable to vote, open a bank account, own property or find a job. The inability to obtain identification documents limits people’s freedom.

nn

What’s more, traditional centralized identification systems are insecure, fragmented and exclusionary. Centralized identity databases are at risk as they often become prime targets for hackers. From time to time, we hear about hacks and attacks on centralized identity solutions in which thousands and millions of customer records are being stolen from major retailers.

nn

The ownership issues remain as well. Users who have traditional forms of digital identity still don’t have complete ownership and control over them and are usually unaware of the value their data generates. In a centralized scenario, PII is stored and managed by others. Thus, it becomes more challenging, if not impossible, for users to claim ownership of their identities.

nn

Decentralized digital identity addresses these issues by providing a way for digital identity to be used across multiple participating platforms without sacrificing security and the user’s experience. In a decentralized identity framework, users need only an internet connection and a device to access it.

nn

Furthermore, in decentralized identity systems, distributed ledger technologies and blockchain, in particular, validate the existence of a legitimate identity. By providing a consistent, interoperable and tamper-proof architecture, blockchains enable the secure management and storage of PII, with significaant benefits for organizations, users, developers and Internet of Things (IoT) management systems.

nn

Centralized identity vs. Decentralized identity

nnn”,”title_es”:””,”content_es”:”n”,”title_cn”:””,”content_cn”:”n”,”title_de”:””,”content_de”:”n”,”title_fr”:””,”content_fr”:”n”,”title_it”:””,”content_it”:”n”,”title_ar”:””,”content_ar”:”n”,”title_br”:””,”content_br”:”n”,”title_jp”:””,”content_jp”:”n”,”created_at”:”2022-08-31 16:20:51″,”updated_at”:”2022-08-31 16:31:59″,”title_kr”:””,”content_kr”:”n”,”title_tr”:””,”content_tr”:”n”}},{“id”:3668,”post_id”:92527,”title”:”What is self-sovereign identity?”,”content”:”

Self-sovereign identity is a concept that refers to the use of distributed databases to manage PII.

nn

The notion of self-sovereign identity (SSI) is core to the idea of decentralized identity. Instead of having a set of identities across multiple platforms or a single identity managed by a third party, SII users have digital wallets in which various credentials are stored and accessible through reliable applications.

nn

Experts distinguish three main components known as the three pillars of SSI: blockchain, verifiable credentials (VCs) and decentralized identifiers (DIDs).

nn

Three pillars of self-sovereign identity (SSI)

nn

Blockchain is a decentralized digital database, a ledger of transactions duplicated and distributed among network computers that record information in a way that makes it difficult or impossible to change, hack or cheat.

nn

Second, there are VCs referred to as tamper-proof cryptographically-secured and verified credentials that implement SSI and protect users’ data. They can represent information found in paper credentials, such as a passport or license and digital credentials with no physical equivalent, such as, for instance, ownership of a bank account.

nn

And last but not least, SSI includes DIDs, a new type of identifier that enables users to have a cryptographically verifiable, decentralized digital identity. A DID refers to any subject like a person, organization, data model, abstract entity, et cetera, as determined by the controller of the DID. They are created by the user, owned by the user and independent of any organization. Designed to be decoupled from centralized registries, identity providers and certificate authorities, DIDs enable users to prove control over their digital identity without requiring permission from any third party.

nn

Alongside SII, which is rooted in blockchain, DIDs and VCs, decentralized identity architecture also embraces four more elements. They are a holder who creates a DID and receives the verifiable credential, an issuer that signs a verifiable credential with their private key and issues it to the holder, and a verifier that checks the credentials and can read the issuer’s public DID on the blockchain. Moreover, a decentralized identity architecture encompasses special decentralized identity wallets that fuel the whole system.

nn

How decentralized identity works

nn

The basis for decentralized identity management is the use of decentralized encrypted blockchain-based wallets.

nn

In a decentralized identity framework, users utilize decentralized identity wallets — special apps that allow them to create their decentralized identifiers, store their PII and manage their VCs —instead of keeping identity information on numerous websites controlled by intermediaries.

nn

Besides distributed architecture, these decentralized identity wallets are encrypted. Passwords to access them are replaced by non-phishable cryptographic keys that do not represent a single weakness in the case of a breach. A decentralized wallet generates a pair of cryptographic keys: public and private. The public key distinguishes a concrete wallet, while the private one, which is stored in the wallet, is needed during the authentication process.

nn

While decentralized identity wallets transparently authenticate users, they also protect users’ communications and data. Decentralized apps (DApps) store PII, verified identity details and the information needed to establish trust, prove eligibility or just complete a transaction. These wallets help users give and revoke access to identity information from a single source, making it faster and easier.

nn

On top of that, this information in the wallet is signed by multiple trusted parties to prove its accuracy. For example, digital identities can get approval from issuers such as universities, employers, or government structures. Using a decentralized identity wallet, users can present proof of their identity to any third party.

nnn”,”created_at”:”2022-08-31 16:27:27″,”updated_at”:”2022-08-31 16:31:58″,”sort”:3,”translations”:{“id”:3661,”explained_post_id”:3668,”title_en”:”What is self-sovereign identity?”,”content_en”:”

Self-sovereign identity is a concept that refers to the use of distributed databases to manage PII.

nn

The notion of self-sovereign identity (SSI) is core to the idea of decentralized identity. Instead of having a set of identities across multiple platforms or a single identity managed by a third party, SII users have digital wallets in which various credentials are stored and accessible through reliable applications.

nn

Experts distinguish three main components known as the three pillars of SSI: blockchain, verifiable credentials (VCs) and decentralized identifiers (DIDs).

nn

Three pillars of self-sovereign identity (SSI)

nn

Blockchain is a decentralized digital database, a ledger of transactions duplicated and distributed among network computers that record information in a way that makes it difficult or impossible to change, hack or cheat.

nn

Second, there are VCs referred to as tamper-proof cryptographically-secured and verified credentials that implement SSI and protect users’ data. They can represent information found in paper credentials, such as a passport or license and digital credentials with no physical equivalent, such as, for instance, ownership of a bank account.

nn

And last but not least, SSI includes DIDs, a new type of identifier that enables users to have a cryptographically verifiable, decentralized digital identity. A DID refers to any subject like a person, organization, data model, abstract entity, et cetera, as determined by the controller of the DID. They are created by the user, owned by the user and independent of any organization. Designed to be decoupled from centralized registries, identity providers and certificate authorities, DIDs enable users to prove control over their digital identity without requiring permission from any third party.

nn

Alongside SII, which is rooted in blockchain, DIDs and VCs, decentralized identity architecture also embraces four more elements. They are a holder who creates a DID and receives the verifiable credential, an issuer that signs a verifiable credential with their private key and issues it to the holder, and a verifier that checks the credentials and can read the issuer’s public DID on the blockchain. Moreover, a decentralized identity architecture encompasses special decentralized identity wallets that fuel the whole system.

nn

How decentralized identity works

nn

The basis for decentralized identity management is the use of decentralized encrypted blockchain-based wallets.

nn

In a decentralized identity framework, users utilize decentralized identity wallets — special apps that allow them to create their decentralized identifiers, store their PII and manage their VCs —instead of keeping identity information on numerous websites controlled by intermediaries.

nn

Besides distributed architecture, these decentralized identity wallets are encrypted. Passwords to access them are replaced by non-phishable cryptographic keys that do not represent a single weakness in the case of a breach. A decentralized wallet generates a pair of cryptographic keys: public and private. The public key distinguishes a concrete wallet, while the private one, which is stored in the wallet, is needed during the authentication process.

nn

While decentralized identity wallets transparently authenticate users, they also protect users’ communications and data. Decentralized apps (DApps) store PII, verified identity details and the information needed to establish trust, prove eligibility or just complete a transaction. These wallets help users give and revoke access to identity information from a single source, making it faster and easier.

nn

On top of that, this information in the wallet is signed by multiple trusted parties to prove its accuracy. For example, digital identities can get approval from issuers such as universities, employers, or government structures. Using a decentralized identity wallet, users can present proof of their identity to any third party.

nnn”,”title_es”:””,”content_es”:”n”,”title_cn”:””,”content_cn”:”n”,”title_de”:””,”content_de”:”n”,”title_fr”:””,”content_fr”:”n”,”title_it”:””,”content_it”:”n”,”title_ar”:””,”content_ar”:”n”,”title_br”:””,”content_br”:”n”,”title_jp”:””,”content_jp”:”n”,”created_at”:”2022-08-31 16:27:27″,”updated_at”:”2022-08-31 16:31:58″,”title_kr”:””,”content_kr”:”n”,”title_tr”:””,”content_tr”:”n”}},{“id”:3669,”post_id”:92527,”title”:”The pros and cons of decentralized identity”,”content”:”

The four main benefits of decentralized identity management include control, security, privacy and ease of use. However, the main concerns are a low level of adoption, the lack of regulation and interoperability.

nn

Control gives identity owners and digital devices power over their digital identifiers. Because users have complete control and ownership of their identities and credentials, they can decide which information they want to reveal and can prove their claims without depending on any other party.

nn

Security reduces attack surfaces by storing PII. Blockchain is an encrypted decentralized storage system that is safe, flexible and impenetrable by design, reducing the risk of an attacker gaining unauthorized access to steal or monetize user data.

nn

Decentralized identity management also helps organizations reduce security risks. Based on how organizations collect, process and store users’ data, they are subject to regulations. Organizations face sanctions and fines even for unintentional rule violations or data breaches. With decentralized identity management, they have an opportunity to collect and store less identity data, simplifying their compliance responsibilities and reducing the risks of cyberattacks and information being misused.

nn

Privacy enables entities to use the principle of least privilege (PoLP) to designate minimal or selective access for identity credentials. PoLP is a term correlated with information security. It states that any person, gadget or process should only have the minimal rights necessary to execute the considered task.

nn

And last but not least, decentralized identity technology gives users the advantage of easily creating and managing their identities with user-friendly neoteric decentralized identity apps and platforms.

nn

As for flaws and drawbacks, there are a bunch of them, primarily — adoption. Governments and organizations are still attempting to figure out how to deploy the decentralized identity technology at scale, while most non-tech users have not even heard of this phenomenon.

nn

Overcoming the legacy systems and regulations and creating interoperable global standards and governance are also important issues. While a secondary issue, identity data fragility, which refers to duplication, confusion, and inaccuracy in identity management, remains.

nnn”,”created_at”:”2022-08-31 16:28:30″,”updated_at”:”2022-08-31 16:31:58″,”sort”:4,”translations”:{“id”:3662,”explained_post_id”:3669,”title_en”:”The pros and cons of decentralized identity”,”content_en”:”

The four main benefits of decentralized identity management include control, security, privacy and ease of use. However, the main concerns are a low level of adoption, the lack of regulation and interoperability.

nn

Control gives identity owners and digital devices power over their digital identifiers. Because users have complete control and ownership of their identities and credentials, they can decide which information they want to reveal and can prove their claims without depending on any other party.

nn

Security reduces attack surfaces by storing PII. Blockchain is an encrypted decentralized storage system that is safe, flexible and impenetrable by design, reducing the risk of an attacker gaining unauthorized access to steal or monetize user data.

nn

Decentralized identity management also helps organizations reduce security risks. Based on how organizations collect, process and store users’ data, they are subject to regulations. Organizations face sanctions and fines even for unintentional rule violations or data breaches. With decentralized identity management, they have an opportunity to collect and store less identity data, simplifying their compliance responsibilities and reducing the risks of cyberattacks and information being misused.

nn

Privacy enables entities to use the principle of least privilege (PoLP) to designate minimal or selective access for identity credentials. PoLP is a term correlated with information security. It states that any person, gadget or process should only have the minimal rights necessary to execute the considered task.

nn

And last but not least, decentralized identity technology gives users the advantage of easily creating and managing their identities with user-friendly neoteric decentralized identity apps and platforms.

nn

As for flaws and drawbacks, there are a bunch of them, primarily — adoption. Governments and organizations are still attempting to figure out how to deploy the decentralized identity technology at scale, while most non-tech users have not even heard of this phenomenon.

nn

Overcoming the legacy systems and regulations and creating interoperable global standards and governance are also important issues. While a secondary issue, identity data fragility, which refers to duplication, confusion, and inaccuracy in identity management, remains.

nnn”,”title_es”:””,”content_es”:”n”,”title_cn”:””,”content_cn”:”n”,”title_de”:””,”content_de”:”n”,”title_fr”:””,”content_fr”:”n”,”title_it”:””,”content_it”:”n”,”title_ar”:””,”content_ar”:”n”,”title_br”:””,”content_br”:”n”,”title_jp”:””,”content_jp”:”n”,”created_at”:”2022-08-31 16:28:30″,”updated_at”:”2022-08-31 16:31:58″,”title_kr”:””,”content_kr”:”n”,”title_tr”:””,”content_tr”:”n”}},{“id”:3670,”post_id”:92527,”title”:”Decentralized identity protocols”,”content”:”

Several identity protocols, from crypto startups to big tech solutions, deal with decentralized identification, and each has its specifics and features.

nn

Though the decentralized identity technology is fairly new, initiatives and players in the decentralized identity space, software for implementing decentralized identity wallets and supporting services are plentiful. They range from the Hyperledger open-source developing community, through a range of decentralized identity protocols and startups, to some of the biggest names in the industry.

nn

Decentralized identity protocols and private identity stores such as uPort or 3Box are called identity hubs. Recently, the Ethereum-based uPort platform split into two new projects: Veramo, an open source framework for identifiers and credentials, and Serto – both of which carry on the mission of decentralizing the internet. 3Box Labs, in turn, went headlong into the development of Ceramic Network, a decentralized data network that brings unlimited data composability to Web3 apps, and Identity Index (IDX), a cross-chain protocol for decentralized identity and interoperable data.

nn

Other DID platforms are ION, an open public layer-2 decentralized identity network that runs atop the Bitcoin (BTC) blockchain based on the purely deterministic Sidetree protocol. The notable Polkadot (DOT) ecosystem player Dock protocol enables everyone to issue and build solutions for decentralized identity and verifiable credentials that are instantly verifiable using blockchain. The Sovrin Network is an open-source, decentralized, public identity network metasystem to create, manage and control self-sovereign digital identity. ORE ID is the universal authentication and authorization platform for blockchain that functions cross-chain.

nn

Connecting blockchain with crypto-biometrics, the Humanode project enables liveness detection checks that help identify real and unique human beings while accessing wallets and platforms and provide Sybil-resistance to any decentralized identity network.

nn

Moreover, in the background, many vendors that provide decentralized identity wallets or help organizations incorporate the technology into their apps are members of the Decentralized Identity Foundation and the Trust Over IP Foundation. The World Wide Web Consortium provides standards for identity technologies and interoperability via the W3C-DID and VC projects. These organizations are working tirelessly to standardize and shape decentralized identity.

nn

The future of decentralized identity

nn

The decentralized identity space is still in its infancy; however, it is clear that it has the potential to change existing identity management for the better.

nn

The world moves more toward Web3, the next evolution of the internet. Through decentralization and blockchain technology, an increasing number of people are taking back control of their data.

nn

The digital identity space is still in its inception; however, from all the above discussion, it is obvious that decentralized identity with blockchain has the potential to make identity management decentralized, simplified and seamless, completely transforming the landscape.

nn

While startups and DID initiatives continue to develop proofs of concepts for decentralized identity in government, finance, healthcare and other fields, the opportunities for decentralized identity continue to grow.

nn

Overall, the goal is to make users feel more empowered online and build up and share a verifiable reputation and proof of existence. Analysts predict that one of the latest hottest trends in the tech industry — the Metaverse — may become a key initiator for decentralized identity spread.

nn

With the advancement of avatars in the form of nonfungible tokens serving as users’ digital identities within virtual spaces, soulbound tokens, blockchain, biometrics and related cutting-edge technologies, decentralized identity will soon reach the masses in the flourishing Web3 ecosystem, which will boom in the coming years.

nn

Purchase a licence for this article. Powered by SharpShark.

nnn”,”created_at”:”2022-08-31 16:29:46″,”updated_at”:”2022-08-31 16:31:58″,”sort”:5,”translations”:{“id”:3663,”explained_post_id”:3670,”title_en”:”Decentralized identity protocols”,”content_en”:”

Several identity protocols, from crypto startups to big tech solutions, deal with decentralized identification, and each has its specifics and features.

nn

Though the decentralized identity technology is fairly new, initiatives and players in the decentralized identity space, software for implementing decentralized identity wallets and supporting services are plentiful. They range from the Hyperledger open-source developing community, through a range of decentralized identity protocols and startups, to some of the biggest names in the industry.

nn

Decentralized identity protocols and private identity stores such as uPort or 3Box are called identity hubs. Recently, the Ethereum-based uPort platform split into two new projects: Veramo, an open source framework for identifiers and credentials, and Serto – both of which carry on the mission of decentralizing the internet. 3Box Labs, in turn, went headlong into the development of Ceramic Network, a decentralized data network that brings unlimited data composability to Web3 apps, and Identity Index (IDX), a cross-chain protocol for decentralized identity and interoperable data.

nn

Other DID platforms are ION, an open public layer-2 decentralized identity network that runs atop the Bitcoin (BTC) blockchain based on the purely deterministic Sidetree protocol. The notable Polkadot (DOT) ecosystem player Dock protocol enables everyone to issue and build solutions for decentralized identity and verifiable credentials that are instantly verifiable using blockchain. The Sovrin Network is an open-source, decentralized, public identity network metasystem to create, manage and control self-sovereign digital identity. ORE ID is the universal authentication and authorization platform for blockchain that functions cross-chain.

nn

Connecting blockchain with crypto-biometrics, the Humanode project enables liveness detection checks that help identify real and unique human beings while accessing wallets and platforms and provide Sybil-resistance to any decentralized identity network.

nn

Moreover, in the background, many vendors that provide decentralized identity wallets or help organizations incorporate the technology into their apps are members of the Decentralized Identity Foundation and the Trust Over IP Foundation. The World Wide Web Consortium provides standards for identity technologies and interoperability via the W3C-DID and VC projects. These organizations are working tirelessly to standardize and shape decentralized identity.

nn

The future of decentralized identity

nn

The decentralized identity space is still in its infancy; however, it is clear that it has the potential to change existing identity management for the better.

nn

The world moves more toward Web3, the next evolution of the internet. Through decentralization and blockchain technology, an increasing number of people are taking back control of their data.

nn

The digital identity space is still in its inception; however, from all the above discussion, it is obvious that decentralized identity with blockchain has the potential to make identity management decentralized, simplified and seamless, completely transforming the landscape.

nn

While startups and DID initiatives continue to develop proofs of concepts for decentralized identity in government, finance, healthcare and other fields, the opportunities for decentralized identity continue to grow.

nn

Overall, the goal is to make users feel more empowered online and build up and share a verifiable reputation and proof of existence. Analysts predict that one of the latest hottest trends in the tech industry — the Metaverse — may become a key initiator for decentralized identity spread.

nn

With the advancement of avatars in the form of nonfungible tokens serving as users’ digital identities within virtual spaces, soulbound tokens, blockchain, biometrics and related cutting-edge technologies, decentralized identity will soon reach the masses in the flourishing Web3 ecosystem, which will boom in the coming years.

nn

Purchase a licence for this article. Powered by SharpShark.

nnn”,”title_es”:””,”content_es”:”n”,”title_cn”:””,”content_cn”:”n”,”title_de”:””,”content_de”:”n”,”title_fr”:””,”content_fr”:”n”,”title_it”:””,”content_it”:”n”,”title_ar”:””,”content_ar”:”n”,”title_br”:””,”content_br”:”n”,”title_jp”:””,”content_jp”:”n”,”created_at”:”2022-08-31 16:29:46″,”updated_at”:”2022-08-31 16:31:58″,”title_kr”:””,”content_kr”:”n”,”title_tr”:””,”content_tr”:”n”}}],”is_partner_material”:false,”commentsSection”:{“schemaEntityUrl”:”//cointelegraph.com/explained/what-is-decentralized-identity-in-blockchain”,”list”:[],”amount”:0,”i18n”:{“addComment”:”Add a comment…”,”amountOnePostfix”:”Comment”,”amountPostfix”:”Comments”,”cancel”:”Cancel”,”delete”:”Delete”,”edit”:”Edit”,”errorBig”:”Comment text cannot be longer than 2000 characters”,”errorDuplicate”:”Duplicate comment”,”errorSmall”:”Comment text must be at least 2 characters long”,”hideButton”:”Hide comments”,”noComments”:” “,”commentOnModeration”:”Comment on moderation”,”postComment”:”Post”,”reply”:”Reply”,”showAllComments”:”Show All Comments”,”showButtonPostfix”:”comments”,”showButtonPrefix”:”Show”,”signIn”:”Sign in”,”update”:”Update comment”,”commentWasDeleted”:”This comment has been deleted”}},”related”:[{“id”:80245,”retina”:”https://images.cointelegraph.com/images/1480_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9hZWQxNWVlY2QwMTExNGMzYmNjZjA1MmZiYjA4MjEyOS5KUEc=.jpg”,”img”:”https://images.cointelegraph.com/images/740_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9hZWQxNWVlY2QwMTExNGMzYmNjZjA1MmZiYjA4MjEyOS5KUEc=.jpg”,”thumb”:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9hZWQxNWVlY2QwMTExNGMzYmNjZjA1MmZiYjA4MjEyOS5KUEc=.jpg”,”thumb370″:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9hZWQxNWVlY2QwMTExNGMzYmNjZjA1MmZiYjA4MjEyOS5KUEc=.jpg”,”amp_thumb”:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9hZWQxNWVlY2QwMTExNGMzYmNjZjA1MmZiYjA4MjEyOS5KUEc=.jpg”,”thumb150″:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9hZWQxNWVlY2QwMTExNGMzYmNjZjA1MmZiYjA4MjEyOS5KUEc=.jpg”,”url”:”https://cointelegraph.com/explained/the-biggest-crypto-heists-of-all-time”,”title”:”The biggest crypto heists of all time”,”lead”:” Crypto exchanges are hacked surprisingly often. A few of the biggest crypto heists that occurred in the past few years are discussed in …”,”leadfull”:””,”category_id”:65,”category_url”:”https://cointelegraph.com/explained”,”category_title”:”Explained”,”author_url”:”https://cointelegraph.com/authors/guest-author”,”author_hash”:”aHR0cHM6Ly9jb2ludGVsZWdyYXBoLmNvbS9hdXRob3JzL2d1ZXN0LWF1dGhvcg==”,”author_title”:” Guest Author “,”author_img”:”https://cointelegraph.com/assets/img/icons/author_male.jpg”,”date”:”JAN 28, 2022″,”flash_date”:”JAN 28, 2022″,”sponsored”:false,”press_release”:false,”sponsored_label”:”Sponsored”,”explained”:true,”badge”:{“title”:”Explained”,”label”:”default”},”published”:{“date”:”2022-01-28 23:00:00.000000″,”timezone_type”:3,”timezone”:”Europe/London”},”stat_uniqs”:0,”rss_date”:”Fri, 28 Jan 2022 23:00:00 +0000″,”publishedW3″:”2022-01-28T23:00:00+00:00″,”show_referral”:false,”isMagazine”:false},{“id”:91426,”retina”:”https://images.cointelegraph.com/images/1480_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy80ZTUyOTM5YTA3ZDliZDZmMGFjMWY5YTg2ZjI3YWM5ZS5qcGc=.jpg”,”img”:”https://images.cointelegraph.com/images/740_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy80ZTUyOTM5YTA3ZDliZDZmMGFjMWY5YTg2ZjI3YWM5ZS5qcGc=.jpg”,”thumb”:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy80ZTUyOTM5YTA3ZDliZDZmMGFjMWY5YTg2ZjI3YWM5ZS5qcGc=.jpg”,”thumb370″:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy80ZTUyOTM5YTA3ZDliZDZmMGFjMWY5YTg2ZjI3YWM5ZS5qcGc=.jpg”,”amp_thumb”:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy80ZTUyOTM5YTA3ZDliZDZmMGFjMWY5YTg2ZjI3YWM5ZS5qcGc=.jpg”,”thumb150″:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy80ZTUyOTM5YTA3ZDliZDZmMGFjMWY5YTg2ZjI3YWM5ZS5qcGc=.jpg”,”url”:”https://cointelegraph.com/explained/nfts-and-intellectual-property-explained”,”title”:”NFTs and intellectual property, explained”,”lead”:”When you buy a nonfungible token, do you automatically get intellectual property rights? Well… it’s complicated.”,”leadfull”:””,”category_id”:65,”category_url”:”https://cointelegraph.com/explained”,”category_title”:”Explained”,”author_url”:”https://cointelegraph.com/authors/chris-jones”,”author_hash”:”aHR0cHM6Ly9jb2ludGVsZWdyYXBoLmNvbS9hdXRob3JzL2NocmlzLWpvbmVz”,”author_title”:”Chris Jones”,”author_img”:”https://cointelegraph.com/assets/img/icons/author_male.jpg”,”date”:”AUG 11, 2022″,”flash_date”:”AUG 11, 2022″,”sponsored”:false,”press_release”:false,”sponsored_label”:”Sponsored”,”explained”:true,”badge”:{“title”:”Explained”,”label”:”default”},”published”:{“date”:”2022-08-11 10:00:00.000000″,”timezone_type”:3,”timezone”:”Europe/London”},”stat_uniqs”:51,”rss_date”:”Thu, 11 Aug 2022 10:00:00 +0100″,”publishedW3″:”2022-08-11T10:00:00+01:00″,”show_referral”:false,”isMagazine”:false},{“id”:91467,”retina”:”https://images.cointelegraph.com/images/1480_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvNzgzOTVlOTEtMmM2ZC00MjMzLWE4NWYtZDZjYTZjNWExNTAyLmpwZw==.jpg”,”img”:”https://images.cointelegraph.com/images/740_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvNzgzOTVlOTEtMmM2ZC00MjMzLWE4NWYtZDZjYTZjNWExNTAyLmpwZw==.jpg”,”thumb”:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvNzgzOTVlOTEtMmM2ZC00MjMzLWE4NWYtZDZjYTZjNWExNTAyLmpwZw==.jpg”,”thumb370″:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvNzgzOTVlOTEtMmM2ZC00MjMzLWE4NWYtZDZjYTZjNWExNTAyLmpwZw==.jpg”,”amp_thumb”:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvNzgzOTVlOTEtMmM2ZC00MjMzLWE4NWYtZDZjYTZjNWExNTAyLmpwZw==.jpg”,”thumb150″:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvNzgzOTVlOTEtMmM2ZC00MjMzLWE4NWYtZDZjYTZjNWExNTAyLmpwZw==.jpg”,”url”:”https://cointelegraph.com/news/reinventing-yourself-in-the-metaverse-through-digital-identity”,”title”:”Reinventing yourself in the Metaverse through digital identity “,”lead”:”Metaverse users can reinvent themselves with a digital identity built upon avatars and digital assets, but there are challenges to consider.”,”leadfull”:””,”category_id”:19,”category_url”:”https://cointelegraph.com/category/analysis”,”category_title”:”Analysis”,”author_url”:”https://cointelegraph.com/authors/rachel-wolfson”,”author_hash”:”aHR0cHM6Ly9jb2ludGVsZWdyYXBoLmNvbS9hdXRob3JzL3JhY2hlbC13b2xmc29u”,”author_title”:”Rachel Wolfson”,”author_img”:”https://images.cointelegraph.com/images/32_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy81OGI2YmIyMjI0MGRjOGI5M2UxYTUxYzMzZTMzNjY2Mi5qcGc=.jpg”,”date”:”AUG 11, 2022″,”flash_date”:”AUG 11, 2022″,”sponsored”:false,”press_release”:false,”sponsored_label”:”Sponsored”,”explained”:false,”badge”:{“title”:”Analysis”,”label”:”info”},”published”:{“date”:”2022-08-11 16:50:00.000000″,”timezone_type”:3,”timezone”:”Europe/London”},”stat_uniqs”:5804,”rss_date”:”Thu, 11 Aug 2022 16:50:00 +0100″,”publishedW3″:”2022-08-11T16:50:00+01:00″,”show_referral”:true,”isMagazine”:false},{“id”:91692,”retina”:”https://images.cointelegraph.com/images/1480_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvOGY1ZDUxMTgtM2Y0NC00MjZiLTg2OWQtMzUwMTY0YjZlMzI0LmpwZw==.jpg”,”img”:”https://images.cointelegraph.com/images/740_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvOGY1ZDUxMTgtM2Y0NC00MjZiLTg2OWQtMzUwMTY0YjZlMzI0LmpwZw==.jpg”,”thumb”:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvOGY1ZDUxMTgtM2Y0NC00MjZiLTg2OWQtMzUwMTY0YjZlMzI0LmpwZw==.jpg”,”thumb370″:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvOGY1ZDUxMTgtM2Y0NC00MjZiLTg2OWQtMzUwMTY0YjZlMzI0LmpwZw==.jpg”,”amp_thumb”:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvOGY1ZDUxMTgtM2Y0NC00MjZiLTg2OWQtMzUwMTY0YjZlMzI0LmpwZw==.jpg”,”thumb150″:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvOGY1ZDUxMTgtM2Y0NC00MjZiLTg2OWQtMzUwMTY0YjZlMzI0LmpwZw==.jpg”,”url”:”https://cointelegraph.com/news/organizations-look-toward-multiparty-computation-to-advance-web3″,”title”:”Organizations look toward multiparty computation to advance Web3″,”lead”:”Multiparty computation is being leveraged to ensure private key security and decentralization within Web3 platforms. But why use it?”,”leadfull”:””,”category_id”:19,”category_url”:”https://cointelegraph.com/category/analysis”,”category_title”:”Analysis”,”author_url”:”https://cointelegraph.com/authors/rachel-wolfson”,”author_hash”:”aHR0cHM6Ly9jb2ludGVsZWdyYXBoLmNvbS9hdXRob3JzL3JhY2hlbC13b2xmc29u”,”author_title”:”Rachel Wolfson”,”author_img”:”https://images.cointelegraph.com/images/32_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy81OGI2YmIyMjI0MGRjOGI5M2UxYTUxYzMzZTMzNjY2Mi5qcGc=.jpg”,”date”:”AUG 16, 2022″,”flash_date”:”AUG 16, 2022″,”sponsored”:false,”press_release”:false,”sponsored_label”:”Sponsored”,”explained”:false,”badge”:{“title”:”Analysis”,”label”:”info”},”published”:{“date”:”2022-08-16 15:47:00.000000″,”timezone_type”:3,”timezone”:”Europe/London”},”stat_uniqs”:2333,”rss_date”:”Tue, 16 Aug 2022 15:47:00 +0100″,”publishedW3″:”2022-08-16T15:47:00+01:00″,”show_referral”:true,”isMagazine”:false},{“id”:91935,”retina”:”https://images.cointelegraph.com/images/1480_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvMDA5ZTkxOWEtMzIxOC00OTQ5LTgzNzUtYzRkYTViODdkYmIxLmpwZw==.jpg”,”img”:”https://images.cointelegraph.com/images/740_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvMDA5ZTkxOWEtMzIxOC00OTQ5LTgzNzUtYzRkYTViODdkYmIxLmpwZw==.jpg”,”thumb”:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvMDA5ZTkxOWEtMzIxOC00OTQ5LTgzNzUtYzRkYTViODdkYmIxLmpwZw==.jpg”,”thumb370″:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvMDA5ZTkxOWEtMzIxOC00OTQ5LTgzNzUtYzRkYTViODdkYmIxLmpwZw==.jpg”,”amp_thumb”:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvMDA5ZTkxOWEtMzIxOC00OTQ5LTgzNzUtYzRkYTViODdkYmIxLmpwZw==.jpg”,”thumb150″:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvMDA5ZTkxOWEtMzIxOC00OTQ5LTgzNzUtYzRkYTViODdkYmIxLmpwZw==.jpg”,”url”:”https://cointelegraph.com/news/crypto-unicorns-founder-says-p2e-gaming-is-in-a-long-maturation-phase”,”title”:”Crypto Unicorns founder says P2E gaming is in a long ‘maturation phase’ “,”lead”:”Crypto Unicorns founder Aron Beierschmitt chats with NFT Steez about the key components blockchain-games need to build sustainable in-game play-and-earn economi…”,”leadfull”:””,”category_id”:86,”category_url”:”https://cointelegraph.com/category/interview”,”category_title”:”Interview”,”author_url”:”https://cointelegraph.com/authors/alyssa-exposito”,”author_hash”:”aHR0cHM6Ly9jb2ludGVsZWdyYXBoLmNvbS9hdXRob3JzL2FseXNzYS1leHBvc2l0bw==”,”author_title”:”Alyssa Exposito”,”author_img”:”https://images.cointelegraph.com/images/32_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9iMTBhYmU4NjAzM2NkZDkyMjE3ZTJkZDdiNDQxMzIyNi5qcGc=.jpg”,”date”:”AUG 19, 2022″,”flash_date”:”AUG 19, 2022″,”sponsored”:false,”press_release”:false,”sponsored_label”:”Sponsored”,”explained”:false,”badge”:{“title”:”Markets News”,”label”:”default”},”published”:{“date”:”2022-08-19 21:02:26.000000″,”timezone_type”:3,”timezone”:”Europe/London”},”stat_uniqs”:2069,”rss_date”:”Fri, 19 Aug 2022 21:02:26 +0100″,”publishedW3″:”2022-08-19T21:02:26+01:00″,”show_referral”:true,”isMagazine”:false},{“id”:91948,”retina”:”https://images.cointelegraph.com/images/1480_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvYzhkMzA3NzctMzA0My00YTM2LTgxNzAtNjY1MGMxOGI3NzU1LmpwZw==.jpg”,”img”:”https://images.cointelegraph.com/images/740_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvYzhkMzA3NzctMzA0My00YTM2LTgxNzAtNjY1MGMxOGI3NzU1LmpwZw==.jpg”,”thumb”:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvYzhkMzA3NzctMzA0My00YTM2LTgxNzAtNjY1MGMxOGI3NzU1LmpwZw==.jpg”,”thumb370″:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvYzhkMzA3NzctMzA0My00YTM2LTgxNzAtNjY1MGMxOGI3NzU1LmpwZw==.jpg”,”amp_thumb”:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvYzhkMzA3NzctMzA0My00YTM2LTgxNzAtNjY1MGMxOGI3NzU1LmpwZw==.jpg”,”thumb150″:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvYzhkMzA3NzctMzA0My00YTM2LTgxNzAtNjY1MGMxOGI3NzU1LmpwZw==.jpg”,”url”:”https://cointelegraph.com/news/web3-games-incorporate-features-to-drive-female-participation”,”title”:”Web3 games incorporate features to drive female participation”,”lead”:”Web3 games are focusing on community building, aesthetics, customization and representation to attract female users — but is this enough? “,”leadfull”:””,”category_id”:19,”category_url”:”https://cointelegraph.com/category/analysis”,”category_title”:”Analysis”,”author_url”:”https://cointelegraph.com/authors/rachel-wolfson”,”author_hash”:”aHR0cHM6Ly9jb2ludGVsZWdyYXBoLmNvbS9hdXRob3JzL3JhY2hlbC13b2xmc29u”,”author_title”:”Rachel Wolfson”,”author_img”:”https://images.cointelegraph.com/images/32_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy81OGI2YmIyMjI0MGRjOGI5M2UxYTUxYzMzZTMzNjY2Mi5qcGc=.jpg”,”date”:”AUG 20, 2022″,”flash_date”:”AUG 20, 2022″,”sponsored”:false,”press_release”:false,”sponsored_label”:”Sponsored”,”explained”:false,”badge”:{“title”:”Analysis”,”label”:”info”},”published”:{“date”:”2022-08-20 15:45:00.000000″,”timezone_type”:3,”timezone”:”Europe/London”},”stat_uniqs”:3915,”rss_date”:”Sat, 20 Aug 2022 15:45:00 +0100″,”publishedW3″:”2022-08-20T15:45:00+01:00″,”show_referral”:true,”isMagazine”:false}]}” :shares='{“facebook”:{“url”:”https://www.facebook.com/sharer/sharer.php?u=%URL%”,”icon”:”facebook”,”title”:”Facebook”,”sizesAllowed”:[{“size”:”lg”,”label”:”Large devices”,”breakpoint”:”> 1200px”},{“size”:”md”,”label”:”Medium devices”,”breakpoint”:”> 992px”},{“size”:”sm”,”label”:”Small tablets”,”breakpoint”:”> 768px”},{“size”:”xs”,”label”:”Smartphones”,”breakpoint”:”> 480px”},{“size”:”xxs”,”label”:”Extra small devices”,”breakpoint”:”< 480px"}],"position":1,"status":true},"twitter":{"url":"https://twitter.com/intent/tweet?text=%TEXT%","icon":"twitter","title":"Twitter","position":2,"status":true,"sizesAllowed":[{"size":"xxs","label":"Extra small devices","breakpoint":"< 480px"},{"size":"xs","label":"Smartphones","breakpoint":"> 480px”},{“size”:”sm”,”label”:”Small tablets”,”breakpoint”:”> 768px”},{“size”:”md”,”label”:”Medium devices”,”breakpoint”:”> 992px”},{“size”:”lg”,”label”:”Large devices”,”breakpoint”:”> 1200px”}]},”telegram”:{“url”:”https://t.me/share/url?url=%URL%&text=%TEXT%”,”icon”:”telegram”,”title”:”Telegram”,”position”:3,”status”:true,”sizesAllowed”:[{“size”:”xxs”,”label”:”Extra small devices”,”breakpoint”:”< 480px"},{"size":"xs","label":"Smartphones","breakpoint":"> 480px”},{“size”:”sm”,”label”:”Small tablets”,”breakpoint”:”> 768px”},{“size”:”md”,”label”:”Medium devices”,”breakpoint”:”> 992px”},{“size”:”lg”,”label”:”Large devices”,”breakpoint”:”> 1200px”}]},”linkedin”:{“url”:”https://www.linkedin.com/shareArticle?mini=true&url=%URL%&title=%TITLE%”,”icon”:”linked-in”,”title”:”LinkedIn”,”position”:5,”status”:true,”sizesAllowed”:[{“size”:”xxs”,”label”:”Extra small devices”,”breakpoint”:”< 480px"},{"size":"xs","label":"Smartphones","breakpoint":"> 480px”},{“size”:”sm”,”label”:”Small tablets”,”breakpoint”:”> 768px”},{“size”:”md”,”label”:”Medium devices”,”breakpoint”:”> 992px”},{“size”:”lg”,”label”:”Large devices”,”breakpoint”:”> 1200px”}]},”copy”:{“url”:”%URL%”,”icon”:”copy”,”position”:7,”title”:”Copy Link”,”sizesAllowed”:[{“size”:”xxs”,”label”:”Extra small devices”,”breakpoint”:”< 480px"},{"size":"xs","label":"Smartphones","breakpoint":"> 480px”},{“size”:”sm”,”label”:”Small tablets”,”breakpoint”:”> 768px”},{“size”:”md”,”label”:”Medium devices”,”breakpoint”:”> 992px”},{“size”:”lg”,”label”:”Large devices”,”breakpoint”:”> 1200px”}],”status”:true},”whatsapp”:{“url”:”https://wa.me/?text=%TITLE% %URL%”,”icon”:”whats-app”,”title”:”Whatsapp”,”sizesAllowed”:[{“size”:”xxs”,”label”:”Extra small devices”,”breakpoint”:”< 480px"},{"size":"xs","label":"Smartphones","breakpoint":"> 480px”},{“size”:”sm”,”label”:”Small tablets”,”breakpoint”:”> 768px”},{“size”:”md”,”label”:”Medium devices”,”breakpoint”:”> 992px”},{“size”:”lg”,”label”:”Large devices”,”breakpoint”:”> 1200px”}],”position”:6,”status”:true},”reddit”:{“url”:”https://www.reddit.com/submit?url=%URL%&title=%TITLE%”,”icon”:”reddit”,”title”:”Reddit”,”sizesAllowed”:[{“size”:”xxs”,”label”:”Extra small devices”,”breakpoint”:”< 480px"},{"size":"xs","label":"Smartphones","breakpoint":"> 480px”},{“size”:”sm”,”label”:”Small tablets”,”breakpoint”:”> 768px”},{“size”:”md”,”label”:”Medium devices”,”breakpoint”:”> 992px”},{“size”:”lg”,”label”:”Large devices”,”breakpoint”:”> 1200px”}],”position”:4,”status”:true}}’ is=”ExplainedPostPage”>

A decentralized identity is a self-owned, independent identity that enables trusted data exchange.

Decentralized identity is an emerging Web3 concept based on a trust framework for identity management. Such decentralized identity management includes an approach to identity and access administration that allows people to generate, manage and control their personally identifiable information (PII) without a centralized third party like a registry, identity provider or certification authority.

Considered to be private and sensitive data, PII refers to the body of information about specific individuals that directly or indirectly identifies them. Usually, it combines name, age, address, biometrics, citizenship, employment, credit card accounts, credit history, et cetera. In addition to PII, information that forms a decentralized digital identity includes data from online electronic devices, such as usernames and passwords, search history, buying history and others.

With a decentralized identity, users can control their own PII and provide only the information that is required to be verified. Decentralized identity management supports an identity trust framework where users, organizations and things interact with each other transparently and securely.

A decentralized identity aims to give people official proof of identity and complete ownership and control over their identities in a secure and user-friendly way.

A verifiable proof of existence is often needed for citizens to access essential services like healthcare, banking and education. Unfortunately, according to Worldbank data, 1 billion people on our planet still do not have an official proof of identity. A considerable part of the population is in a precarious position, unable to vote, open a bank account, own property or find a job. The inability to obtain identification documents limits people’s freedom.

What’s more, traditional centralized identification systems are insecure, fragmented and exclusionary. Centralized identity databases are at risk as they often become prime targets for hackers. From time to time, we hear about hacks and attacks on centralized identity solutions in which thousands and millions of customer records are being stolen from major retailers.

The ownership issues remain as well. Users who have traditional forms of digital identity still don’t have complete ownership and control over them and are usually unaware of the value their data generates. In a centralized scenario, PII is stored and managed by others. Thus, it becomes more challenging, if not impossible, for users to claim ownership of their identities.

Decentralized digital identity addresses these issues by providing a way for digital identity to be used across multiple participating platforms without sacrificing security and the user’s experience. In a decentralized identity framework, users need only an internet connection and a device to access it.

Furthermore, in decentralized identity systems, distributed ledger technologies and blockchain, in particular, validate the existence of a legitimate identity. By providing a consistent, interoperable and tamper-proof architecture, blockchains enable the secure management and storage of PII, with significaant benefits for organizations, users, developers and Internet of Things (IoT) management systems.

Centralized identity vs. Decentralized identity

Self-sovereign identity is a concept that refers to the use of distributed databases to manage PII.

The notion of self-sovereign identity (SSI) is core to the idea of decentralized identity. Instead of having a set of identities across multiple platforms or a single identity managed by a third party, SII users have digital wallets in which various credentials are stored and accessible through reliable applications.

Experts distinguish three main components known as the three pillars of SSI: blockchain, verifiable credentials (VCs) and decentralized identifiers (DIDs).

Three pillars of self-sovereign identity (SSI)

Blockchain is a decentralized digital database, a ledger of transactions duplicated and distributed among network computers that record information in a way that makes it difficult or impossible to change, hack or cheat.

Second, there are VCs referred to as tamper-proof cryptographically-secured and verified credentials that implement SSI and protect users’ data. They can represent information found in paper credentials, such as a passport or license and digital credentials with no physical equivalent, such as, for instance, ownership of a bank account.

And last but not least, SSI includes DIDs, a new type of identifier that enables users to have a cryptographically verifiable, decentralized digital identity. A DID refers to any subject like a person, organization, data model, abstract entity, et cetera, as determined by the controller of the DID. They are created by the user, owned by the user and independent of any organization. Designed to be decoupled from centralized registries, identity providers and certificate authorities, DIDs enable users to prove control over their digital identity without requiring permission from any third party.

Alongside SII, which is rooted in blockchain, DIDs and VCs, decentralized identity architecture also embraces four more elements. They are a holder who creates a DID and receives the verifiable credential, an issuer that signs a verifiable credential with their private key and issues it to the holder, and a verifier that checks the credentials and can read the issuer’s public DID on the blockchain. Moreover, a decentralized identity architecture encompasses special decentralized identity wallets that fuel the whole system.

How decentralized identity works

The basis for decentralized identity management is the use of decentralized encrypted blockchain-based wallets.

In a decentralized identity framework, users utilize decentralized identity wallets — special apps that allow them to create their decentralized identifiers, store their PII and manage their VCs —instead of keeping identity information on numerous websites controlled by intermediaries.

Besides distributed architecture, these decentralized identity wallets are encrypted. Passwords to access them are replaced by non-phishable cryptographic keys that do not represent a single weakness in the case of a breach. A decentralized wallet generates a pair of cryptographic keys: public and private. The public key distinguishes a concrete wallet, while the private one, which is stored in the wallet, is needed during the authentication process.

While decentralized identity wallets transparently authenticate users, they also protect users’ communications and data. Decentralized apps (DApps) store PII, verified identity details and the information needed to establish trust, prove eligibility or just complete a transaction. These wallets help users give and revoke access to identity information from a single source, making it faster and easier.

On top of that, this information in the wallet is signed by multiple trusted parties to prove its accuracy. For example, digital identities can get approval from issuers such as universities, employers, or government structures. Using a decentralized identity wallet, users can present proof of their identity to any third party.

The four main benefits of decentralized identity management include control, security, privacy and ease of use. However, the main concerns are a low level of adoption, the lack of regulation and interoperability.

Control gives identity owners and digital devices power over their digital identifiers. Because users have complete control and ownership of their identities and credentials, they can decide which information they want to reveal and can prove their claims without depending on any other party.

Security reduces attack surfaces by storing PII. Blockchain is an encrypted decentralized storage system that is safe, flexible and impenetrable by design, reducing the risk of an attacker gaining unauthorized access to steal or monetize user data.

Decentralized identity management also helps organizations reduce security risks. Based on how organizations collect, process and store users’ data, they are subject to regulations. Organizations face sanctions and fines even for unintentional rule violations or data breaches. With decentralized identity management, they have an opportunity to collect and store less identity data, simplifying their compliance responsibilities and reducing the risks of cyberattacks and information being misused.

Privacy enables entities to use the principle of least privilege (PoLP) to designate minimal or selective access for identity credentials. PoLP is a term correlated with information security. It states that any person, gadget or process should only have the minimal rights necessary to execute the considered task.

And last but not least, decentralized identity technology gives users the advantage of easily creating and managing their identities with user-friendly neoteric decentralized identity apps and platforms.

As for flaws and drawbacks, there are a bunch of them, primarily — adoption. Governments and organizations are still attempting to figure out how to deploy the decentralized identity technology at scale, while most non-tech users have not even heard of this phenomenon.

Overcoming the legacy systems and regulations and creating interoperable global standards and governance are also important issues. While a secondary issue, identity data fragility, which refers to duplication, confusion, and inaccuracy in identity management, remains.

Several identity protocols, from crypto startups to big tech solutions, deal with decentralized identification, and each has its specifics and features.

Though the decentralized identity technology is fairly new, initiatives and players in the decentralized identity space, software for implementing decentralized identity wallets and supporting services are plentiful. They range from the Hyperledger open-source developing community, through a range of decentralized identity protocols and startups, to some of the biggest names in the industry.

Decentralized identity protocols and private identity stores such as uPort or 3Box are called identity hubs. Recently, the Ethereum-based uPort platform split into two new projects: Veramo, an open source framework for identifiers and credentials, and Serto – both of which carry on the mission of decentralizing the internet. 3Box Labs, in turn, went headlong into the development of Ceramic Network, a decentralized data network that brings unlimited data composability to Web3 apps, and Identity Index (IDX), a cross-chain protocol for decentralized identity and interoperable data.

Other DID platforms are ION, an open public layer-2 decentralized identity network that runs atop the Bitcoin (BTC) blockchain based on the purely deterministic Sidetree protocol. The notable Polkadot (DOT) ecosystem player Dock protocol enables everyone to issue and build solutions for decentralized identity and verifiable credentials that are instantly verifiable using blockchain. The Sovrin Network is an open-source, decentralized, public identity network metasystem to create, manage and control self-sovereign digital identity. ORE ID is the universal authentication and authorization platform for blockchain that functions cross-chain.

Connecting blockchain with crypto-biometrics, the Humanode project enables liveness detection checks that help identify real and unique human beings while accessing wallets and platforms and provide Sybil-resistance to any decentralized identity network.

Moreover, in the background, many vendors that provide decentralized identity wallets or help organizations incorporate the technology into their apps are members of the Decentralized Identity Foundation and the Trust Over IP Foundation. The World Wide Web Consortium provides standards for identity technologies and interoperability via the W3C-DID and VC projects. These organizations are working tirelessly to standardize and shape decentralized identity.

The future of decentralized identity

The decentralized identity space is still in its infancy; however, it is clear that it has the potential to change existing identity management for the better.

The world moves more toward Web3, the next evolution of the internet. Through decentralization and blockchain technology, an increasing number of people are taking back control of their data.

The digital identity space is still in its inception; however, from all the above discussion, it is obvious that decentralized identity with blockchain has the potential to make identity management decentralized, simplified and seamless, completely transforming the landscape.

While startups and DID initiatives continue to develop proofs of concepts for decentralized identity in government, finance, healthcare and other fields, the opportunities for decentralized identity continue to grow.

Overall, the goal is to make users feel more empowered online and build up and share a verifiable reputation and proof of existence. Analysts predict that one of the latest hottest trends in the tech industry — the Metaverse — may become a key initiator for decentralized identity spread.

With the advancement of avatars in the form of nonfungible tokens serving as users’ digital identities within virtual spaces, soulbound tokens, blockchain, biometrics and related cutting-edge technologies, decentralized identity will soon reach the masses in the flourishing Web3 ecosystem, which will boom in the coming years.

Purchase a licence for this article. Powered by SharpShark.

Go to Source

Bit Coin

4 On-Chain Metrics Show the Bitcoin Price Is Primed for Bullish Explosion

Published

on

4 On-Chain Metrics Show the Bitcoin Price Is Primed for Bullish Explosion

Amid recent macroeconomic extremes, Bitcoin has maintained a quiet stance, almost eerie for its HODLers. Nonetheless, its hashrate and accumulation are soaring — what could this mean for its price?

Bitcoin has been consolidating in a narrow range between $18,800 and $20,200 since the mid-Sept price fall. In volatile markets like cryptocurrency, similar quiet periods of consolidation are rare. 

Recent Glassnode findings show that the current BTC price action resembles both pre-crash November 2018 and pre-rally March 2019. Despite price downturns, mining and accumulation statistics are improving. Let’s look into what this means for the health of the network.

Bitcoin hashrate makes new ATH 

Last week, the Bitcoin hashrate made a new all-time high of 242 exahashes per second.

Source: Glassnode

In the chart below, we can see that Bitcoin’s longer-term, slower hash ribbon was once again overtaken by the faster ribbon, indicating improved mining conditions in late August. Since the price saw no major uptick during this time, the rise in hashrate was likely due to more efficient mining hardware and more mining rigs working in general.

Source: Glassnode

Historically, these hash ribbon moving average swaps precede price gains. Historically, when the hash-rate drops and subsequently recovers, major BTC price bottoms have been made. 

Is a price bottom in?

Apart from the hashrate, Bitcoin accumulation levels also reached a 7-year high. CryptoQuant data shows that 6-month-old and older Bitcoins now make up 74% of the realized cap. During the 2019 and 2015 bottoms, this score sat at 70% and 77%, respectively.

Source: CryptoQuant 

Lastly, for the first time in this cycle, the percentage of supply in loss has reached the 50% level.

CryptoQuant data shows that the price bottoms during previous cycles normally occur when the percentage of supply in loss reaches 50% or more.

Source: CryptoQuant

The current data shows the highest percentage of losses at 52% on the daily chart, 50.4% on the weekly (7DMA), and 48% on the monthly (30DMA). 

While quite a few metrics suggest that BTC should be near a bottom, the overall momentum will likely still depend on macroeconomic conditions as well as its correlation with the Nasdaq and S&P 500. 

Disclaimer

All the information contained on our website is published in good faith and for general information purposes only. Any action the reader takes upon the information found on our website is strictly at their own risk.

Go to Source

Continue Reading

Bit Coin

Bitcoin price sees first October spike above $20K as daily gains hit 5%

Published

on

Bitcoin price sees first October spike above $20K as daily gains hit 5%

BTC price action sees a new October peak amid a declining U.S. dollar and a successful prior day’s trading for U.S. equities.

318 Total views

16 Total shares

Bitcoin price sees first October spike above K as daily gains hit 5%

Bitcoin (BTC) saw its first trip above $20,000 on Oct. 4 as traders expected familiar resistance to cap gains.

BTC/USD 1-hour candle chart (Bitstamp). Source: TradingView

Multi-week dollar lows fuel Bitcoin bulls

Data from Cointelegraph Markets Pro and TradingView showed BTC/United States dollar climbing prior to the Wall Street open, up over 5% in 24 hours.

The pair had shaken off macroeconomic concerns at the start of the week, with trouble at Credit Suisse and the escalating Russia-Ukraine conflict failing to slow performance.

Now, the short-term analysis focused on a run potentially topping out closer to $21,000 — as was the case late last month, as sell-side pressure at that level remained significant.

“20500-21000 is a sell zone. If price gets there, which should, don’t be too bullish,” popular trader Il Capo of Crypto told Twitter followers on the day.

Razzoorn, an analyst at international trade group The Birb Nest, noted that the current charge was Bitcoin’s fifth attempt at escaping a major liquidity cloud in several weeks.

Despite the potentially limited upside opportunity, Bitcoin rallied in line with a broader risk asset tide which saw United States equities finish noticeably higher the day prior.

At the same time, the U.S. dollar suffered, the U.S. dollar index (DXY) extending losses to approach 111 points and threaten support in place since mid-September.

U.S. dollar index (DXY) 1-day candle chart. Source: TradingView

“Up the market goes,” a more optimistic Michaël van de Poppe, CEO and founder of trading platform Eight, continued:

“Flipping $19,500 for support. Now, if range-high at $19,600 holds for Bitcoin, I assume we’ll continue towards $22,400.”

Altcoins attempt to change sticky trend

Across major altcoins, it was Ether (ETH) and Ripple (XRP) leading daily performance at the time of writing. 

Related: CoinShares’ Butterfill suggests ’continued hesitancy’ among investors

ETH/USD traded above $1,350, still yet to break out of its sideways trend in place for several weeks since major losses entered during the post-Merge breakdown.

ETH/USD 1-day candle chart (Binance). Source: TradingView

XRP, on the other hand, faced a more stubborn band of resistance after prior gains, bouncing off multi-week support just below $0.45.

XRP/USD 1-day candle chart (Binance). Source: TradingView

The views and opinions expressed here are solely those of the author and do not necessarily reflect the views of Cointelegraph.com. Every investment and trading move involves risk, you should conduct your own research when making a decision.

Go to Source

Continue Reading

Bit Coin

McDonald’s starts to accept Bitcoin and Tether in Swiss town

Published

on

McDonald’s starts to accept Bitcoin and Tether in Swiss town

The global fast food chain is among the first to participate in a crypto-friendly experiment in the town of Lugano.

740 Total views

41 Total shares

McDonald’s starts to accept Bitcoin and Tether in Swiss town

Multinational fast food chain McDonald’s started to accept Bitcoin (BTC) as a payment method in the 63,000-populated city of Lugano in Italian Switzerland, which is becoming a hotspot for crypto adoption in Western Europe. 

A one-minute video of ordering food on McDonald’s digital kiosk and then paying for it at the regular register with the help of a mobile app was uploaded on Twitter by Bitcoin Magazine on Oct. 3. The Tether (USDT)  logo could be spotted next to the Bitcoin symbol on the credit cash machine, which is not surprising, as in March 2022 the city of Lugano announced it would accept Bitcoin, Tether and the LVGA token as a legal tender.

On March 3, 2022, the city signed a memorandum of understanding with Tether Operations Limited, launching the so-called “Plan B.” According to this plan, Tether has created two funds — the first one is a $106 million, or 100 million Swiss francs, investment pool for crypto startups, and the second is around $3 million, or 3 million Swiss francs, attempt to encourage the adoption of crypto for shops and businesses across the city.

In addition to allowing Lugano residents to pay their taxes using crypto, the project will extend payments to parking tickets, public services and tuition fees for students. More than 200 shops and businesses in the area are also expected to accept crypto payments for goods and services.

Related: Swiss Post’s banking arm developing in-house crypto custody platform

Speaking to Cointelegraph in June, Paolo Ardoino, chief technology officer of Tether and Bitfinex, claimed that Plan B “is going great,” announcing a two-week educational activity on blockchain and cryptocurrencies in the city.

In September 2021 El Salvador became the first country in the world to allow using Bitcoin as a legal tender. Since that time, McDonald’s has been accepting Bitcoin at all its 19 outlets in the country.

Go to Source

Continue Reading
Home | Latest News | Cryptocurrency | Bit Coin | What is decentralized identity in blockchain?
a

Market

Trending