
Sign up to save your podcasts
Or
In this episode of Identi3, Nick Lambert is joined by Kim Hamilton Duffy, Director of Identity and Standards at Centre. Centre is an independent, member-based Consortium founded by Coinbase and Circle in 2018. They launched the stablecoin USDC and Verite, a set of open-source, decentralized identity protocols.
(00:00) Intro
(01:50) What is Centre?
(02:24) What is Verite?
(04:17) Why should an individual care about Decentralized Identity? What does it get them?
(12:50) Which Verite use case excites Kim the most
(18:20) What are Kim’s goals as Director of Identity and Standards at Centre
(21:50) Why are standards important?
(23:21) What are the most significant barriers to implementing Decentralized Identity technology, and how can we overcome them?
(30:40) How do we ensure that Digital Identity is not used for data exploitation and to breach people’s privacy?
(37:17) Key takeaways from Kim’s experience as MIT’s Digital Credentials Consortium Architect
(41:45) Where do you see Decentralized Identity technology in 10 years?
Enjoy!
Connect with Nick on his LinkedIn.
If you want to learn more about Dock, check out our website.
LEARN MORE:
Decentralized Identity
Self-Sovereign Identity
Verifiable Credentials
Decentralized Identifiers (DIDs)
Blockchain Identity Management
Digital ID Wallet
Digital Identity
EU Digital Identity Wallet
eIDAS 2
In this episode of Identi3, Nick Lambert is joined by Kim Hamilton Duffy, Director of Identity and Standards at Centre. Centre is an independent, member-based Consortium founded by Coinbase and Circle in 2018. They launched the stablecoin USDC and Verite, a set of open-source, decentralized identity protocols.
(00:00) Intro
(01:50) What is Centre?
(02:24) What is Verite?
(04:17) Why should an individual care about Decentralized Identity? What does it get them?
(12:50) Which Verite use case excites Kim the most
(18:20) What are Kim’s goals as Director of Identity and Standards at Centre
(21:50) Why are standards important?
(23:21) What are the most significant barriers to implementing Decentralized Identity technology, and how can we overcome them?
(30:40) How do we ensure that Digital Identity is not used for data exploitation and to breach people’s privacy?
(37:17) Key takeaways from Kim’s experience as MIT’s Digital Credentials Consortium Architect
(41:45) Where do you see Decentralized Identity technology in 10 years?
Enjoy!
Connect with Nick on his LinkedIn.
If you want to learn more about Dock, check out our website.
LEARN MORE:
Decentralized Identity
Self-Sovereign Identity
Verifiable Credentials
Decentralized Identifiers (DIDs)
Blockchain Identity Management
Digital ID Wallet
Digital Identity
EU Digital Identity Wallet
eIDAS 2