WEBVTT

00:00.000 --> 00:13.000
Is it owned by a government or an organisation? Is it the same in the digitalism and physical?

00:13.000 --> 00:18.200
How do you experience it? I don't know anybody who has had their identity stolen or you

00:18.200 --> 00:23.000
know anyone who has had that identity stolen. What does that actually mean to have your identity

00:23.000 --> 00:29.000
stolen? And is it possible do you have multiple identities?

00:30.000 --> 00:37.000
I think we're probably I think all of us in this room agreement that something anyway is currently going wrong with identity

00:37.000 --> 00:45.000
But we're seeing the identity and the way we use identities in the digital domain are a key sort of source and resource for

00:46.000 --> 01:00.000
errors, fault, fraud, but also confusion. So if we see you know the amount of passwords is massively rising to all of the different services that we log into

01:00.000 --> 01:07.000
But also the amount of emails and spam emails and how these are used to actually gain access to identity so fishing attempts

01:07.000 --> 01:15.000
I like to go through all these but one of the things is also important for us to think about is is it just people individuals of identities

01:15.000 --> 01:23.000
but what about things and the things that we're interacting with in the physical domain and what is that bridge between the physical and the digital?

01:23.000 --> 01:30.000
With all of these things that are increasingly going wrong and increasingly causing an impact on different groups

01:31.000 --> 01:38.000
particularly vulnerable groups we talked about people who don't have maybe digital literacy but also elderly targets

01:38.000 --> 01:43.000
We also see children a lot of children having their identity stolen as well

01:43.000 --> 01:53.000
So we're part of a group of community, disposal identities community at the end I'll put up the links so you can join this open community and join the discussion

01:53.000 --> 02:00.000
But we believe there's a need for a fundamental change in the way that we think about identities

02:00.000 --> 02:09.000
So quick diagram here so current identity models very centralized so federated identity it means that there are organizations who are

02:09.000 --> 02:11.000
Managing

02:11.000 --> 02:18.000
Possibly owning controlling our identity across multiple services, but also gives an ability as we know to track

02:19.000 --> 02:24.000
And trace and surveil what we're doing across multiple services

02:24.000 --> 02:31.000
Self-soven identity takes this from the centralized perspective and architecture to a decentralized

02:31.000 --> 02:36.000
but also giving the agency in the end users control

02:36.000 --> 02:43.000
But the challenge here, and maybe a disclaimer here, I'm not a developer, I'm a UX trained product owner

02:43.000 --> 02:46.000
So I'm kind of the advocate for the end user

02:46.000 --> 02:53.000
What we're looking here is asking people to completely change their paradigm of how they interact with identity

02:53.000 --> 03:00.000
From this rather easy, possibly lazy centralized to a decentralized where they are responsible

03:00.000 --> 03:08.000
But we'd like to move it to a disposable perspective, disposal identities, where by depending on the context

03:08.000 --> 03:13.000
Depending also on the timing, I actually have a completely different identity

03:13.000 --> 03:18.000
If you think about this, it's something we also do very much in fiscal domain

03:18.000 --> 03:26.000
And in the social domain, why are we not able to do this effectively? Why is it not facilitated in the digital domain?

03:26.000 --> 03:30.000
How many people have more than one email?

03:31.000 --> 03:37.000
How many people have an express? I call it like a junk email or spam email that uses organizations you don't trust

03:37.000 --> 03:42.000
Okay, so we're already kind of doing it anyway, so we believe that actually in the development of the digital identities

03:42.000 --> 03:49.000
We need to facilitate this ability to change our identities and only share the information, data minimization

03:49.000 --> 03:53.000
That is needed for that interaction that transaction

03:54.000 --> 03:58.000
And it's based on a theory, Rob

03:58.000 --> 04:03.000
Which is formed the base of our community

04:03.000 --> 04:08.000
Well, thanks, yes, it's not so much, I would say theories are big word

04:08.000 --> 04:15.000
You see the spider in the middle and basically what I've always noticed is that all the threads

04:15.000 --> 04:20.000
They sort of move to the spider, so basically in the world that we live in now

04:20.000 --> 04:24.000
We have all these entities and services that basically label to look at us

04:24.000 --> 04:33.000
And the idea is to turn that round so that the spider basically determines which type of information goes to all the other entities

04:33.000 --> 04:39.000
So from self-suffering identity, we'll be able to generate disposable identities

04:39.000 --> 04:45.000
And I think that mainly for about 80% of transactions

04:46.000 --> 04:48.000
We simply have to send a token payability

04:48.000 --> 04:53.000
So for example, if I rent a house and if I need to pay an energy provider

04:53.000 --> 04:56.000
All the energy provider needs to know that I can pay

04:56.000 --> 05:00.000
There's just very little else that he or she or the entity should know

05:00.000 --> 05:03.000
They're just one of my money, sort of

05:03.000 --> 05:07.000
So I can send them a token payability that I can pay

05:07.000 --> 05:10.000
That's all, that's all they need to know

05:10.000 --> 05:15.000
And this goes for all the other services and entities as well

05:15.000 --> 05:17.000
And so I can basically go through life

05:17.000 --> 05:20.000
Having good relationships with all these entities

05:20.000 --> 05:24.000
Which they basically don't have to know who I am, what I am, where I'm from

05:24.000 --> 05:27.000
They're just one of my money that just needs to know that I can pay

05:27.000 --> 05:30.000
So I send them this payability token

05:30.000 --> 05:35.000
And in the token of course there's something that can be unlocked if I do not pay

05:35.000 --> 05:38.000
If I breach the contract, they can find me which is kind of logical

05:38.000 --> 05:44.000
Which is very enough, but basically that's all that they would sort of have to know

05:44.000 --> 05:48.000
So that's basically this idea of disposable or ephemeral identities

05:48.000 --> 05:52.000
In a more positive sense we can say ephemeral identities

05:52.000 --> 06:00.000
In a more urgent sense in which we are now in which we are so much sort of under the looking glass

06:00.000 --> 06:05.000
It's good to speak of disposable identities, so that's what we do

06:05.000 --> 06:10.000
So with this, it's not really a theory, we can make it and make it a theory with this idea

06:10.000 --> 06:12.000
I hand over back to you in Lorna

06:12.000 --> 06:13.000
Right

06:13.000 --> 06:14.000
Yeah

06:17.000 --> 06:21.000
So one of the things that we see is that with identities

06:21.000 --> 06:25.000
There are multiple different perspectives on how we look at identity

06:25.000 --> 06:28.000
And also these are driving the way that we're developing the solutions

06:28.000 --> 06:30.000
And we see it in a moment predominantly

06:30.000 --> 06:33.000
It's being driven by the EUDI of

06:33.000 --> 06:40.000
We have to be compliant if we want to be sort of interoperable and working across all of the different countries in Europe

06:40.000 --> 06:43.000
We're seeing also the development of technology

06:43.000 --> 06:50.000
But I'd like to sort of also discuss here about the need for a social cultural perspective

06:50.000 --> 06:56.000
As well to sort of help drive back towards the more legal and economic perspective

06:56.000 --> 06:59.000
This seems to be driving development at the moment

06:59.000 --> 07:03.000
So use experience perspective

07:03.000 --> 07:08.000
A community, maybe a little bit of history

07:08.000 --> 07:12.000
So our community kicked off very dynamically in the pandemic

07:12.000 --> 07:17.000
Where we had this realization very early on in March of the pandemic

07:17.000 --> 07:22.000
That it would be really good to have a much more privacy security

07:22.000 --> 07:27.000
To support with the services for example with the tracking and tracing and vaccinations

07:27.000 --> 07:33.000
The group got together, we had different groups, UX team, tech team, dev team

07:33.000 --> 07:36.000
In the UX team we started doing scenarios

07:36.000 --> 07:38.000
How is this going to be implied?

07:38.000 --> 07:43.000
But we actually came to this realization when you put it in the real context

07:43.000 --> 07:48.000
There was a danger that although we would provide this autonomous private solution

07:48.000 --> 07:57.000
That actually we would also be creating the opportunity for another institution to block people's access

07:57.000 --> 08:02.000
So for example if you don't have the QR code to show that you're not infected or that you're not vaccinated

08:02.000 --> 08:06.000
Then your access to services and locations could be blocked

08:06.000 --> 08:09.000
And we decided this is not what we wanted to contribute to

08:09.000 --> 08:13.000
So we stopped development and as we all know that kind of started happening

08:13.000 --> 08:17.000
So we could see by using the user perspective what would actually happen

08:17.000 --> 08:22.000
So although we have the intentions of giving control to users and decentralized way

08:22.000 --> 08:26.000
You have to look at the context at how it might be developed

08:26.000 --> 08:33.000
So but we didn't stop there, we decided to continue to develop this into use cases

08:33.000 --> 08:37.000
We actually set up a foundation, it's a non-profit organization twins

08:37.000 --> 08:40.000
And we're developing an app called twins connect

08:40.000 --> 08:42.000
We've developed the first solution

08:42.000 --> 08:48.000
And we're now in the process of further developing it for open source publishing

08:48.000 --> 08:54.000
And also to ensure that it's actually compliant with EUDI off

08:54.000 --> 09:03.000
And the idea is that we have this app or this agent, this manager in between us and our services

09:03.000 --> 09:05.000
You could call it a wallet

09:05.000 --> 09:08.000
But we have, we want to call it something else

09:08.000 --> 09:12.000
And actually the focus is not about managing my identities

09:12.000 --> 09:14.000
But it's actually about managing my relationships

09:14.000 --> 09:17.000
Which are to do with identity and data

09:17.000 --> 09:20.000
So at the moment there's a lot of focus on identity

09:20.000 --> 09:24.000
But we see that actually the purpose is to identify myself

09:24.000 --> 09:27.000
So that I can transact with you with different data

09:27.000 --> 09:32.000
And I can actually then trust that you are who you say you are

09:32.000 --> 09:37.000
I can trust that you are going to use my data in the way that we've actually agreed

09:37.000 --> 09:41.000
I can have contracts under my control that I can actually revoke

09:41.000 --> 09:43.000
So there's a lot of different needs

09:43.000 --> 09:46.000
And we have to test it with users and when we sort of ask them

09:46.000 --> 09:48.000
These are the kind of things that we're building

09:48.000 --> 09:51.000
It seemed to make a lot of sense and resonate

09:51.000 --> 09:55.000
Much more than the story about having verified credentials

09:55.000 --> 09:58.000
And the self-sovereign identity

09:59.000 --> 10:03.000
So at the course of these are the properties that we are building

10:03.000 --> 10:05.000
So basically there's disposability

10:05.000 --> 10:07.000
And this could be set on a time-based

10:07.000 --> 10:11.000
So when I take my pet to the vet

10:11.000 --> 10:13.000
Only in that time is that information available

10:13.000 --> 10:15.000
But once that point is over

10:15.000 --> 10:18.000
The vet doesn't need to store or have my information

10:18.000 --> 10:19.000
Verifyability

10:19.000 --> 10:23.000
So there needs some in many cases where the risk level is increased

10:23.000 --> 10:25.000
How can that be verified

10:26.000 --> 10:29.000
Also the privacy and particularly the transparency

10:29.000 --> 10:32.000
So we're talking about the GDPR consent controls

10:32.000 --> 10:35.000
Why is that not in my control

10:35.000 --> 10:39.000
And I can actually see who has access to what data and when

10:40.000 --> 10:44.000
Number of use cases I'm not going to go into that too much now

10:44.000 --> 10:47.000
But so we've got a lot of these QR codes

10:47.000 --> 10:49.000
These are credentials

10:49.000 --> 10:51.000
If I have my phone in the physical domain

10:51.000 --> 10:54.000
But this credential saying that I am above a certain age

10:54.000 --> 10:56.000
Or I have the payability

10:56.000 --> 10:59.000
Or I have the credential to drive a car

10:59.000 --> 11:02.000
How do you know that's me?

11:02.000 --> 11:04.000
So when we start looking at in the real world

11:04.000 --> 11:06.000
How am I actually going to verify that this QR code

11:06.000 --> 11:08.000
This phone is mine

11:10.000 --> 11:13.000
So there's a lot of these things that when we start putting it into the physical domain

11:13.000 --> 11:16.000
How does this actually bridge between the physical and digital

11:16.000 --> 11:19.000
So who can you trust and how do you trust them?

11:19.000 --> 11:23.000
What can you trust when it comes to credentials and data?

11:23.000 --> 11:26.000
But also how do we actually build that trust?

11:26.000 --> 11:28.000
That's one of the things that we're working on

11:28.000 --> 11:32.000
And also really is this trust worthy from a user perspective

11:32.000 --> 11:36.000
And I'm going to sort of finish here on my perspective

11:36.000 --> 11:38.000
I want to throw into the room

11:38.000 --> 11:41.000
Can we stop talking about wallets and can we stop

11:41.000 --> 11:45.000
Actually walletizing and commoditizing identity

11:45.000 --> 11:47.000
From a social cultural perspective

11:47.000 --> 11:49.000
I think this is really actually quite dangerous

11:49.000 --> 11:51.000
And we shouldn't be going that way

11:51.000 --> 11:53.000
Because it's a mental model

11:53.000 --> 11:57.000
And what it is is actually it's driving us towards a very transactual

11:57.000 --> 12:01.000
And very commercial perspective on identity

12:01.000 --> 12:04.000
And I don't think that that's what identity is

12:04.000 --> 12:06.000
We don't think that's what identity is

12:06.000 --> 12:08.000
But at a social cultural perspective

12:08.000 --> 12:10.000
Should actually drive us towards designing

12:10.000 --> 12:13.000
Actually mental models and actually in solutions

12:13.000 --> 12:18.000
There are much more sort of fair and social and sustainable

12:18.000 --> 12:22.000
Our approach is towards relationships and connections

12:22.000 --> 12:25.000
Where we build up trust and in that trust

12:25.000 --> 12:29.000
We actually are able and enabled to share our data

12:29.000 --> 12:32.000
References and psychology references in computer science

12:32.000 --> 12:34.000
Which I think back up this perspective

12:34.000 --> 12:37.000
That we as humans I think is a human right

12:37.000 --> 12:40.000
We should be able to operate in the physical and the digital

12:40.000 --> 12:43.000
And the legal domain with multiple identities

12:45.000 --> 12:49.000
So I put a skip past this and so we've built the solution

12:49.000 --> 12:52.000
I say that's not yet published but this year it will be

12:52.000 --> 12:55.000
So join our community later the link is going to be on the screen

12:55.000 --> 13:00.000
But it actually has dyeing technology inside so I'm going to hand over to Andrea

13:00.000 --> 13:03.000
Thank you for now

13:03.000 --> 13:06.000
Well I believe this is for the walletizing song

13:06.000 --> 13:08.000
Only because I speak loud nothing happens

13:08.000 --> 13:10.000
Alright Andrea

13:10.000 --> 13:12.000
I wear two hats

13:12.000 --> 13:16.000
One of the non-profit foundation dyeing org

13:16.000 --> 13:19.000
And one of the

13:19.000 --> 13:22.000
For-profit BV call forpome

13:22.000 --> 13:26.000
We come from long history of innovation

13:26.000 --> 13:28.000
In 2000

13:28.000 --> 13:30.000
One of my co-founders

13:30.000 --> 13:34.000
It did the first Linux that booted from CD

13:34.000 --> 13:36.000
Called Dinabolic back then

13:36.000 --> 13:39.000
Which funny enough grabbed the attention of dark pop

13:39.000 --> 13:42.000
Because it was used by US military deployed in rock

13:42.000 --> 13:46.000
In 2011

13:46.000 --> 13:51.000
The same guy presented the beat coin to the cow's computer club in Berlin

13:51.000 --> 13:53.000
And it did the first fork

13:53.000 --> 14:03.000
And then in 2014 there were disagreements about a certain component inside

14:03.000 --> 14:07.000
The Linux that ended up in forking they'd be out into that one

14:07.000 --> 14:13.000
And that's when I showed up basically in the organization

14:13.000 --> 14:17.000
So we have a background as cryptographers

14:17.000 --> 14:23.000
We started working on a cryptographic version machine back in 2017

14:23.000 --> 14:28.000
Then we built components on top and we ended up building solutions on top

14:29.000 --> 14:33.000
The purpose of the cryptographic machine was primarily

14:33.000 --> 14:39.000
To allow non-programmers to understand a new cryptography

14:39.000 --> 14:43.000
So the motto was cryptography for the messes

14:43.000 --> 14:46.000
And that's when Xenruh, which was born

14:46.000 --> 14:51.000
Xenruh is so everything we do is entirely up in source

14:51.000 --> 14:55.000
Xenruh is written C, it builds on any platform

14:55.000 --> 14:58.000
On any architecture, even on cortex and chips

14:58.000 --> 15:03.000
And it's programmed in a dialect of cucumber-girking

15:03.000 --> 15:07.000
Which can be read at least by non-programmers

15:07.000 --> 15:12.000
Fast forward 2022

15:12.000 --> 15:18.000
We decided we heard about the ODRF specification

15:18.000 --> 15:21.000
We decided to start working on it

15:21.000 --> 15:24.000
We got a first grant from an NGO program

15:24.000 --> 15:27.000
Then we got a second grant recently

15:27.000 --> 15:31.000
In the middle we got a third grant to implement a compliance slash

15:31.000 --> 15:36.000
Interrogacy resolution that we're going to be very happy to show to Sean

15:36.000 --> 15:38.000
Well, it was not here

15:38.000 --> 15:43.000
And we are now at the stage, how much time we have?

15:43.000 --> 15:45.000
Yeah, plenty of time

15:45.000 --> 15:48.000
We are now at the stage

15:48.000 --> 15:51.000
Where we have a...

15:51.000 --> 15:55.000
Okay, the term wallet, I find it extremely unfortunate

15:55.000 --> 15:58.000
Because the wallet can mean a million different things

15:58.000 --> 16:01.000
All of people associate wallets with cryptocurrency

16:01.000 --> 16:05.000
When we talk about ODRF wallet

16:05.000 --> 16:07.000
It's not clear what it is

16:07.000 --> 16:11.000
So I love to use the term identity solution

16:11.000 --> 16:15.000
So what we have is a fully open source solution

16:15.000 --> 16:21.000
Where the main, the two main pillars of how the solution would work

16:21.000 --> 16:23.000
Would be first of all

16:23.000 --> 16:26.000
We do not want to store private keys of anybody anywhere

16:26.000 --> 16:29.000
Second, we want

16:29.000 --> 16:33.000
Organizations running

16:33.000 --> 16:36.000
Issues and very fires

16:36.000 --> 16:39.000
Or if we talk in the open entity for VCI language

16:39.000 --> 16:43.000
Authorization service, credential issues and running parties

16:43.000 --> 16:46.000
We want them to run them in their own infrastructure

16:46.000 --> 16:50.000
So we do not run any of the Microsoft ourselves

16:50.000 --> 16:54.000
We have a dashboard that with a low code, no code approach

16:54.000 --> 16:57.000
It allows you to set up a credential issue

16:57.000 --> 17:01.000
Then you press a button and you deploy the credential issues somewhere else

17:01.000 --> 17:05.000
And we can do a very quick demo here

17:05.000 --> 17:08.000
Let me skip to this

17:08.000 --> 17:12.000
So for those who are interested here, you don't load the wallet

17:12.000 --> 17:15.000
Which has been in the store for about the month

17:15.000 --> 17:16.000
For the stores

17:16.000 --> 17:18.000
And I enjoy the nice for about a month

17:18.000 --> 17:20.000
So please don't be too

17:20.000 --> 17:22.000
Don't expect too much from that

17:22.000 --> 17:24.000
And once you have installed the wallet

17:24.000 --> 17:26.000
And you have gone through the setup

17:26.000 --> 17:29.000
You can try and get a credential here

17:29.000 --> 17:33.000
The credential is actually one of the first integrations we have done

17:33.000 --> 17:37.000
You will be asked to respond to a questionnaire

17:37.000 --> 17:40.000
Which integrates with another open source tool

17:40.000 --> 17:44.000
Cobotoolbox and basically once you respond to the questionnaire

17:44.000 --> 17:48.000
The answers go into that tool

17:48.000 --> 17:52.000
And you get an SDJot

17:52.000 --> 17:56.000
LDARF compatible ish credential

17:56.000 --> 18:00.000
And we have plenty of time

18:00.000 --> 18:04.000
So again, this is a completely open source

18:04.000 --> 18:08.000
Our connection between foundation

18:08.000 --> 18:10.000
We have a long-standing friendship

18:10.000 --> 18:14.000
They look at the problem from the UX

18:14.000 --> 18:16.000
And humans are perspective

18:16.000 --> 18:20.000
We have been looking at the exact same problem

18:20.000 --> 18:24.000
From a cryptographic slash technical perspective

18:24.000 --> 18:29.000
As I said, we come from the week we have a background cryptography

18:29.000 --> 18:32.000
Our wallet right now, our identity solution

18:32.000 --> 18:35.000
Can do in the version you see online

18:35.000 --> 18:37.000
Can do only SDJot

18:37.000 --> 18:41.000
But we can also do BBS or BBS plus

18:41.000 --> 18:43.000
As some people know it which is

18:43.000 --> 18:48.000
The journalish proof flow that is getting more traction

18:48.000 --> 18:50.000
We can do post quantum cryptography

18:50.000 --> 18:53.000
We can do other journalish proof flows

18:53.000 --> 18:59.000
We have, we have, we're looking at the upcoming cryptography

18:59.000 --> 19:03.000
And we're very, very active in privacy

19:03.000 --> 19:05.000
Enhancing technologies

19:05.000 --> 19:09.000
Especially when it comes to the knowledge proofs

19:09.000 --> 19:13.000
We did implement this from scratch

19:13.000 --> 19:17.000
Meaning that we implement the open ID for VCI protocol

19:17.000 --> 19:19.000
Only with tools built in house

19:19.000 --> 19:21.000
While we did this

19:21.000 --> 19:25.000
We realize our painful it is

19:25.000 --> 19:27.000
And how broad this specification is

19:27.000 --> 19:29.000
So we felt the need

19:29.000 --> 19:31.000
To start working on tool

19:31.000 --> 19:33.000
That would help people

19:33.000 --> 19:37.000
Testing their compliance and interrability

19:37.000 --> 19:39.000
So we have another product we're working on

19:39.000 --> 19:43.000
Which is, yeah, we don't have time to talk about it now

19:43.000 --> 19:47.000
We may have time to talk about it tonight

19:47.000 --> 19:49.000
Because we have a site gig

19:49.000 --> 19:53.000
And, okay, I think that those who wanted to try this

19:53.000 --> 19:55.000
They had done it already

19:55.000 --> 19:57.000
There is probably a

19:58.000 --> 20:06.000
Yes, so we are running an event tonight at 7

20:06.000 --> 20:11.000
And those who want to join are very welcome to

20:11.000 --> 20:14.000
And I think that we have five minutes

20:14.000 --> 20:16.000
Yeah, let's do some Q&A

20:16.000 --> 20:17.000
We've got five minutes

20:17.000 --> 20:19.000
Did you have a question for this team?

20:19.000 --> 20:20.000
Please raise your hand

20:20.000 --> 20:22.000
And if I can ask the presenters

20:22.000 --> 20:24.000
And some nasty questions if you could repeat it for this

20:24.000 --> 20:25.000
The mic that we asked

20:25.000 --> 20:27.000
Can you question right here in the corner?

20:27.000 --> 20:29.000
Like, yeah, just here

20:43.000 --> 20:46.000
I think that was my question to you, can your ID be stolen?

20:46.000 --> 20:47.000
Yes

20:47.000 --> 20:51.000
Yeah, the question is, do you have something about

20:51.000 --> 20:55.000
Is that the recovery of my ID that's stolen or lost?

20:55.000 --> 20:59.000
Yeah, that's actually a question I was hoping to ask

20:59.000 --> 21:02.000
Because one of the challenges we've had in trying to bridge

21:02.000 --> 21:04.000
The sort of the user's world

21:04.000 --> 21:06.000
With the self-suffering identity world

21:06.000 --> 21:08.000
Is, of course, the recovery

21:08.000 --> 21:11.000
So that's one of the modules that we're developing

21:11.000 --> 21:13.000
From a user's perspective

21:13.000 --> 21:15.000
What approaches work best

21:15.000 --> 21:19.000
So do we have completely sort of self-suffering

21:19.000 --> 21:23.000
Where by, yeah, if you lose your access, you lose everything

21:23.000 --> 21:27.000
Or do you, would people want to have sort of brokers

21:27.000 --> 21:30.000
In between which kind of takes away the full on privacy

21:30.000 --> 21:31.000
But actually a range

21:31.000 --> 21:34.000
Or do you have shared secrets that you can then socially

21:34.000 --> 21:37.000
So we're actually looking into what makes sense

21:37.000 --> 21:39.000
Because again, it's a mental model paradigms

21:39.000 --> 21:42.000
Like, yeah, but I just like send for a password reset

21:42.000 --> 21:43.000
No, that doesn't work

21:43.000 --> 21:46.000
So that's actually one of the sort of the social sort of

21:46.000 --> 21:49.000
Use experience things, areas that is not solved

21:49.000 --> 21:53.000
And I'm not sure it's actually solved yet with UDI

21:53.000 --> 21:54.000
Either

21:54.000 --> 21:58.000
So any thoughts or suggestions, please join our community

21:58.000 --> 22:01.000
And feed into this, this is a developing area

22:01.000 --> 22:06.000
Next question, right here in front

22:06.000 --> 22:10.000
There are a lot of things that you have to do

22:10.000 --> 22:13.000
The idea of the activity

22:13.000 --> 22:15.000
So different things

22:15.000 --> 22:18.000
And how you find it in force

22:18.000 --> 22:21.000
And then you're like, well, you can't answer

22:21.000 --> 22:22.000
And then you can't answer

22:22.000 --> 22:27.000
Yeah, so one of the sort of solutions that we're developing

22:27.000 --> 22:31.000
Again, it's still, you know, in the actual real world

22:31.000 --> 22:34.000
It's still a question mark as to how

22:34.000 --> 22:36.000
It's still a problem

22:36.000 --> 22:38.000
It's still a problem

22:38.000 --> 22:41.000
But the idea is that the data that you're sharing

22:41.000 --> 22:43.000
You're not literally sharing

22:43.000 --> 22:45.000
You're giving access to

22:45.000 --> 22:47.000
And so what we do is you build channels

22:47.000 --> 22:50.000
With whoever you're having this identity in data sharing

22:50.000 --> 22:53.000
With and the moment you or your contract says

22:53.000 --> 22:55.000
This is no longer being shared

22:55.000 --> 22:57.000
Or access is being revoked

22:57.000 --> 22:59.000
Then that's sort of automatic

22:59.000 --> 23:01.000
Forgetability

23:02.000 --> 23:04.000
But it's not perfect

23:04.000 --> 23:06.000
And again, this is the question

23:06.000 --> 23:09.000
So once someone has that data

23:09.000 --> 23:12.000
How do you track and how do you follow what's happening with it

23:12.000 --> 23:15.000
One of the solutions we've actually developed a solution

23:15.000 --> 23:18.000
As an innovation project with a Belgian retailer

23:18.000 --> 23:22.000
And one of the solutions there was to separate the personal data

23:22.000 --> 23:24.000
From the content data

23:24.000 --> 23:27.000
Which actually from a commercial perspective is most interesting

23:27.000 --> 23:29.000
They don't need to know who you are

23:29.000 --> 23:31.000
But they really want to know sort of

23:31.000 --> 23:35.000
Amalgamated consolidated data of uses and interest

23:35.000 --> 23:37.000
So that's also another option

23:37.000 --> 23:39.000
So it doesn't matter the data goes out there

23:39.000 --> 23:41.000
Again, questions because as we know

23:41.000 --> 23:43.000
We can say there's no personal identity

23:43.000 --> 23:46.000
But it can still be tracked back and traced back

23:46.000 --> 23:47.000
So again, it's early days

23:47.000 --> 23:50.000
We don't have the, I think the right solutions

23:50.000 --> 23:53.000
But I think we have the ideas to try and get us there

23:53.000 --> 23:56.000
If we keep bringing it back into the real world

23:56.000 --> 23:58.000
We're going on a minute what happens if

23:58.000 --> 24:00.000
What are the unintended consequences?

24:00.000 --> 24:04.000
So no answers, but definitely thoughts and ideas

24:04.000 --> 24:06.000
Next question right there

24:20.000 --> 24:22.000
You're asking me

24:22.000 --> 24:25.000
If it's still yet another blockchain ontology

24:25.000 --> 24:27.000
Technology

24:27.000 --> 24:29.000
Technology

24:29.000 --> 24:31.000
No, no, no

24:31.000 --> 24:35.000
Our components can do blockchain to probability

24:35.000 --> 24:38.000
But if you try the wall from the QR code

24:38.000 --> 24:39.000
There is no blockchain there

24:39.000 --> 24:41.000
There could be

24:41.000 --> 24:45.000
We talked with a couple of people that would like to do KYC

24:45.000 --> 24:49.000
And mix blockchain KYC with the ADRF

24:49.000 --> 24:51.000
But that doesn't mean not yet

24:51.000 --> 24:55.000
It's a new question one is about

24:55.000 --> 24:57.000
If you invent one

24:57.000 --> 24:59.000
Let's go back to

24:59.000 --> 25:01.000
You know, I don't mean any of these great

25:01.000 --> 25:03.000
Particularly over the other town

25:03.000 --> 25:05.000
It's on one

25:05.000 --> 25:07.000
At some point you know

25:07.000 --> 25:09.000
I don't know

25:09.000 --> 25:11.000
I don't know what I'm promoting

25:11.000 --> 25:13.000
In fact, it's the first kind of something

25:13.000 --> 25:15.000
It's called market

25:15.000 --> 25:17.000
And someone knows I was there

25:17.000 --> 25:19.000
And this is called market

25:19.000 --> 25:21.000
It's called market

25:21.000 --> 25:23.000
Yeah, so the idea

25:23.000 --> 25:25.000
Indeed is that every time you scan

25:25.000 --> 25:27.000
And it's an identity data relationships

25:27.000 --> 25:29.000
The identity is I am a customer

25:29.000 --> 25:31.000
That's it

25:31.000 --> 25:33.000
Or I am a customer who is vegetarian

25:33.000 --> 25:35.000
That's all the identity data you're sharing

25:35.000 --> 25:39.000
When you actually do the data transaction

25:39.000 --> 25:41.000
So this is why we're trying to shift this thinking

25:41.000 --> 25:43.000
It's not identity and data relationships

25:43.000 --> 25:45.000
So in the one location

25:45.000 --> 25:47.000
I have one identity

25:47.000 --> 25:49.000
And the other one I have

25:49.000 --> 25:51.000
I'm a completely different identity profile

25:51.000 --> 25:53.000
I'm still a customer

25:53.000 --> 25:55.000
And I'm still a vegetarian

25:55.000 --> 25:59.000
But there's no connection between the two

