The Rubric Podcast

A friendly conversation about DIDs and DID methods

Unlocking did:key (Part 2)

[Part 2 of 2]  We talk with Orie Steele of Transmute, an editor of the did:key spec and Mike Varley of SecureKey, who has worked through that spec and implemented did:key for his company. did:key might be the simplest and most useful DID method out there. It certainly was the most surprising when we first...

Read More
The Rubric
The Rubric
Unlocking did:key (Part 2)
/

Unlocking did:key (Part 1)

[Part 1 of 2]  We talk with Orie Steele of Transmute, an editor of the did:key spec and Mike Varley of SecureKey, who has worked through that spec and implemented did:key for his company. did:key might be the simplest and most useful DID method out there. It certainly was the most surprising when we first...

Read More
The Rubric
The Rubric
Unlocking did:key (Part 1)
/

About The Rubric

A rubric is a standard way to evaluate subjects in a particular topic. Legendary Requirements helped create two rubrics for DID Methods, one published by Rebooting the Web of Trust (A Rubric for the Decentralization of DID Methods), the other published by the World Wide Web Consortium (DID Method Rubric). The Rubric podcast is our way to extend the conversation about DID Methods into a more intimate, personal format.

On The Rubric, we meet the people making Decentralized Identity a reality. We discuss the technologies and motivations behind the movement, including Decentralized Identifiers–which encompass DIDs, DID Documents, and DID Methods, so you can make better decisions about which DID Method is appropriate for your use.

Decentralized Identifiers enable robust identity-based services without dependence on a trusted third party. Instead of being forced to use centralized identity verification services, like Facebook, Google or the Department of Motor Vehicles, DIDs can be created by anyone, anywhere, and be used for any purpose.

DID Methods are the magic ingredient that gives DIDs their flexibility.

Before creating any specific DID, you first choose a DID method, which determines how you perform the create, read, update, and deactivate operations on a DID of that method.

Once created, each DID includes the name of its method in the identifier itself, so that when you use the DID, others know how to retrieve the associated DID Document that contains the cryptographic material for secure interactions.

Different DID Methods use different underlying mechanisms with different performance, security, and privacy tradeoffs.

The Rubric interviews the creators and users of different DID Methods, to better understand their motivations, approach, and future plans, to help you make better decisions about which DID Method best fits your needs.

Meet the Hosts

Joe Andrieu

Joe Andrieu is the president of Legendary Requirements, a requirements engineering consultancy specializing in decentralized identity. He is the lead author and editor of A Rubric for the Decentralization of DID Methods and The DID Method Rubric as well as Verifiable Credentials Use Cases and DID Use Cases and Requirements. He was a co-chair for the W3C’s Community Credential’s Group and is an invited expert to the W3C for both Decentralized Identifiers and Verifiable Credentials. He is also on the board, treasurer, and past producer for Rebooting the Web of Trust where he has published A Primer on Functional Identity, Five Mental Models for Identity, Joram 1.0.0, and Amira 1.0.0.

Erica Connell

Erica Connell is the producer of The Rubric and Director of Media for Legendary Requirements. She is a Director, Actor, Writer, Producer, and the owner and President of Wonderland Stage & Screen, where she inspires students to tell their own stories while learning professional tools and techniques of stagecraft and filmmaking. She is a past coordinator and producer for Rebooting the Web of Trust and an active participant in the Credentials Community Group at the World Wide Web Consortium.

Eric Schuh

Eric Schuh is a requirements engineer with Legendary Requirements. He is an editor of the VC-HTTP-API Use Case document at the World Wide Web Consortium’s Credential Community Group. Eric began his career as a software and systems engineer focused on embedded systems where he developed technology for systems ranging from satellites to infrared cameras.