Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Decentralized Identity Explained

You're reading from   Decentralized Identity Explained Embrace decentralization for a more secure and empowering digital experience

Arrow left icon
Product type Paperback
Published in Jul 2024
Publisher Packt
ISBN-13 9781804617632
Length 392 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Rohan Pinto Rohan Pinto
Author Profile Icon Rohan Pinto
Rohan Pinto
Arrow right icon
View More author details
Toc

Table of Contents (22) Chapters Close

Preface 1. Part 1 - Digital Identity Era: Then
2. Chapter 1: The History of Digital Identity FREE CHAPTER 3. Chapter 2: Identity Management Versus Access Management 4. Part 2 - Digital Identity Era: Now
5. Chapter 3: IAM Best Practices 6. Chapter 4: Trust Anchors/Sources of Truth and Their Importance 7. Chapter 5: Historical Source of Authority 8. Chapter 6: The Relationship between Trust and Risk 9. Chapter 7: Informed Consent and Why It Matters 10. Chapter 8: IAM – the Security Perspective 11. Part 3 - Digital Identity Era: The Near Future
12. Chapter 9: Self-Sovereign Identity 13. Chapter 10: Privacy by Design in the SSI Space 14. Chapter 11: Relationship between DIDs and SSI 15. Chapter 12: Protocols and Standards – DID Standards 16. Chapter 13: DID Authentication 17. Chapter 14: Identity Verification 18. Part 4 - Digital Identity Era: A Probabilistic Future
19. Chapter 15: Biometrics Security in Distributed Identity Management 20. Index 21. Other Books You May Enjoy

Social networks – Identity 2.0

While most identity schemas of the 1980s and 1990s were supported in some way by the CA model, the next notable revolution in digital identity was accelerated by social networking sites. Social networking sites function by allowing individuals to publish their social graphs, institutions, hobbies, and beliefs, among other things, publicly. While billions of IDs can be accessed, social network identification has grown in popularity due to its ease of use for SSO and identity reuse. It is referred to as the Identity 2.0 generation.

As the internet evolved, a new wave of invention and connectedness arose, ushering in the internet’s second generation. The emergence of social networks characterized this period, revolutionizing the way individuals interact, exchange information, and engage with one another online. Individuals might utilize social networks to build profiles, connect with friends and family, and exchange material in a more engaging and user-centric manner.

Social networking has its origins in the early 2000s when numerous pioneering platforms arose. Friendster, which debuted in 2002, is widely regarded as the first contemporary social networking service. Users could make profiles, interact with friends, and share updates. However, technological problems and scalability limitations hampered its long-term viability.

In 2004, a Harvard University student named Mark Zuckerberg founded Facebook, a social networking website. Initially confined to Harvard students, Facebook swiftly moved to other colleges before opening to the general public in 2006. Because of its simple design, emphasis on actual identities, and comprehensive privacy safeguards, Facebook has become enormously popular. It transformed the social networking scene and paved the way for the subsequent social media explosion.

Following Facebook’s popularity, several social networking sites arose, each with its own set of features and target demographic. MySpace, which rose to prominence in the mid-2000s, enabled users to customize their accounts with music and themes. LinkedIn focuses on professional networking, connecting people based on their professional interests and achievements. Twitter, a microblogging site, pioneered the idea of sending out brief, real-time messages known as tweets.

People’s online communication and interaction have been transformed by social networks. They provided a platform for people to keep in touch with friends and family even when they were separated by large distances. Real-time interactions and involvement were made possible by features such as private messaging, comments, and likes. Social networks also made it easier to find new connections and common interests, establishing online communities and virtual partnerships.

The capacity for users to generate and share content was a fundamental motivation behind the growth of social networks. Photos, videos, status updates, and blog articles have all become commonplace in online conversations. The advent of the sharing economy, in which individuals could monetize their talents, assets, and knowledge through platforms such as YouTube, Instagram, and TikTok, resulted from this shift toward user-generated content.

Concerns over security and privacy have become increasingly prominent as social networks have gained popularity. There were concerns about the handling and misuse of the large amounts of personal information being shared on these platforms. Social networks came under scrutiny due to issues such as privacy settings, data breaches, and targeted advertising. Regulations were increased as a result of these concerns and greater emphasis was placed on user privacy and consent.

In addition to news and information, social networks have become important sources of information for many users. Sharing news articles, opinions, and personal experiences shaped public discourse and spread information rapidly. In addition, this brought with it challenges such as the spread of misinformation, the creation of filter bubbles, and the manipulation of social networks as political tools. While maintaining an ecosystem of healthy information and upholding freedom of expression, platforms faced increasing pressure to address these issues.

The introduction of smartphones and mobile apps drove the expansion of social networks even further. Users can now access their social media profiles while they were on the road, share information, and communicate with others in real time. Mobile applications added elements such as location tracking, augmented reality filters, and live streaming to social networking experiences, making them more participatory and immersive.

The advent of social networks was a watershed moment in the growth of the internet. These platforms transformed the way people interacted, communicated, and exchanged material on the internet. Social networks provided a platform for self-expression, community building, and knowledge sharing, but they also included privacy, data security, and societal implications. As social networks expand, their impact on how we interact and engage in the digital world remains significant, determining the future of online connectedness and communication.

Building on our study of Identity 2.0 in social networks and its implications for digital identity management, let’s move on to a more sophisticated and safe method of identity verification: biometric identification. In the next section, we’ll look at how biometric technologies such as fingerprint and facial recognition are transforming identity identification and improving security across several platforms.

You have been reading a chapter from
Decentralized Identity Explained
Published in: Jul 2024
Publisher: Packt
ISBN-13: 9781804617632
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image