🍔
Play Now
Sign in
Explore
Map
Events
Parcels
Wearables
Islands
Spaces
Womps
Buy
Merch store
About
Code of Conduct
Discord
Privacy Policy
Terms of Use
Tutorials
Twitter
Uptime
© Nolan Consulting Limited
v37287
Map
Play Now
12 Collar Crescent
Near
Doom in
Origin City
(69W,323S,)
Details
Address
12 Collar Crescent
Doom
Origin City
Token ID
#1117
Traffic
4876 Visits
Owned By
0xfb-96fa5
Size
20m wide × 14m deep × 16m tall. 280m² area.
Description
Collaborators
0x6789...d7800f
Womps
Sign:
White Paper
Richtext:
This white paper offers a remedy: an open, permissionless, and highly-secure, identity platform that will be built on blockchain technology. This cutting-edge identity platform will enable consumers to protect and manage their own identity (rather than trusting careless corporations and government entities to do so). Best of all, this new platform will create a single, lifelong identity—one designed to be equally adaptable to both the digital and real-world demands. In other words, not only will it be be highly secure, it will also aim to replace the 130+ identities, logins and physical IDs we now juggle as we shop online, verify transactions and enter buildings and health clubs. The current state of security surrounding identity is alarming. In 2017 alone, nearly 17 million U.S. consumers were victimized by fraudsters, according to Javelin Strategy & Research. But this finding tells only part of the story. As more details emerge surrounding the massive 2017 Equifax breach, it now appears hackers gained access to more than 145 million stolen identities in that caper alone. It is likely those stolen credentials will fuel illegal activity for years to come. Identity theft is now so common that consumers barely have time to react to one breach before another is announced. In the first half of 2017, for instance, there were 791 data breaches reported. That works out to more than four each day. When breaches are announced, authorities quickly work to triage the situation by alerting vendors, consumers and the media. We then collectively move on with our daily lives. But the cost of ID theft, of which consumers absorbed nearly $17 billion last year, means such a laissez-faire approach is no longer sustainable. It’s time to completely overhaul how we manage our identities.
Sign:
“Lost Identity” by Bartosz Beda — oil on canvas
Sign:
GitHub
Richtext:
Using a self-sovereign identity such as lifeID along with verified claims in the digital world allows us to interact in a way that resembles what we already do in the real world. With lifeID, these unique digital identifiers along with the verified claims are encrypted and stored on the smartphone using the lifeID app. This gives users autonomy in the digital world where it doesn’t currently exist today. lifeID will change the nature of digital identity, putting users back in control of their information, while maximizing convenience across the board.
Sign:
What Makes lifeID Different?
Richtext:
1. lifeID is open-source. Anyone can view exactly how the protocol works and a transparent governance system will ensure that it remains responsive to the needs of the community. Developers will be able to adapt the technology to their own stack, and use it however they see fit. 2. lifeID will not be tied to any specific blockchain. It exists on top of a smart contract-capable blockchain, but the platform functions independently of which blockchain it is running on. In fact, it is likely that lifeID will switch blockchains at some point in the future as new technology emerges. 3. The lifeID network will be completely decentralized. Built-in economic incentives are designed to ensure that the network will exist in perpetuity, and encourage anyone to become a stakeholder by running nodes in the network. 4. lifeID is pioneering solutions that are essential to mainstream adoption of a digital identity. One such key feature is a robust, secure recovery mechanism if an ID holder loses their private keys. We believe that you shouldn’t need to be a cryptography expert to use our technology, nor should anyone have to live with the anxiety of permanently losing their digital identity. 5. lifeID is permissionless. Several organizations are attempting to create a digital identity with private or permissioned blockchains. Although lifeID is compatible with these projects, they are fundamentally different. An identity issued from a permissioned blockchain is akin to issuing a corporate ID card. One may use it for the purpose that it was built for — entering a building or purchasing meals, for example — but with the understanding that it can be revoked at any time by the issuer. lifeID allows anyone to create a digital identity, and it can never be revoked by anyone except the holder. 6. lifeID gives users the ability to sign claims with their private key. Users will be able to exchange signed claims allowing for verification without needing to know the underlying information. For example, it would be possible for a person to prove that they are over a certain age (because a third party has already verified it) without actually revealing what that age is. A similar process can prove a minimum bank balance or credit risk without revealing specific numerical values. 7. As blockchain attracts more attention, many companies have pivoted into this space, but they are just repurposing technology built for another use. lifeID, on the other hand, has always been singularly focused on building a blockchain-based identity solution, and our technology has been engineered from the ground up to reflect this.
Sign:
Blockchain-based Self-Sovereign Identity
Sign:
The Three Pillars of a
Richtext:
The requirements of a self-sovereign identity platform To fully realize the promises of a self-sovereign identity, the blockchain platform that serves as the central registry must be built with three important pillars: 1. Driven by economic incentive 2. Open and Permissionless 3. Self Governance The core tenet of a self-sovereign digital identity is that the user remains in control of the existence and use of the digital identity. A decentralized blockchain platform solves the problem of building a centralized registry that coordinates the use of these identities in the digital world. For the blockchain to accomplish this, it must be permissionless, economically self-sustaining and the governance that shepherds its future must be transparent, fair and ultimately serve the identity holders.
Sign:
Twitter
Sign:
Medium
Richtext:
lifeID was founded with the vision that every person in the world deserves to own and control their identity. For lifeID and our world-wide community, the future of identity rests on the concept that controlling personally identifiable information (PII) — both online and in the real-world — is a foundational right. This right will ensure a future with simple, secure digital identities; a future with password-free online experiences; a future where individuals can establish who they are, or verify facts about their lives, without the intrusion or oversight from government entities or corporations. Although there are several self-sovereign Identity solutions in development within the larger blockchain community, they are all quite different. They share some common principles of self-sovereign identity, but not all. There is a definitional gap to be filled, establishing what we think are the foundational attributes of a truly self-sovereign identity. It is our goal to inspire discussion and agreement within our community for what comprises a self-sovereign identity to ensure the success, integrity and sustainability of these solutions for people throughout the world. In light of this, we hold these truths to be self-evident features of any self-sovereign identity solution.
Richtext:
|6. Identities must be portable. Identity attributes and verified claims must be controlled personally and be transportable and interoperable as desired. Government entities, companies and other individuals can come and go. So it is essential that identity holders can move their identity data to other blockchains or platforms to ensure that they alone control their identity. |7. Identities must be interoperable. Identity holders must be able to us their identities in all facets of their lives. So any identity platform or protocol must function across geographical, political and commercial jurisdictions. Identities should be as widely usable as possible. Ultimately, identities are of little value if they only work in niches. |8. Individuals must consent to the use of their identity. The point of having an identity is that you can use it to participate in mutually beneficial transactions — whether personal or commercial. This requires that some amount of personal information needs to be shared. However, any sharing of personal data must require the absolute consent of the user — even if third parties have a record of previously verified claims. For every transaction associated with a claim, the identity holder must deliberately consent to its use. |9. Disclosure of verified claims must be minimized. For every transaction, only the minimum amount of personally identifiable information should be required and shared. If an identity holder wants to enable an age-related commercial transaction, e.g. buy alcohol, the only verified claim that needs to be shared is whether they are over 21. There is no need to share actual age, street address, height, weight, etc. |10. The rights of identity holders must supersede any other platform or ecosystem entities. If a conflict arises between the needs of the platform or entities engaging with identity holders, the governance must be designed to err on the side of preserving these rights for identity holder over the needs of the protocols, platform or network. To ensure this, identity authentication must be decentralized, independent, and free of censorship.
Richtext:
|1. Individuals must be able to establish their existence as a unified identity online and in the physical world. A unified identity requires that people not only have an online presence, but that presence must function seamlessly across both online and real-world environments. One unified identity for all spheres of life. |2. Individuals must have the tools to access and control their identities. Self-sovereign identity holders must be able to easily retrieve identity attributes and verified claims as well as any metadata that has been generated in the process of transactions. There can be no personally identifiable information (PII) data that is hidden from the identity holder. This includes management, updating or changing identity attributes, and keeping private what they choose. |3. The platforms and protocols on which self-sovereign identities are built, must be open and transparent. This refers to how the platforms and protocols are governed, including how they are managed and updated. They should be open-source, well-known, and as independent as possible of any particular architecture; anyone should be able to examine how they work. |4. Users must have the right to participate in the governance of their identity infrastructure. The platform protocols on which self-sovereign identities are built, must be governed by identity holders. By definition, if the platform is governed by a private entity or limited set of participants, the Identity holder is not in control of the future of their identity. |5. Identities must exist for the life of the identity holder. While the platform and protocols evolve, each singular identity must remain intact. This must not contradict a “right to be forgotten”; a user should be able to dispose of an identity if he or she wishes and claims should be modified or removed as appropriate over time. To do this requires a firm separation between an identity and its claims: they can’t be tied forever.
Sign:
white paper
Sign:
contact
Sign:
Self-Sovereign Identity Bill of Rights
Sign:
this is Ian
Sign:
<---- Blue Moon Tavern
Sign:
Donate NOW
Richtext:
It might be a long time before it's safe for the Blue Moon Tavern to operate again, and we understand why. But the uncertainty is taking a dreadful toll on our financial health. Please make a gift to help keep Seattle's most infamous bar alive. The Blue Moon has been a local University District haunt in Seattle since 1934. We have changed a lot over the years - but we have always been an independent, locally owned dive bar and we love our unique and diverse community. From eclectic open mic nights to opera on tap to themed comedy shows to a variety of local and touring musicians, the Blue Moon is proud to offer one of our fine city's most intimate and well-tread stages. We usually depend on live music crowds to meet our revenue goals every week - and we don't have any illusions about the near-term safety of hosting live music OR crowds. If we meet our fundraising goal, we can avoid permanent closure through the end of 2020. Help us get through this year, and we'll do everything we can to be there for you when it's once again safe to gather for a pint. Please, if you are able to make a gift, send it now and earn some excellent nightlife karma #SmallBusinessRelief
Sign:
Save the Blue Moon
Sign:
secret room
Sign:
<--- Event Stage
Sign:
Event Stage--->
Sign:
portal
Sign:
^^
Sign:
website
Sign:
Bartosz Beda
Sign:
back to Tokyo
Sign:
portal
Sign:
~>
Sign:
portal
Sign:
portal
Polytext: life
Sign:
click to play
Sign:
click to play
Sign:
The Mission of the lifeID Foundation
Polytext: staff
Polytext: ID
Polytext: The Blue Moon Tavern
Polytext: The Blue Moon Tavern
Nearby
Loading...
Misc
🐙 Force update