 All right, your life. I have two directions, two tracks. One is mainly about hyperledger, fabric, consortium projects. On the other hand, I have some really public blockchain projects. They are mainly about development with solid IT. It's not just necessarily Ethereum, but actually everything that is similar to Ethereum for example, like polygons and so on. As I said, the topic for today is digital identity and blockchain. And then the agenda actually looks like this. I would like to start to describe a little bit, to summarize a little bit what are the problems with the existing identity solutions. Identity and authentication solutions are exactly the website authentication and also the such paper instructions, or I would say, ordinary paper instructions. Then I will go on and then I will introduce a little bit what is a WebDry authentication and then we will really show the professional authentication and identification solutions, like, for example, a verifiable credential in English, the DEID, the central identifier, a bit in the direction of zero-knowledge proof and selective information distribution. Today is a hyperledger meetup. Of course, I have a slide about hyperledger and then also a slide about hyperledger and hyperledger identity solutions. Then I also have a exciting slide about the European self-sovereign identity system. And then in the end I have, I planned in a demo, probably we will have time for that, but I would definitely show some slides for such a general, verifiable proof certificate and then in the end we would like to have a round of questions and answers. So my suggestion would be, I really prepared for a presentation, so that it is not 100% perfect. So then it can happen that I break down briefly and then we can have a 20-second break without planning. But generally my suggestion would be, if someone has a big question or a complicated question or maybe a point that should be discussed, then my suggestion would be to really discuss something in the end. I think my presentation will take about 30-40 minutes and then, as I said, we will have a bigger discussion at the end. So then we will start. And then I have two classic identity solutions for the first term. Once I show the Web2 authentication. I mean, the Web2 authentication is a classic authentication. It looks like if you want to use some online services these days, then you actually have or you actually have to register with Benutzera, name, e-mail and even password. This is the so-called classic Web2 authentication and as I said, it is often used practically on any online service. Practically speaking, Benutzera, name and e-mail are the identity information and password is practically like a test that I really have these identities Benutzera, name and e-mail. I would say something like this works relatively well until you have only one or three so-called online services used. But then nowadays, when you want to use maybe even a few dozen or maybe even a few hundred online services, then it will be difficult. And the problem is what I can do, I can of course use a name, an e-mail and more or less use a password everywhere. That is the problem that, on the one hand, when an online service is accidentally hacked, then my password is practically immediately known and not only for one online service, but also for several other online services. That is of course a problem, so it is certainly not practical. On the other hand, there is a information correlation between the website or between online services. So, for example, if I search for something on Google, then maybe I will get an advertisement on Facebook and even on Twitter and so on and so on. That is what I call information correlation. On the other hand, it can also happen if, for example, an online service is hacked and I only use a username and an e-mail everywhere, then it can happen that my entire online activity practically lands somewhere on a public network, which is of course not too practical. Of course, it is not a best practice, to use a username and password everywhere. Certainly, technically, it would be practical for every online service to use a different username, a different e-mail and also to use a different password. However, it is simply not realistic. I mean, no one actually has hundreds or even dozens of different username and password. That means an online service or an authentication of an online service and somehow an identity of an online service is not necessarily simple and does not work perfectly. The other thing is a bit different. I would say these are the so-called paper certificates. For example, a diploma certificate for example and so on. I know they are not seen as paper nowadays. But I would say such certificates come from the paper world. That means there is a piece of paper that says something. There is a stamp on it and then confirms the thing and then it is practically for someone. And then sometimes I can digitize something like this but then digitizing uses this classical model and I simply mean the paper certificates. As I said, these are the personal certificates that appear. Diploma certificate. If I think for a company then it can be something like ISO certificate. What does it start to be in this fashion today? They are the climate and sustainability certificates and also unfortunately to say the COVID certificate. I would say that even if they sometimes exist digitally I would say. The original idea is still this paper proof model. These are the two identity and identification ways that exist at the moment and I would say they do not work perfectly in the digital world. Then we start to look at how such things can be improved. One direction is the so-called Webdry identification. Webdry identification works with decentralized applications and defy applications. So it is quite a smart moment. For example, if I want to do something with uniswap first I have to run my browser but this is uniswap at the moment. Uniswap is both a decentralized application and a defy application. What is important with uniswap for example I do not have a user name I do not have an email here I also do not have a password here but what I have here is a crypto currency wallet and in the crypto currency wallet I also do not have the public and private keys my other one is the public key and I would say my identity when I use such tools is my public key it is a pseudonym identity it is quite cryptic but in any case with such an identity I can practically use this decentralized application and I still have a private key when I somehow write a transaction with my private key and I actually write a cryptographic key then I check practically that this pseudonym identity really belongs to me that I really use this pseudonym identity to use the system and that is the so-called Web3 authentication as I said based on private and public keys public keys or the address is practically the identity I mean Ethereum is the public key the same as the address for example on Bitcoin it is different a little but then the main idea is the same the public key or the address which is derived from the public key is the identity and I also have a private key and I can create a digital signature with the private key which is practically an identity background so that I can use cryptography that I am who I am practically to formulate it is based on pseudonymization sometimes pseudonymization is not perfect and is criticized for so-called key-wise and e-mail processes what is important is but as I said it is only used with decentralized and DeFi applications that means it is a niche market at the moment let's see how we can develop a Web3 authentication model and then if we want to develop the Web3 authentication we can cover several scenarios then the model which is often used is the so-called customizable certificate or verifiable credential and with customizable certificate or verifiable credential what is important is I have a so-called certificate we can imagine the certificate is practically a piece of paper like for example a diploma it says my name which university has this diploma and then some more information for example that I have a 3-webcom and so on so that is a certificate and then the model is practically this certificate I have three actors so for the first three actors in this model I have the manufacturer I have the owner and I still have a user so the manufacturer is practically a university a university makes a diploma writes in that is the name of the university I have this diploma for someone who makes some more information that I for example have a good grade and that is the manufacturer then there is the owner the owner for example someone who just makes his diploma and gets his diploma in any case someone who has this certificate and then the third actor role is practically the examiner the examiner is someone who just wants to verify the certificate wants to check for example if it is a diploma then actually can practically be a examiner our future employer wants to see our diploma and verify our diploma is it a real diploma is it wrong for example is it not from the university am I really the owner of the diploma is it not wrong that for example originally it was somehow just based on the format and then it was somehow wrong and then the good format and so on and so on so that is the easiest model for an extra certificate and that would be something with a further role really the main thing is that this verification process of the examiner should run so well and so perfectly and it should actually run cryptographically how it is possible and so for the first we can enter a fourth role that is the so-called data registry registration that is a data storage where we for example can store such certificates I would say it is a global global central storage central or decentralized storage where we practically such certificates for example our diploma can simply store and that helps in the verification process so for example when the university destroys our diploma when the diploma itself is immediately entered in this central or decentralized data storage then with the verification process with the verification of our diploma then this must be read and can really compare this is a verification for the data storage for proof certificates of diplomas and so on and so on now my internet starts to be a bit problematic I do it slowly a bit but then I hope that it will continue to work well what is important is that the exhibition stores the certificates normally does not store the entire certificate but some I would say metadata of our certificate so that our diploma or our certificate can be verified better and then the proof is the data storage and that helps in the verification process so let's see how we can actually use the Web3 authentication with our verified certificate model or can use as I said we have the four roles here the exhibition owners and also a central data storage so first both the exhibition owner and also the proof has some identity information and this identity information is similar to Web3 authentication so that means when I'm an exhibition owner then I have my private and public key and public key represents my identity and if I have something with my private key then I have my private key and public key represents my identity and if I have something with my private key then practically I check that I really I check cryptography that I'm the identity to say and it also works similar to the exhibition owner so the exhibition owner also has a private key and a public key and identity is practically a private key and if the owner describes something with a private key then he confirms cryptography that he really is the identity so with that we have our model so in our Diplom as I said there are actually three groups of information once there is an identity of the university there is an identity of the owner and three times there is much more information that I, for example, was of the model or marketing got a good and so on so identity information we can actually cover with private and public key keys so that means instead of university or the name of the owner we can imagine that we actually only write the public keys so that means the public key of the university and the public key of the owner and we can also put a message so the university to check the university that the university really has the Diplom the university can actually put a letter a cryptographic letter with his private key and that's the Diplom and if there is a test if there is a verification then practically the test what the test can look at he actually gets a Diplom where practically there is no identity information I mean no classical identity information not necessarily a name or a university name but two public keys but then what the test can do to verify this Diplom he can practically see if the signature of the university is really compatible with the public key in the Diplom that's one thing second, he can ask for a additional signature from the Basizer and if the Basizer can really write cryptography that with his private key then the Basizer can practically confirm that he has the private key that means he really has the public key that's one thing and this verification process can be improved somehow with this central data savings this central data savings is of course the blockchain so that's a blockchain solution here of course we can't write the Diplom into the blockchain unfortunately it doesn't work first then second it's not really practically regarding the private sphere or the private sphere so that's not practically writing the Diplom into the blockchain but what we can do we can write some information so for example we can create a hash value of our Diplom of our certificate and we can write this hash value into the blockchain so that means the proof can with the help of this information with the hash value really verify that the Diplom that is shown is valid so that means it's the same thing which is shared by the university so there is no such thing that for example the city of Mathe I wrote the document wrong Mathe wrote it wrong the other thing which can still be done here regarding the blockchain we can we can't write private data into the blockchain because of GDP which is possible if it is such a company data for example we can write data or register data regarding the university so that means the university can make an entry into the blockchain that it is the university and then this public key belongs to this university something like that is possible and that has no problem with GDPR as far as I know so that means that the proof with the verification process can really determine whether the public key exists and then the public key really belongs to the university and that is the common idea for overvaluable certificate and I talked about Diplom but then that can of course be a lot of other certificates so this relatively compact process I wouldn't say it's easy it can also be with Führerschein certificate or simply if we want to use it on an online service and then the main idea is really regarding identity exhibition, register and proof we use a key pair private and public key and then public key are our identities to say blockchain is just a part of the whole system blockchain is for data storage I would guarantee the data consistency for example with hash values or with public key and that is the common idea here I mean of course the common idea is simply the things are always a bit more difficult and then I would show some things that are still more difficult to have other ideas we can't go very deep because it takes weeks regarding the mathematical things so the mathematical things are really complicated but what is even more important with this testable certificate is a cryptographic process that means it's a cryptographic protocol and with a test it's really a cryptographic guarantee that the certificate or that the certificate cryptographically correct cryptographically good so another term that is the so decentralized identifier so so far we have talked about that we practically use key pairs private and public key pairs it was an easy version normally we don't use the key pairs but based on the key pairs there is such a decentralized identifier that the key pairs still use metadata it's a bit similar to for example the X509 certificate from PKI the thing also has key pairs the data the idea works a bit different and actually has more metadata the other idea is the so called identity wallet so the question is of course how we can use such an identity system and then the main idea is that we have identity wallet identity wallet is something similar to for example a cryptographic wallet in a cryptographic wallet we actually only have public and private key pairs otherwise not in an identity wallet we don't only have the key pairs but first of all we have a lot of these ideas so these ideas are already key pairs with further metadata then we also have different certificates so we have various certificates and we can have more cryptographic materials and everything is saved in this identity wallet what is maybe important to note here so if I have such a wallet then it is configurable how I use it for example we can imagine that a DID is practically an identity and as a person as a person can actually have more than one identity so more than one DID it is configurable so we can imagine that for example I want to use a DID only for social media for Facebook and Twitter but I have a completely different DID for example for bank services and then I have a completely different DID if I use it with the government or if I want to use it with the government and as I said it is configurable so we can imagine that also for social media I can configure it that is a DID for Facebook a DID for Twitter a DID for a separate DID for Instagram and they are absolutely independent from each other they cannot be connected but if I want to configure it or if I want to use it then I can actually have a DID so I can say that if I want to do that then I can have a DID for every social media for my banking service exactly so as I said it is configurable the second thing can also be configured like a crypto management wallet so we can imagine that I have such an identity wallet on my phone I can have such an identity wallet on my laptop on my computer and I can even have such an identity wallet as a backup for example and which information or which certificates are actually saved that is configurable so I can say on my mobile phone I have a reliable certificate which is my driver's license but otherwise not on my laptop I have both my driver's license and my diploma and if I want to have then it can be synchronized then it is synchronized from the identity wallet from my laptop from my mobile phone and then I have my diploma on my mobile phone and then, for example, when it comes to my job interview and so on on the next slide I have an example for a DID Decentral Identification it is the public key here and then as I said there are a lot of meta-information here it is actually a JSON document and I hope at the moment there will be a problem but then I will continue so now continue that was my network problem so I hope that was the only problem that was only 10 seconds so I still have an idea maybe it was even a bit clear such a application has a relatively good privacy property so my diploma here is actually public on the blockchain the blockchain only has a blockchain in between I will show you my diploma I will show you but it seems so here it has practically only money so that means my certificate is not public my certificate is for the exhibition for the owner and also for the exam otherwise I will not be able to see that my network again had a problem but I hope I will continue so where I was that my diploma was only for the exhibition and it is good that the blockchain with the current and this thing can also be improved and with very new proof and selective information distribution we are already a bit of a typographic thing but for example I will show you I have my certificate and then I want to show it and then someone has to verify that I am already 18 years old 18 years old but I want to do that information is distributed so that means that the certificate only contains one information that I am already more than 18 years old sorry hopefully now it works further I had no luck at the moment with my work that means with very new proof and selective information distribution we can have more private sphere settings so that was so far and I hope my network works for the next 10 minutes we have a few platforms regarding blockchain identity solutions because we are in the middle of it I would like to summarize Hyperledger on a slide Hyperledger is a non-profit organization it is also a Linux foundation project controlled by European source projects and then it is actually an incubator as practically a regular project mainly for consortium blockchain projects there are already some exceptions such as Besu and as I said it is an incubator so that means several sometimes independent and contested projects are incubated if we go to this side then we can already see what is Hyperledger and they are the Hyperledger projects they are for example Hyperledger Fepdix selbst probably the most famous Hyperledger project is just a piece here and even Hyperledger has several identity solutions even four we have here Hyperledger Indi Hyperledger Indi is an identity blockchain so what we can do with Hyperledger we can register the identity information we can write the hash values we can write for example that a public key for example for a university and so on we also have Hyperledger Iris Hyperledger Iris is a solution to save and transfer and so on to save and so on to transfer and so on maybe a hint here such blockchain and identity solutions blockchain is just a part and then what can be really complicated the other part where we practically with one of the transfer distribution distribution so that they can communicate and so on and so on and so on Hyperledger Iris now we have here Hyperledger Urso Hyperledger Urso is a cryptographic library practically not only for identity solutions but also for further Hyperledger projects and then for the first word it is actually so much I know currently only used by Iris and Indi but in the future maybe somewhere else and then we have a new project Hyperledger Anon Creed it is also a framework for such available certificates we actually have quite a lot of such blockchain and identity things or frameworks for example just to notice so it is probably the biggest problem for me so much I know sometimes used by Hyperledger Indi or something like that and then maybe another slide what is exciting is a big topic there are also such initiatives on the European Union level that is the European self-sovereign identity system European self-sovereign infrastructure it is actually a very outstanding service first for public applications currently not for public applications but sometimes there are opportunities for companies and one of the flagship of this European blockchain service infrastructure is the European self-sovereign identity framework what is maybe even exciting is a new kind of regulation and then with this regulation it will also be possible to use such systems not only technically but also legally I have a demo which I will show if anyone actually has time, you can watch it it is an UPU you just don't need a technical I have a slide about practically to say what you can do here with a mobile phone with this side you have to download an UPU identity wallet and then you will get a lot of such services first you need a city ID city ID is like a personal ID you will get from Newport and then when you have this personal ID it is a transferable certificate on your mobile phone in the identity wallet then you can get a diploma for example when you get a diploma it looks like you want to have a personal ID as a transferable certificate and then you get a diploma as a transferable certificate then you can also get a year membership for a museum a transferable certificate as a personal ID as a city ID if you have that then you can ask such a year membership for a museum that will be a transferable certificate on your mobile phone and when you have a museum for example it can be checked if it really is valid, I mean cryptographically valid and then you get a year membership for a museum one example is still sick even more complicated and here you already need a city ID which is a transferable certificate from Newport and then you still need a worker certificate that is also a transferable certificate what you can have on your mobile phone and then when both can be checked then you get a transferable certificate and then the transferable certificate will also be a transferable certificate so this is a good demo and then I think I changed my presentation in the middle we had about 2 minutes because of my network connection but then I hope that the rest was good and understandable so then that was my presentation and then I would say if someone has such questions or discussion points then I would like to try to answer also in chat chat is right in front of me so I would say if anyone has a question was I on the one hand so good that everyone was understandable or was I so bad that no one understood anything that is also of course not too practical but then if no one has a question or no one has a discussion point then I would like to thank the participants and then next year I have another lecture in English that will be deep technical and about hypergeo-fabric but otherwise would be a proposal then maybe we will try again next year to have something in German maybe maybe I will show that it would be nice to bring a bit back to life maybe even I will get something next year that is somewhere I mean probably like Munich or Vienna then it will probably be exciting but then I have to say for this year was a German presentation and then we will continue next year and if anyone has any interest about hypergeo-fabric a pretty technical presentation then thank you very much for the participation and I wish for everyone a nice, nice event