 It's great to be with you this morning. So I thought I'd start at the beginning. I began, I founded the internet identity workshop with some colleagues in 2005, and we are still convening. We began meeting, really asking this question, how can individuals own their own digital identifiers? How can we get out from being underneath the platforms that we're interacting with? Just a username and password, or now more recently, you have these intermediaries, like Google and Facebook, that you're using to log into various things. And then if you got yourself your own identifier, how do you actually prove meaningful things about yourself using them? And the good news is, after 15 years of convening, we've gotten somewhere. Our next one's actually happening next week, and you're all invited, of course. And we've, there's a whole set of open standards around self sovereign identity that have emerged. And I'm going to touch on them really briefly. And then at the core of them is this, the decentralized identifier. And it's an identifier that individuals themselves create, along with a public key and a private key. And they can post them to ledgers. And there's lots you can read online about the technical details. And I'm not going to go into them now. There's not enough time. But I invite you to explore them. And conceptually, at the top, you have identifier owners. Then you have the next layer. Individuals have digital tools that work on their behalf. So at the core of this is a wallet that they would probably carry on a smartphone. And then next you have what is happening in the cloud. So that individuals will have agents that are cloud-based that are connected to their wallet. And these are also under their control. And the vision for these is they act much more like a bank does today. We go and we put our money in a bank. And the bank helps us do things with our money. And it put it still our money. We go back to the bank and go, I want my money. I'm going to take it to the other bank. The same should be true with our data. It shouldn't break down if we choose to change service providers and those that are acting on our behalf with it. And then next you have, as has been mentioned, the shared ledger distributed ledger technology, of which there are quite a few different folks. Sovereign is one that's been named here already that are supporting this. And it's really a routing infrastructure. There isn't very much information stored on these in the distributed ledger. It's really a way to go find and connect between agent to agent for individuals and to connect using public key infrastructure. And the other thing that you can do with this is verifiable credentials to support the movement of attestations, credentials, claims, however you want to call it, from institutions to individuals. So where do these verifiable credentials come from? And one source is registries. And this is what I'm really grateful for Mike's work is kind of to go, oh, right, OK. That's one way to look at them. And I spent the last two years at UT Austin in our new Masters of Science in Identity Management program. And I'll tell you a little bit of the story and then I'll walk through what we have. In that program, we were in a cohort of 12 folks. And we would get new teachers, right? This happens in a cohort program. And we kept talking about identity as if it was one really big thing. And I was like, wait a second. There's different forms of identity in different places. And we need to have a framework to think clearly about it. And so this is actually part of Mike's paper. So what are the different places that PII, personally identifiable information, ends up in databases? And this is the anchor for how I thought about dividing up the world of identity into some manageable chunks. And so at the core, at the top of this, is me and my identity. And this is the place where I, as an individual, collect and manage and store my own information. And we have several varieties. User-centric digital identity, this is what the folks I've been supporting, convening at the IIW have been working on for a long time. There's the indie web efforts. Folks have been working on these challenges. In that context, you have the quantified self-movement, which is all these tracking and all sorts of tools for people to manage and track their own information. And now this new kid on the identity block, the self-sovereign identity work. So this is me and my identity. Next is a category that often gets overlooked. But how do elders, children, folks with disabilities, and others manage their identity? They do it with folks acting on their behalf. So you have you and my identity or delegated relationships that we need to have accountability in the systems to support folks who aren't managing their own identities, having others do it on their behalf, but in a way that means they're not giving away their credentials, that there's accountability. So these are the sources for data and identity information in the next 12 domains. And we're going to step through them. So the first one is government registration. And there's two forms, really. There's primary registration, which is done by parents on behalf of their children. This is when you register your child's birth at the county level. And now, more recently, also with the federal government to get the issuance of the Social Security Number. And then also, secondary registration is all the registrations you do after that. Often yourself, using those primary documents to get a driver's license, to get a passport, all kinds of different things need you to get another identity issued to you by various governments. And all of these systems and processes are very recent inventions. Most of them are less than 100 years old. And there is a loop that happens, actually, where modern states came into being, in part because they went out and registered their citizens who then thought to themselves, I'm part of this thing called the state. So it actually forms a recursive loop in terms of people's sense of identity when these processes are put in place. And this is a map from Mia Harbets, whose work is in the CRBS space, Civil Registration of Vital Statistics, about what happens when you have effective civil registration in terms of enabling a holistic picture of its impact on society. Next, you have government transactions. And this is where you show up with the documents you had in step one, which is getting registered, and you go and use them to do things, actually. And this is actually where you find a bunch of registries. You can't register your car unless you have a driver's license in which to make the connection. And when you do land transactions that are recorded by the government, they ask you to present government-issued ID, right? Next, we have civil society. This is a whole cluster of organizations I put together for the purposes of this, which is organizations which you have an ongoing relationship. And that are providing not just commercial transactions, but health, education, many other things. And all of these institutions have a registration process and some sort of issuance of credentials that you represent when you show up to ask for those services. And you present the credentials you got through the registration process, and you're able to transact to get those services. And this is also a place where we find, ta-da, a registry. Professional licensing often happens in these types of institutions, right? This is another registry. You have commercial registration. This is where you sign up to get loyalty, a loyalty points or a customer number with a service provider. And then when you present, you show up, you share whatever it was you got in the registration process along with payment and you get our goods and services. Next, you have employment registration. This is where individuals are applying for jobs, sharing information about who they are. Once they're offered a job and it's accepted, they're enrolled into the enterprise systems and they get a credential and they present that credential to do work and in return they're paid for that work, right? So this next category of where we end up with PII and databases is surveillance. And in my research, there were three main kinds, voluntary known, involuntary known and involuntary unknown. And this happens across all of the contexts that I've already gone through. So you have government surveillance happening. Of all three types, you have civil society surveillance. So this is like CCTV cameras going to school or various ways that people are being tracked. A lot of it's voluntary. I put on some sort of health monitor and it's going back to my doctor. I understand that's happening and I'm choosing it. And then you have commercial surveillance and finally employment surveillance. So this is where, this is really old. Taylorism is not new. So those are the next 12 domains. And then finally you have the data broker industry that's pulling data from all of the above context, public data, data from commercial entities, compiling it into digital dossiers and reselling it to government in the commercial sector. And then finally all of these domains are subject to attacks on the black market, both by state actors and criminals. And this data is being spread around in that way. So there you have the domains of identity. Now, I want to quickly tie it all back together and be like, how do we actually, if you notice in all these little diagrams, there's the person. And what if we put the person at the center? Using, going back to SSI, using their wallet and their cloud agent that they could collect the credentials that they get from government and then reuse them when they show up on the door of government to do transactions. They can collect credentials from their civil society, institutional engagement, their professional licenses, their number from the Water Polo Association, all kinds of credentials in digital form. And when they use them, it's really easy for them. There are employment registration credentials that the credential proof that where they're employed and use those in a much more secure way to even log into those systems of the enterprise. And then commercial registration, all their loyalty cards and points, et cetera, and use them. So self-savarin identity is what sits in the middle enabling individuals to manage all these different relationships in a way that is significantly less complex than each of those institutions needing to have a business relationship with each other to see those credentials. So we are really seeing the emergence of a new layer of the internet for people, I believe, layer eight on top of the one we have right now. And I want to close with this quote, protocol is a language that regulates flow, direct net space, codes relationships, and connect life forms. It's etiquette for autonomous agent. And these are the new set of protocols to really enable us as people to connect to one another and connect to organizations. And I'll leave you with this to get to this future. We need to coordinate the development of common building blocks, code, infrastructure and protocol. We must ship interoperable products and we need to work towards alignment and control. So with that, thank you and look forward to the panel.