 YouTube. Okay, you're all set. The live stream is up and I'll set you as host. Okay, so just let me see here. Okay, now we are live. So David, we are start here. Oh Yeah, you're welcome to start. Yeah. Yeah. Okay, and do you start? Unfortunately, you're talking in the important so anything else that you can Call me and Okay, so it's Important to do two quick placements now that we're officially starting, which are the policies of the hyper ledger In anti-trust issues. So it's important to have Consciousness of our policy of anti-trust and also of our code of conduct Where we conduct when we conduct all our sessions and all our activities So made this this rescue I would like to invite everyone who is still not part of the chapter of Brazil, the hyper ledger That they sign up, do a part of the community, we have done A work, me and Marcos, we have done a work from this year to conduct this group, which is a super engaged group So who else is interested in participating, it will always be very welcome. On the second Friday of the ninth day, Marcos will be conducting Inclusive an event where I will be following him as well About what is the hyper ledger As it was last year that we can wait for next year. Okay, Marcos, before we move on to For Fernando, would you like to make some placement? Thank you for the presence, especially here from Fernando, which will pass on such an important theme for us Part of identification here, something that has been a challenge in both the social part and the technological part And show how hyper ledger technologies can help at this point. Okay, so once again I would like to thank everyone For now, for our presenter Fernando Marino Thank you Marcos, thank you Rana Teixeira, I would like to thank everyone who is here tonight For us to talk about digital decentralization identity, it is very stimulating, we are already here with 20 people in the room Who are being joined here on a Tuesday after 19 hours to talk about decentralization identity Very cool, and a special thanks to Marcos Sáez who made the invitation for this, for this participation Thank you very much for the opportunity to talk here, guys Well, I'm going to share my screen now with you, that good question about post-pandemic You are coming to my screen Okay, cool So let's go there, well, first of all I am Fernando Marino, I am the technical leader of the blockchain and cpqd solutions I don't know if you are just seeing a slide, the zoom is not even taking it Great Okay, so the technical leader of the blockchain and cpqd solutions I have been in cpqd since 2014 In 2016 I had my first contact with blockchain in cpqd It was the first time I played in GoKo, Hyperledger Fabric in version 0.6 I was a great learner, I would say And I always had the opportunity to work with new solutions, new Hyperledger tools From 2018 I started researching, studying applications for the Hyperledger frameworks Hyperledger, first Wind, after Wind Aeres and after Hyperledger Aeres and Ursa We will see more in the future how these three frameworks, these three projects of Hyperledger fit for us to develop digital identity solutions Digital identity, more specifically Agenda, well, let's start talking about digital identity We have to talk quickly about the concept of digital identity Then we will focus on the concept of digital identity of Soberana And within Soberana's digital identity some new things arise Some new words start to arise, for example, agents Which is a key part, it is fundamental for us to understand how this Soberana works Then I will quickly talk about some initiatives And then I will show how it works The macro-architecture of a solution based on digital identity Decentralized with Hyperledger Indy, Ares and Ursa Well, let's go, then, about digital identity There is no way to start talking about digital identity without questioning what is identity First of all, what is identity? Identity are our attributes What we identify with Like birth information, credit history, health registration Father's name, mother's name This type of information These information are considered the attributes of your identity They are our relationships From who is your friend, who is your brother, who is your son From the city I was born What is the relationship like business and private They are also our agents They are our applications that we use They are our devices, our cell phones Our wearables Our agents that represent us For example, our lawyers For those of us who we pass some search And can represent us Our parents, while we have no humanity We are the greatest of age And they represent us, for example, together with schools So our identity It is basically composed of attributes, relationships and agents In digital identity You are your data Because these data that you have in the digital world They compose this identity They compose your attribute They compose your relationships With whom you have connections And they also compose What are the agents that you have From your devices, applications, accounts That you have there How does it work in the physical world? In the physical world, when I want to identify I open my wallet, I take a credential For example, an RG, a CNH I present it to a verifier This verifier takes the CNH Identifies the signals, the symbols The role, it can identify That it is a valid identity, not a verified one It can look at a photo there It goes to comparison, it sees that the identity is mine And it can infer the data that is there Like the name, birth date and so on In the digital world, a little different Because who does this validation of the identity Is not a person, they are machines The digital identity works from one machine to another So they are servers that they can recover secrets Information that you have To identify and identify yourself in the digital world In the centralized identity That is the model that we have You do not actually have this identity It is very important to say this When we are talking about the other side It is talking about control In the centralized identity You do not have this identity Instead of you having this identity In the site, it is an application The service that you are using He who has this identity in his database There is a probability of fraud Invasion of privacy, database As we have seen Recurrently happen The identity is managed in signals This is a problem, because when you put A number of hundreds of thousands Of identities And when you think about the encampments There are millions of identities Recently, these signals end up Making reasons of desire for hackers And they end up investing in attacks It is important to highlight that these attacks are expensive You do an attack on top of a signal Digital identity is not a cheap thing It has a high cost This is done because it compensates Because after the city is sold They are sold on the internet Outside the dark web, etc The number of users of hundreds Are spread by hundreds of apps There is a problem of usability Because we have to do a management Of several users of hundreds With several records and data Replicated in several sites And consequently I think everyone here has a strong sign A different sign for each user But no We end up seeing the weak signs Being created, which are possible With these data and accounts That are used Centralized companies End up making a bad use Of this identity End up making processes And selling data Selling information generated From these processes Without the user's consent So here to show a little The history of the internet How the identity was developed on the internet To start the internet was born Without a native layer of identity There is no native layer of identity All the services were created For people on the internet That they had to create Their own identification signs So you have here For example Iconos Health services Each of these services with which The user relates He will have to create a register Make a registration And have to manage users For each of these services with which He wants to interact With the famous Identity Provider Which has evolved a lot Has improved a lot Because now this guy here Has only one identity With one strong identity For example Google or Facebook And using that access option With Google, access and Facebook He can access several of these services With a single register and a single user Has improved a lot Of the user's point of view Of the hundreds of users And records that I had to keep Updated and decorating the password Now I have one or two, at the maximum Three, however, here we had Signs with tens of thousands Or hundreds of thousands of data Of personal information records Now we are in the billions And when this goes It goes to the millions How it happened with Google Plus Which was a community that didn't have So many members like that With Google Plus, it was a data leak And Google finally broke That social network So it's serious And now we have a lot of Considered, the final evolution Of digital identity It's the sovereign identity It's the natural evolution And for the first time The user is in control of his identity Because his identity, his credentials His register are with him On his post, on his digital wallet And he defines with who And when he will share So it was the first identity That actually put the user In the center of his identity It was a great advance Ok, let's talk specifically About the principles of this sovereign identity The principle of this sovereign identity Is about existence It has to exist this identity It's a sovereign identity Why people say it's a sovereign? Why do you start with the user The only one for him He creates the decentralized identifier In his digital wallet And from there He establishes connections with other agents That we will talk about in a little bit And he starts to receive information And generate these information And inherit it in his digital wallet Ok, so then his existence begins Control, that consists of the user Control his identity With who he is sharing his data Who is accessing his data Who keeps this consent He controls or accesses his information Access to be able to access These information Transparency No one is accessing their information And processing these information without you knowing Persistence, this is very cool This part of persistence, why? Because today I have an identity I have a register here on the A site If this A site falls and falls I will lose it, I don't have this information At that time, I will believe in it Not here, ok? And it generated a verifiable credential It sent a digital certificate For me here Even if the faculty fails I will continue with this certificate And this certificate will continue to be valid And passive of use in this ecosystem There is still no more faculty Portability, which means That this identity is portable So the user has the power To use another application To use this identity with another service With another solution This is very cool Both from the user's point of view And from the institution's point of view Because this creates the possibility Of bringing your own identity What does this mean? Instead of you having to register To be able to access an e-commerce To be able to access an air passage You bring your identity With the requirements of that service That you want to consume And you don't need to register It's very good from the user's point of view Because every time you open a form For the user to fill It's a friction It's a lost purchase It's a non-made business It's a more satisfied user Interoperability, which means That you can use different systems Consentment, everything runs Around the user's consent No information is needed No processed information If there is no consent Minimization is very cool I don't need to identify I don't need to identify for anyone I go to a restaurant I take my table to a restaurant I make the signal For those who are waiting My colleague sits with me We have dinner The only identification I have Is when I pay with a credit card My credit card is an identifier That I have with the Mastercard Or the Visa That allows me to pay We get used To use the password To register and register We get used to it Because it's not a natural way To minimize the identity The decentralized identity Preconises for that For you to have a minimum of friction You can act in the digital world In a more similar way With which you act in the real world And protection A lot of protection Here, it loses a little This incentive Because you distributed Decentralize your information Instead of being located in the silos That are reasons of desire Now they are spread to thousands Sometimes even millions of digital cards That only have one identity And the security technology Above this wallet Is as big as the one in the seal In terms of cryptography and security And the effort for the hacker To do that Of course, there are people who are exposed That eventually make sense They make an isolated attack But not in general Some characteristics Decentralized There is no central authority So it's very important It is based on blockchain technology Centered on the user Elevated security levels As I said And compatible with GDPR and LGPD It is important for different contexts As I said earlier The Big Iron Identity Low maintenance cost And considered the identity layer Of the internet that was not designed in its origin So this is the interesting part You leave it here You have a layer based on blockchain That you can use to identify An interesting case How does it work? It's the triangle of trust Why the triangle of trust? Because you have an emitter The verifier does not trust the person It has a relationship with the emitter It trusts the emitter And the emitter emits a credential For the person When it emits a credential for the person This credential is stored in the person's device In the digital wallet of this person That usually is in the mobile device On the cell phone But it needs to be on the cell phone? No, it can be in the cloud But in general it stays in the mobile device When it presents this credential to the verifier When it presents this credential to the verifier There is a concept here that we saw Quickly that the verifier is decentralized As if it were a switch of keys Like WhatsApp that happens between these pairs That the verifier can verify That this credential was actually Emitted to this person that he is Relating with what he is talking about And to verify Who emitted this credential And if the data and information Of this credential are ok He does not need to integrate with the emitter Instead of that He consults the blockchain network And in the blockchain network he will be able to Find the public key That is called the verifier Of the emitter and he will be able to verify All the items that are in this document All the data that is in this document That first they were actually emitted For this person For this third emitter And that besides that None of the data was corrupted Without any data being in the blockchain We will see that later There is no hash What goes in the blockchain What does not go in the blockchain Let's start from there, what does not go in the blockchain There will be no personal data But hash is a personal data And it is not in the blockchain Private decentralized identifiers Remember that identifier that the person created That the person created Not the emitter created That decentralized identifier I think some of you have already heard about DID Talk about DID since the beginning Of the year 2000 As if it were a link of the RL Which is generated through a new type Of typography called BLS Signature Can do Super short and precise And also With the chance Of not generating new hash Forgetting the name of this procedure So good compared to the SHAQ 112 And we were trying to find A use for DID Here it fell with a glove But there is no DID of private That the person created to identify Is only in the digital wallet Of this person Regists of consent Or emissions or validation of credentials They do not stay in the blockchain And what goes in the blockchain Public decentralized identifiers And it is the endpoints of our emitters What do we miss? Calm down, get there Of data and definitions of credentials This needs to be But not the data of the credentials, but its structure The schema of the data bank Of this credentials is in the blockchain Because we are talking about metadata So the verifiers They will need to assemble these credentials When they are presented For them, the credentials that were emitted And registration of the credentials But not the registration of the credentials You cannot get to the credentials This is very interesting It is just a mathematical proof That the credentials were revealed In a file That is synchronized in the blockchain A Teio file That is synchronized in the ledger This is very cool, because if the credentials Were exposed, it won For some reason, it was revealed Because you stopped being part of the company For example, you stopped being a police Something like that A proof of that And when you use this credentials In your name The verifier will be able to see that it was revealed And the validation will fail Here is a very cool part That are the current challenges The benefits that the digital identity Of sovereignty has The current challenges are the New York customer You have a great challenge Of self-care in the New York customer That also controls money laundering They are expensive, delayed processes The decentralized identity helps a lot Because you can, in a reliable and fast way Bring reliable information about you For the verifiers Limited control over data laundering As I said, my cat wants to participate In the live chat This is also useful for the patch We already talked about Limited control over data laundering Dependence of trust in third parties As certification authorities And central authorities For you to have this confidence About the verification of certifications High responsibility to protect the data Of the user And the only flaw Benefits, individuals have Personal data Verified by several different parts So you have Various parts verifying and confirming For example, I am Fernando I have cartons, I have universities I have health plans, doctors That are proving that I am Fernando And personally interact with me So you begin to put more trust Above this identity But you don't have confidential data And the ability To improve conformity, resilience And interoperability Because this is still a difficulty I took the data from one place and took it to another Now that we are talking about Paybank To be able to put the data From one to another Centralized identity puts this as a protocol About standardization For all this interoperability There is a lot of standardization Behind We are not talking about platform We are talking about protocol And having this identity With a protocol This protocol has the standardization About what is a verified credential These types of certifications And who is doing it Who does it, just a second One minute If there is an animal that is temperamental It is a cat And it has all the standardization Above it, for W3C It has a specific protocol For you to make authentication Decentralized identifiers That is, make a password authentication By Diff Decentralized identity foundation Together with ITF The KMS Is a process of Decentralized Management system That is for you to make decentralization Of keys that are made To make Decentralized management And the types of Decentralized identifiers That are also for W3C They are the same guys that are behind OpenID And of many other protocols Of the past digital identity Besides that, there is a very cool guy Who was born in Hyperledger And today has become a protocol A separate foundation That is Trust Over IP The TOIP Is about governance Of solutions based on Decentralized identity There are two verticals One is for you talking about Governance of applications And another is about technologies It is divided into four layers From the technological part Of The tools Of use in general With, for example, the Decentralized identifiers And the blockchain That is here in this layer That is the communication layer That I dedicated That is the whole protocol Of key changes To be able to establish a connection Between two devices A cryptographic connection Don't replace TLS Before I asked It runs on top of TLS On top of TLS, there is one more Cryptographic layer That is dedicated You send me data The protocol changes data Via verifiable credentials Respecting the triangle of trust Of our conversations The user, the user And the user's own port And the application Of Decentralized Identity We will talk a little bit about that Sooner or later We have four types of agent We have the agents of people That are usually represented by Mobile Edge Agent That is the layer For mobile devices Usually here that is the digital wallet Here that is the agent of the physical people Then we have the institutional agents That are the agents of the legal people Of the organizations Both organizations There are two types Both the institutional agent Emissor and the institutional agent Verifier And you can have the manager that is the verifier And the verifier that only makes verifications You have the Cloud Agent That is a very interesting agent That has several functions One of them is to make the mediation Between the mobile device And the institutional agent Why? Because the mobile device does not have A persistent endpoint In addition to not having a persistent endpoint It can turn off Stay covered It has a lot of problems It does not have high availability So for you to guarantee the messages Of this guy If you give it to this guy You have this intermediary And then you have the Hub Agent The Hub Agent has an evolution Of the Cloud Agent But in addition to making the message It also has a verification credential So the protocol is very cool for this to happen Because all the credentials and data That are stored in the Hub They are stored cryptographed And the cryptography occurs here In the mobile agent's layer To make things cryptographed This guy makes a key exchange With this guy who receives an access token That allows him to access the data Inside the Hub Agent He sends it here to the Hub Agent Access the credential that was Explored by the Mobile Agent Receives the data cryptographed Take the key that was exchanged here With the Mobile Agent and cryptographed Inside his wallet So it is very safe to guarantee privacy But if you pass this data cryptographed The data is leaked So, a little attention Some initiatives We have a lot of initiatives Rolling around in the world at this moment You have the European Group Of the Observatory Blockchain Creating A decentralized identity service You have the Catalan Government That is not there together Making its own decentralized identity Also You have India talking about Decentralized identity You have private initiatives Like Evernon A great partner of Hyperledger Those guys who helped develop a lot of things Daniel Hardman A great architect And Evernon He wrote a lot of things About Hyperledger India and Aeres Atrinski, who made a very cool platform For decentralized identity We will talk a little bit more about her She is a network for identity Since 2018 We have developed Prototypes, MVPs, Autosuberana Here in CPCD We have developed and concluded Five Autosuberana identity projects One of them, very famous Was the FINID We developed in LIFT A technology innovation laboratory From the central bank Which is the financial passport You create a digital wallet From the financial identity That you want to interact with You simply present the passport You automatically create a account And you interact with that bank So you have an affordable financial identity The RECONIDI That was an application made on the FINIDI To make consent records For access to open bank data That was also made in LIFT This one was LIFT 2019 This one was LIFT 2020 This was very cool Because it is a very cheap digital signature Then you will have The PRODID Digital identity of the Rural Product Rural Product It has to have several certificates To prove that it is creating a place Without being a place of destruction Without being a place of Environmental reserve There is no slave market All this is physical The guys spend a lot of time Proving that they are certified That they can sell their commodities And the digital identity facilitates this process Along with the verifiers Which are the figurative Organs and taxis And even the supermarket And why not the consumer The GOVEDI That was a POC that we did With the Ministry of Economy That we did with the Ministry of Economy Internally That simulated the digital identity Of the citizen Of the time That is the simple recipe Of the medical and the patient These projects were done With several partners Cf3, CwConnect To test the focus That we validate the concept of digital identity In these areas of government Financial sector The agronegócio And the medical Test the utility Of the value and identity This is very interesting We are talking about emerging technologies Aeres That we talked about She won the 0.6 version That was a great update And was active last month So the project ended up being active Since 2018 We were using some components That were still incubated And they were only active when they matured In terms of technology, code and community That happened with Indy and Aeres Sovrim is very cool The analogy that I make with Sovrim You have the Bitcoin network You have Retire for smart contracts And you have a network For self sovereign identity So in a public network Permissioned What does that mean? That our validators They are Permissioned You have to trust yourself To be the new validator And all the technical requirements To be the new validator Sovrim is the new validator The only one active today in Brazil Is the CPD node And you But it is public Because anyone can synchronize the ledger You can access the ledger And you can check the ledger That's why it's public Permissioned And it's very cool Because you can create A network that uses Indy's protocol Ok Now, ok The perfect match To make a self sovereign identity solution You will need a blockchain One of the blockchain That has Implementation Of cryptography And the necessary functions To make the definition of a credential That each one is in the scheme You have to enable To register A public decentralized identifier Of an emissor Indy Indy's protocol That is active Has all the features To make a self sovereign identity But it is important That it doesn't have For smart contracts Only focused For self sovereign identity Aeres Even more than a biotech A very powerful component To create your agent Because before you had to take your agent And take some SDKs That left you a level of cryptography To make a credential To establish a connection To make a key exchange And make all this messages Obedece this self sovereign identity protocol Aeres betrayed all this concept And gives you some functions ready To create a connection invitation To be able to make a credential To verify a credential To request the proof of a credential To give you these functions ready And allow you to be more focused In the business layer And the Ursa The Ursa is a very cool project From Hyperledger That a cryptographic library Is implemented the functions Of cryptography like CL Signature That is a signature pattern That you make For the ZeranoledgementProof That you make a proof of zero The BLS Signature That you make your decentralized identifiers So all these implementations Are inside the Ursa And Aeres is already using the Ursa She is using the Ursa to do this So when you have the Ursa Aeres and Indy You can focus more on the business layer The logic layer Transactions So here is a conceptual model That is a decentralized identity You have three layers The first one is a very technological layer It is technology I refer to cryptography Consensus Blockchain That is the protocol layer Where they are The second layer is the agents You will have the agent, verifier The emitter, the folder The emitter, the verifier, the folder There is no digital folder It is an archive That you can store Secure information That is cryptographed Inside your device But it is an archive that you open and close And you keep the information there And the files inside That with a wallet There are keys and credentials And finally You have the application layer With the logic layer Where you make the transactions Or what you are trying to propose An education area, a college Here you put your verification policies What do you want to verify What is mandatory, what is facultative You submit transactions, execute You have your data storage Renewed to the processing of this information You have information results Emission policies What is the error? What is the verification policy? What is the emitter policy? This is the interesting part Note that in the most technological layer You have the Indie and the URSA The Indie implements all the Red Blockchain protocol The consensus, the full consensus That is a variant of the Byzantine consensus The URSA implements the cryptographic functions And the Aeres That is our abstraction layer That is our library That allows us to So there is not much technology But focus more on the business And above all All this You have governance frameworks For example, the trust over IP That came out of an RFC 289 From the Rappledger Aeres group Ok That's it I had to introduce to you A quick presentation It is very extensive We have a workgroup Within the chapter Brazil That we are going to activate this year And this meeting And this group I invite all of you to participate In this meeting On the wiki of the Rappledger I invite you to participate And we will discuss more Because I know it is a very extensive topic There are many things The idea was to make you curious So you can learn more And participate more in this community Ok, thank you Very good I want to say so much detail What I see We have all this rain The rain The incubator The hyperledger With so many options for us And the CPCD using several of them In this process We ask here For those who have any questions Some question for Fernando Please write here on the channel We will start A practical question In relation to LGPD Some of the largest companies In the world They live to donate Systems and products For users In exchange they end up Using the information Of these users And of course Because of this the laws LGPD and DPR And Autosoberana Can bring advantages Or even disadvantages In this process Great, great question Marcos Very good There is a very strong connection In LGPD and DPR With Autosoberana's identity First of all In my opinion Autosoberana's identity is a little above LGPD When you implement that Interoperability You have it beyond LGPD Because to begin Autosoberana's identity It does not have the obstacles That you can find in LGPD It is for everyone the same So it is a very elegant way That you can leave Your company with LGPD However You as a verifier You as an emitter That ends up having access to your personal data So you can make a verification By controlling everything carefully That the security of the information That the good practices of LGPD Bring with these data Amazinate them correctly In a anonymized way Preferably in a separate base Of the other data That you have from the company Or from other cadastres So if you do not have an ID While a verifier or an emitter You will deal with these data But from the user's perspective He must have control He must have a feeling That he can have his existence While a person who has personal data You can understand In a very clear and objective way Very good I will start with the first question Here Of André Fernandes That put here in the group About the FNAID Was something that the financial system Is already experimenting Well, FNAID He came out of the lift as a POC But a lot has already evolved in FNAID André, I can not say All the things we are doing here Unfortunately with FNAID But we have talked a lot With the financial sector Demonstrated a lot Making some tests, validations Of FNAID Inside this sector That has been very promising But it is already evolving For a MVP But we are starting to validate The values he intends To bring to the system Very cool Guilherme asks me Now Fernando, do you think that a massive adoption Should start From the public sector Or private or PPP And then I add to my question If suddenly in a massive adoption You could have several edges Interoperating with each other Together with the question This is a very good part Very gratifying Because of the protocol Of the standards that are being defined With W3C And ETF Interoperability is a more viable thing So you can do this Interoperability Because at the moment you are using The same cryptographic functions The same standards for you to do this You can have a network of networks For example, a sovereign That will have the public transactions Or a government network And then you can have other smaller Networks here For example, the bank network With its customers What he needs to do To make digital signatures With that specific bank And then another network is in the other You can do this encoding Even with the Indie itself In my opinion, the PPP Is the best way Because you make a digital identity That only uses for public services It ends up not being so useful To the eyes of the common man Of the average man That the guy who also needs To authenticate in e-commerce But when you put the public sector You put a very valuable layer of trust In this network And then the private services That are passing through your identity He begins to look at this With a better perspective When he trusts more in that And this adoption of this protocol Is a simple way to achieve this Perfect Marco Jardim asks Is there any kind of cost To make us verifiers, emissaries Etc Cool, it depends A lot on the truth that you will have If you will adopt a platform To do this, you will have a service In general, there are some costs That you can find on the blockchain The blockchain network For example, let's talk about an example Of a network that is already running for more than a year In the centralized city To make a registration of a credential You pay a few dollars I think up to 50 dollars To make a definition of a credential But a definition of a credential With it, you can generate millions of credentials You have to pay nothing more for that And verify millions of credentials Of course, there is a cost of operation Generally You have a cost to do operation Of your verifier or your emissary The verifier is usually much smaller The emissary is a little bigger because of the transactions That he has to do on the blockchain network And also the responsibility that this guy has Because when he is submitting If you submit a credential that people do not trust It does not have value Because this will only start to have value When you have confidence involved in it Cool, cool Glambert is starting to study Altisloberana And he asks the question What is the difference between IDD and digital certification And what are the problems of the digital certification That the IDD treats Cool Great question, Glambert Very cool, let's go Digital certification brought great advances In the identification part But it also has some problems We have chronic problems For example Digital certification It has few verified attributes There is no, for example, my profession There is no, for example, my relationship With whom I am married There is no other information like my address The address is corrected In fact For example, my health portfolio Is not in my digital certificate And worse When these information are in your digital certificate And you use your digital certificate Everyone will know that Your digital certificate is yours The data is in the public They are available in the certificate authority Because when it was created back there This concept of privacy was not so well elaborated They were worried They were worried to create a token Who had that token In fact, that person The digital certificate So it has this limitation Both from the point of view of privacy From the point of view of flexibility You create customized certificates It is very expensive to do this I even tried in the past to create a certificate Which is a standard for that But it didn't work, it didn't go forward In addition, the digital certificate Is centralized To be able to do validation The verification of that certificate You need to consult an authorized certificate While here you have a decentralized blockchain You don't consult anyone You have an authentication Through a central organ Instead of that You consult the blockchain This is the great gain That decentralized identity Is much cheaper For you to have an idea That in Brazil we have less than 3 million Of physical people with digital certificates It worked well for legal people Not so much for physical people It didn't work Juliano makes a question Juliano, I'll leave your question to the end He asks how to interact more With this community initiative Because we here From the Hyperledger group We will also talk How to interact in the hyperledger community Brazil Moving on to Luiz Maciel He asks Why there are several identities Like Finadi and Regconadi Why there is not only one Identity developed for you Cool We are testing A very new concept Luiz, think about it Blockchain was a new thing Blockchain started with Bitcoin In 2014 There was the first smart contract implementation In 2016 the Hyperledger entered And in 2018 They started the first versions That you can do the pocs On top of the hyperledger identity We have a lot of brilliant minds Discussing The hyperledger community is privileged In this aspect We are discussing about it In the Hyperledger groups But we also need to verify The value of this identity And some singular transactions Where we are in the MVP We are taking specific things I'm testing this In an agro business For the pecuarista I'm testing this for electronic prescription I'm testing this in the financial sector For the portability of the financial sector We are in this variation It is predicted in the reports we have Read and we have had access There is a very interesting owner That he says that in the beginning This is exactly it, experimentation Digital cards for specific purposes And then an evolution for a unique passport Where you will have a unique identity But one important thing Identity is unique, but not the credentials I have a physical credential I have a ticket to the cinema A ticket to the theater I have a credential here for the company And the set of this identity Symbolizes me Identifies me as a unique person Fernando, this next one is difficult Mateus from the University of Bahia The Federal University of Bahia He gives you the parabens Considering the scenario Totally decentralized And the triangle theorem of Zoco It is impossible to guarantee everything at the same time So how to make this challenge This is a product This is a product No, this is Let's see if I can answer it How do you guarantee everything at the same time There is some You can't guarantee everything at the same time What can you do It is a very interesting thing The following When an emissor, let's say I am now an emissor I register myself as an emissor of a credential I am DETRAN I register myself as an emissor of a credential I have a cop, for example And he synchronizes this ledger In his car A small ledger For more than a billion of credentials The idea is that she gets very small He synchronizes this in his car I am going to my city of Natal I am going to Garça There is no connection When this cop stops me He will ask me to present this credential I am as a credential in my device He also has no connection When I present it to him He has the ledger synchronized Even though I have Just received the credential And he was already in an area That does not have synchronization His ledger does not have a synchronization There is no problem Because he already has information of this emissor And I can use this credential Even in these circumstances And prove that I am me That the credential was DETRAN And that everything is right with her And everything is fine Everything is fine What can happen is The DETRAN in this region Revoke my credential In fact, he will not be able to take the credential But you have several ways to mitigate this India is ready to mitigate this Very good We are getting close to our time I am going to ask two more questions So we can finish He is here Marco Jardim Marco Jardim asks This identity is decentralized Because eventually I have to pay A central entity to have the possibility To emit this identity In this network How this is so decentralized Show, ball show Then it is all decentralized That this business model As long as you pay for a credential To be issued If you will pay If the business model will be the verifier Eventually you will have to pay Because it is decentralized In this world You can't forget the emitters The emitters also have their business model Maybe they emit the credential For free There is a premium version Of this credential Depends a lot on the business model Of the seller The last question Coming directly from the YouTube live Leonardo Oliveira I have heard a lot about the Sovereign network It is a platform It is necessary to be on this network There are others like IBM and Microsoft A company can have A bank to build their own network Yes, you are here Using the Rappader Indie Sovereign is a Rappader Indie You can or not use Sovereign You can have a private and permissioned Indie You can have a consortium In Indie Or you can have public permissioned Indie In the case of Sovereign This is the definition of the solution As you are doing But it is very important The interoperability You allow your identity to be used You also accept identities Of other ecosystems Very good Here we analyze How a question became relevant How to develop in this community How to be part, create your network Learn I like to develop I am already asking What kind of programming language do you use If you use what you did In the U.S. How to develop In this community Today There are two communities that I recommend For you to access While developers of identity solutions The first one is the Rappader Eris A group that is very strong A group that is big The British Columbia The first application In production using the Rappader Indie For legal persons In the British Columbia In Canada And the Rappader Indie Where you have sensational presentations Of the main heads That define the protocols Of decentralized identity Last week there was a spectacular From Drummond Ridge Of the identity of the Alto Soberana There, Volta 1000 against Fiwindra These kinds of people are all there And it is a very accessible group It has Slack, the Rappader Eris channel And there you can Put questions Of how you add the library In your project There is a component, speaking in language Of programming, which is very cool Because I am his fan That is Eris Cloud Edge Python Known as Acapai And that entered with active status Within the community In a short time Can be used as a service As an institutional agent For example, I want to make an agent Acapai, that you can do A mission very quickly You just develop your application And integrate into a PayRest It is developed in Python And you can develop, inject The Python code inside your business Or you can develop your business With this Acapai I think Fernando Yeah, the connection of Fernando Fernando, you want to continue Talking about how to interact With the community Yeah, I put some messages In our chat So there are the links Fernando has returned, Fernando You want to finish your message Just these groups Inviting people to access In Slack, enter In the middle list There is a lot of nice trade Of these challenges and doubts And participate, people My invitation is for you to participate In this group Perfect, I was commenting that I left The links in the chat Come in contact with us There is our link of the IPL of Brazil In LinkedIn too On Monday When I and Marcos Let's talk about The scenario of the Hyperledia Together with a special guest So don't miss it, sign up On the Meetup And all are welcome Fernando, thank you very much It's always good to hear from people Who are very involved Even the meat involved In this kind of technology And I hope to contact you Thank you all, Fernando Just thank you for everything That we learned a lot With you For me it was a great lesson So very good I also thank Karen Otone Of the Hyperledia That organized this David, we really appreciate everything You've done so far for us Our support and everything Thank you From Hyperledia Fernando, once again thank you Thank you It was a pleasure Thank you Dave See you on Monday See you