Newly Released Podcast
Essential Tips for Designing Decentralized Ecosystems (with Antti Kettunen)
Explore the challenges of designing decentralized ecosystems with expert Antti Kettunen. Learn strategies for balancing incentives and creating sustainable value.
All Episodes
eIDAS 2.0: Predicting Its Impact on Various Ecosystems (with Dominik Beron)
Explore the impact of eIDAS 2.0 on identity in Europe, the future of digital wallets, and the role of EBSI in this insightful podcast episode.
Exploring Digital Credential Protocols: Aries, OpenID4VC, ISO, KERI (with Hakan Yildiz and Vladimir Simjanoski)
This podcast episode delves into exploring the world of digital credential protocols like Aries, OpenID4VC, ISO, and KERI.
Decentralized Identifiers (DIDs): Strengths, Weaknesses, Opportunities and Threats (with Markus Sabadello)
This podcast episode delves into the nuances of DIDs, aiming to contribute to the broader goal of promoting their adoption.
The Digital Travel Credential (DTC) (with Daniel Bachenheimer)
This podcast episode covers everything ‘digital travel credential’. Who governs it, what standards are followed, what does adoption look like.
Digital Trust in the Age of Generative AI – Part 2 (with Wenjing Chu & Sankarshan Mukhopadhyay)
How can we create some short-term wins for consumers to help them better understand the provenance of data/content?
Secure Organizational Identity (with Lance Byrd)
How can secure organizational identity help us move away from administrative roots of trust and towards cryptographic roots of trust?
The Bhutan National Digital Identity (NDI): What it takes for a Nationwide Launch (with Kumar Gajmer & Pallavi Sharma)
What does it take for a Nationwide Launch of a Digital Identity Program? Explore from Legal, Business and Technology lenses.
How Digital Credentials are Transforming Learning Data (with Kate Giovacchini & Andrew A. Johnson)
Explore the importance of making learner data more accessible and dynamic, as opposed to the current static and non-portable nature of it.
Trust Spanning Protocol: Seven Key Pillars (with Drummond Reed)
How does the Trust over IP technology architecture address the internet’s shortcomings of security, privacy, authenticity and confidentiality?