Adam Larter
Break the Chain: Decentralized solutions for today’s Web2.0 privacy problems
#1about 2 minutes
The developer's responsibility as a custodian of user data
Centralized Web2.0 architectures create data honeypots that lead to frequent and costly breaches, highlighting the developer's role in protecting user information.
#2about 3 minutes
Rethinking data ownership beyond centralized systems and blockchain
Users should own their data, and while blockchain is a decentralized technology, it is not suitable for storing private, personally identifiable information.
#3about 2 minutes
Understanding the financial and compliance risks of data breaches
Data breaches result in significant financial costs, reputational damage, and steep fines under regulations like GDPR.
#4about 1 minute
Shifting from centralized databases to personal data stores
The proposed architectural shift moves user data from a central server to a personal data store where applications "log into the user" with consent.
#5about 4 minutes
Introducing Decentralized Identifiers and Verifiable Credentials
Decentralized Identifiers (DIDs) provide a unique identity, while Verifiable Credentials (VCs) are cryptographically secure, tamper-evident claims about that identity.
#6about 2 minutes
How to present and query verifiable data securely
Verifiable Presentations (VPs) are used to share selected data from VCs, and Presentation Exchange (PEX) provides a standard query language for requesting it.
#7about 5 minutes
Bridging Web2.0 and Web3 with OpenID Connect standards
OpenID Connect extensions for Verifiable Credential Issuance and Verifiable Presentations allow existing identity protocols to work with decentralized data.
#8about 6 minutes
An overview of the Affinity decentralized identity platform
The Affinity platform provides tools like the Affinity Vault for personal data storage, Affinity Login for authentication, and Affinity Elements as a control plane.
#9about 3 minutes
Announcing the Affinity IOTA framework for developers
The IOTA framework is an end-to-end orchestration layer that simplifies decentralized data access by moving queries to the user's front-end data store.
#10about 1 minute
Implementing the IOTA framework with a simple SDK
Developers can integrate decentralized data requests into their applications with just a few lines of code using the Affinity SDK.
#11about 1 minute
Building an Internet of Trust with a new architecture
The Affinity Trust Network provides the tools to build applications where the user controls the consent boundary, with future plans for open-sourcing components.
Related jobs
Jobs that call for the skills explored in this talk.
Matching moments
07:37 MIN
Solving for data sovereignty and identity control
Giving the individual control of their data: Open Source Decentralized Web Nodes
00:19 MIN
The vision for a user-centric web called Web5
Giving the individual control of their data: Open Source Decentralized Web Nodes
01:55 MIN
The problem of centralized platforms and data sovereignty
Trust as the Key Concept in Future Mobility
18:04 MIN
Answering questions on data, scalability, and accessibility
Web3: Embracing the Next Era of the Internet Within a Web2 Landscape
13:42 MIN
The critical role of open standards and protocols
Giving the individual control of their data: Open Source Decentralized Web Nodes
32:36 MIN
Q&A on data ownership, monetization, and competing tools
A Data Mesh needs Open Metadata
10:15 MIN
How verifiable credentials enable trustless interactions
Refactoring the Web
09:04 MIN
The core technical components for asset tokenization
Tokenization of Everything: Where the Real World Meets Blockchain
Featured Partners
Related Videos
Refactoring the Web
Angie Jones
Giving the individual control of their data: Open Source Decentralized Web Nodes
Angie Jones, Mike Brock, Daniel Buchner, Markus Sabadello & Nalin Mittal
Web3: Embracing the Next Era of the Internet Within a Web2 Landscape
Darrel Idiagbor
Demystifying Crypto & Web3: A Technical Journey Through 15 Years of Innovation
Ed Marquez
Going Beyond Passwords: The Future of User Authentication
Gift Egwuenu
Overcome your trust issues! In a world of fake data, Data Provenance FTW
Jon Geater
Trust as the Key Concept in Future Mobility
Peter Busch
Debunking the Top 10 Myths about Web 3
Ed Marquez
Related Articles
View all articles



From learning to earning
Jobs that call for the skills explored in this talk.







IDAM Solutions Architect - (Transformation)
DevNull Security
Charing Cross, United Kingdom
Remote
£70-80K
UML

IDAM Solutions Architect - (Transformation)
DevNull Security
Edinburgh, United Kingdom
Remote
£70-80K
UML

IDAM Solutions Architect - (Transformation)
DevNull Security
Sheffield, United Kingdom
Remote
£70-80K
UML