Citations by Lens
Browse citations organized by the 15 lens briefs. Each lens provides context and links to its supporting citations in the full reference.
| Other views: All Citations (Alphabetical) | By Year | By Tag | Citations Home |
Lenses
15 lenses across 4 categories exploring self-sovereign identity through diverse conceptual, ethical, legal, and technical perspectives. Each lens reveals a distinct dimension of the problem space—surfacing harms, exploring tensions, and proposing constructive directions.
Foundational Principles & Rights
The Irreducible Person
You exist—no system needs to grant that, and none should take it away. This lens examines the operational paradox: some aspects of personhood (dignity, existence, cognitive liberty) lose their protective meaning the moment we try to measure them. Discuss on GitHub
-
The Path to Self-Sovereign Identity (2016). Allen, Christopher.
BRIEF: Foundational 2016 article establishing 10 principles of self-sovereign identity.
-
Compliance SSI System Property Set (2022). Pattiyanon & Aoki.
BRIEF: Framework of 42 verifiable properties bridging SSI principles and compliance.
-
Race After Technology (2019). Benjamin, Ruha.
BRIEF: Exposes how technologies reproduce racial inequity while appearing neutral.
-
Universal Declaration of Human Rights (1948). United Nations.
BRIEF: Foundational declaration establishing universal human dignity and rights.
Anti-Property
When we talk about “owning our data,” we risk turning ourselves into products. This lens examines why property law fails for identity—you can’t sell yourself like you sell a car—and proposes agency-based alternatives where delegation creates duties, not markets. Discuss on GitHub
-
Beyond Data (2023). Renieris, Elizabeth M.
BRIEF: Comprehensive critique of “data ownership” frameworks.
-
Contested Commodities (1996). Radin, Margaret Jane.
BRIEF: Foundational market-inalienability theory.
-
Whiteness as Property (1993). Harris, Cheryl I.
BRIEF: Demonstrates how property law encoded racial hierarchies.
-
Between Truth and Power (2019). Cohen, Julie E.
BRIEF: How code and law co-construct identity as extractable capital.
-
The Illusion of Personal Data as No One’s Property (2015). Purtova.
BRIEF: Corporations already claim quasi-property rights in data.
-
Privacy in Context (2009). Nissenbaum, Helen.
BRIEF: Privacy violations occur when information flows breach context-specific norms.
Right to Transact
If you can be prevented from participating, none of the other principles matter. This lens grounds SSI in constitutional rights—free assembly, free association, peer-to-peer exchange—and warns that de-platforming from dominant wallets means losing not just a service, but your operational identity. Discuss on GitHub
-
Operation Choke Point 2.0 (2023). Carter, Nic.
BRIEF: Documents financial system weaponization against legal industries.
-
Universal Declaration of Human Rights (1948). United Nations.
BRIEF: Foundational declaration establishing universal human dignity and rights.
-
Citizens United v. FEC (2010). U.S. Supreme Court.
BRIEF: Landmark ruling extending free speech to political spending.
-
Freedom to Transact (2022). Renieris, Elizabeth M.
BRIEF: Critiques framing financial freedom as fundamental right.
-
Death of the Social Contract (2025). Tcherneva, Pavlina R.
BRIEF: Applies enshittification framework to labor markets—workers cannot “delete the app” when employment is prerequisite for all life essentials.
Cryptographic Paradigms
PKI assumptions have constrained digital identity for 36 years. This lens asks what paradigm assumptions we’re embedding now that will limit what SSI can become—and how to write principles that enable future capabilities we haven’t yet invented. Discuss on GitHub
-
The Path to Self-Sovereign Identity (2016). Allen, Christopher.
BRIEF: Foundational 2016 article establishing 10 principles of SSI.
-
The Exodus Protocol (2025). Allen, Christopher.
BRIEF: “Infrastructure without infrastructure”—mathematics over policy.
-
Edge Identifiers & Cliques (2024). Allen, Christopher.
BRIEF: Relationship-based cryptographic identity using Schnorr multisig.
-
RFC 9591: FROST Protocol (2024). IETF.
BRIEF: IETF standard for threshold Schnorr signatures.
-
Capability Myths Demolished (2003). Miller et al.
BRIEF: How paradigm assumptions shape what systems can do.
-
Failures of PKI: 53 Year Survey (2024). Dumitrescu & Pouwelse.
BRIEF: Comprehensive analysis of PKI/X.509 paradigm failures.
-
Blockchain SSI Comprehensive Survey (2022). Ahmed et al.
BRIEF: Documents fundamental privacy-transparency paradox in blockchain identity.
-
A Survey on Essential Components of SSI (2018). Mühle et al.
BRIEF: How Zooko’s Triangle was “squared” by blockchain—a paradigm shift.
-
SSI Systematic Review (2022). Schardong & Custódio.
BRIEF: Corrects blockchain bias—SSI need not require distributed ledgers; ZKPs most adopted primitive.
-
Origins of SSI (2023). Allen, Christopher.
BRIEF: Living Systems Theory provides “selective membrane” design pattern—foundational for SSI architecture.
-
PETs Limitations in Age Verification (2025). Chatel et al.
BRIEF: Complex PET implementations become “black boxes” centralizing power among sophisticated vendors.
-
Bibliometric Review of Digital Identity (2021). Ante et al.
BRIEF: Documents SSI research fragmentation from foundational cryptographic literature—field risks reinventing paradigms.
-
Generative AI Security (2024). Zhu et al.
BRIEF: Traditional software security fails for GenAI—attacks resemble social engineering against reasoning systems.
Preventing Coercion
Coercion Resistance
Privacy is the shield, but coercion resistance is the goal. This meta-lens coordinates four dimensions of manipulation: dark patterns that exploit cognitive limits, profiling that infers what you never disclosed, structural lock-in that traps you, and internalized surveillance that makes you police yourself. Discuss on GitHub
-
Automating Inequality (2018). Eubanks, Virginia.
BRIEF: How automated systems create “digital poorhouse” profiling the poor.
-
Race After Technology (2019). Benjamin, Ruha.
BRIEF: Technologies reproduce racial inequity while appearing neutral.
-
The Battle for Your Brain (2023). Farahany, Nita A.
BRIEF: Cognitive liberty as foundational right threatened by neurotechnology.
-
The Age of Surveillance Capitalism (2019). Zuboff, Shoshana.
BRIEF: Surveillance capitalism extracts behavioral surplus for prediction products.
-
SSI: The Good, The Bad and The Ugly (2020). Zwitter et al.
BRIEF: Biometric backup dilemma—persistent authentication versus surveillance infrastructure.
-
SSI Moral Bankruptcy (2024). Allen, Christopher.
BRIEF: Community failed to counter Four Horsemen rhetoric justifying surveillance over vulnerable populations.
-
Dimensions of Digital Coercion (2023). Ehmke, Coraline Ada.
BRIEF: Four-dimensional framework identifying attention, ergonomic, trust, and cultural coercion patterns.
-
Big Tech Wants Direct Access to Our Brains (2025). Kinstler, Linda.
BRIEF: Documents frontier of identity coercion—cognitive liberty as “precondition to any other concept of liberty.”
Self-Coercion
The most effective control is the kind that feels like your own idea. This lens examines invisible coercion—chilling effects, anticipatory compliance, behavioral conformity—harms that persist even with perfect cryptographic privacy because you stop yourself before any rule is enforced. Discuss on GitHub
-
Chilling Effects (2016). Penney, Jonathon W.
BRIEF: First empirical evidence of surveillance chilling effects—30% Wikipedia decline.
-
The Age of Surveillance Capitalism (2019). Zuboff, Shoshana.
BRIEF: How behavioral modification works through surveillance capitalism.
-
Discipline and Punish (1977). Foucault, Michel.
BRIEF: Classic analysis of how surveillance induces self-regulation.
-
Algorithms of Oppression (2018). Noble, Safiya Umoja.
BRIEF: Search algorithms create conformity pressure through biased categorizations.
-
Dimensions of Digital Coercion (2023). Ehmke, Coraline Ada.
BRIEF: “Without accountability, no trust. Without trust, no consent.”—connects platform design to self-policing.
Choice Architecture & Exit Rights
Small voluntary decisions accumulate into structural dependency. This lens examines the 18-year trap: credentials stored in proprietary formats, reputation that doesn’t transfer, biometrics that can’t be revoked—and why reversible design and proportionate exit rights are coercion resistance, not convenience features. Discuss on GitHub
-
The Tyranny of Convenience (2018). Wu, Tim.
BRIEF: How convenience becomes tyranny through accumulated small choices.
-
Automating Inequality (2018). Eubanks, Virginia.
BRIEF: Automated systems trap vulnerable populations through asymmetric exit costs.
-
Privacy Self-Management (2013). Solove, Daniel J.
BRIEF: Individual “consent” in asymmetric architectures cannot produce meaningful consent.
-
Principal Authority (2021). Allen, Christopher.
BRIEF: Agency law framework enabling genuine exit rights through delegation accountability.
-
SSI Systematic Mapping Study (2021). Čučko & Turkanović.
BRIEF: Documents zero usability research in SSI field—risking PGP’s adoption failure.
-
Dimensions of Digital Coercion (2023). Ehmke, Coraline Ada.
BRIEF: Documents how dark patterns, engagement manipulation, and ergonomic paywalls create structural coercion.
-
PETs Limitations in Age Verification (2025). Chatel et al.
BRIEF: “Libraries become prisons”—complex PETs constrain application design, creating vendor lock-in.
-
The Structuring Work of Algorithms (2023). boyd, danah.
BRIEF: Algorithms enable network-based discrimination evading categorical antidiscrimination law—SSI must address network position.
Binding Commitments
Not all lock-in is harmful—Kenyan chamas prove that voluntary constraint enables trust. This lens distinguishes productive commitment (mutual stakes, transparent terms, bounded scope) from exploitative lock-in (asymmetric power, opaque terms, punitive exit), because SSI needs commitment mechanisms, not just escape hatches. Discuss on GitHub
-
The Identity Cycle (2021). Grigg, Ian.
BRIEF: Identity emerges from community; validated through Kenyan chamas.
-
Ulysses and the Sirens (1979). Elster, Jon.
BRIEF: Foundational work on rational self-binding enabling otherwise impossible outcomes.
-
The Strategy of Conflict (1960). Schelling, Thomas C.
BRIEF: How credible commitment enables cooperation impossible for uncommitted actors.
-
Commitment Devices (2010). Bryan, Gharad et al.
BRIEF: Comprehensive review showing how voluntary constraints enable better outcomes.
Relational & Contextual Identity
Relational Autonomy
Ubuntu teaches “I am because we are”—yet SSI architectures model identity as individual attribute containers. This lens examines what’s lost: immigration systems that can’t see family bonds, chama membership invisible to credit systems, and how relationship-aware credentials could change both. Discuss on GitHub
-
Descartes was wrong: ‘a person is a person through other persons’ (2017). Birhane.
BRIEF: Contrasts Western individualism with Ubuntu’s relational personhood.
-
Five Mental Models of Identity (2020). Andrieu et al.
BRIEF: Identifies five identity mental models including relationship model.
-
Generative Identity (2019). Sheldrake, Philip.
BRIEF: Identity as emergent, relational, and contextual rather than fixed property.
-
The Identity Cycle (2021). Grigg, Ian.
BRIEF: Identity emerges from community, not state capture.
-
Edge Identifiers & Cliques (2024). Allen, Christopher.
BRIEF: Relationship-based cryptographic identity using edge identifiers.
-
SSI: The Good, The Bad and The Ugly (2020). Zwitter et al.
BRIEF: Identifies relational data ownership problem—attributes are inherently relational.
-
Origins of SSI (2023). Allen, Christopher.
BRIEF: All five SSI traditions emphasize autonomy requires relationships, not isolation.
-
Open & Fuzzy Cliques (2024). Allen, Christopher.
BRIEF: Open cliques support fluid social modeling where not everyone is connected.
Context Boundaries & Anti-Correlation
Your employer shouldn’t see your therapy notes; your landlord shouldn’t know your political donations. This lens examines context collapse—when separate spheres of life merge through correlation attacks—and proposes unlinkable identifiers that keep your different worlds cryptographically distinct. Discuss on GitHub
-
Privacy in Context (2009). Nissenbaum, Helen.
BRIEF: Foundational theory—violations occur when flows breach context-specific norms.
-
Edge Identifiers & Cliques (2024). Allen, Christopher.
BRIEF: Technical solution for context separation through relationship-based identity.
-
De-anonymizing Social Networks (2009). Narayanan & Shmatikov.
BRIEF: Connection patterns enable re-identification even with perfect anonymization.
-
The Age of Surveillance Capitalism (2019). Zuboff, Shoshana.
BRIEF: Behavioral surplus extraction deliberately collapses context boundaries.
Multi-Scalar Sovereignty
Sovereignty doesn’t stop at the individual—200,000 Kenyan chamas manage $1.7 billion without institutional permission. This lens examines how autonomy operates across persons, communities, and nations, warning against “sovereignty-as-a-service” models that centralize power while claiming to distribute it. Discuss on GitHub
-
Sovereignty-as-a-Service (2025). Grohmann & Costa Barbosa.
BRIEF: How Big Tech redefined sovereignty from political capacity to commercial product.
-
Cyber-Proletariat (2015). Dyer-Witheford, Nick.
BRIEF: Digital capitalism creates feudal dependencies masquerading as autonomy.
-
The Question Concerning Technology in China (2016). Hui, Yuk.
BRIEF: Sovereignty is culturally situated—global SSI must negotiate across traditions.
-
Governing Principles of SSI (2020). Naik & Jenkins.
BRIEF: SSI’s fundamental challenge: technical capabilities proven, ecosystem infrastructure immature.
-
Is SSI Really Sovereign? (2022). Naik & Jenkins.
BRIEF: Sovereignty is contextual and jurisdiction-dependent, not binary or absolute.
-
Self-Sovereign Identities Survey (2024). Costa & Cunha.
BRIEF: Documents Global South exclusion—850M lacking identity excluded from SSI design process.
-
Taxonomy of SSI Challenges (2024). Satybaldy et al.
BRIEF: Four-layer architectural framework showing where sovereignty operates at each layer.
-
SSI: The Good, The Bad and The Ugly (2020). Zwitter et al.
BRIEF: Warns network effects create quasi-mandatory participation—”neo-feudalism” risk.
-
SSI: 5 Years On (2021). Allen, Christopher.
BRIEF: LESS vs Trust Minimized Identity dichotomy—institutional SSI vs human rights SSI require bifurcation.
-
SSI Moral Bankruptcy (2024). Allen, Christopher.
BRIEF: did:web “diminishes resilience” through DNS/CA dependencies—reintroducing centralization SSI opposed.
-
Architectural Considerations of Age Restriction (2025). Nottingham, Mark.
BRIEF: Identifies secondary centralization through browser/OS lock-in—SSI wallet providers could similarly concentrate power.
Stewardship
When caring for someone else’s digital identity—are you empowering or exploiting? This lens examines care relationships (parents, guardians, platforms) where the person being helped had no voice in choosing you, cannot exit, and bears permanent consequences of your decisions. Discuss on GitHub
-
Utah SEDI Guidelines (2024). Utah Office of Privacy.
BRIEF: Framework for regulated digital identity with fiduciary oversight.
-
Sovrin Guardianship White Paper (2019/2023). Sovrin Foundation.
BRIEF: Early SSI guardianship framework; warns about “safeguarding dystopia.”
-
Sharenting and Children’s Privacy (2021). Cordeiro, Vanessa.
BRIEF: Digital footprint creation for children who never consented.
-
Navigating Digital ID Risks (2023). Open Government Partnership.
BRIEF: Policy guidance on digital ID risks across 27 countries.
-
Private Age Verification Architecture (2025). Celi et al.
BRIEF: Proposes guardian-issued credentials (parents/teachers/school IT via DIDs) rather than government monopolies.
-
Resilience in Times of Crisis (2024). Garazha et al.
BRIEF: Reveals gap between “control” rhetoric and lived refugee experience—practical benefits drove empowerment more than abstract sovereignty.
Compliance, Governance & Technical Foundations
From Principles to Compliance
Not everything important can be measured—but that doesn’t mean it can’t be verified. This lens develops a three-tier framework: what can be technically tested, what requires regulatory enforcement, and what must remain ethical commitment—because treating all principles as measurable destroys the ones that matter most. Discuss on GitHub
-
Compliance SSI System Property Set (2022). Pattiyanon & Aoki.
BRIEF: 42 testable properties bridging principles and regulatory compliance.
-
The Path to Self-Sovereign Identity (2016). Allen, Christopher.
BRIEF: Foundational 10 SSI principles operationalization frameworks build upon.
-
Principal Authority (2021). Allen, Christopher.
BRIEF: Legal framework for operationalizing SSI through enforceable duties.
-
Digital Law Framework (2025). Allen, Christopher.
BRIEF: Technology-neutral legal framework for cryptographic systems.
-
Blockchain SSI Comprehensive Survey (2022). Ahmed et al.
BRIEF: No solution achieves all five essential components; privacy/simplicity weakest (25-44%).
-
SSI Systematic Mapping Study (2021). Čučko & Turkanović.
BRIEF: First systematic mapping revealing SSI field maturity gaps (47.5% validation vs 0.8% evaluation).
-
A Survey on Essential Components of SSI (2018). Mühle et al.
BRIEF: Foundational survey establishing four essential technical components for SSI.
-
Governing Principles of SSI (2020). Naik & Jenkins.
BRIEF: Expands Allen’s 10 principles to 20 covering technical, operational, and social dimensions.
-
Self-Sovereign Identities Survey (2024). Costa & Cunha.
BRIEF: Reveals theory-practice chasm—49 proposals vs only 14 real-world deployments.
-
Taxonomy of SSI Challenges (2024). Satybaldy et al.
BRIEF: Nine-category challenge taxonomy mapping architecture to development phases.
-
SSI Systematic Review (2022). Schardong & Custódio.
BRIEF: Critical gaps: only 14 works on trust, 6 on recovery, 2 on compliance.
-
SSI: 5 Years On (2021). Allen, Christopher.
BRIEF: Mission drift pattern—technical standardization success coincides with value compromise.
-
SSI Moral Bankruptcy (2024). Allen, Christopher.
BRIEF: Originator critique framing SSI challenges as moral failure, not market failure.
-
SSI on the Blockchain (2024). Pava-Díaz et al.
BRIEF: First quantitative evaluation of SSI implementations against Allen’s principles—portability crisis (0.39 average) from blockchain coupling.
Regulatory Frameworks
Legal “voluntary” erodes to practical “mandatory” within years—Estonia, Aadhaar, Ireland prove the pattern. This lens proposes technology-neutral legal structures that enable SSI without mandating it: anti-coercion provisions, platform independence requirements, and recognition without state monopoly. Discuss on GitHub
-
Digital Law Framework (2025). Allen, Christopher.
BRIEF: Four-layer model legislation with anti-coercion provisions.
-
Five Anchors to Preserve Autonomy (2025). Allen, Christopher.
BRIEF: How government digital identity systems can preserve autonomy.
-
Utah Code Title 46 (2021). Utah State Legislature.
BRIEF: State legislation recognizing credentials without government monopoly.
-
EU Regulation 2024/1183 eIDAS 2.0 (2024). European Parliament.
BRIEF: EU digital identity framework—both benefits and risks.
-
Is SSI Really Sovereign? (2022). Naik & Jenkins.
BRIEF: Regulations can enhance sovereignty (GDPR) or restrict it (state prohibitions).
-
Architectural Considerations of Age Restriction (2025). Nottingham, Mark.
BRIEF: IETF analysis applying Internet architecture principles to age verification—model for assessing identity regulations.
Principal Authority
Current platforms violate every duty agents owe principals: they exceed scope, act in their own interest, manipulate through dark patterns, hide what they do, and make exit prohibitively costly. This lens shows how agency law—centuries of established doctrine—can restore accountable delegation to digital identity. Discuss on GitHub
-
Principal Authority (2021). Allen, Christopher.
BRIEF: Wyoming SF0039’s legal grounding of digital identity in Agency law.
-
Restatement (Third) of Agency (2006). American Law Institute.
BRIEF: Authoritative U.S. codification of Agency law establishing enforceable duties.
-
Information Fiduciaries (2016). Balkin, Jack M.
BRIEF: Platforms owe fiduciary duties of care, confidentiality, and loyalty.
-
Automating Inequality (2018). Eubanks, Virginia.
BRIEF: Documents how automated systems violate duties agents should owe subjects.