Citations by Tag
Browse citations organized by topic tags.
| Other views: By Lens | By Year | All Citations (Alphabetical) | Citations Home |
| H: #HarrisCheryl | #HDKeys | #Heidegger | #HighModernism | #HuiYuk | #HumanAutonomy | #HumanitarianTechnology | #HumanRights | #HyperledgerIndy |
| J: #Jailbreaking | #JobGuarantee | #JurisdictionalVariation |
| K: #Kenya | #KeyDerivation | #KeyManagement | #KeyRecovery | #KhanLina | #KofNSignatures |
| O: #ObjectCapabilities | #OCaps | #OnlineIdentity | #OpenCliques | #OpenGovernment | #OpenSourceAI | #OpenSourceCritique | #OperationChokePoint | #Optogenetics | #OstromPrinciples |
| U: #Ubuntu | #UDHR | #UETA | #Ukraine | #UlyssesContracts | #UnemploymentPolicy | #UnitedNations | #UniversalRights | #uPort | #UsabilityChallenges | #UsabilityGap | #UserControl | #UserRights | #Utah | #UtahLaw |
| V: #VaheesanSandeep | #VerifiableClaims | #VerifiableCredentials | #VerifiableProperties | #VerifiableRecords | #VulnerablePopulations |
| W: #W3C | #W3CDID | #W3CStandards | #Watermarking | #Web3 | #WebOfTrust | #WelfareSurveillance | #WesternPhilosophy | #Whistleblowing | #WhitenessAsProperty | #Wikipedia | #WorkerPower | #WorkerRights | #WuTim | #Wyoming |
X: #X509
| Z: #ZeroKnowledgeProofs | #ZookosTriangle | #ZuboffShoshana |
#AbusePreventions (1)
-
Baird et al. (2023) Threshold Signatures
BRIEF: Modern threshold signature schemes enabling distributed authority where K-of-N parties must cooperate—cryptographic foundation for preventing single points of failure.
#AccessBarriers (1)
-
Nottingham (2025) Age Restriction Architecture
BRIEF: IETF analysis identifying five architectural risks from age verification: centralization, privacy erosion, access barriers, fragmentation, and age-gated internet infrastructure.
#AccessControl (1)
-
Miller et al. (2003) Capability Myths Demolished
BRIEF: Foundational OCaps paper demonstrating how capability possession equals authority—foundational model for SSI delegation.
#Accessibility (1)
-
Sovrin Guardianship (2019/2023)
BRIEF: Explores guardianship necessity for SSI inclusivity given 2.9 billion without internet access; warns about “safeguarding dystopia.”
#AccountabilityMechanisms (1)
-
Ehmke (2023) Dimensions of Digital Coercion
BRIEF: Systematic framework analyzing digital coercion through four dimensions across commercial and open-source platforms, proposing multi-layered standards as accountability.
#AdversarialML (1)
-
Zhu et al. (2024) Generative AI Security
BRIEF: Analyzes GenAI security; traditional defenses fail, requiring AI firewalls, guardrails, watermarking for social engineering attacks.
#AfricanPhilosophy (1)
-
Birhane (2017) Ubuntu Philosophy
BRIEF: Contrasts Western individualist “I think therefore I am” with Ubuntu’s relational personhood: “I am because we are.”
#AgencyLaw (2)
-
Allen (2021) Principal Authority
BRIEF: Analyzes Wyoming SF0039’s legal grounding of digital identity in Agency law, reorganizing SSI principles as Principal rights and Agent duties.
-
Restatement Third of Agency (2006)
BRIEF: Authoritative U.S. codification of Agency law establishing enforceable duties agents owe principals with centuries of precedent.
#AgeVerification (3)
-
Celi et al. (2025) Private Age Verification Architecture
BRIEF: Separates content moderation from guardianship in age verification. Proposes guardian-issued DID credentials with client-side enforcement.
-
Chatel et al. (2025) PETs Limitations in Age Verification
BRIEF: PETs solve only application-layer privacy, not circumvention, censorship, or effectiveness. Complex libraries become “prisons” centralizing power.
-
Nottingham (2025) Age Restriction Architecture
BRIEF: IETF analysis identifying five architectural risks from age verification: centralization, privacy erosion, access barriers, fragmentation, and age-gated internet infrastructure.
#AIAlignment (1)
-
Zhu et al. (2024) Generative AI Security
BRIEF: Analyzes GenAI security; traditional defenses fail, requiring AI firewalls, guardrails, watermarking for social engineering attacks.
#AIFirewall (1)
-
Zhu et al. (2024) Generative AI Security
BRIEF: Analyzes GenAI security; traditional defenses fail, requiring AI firewalls, guardrails, watermarking for social engineering attacks.
#AIGovernance (1)
-
Zhu et al. (2024) Generative AI Security
BRIEF: Analyzes GenAI security; traditional defenses fail, requiring AI firewalls, guardrails, watermarking for social engineering attacks.
#AIIntegration (1)
-
Kinstler (2025) Big Tech Wants Direct Access to Our Brains
BRIEF: Documents Big Tech BCI commercialization and neurorights movement seeking legal protections for mental privacy and cognitive liberty.
#AISecurity (1)
-
Zhu et al. (2024) Generative AI Security
BRIEF: Analyzes GenAI security; traditional defenses fail, requiring AI firewalls, guardrails, watermarking for social engineering attacks.
#AKASHA (1)
-
Sheldrake (2019) Generative Identity
BRIEF: Proposes “generative identity” moving beyond self-sovereignty’s individual focus to embrace emergent, relational, and contextual identity.
#Akrasia (1)
-
Elster (1979) Ulysses and the Sirens
BRIEF: Foundational work on rational self-binding—Ulysses constraining future self enables otherwise impossible outcomes.
#AlgorithmicBias (3)
-
Benjamin (2019) Race After Technology
BRIEF: Exposes how technologies reproduce racial inequity while appearing neutral, introducing “New Jim Code” concept for discriminatory automation.
-
Eubanks (2018) Automating Inequality
BRIEF: Examines how automated systems create “digital poorhouse” that profiles and punishes poor Americans through case studies of welfare, homeless services, and child welfare.
-
Noble (2018) Algorithms of Oppression
BRIEF: Documents how search algorithms perpetuate racism and sexism, creating conformity pressure through biased categorizations users can’t see or contest.
#AlgorithmicOppression (2)
-
Ehmke (2023) Dimensions of Digital Coercion
BRIEF: Systematic framework analyzing digital coercion through four dimensions across commercial and open-source platforms, proposing multi-layered standards as accountability.
-
Noble (2018) Algorithms of Oppression
BRIEF: Documents how search algorithms perpetuate racism and sexism, creating conformity pressure through biased categorizations users can’t see or contest.
#AlgorithmicPower (1)
-
boyd (2023) Structuring Algorithms
BRIEF: Framework showing algorithms structure networks via institutional arrangements, enabling network-based discrimination through data infrastructure control beyond categorical protections.
#AllenChristopher (8)
-
Allen (2016) Path to Self-Sovereign Identity
BRIEF: Foundational 2016 article establishing 10 principles of self-sovereign identity and tracing identity system evolution from centralized to user-centric to self-sovereign models.
-
Allen (2021) Principal Authority
BRIEF: Analyzes Wyoming SF0039’s legal grounding of digital identity in Agency law, reorganizing SSI principles as Principal rights and Agent duties.
-
BRIEF: Proposes relationship-based cryptographic identity using edge identifiers and cliques with Schnorr multisig protocols.
-
BRIEF: Explores cryptographic capabilities enabling selective disclosure and delegated authority through derived keys, threshold signatures, and ZKPs.
-
Allen (2025) Digital Law Framework
BRIEF: Four-layer model legislation demonstrating technology-neutral regulatory approach with anti-coercion provisions and platform independence requirements.
-
BRIEF: Establishes “infrastructure without infrastructure”—systems functioning autonomously without centralized control, mathematics over policy.
-
Allen (2025) Right to Transact (draft)
BRIEF: Frames transactional freedom as constitutional right grounded in assembly and association, not merely financial access.
-
Allen (2025) Swiss e-ID Anchors
BRIEF: Demonstrates how government digital identity systems can preserve autonomy—addresses “voluntary in law” eroding to “mandatory in practice” pattern.
#AllenPrinciples (1)
-
Pava-Díaz et al. (2024) SSI on the Blockchain
BRIEF: Evaluates nine blockchain SSI frameworks against Allen’s principles, identifying portability and interoperability gaps from tight coupling.
#Amazon (1)
-
Grohmann (2025) Sovereignty-as-a-Service
BRIEF: Analyzes how Microsoft, Amazon, and Google redefined digital sovereignty from political capacity to commercial product—warning pattern for SSI.
#AmericanLawInstitute (1)
-
Restatement Third of Agency (2006)
BRIEF: Authoritative U.S. codification of Agency law establishing enforceable duties agents owe principals with centuries of precedent.
#AndrieuJoe (1)
-
Andrieu et al. (2020) Five Mental Models
BRIEF: Identifies five identity mental models (space-time, presentation, attribute, relationship, capability) and their intersections for SSI architecture.
#AntiCoercion (1)
-
Allen (2025) Digital Law Framework
BRIEF: Four-layer model legislation demonstrating technology-neutral regulatory approach with anti-coercion provisions and platform independence requirements.
#AntidiscriminationLaw (1)
-
boyd (2023) Structuring Algorithms
BRIEF: Framework showing algorithms structure networks via institutional arrangements, enabling network-based discrimination through data infrastructure control beyond categorical protections.
#Antitrust (1)
-
Khan & Vaheesan (2017) Market Power (draft)
BRIEF: Analyzes how market power concentration enables gatekeeping and exclusion—applies directly to SSI infrastructure where monopoly positions create participation barriers.
#AokiToshiaki (1)
-
BRIEF: Framework of 42 verifiable properties bridging SSI principles and legal/regulatory compliance requirements across jurisdictions.
#Article16 (1)
-
BRIEF: Binding international treaty establishing legal personhood as universal right, extending UDHR principles into enforceable international law.
#ArtificialIntelligence (1)
-
Benjamin (2019) Race After Technology
BRIEF: Exposes how technologies reproduce racial inequity while appearing neutral, introducing “New Jim Code” concept for discriminatory automation.
#AttributeBasedEncryption (1)
-
Ante et al. (2021) Bibliometric Review of Digital Identity
BRIEF: First bibliometric mapping of digital identity reveals seven fragmented streams with minimal cross-citation despite 7x publication growth.
#AuthenticatedMessaging (1)
-
BRIEF: Standard protocol for secure, authenticated messaging between DID-identified parties—foundational delegation protocol for SSI.
#AuthoritarianControl (1)
-
Allen (2024) SSI Moral Bankruptcy
BRIEF: SSI originator argues ecosystem became morally bankrupt by abandoning founding principles for market adoption and surveillance-enabling compromises.
#Authoritarianism (1)
-
Scott (1998) Seeing Like a State (draft)
BRIEF: Examines failed large-scale state interventions, identifying how “legibility” requirements destroy local knowledge and contextual complexity.
#AuthorizationModels (1)
-
Miller et al. (2003) Capability Myths Demolished
BRIEF: Foundational OCaps paper demonstrating how capability possession equals authority—foundational model for SSI delegation.
#AutomatingInequality (1)
-
Eubanks (2018) Automating Inequality
BRIEF: Examines how automated systems create “digital poorhouse” that profiles and punishes poor Americans through case studies of welfare, homeless services, and child welfare.
#AutonomousSystems (1)
-
BRIEF: Establishes “infrastructure without infrastructure”—systems functioning autonomously without centralized control, mathematics over policy.
#Autonomy (2)
-
Allen (2025) Swiss e-ID Anchors
BRIEF: Demonstrates how government digital identity systems can preserve autonomy—addresses “voluntary in law” eroding to “mandatory in practice” pattern.
-
Farahany (2023) Battle for Your Brain
BRIEF: Argues cognitive liberty (mental self-determination) is foundational right threatened by neurotechnology.
#BalkinJack (1)
-
Balkin (2016) Information Fiduciaries
BRIEF: Introduces “information fiduciary” concept—platforms holding user data owe fiduciary duties of care, confidentiality, and loyalty.
#BankingAccess (1)
-
Carter (2023) Operation Choke Point 2.0
BRIEF: Documents financial system weaponization against legal industries through systematic banking access denial.
#BankingPolicy (1)
-
Carter (2023) Operation Choke Point 2.0
BRIEF: Documents financial system weaponization against legal industries through systematic banking access denial.
#BCI (1)
-
Kinstler (2025) Big Tech Wants Direct Access to Our Brains
BRIEF: Documents Big Tech BCI commercialization and neurorights movement seeking legal protections for mental privacy and cognitive liberty.
#BehavioralData (1)
-
Zuboff (2019) Surveillance Capitalism
BRIEF: Develops surveillance capitalism framework—unprecedented economic logic extracting behavioral surplus and deploying instrumentarian power through ubiquitous computation.
#BehavioralEconomics (1)
-
Bryan et al. (2010) Commitment Devices
BRIEF: Comprehensive review of commitment device research showing how voluntary constraints enable better outcomes.
#BenjaminRuha (1)
-
Benjamin (2019) Race After Technology
BRIEF: Exposes how technologies reproduce racial inequity while appearing neutral, introducing “New Jim Code” concept for discriminatory automation.
#BibliometricAnalysis (1)
-
Ante et al. (2021) Bibliometric Review of Digital Identity
BRIEF: First bibliometric mapping of digital identity reveals seven fragmented streams with minimal cross-citation despite 7x publication growth.
#BigTech (3)
-
Grohmann (2025) Sovereignty-as-a-Service
BRIEF: Analyzes how Microsoft, Amazon, and Google redefined digital sovereignty from political capacity to commercial product—warning pattern for SSI.
-
Kinstler (2025) Big Tech Wants Direct Access to Our Brains
BRIEF: Documents Big Tech BCI commercialization and neurorights movement seeking legal protections for mental privacy and cognitive liberty.
-
Zuboff (2019) Surveillance Capitalism
BRIEF: Develops surveillance capitalism framework—unprecedented economic logic extracting behavioral surplus and deploying instrumentarian power through ubiquitous computation.
#BiometricIdentification (1)
-
Zwitter et al. (2020) SSI: The Good, The Bad and The Ugly
BRIEF: Critically examines SSI through philosophical, legal, and technical lenses, revealing naturalist-constructivist tensions requiring explicit governance decisions.
#BirhaneAbeba (1)
-
Birhane (2017) Ubuntu Philosophy
BRIEF: Contrasts Western individualist “I think therefore I am” with Ubuntu’s relational personhood: “I am because we are.”
#BlockchainBias (1)
-
Schardong (2022) SSI Systematic Review
BRIEF: First reproducible systematic review of SSI reveals explosive growth but critical gaps in trust, usability, and compliance.
#BlockchainGovernance (1)
-
Naik & Jenkins (2022) Is SSI Really Sovereign?
BRIEF: Critical assessment revealing SSI sovereignty as inherently contextual and jurisdiction-dependent rather than binary or absolute.
#BlockchainIdentity (8)
-
Ante et al. (2021) Bibliometric Review of Digital Identity
BRIEF: First bibliometric mapping of digital identity reveals seven fragmented streams with minimal cross-citation despite 7x publication growth.
-
Ahmed et al. (2022) Blockchain SSI Survey
BRIEF: Survey of 153 blockchain identity articles establishing five essential components framework for evaluating BC-IDMS solutions.
-
Čučko & Turkanović (2021) SSI Systematic Mapping
BRIEF: First systematic mapping of SSI research reveals validation dominating, evaluation absent, and zero usability research.
-
Costa & Cunha (2024) Self-Sovereign Identities Survey
BRIEF: Reviews 94 blockchain SSI papers identifying theory-practice chasm, limited validation, interoperability gaps, and Global South exclusion.
-
Mühle et al. (2018) Essential Components of SSI
BRIEF: First comprehensive technical survey identifying four essential SSI components: decentralized identifiers, authentication, verifiable claims, and storage solutions.
-
Naik & Jenkins (2020) Governing Principles of SSI
BRIEF: 20-principle SSI evaluation framework extending Allen’s 10 principles; comparative analysis reveals technical maturity but operational gaps.
-
Pava-Díaz et al. (2024) SSI on the Blockchain
BRIEF: Evaluates nine blockchain SSI frameworks against Allen’s principles, identifying portability and interoperability gaps from tight coupling.
-
Zwitter et al. (2020) SSI: The Good, The Bad and The Ugly
BRIEF: Critically examines SSI through philosophical, legal, and technical lenses, revealing naturalist-constructivist tensions requiring explicit governance decisions.
#BrainComputerInterface (1)
-
Kinstler (2025) Big Tech Wants Direct Access to Our Brains
BRIEF: Documents Big Tech BCI commercialization and neurorights movement seeking legal protections for mental privacy and cognitive liberty.
#BrainPrivacy (1)
-
Farahany (2023) Battle for Your Brain
BRIEF: Argues cognitive liberty (mental self-determination) is foundational right threatened by neurotechnology.
#CampaignFinance (1)
-
BRIEF: Landmark ruling extending free speech protections to political spending—debatable whether expression through expenditure applies to identity transactions.
#CapabilityBasedSecurity (1)
-
Miller et al. (2003) Capability Myths Demolished
BRIEF: Foundational OCaps paper demonstrating how capability possession equals authority—foundational model for SSI delegation.
#CarterNic (1)
-
Carter (2023) Operation Choke Point 2.0
BRIEF: Documents financial system weaponization against legal industries through systematic banking access denial.
#Censorship (1)
-
Chatel et al. (2025) PETs Limitations in Age Verification
BRIEF: PETs solve only application-layer privacy, not circumvention, censorship, or effectiveness. Complex libraries become “prisons” centralizing power.
#Centralization (2)
-
Chatel et al. (2025) PETs Limitations in Age Verification
BRIEF: PETs solve only application-layer privacy, not circumvention, censorship, or effectiveness. Complex libraries become “prisons” centralizing power.
-
Nottingham (2025) Age Restriction Architecture
BRIEF: IETF analysis identifying five architectural risks from age verification: centralization, privacy erosion, access barriers, fragmentation, and age-gated internet infrastructure.
#CentralizedControl (1)
-
Scott (1998) Seeing Like a State (draft)
BRIEF: Examines failed large-scale state interventions, identifying how “legibility” requirements destroy local knowledge and contextual complexity.
#CertificateAuthority (1)
-
Dumitrescu & Pouwelse (2024) PKI Failures
BRIEF: Comprehensive analysis of PKI/X.509 paradigm assumptions and their consequences over decades—cautionary example for 2026 principles.
#Chamas (1)
-
Grigg (2021) The Identity Cycle
BRIEF: Argues identity emerges from community, not state capture; validates through Kenyan chamas (200,000+ groups, $1.7B, 42% GDP).
#ChildProtection (1)
-
BRIEF: Examines tension between children’s privacy rights and parental freedom; documents sharenting harms including identity theft and permanent digital footprints.
#ChildrensRights (1)
-
BRIEF: Examines tension between children’s privacy rights and parental freedom; documents sharenting harms including identity theft and permanent digital footprints.
#ChileConstitution (1)
-
Kinstler (2025) Big Tech Wants Direct Access to Our Brains
BRIEF: Documents Big Tech BCI commercialization and neurorights movement seeking legal protections for mental privacy and cognitive liberty.
#ChillingEffects (1)
-
Penney (2016) Chilling Effects
BRIEF: First empirical evidence of regulatory chilling effects from online surveillance, documenting 30% traffic decline to sensitive Wikipedia articles post-Snowden.
#ChineseTechnology (1)
-
Hui (2016) Question Concerning Technology in China
BRIEF: Argues sovereignty isn’t universal but culturally situated—global SSI must negotiate across traditions rather than imposing single Western model.
#Circumvention (1)
-
Chatel et al. (2025) PETs Limitations in Age Verification
BRIEF: PETs solve only application-layer privacy, not circumvention, censorship, or effectiveness. Complex libraries become “prisons” centralizing power.
#CitizensUnited (1)
-
BRIEF: Landmark ruling extending free speech protections to political spending—debatable whether expression through expenditure applies to identity transactions.
#CivilLiberties (2)
-
Greenwald (2014) No Place to Hide (draft)
BRIEF: Documents Snowden’s NSA surveillance disclosures, examining unprecedented government abuse of power and implications for privacy and democracy.
-
BRIEF: Foundational 1948 declaration establishing universal human dignity and rights as basis for international human rights law.
#CivilRights (1)
-
BRIEF: Binding international treaty establishing legal personhood as universal right, extending UDHR principles into enforceable international law.
#ClientSideVerification (1)
-
Celi et al. (2025) Private Age Verification Architecture
BRIEF: Separates content moderation from guardianship in age verification. Proposes guardian-issued DID credentials with client-side enforcement.
#Cliques (2)
-
BRIEF: Proposes relationship-based cryptographic identity using edge identifiers and cliques with Schnorr multisig protocols.
-
Allen (2024) Open & Fuzzy Cliques
BRIEF: Extends cryptographic cliques with open (incomplete connectivity), fuzzy (threshold), and device variants for practical implementation.
#CloudSovereignty (1)
-
Grohmann (2025) Sovereignty-as-a-Service
BRIEF: Analyzes how Microsoft, Amazon, and Google redefined digital sovereignty from political capacity to commercial product—warning pattern for SSI.
#CoCitationAnalysis (1)
-
Ante et al. (2021) Bibliometric Review of Digital Identity
BRIEF: First bibliometric mapping of digital identity reveals seven fragmented streams with minimal cross-citation despite 7x publication growth.
#CognitiveLiberty (2)
-
Farahany (2023) Battle for Your Brain
BRIEF: Argues cognitive liberty (mental self-determination) is foundational right threatened by neurotechnology.
-
Kinstler (2025) Big Tech Wants Direct Access to Our Brains
BRIEF: Documents Big Tech BCI commercialization and neurorights movement seeking legal protections for mental privacy and cognitive liberty.
#CohenJulie (1)
-
Cohen (2019) Between Truth and Power
BRIEF: Demonstrates how code and law co-construct identity as extractable capital; property frameworks actively create data as commodity.
#CollectiveInterests (1)
-
Renieris (2022) Freedom to Transact Critique
BRIEF: Essential counterpoint—challenges absolute “right to transact” claims, distinguishing proportionate regulation from exclusionary gatekeeping.
#CommitmentDevices (1)
-
Bryan et al. (2010) Commitment Devices
BRIEF: Comprehensive review of commitment device research showing how voluntary constraints enable better outcomes.
#Commodification (1)
-
Radin (1996) Contested Commodities
BRIEF: Foundational market-inalienability theory—some things too bound up with personhood to commodify, including core identity attributes.
#CommonLaw (1)
-
Restatement Third of Agency (2006)
BRIEF: Authoritative U.S. codification of Agency law establishing enforceable duties agents owe principals with centuries of precedent.
#CommonsGovernance (1)
-
BRIEF: Allen traces SSI origins to five traditions: sovereignty, living systems, commons governance, feminist theory, and human rights.
#Community (1)
-
Grigg (2021) The Identity Cycle
BRIEF: Argues identity emerges from community, not state capture; validates through Kenyan chamas (200,000+ groups, $1.7B, 42% GDP).
#CommunityIdentity (1)
-
Birhane (2017) Ubuntu Philosophy
BRIEF: Contrasts Western individualist “I think therefore I am” with Ubuntu’s relational personhood: “I am because we are.”
#ComparativeAnalysis (1)
-
Naik & Jenkins (2020) Governing Principles of SSI
BRIEF: 20-principle SSI evaluation framework extending Allen’s 10 principles; comparative analysis reveals technical maturity but operational gaps.
#CompetitionLaw (1)
-
Khan & Vaheesan (2017) Market Power (draft)
BRIEF: Analyzes how market power concentration enables gatekeeping and exclusion—applies directly to SSI infrastructure where monopoly positions create participation barriers.
#Complexity (1)
-
Sheldrake (2019) Generative Identity
BRIEF: Proposes “generative identity” moving beyond self-sovereignty’s individual focus to embrace emergent, relational, and contextual identity.
#Compliance (1)
-
BRIEF: Framework of 42 verifiable properties bridging SSI principles and legal/regulatory compliance requirements across jurisdictions.
#ConceptualGenealogy (1)
-
BRIEF: Allen traces SSI origins to five traditions: sovereignty, living systems, commons governance, feminist theory, and human rights.
#ConsentDilemma (1)
-
Solove (2013) Privacy Self-Management
BRIEF: Demonstrates privacy consent mechanisms fail—assumptions of informed, empowered users false given information asymmetry and manufactured consent.
#ConstitutionalLaw (1)
-
Balkin (2016) Information Fiduciaries
BRIEF: Introduces “information fiduciary” concept—platforms holding user data owe fiduciary duties of care, confidentiality, and loyalty.
#ConstitutionalRights (1)
-
Allen (2025) Right to Transact (draft)
BRIEF: Frames transactional freedom as constitutional right grounded in assembly and association, not merely financial access.
#ConsumerBehavior (1)
-
Wu (2018) Tyranny of Convenience
BRIEF: Analyzes how convenience becomes tyranny—small easy choices accumulate into structural dependency.
#ConsumerProtection (1)
-
Khan & Vaheesan (2017) Market Power (draft)
BRIEF: Analyzes how market power concentration enables gatekeeping and exclusion—applies directly to SSI infrastructure where monopoly positions create participation barriers.
#ContentModeration (2)
-
Nottingham (2025) Age Restriction Architecture
BRIEF: IETF analysis identifying five architectural risks from age verification: centralization, privacy erosion, access barriers, fragmentation, and age-gated internet infrastructure.
-
Zhu et al. (2024) Generative AI Security
BRIEF: Analyzes GenAI security; traditional defenses fail, requiring AI firewalls, guardrails, watermarking for social engineering attacks.
#ContextualIntegrity (2)
-
boyd (2023) Structuring Algorithms
BRIEF: Framework showing algorithms structure networks via institutional arrangements, enabling network-based discrimination through data infrastructure control beyond categorical protections.
-
Nissenbaum (2009) Privacy in Context
BRIEF: Foundational privacy theory—violations occur when information flows breach context-specific norms, not merely when individuals lose control.
#Convenience (1)
-
Wu (2018) Tyranny of Convenience
BRIEF: Analyzes how convenience becomes tyranny—small easy choices accumulate into structural dependency.
#Cooperation (1)
-
Schelling (1960) Strategy of Conflict
BRIEF: Game theory classic showing how credible commitment enables cooperation impossible for uncommitted actors.
#CorporateData (1)
-
Purtova (2015) Illusion of Personal Data
BRIEF: Demonstrates “no one owns data” is illusion—corporations already claim quasi-property rights; individual ownership validates framework favoring institutional actors.
#CorporateRights (1)
-
BRIEF: Landmark ruling extending free speech protections to political spending—debatable whether expression through expenditure applies to identity transactions.
#Cosmotechnics (1)
-
Hui (2016) Question Concerning Technology in China
BRIEF: Argues sovereignty isn’t universal but culturally situated—global SSI must negotiate across traditions rather than imposing single Western model.
#CredentialExchange (1)
-
BRIEF: Standard protocol for secure, authenticated messaging between DID-identified parties—foundational delegation protocol for SSI.
#CredentialFormat (1)
-
W3C (2024) Verifiable Credentials 2.0
BRIEF: W3C standard for machine-verifiable credentials—foundational data model for delegation, authorization, and revocability.
#CredibleCommitment (1)
-
Schelling (1960) Strategy of Conflict
BRIEF: Game theory classic showing how credible commitment enables cooperation impossible for uncommitted actors.
#CrisisManagement (1)
-
Garazha et al. (2024) Resilience in Times of Crisis
BRIEF: Derives seven design principles for SSI-based refugee identity through iterative prototyping with Ukrainian refugees in Switzerland.
#CriticalAnalysis (2)
-
Chatel et al. (2025) PETs Limitations in Age Verification
BRIEF: PETs solve only application-layer privacy, not circumvention, censorship, or effectiveness. Complex libraries become “prisons” centralizing power.
-
Renieris (2022) Freedom to Transact Critique
BRIEF: Essential counterpoint—challenges absolute “right to transact” claims, distinguishing proportionate regulation from exclusionary gatekeeping.
#CriticalRaceStudies (1)
-
Benjamin (2019) Race After Technology
BRIEF: Exposes how technologies reproduce racial inequity while appearing neutral, introducing “New Jim Code” concept for discriminatory automation.
#CriticalRaceTheory (1)
-
Harris (1993) Whiteness as Property
BRIEF: Demonstrates how property law historically encoded racial hierarchies—whiteness functioned as property granting access, opportunity, protection.
#CriticalTheory (1)
-
Foucault (1977) Discipline and Punish
BRIEF: Classic analysis of how surveillance induces self-regulation—”visibility is a trap”—tracing punishment’s evolution from spectacle to psychological control.
#CrossBorderIdentity (1)
-
EU Regulation 2024/1183 eIDAS 2.0
BRIEF: EU digital identity framework demonstrating both benefits (legal recognition, interoperability) and risks (government-centric architecture, limited platform independence).
#Crypto (1)
-
Renieris (2022) Freedom to Transact Critique
BRIEF: Essential counterpoint—challenges absolute “right to transact” claims, distinguishing proportionate regulation from exclusionary gatekeeping.
#Cryptocurrency (1)
-
Carter (2023) Operation Choke Point 2.0
BRIEF: Documents financial system weaponization against legal industries through systematic banking access denial.
#CryptographicCapabilities (1)
-
BRIEF: Explores cryptographic capabilities enabling selective disclosure and delegated authority through derived keys, threshold signatures, and ZKPs.
#CryptographicInfrastructure (1)
-
Dumitrescu & Pouwelse (2024) PKI Failures
BRIEF: Comprehensive analysis of PKI/X.509 paradigm assumptions and their consequences over decades—cautionary example for 2026 principles.
#CryptographicSecrets (1)
-
Allen (2025) Digital Law Framework
BRIEF: Four-layer model legislation demonstrating technology-neutral regulatory approach with anti-coercion provisions and platform independence requirements.
#CryptographicSecurity (2)
-
Baird et al. (2023) Threshold Signatures
BRIEF: Modern threshold signature schemes enabling distributed authority where K-of-N parties must cooperate—cryptographic foundation for preventing single points of failure.
-
W3C (2024) Verifiable Credentials 2.0
BRIEF: W3C standard for machine-verifiable credentials—foundational data model for delegation, authorization, and revocability.
#CryptographicVerification (1)
-
W3C (2022) Decentralized Identifiers
BRIEF: W3C standard for decentralized, self-sovereign identifiers with cryptographic verification—foundational infrastructure for platform-independent delegation.
#Cryptography (2)
-
BRIEF: Proposes relationship-based cryptographic identity using edge identifiers and cliques with Schnorr multisig protocols.
-
BRIEF: IETF standard for threshold Schnorr signatures enabling distributed trust—emerging capability existing paradigms didn’t anticipate.
#CulturalImperialism (1)
-
Ehmke (2023) Dimensions of Digital Coercion
BRIEF: Systematic framework analyzing digital coercion through four dimensions across commercial and open-source platforms, proposing multi-layered standards as accountability.
#CulturalTechnology (1)
-
Hui (2016) Question Concerning Technology in China
BRIEF: Argues sovereignty isn’t universal but culturally situated—global SSI must negotiate across traditions rather than imposing single Western model.
#CyberProletariat (1)
-
Dyer-Witheford (2015) Cyber-Proletariat
BRIEF: Examines digital capitalism’s creation of feudal dependencies masquerading as autonomy—platforms deepen subordination through service dependency.
#CyberspaceSovereignty (1)
-
Naik & Jenkins (2022) Is SSI Really Sovereign?
BRIEF: Critical assessment revealing SSI sovereignty as inherently contextual and jurisdiction-dependent rather than binary or absolute.
#DaoQi (1)
-
Hui (2016) Question Concerning Technology in China
BRIEF: Argues sovereignty isn’t universal but culturally situated—global SSI must negotiate across traditions rather than imposing single Western model.
#DarkPatterns (1)
-
Ehmke (2023) Dimensions of Digital Coercion
BRIEF: Systematic framework analyzing digital coercion through four dimensions across commercial and open-source platforms, proposing multi-layered standards as accountability.
#DataExtraction (1)
-
Zuboff (2019) Surveillance Capitalism
BRIEF: Develops surveillance capitalism framework—unprecedented economic logic extracting behavioral surplus and deploying instrumentarian power through ubiquitous computation.
#DataGovernance (1)
-
Cohen (2019) Between Truth and Power
BRIEF: Demonstrates how code and law co-construct identity as extractable capital; property frameworks actively create data as commodity.
#DataInfrastructure (1)
-
boyd (2023) Structuring Algorithms
BRIEF: Framework showing algorithms structure networks via institutional arrangements, enabling network-based discrimination through data infrastructure control beyond categorical protections.
#DataMarkets (1)
-
Cohen (2019) Between Truth and Power
BRIEF: Demonstrates how code and law co-construct identity as extractable capital; property frameworks actively create data as commodity.
#DataMinimization (1)
-
Allen (2024) SSI Moral Bankruptcy
BRIEF: SSI originator argues ecosystem became morally bankrupt by abandoning founding principles for market adoption and surveillance-enabling compromises.
#DataOwnership (2)
-
Purtova (2015) Illusion of Personal Data
BRIEF: Demonstrates “no one owns data” is illusion—corporations already claim quasi-property rights; individual ownership validates framework favoring institutional actors.
-
BRIEF: Comprehensive critique of “data ownership” frameworks; calls for grounding digital identity in human rights rather than property law.
#DataProperty (1)
-
Purtova (2015) Illusion of Personal Data
BRIEF: Demonstrates “no one owns data” is illusion—corporations already claim quasi-property rights; individual ownership validates framework favoring institutional actors.
#DataProtection (4)
-
Balkin (2016) Information Fiduciaries
BRIEF: Introduces “information fiduciary” concept—platforms holding user data owe fiduciary duties of care, confidentiality, and loyalty.
-
Nissenbaum (2009) Privacy in Context
BRIEF: Foundational privacy theory—violations occur when information flows breach context-specific norms, not merely when individuals lose control.
-
Open Government Partnership (2023)
BRIEF: Policy guidance on digital ID risks across 27 countries; recommends Human Rights Impact Assessments and meaningful participation of at-risk populations.
-
Purtova (2015) Illusion of Personal Data
BRIEF: Demonstrates “no one owns data” is illusion—corporations already claim quasi-property rights; individual ownership validates framework favoring institutional actors.
#DataRights (1)
-
BRIEF: Comprehensive critique of “data ownership” frameworks; calls for grounding digital identity in human rights rather than property law.
#DataSovereignty (1)
-
Kinstler (2025) Big Tech Wants Direct Access to Our Brains
BRIEF: Documents Big Tech BCI commercialization and neurorights movement seeking legal protections for mental privacy and cognitive liberty.
#DeAnonymization (1)
-
Narayanan & Shmatikov (2009) De-anonymizing Social Networks
BRIEF: Demonstrates that social graph structure enables re-identification even with perfect attribute anonymization—connection patterns are identifying.
#Decentralization (6)
-
Allen (2016) Path to Self-Sovereign Identity
BRIEF: Foundational 2016 article establishing 10 principles of self-sovereign identity and tracing identity system evolution from centralized to user-centric to self-sovereign models.
-
Allen (2024) SSI Moral Bankruptcy
BRIEF: SSI originator argues ecosystem became morally bankrupt by abandoning founding principles for market adoption and surveillance-enabling compromises.
-
BRIEF: Establishes “infrastructure without infrastructure”—systems functioning autonomously without centralized control, mathematics over policy.
-
Nottingham (2025) Age Restriction Architecture
BRIEF: IETF analysis identifying five architectural risks from age verification: centralization, privacy erosion, access barriers, fragmentation, and age-gated internet infrastructure.
-
Sheldrake (2019) Generative Identity
BRIEF: Proposes “generative identity” moving beyond self-sovereignty’s individual focus to embrace emergent, relational, and contextual identity.
-
BRIEF: Utah’s State-Endorsed Digital Identity framework establishing privacy-first, decentralized principles where identity belongs to individuals, not governments.
#DecentralizedIdentifiers (7)
-
BRIEF: Five-year SSI retrospective finds W3C success with mission drift toward institutional surveillance over refugee protection.
-
Ahmed et al. (2022) Blockchain SSI Survey
BRIEF: Survey of 153 blockchain identity articles establishing five essential components framework for evaluating BC-IDMS solutions.
-
Čučko & Turkanović (2021) SSI Systematic Mapping
BRIEF: First systematic mapping of SSI research reveals validation dominating, evaluation absent, and zero usability research.
-
Costa & Cunha (2024) Self-Sovereign Identities Survey
BRIEF: Reviews 94 blockchain SSI papers identifying theory-practice chasm, limited validation, interoperability gaps, and Global South exclusion.
-
Mühle et al. (2018) Essential Components of SSI
BRIEF: First comprehensive technical survey identifying four essential SSI components: decentralized identifiers, authentication, verifiable claims, and storage solutions.
-
Pava-Díaz et al. (2024) SSI on the Blockchain
BRIEF: Evaluates nine blockchain SSI frameworks against Allen’s principles, identifying portability and interoperability gaps from tight coupling.
-
W3C (2022) Decentralized Identifiers
BRIEF: W3C standard for decentralized, self-sovereign identifiers with cryptographic verification—foundational infrastructure for platform-independent delegation.
#DecentralizedIdentity (4)
-
Allen (2024) Open & Fuzzy Cliques
BRIEF: Extends cryptographic cliques with open (incomplete connectivity), fuzzy (threshold), and device variants for practical implementation.
-
boyd (2023) Structuring Algorithms
BRIEF: Framework showing algorithms structure networks via institutional arrangements, enabling network-based discrimination through data infrastructure control beyond categorical protections.
-
Celi et al. (2025) Private Age Verification Architecture
BRIEF: Separates content moderation from guardianship in age verification. Proposes guardian-issued DID credentials with client-side enforcement.
-
Pava-Díaz et al. (2024) SSI on the Blockchain
BRIEF: Evaluates nine blockchain SSI frameworks against Allen’s principles, identifying portability and interoperability gaps from tight coupling.
#DecentralizedMessaging (1)
-
BRIEF: Standard protocol for secure, authenticated messaging between DID-identified parties—foundational delegation protocol for SSI.
#DecisionMaking (1)
-
Bryan et al. (2010) Commitment Devices
BRIEF: Comprehensive review of commitment device research showing how voluntary constraints enable better outcomes.
#DecisionTheory (1)
-
Elster (1979) Ulysses and the Sirens
BRIEF: Foundational work on rational self-binding—Ulysses constraining future self enables otherwise impossible outcomes.
#DelegatedAuthority (1)
-
BRIEF: Explores cryptographic capabilities enabling selective disclosure and delegated authority through derived keys, threshold signatures, and ZKPs.
#Delegation (2)
-
Allen (2021) Principal Authority
BRIEF: Analyzes Wyoming SF0039’s legal grounding of digital identity in Agency law, reorganizing SSI principles as Principal rights and Agent duties.
-
Restatement Third of Agency (2006)
BRIEF: Authoritative U.S. codification of Agency law establishing enforceable duties agents owe principals with centuries of precedent.
#Democracy (1)
-
Zuboff (2019) Surveillance Capitalism
BRIEF: Develops surveillance capitalism framework—unprecedented economic logic extracting behavioral surplus and deploying instrumentarian power through ubiquitous computation.
#DeMottDeborah (1)
-
Restatement Third of Agency (2006)
BRIEF: Authoritative U.S. codification of Agency law establishing enforceable duties agents owe principals with centuries of precedent.
#DependentCare (1)
-
Sovrin Guardianship (2019/2023)
BRIEF: Explores guardianship necessity for SSI inclusivity given 2.9 billion without internet access; warns about “safeguarding dystopia.”
#DependentIdentityOwners (1)
-
Naik & Jenkins (2022) Is SSI Really Sovereign?
BRIEF: Critical assessment revealing SSI sovereignty as inherently contextual and jurisdiction-dependent rather than binary or absolute.
#Deplatforming (1)
-
Allen (2025) Right to Transact (draft)
BRIEF: Frames transactional freedom as constitutional right grounded in assembly and association, not merely financial access.
#Descartes (1)
-
Birhane (2017) Ubuntu Philosophy
BRIEF: Contrasts Western individualist “I think therefore I am” with Ubuntu’s relational personhood: “I am because we are.”
#DesignScienceResearch (1)
-
Garazha et al. (2024) Resilience in Times of Crisis
BRIEF: Derives seven design principles for SSI-based refugee identity through iterative prototyping with Ukrainian refugees in Switzerland.
#Deterrence (1)
-
Schelling (1960) Strategy of Conflict
BRIEF: Game theory classic showing how credible commitment enables cooperation impossible for uncommitted actors.
#DeviceCliques (1)
-
Allen (2024) Open & Fuzzy Cliques
BRIEF: Extends cryptographic cliques with open (incomplete connectivity), fuzzy (threshold), and device variants for practical implementation.
#DIDComm (1)
-
BRIEF: Standard protocol for secure, authenticated messaging between DID-identified parties—foundational delegation protocol for SSI.
#DIDProtocols (1)
-
BRIEF: Standard protocol for secure, authenticated messaging between DID-identified parties—foundational delegation protocol for SSI.
#DIDs (2)
-
Satybaldy et al. (2024) Taxonomy of SSI Challenges
BRIEF: Systematic literature review synthesizing SSI architectural framework, development lifecycle, and nine-category taxonomy of open challenges.
-
W3C (2022) Decentralized Identifiers
BRIEF: W3C standard for decentralized, self-sovereign identifiers with cryptographic verification—foundational infrastructure for platform-independent delegation.
#DidWeb (1)
-
Allen (2024) SSI Moral Bankruptcy
BRIEF: SSI originator argues ecosystem became morally bankrupt by abandoning founding principles for market adoption and surveillance-enabling compromises.
#DIF (1)
-
BRIEF: Standard protocol for secure, authenticated messaging between DID-identified parties—foundational delegation protocol for SSI.
#DigitalCertificates (1)
-
Dumitrescu & Pouwelse (2024) PKI Failures
BRIEF: Comprehensive analysis of PKI/X.509 paradigm assumptions and their consequences over decades—cautionary example for 2026 principles.
#DigitalCoercion (1)
-
Ehmke (2023) Dimensions of Digital Coercion
BRIEF: Systematic framework analyzing digital coercion through four dimensions across commercial and open-source platforms, proposing multi-layered standards as accountability.
#DigitalCredentials (1)
-
W3C (2024) Verifiable Credentials 2.0
BRIEF: W3C standard for machine-verifiable credentials—foundational data model for delegation, authorization, and revocability.
#DigitalDependency (1)
-
Wu (2018) Tyranny of Convenience
BRIEF: Analyzes how convenience becomes tyranny—small easy choices accumulate into structural dependency.
#DigitalDiscrimination (1)
-
Noble (2018) Algorithms of Oppression
BRIEF: Documents how search algorithms perpetuate racism and sexism, creating conformity pressure through biased categorizations users can’t see or contest.
#DigitalEconomy (2)
-
Dyer-Witheford (2015) Cyber-Proletariat
BRIEF: Examines digital capitalism’s creation of feudal dependencies masquerading as autonomy—platforms deepen subordination through service dependency.
-
Zuboff (2019) Surveillance Capitalism
BRIEF: Develops surveillance capitalism framework—unprecedented economic logic extracting behavioral surplus and deploying instrumentarian power through ubiquitous computation.
#DigitalFootprint (1)
-
BRIEF: Examines tension between children’s privacy rights and parental freedom; documents sharenting harms including identity theft and permanent digital footprints.
#DigitalID (1)
-
Open Government Partnership (2023)
BRIEF: Policy guidance on digital ID risks across 27 countries; recommends Human Rights Impact Assessments and meaningful participation of at-risk populations.
#DigitalIdentity (13)
-
Allen (2016) Path to Self-Sovereign Identity
BRIEF: Foundational 2016 article establishing 10 principles of self-sovereign identity and tracing identity system evolution from centralized to user-centric to self-sovereign models.
-
Allen (2021) Principal Authority
BRIEF: Analyzes Wyoming SF0039’s legal grounding of digital identity in Agency law, reorganizing SSI principles as Principal rights and Agent duties.
-
Allen (2025) Swiss e-ID Anchors
BRIEF: Demonstrates how government digital identity systems can preserve autonomy—addresses “voluntary in law” eroding to “mandatory in practice” pattern.
-
Ante et al. (2021) Bibliometric Review of Digital Identity
BRIEF: First bibliometric mapping of digital identity reveals seven fragmented streams with minimal cross-citation despite 7x publication growth.
-
Andrieu et al. (2020) Five Mental Models
BRIEF: Identifies five identity mental models (space-time, presentation, attribute, relationship, capability) and their intersections for SSI architecture.
-
Garazha et al. (2024) Resilience in Times of Crisis
BRIEF: Derives seven design principles for SSI-based refugee identity through iterative prototyping with Ukrainian refugees in Switzerland.
-
Nottingham (2025) Age Restriction Architecture
BRIEF: IETF analysis identifying five architectural risks from age verification: centralization, privacy erosion, access barriers, fragmentation, and age-gated internet infrastructure.
-
Pava-Díaz et al. (2024) SSI on the Blockchain
BRIEF: Evaluates nine blockchain SSI frameworks against Allen’s principles, identifying portability and interoperability gaps from tight coupling.
-
BRIEF: Comprehensive critique of “data ownership” frameworks; calls for grounding digital identity in human rights rather than property law.
-
Sheldrake (2019) Generative Identity
BRIEF: Proposes “generative identity” moving beyond self-sovereignty’s individual focus to embrace emergent, relational, and contextual identity.
-
BRIEF: State legislation recognizing digital identity credentials without creating government monopoly—model for “recognition without mandate.”
-
BRIEF: Utah’s State-Endorsed Digital Identity framework establishing privacy-first, decentralized principles where identity belongs to individuals, not governments.
-
Zwitter et al. (2020) SSI: The Good, The Bad and The Ugly
BRIEF: Critically examines SSI through philosophical, legal, and technical lenses, revealing naturalist-constructivist tensions requiring explicit governance decisions.
#DigitalInclusion (3)
-
Allen (2025) Right to Transact (draft)
BRIEF: Frames transactional freedom as constitutional right grounded in assembly and association, not merely financial access.
-
Open Government Partnership (2023)
BRIEF: Policy guidance on digital ID risks across 27 countries; recommends Human Rights Impact Assessments and meaningful participation of at-risk populations.
-
Sovrin Guardianship (2019/2023)
BRIEF: Explores guardianship necessity for SSI inclusivity given 2.9 billion without internet access; warns about “safeguarding dystopia.”
#DigitalInfrastructure (1)
-
BRIEF: Establishes “infrastructure without infrastructure”—systems functioning autonomously without centralized control, mathematics over policy.
#DigitalLabor (1)
-
Dyer-Witheford (2015) Cyber-Proletariat
BRIEF: Examines digital capitalism’s creation of feudal dependencies masquerading as autonomy—platforms deepen subordination through service dependency.
#DigitalLawFramework (1)
-
Allen (2025) Digital Law Framework
BRIEF: Four-layer model legislation demonstrating technology-neutral regulatory approach with anti-coercion provisions and platform independence requirements.
#DigitalPoorhouse (1)
-
Eubanks (2018) Automating Inequality
BRIEF: Examines how automated systems create “digital poorhouse” that profiles and punishes poor Americans through case studies of welfare, homeless services, and child welfare.
#DigitalPrivacy (2)
-
Balkin (2016) Information Fiduciaries
BRIEF: Introduces “information fiduciary” concept—platforms holding user data owe fiduciary duties of care, confidentiality, and loyalty.
-
BRIEF: Examines tension between children’s privacy rights and parental freedom; documents sharenting harms including identity theft and permanent digital footprints.
#DigitalRights (1)
-
Kinstler (2025) Big Tech Wants Direct Access to Our Brains
BRIEF: Documents Big Tech BCI commercialization and neurorights movement seeking legal protections for mental privacy and cognitive liberty.
#DigitalSignatureAct (1)
-
BRIEF: State legislation recognizing digital identity credentials without creating government monopoly—model for “recognition without mandate.”
#DigitalSignatures (1)
-
Allen (2025) Digital Law Framework
BRIEF: Four-layer model legislation demonstrating technology-neutral regulatory approach with anti-coercion provisions and platform independence requirements.
#DigitalSovereignty (2)
-
Grohmann (2025) Sovereignty-as-a-Service
BRIEF: Analyzes how Microsoft, Amazon, and Google redefined digital sovereignty from political capacity to commercial product—warning pattern for SSI.
-
Naik & Jenkins (2022) Is SSI Really Sovereign?
BRIEF: Critical assessment revealing SSI sovereignty as inherently contextual and jurisdiction-dependent rather than binary or absolute.
#DigitalWallet (2)
-
EU Regulation 2024/1183 eIDAS 2.0
BRIEF: EU digital identity framework demonstrating both benefits (legal recognition, interoperability) and risks (government-centric architecture, limited platform independence).
-
Garazha et al. (2024) Resilience in Times of Crisis
BRIEF: Derives seven design principles for SSI-based refugee identity through iterative prototyping with Ukrainian refugees in Switzerland.
#Dignity (2)
-
Radin (1996) Contested Commodities
BRIEF: Foundational market-inalienability theory—some things too bound up with personhood to commodify, including core identity attributes.
-
BRIEF: Foundational 1948 declaration establishing universal human dignity and rights as basis for international human rights law.
#Discipline (1)
-
Foucault (1977) Discipline and Punish
BRIEF: Classic analysis of how surveillance induces self-regulation—”visibility is a trap”—tracing punishment’s evolution from spectacle to psychological control.
#Discrimination (3)
-
Benjamin (2019) Race After Technology
BRIEF: Exposes how technologies reproduce racial inequity while appearing neutral, introducing “New Jim Code” concept for discriminatory automation.
-
boyd (2023) Structuring Algorithms
BRIEF: Framework showing algorithms structure networks via institutional arrangements, enabling network-based discrimination through data infrastructure control beyond categorical protections.
-
Eubanks (2018) Automating Inequality
BRIEF: Examines how automated systems create “digital poorhouse” that profiles and punishes poor Americans through case studies of welfare, homeless services, and child welfare.
#DistributedAuthority (1)
-
Baird et al. (2023) Threshold Signatures
BRIEF: Modern threshold signature schemes enabling distributed authority where K-of-N parties must cooperate—cryptographic foundation for preventing single points of failure.
#DistributedTrust (1)
-
BRIEF: IETF standard for threshold Schnorr signatures enabling distributed trust—emerging capability existing paradigms didn’t anticipate.
#DunbarNumber (1)
-
Grigg (2021) The Identity Cycle
BRIEF: Argues identity emerges from community, not state capture; validates through Kenyan chamas (200,000+ groups, $1.7B, 42% GDP).
#DyerWithefordNick (1)
-
Dyer-Witheford (2015) Cyber-Proletariat
BRIEF: Examines digital capitalism’s creation of feudal dependencies masquerading as autonomy—platforms deepen subordination through service dependency.
#EconomicPolicy (1)
-
Tcherneva (2025) Death of the Social Contract
BRIEF: Applies enshittification framework to labor market degradation, proposing job guarantee as circuit breaker restoring worker power.
#EconomicPsychology (1)
-
Bryan et al. (2010) Commitment Devices
BRIEF: Comprehensive review of commitment device research showing how voluntary constraints enable better outcomes.
#EconomicRights (1)
-
Radin (1996) Contested Commodities
BRIEF: Foundational market-inalienability theory—some things too bound up with personhood to commodify, including core identity attributes.
#EdgeIdentifiers (2)
-
BRIEF: Proposes relationship-based cryptographic identity using edge identifiers and cliques with Schnorr multisig protocols.
-
Allen (2024) Open & Fuzzy Cliques
BRIEF: Extends cryptographic cliques with open (incomplete connectivity), fuzzy (threshold), and device variants for practical implementation.
#EdwardSnowden (1)
-
Greenwald (2014) No Place to Hide (draft)
BRIEF: Documents Snowden’s NSA surveillance disclosures, examining unprecedented government abuse of power and implications for privacy and democracy.
#eIDAS (1)
-
EU Regulation 2024/1183 eIDAS 2.0
BRIEF: EU digital identity framework demonstrating both benefits (legal recognition, interoperability) and risks (government-centric architecture, limited platform independence).
#ElectionLaw (1)
-
BRIEF: Landmark ruling extending free speech protections to political spending—debatable whether expression through expenditure applies to identity transactions.
#ElectronicSignatures (1)
-
BRIEF: State legislation recognizing digital identity credentials without creating government monopoly—model for “recognition without mandate.”
#ElsterJon (1)
-
Elster (1979) Ulysses and the Sirens
BRIEF: Foundational work on rational self-binding—Ulysses constraining future self enables otherwise impossible outcomes.
#Emergence (1)
-
Sheldrake (2019) Generative Identity
BRIEF: Proposes “generative identity” moving beyond self-sovereignty’s individual focus to embrace emergent, relational, and contextual identity.
#Empowerment (1)
-
Garazha et al. (2024) Resilience in Times of Crisis
BRIEF: Derives seven design principles for SSI-based refugee identity through iterative prototyping with Ukrainian refugees in Switzerland.
#Enshittification (2)
-
BRIEF: Establishes “infrastructure without infrastructure”—systems functioning autonomously without centralized control, mathematics over policy.
-
Tcherneva (2025) Death of the Social Contract
BRIEF: Applies enshittification framework to labor market degradation, proposing job guarantee as circuit breaker restoring worker power.
#Ethics (1)
-
Radin (1996) Contested Commodities
BRIEF: Foundational market-inalienability theory—some things too bound up with personhood to commodify, including core identity attributes.
#EthicsOfPrivacy (1)
-
Nissenbaum (2009) Privacy in Context
BRIEF: Foundational privacy theory—violations occur when information flows breach context-specific norms, not merely when individuals lose control.
#EubanksVirginia (1)
-
Eubanks (2018) Automating Inequality
BRIEF: Examines how automated systems create “digital poorhouse” that profiles and punishes poor Americans through case studies of welfare, homeless services, and child welfare.
#EUDIW (1)
-
EU Regulation 2024/1183 eIDAS 2.0
BRIEF: EU digital identity framework demonstrating both benefits (legal recognition, interoperability) and risks (government-centric architecture, limited platform independence).
#EURegulation (1)
-
EU Regulation 2024/1183 eIDAS 2.0
BRIEF: EU digital identity framework demonstrating both benefits (legal recognition, interoperability) and risks (government-centric architecture, limited platform independence).
#EuropeanDigitalIdentity (1)
-
EU Regulation 2024/1183 eIDAS 2.0
BRIEF: EU digital identity framework demonstrating both benefits (legal recognition, interoperability) and risks (government-centric architecture, limited platform independence).
#EvaluationGap (1)
-
Čučko & Turkanović (2021) SSI Systematic Mapping
BRIEF: First systematic mapping of SSI research reveals validation dominating, evaluation absent, and zero usability research.
#ExodusProtocol (1)
-
BRIEF: Establishes “infrastructure without infrastructure”—systems functioning autonomously without centralized control, mathematics over policy.
#FamilyCare (1)
-
Sovrin Guardianship (2019/2023)
BRIEF: Explores guardianship necessity for SSI inclusivity given 2.9 billion without internet access; warns about “safeguarding dystopia.”
#FamilyPrivacy (1)
-
BRIEF: Examines tension between children’s privacy rights and parental freedom; documents sharenting harms including identity theft and permanent digital footprints.
#FarahanyNita (1)
-
Farahany (2023) Battle for Your Brain
BRIEF: Argues cognitive liberty (mental self-determination) is foundational right threatened by neurotechnology.
#Federalism (1)
-
Garazha et al. (2024) Resilience in Times of Crisis
BRIEF: Derives seven design principles for SSI-based refugee identity through iterative prototyping with Ukrainian refugees in Switzerland.
#FeministPoliticalTheory (1)
-
BRIEF: Allen traces SSI origins to five traditions: sovereignty, living systems, commons governance, feminist theory, and human rights.
#FiduciaryDuty (3)
-
Allen (2021) Principal Authority
BRIEF: Analyzes Wyoming SF0039’s legal grounding of digital identity in Agency law, reorganizing SSI principles as Principal rights and Agent duties.
-
Balkin (2016) Information Fiduciaries
BRIEF: Introduces “information fiduciary” concept—platforms holding user data owe fiduciary duties of care, confidentiality, and loyalty.
-
Restatement Third of Agency (2006)
BRIEF: Authoritative U.S. codification of Agency law establishing enforceable duties agents owe principals with centuries of precedent.
#FieldEvolution (1)
-
Ante et al. (2021) Bibliometric Review of Digital Identity
BRIEF: First bibliometric mapping of digital identity reveals seven fragmented streams with minimal cross-citation despite 7x publication growth.
#FinancialDeplatforming (1)
-
Carter (2023) Operation Choke Point 2.0
BRIEF: Documents financial system weaponization against legal industries through systematic banking access denial.
#FinancialFreedom (1)
-
Allen (2025) Right to Transact (draft)
BRIEF: Frames transactional freedom as constitutional right grounded in assembly and association, not merely financial access.
#FinancialInclusion (1)
-
Grigg (2021) The Identity Cycle
BRIEF: Argues identity emerges from community, not state capture; validates through Kenyan chamas (200,000+ groups, $1.7B, 42% GDP).
#Financialization (2)
-
boyd (2023) Structuring Algorithms
BRIEF: Framework showing algorithms structure networks via institutional arrangements, enabling network-based discrimination through data infrastructure control beyond categorical protections.
-
Tcherneva (2025) Death of the Social Contract
BRIEF: Applies enshittification framework to labor market degradation, proposing job guarantee as circuit breaker restoring worker power.
#FinancialSurveillance (1)
-
Carter (2023) Operation Choke Point 2.0
BRIEF: Documents financial system weaponization against legal industries through systematic banking access denial.
#FirstAmendment (3)
-
Balkin (2016) Information Fiduciaries
BRIEF: Introduces “information fiduciary” concept—platforms holding user data owe fiduciary duties of care, confidentiality, and loyalty.
-
BRIEF: Landmark ruling extending free speech protections to political spending—debatable whether expression through expenditure applies to identity transactions.
-
Penney (2016) Chilling Effects
BRIEF: First empirical evidence of regulatory chilling effects from online surveillance, documenting 30% traffic decline to sensitive Wikipedia articles post-Snowden.
#FocalPoints (1)
-
Schelling (1960) Strategy of Conflict
BRIEF: Game theory classic showing how credible commitment enables cooperation impossible for uncommitted actors.
#FoucaultMichel (1)
-
Foucault (1977) Discipline and Punish
BRIEF: Classic analysis of how surveillance induces self-regulation—”visibility is a trap”—tracing punishment’s evolution from spectacle to psychological control.
#FourHorsemen (1)
-
Allen (2024) SSI Moral Bankruptcy
BRIEF: SSI originator argues ecosystem became morally bankrupt by abandoning founding principles for market adoption and surveillance-enabling compromises.
#Fragmentation (1)
-
Nottingham (2025) Age Restriction Architecture
BRIEF: IETF analysis identifying five architectural risks from age verification: centralization, privacy erosion, access barriers, fragmentation, and age-gated internet infrastructure.
#Framework (1)
-
Andrieu et al. (2020) Five Mental Models
BRIEF: Identifies five identity mental models (space-time, presentation, attribute, relationship, capability) and their intersections for SSI architecture.
#FrameworkComparison (1)
-
Pava-Díaz et al. (2024) SSI on the Blockchain
BRIEF: Evaluates nine blockchain SSI frameworks against Allen’s principles, identifying portability and interoperability gaps from tight coupling.
#FreeAssociation (1)
-
Allen (2025) Right to Transact (draft)
BRIEF: Frames transactional freedom as constitutional right grounded in assembly and association, not merely financial access.
#FreedomOfThought (1)
-
Farahany (2023) Battle for Your Brain
BRIEF: Argues cognitive liberty (mental self-determination) is foundational right threatened by neurotechnology.
#FreedomToTransact (1)
-
Renieris (2022) Freedom to Transact Critique
BRIEF: Essential counterpoint—challenges absolute “right to transact” claims, distinguishing proportionate regulation from exclusionary gatekeeping.
#FreeSpeech (1)
-
BRIEF: Landmark ruling extending free speech protections to political spending—debatable whether expression through expenditure applies to identity transactions.
#FROST (3)
-
BRIEF: Proposes relationship-based cryptographic identity using edge identifiers and cliques with Schnorr multisig protocols.
-
Allen (2024) Open & Fuzzy Cliques
BRIEF: Extends cryptographic cliques with open (incomplete connectivity), fuzzy (threshold), and device variants for practical implementation.
-
BRIEF: IETF standard for threshold Schnorr signatures enabling distributed trust—emerging capability existing paradigms didn’t anticipate.
#FundamentalRights (1)
-
BRIEF: Foundational 1948 declaration establishing universal human dignity and rights as basis for international human rights law.
#FuzzyCliques (1)
-
Allen (2024) Open & Fuzzy Cliques
BRIEF: Extends cryptographic cliques with open (incomplete connectivity), fuzzy (threshold), and device variants for practical implementation.
#GameTheory (1)
-
Schelling (1960) Strategy of Conflict
BRIEF: Game theory classic showing how credible commitment enables cooperation impossible for uncommitted actors.
#GDPR (2)
-
BRIEF: Framework of 42 verifiable properties bridging SSI principles and legal/regulatory compliance requirements across jurisdictions.
-
Zwitter et al. (2020) SSI: The Good, The Bad and The Ugly
BRIEF: Critically examines SSI through philosophical, legal, and technical lenses, revealing naturalist-constructivist tensions requiring explicit governance decisions.
#GDPRCompliance (2)
-
Costa & Cunha (2024) Self-Sovereign Identities Survey
BRIEF: Reviews 94 blockchain SSI papers identifying theory-practice chasm, limited validation, interoperability gaps, and Global South exclusion.
-
Pava-Díaz et al. (2024) SSI on the Blockchain
BRIEF: Evaluates nine blockchain SSI frameworks against Allen’s principles, identifying portability and interoperability gaps from tight coupling.
#GenerativeAI (1)
-
Zhu et al. (2024) Generative AI Security
BRIEF: Analyzes GenAI security; traditional defenses fail, requiring AI firewalls, guardrails, watermarking for social engineering attacks.
#GenerativeIdentity (1)
-
Sheldrake (2019) Generative Identity
BRIEF: Proposes “generative identity” moving beyond self-sovereignty’s individual focus to embrace emergent, relational, and contextual identity.
#GlobalDevelopment (1)
-
Open Government Partnership (2023)
BRIEF: Policy guidance on digital ID risks across 27 countries; recommends Human Rights Impact Assessments and meaningful participation of at-risk populations.
#GlobalLabor (1)
-
Dyer-Witheford (2015) Cyber-Proletariat
BRIEF: Examines digital capitalism’s creation of feudal dependencies masquerading as autonomy—platforms deepen subordination through service dependency.
#GlobalSouth (1)
-
Costa & Cunha (2024) Self-Sovereign Identities Survey
BRIEF: Reviews 94 blockchain SSI papers identifying theory-practice chasm, limited validation, interoperability gaps, and Global South exclusion.
#Google (1)
-
Grohmann (2025) Sovereignty-as-a-Service
BRIEF: Analyzes how Microsoft, Amazon, and Google redefined digital sovereignty from political capacity to commercial product—warning pattern for SSI.
#GovernanceFrameworks (1)
-
Ahmed et al. (2022) Blockchain SSI Survey
BRIEF: Survey of 153 blockchain identity articles establishing five essential components framework for evaluating BC-IDMS solutions.
#GovernmentAccountability (1)
-
Open Government Partnership (2023)
BRIEF: Policy guidance on digital ID risks across 27 countries; recommends Human Rights Impact Assessments and meaningful participation of at-risk populations.
#GovernmentAsAPlatform (1)
-
Garazha et al. (2024) Resilience in Times of Crisis
BRIEF: Derives seven design principles for SSI-based refugee identity through iterative prototyping with Ukrainian refugees in Switzerland.
#GovernmentID (2)
-
Allen (2025) Swiss e-ID Anchors
BRIEF: Demonstrates how government digital identity systems can preserve autonomy—addresses “voluntary in law” eroding to “mandatory in practice” pattern.
-
BRIEF: Utah’s State-Endorsed Digital Identity framework establishing privacy-first, decentralized principles where identity belongs to individuals, not governments.
#GovernmentOverreach (2)
-
Carter (2023) Operation Choke Point 2.0
BRIEF: Documents financial system weaponization against legal industries through systematic banking access denial.
-
Greenwald (2014) No Place to Hide (draft)
BRIEF: Documents Snowden’s NSA surveillance disclosures, examining unprecedented government abuse of power and implications for privacy and democracy.
#GradualIdentification (1)
-
Garazha et al. (2024) Resilience in Times of Crisis
BRIEF: Derives seven design principles for SSI-based refugee identity through iterative prototyping with Ukrainian refugees in Switzerland.
#GraphAnalysis (1)
-
Narayanan & Shmatikov (2009) De-anonymizing Social Networks
BRIEF: Demonstrates that social graph structure enables re-identification even with perfect attribute anonymization—connection patterns are identifying.
#GreenwaldGlenn (1)
-
Greenwald (2014) No Place to Hide (draft)
BRIEF: Documents Snowden’s NSA surveillance disclosures, examining unprecedented government abuse of power and implications for privacy and democracy.
#GriggIan (1)
-
Grigg (2021) The Identity Cycle
BRIEF: Argues identity emerges from community, not state capture; validates through Kenyan chamas (200,000+ groups, $1.7B, 42% GDP).
#GroupFormingNetworks (1)
-
Grigg (2021) The Identity Cycle
BRIEF: Argues identity emerges from community, not state capture; validates through Kenyan chamas (200,000+ groups, $1.7B, 42% GDP).
#Guardianship (2)
-
Baird et al. (2023) Threshold Signatures
BRIEF: Modern threshold signature schemes enabling distributed authority where K-of-N parties must cooperate—cryptographic foundation for preventing single points of failure.
-
Sovrin Guardianship (2019/2023)
BRIEF: Explores guardianship necessity for SSI inclusivity given 2.9 billion without internet access; warns about “safeguarding dystopia.”
#GuardianshipModel (1)
-
Celi et al. (2025) Private Age Verification Architecture
BRIEF: Separates content moderation from guardianship in age verification. Proposes guardian-issued DID credentials with client-side enforcement.
#HarrisCheryl (1)
-
Harris (1993) Whiteness as Property
BRIEF: Demonstrates how property law historically encoded racial hierarchies—whiteness functioned as property granting access, opportunity, protection.
#HDKeys (1)
-
BRIEF: Explores cryptographic capabilities enabling selective disclosure and delegated authority through derived keys, threshold signatures, and ZKPs.
#Heidegger (1)
-
Hui (2016) Question Concerning Technology in China
BRIEF: Argues sovereignty isn’t universal but culturally situated—global SSI must negotiate across traditions rather than imposing single Western model.
#HighModernism (1)
-
Scott (1998) Seeing Like a State (draft)
BRIEF: Examines failed large-scale state interventions, identifying how “legibility” requirements destroy local knowledge and contextual complexity.
#HuiYuk (1)
-
Hui (2016) Question Concerning Technology in China
BRIEF: Argues sovereignty isn’t universal but culturally situated—global SSI must negotiate across traditions rather than imposing single Western model.
#HumanAutonomy (1)
-
Zuboff (2019) Surveillance Capitalism
BRIEF: Develops surveillance capitalism framework—unprecedented economic logic extracting behavioral surplus and deploying instrumentarian power through ubiquitous computation.
#HumanitarianTechnology (1)
-
Garazha et al. (2024) Resilience in Times of Crisis
BRIEF: Derives seven design principles for SSI-based refugee identity through iterative prototyping with Ukrainian refugees in Switzerland.
#HumanRights (9)
-
BRIEF: Allen traces SSI origins to five traditions: sovereignty, living systems, commons governance, feminist theory, and human rights.
-
Farahany (2023) Battle for Your Brain
BRIEF: Argues cognitive liberty (mental self-determination) is foundational right threatened by neurotechnology.
-
BRIEF: Binding international treaty establishing legal personhood as universal right, extending UDHR principles into enforceable international law.
-
Kinstler (2025) Big Tech Wants Direct Access to Our Brains
BRIEF: Documents Big Tech BCI commercialization and neurorights movement seeking legal protections for mental privacy and cognitive liberty.
-
Open Government Partnership (2023)
BRIEF: Policy guidance on digital ID risks across 27 countries; recommends Human Rights Impact Assessments and meaningful participation of at-risk populations.
-
Renieris (2022) Freedom to Transact Critique
BRIEF: Essential counterpoint—challenges absolute “right to transact” claims, distinguishing proportionate regulation from exclusionary gatekeeping.
-
BRIEF: Comprehensive critique of “data ownership” frameworks; calls for grounding digital identity in human rights rather than property law.
-
BRIEF: Foundational 1948 declaration establishing universal human dignity and rights as basis for international human rights law.
-
Zwitter et al. (2020) SSI: The Good, The Bad and The Ugly
BRIEF: Critically examines SSI through philosophical, legal, and technical lenses, revealing naturalist-constructivist tensions requiring explicit governance decisions.
#HyperledgerIndy (1)
-
Naik & Jenkins (2020) Governing Principles of SSI
BRIEF: 20-principle SSI evaluation framework extending Allen’s 10 principles; comparative analysis reveals technical maturity but operational gaps.
#ICCPR (1)
-
BRIEF: Binding international treaty establishing legal personhood as universal right, extending UDHR principles into enforceable international law.
#IdentifierPortability (1)
-
W3C (2022) Decentralized Identifiers
BRIEF: W3C standard for decentralized, self-sovereign identifiers with cryptographic verification—foundational infrastructure for platform-independent delegation.
#Identity (3)
-
Allen (2016) Path to Self-Sovereign Identity
BRIEF: Foundational 2016 article establishing 10 principles of self-sovereign identity and tracing identity system evolution from centralized to user-centric to self-sovereign models.
-
Andrieu et al. (2020) Five Mental Models
BRIEF: Identifies five identity mental models (space-time, presentation, attribute, relationship, capability) and their intersections for SSI architecture.
-
Grigg (2021) The Identity Cycle
BRIEF: Argues identity emerges from community, not state capture; validates through Kenyan chamas (200,000+ groups, $1.7B, 42% GDP).
#IdentityArchitecture (1)
-
Mühle et al. (2018) Essential Components of SSI
BRIEF: First comprehensive technical survey identifying four essential SSI components: decentralized identifiers, authentication, verifiable claims, and storage solutions.
#IdentityBasedCryptography (1)
-
Ante et al. (2021) Bibliometric Review of Digital Identity
BRIEF: First bibliometric mapping of digital identity reveals seven fragmented streams with minimal cross-citation despite 7x publication growth.
#IdentityDelegation (1)
-
Sovrin Guardianship (2019/2023)
BRIEF: Explores guardianship necessity for SSI inclusivity given 2.9 billion without internet access; warns about “safeguarding dystopia.”
#IdentityGovernance (3)
-
BRIEF: Framework of 42 verifiable properties bridging SSI principles and legal/regulatory compliance requirements across jurisdictions.
-
Naik & Jenkins (2022) Is SSI Really Sovereign?
BRIEF: Critical assessment revealing SSI sovereignty as inherently contextual and jurisdiction-dependent rather than binary or absolute.
-
Zwitter et al. (2020) SSI: The Good, The Bad and The Ugly
BRIEF: Critically examines SSI through philosophical, legal, and technical lenses, revealing naturalist-constructivist tensions requiring explicit governance decisions.
#IdentityManagement (3)
-
Garazha et al. (2024) Resilience in Times of Crisis
BRIEF: Derives seven design principles for SSI-based refugee identity through iterative prototyping with Ukrainian refugees in Switzerland.
-
Naik & Jenkins (2020) Governing Principles of SSI
BRIEF: 20-principle SSI evaluation framework extending Allen’s 10 principles; comparative analysis reveals technical maturity but operational gaps.
-
Pava-Díaz et al. (2024) SSI on the Blockchain
BRIEF: Evaluates nine blockchain SSI frameworks against Allen’s principles, identifying portability and interoperability gaps from tight coupling.
#IdentityPhilosophy (1)
-
Zwitter et al. (2020) SSI: The Good, The Bad and The Ugly
BRIEF: Critically examines SSI through philosophical, legal, and technical lenses, revealing naturalist-constructivist tensions requiring explicit governance decisions.
#IdentityPortability (1)
-
Pava-Díaz et al. (2024) SSI on the Blockchain
BRIEF: Evaluates nine blockchain SSI frameworks against Allen’s principles, identifying portability and interoperability gaps from tight coupling.
#IdentityPrinciples (2)
-
Allen (2016) Path to Self-Sovereign Identity
BRIEF: Foundational 2016 article establishing 10 principles of self-sovereign identity and tracing identity system evolution from centralized to user-centric to self-sovereign models.
-
Naik & Jenkins (2020) Governing Principles of SSI
BRIEF: 20-principle SSI evaluation framework extending Allen’s 10 principles; comparative analysis reveals technical maturity but operational gaps.
#IdentityTheft (1)
-
BRIEF: Examines tension between children’s privacy rights and parental freedom; documents sharenting harms including identity theft and permanent digital footprints.
#IdentityTheory (2)
-
Andrieu et al. (2020) Five Mental Models
BRIEF: Identifies five identity mental models (space-time, presentation, attribute, relationship, capability) and their intersections for SSI architecture.
-
Sheldrake (2019) Generative Identity
BRIEF: Proposes “generative identity” moving beyond self-sovereignty’s individual focus to embrace emergent, relational, and contextual identity.
#IETF (1)
-
BRIEF: IETF standard for threshold Schnorr signatures enabling distributed trust—emerging capability existing paradigms didn’t anticipate.
#Inclusion (1)
-
Open Government Partnership (2023)
BRIEF: Policy guidance on digital ID risks across 27 countries; recommends Human Rights Impact Assessments and meaningful participation of at-risk populations.
#Inequality (1)
-
Khan & Vaheesan (2017) Market Power (draft)
BRIEF: Analyzes how market power concentration enables gatekeeping and exclusion—applies directly to SSI infrastructure where monopoly positions create participation barriers.
#InformationalCapitalism (1)
-
Cohen (2019) Between Truth and Power
BRIEF: Demonstrates how code and law co-construct identity as extractable capital; property frameworks actively create data as commodity.
#InformationAsymmetry (1)
-
Solove (2013) Privacy Self-Management
BRIEF: Demonstrates privacy consent mechanisms fail—assumptions of informed, empowered users false given information asymmetry and manufactured consent.
#InformationFiduciaries (1)
-
Balkin (2016) Information Fiduciaries
BRIEF: Introduces “information fiduciary” concept—platforms holding user data owe fiduciary duties of care, confidentiality, and loyalty.
#InformationFlow (1)
-
Nissenbaum (2009) Privacy in Context
BRIEF: Foundational privacy theory—violations occur when information flows breach context-specific norms, not merely when individuals lose control.
#InformationScience (1)
-
Noble (2018) Algorithms of Oppression
BRIEF: Documents how search algorithms perpetuate racism and sexism, creating conformity pressure through biased categorizations users can’t see or contest.
#InformationSeeking (1)
-
Penney (2016) Chilling Effects
BRIEF: First empirical evidence of regulatory chilling effects from online surveillance, documenting 30% traffic decline to sensitive Wikipedia articles post-Snowden.
#InformedConsent (1)
-
Solove (2013) Privacy Self-Management
BRIEF: Demonstrates privacy consent mechanisms fail—assumptions of informed, empowered users false given information asymmetry and manufactured consent.
#InfrastructureStudies (1)
-
boyd (2023) Structuring Algorithms
BRIEF: Framework showing algorithms structure networks via institutional arrangements, enabling network-based discrimination through data infrastructure control beyond categorical protections.
#InstitutionalCapture (1)
-
Allen (2024) SSI Moral Bankruptcy
BRIEF: SSI originator argues ecosystem became morally bankrupt by abandoning founding principles for market adoption and surveillance-enabling compromises.
#InstitutionalChange (1)
-
Cohen (2019) Between Truth and Power
BRIEF: Demonstrates how code and law co-construct identity as extractable capital; property frameworks actively create data as commodity.
#InstitutionalSafeguards (1)
-
Allen (2025) Swiss e-ID Anchors
BRIEF: Demonstrates how government digital identity systems can preserve autonomy—addresses “voluntary in law” eroding to “mandatory in practice” pattern.
#IntellectualHistory (1)
-
BRIEF: Allen traces SSI origins to five traditions: sovereignty, living systems, commons governance, feminist theory, and human rights.
#Interdependence (1)
-
Birhane (2017) Ubuntu Philosophy
BRIEF: Contrasts Western individualist “I think therefore I am” with Ubuntu’s relational personhood: “I am because we are.”
#InterdisciplinaryGaps (1)
-
Ante et al. (2021) Bibliometric Review of Digital Identity
BRIEF: First bibliometric mapping of digital identity reveals seven fragmented streams with minimal cross-citation despite 7x publication growth.
#InternationalLaw (2)
-
BRIEF: Binding international treaty establishing legal personhood as universal right, extending UDHR principles into enforceable international law.
-
BRIEF: Foundational 1948 declaration establishing universal human dignity and rights as basis for international human rights law.
#InternetArchitecture (1)
-
Nottingham (2025) Age Restriction Architecture
BRIEF: IETF analysis identifying five architectural risks from age verification: centralization, privacy erosion, access barriers, fragmentation, and age-gated internet infrastructure.
#Interoperability (2)
-
Costa & Cunha (2024) Self-Sovereign Identities Survey
BRIEF: Reviews 94 blockchain SSI papers identifying theory-practice chasm, limited validation, interoperability gaps, and Global South exclusion.
-
Satybaldy et al. (2024) Taxonomy of SSI Challenges
BRIEF: Systematic literature review synthesizing SSI architectural framework, development lifecycle, and nine-category taxonomy of open challenges.
#InteroperabilityChallenges (1)
-
Ahmed et al. (2022) Blockchain SSI Survey
BRIEF: Survey of 153 blockchain identity articles establishing five essential components framework for evaluating BC-IDMS solutions.
#InteroperabilityStandards (2)
-
EU Regulation 2024/1183 eIDAS 2.0
BRIEF: EU digital identity framework demonstrating both benefits (legal recognition, interoperability) and risks (government-centric architecture, limited platform independence).
-
Pava-Díaz et al. (2024) SSI on the Blockchain
BRIEF: Evaluates nine blockchain SSI frameworks against Allen’s principles, identifying portability and interoperability gaps from tight coupling.
#IoTIdentity (1)
-
Ante et al. (2021) Bibliometric Review of Digital Identity
BRIEF: First bibliometric mapping of digital identity reveals seven fragmented streams with minimal cross-citation despite 7x publication growth.
#Jailbreaking (1)
-
Zhu et al. (2024) Generative AI Security
BRIEF: Analyzes GenAI security; traditional defenses fail, requiring AI firewalls, guardrails, watermarking for social engineering attacks.
#JobGuarantee (1)
-
Tcherneva (2025) Death of the Social Contract
BRIEF: Applies enshittification framework to labor market degradation, proposing job guarantee as circuit breaker restoring worker power.
#JurisdictionalVariation (1)
-
Naik & Jenkins (2022) Is SSI Really Sovereign?
BRIEF: Critical assessment revealing SSI sovereignty as inherently contextual and jurisdiction-dependent rather than binary or absolute.
#Kenya (1)
-
Grigg (2021) The Identity Cycle
BRIEF: Argues identity emerges from community, not state capture; validates through Kenyan chamas (200,000+ groups, $1.7B, 42% GDP).
#KeyDerivation (1)
-
BRIEF: Explores cryptographic capabilities enabling selective disclosure and delegated authority through derived keys, threshold signatures, and ZKPs.
#KeyManagement (1)
-
Satybaldy et al. (2024) Taxonomy of SSI Challenges
BRIEF: Systematic literature review synthesizing SSI architectural framework, development lifecycle, and nine-category taxonomy of open challenges.
#KeyRecovery (1)
-
Baird et al. (2023) Threshold Signatures
BRIEF: Modern threshold signature schemes enabling distributed authority where K-of-N parties must cooperate—cryptographic foundation for preventing single points of failure.
#KhanLina (1)
-
Khan & Vaheesan (2017) Market Power (draft)
BRIEF: Analyzes how market power concentration enables gatekeeping and exclusion—applies directly to SSI infrastructure where monopoly positions create participation barriers.
#KofNSignatures (1)
-
Baird et al. (2023) Threshold Signatures
BRIEF: Modern threshold signature schemes enabling distributed authority where K-of-N parties must cooperate—cryptographic foundation for preventing single points of failure.
#LaborEconomics (1)
-
Tcherneva (2025) Death of the Social Contract
BRIEF: Applies enshittification framework to labor market degradation, proposing job guarantee as circuit breaker restoring worker power.
#LaborExploitation (1)
-
Dyer-Witheford (2015) Cyber-Proletariat
BRIEF: Examines digital capitalism’s creation of feudal dependencies masquerading as autonomy—platforms deepen subordination through service dependency.
#LaborMarkets (1)
-
Tcherneva (2025) Death of the Social Contract
BRIEF: Applies enshittification framework to labor market degradation, proposing job guarantee as circuit breaker restoring worker power.
#LegalArchitecture (1)
-
Allen (2025) Digital Law Framework
BRIEF: Four-layer model legislation demonstrating technology-neutral regulatory approach with anti-coercion provisions and platform independence requirements.
#LegalDoctrine (1)
-
Restatement Third of Agency (2006)
BRIEF: Authoritative U.S. codification of Agency law establishing enforceable duties agents owe principals with centuries of precedent.
#LegalFoundation (1)
-
BRIEF: Foundational 1948 declaration establishing universal human dignity and rights as basis for international human rights law.
#LegalFramework (2)
-
Allen (2021) Principal Authority
BRIEF: Analyzes Wyoming SF0039’s legal grounding of digital identity in Agency law, reorganizing SSI principles as Principal rights and Agent duties.
-
BRIEF: Framework of 42 verifiable properties bridging SSI principles and legal/regulatory compliance requirements across jurisdictions.
#LegalHistory (1)
-
Harris (1993) Whiteness as Property
BRIEF: Demonstrates how property law historically encoded racial hierarchies—whiteness functioned as property granting access, opportunity, protection.
#LegalPersonhood (1)
-
BRIEF: Binding international treaty establishing legal personhood as universal right, extending UDHR principles into enforceable international law.
#LegalRecognition (1)
-
BRIEF: State legislation recognizing digital identity credentials without creating government monopoly—model for “recognition without mandate.”
#LegalTheory (4)
-
Balkin (2016) Information Fiduciaries
BRIEF: Introduces “information fiduciary” concept—platforms holding user data owe fiduciary duties of care, confidentiality, and loyalty.
-
Cohen (2019) Between Truth and Power
BRIEF: Demonstrates how code and law co-construct identity as extractable capital; property frameworks actively create data as commodity.
-
Purtova (2015) Illusion of Personal Data
BRIEF: Demonstrates “no one owns data” is illusion—corporations already claim quasi-property rights; individual ownership validates framework favoring institutional actors.
-
Radin (1996) Contested Commodities
BRIEF: Foundational market-inalienability theory—some things too bound up with personhood to commodify, including core identity attributes.
#LegalTreatise (1)
-
Restatement Third of Agency (2006)
BRIEF: Authoritative U.S. codification of Agency law establishing enforceable duties agents owe principals with centuries of precedent.
#Legibility (1)
-
Scott (1998) Seeing Like a State (draft)
BRIEF: Examines failed large-scale state interventions, identifying how “legibility” requirements destroy local knowledge and contextual complexity.
#LESSIdentity (1)
-
BRIEF: Five-year SSI retrospective finds W3C success with mission drift toward institutional surveillance over refugee protection.
#LibraryDependencies (1)
-
Chatel et al. (2025) PETs Limitations in Age Verification
BRIEF: PETs solve only application-layer privacy, not circumvention, censorship, or effectiveness. Complex libraries become “prisons” centralizing power.
#LiteratureReview (1)
-
Čučko & Turkanović (2021) SSI Systematic Mapping
BRIEF: First systematic mapping of SSI research reveals validation dominating, evaluation absent, and zero usability research.
#LivingSystemsTheory (1)
-
BRIEF: Allen traces SSI origins to five traditions: sovereignty, living systems, commons governance, feminist theory, and human rights.
#LLMSecurity (1)
-
Zhu et al. (2024) Generative AI Security
BRIEF: Analyzes GenAI security; traditional defenses fail, requiring AI firewalls, guardrails, watermarking for social engineering attacks.
#LocalKnowledge (1)
-
Scott (1998) Seeing Like a State (draft)
BRIEF: Examines failed large-scale state interventions, identifying how “legibility” requirements destroy local knowledge and contextual complexity.
#LockIn (1)
-
Wu (2018) Tyranny of Convenience
BRIEF: Analyzes how convenience becomes tyranny—small easy choices accumulate into structural dependency.
#MachineLearning (2)
-
boyd (2023) Structuring Algorithms
BRIEF: Framework showing algorithms structure networks via institutional arrangements, enabling network-based discrimination through data infrastructure control beyond categorical protections.
-
Zhu et al. (2024) Generative AI Security
BRIEF: Analyzes GenAI security; traditional defenses fail, requiring AI firewalls, guardrails, watermarking for social engineering attacks.
#MarketInalienability (1)
-
Radin (1996) Contested Commodities
BRIEF: Foundational market-inalienability theory—some things too bound up with personhood to commodify, including core identity attributes.
#MarketPower (1)
-
Khan & Vaheesan (2017) Market Power (draft)
BRIEF: Analyzes how market power concentration enables gatekeeping and exclusion—applies directly to SSI infrastructure where monopoly positions create participation barriers.
#MassSurveillance (1)
-
Greenwald (2014) No Place to Hide (draft)
BRIEF: Documents Snowden’s NSA surveillance disclosures, examining unprecedented government abuse of power and implications for privacy and democracy.
#MathematicsOverPolicy (1)
-
BRIEF: Establishes “infrastructure without infrastructure”—systems functioning autonomously without centralized control, mathematics over policy.
#MeaningCapture (1)
-
Grohmann (2025) Sovereignty-as-a-Service
BRIEF: Analyzes how Microsoft, Amazon, and Google redefined digital sovereignty from political capacity to commercial product—warning pattern for SSI.
#MemberStateImplementation (1)
-
EU Regulation 2024/1183 eIDAS 2.0
BRIEF: EU digital identity framework demonstrating both benefits (legal recognition, interoperability) and risks (government-centric architecture, limited platform independence).
#MentalModels (1)
-
Andrieu et al. (2020) Five Mental Models
BRIEF: Identifies five identity mental models (space-time, presentation, attribute, relationship, capability) and their intersections for SSI architecture.
#MentalPrivacy (2)
-
Farahany (2023) Battle for Your Brain
BRIEF: Argues cognitive liberty (mental self-determination) is foundational right threatened by neurotechnology.
-
Kinstler (2025) Big Tech Wants Direct Access to Our Brains
BRIEF: Documents Big Tech BCI commercialization and neurorights movement seeking legal protections for mental privacy and cognitive liberty.
#MetadataLeakage (1)
-
Chatel et al. (2025) PETs Limitations in Age Verification
BRIEF: PETs solve only application-layer privacy, not circumvention, censorship, or effectiveness. Complex libraries become “prisons” centralizing power.
#MetaResearch (1)
-
Ante et al. (2021) Bibliometric Review of Digital Identity
BRIEF: First bibliometric mapping of digital identity reveals seven fragmented streams with minimal cross-citation despite 7x publication growth.
#Metaverse (1)
-
BRIEF: Comprehensive critique of “data ownership” frameworks; calls for grounding digital identity in human rights rather than property law.
#MethodologicalInnovation (1)
-
Tcherneva (2025) Death of the Social Contract
BRIEF: Applies enshittification framework to labor market degradation, proposing job guarantee as circuit breaker restoring worker power.
#Metis (1)
-
Scott (1998) Seeing Like a State (draft)
BRIEF: Examines failed large-scale state interventions, identifying how “legibility” requirements destroy local knowledge and contextual complexity.
#Microsoft (1)
-
Grohmann (2025) Sovereignty-as-a-Service
BRIEF: Analyzes how Microsoft, Amazon, and Google redefined digital sovereignty from political capacity to commercial product—warning pattern for SSI.
#MillerMarkS (1)
-
Miller et al. (2003) Capability Myths Demolished
BRIEF: Foundational OCaps paper demonstrating how capability possession equals authority—foundational model for SSI delegation.
#MINDAct (1)
-
Kinstler (2025) Big Tech Wants Direct Access to Our Brains
BRIEF: Documents Big Tech BCI commercialization and neurorights movement seeking legal protections for mental privacy and cognitive liberty.
#MindReading (1)
-
Kinstler (2025) Big Tech Wants Direct Access to Our Brains
BRIEF: Documents Big Tech BCI commercialization and neurorights movement seeking legal protections for mental privacy and cognitive liberty.
#MinskyianAnalysis (1)
-
Tcherneva (2025) Death of the Social Contract
BRIEF: Applies enshittification framework to labor market degradation, proposing job guarantee as circuit breaker restoring worker power.
#MissionDrift (1)
-
BRIEF: Five-year SSI retrospective finds W3C success with mission drift toward institutional surveillance over refugee protection.
#MKUltra (1)
-
Kinstler (2025) Big Tech Wants Direct Access to Our Brains
BRIEF: Documents Big Tech BCI commercialization and neurorights movement seeking legal protections for mental privacy and cognitive liberty.
#ModelLegislation (1)
-
Allen (2025) Digital Law Framework
BRIEF: Four-layer model legislation demonstrating technology-neutral regulatory approach with anti-coercion provisions and platform independence requirements.
#MoneyManagerCapitalism (1)
-
Tcherneva (2025) Death of the Social Contract
BRIEF: Applies enshittification framework to labor market degradation, proposing job guarantee as circuit breaker restoring worker power.
#Monopoly (1)
-
Khan & Vaheesan (2017) Market Power (draft)
BRIEF: Analyzes how market power concentration enables gatekeeping and exclusion—applies directly to SSI infrastructure where monopoly positions create participation barriers.
#MoralBankruptcy (1)
-
Allen (2024) SSI Moral Bankruptcy
BRIEF: SSI originator argues ecosystem became morally bankrupt by abandoning founding principles for market adoption and surveillance-enabling compromises.
#MPC (1)
-
Allen (2024) Open & Fuzzy Cliques
BRIEF: Extends cryptographic cliques with open (incomplete connectivity), fuzzy (threshold), and device variants for practical implementation.
#MultiPartyComputation (3)
-
BRIEF: Proposes relationship-based cryptographic identity using edge identifiers and cliques with Schnorr multisig protocols.
-
Baird et al. (2023) Threshold Signatures
BRIEF: Modern threshold signature schemes enabling distributed authority where K-of-N parties must cooperate—cryptographic foundation for preventing single points of failure.
-
BRIEF: IETF standard for threshold Schnorr signatures enabling distributed trust—emerging capability existing paradigms didn’t anticipate.
#MuSig2 (2)
-
BRIEF: Proposes relationship-based cryptographic identity using edge identifiers and cliques with Schnorr multisig protocols.
-
Allen (2024) Open & Fuzzy Cliques
BRIEF: Extends cryptographic cliques with open (incomplete connectivity), fuzzy (threshold), and device variants for practical implementation.
#NAIRU (1)
-
Tcherneva (2025) Death of the Social Contract
BRIEF: Applies enshittification framework to labor market degradation, proposing job guarantee as circuit breaker restoring worker power.
#NarayananArvind (1)
-
Narayanan & Shmatikov (2009) De-anonymizing Social Networks
BRIEF: Demonstrates that social graph structure enables re-identification even with perfect attribute anonymization—connection patterns are identifying.
#NationalSecurity (1)
-
Greenwald (2014) No Place to Hide (draft)
BRIEF: Documents Snowden’s NSA surveillance disclosures, examining unprecedented government abuse of power and implications for privacy and democracy.
#Negotiation (1)
-
Schelling (1960) Strategy of Conflict
BRIEF: Game theory classic showing how credible commitment enables cooperation impossible for uncommitted actors.
#NetworkEffects (1)
-
Wu (2018) Tyranny of Convenience
BRIEF: Analyzes how convenience becomes tyranny—small easy choices accumulate into structural dependency.
#NetworkMaking (1)
-
boyd (2023) Structuring Algorithms
BRIEF: Framework showing algorithms structure networks via institutional arrangements, enabling network-based discrimination through data infrastructure control beyond categorical protections.
#NetworkPrivacy (1)
-
Narayanan & Shmatikov (2009) De-anonymizing Social Networks
BRIEF: Demonstrates that social graph structure enables re-identification even with perfect attribute anonymization—connection patterns are identifying.
#NeuralData (1)
-
Kinstler (2025) Big Tech Wants Direct Access to Our Brains
BRIEF: Documents Big Tech BCI commercialization and neurorights movement seeking legal protections for mental privacy and cognitive liberty.
#Neuralink (1)
-
Kinstler (2025) Big Tech Wants Direct Access to Our Brains
BRIEF: Documents Big Tech BCI commercialization and neurorights movement seeking legal protections for mental privacy and cognitive liberty.
#Neurorights (2)
-
Farahany (2023) Battle for Your Brain
BRIEF: Argues cognitive liberty (mental self-determination) is foundational right threatened by neurotechnology.
-
Kinstler (2025) Big Tech Wants Direct Access to Our Brains
BRIEF: Documents Big Tech BCI commercialization and neurorights movement seeking legal protections for mental privacy and cognitive liberty.
#Neurotechnology (2)
-
Farahany (2023) Battle for Your Brain
BRIEF: Argues cognitive liberty (mental self-determination) is foundational right threatened by neurotechnology.
-
Kinstler (2025) Big Tech Wants Direct Access to Our Brains
BRIEF: Documents Big Tech BCI commercialization and neurorights movement seeking legal protections for mental privacy and cognitive liberty.
#NewJimCode (1)
-
Benjamin (2019) Race After Technology
BRIEF: Exposes how technologies reproduce racial inequity while appearing neutral, introducing “New Jim Code” concept for discriminatory automation.
#NissenbaumHelen (1)
-
Nissenbaum (2009) Privacy in Context
BRIEF: Foundational privacy theory—violations occur when information flows breach context-specific norms, not merely when individuals lose control.
#NobelPrize (1)
-
Schelling (1960) Strategy of Conflict
BRIEF: Game theory classic showing how credible commitment enables cooperation impossible for uncommitted actors.
#NobleSafiya (1)
-
Noble (2018) Algorithms of Oppression
BRIEF: Documents how search algorithms perpetuate racism and sexism, creating conformity pressure through biased categorizations users can’t see or contest.
#NoRegistryDependency (1)
-
W3C (2022) Decentralized Identifiers
BRIEF: W3C standard for decentralized, self-sovereign identifiers with cryptographic verification—foundational infrastructure for platform-independent delegation.
#Normalization (1)
-
Foucault (1977) Discipline and Punish
BRIEF: Classic analysis of how surveillance induces self-regulation—”visibility is a trap”—tracing punishment’s evolution from spectacle to psychological control.
#NSA (2)
-
Greenwald (2014) No Place to Hide (draft)
BRIEF: Documents Snowden’s NSA surveillance disclosures, examining unprecedented government abuse of power and implications for privacy and democracy.
-
Penney (2016) Chilling Effects
BRIEF: First empirical evidence of regulatory chilling effects from online surveillance, documenting 30% traffic decline to sensitive Wikipedia articles post-Snowden.
#ObjectCapabilities (1)
-
Miller et al. (2003) Capability Myths Demolished
BRIEF: Foundational OCaps paper demonstrating how capability possession equals authority—foundational model for SSI delegation.
#OCaps (1)
-
Miller et al. (2003) Capability Myths Demolished
BRIEF: Foundational OCaps paper demonstrating how capability possession equals authority—foundational model for SSI delegation.
#OnlineIdentity (1)
-
BRIEF: Examines tension between children’s privacy rights and parental freedom; documents sharenting harms including identity theft and permanent digital footprints.
#OpenCliques (1)
-
Allen (2024) Open & Fuzzy Cliques
BRIEF: Extends cryptographic cliques with open (incomplete connectivity), fuzzy (threshold), and device variants for practical implementation.
#OpenGovernment (1)
-
Open Government Partnership (2023)
BRIEF: Policy guidance on digital ID risks across 27 countries; recommends Human Rights Impact Assessments and meaningful participation of at-risk populations.
#OpenSourceAI (1)
-
Zhu et al. (2024) Generative AI Security
BRIEF: Analyzes GenAI security; traditional defenses fail, requiring AI firewalls, guardrails, watermarking for social engineering attacks.
#OpenSourceCritique (1)
-
Ehmke (2023) Dimensions of Digital Coercion
BRIEF: Systematic framework analyzing digital coercion through four dimensions across commercial and open-source platforms, proposing multi-layered standards as accountability.
#OperationChokePoint (1)
-
Carter (2023) Operation Choke Point 2.0
BRIEF: Documents financial system weaponization against legal industries through systematic banking access denial.
#Optogenetics (1)
-
Kinstler (2025) Big Tech Wants Direct Access to Our Brains
BRIEF: Documents Big Tech BCI commercialization and neurorights movement seeking legal protections for mental privacy and cognitive liberty.
#OstromPrinciples (1)
-
BRIEF: Allen traces SSI origins to five traditions: sovereignty, living systems, commons governance, feminist theory, and human rights.
#Panopticon (1)
-
Foucault (1977) Discipline and Punish
BRIEF: Classic analysis of how surveillance induces self-regulation—”visibility is a trap”—tracing punishment’s evolution from spectacle to psychological control.
#ParentalRights (1)
-
BRIEF: Examines tension between children’s privacy rights and parental freedom; documents sharenting harms including identity theft and permanent digital footprints.
#PattiyanonCharnon (1)
-
BRIEF: Framework of 42 verifiable properties bridging SSI principles and legal/regulatory compliance requirements across jurisdictions.
#PeerIdentity (1)
-
Grigg (2021) The Identity Cycle
BRIEF: Argues identity emerges from community, not state capture; validates through Kenyan chamas (200,000+ groups, $1.7B, 42% GDP).
#PeerToPeer (1)
-
Allen (2025) Right to Transact (draft)
BRIEF: Frames transactional freedom as constitutional right grounded in assembly and association, not merely financial access.
#PenneyJonathon (1)
-
Penney (2016) Chilling Effects
BRIEF: First empirical evidence of regulatory chilling effects from online surveillance, documenting 30% traffic decline to sensitive Wikipedia articles post-Snowden.
#Personhood (2)
-
Birhane (2017) Ubuntu Philosophy
BRIEF: Contrasts Western individualist “I think therefore I am” with Ubuntu’s relational personhood: “I am because we are.”
-
Radin (1996) Contested Commodities
BRIEF: Foundational market-inalienability theory—some things too bound up with personhood to commodify, including core identity attributes.
#Philosophy (2)
-
Birhane (2017) Ubuntu Philosophy
BRIEF: Contrasts Western individualist “I think therefore I am” with Ubuntu’s relational personhood: “I am because we are.”
-
Sheldrake (2019) Generative Identity
BRIEF: Proposes “generative identity” moving beyond self-sovereignty’s individual focus to embrace emergent, relational, and contextual identity.
#PKI (1)
-
Dumitrescu & Pouwelse (2024) PKI Failures
BRIEF: Comprehensive analysis of PKI/X.509 paradigm assumptions and their consequences over decades—cautionary example for 2026 principles.
#PlanningFailures (1)
-
Scott (1998) Seeing Like a State (draft)
BRIEF: Examines failed large-scale state interventions, identifying how “legibility” requirements destroy local knowledge and contextual complexity.
#PlatformCapitalism (2)
-
boyd (2023) Structuring Algorithms
BRIEF: Framework showing algorithms structure networks via institutional arrangements, enabling network-based discrimination through data infrastructure control beyond categorical protections.
-
Dyer-Witheford (2015) Cyber-Proletariat
BRIEF: Examines digital capitalism’s creation of feudal dependencies masquerading as autonomy—platforms deepen subordination through service dependency.
#PlatformCapture (1)
-
Grohmann (2025) Sovereignty-as-a-Service
BRIEF: Analyzes how Microsoft, Amazon, and Google redefined digital sovereignty from political capacity to commercial product—warning pattern for SSI.
#PlatformEconomics (1)
-
Khan & Vaheesan (2017) Market Power (draft)
BRIEF: Analyzes how market power concentration enables gatekeeping and exclusion—applies directly to SSI infrastructure where monopoly positions create participation barriers.
#PlatformGovernance (2)
-
Balkin (2016) Information Fiduciaries
BRIEF: Introduces “information fiduciary” concept—platforms holding user data owe fiduciary duties of care, confidentiality, and loyalty.
-
Ehmke (2023) Dimensions of Digital Coercion
BRIEF: Systematic framework analyzing digital coercion through four dimensions across commercial and open-source platforms, proposing multi-layered standards as accountability.
#PlatformIndependence (2)
-
Allen (2025) Swiss e-ID Anchors
BRIEF: Demonstrates how government digital identity systems can preserve autonomy—addresses “voluntary in law” eroding to “mandatory in practice” pattern.
-
W3C (2022) Decentralized Identifiers
BRIEF: W3C standard for decentralized, self-sovereign identifiers with cryptographic verification—foundational infrastructure for platform-independent delegation.
#PlatformLogic (1)
-
Tcherneva (2025) Death of the Social Contract
BRIEF: Applies enshittification framework to labor market degradation, proposing job guarantee as circuit breaker restoring worker power.
#PlatformMonopoly (1)
-
Wu (2018) Tyranny of Convenience
BRIEF: Analyzes how convenience becomes tyranny—small easy choices accumulate into structural dependency.
#PlatformPower (1)
-
Cohen (2019) Between Truth and Power
BRIEF: Demonstrates how code and law co-construct identity as extractable capital; property frameworks actively create data as commodity.
#PolicyGuidance (1)
-
Open Government Partnership (2023)
BRIEF: Policy guidance on digital ID risks across 27 countries; recommends Human Rights Impact Assessments and meaningful participation of at-risk populations.
#PoliticalRights (1)
-
BRIEF: Binding international treaty establishing legal personhood as universal right, extending UDHR principles into enforceable international law.
#PoliticalSpeech (1)
-
BRIEF: Landmark ruling extending free speech protections to political spending—debatable whether expression through expenditure applies to identity transactions.
#Portability (1)
-
BRIEF: Establishes “infrastructure without infrastructure”—systems functioning autonomously without centralized control, mathematics over policy.
#Poverty (1)
-
Eubanks (2018) Automating Inequality
BRIEF: Examines how automated systems create “digital poorhouse” that profiles and punishes poor Americans through case studies of welfare, homeless services, and child welfare.
#Power (1)
-
Foucault (1977) Discipline and Punish
BRIEF: Classic analysis of how surveillance induces self-regulation—”visibility is a trap”—tracing punishment’s evolution from spectacle to psychological control.
#PrecarityOfWork (1)
-
Tcherneva (2025) Death of the Social Contract
BRIEF: Applies enshittification framework to labor market degradation, proposing job guarantee as circuit breaker restoring worker power.
#Precommitment (2)
-
Bryan et al. (2010) Commitment Devices
BRIEF: Comprehensive review of commitment device research showing how voluntary constraints enable better outcomes.
-
Elster (1979) Ulysses and the Sirens
BRIEF: Foundational work on rational self-binding—Ulysses constraining future self enables otherwise impossible outcomes.
#PredictiveAnalytics (1)
-
Eubanks (2018) Automating Inequality
BRIEF: Examines how automated systems create “digital poorhouse” that profiles and punishes poor Americans through case studies of welfare, homeless services, and child welfare.
#PrincipalAuthority (1)
-
Allen (2021) Principal Authority
BRIEF: Analyzes Wyoming SF0039’s legal grounding of digital identity in Agency law, reorganizing SSI principles as Principal rights and Agent duties.
#Prison (1)
-
Foucault (1977) Discipline and Punish
BRIEF: Classic analysis of how surveillance induces self-regulation—”visibility is a trap”—tracing punishment’s evolution from spectacle to psychological control.
#Privacy (7)
-
Allen (2016) Path to Self-Sovereign Identity
BRIEF: Foundational 2016 article establishing 10 principles of self-sovereign identity and tracing identity system evolution from centralized to user-centric to self-sovereign models.
-
Greenwald (2014) No Place to Hide (draft)
BRIEF: Documents Snowden’s NSA surveillance disclosures, examining unprecedented government abuse of power and implications for privacy and democracy.
-
Nissenbaum (2009) Privacy in Context
BRIEF: Foundational privacy theory—violations occur when information flows breach context-specific norms, not merely when individuals lose control.
-
Penney (2016) Chilling Effects
BRIEF: First empirical evidence of regulatory chilling effects from online surveillance, documenting 30% traffic decline to sensitive Wikipedia articles post-Snowden.
-
BRIEF: Comprehensive critique of “data ownership” frameworks; calls for grounding digital identity in human rights rather than property law.
-
BRIEF: Utah’s State-Endorsed Digital Identity framework establishing privacy-first, decentralized principles where identity belongs to individuals, not governments.
-
Zuboff (2019) Surveillance Capitalism
BRIEF: Develops surveillance capitalism framework—unprecedented economic logic extracting behavioral surplus and deploying instrumentarian power through ubiquitous computation.
#PrivacyAttacks (1)
-
Narayanan & Shmatikov (2009) De-anonymizing Social Networks
BRIEF: Demonstrates that social graph structure enables re-identification even with perfect attribute anonymization—connection patterns are identifying.
#PrivacyByDesign (2)
-
Allen (2025) Swiss e-ID Anchors
BRIEF: Demonstrates how government digital identity systems can preserve autonomy—addresses “voluntary in law” eroding to “mandatory in practice” pattern.
-
BRIEF: Utah’s State-Endorsed Digital Identity framework establishing privacy-first, decentralized principles where identity belongs to individuals, not governments.
#PrivacyChallenges (1)
-
Satybaldy et al. (2024) Taxonomy of SSI Challenges
BRIEF: Systematic literature review synthesizing SSI architectural framework, development lifecycle, and nine-category taxonomy of open challenges.
#PrivacyConsent (1)
-
Solove (2013) Privacy Self-Management
BRIEF: Demonstrates privacy consent mechanisms fail—assumptions of informed, empowered users false given information asymmetry and manufactured consent.
#PrivacyEnhancingTechnologies (2)
-
Celi et al. (2025) Private Age Verification Architecture
BRIEF: Separates content moderation from guardianship in age verification. Proposes guardian-issued DID credentials with client-side enforcement.
-
Chatel et al. (2025) PETs Limitations in Age Verification
BRIEF: PETs solve only application-layer privacy, not circumvention, censorship, or effectiveness. Complex libraries become “prisons” centralizing power.
#PrivacyLaw (2)
-
BRIEF: Framework of 42 verifiable properties bridging SSI principles and legal/regulatory compliance requirements across jurisdictions.
-
Solove (2013) Privacy Self-Management
BRIEF: Demonstrates privacy consent mechanisms fail—assumptions of informed, empowered users false given information asymmetry and manufactured consent.
#PrivacyPreserving (3)
-
Ahmed et al. (2022) Blockchain SSI Survey
BRIEF: Survey of 153 blockchain identity articles establishing five essential components framework for evaluating BC-IDMS solutions.
-
Naik & Jenkins (2020) Governing Principles of SSI
BRIEF: 20-principle SSI evaluation framework extending Allen’s 10 principles; comparative analysis reveals technical maturity but operational gaps.
-
W3C (2024) Verifiable Credentials 2.0
BRIEF: W3C standard for machine-verifiable credentials—foundational data model for delegation, authorization, and revocability.
#PrivacyResearch (1)
-
Ante et al. (2021) Bibliometric Review of Digital Identity
BRIEF: First bibliometric mapping of digital identity reveals seven fragmented streams with minimal cross-citation despite 7x publication growth.
#PrivacyRights (1)
-
Zwitter et al. (2020) SSI: The Good, The Bad and The Ugly
BRIEF: Critically examines SSI through philosophical, legal, and technical lenses, revealing naturalist-constructivist tensions requiring explicit governance decisions.
#PrivacySecurity (1)
-
Nottingham (2025) Age Restriction Architecture
BRIEF: IETF analysis identifying five architectural risks from age verification: centralization, privacy erosion, access barriers, fragmentation, and age-gated internet infrastructure.
#PrivacySelfManagement (1)
-
Solove (2013) Privacy Self-Management
BRIEF: Demonstrates privacy consent mechanisms fail—assumptions of informed, empowered users false given information asymmetry and manufactured consent.
#PrivacySurveillance (1)
-
Allen (2024) SSI Moral Bankruptcy
BRIEF: SSI originator argues ecosystem became morally bankrupt by abandoning founding principles for market adoption and surveillance-enabling compromises.
#PrivacyTechnology (1)
-
Pava-Díaz et al. (2024) SSI on the Blockchain
BRIEF: Evaluates nine blockchain SSI frameworks against Allen’s principles, identifying portability and interoperability gaps from tight coupling.
#PrivacyTheory (1)
-
Nissenbaum (2009) Privacy in Context
BRIEF: Foundational privacy theory—violations occur when information flows breach context-specific norms, not merely when individuals lose control.
#PromptInjection (1)
-
Zhu et al. (2024) Generative AI Security
BRIEF: Analyzes GenAI security; traditional defenses fail, requiring AI firewalls, guardrails, watermarking for social engineering attacks.
#Property (1)
-
Radin (1996) Contested Commodities
BRIEF: Foundational market-inalienability theory—some things too bound up with personhood to commodify, including core identity attributes.
#PropertyLaw (1)
-
Harris (1993) Whiteness as Property
BRIEF: Demonstrates how property law historically encoded racial hierarchies—whiteness functioned as property granting access, opportunity, protection.
#PropertyRegimes (1)
-
Purtova (2015) Illusion of Personal Data
BRIEF: Demonstrates “no one owns data” is illusion—corporations already claim quasi-property rights; individual ownership validates framework favoring institutional actors.
#PropertyRights (1)
-
Purtova (2015) Illusion of Personal Data
BRIEF: Demonstrates “no one owns data” is illusion—corporations already claim quasi-property rights; individual ownership validates framework favoring institutional actors.
#PurtovaNadezhda (1)
-
Purtova (2015) Illusion of Personal Data
BRIEF: Demonstrates “no one owns data” is illusion—corporations already claim quasi-property rights; individual ownership validates framework favoring institutional actors.
#RacialJustice (2)
-
Benjamin (2019) Race After Technology
BRIEF: Exposes how technologies reproduce racial inequity while appearing neutral, introducing “New Jim Code” concept for discriminatory automation.
-
Harris (1993) Whiteness as Property
BRIEF: Demonstrates how property law historically encoded racial hierarchies—whiteness functioned as property granting access, opportunity, protection.
#Racism (1)
-
Noble (2018) Algorithms of Oppression
BRIEF: Documents how search algorithms perpetuate racism and sexism, creating conformity pressure through biased categorizations users can’t see or contest.
#RadinMargaret (1)
-
Radin (1996) Contested Commodities
BRIEF: Foundational market-inalienability theory—some things too bound up with personhood to commodify, including core identity attributes.
#RationalChoice (1)
-
Bryan et al. (2010) Commitment Devices
BRIEF: Comprehensive review of commitment device research showing how voluntary constraints enable better outcomes.
#Rationality (1)
-
Elster (1979) Ulysses and the Sirens
BRIEF: Foundational work on rational self-binding—Ulysses constraining future self enables otherwise impossible outcomes.
#RefugeeIdentity (1)
-
BRIEF: Five-year SSI retrospective finds W3C success with mission drift toward institutional surveillance over refugee protection.
#Refugees (1)
-
Garazha et al. (2024) Resilience in Times of Crisis
BRIEF: Derives seven design principles for SSI-based refugee identity through iterative prototyping with Ukrainian refugees in Switzerland.
#Regulation (2)
-
BRIEF: Framework of 42 verifiable properties bridging SSI principles and legal/regulatory compliance requirements across jurisdictions.
-
Renieris (2022) Freedom to Transact Critique
BRIEF: Essential counterpoint—challenges absolute “right to transact” claims, distinguishing proportionate regulation from exclusionary gatekeeping.
#ReIdentification (1)
-
Narayanan & Shmatikov (2009) De-anonymizing Social Networks
BRIEF: Demonstrates that social graph structure enables re-identification even with perfect attribute anonymization—connection patterns are identifying.
#RelationalIdentity (3)
-
BRIEF: Proposes relationship-based cryptographic identity using edge identifiers and cliques with Schnorr multisig protocols.
-
Birhane (2017) Ubuntu Philosophy
BRIEF: Contrasts Western individualist “I think therefore I am” with Ubuntu’s relational personhood: “I am because we are.”
-
Zwitter et al. (2020) SSI: The Good, The Bad and The Ugly
BRIEF: Critically examines SSI through philosophical, legal, and technical lenses, revealing naturalist-constructivist tensions requiring explicit governance decisions.
#RemoteNotarization (1)
-
BRIEF: State legislation recognizing digital identity credentials without creating government monopoly—model for “recognition without mandate.”
#RenierisElizabeth (2)
-
Renieris (2022) Freedom to Transact Critique
BRIEF: Essential counterpoint—challenges absolute “right to transact” claims, distinguishing proportionate regulation from exclusionary gatekeeping.
-
BRIEF: Comprehensive critique of “data ownership” frameworks; calls for grounding digital identity in human rights rather than property law.
#ResearchFragmentation (1)
-
Ante et al. (2021) Bibliometric Review of Digital Identity
BRIEF: First bibliometric mapping of digital identity reveals seven fragmented streams with minimal cross-citation despite 7x publication growth.
#ResearchMapping (1)
-
Ante et al. (2021) Bibliometric Review of Digital Identity
BRIEF: First bibliometric mapping of digital identity reveals seven fragmented streams with minimal cross-citation despite 7x publication growth.
#ResearchMethodology (2)
-
Čučko & Turkanović (2021) SSI Systematic Mapping
BRIEF: First systematic mapping of SSI research reveals validation dominating, evaluation absent, and zero usability research.
-
Schardong (2022) SSI Systematic Review
BRIEF: First reproducible systematic review of SSI reveals explosive growth but critical gaps in trust, usability, and compliance.
#Restatement (1)
-
Restatement Third of Agency (2006)
BRIEF: Authoritative U.S. codification of Agency law establishing enforceable duties agents owe principals with centuries of precedent.
#RevocationFlows (1)
-
BRIEF: Standard protocol for secure, authenticated messaging between DID-identified parties—foundational delegation protocol for SSI.
#RFC9591 (1)
-
BRIEF: IETF standard for threshold Schnorr signatures enabling distributed trust—emerging capability existing paradigms didn’t anticipate.
#RightToTransact (1)
-
Allen (2025) Right to Transact (draft)
BRIEF: Frames transactional freedom as constitutional right grounded in assembly and association, not merely financial access.
#RLHF (1)
-
Zhu et al. (2024) Generative AI Security
BRIEF: Analyzes GenAI security; traditional defenses fail, requiring AI firewalls, guardrails, watermarking for social engineering attacks.
#RWOT (1)
-
Andrieu et al. (2020) Five Mental Models
BRIEF: Identifies five identity mental models (space-time, presentation, attribute, relationship, capability) and their intersections for SSI architecture.
#SB260 (1)
-
BRIEF: Utah’s State-Endorsed Digital Identity framework establishing privacy-first, decentralized principles where identity belongs to individuals, not governments.
#SchedulingAlgorithms (1)
-
boyd (2023) Structuring Algorithms
BRIEF: Framework showing algorithms structure networks via institutional arrangements, enabling network-based discrimination through data infrastructure control beyond categorical protections.
#SchellingThomas (1)
-
Schelling (1960) Strategy of Conflict
BRIEF: Game theory classic showing how credible commitment enables cooperation impossible for uncommitted actors.
#Schnorr (2)
-
Allen (2024) Open & Fuzzy Cliques
BRIEF: Extends cryptographic cliques with open (incomplete connectivity), fuzzy (threshold), and device variants for practical implementation.
-
BRIEF: IETF standard for threshold Schnorr signatures enabling distributed trust—emerging capability existing paradigms didn’t anticipate.
#SchnorrSignatures (1)
-
BRIEF: Proposes relationship-based cryptographic identity using edge identifiers and cliques with Schnorr multisig protocols.
#ScottJamesC (1)
-
Scott (1998) Seeing Like a State (draft)
BRIEF: Examines failed large-scale state interventions, identifying how “legibility” requirements destroy local knowledge and contextual complexity.
#SearchEngines (1)
-
Noble (2018) Algorithms of Oppression
BRIEF: Documents how search algorithms perpetuate racism and sexism, creating conformity pressure through biased categorizations users can’t see or contest.
#SecureCommunication (1)
-
BRIEF: Standard protocol for secure, authenticated messaging between DID-identified parties—foundational delegation protocol for SSI.
#SecurityAnalysis (1)
-
Ahmed et al. (2022) Blockchain SSI Survey
BRIEF: Survey of 153 blockchain identity articles establishing five essential components framework for evaluating BC-IDMS solutions.
#SecurityArchitecture (1)
-
Miller et al. (2003) Capability Myths Demolished
BRIEF: Foundational OCaps paper demonstrating how capability possession equals authority—foundational model for SSI delegation.
#SecurityFailures (1)
-
Dumitrescu & Pouwelse (2024) PKI Failures
BRIEF: Comprehensive analysis of PKI/X.509 paradigm assumptions and their consequences over decades—cautionary example for 2026 principles.
#SecurityResearch (1)
-
Narayanan & Shmatikov (2009) De-anonymizing Social Networks
BRIEF: Demonstrates that social graph structure enables re-identification even with perfect attribute anonymization—connection patterns are identifying.
#SecurityStandards (1)
-
BRIEF: IETF standard for threshold Schnorr signatures enabling distributed trust—emerging capability existing paradigms didn’t anticipate.
#SEDI (1)
-
BRIEF: Utah’s State-Endorsed Digital Identity framework establishing privacy-first, decentralized principles where identity belongs to individuals, not governments.
#SelectiveDisclosure (2)
-
BRIEF: Explores cryptographic capabilities enabling selective disclosure and delegated authority through derived keys, threshold signatures, and ZKPs.
-
W3C (2024) Verifiable Credentials 2.0
BRIEF: W3C standard for machine-verifiable credentials—foundational data model for delegation, authorization, and revocability.
#SelfBinding (1)
-
Elster (1979) Ulysses and the Sirens
BRIEF: Foundational work on rational self-binding—Ulysses constraining future self enables otherwise impossible outcomes.
#SelfCensorship (1)
-
Penney (2016) Chilling Effects
BRIEF: First empirical evidence of regulatory chilling effects from online surveillance, documenting 30% traffic decline to sensitive Wikipedia articles post-Snowden.
#SelfControl (2)
-
Bryan et al. (2010) Commitment Devices
BRIEF: Comprehensive review of commitment device research showing how voluntary constraints enable better outcomes.
-
Elster (1979) Ulysses and the Sirens
BRIEF: Foundational work on rational self-binding—Ulysses constraining future self enables otherwise impossible outcomes.
#SelfRegulation (1)
-
Foucault (1977) Discipline and Punish
BRIEF: Classic analysis of how surveillance induces self-regulation—”visibility is a trap”—tracing punishment’s evolution from spectacle to psychological control.
#SelfSovereignIdentity (17)
-
Allen (2016) Path to Self-Sovereign Identity
BRIEF: Foundational 2016 article establishing 10 principles of self-sovereign identity and tracing identity system evolution from centralized to user-centric to self-sovereign models.
-
BRIEF: Five-year SSI retrospective finds W3C success with mission drift toward institutional surveillance over refugee protection.
-
BRIEF: Allen traces SSI origins to five traditions: sovereignty, living systems, commons governance, feminist theory, and human rights.
-
Allen (2024) SSI Moral Bankruptcy
BRIEF: SSI originator argues ecosystem became morally bankrupt by abandoning founding principles for market adoption and surveillance-enabling compromises.
-
Ante et al. (2021) Bibliometric Review of Digital Identity
BRIEF: First bibliometric mapping of digital identity reveals seven fragmented streams with minimal cross-citation despite 7x publication growth.
-
Ahmed et al. (2022) Blockchain SSI Survey
BRIEF: Survey of 153 blockchain identity articles establishing five essential components framework for evaluating BC-IDMS solutions.
-
Čučko & Turkanović (2021) SSI Systematic Mapping
BRIEF: First systematic mapping of SSI research reveals validation dominating, evaluation absent, and zero usability research.
-
Costa & Cunha (2024) Self-Sovereign Identities Survey
BRIEF: Reviews 94 blockchain SSI papers identifying theory-practice chasm, limited validation, interoperability gaps, and Global South exclusion.
-
Garazha et al. (2024) Resilience in Times of Crisis
BRIEF: Derives seven design principles for SSI-based refugee identity through iterative prototyping with Ukrainian refugees in Switzerland.
-
Mühle et al. (2018) Essential Components of SSI
BRIEF: First comprehensive technical survey identifying four essential SSI components: decentralized identifiers, authentication, verifiable claims, and storage solutions.
-
Naik & Jenkins (2020) Governing Principles of SSI
BRIEF: 20-principle SSI evaluation framework extending Allen’s 10 principles; comparative analysis reveals technical maturity but operational gaps.
-
Naik & Jenkins (2022) Is SSI Really Sovereign?
BRIEF: Critical assessment revealing SSI sovereignty as inherently contextual and jurisdiction-dependent rather than binary or absolute.
-
Pava-Díaz et al. (2024) SSI on the Blockchain
BRIEF: Evaluates nine blockchain SSI frameworks against Allen’s principles, identifying portability and interoperability gaps from tight coupling.
-
Satybaldy et al. (2024) Taxonomy of SSI Challenges
BRIEF: Systematic literature review synthesizing SSI architectural framework, development lifecycle, and nine-category taxonomy of open challenges.
-
Schardong (2022) SSI Systematic Review
BRIEF: First reproducible systematic review of SSI reveals explosive growth but critical gaps in trust, usability, and compliance.
-
W3C (2022) Decentralized Identifiers
BRIEF: W3C standard for decentralized, self-sovereign identifiers with cryptographic verification—foundational infrastructure for platform-independent delegation.
-
Zwitter et al. (2020) SSI: The Good, The Bad and The Ugly
BRIEF: Critically examines SSI through philosophical, legal, and technical lenses, revealing naturalist-constructivist tensions requiring explicit governance decisions.
#SF0039 (1)
-
Allen (2021) Principal Authority
BRIEF: Analyzes Wyoming SF0039’s legal grounding of digital identity in Agency law, reorganizing SSI principles as Principal rights and Agent duties.
#Sharenting (1)
-
BRIEF: Examines tension between children’s privacy rights and parental freedom; documents sharenting harms including identity theft and permanent digital footprints.
#SheldrakePhilip (1)
-
Sheldrake (2019) Generative Identity
BRIEF: Proposes “generative identity” moving beyond self-sovereignty’s individual focus to embrace emergent, relational, and contextual identity.
#ShmatiskovVitaly (1)
-
Narayanan & Shmatikov (2009) De-anonymizing Social Networks
BRIEF: Demonstrates that social graph structure enables re-identification even with perfect attribute anonymization—connection patterns are identifying.
#Snowden (1)
-
Penney (2016) Chilling Effects
BRIEF: First empirical evidence of regulatory chilling effects from online surveillance, documenting 30% traffic decline to sensitive Wikipedia articles post-Snowden.
#SocialContract (1)
-
Tcherneva (2025) Death of the Social Contract
BRIEF: Applies enshittification framework to labor market degradation, proposing job guarantee as circuit breaker restoring worker power.
#SocialEngineering (1)
-
Zhu et al. (2024) Generative AI Security
BRIEF: Analyzes GenAI security; traditional defenses fail, requiring AI firewalls, guardrails, watermarking for social engineering attacks.
#SocialJustice (2)
-
Benjamin (2019) Race After Technology
BRIEF: Exposes how technologies reproduce racial inequity while appearing neutral, introducing “New Jim Code” concept for discriminatory automation.
-
boyd (2023) Structuring Algorithms
BRIEF: Framework showing algorithms structure networks via institutional arrangements, enabling network-based discrimination through data infrastructure control beyond categorical protections.
#SocialNetworks (1)
-
Narayanan & Shmatikov (2009) De-anonymizing Social Networks
BRIEF: Demonstrates that social graph structure enables re-identification even with perfect attribute anonymization—connection patterns are identifying.
#SocialNorms (1)
-
Nissenbaum (2009) Privacy in Context
BRIEF: Foundational privacy theory—violations occur when information flows breach context-specific norms, not merely when individuals lose control.
#SocialServices (1)
-
Eubanks (2018) Automating Inequality
BRIEF: Examines how automated systems create “digital poorhouse” that profiles and punishes poor Americans through case studies of welfare, homeless services, and child welfare.
#SoloveDaniel (1)
-
Solove (2013) Privacy Self-Management
BRIEF: Demonstrates privacy consent mechanisms fail—assumptions of informed, empowered users false given information asymmetry and manufactured consent.
#Sovereignty (1)
-
Allen (2025) Swiss e-ID Anchors
BRIEF: Demonstrates how government digital identity systems can preserve autonomy—addresses “voluntary in law” eroding to “mandatory in practice” pattern.
#SovereigntyAsService (1)
-
Grohmann (2025) Sovereignty-as-a-Service
BRIEF: Analyzes how Microsoft, Amazon, and Google redefined digital sovereignty from political capacity to commercial product—warning pattern for SSI.
#Sovrin (2)
-
Naik & Jenkins (2020) Governing Principles of SSI
BRIEF: 20-principle SSI evaluation framework extending Allen’s 10 principles; comparative analysis reveals technical maturity but operational gaps.
-
Sovrin Guardianship (2019/2023)
BRIEF: Explores guardianship necessity for SSI inclusivity given 2.9 billion without internet access; warns about “safeguarding dystopia.”
#SSI (11)
-
Allen (2016) Path to Self-Sovereign Identity
BRIEF: Foundational 2016 article establishing 10 principles of self-sovereign identity and tracing identity system evolution from centralized to user-centric to self-sovereign models.
-
Allen (2021) Principal Authority
BRIEF: Analyzes Wyoming SF0039’s legal grounding of digital identity in Agency law, reorganizing SSI principles as Principal rights and Agent duties.
-
BRIEF: Proposes relationship-based cryptographic identity using edge identifiers and cliques with Schnorr multisig protocols.
-
Andrieu et al. (2020) Five Mental Models
BRIEF: Identifies five identity mental models (space-time, presentation, attribute, relationship, capability) and their intersections for SSI architecture.
-
Ahmed et al. (2022) Blockchain SSI Survey
BRIEF: Survey of 153 blockchain identity articles establishing five essential components framework for evaluating BC-IDMS solutions.
-
boyd (2023) Structuring Algorithms
BRIEF: Framework showing algorithms structure networks via institutional arrangements, enabling network-based discrimination through data infrastructure control beyond categorical protections.
-
BRIEF: Framework of 42 verifiable properties bridging SSI principles and legal/regulatory compliance requirements across jurisdictions.
-
Čučko & Turkanović (2021) SSI Systematic Mapping
BRIEF: First systematic mapping of SSI research reveals validation dominating, evaluation absent, and zero usability research.
-
Naik & Jenkins (2020) Governing Principles of SSI
BRIEF: 20-principle SSI evaluation framework extending Allen’s 10 principles; comparative analysis reveals technical maturity but operational gaps.
-
Sheldrake (2019) Generative Identity
BRIEF: Proposes “generative identity” moving beyond self-sovereignty’s individual focus to embrace emergent, relational, and contextual identity.
-
Sovrin Guardianship (2019/2023)
BRIEF: Explores guardianship necessity for SSI inclusivity given 2.9 billion without internet access; warns about “safeguarding dystopia.”
#SSIArchitecture (2)
-
Mühle et al. (2018) Essential Components of SSI
BRIEF: First comprehensive technical survey identifying four essential SSI components: decentralized identifiers, authentication, verifiable claims, and storage solutions.
-
Satybaldy et al. (2024) Taxonomy of SSI Challenges
BRIEF: Systematic literature review synthesizing SSI architectural framework, development lifecycle, and nine-category taxonomy of open challenges.
#SSICritique (1)
-
Naik & Jenkins (2022) Is SSI Really Sovereign?
BRIEF: Critical assessment revealing SSI sovereignty as inherently contextual and jurisdiction-dependent rather than binary or absolute.
#SSITaxonomy (1)
-
Schardong (2022) SSI Systematic Review
BRIEF: First reproducible systematic review of SSI reveals explosive growth but critical gaps in trust, usability, and compliance.
#StateLegislation (1)
-
BRIEF: State legislation recognizing digital identity credentials without creating government monopoly—model for “recognition without mandate.”
#StatePolicy (2)
-
Allen (2025) Digital Law Framework
BRIEF: Four-layer model legislation demonstrating technology-neutral regulatory approach with anti-coercion provisions and platform independence requirements.
-
BRIEF: Utah’s State-Endorsed Digital Identity framework establishing privacy-first, decentralized principles where identity belongs to individuals, not governments.
#StateSimplification (1)
-
Scott (1998) Seeing Like a State (draft)
BRIEF: Examines failed large-scale state interventions, identifying how “legibility” requirements destroy local knowledge and contextual complexity.
#StateSovereignty (1)
-
Naik & Jenkins (2022) Is SSI Really Sovereign?
BRIEF: Critical assessment revealing SSI sovereignty as inherently contextual and jurisdiction-dependent rather than binary or absolute.
#StrategicBehavior (2)
-
Elster (1979) Ulysses and the Sirens
BRIEF: Foundational work on rational self-binding—Ulysses constraining future self enables otherwise impossible outcomes.
-
Schelling (1960) Strategy of Conflict
BRIEF: Game theory classic showing how credible commitment enables cooperation impossible for uncommitted actors.
#StructuralInequality (1)
-
Harris (1993) Whiteness as Property
BRIEF: Demonstrates how property law historically encoded racial hierarchies—whiteness functioned as property granting access, opportunity, protection.
#SupremeCourt (1)
-
BRIEF: Landmark ruling extending free speech protections to political spending—debatable whether expression through expenditure applies to identity transactions.
#Surveillance (4)
-
Benjamin (2019) Race After Technology
BRIEF: Exposes how technologies reproduce racial inequity while appearing neutral, introducing “New Jim Code” concept for discriminatory automation.
-
Foucault (1977) Discipline and Punish
BRIEF: Classic analysis of how surveillance induces self-regulation—”visibility is a trap”—tracing punishment’s evolution from spectacle to psychological control.
-
Greenwald (2014) No Place to Hide (draft)
BRIEF: Documents Snowden’s NSA surveillance disclosures, examining unprecedented government abuse of power and implications for privacy and democracy.
-
Penney (2016) Chilling Effects
BRIEF: First empirical evidence of regulatory chilling effects from online surveillance, documenting 30% traffic decline to sensitive Wikipedia articles post-Snowden.
#SurveillanceCapitalism (4)
-
Ehmke (2023) Dimensions of Digital Coercion
BRIEF: Systematic framework analyzing digital coercion through four dimensions across commercial and open-source platforms, proposing multi-layered standards as accountability.
-
Kinstler (2025) Big Tech Wants Direct Access to Our Brains
BRIEF: Documents Big Tech BCI commercialization and neurorights movement seeking legal protections for mental privacy and cognitive liberty.
-
BRIEF: Comprehensive critique of “data ownership” frameworks; calls for grounding digital identity in human rights rather than property law.
-
Zuboff (2019) Surveillance Capitalism
BRIEF: Develops surveillance capitalism framework—unprecedented economic logic extracting behavioral surplus and deploying instrumentarian power through ubiquitous computation.
#SurveillanceResistance (1)
-
BRIEF: Five-year SSI retrospective finds W3C success with mission drift toward institutional surveillance over refugee protection.
#Survey (2)
-
Ahmed et al. (2022) Blockchain SSI Survey
BRIEF: Survey of 153 blockchain identity articles establishing five essential components framework for evaluating BC-IDMS solutions.
-
Mühle et al. (2018) Essential Components of SSI
BRIEF: First comprehensive technical survey identifying four essential SSI components: decentralized identifiers, authentication, verifiable claims, and storage solutions.
#SwissEID (1)
-
Allen (2025) Swiss e-ID Anchors
BRIEF: Demonstrates how government digital identity systems can preserve autonomy—addresses “voluntary in law” eroding to “mandatory in practice” pattern.
#SwitchingCosts (1)
-
Wu (2018) Tyranny of Convenience
BRIEF: Analyzes how convenience becomes tyranny—small easy choices accumulate into structural dependency.
#Switzerland (1)
-
Garazha et al. (2024) Resilience in Times of Crisis
BRIEF: Derives seven design principles for SSI-based refugee identity through iterative prototyping with Ukrainian refugees in Switzerland.
#SystematicLiteratureReview (1)
-
Costa & Cunha (2024) Self-Sovereign Identities Survey
BRIEF: Reviews 94 blockchain SSI papers identifying theory-practice chasm, limited validation, interoperability gaps, and Global South exclusion.
#SystematicMapping (1)
-
Čučko & Turkanović (2021) SSI Systematic Mapping
BRIEF: First systematic mapping of SSI research reveals validation dominating, evaluation absent, and zero usability research.
#SystematicReview (3)
-
Ante et al. (2021) Bibliometric Review of Digital Identity
BRIEF: First bibliometric mapping of digital identity reveals seven fragmented streams with minimal cross-citation despite 7x publication growth.
-
Satybaldy et al. (2024) Taxonomy of SSI Challenges
BRIEF: Systematic literature review synthesizing SSI architectural framework, development lifecycle, and nine-category taxonomy of open challenges.
-
Schardong (2022) SSI Systematic Review
BRIEF: First reproducible systematic review of SSI reveals explosive growth but critical gaps in trust, usability, and compliance.
#SystemicRacism (1)
-
Harris (1993) Whiteness as Property
BRIEF: Demonstrates how property law historically encoded racial hierarchies—whiteness functioned as property granting access, opportunity, protection.
#SystemicRisk (1)
-
Dumitrescu & Pouwelse (2024) PKI Failures
BRIEF: Comprehensive analysis of PKI/X.509 paradigm assumptions and their consequences over decades—cautionary example for 2026 principles.
#SystemsSecurity (1)
-
Miller et al. (2003) Capability Myths Demolished
BRIEF: Foundational OCaps paper demonstrating how capability possession equals authority—foundational model for SSI delegation.
#TamperEvident (1)
-
W3C (2024) Verifiable Credentials 2.0
BRIEF: W3C standard for machine-verifiable credentials—foundational data model for delegation, authorization, and revocability.
#Taxonomy (1)
-
Satybaldy et al. (2024) Taxonomy of SSI Challenges
BRIEF: Systematic literature review synthesizing SSI architectural framework, development lifecycle, and nine-category taxonomy of open challenges.
#TechCritique (2)
-
Dyer-Witheford (2015) Cyber-Proletariat
BRIEF: Examines digital capitalism’s creation of feudal dependencies masquerading as autonomy—platforms deepen subordination through service dependency.
-
Noble (2018) Algorithms of Oppression
BRIEF: Documents how search algorithms perpetuate racism and sexism, creating conformity pressure through biased categorizations users can’t see or contest.
#TechEthics (2)
-
Benjamin (2019) Race After Technology
BRIEF: Exposes how technologies reproduce racial inequity while appearing neutral, introducing “New Jim Code” concept for discriminatory automation.
-
BRIEF: Comprehensive critique of “data ownership” frameworks; calls for grounding digital identity in human rights rather than property law.
#TechLaw (1)
-
Cohen (2019) Between Truth and Power
BRIEF: Demonstrates how code and law co-construct identity as extractable capital; property frameworks actively create data as commodity.
#TechnicalStandards (1)
-
BRIEF: Framework of 42 verifiable properties bridging SSI principles and legal/regulatory compliance requirements across jurisdictions.
#TechnologicalPluralism (1)
-
Hui (2016) Question Concerning Technology in China
BRIEF: Argues sovereignty isn’t universal but culturally situated—global SSI must negotiate across traditions rather than imposing single Western model.
#Technology (1)
-
Benjamin (2019) Race After Technology
BRIEF: Exposes how technologies reproduce racial inequity while appearing neutral, introducing “New Jim Code” concept for discriminatory automation.
#TechnologyEthics (2)
-
Allen (2024) SSI Moral Bankruptcy
BRIEF: SSI originator argues ecosystem became morally bankrupt by abandoning founding principles for market adoption and surveillance-enabling compromises.
-
Ehmke (2023) Dimensions of Digital Coercion
BRIEF: Systematic framework analyzing digital coercion through four dimensions across commercial and open-source platforms, proposing multi-layered standards as accountability.
#TechnologyGovernance (1)
-
Kinstler (2025) Big Tech Wants Direct Access to Our Brains
BRIEF: Documents Big Tech BCI commercialization and neurorights movement seeking legal protections for mental privacy and cognitive liberty.
#TechnologyPhilosophy (1)
-
Hui (2016) Question Concerning Technology in China
BRIEF: Argues sovereignty isn’t universal but culturally situated—global SSI must negotiate across traditions rather than imposing single Western model.
#TechnologyPolicy (1)
-
Nissenbaum (2009) Privacy in Context
BRIEF: Foundational privacy theory—violations occur when information flows breach context-specific norms, not merely when individuals lose control.
#TemporalPreference (1)
-
Bryan et al. (2010) Commitment Devices
BRIEF: Comprehensive review of commitment device research showing how voluntary constraints enable better outcomes.
#TenPrinciples (1)
-
Allen (2016) Path to Self-Sovereign Identity
BRIEF: Foundational 2016 article establishing 10 principles of self-sovereign identity and tracing identity system evolution from centralized to user-centric to self-sovereign models.
#ThresholdSignatures (4)
-
Allen (2024) Open & Fuzzy Cliques
BRIEF: Extends cryptographic cliques with open (incomplete connectivity), fuzzy (threshold), and device variants for practical implementation.
-
BRIEF: Explores cryptographic capabilities enabling selective disclosure and delegated authority through derived keys, threshold signatures, and ZKPs.
-
Baird et al. (2023) Threshold Signatures
BRIEF: Modern threshold signature schemes enabling distributed authority where K-of-N parties must cooperate—cryptographic foundation for preventing single points of failure.
-
BRIEF: IETF standard for threshold Schnorr signatures enabling distributed trust—emerging capability existing paradigms didn’t anticipate.
#TransactionalAbsolutism (1)
-
Renieris (2022) Freedom to Transact Critique
BRIEF: Essential counterpoint—challenges absolute “right to transact” claims, distinguishing proportionate regulation from exclusionary gatekeeping.
#TreatyLaw (1)
-
BRIEF: Binding international treaty establishing legal personhood as universal right, extending UDHR principles into enforceable international law.
#Trust (1)
-
Grigg (2021) The Identity Cycle
BRIEF: Argues identity emerges from community, not state capture; validates through Kenyan chamas (200,000+ groups, $1.7B, 42% GDP).
#TrustFrameworks (1)
-
Satybaldy et al. (2024) Taxonomy of SSI Challenges
BRIEF: Systematic literature review synthesizing SSI architectural framework, development lifecycle, and nine-category taxonomy of open challenges.
#TrustMinimizedIdentity (1)
-
BRIEF: Five-year SSI retrospective finds W3C success with mission drift toward institutional surveillance over refugee protection.
#TrustModels (2)
-
Dumitrescu & Pouwelse (2024) PKI Failures
BRIEF: Comprehensive analysis of PKI/X.509 paradigm assumptions and their consequences over decades—cautionary example for 2026 principles.
-
Schardong (2022) SSI Systematic Review
BRIEF: First reproducible systematic review of SSI reveals explosive growth but critical gaps in trust, usability, and compliance.
#Ubuntu (1)
-
Birhane (2017) Ubuntu Philosophy
BRIEF: Contrasts Western individualist “I think therefore I am” with Ubuntu’s relational personhood: “I am because we are.”
#UDHR (1)
-
BRIEF: Foundational 1948 declaration establishing universal human dignity and rights as basis for international human rights law.
#UETA (1)
-
BRIEF: State legislation recognizing digital identity credentials without creating government monopoly—model for “recognition without mandate.”
#Ukraine (1)
-
Garazha et al. (2024) Resilience in Times of Crisis
BRIEF: Derives seven design principles for SSI-based refugee identity through iterative prototyping with Ukrainian refugees in Switzerland.
#UlyssesContracts (1)
-
Elster (1979) Ulysses and the Sirens
BRIEF: Foundational work on rational self-binding—Ulysses constraining future self enables otherwise impossible outcomes.
#UnemploymentPolicy (1)
-
Tcherneva (2025) Death of the Social Contract
BRIEF: Applies enshittification framework to labor market degradation, proposing job guarantee as circuit breaker restoring worker power.
#UnitedNations (2)
-
BRIEF: Binding international treaty establishing legal personhood as universal right, extending UDHR principles into enforceable international law.
-
BRIEF: Foundational 1948 declaration establishing universal human dignity and rights as basis for international human rights law.
#UniversalRights (1)
-
BRIEF: Foundational 1948 declaration establishing universal human dignity and rights as basis for international human rights law.
#uPort (1)
-
Naik & Jenkins (2020) Governing Principles of SSI
BRIEF: 20-principle SSI evaluation framework extending Allen’s 10 principles; comparative analysis reveals technical maturity but operational gaps.
#UsabilityChallenges (1)
-
Satybaldy et al. (2024) Taxonomy of SSI Challenges
BRIEF: Systematic literature review synthesizing SSI architectural framework, development lifecycle, and nine-category taxonomy of open challenges.
#UsabilityGap (1)
-
Čučko & Turkanović (2021) SSI Systematic Mapping
BRIEF: First systematic mapping of SSI research reveals validation dominating, evaluation absent, and zero usability research.
#UserControl (1)
-
Allen (2016) Path to Self-Sovereign Identity
BRIEF: Foundational 2016 article establishing 10 principles of self-sovereign identity and tracing identity system evolution from centralized to user-centric to self-sovereign models.
#UserRights (1)
-
Solove (2013) Privacy Self-Management
BRIEF: Demonstrates privacy consent mechanisms fail—assumptions of informed, empowered users false given information asymmetry and manufactured consent.
#Utah (1)
-
BRIEF: Utah’s State-Endorsed Digital Identity framework establishing privacy-first, decentralized principles where identity belongs to individuals, not governments.
#UtahLaw (1)
-
BRIEF: State legislation recognizing digital identity credentials without creating government monopoly—model for “recognition without mandate.”
#VaheesanSandeep (1)
-
Khan & Vaheesan (2017) Market Power (draft)
BRIEF: Analyzes how market power concentration enables gatekeeping and exclusion—applies directly to SSI infrastructure where monopoly positions create participation barriers.
#VerifiableClaims (1)
-
Mühle et al. (2018) Essential Components of SSI
BRIEF: First comprehensive technical survey identifying four essential SSI components: decentralized identifiers, authentication, verifiable claims, and storage solutions.
#VerifiableCredentials (12)
-
BRIEF: Five-year SSI retrospective finds W3C success with mission drift toward institutional surveillance over refugee protection.
-
Andrieu et al. (2020) Five Mental Models
BRIEF: Identifies five identity mental models (space-time, presentation, attribute, relationship, capability) and their intersections for SSI architecture.
-
Ahmed et al. (2022) Blockchain SSI Survey
BRIEF: Survey of 153 blockchain identity articles establishing five essential components framework for evaluating BC-IDMS solutions.
-
Celi et al. (2025) Private Age Verification Architecture
BRIEF: Separates content moderation from guardianship in age verification. Proposes guardian-issued DID credentials with client-side enforcement.
-
Čučko & Turkanović (2021) SSI Systematic Mapping
BRIEF: First systematic mapping of SSI research reveals validation dominating, evaluation absent, and zero usability research.
-
Costa & Cunha (2024) Self-Sovereign Identities Survey
BRIEF: Reviews 94 blockchain SSI papers identifying theory-practice chasm, limited validation, interoperability gaps, and Global South exclusion.
-
Garazha et al. (2024) Resilience in Times of Crisis
BRIEF: Derives seven design principles for SSI-based refugee identity through iterative prototyping with Ukrainian refugees in Switzerland.
-
Naik & Jenkins (2020) Governing Principles of SSI
BRIEF: 20-principle SSI evaluation framework extending Allen’s 10 principles; comparative analysis reveals technical maturity but operational gaps.
-
Pava-Díaz et al. (2024) SSI on the Blockchain
BRIEF: Evaluates nine blockchain SSI frameworks against Allen’s principles, identifying portability and interoperability gaps from tight coupling.
-
Satybaldy et al. (2024) Taxonomy of SSI Challenges
BRIEF: Systematic literature review synthesizing SSI architectural framework, development lifecycle, and nine-category taxonomy of open challenges.
-
Schardong (2022) SSI Systematic Review
BRIEF: First reproducible systematic review of SSI reveals explosive growth but critical gaps in trust, usability, and compliance.
-
W3C (2024) Verifiable Credentials 2.0
BRIEF: W3C standard for machine-verifiable credentials—foundational data model for delegation, authorization, and revocability.
#VerifiableProperties (1)
-
BRIEF: Framework of 42 verifiable properties bridging SSI principles and legal/regulatory compliance requirements across jurisdictions.
#VerifiableRecords (1)
-
Allen (2025) Digital Law Framework
BRIEF: Four-layer model legislation demonstrating technology-neutral regulatory approach with anti-coercion provisions and platform independence requirements.
#VulnerablePopulations (1)
-
Sovrin Guardianship (2019/2023)
BRIEF: Explores guardianship necessity for SSI inclusivity given 2.9 billion without internet access; warns about “safeguarding dystopia.”
#W3C (2)
-
W3C (2022) Decentralized Identifiers
BRIEF: W3C standard for decentralized, self-sovereign identifiers with cryptographic verification—foundational infrastructure for platform-independent delegation.
-
W3C (2024) Verifiable Credentials 2.0
BRIEF: W3C standard for machine-verifiable credentials—foundational data model for delegation, authorization, and revocability.
#W3CDID (1)
-
Mühle et al. (2018) Essential Components of SSI
BRIEF: First comprehensive technical survey identifying four essential SSI components: decentralized identifiers, authentication, verifiable claims, and storage solutions.
#W3CStandards (4)
-
BRIEF: Five-year SSI retrospective finds W3C success with mission drift toward institutional surveillance over refugee protection.
-
Costa & Cunha (2024) Self-Sovereign Identities Survey
BRIEF: Reviews 94 blockchain SSI papers identifying theory-practice chasm, limited validation, interoperability gaps, and Global South exclusion.
-
Pava-Díaz et al. (2024) SSI on the Blockchain
BRIEF: Evaluates nine blockchain SSI frameworks against Allen’s principles, identifying portability and interoperability gaps from tight coupling.
-
Schardong (2022) SSI Systematic Review
BRIEF: First reproducible systematic review of SSI reveals explosive growth but critical gaps in trust, usability, and compliance.
#Watermarking (1)
-
Zhu et al. (2024) Generative AI Security
BRIEF: Analyzes GenAI security; traditional defenses fail, requiring AI firewalls, guardrails, watermarking for social engineering attacks.
#Web3 (1)
-
Allen (2016) Path to Self-Sovereign Identity
BRIEF: Foundational 2016 article establishing 10 principles of self-sovereign identity and tracing identity system evolution from centralized to user-centric to self-sovereign models.
#WebOfTrust (1)
-
Andrieu et al. (2020) Five Mental Models
BRIEF: Identifies five identity mental models (space-time, presentation, attribute, relationship, capability) and their intersections for SSI architecture.
#WelfareSurveillance (1)
-
Eubanks (2018) Automating Inequality
BRIEF: Examines how automated systems create “digital poorhouse” that profiles and punishes poor Americans through case studies of welfare, homeless services, and child welfare.
#WesternPhilosophy (1)
-
Birhane (2017) Ubuntu Philosophy
BRIEF: Contrasts Western individualist “I think therefore I am” with Ubuntu’s relational personhood: “I am because we are.”
#Whistleblowing (1)
-
Greenwald (2014) No Place to Hide (draft)
BRIEF: Documents Snowden’s NSA surveillance disclosures, examining unprecedented government abuse of power and implications for privacy and democracy.
#WhitenessAsProperty (1)
-
Harris (1993) Whiteness as Property
BRIEF: Demonstrates how property law historically encoded racial hierarchies—whiteness functioned as property granting access, opportunity, protection.
#Wikipedia (1)
-
Penney (2016) Chilling Effects
BRIEF: First empirical evidence of regulatory chilling effects from online surveillance, documenting 30% traffic decline to sensitive Wikipedia articles post-Snowden.
#WorkerPower (1)
-
Tcherneva (2025) Death of the Social Contract
BRIEF: Applies enshittification framework to labor market degradation, proposing job guarantee as circuit breaker restoring worker power.
#WorkerRights (1)
-
boyd (2023) Structuring Algorithms
BRIEF: Framework showing algorithms structure networks via institutional arrangements, enabling network-based discrimination through data infrastructure control beyond categorical protections.
#WuTim (1)
-
Wu (2018) Tyranny of Convenience
BRIEF: Analyzes how convenience becomes tyranny—small easy choices accumulate into structural dependency.
#Wyoming (1)
-
Allen (2021) Principal Authority
BRIEF: Analyzes Wyoming SF0039’s legal grounding of digital identity in Agency law, reorganizing SSI principles as Principal rights and Agent duties.
#X509 (1)
-
Dumitrescu & Pouwelse (2024) PKI Failures
BRIEF: Comprehensive analysis of PKI/X.509 paradigm assumptions and their consequences over decades—cautionary example for 2026 principles.
#ZeroKnowledgeProofs (4)
-
BRIEF: Explores cryptographic capabilities enabling selective disclosure and delegated authority through derived keys, threshold signatures, and ZKPs.
-
Celi et al. (2025) Private Age Verification Architecture
BRIEF: Separates content moderation from guardianship in age verification. Proposes guardian-issued DID credentials with client-side enforcement.
-
Pava-Díaz et al. (2024) SSI on the Blockchain
BRIEF: Evaluates nine blockchain SSI frameworks against Allen’s principles, identifying portability and interoperability gaps from tight coupling.
-
Schardong (2022) SSI Systematic Review
BRIEF: First reproducible systematic review of SSI reveals explosive growth but critical gaps in trust, usability, and compliance.
#ZookosTriangle (1)
-
Mühle et al. (2018) Essential Components of SSI
BRIEF: First comprehensive technical survey identifying four essential SSI components: decentralized identifiers, authentication, verifiable claims, and storage solutions.
#ZuboffShoshana (1)
-
Zuboff (2019) Surveillance Capitalism
BRIEF: Develops surveillance capitalism framework—unprecedented economic logic extracting behavioral surplus and deploying instrumentarian power through ubiquitous computation.