Citations by Tag

Browse citations organized by topic tags.

Other views: By Lens By Year All Citations (Alphabetical) Citations Home
A: #AbusePreventions #AccessBarriers #AccessControl #Accessibility #AccountabilityMechanisms #AdversarialML #AfricanPhilosophy #AgencyLaw #AgeVerification #AIAlignment #AIFirewall #AIGovernance #AIIntegration #AISecurity #AKASHA #Akrasia #AlgorithmicBias #AlgorithmicOppression #AlgorithmicPower #AllenChristopher #AllenPrinciples #Amazon #AmericanLawInstitute #AndrieuJoe #AntiCoercion #AntidiscriminationLaw #Antitrust #AokiToshiaki #Article16 #ArtificialIntelligence #AttributeBasedEncryption #AuthenticatedMessaging #AuthoritarianControl #Authoritarianism #AuthorizationModels #AutomatingInequality #AutonomousSystems #Autonomy
B: #BalkinJack #BankingAccess #BankingPolicy #BCI #BehavioralData #BehavioralEconomics #BenjaminRuha #BibliometricAnalysis #BigTech #BiometricIdentification #BirhaneAbeba #BlockchainBias #BlockchainGovernance #BlockchainIdentity #BrainComputerInterface #BrainPrivacy
C: #CampaignFinance #CapabilityBasedSecurity #CarterNic #Censorship #Centralization #CentralizedControl #CertificateAuthority #Chamas #ChildProtection #ChildrensRights #ChileConstitution #ChillingEffects #ChineseTechnology #Circumvention #CitizensUnited #CivilLiberties #CivilRights #ClientSideVerification #Cliques #CloudSovereignty #CoCitationAnalysis #CognitiveLiberty #CohenJulie #CollectiveInterests #CommitmentDevices #Commodification #CommonLaw #CommonsGovernance #Community #CommunityIdentity #ComparativeAnalysis #CompetitionLaw #Complexity #Compliance #ConceptualGenealogy #ConsentDilemma #ConstitutionalLaw #ConstitutionalRights #ConsumerBehavior #ConsumerProtection #ContentModeration #ContextualIntegrity #Convenience #Cooperation #CorporateData #CorporateRights #Cosmotechnics #CredentialExchange #CredentialFormat #CredibleCommitment #CrisisManagement #CriticalAnalysis #CriticalRaceStudies #CriticalRaceTheory #CriticalTheory #CrossBorderIdentity #Crypto #Cryptocurrency #CryptographicCapabilities #CryptographicInfrastructure #CryptographicSecrets #CryptographicSecurity #CryptographicVerification #Cryptography #CulturalImperialism #CulturalTechnology #CyberProletariat #CyberspaceSovereignty
D: #DaoQi #DarkPatterns #DataExtraction #DataGovernance #DataInfrastructure #DataMarkets #DataMinimization #DataOwnership #DataProperty #DataProtection #DataRights #DataSovereignty #DeAnonymization #Decentralization #DecentralizedIdentifiers #DecentralizedIdentity #DecentralizedMessaging #DecisionMaking #DecisionTheory #DelegatedAuthority #Delegation #Democracy #DeMottDeborah #DependentCare #DependentIdentityOwners #Deplatforming #Descartes #DesignScienceResearch #Deterrence #DeviceCliques #DIDComm #DIDProtocols #DIDs #DidWeb #DIF #DigitalCertificates #DigitalCoercion #DigitalCredentials #DigitalDependency #DigitalDiscrimination #DigitalEconomy #DigitalFootprint #DigitalID #DigitalIdentity #DigitalInclusion #DigitalInfrastructure #DigitalLabor #DigitalLawFramework #DigitalPoorhouse #DigitalPrivacy #DigitalRights #DigitalSignatureAct #DigitalSignatures #DigitalSovereignty #DigitalWallet #Dignity #Discipline #Discrimination #DistributedAuthority #DistributedTrust #DunbarNumber #DyerWithefordNick
E: #EconomicPolicy #EconomicPsychology #EconomicRights #EdgeIdentifiers #EdwardSnowden #eIDAS #ElectionLaw #ElectronicSignatures #ElsterJon #Emergence #Empowerment #Enshittification #Ethics #EthicsOfPrivacy #EubanksVirginia #EUDIW #EURegulation #EuropeanDigitalIdentity #EvaluationGap #ExodusProtocol
F: #FamilyCare #FamilyPrivacy #FarahanyNita #Federalism #FeministPoliticalTheory #FiduciaryDuty #FieldEvolution #FinancialDeplatforming #FinancialFreedom #FinancialInclusion #Financialization #FinancialSurveillance #FirstAmendment #FocalPoints #FoucaultMichel #FourHorsemen #Fragmentation #Framework #FrameworkComparison #FreeAssociation #FreedomOfThought #FreedomToTransact #FreeSpeech #FROST #FundamentalRights #FuzzyCliques
G: #GameTheory #GDPR #GDPRCompliance #GenerativeAI #GenerativeIdentity #GlobalDevelopment #GlobalLabor #GlobalSouth #Google #GovernanceFrameworks #GovernmentAccountability #GovernmentAsAPlatform #GovernmentID #GovernmentOverreach #GradualIdentification #GraphAnalysis #GreenwaldGlenn #GriggIan #GroupFormingNetworks #Guardianship #GuardianshipModel
H: #HarrisCheryl #HDKeys #Heidegger #HighModernism #HuiYuk #HumanAutonomy #HumanitarianTechnology #HumanRights #HyperledgerIndy
I: #ICCPR #IdentifierPortability #Identity #IdentityArchitecture #IdentityBasedCryptography #IdentityDelegation #IdentityGovernance #IdentityManagement #IdentityPhilosophy #IdentityPortability #IdentityPrinciples #IdentityTheft #IdentityTheory #IETF #Inclusion #Inequality #InformationalCapitalism #InformationAsymmetry #InformationFiduciaries #InformationFlow #InformationScience #InformationSeeking #InformedConsent #InfrastructureStudies #InstitutionalCapture #InstitutionalChange #InstitutionalSafeguards #IntellectualHistory #Interdependence #InterdisciplinaryGaps #InternationalLaw #InternetArchitecture #Interoperability #InteroperabilityChallenges #InteroperabilityStandards #IoTIdentity
J: #Jailbreaking #JobGuarantee #JurisdictionalVariation
K: #Kenya #KeyDerivation #KeyManagement #KeyRecovery #KhanLina #KofNSignatures
L: #LaborEconomics #LaborExploitation #LaborMarkets #LegalArchitecture #LegalDoctrine #LegalFoundation #LegalFramework #LegalHistory #LegalPersonhood #LegalRecognition #LegalTheory #LegalTreatise #Legibility #LESSIdentity #LibraryDependencies #LiteratureReview #LivingSystemsTheory #LLMSecurity #LocalKnowledge #LockIn
M: #MachineLearning #MarketInalienability #MarketPower #MassSurveillance #MathematicsOverPolicy #MeaningCapture #MemberStateImplementation #MentalModels #MentalPrivacy #MetadataLeakage #MetaResearch #Metaverse #MethodologicalInnovation #Metis #Microsoft #MillerMarkS #MINDAct #MindReading #MinskyianAnalysis #MissionDrift #MKUltra #ModelLegislation #MoneyManagerCapitalism #Monopoly #MoralBankruptcy #MPC #MultiPartyComputation #MuSig2
N: #NAIRU #NarayananArvind #NationalSecurity #Negotiation #NetworkEffects #NetworkMaking #NetworkPrivacy #NeuralData #Neuralink #Neurorights #Neurotechnology #NewJimCode #NissenbaumHelen #NobelPrize #NobleSafiya #NoRegistryDependency #Normalization #NSA
O: #ObjectCapabilities #OCaps #OnlineIdentity #OpenCliques #OpenGovernment #OpenSourceAI #OpenSourceCritique #OperationChokePoint #Optogenetics #OstromPrinciples
P: #Panopticon #ParentalRights #PattiyanonCharnon #PeerIdentity #PeerToPeer #PenneyJonathon #Personhood #Philosophy #PKI #PlanningFailures #PlatformCapitalism #PlatformCapture #PlatformEconomics #PlatformGovernance #PlatformIndependence #PlatformLogic #PlatformMonopoly #PlatformPower #PolicyGuidance #PoliticalRights #PoliticalSpeech #Portability #Poverty #Power #PrecarityOfWork #Precommitment #PredictiveAnalytics #PrincipalAuthority #Prison #Privacy #PrivacyAttacks #PrivacyByDesign #PrivacyChallenges #PrivacyConsent #PrivacyEnhancingTechnologies #PrivacyLaw #PrivacyPreserving #PrivacyResearch #PrivacyRights #PrivacySecurity #PrivacySelfManagement #PrivacySurveillance #PrivacyTechnology #PrivacyTheory #PromptInjection #Property #PropertyLaw #PropertyRegimes #PropertyRights #PurtovaNadezhda
R: #RacialJustice #Racism #RadinMargaret #RationalChoice #Rationality #RefugeeIdentity #Refugees #Regulation #ReIdentification #RelationalIdentity #RemoteNotarization #RenierisElizabeth #ResearchFragmentation #ResearchMapping #ResearchMethodology #Restatement #RevocationFlows #RFC9591 #RightToTransact #RLHF #RWOT
S: #SB260 #SchedulingAlgorithms #SchellingThomas #Schnorr #SchnorrSignatures #ScottJamesC #SearchEngines #SecureCommunication #SecurityAnalysis #SecurityArchitecture #SecurityFailures #SecurityResearch #SecurityStandards #SEDI #SelectiveDisclosure #SelfBinding #SelfCensorship #SelfControl #SelfRegulation #SelfSovereignIdentity #SF0039 #Sharenting #SheldrakePhilip #ShmatiskovVitaly #Snowden #SocialContract #SocialEngineering #SocialJustice #SocialNetworks #SocialNorms #SocialServices #SoloveDaniel #Sovereignty #SovereigntyAsService #Sovrin #SSI #SSIArchitecture #SSICritique #SSITaxonomy #StateLegislation #StatePolicy #StateSimplification #StateSovereignty #StrategicBehavior #StructuralInequality #SupremeCourt #Surveillance #SurveillanceCapitalism #SurveillanceResistance #Survey #SwissEID #SwitchingCosts #Switzerland #SystematicLiteratureReview #SystematicMapping #SystematicReview #SystemicRacism #SystemicRisk #SystemsSecurity
T: #TamperEvident #Taxonomy #TechCritique #TechEthics #TechLaw #TechnicalStandards #TechnologicalPluralism #Technology #TechnologyEthics #TechnologyGovernance #TechnologyPhilosophy #TechnologyPolicy #TemporalPreference #TenPrinciples #ThresholdSignatures #TransactionalAbsolutism #TreatyLaw #Trust #TrustFrameworks #TrustMinimizedIdentity #TrustModels
U: #Ubuntu #UDHR #UETA #Ukraine #UlyssesContracts #UnemploymentPolicy #UnitedNations #UniversalRights #uPort #UsabilityChallenges #UsabilityGap #UserControl #UserRights #Utah #UtahLaw
V: #VaheesanSandeep #VerifiableClaims #VerifiableCredentials #VerifiableProperties #VerifiableRecords #VulnerablePopulations
W: #W3C #W3CDID #W3CStandards #Watermarking #Web3 #WebOfTrust #WelfareSurveillance #WesternPhilosophy #Whistleblowing #WhitenessAsProperty #Wikipedia #WorkerPower #WorkerRights #WuTim #Wyoming

X: #X509

Z: #ZeroKnowledgeProofs #ZookosTriangle #ZuboffShoshana

#AbusePreventions (1)

  • Baird et al. (2023) Threshold Signatures

    BRIEF: Modern threshold signature schemes enabling distributed authority where K-of-N parties must cooperate—cryptographic foundation for preventing single points of failure.

#AccessBarriers (1)

  • Nottingham (2025) Age Restriction Architecture

    BRIEF: IETF analysis identifying five architectural risks from age verification: centralization, privacy erosion, access barriers, fragmentation, and age-gated internet infrastructure.

#AccessControl (1)

#Accessibility (1)

  • Sovrin Guardianship (2019/2023)

    BRIEF: Explores guardianship necessity for SSI inclusivity given 2.9 billion without internet access; warns about “safeguarding dystopia.”

#AccountabilityMechanisms (1)

  • Ehmke (2023) Dimensions of Digital Coercion

    BRIEF: Systematic framework analyzing digital coercion through four dimensions across commercial and open-source platforms, proposing multi-layered standards as accountability.

#AdversarialML (1)

#AfricanPhilosophy (1)

  • Birhane (2017) Ubuntu Philosophy

    BRIEF: Contrasts Western individualist “I think therefore I am” with Ubuntu’s relational personhood: “I am because we are.”

#AgencyLaw (2)

  • Allen (2021) Principal Authority

    BRIEF: Analyzes Wyoming SF0039’s legal grounding of digital identity in Agency law, reorganizing SSI principles as Principal rights and Agent duties.

  • Restatement Third of Agency (2006)

    BRIEF: Authoritative U.S. codification of Agency law establishing enforceable duties agents owe principals with centuries of precedent.

#AgeVerification (3)

#AIAlignment (1)

#AIFirewall (1)

#AIGovernance (1)

#AIIntegration (1)

#AISecurity (1)

#AKASHA (1)

  • Sheldrake (2019) Generative Identity

    BRIEF: Proposes “generative identity” moving beyond self-sovereignty’s individual focus to embrace emergent, relational, and contextual identity.

#Akrasia (1)

#AlgorithmicBias (3)

  • Benjamin (2019) Race After Technology

    BRIEF: Exposes how technologies reproduce racial inequity while appearing neutral, introducing “New Jim Code” concept for discriminatory automation.

  • Eubanks (2018) Automating Inequality

    BRIEF: Examines how automated systems create “digital poorhouse” that profiles and punishes poor Americans through case studies of welfare, homeless services, and child welfare.

  • Noble (2018) Algorithms of Oppression

    BRIEF: Documents how search algorithms perpetuate racism and sexism, creating conformity pressure through biased categorizations users can’t see or contest.

#AlgorithmicOppression (2)

  • Ehmke (2023) Dimensions of Digital Coercion

    BRIEF: Systematic framework analyzing digital coercion through four dimensions across commercial and open-source platforms, proposing multi-layered standards as accountability.

  • Noble (2018) Algorithms of Oppression

    BRIEF: Documents how search algorithms perpetuate racism and sexism, creating conformity pressure through biased categorizations users can’t see or contest.

#AlgorithmicPower (1)

  • boyd (2023) Structuring Algorithms

    BRIEF: Framework showing algorithms structure networks via institutional arrangements, enabling network-based discrimination through data infrastructure control beyond categorical protections.

#AllenChristopher (8)

  • Allen (2016) Path to Self-Sovereign Identity

    BRIEF: Foundational 2016 article establishing 10 principles of self-sovereign identity and tracing identity system evolution from centralized to user-centric to self-sovereign models.

  • Allen (2021) Principal Authority

    BRIEF: Analyzes Wyoming SF0039’s legal grounding of digital identity in Agency law, reorganizing SSI principles as Principal rights and Agent duties.

  • Allen (2024) Edge Identifiers

    BRIEF: Proposes relationship-based cryptographic identity using edge identifiers and cliques with Schnorr multisig protocols.

  • Allen (2025) Clubs

    BRIEF: Explores cryptographic capabilities enabling selective disclosure and delegated authority through derived keys, threshold signatures, and ZKPs.

  • Allen (2025) Digital Law Framework

    BRIEF: Four-layer model legislation demonstrating technology-neutral regulatory approach with anti-coercion provisions and platform independence requirements.

  • Allen (2025) Exodus Protocol

    BRIEF: Establishes “infrastructure without infrastructure”—systems functioning autonomously without centralized control, mathematics over policy.

  • Allen (2025) Right to Transact (draft)

    BRIEF: Frames transactional freedom as constitutional right grounded in assembly and association, not merely financial access.

  • Allen (2025) Swiss e-ID Anchors

    BRIEF: Demonstrates how government digital identity systems can preserve autonomy—addresses “voluntary in law” eroding to “mandatory in practice” pattern.

#AllenPrinciples (1)

#Amazon (1)

#AmericanLawInstitute (1)

  • Restatement Third of Agency (2006)

    BRIEF: Authoritative U.S. codification of Agency law establishing enforceable duties agents owe principals with centuries of precedent.

#AndrieuJoe (1)

#AntiCoercion (1)

  • Allen (2025) Digital Law Framework

    BRIEF: Four-layer model legislation demonstrating technology-neutral regulatory approach with anti-coercion provisions and platform independence requirements.

#AntidiscriminationLaw (1)

  • boyd (2023) Structuring Algorithms

    BRIEF: Framework showing algorithms structure networks via institutional arrangements, enabling network-based discrimination through data infrastructure control beyond categorical protections.

#Antitrust (1)

  • Khan & Vaheesan (2017) Market Power (draft)

    BRIEF: Analyzes how market power concentration enables gatekeeping and exclusion—applies directly to SSI infrastructure where monopoly positions create participation barriers.

#AokiToshiaki (1)

  • CSSPS (2022)

    BRIEF: Framework of 42 verifiable properties bridging SSI principles and legal/regulatory compliance requirements across jurisdictions.

#Article16 (1)

  • ICCPR (1966) (draft)

    BRIEF: Binding international treaty establishing legal personhood as universal right, extending UDHR principles into enforceable international law.

#ArtificialIntelligence (1)

  • Benjamin (2019) Race After Technology

    BRIEF: Exposes how technologies reproduce racial inequity while appearing neutral, introducing “New Jim Code” concept for discriminatory automation.

#AttributeBasedEncryption (1)

#AuthenticatedMessaging (1)

  • DIDComm (2024)

    BRIEF: Standard protocol for secure, authenticated messaging between DID-identified parties—foundational delegation protocol for SSI.

#AuthoritarianControl (1)

  • Allen (2024) SSI Moral Bankruptcy

    BRIEF: SSI originator argues ecosystem became morally bankrupt by abandoning founding principles for market adoption and surveillance-enabling compromises.

#Authoritarianism (1)

#AuthorizationModels (1)

#AutomatingInequality (1)

  • Eubanks (2018) Automating Inequality

    BRIEF: Examines how automated systems create “digital poorhouse” that profiles and punishes poor Americans through case studies of welfare, homeless services, and child welfare.

#AutonomousSystems (1)

  • Allen (2025) Exodus Protocol

    BRIEF: Establishes “infrastructure without infrastructure”—systems functioning autonomously without centralized control, mathematics over policy.

#Autonomy (2)

  • Allen (2025) Swiss e-ID Anchors

    BRIEF: Demonstrates how government digital identity systems can preserve autonomy—addresses “voluntary in law” eroding to “mandatory in practice” pattern.

  • Farahany (2023) Battle for Your Brain

    BRIEF: Argues cognitive liberty (mental self-determination) is foundational right threatened by neurotechnology.

#BalkinJack (1)

#BankingAccess (1)

#BankingPolicy (1)

#BCI (1)

#BehavioralData (1)

  • Zuboff (2019) Surveillance Capitalism

    BRIEF: Develops surveillance capitalism framework—unprecedented economic logic extracting behavioral surplus and deploying instrumentarian power through ubiquitous computation.

#BehavioralEconomics (1)

#BenjaminRuha (1)

  • Benjamin (2019) Race After Technology

    BRIEF: Exposes how technologies reproduce racial inequity while appearing neutral, introducing “New Jim Code” concept for discriminatory automation.

#BibliometricAnalysis (1)

#BigTech (3)

#BiometricIdentification (1)

#BirhaneAbeba (1)

  • Birhane (2017) Ubuntu Philosophy

    BRIEF: Contrasts Western individualist “I think therefore I am” with Ubuntu’s relational personhood: “I am because we are.”

#BlockchainBias (1)

#BlockchainGovernance (1)

#BlockchainIdentity (8)

#BrainComputerInterface (1)

#BrainPrivacy (1)

#CampaignFinance (1)

  • Citizens United (2010)

    BRIEF: Landmark ruling extending free speech protections to political spending—debatable whether expression through expenditure applies to identity transactions.

#CapabilityBasedSecurity (1)

#CarterNic (1)

#Censorship (1)

#Centralization (2)

#CentralizedControl (1)

#CertificateAuthority (1)

#Chamas (1)

  • Grigg (2021) The Identity Cycle

    BRIEF: Argues identity emerges from community, not state capture; validates through Kenyan chamas (200,000+ groups, $1.7B, 42% GDP).

#ChildProtection (1)

  • Cordeiro (2021) Sharenting

    BRIEF: Examines tension between children’s privacy rights and parental freedom; documents sharenting harms including identity theft and permanent digital footprints.

#ChildrensRights (1)

  • Cordeiro (2021) Sharenting

    BRIEF: Examines tension between children’s privacy rights and parental freedom; documents sharenting harms including identity theft and permanent digital footprints.

#ChileConstitution (1)

#ChillingEffects (1)

  • Penney (2016) Chilling Effects

    BRIEF: First empirical evidence of regulatory chilling effects from online surveillance, documenting 30% traffic decline to sensitive Wikipedia articles post-Snowden.

#ChineseTechnology (1)

#Circumvention (1)

#CitizensUnited (1)

  • Citizens United (2010)

    BRIEF: Landmark ruling extending free speech protections to political spending—debatable whether expression through expenditure applies to identity transactions.

#CivilLiberties (2)

  • Greenwald (2014) No Place to Hide (draft)

    BRIEF: Documents Snowden’s NSA surveillance disclosures, examining unprecedented government abuse of power and implications for privacy and democracy.

  • UDHR (1948)

    BRIEF: Foundational 1948 declaration establishing universal human dignity and rights as basis for international human rights law.

#CivilRights (1)

  • ICCPR (1966) (draft)

    BRIEF: Binding international treaty establishing legal personhood as universal right, extending UDHR principles into enforceable international law.

#ClientSideVerification (1)

#Cliques (2)

  • Allen (2024) Edge Identifiers

    BRIEF: Proposes relationship-based cryptographic identity using edge identifiers and cliques with Schnorr multisig protocols.

  • Allen (2024) Open & Fuzzy Cliques

    BRIEF: Extends cryptographic cliques with open (incomplete connectivity), fuzzy (threshold), and device variants for practical implementation.

#CloudSovereignty (1)

#CoCitationAnalysis (1)

#CognitiveLiberty (2)

#CohenJulie (1)

#CollectiveInterests (1)

#CommitmentDevices (1)

#Commodification (1)

  • Radin (1996) Contested Commodities

    BRIEF: Foundational market-inalienability theory—some things too bound up with personhood to commodify, including core identity attributes.

#CommonLaw (1)

  • Restatement Third of Agency (2006)

    BRIEF: Authoritative U.S. codification of Agency law establishing enforceable duties agents owe principals with centuries of precedent.

#CommonsGovernance (1)

  • Allen (2023) Origins of SSI

    BRIEF: Allen traces SSI origins to five traditions: sovereignty, living systems, commons governance, feminist theory, and human rights.

#Community (1)

  • Grigg (2021) The Identity Cycle

    BRIEF: Argues identity emerges from community, not state capture; validates through Kenyan chamas (200,000+ groups, $1.7B, 42% GDP).

#CommunityIdentity (1)

  • Birhane (2017) Ubuntu Philosophy

    BRIEF: Contrasts Western individualist “I think therefore I am” with Ubuntu’s relational personhood: “I am because we are.”

#ComparativeAnalysis (1)

#CompetitionLaw (1)

  • Khan & Vaheesan (2017) Market Power (draft)

    BRIEF: Analyzes how market power concentration enables gatekeeping and exclusion—applies directly to SSI infrastructure where monopoly positions create participation barriers.

#Complexity (1)

  • Sheldrake (2019) Generative Identity

    BRIEF: Proposes “generative identity” moving beyond self-sovereignty’s individual focus to embrace emergent, relational, and contextual identity.

#Compliance (1)

  • CSSPS (2022)

    BRIEF: Framework of 42 verifiable properties bridging SSI principles and legal/regulatory compliance requirements across jurisdictions.

#ConceptualGenealogy (1)

  • Allen (2023) Origins of SSI

    BRIEF: Allen traces SSI origins to five traditions: sovereignty, living systems, commons governance, feminist theory, and human rights.

#ConsentDilemma (1)

  • Solove (2013) Privacy Self-Management

    BRIEF: Demonstrates privacy consent mechanisms fail—assumptions of informed, empowered users false given information asymmetry and manufactured consent.

#ConstitutionalLaw (1)

#ConstitutionalRights (1)

#ConsumerBehavior (1)

#ConsumerProtection (1)

  • Khan & Vaheesan (2017) Market Power (draft)

    BRIEF: Analyzes how market power concentration enables gatekeeping and exclusion—applies directly to SSI infrastructure where monopoly positions create participation barriers.

#ContentModeration (2)

#ContextualIntegrity (2)

  • boyd (2023) Structuring Algorithms

    BRIEF: Framework showing algorithms structure networks via institutional arrangements, enabling network-based discrimination through data infrastructure control beyond categorical protections.

  • Nissenbaum (2009) Privacy in Context

    BRIEF: Foundational privacy theory—violations occur when information flows breach context-specific norms, not merely when individuals lose control.

#Convenience (1)

#Cooperation (1)

#CorporateData (1)

  • Purtova (2015) Illusion of Personal Data

    BRIEF: Demonstrates “no one owns data” is illusion—corporations already claim quasi-property rights; individual ownership validates framework favoring institutional actors.

#CorporateRights (1)

  • Citizens United (2010)

    BRIEF: Landmark ruling extending free speech protections to political spending—debatable whether expression through expenditure applies to identity transactions.

#Cosmotechnics (1)

#CredentialExchange (1)

  • DIDComm (2024)

    BRIEF: Standard protocol for secure, authenticated messaging between DID-identified parties—foundational delegation protocol for SSI.

#CredentialFormat (1)

#CredibleCommitment (1)

#CrisisManagement (1)

#CriticalAnalysis (2)

#CriticalRaceStudies (1)

  • Benjamin (2019) Race After Technology

    BRIEF: Exposes how technologies reproduce racial inequity while appearing neutral, introducing “New Jim Code” concept for discriminatory automation.

#CriticalRaceTheory (1)

  • Harris (1993) Whiteness as Property

    BRIEF: Demonstrates how property law historically encoded racial hierarchies—whiteness functioned as property granting access, opportunity, protection.

#CriticalTheory (1)

  • Foucault (1977) Discipline and Punish

    BRIEF: Classic analysis of how surveillance induces self-regulation—”visibility is a trap”—tracing punishment’s evolution from spectacle to psychological control.

#CrossBorderIdentity (1)

  • EU Regulation 2024/1183 eIDAS 2.0

    BRIEF: EU digital identity framework demonstrating both benefits (legal recognition, interoperability) and risks (government-centric architecture, limited platform independence).

#Crypto (1)

#Cryptocurrency (1)

#CryptographicCapabilities (1)

  • Allen (2025) Clubs

    BRIEF: Explores cryptographic capabilities enabling selective disclosure and delegated authority through derived keys, threshold signatures, and ZKPs.

#CryptographicInfrastructure (1)

#CryptographicSecrets (1)

  • Allen (2025) Digital Law Framework

    BRIEF: Four-layer model legislation demonstrating technology-neutral regulatory approach with anti-coercion provisions and platform independence requirements.

#CryptographicSecurity (2)

  • Baird et al. (2023) Threshold Signatures

    BRIEF: Modern threshold signature schemes enabling distributed authority where K-of-N parties must cooperate—cryptographic foundation for preventing single points of failure.

  • W3C (2024) Verifiable Credentials 2.0

    BRIEF: W3C standard for machine-verifiable credentials—foundational data model for delegation, authorization, and revocability.

#CryptographicVerification (1)

  • W3C (2022) Decentralized Identifiers

    BRIEF: W3C standard for decentralized, self-sovereign identifiers with cryptographic verification—foundational infrastructure for platform-independent delegation.

#Cryptography (2)

  • Allen (2024) Edge Identifiers

    BRIEF: Proposes relationship-based cryptographic identity using edge identifiers and cliques with Schnorr multisig protocols.

  • IETF (2024) FROST RFC 9591

    BRIEF: IETF standard for threshold Schnorr signatures enabling distributed trust—emerging capability existing paradigms didn’t anticipate.

#CulturalImperialism (1)

  • Ehmke (2023) Dimensions of Digital Coercion

    BRIEF: Systematic framework analyzing digital coercion through four dimensions across commercial and open-source platforms, proposing multi-layered standards as accountability.

#CulturalTechnology (1)

#CyberProletariat (1)

  • Dyer-Witheford (2015) Cyber-Proletariat

    BRIEF: Examines digital capitalism’s creation of feudal dependencies masquerading as autonomy—platforms deepen subordination through service dependency.

#CyberspaceSovereignty (1)

#DaoQi (1)

#DarkPatterns (1)

  • Ehmke (2023) Dimensions of Digital Coercion

    BRIEF: Systematic framework analyzing digital coercion through four dimensions across commercial and open-source platforms, proposing multi-layered standards as accountability.

#DataExtraction (1)

  • Zuboff (2019) Surveillance Capitalism

    BRIEF: Develops surveillance capitalism framework—unprecedented economic logic extracting behavioral surplus and deploying instrumentarian power through ubiquitous computation.

#DataGovernance (1)

#DataInfrastructure (1)

  • boyd (2023) Structuring Algorithms

    BRIEF: Framework showing algorithms structure networks via institutional arrangements, enabling network-based discrimination through data infrastructure control beyond categorical protections.

#DataMarkets (1)

#DataMinimization (1)

  • Allen (2024) SSI Moral Bankruptcy

    BRIEF: SSI originator argues ecosystem became morally bankrupt by abandoning founding principles for market adoption and surveillance-enabling compromises.

#DataOwnership (2)

  • Purtova (2015) Illusion of Personal Data

    BRIEF: Demonstrates “no one owns data” is illusion—corporations already claim quasi-property rights; individual ownership validates framework favoring institutional actors.

  • Renieris (2023) Beyond Data

    BRIEF: Comprehensive critique of “data ownership” frameworks; calls for grounding digital identity in human rights rather than property law.

#DataProperty (1)

  • Purtova (2015) Illusion of Personal Data

    BRIEF: Demonstrates “no one owns data” is illusion—corporations already claim quasi-property rights; individual ownership validates framework favoring institutional actors.

#DataProtection (4)

  • Balkin (2016) Information Fiduciaries

    BRIEF: Introduces “information fiduciary” concept—platforms holding user data owe fiduciary duties of care, confidentiality, and loyalty.

  • Nissenbaum (2009) Privacy in Context

    BRIEF: Foundational privacy theory—violations occur when information flows breach context-specific norms, not merely when individuals lose control.

  • Open Government Partnership (2023)

    BRIEF: Policy guidance on digital ID risks across 27 countries; recommends Human Rights Impact Assessments and meaningful participation of at-risk populations.

  • Purtova (2015) Illusion of Personal Data

    BRIEF: Demonstrates “no one owns data” is illusion—corporations already claim quasi-property rights; individual ownership validates framework favoring institutional actors.

#DataRights (1)

  • Renieris (2023) Beyond Data

    BRIEF: Comprehensive critique of “data ownership” frameworks; calls for grounding digital identity in human rights rather than property law.

#DataSovereignty (1)

#DeAnonymization (1)

#Decentralization (6)

  • Allen (2016) Path to Self-Sovereign Identity

    BRIEF: Foundational 2016 article establishing 10 principles of self-sovereign identity and tracing identity system evolution from centralized to user-centric to self-sovereign models.

  • Allen (2024) SSI Moral Bankruptcy

    BRIEF: SSI originator argues ecosystem became morally bankrupt by abandoning founding principles for market adoption and surveillance-enabling compromises.

  • Allen (2025) Exodus Protocol

    BRIEF: Establishes “infrastructure without infrastructure”—systems functioning autonomously without centralized control, mathematics over policy.

  • Nottingham (2025) Age Restriction Architecture

    BRIEF: IETF analysis identifying five architectural risks from age verification: centralization, privacy erosion, access barriers, fragmentation, and age-gated internet infrastructure.

  • Sheldrake (2019) Generative Identity

    BRIEF: Proposes “generative identity” moving beyond self-sovereignty’s individual focus to embrace emergent, relational, and contextual identity.

  • Utah SEDI (2024)

    BRIEF: Utah’s State-Endorsed Digital Identity framework establishing privacy-first, decentralized principles where identity belongs to individuals, not governments.

#DecentralizedIdentifiers (7)

#DecentralizedIdentity (4)

#DecentralizedMessaging (1)

  • DIDComm (2024)

    BRIEF: Standard protocol for secure, authenticated messaging between DID-identified parties—foundational delegation protocol for SSI.

#DecisionMaking (1)

#DecisionTheory (1)

#DelegatedAuthority (1)

  • Allen (2025) Clubs

    BRIEF: Explores cryptographic capabilities enabling selective disclosure and delegated authority through derived keys, threshold signatures, and ZKPs.

#Delegation (2)

  • Allen (2021) Principal Authority

    BRIEF: Analyzes Wyoming SF0039’s legal grounding of digital identity in Agency law, reorganizing SSI principles as Principal rights and Agent duties.

  • Restatement Third of Agency (2006)

    BRIEF: Authoritative U.S. codification of Agency law establishing enforceable duties agents owe principals with centuries of precedent.

#Democracy (1)

  • Zuboff (2019) Surveillance Capitalism

    BRIEF: Develops surveillance capitalism framework—unprecedented economic logic extracting behavioral surplus and deploying instrumentarian power through ubiquitous computation.

#DeMottDeborah (1)

  • Restatement Third of Agency (2006)

    BRIEF: Authoritative U.S. codification of Agency law establishing enforceable duties agents owe principals with centuries of precedent.

#DependentCare (1)

  • Sovrin Guardianship (2019/2023)

    BRIEF: Explores guardianship necessity for SSI inclusivity given 2.9 billion without internet access; warns about “safeguarding dystopia.”

#DependentIdentityOwners (1)

#Deplatforming (1)

#Descartes (1)

  • Birhane (2017) Ubuntu Philosophy

    BRIEF: Contrasts Western individualist “I think therefore I am” with Ubuntu’s relational personhood: “I am because we are.”

#DesignScienceResearch (1)

#Deterrence (1)

#DeviceCliques (1)

  • Allen (2024) Open & Fuzzy Cliques

    BRIEF: Extends cryptographic cliques with open (incomplete connectivity), fuzzy (threshold), and device variants for practical implementation.

#DIDComm (1)

  • DIDComm (2024)

    BRIEF: Standard protocol for secure, authenticated messaging between DID-identified parties—foundational delegation protocol for SSI.

#DIDProtocols (1)

  • DIDComm (2024)

    BRIEF: Standard protocol for secure, authenticated messaging between DID-identified parties—foundational delegation protocol for SSI.

#DIDs (2)

#DidWeb (1)

  • Allen (2024) SSI Moral Bankruptcy

    BRIEF: SSI originator argues ecosystem became morally bankrupt by abandoning founding principles for market adoption and surveillance-enabling compromises.

#DIF (1)

  • DIDComm (2024)

    BRIEF: Standard protocol for secure, authenticated messaging between DID-identified parties—foundational delegation protocol for SSI.

#DigitalCertificates (1)

#DigitalCoercion (1)

  • Ehmke (2023) Dimensions of Digital Coercion

    BRIEF: Systematic framework analyzing digital coercion through four dimensions across commercial and open-source platforms, proposing multi-layered standards as accountability.

#DigitalCredentials (1)

#DigitalDependency (1)

#DigitalDiscrimination (1)

  • Noble (2018) Algorithms of Oppression

    BRIEF: Documents how search algorithms perpetuate racism and sexism, creating conformity pressure through biased categorizations users can’t see or contest.

#DigitalEconomy (2)

  • Dyer-Witheford (2015) Cyber-Proletariat

    BRIEF: Examines digital capitalism’s creation of feudal dependencies masquerading as autonomy—platforms deepen subordination through service dependency.

  • Zuboff (2019) Surveillance Capitalism

    BRIEF: Develops surveillance capitalism framework—unprecedented economic logic extracting behavioral surplus and deploying instrumentarian power through ubiquitous computation.

#DigitalFootprint (1)

  • Cordeiro (2021) Sharenting

    BRIEF: Examines tension between children’s privacy rights and parental freedom; documents sharenting harms including identity theft and permanent digital footprints.

#DigitalID (1)

  • Open Government Partnership (2023)

    BRIEF: Policy guidance on digital ID risks across 27 countries; recommends Human Rights Impact Assessments and meaningful participation of at-risk populations.

#DigitalIdentity (13)

  • Allen (2016) Path to Self-Sovereign Identity

    BRIEF: Foundational 2016 article establishing 10 principles of self-sovereign identity and tracing identity system evolution from centralized to user-centric to self-sovereign models.

  • Allen (2021) Principal Authority

    BRIEF: Analyzes Wyoming SF0039’s legal grounding of digital identity in Agency law, reorganizing SSI principles as Principal rights and Agent duties.

  • Allen (2025) Swiss e-ID Anchors

    BRIEF: Demonstrates how government digital identity systems can preserve autonomy—addresses “voluntary in law” eroding to “mandatory in practice” pattern.

  • Ante et al. (2021) Bibliometric Review of Digital Identity

    BRIEF: First bibliometric mapping of digital identity reveals seven fragmented streams with minimal cross-citation despite 7x publication growth.

  • Andrieu et al. (2020) Five Mental Models

    BRIEF: Identifies five identity mental models (space-time, presentation, attribute, relationship, capability) and their intersections for SSI architecture.

  • Garazha et al. (2024) Resilience in Times of Crisis

    BRIEF: Derives seven design principles for SSI-based refugee identity through iterative prototyping with Ukrainian refugees in Switzerland.

  • Nottingham (2025) Age Restriction Architecture

    BRIEF: IETF analysis identifying five architectural risks from age verification: centralization, privacy erosion, access barriers, fragmentation, and age-gated internet infrastructure.

  • Pava-Díaz et al. (2024) SSI on the Blockchain

    BRIEF: Evaluates nine blockchain SSI frameworks against Allen’s principles, identifying portability and interoperability gaps from tight coupling.

  • Renieris (2023) Beyond Data

    BRIEF: Comprehensive critique of “data ownership” frameworks; calls for grounding digital identity in human rights rather than property law.

  • Sheldrake (2019) Generative Identity

    BRIEF: Proposes “generative identity” moving beyond self-sovereignty’s individual focus to embrace emergent, relational, and contextual identity.

  • Utah Code Title 46 (2021)

    BRIEF: State legislation recognizing digital identity credentials without creating government monopoly—model for “recognition without mandate.”

  • Utah SEDI (2024)

    BRIEF: Utah’s State-Endorsed Digital Identity framework establishing privacy-first, decentralized principles where identity belongs to individuals, not governments.

  • Zwitter et al. (2020) SSI: The Good, The Bad and The Ugly

    BRIEF: Critically examines SSI through philosophical, legal, and technical lenses, revealing naturalist-constructivist tensions requiring explicit governance decisions.

#DigitalInclusion (3)

  • Allen (2025) Right to Transact (draft)

    BRIEF: Frames transactional freedom as constitutional right grounded in assembly and association, not merely financial access.

  • Open Government Partnership (2023)

    BRIEF: Policy guidance on digital ID risks across 27 countries; recommends Human Rights Impact Assessments and meaningful participation of at-risk populations.

  • Sovrin Guardianship (2019/2023)

    BRIEF: Explores guardianship necessity for SSI inclusivity given 2.9 billion without internet access; warns about “safeguarding dystopia.”

#DigitalInfrastructure (1)

  • Allen (2025) Exodus Protocol

    BRIEF: Establishes “infrastructure without infrastructure”—systems functioning autonomously without centralized control, mathematics over policy.

#DigitalLabor (1)

  • Dyer-Witheford (2015) Cyber-Proletariat

    BRIEF: Examines digital capitalism’s creation of feudal dependencies masquerading as autonomy—platforms deepen subordination through service dependency.

#DigitalLawFramework (1)

  • Allen (2025) Digital Law Framework

    BRIEF: Four-layer model legislation demonstrating technology-neutral regulatory approach with anti-coercion provisions and platform independence requirements.

#DigitalPoorhouse (1)

  • Eubanks (2018) Automating Inequality

    BRIEF: Examines how automated systems create “digital poorhouse” that profiles and punishes poor Americans through case studies of welfare, homeless services, and child welfare.

#DigitalPrivacy (2)

  • Balkin (2016) Information Fiduciaries

    BRIEF: Introduces “information fiduciary” concept—platforms holding user data owe fiduciary duties of care, confidentiality, and loyalty.

  • Cordeiro (2021) Sharenting

    BRIEF: Examines tension between children’s privacy rights and parental freedom; documents sharenting harms including identity theft and permanent digital footprints.

#DigitalRights (1)

#DigitalSignatureAct (1)

  • Utah Code Title 46 (2021)

    BRIEF: State legislation recognizing digital identity credentials without creating government monopoly—model for “recognition without mandate.”

#DigitalSignatures (1)

  • Allen (2025) Digital Law Framework

    BRIEF: Four-layer model legislation demonstrating technology-neutral regulatory approach with anti-coercion provisions and platform independence requirements.

#DigitalSovereignty (2)

#DigitalWallet (2)

#Dignity (2)

  • Radin (1996) Contested Commodities

    BRIEF: Foundational market-inalienability theory—some things too bound up with personhood to commodify, including core identity attributes.

  • UDHR (1948)

    BRIEF: Foundational 1948 declaration establishing universal human dignity and rights as basis for international human rights law.

#Discipline (1)

  • Foucault (1977) Discipline and Punish

    BRIEF: Classic analysis of how surveillance induces self-regulation—”visibility is a trap”—tracing punishment’s evolution from spectacle to psychological control.

#Discrimination (3)

  • Benjamin (2019) Race After Technology

    BRIEF: Exposes how technologies reproduce racial inequity while appearing neutral, introducing “New Jim Code” concept for discriminatory automation.

  • boyd (2023) Structuring Algorithms

    BRIEF: Framework showing algorithms structure networks via institutional arrangements, enabling network-based discrimination through data infrastructure control beyond categorical protections.

  • Eubanks (2018) Automating Inequality

    BRIEF: Examines how automated systems create “digital poorhouse” that profiles and punishes poor Americans through case studies of welfare, homeless services, and child welfare.

#DistributedAuthority (1)

  • Baird et al. (2023) Threshold Signatures

    BRIEF: Modern threshold signature schemes enabling distributed authority where K-of-N parties must cooperate—cryptographic foundation for preventing single points of failure.

#DistributedTrust (1)

  • IETF (2024) FROST RFC 9591

    BRIEF: IETF standard for threshold Schnorr signatures enabling distributed trust—emerging capability existing paradigms didn’t anticipate.

#DunbarNumber (1)

  • Grigg (2021) The Identity Cycle

    BRIEF: Argues identity emerges from community, not state capture; validates through Kenyan chamas (200,000+ groups, $1.7B, 42% GDP).

#DyerWithefordNick (1)

  • Dyer-Witheford (2015) Cyber-Proletariat

    BRIEF: Examines digital capitalism’s creation of feudal dependencies masquerading as autonomy—platforms deepen subordination through service dependency.

#EconomicPolicy (1)

#EconomicPsychology (1)

#EconomicRights (1)

  • Radin (1996) Contested Commodities

    BRIEF: Foundational market-inalienability theory—some things too bound up with personhood to commodify, including core identity attributes.

#EdgeIdentifiers (2)

  • Allen (2024) Edge Identifiers

    BRIEF: Proposes relationship-based cryptographic identity using edge identifiers and cliques with Schnorr multisig protocols.

  • Allen (2024) Open & Fuzzy Cliques

    BRIEF: Extends cryptographic cliques with open (incomplete connectivity), fuzzy (threshold), and device variants for practical implementation.

#EdwardSnowden (1)

#eIDAS (1)

  • EU Regulation 2024/1183 eIDAS 2.0

    BRIEF: EU digital identity framework demonstrating both benefits (legal recognition, interoperability) and risks (government-centric architecture, limited platform independence).

#ElectionLaw (1)

  • Citizens United (2010)

    BRIEF: Landmark ruling extending free speech protections to political spending—debatable whether expression through expenditure applies to identity transactions.

#ElectronicSignatures (1)

  • Utah Code Title 46 (2021)

    BRIEF: State legislation recognizing digital identity credentials without creating government monopoly—model for “recognition without mandate.”

#ElsterJon (1)

#Emergence (1)

  • Sheldrake (2019) Generative Identity

    BRIEF: Proposes “generative identity” moving beyond self-sovereignty’s individual focus to embrace emergent, relational, and contextual identity.

#Empowerment (1)

#Enshittification (2)

  • Allen (2025) Exodus Protocol

    BRIEF: Establishes “infrastructure without infrastructure”—systems functioning autonomously without centralized control, mathematics over policy.

  • Tcherneva (2025) Death of the Social Contract

    BRIEF: Applies enshittification framework to labor market degradation, proposing job guarantee as circuit breaker restoring worker power.

#Ethics (1)

  • Radin (1996) Contested Commodities

    BRIEF: Foundational market-inalienability theory—some things too bound up with personhood to commodify, including core identity attributes.

#EthicsOfPrivacy (1)

  • Nissenbaum (2009) Privacy in Context

    BRIEF: Foundational privacy theory—violations occur when information flows breach context-specific norms, not merely when individuals lose control.

#EubanksVirginia (1)

  • Eubanks (2018) Automating Inequality

    BRIEF: Examines how automated systems create “digital poorhouse” that profiles and punishes poor Americans through case studies of welfare, homeless services, and child welfare.

#EUDIW (1)

  • EU Regulation 2024/1183 eIDAS 2.0

    BRIEF: EU digital identity framework demonstrating both benefits (legal recognition, interoperability) and risks (government-centric architecture, limited platform independence).

#EURegulation (1)

  • EU Regulation 2024/1183 eIDAS 2.0

    BRIEF: EU digital identity framework demonstrating both benefits (legal recognition, interoperability) and risks (government-centric architecture, limited platform independence).

#EuropeanDigitalIdentity (1)

  • EU Regulation 2024/1183 eIDAS 2.0

    BRIEF: EU digital identity framework demonstrating both benefits (legal recognition, interoperability) and risks (government-centric architecture, limited platform independence).

#EvaluationGap (1)

#ExodusProtocol (1)

  • Allen (2025) Exodus Protocol

    BRIEF: Establishes “infrastructure without infrastructure”—systems functioning autonomously without centralized control, mathematics over policy.

#FamilyCare (1)

  • Sovrin Guardianship (2019/2023)

    BRIEF: Explores guardianship necessity for SSI inclusivity given 2.9 billion without internet access; warns about “safeguarding dystopia.”

#FamilyPrivacy (1)

  • Cordeiro (2021) Sharenting

    BRIEF: Examines tension between children’s privacy rights and parental freedom; documents sharenting harms including identity theft and permanent digital footprints.

#FarahanyNita (1)

#Federalism (1)

#FeministPoliticalTheory (1)

  • Allen (2023) Origins of SSI

    BRIEF: Allen traces SSI origins to five traditions: sovereignty, living systems, commons governance, feminist theory, and human rights.

#FiduciaryDuty (3)

  • Allen (2021) Principal Authority

    BRIEF: Analyzes Wyoming SF0039’s legal grounding of digital identity in Agency law, reorganizing SSI principles as Principal rights and Agent duties.

  • Balkin (2016) Information Fiduciaries

    BRIEF: Introduces “information fiduciary” concept—platforms holding user data owe fiduciary duties of care, confidentiality, and loyalty.

  • Restatement Third of Agency (2006)

    BRIEF: Authoritative U.S. codification of Agency law establishing enforceable duties agents owe principals with centuries of precedent.

#FieldEvolution (1)

#FinancialDeplatforming (1)

#FinancialFreedom (1)

#FinancialInclusion (1)

  • Grigg (2021) The Identity Cycle

    BRIEF: Argues identity emerges from community, not state capture; validates through Kenyan chamas (200,000+ groups, $1.7B, 42% GDP).

#Financialization (2)

  • boyd (2023) Structuring Algorithms

    BRIEF: Framework showing algorithms structure networks via institutional arrangements, enabling network-based discrimination through data infrastructure control beyond categorical protections.

  • Tcherneva (2025) Death of the Social Contract

    BRIEF: Applies enshittification framework to labor market degradation, proposing job guarantee as circuit breaker restoring worker power.

#FinancialSurveillance (1)

#FirstAmendment (3)

  • Balkin (2016) Information Fiduciaries

    BRIEF: Introduces “information fiduciary” concept—platforms holding user data owe fiduciary duties of care, confidentiality, and loyalty.

  • Citizens United (2010)

    BRIEF: Landmark ruling extending free speech protections to political spending—debatable whether expression through expenditure applies to identity transactions.

  • Penney (2016) Chilling Effects

    BRIEF: First empirical evidence of regulatory chilling effects from online surveillance, documenting 30% traffic decline to sensitive Wikipedia articles post-Snowden.

#FocalPoints (1)

#FoucaultMichel (1)

  • Foucault (1977) Discipline and Punish

    BRIEF: Classic analysis of how surveillance induces self-regulation—”visibility is a trap”—tracing punishment’s evolution from spectacle to psychological control.

#FourHorsemen (1)

  • Allen (2024) SSI Moral Bankruptcy

    BRIEF: SSI originator argues ecosystem became morally bankrupt by abandoning founding principles for market adoption and surveillance-enabling compromises.

#Fragmentation (1)

  • Nottingham (2025) Age Restriction Architecture

    BRIEF: IETF analysis identifying five architectural risks from age verification: centralization, privacy erosion, access barriers, fragmentation, and age-gated internet infrastructure.

#Framework (1)

#FrameworkComparison (1)

#FreeAssociation (1)

#FreedomOfThought (1)

#FreedomToTransact (1)

#FreeSpeech (1)

  • Citizens United (2010)

    BRIEF: Landmark ruling extending free speech protections to political spending—debatable whether expression through expenditure applies to identity transactions.

#FROST (3)

  • Allen (2024) Edge Identifiers

    BRIEF: Proposes relationship-based cryptographic identity using edge identifiers and cliques with Schnorr multisig protocols.

  • Allen (2024) Open & Fuzzy Cliques

    BRIEF: Extends cryptographic cliques with open (incomplete connectivity), fuzzy (threshold), and device variants for practical implementation.

  • IETF (2024) FROST RFC 9591

    BRIEF: IETF standard for threshold Schnorr signatures enabling distributed trust—emerging capability existing paradigms didn’t anticipate.

#FundamentalRights (1)

  • UDHR (1948)

    BRIEF: Foundational 1948 declaration establishing universal human dignity and rights as basis for international human rights law.

#FuzzyCliques (1)

  • Allen (2024) Open & Fuzzy Cliques

    BRIEF: Extends cryptographic cliques with open (incomplete connectivity), fuzzy (threshold), and device variants for practical implementation.

#GameTheory (1)

#GDPR (2)

  • CSSPS (2022)

    BRIEF: Framework of 42 verifiable properties bridging SSI principles and legal/regulatory compliance requirements across jurisdictions.

  • Zwitter et al. (2020) SSI: The Good, The Bad and The Ugly

    BRIEF: Critically examines SSI through philosophical, legal, and technical lenses, revealing naturalist-constructivist tensions requiring explicit governance decisions.

#GDPRCompliance (2)

#GenerativeAI (1)

#GenerativeIdentity (1)

  • Sheldrake (2019) Generative Identity

    BRIEF: Proposes “generative identity” moving beyond self-sovereignty’s individual focus to embrace emergent, relational, and contextual identity.

#GlobalDevelopment (1)

  • Open Government Partnership (2023)

    BRIEF: Policy guidance on digital ID risks across 27 countries; recommends Human Rights Impact Assessments and meaningful participation of at-risk populations.

#GlobalLabor (1)

  • Dyer-Witheford (2015) Cyber-Proletariat

    BRIEF: Examines digital capitalism’s creation of feudal dependencies masquerading as autonomy—platforms deepen subordination through service dependency.

#GlobalSouth (1)

#Google (1)

#GovernanceFrameworks (1)

#GovernmentAccountability (1)

  • Open Government Partnership (2023)

    BRIEF: Policy guidance on digital ID risks across 27 countries; recommends Human Rights Impact Assessments and meaningful participation of at-risk populations.

#GovernmentAsAPlatform (1)

#GovernmentID (2)

  • Allen (2025) Swiss e-ID Anchors

    BRIEF: Demonstrates how government digital identity systems can preserve autonomy—addresses “voluntary in law” eroding to “mandatory in practice” pattern.

  • Utah SEDI (2024)

    BRIEF: Utah’s State-Endorsed Digital Identity framework establishing privacy-first, decentralized principles where identity belongs to individuals, not governments.

#GovernmentOverreach (2)

#GradualIdentification (1)

#GraphAnalysis (1)

#GreenwaldGlenn (1)

#GriggIan (1)

  • Grigg (2021) The Identity Cycle

    BRIEF: Argues identity emerges from community, not state capture; validates through Kenyan chamas (200,000+ groups, $1.7B, 42% GDP).

#GroupFormingNetworks (1)

  • Grigg (2021) The Identity Cycle

    BRIEF: Argues identity emerges from community, not state capture; validates through Kenyan chamas (200,000+ groups, $1.7B, 42% GDP).

#Guardianship (2)

  • Baird et al. (2023) Threshold Signatures

    BRIEF: Modern threshold signature schemes enabling distributed authority where K-of-N parties must cooperate—cryptographic foundation for preventing single points of failure.

  • Sovrin Guardianship (2019/2023)

    BRIEF: Explores guardianship necessity for SSI inclusivity given 2.9 billion without internet access; warns about “safeguarding dystopia.”

#GuardianshipModel (1)

#HarrisCheryl (1)

  • Harris (1993) Whiteness as Property

    BRIEF: Demonstrates how property law historically encoded racial hierarchies—whiteness functioned as property granting access, opportunity, protection.

#HDKeys (1)

  • Allen (2025) Clubs

    BRIEF: Explores cryptographic capabilities enabling selective disclosure and delegated authority through derived keys, threshold signatures, and ZKPs.

#Heidegger (1)

#HighModernism (1)

#HuiYuk (1)

#HumanAutonomy (1)

  • Zuboff (2019) Surveillance Capitalism

    BRIEF: Develops surveillance capitalism framework—unprecedented economic logic extracting behavioral surplus and deploying instrumentarian power through ubiquitous computation.

#HumanitarianTechnology (1)

#HumanRights (9)

  • Allen (2023) Origins of SSI

    BRIEF: Allen traces SSI origins to five traditions: sovereignty, living systems, commons governance, feminist theory, and human rights.

  • Farahany (2023) Battle for Your Brain

    BRIEF: Argues cognitive liberty (mental self-determination) is foundational right threatened by neurotechnology.

  • ICCPR (1966) (draft)

    BRIEF: Binding international treaty establishing legal personhood as universal right, extending UDHR principles into enforceable international law.

  • Kinstler (2025) Big Tech Wants Direct Access to Our Brains

    BRIEF: Documents Big Tech BCI commercialization and neurorights movement seeking legal protections for mental privacy and cognitive liberty.

  • Open Government Partnership (2023)

    BRIEF: Policy guidance on digital ID risks across 27 countries; recommends Human Rights Impact Assessments and meaningful participation of at-risk populations.

  • Renieris (2022) Freedom to Transact Critique

    BRIEF: Essential counterpoint—challenges absolute “right to transact” claims, distinguishing proportionate regulation from exclusionary gatekeeping.

  • Renieris (2023) Beyond Data

    BRIEF: Comprehensive critique of “data ownership” frameworks; calls for grounding digital identity in human rights rather than property law.

  • UDHR (1948)

    BRIEF: Foundational 1948 declaration establishing universal human dignity and rights as basis for international human rights law.

  • Zwitter et al. (2020) SSI: The Good, The Bad and The Ugly

    BRIEF: Critically examines SSI through philosophical, legal, and technical lenses, revealing naturalist-constructivist tensions requiring explicit governance decisions.

#HyperledgerIndy (1)

#ICCPR (1)

  • ICCPR (1966) (draft)

    BRIEF: Binding international treaty establishing legal personhood as universal right, extending UDHR principles into enforceable international law.

#IdentifierPortability (1)

  • W3C (2022) Decentralized Identifiers

    BRIEF: W3C standard for decentralized, self-sovereign identifiers with cryptographic verification—foundational infrastructure for platform-independent delegation.

#Identity (3)

  • Allen (2016) Path to Self-Sovereign Identity

    BRIEF: Foundational 2016 article establishing 10 principles of self-sovereign identity and tracing identity system evolution from centralized to user-centric to self-sovereign models.

  • Andrieu et al. (2020) Five Mental Models

    BRIEF: Identifies five identity mental models (space-time, presentation, attribute, relationship, capability) and their intersections for SSI architecture.

  • Grigg (2021) The Identity Cycle

    BRIEF: Argues identity emerges from community, not state capture; validates through Kenyan chamas (200,000+ groups, $1.7B, 42% GDP).

#IdentityArchitecture (1)

#IdentityBasedCryptography (1)

#IdentityDelegation (1)

  • Sovrin Guardianship (2019/2023)

    BRIEF: Explores guardianship necessity for SSI inclusivity given 2.9 billion without internet access; warns about “safeguarding dystopia.”

#IdentityGovernance (3)

#IdentityManagement (3)

#IdentityPhilosophy (1)

#IdentityPortability (1)

#IdentityPrinciples (2)

#IdentityTheft (1)

  • Cordeiro (2021) Sharenting

    BRIEF: Examines tension between children’s privacy rights and parental freedom; documents sharenting harms including identity theft and permanent digital footprints.

#IdentityTheory (2)

  • Andrieu et al. (2020) Five Mental Models

    BRIEF: Identifies five identity mental models (space-time, presentation, attribute, relationship, capability) and their intersections for SSI architecture.

  • Sheldrake (2019) Generative Identity

    BRIEF: Proposes “generative identity” moving beyond self-sovereignty’s individual focus to embrace emergent, relational, and contextual identity.

#IETF (1)

  • IETF (2024) FROST RFC 9591

    BRIEF: IETF standard for threshold Schnorr signatures enabling distributed trust—emerging capability existing paradigms didn’t anticipate.

#Inclusion (1)

  • Open Government Partnership (2023)

    BRIEF: Policy guidance on digital ID risks across 27 countries; recommends Human Rights Impact Assessments and meaningful participation of at-risk populations.

#Inequality (1)

  • Khan & Vaheesan (2017) Market Power (draft)

    BRIEF: Analyzes how market power concentration enables gatekeeping and exclusion—applies directly to SSI infrastructure where monopoly positions create participation barriers.

#InformationalCapitalism (1)

#InformationAsymmetry (1)

  • Solove (2013) Privacy Self-Management

    BRIEF: Demonstrates privacy consent mechanisms fail—assumptions of informed, empowered users false given information asymmetry and manufactured consent.

#InformationFiduciaries (1)

#InformationFlow (1)

  • Nissenbaum (2009) Privacy in Context

    BRIEF: Foundational privacy theory—violations occur when information flows breach context-specific norms, not merely when individuals lose control.

#InformationScience (1)

  • Noble (2018) Algorithms of Oppression

    BRIEF: Documents how search algorithms perpetuate racism and sexism, creating conformity pressure through biased categorizations users can’t see or contest.

#InformationSeeking (1)

  • Penney (2016) Chilling Effects

    BRIEF: First empirical evidence of regulatory chilling effects from online surveillance, documenting 30% traffic decline to sensitive Wikipedia articles post-Snowden.

#InformedConsent (1)

  • Solove (2013) Privacy Self-Management

    BRIEF: Demonstrates privacy consent mechanisms fail—assumptions of informed, empowered users false given information asymmetry and manufactured consent.

#InfrastructureStudies (1)

  • boyd (2023) Structuring Algorithms

    BRIEF: Framework showing algorithms structure networks via institutional arrangements, enabling network-based discrimination through data infrastructure control beyond categorical protections.

#InstitutionalCapture (1)

  • Allen (2024) SSI Moral Bankruptcy

    BRIEF: SSI originator argues ecosystem became morally bankrupt by abandoning founding principles for market adoption and surveillance-enabling compromises.

#InstitutionalChange (1)

#InstitutionalSafeguards (1)

  • Allen (2025) Swiss e-ID Anchors

    BRIEF: Demonstrates how government digital identity systems can preserve autonomy—addresses “voluntary in law” eroding to “mandatory in practice” pattern.

#IntellectualHistory (1)

  • Allen (2023) Origins of SSI

    BRIEF: Allen traces SSI origins to five traditions: sovereignty, living systems, commons governance, feminist theory, and human rights.

#Interdependence (1)

  • Birhane (2017) Ubuntu Philosophy

    BRIEF: Contrasts Western individualist “I think therefore I am” with Ubuntu’s relational personhood: “I am because we are.”

#InterdisciplinaryGaps (1)

#InternationalLaw (2)

  • ICCPR (1966) (draft)

    BRIEF: Binding international treaty establishing legal personhood as universal right, extending UDHR principles into enforceable international law.

  • UDHR (1948)

    BRIEF: Foundational 1948 declaration establishing universal human dignity and rights as basis for international human rights law.

#InternetArchitecture (1)

  • Nottingham (2025) Age Restriction Architecture

    BRIEF: IETF analysis identifying five architectural risks from age verification: centralization, privacy erosion, access barriers, fragmentation, and age-gated internet infrastructure.

#Interoperability (2)

#InteroperabilityChallenges (1)

#InteroperabilityStandards (2)

  • EU Regulation 2024/1183 eIDAS 2.0

    BRIEF: EU digital identity framework demonstrating both benefits (legal recognition, interoperability) and risks (government-centric architecture, limited platform independence).

  • Pava-Díaz et al. (2024) SSI on the Blockchain

    BRIEF: Evaluates nine blockchain SSI frameworks against Allen’s principles, identifying portability and interoperability gaps from tight coupling.

#IoTIdentity (1)

#Jailbreaking (1)

#JobGuarantee (1)

#JurisdictionalVariation (1)

#Kenya (1)

  • Grigg (2021) The Identity Cycle

    BRIEF: Argues identity emerges from community, not state capture; validates through Kenyan chamas (200,000+ groups, $1.7B, 42% GDP).

#KeyDerivation (1)

  • Allen (2025) Clubs

    BRIEF: Explores cryptographic capabilities enabling selective disclosure and delegated authority through derived keys, threshold signatures, and ZKPs.

#KeyManagement (1)

#KeyRecovery (1)

  • Baird et al. (2023) Threshold Signatures

    BRIEF: Modern threshold signature schemes enabling distributed authority where K-of-N parties must cooperate—cryptographic foundation for preventing single points of failure.

#KhanLina (1)

  • Khan & Vaheesan (2017) Market Power (draft)

    BRIEF: Analyzes how market power concentration enables gatekeeping and exclusion—applies directly to SSI infrastructure where monopoly positions create participation barriers.

#KofNSignatures (1)

  • Baird et al. (2023) Threshold Signatures

    BRIEF: Modern threshold signature schemes enabling distributed authority where K-of-N parties must cooperate—cryptographic foundation for preventing single points of failure.

#LaborEconomics (1)

#LaborExploitation (1)

  • Dyer-Witheford (2015) Cyber-Proletariat

    BRIEF: Examines digital capitalism’s creation of feudal dependencies masquerading as autonomy—platforms deepen subordination through service dependency.

#LaborMarkets (1)

#LegalArchitecture (1)

  • Allen (2025) Digital Law Framework

    BRIEF: Four-layer model legislation demonstrating technology-neutral regulatory approach with anti-coercion provisions and platform independence requirements.

#LegalDoctrine (1)

  • Restatement Third of Agency (2006)

    BRIEF: Authoritative U.S. codification of Agency law establishing enforceable duties agents owe principals with centuries of precedent.

#LegalFoundation (1)

  • UDHR (1948)

    BRIEF: Foundational 1948 declaration establishing universal human dignity and rights as basis for international human rights law.

#LegalFramework (2)

  • Allen (2021) Principal Authority

    BRIEF: Analyzes Wyoming SF0039’s legal grounding of digital identity in Agency law, reorganizing SSI principles as Principal rights and Agent duties.

  • CSSPS (2022)

    BRIEF: Framework of 42 verifiable properties bridging SSI principles and legal/regulatory compliance requirements across jurisdictions.

#LegalHistory (1)

  • Harris (1993) Whiteness as Property

    BRIEF: Demonstrates how property law historically encoded racial hierarchies—whiteness functioned as property granting access, opportunity, protection.

#LegalPersonhood (1)

  • ICCPR (1966) (draft)

    BRIEF: Binding international treaty establishing legal personhood as universal right, extending UDHR principles into enforceable international law.

#LegalRecognition (1)

  • Utah Code Title 46 (2021)

    BRIEF: State legislation recognizing digital identity credentials without creating government monopoly—model for “recognition without mandate.”

#LegalTheory (4)

  • Balkin (2016) Information Fiduciaries

    BRIEF: Introduces “information fiduciary” concept—platforms holding user data owe fiduciary duties of care, confidentiality, and loyalty.

  • Cohen (2019) Between Truth and Power

    BRIEF: Demonstrates how code and law co-construct identity as extractable capital; property frameworks actively create data as commodity.

  • Purtova (2015) Illusion of Personal Data

    BRIEF: Demonstrates “no one owns data” is illusion—corporations already claim quasi-property rights; individual ownership validates framework favoring institutional actors.

  • Radin (1996) Contested Commodities

    BRIEF: Foundational market-inalienability theory—some things too bound up with personhood to commodify, including core identity attributes.

#LegalTreatise (1)

  • Restatement Third of Agency (2006)

    BRIEF: Authoritative U.S. codification of Agency law establishing enforceable duties agents owe principals with centuries of precedent.

#Legibility (1)

#LESSIdentity (1)

  • Allen (2021) SSI: 5 Years On

    BRIEF: Five-year SSI retrospective finds W3C success with mission drift toward institutional surveillance over refugee protection.

#LibraryDependencies (1)

#LiteratureReview (1)

#LivingSystemsTheory (1)

  • Allen (2023) Origins of SSI

    BRIEF: Allen traces SSI origins to five traditions: sovereignty, living systems, commons governance, feminist theory, and human rights.

#LLMSecurity (1)

#LocalKnowledge (1)

#LockIn (1)

#MachineLearning (2)

  • boyd (2023) Structuring Algorithms

    BRIEF: Framework showing algorithms structure networks via institutional arrangements, enabling network-based discrimination through data infrastructure control beyond categorical protections.

  • Zhu et al. (2024) Generative AI Security

    BRIEF: Analyzes GenAI security; traditional defenses fail, requiring AI firewalls, guardrails, watermarking for social engineering attacks.

#MarketInalienability (1)

  • Radin (1996) Contested Commodities

    BRIEF: Foundational market-inalienability theory—some things too bound up with personhood to commodify, including core identity attributes.

#MarketPower (1)

  • Khan & Vaheesan (2017) Market Power (draft)

    BRIEF: Analyzes how market power concentration enables gatekeeping and exclusion—applies directly to SSI infrastructure where monopoly positions create participation barriers.

#MassSurveillance (1)

#MathematicsOverPolicy (1)

  • Allen (2025) Exodus Protocol

    BRIEF: Establishes “infrastructure without infrastructure”—systems functioning autonomously without centralized control, mathematics over policy.

#MeaningCapture (1)

#MemberStateImplementation (1)

  • EU Regulation 2024/1183 eIDAS 2.0

    BRIEF: EU digital identity framework demonstrating both benefits (legal recognition, interoperability) and risks (government-centric architecture, limited platform independence).

#MentalModels (1)

#MentalPrivacy (2)

#MetadataLeakage (1)

#MetaResearch (1)

#Metaverse (1)

  • Renieris (2023) Beyond Data

    BRIEF: Comprehensive critique of “data ownership” frameworks; calls for grounding digital identity in human rights rather than property law.

#MethodologicalInnovation (1)

#Metis (1)

#Microsoft (1)

#MillerMarkS (1)

#MINDAct (1)

#MindReading (1)

#MinskyianAnalysis (1)

#MissionDrift (1)

  • Allen (2021) SSI: 5 Years On

    BRIEF: Five-year SSI retrospective finds W3C success with mission drift toward institutional surveillance over refugee protection.

#MKUltra (1)

#ModelLegislation (1)

  • Allen (2025) Digital Law Framework

    BRIEF: Four-layer model legislation demonstrating technology-neutral regulatory approach with anti-coercion provisions and platform independence requirements.

#MoneyManagerCapitalism (1)

#Monopoly (1)

  • Khan & Vaheesan (2017) Market Power (draft)

    BRIEF: Analyzes how market power concentration enables gatekeeping and exclusion—applies directly to SSI infrastructure where monopoly positions create participation barriers.

#MoralBankruptcy (1)

  • Allen (2024) SSI Moral Bankruptcy

    BRIEF: SSI originator argues ecosystem became morally bankrupt by abandoning founding principles for market adoption and surveillance-enabling compromises.

#MPC (1)

  • Allen (2024) Open & Fuzzy Cliques

    BRIEF: Extends cryptographic cliques with open (incomplete connectivity), fuzzy (threshold), and device variants for practical implementation.

#MultiPartyComputation (3)

  • Allen (2024) Edge Identifiers

    BRIEF: Proposes relationship-based cryptographic identity using edge identifiers and cliques with Schnorr multisig protocols.

  • Baird et al. (2023) Threshold Signatures

    BRIEF: Modern threshold signature schemes enabling distributed authority where K-of-N parties must cooperate—cryptographic foundation for preventing single points of failure.

  • IETF (2024) FROST RFC 9591

    BRIEF: IETF standard for threshold Schnorr signatures enabling distributed trust—emerging capability existing paradigms didn’t anticipate.

#MuSig2 (2)

  • Allen (2024) Edge Identifiers

    BRIEF: Proposes relationship-based cryptographic identity using edge identifiers and cliques with Schnorr multisig protocols.

  • Allen (2024) Open & Fuzzy Cliques

    BRIEF: Extends cryptographic cliques with open (incomplete connectivity), fuzzy (threshold), and device variants for practical implementation.

#NAIRU (1)

#NarayananArvind (1)

#NationalSecurity (1)

#Negotiation (1)

#NetworkEffects (1)

#NetworkMaking (1)

  • boyd (2023) Structuring Algorithms

    BRIEF: Framework showing algorithms structure networks via institutional arrangements, enabling network-based discrimination through data infrastructure control beyond categorical protections.

#NetworkPrivacy (1)

#NeuralData (1)

#Neurorights (2)

#Neurotechnology (2)

#NewJimCode (1)

  • Benjamin (2019) Race After Technology

    BRIEF: Exposes how technologies reproduce racial inequity while appearing neutral, introducing “New Jim Code” concept for discriminatory automation.

#NissenbaumHelen (1)

  • Nissenbaum (2009) Privacy in Context

    BRIEF: Foundational privacy theory—violations occur when information flows breach context-specific norms, not merely when individuals lose control.

#NobelPrize (1)

#NobleSafiya (1)

  • Noble (2018) Algorithms of Oppression

    BRIEF: Documents how search algorithms perpetuate racism and sexism, creating conformity pressure through biased categorizations users can’t see or contest.

#NoRegistryDependency (1)

  • W3C (2022) Decentralized Identifiers

    BRIEF: W3C standard for decentralized, self-sovereign identifiers with cryptographic verification—foundational infrastructure for platform-independent delegation.

#Normalization (1)

  • Foucault (1977) Discipline and Punish

    BRIEF: Classic analysis of how surveillance induces self-regulation—”visibility is a trap”—tracing punishment’s evolution from spectacle to psychological control.

#NSA (2)

  • Greenwald (2014) No Place to Hide (draft)

    BRIEF: Documents Snowden’s NSA surveillance disclosures, examining unprecedented government abuse of power and implications for privacy and democracy.

  • Penney (2016) Chilling Effects

    BRIEF: First empirical evidence of regulatory chilling effects from online surveillance, documenting 30% traffic decline to sensitive Wikipedia articles post-Snowden.

#ObjectCapabilities (1)

#OCaps (1)

#OnlineIdentity (1)

  • Cordeiro (2021) Sharenting

    BRIEF: Examines tension between children’s privacy rights and parental freedom; documents sharenting harms including identity theft and permanent digital footprints.

#OpenCliques (1)

  • Allen (2024) Open & Fuzzy Cliques

    BRIEF: Extends cryptographic cliques with open (incomplete connectivity), fuzzy (threshold), and device variants for practical implementation.

#OpenGovernment (1)

  • Open Government Partnership (2023)

    BRIEF: Policy guidance on digital ID risks across 27 countries; recommends Human Rights Impact Assessments and meaningful participation of at-risk populations.

#OpenSourceAI (1)

#OpenSourceCritique (1)

  • Ehmke (2023) Dimensions of Digital Coercion

    BRIEF: Systematic framework analyzing digital coercion through four dimensions across commercial and open-source platforms, proposing multi-layered standards as accountability.

#OperationChokePoint (1)

#Optogenetics (1)

#OstromPrinciples (1)

  • Allen (2023) Origins of SSI

    BRIEF: Allen traces SSI origins to five traditions: sovereignty, living systems, commons governance, feminist theory, and human rights.

#Panopticon (1)

  • Foucault (1977) Discipline and Punish

    BRIEF: Classic analysis of how surveillance induces self-regulation—”visibility is a trap”—tracing punishment’s evolution from spectacle to psychological control.

#ParentalRights (1)

  • Cordeiro (2021) Sharenting

    BRIEF: Examines tension between children’s privacy rights and parental freedom; documents sharenting harms including identity theft and permanent digital footprints.

#PattiyanonCharnon (1)

  • CSSPS (2022)

    BRIEF: Framework of 42 verifiable properties bridging SSI principles and legal/regulatory compliance requirements across jurisdictions.

#PeerIdentity (1)

  • Grigg (2021) The Identity Cycle

    BRIEF: Argues identity emerges from community, not state capture; validates through Kenyan chamas (200,000+ groups, $1.7B, 42% GDP).

#PeerToPeer (1)

#PenneyJonathon (1)

  • Penney (2016) Chilling Effects

    BRIEF: First empirical evidence of regulatory chilling effects from online surveillance, documenting 30% traffic decline to sensitive Wikipedia articles post-Snowden.

#Personhood (2)

  • Birhane (2017) Ubuntu Philosophy

    BRIEF: Contrasts Western individualist “I think therefore I am” with Ubuntu’s relational personhood: “I am because we are.”

  • Radin (1996) Contested Commodities

    BRIEF: Foundational market-inalienability theory—some things too bound up with personhood to commodify, including core identity attributes.

#Philosophy (2)

  • Birhane (2017) Ubuntu Philosophy

    BRIEF: Contrasts Western individualist “I think therefore I am” with Ubuntu’s relational personhood: “I am because we are.”

  • Sheldrake (2019) Generative Identity

    BRIEF: Proposes “generative identity” moving beyond self-sovereignty’s individual focus to embrace emergent, relational, and contextual identity.

#PKI (1)

#PlanningFailures (1)

#PlatformCapitalism (2)

  • boyd (2023) Structuring Algorithms

    BRIEF: Framework showing algorithms structure networks via institutional arrangements, enabling network-based discrimination through data infrastructure control beyond categorical protections.

  • Dyer-Witheford (2015) Cyber-Proletariat

    BRIEF: Examines digital capitalism’s creation of feudal dependencies masquerading as autonomy—platforms deepen subordination through service dependency.

#PlatformCapture (1)

#PlatformEconomics (1)

  • Khan & Vaheesan (2017) Market Power (draft)

    BRIEF: Analyzes how market power concentration enables gatekeeping and exclusion—applies directly to SSI infrastructure where monopoly positions create participation barriers.

#PlatformGovernance (2)

  • Balkin (2016) Information Fiduciaries

    BRIEF: Introduces “information fiduciary” concept—platforms holding user data owe fiduciary duties of care, confidentiality, and loyalty.

  • Ehmke (2023) Dimensions of Digital Coercion

    BRIEF: Systematic framework analyzing digital coercion through four dimensions across commercial and open-source platforms, proposing multi-layered standards as accountability.

#PlatformIndependence (2)

  • Allen (2025) Swiss e-ID Anchors

    BRIEF: Demonstrates how government digital identity systems can preserve autonomy—addresses “voluntary in law” eroding to “mandatory in practice” pattern.

  • W3C (2022) Decentralized Identifiers

    BRIEF: W3C standard for decentralized, self-sovereign identifiers with cryptographic verification—foundational infrastructure for platform-independent delegation.

#PlatformLogic (1)

#PlatformMonopoly (1)

#PlatformPower (1)

#PolicyGuidance (1)

  • Open Government Partnership (2023)

    BRIEF: Policy guidance on digital ID risks across 27 countries; recommends Human Rights Impact Assessments and meaningful participation of at-risk populations.

#PoliticalRights (1)

  • ICCPR (1966) (draft)

    BRIEF: Binding international treaty establishing legal personhood as universal right, extending UDHR principles into enforceable international law.

#PoliticalSpeech (1)

  • Citizens United (2010)

    BRIEF: Landmark ruling extending free speech protections to political spending—debatable whether expression through expenditure applies to identity transactions.

#Portability (1)

  • Allen (2025) Exodus Protocol

    BRIEF: Establishes “infrastructure without infrastructure”—systems functioning autonomously without centralized control, mathematics over policy.

#Poverty (1)

  • Eubanks (2018) Automating Inequality

    BRIEF: Examines how automated systems create “digital poorhouse” that profiles and punishes poor Americans through case studies of welfare, homeless services, and child welfare.

#Power (1)

  • Foucault (1977) Discipline and Punish

    BRIEF: Classic analysis of how surveillance induces self-regulation—”visibility is a trap”—tracing punishment’s evolution from spectacle to psychological control.

#PrecarityOfWork (1)

#Precommitment (2)

#PredictiveAnalytics (1)

  • Eubanks (2018) Automating Inequality

    BRIEF: Examines how automated systems create “digital poorhouse” that profiles and punishes poor Americans through case studies of welfare, homeless services, and child welfare.

#PrincipalAuthority (1)

  • Allen (2021) Principal Authority

    BRIEF: Analyzes Wyoming SF0039’s legal grounding of digital identity in Agency law, reorganizing SSI principles as Principal rights and Agent duties.

#Prison (1)

  • Foucault (1977) Discipline and Punish

    BRIEF: Classic analysis of how surveillance induces self-regulation—”visibility is a trap”—tracing punishment’s evolution from spectacle to psychological control.

#Privacy (7)

  • Allen (2016) Path to Self-Sovereign Identity

    BRIEF: Foundational 2016 article establishing 10 principles of self-sovereign identity and tracing identity system evolution from centralized to user-centric to self-sovereign models.

  • Greenwald (2014) No Place to Hide (draft)

    BRIEF: Documents Snowden’s NSA surveillance disclosures, examining unprecedented government abuse of power and implications for privacy and democracy.

  • Nissenbaum (2009) Privacy in Context

    BRIEF: Foundational privacy theory—violations occur when information flows breach context-specific norms, not merely when individuals lose control.

  • Penney (2016) Chilling Effects

    BRIEF: First empirical evidence of regulatory chilling effects from online surveillance, documenting 30% traffic decline to sensitive Wikipedia articles post-Snowden.

  • Renieris (2023) Beyond Data

    BRIEF: Comprehensive critique of “data ownership” frameworks; calls for grounding digital identity in human rights rather than property law.

  • Utah SEDI (2024)

    BRIEF: Utah’s State-Endorsed Digital Identity framework establishing privacy-first, decentralized principles where identity belongs to individuals, not governments.

  • Zuboff (2019) Surveillance Capitalism

    BRIEF: Develops surveillance capitalism framework—unprecedented economic logic extracting behavioral surplus and deploying instrumentarian power through ubiquitous computation.

#PrivacyAttacks (1)

#PrivacyByDesign (2)

  • Allen (2025) Swiss e-ID Anchors

    BRIEF: Demonstrates how government digital identity systems can preserve autonomy—addresses “voluntary in law” eroding to “mandatory in practice” pattern.

  • Utah SEDI (2024)

    BRIEF: Utah’s State-Endorsed Digital Identity framework establishing privacy-first, decentralized principles where identity belongs to individuals, not governments.

#PrivacyChallenges (1)

#PrivacyConsent (1)

  • Solove (2013) Privacy Self-Management

    BRIEF: Demonstrates privacy consent mechanisms fail—assumptions of informed, empowered users false given information asymmetry and manufactured consent.

#PrivacyEnhancingTechnologies (2)

#PrivacyLaw (2)

  • CSSPS (2022)

    BRIEF: Framework of 42 verifiable properties bridging SSI principles and legal/regulatory compliance requirements across jurisdictions.

  • Solove (2013) Privacy Self-Management

    BRIEF: Demonstrates privacy consent mechanisms fail—assumptions of informed, empowered users false given information asymmetry and manufactured consent.

#PrivacyPreserving (3)

#PrivacyResearch (1)

#PrivacyRights (1)

#PrivacySecurity (1)

  • Nottingham (2025) Age Restriction Architecture

    BRIEF: IETF analysis identifying five architectural risks from age verification: centralization, privacy erosion, access barriers, fragmentation, and age-gated internet infrastructure.

#PrivacySelfManagement (1)

  • Solove (2013) Privacy Self-Management

    BRIEF: Demonstrates privacy consent mechanisms fail—assumptions of informed, empowered users false given information asymmetry and manufactured consent.

#PrivacySurveillance (1)

  • Allen (2024) SSI Moral Bankruptcy

    BRIEF: SSI originator argues ecosystem became morally bankrupt by abandoning founding principles for market adoption and surveillance-enabling compromises.

#PrivacyTechnology (1)

#PrivacyTheory (1)

  • Nissenbaum (2009) Privacy in Context

    BRIEF: Foundational privacy theory—violations occur when information flows breach context-specific norms, not merely when individuals lose control.

#PromptInjection (1)

#Property (1)

  • Radin (1996) Contested Commodities

    BRIEF: Foundational market-inalienability theory—some things too bound up with personhood to commodify, including core identity attributes.

#PropertyLaw (1)

  • Harris (1993) Whiteness as Property

    BRIEF: Demonstrates how property law historically encoded racial hierarchies—whiteness functioned as property granting access, opportunity, protection.

#PropertyRegimes (1)

  • Purtova (2015) Illusion of Personal Data

    BRIEF: Demonstrates “no one owns data” is illusion—corporations already claim quasi-property rights; individual ownership validates framework favoring institutional actors.

#PropertyRights (1)

  • Purtova (2015) Illusion of Personal Data

    BRIEF: Demonstrates “no one owns data” is illusion—corporations already claim quasi-property rights; individual ownership validates framework favoring institutional actors.

#PurtovaNadezhda (1)

  • Purtova (2015) Illusion of Personal Data

    BRIEF: Demonstrates “no one owns data” is illusion—corporations already claim quasi-property rights; individual ownership validates framework favoring institutional actors.

#RacialJustice (2)

  • Benjamin (2019) Race After Technology

    BRIEF: Exposes how technologies reproduce racial inequity while appearing neutral, introducing “New Jim Code” concept for discriminatory automation.

  • Harris (1993) Whiteness as Property

    BRIEF: Demonstrates how property law historically encoded racial hierarchies—whiteness functioned as property granting access, opportunity, protection.

#Racism (1)

  • Noble (2018) Algorithms of Oppression

    BRIEF: Documents how search algorithms perpetuate racism and sexism, creating conformity pressure through biased categorizations users can’t see or contest.

#RadinMargaret (1)

  • Radin (1996) Contested Commodities

    BRIEF: Foundational market-inalienability theory—some things too bound up with personhood to commodify, including core identity attributes.

#RationalChoice (1)

#Rationality (1)

#RefugeeIdentity (1)

  • Allen (2021) SSI: 5 Years On

    BRIEF: Five-year SSI retrospective finds W3C success with mission drift toward institutional surveillance over refugee protection.

#Refugees (1)

#Regulation (2)

  • CSSPS (2022)

    BRIEF: Framework of 42 verifiable properties bridging SSI principles and legal/regulatory compliance requirements across jurisdictions.

  • Renieris (2022) Freedom to Transact Critique

    BRIEF: Essential counterpoint—challenges absolute “right to transact” claims, distinguishing proportionate regulation from exclusionary gatekeeping.

#ReIdentification (1)

#RelationalIdentity (3)

#RemoteNotarization (1)

  • Utah Code Title 46 (2021)

    BRIEF: State legislation recognizing digital identity credentials without creating government monopoly—model for “recognition without mandate.”

#RenierisElizabeth (2)

  • Renieris (2022) Freedom to Transact Critique

    BRIEF: Essential counterpoint—challenges absolute “right to transact” claims, distinguishing proportionate regulation from exclusionary gatekeeping.

  • Renieris (2023) Beyond Data

    BRIEF: Comprehensive critique of “data ownership” frameworks; calls for grounding digital identity in human rights rather than property law.

#ResearchFragmentation (1)

#ResearchMapping (1)

#ResearchMethodology (2)

#Restatement (1)

  • Restatement Third of Agency (2006)

    BRIEF: Authoritative U.S. codification of Agency law establishing enforceable duties agents owe principals with centuries of precedent.

#RevocationFlows (1)

  • DIDComm (2024)

    BRIEF: Standard protocol for secure, authenticated messaging between DID-identified parties—foundational delegation protocol for SSI.

#RFC9591 (1)

  • IETF (2024) FROST RFC 9591

    BRIEF: IETF standard for threshold Schnorr signatures enabling distributed trust—emerging capability existing paradigms didn’t anticipate.

#RightToTransact (1)

#RLHF (1)

#RWOT (1)

#SB260 (1)

  • Utah SEDI (2024)

    BRIEF: Utah’s State-Endorsed Digital Identity framework establishing privacy-first, decentralized principles where identity belongs to individuals, not governments.

#SchedulingAlgorithms (1)

  • boyd (2023) Structuring Algorithms

    BRIEF: Framework showing algorithms structure networks via institutional arrangements, enabling network-based discrimination through data infrastructure control beyond categorical protections.

#SchellingThomas (1)

#Schnorr (2)

  • Allen (2024) Open & Fuzzy Cliques

    BRIEF: Extends cryptographic cliques with open (incomplete connectivity), fuzzy (threshold), and device variants for practical implementation.

  • IETF (2024) FROST RFC 9591

    BRIEF: IETF standard for threshold Schnorr signatures enabling distributed trust—emerging capability existing paradigms didn’t anticipate.

#SchnorrSignatures (1)

  • Allen (2024) Edge Identifiers

    BRIEF: Proposes relationship-based cryptographic identity using edge identifiers and cliques with Schnorr multisig protocols.

#ScottJamesC (1)

#SearchEngines (1)

  • Noble (2018) Algorithms of Oppression

    BRIEF: Documents how search algorithms perpetuate racism and sexism, creating conformity pressure through biased categorizations users can’t see or contest.

#SecureCommunication (1)

  • DIDComm (2024)

    BRIEF: Standard protocol for secure, authenticated messaging between DID-identified parties—foundational delegation protocol for SSI.

#SecurityAnalysis (1)

#SecurityArchitecture (1)

#SecurityFailures (1)

#SecurityResearch (1)

#SecurityStandards (1)

  • IETF (2024) FROST RFC 9591

    BRIEF: IETF standard for threshold Schnorr signatures enabling distributed trust—emerging capability existing paradigms didn’t anticipate.

#SEDI (1)

  • Utah SEDI (2024)

    BRIEF: Utah’s State-Endorsed Digital Identity framework establishing privacy-first, decentralized principles where identity belongs to individuals, not governments.

#SelectiveDisclosure (2)

  • Allen (2025) Clubs

    BRIEF: Explores cryptographic capabilities enabling selective disclosure and delegated authority through derived keys, threshold signatures, and ZKPs.

  • W3C (2024) Verifiable Credentials 2.0

    BRIEF: W3C standard for machine-verifiable credentials—foundational data model for delegation, authorization, and revocability.

#SelfBinding (1)

#SelfCensorship (1)

  • Penney (2016) Chilling Effects

    BRIEF: First empirical evidence of regulatory chilling effects from online surveillance, documenting 30% traffic decline to sensitive Wikipedia articles post-Snowden.

#SelfControl (2)

#SelfRegulation (1)

  • Foucault (1977) Discipline and Punish

    BRIEF: Classic analysis of how surveillance induces self-regulation—”visibility is a trap”—tracing punishment’s evolution from spectacle to psychological control.

#SelfSovereignIdentity (17)

#SF0039 (1)

  • Allen (2021) Principal Authority

    BRIEF: Analyzes Wyoming SF0039’s legal grounding of digital identity in Agency law, reorganizing SSI principles as Principal rights and Agent duties.

#Sharenting (1)

  • Cordeiro (2021) Sharenting

    BRIEF: Examines tension between children’s privacy rights and parental freedom; documents sharenting harms including identity theft and permanent digital footprints.

#SheldrakePhilip (1)

  • Sheldrake (2019) Generative Identity

    BRIEF: Proposes “generative identity” moving beyond self-sovereignty’s individual focus to embrace emergent, relational, and contextual identity.

#ShmatiskovVitaly (1)

#Snowden (1)

  • Penney (2016) Chilling Effects

    BRIEF: First empirical evidence of regulatory chilling effects from online surveillance, documenting 30% traffic decline to sensitive Wikipedia articles post-Snowden.

#SocialContract (1)

#SocialEngineering (1)

#SocialJustice (2)

  • Benjamin (2019) Race After Technology

    BRIEF: Exposes how technologies reproduce racial inequity while appearing neutral, introducing “New Jim Code” concept for discriminatory automation.

  • boyd (2023) Structuring Algorithms

    BRIEF: Framework showing algorithms structure networks via institutional arrangements, enabling network-based discrimination through data infrastructure control beyond categorical protections.

#SocialNetworks (1)

#SocialNorms (1)

  • Nissenbaum (2009) Privacy in Context

    BRIEF: Foundational privacy theory—violations occur when information flows breach context-specific norms, not merely when individuals lose control.

#SocialServices (1)

  • Eubanks (2018) Automating Inequality

    BRIEF: Examines how automated systems create “digital poorhouse” that profiles and punishes poor Americans through case studies of welfare, homeless services, and child welfare.

#SoloveDaniel (1)

  • Solove (2013) Privacy Self-Management

    BRIEF: Demonstrates privacy consent mechanisms fail—assumptions of informed, empowered users false given information asymmetry and manufactured consent.

#Sovereignty (1)

  • Allen (2025) Swiss e-ID Anchors

    BRIEF: Demonstrates how government digital identity systems can preserve autonomy—addresses “voluntary in law” eroding to “mandatory in practice” pattern.

#SovereigntyAsService (1)

#Sovrin (2)

#SSI (11)

  • Allen (2016) Path to Self-Sovereign Identity

    BRIEF: Foundational 2016 article establishing 10 principles of self-sovereign identity and tracing identity system evolution from centralized to user-centric to self-sovereign models.

  • Allen (2021) Principal Authority

    BRIEF: Analyzes Wyoming SF0039’s legal grounding of digital identity in Agency law, reorganizing SSI principles as Principal rights and Agent duties.

  • Allen (2024) Edge Identifiers

    BRIEF: Proposes relationship-based cryptographic identity using edge identifiers and cliques with Schnorr multisig protocols.

  • Andrieu et al. (2020) Five Mental Models

    BRIEF: Identifies five identity mental models (space-time, presentation, attribute, relationship, capability) and their intersections for SSI architecture.

  • Ahmed et al. (2022) Blockchain SSI Survey

    BRIEF: Survey of 153 blockchain identity articles establishing five essential components framework for evaluating BC-IDMS solutions.

  • boyd (2023) Structuring Algorithms

    BRIEF: Framework showing algorithms structure networks via institutional arrangements, enabling network-based discrimination through data infrastructure control beyond categorical protections.

  • CSSPS (2022)

    BRIEF: Framework of 42 verifiable properties bridging SSI principles and legal/regulatory compliance requirements across jurisdictions.

  • Čučko & Turkanović (2021) SSI Systematic Mapping

    BRIEF: First systematic mapping of SSI research reveals validation dominating, evaluation absent, and zero usability research.

  • Naik & Jenkins (2020) Governing Principles of SSI

    BRIEF: 20-principle SSI evaluation framework extending Allen’s 10 principles; comparative analysis reveals technical maturity but operational gaps.

  • Sheldrake (2019) Generative Identity

    BRIEF: Proposes “generative identity” moving beyond self-sovereignty’s individual focus to embrace emergent, relational, and contextual identity.

  • Sovrin Guardianship (2019/2023)

    BRIEF: Explores guardianship necessity for SSI inclusivity given 2.9 billion without internet access; warns about “safeguarding dystopia.”

#SSIArchitecture (2)

#SSICritique (1)

#SSITaxonomy (1)

#StateLegislation (1)

  • Utah Code Title 46 (2021)

    BRIEF: State legislation recognizing digital identity credentials without creating government monopoly—model for “recognition without mandate.”

#StatePolicy (2)

  • Allen (2025) Digital Law Framework

    BRIEF: Four-layer model legislation demonstrating technology-neutral regulatory approach with anti-coercion provisions and platform independence requirements.

  • Utah SEDI (2024)

    BRIEF: Utah’s State-Endorsed Digital Identity framework establishing privacy-first, decentralized principles where identity belongs to individuals, not governments.

#StateSimplification (1)

#StateSovereignty (1)

#StrategicBehavior (2)

#StructuralInequality (1)

  • Harris (1993) Whiteness as Property

    BRIEF: Demonstrates how property law historically encoded racial hierarchies—whiteness functioned as property granting access, opportunity, protection.

#SupremeCourt (1)

  • Citizens United (2010)

    BRIEF: Landmark ruling extending free speech protections to political spending—debatable whether expression through expenditure applies to identity transactions.

#Surveillance (4)

  • Benjamin (2019) Race After Technology

    BRIEF: Exposes how technologies reproduce racial inequity while appearing neutral, introducing “New Jim Code” concept for discriminatory automation.

  • Foucault (1977) Discipline and Punish

    BRIEF: Classic analysis of how surveillance induces self-regulation—”visibility is a trap”—tracing punishment’s evolution from spectacle to psychological control.

  • Greenwald (2014) No Place to Hide (draft)

    BRIEF: Documents Snowden’s NSA surveillance disclosures, examining unprecedented government abuse of power and implications for privacy and democracy.

  • Penney (2016) Chilling Effects

    BRIEF: First empirical evidence of regulatory chilling effects from online surveillance, documenting 30% traffic decline to sensitive Wikipedia articles post-Snowden.

#SurveillanceCapitalism (4)

#SurveillanceResistance (1)

  • Allen (2021) SSI: 5 Years On

    BRIEF: Five-year SSI retrospective finds W3C success with mission drift toward institutional surveillance over refugee protection.

#Survey (2)

#SwissEID (1)

  • Allen (2025) Swiss e-ID Anchors

    BRIEF: Demonstrates how government digital identity systems can preserve autonomy—addresses “voluntary in law” eroding to “mandatory in practice” pattern.

#SwitchingCosts (1)

#Switzerland (1)

#SystematicLiteratureReview (1)

#SystematicMapping (1)

#SystematicReview (3)

#SystemicRacism (1)

  • Harris (1993) Whiteness as Property

    BRIEF: Demonstrates how property law historically encoded racial hierarchies—whiteness functioned as property granting access, opportunity, protection.

#SystemicRisk (1)

#SystemsSecurity (1)

#TamperEvident (1)

#Taxonomy (1)

#TechCritique (2)

  • Dyer-Witheford (2015) Cyber-Proletariat

    BRIEF: Examines digital capitalism’s creation of feudal dependencies masquerading as autonomy—platforms deepen subordination through service dependency.

  • Noble (2018) Algorithms of Oppression

    BRIEF: Documents how search algorithms perpetuate racism and sexism, creating conformity pressure through biased categorizations users can’t see or contest.

#TechEthics (2)

  • Benjamin (2019) Race After Technology

    BRIEF: Exposes how technologies reproduce racial inequity while appearing neutral, introducing “New Jim Code” concept for discriminatory automation.

  • Renieris (2023) Beyond Data

    BRIEF: Comprehensive critique of “data ownership” frameworks; calls for grounding digital identity in human rights rather than property law.

#TechLaw (1)

#TechnicalStandards (1)

  • CSSPS (2022)

    BRIEF: Framework of 42 verifiable properties bridging SSI principles and legal/regulatory compliance requirements across jurisdictions.

#TechnologicalPluralism (1)

#Technology (1)

  • Benjamin (2019) Race After Technology

    BRIEF: Exposes how technologies reproduce racial inequity while appearing neutral, introducing “New Jim Code” concept for discriminatory automation.

#TechnologyEthics (2)

  • Allen (2024) SSI Moral Bankruptcy

    BRIEF: SSI originator argues ecosystem became morally bankrupt by abandoning founding principles for market adoption and surveillance-enabling compromises.

  • Ehmke (2023) Dimensions of Digital Coercion

    BRIEF: Systematic framework analyzing digital coercion through four dimensions across commercial and open-source platforms, proposing multi-layered standards as accountability.

#TechnologyGovernance (1)

#TechnologyPhilosophy (1)

#TechnologyPolicy (1)

  • Nissenbaum (2009) Privacy in Context

    BRIEF: Foundational privacy theory—violations occur when information flows breach context-specific norms, not merely when individuals lose control.

#TemporalPreference (1)

#TenPrinciples (1)

  • Allen (2016) Path to Self-Sovereign Identity

    BRIEF: Foundational 2016 article establishing 10 principles of self-sovereign identity and tracing identity system evolution from centralized to user-centric to self-sovereign models.

#ThresholdSignatures (4)

  • Allen (2024) Open & Fuzzy Cliques

    BRIEF: Extends cryptographic cliques with open (incomplete connectivity), fuzzy (threshold), and device variants for practical implementation.

  • Allen (2025) Clubs

    BRIEF: Explores cryptographic capabilities enabling selective disclosure and delegated authority through derived keys, threshold signatures, and ZKPs.

  • Baird et al. (2023) Threshold Signatures

    BRIEF: Modern threshold signature schemes enabling distributed authority where K-of-N parties must cooperate—cryptographic foundation for preventing single points of failure.

  • IETF (2024) FROST RFC 9591

    BRIEF: IETF standard for threshold Schnorr signatures enabling distributed trust—emerging capability existing paradigms didn’t anticipate.

#TransactionalAbsolutism (1)

#TreatyLaw (1)

  • ICCPR (1966) (draft)

    BRIEF: Binding international treaty establishing legal personhood as universal right, extending UDHR principles into enforceable international law.

#Trust (1)

  • Grigg (2021) The Identity Cycle

    BRIEF: Argues identity emerges from community, not state capture; validates through Kenyan chamas (200,000+ groups, $1.7B, 42% GDP).

#TrustFrameworks (1)

#TrustMinimizedIdentity (1)

  • Allen (2021) SSI: 5 Years On

    BRIEF: Five-year SSI retrospective finds W3C success with mission drift toward institutional surveillance over refugee protection.

#TrustModels (2)

#Ubuntu (1)

  • Birhane (2017) Ubuntu Philosophy

    BRIEF: Contrasts Western individualist “I think therefore I am” with Ubuntu’s relational personhood: “I am because we are.”

#UDHR (1)

  • UDHR (1948)

    BRIEF: Foundational 1948 declaration establishing universal human dignity and rights as basis for international human rights law.

#UETA (1)

  • Utah Code Title 46 (2021)

    BRIEF: State legislation recognizing digital identity credentials without creating government monopoly—model for “recognition without mandate.”

#Ukraine (1)

#UlyssesContracts (1)

#UnemploymentPolicy (1)

#UnitedNations (2)

  • ICCPR (1966) (draft)

    BRIEF: Binding international treaty establishing legal personhood as universal right, extending UDHR principles into enforceable international law.

  • UDHR (1948)

    BRIEF: Foundational 1948 declaration establishing universal human dignity and rights as basis for international human rights law.

#UniversalRights (1)

  • UDHR (1948)

    BRIEF: Foundational 1948 declaration establishing universal human dignity and rights as basis for international human rights law.

#uPort (1)

#UsabilityChallenges (1)

#UsabilityGap (1)

#UserControl (1)

  • Allen (2016) Path to Self-Sovereign Identity

    BRIEF: Foundational 2016 article establishing 10 principles of self-sovereign identity and tracing identity system evolution from centralized to user-centric to self-sovereign models.

#UserRights (1)

  • Solove (2013) Privacy Self-Management

    BRIEF: Demonstrates privacy consent mechanisms fail—assumptions of informed, empowered users false given information asymmetry and manufactured consent.

#Utah (1)

  • Utah SEDI (2024)

    BRIEF: Utah’s State-Endorsed Digital Identity framework establishing privacy-first, decentralized principles where identity belongs to individuals, not governments.

#UtahLaw (1)

  • Utah Code Title 46 (2021)

    BRIEF: State legislation recognizing digital identity credentials without creating government monopoly—model for “recognition without mandate.”

#VaheesanSandeep (1)

  • Khan & Vaheesan (2017) Market Power (draft)

    BRIEF: Analyzes how market power concentration enables gatekeeping and exclusion—applies directly to SSI infrastructure where monopoly positions create participation barriers.

#VerifiableClaims (1)

#VerifiableCredentials (12)

#VerifiableProperties (1)

  • CSSPS (2022)

    BRIEF: Framework of 42 verifiable properties bridging SSI principles and legal/regulatory compliance requirements across jurisdictions.

#VerifiableRecords (1)

  • Allen (2025) Digital Law Framework

    BRIEF: Four-layer model legislation demonstrating technology-neutral regulatory approach with anti-coercion provisions and platform independence requirements.

#VulnerablePopulations (1)

  • Sovrin Guardianship (2019/2023)

    BRIEF: Explores guardianship necessity for SSI inclusivity given 2.9 billion without internet access; warns about “safeguarding dystopia.”

#W3C (2)

  • W3C (2022) Decentralized Identifiers

    BRIEF: W3C standard for decentralized, self-sovereign identifiers with cryptographic verification—foundational infrastructure for platform-independent delegation.

  • W3C (2024) Verifiable Credentials 2.0

    BRIEF: W3C standard for machine-verifiable credentials—foundational data model for delegation, authorization, and revocability.

#W3CDID (1)

#W3CStandards (4)

#Watermarking (1)

#Web3 (1)

  • Allen (2016) Path to Self-Sovereign Identity

    BRIEF: Foundational 2016 article establishing 10 principles of self-sovereign identity and tracing identity system evolution from centralized to user-centric to self-sovereign models.

#WebOfTrust (1)

#WelfareSurveillance (1)

  • Eubanks (2018) Automating Inequality

    BRIEF: Examines how automated systems create “digital poorhouse” that profiles and punishes poor Americans through case studies of welfare, homeless services, and child welfare.

#WesternPhilosophy (1)

  • Birhane (2017) Ubuntu Philosophy

    BRIEF: Contrasts Western individualist “I think therefore I am” with Ubuntu’s relational personhood: “I am because we are.”

#Whistleblowing (1)

#WhitenessAsProperty (1)

  • Harris (1993) Whiteness as Property

    BRIEF: Demonstrates how property law historically encoded racial hierarchies—whiteness functioned as property granting access, opportunity, protection.

#Wikipedia (1)

  • Penney (2016) Chilling Effects

    BRIEF: First empirical evidence of regulatory chilling effects from online surveillance, documenting 30% traffic decline to sensitive Wikipedia articles post-Snowden.

#WorkerPower (1)

#WorkerRights (1)

  • boyd (2023) Structuring Algorithms

    BRIEF: Framework showing algorithms structure networks via institutional arrangements, enabling network-based discrimination through data infrastructure control beyond categorical protections.

#WuTim (1)

#Wyoming (1)

  • Allen (2021) Principal Authority

    BRIEF: Analyzes Wyoming SF0039’s legal grounding of digital identity in Agency law, reorganizing SSI principles as Principal rights and Agent duties.

#X509 (1)

#ZeroKnowledgeProofs (4)

#ZookosTriangle (1)

#ZuboffShoshana (1)

  • Zuboff (2019) Surveillance Capitalism

    BRIEF: Develops surveillance capitalism framework—unprecedented economic logic extracting behavioral surplus and deploying instrumentarian power through ubiquitous computation.