#RevisitingSSI

Ten Years Later

Workshop Kickoff (EU/US)

December 2nd, 2025 - 7pm CET, 10a PT

Made Possible By Our Sponsors

Stream44.Studio

Supporting the strategic inquiry to shape</br>the next decade of digital identity


…and My Monthly GitHub Patrons

Individual Patrons

github.com/sponsor/ChristopherA


Today’s Agenda

  1. Context: The ten-year question
  2. Lenses: 15 ways of seeing
  3. Working Circles: What they produce
  4. Activity: Breakouts and discussion
  5. Next Steps: Two kickoffs, one community

Goal: Find a lens that calls to you


Part 1

The Ten-Year Question


April 2016

I published ten principles for self-sovereign identity.

They were aspirational—a compass, not a map.


The Movement (2016–2021)

The principles caught fire.

  • Hundreds of articles and academic papers
  • Broad acceptance among technologists, policymakers, advocates
  • W3C working groups, government pilots, enterprise interest

A global community formed around
decentralized digital identity

The principles inspired people


Technical Success…

  • DIDs: W3C Recommendation ✓
  • Verifiable Credentials: Standard ✓
  • Government pilots: Dozens ✓

The architecture worked. The standards shipped.

But somewhere along the way…

The principles got lost


What Went Wrong

  • Focused on privacy instead of what privacy defends: resisting coercion
  • Followed the money. Death by 1000 compromises
  • did:web—“decentralized” in name only
  • Google & Apple and winning with more resources & centralized solutions
  • Governments focused on “Four Horsemen”
    (terror, pedophilia, drugs, money) while the real threat is autocracy

The Result

  • We hoped to reduce centralized power

  • But we became indistinguishable from the very systems we set out to disrupt

“If we can’t maintain semantic integrity of ’decentralized’ in our own community, how can we fight for it in the larger world?”

We may have increased centralized power


The Question

  • What did we get right?

  • What did we miss?

  • What must change for the next decade?


Why You’re Here

We need diverse expertise:

  • Technologists + Lawyers
  • Advocates + Academics
  • Policy experts + Lived experience

We are not building specs—
we are doing a strategic inquiry


Quick Introductions

Raise your Zoom hand to share:

  1. Name & affiliation (if any)
  2. One sentence: What brings you to this work?

~30 seconds each • I’ll go first to model

I’m Christopher Allen of Blockchain Commons.
I wrote the original ten principles in 2016.
I’m here because I believe we lost our way—
and this community can help us find it again.

Note:

If someone runs long: “Thank you—great context! Who’s next?”

After 10-12 intros: “We won’t get to everyone now, but you’ll introduce yourselves in your working circles. Let’s continue.” Note: end-speaker-notes


What We’ll Produce

Phase Output Timeline
1 Lens Briefs Dec–Jan
2 Drafts of Papers Feb–Apr
3 **Revised Principles**
(Exactly ten years
after the original)
April 26th, 2026
4 Papers and articles based
on the Revised Principles
May-Dec

Part 2

The 15 Lenses


What Are Lenses?

Each lens reveals something the others miss.

No single lens is complete.

Each working circle goes deep on one
while staying aware of the whole.


Four Categories

  1. Foundational Principles & Rights (4)
  2. Preventing Coercion (4)
  3. Relational & Contextual Identity (4)
  4. Compliance, Governance & Technical (3)

Category 1: Foundational Principles & Rights

What makes identity a right</br>rather than a privilege?

- **Irreducible Person** — Existence before encoding - **Anti-Property** — Identity cannot be owned or sold - **Right to Transact** — Digital participation as constitutional right - **Cryptographic Paradigms** — Assumptions that shape possibility

1. Irreducible Person

Core insight:

Existence isn’t earned or proven—it simply is.

Key question:

How do we protect dignity from being made measurable?

Example: Aadhaar biometric exclusion—existence conditioned on encoding


2. Anti-Property

Core insight:

Identity cannot be owned, bought, sold, or treated as property.

Key question:

How do we resist “data ownership” commodification?

“Owning your data” legitimizes markets that shouldn’t exist


3. Right to Transact

Core insight:

Digital participation is a constitutional right.

Key question:

How do we prevent exclusion by gatekeepers?

Operation Choke Point 2.0: Banks weaponized as censors


4. Cryptographic Paradigms

Core insight:

PKI assumptions constrained us for 36 years.

Key question:

What assumptions are we embedding now that will limit 2036?

What can’t we invent because current paradigms block it?


Category 2: Preventing Coercion

How do systems compel behavior—</br>and how do we resist?

- **Coercion Resistance** — Privacy defends against force - **Self-Coercion** — When control feels like your own idea - **Choice Architecture** — Small choices become structural traps - **Binding Commitments** — When constraint enables trust

5. Coercion Resistance

Core insight:

Privacy is the shield. Coercion resistance is the goal.

Four dimensions:

  • Interface (dark patterns)
  • Inference (profiling)
  • Structural (lock-in)
  • Psychological (self-censorship)

6. Self-Coercion

Core insight:

The most effective control feels like your own idea.

Key question:

How do we counter chilling effects?

You modify behavior based on imagined consequences—no rule needed


7. Choice Architecture

Core insight:

Small voluntary choices accumulate into structural dependency.

Key question:

How do we ensure real exit rights?

“The 18-year trap”: Credentials that won’t transfer


8. Binding Commitments

Core insight:

Not all lock-in is harmful. Voluntary constraint enables trust.

Key question:

When is commitment productive vs. exploitative?

Kenyan chamas: 200,000+ groups managing $1.7B through mutual stakes


Category 3: Relational & Contextual Identity

Identity exists in relationship:
to others, to context, to scale.

- **Relational Autonomy** — “I am because we are” - **Context Boundaries** — Keeping life spheres distinct - **Multi-Scalar Sovereignty** — Individual, community, nation - **Stewardship** — Caring for those who cannot consent

9. Relational Autonomy

Core insight:

“I am because we are” —Ubuntu philosophy

Key question:

How do we credential relationships, not just attributes?

Immigration systems separate families;
bonds are invisible


10. Context Boundaries

Core insight:

Your employer shouldn’t see therapy notes.

Key question:

How do we prevent correlation attacks?

Unlinkable identifiers keep life spheres cryptographically distinct


11. Multi-Scalar Sovereignty

Core insight:

Sovereignty operates at individual, community, AND national scales.

Key question:

How do we prevent re-centralization?

Technical distribution ≠ political distribution


12. Stewardship

Core insight:

When caring for others’ identity, are we empowering or exploiting?

Key question:

How do we protect those who can’t exit or refuse?

18 years of credential accumulation without child consent


Category 4: Compliance, Governance & Technical

How do our principles survive contact
with law, standards, and power?

- **Principles to Compliance** — Not everything can be measured - **Regulatory Frameworks** — Voluntary erodes to mandatory - **Principal Authority** — Restoring accountability to agents

13. Principles to Compliance

Core insight:

Not everything important can be measured.

Key question:

What must remain ethical commitment vs. technical test?

Treating all principles as measurable destroys the ones that matter most


14. Regulatory Frameworks

Core insight:

Legal “voluntary” erodes to practical “mandatory”

Key question:

How do we enable SSI without mandating it?

Utah model: Recognition without government monopoly


15. Principal Authority

Core insight:

Platforms violate every duty agents owe principals.

Key question:

How do we restore accountability?

Centuries of agency law—enforceable duties of care, loyalty, disclosure


Lens Connections

These aren’t silos.

  • Stewardship ↔ Relational Autonomy
  • Coercion Resistance threads through everything
  • Context Boundaries ↔ Multi-Scalar Sovereignty

Each brief acknowledges connections while going deep on one


These Are Starting Points

The lens briefs are early drafts—
provocations, not conclusions

  • New lenses may emerge from your work
  • We won’t tackle all equally, and that’s okay
  • Coverage will be organic, based on interest and expertise

Each working circle will take ownership
of where the lens goes next.


Part 3

What Working Circles Will Do


Working Circles

Size: 2-5 members (3–4 ideal)

Composition: Seek diversity
Technical + Policy + Advocacy + Academic

Commitment: 2–3 sessions × 90 minutes

Goal: Rough consensus on worthy insights, not standards, specs, or product designs

Ground your work in references or
lived experience, not speculation


The Lens Brief Template

1. **Territory / Focus** — Core insight, concrete grounding 2. **Relationship to Other Lenses** — Connections, distinctions 3. **Why This Matters for SSI** — Architectural gaps, design implications 4. **Harms, Risks, Questions** — What goes wrong when ignored 5. **Constructive Directions** — Strategic pathways forward 6. **2026 Principles** — Draft principle language 7. **Resources** — Foundational literature *1500–3000 words • Full template at revisitingssi.com*

Beyond the Lens Brief

Phase 2 (selective): Strong briefs may advance to:

  • Full academic paper
  • Policy brief
  • Principles synthesis

Credit: Substantial contribution = authorship


The Stakes

Your work informs principles published

April 26th, 2026

Exactly ten years after the original.

These will guide digital identity systems affecting billions of people.


Part 4

Workshop Activity


Small Group Warm-Up

Zoom will auto-assign you to rooms (3 people each)

In your breakout:

  1. Introduce yourselves briefly
  2. Each share:
    “If you had to focus on one lens just for today—no long-term commitment—which would you choose and why”?

~10 minutes


Share Your Interest

When you return:

  1. Type in chat: Your chosen lens for today
  2. I’ll call out lenses with 2+ people
  3. When yours is called, share your “why” (~30 sec)

Starting with the most popular


Lens Deep-Dive (time permitting)

Choose your room—named for each active lens

Your task:

  • Discuss:
    “What’s the biggest risk if this lens is ignored?”

  • Pick someone to report back

~10 minutes


Lens Reports

One person from each room:

  • Which lens?
  • What risk did you identify?

~30 seconds each


Where’s the Energy?

Based on what we heard:

  • Which lenses have momentum?
  • Who wants to continue working on these?
  • Any lenses we should combine or table for now?

This shapes our working circles going forward


Part 5

Next Steps


Two Kickoffs, One Community

Today: EU/US timezone-friendly

Next week: Asia/EU timezone-friendly

Working circles may form at either—or span both.

Cross-timezone? Work asynchronously or find overlapping hours


What’s Next

If your working circle has momentum:

  • Announce on GitHub Discussions
  • Seek diverse points-of-view
    (from workshop or invite from outside)
  • Schedule your first session

Still exploring?

  • Share interest on GitHub Discussions or Signal
  • Connect at next week’s Asia/EU kickoff

No pressure to commit to a circle today


How We Work

  • Licensing: All outputs CC-BY 4.0
    • Open for others to build on
  • Conduct: What’s shared here stays here
    • Don’t quote members without permission.
    • See also RevisitingSSI.com/conduct
  • Facilitation: I’m the initial host, facilitator,
    and academic referee
    • Want to help at this level? Let’s talk

Resources

GitHub Discussions — Cross-circle dialogue

Signal Group — Quick coordination

Citations Library — revisitingssi.com/library/citations/

Facilitator Office Hours — [TBD]


Key Dates

Milestone Date
Lens Briefs Due End of January
Mid-Point Check-in [TBD]
Phase 2 Kickoff [TBD]
Principles Publication April 26th, 2026

Closing

The original principles were written by one person in a moment of inspiration.

These revised principles will emerge from a community wrestling honestly with hard questions.

That’s you! Thank you!


Support This Work!

Your support enables my work as
host, facilitator, and academic steward:

  • Community infrastructure
  • Workshop & working circle facilitation
  • Research coordination & publication

Be an organizational patron of workshop: revisitingssi.com/sponsor/

…or individual sponsor (monthly via GitHub, like Patreon): github.com/sponsors/ChristopherA


Thank You!

Ten years of learning. A decade of impact ahead.

RevisitingSSI.com

Christopher Allen <ChristopherA@LifeWithAlacrity.com>

available for trust architecture, technical consultation, and policy review