Your Guide to Self Sovereign Identity

A comprehensive analysis of the technology, standards, projects, and companies that use blockchain for identity.

Buy Now


Digital identity is an infrastructure necessary to do most everything on the Internet. And while there have been many solutions through the years, It remains a problem.

Companies own the digital identities of the people that use their services. Centralized databases are a security risk for cyberattacks; not to mention the low integrity of stored data, and users have little to no control of how their data is secured.

Self-Sovereign Identity technologies give individuals and companies the ability to control and manage their own digital identifiers. This technology is gaining momentum as it solves previously unsolvable challenges. With the emergence SSI open standards, a new layer of the internet emerges for the identity of people and organizations. SSI represents a new paradigm -- it changes the identity game completely.


Buy Now



You are looking to invest in the space and want a comprehensive, unbiased overview.


You are trying to understand the technology and how you can use it. You want to sell a pilot project to your management team.


You want to understand how this technology applies to your industry and existing product strategy.


You want to understand and explore new capabilities enabled by SSI technology. You want to learn about existing government funded projects and research.


You program digital identity conference tracks and need to know the critical topics and experts.


You want an comprehensive introduction to the standards, DID specs, wallets and agents. And you want to know where you can dig into the technical details.

Authored by industry insiders for outsider understanding

Kaliya Young

Kaliya Young holds a Master of Science in Identity Management and Security. She co-Founded the Internet Identity Workshop, and the Personal Data Ecosystem Consortium. She facilitated ID2020 DesignShop, the Rebooting Web of Trust. She was elected in August 2012 to the National Strategy for Trusted Identities in Cyberspace (NSTIC) Identity Ecosystem Steering Committee, Management Council as the Consumer Advocate delegate and served there for three years. In 2012 she was named a Young Global Leader in 2012 by the World Economic Forum (WEF). She is an Independent Advocate for the Rights and Dignity of our Digital Selves.

Heather Vescent

Heather Vescent owns and operates The Purple Tornado, a foresight and strategic intelligence consultancy. Vescent has delivered research insights to governments and corporations in digital identity, military learning, payments, transactions, and new economic models. She is the writer/producer of 14 documentaries and short films about future technology. Her clients include US & UK governments, SWIFT, Disney, IEEE, mid-size companies and start-ups. Her research has been covered in the New York Times, CNN, American Banker, CNBC, Fox, and the Atlantic. She is an author of the Cyber Attack Survival Manual, published by Weldon-Owen. Her work has won multiple awards from the Association of Professional Futurists.