Adam Larter

Break the Chain: Decentralized solutions for today’s Web2.0 privacy problems

The best way to prevent a data breach is to never store PII. This talk introduces the decentralized stack that makes this a practical reality.

Break the Chain: Decentralized solutions for today’s Web2.0 privacy problems
#1about 2 minutes

The developer's responsibility as a custodian of user data

Centralized Web2.0 architectures create data honeypots that lead to frequent and costly breaches, highlighting the developer's role in protecting user information.

#2about 3 minutes

Rethinking data ownership beyond centralized systems and blockchain

Users should own their data, and while blockchain is a decentralized technology, it is not suitable for storing private, personally identifiable information.

#3about 2 minutes

Understanding the financial and compliance risks of data breaches

Data breaches result in significant financial costs, reputational damage, and steep fines under regulations like GDPR.

#4about 1 minute

Shifting from centralized databases to personal data stores

The proposed architectural shift moves user data from a central server to a personal data store where applications "log into the user" with consent.

#5about 4 minutes

Introducing Decentralized Identifiers and Verifiable Credentials

Decentralized Identifiers (DIDs) provide a unique identity, while Verifiable Credentials (VCs) are cryptographically secure, tamper-evident claims about that identity.

#6about 2 minutes

How to present and query verifiable data securely

Verifiable Presentations (VPs) are used to share selected data from VCs, and Presentation Exchange (PEX) provides a standard query language for requesting it.

#7about 5 minutes

Bridging Web2.0 and Web3 with OpenID Connect standards

OpenID Connect extensions for Verifiable Credential Issuance and Verifiable Presentations allow existing identity protocols to work with decentralized data.

#8about 6 minutes

An overview of the Affinity decentralized identity platform

The Affinity platform provides tools like the Affinity Vault for personal data storage, Affinity Login for authentication, and Affinity Elements as a control plane.

#9about 3 minutes

Announcing the Affinity IOTA framework for developers

The IOTA framework is an end-to-end orchestration layer that simplifies decentralized data access by moving queries to the user's front-end data store.

#10about 1 minute

Implementing the IOTA framework with a simple SDK

Developers can integrate decentralized data requests into their applications with just a few lines of code using the Affinity SDK.

#11about 1 minute

Building an Internet of Trust with a new architecture

The Affinity Trust Network provides the tools to build applications where the user controls the consent boundary, with future plans for open-sourcing components.

Related jobs
Jobs that call for the skills explored in this talk.

Featured Partners

Related Articles

View all articles
DC
Daniel Cranney
The Overflow: Security and Privacy
Every week we dig through hundreds of links from all over the web, and it’s often hard for developers keep up. So, we thought we’d put together some links we couldn’t fit in the Dev Digest in what we call The Overflow. This week, we’re looking at wha...
The Overflow: Security and Privacy
DC
Daniel Cranney
Why Attend a Developer Event?
Modern software engineering moves too fast for documentation alone. Attending a world-class event is about shifting from tactical execution to strategic leadership. Skill Diversification: Break out of your specific tech stack to see how the industry...
Why Attend a Developer Event?
CH
Chris Heilmann
With AIs wide open - WeAreDevelopers at All Things Open 2025
Last week our VP of Developer Relations, Chris Heilmann, flew to Raleigh, North Carolina to present at All Things Open . An excellent event he had spoken at a few times in the past and this being the “Lucky 13” edition, he didn’t hesitate to come and...
With AIs wide open - WeAreDevelopers at All Things Open 2025

From learning to earning

Jobs that call for the skills explored in this talk.