Remove tags verifiable claims
article thumbnail

Using X.509 Certs for DID Provenance

Phil Windley

509 certificate authorities who already perform identity proofing for businesses provides a rich resource that can be leveraged to boot the verifiable data ecosystem. The issuer creates a credential definition in the usual way that includes their DID and writes it to whatever Verifiable Data Registry their DID method dictates.

Data 69
article thumbnail

Zero Data

Phil Windley

Verifiable credentials (VCs) offer a way to represent information so that its authenticity can be verified through cryptographic means. They can be thought of as digital attestations or proofs that are created by an issuer about a subject and are presented by the holder to a verifier as required.

Data 65
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

BTS fan Twitter accounts say they’re being targeted by copyright trolls

The Verge

The owner of a fan account with over 233,000 followers, which posts videos, photos, and memes related to the South Korean band, claims that their original header and profile picture, as well as multiple tweets including their own screenshots and memes, have been taken down by the trolls over the past few weeks.

Backup 96
article thumbnail

A Defacto National ID from ID.me

Phil Windley

Summary: Last week, I reported ID.me’s claim that they were not doing 1:many facial recognition. ID.me’s original press release, since updated , claimed that the company didn’t use 1:many facial matching where the selfie or ID photo is compared to a database of pictures. is on the path to become one. backtracked. I vote for that.

Course 98
article thumbnail

Facebook will let people claim ownership of images and issue takedown requests

The Verge

In an update to its rights management platform, the company is starting to work with certain partners today to give them the power to claim ownership over images and then moderate where those images show up across the Facebook platform, including on Instagram. The system defaults ownership to whoever filed first.

Course 128
article thumbnail

4 Ways North Korea Is Targeting Security Researchers

SecureWorld News

Google's Threat Analysis Group (TAG) has been working for several months to try to identify who is behind an ongoing campaign targeting security researchers, specifically those who work on vulnerability research and development at a variety of organizations. Google's TAG team discovery: cyberattack motive.

article thumbnail

Fidelity, Provenance, and Trust

Phil Windley

Summary: In this post, I look at the words we use to describe verifiable credential exchange with an eye to being more specific about the part different components of the SSI stack play in providing trustworthy data exchange. Verifiable credentials contain claims about attributes. The SSI Stack (click to enlarge).

Banking 56