The Self-Sovereign Internet
Phil Windley
JUNE 14, 2021
If you're not up to speed with DIDComm and how it creates a secure overlay network on TCP/IP, you should be. Alice) who, by virtue of knowing the authentication factors (e.g. Alice uses her private key to sign statements that authenticate herself and authorize use of the identifier. claim it by logging in). Generativity.
Let's personalize your content