Remove tags credentials
article thumbnail

Using X.509 Certs for DID Provenance

Phil Windley

When you used a verifiable credential to prove something about yourself, the verifier can know cryptographically: (1) the identifiers for the issuer, (2) the credential hasn't been tampered with, (3) the credential was issued to you, and (4) the credential hasn't been revoked. Summary: The abundance of X.509

Data 69
article thumbnail

Verifying Twitter

Phil Windley

A verifiable credential-based solution would be a better way to increase trust in the platform by authenticating users as real people without attendent privacy concerns. You won't be surprised that my solution uses verifiable credentials. These credential issuers could charge whatever the market would bear.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Comparing X.509 Certificates with SSI

Phil Windley

509 certificates are more like verifiable credentials or DIDDocs. Rather SSI uses verifiable credentials to assert information about a decentralized identifier in a trustworthy way. For that, we use verifiable credentials. Alice proves her name and date of birth using a verifiable credential representing her driver's license.

Banking 137
article thumbnail

Better Onboarding with Verifiable Credentials

Phil Windley

As I was going though this, I couldn't help thinking how much easier it could be using verifiable credentials. Verify information about myself that they ask for using verifiable credentials. Credentials asserting your verified email and phone number would be easy enough to get if I don't already have them. Enter an email.

article thumbnail

Zero Trust with Zero Data

Phil Windley

Presenting your ID to buy beer is used so often as an example of how verifiable credentials work that it's cliche. Imagine that instead of using a credential (e.g., By using verifiable credentials to transfer attributes about their subject in a way that is decentralized and yet trustworthy.

Data 66
article thumbnail

Zero Data

Phil Windley

Verifiable credentials (VCs) offer a way to represent information so that its authenticity can be verified through cryptographic means. Credential Chaining: Multiple credentials can be linked together, enabling more complex proofs and interactions.

Data 65
article thumbnail

Using Sovrin for Age Verification

Phil Windley

SSI doesn't have accounts, it has relationships and credentials. Some of those will be self asserted and some you might require credentials depending on your use case. The second thing is determining which credentials you want to require. Tags: sovrin sovrin+use+cases. First, there's no such thing as a "Sovrin account".