Remove tags verifiable credentials
article thumbnail

Using X.509 Certs for DID Provenance

Phil Windley

509 certificate authorities who already perform identity proofing for businesses provides a rich resource that can be leveraged to boot the verifiable data ecosystem. For that, they need to take the issuer's decentralized identifier (DID) that they got from credential presentation and determine who it belongs to.

Data 69
article thumbnail

Verifying Twitter

Phil Windley

Summary: Elon has started a monthly $8 fee for verified twitter users. A verifiable credential-based solution would be a better way to increase trust in the platform by authenticating users as real people without attendent privacy concerns. You won't be surprised that my solution uses verifiable credentials.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Comparing X.509 Certificates with SSI

Phil Windley

509 certificates are more like verifiable credentials or DIDDocs. Rather SSI uses verifiable credentials to assert information about a decentralized identifier in a trustworthy way. For that, we use verifiable credentials. The proof also shows that these credentials have not been revoked.

Banking 137
article thumbnail

Zero Data

Phil Windley

Verifiable credentials (VCs) offer a way to represent information so that its authenticity can be verified through cryptographic means. They can be thought of as digital attestations or proofs that are created by an issuer about a subject and are presented by the holder to a verifier as required.

Data 65
article thumbnail

Better Onboarding with Verifiable Credentials

Phil Windley

Verify your phone number using SMS or WhatsApp (they recommend WhatsApp). As I was going though this, I couldn't help thinking how much easier it could be using verifiable credentials. Verify information about myself that they ask for using verifiable credentials. Solve the captcha. I chose 2FA. I chose SMS.

article thumbnail

Zero Trust with Zero Data

Phil Windley

Presenting your ID to buy beer is used so often as an example of how verifiable credentials work that it's cliche. Imagine that instead of using a credential (e.g., By using verifiable credentials to transfer attributes about their subject in a way that is decentralized and yet trustworthy.

Data 66
article thumbnail

Comparing X.509 Vertificates with SSI

Phil Windley

509 certificates are more like verifiable credentials or DIDDocs. Rather SSI uses verifiable credentials to assert information about a decentralized identifier in a trustworthy way. For that, we use verifiable credentials. The proof also shows that these credentials have not been revoked.

Banking 98