Difference between revisions of "Verifiable Credential"
From MgmtWiki
(→The Verifiable Credential is a Swiss Army knife) |
(→The Verifiable Credential is a Swiss Army knife) |
||
Line 13: | Line 13: | ||
* The Swiss Army knife is not used to fix a car our build a house if there are purpose-built tools available. | * The Swiss Army knife is not used to fix a car our build a house if there are purpose-built tools available. | ||
The [[Verifiable Credential]] spec was created to allow [[Verifiable Credential]]s to fill any identify function. | The [[Verifiable Credential]] spec was created to allow [[Verifiable Credential]]s to fill any identify function. | ||
− | * It is | + | * It is wildly popular among hackers who want to be able to create quick-and-dirly soltuions. |
* It is not designed to architect or build industrial scale identifier solutions. | * It is not designed to architect or build industrial scale identifier solutions. | ||
Revision as of 12:32, 14 May 2021
Contents
Full Title or Meme
The Verifiable Credentials Data Model 1.0 is a standard means fro create a collection of claims to move between trust domains or federations. But since is it a data model and not a data format or protocol, it cannot deliver on that goal.
Contest
- The Verifiable Credential was the first of a series of proposed standards to enable Self-Sovereign Identity by enabling the packaging of user identity information that can be verified by the receiver.
- The Verifiable Presentation is created in response to a request from a Verifier which is known here as a Relying Party.
Problems
The Verifiable Credential is a Swiss Army knife
The Swiss Army knife was designed for survival in the wild if it were the only tool available to you.
- It was wildly popular and sold or copied throughout the world.
- The Swiss Army knife is not used to fix a car our build a house if there are purpose-built tools available.
The Verifiable Credential spec was created to allow Verifiable Credentials to fill any identify function.
- It is wildly popular among hackers who want to be able to create quick-and-dirly soltuions.
- It is not designed to architect or build industrial scale identifier solutions.
Solutions
interoperability
- This Evernym atricle seems to be saying both that it does not exist and it is right around the corner. (2020-12-21)
References
- This was one of the highlights from XXXI Internet Identity workshop:(IIW) presentation by Timothy Ruff (https://lnkd.in/gXDRGMy).