Difference between revisions of "Verifiable Credential"

From MgmtWiki
Jump to: navigation, search
(The Verifiable Credential is a Swiss Army knife)
(The Verifiable Credential is a Swiss Army knife)
Line 13: Line 13:
 
* The Swiss Army knife is not used to fix a car our build a house if there are purpose-built tools available.
 
* The Swiss Army knife is not used to fix a car our build a house if there are purpose-built tools available.
 
The [[Verifiable Credential]] spec was created to allow [[Verifiable Credential]]s to fill any identify function.
 
The [[Verifiable Credential]] spec was created to allow [[Verifiable Credential]]s to fill any identify function.
* It is enormously popular among hackers who want to be able to create quick-and-dirly soltuions.
+
* It is wildly popular among hackers who want to be able to create quick-and-dirly soltuions.
 
* It is not designed to architect or build industrial scale identifier solutions.
 
* It is not designed to architect or build industrial scale identifier solutions.
  

Revision as of 13:32, 14 May 2021

Full Title or Meme

The Verifiable Credentials Data Model 1.0 is a standard means fro create a collection of claims to move between trust domains or federations. But since is it a data model and not a data format or protocol, it cannot deliver on that goal.

Contest

  • The Verifiable Credential was the first of a series of proposed standards to enable Self-Sovereign Identity by enabling the packaging of user identity information that can be verified by the receiver.
  • The Verifiable Presentation is created in response to a request from a Verifier which is known here as a Relying Party.

Problems

The Verifiable Credential is a Swiss Army knife

The Swiss Army knife was designed for survival in the wild if it were the only tool available to you.

  • It was wildly popular and sold or copied throughout the world.
  • The Swiss Army knife is not used to fix a car our build a house if there are purpose-built tools available.

The Verifiable Credential spec was created to allow Verifiable Credentials to fill any identify function.

  • It is wildly popular among hackers who want to be able to create quick-and-dirly soltuions.
  • It is not designed to architect or build industrial scale identifier solutions.

Solutions

interoperability

  • This Evernym atricle seems to be saying both that it does not exist and it is right around the corner. (2020-12-21)

References

  • This was one of the highlights from XXXI Internet Identity workshop:(IIW) presentation by Timothy Ruff (https://lnkd.in/gXDRGMy).