If you've got a sensor that isn't within easy range of wifi, then LoraWAN is a good solution. And event-based rules in picos are a convenient way to…
Exploring the architectural patterns we can use with policy-based access control (PBAC) illustrates the difference between policy-based and…
If you enjoy listening more than reading, these two podcasts may be just the thing to get you up to speed on learning digital identity. I was recently…

February 2023

I've had a busy month. Something had to drop and it was regular updates here. Hopefully I’m back to a more regular schedule now. Technological change is…
4

January 2023

SSI wallets will embody people in the digital world and give them a place to stand as a peer to others online. But online services will still have…
Summary: The following is an excerpt from my upcoming book, Learning Digital Identity, which will be available January 2023. The family therapist…
Summary: Making onboarding easier would result in better customer experience, more customers, and reduced support costs. Last week a friend referred me…

December 2022

Summary: This post is adapted from my forthcoming book, Learning Digital Identity, from O'Reilly Media. Our physical wallets are, historically, for…

November 2022

Summary: Verifiable credentials have a number of use cases in healthcare. Using them can reduce the administrative burden that people experience at the…
Summary: Elon has started a monthly $8 fee for verified twitter users. A verifiable credential-based solution would be a better way to increase trust in…
Summary: This post is an excerpt from my upcoming book, Learning Digital Identity, which will be available January 2023. Cogito, ergo sum. —René…

October 2022

Summary: Verifiable credentials have transport options other than DIDComm. In this post, I explore the OpenID4VC specification which allows credentials…