Discussion about this post

User's avatar
Neil Thomson's avatar

Of course, this workflow would also benefit from more secure comms/protocols such as DIDComm or ToIPs proposed Trust Spanning Protocol

Expand full comment
Phillip D. Long's avatar

Phil - it's presentations like the one you've just summarized from Drummond's talk at the latest IIW that drive home how important this gathering of people is to the SSI/VC community.

I have two questions, both possibly representing miss-interpretations of what's being said. The first is shouldn't the direction of the arrow in the graphic "Using X.509 Certificates to establish the owner of a DID" listed as #7 Reads be from the Credential Verifier to the Verifiable Data Registry? The Credential Verifier is reading the vetting information provided by the link in the credential to the DIDdoc where that information is stored in the Verifiable Credential Registry.

Second Step 8. Retrieves Certificate seems to be a call back to the issuer (your Attestor Org). Isn't that one of the fundamental design principles the decentralized architecture of VCs intentionally eliminates the necessity for? If that's a necessary step, a core value proposition, namely the ability to still verify an issuer who has 'gone away' (business folded, college closed, etc.) should still be possible as long as the public key of that now defunct issuer has been preserved and past on to some public third-party (such as a verifiable issuer registry or other persistent publicly accessible endpoint.

Cheers.

Expand full comment
2 more comments...

No posts