"We can't have broad adoption of verifiable credentials until we find a way to scale their presentation by providing tooling that credential verifiers can use to reduce their risk and gain confidence in the facts presented to them." This summary captures the essence of the article but not the depth of it. Phil Windley explores the mechanisms of both trust (which involves risk) and confidence (which doesn't) and traces the genesis of the latter in acceptance networks. We have such a system for financial transactions, but identity systems aren't there yet. "We have identity providers (IdPs) like Google and Apple who control a closed ecosystem of relying parties (with a lot of overlap)... Fixing this requires the equivalent of an acceptance network for digital identity." This article looks at what's required, the principles that make it possible, and centralized and decentraized models.
Today: 0 Total: 944 [Share]
] [