-
I wonder if there is a mistake somewhere in the tool chain or in the modelling of Verifiable Claims.
Using the process described in [issue 1 of Jen3](https://github.com/william-vw/jen3/issues/1) I to…
-
Given:
```
Pd : Price of the Product
h(d): Hash ( SHA3/keccak256 ) of the Product
ID : Contract Nonce or hashIdentifier for that particular agreement
enc: encrypt
[B/S]pub: Buyer/Seller public k…
-
**Note from the teaching team:** This bug was reported during the _Part II (Evaluating Documents)_ stage of the PE. **You may reject this bug if it is not related to the quality of documentation.**
Th…
-
Could you add a few lines to the Readme documentation about the architecture roadmap?
Specifically, if the RISC-V target is on the roadmap.
Separately, perhaps here, could you comment on whether t…
-
**Describe the issue**:
- Using `dask[distributed]==2022.2.0`, this same code runs in 23 seconds for a `0.8 GB` DataFrame.
- Using `dask[distributed]==2024.8.0`, this same code **times out** for…
-
Hi 👋
First of all, we are basing most of our OIDC4VC work at Gaia-X on your libraries and our experience with them is really great 👍
As the [Verifiable Credential Data Model v2.0 specification…
-
-
-
Following the research on the verifiable presentation, implement the support for presentation definitions, similar to the credential definition
-
Your FAQ claims
> **Do you provide deterministic builds?** Since we need to distribute the app via the App Store that is not possible. The source is however available on our Github so that anyone c…