-
The AS as an agent of the Resource Subject where there are the strongest possible constraints (technical if possible) on anyone but them (or the Grantor) seeing their policies and the RS cannot know w…
-
### Prize Title
[Intermediate/Advanced Bounty] Enable interactive signing of arbitrary data
### Difficulty
Intermediate
### Prize Bounty
USD 2,000
### Challenge Description
- Implement…
-
As the wallet is currently implemented, each user has a single public-private key pair which is used for all of the user's credentials. At some point we will need to satisfy stricter privacy requireme…
emlun updated
2 months ago
-
Una credencial verificable contiene al menos la información que se encuentra en una credencial física (Diploma, Documento o Certificado); pero haciendo uso de las firmas digitales, permite que puedan …
-
This issue contains the Verifiable Credentials Working Group's internationalization self-review of Controller Documents v1.0, which are a generalization of DID Documents and some content from VC Data …
-
I'm [exploring how to structure a Credentials API](https://github.com/w3c-ccg/credential-handler-api/issues/2) for the [Credentials Community Group](https://w3c-ccg.github.io/) using lessons learned f…
-
Please edit and create a PR from the IDCC team with some iteration on the following:
##
## Background
Shang-Chi is the Manager of a Hong Kong social enterprise - EldHealth focusing on elderly ph…
-
DID and VC are increasingly being adopted by real scaled use cases, something that should be better reflected in Chapter 4-1. @Identitywoman would be a good person to do some of this, but I'd also lo…
-
The eIDAS regulation has the following text:
Article 5a, 5., (a), viii
'European Digital Identity Wallets shall, in particular (…) support common protocols and interfaces (…) for relying parties to…
-
Proposed base set of fields for any concept:
![conceptbasemeta](https://user-images.githubusercontent.com/5365465/112857081-c6ddca80-90b0-11eb-91a0-488a92157a4a.png)