-
**Is your feature request related to a problem? Please describe.**
DeX ranks low on SEO. To improve our existance on Google we need other public websites to link to dex.software. We need help with th…
-
### Description
A user will be presented with a request from a relying party for access to some attributes managed by the digital wallet. The relying party should have already registered (with the …
-
Hello,
First, I would like to say I really appreciate all the hard work you’ve put into developing this App!
With the recent implementation of the Digital Markets Act in the European Union, it’…
ghost updated
4 months ago
-
# Bug report
## Description
On .msi download, chrome consider the helper as a suspicious software and displays a warning.
## Steps to reproduce
- download the helper in chrome
- go to the Dow…
-
This scenario includes a notary examining 3 artifacts provided by a software vendor for registration into a SCITT registry where consumers can verify that these artifacts, and their digital signature …
-
DID and VC are increasingly being adopted by real scaled use cases, something that should be better reflected in Chapter 4-1. @Identitywoman would be a good person to do some of this, but I'd also lo…
-
Branched out from #52
As introduced by securitytxt/security-txt#140, the `Signature:` directive is being replaced with inline signatures:
> It is RECOMMENDED that a security.txt file be dig…
-
### Describe your problem:
The old version of the application 0.4.0 is available in the Microsoft Store.
### Solution you'd like to see:
Please make the latest version of the app available fo…
-
More speficially, https://www.w3.org/TR/did-use-cases/#uc ...
![image](https://github.com/user-attachments/assets/c47d9cb0-d5e7-4173-bb7c-40b5c8004fa6)
-
Medium+ Vulnerabilities and their info
Description of high vulnerability:
CVSS score of 7.5
The remote host supports the use of SSL ciphers that offer medium strength encryption. Ness…