-
With the anticipated arrival of Post-Quantum Cryptography (PQC) requiring massive amounts of _binary_ data, CBOR will prove to be a better choice than JSON.
See also: https://github.com/eu-digital-…
-
Hello,
I believe that in the journey described in annex-01-initialisation-and-activation.pdf, the PID provider should be validated according to the Trusted List by the EUDI Wallet. In [this attache…
-
Since the EUDI Wallet instance may have different level of security depending on its own hardware and/or software capabilities, here the proposal: define a claim name for exposing different level of s…
-
https://www.w3.org/TR/vc-jose-cose/
https://www.w3.org/news/2024/w3c-invites-implementations-of-securing-verifiable-credentials-using-jose-and-cose/
-
Don't we still want to introduce the term Wallet Trust Evidence?
_Originally posted by @grausof in https://github.com/italia/eudi-wallet-it-docs/pull/220#discussion_r1512336689_
-
The revocation flow could be triggered by:
1. Legal Authority or law enforcement
2. Wallet Provider (if it enables this feature)
3. Authentic Source
The current version specify only the protoc…
-
### Description
Is EUDI going to have deep System integration? I don't see any other way of implementing it.
So EUDI must be integrated directly into the Apple Wallet for example so that the Entrys …
iMonZ updated
3 months ago
-
The German [Architecture Proposal Version 2](https://gitlab.opencode.de/bmi/eudi-wallet/eidas-2.0-architekturkonzept/-/blob/main/architecture-proposal.md?ref_type=heads) (from 2024-03-21) lists severa…
-
In https://github.com/eu-digital-identity-wallet/eudi-doc-architecture-and-reference-framework/blob/main/docs/annexes/annex-2/annex-2-high-level-requirements.md, ISSU_34, we read
```
PID Providers…
-
### Description
**Name:** Heather Dahl, Ken Ebert, Indicio
**ARF Chapter:** 6.1.3 Assumptions on trust
_"“In some cases, there is a risk that a valid party in the EUDI Wallet ecosystem tries to p…