-
@aquabu or others -- are there docs in GDrive that we want to add to this repo?
-
DID and VC are increasingly being adopted by real scaled use cases, something that should be better reflected in Chapter 4-1. @Identitywoman would be a good person to do some of this, but I'd also lo…
-
-
The integrity of our identity verification application is one of our highest priorities. Therefore, our bug bounty program for the [Gitcoin Passport](https://passport.gitcoin.co/) rewards up to **$600…
-
As a thought experiment, I'll attempt to fill out this schema as if I were a character in a complex, futuristic world. Keep in mind that this is a highly subjective and creative interpretation, and t…
-
I'm sorry to post so many concepts in 1 issue.
There are a lot of existing IETF WGs that have a part of this picture, and I wanted to paint how I see them being related.
```mermaid
flowchart
…
-
### Abstract
Learner ownership of digitally verifiable and shareable assertions of attainment -- credentials -- is aligned with goals of learner-centricity and open platforms. The Open edX platform …
-
# International Supply Chain Showcase
# Author(s)
@markymark-26
# Description
The Baseline Protocol combines zero knowledge cryptography, self-sovereign identity, and ccsm's to enable zero …
-
There is [FEP-C390](https://codeberg.org/fediverse/fep/src/commit/bce8b4f98e6a387e1c245f98eb666c5126f00226/feps/fep-c390.md) that describes identity proofs based on DIDs that are linked to actors, pra…
-
`This feature was created by the network service committee to ensure that the scope is planned for 24.08.`
**Description:**
The purpose of this ticket is to conceptualize and evaluate the necessary m…