Closed gitaaron closed 2 years ago
A list of user stories and non-functional requirements we are trying to achieve in securing FULA.
Example /
Alice and Bob are using the same BOX.
Alice wants to share her decentralized identity with Bob.
Question - why is Alice sharing her identity with Bob? Is this onboarding Bob or does Bob already have an account and she just wants to share an image with him.
A list of user stories and non-functional requirements we are trying to achieve in securing FULA.
Example /