Open Vishwas1 opened 3 years ago
In earlier identity protocols, we have only ever been able to express statements like “according to identity provider X, my identifier is Y”, but never truly “I am me”.
You will notice that the architecture diagrams in the DID Auth paper only show two participants (identity owner and relying party), whereas diagrams of earlier identity protocols typically contained three participants (identity provider, relying party, user). This is a fundamental shift.