Example 8 uses the DID context URL for verification methods. While this is, technically, correct, it may come as a surprise for a reader of a Verifiable Credential Specification reader, who does not necessarily know about DID... The same thing happens elsewhere (like Example 7).
Maybe some general intro note should be added to the spec, making it clear that, though used in a VC setting, the vocabularies defined in the spec are also used by other specs like, for example, DID...
Example 8 uses the DID context URL for verification methods. While this is, technically, correct, it may come as a surprise for a reader of a Verifiable Credential Specification reader, who does not necessarily know about DID... The same thing happens elsewhere (like Example 7).
Maybe some general intro note should be added to the spec, making it clear that, though used in a VC setting, the vocabularies defined in the spec are also used by other specs like, for example, DID...