February 14, 2020
In a previous post, I described how verifiable credentials differ in their approach to privacy: Correlating credentials correlate their holder to a disclosed identifier, and a disclosed signature, that’s the same in every use of a given credential. Other attributes are often identical as well, but these two perfect correlators are guaranteed to be present...
Read More