Category

General
Link secrets play an important role in enabling more trusted interactions with verifiable credentials. They give verifiers the ability to know that a credential was truly issued to the individual presenting it, and they enable individual holders to combine different credentials into powerful compound proofs. In this post, I’ll break down what link secrets are,...
Read More
One of the most powerful uses for digital credentials is the exchange of data between departments or even entirely separate organizations. A job candidate should be able to prove education and employment. A customer should be able to prove membership in a loyalty program and the receipt of past transactions. A patient should be able...
Read More
How Pravici is using verifiable credentials and Evernym to give customers control over their personal data.
Read More
The following was published as the conclusion to our series, The Seven Deadly Sins of Digital Customer Relationships. This chapter can be read as a great summary; however, if you’d like to dive deeper into any of the individual ‘sins,’ you can find the entire series here. A CODA So that’s it. Seven sins. And...
Read More
The following was published as Chapter 7 of our series, The Seven Deadly Sins of Digital Customer Relationships. This chapter can be read by itself as a great introduction to the benefits of sourcing data directly from the customer. However, if you’d like to start from the beginning, you can find the entire series here....
Read More
1 2 3 11
X

What role do Decentralized Identifiers (DIDs) play in the future of the Web?
Join us for our November 3rd webinar to find out - RSVP