Category

General
We’d like to congratulate our friends at cheqd on launching a production token-enabled network for verifiable identity that supports W3C standards for decentralized identifiers and verifiable credentials! The cheqd network allows for the exchange of identity credentials in a decentralized and self-sovereign manner. This puts individuals in control of their digital information, with the ability...
Read More
Link secrets play an important role in enabling more trusted interactions with verifiable credentials. They give verifiers the ability to know that a credential was truly issued to the individual presenting it, and they enable individual holders to combine different credentials into powerful compound proofs. In this post, I’ll break down what link secrets are,...
Read More
One of the most powerful uses for digital credentials is the exchange of data between departments or even entirely separate organizations. A job candidate should be able to prove education and employment. A customer should be able to prove membership in a loyalty program and the receipt of past transactions. A patient should be able...
Read More
How Pravici is using verifiable credentials and Evernym to give customers control over their personal data.
Read More
The following was published as the conclusion to our series, The Seven Deadly Sins of Digital Customer Relationships. This chapter can be read as a great summary; however, if you’d like to dive deeper into any of the individual ‘sins,’ you can find the entire series here. A CODA So that’s it. Seven sins. And...
Read More
1 2 3 11