diff --git a/index.html b/index.html index c3adc46ae..362f8b51e 100644 --- a/index.html +++ b/index.html @@ -1070,7 +1070,7 @@

Getting Started

the `credentialSubject` object expresses a particular attribute of the credential subject. Once a developer has added a number of these property-value combinations, the modified object can be sent to verifiable credential -issuer sofware and a verifiable credential will be created for the +issuer software and a verifiable credential will be created for the developer. From a prototyping standpoint, that is all a developer needs to do.

@@ -2325,7 +2325,7 @@

Presentations Including Holder Claims

}, { ... } }], - "proof": [{ ... }] + "proof": [{ ... }] }

@@ -2354,7 +2354,7 @@

Presentations Including Holder Claims

}, { ... } }], - "proof": [{ ... }] + "proof": [{ ... }] } @@ -2956,6 +2956,7 @@

Integrity of Related Resources

Candidates for this mechanism include `digestSRI` and `digestMultibase`. There are arguments for and against unification that the WG is currently debating.

+

There MUST NOT be more than one object in the relatedResource per id.

@@ -3029,9 +3030,7 @@

Integrity of Related Resources

}, ... } - - -

+
@@ -5204,7 +5203,7 @@

Man-in-the-Middle (MITM) Attack

A verifier might need to ensure it is the intended recipient of a verifiable presentation and not the target of a man-in-the-middle attack. -Some securing mechanisms, +Some securing mechanisms, like [[VC-JOSE-COSE]] or [[VC-DATA-INTEGRITY]], provide an option to specify the intended audience or domain of a presentation, which can help reduce this risk. @@ -5322,7 +5321,7 @@

Device Theft and Impersonation

for their actions or transactions, thereby reinforcing accountability and deterring malicious behaviors. The attainment of non-repudiation is a multifaceted endeavor, encompassing an array of techniques ranging from -securing mechanisms, proofs of possession, +securing mechanisms, proofs of possession, and authentication schemes in a variety of protocols designed to foster trust and reliability.

diff --git a/privacy.html b/privacy.html index e50a04933..b04831969 100644 --- a/privacy.html +++ b/privacy.html @@ -153,7 +153,7 @@

Does this specification introduce new state for an origin that persists acro

Does this specification expose persistent, cross-origin state to the web?

-Yes. Verifiable Claims contain a random though potentially persistent identifier of the subject. This is passed between the issuer and the inspector. Consequently collusion between them could identify the subject to the inspector, even though the Verifiable Claim itself does not. This is because in many cases the issuer will know the complete identity of the subject, even if the Verifiable Claim only contains a small proportion of it (such as age). +Yes. Verifiable Claims contain a random though potentially persistent identifier (PId) of the subject. This is passed between the issuer and the inspector. Consequently collusion between them could identify the subject to the inspector, even though the Verifiable Claim itself does not. This is because in many cases the issuer will know the complete identity of the subject, even if the Verifiable Claim only contains a small proportion of it (such as age).

Recommendation: The subject should limit the distribution of Verifiable Claims containing the same PId to a minimal number of origins. The subject should obtain Verifiable Claims with different PId to send to different origins wherever possible. @@ -260,7 +260,7 @@

How should this specification work in the context of a user agent’s "incog

Does this specification persist data to a user’s local device?

-The overall life cycle of Verifiable Claims envisages that they are stored persistently on the user’s local device or on a remote device under the user’s control. However, Verifiable Claims on their own, if captured by a hostile entity, should not be of any value to it, except in so far as the Verifiable Claim may potentially reveal a small amount of Personally Identifiable Information (PII). about the subject. +The overall life cycle of Verifiable Claims envisages that they are stored persistently on the user’s local device or on a remote device under the user’s control. However, Verifiable Claims on their own, if captured by a hostile entity, should not be of any value to it, except in so far as the Verifiable Claim may potentially reveal a small amount of Personally Identifiable Information (PII) about the subject.

Recommendation: Verifiable Claims should be encrypted during storage to prevent them being stolen by an attacker