Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add confidence method to VCDM #1054
Add confidence method to VCDM #1054
Changes from 6 commits
c08f81a
5884ecc
d353ed8
fc0cd1f
87fb326
2b84c20
1d83150
59684a4
8450b27
825d128
61381c1
9e61926
1f6c3d3
f3f6c47
872d1bd
463b8da
2632d7d
e00e02f
7275ae8
23e5108
61893d4
5e880f1
0f12cca
413b14f
ee326d8
6107513
6fe6b4a
12ea07e
20fe60a
90a7455
fd065af
8821578
73c85e4
65948b1
b691737
0dfdc32
f4435ba
7e06b5c
9fb3918
372bbe8
659053b
55a2568
85bce72
7aa4ec9
c139a8e
6a7c4fd
a84f866
1119501
05b4034
File filter
Filter by extension
Conversations
Jump to
There are no files selected for viewing
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
A DID isn't necessary if you're using Data Integrity, since that specification defines how authentication methods can be fetched using a protocol scheme: https://w3c.github.io/vc-data-integrity/#retrieve-verification-method ... that approach works for both
publicKeyJwk
andpublicKeyMultibase
.There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I like the examples, however I wonder if it is best to include a confirmation method example that does not include key proofs, e.g. a portrait picture or the id number of a passport document, as we have described it in our RWOT#11 paper on identifier bindings. This might help readers understand the concept and open their mind
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think this is further evidence that we're talking about something more broad than "confirmation methods", i.e., "assurance" of some kind. It seems that a "confirmation method" could be one such example of an assurance method -- if we even want to use "confirmation" language at all. But "confirmation method" seems to describe something very specific when used in other places in the ecosystem (e.g., confirmation of the possession of key material -- which, btw, it doesn't even actually confirm).
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
IMO, portrait picture generally makes sense. For example in the ICAO DTC use case, where a traveller registers their DTC before travelling. The DTC might include a confirmation method with a biometric template, e.g., picture. When crossing the border, the automated border control system could then check whether a traveller with that biometric template was registered and let them through.