As a seasoned technologist, I'm driven by the pursuit of innovation in Cybersecurity, Authentication, and Encryption. I approach problems with a creative mindset and am passionate about innovation.
In terms of sovereignty, it refers to one's ability to maintain control of your data. When we refer to a credential, don't think of it as identity, it's easy to misinterpret it. They are mutually exclusive.
A credential can be anything like an education record or a script from a doctor.
To answer your concerns regarding the identity aspect of this, we now step into the world of verifiable credentials, where something like identity is verified by a 3rd party like a government.
In this instance, your digital identity (your public key) and your real identity are verified by the 3rd party. From this point, your digital identity has the same weight as your physical identity.
In terms of losing your key, in the blockchain space, recovery mechanisms are using the 12/24 word recovery phrases that are created when wallets are created. However, if there is a total loss, recreating your process and rebuilding your profile is also an option. That's not to say that it's hard-coupled to a specific public key.
The concept of the key and its recovery is not new, it is widely used within the blockchain space.
Something to remember is this solution creates convenience for the end user.
The use case for something like this would not be to replace your identity, but to provide proof of identity by leveraging verifiable credentials on one side, and for enterprises that are not utilizing your API, to access the original unverified data for their internal processes safely and securely without having the reliance on a centralized platform that could disappear at any time.
Leveraging the decentralized chains ensures that users have access to their data at any time and can provision it to anyone they choose.
Lastly, you mentioned the technical know-how. It's our job as engineers to make the technology simple. Before Windows there was DOS, before DOS there were punch cards. There is no straight line to simplicity, but it starts somewhere.
For further actions, you may consider blocking this person and/or reporting abuse
We're a place where coders share, stay up-to-date and grow their careers.
Thanks for your comment.
In terms of sovereignty, it refers to one's ability to maintain control of your data. When we refer to a credential, don't think of it as identity, it's easy to misinterpret it. They are mutually exclusive.
A credential can be anything like an education record or a script from a doctor.
To answer your concerns regarding the identity aspect of this, we now step into the world of verifiable credentials, where something like identity is verified by a 3rd party like a government.
In this instance, your digital identity (your public key) and your real identity are verified by the 3rd party. From this point, your digital identity has the same weight as your physical identity.
In terms of losing your key, in the blockchain space, recovery mechanisms are using the 12/24 word recovery phrases that are created when wallets are created. However, if there is a total loss, recreating your process and rebuilding your profile is also an option. That's not to say that it's hard-coupled to a specific public key.
The concept of the key and its recovery is not new, it is widely used within the blockchain space.
Something to remember is this solution creates convenience for the end user.
The use case for something like this would not be to replace your identity, but to provide proof of identity by leveraging verifiable credentials on one side, and for enterprises that are not utilizing your API, to access the original unverified data for their internal processes safely and securely without having the reliance on a centralized platform that could disappear at any time.
Leveraging the decentralized chains ensures that users have access to their data at any time and can provision it to anyone they choose.
Lastly, you mentioned the technical know-how. It's our job as engineers to make the technology simple. Before Windows there was DOS, before DOS there were punch cards. There is no straight line to simplicity, but it starts somewhere.