Comment on page
Here are some frequently asked questions.
- Decentralized Identifiers (DIDs) - These are like aliases for our existing addresses (Ethereum address, email address, website, Bitcoin address, etc.) that make it easy to prove ownership and control over other identifiers.
- DID Method - There a number of different ways to create DIDs (over 100 in fact!) but because different types of identifiers (like Ethereum addresses or Bitcoin addresses) work slightly differently and are rooted in different system we need a set of rules about how to create and interact with DIDs made out of the different identifiers. A DID Method is simply those rules!
- DID Document (DDO) - DIDs need DID Documents. A DID Document is a file that lists the current state of the DID as well as other public keys and endpoints for how to interact with that DID. The DID Document is where the magic of DIDs really happens!
- DID Communication Protocol (DIDComm) - This is a protocol that allows two DIDs to open a secure channel between them and send messages back and forth.
- Verifiable credentials are specially formatted data that you can put on your Disco profile. Think of them like a digital version of your membership cards, IDs, library cards, or any other important document that you get from some other authority.
- Signed: In most cases, A verifiable credential is cryptographically signed by one DID about another DID and because the credential is signed it means nobody can tamper with the credential.
- Also Known As: Verifiable Credentials are the official name of the technical standard for this type of data but you might hear them referred to as Attestations, Claims, or even Badges.
- Encrypted: A VC can be encrypted using the subject’s DID so that only the subject and the issuer know what is in the credential.
- Credentials need to be stored somewhere! Because putting personal information on a blockchain ranges from suboptimal to dangerous (for a number of reasons), the credential needs to be stored somewhere else. Disco currently uses the Ceramic network for storage but will be integrating many different storage solutions over time.
- Your data is yours! It’s the whole point of Disco. If you have a Verifiable Credential on your Disco profile, you can take your Verifiable Credentials along with you to unlock access in other apps and spaces. Because your VC is signed, encrypted and tamper-evident, you can safely for move it across storage solutions and environments without damaging its integrity.
- Disco is here to enhance your privacy. By default, a credential that you receive is encrypted so that only you can see it. You can decrypt this credential and add it to your Disco profile so that the whole world can see it but then if you change your mind, you can re-encrypt the credential so that it is no longer on your profile. Just remember, once you make a credential public anyone can copy the data to an archive, that’s just the nature of the internet.
- Sometimes referred to as the “Credential Holder”. The subject is the person or entity that a Verifiable Credential is written about. For instance, you are the subject of your Passport and your home country is the issuer.
- A Relying Party is an individual or organization who relies upon data presented in a Verifiable Credential to inform app logic, unlock access to certain privileges, or other form of access enabled by data verification.
- A schema is a template for a Verifiable Credential. For example, driver’s licenses, passports, or diplomas all contain similar data organized in similar ways. This allows relying parties to interpret them easily no matter who the issuer. Schemas allow us to do the same thing for Verifiable Credentials.
- You can create self-attested credentials by going to your profile, then clicking
Issue Self-Attested Credential.