The Indicio Blog

DIGITAL IDENTITY NEWS, INSIGHTS, & RESOURCES

How to Avoid Hacks like the MGM Grand

How to Avoid Hacks like the MGM Grand

Phishing attacks are all too common, and as a few casinos in Las Vegas are finding out, incredibly costly. As we continue to interact online, the only way to really stop these attacks is to have cryptographic confidence in who you are speaking with.By Sam Curren The...

read more
The Future is Passwordless

The Future is Passwordless

Passwords have been our main key to gain access to products and services for years. But as other options come onto the market, it is worth exploring what they can offer and why you might want to switch.By Tim Spring Passwords have been around for a long time, so long...

read more
Handling High Volume Verification with SocketDock

Handling High Volume Verification with SocketDock

Indicio’s new open-source tool enables websockets to quickly manage large scale mediation without dropping messagesBy Colton Watkins Imagine the following  scenario. It’s a Friday morning, the first day of a convention that only comes around once a year, and you’re...

read more
Indicio Launches Proven Mediator on Google Cloud

Indicio Launches Proven Mediator on Google Cloud

Indicio’s new Google Marketplace product enables mobile devices to communicate with credential issuers and verifiers in decentralized identity solutions that are built using DIDComm. Reliable mediation is critical to building a successful Trusted Digital Ecosystem...

read more
Why a Ledger?

Why a Ledger?

In a previous article we discussed what exactly a ledger does. In this article we will seek to understand why you would want to use one, and what your options are.By Sam Curren For a brief recap, the ledger offers four important elements when building a decentralized...

read more
How do you get started with verifiable credentials?

How do you get started with verifiable credentials?

Adopting new technologies can be a daunting task, tying up resources and taking much longer than planned. Better the broken system you know than the new system breaking in ways you never anticipated! Verifiable credential technology was designed to minimize all these...

read more

Category

Search the Indicio Blog

Recent Posts

Archives

Sign Up for Newsletter

Recent technical articles