Blog

SEARCH FOR ANY TOPICS HERE

Platform vs Component-Based Solutions

Platform vs Component-Based Solutions

Before purchasing a decentralized identity solution you will need to decide if you want to buy a platform or component-based system. But what is the difference, what are the benefits of each approach, and what will provide the best way forward for your...

read more
101 Use Cases for Verifiable Credentials

101 Use Cases for Verifiable Credentials

Verifiable credentials allow you to cryptographically verify who issued information, and they allow you to know if that information has been tampered with. But what does this mean in a practical sense?By Tim Spring Recently our team was asked a question that we...

read more
How to Avoid Hacks like the MGM Grand

How to Avoid Hacks like the MGM Grand

Phishing attacks are all too common, and as a few casinos in Las Vegas are finding out, incredibly costly. As we continue to interact online, the only way to really stop these attacks is to have cryptographic confidence in who you are speaking with.By Sam Curren The...

read more
Digital Transformation Takes Flight—Literally!

Digital Transformation Takes Flight—Literally!

The era of seamless travel has arrived: SITA’s Digital Travel Credential isn’t just a better way to travel and cross borders, it’s a symbol of a new era in privacy-preserving, trustworthy digital interaction.By Trevor Butterworth The promise of digital interaction is...

read more