By Ken Ebert Everyone’s online life begins with a user account, a login, and a password, which combined, turns into an identity. I am my email address — or social media account login. For the past twenty five years, life online has evolved by accumulating these...
SEARCH FOR ANY TOPICS HERE
Digital Identity and the Public Sector: Using Verifiable Credentials to Manage Social Security
In this paper, we describe a scalable architecture using currently available open-source decentralized identity technology for managing social security and employment verificationTrevor Butterworth Decentralized identity technology addresses the legacy problem of an...
How to Avoid Hacks like the MGM Grand
Phishing attacks are all too common, and as a few casinos in Las Vegas are finding out, incredibly costly. As we continue to interact online, the only way to really stop these attacks is to have cryptographic confidence in who you are speaking with.By Sam Curren The...
Digital Transformation Takes Flight—Literally!
The era of seamless travel has arrived: SITA’s Digital Travel Credential isn’t just a better way to travel and cross borders, it’s a symbol of a new era in privacy-preserving, trustworthy digital interaction.By Trevor Butterworth The promise of digital interaction is...
Indicio Creates Verifiable Data Solution for Public Sector
New Government Permits, Licence and Certifications product makes it easier to issue and verify any government permit, license, or certification.SEATTLE, September 18, 2023 — Indicio, the world’s leading software development company delivering verifiable data solutions...
The Future is Passwordless
Passwords have been our main key to gain access to products and services for years. But as other options come onto the market, it is worth exploring what they can offer and why you might want to switch.By Tim Spring Passwords have been around for a long time, so long...
Handling High Volume Verification with SocketDock
Indicio’s new open-source tool enables websockets to quickly manage large scale mediation without dropping messagesBy Colton Watkins Imagine the following scenario. It’s a Friday morning, the first day of a convention that only comes around once a year, and you’re...
Indicio offers a variety of verifiable credential protocols, tools, and building blocks
When it comes to decentralized identity, Indicio is technology agnostic. This enables us to offer customers the best possible solutions to meet their exact needs.By Ken Ebert In a rapidly expanding field, there are many approaches to solving a multitude of use cases...
Breakthrough in DIDComm Mediation: Indicio Achieves Significant Scale with New Solution
Indicio recently had a breakthrough in work to scale the mediator we have been using for issuing and verifying credentials. This new mediator greatly reduces a huge problem decentralized identity faces — accommodating all the people that want to use the technology.By...
Zero-Trust Practices with DIDComm
Zero-Trust practices offer many benefits to the organizations that adopt them; in this piece we will explore how they work, why they are gaining in popularity, and how DIDComm can help enable them for you.By Sam Curren What is Zero Trust? Zero Trust is an approach to...