
What we’re about
As Decentralized Identity takes off, individuals can own and manage their own tamper-proof credentials for applications such as personal health, education, and voting records in an encrypted digital wallet on their personal devices. By including a Decentralized Identifier (DID) in a Verifiable Credential (VC), the credential holder can control who can access their data and how it is used. Decentralized identity sometimes uses a distributed ledger to provide a robust public key infrastructure and allow users to prove their identity using digital signatures without a centralized authority. Come learn more, we are open to newbies and experts.