I articulated precisely what was needed for a pki infrastructure. can you articulate in technical terms how DIDs and VCs satisfy that and only that?

Reply to this note

Please Login to reply.

Discussion

indeed the embedding of proofs just makes dids broken, imo

The whole system is based on a premise of identity that isn't necessary for anyone in this ecosystem

The entire system was authored without actually thinking about what people needed or wanted and instead it was authored with a series of intents instead of coming from industry coming from protocol designers

The proper way to build a protocol is to observe what's happening in the wild in the chaos of something like an NOSTR and then look what most people are doing and codify it so that new people coming on board can be compatible

in nostr anyone can publish a structured event with some public claims

anyone can respond to that event with public structured assertions of those claims

the absurd notions of privacy in the did system and the insistance on using xml reflects everything wrong with the w3c