da Jacopo Sesana | Mag 12, 2021 | Guides
In the last few guides, we have discussed about several topics: from digital identity models, to the emergence of Self Sovereign Identity (SSI), and one of the first pillars, DIDs. As already addressed, the concept of Self Sovereign Identity is based on three main...
da Jacopo Sesana | Mag 12, 2021 | Guides
What are Decentralized Identifiers (DID)? Special features of Decentralized Identifiers (DID) How is a Decentralized Identifier (DID) formed? Introduction to the architecture of Decentralized Identifiers (DID) In this third guide, we will explain how one of the...
da Jacopo Sesana | Mag 12, 2021 | Guides
How the centralized model for personal data management works How the federated personal data management model works How the SSi model works for personal data management What is a digital identity? This is an increasingly topical question in a world that is becoming...
da Jacopo Sesana | Mag 11, 2021 | Guides
The concept of identity and the concept of identity on the web The birth of the Internet and the problem of digital identity Introduction to the founding concepts and technological architecture of Self-Sovereign Identity. Identity is a purely human concept. It is that...
da Marco Fusillo | Apr 29, 2021 | Guides
Welcome back! In previous guides we have already introduced several interesting concepts regarding Self Sovereign Identity. We have moved from digital identity models to the concept of SSI, analysing the three fundamental pillars supporting Self Sovereign Identity,...
da Jacopo Sesana | Apr 29, 2021 | Guides
What is an Auth DID? What is a DKMS? The workflow for identity verification on SSI Why are they essential for SSI? We are back with our fifth guide on Self Sovereign Identity where we will explain how DID Auth and Decentralized Key Management System (DKMS) work, the...