Archive for Feb 2024

Zero Trust with Zero Data

The physical world is full of zero trust examples, but they gather attributes for the access control decisions in a very different way than we're used to online.
Continue reading...

Acceptance Networks for Self-Sovereign Identity

We can't have broad adoption of verifiable credentials until we find a way to scale their presentation by providing tooling that credential verifiers can use to reduce their risk and gain confidence in the facts presented to them.
Continue reading...