-
Notifications
You must be signed in to change notification settings - Fork 4
Editorial changes: a bit of wordsmithing #10
base: main
Are you sure you want to change the base?
Conversation
Signed-off-by: Daniel Hardman <[email protected]>
Signed-off-by: Daniel Hardman <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good, the comments we can take into consideration in separate PR if needed.
|
||
The last of these examples deserves special comment. There is a tension between the decentralization that we want in a verifiable credential ecosystem, and the way that trust tends to centralize because knowledge and reputation are unevenly distributed. We want anyone to be able to attest to anything they like--but we know that verifiers care very much about the reputation of the parties that make those attestations. | ||
The last of these examples deserves special comment. There is a tension between the decentralization that we want in a verifiable data ecosystem, and the way that trust tends to centralize because knowledge and reputation are unevenly distributed. We want anyone to be able to attest to anything they like — but we know that verifiers care deeply about the reputation of the parties that make those attestations. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
should we use instead of verifiable data -> authentic data ?
verifiable is not explicit which verification we are talking here about.
|
||
We could say that verifiers will choose which issuers they trust. This is exactly what most practioners of VCs recommend, and it works in early pilots. However, this places a heavy burden on verifiers, over the long haul--verifiers can't afford to vet every potential issuer of credentials they might encounter. The result will be a tendency to accept credentials only from a short list of issuers, which leads back to centralization. | ||
We could say that verifiers will choose which issuers they trust. This is exactly what most practitioners of verifiable credentials recommend, and it works fine in early pilots. However, as the complexity of a data ecosystem grows, it doesn't scale; verifiers simply can't afford to vet every potential issuer of credentials they might encounter. (Consider a timely example. Tens of thousands of labs are now issuing COVID test results. No verifier can possibly know them all.) One obvious remedy is to accept credentials only from a short list of issuers, which leads back to centralization. Another remedy is to create a trust registry, where vetted issuers can be looked up. This introduces centralization in a different way. | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
"This introduces centralization in a different way"
I would suggest to talk more about federated approach or as we call it fractal governance where you decide how this federation can be build up and bridge between governance authority. This could give a feeling that on highest level you have sort of centralization (to bridge) but it does not impact local governance at all. So would not call it centralization in that case.
Signed-off-by: Daniel Hardman <[email protected]>
No description provided.