Skip to content
This repository has been archived by the owner on Mar 5, 2024. It is now read-only.

Editorial changes: a bit of wordsmithing #10

Open
wants to merge 3 commits into
base: main
Choose a base branch
from

Conversation

dhh1128
Copy link

@dhh1128 dhh1128 commented Jul 19, 2021

No description provided.

Daniel Hardman added 2 commits July 19, 2021 18:58
Copy link
Contributor

@mitfik mitfik left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good, the comments we can take into consideration in separate PR if needed.


The last of these examples deserves special comment. There is a tension between the decentralization that we want in a verifiable credential ecosystem, and the way that trust tends to centralize because knowledge and reputation are unevenly distributed. We want anyone to be able to attest to anything they like--but we know that verifiers care very much about the reputation of the parties that make those attestations.
The last of these examples deserves special comment. There is a tension between the decentralization that we want in a verifiable data ecosystem, and the way that trust tends to centralize because knowledge and reputation are unevenly distributed. We want anyone to be able to attest to anything they like — but we know that verifiers care deeply about the reputation of the parties that make those attestations.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

should we use instead of verifiable data -> authentic data ?
verifiable is not explicit which verification we are talking here about.


We could say that verifiers will choose which issuers they trust. This is exactly what most practioners of VCs recommend, and it works in early pilots. However, this places a heavy burden on verifiers, over the long haul--verifiers can't afford to vet every potential issuer of credentials they might encounter. The result will be a tendency to accept credentials only from a short list of issuers, which leads back to centralization.
We could say that verifiers will choose which issuers they trust. This is exactly what most practitioners of verifiable credentials recommend, and it works fine in early pilots. However, as the complexity of a data ecosystem grows, it doesn't scale; verifiers simply can't afford to vet every potential issuer of credentials they might encounter. (Consider a timely example. Tens of thousands of labs are now issuing COVID test results. No verifier can possibly know them all.) One obvious remedy is to accept credentials only from a short list of issuers, which leads back to centralization. Another remedy is to create a trust registry, where vetted issuers can be looked up. This introduces centralization in a different way.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

"This introduces centralization in a different way"

I would suggest to talk more about federated approach or as we call it fractal governance where you decide how this federation can be build up and bridge between governance authority. This could give a feeling that on highest level you have sort of centralization (to bridge) but it does not impact local governance at all. So would not call it centralization in that case.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants