You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The strongest verification method available to an AID controller is to anchor a seal of the hash (SAID) of whatever is to be authenticated. This is stronger than merely signing because the anchor binds the authentication to the key state and an attacker can't later create an anchor with compromised keys from an earlier key state.
So the open question is how to indicate in the did doc that anchoring seals are a verification method .
In a sense, an anchoring seal is similar to an Indy state proof but more granular. Or similar to an Indy Attrib record update but again more granular.
The text was updated successfully, but these errors were encountered:
The strongest verification method available to an AID controller is to anchor a seal of the hash (SAID) of whatever is to be authenticated. This is stronger than merely signing because the anchor binds the authentication to the key state and an attacker can't later create an anchor with compromised keys from an earlier key state.
So the open question is how to indicate in the did doc that anchoring seals are a verification method .
In a sense, an anchoring seal is similar to an Indy state proof but more granular. Or similar to an Indy Attrib record update but again more granular.
The text was updated successfully, but these errors were encountered: