[MINUTES] CCG Weekly 2025-05-27

W3C CCG Meeting Summary - 2025/05/27

*Topics Covered:*

   -

   *Verifiable Credentials Working Group (VCWG) Update:* The VCWG recently
   finalized seven specifications, including the VC Data Model 2.0. The group
   is now in maintenance mode, focusing on finishing the VC JSON schema and
   data integrity BBS specifications, addressing minor issues (AA), and
   working on the reserved extension points: render method and confidence
   method. Re-chartering is anticipated in late summer/fall to address
   additional work items.
   -

   *Upcoming Work Items:* Discussion centered around several potential work
   items for future consideration within the VCWG, including:
   - Verifiable Credential Barcodes (already in production for US driver's
      licenses)
      - Verifiable Credential Rendering Method
      - Quantum-safe Crypto Suites
      - Verifiable Credential API (life cycle management; differs from the
      browser-based Digital Credentials API)
      - Verifiable Presentation Request (query language, potential merger
      with VC API)
      - Verifiable Issuers and Verifiers
      - Verifiable Credentials over Wireless
      - Confidence Method (raising confidence in credential presenter
      identity)
      - Credential Refresh (automatic credential renewal)
   -

   *Key Differences between VC API and Digital Credentials API:* The VC API
   focuses on broader life cycle management and interoperability, including
   back-office functions and support for multiple protocols (like OID4). The
   Digital Credentials API (DC API) is browser-based and aims for
   protocol/data format agnosticism, delegating protocol specifics to other
   specifications. The VC API can work within the DC API framework.
   -

   *Threat Modeling for Verifiable Credentials:* The need for a
   comprehensive threat model for VCs was highlighted, emphasizing the
   importance of addressing this before the next re-chartering.
   -

   *Geneva Meeting (July 2025):* A meeting involving various organizations
   (governments, W3C, OIDF, IETF, etc.) will focus on the state of digital
   identity and wallets. Discussions will include updates on VC 2.0, threat
   modeling, and the Digital Credentials API. Key concerns raised include
   maintaining privacy and preventing government overreach in the deployment
   of digital identity systems. The meeting aims to foster collaboration and
   address concerns around democratizing credential issuance and avoiding
   surveillance.

*Key Points:*

   - The VCWG has successfully concluded a significant phase of work.
   - The group will take a short break before focusing on the render method
   and confidence method specifications.
   - Re-chartering is expected to expand the scope of the VCWG to include
   further work items.
   - There's a need for clarification on the differences between the VC API
   and the DC API.
   - A comprehensive threat model for VCs is crucial.
   - The upcoming Geneva meeting presents an opportunity for significant
   collaboration and discussion of important issues in the digital identity
   space. Concerns around privacy and the potential for governmental overreach
   in the deployment of digital identity systems were highlighted.

Text: https://meet.w3c-ccg.org/archives/w3c-ccg-ccg-weekly-2025-05-27.md

Video: https://meet.w3c-ccg.org/archives/w3c-ccg-ccg-weekly-2025-05-27.mp4
*CCG Weekly - 2025/05/27 11:58 EDT - Transcript* *Attendees*

Alex Higuera, Benjamin Young, Brent Zundel, Chandima Cumaranatunge, Dmitri
Zagidulin, Erica Connell, Greg Bernstein, Gregory Natran, Harrison Tang,
Hiroyuki Sano, Jennie Meier, Joe Andrieu, Kaliya Identity Woman, Kayode
Ezike, Mahmoud Alkhraishi, Manu Sporny, Parth Bhatt, Philippe Le Hégaret,
Phillip Long, Rob Padula, Vanessa Xu, Will Abramson
*Transcript*

Harrison Tang: Hey, Brent.

Brent Zundel: Hey Harrison, how are you?

Harrison Tang: Good. Thank you for taking the time to drop out.

Brent Zundel: Yeah, of course.

Harrison Tang: How's it going?

Brent Zundel: Things are going pretty well.

Harrison Tang: Good to hear. And congrats on the VC 2.0 being the official
years in the making,…

Brent Zundel: Thanks. Yeah,…

Harrison Tang: Yeah.

Brent Zundel: it's been a long time coming.

Harrison Tang: All right, we'll start in about two minutes. I think usually
we have 30 people coming in, but I think people scroll in around 9 910 or
so.

Harrison Tang: All we'll start and then we'll let other people join in the
next five minutes or so. But welcome to this week's W3C CCG meeting. today,
we're very excited to have Brent here to lead a discussion on what's next
on the verifiable credentials working group. but before then just want to
quickly do a quick reminder on the code of ethics and professional conduct.
I just want to make sure that all of us hold constructive conversations
here that we always have. Next quick note on the intellectual property.
anyone can participate in these calls. However, all substantive
contributions to any CCG items must be member of the CCG with full IPR
agreement signed.

Harrison Tang: so if you have any questions in regards to getting the W3C
account or the community contributor license agreement please feel free to
reach out to any of the coaches. these meetings are automatically recorded
and transcribed and we use a Google Hangout to do that. and we'll publish
automatically again thanks to Among U we'll publish automatically the
transcriptions in the next few hours and then you can just use the raise
hand feature in Google Hangouts if you have any questions and I'll moderate
the queue. All right. I just want to take a moment for introductions and
reintroductions.
00:05:00

Harrison Tang: So, if you're new to the community or you haven't been
active and want to engage, feel free to just unmute and introduce yourself
a little bit. I see mostly familiar faces. So, next announcements and Any
announcements reminders? Money expense.

Manu Sporny: Yeah, just a reminder on the regular other community group
meetings that we are having this week. later on today, there will be the
verifiable credential API call where we are continuing to kind of make
changes to that specification to get in shape to transfer to the BCWG.
tomorrow will be the more broad kind of incubation and promotion call that
we've been having. which covers a ton of other specifications. we'll be
focusing on the confidence method specification tomorrow along with the
verifiable credential rendering method one.

Manu Sporny: and then on Friday is the data integrity incubation work where
we are focusing on the postquantum signatures so that crypto suite and some
advances for postquantum pseudonyms that we've been working on trying to
finish that work up. all of those things of course being proposed to be
handed over to the BCWG. so those invitations went out yesterday. please
join us if you're interested in any of those work items. Thanks.

Harrison Tang: Thanks, Any other announcements or reminders? Any updates on
the work items? So, we'll onion, please.

Manu Sporny: Sorry, there are updates on a variety of work items. Rather
than going through all of them, I'll just put a link here in the chat
channel. unfortunately, we're going to lose that link in the minutes, but
those are kind of all of the things that are under active development in
the various CCG groups. and an estimate on the amount of work that's left
before we feel like we can wrap it up for the CCG part of the work on each
one.

Manu Sporny: That's it.

Harrison Tang: Great. Thank you,…

Harrison Tang: Money. And we'll hold the next work guidance updates and
quarterly review on July 15. Any other announcements or reminders or work
item related stuff? Right, just a preview of what's coming. So, next week
we'll have Wol to talk about Provenence Mark. The week after we'll have
Daniel from Open Wallet Foundation to talk about the latest developments on
open wallet initiative and then actually a month from now June 24th we'll
have a meet and greet breakout sessions.

Harrison Tang: so the co-chairs will hold these breakout sessions so that
people and new members of the community can actually meet each other and
then July 15 we'll talk about the items. All right, last calls for
introductions, announcements work or work item related stuff. All right,
let's get to the main agenda. So again, very excited to have Brent the
chair of the verifiable credentials working group to present and lead a
discussion on what's next on the verifiable credentials working group. So
as Manu and others have talked about, the VC 2.0 has become the official
standard.

Harrison Tang: Congratulations and it's a great time for Brent to come here
and thanks Brent for taking the time to come here to talk about what's next.

Harrison Tang: The floor is yours.

Brent Zundel: Yeah, happy to be here.
00:10:00

Brent Zundel: Thanks my name is Brent Zandell. I've been the chair of the
VC working group for I don't remember long time and we w just wrapped up a
large workload. It was pretty impressive how much work got done. I think
seven specs are now recommendations including the verifiable credentials
data model 2.0. the bulk of the work that we did was first we updated the
data model but we also officially standardized several securing
specifications as well as specifications for a number of the extension
points that are in the data model.

Brent Zundel: what's next for us? this is pretty much going to be a review
of what the charter text says that we're allowed to do along with a little
bit of confirmation. So, our charter and the purpose of our charter is to
cover the possible work items that we can take on. and that's mostly so
that participants can be comfortable with any IPR agreements that they
would be required to make as part of contributing to that work. the other
main point of the charter is to give us a rough timeline for where we're
going to be working in. And our current charter will go through October
2026. our charter is kind of an odd hybrid.

Brent Zundel: we rechartered late last year in order to give us a charter
that would allow us to finish the work that was in progress. wrap up this
recommendations that we were working on. and then the charter would
automatically kind of shift into what's called maintenance mode. And so
that's the mode that we're currently in. of the set of work items that was
originally slated only two of those remain that's the VC JSON schema and
data integrity BBS are the two specs that we didn't move to recommendation
yet the first is looking for a little bit more implementation support and
the second is just waiting for BBS to be official in the IETF so that we
can point to

Brent Zundel: other than that we're in maintenance mode. This is direct
from our charter. So once the planned recommendations have been published,
the working group will continue in maintenance mode to handle new
recommendations Class 4 changes to these recommendations are out of scope
except for and so the process at W3C outlines different classes of changes.
And class 4 means normative additions not in response to obviously being
mistakes that we made or bugs that people find. and there's except for
reserved extension points and any serious security issues.

Brent Zundel: So, we're currently in a mode that is restrictive as to what
we can take on and work on. the charter explicitly says no new
recommendations and it limits us to anything below a class 4 change. so
other than VCJSON schema and data integrity BBS, technically we're not
allowed to do any new recommendations. except for these extension points
and that's what we're going to go into. kind of summarizing this into
regular language. So any specs in progress, we can finish those and we can
obviously republish and keep working on any of our notes. For example, the
use cases and requirements document has had a lot of work go into it and we
will continue to publish and update that.

Brent Zundel: and then these extension points and the two extension points
that are explicitly called out in the charter and in the VC data model
document itself are the render method and confidence method extension
points and then security issues and then aa and aa is everything from hey
you guys missed a comma to can you explain this a little bit better? It
doesn't make any sense to me. and so any AAA that we address ideally will
be done non-normatively. but if there are normative changes required for aa
we technically can do those but we try to avoid it if possible. And a
hummingbird just came to my hummingbird feeder for the very first time.
Sorry that was very exciting. I've had this hummingbird feeder out for
months now and it's just been sitting there and I've been replacing the
sugar water every week.
00:15:00

Brent Zundel: and come on hummingbirds and somebody just drank from it. It
was very excited. back to any questions so far? you guys can interrupt at
any point if anything. I mean, I don't have a whole ton of slides and so
this should be more of a conversation than me just gav at people, but just
invite people to feel like they can interrupt at any moment. I'm not at all
bothered by that.

Harrison Tang: Yeah, you fine, please.

Brent Zundel: And Harrison, if you want to run Q or I can either way kind
of thing.

Mahmoud Alkhraishi: Hi Brent. how long do you think we're going to stay in
maintenance mode and when do you anticipate next rechartering and anything
on that

Brent Zundel: That is a very good question. and I will get into that in a
little bit. So if what I cover doesn't address your question, recue and
remind me that I haven't covered it adequately. so as of now and I think
this is my last slide. So seriously awesome deck here. we are pretty much
taking a break till August. And what that really means is everybody is
really busy doing a lot of other stuff and so we're not going to put CCG on
top of all that other work that people are doing.

Brent Zundel: when we start back up, we already have several issues filed
that we're going to be working on along with some response to security
review that was requested. at that point in August, we can very easily
promote the render method and confidence method specs to the VC working
group. just to forstall the possible question people might have, if the
charter says no new recommendations, how are we going to justify bringing
in a render method and confidence method recommendation? that's because as
long as the work that we are doing fits within the scope of the charter,
the V the W3C doesn't really care whether it's part of one recommendation
or become breaks out into its own recommendation. Whether there's two
recommendations or one really doesn't matter.

Brent Zundel: So if a work item is justifiably part of the VC data model
according to the charter and we say we want to break this thing out of the
data model into its own specification, nobody's going to give us grief for
doing render method and confidence method we can easily pull in. promoting
other work items from CC would likely require recharter. So I'm fully
expecting in August we're going to start talking about recharter. We're
going to look at the slate of work items that are ready to move on and look
at the people who are on board and say how much work do we want to do here.

Brent Zundel: and then we're going to begin that rechartering conversation.
And I fully expect the rechartering to occur as part of the work groups
conversations, which means we're probably going to meet at in Coobe this
year for a half day or so to talk over what work items, kind of begin
finalizing that, putting it together. so even though our current charter
runs until October 2026 and if we made no changes to it, we would be in
maintenance mode until then. without rechartering, we could do render
method and confidence method and obviously the Ara stuff. to do more than
that, I think we really would need to recharter. And so I'm expecting those
conversations to begin probably this fall or late this summer. and I'm not
sure did somebody's hand go up?

Harrison Tang: Joe, do you still have a question?

Joe Andrieu: I do I had thought Brent that the last time we talked about
whether or…

Joe Andrieu: not render method and confidence method could be separate
because of the language in the charter we were advised that we can't do
that. has there been a new advice on that new guidance?

Brent Zundel: t know I think that this is just my opinion as chair of the
group and…

Brent Zundel: my understanding of the process.

Brent Zundel: I really think we would be fine bringing those two things
without a recharter because nobody cared that we broke for example under
our previous charter we didn't mention what's blanking on the spec we have
too many specs the one that we did that was the super set of DIDs the
control identifiers yes thank you that for example that spec was not
mentioned as part of our previous charter at all.
00:20:00

Manu Sporny: said control that

Brent Zundel: It wasn't technically in scope listed as the things but it
was originally part of the VC data model and then it was part of the
securing mechanisms and so we coalesed that out into its own recommendation
and Nobody was like hey your charter didn't specifically say you were going
to do controlled identifiers.

Brent Zundel: So I think we would be okay the same way we were okay, but I
think if we tried to push beyond that, people would be like, hey So that's
kind of the line that I'm seeing, but again, I'm happy to I mean, the group
is going to have to make those determinations. I don't make those decisions.

Joe Andrieu: Cool. Thanks, Brett.

Brent Zundel: Whether to try for it without rechartering or whether there's
enough in addition to confidence method and render method that would
justify a recharter. and so let's just mention them all in the new charter.
That's something the group's going to have to come to a determination on.
But my opinion is I think we'd be okay. any other questions or comments?
Any other conversations people want to have? I really expected these slides
to take longer to go through, but apparently I'm a little nervous.

Harrison Tang: Autumns.

Brent Zundel: Manu, what's up?

Manu Sporny: Hey, hey, Brent. plus one to everything that you said. I think
that's the correct read of the current charter. and so that's good. as you
know, we've been incubating other things in the CCG that are definitely not
in the charter. So some of the stuff's in the charter and we is covered by
the charter at least our expectation of the interpretation of the current
charter meaning confidence and render method. and then there are other
things that are totally not covered right that I think all of us believe we
would need a recharter to do.

Manu Sporny: plus one to the group taking a bit of a break as you mentioned
it was a lot of work and I think that it is good to let the group kind of
relax a bit before going into the next kind of branch of work which seems
to be confidence method and render method which is good I think that is
very much aligned with expectations. I would like to just glance over what
some of these other work items might be and, the type of things we would
need to potentially do to get those onto a standards track and maybe even
get some feedback from, the group on how those conversations might go at
the end of the summer.

Manu Sporny: But I don't want to derail things. If there are other things
that folks would like to talk about that would be good. But I thought while
we are talking about the future of the VCWG maybe we could bring up these
other other work items to get folks thoughts on them.

Brent Zundel: I'm happy for the conversation to go in that direction,…

Manu Sporny: That's it.

Brent Zundel: but also happy to ceue up other questions or comments people
have to make sure we get them covered. So if anybody else has something
else they want to talk about, we can agenda bash a little bit here and make
sure keep time for other things.

Brent Zundel: What's up, Joe?

Joe Andrieu: Yeah, I think one of the things we might want to do I don't
think it reads on the charter at all,…

Joe Andrieu: but just in terms of what are we going to do in this
maintenance mode is potentially a threat model for verifiable credentials.
I've been working with Simone over in the security group and they are
ultimately going to be asking any new specification to develop that and we
have some hooks into the DID resolution work where we talked about
architecture. That seems like the right place to start that work with DIDS
and…

Joe Andrieu: I think in the fullness of time we should figure out how to
get some of our attention on doing threat modeling for VCs.

Brent Zundel: Yeah, totally agree.

Brent Zundel: That's one of those things that had the security group been
able to, get organized a year before they did, we definitely would have
made sure that was done before we finished up. it was just a matter of
timing. we didn't even get the security review until we were in proposed
Rex. So yeah totally agree with that as a thing to work on it. Yes.

Manu Sporny: Yeah, plus one did that as well. I mean, part of their
security review was kind of like we would like you to rewrite the security
consideration section. and I think our response to that was exactly what
would you like it to look like? So, I think there's a really good
opportunity for us to work on that with the security group. of course that
will throw us once again into being guinea pig through a new process at W3C
which we are now expert at.
00:25:00

Manu Sporny: A plus one that work I think it would be really worthwhile to
because I think it's really fertile ground meaning that the type of
thinking that this community and the BCWG has been doing over the past five
plus whatever 10 plus years however long it's been now it lends itself well
to the type of threat modeling that Simony and the rest of the security
group, really want groups to be doing. And I think we can hopefully provide
a really good example that potentially other working groups could follow in
doing that work and…

Manu Sporny: and we have lots of time to do it like it, until 2026. Not
that I hope it takes that whole amount of time. That's it.

Brent Zundel: All right.

Brent Zundel: So, I'm going to switch over to the issue 250 so we can go
through these additional work items that could be promoted to VC working
group just so folks haven't been nined and are aware of what all that work
is. I also want to save a few minutes so that we can talk about the meeting
that's coming up in Geneva. just so folks are aware of what that is and
some of the conversations that'll be had there so that those of us who are
heading to that can make sure and try to represent the views of those who
aren't able to attend and make sure that the conversations had that need to
be had.

Brent Zundel: so here, if I got it right, is the 2025 work item promotions.
so I read through this and thought this is This is a huge amount of
potential work. And also part of me was like, no, we're not ready to do a
huge amount of work again. so like we said the render method and the
confidence method we would be able to bring in no problem. I honestly like
credential refresh might even be able to technically be able to fit
somewhere in there because we do have that extension point or we've had
that extension point in the past so that wouldn't be as big of a stretch.

Brent Zundel: But some of these others, particularly the VC API would
definitely require a recharter…

Brent Zundel: because our charter currently says we will not do any APIs
and so we'd have to take out that line. Joe, what's up?

Joe Andrieu: Yeah,…

Joe Andrieu: some of those links are 404ing. just a heads up,…

Joe Andrieu: I try to click through the confidence method, so I'm not sure…

Manu Sporny: That's my bad.

Joe Andrieu: how to fix it.

Manu Sporny: I just renamed that two days ago.

Joe Andrieu: Okay.

Brent Zundel: Okay, thanks for the heads up,…

Brent Zundel: So I would love it if could we take two minutes for each of
these and give a little what is verifiable credential barcodes for example?
jump up and go ahead.

Manu Sporny: Yes, I'm happy to run through those.

Manu Sporny: And Brent, let me know how you want me to go through them. I
can just do a quick blurb break.

Brent Zundel: Yeah, just do a little time just a couple minutes tops for
each just so that folks are like,…

Brent Zundel: That's cool." We can get people excited about finishing them
up and moving them over.

Manu Sporny:

Manu Sporny: Sure thing. So, verifiable credential barcodes is a kind of
what it sounds like, it's taking a verifiable credential and then
converting it into a barcode that can be printed out on a piece of paper.
the reason that's important so onto the back of a physical driver's license
or onto a birth certificate or onto a shipping container or onto a vehicle.
These are all use cases that are in pilot or going out to verifiable
credential barcodes by the end of the summer will be in production on the
back of driver's licenses in the United States to the tune of several tens
of millions of people.

Manu Sporny: So this is an example of we're a little late getting it into
the standardization process because it is going to go out in production
before we even are able to kind of recharter but that's good because the
spec is much more mature than what we would normally have it at before we
move it into the VCWG. and then it also depends on the seabore LD stuff
with which the JSON LD working group is working on. So what this allows you
to do is allows you to take the digital version of verifiable credential
put it into a barcode and then put it on a physical thing and that has been
one of the use cases that people seem to be interested in.
00:30:00

Manu Sporny: next one. The rendering method is has to do with if you as an
issuer want your credential to look a very specific way or you want to be
able to again print your credential on a print to PDF. that is one of the
things that the verifiable credential rendering method does. that
specification currently has three different broad strategies on doing it.
One of those mechanisms is in production in Singapore and the Pacific
region. how to render a education certificate or how to display a diploma
or how to display a trade document or how to display a driver's license or
an employee ID card.

Manu Sporny: if you want certain graphics and colors and things like that
to show up on it, that's what the rendering method thing is about. the
quantum safe crypto suites is so when we did the data integrity work in the
verifiable credential working group we use traditional cryptography that
was approved by national institute of standards and a lot of other nation
state cryptography groups but the postquantum stuff was new enough where it
wasn't really in the charter and so this is just a set of data integrity
suites that support the postquantum signature schemes and selective
disclosure for postquantum and stuff like that.

Manu Sporny: they're fairly mechanical updates but it's important work that
needs to be done before the switch over which is the year 2030 so in 5
years and then the mandatory switch over suggested is 2035 where we have to
be completely off of elliptic curve cryptography. verifiable credential API
is about credential life cycle management. not just delivery which is what
open ID4 oid for VCI and OID4 VP is about delivering credentials from a
wallet to a system. The VC API is more broad than that.

Manu Sporny: It deals with credential life cycle management how do you
mechanically issue a credential? How do you change the state of that the
status from issued to revoked? what are the APIs you use to do that. it's
inclusive of oid4 so you can run oid4 over the VC API. but it's about life
cycle management. and it's about the issuance of not only these verifiable
credentials but the QR code version of them and other things of that
nature. the next one verifiable presentation request is just the query
language that can be used with VC API. there's also options of presentation
exchange or DCQL or other things like that.

Manu Sporny: verifiable issuers and verifiers are around how does an entity
such as na a nation state publish all of the entities that should issue
their driver's licenses or education certificates or things of that nature.
So that's about how do you know who the issuers of a certain type of
credential should be and how do you know who the verifiers of a certain
type of credential should be? Again, it's an in thing. It's not like, a
mandatory you have to use this, but that's work that David and Isaac have
been doing for a number of years now.

Manu Sporny: verifiable credentials over wireless is just how do you take a
verifiable credential and how do you move it over NFC or Bluetooth. so this
has come up in some of the first responder use cases where you might have
no network connectivity and you need to be able to transmit this stuff. it
also has to do with some of the p transit pass use cases where you might
have a digital version of your transit or metro pass. but the NFC mechanism
they use is super old. and you need to be able to tap into those old style
kiosks using some of these newer credentials. So that's what the verifiable
credential over wireless is just transmitting it wirelessly instead of
optically like the QR code.
00:35:00

Manu Sporny: confidence method is how do you raise your confidence that the
person presenting this credential is in fact the same entity or related to
the same entity that the issuer saw. So think of when you get your driver's
license, you go in, you take the test, you meet someone face to face
typically and then you get your driver's license issued to you. And so when
you go away and you use that driver's license elsewhere, people usually use
your picture to figure out if you're the same person. But we want more
privacy preserving mechanisms.

Manu Sporny: And so a cryptographic key could be one such mechanism that a
verifier could use to know that the same person that picked up the driver's
license at the DMV is now effectively the same person in front of me
because they're proving that they have the same cryptographic key material
that they used when they picked it up for example. so that's confidence
method. we can also do pictures there.

Manu Sporny: there's some biometric portions that we could say one way you
could raise the confidence that the subject is here's a picture of them
right so that's confidence method and then credential refreshes one of the
things as a number of us are deploying this stuff in production we're
finding out is that issuers have taken a pretty careful approach like
they're like what? We're going to issue credentials, but we're only going
to issue them for 30 days at a time because this is new technology and
we're concerned that if we issue something for 3 years and something bad
happens that we won't be able to claw it back. Meaning they haven't quite
figured out how to use the status list stuff yet and they just want to
issue things like 30 days at a time.

Manu Sporny: but that's all that ends up being kind of a pain to people and
so meaning it's kind of a bummer when you open your app up and all of your
credentials have expired because you haven't used them in 30 days. So
credential refresh is a way of giving the wallet a way of just
automatically refreshing the credential when it comes close to expiring. So
you're never in a situation where you open up your wallet, your credentials
are expired, and you have no network connection, right? And so you can't
even do an NFC tap to verify with it. okay, that's a high level on kind of
everything we're working on right now. Hopefully that was okay.

Brent Zundel: Yeah, thank you, That was great.

Brent Zundel: Hey, Harrison.

Harrison Tang: Yeah, manu can you clarify again what's the difference
between VC API and…

Harrison Tang: verifiable presentation requests because shouldn't
verifiable presentation request just part of the VC life cycle management?

Manu Sporny: That is an excellent point, Harrison, and we are currently
discussing whether or not we should just merge the two. I think one of the
things we're kind of seeing, especially, the number of us are implementing
OID4 VP and OID4 VCI and, there is now this switch from presentation
exchange to the new DCQL stuff. and some of us are implementing, the DCQL
stuff. and the concern here is just like we're still kind of trying to
figure out the query languages here. And we're concerned that by strongly
binding the query languages or the credential formats to the protocols that
we may be doing it prematurely. So that's why we have it separate.

Manu Sporny: We're trying to force ourselves to design it in a way where
maybe verifiable presentation request goes away in time. Maybe it's
replaced by DCQL, maybe something else, better comes along in two years.
But we're trying to get the layers of abstraction right so that the query
language can be somewhat separable from the underlying protocol.

Harrison Tang: All right.

Manu Sporny: So, I think that's the theory. I don't know if it's really
working out in practice, but that's why it's separate for now.
00:40:00

Harrison Tang: Thank you.

Brent Zundel: I had a question,…

Brent Zundel: Can you outline the key differences between the VC API, which
is a work item of the CCG, and the digital credentials API, which is a work
item of the Fed ID working group?

Manu Sporny: Yes, excellent question. so the digital credentials API is a
browserbased API, meaning that the digital credential API that's being
worked on at W3C is meant to be implemented in the browser. So, Apple's
working on it, Google's working on it, Samsung I'm sure it's going to be in
there. and what it does is it is a mechanism that will route requests for
credentials in theory in any format over any protocol. So that DC API is
really trying to be protocol and data format agnostic.

Manu Sporny: They're just kind of like if a website asks for a credential
the DC API the browser will get that request over to the wallet whatever
wallet can answer it right and it is trying to stay out of the way from a
protocol and data format perspective it's trying to be agnostic to that so
the DC API lists like these are all the protocols that you can speak over
DC API and in theory there's going to be more than one of them. open ID is
OID4 is one of the ones that's being focused on now. the presumption is VC
API could be and anyone else in the world, any other standards group in the
world can come up with their own kind of credential protocol if they want
to and register it in this, protocol registry in DC API.

Manu Sporny: So DC API browser only and it is supposed to delegate the nuts
and bolts of the protocol to other specifications. At least that's my
understanding of it where it is today.

Brent Zundel: and the VC API would fit within that.

Manu Sporny: Yes. It would Yeah. Sorry.

Brent Zundel: Hey, Harrison.

Harrison Tang: Yeah, by the way,…

Harrison Tang: You're correct. And I would just like to add that BC API is
also going to work on support for wallets in this case Apple wallet and
Google wallet. So you'll go outside the browsers they will also work with
other than that…

Harrison Tang: what manu said is all correct. it's kind of like a wrapper.
It's a basically protocol agnostic.

Brent Zundel: Yeah, thank you for clarifying that.

Brent Zundel: I just know that, when the time comes that VC API gets listed
in the charter, everybody who is familiar with DC API is going to go, "Wait
a minute, what's the difference here?" And we're going to have to be able
to readily answer that question and should plan on doing that when we reach
harder.

Manu Sporny: Yes, plus one to that, Brent. I mean, it's like, we named this
thing three years ago and it's confusingly named now. so I think that let's
see we've got to come up with a picture to explain all this, but there even
two parts of VC API. there's kind of the back office parts of VCAPI and
that wholly has to do with preventing vendor lock within a organization.

Manu Sporny: So let's say a DMV or the US federal government or someone
decides that they want to utilize these technologies and they want to go
out and buy this stuff from a technology from a vendor all the life cycle
management that their internal systems have to do issuing verifying a
credential changing the revocation status of it or any other types of
statuses those are wholly outside

Manu Sporny: of actually delivering that credential to a person or another
organization that's just like back office management stuff and covers a
good chunk of that. VC API also covers kind of delivery what the oid4 stuff
does but in a different way in a way that allows you to chain things
together more and that's kind of the stuff that we're using in the retail
tor for retail sales. So digital receipts and loyalty cards and payment
instruments and all that kind of back and forth communication we're using
VC API4 in the retail sector.
00:45:00

Manu Sporny: and on top of that and this is where it gets really confusing
VCA we also implement OID4 over VC API meaning that VC API is agnostic
enough to run other protocols within its structure. So, we have VC API
implementations that do all of the back office stuff, but they also do the
credential delivery stuff through OID4 VCI and OID4 VP. and all of the
delivery stuff can work with the DC API. again, in theory, we have to
actually demonstrate that it has that, flexibility. so VC API does,

Manu Sporny: more things than just delivery. And we're going to have to
figure out a way of very clearly communicating like it totally doesn't do
what DC API does. It does management stuff that oid4 doesn't do,…

Brent Zundel: Philip

Manu Sporny: but it also does oid4 stuff. And I think that's the thing
that's, really confusing to everyone. plus one figuring out how to explain

Philippe Le Hégaret: I had a completely unrelated questions. you list
barcode in terms of specs ready for promotions. but you don't list anything
about QR codes. What's happening with that?

Manu Sporny: Yeah a QR code is a type of barcode and in the barcoding
industry I wish Phil Archer was here from GS1. So a QR code is what is
called a 2D barcode and we tried to be generic and just say this is about
barcodes but It's about PDF 417 barcodes. it's about MRZ data which is what
you find on your passport which weirdly enough is called a barcode even
though it's consists of machine readable letters. the matrix codes there 20
different types of barcode formats and this is meant to be generic. It can
be encoded in many of those types of barcode formats including codes.

Brent Zundel: All right.

Philippe Le Hégaret: Thank you for the clarification.

Philippe Le Hégaret: I'm learning something every day.

Brent Zundel: So, I'm happy to take any other questions that folks have and
hang out, but I also love ending meetings early. So, turning things back
over to Harrison. You're in charge, …

Harrison Tang: Any other question? Mamu, did your earlier question answer?

Mahmoud Alkhraishi: Yes, I'm great.

Harrison Tang: Any other questions?

Manu Sporny: Brent, there was something you said you wanted to cover, and I
don't know…

Brent Zundel: right right.

Manu Sporny: if we did that.

Brent Zundel: I completely forgot my own agenda item. so early in July I
believe it's the second and third of July there is a meeting I believe
hosted by the open wallet foundation in conjunction with W3C and other
SDOS's to talk about the state of wallets and credentials in those wallets.
I am planning to attend that meeting so that I can talk about BC data
model. I know that folks from OIDF are going to be there and folks from
IETF are going to be there and so a whole bunch of people are going to be
getting together. and Julie I'd love if you give a little bit more color
into what the meeting is going to be all about.

Philippe Le Hégaret: So the meeting is organized by the Swiss government
and the open wallet foundation has been the main tractor and bringing
things together on that. It involves 20 to 30 different organizations and
WC is only one of those 20 to 30. by the way, Open ID is also involved. we
from ITU. we have several governments involved. The goal was to put the
entire industry around the same table because there are so many efforts
happening in parallel in several organizations that it's really hard for
outsiders to find their ways into that sea of efforts being done.

Philippe Le Hégaret: from our We get a request every two or three weeks to
go and present the work around digital identity from outside organizations.
it's a little bit crazy. one of the advantage of this conference is a lot
of the governments are going to be there. So we don't have to repeat oursel
10 different types of times. as such it's seen as a neutral ground as we're
not here to say that this protocol or this format or this API is the best
and all of the alternative are not but we have four sessions organized by
people are by the team and with some help of some of you.
00:50:00

Philippe Le Hégaret: Piertoan is going to do a 30 minutes session on what's
new with verifiable credentials with a recent release of VC 2.0. We thought
it was appropriate to do a little session to if people are interested to be
brought up to speed on what's new with VC. then Simony is going he's doing
two session on the stress models threat ing. so Joe mentioned earlier the
threat modeling and thing I could say on that another reason why it's very
important for WC to look that is because of The

Philippe Le Hégaret: resilience act happening in Europe and the need to
make sure that cyber security is done right and so we expect that to be a
major shift in the software industry in the upcoming years since it's
shifting the responsibility for security bugs to the company shifting the
software similar to what was done in the automotive industry and while as a
standard organizations we're not directly impacted by that we expect a lot
of our members to be impacted by those legislations. so that's also another
motivation for moving forward the work on threat modeling as a whole. and
then the last session is organized around the digital credential API which
is a browser API.

Philippe Le Hégaret: A lot of organizations are looking at this API because
they're all going to want to exchange digital identity on the web and this
API is going to be one of the major way to do that to talk with the digital
wallets installed on the devices of people as such. So we thought we should
organize a session on where we are at with that and listen to governments
and other organizations on what they think that API ought to be as so the
conferences the first day is a plenary session set of plenaries the program
has already been published on various platforms.

Philippe Le Hégaret: The second day is similar to the tip breakouts where
it's a lot of session in parallel and that agenda hasn't been published
quite yet and unfortunately I was not able to participate in the core
organizer call earlier today. So I don't have the latest news on that front
but I know that there is a website…

Philippe Le Hégaret: which is going to be put up to plate if not already
the case as well. I'll stop there. so sorry I said…

Brent Zundel: Thank you,…

Brent Zundel: That was great. so with all of that flood of information, is
there something that folks from CCG want to make sure those of us attending
keep in mind? And Philip, you've got your hand up.

Philippe Le Hégaret: what I wanted to say so I should lower my hand.

Manu Sporny: I do think it's difficult to kind of understand what's going
to happen at the event. me meaning it's a lot of organizations and it's a
lot of really big organizations and I don't know I mean I think it's really
great that this is being identified as a big part of societal change and
everyone needs to get together and build systems that meet the challenges
here. but I think Brent, it's really hard to kind of provide

Brent Zundel: Yeah.

Manu Sporny: what do we want to convey here when it's kind of like we don't
really know what to expect. And so I would imagine it's just kind of like
sit and listen and figure out how we can u be a part of the conversation
and contribute positively and that sort of thing, I mean may maybe let
people know that there is and I'm sure this is like you already know this
and so does Philipe we just want to convey hey there is active work going
on here and we would really like more participation from broader
communities always and so please join us right I mean it doesn't have to
end at the July event like there's
00:55:00

Manu Sporny: ongoing work. rechartering. We're talking about threat
modeling. We want this to be, a net positive benefit to society.

Brent Zundel: I'm going to try

Manu Sporny: So, please join us if you are interested in contributing,
which I'm sure you were all already going to do, Brent. That's it.

Joe Andrieu: Plus one to…

Joe Andrieu: what Manny just said. I think who knows what the real pivot
points of the conversation are going to be. One thing that I've noticed in
conversations both with the DC API folks and with some of the folks with
more of a European context that's different from what I think we've done
that's important is democratizing the issuance of verifiable credentials.
we've done a lot to really make sure that the specification works if
everyone on the planet is issuing credentials as a normal course of
operations. a parent issuing a VC as a doctor's note, to the school about
why their kid was out yesterday. and I think a lot of the infrastructure
players are thinking about it in terms of how do we enable driver's license
issued by the state. And so that leads to different trade-offs.

Joe Andrieu: So I just want to make sure we point out that distinction and
that there's an aspiration here to democratize issuance and that, we would
like to see some attention to alignment with that. I mean,…

Brent Zundel: Yeah, that's a good man.

Joe Andrieu: I'm going to be there, but I just want to raise that as one of
our possible issues.

Brent Zundel: I'm looking forward to Geneva even more now. I get a hand.
Joe, I think Mon, you got your hand up.

Manu Sporny: Yeah, plus one to what Joe said. I think that there are a
number of things that we're a little concerned about I mean plus one for
there being government wallets and them doing governmenty things but not at
the expense of there being kind of an open market and open kind of
competition for digital wallets and things like that. I think that there
are some dangers there around government tracking of credential usage for
example things that we have been very aware of but don't seem to be a part
of the discussion when governments are saying they're going to do
government- based wallets.

Manu Sporny: most recent example being, the UK announced that they're going
to support W3C verifiable credentials and MDOC and SDH and all those
things. But they were like, but for the government credentials, we're going
to have a government wallet. So all the government agencies should issue
into our wallet.

Manu Sporny: And the danger there is all right, pervasive tracking. How are
you proving that it's not phoning home? that sort of thing. That's it.

Brent Zundel: Yeah, I think I and…

Brent Zundel: I really think making sure that the threat modeling
conversation touches those points is going to be key.

Philippe Le Hégaret: Yes,…

Philippe Le Hégaret: if I may add to that in terms of things that are very
important for you see at this conference and keep in mind we committed this
year, it doesn't mean that we go back. because it's organized unconference
style. The fact that we're not quite sure what's going to happen is we're
the same situation as well. but privacy has been so Seth Doss the CEO of WC
part in a panel organized by the open wed foundation on the side of the
Davos conference back in January. That's where this idea of doing this
Geneva conference came from and Seth was the only one who mentioned privacy
during that panel and that kind of raised some alarms in our mind.

Philippe Le Hégaret: we see a lot of government going into that space and
they're rushing into it and we're kind of like hold on do you realize what
you're doing in terms and deploying that on the web as well you could be
creating a surveillance states from facilitating the work of all of those
scammers all around the world as well on that so the threat modeling is
very important for us. That's why we're doing a dedicated session to that
and Simony is going to be there. He's the one organizing it. you're welcome
to reach out to him if you want to participate and in the organization of
the session. By the way, Tara Wen the privacy lead is also going to be
there.

Brent Zundel: Hey, Cle.

Philippe Le Hégaret: As well, we are very afraid of what's going to happen
on private related to privacy and the web.
01:00:00

Kaliya Identity Woman: Hi there. I of course agree with all the concerns
about privacy. On the other hand, I think those of us who are working in
the space need to run faster, communicate better because there are bigger
threats than those things. Someone just sent to me the cover of Time
magazine this week is World's Orb and we can quote unquote be more
cautious. I think we have been cautious and we need to figure out how we
communicate better about what we are doing to solve the problems that are
surfacing around AI and humanness and stuff.

Brent Zundel: Amen Yeah,…

Harrison Tang: All Any other questions or comments? All right. Thank you.
Thanks, Brent for leading a great conversation and thanks everyone for
adding your comments. this is definitely an interesting discussion.

Brent Zundel: it's good to be here.

Harrison Tang: All right, we're at time.

Brent Zundel: Thanks everybody.

Harrison Tang: So this concludes this week's CCG meeting. Thanks a lot.
Meeting ended after 01:01:57 👋

*This editable transcript was computer generated and might contain errors.
People can also change the text after it was created.*

Received on Tuesday, 27 May 2025 22:05:42 UTC