- From: Manu Sporny <msporny@digitalbazaar.com>
- Date: Mon, 6 Oct 2025 09:19:00 -0400
- To: Jori Lehtinen <lehtinenjori03@gmail.com>
- Cc: public-credentials@w3.org
On Mon, Oct 6, 2025 at 2:53 AM Jori Lehtinen <lehtinenjori03@gmail.com> wrote: > AWA is an open, web-native pseudonymous authentication model Hi Jori, thanks for the work you're doing on AWA and wanting to move the Web toward the future that you mentioned above. There are many of us on this list that are attempting to do the same, so you're in good company. :) > A full description of a possible protocol can be found in the READ ME. (ITS PRETTY DARN GOOD) I read it quickly, so might have missed a few things. It reminds me of the BBS work we're doing with pseudonyms: https://www.w3.org/TR/vc-di-bbs/#credential-bound-pseudonyms What I can't tell from your write up is how the RP (we call it a Verifier) can tell if a state's eID value was used or not. How do you do that in zero knowledge? You also say that the solution can only be used inside a national boundary, which would work against sybil attacks inside the national boundary, but proof of personhood often goes beyond national boundaries -- how do you solve for that? -- manu -- Manu Sporny - https://www.linkedin.com/in/manusporny/ Founder/CEO - Digital Bazaar, Inc. https://www.digitalbazaar.com/
Received on Monday, 6 October 2025 13:19:40 UTC