- From: <meetings@w3c-ccg.org>
- Date: Wed, 17 Sep 2025 15:04:58 -0700
- To: public-credentials@w3.org
- Message-ID: <CA+ChqYcwix6+kQ+dV9_oz0T3OWptddtL+eGpagvrpWdR1e87WA@mail.gmail.com>
CCG Incubation and Promotion Meeting Summary - 2025-09-17 *Topics Covered:* 1. *W3C Verifiable Credential Working Group Standardization Poll:* A poll to gather community input on prioritization for the VCWG is closing Friday. Results will guide VCWG priorities. 2. *Verifiable Credential Refresh Specification Update:* The specification was updated to align with the latest VCOM spec. Key changes include simplifying manual and automated refresh mechanisms using VCOM interactions and removing redundant features. A refresh credential example will be added to improve DID authentication. The updated spec will be reviewed for promotion to the VCWG. 3. *Verifiable Issuers and Verifiers Specification:* Discussion was hampered by the absence of key attendees (Isaac, David, Dmitri). However, three core use cases were identified: - A trusted directory of vetted entities (Dmitri's use case). - Support for the EU trust service provider model (Isaac and David's use case). - A fully decentralized solution with no central list, relying on verifiable presentations and root-of-trust credentials. 4. *Data Aggregation and Credential Usage:* The potential for data aggregation to inform credential improvement was raised but deemed a separate, potentially high-risk work item due to privacy concerns. The group agreed this topic requires careful consideration to avoid unintended consequences. The dangers of enabling data mining and the need for privacy-preserving solutions were emphasized, illustrated by an example of airline data being sold to government agencies. *Key Points:* - The absence of key attendees significantly limited progress on the Verifiable Issuers and Verifiers specification. - The Verifiable Credential Refresh specification is nearing completion and will be reviewed for promotion. - Three core use cases were identified for the Verifiable Issuers and Verifiers specification, requiring further discussion and development of minimum viable examples. - Data aggregation for credential usage improvement was identified as a high-risk but potentially valuable area requiring a separate work item focused on privacy-preserving methodologies. - The meeting highlighted the importance of prioritizing privacy and avoiding data mining practices. Text: https://meet.w3c-ccg.org/archives/w3c-ccg-ccg-incubation-and-promotion-2025-09-17.md Video: https://meet.w3c-ccg.org/archives/w3c-ccg-ccg-incubation-and-promotion-2025-09-17.mp4 *CCG Incubation and Promotion - 2025/09/17 10:59 EDT - Transcript* *Attendees* Benjamin Young, Dave Longley, Denken Chen, Dmitri Zagidulin, Hiroyuki Sano, John's Notetaker, Kayode Ezike, Manu Sporny, Phillip Long, Ted Thibodeau Jr *Transcript* Manu Sporny: All right. Hey everyone, let's go ahead and get started. David Chadwick sent his regrets for today, which is unfortunate because we really do need to talk about the core, use cases and objections that he has, to the current direction. it would also be good if we had Dimmitri here because Dimmitri also has some ideas about what he would like us to focus on, with the verifiable issuers verifiers specification. So, it sounds like we're probably not going to have two of the core people that we need here to move the discussion forward today. Manu Sporny: so in the meantime we can give everyone kind of an update on the polls. there is other work that was done on the credential refresh specification so we can review some of those changes. and then we might need to end early because we don't have Isaac David nor Dimmitri So, that's our agenda for today. Are there any updates or changes to the agenda? Anything else we want to discuss? All right. let's go ahead and jump in. just a reminder that there is a poll for the W3C verifiable credential working group standardization. Manu Sporny: so the items that we're incubating and promoting in this group are going to go over to the VCWG. and we're trying to get as much input from the community as we can for what we should be focusing on over the next couple of jeez what is going on here? not that. Yeah, there we go. Sorry, I'm trying to get the link here and share it in the channel. so the incubation and prioritization work, polls out there. We are going to close the poll this Friday. so if you or someone has not responded to the poll yet, please do let them know. we would really like as much feedback as possible here. Manu Sporny: I did send private requests out to everyone that I could think of in the CCG and the verifiable credential working group as well as other standards bodies in the retail sector, the vital records sector to provide input if they haven't already. okay, so I think that is it for any questions or comments on the poll? We basically closing it as of the close of business Friday and then we will report out the results to everyone and that will set the priorities for the verifiable credential working group. Okay. 00:05:00 Manu Sporny: up on the agenda is a quick update on verifiable credential refresh. so this is one of the items that we're incubating. It's this one down here. We really haven't put too much effort into it. it needed to be updated to match kind of the latest in the VCOM spec and other things like that. I was able to do some work on it this past weekend. it still needs another pass, but it's in much better shape now. I would suggest it's probably a review or two from other people away from being able to say we're ready to promote it. Manu Sporny: so I'm just going to go through kind of some of the updates on the call today and then see if we have any concerns, feedback, anything of that nature. okay. before I do this, can someone ping Dimmitri and see if he can be on the call today because hopefully he can make it. thank you Dave. so we'll go through this and if Dimmitri is not here, we'll just need to end the call early. verifiable credential refresh. this is what you do if your credential expires. there are two main ways that we had ways to engage on a refresh that we had discussed previously. One of them is to do a manual refresh. Manu Sporny: So basically you get a credential and that credential in it says here's the refresh service and when you go to the refresh service they require you as a human being to engage in some way filling out some information some form logging in doing authentication something like that that would then result in a new verifiable credential being issued to you. So that one is a human in the loop use case and then we also have an automated use case where you have a refresh service and the refresh service says here's a place you can refresh but it's an automated mechanism so your digital wallet can take care of the refresh behind the scenes without having to bug you. Manu Sporny: So let's say your credential for whatever reason expires every 6 months or every year your digital wallet could in the background go and fetch a new credential without having to bother you if there is an automated refresh way of doing that. For example, one way is through the COM mechanism the issuer would ask you to DID authentication first for the credential you currently provide the current credential that's expiring over BC API. Manu Sporny: And then if you do both of those things, there might be a business rule where the issuer goes, okay, here's a new version of that credential. and that could all happen behind the scenes without you having to engage unless you configure your software to not do that. so those are the two main use cases, manual automated refresh. and we hadn't updated the specification in a long time. we have some new features in the BCOM specification which allows us to do a refresh pretty easily. The data model is pretty straightforward. you use the refresh service in the verifiable cred 20 data model. the object has a type. Right now we've just verifiable credential interaction service. Manu Sporny: So this is an interaction that you can do to refresh the service endpoints provided. so this kind of follow the did service endpoints approach and their validity dates when is the refresh service valid from invalid So you can basically say for example for a credential that lasts a year maybe the refresh service is only active in the last 3 months of that year. you really don't want people like hitting and trying to refresh the credential until you're 3 months away from expiration. so that's what valid from invalid until are for. the way it would be expressed is just like so this is an example of a bachelor's degree which for whatever reason expires every 10 years or so. They want you to come back and just refresh a new one. 00:10:00 Manu Sporny: Maybe they change the look and feel of it. Maybe they, do do something or another on it, but you can have your wallet just automatically refresh it. Or maybe manually, they want to hit you up for a donation to the university or something before you refresh your credential. Those are all examples of reasons they might make it manual instead of the automatic refresh is kind of the same thing. in fact it's so similar that we might just get rid of we might just boil this down to one example. because we now have interactions in the VCOM spec it allows the issuer to dynamically decide whether to do manual or automatic. They can start off with manual change to automatic if something changes with that particular individual or the particular type of credential. Manu Sporny: so this has given us a lot of flexibility that we didn't have before which is really nice. made the whole thing much simpler. The refresh protocol is a pretty tip normal meaning most refresh procedures are pretty straightforward. It's either the wallet it reaches out once it needs to refresh it's told whether or not where it needs to go. Manu Sporny: the wallet goes there retrieves some information and at that point the wallet then has to either do the refresh automatically or the wallet's told nope sorry you've got to involve the person in the refresh there's some manual process that they've got to do here so that's effectively the back and forth we do need to update the diagram I probably need to upgrade it to use respect mermaid so that's one of the updates that needs to be done there and then Manu Sporny: for a manual this is wrong right now, so I'm going to skip it. the initial post is incorrect, so I need to go and rework that. But basically, the wallet reaches out to The issuer provides the VPR. This one's an automatic refresh. It asks for did authentication. s the example It understands the ECDSA crypto suite. And so the response will have DID authentication assertion and then the query by example is we need your university degree credential as well. So please provide that provides a challenge provides a domain and provides an interact response. But I think Dave Longley we're getting rid of this. Is that right? Dave Longley: If there's not a good use case for it, I think it has been replaced entirely by the redirect possibility that you can send at the end of an exchange. So by sending an interact object sort of in the middle of an exchange, it's unclear, whether or not you would go take it and use it somewhere or what you would, when you would use this. the exchange protocol has changed over time since the interact object was created where you can transmit multiple messages back and forth until the exchange ends. And if you need to go somewhere else at the end of the exchange either party can send a redirect URL and the redirect URL could be to anywhere and it can also be an interaction again taking you to yet another interaction. Dave Longley: So, I don't think we need that property anymore. Manu Sporny: Okay. … Manu Sporny: So, I can remove that and then of course this gets changed back to BC API based on the call we had yesterday. so VPR is sent and then a verifiable presentation is responded with. one I forget for did off if This one doesn't have a D off in it. There need to be two credentials here. One of them is the actual bachelor's degree and the other one's a did off. we do have some weirdness here where this is effectively that's happening here. I don't know if we need to figure out if for the authentication protocol this is in the VCOM specification if this is acceptable as a did off or you need to be more explicit. 00:15:00 Manu Sporny: and then once they do the did off and the presentation a verifiable presentation is sent back to the holder with the new university degree credential. So that thing's been refreshed at this point. and then the validity period has been updated to extend another 10 years. and that's it. pretty straightforward specification. Let me see if there are any questions Any questions, concerns? Go ahead, Dave. Dave Longley: The one thing I'll bring up is that there had been discussion around an alternative approach where either could be used by an issuer where a refresh credential could be created so that it could be used for any number of different credentials that might not include refresh services themselves. Dave Longley: And we could do that in the working group or we could have an example of that in this spec for something to work on when it hits the working group. Manu Sporny: We should probably put it in before it goes into the working group. Manu Sporny: Let me add an issue actually. Dave Longley: And that is another place where the a can be put to help did off problem you were mentioning. Dave Longley: As long as you always have that refresh credential, you could did off, put a D in that refresh credential and then perform D O using it and… Dave Longley: any other credential that the issue would be willing to refresh for you. Manu Sporny: So add refresh credential example to data model. Manu Sporny: Discussed the possibility of a re f that lists one or more credentials that could be refreshed provided the service. that would not go into the fresh service end point. Manu Sporny: go ahead and create that. we don't have any of the effort stuff on this repo. So, I'll try to process that and get that into the spec. Any other questions, comments on the spec. All right. So, we will I also forgot I added the conformance glasses, too. So, please do take a look at the spec. Manu Sporny: we will probably ask next week after this other stuff's in there whether or not we're ready to promote this to the VCWG. so if you have any comments or concerns or issues, please raise them before next week. okay, that's it for the verifiable credential refresh spec. the next item up is the verifiable issuers and verifiers list or specification. we really do need Isaac and David or Dimmitri here for this conversation because Dimmitri's got a set of use cases that we need to discuss. 00:20:00 Manu Sporny: David's got a set of objections that we need to discuss and we need Isaac's input as well since he's provided input on this. okay. and we're not going to have that discussion today because they're not here. but to point out kind of the issues we're having now. I think the core of the issue right now is that we were unable to merge this David's insisting that we use the current data model. I think the concern is that the current data model does not fit the fully decentralized use case very well. it sounds like we have three different core use cases at this point. I didn't during the last call hear any objections that those are all three valid use cases. Manu Sporny: As I understand it one Dmitri has a use case where he wants to just list known entities in the coem. so basically entities that have been identity proofed to some degree. So for example, a list of all the universities in the United States including their URLs their ds a variety of things like that. So it's just kind of a kybad list of entities. Manu Sporny: Go ahead Dave. Dave Longley: I want to say it's not necessarily even KYC,… Dave Longley: but How you get into the trusted directory might be an open thing for different ecosystems, but it's a mapping of identifier like it did to information about that entity. Dave Longley: And that's especially useful for displaying information about entities in digital wallets and so on. So, I think he's looking for a trusted directory. Manu Sporny: Plus one. Manu Sporny: So, let's say that's the trusted directory use case. the second one is the one that Isaac and David seem to be most interested in which is to effectively support the trust service provider model in the European Union. so there is this standard out there Isaac has done some work on it as well with David. Manu Sporny: it's based on train which basically says here are the trust service providers in the EU this is what they're trusted to provide these are legal agreements associated with how they operate these are the things that they can issue these are things that they're certified to issue all that kind of stuff so it's kind of a very detailed directory or not it's a very detailed list of which entities are trusted to authorize rise other entities to issue credentials. go ahead Dave. Dave Longley: And I want to say there might be some synergy between those two use cases where you could have an entry in your trusted directory that says that this particular entity is a trust service provider and then use the data model that Dave is talking about to describe that portion of that entity. Dave Longley: So there's good ways to put those things together where you can have the trusted directory independently of that. But if you wanted to augment information about any given entity, you could use the trust service provider data model if it was applicable for that entity. Manu Sporny: Yep. Bless one to that. Manu Sporny: So there is some overlap there. Manu Sporny: Certainly. Go ahead, Ted. Ted Thibodeau Jr: Yeah, I think terminology should be avoided about authorizing entities to issue credentials. Ted Thibodeau Jr: Rather, it's an ement of not even validity, the endorsement that this issuer of credentials is authoritative just isn't the right word. Manu Sporny: Yeah. Dave Longley: I think it's one party is saying that they would be willing to accept credentials for credentials and… Dave Longley: and specifically these claims made by these parties. So I think you're just making that assertion. You're saying if you saw these claims made by these parties, I'd be willing to accept those. Ted Thibodeau Jr: Yeah. Wait, wait. Dave Longley: And that is what is on offer. It's not saying these are the parties that are authoritative to say these things in the world. That's what we don't want. Manu Sporny: Yeah, plus one. Manu Sporny: I think that sensitivity is definitely strong among a subset of us. I do think that there's a cultural misalignment here, meaning that it really is authoritative to issue in the EU. it is very heavy-handed, right? is and I think that's making some of us a little nervous because I don't think we're wanting that level of authoritiveness to necessarily follow with the third use case which we haven't talked about just yet. remember that it's also verifiers. 00:25:00 Manu Sporny: So in the EU' basically there are authorized verifiers for national IDs and if you are not on that list you are not supposed to hand over the document to that entity and it legal consequences if you as a digital wallet hand over a credential to someone that is not an authorized verifier of a national ID document for example. so we are going to have to tease this apart, right? … Manu Sporny: but go ahead, Dave. Dave Longley: Yeah, I think with the model and… Dave Longley: design that we're suggesting that Ted and I have both I think we're in agreement here allows for that to happen but also allows the other use cases. And if you design it such that what you're describing is I would accept these then a business or… Dave Longley: some group in some ecosystem could all agree to say we're only going to accept whatever this other party says they would accept. And that accomplishes the same thing without putting it into the data model and the design that everything has to take that authoritative approach. But you can do that within the same design. So I think this more decentralized approach covers both cases. Manu Sporny: Mhm. Dave Longley: and we can talk about how to do that in the spec to smooth over any rough edges that people… Dave Longley: who want to say we need to say this is authoritative in our ecosystem you can do that and here's Manu Sporny: Mhm. Yep. Manu Sporny: Plus one of that. T Ted Thibodeau Jr: Yeah, that's exactly the direction that I think we should be going in is enforcing the idea of business logic to accomplish that goal of authoritative issuers… Ted Thibodeau Jr: which is different than and trust is the wrong word again. but I guess that sort of is the right word. Ted Thibodeau Jr: I'm saying I would trust a certificate issued by this entity with these claims in it and… Manu Sporny: Mhm. Ted Thibodeau Jr: then you base your decisions on what I say. That's fine. But it's not that I am making them the authoritative issuer for everybody else in the world. Manu Sporny: Mhm. Ted Thibodeau Jr: It's just I'm saying about what I would do and this is EU entity that is endorsing these issuers is doing All right. Manu Sporny: Yep. Yeah. And so maybe endorsement is a better thing than authority. and then trust is always that slippery slope than that. Everyone has a different definition of trust. Sure. okay. okay. Manu Sporny: so the second use case I think it is coming from something that's making a much stronger statement the EU trust service provider thing and then the third thing is the fully decentralized solution meaning what do we need to do a kind of a fully decentralized solution where there really doesn't need to be a list anywhere but you need to show up with a couple of things. Manu Sporny: Meaning when you go to a verifier the verifier can say it's a bad word but these are my roots of trust give me a credential from one of these roots of trust for any credential that you give me it's got to be rooted back to that root of trust and then I want a university degree yeah so yeah acceptable endorsers or something like that so Manu Sporny: So what actually ends up happening is behind the scenes the wallet can go out and get one of those credentials or look it up or that's out of scope but what the holder hands over or the university degree itself and then something that links the issuer of that university degree to the the acceptable endorser root of trust that the verifier has asked for. And it might go through two hops, whatever. X5 or 9erts do this through certificate chaining. we're trying not to be that hierarchical about this. and so that's the third use case is how fully decentralized. There is no list out there anywhere, but the individual shows up with the things that they need. 00:30:00 Manu Sporny: and this is analogous to the way bitstring status list works in theory and in reality potentially the entity the digital wallet presenting is capable of giving the credential and bitstring status list at the same time So the verifier doesn't need to go out anywhere to get that information. go ahead, Dave. Dave Longley: Yeah, I was going to draw the same analogy and I think that the specification should be clear that the design is such that whoever is going to be presenting these credentials can go out and gather what they need to. They can gather it on a schedule that's appropriate for them and they can do it without leaking who they're going to be sharing that information with. that is a much more privacy preserving way of doing it than some of the alternatives that might be in the ecosystem today that rely on federations where verifiers will hop all around going to different federations asking about someone. And so we want to sort of avoid those little phone homes. and I think this design can do that. Manu Sporny: Yeah, plus one. on that note, it may be that, I want to be careful about how to say this. It may be that federation is the anti-attern we're trying to avoid. because federation by and large is a phone home system. It's, two-party. I know that there's some people that argue that it is possible to configure Open ID Connect so that it doesn't phone home. as evidenced by OID4VP and OID for VCI. but I think largely federation with its constant ping backs to the system of record is fundamentally a phone home system that we're trying to avoid. but I don't know if that's the right way to talk about it without infuriating a bunch of people. go ahead Dave. Dave Longley: Yeah, I don't think there's anything wrong with a federation of acceptable endorsers. it becomes problematic in the way in which it is implemented and how you go about collecting information. So I think it's important that the protocol that's used between amongst a federation for trying to verify VCs when someone's presenting that's where things can get messy and it's important that the presentation protocol can be privacy preserving so people can bring with them and always do bring with them. No one goes and does phone homes. they bring with them what they need to be accepted and they're able to find out what they need to bring to the table to be accepted and all of that can be based on top of the concept of a federation. Dave Longley: we need to be careful though that there we don't build into a protocol that does these phone homes. Manu Sporny: Plus one to that fill. Phillip Long: Yeah, and I've been struggling with this from the higher ed perspective at least because it's very clear that many institutions express the desire to have information about how their credentials are being used or if they're being used and ways in which that information can inform the better construction of that credential or improve the contents or whatever. ever it is. And so that's an aspect of the phone home which is valuable to The question, but obviously it violates the idea that we share that this should not be something that's is done without the permission of the individual. Phillip Long: So the question I guess I have is there a way to present this in a fashion to the individual when verification is sought that does in fact seek permission or at least if not seek permission is there a way of including data in the credential that says for these circumstances I'm okay with the institution seeing the verification that is the issuer seeing the verification Yeah. 00:35:00 Manu Sporny: Yeah, it's excellent question. Dave Longley: Yeah, and that sounds like a useful fourth use case. We were listing use cases. Maybe there's some kind of aggregate credential usage use case that could be explored for how that could be accomplished to meet those goals without harming people's privacy. The end soing. Phillip Long: the extent to which we can do that with giving a default option that can be in there so it can be done quickly without necessarily a decision every time it's verified. Going back to the individual and waiting for them to respond would be helpful. Manu Sporny: Yeah, I'm very concerned that we're wandering right into data mining territory and it is really difficult to design a system that does not fall over, I'm wondering if this is the spec to have that discussion in. Right. I think it feels like a different thing. I mean plus one like Phil I completely get the value and it's coming from a good place where the education institutions want to make sure that they are providing education that is aligned with the needs of the individual. so that statement stands on its own. Manu Sporny: My concern here is that it becomes very easy to accidentally enable massive data collection and data mining even if it's a voluntary thing. People will click through things to get to other things and typically what the entire web has been optimized onto making sure that people click past the things that give away their data. And so e I'm very concerned about even approaching that problem. I think it might be okay for us to tell the education institutions that you should do your discovery in the same way you've been doing it. Manu Sporny: and maybe we have a different work item to figure out how to do good statistical aggregation of data to provide people information. Manu Sporny: It just feels like an immediate lightning rod for ACLU and data mining and whatnot like opening that door while we're just trying to work on the base kind of use cases. Go ahead, Phil. Phillip Long: I completely understand that and… that's why I hesitated to say it. But I also know we just had from the CCG meeting earlier this week, yesterday I guess it was the presentation from the folks from the center for digital public infrastructure and one of the questions they pointed out in their implementation of VCs was that the issuers wanted to know how their VCs were being used the same problem that you're describing which essentially is an endound this decentralization in order to get the kind of data flows they've always had coming to them. Phillip Long: Phillip Long: So I appreciate this and maybe we just need to flag this as an issue even even if we agree that it should not be something that this particular implementation of a verifier issue or process supports and… Phillip Long: and highlights it as a topic that needs its own discussion as you'd mentioned. I do think it's a use case as Dave had said earlier that's important. It may not be the use case for this solution. Thanks. Manu Sporny: Plus one that. Manu Sporny: Go ahead, Dave. Dave Longley: Yeah, I share all those concerns. Having it be a different work item of sorts is a good idea. I want to point out that from the standards group from this ecosystem, if we don't have good people who really care about privacy preserving ways of accomplishing certain goals, then those people will go outside and find other ways to do it. And now some of those goals we might say they shouldn't be accomplished, but I'm sure within all of the goals that people might want to do with data collection, some of those goals are okay and can be done in privacy preserving ways. Other ones are not and not we just shouldn't support that and we don't have to be part of it. Dave Longley: But collecting some of the information in aggregate to better understand how things can be used and so on provided that that can be done in a privacy preserving way seems to be a legitimate goal and if this group maybe it's not in this iteration but I don't know when it is it doesn't say how you can do that probably groups and companies and ecosystems will probably do it in less than optimal ways. because there are other benefits that they can get in places that, it's not helpful in. And so I want to make sure that we don't say we're going to completely walk away from solving any of the legitimate goals providing any guidance to do this in a legitimate privacy preserving way because all that does is put all the incentives on doing it in some other way that violates people's privacy. 00:40:00 Manu Sporny: Yeah, plus one to that. if we don't actively work on a solution, a worse solution will be u put in place. I do want to double down though. I do not think that the verifiable issuers verifiers thing is the place to solve this problem. so I appreciate Phil that you were hesitant to bring it up at all. I think it's a good point, but I do not think we should put it in this spec. I think we should have a separate work item and treat it as the Manu Sporny: potentially radioactive dangerous thing that it is if done incorrectly. I wanted to point out, a recent story that I saw. so I didn't know this, but the airlines operate a data broker and it's jointly owned by the American Airlines, United Delta. and they just got caught selling to the US government, Secret Service, ICE. and they also were specifically caught saying that they did not want to be named as selling this information, to governments. So, this is an example of, this is I think they're a nonprofit. Manu Sporny: They're jointly owned by the airlines and they are selling US citizen data to the government where traditionally governments are not allowed to collect that information on their citizens right so this is the endound that is happening in the US this is 12,800 travel agencies it's 270 carriers if you have flown in the last 5 years your data has been sold multiple times over by this organization and it is not anonymized. It is your full flight details. Right? so this is the kind of thing that can happen when privacy preserving solutions aren't taken and this is specifically in an attempt to avoid any kind of privacy preserving solution. Manu Sporny: So, this kind of bad behavior is going to continue to happen until there's rules and laws and regulations against it. and this is the type of thing that I think is really dangerous for us to enable. I think some of these organizations asking for this data are not trained when it comes to, privacy. and they just have a data problem and they're just trying to solve it. but they don't quite understand the danger to civil liberties that they are creating. Manu Sporny: Okay so enough on that but hopefully that I think what the takeaway here is maybe this is a different work item and if we don't provide a solution we're going to continue to see this type of data broker stuff happening. go ahead, Phil. Phillip Long: And I thought,… Phillip Long: yeah, just to close it out, I agree with this isn't the place to do it. I also think that we at least should say something about it to say that this is a really important slippery slope. It needs its own work item and such. We just need to mention it here so people don't think we just blindly left it off. Manu Sporny: Yeah, agreed. And it might be the best place to put that is the core VC data model spec, right? And privacy security considerations there. Phillip Long: People are going to look for it in here if it's a feature that they can use. So, I don't think it's inappropriate to make at least a reference in here, maybe point back to the VCDM for a deeper explanation of it, but I think they'll look for it here. Manu Sporny: Yep. Okay. Phillip Long: And by this airline thing, ironically, the one place that data hasn't been collected from is third-party booking sites. for whatever reason, the hoppers and things like that did not get involved in selling your data and… Phillip Long: the associated credit card information with it and it's a mystery to me why that was overlooked, but it was. Anyway, thanks Manu Sporny: Yeah. Yeah. Manu Sporny: All right. Good. So, we've basically identified the use cases. Demetri, I see you joined. we just spent the call because we didn't have David nor Isaac nor you. We spent the call just kind of focused on the core use cases. to summarize, your use case is effectively being able to publish a directory of known entities like universities, the identifiers they're associated with, and some information images, names that have been vetted for the purposes of, helping wallets, display them things of that nature. 00:45:00 Manu Sporny: that was Use case two was David and Isaac's use case which kind of builds on top of your use case which is here the known institutions and these are the things that they're allowed to issue known to issue. we tried to figure out some better language other than authorized to issue and whatnot there. And then the third use case is a fully decentralized use case where there is no list published online but a verifier can a say that these are my roots of trust. and then the holder can present a set of credentials that are bound all the way back to the root of trust. Manu Sporny: going from the accrediting or endorsing institution or person down to an endorsement of a particular issuer to the credential itself being kind of presented in a decentralized way. And then finally we talked about a use case about aggregation of data and understanding how credentials are being used. Manu Sporny: but I think decided that that is a separate work item. We'll want to mention it in this specification but doing good differential privacy on who's using what credential where is a useful thing but a highly dangerous and we need to spend a lot of time trying to figure out the best way to do privacy preserving data aggregation of that nature. Manu Sporny: okay those I think are the high level use cases. we can do a PR to add those use cases to the spec. We do have use cases here but they're very old and I don't know if I think what I might do is just add some use cases and then we can decide if we want to keep these use cases or not. so that seems like the use case here. any other comments, concerns? We've got a concrete next step and then we'll meet again next week and try to go through the use cases. Manu Sporny: And once we have the core use cases though I think the next step after that to make sure that we keep making concrete progress is to provide minimum viable examples of each use case. what's the minimum thing that we need to achieve each use case we work on that and then that will inform the data model. rather going top down from train to what we have. I think we're going to try to go bottom up from use cases to data model. I think that is it for the call this week. thank you everyone very much for the discussion today. we will meet again next week to continue this verifiable issuers verifiers thanks Have a wonderful rest of your week and we will chat again next week. Bye. Dmitri Zagidulin: Thanks all. Bye. Meeting ended after 00:49:11 👋 *This editable transcript was computer generated and might contain errors. People can also change the text after it was created.*
Received on Wednesday, 17 September 2025 22:05:08 UTC