What is a DID? (3/3)
What is a DID? (3/3) We saw in the first of this series of articles how DIDs could be used to secure user identity data on the Internet and ensure…
What is a DID? (3/3) We saw in the first of this series of articles how DIDs could be used to secure user identity data on the Internet and ensure…
What is a DID? (2/3) In the previous article, we presented different cases of possible uses of DIDs. In this article we will discuss the basic technical characteristics that allow…