# DiDs & VCs

In the world of digital identity, we are moving away from centralized logins (like "Sign in with Google") toward a model where you own your identity. This is powered by two main pillars: Decentralized Identifiers (DIDs) and Verifiable Credentials (VCs).

<a class="button secondary"></a>

Think of it like a digital wallet: DIDs are your permanent, unchangeable address, and VCs are the ID cards you keep inside it.

***

### 1. How the Technology Works

#### Decentralized Identifiers (DIDs)

A DID is a new type of identifier that is globally unique, resolvable with high availability, and cryptographically verifiable. Unlike an email address or a username, it isn't "issued" by a company. You generate it yourself using a private key.

<a class="button secondary"></a>

* No Central Authority: It lives on a distributed ledger (blockchain) or a peer-to-peer network.

  <a class="button secondary"></a>
* Security: It links to a "DID Document" containing public keys that prove you are the owner of that ID.

  <a class="button secondary"></a>

#### Verifiable Credentials (VCs)

A VC is the digital equivalent of a physical document (like a driver's license or a diploma). It is digitally signed by an issuer so that any third party can verify its authenticity without having to call the issuer directly.

<a class="button secondary"></a><a class="button secondary"></a>

#### The Trust Triangle

This ecosystem relies on three specific roles:

1. The Issuer: An entity (like a University) that signs a VC and gives it to the Holder.

   <a class="button secondary"></a>
2. The Holder: You. You store the VC in your digital wallet.

   <a class="button secondary"></a>
3. The Verifier: An entity (like a potential employer) that needs to check your credentials. They use the DID on the blockchain to verify the Issuer's signature.

   <a class="button secondary"></a>

***

### 2. Use Cases

The power of DIDs and VCs lies in Privacy and Interoperability. Here is how different sectors use them:

#### Governments and Public Services

* Digital Passports/IDs: Citizens can store a government-signed VC on their phone. When entering a bar, they can share a "Proof of Age" VC that confirms they are over 18 without revealing their exact birthdate or home address.
* Benefits Distribution: Reducing fraud in social security by ensuring the person claiming the benefit is the verified holder of the digital identity.

  <a class="button secondary"></a>
* Tax Filing: Securely linking various income VCs from different employers directly to a tax portal.

#### Private Companies

* Streamlined Onboarding (KYC): Banks can verify a customer's identity in seconds if the customer provides a VC issued by a trusted government or another bank.

  <a class="button secondary"></a>
* Supply Chain Tracking: A company can prove a product is "Organic" or "Fair Trade" by attaching a VC signed by a certifying body to the product’s digital twin.

  <a class="button secondary"></a>
* Corporate Access: Employees use DIDs to access secure buildings or servers, eliminating the need for vulnerable password databases.

#### For the Individual User

* Passwordless Login: No more "Forgot Password" emails. You "handshake" with a website using your DID.
* Data Sovereignty: You decide exactly which pieces of data to share. If a rental agency asks for proof of income, you share only that specific VC, not your entire bank statement.
* Education & Careers: Carrying a lifelong digital transcript of degrees and certifications that can be instantly verified by any employer worldwide.

***

### Summary Table

| **Feature**  | **Old Model (Centralized)**                  | **New Model (DID/VC)**                    |
| ------------ | -------------------------------------------- | ----------------------------------------- |
| Ownership    | Owned by the platform (Facebook/Google)      | Owned by the individual                   |
| Privacy      | Platforms track your logins                  | No central tracking of usage              |
| Verification | Requires manual checks or API calls          | Instant cryptographic verification        |
| Security     | Central database is a "honeypot" for hackers | Decentralized; no single point of failure |

***

This shift is often called Self-Sovereign Identity (SSI). It’s essentially giving you the "master key" to your digital life.

Would you like me to walk you through a specific technical workflow, such as how a "Zero-Knowledge Proof" allows you to prove your age without revealing your birthday?
