Completed
- How to backup and recover if lose wallet
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Understanding and Using Verifiable Credentials
Automatically move to the next video in the Classroom when playback concludes
- 1 - Introduction
- 2 - Identity in the real world
- 3 - Identity with centralized identity
- 4 - Challenges today
- 5 - Me as my own identity provider
- 6 - Attestations from an issuer
- 7 - Trusts
- 8 - The need for proof
- 9 - How we prove things with computers
- 10 - How to know it’s the right public key for an entity
- 11 - Decentralized identifier DID
- 12 - Requirements for a DID
- 13 - Associating DID to public key
- 14 - Solution
- 15 - How do I rotate keys? DID document
- 16 - What is a DID and how is it working
- 17 - Methods
- 18 - What really matters!
- 19 - Why is the DID so ugly
- 20 - Verifiable credentials at last
- 21 - Issuer, holder and verifier all together
- 22 - Lets see this in action
- 23 - Using Microsoft Entra to issue and verify
- 24 - How to backup and recover if lose wallet
- 25 - Why do we care?
- 26 - Some considerations as responsibilities shift
- 27 - Closing thoughts