diff --git a/index.html b/index.html index f5b26cd..e2db4bf 100644 --- a/index.html +++ b/index.html @@ -626,7 +626,7 @@

Privacy loss (surveillance): if this technology is not designed and implemented properly, it can lead to surveillance by state and non-state actors such as government and private technology providers. For example, centralized or federated models are more prone to these threats, while decentralized models are less so, but it depends on how they are implemented. Therefore, it is necessary to provide privacy-preserving technologies and implement them properly.

-

Note: W3C is handling this issue with a Threat Model.

+

Note: W3C might consider handling this issue with a Threat Model.

2.3. Digital identity management models

With these assumptions, before proceeding, it is important to understand how digital identities are managed and how they have evolved over the years.

Let us start with the example of a person’s identity, and break it down. We had: