From 45aed2ce233e014eeebd9e8903e7f00476eebbf1 Mon Sep 17 00:00:00 2001 From: Coralie Mercier Date: Tue, 6 Aug 2024 12:20:24 +0200 Subject: [PATCH] QA typo --- index.html | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/index.html b/index.html index d625db0..a40e140 100644 --- a/index.html +++ b/index.html @@ -1027,7 +1027,7 @@

Therefore, even in a scenario that may seem trivial, it requires extensive study.

Mitigating the threats at technological and governance levels
-

According to the Trust Over IP Stack, the ecosystem of Decentralized Identities is very broad and combines technological aspects such as Digital Credentials and Wallets - and those of Governancee [introduction-toip].

+

According to the Trust Over IP Stack, the ecosystem of Decentralized Identities is very broad and combines technological aspects such as Digital Credentials and Wallets - and those of Governance [introduction-toip].

Therefore, some threats exist at the technology level and can be managed by SDOs and implementers, but governments must manage others at the governance level. Governments provide the requirements and technology architectures that are then standardized and implemented.

For example, a centralized identity system is prone to surveillance. Conversely, a decentralized system with certain technological features and cryptographic methods can mitigate surveillance and respect human rights.

Other issues are related to digital wallets. On the one hand, it is necessary to balance security and hardware and software requirements that could discriminate. On the other hand, it is important to avoid vendor lock-in and prevent what happened with the Digital Market Act and default browser choice.