Stacked Menu with Dropdown

Replies

@drwalt the Chinese cars weren’t exactly arriving in the years between Tяump 1 and Tяump 2.

Down here in NZ there SEEM to be a lot of BYD - though the actual numbers for the country are relatively low - as high as 7% a few months ago - but typically around 2%. (I am Auckland - which might be why the bias of perception?_

Chinese manufacturers as whole - around 10 to 15 percent - month by month - US manufactures sit in the 5 to 10 percent range.

@todd Dana Blankenhorn is an interesting chap to follow on this topic.

@fromjason essentially - although not a ‘single centralised hub’ - more ‘distributed nodes’ - since nowhere - anywhere - is there - let alone should there be - or could there be - ‘one ring to rule them all’. As a result he has developed an identity protocol to do just that … central to his thesis - the internet is about things - and identity is about people - and you don’t solve identity issues with things - use them yes but a thing doesn’t define you.

Arguably today’s is a kluge - but after research - my only option. Definitely the hardest so far.

@bradenslen what @mizaz just said.

Jax and I THOUGHT we had seem them all - so like Miraz - decided to do a little revisit. We just finished series 6 - which we had never seen - so now we are going to try out series 5.

BUT - the reason I ask is Epsode 1 - Series 6 - which has a SteamPunk theme - loved it … and some of our monocle exchange reminded me of that episode.

@fromjason It is certainly connected - BUT the question is how do you make it ‘Self-sovereign’ …

> Self-sovereign identity (SSI) empowers individuals to control their own digital identities without relying on centralized authorities like governments or tech giants. Users store verifiable credentials in personal digital wallets, sharing only necessary data selectively for privacy and security.

and

> Verifiable credentials are tamper-evident digital documents that prove claims about an identity or qualification, like a digital passport or diploma. They use cryptographic signatures from trusted issuers to enable instant verification without contacting the issuer. These standards, defined by the W3C, support privacy by allowing selective disclosure of information.

My question - which to date remains unanswered is

How do you ‘prove claims about an identity or qualification’ without some kind of ‘central authority’ and/or ‘trusted issuers’?

and

Where can I see this in action - in the wild?

Secondly - what - exactly - is ‘your identity’?

Thirdly if I take your phone - do I assume ‘your identity’?