By layering End-to-End Encryption (E2EE) on cloud storage services ourselves, we can ensure that our data is protected from unwanted access, even from the storage services themselves.| Decentralized Identity Foundation - Blog
Guest Blog By Colton Wolkins The DIDComm User Group Meeting is open to anyone interested in using and implementing DIDComm. This is a great place for developers to learn, ask questions, and share experiences! DIDComm (Decentralized Identity Communication) is rapidly becoming a fundamental protocol for secure, private, and interoperable messaging| Decentralized Identity Foundation
How key industries are preparing for eIDAS with DIDComm The successful formal verification of DIDComm paves the way for tremendous DIDComm adoption. To help provide an understanding of this important technology, we’ve outlined some of the industries where DIDComm can play an important role. To learn more about DIDComm,| Decentralized Identity Foundation - Blog