You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Polygon ID’s identity infrastructure facilitates trusted and secure relationships between apps and users, following the principles of self-sovereign identity and privacy by default. Polygon ID enables organizations on one side to issue verifiable credentials about users, and organizations, on the other side, to verify those claims via a suite of tools created for each member of the SSI ecosystem.
19
+
Privado iD’s identity infrastructure facilitates trusted and secure relationships between apps and users, following the principles of self-sovereign identity and privacy by default. Privado iD enables organizations on one side to issue verifiable credentials about users, and organizations, on the other side, to verify those claims via a suite of tools created for each member of the SSI ecosystem.
24
20
25
-
## Why Polygon ID?
21
+
## Why Privado iD?
26
22
27
-
Polygon ID, with the help of zero-knowledge proofs, lets users prove their identity without the need of exposing their private information. This ensures both the **Freedom of Expression** and **Privacy by Default** (user's identities are secured by zero-knowledge cryptography).
23
+
Privado iD, with the help of zero-knowledge proofs, lets users prove their identity without the need of exposing their private information. This ensures both the **Freedom of Expression** and **Privacy by Default** (user's identities are secured by zero-knowledge cryptography).
28
24
29
-
## Core Concepts of Polygon ID: Verifiable Credentials, Identity Holder, Issuer and Verifier
25
+
## Core Concepts of Privado iD: Verifiable Credentials, Identity Holder, Issuer and Verifier
30
26
31
27
Every identity is identified by a unique identifier called [DID (Decentralized Identifier)](https://www.w3.org/TR/did-core/). Every identity-based information is represented via [Verifiable Credentials (VCs)](https://www.w3.org/TR/vc-data-model/). In the simplest terms, a VC represents any type of information related to an individual/enterprise/object. The VC could be as simple as the age of the entity or the highest degree held by it. It could also be a membership certificate issued by a DAO, for instance.
32
28
33
29
:::note
34
30
35
-
The toolset made available by Polygon ID is fully compliant with the W3C standards. We have a [<ins>definition spec. for the Polygon ID DID method</ins>](https://github.com/0xPolygonID/did-polygonid).
31
+
The toolset made available by Privado iD (prev. Polygon ID) is fully compliant with the W3C standards. We have a [<ins>definition spec. for the Polygon ID DID method</ins>](https://github.com/0xPolygonID/did-polygonid).
36
32
37
33
:::
38
34
39
-
The architecture of the framework is composed of three modules: Identity Holder, Issuer, and Verifier. These three, together, form what we call the **Triangle of Trust**. Let us see what role each entity plays in Polygon ID.
35
+
The architecture of the framework is composed of three modules: Identity Holder, Issuer, and Verifier. These three, together, form what we call the **Triangle of Trust**. Let us see what role each entity plays in Privado iD.
40
36
41
37
1.**Identity Holder**: An entity that holds claims in its [Wallet](./wallet/wallet-overview.md). A VC, as mentioned above, is issued by an Issuer to the Holder. The Identity Holder generates zero-knowledge proofs of the VCs issued and presents these proofs to the Verifier, which verifies that the proof is authentic and matches specific criteria.
42
38
43
39
2.[**Issuer**](./issuer/issuer-overview.md): An entity (person, organization, or thing) that issues VCs to the Holders. VCs are cryptographically signed by the Issuer. Every VC comes from an Issuer.
44
40
45
41
3.[**Verifier**](./verifier/verifier-overview.md): A Verifier verifies the proof presented by a Holder. It requests the Holder to send a proof based on the VCs they hold in their wallet. While verifying a proof, the Verifier performs a set of checks, for example that the VC was signed by the expected Issuer and that the VC matches the criteria requested by the Verifier. This verification process can happen either off-chain or on-chain.
46
42
47
-
The simplest example of a Verifier is a bar that wants to verify if a client is over 18. In the real world, the Identity Holder would need to provide an ID and show all their personal information. With Polygon ID, they only need to pass a proof.
43
+
The simplest example of a Verifier is a bar that wants to verify if a client is over 18. In the real world, the Identity Holder would need to provide an ID and show all their personal information. With Privado iD, they only need to pass a proof.
48
44
49
45
A core concept here is the _trust_ that must exist between a Verifier and an Issuer: the fact that the information contained inside a VC is cryptographically verifiable doesn't guarantee it's true. The Issuer must be a trusted and reputable party so that Verifier can consume the VCs originated by that Issuer.
50
46
@@ -56,22 +52,22 @@ A core concept here is the _trust_ that must exist between a Verifier and an Iss
56
52
57
53
A [Wallet](./wallet/wallet-overview.md) plays a crucial role in the seamless exchange of VCs with the Issuer, on one hand, and proofs with the Verifier, on the other. As stated above, an Identity Holder carries their personal data, in the form of VC, within their wallet. At its core, the wallet stores the private key of a user, fetch VCs from the Issuer, and create zero-knowledge proofs to be presented to the Verifier. Being the carrier of the sensitive information, the Wallet has been designed to ensure that the identity of its Holder is protected and preserved, and no sensitive data can be revealed to the third party without the consent of the Holder.
58
54
59
-
## What Can you Achieve Using Polygon ID?
55
+
## What Can you Achieve Using Privado iD?
60
56
61
57
1.**Privacy using Zero-Knowledge Proofs**: An Identity Holder, using zero-knowledge proofs, can keep thier personal data private. During the process of VC verification, it just needs to show a proof that they are the owner of a VC that matches certain criteria without letting the Verifier know of the actual VC. For example, an Identity Holder can prove to a Verifier authority that they are above 18 years of age by presenting the proof without revealing their actual age. This ensures minimum data exposure and hence confirms the safety of any sensitive data.
62
58
Another aspect of privacy comes from the fact that the Issuer would not be able to track the usage of VCs by an individual once it has been issued.
63
59
64
60
2.**Off-Chain and On-Chain Verification**: Verification of proofs can be done either off-chain or on-chain via Smart Contracts. For example, developers can set up a contract that airdrops tokens only to users that meet certain criteria based on their VCs.
65
61
66
-
3.**Self-Sovereignty**: Polygon ID renders self-sovereignty in the hands of the user. The user is the only custodian of their private keys; user-controlled data can be shared with third parties without taking any permission from the Issuer that has issued the VCs to the user.
62
+
3.**Self-Sovereignty**: Privado iD renders self-sovereignty in the hands of the user. The user is the only custodian of their private keys; user-controlled data can be shared with third parties without taking any permission from the Issuer that has issued the VCs to the user.
67
63
68
64
4.**Transitive Trust**: A transitive trust between the actors of the triangle means that the trust between two entities in one domain or context can be easily extended to other domains or contexts. For instance, the information generated by an Issuer can be conveniently used by more than one Verifier without asking for permission. Along similar lines, an Identity Holder can build up their trust by collecting multiple credentials from different Issuers in one digital wallet.
69
65
70
-
## Polygon ID and Iden3
66
+
## Privado iD and Iden3
71
67
72
-
<ahref="https://iden3.io/"target="_blank">Iden3</a> is the open-source protocol at the basis of Polygon ID. The protocol defines on a low-level how the parties listed above communicate and interact with each other. Polygon ID is an abstraction layer to enable developers to build applications leveraging the Iden3 protocol.
68
+
<ahref="https://iden3.io/"target="_blank">Iden3</a> is the open-source protocol at the basis of Privado iD. The protocol defines on a low-level how the parties listed above communicate and interact with each other. Privado iD is an abstraction layer to enable developers to build applications leveraging the Iden3 protocol.
73
69
74
-
## Further Resources On Polygon ID
70
+
## Further Resources On Privado iD (prev. Polygon ID)
75
71
76
72
-[Polygon University - Courses on Polygon ID](https://university.polygon.technology/polygonid/)
77
73
-[Polygon ID Youtube Playlists](https://www.youtube.com/@0xPolygonTV/playlists?view=50&sort=dd&shelf_id=5)
Copy file name to clipboardExpand all lines: docs/quick-start-demo.md
+7-7
Original file line number
Diff line number
Diff line change
@@ -2,10 +2,10 @@
2
2
id: quick-start-demo
3
3
title: Quick Start Demo
4
4
sidebar_label: Quick Start Demo
5
-
description: A quick demonstration of Polygon ID's main features.
5
+
description: A quick demonstration of Privado iD's main features.
6
6
keywords:
7
7
- docs
8
-
- polygon id
8
+
- privado id
9
9
- ID holder
10
10
- issuer
11
11
- verifier
@@ -16,10 +16,10 @@ keywords:
16
16
17
17
import useBaseUrl from '@docusaurus/useBaseUrl';
18
18
19
-
This tutorial is a quick demonstration of some of Polygon ID's main functionalities. To illustrate how Polygon ID works, we will walk you through some of its products and tools by following along a simple POAP use case.
19
+
This tutorial is a quick demonstration of some of Privado iD's main functionalities. To illustrate how Privado iD works, we will walk you through some of its products and tools by following along a simple POAP use case.
20
20
POAP stands for Proof of Attendance Protocol, which is used to prove that someone has taken part in a given event.
21
21
22
-
This guide will briefly touch on the 3 roles of the [Triangle of Trust](introduction.md#core-concepts-of-polygon-id-verifiable-credentials-identity-holder-issuer-and-verifier), namely the Identity Holder, the Issuer and the Verifier. For that, we will take the case of an individual who needs to prove that they were able to participate in a particular event.
22
+
This guide will briefly touch on the 3 roles of the [Triangle of Trust](introduction.md#core-concepts-of-privado-id-verifiable-credentials-identity-holder-issuer-and-verifier), namely the Identity Holder, the Issuer and the Verifier. For that, we will take the case of an individual who needs to prove that they were able to participate in a particular event.
23
23
24
24
These are the steps we will cover in this article:
25
25
@@ -45,7 +45,7 @@ To get started with the Polygon ID Wallet, download the Polygon ID Wallet App an
45
45
46
46
:::note
47
47
48
-
Polygon ID wallet is an implementation of the Wallet SDK, as a way of showcasing its possibilities. Head to [<ins>the Polygon ID SDK documentation</ins>](./wallet/wallet-sdk/polygonid-sdk/polygonid-sdk-overview.md) to know more about how it works.
48
+
Polygon ID wallet is an implementation of the Wallet SDK, as a way of showcasing its possibilities. Head to [<ins>the Wallet SDK documentation</ins>](./wallet/wallet-sdk/polygonid-sdk/polygonid-sdk-overview.md) to know more about how it works.
49
49
50
50
:::
51
51
@@ -88,7 +88,7 @@ To learn how to set up your own issuer environment by deploying an issuer node,
88
88
89
89
:::info
90
90
91
-
The schema used in this demo was built using the Polygon ID Schema Builder and is available on [<ins>the Polygon ID Schema Explorer</ins>](https://schema-builder.polygonid.me/schemas/1fa99457-b2ae-4884-ae12-d658bd6abf69). Learn more about creating new schemas on [<ins>the Schema Builder UI guide</ins>](https://devs.polygonid.com/docs/issuer/schema-builder/).
91
+
The schema used in this demo was built using the Privado iD Schema Builder and is available on [<ins>the Privado iD Schema Explorer</ins>](https://schema-builder.polygonid.me/schemas/1fa99457-b2ae-4884-ae12-d658bd6abf69). Learn more about creating new schemas on [<ins>the Schema Builder UI guide</ins>](https://devs.polygonid.com/docs/issuer/schema-builder/).
92
92
93
93
:::
94
94
@@ -200,6 +200,6 @@ Here are the steps to verify the credential:
200
200
201
201
:::info
202
202
203
-
This was a quick demonstration of Polygon ID's basic functionalities. However, Polygon ID is far more complex than this. It offers a range of SSI-focused tools that allow for decentralized identity and verifiable credentials management.
203
+
This was a quick demonstration of Privado iD's basic functionalities. However, Privado iD is far more complex than this. It offers a range of SSI-focused tools that allow for decentralized identity and verifiable credentials management.
0 commit comments