{"@context":"https:\/\/schema.org\/","@type":"CollectionPage","@id":"https:\/\/extrimian.io\/category\/verifiable-credentials\/#CollectionPage","headline":"Verifiable Credentials Category","description":"<p>Understand the nuances and applications of verifiable credentials in our dedicated category. Learn how this technology is being used to enhance privacy, security, and trust in digital transactions and interactions.<\/p>\n","url":"https:\/\/extrimian.io\/category\/verifiable-credentials\/","hasPart":[{"@type":"BlogPosting","@id":"https:\/\/extrimian.io\/cadena-project-a-idb-and-extrimian-solution\/","headline":"CADENA Project: a IDB and Extrimian solution","url":"https:\/\/extrimian.io\/cadena-project-a-idb-and-extrimian-solution\/","datePublished":"2024-02-06","dateModified":"2024-02-15","mainEntityOfPage":"https:\/\/extrimian.io\/cadena-project-a-idb-and-extrimian-solution\/","author":{"@type":"Person","@id":"https:\/\/extrimian.io\/author\/javier\/#Person","name":"Javier Magdalena","url":"https:\/\/extrimian.io\/author\/javier\/","identifier":12,"image":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/litespeed\/avatar\/8b7532d0d85a82fdb51b9f37ead73cc4.jpg?ver=1777468581","url":"https:\/\/extrimian.io\/wp-content\/litespeed\/avatar\/8b7532d0d85a82fdb51b9f37ead73cc4.jpg?ver=1777468581","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Extrimian","logo":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/05\/Extrimian_Logos_Share_Logo-Extrimian-One-Line-color.png","url":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/05\/Extrimian_Logos_Share_Logo-Extrimian-One-Line-color.png","width":2387,"height":584}},"image":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/02\/CADENA_Project_Innovation_in_Border_Controls_between_IDB_and_Extrimian.png","url":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/02\/CADENA_Project_Innovation_in_Border_Controls_between_IDB_and_Extrimian.png","height":1562,"width":3125},"keywords":["News","Product Announcements","Product Updates"]},{"@type":"BlogPosting","@id":"https:\/\/extrimian.io\/verifiable-data-digital-identity-web3\/","headline":"Verifiable Information: The Fundamentals of Digital Identity on web3","url":"https:\/\/extrimian.io\/verifiable-data-digital-identity-web3\/","datePublished":"2024-01-09","dateModified":"2024-02-15","mainEntityOfPage":"https:\/\/extrimian.io\/verifiable-data-digital-identity-web3\/","author":{"@type":"Person","@id":"https:\/\/extrimian.io\/author\/javier\/#Person","name":"Javier Magdalena","url":"https:\/\/extrimian.io\/author\/javier\/","identifier":12,"image":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/litespeed\/avatar\/8b7532d0d85a82fdb51b9f37ead73cc4.jpg?ver=1777468581","url":"https:\/\/extrimian.io\/wp-content\/litespeed\/avatar\/8b7532d0d85a82fdb51b9f37ead73cc4.jpg?ver=1777468581","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Extrimian","logo":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/05\/Extrimian_Logos_Share_Logo-Extrimian-One-Line-color.png","url":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/05\/Extrimian_Logos_Share_Logo-Extrimian-One-Line-color.png","width":2387,"height":584}},"image":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/01\/Verifiable-Information-Beyond-Identity-in-Web-3.png","url":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/01\/Verifiable-Information-Beyond-Identity-in-Web-3.png","height":1562,"width":3125},"keywords":["Learn | Academy","Web3 Education"]},{"@type":"BlogPosting","@id":"https:\/\/extrimian.io\/renewal-of-agreement-ict-ministry-and-extrimian\/","headline":"Renewal of agreement: TIC Ministry of Colombia and Extrimian","url":"https:\/\/extrimian.io\/renewal-of-agreement-ict-ministry-and-extrimian\/","datePublished":"2023-12-14","dateModified":"2023-12-21","mainEntityOfPage":"https:\/\/extrimian.io\/renewal-of-agreement-ict-ministry-and-extrimian\/","author":{"@type":"Person","@id":"https:\/\/extrimian.io\/author\/julieta-cura\/#Person","name":"Julieta Cura","url":"https:\/\/extrimian.io\/author\/julieta-cura\/","identifier":2,"description":"Enthusiast of decentralized technologies and specialist in Growth Marketing and Content Marketing at Extrimian.","image":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/litespeed\/avatar\/ed18e4cfaf7da338dfbbe661bf3e56a6.jpg?ver=1777468581","url":"https:\/\/extrimian.io\/wp-content\/litespeed\/avatar\/ed18e4cfaf7da338dfbbe661bf3e56a6.jpg?ver=1777468581","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Extrimian","logo":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/05\/Extrimian_Logos_Share_Logo-Extrimian-One-Line-color.png","url":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/05\/Extrimian_Logos_Share_Logo-Extrimian-One-Line-color.png","width":2387,"height":584}},"image":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/uploads\/2023\/11\/Beyond-password-Online-Authentication-2.png","url":"https:\/\/extrimian.io\/wp-content\/uploads\/2023\/11\/Beyond-password-Online-Authentication-2.png","height":1562,"width":3125},"keywords":["News","Product Announcements","Product Updates"]},{"@type":"BlogPosting","@id":"https:\/\/extrimian.io\/beyond-passwords-how-self-sovereign-identity-redefines-online-authentication\/","headline":"Beyond Passwords: How Self-Sovereign Identity Redefines Online Authentication","url":"https:\/\/extrimian.io\/beyond-passwords-how-self-sovereign-identity-redefines-online-authentication\/","datePublished":"2023-12-12","dateModified":"2023-12-12","mainEntityOfPage":"https:\/\/extrimian.io\/beyond-passwords-how-self-sovereign-identity-redefines-online-authentication\/","author":{"@type":"Person","@id":"https:\/\/extrimian.io\/author\/julieta-cura\/#Person","name":"Julieta Cura","url":"https:\/\/extrimian.io\/author\/julieta-cura\/","identifier":2,"description":"Enthusiast of decentralized technologies and specialist in Growth Marketing and Content Marketing at Extrimian.","image":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/litespeed\/avatar\/ed18e4cfaf7da338dfbbe661bf3e56a6.jpg?ver=1777468581","url":"https:\/\/extrimian.io\/wp-content\/litespeed\/avatar\/ed18e4cfaf7da338dfbbe661bf3e56a6.jpg?ver=1777468581","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Extrimian","logo":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/05\/Extrimian_Logos_Share_Logo-Extrimian-One-Line-color.png","url":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/05\/Extrimian_Logos_Share_Logo-Extrimian-One-Line-color.png","width":2387,"height":584}},"image":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/uploads\/2023\/11\/Beyond-password-Online-Authentication.png","url":"https:\/\/extrimian.io\/wp-content\/uploads\/2023\/11\/Beyond-password-Online-Authentication.png","height":1562,"width":3125},"keywords":["Learn | Academy","Web3 Education"]},{"@type":"BlogPosting","@id":"https:\/\/extrimian.io\/what-are-verifiable-credentials-and-how-they-work\/","headline":"What are Verifiable Credentials and how they work","url":"https:\/\/extrimian.io\/what-are-verifiable-credentials-and-how-they-work\/","datePublished":"2023-12-07","dateModified":"2023-12-27","mainEntityOfPage":"https:\/\/extrimian.io\/what-are-verifiable-credentials-and-how-they-work\/","author":{"@type":"Person","@id":"https:\/\/extrimian.io\/author\/julieta-cura\/#Person","name":"Julieta Cura","url":"https:\/\/extrimian.io\/author\/julieta-cura\/","identifier":2,"description":"Enthusiast of decentralized technologies and specialist in Growth Marketing and Content Marketing at Extrimian.","image":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/litespeed\/avatar\/ed18e4cfaf7da338dfbbe661bf3e56a6.jpg?ver=1777468581","url":"https:\/\/extrimian.io\/wp-content\/litespeed\/avatar\/ed18e4cfaf7da338dfbbe661bf3e56a6.jpg?ver=1777468581","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Extrimian","logo":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/05\/Extrimian_Logos_Share_Logo-Extrimian-One-Line-color.png","url":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/05\/Extrimian_Logos_Share_Logo-Extrimian-One-Line-color.png","width":2387,"height":584}},"image":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/uploads\/2023\/11\/What-are-Verifiable-CredentialsWhat-are-Verifiable-Credentials.png","url":"https:\/\/extrimian.io\/wp-content\/uploads\/2023\/11\/What-are-Verifiable-CredentialsWhat-are-Verifiable-Credentials.png","height":1562,"width":3125},"keywords":["Learn | Academy","Web3 Education"]},{"@type":"BlogPosting","@id":"https:\/\/extrimian.io\/regulation-on-digital-identity-and-blockchain-2\/","headline":"Regulation on Digital Identity and Blockchain (2)","url":"https:\/\/extrimian.io\/regulation-on-digital-identity-and-blockchain-2\/","datePublished":"2023-12-07","dateModified":"2023-12-07","mainEntityOfPage":"https:\/\/extrimian.io\/regulation-on-digital-identity-and-blockchain-2\/","author":{"@type":"Person","@id":"https:\/\/extrimian.io\/author\/julieta-cura\/#Person","name":"Julieta Cura","url":"https:\/\/extrimian.io\/author\/julieta-cura\/","identifier":2,"description":"Enthusiast of decentralized technologies and specialist in Growth Marketing and Content Marketing at Extrimian.","image":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/litespeed\/avatar\/ed18e4cfaf7da338dfbbe661bf3e56a6.jpg?ver=1777468581","url":"https:\/\/extrimian.io\/wp-content\/litespeed\/avatar\/ed18e4cfaf7da338dfbbe661bf3e56a6.jpg?ver=1777468581","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Extrimian","logo":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/05\/Extrimian_Logos_Share_Logo-Extrimian-One-Line-color.png","url":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/05\/Extrimian_Logos_Share_Logo-Extrimian-One-Line-color.png","width":2387,"height":584}},"image":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/uploads\/2023\/11\/Regulation-on-Digital-Identity-and-Blockchain_part2.png","url":"https:\/\/extrimian.io\/wp-content\/uploads\/2023\/11\/Regulation-on-Digital-Identity-and-Blockchain_part2.png","height":1562,"width":3125},"keywords":["Learn | Academy","Web3 Education"]},{"@type":"BlogPosting","@id":"https:\/\/extrimian.io\/jack-dorsey-announces-web-5-and-extrimian-has-an-important-role-to-play\/","headline":"Jack Dorsey announces \u2018Web 5\u2019 and Extrimian has an important role to play","url":"https:\/\/extrimian.io\/jack-dorsey-announces-web-5-and-extrimian-has-an-important-role-to-play\/","datePublished":"2023-12-07","dateModified":"2023-12-27","mainEntityOfPage":"https:\/\/extrimian.io\/jack-dorsey-announces-web-5-and-extrimian-has-an-important-role-to-play\/","author":{"@type":"Person","@id":"https:\/\/extrimian.io\/author\/julieta-cura\/#Person","name":"Julieta Cura","url":"https:\/\/extrimian.io\/author\/julieta-cura\/","identifier":2,"description":"Enthusiast of decentralized technologies and specialist in Growth Marketing and Content Marketing at Extrimian.","image":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/litespeed\/avatar\/ed18e4cfaf7da338dfbbe661bf3e56a6.jpg?ver=1777468581","url":"https:\/\/extrimian.io\/wp-content\/litespeed\/avatar\/ed18e4cfaf7da338dfbbe661bf3e56a6.jpg?ver=1777468581","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Extrimian","logo":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/05\/Extrimian_Logos_Share_Logo-Extrimian-One-Line-color.png","url":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/05\/Extrimian_Logos_Share_Logo-Extrimian-One-Line-color.png","width":2387,"height":584}},"image":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/uploads\/2023\/11\/Jack-Dorsey-announces-Web-5.png","url":"https:\/\/extrimian.io\/wp-content\/uploads\/2023\/11\/Jack-Dorsey-announces-Web-5.png","height":1562,"width":3125},"keywords":["Learn | Academy","News","Product Announcements","Web3 Education"]},{"@type":"BlogPosting","@id":"https:\/\/extrimian.io\/what-are-the-main-contributions-of-the-self-sovereign-identity\/","headline":"What are the main contributions of the Self-Sovereign Identity?","url":"https:\/\/extrimian.io\/what-are-the-main-contributions-of-the-self-sovereign-identity\/","datePublished":"2023-12-05","dateModified":"2023-12-05","mainEntityOfPage":"https:\/\/extrimian.io\/what-are-the-main-contributions-of-the-self-sovereign-identity\/","author":{"@type":"Person","@id":"https:\/\/extrimian.io\/author\/julieta-cura\/#Person","name":"Julieta Cura","url":"https:\/\/extrimian.io\/author\/julieta-cura\/","identifier":2,"description":"Enthusiast of decentralized technologies and specialist in Growth Marketing and Content Marketing at Extrimian.","image":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/litespeed\/avatar\/ed18e4cfaf7da338dfbbe661bf3e56a6.jpg?ver=1777468581","url":"https:\/\/extrimian.io\/wp-content\/litespeed\/avatar\/ed18e4cfaf7da338dfbbe661bf3e56a6.jpg?ver=1777468581","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Extrimian","logo":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/05\/Extrimian_Logos_Share_Logo-Extrimian-One-Line-color.png","url":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/05\/Extrimian_Logos_Share_Logo-Extrimian-One-Line-color.png","width":2387,"height":584}},"image":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/uploads\/2023\/11\/Self-Sovereign-Identity.png","url":"https:\/\/extrimian.io\/wp-content\/uploads\/2023\/11\/Self-Sovereign-Identity.png","height":1562,"width":3125},"keywords":["Learn | Academy","Web3 Education"]}]}