{"@context":"https:\/\/schema.org\/","@type":"CollectionPage","@id":"https:\/\/extrimian.io\/es\/categoria\/verifiable-credentials-es\/#CollectionPage","headline":"Verifiable Credentials Category","description":"<p>Comprenda los matices y las aplicaciones de las credenciales verificables en nuestra categor\u00eda espec\u00edfica. Descubra c\u00f3mo se utiliza esta tecnolog\u00eda para mejorar la privacidad, la seguridad y la confianza en las transacciones e interacciones digitales.<\/p>\n","url":"https:\/\/extrimian.io\/es\/categoria\/verifiable-credentials-es\/","hasPart":[{"@type":"BlogPosting","@id":"https:\/\/extrimian.io\/es\/cadena-project-a-idb-and-extrimian-solution\/","headline":"CADENA Project: a IDB and Extrimian solution","url":"https:\/\/extrimian.io\/es\/cadena-project-a-idb-and-extrimian-solution\/","datePublished":"2024-02-06","dateModified":"2024-02-15","mainEntityOfPage":"https:\/\/extrimian.io\/es\/cadena-project-a-idb-and-extrimian-solution\/","author":{"@type":"Person","@id":"https:\/\/extrimian.io\/es\/author\/javier\/#Person","name":"Javier Magdalena","url":"https:\/\/extrimian.io\/es\/author\/javier\/","identifier":12,"image":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/litespeed\/avatar\/8b7532d0d85a82fdb51b9f37ead73cc4.jpg?ver=1777468581","url":"https:\/\/extrimian.io\/wp-content\/litespeed\/avatar\/8b7532d0d85a82fdb51b9f37ead73cc4.jpg?ver=1777468581","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Extrimian","logo":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/05\/Extrimian_Logos_Share_Logo-Extrimian-One-Line-color.png","url":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/05\/Extrimian_Logos_Share_Logo-Extrimian-One-Line-color.png","width":2387,"height":584}},"image":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/02\/CADENA_Project_Innovation_in_Border_Controls_between_IDB_and_Extrimian.png","url":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/02\/CADENA_Project_Innovation_in_Border_Controls_between_IDB_and_Extrimian.png","height":1562,"width":3125},"keywords":["News","Product Announcements","Product Updates"]},{"@type":"BlogPosting","@id":"https:\/\/extrimian.io\/es\/informacion-verificable-los-fundamentos-de-la-identidad-digital-en-web3\/","headline":"Informaci\u00f3n verificable: Los fundamentos de la identidad digital en web3","url":"https:\/\/extrimian.io\/es\/informacion-verificable-los-fundamentos-de-la-identidad-digital-en-web3\/","datePublished":"2024-01-09","dateModified":"2024-06-13","mainEntityOfPage":"https:\/\/extrimian.io\/es\/informacion-verificable-los-fundamentos-de-la-identidad-digital-en-web3\/","author":{"@type":"Person","@id":"https:\/\/extrimian.io\/es\/author\/javier\/#Person","name":"Javier Magdalena","url":"https:\/\/extrimian.io\/es\/author\/javier\/","identifier":12,"image":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/litespeed\/avatar\/8b7532d0d85a82fdb51b9f37ead73cc4.jpg?ver=1777468581","url":"https:\/\/extrimian.io\/wp-content\/litespeed\/avatar\/8b7532d0d85a82fdb51b9f37ead73cc4.jpg?ver=1777468581","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Extrimian","logo":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/05\/Extrimian_Logos_Share_Logo-Extrimian-One-Line-color.png","url":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/05\/Extrimian_Logos_Share_Logo-Extrimian-One-Line-color.png","width":2387,"height":584}},"image":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/01\/Verifiable-Information-Beyond-Identity-in-Web-3.png","url":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/01\/Verifiable-Information-Beyond-Identity-in-Web-3.png","height":1562,"width":3125},"keywords":["Learn | Academy","Web3 Education"]},{"@type":"BlogPosting","@id":"https:\/\/extrimian.io\/es\/renovacion-del-acuerdo-tic-ministerio-de-colombia-y-extrimian\/","headline":"Renovaci\u00f3n del acuerdo: TIC Ministerio de Colombia y Extrimian","url":"https:\/\/extrimian.io\/es\/renovacion-del-acuerdo-tic-ministerio-de-colombia-y-extrimian\/","datePublished":"2023-12-14","dateModified":"2024-06-13","mainEntityOfPage":"https:\/\/extrimian.io\/es\/renovacion-del-acuerdo-tic-ministerio-de-colombia-y-extrimian\/","author":{"@type":"Person","@id":"https:\/\/extrimian.io\/es\/author\/julieta-cura\/#Person","name":"Julieta Cura","url":"https:\/\/extrimian.io\/es\/author\/julieta-cura\/","identifier":2,"description":"Enthusiast of decentralized technologies and specialist in Growth Marketing and Content Marketing at Extrimian.","image":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/litespeed\/avatar\/ed18e4cfaf7da338dfbbe661bf3e56a6.jpg?ver=1777468581","url":"https:\/\/extrimian.io\/wp-content\/litespeed\/avatar\/ed18e4cfaf7da338dfbbe661bf3e56a6.jpg?ver=1777468581","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Extrimian","logo":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/05\/Extrimian_Logos_Share_Logo-Extrimian-One-Line-color.png","url":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/05\/Extrimian_Logos_Share_Logo-Extrimian-One-Line-color.png","width":2387,"height":584}},"image":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/uploads\/2023\/11\/Beyond-password-Online-Authentication-2.png","url":"https:\/\/extrimian.io\/wp-content\/uploads\/2023\/11\/Beyond-password-Online-Authentication-2.png","height":1562,"width":3125},"keywords":["News","Product Announcements","Product Updates"]},{"@type":"BlogPosting","@id":"https:\/\/extrimian.io\/es\/mas-alla-de-las-contrasenas-como-la-identidad-autonoma-redefine-la-autenticacion-en-linea\/","headline":"M\u00e1s all\u00e1 de las contrase\u00f1as: C\u00f3mo la identidad aut\u00f3noma redefine la autenticaci\u00f3n en l\u00ednea","url":"https:\/\/extrimian.io\/es\/mas-alla-de-las-contrasenas-como-la-identidad-autonoma-redefine-la-autenticacion-en-linea\/","datePublished":"2023-12-12","dateModified":"2024-06-13","mainEntityOfPage":"https:\/\/extrimian.io\/es\/mas-alla-de-las-contrasenas-como-la-identidad-autonoma-redefine-la-autenticacion-en-linea\/","author":{"@type":"Person","@id":"https:\/\/extrimian.io\/es\/author\/julieta-cura\/#Person","name":"Julieta Cura","url":"https:\/\/extrimian.io\/es\/author\/julieta-cura\/","identifier":2,"description":"Enthusiast of decentralized technologies and specialist in Growth Marketing and Content Marketing at Extrimian.","image":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/litespeed\/avatar\/ed18e4cfaf7da338dfbbe661bf3e56a6.jpg?ver=1777468581","url":"https:\/\/extrimian.io\/wp-content\/litespeed\/avatar\/ed18e4cfaf7da338dfbbe661bf3e56a6.jpg?ver=1777468581","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Extrimian","logo":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/05\/Extrimian_Logos_Share_Logo-Extrimian-One-Line-color.png","url":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/05\/Extrimian_Logos_Share_Logo-Extrimian-One-Line-color.png","width":2387,"height":584}},"image":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/uploads\/2023\/11\/Beyond-password-Online-Authentication.png","url":"https:\/\/extrimian.io\/wp-content\/uploads\/2023\/11\/Beyond-password-Online-Authentication.png","height":1562,"width":3125},"keywords":["Learn | Academy","Web3 Education"]}]}