II. Frequently Asked Questions (DIDs)
- What are Decentralized Identifiers (DIDs)?
- DIDs are globally unique identifiers that allow an entity to control its digital identity without the need for a central authority. They facilitate a more secure and private web.
- How is a DID structured?
- A DID is composed of three main parts: the schema (always
did:
), the DID method (indicating the specific technology or protocol used), and the unique identifier of the DID.
- A DID is composed of three main parts: the schema (always
- What is a DID Document?
- It is a JSON document containing the information associated with a specific DID, including public keys, services and other metadata necessary for secure interaction in digital environments.
- What are the fundamental principles of DIDs?
- DIDs are based on principles of decentralization, interoperability, security through cryptographic proofs and user control over their own identity.
- How do DIDs work for authentication and identity verification?
- DIDs enable identity verification through the use of cryptographic technology and distributed registries, eliminating the need for intermediaries in the authentication process.
- What are DID methods?
- DID methods are a set of rules and procedures that define how DIDs are created, resolved and managed within a specific system or technology.
- What is the difference between a subject and a controller in the context of DIDs?
- The subject is the entity identified by the DID, while the controller is the entity with permissions to modify the subject’s DID Document.
- What role do resolvers and registries play in the DID ecosystem?
- Resolvers are tools that allow to obtain the DID Document from a DID, and registries are systems that store and allow the management of DIDs and their associated documents.
- How are DIDs created?
- DIDs are created by using a specific DID method, following the rules and procedures defined for that method, and are usually registered in a distributed registration system such as blockchain.
- How is the security and privacy of DIDs ensured?
- Security is guaranteed through the use of advanced cryptography, and privacy is ensured by allowing users to control what information they share and with whom, using selective data disclosure.
- Can DIDs be used by organizations, devices or applications?
- Yes, DIDs can identify not only individuals, but also organizations, devices and applications, offering a wide range of applications in different contexts.
- What are the practical applications of DIDs?
- DIDs have applications in authentication, digital signature, identity management, permission systems, and in any scenario that requires secure and verifiable identification.
- What is the future of DIDs?
- DIDs are expected to play a crucial role in the development of a more secure and privacy-oriented Internet by promoting the adoption of decentralized digital identities in various sectors.