II. Frequently Asked Questions (DIDs)

  1. What are Decentralized Identifiers (DIDs)?
    • DIDs are globally unique identifiers that allow an entity to control its digital identity without the need for a central authority. They facilitate a more secure and private web.
  2. How is a DID structured?
    • A DID is composed of three main parts: the schema (always did:), the DID method (indicating the specific technology or protocol used), and the unique identifier of the DID.
  3. What is a DID Document?
    • It is a JSON document containing the information associated with a specific DID, including public keys, services and other metadata necessary for secure interaction in digital environments.
  4. What are the fundamental principles of DIDs?
    • DIDs are based on principles of decentralization, interoperability, security through cryptographic proofs and user control over their own identity.
  5. How do DIDs work for authentication and identity verification?
    • DIDs enable identity verification through the use of cryptographic technology and distributed registries, eliminating the need for intermediaries in the authentication process.
  6. What are DID methods?
    • DID methods are a set of rules and procedures that define how DIDs are created, resolved and managed within a specific system or technology.
  7. What is the difference between a subject and a controller in the context of DIDs?
    • The subject is the entity identified by the DID, while the controller is the entity with permissions to modify the subject’s DID Document.
  8. What role do resolvers and registries play in the DID ecosystem?
    • Resolvers are tools that allow to obtain the DID Document from a DID, and registries are systems that store and allow the management of DIDs and their associated documents.
  9. How are DIDs created?
    • DIDs are created by using a specific DID method, following the rules and procedures defined for that method, and are usually registered in a distributed registration system such as blockchain.
  10. How is the security and privacy of DIDs ensured?
    • Security is guaranteed through the use of advanced cryptography, and privacy is ensured by allowing users to control what information they share and with whom, using selective data disclosure.
  11. Can DIDs be used by organizations, devices or applications?
    • Yes, DIDs can identify not only individuals, but also organizations, devices and applications, offering a wide range of applications in different contexts.
  12. What are the practical applications of DIDs?
    • DIDs have applications in authentication, digital signature, identity management, permission systems, and in any scenario that requires secure and verifiable identification.
  13. What is the future of DIDs?
    • DIDs are expected to play a crucial role in the development of a more secure and privacy-oriented Internet by promoting the adoption of decentralized digital identities in various sectors.