269269 < p >
270270[=Credentials=] are integral to our daily lives: driver's licenses confirm
271271our capability to operate motor vehicles; university degrees assert our level
272- of education; and government-issued passports attest to our citizenship when
272+ of education; and government-issued passports attest to our citizenship when
273273traveling between countries. This specification provides a mechanism for
274- expressing these sorts of [=credentials=] on the Web in a way that is
274+ expressing these sorts of [=credentials=] on the Web in a way that is
275275cryptographically secure, privacy respecting, and machine verifiable. These
276276[=credentials=] provide benefits to us when used in the physical world, but
277277their use on the Web continues to be elusive.
@@ -307,9 +307,9 @@ <h2>Introduction</h2>
307307 < p >
308308[=Credentials=] are integral to our daily lives: driver's licenses confirm
309309our capability to operate motor vehicles; university degrees assert our level
310- of education; and government-issued passports attest to our citizenship when
310+ of education; and government-issued passports attest to our citizenship when
311311traveling between countries. This specification provides a mechanism for
312- expressing these sorts of [=credentials=] on the Web in a way that is
312+ expressing these sorts of [=credentials=] on the Web in a way that is
313313cryptographically secure, privacy respecting, and machine verifiable. These
314314[=credentials=] provide benefits to us when used in the physical world, but
315315their use on the Web continues to be elusive.
@@ -5548,7 +5548,7 @@ <h3>Patterns of Use</h3>
55485548[=subject=] across multiple [=presentations=] or [=verifiers=]. Even
55495549when different [=credentials=] are presented, if the [=subject=]
55505550identifier is the same, [=verifiers=] (and those with access to
5551- [=verifier=] logs) could infer that the [=credentials'=] [=subjects=]
5551+ [=verifier=] logs) could infer that the [=credentials=]' [=subjects=]
55525552are the same entity.
55535553 </ li >
55545554 < li >
@@ -5562,12 +5562,11 @@ <h3>Patterns of Use</h3>
55625562established profile. For more information, see [[DEMOGRAPHICS]].
55635563 </ li >
55645564 < li >
5565- Passing the identifier of a [=credential=] to a centralized revocation
5566- server. The centralized server can correlate the [=credential's=] use across
5567- interactions. For example, if a [=credential=] is used to prove age in
5568- this manner, the centralized service could know everywhere that
5569- [=credential=] was presented (all liquor stores, bars, adult stores,
5570- lottery sellers, and so on).
5565+ Passing the identifier of a [=credential=] to a centralized revocation server.
5566+ The centralized server can correlate the [=credential|credential's=] use across
5567+ interactions. For example, if a [=credential=] is used to prove age in this
5568+ manner, the centralized service could know everywhere that [=credential=] was
5569+ presented (all liquor stores, bars, adult stores, lottery sellers, and so on).
55715570 </ li >
55725571 </ ul >
55735572
@@ -5740,7 +5739,7 @@ <h3>Data Theft</h3>
57405739 < h3 > Frequency of Claim Issuance</ h3 >
57415740
57425741 < p >
5743- As detailed in Section [[[#usage- patterns]]], patterns of use can be
5742+ As detailed in Section [[[#patterns-of-use ]]], patterns of use can be
57445743correlated with certain types of behavior. This correlation is partially
57455744mitigated when a [=holder=] uses a [=verifiable credential=] without the
57465745knowledge of the [=issuer=]. [=Issuers=] can defeat this protection
@@ -5951,7 +5950,7 @@ <h3>Content Integrity Protection</h3>
59515950 < p >
59525951Implementers are urged to understand how links to external machine-readable
59535952content that are not content-integrity protected could result in successful
5954- attacks against their applications, and utilize the content integrity
5953+ attacks against their applications, and utilize the content integrity
59555954protection mechanism provided by this specification if a security issue could
59565955occur if the external resource is changed.
59575956 </ p >
@@ -6112,7 +6111,7 @@ <h3>Device Theft and Impersonation</h3>
61126111 </ ul >
61136112
61146113 < p >
6115- Furthermore, instances of impersonation can manifest in various forms,
6114+ Furthermore, instances of impersonation can manifest in various forms,
61166115including situations where an [=entity=] attempts to disavow their actions.
61176116Elevating the level of trust and security within the realm of [=verifiable
61186117credentials=] entails more than just averting impersonation; it involves the
@@ -6210,7 +6209,7 @@ <h3>Code Injection</h3>
62106209processing language and base direction information.
62116210 </ li >
62126211 < li >
6213- It increases the security attack surface when utilizing this data model,
6212+ It increases the security attack surface when utilizing this data model,
62146213because naively processing HTML could result in the execution of a `script`
62156214tag that an attacker injected at some point during the data production process.
62166215 </ li >
@@ -7124,7 +7123,7 @@ <h3>Differences between Contexts, Types, and CredentialSchemas</h3>
71247123 < p >
71257124While it is possible to use some [[JSON-LD11]] features to allude to the
71267125contents of the [=verifiable credential=], it's not generally suggested to use
7127- `@context` to constrain the data types of the data model. For example,
7126+ `@context` to constrain the data types of the data model. For example,
71287127`"@type": "@json"` is useful for leaving the semantics open-ended and not
71297128strictly defined. This can be dangerous if the implementer is looking to
71307129constrain the data type of the claims in the [=credential=], and is expected
0 commit comments