Audrey Tang

Yeah, I think it’s using a protocol pioneered by IBM, so it’s somewhat similar to verifiable credentials, but it has its own proof system. There was also a transcript in which I talked with IRMA researchers about the details like zero-knowledge proofs and so on. So, it’s all in the transcript.

鍵盤快捷鍵Keyboard shortcuts

j 下一段next speechk 上一段previous speech