In IDunion we develop concepts for wallet security with verifiable credentials. In the PDF below, you will learn about the three pillars of wallet security, the attestation process and trust model, and much more.
The three pillars of wallet security are:
1. Integrity of the Credential
2. Authenticity of the Holder
3. Authenticity of the Wallet
These pillars are important because they ensure that the credentials issued by an issuer are secure and cannot be tampered with, that the holder is who they claim to be and can prove it, and that the wallet itself is authentic and trustworthy. By maintaining these three pillars, trust can be established in the SSI triangle between the verifier, issuer, and holder/wallet.
More security-relevant use cases demand new requirements for trust in the holder/wallet relationship. One example of such a use case could be a situation where a holder is required to present their credentials to access sensitive information or perform a critical action, such as accessing medical records or transferring large sums of money.
In these cases, it is important to ensure that the holder’s authentication is strong enough to meet the requirements of the regulated use case and that their wallet is authentic and trustworthy.
This document was created by Paul Bastian from Bundesdruckerei in the context of developing a secure attestation service based on OpenID4VC flows. This flow was tested and presented at the Internet Identity Workshop with the Lissi Wallet.