File tree 1 file changed +13
-0
lines changed 1 file changed +13
-0
lines changed Original file line number Diff line number Diff line change @@ -681,6 +681,19 @@ <h1>Trust Model</h1>
681
681
with various threat models studied by the Working Group are urged to read
682
682
the Verifiable Credentials Use Cases Document [[VC-USECASES]].
683
683
</ p >
684
+
685
+ < p class ="note ">
686
+ Experts may recognize that the data model detailed in this specification
687
+ does not imply a transitive trust model, such as that provided by more
688
+ traditional Certificate Authority trust models. In the Verifiable Credentials
689
+ Data Model, a < a > verifier</ a > either directly trusts an < a > issuer</ a > or it
690
+ does not trust the issuer. While it is possible to build transitive trust
691
+ models using the Verifiable Credentials Data Model, implementers are urged
692
+ to
693
+ < a href ="https://tools.ietf.org/html/draft-housley-web-pki-problems "> learn about the security weaknesses</ a >
694
+ introduced by broadly delegating trust in the manner adopted by
695
+ Certificate Authority systems.
696
+ </ p >
684
697
</ section >
685
698
686
699
< section >
You can’t perform that action at this time.
0 commit comments