You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/02_2_Managing_Claims_Elision.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ disclosure.
6
6
7
7
> **🧠 Related Concepts.** After completing this tutorial, explore
8
8
[Progressive Trust](https://github.com/BlockchainCommons/XID-Quickstart/tree/main/concepts/progressive-trust.md) and
9
-
[Self-Attestation](https://github.com/BlockchainCommons/XID-Quickstart/tree/main/concepts/self-attestation.md) to deepen your
9
+
[Self-Attestation](https://github.com/BlockchainCommons/XID-Quickstart/tree/main/concepts/attestation-endorsement-model.md) to deepen your
10
10
understanding.
11
11
12
12
## Objectives for this Section
@@ -53,7 +53,7 @@ Amira has three options for handling the correlation risk of her crypto audit ex
53
53
54
54
***Option 1: Omit Entirely.** Don't mention it at all. If Amira never needs to prove this experience, keeping it private is the safest choice. There's zero correlation risk from information that isn't published. The downside is that she loses the reputation benefit. If crypto audit experience would help her get accepted onto a security project, omitting it means she can't use it.
55
55
***Option 2: Commit Elided.** Create the attestation and sign it, but publish only an opaque commitment (the digest). The commitment proves that Amira had some claim at a specific time, without revealing what the claim says. Later, she can reveal the full attestation to specific people who can verify that it matches the public commitment. This is the "prove I had it all along" pattern. It's useful when you might need to demonstrate timing without revealing content and also tends to give weight to a claim because it didn't come out of nowhere. This is what we'll cover in this Tutorial.
56
-
***Option 3: Encrypt for Recipient.** Create the attestation and encrypt it for a specific person's public key. Only that person can read it. No public trace at all. This is covered in [Tutorial 05](3-creating-self-attestations.md). It's the right choice when a specific trusted person needs to see the claim now, and you don't need to prove timing to anyone else.
56
+
***Option 3: Encrypt for Recipient.** Create the attestation and encrypt it for a specific person's public key. Only that person can read it. No public trace at all. This is covered in [Tutorial §2.3](02_3_Managing_Claims_Encryption.md). It's the right choice when a specific trusted person needs to see the claim now, and you don't need to prove timing to anyone else.
57
57
58
58
| Situation | Approach |
59
59
|-----------|----------|
@@ -63,7 +63,7 @@ Amira has three options for handling the correlation risk of her crypto audit ex
63
63
64
64
Amira decides her crypto audit experience fits the middle category. She might need to prove this capability to future collaborators, but she doesn't want to publish it broadly. She'll commit an elided version publicly and reveal the full attestation selectively.
65
65
66
-
> :brain:**Learn more**: These three approaches are part of the broader concept of [Selective Disclosure](https://github.com/BlockchainCommons/XID-Quickstart/tree/main/concepts/selective-disclosure.md), which is the ability to reveal different information to different parties from the same underlying data structure.
66
+
> :brain:**Learn more**: These three approaches are part of the broader concept of [Selective Disclosure](https://github.com/BlockchainCommons/XID-Quickstart/tree/main/concepts/data-minimization.md), which is the ability to reveal different information to different parties from the same underlying data structure.
0 commit comments