
Sign up to save your podcasts
Or
In this live workshop, Agne Caunt (Product Owner, Dock Labs) and Richard Esplin (Head of Product, Dock Labs) guided learners through the foundations of decentralized identity: how digital identity models have evolved, the Trust Triangle that powers verifiable data exchange, and the technologies behind it: from verifiable credentials to DIDs, wallets, and biometric-bound credentials.
(0:00) – Welcome and session overview
(2:50) – How digital identity models evolved
(7:00) – Key benefits of decentralization
(9:35) – From organization-centric to user-centric identity
(12:15) – Understanding the Trust Triangle
(14:30) – Example of Dock Labs’ verifiable credential platform
(19:00) – What can be a verifiable credential
(21:55) – Credential issuance and wallet flow.
(23:15) – Inside the verifiable credential data model
(24:50) – Selective disclosure and zero-knowledge proofs
(27:20) – What are decentralized identifiers (DIDs)
(30:10) – Choosing the right DID method
(31:20) – What is a credential wallet
(38:40) – Common misconceptions about wallets
(40:20) – How biometric-bound credentials work
(42:20) – The blockchain’s role in decentralized identity
(46:15) – Practical exercise: map your trust triangle
(47:10) – Q&A
📚 EXPLORE:
Website - https://www.dock.io/
👨👩👧👧 FOLLOW:
LinkedIn - https://www.linkedin.com/company/docknetwork/
In this live workshop, Agne Caunt (Product Owner, Dock Labs) and Richard Esplin (Head of Product, Dock Labs) guided learners through the foundations of decentralized identity: how digital identity models have evolved, the Trust Triangle that powers verifiable data exchange, and the technologies behind it: from verifiable credentials to DIDs, wallets, and biometric-bound credentials.
(0:00) – Welcome and session overview
(2:50) – How digital identity models evolved
(7:00) – Key benefits of decentralization
(9:35) – From organization-centric to user-centric identity
(12:15) – Understanding the Trust Triangle
(14:30) – Example of Dock Labs’ verifiable credential platform
(19:00) – What can be a verifiable credential
(21:55) – Credential issuance and wallet flow.
(23:15) – Inside the verifiable credential data model
(24:50) – Selective disclosure and zero-knowledge proofs
(27:20) – What are decentralized identifiers (DIDs)
(30:10) – Choosing the right DID method
(31:20) – What is a credential wallet
(38:40) – Common misconceptions about wallets
(40:20) – How biometric-bound credentials work
(42:20) – The blockchain’s role in decentralized identity
(46:15) – Practical exercise: map your trust triangle
(47:10) – Q&A
📚 EXPLORE:
Website - https://www.dock.io/
👨👩👧👧 FOLLOW:
LinkedIn - https://www.linkedin.com/company/docknetwork/