Updated December 2021 to also demonstrate a step-by-step use case.
As developer communities began implementing Verifiable Credentials over secure connections, they recognized this new model could underpin an entire layer of Internet-scale digital trust.
As is usually the case, their initial efforts focused primarily on proving the technology side of things.
However, as these technical solutions started bearing fruit, customers began coming to the table looking for real-world solutions.
That’s when attention turned to the “other half” of the stack—the practical governance and policy questions that must be answered in order to drive business, legal, and social acceptance.
The result is the ToIP dual stack, which you can access and interact with below. The introductory white paper (PDF) also has more background and detail on the model.