Conclusion

All functions in the aggregator can be changed by a decentralized autonomous organization (DAO). The community can vote on protocol upgrade proposals and implement them to the network. For instance, the community can decide which DID verification method is trusted through DAO voting, then the network will recognize this method as trusted. This approach provides a trustable, efficient environment where the users can unquestionably believe that their credentials are effectively verified.

As a whole, the DID Aggregator is a super DID resolver. It allows developers to add DID verification methods and provide decentralized credential service through the network. It also avails itself as a tool to compute deeper level decentralized identity credentials using a combination of the DID resolving methods uploaded by developers. The aggregator is like a docker of trusted DID methods and allows anyone to use the decentralized network validation service to generate trustable credentials for all kinds of application use.

Last updated