Data Minimisation: Only processes data necessary for verification, avoiding collection of unnecessary attributes.
Selective Disclosure: Verifies only the attributes required for each use case, supporting privacy-preserving credential presentation.
No Credential Storage: Verification results are returned without storing credential contents, eliminating unnecessary data retention.
Complete Audit Trails: Logs verification events without exposing sensitive credential data, meeting compliance requirements while protecting privacy.
User Consent: All verification requires user presentation of credentials through their wallet, maintaining user control over data sharing.
These privacy protections align with GDPR requirements and eIDAS 2.0 principles, ensuring credentials can be verified without creating unnecessary data repositories or exposing sensitive information.