ideally through an aggregation of a number of identity providers (centralized and decentralized) with reliability scores given to each.
ZK-powered ones being the best for privacy.
ideally through an aggregation of a number of identity providers (centralized and decentralized) with reliability scores given to each.
ZK-powered ones being the best for privacy.