diff --git a/index.html b/index.html index c9f1283..9e46a4f 100644 --- a/index.html +++ b/index.html @@ -1144,9 +1144,9 @@
JSON-LD context authors are expected to add `digestMultibase` to contexts that will @@ -1277,20 +1277,20 @@
Finally, implementers are also urged to understand that there is a difference -between the revocation time -and expiration time for a -[=verification method=], and the revocation information associated with a -[=verifiable credential=]. The -revocation time and -expiration time for a +between the revocation information associated with a [=verifiable credential=], +and the revocation +and expiration times +for a [=verification method=]. The +revocation and +expiration times for a [=verification method=] are expressed using the `revocation` and `expires` -properties, respectively, and are related to events such as a private key being -compromised or expiring and can provide timing information which might reveal +properties, respectively; are related to events such as a private key being +compromised or expiring; and can provide timing information which might reveal details about a controller such as their security practices or when they might have been compromised. The revocation information for a [=verifiable -credential=] is expressed using the `credentialStatus` property and is related +credential=] is expressed using the `credentialStatus` property; is related to events such as an individual losing the privilege that is granted by the -[=verifiable credential=] and does not provide timing information, which +[=verifiable credential=]; and does not provide timing information, which enhances privacy.
@@ -1428,10 +1428,10 @@Implementations MAY load application-specific JSON-LD context files from the network during development, but SHOULD permanently cache JSON-LD context files -used in [=conforming secured documents=] in production settings to increase -their security and privacy characteristics. Caching goals MAY be achieved -through approaches such as those described above or functionally equivalent -mechanisms. +used by [=conforming secured documents=] in production settings, to increase +their security and privacy characteristics. Goals of processing speed MAY be +achieved through caching approaches such as those described above or +functionally equivalent mechanisms.
Some applications, such as digital wallets, that are capable of holding arbitrary @@ -2699,7 +2699,7 @@
-The process for verification relationship validation is outlined in +The process of validating a verification relationship is outlined in Section 3.3 Retrieve Verification Method of the [[[CONTROLLER-DOCUMENT]]]