Skip to content
A high level look into SSI and the current projects including the EU Data Wallet

A high level look into SSI and the current projects including the EU Data Wallet

  • Home /
  • Blog Posts /
  • A high level look into SSI and the current projects including the EU Data Wallet
Table Of Contents

Why this post

Self-sovereign identity (SSI) and its adjacent ecosystems evolved fast over the last 24 months. This post summarises where the core standards sit, how the European Digital Identity (EUDI) Wallet programme frames the stack, and what’s actually shipping across networks and vendors—using current, primary sources throughout. This post is a bit more technical in nature as implementation gets closer. If you need more details or background please read the deeper dive version of this post.

Where the standards are now

  • W3C VCDM remains the general data model for verifiable credentials. In parallel, selective disclosure JWTs are maturing rapidly in the IETF:
    • The core SD‑JWT draft was submitted to the IESG for publication on 2025‑03‑03, reflecting stability in the design for selective disclosure over JWTs. Source: IETF Datatracker.
    • The SD‑JWT VC draft adds metadata for credential semantics, integrity and rendering (simple and svg_template), and claim path conventions—useful for wallet UX and verifier display. Source: SD‑JWT‑VC draft.

How the EU frames the wallet stack (ARF v2.4.0)

The EUDI Wallet Architecture and Reference Framework (ARF) v2.4.0 profiles multiple credential technologies with clear modality splits:

  • Remote flows use OpenID for Verifiable Presentations (OpenID4VP) and Credential Issuance (OpenID4VCI).
  • Proximity flows profile ISO/IEC 18013‑5/7 (mDL/mdoc) with HAIP.
  • Credentials are profiled around SD‑JWT VC for selective disclosure in the current ARF line.
  • Trust is rooted in PKI-based Trusted Lists and Trust Registries—not blockchains—and qualified e-signatures (QES) are required “by default and free of charge” for legal effects.
  • Revocation is handled via status lists (e.g., W3C StatusList 2021) in ARF contexts, rather than accumulator proofs.

References: EC EUDI implementation pages and the ARF 2.4.0 docs.

Large Scale Pilots: what finished and what’s next

Four initial LSPs—EWC, POTENTIAL, NOBID, and DC4EU—concluded their grant cycles in 2025. Wrap-ups and deliverables confirm end-to-end wallet journeys (PID, attributes, payments, signatures) and offer detailed UX/accessibility findings (for example, NOBID’s multi-country user testing). Two new LSPs are starting next:

  • APTITUDE — mobility, transport, and banking, including travel documents and strong authentication for payments.
  • WE BUILD — business and payments (B2B/B2G/B2C), with emphasis on legal representation and data sharing.

References: EC pages; BiometricUpdate coverage (Sept 2025); NOBID’s final wrap-up post.

Privacy tech in practice: SD‑JWT and AnonCreds

  • SD‑JWT/VC provides selective disclosure with JWT tooling and aligns with ARF remote and rendering guidance.
  • Hyperledger AnonCreds offers advanced ZKP features (blinded issuer signatures, link secret holder binding, predicate proofs, and non‑correlating revocation proofs). It’s ledger‑agnostic today, though note: ARF’s current revocation profile centers on status lists, not accumulator schemes.

References: IETF SD‑JWT(-VC) drafts; Hyperledger AnonCreds spec and wiki.

Networks and registries: Sovrin and ION

  • Sovrin: The Sovrin Foundation announced that MainNet shutdown in March, 2025. Sovrin’s legacy? AnonCreds lives on as an open specification under Hyperledger with ledger‑agnostic implementations. So if you still anchor identifiers or schemas there it is still possible.
  • ION: A permissionless DID network built on Bitcoin via the Sidetree protocol—no new token, no extra consensus—designed for high‑scale DID ops. Useful when you need decentralised identifier anchoring decoupled from PKI trust lists. Sources: DIF ION overview and GitHub.

Vendors and projects: what’s real and recent

  • Microsoft Entra Verified ID: FaceCheck became generally available on 2024‑08‑12; Entra logs also document revocation via status lists and wallet library updates. Source: Entra “What’s New.”
  • Trinsic: Pivoted from general‑purpose VC infra to an Identity Acceptance Network; public materials reference 500M+ pre‑verified user coverage across providers. Sources: Trinsic site and CEO posts.
  • SpruceID: Government‑scale deployments (e.g., California DMV Wallet) and extensive standards work. Sources: SpruceID site and blog.
  • walt.id: Open‑source wallet/identity infrastructure supporting SD‑JWT, W3C VC, OID4VC, HAIP, and multi‑ecosystem plugins. Source: walt.id.
  • Dock ↔ cheqd alliance and token merger: In early 2025 both announced an alliance, with token/blockchain merger plans approved—consolidating SSI capabilities and simplifying integrations. Sources: Dock and cheqd announcements.

Note: Product and capability names move as the ecosystem is fluid as shown by Sovrin closing.

Practical guidance if you’re building now

  1. Choose by context and mandates
  • EU public services and regulated sectors: Follow ARF v2.4.0. Prefer SD‑JWT VC for remote with OpenID4VP/VCI, and ISO 18013‑5/7 + HAIP for proximity. Plan for QES flows and PKI trust lists.
  • Global private sector: SD‑JWT VC and W3C VC JWT are the lowest‑friction options; evaluate mdoc when proximity/offline is required.
  1. Plan for revocation and status
  • Use StatusList 2021 (or equivalent) where ARF-like semantics apply. If you need non‑linkable revocation proofs, scope AnonCreds carefully and consider bridges to status lists for verifier compatibility.
  1. Mitigate linkability early
  • Minimise stable identifiers; prefer per‑interaction DIDs/keys; use SD‑JWT selective disclosure and align with ARF guidance on device/user binding and re‑issuance policies.
  1. Wallet UX is make‑or‑break
  • LSP findings show that flow clarity, assistive tech support, and plain language matter as much as crypto. Budget for usability testing with diverse users.
  1. Avoid brittle dependencies
  • Don’t bind yourself to a single ledger or DID method unless mandated. Prefer registries you can swap and trust anchors you can rotate.

References (selected)

Proof of Process - Self-Sovereign Identity

Proof of Process - Self-Sovereign Identity

Your Digital Fingerprint: How “Proof of Process” Can Revolutionize Self-Sovereign Identity In our increasingly digital world, proving who you are online is a constant, cumbersome battle. We hand over sensitive documents, answer security questions, and rely on centralized authorities to verify our identities – often leading to fragmented data, privacy concerns, and vulnerability to breaches. But what if there was a way to “self-prove” your identity, without constantly exposing your personal data?

Read more
Proof of Process - The unsung hero set to come of age

Proof of Process - The unsung hero set to come of age

Beyond the Hype: Why “Proof of Process” is the Unsung Hero of Trust In the buzzing world of blockchain and decentralized systems, “Proof of Work” (PoW) often steals the spotlight. We hear about its energy consumption, its role in securing Bitcoin, and its fundamental importance in achieving consensus. But what if I told you there’s another “proof” that, while less glamorous, is arguably just as, if not more, critical to building real-world trust and efficiency?

Read more
A detailed look into SSI and the current projects including the EU Data Wallet

A detailed look into SSI and the current projects including the EU Data Wallet

Navigating the Evolving Landscape of Self-Sovereign Identity: From Failures to Future Promises TL;DR Self-sovereign identity (SSI) is advancing but fragmented: Sovrin’s shutdown in 2025 underscores funding and adoption woes, while standards like AnonCreds (zero-knowledge proofs ZKPs for deep privacy) and SD‑JWT (lightweight web disclosure) compete. Projects like cheqd.io, Dock, and ION drive innovation, but interoperability lags. The EU’s EUDI Wallet, rolling out by 2026 with pilots testing cross-border creds, could unify implementations in one user‑controlled app—enabling seamless, consent‑based data sharing and digital sovereignty.

Read more