From 32430060d6a29a4bb0fead24f79d45f66e6c33a8 Mon Sep 17 00:00:00 2001 From: Manu Sporny Date: Sun, 3 Oct 2021 21:24:59 -0600 Subject: [PATCH 1/4] Add section on resource usage trade-offs. --- index.html | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) diff --git a/index.html b/index.html index 7998b394..51a71e25 100644 --- a/index.html +++ b/index.html @@ -5026,6 +5026,24 @@

Level of Assurance

href="#privacy-considerations"> is applicable for such extensions.

+ +
+

Resource Usage Trade-offs

+ +

+This specification does not require or suggest the use of any specific type of +verifiable data registry. Different use cases might result in different +requirements. Different requirements might suggest different resource usage +trade-offs. For example, trade-offs between computation (energy usage), trust +(deference to authority), coordination (network bandwidth), or memory (physical +storage) might be appropriate for a certain threat model. Other threat models +might not make the same trade-offs. Those that need to consider resource usage +trade-offs for their threat models are directed to the DID Method Rubric, which provides +evaluation criteria to help decision makers evaluate whether or not a particular +verifiable data registry is appropriate for their use cases. +

+
From 0038960a3d98aad6b75f90516f5caee59c607803 Mon Sep 17 00:00:00 2001 From: Manu Sporny Date: Sun, 3 Oct 2021 21:29:41 -0600 Subject: [PATCH 2/4] Explicitly mark the trade-offs section as informative. --- index.html | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/index.html b/index.html index 51a71e25..22b8c546 100644 --- a/index.html +++ b/index.html @@ -5027,7 +5027,7 @@

Level of Assurance

-
+

Resource Usage Trade-offs

From 253768cfb1ffae44bc7c4268575676348606f544 Mon Sep 17 00:00:00 2001 From: Manu Sporny Date: Mon, 4 Oct 2021 21:51:20 -0600 Subject: [PATCH 3/4] Apply suggestions on competing considerations. Co-authored-by: Joe Andrieu --- index.html | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/index.html b/index.html index 22b8c546..ec263ca4 100644 --- a/index.html +++ b/index.html @@ -5028,20 +5028,20 @@

Level of Assurance

-

Resource Usage Trade-offs

+

Evaluating Competing Considerations

This specification does not require or suggest the use of any specific type of verifiable data registry. Different use cases might result in different -requirements. Different requirements might suggest different resource usage +requirements. Different requirements might suggest different considerations with different trade-offs. For example, trade-offs between computation (energy usage), trust (deference to authority), coordination (network bandwidth), or memory (physical -storage) might be appropriate for a certain threat model. Other threat models -might not make the same trade-offs. Those that need to consider resource usage -trade-offs for their threat models are directed to the DID Method Rubric, which provides evaluation criteria to help decision makers evaluate whether or not a particular -verifiable data registry is appropriate for their use cases. +DID Method is appropriate for their use cases.

From e95f2b33d16606bb6a4ea211082f4b9e8e68f235 Mon Sep 17 00:00:00 2001 From: Manu Sporny Date: Tue, 5 Oct 2021 18:43:59 -0600 Subject: [PATCH 4/4] Fix wording in competing considerations section. Co-authored-by: Ted Thibodeau Jr --- index.html | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/index.html b/index.html index ec263ca4..2f16b181 100644 --- a/index.html +++ b/index.html @@ -5036,11 +5036,11 @@

Evaluating Competing Considerations

requirements. Different requirements might suggest different considerations with different trade-offs. For example, trade-offs between computation (energy usage), trust (deference to authority), coordination (network bandwidth), or memory (physical -storage) might or might not be appropriate, for any given use case. Other use cases +storage) might or might not be appropriate for any given use case. Other use cases might not make the same trade-offs. Those that need to consider different criteria for their use case are directed to the DID Method Rubric, which provides -evaluation criteria to help decision makers evaluate whether or not a particular +evaluation criteria to help decision makers determine whether or not a particular DID Method is appropriate for their use cases.