nauth I am now %100 certain that I can build a permissionless, decentralized credential presentation and verification system. In the example below, the only unencrypted channel is the visual invocation and acquisition of a #nauth presented as a QR code. Once acquired, the rest of the communication, including the request for, Tim Bouma May 5, 2025, 12:50 PM