Now

  • Clarify boundaries and terminology
  • Harden evidence formats and canonical encoding rules
  • Publish end-to-end verification demos and test vectors

Next

  • Multiple independent implementations
  • Conformance tests and reproducible fixtures
  • Security review loop

Later

  • Privacy enhancements (selective disclosure patterns)
  • Scaling and operational hardening
  • Partner pilots and production-readiness milestones