Now
- Clarify boundaries and terminology
- Harden evidence formats and canonical encoding rules
- Publish end-to-end verification demos and test vectors
Next
- Multiple independent implementations
- Conformance tests and reproducible fixtures
- Security review loop
Later
- Privacy enhancements (selective disclosure patterns)
- Scaling and operational hardening
- Partner pilots and production-readiness milestones