From 1ab385f1e4daf04a6d6bca44f019d7fe7bc3bda0 Mon Sep 17 00:00:00 2001
From: Manu Sporny Data Theft
manage the status and revocation of those credentials. Similarly,
[=issuers=] are advised to avoid the practice of creating publicly
resolvable credentials that include personally identifiable information
-(PII) or other sensitive data. Instead, a preference should be shown
-for credentials that are safeguarded by robust access control measures,
-ensuring that they remain inaccessible to unauthorized entities.
+(PII) or other sensitive data. Software implementers are advised
+to safeguarded [=verifiable credentials=] using robust consent
+and access control measures, ensuring that they remain
+inaccessible to unauthorized entities.
[=Holders=] are advised to use implementations that appropriately