<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/rss+xml" href="https://feeds.transistor.fm/the-three-party-problem" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>The Three Party Problem</title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/the-three-party-problem</itunes:new-feed-url>
    <description>We talk to the folks bringing digital credentials to market. We chat about the deployments of verifiable credentials with real users in the real world, so that you, our listener, can better navigate the opportunities, risks, and tradeoffs of using digital credentials in your services. </description>
    <copyright>© 2026 Legendary Requirements, Inc.</copyright>
    <podcast:guid>3c627978-cf7e-5f63-9848-a93eaae7d696</podcast:guid>
    <podcast:locked>yes</podcast:locked>
    <language>en</language>
    <pubDate>Wed, 13 May 2026 17:37:18 -0700</pubDate>
    <lastBuildDate>Wed, 13 May 2026 17:38:45 -0700</lastBuildDate>
    <link>http://threepartyproblem.com</link>
    <image>
      <url/>
      <title>The Three Party Problem</title>
      <link>http://threepartyproblem.com</link>
    </image>
    <itunes:category text="Technology"/>
    <itunes:category text="Technology"/>
    <itunes:type>episodic</itunes:type>
    <itunes:author>Legendary Requirements</itunes:author>
    <itunes:image href=""/>
    <itunes:summary>We talk to the folks bringing digital credentials to market. We chat about the deployments of verifiable credentials with real users in the real world, so that you, our listener, can better navigate the opportunities, risks, and tradeoffs of using digital credentials in your services. </itunes:summary>
    <itunes:subtitle>We talk to the folks bringing digital credentials to market.</itunes:subtitle>
    <itunes:keywords>Digital Credentials, Identity, Truth</itunes:keywords>
    <itunes:owner>
      <itunes:name> Legendary Requirements, Inc.</itunes:name>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>No</itunes:explicit>
  </channel>
</rss>
