See a self-sovereign identity wallet in practice. The EDI Wallet demo lets you receive verifiable credentials, store them, and present them with selective disclosure — following the eIDAS 2.0 framework.

Digital identity is broken. Most systems today ask you to hand over all your personal data to verify a single fact — your age, your professional qualification, your citizenship. The result is a surveillance economy where personal data is the price of participation. The EDI Wallet demo shows a different path: a privacy-first identity wallet where you decide what you share, when, and with whom.

Why Digital Identity Needs a Privacy-First Rethink

The EU's eIDAS 2.0 regulation (EU 2024/1183) introduces the European Digital Identity Wallet — a mandatory framework for all EU member states to offer their citizens a digital wallet for identity credentials. The regulation requires that wallets support selective disclosure, meaning a user can prove a specific attribute (such as being over 18) without revealing the underlying credential (their full date of birth and other personal details).

This is a fundamental shift. Instead of centralised identity providers that hold your data and mediate every verification, eIDAS 2.0 wallets enable peer-to-peer credential exchange — between a person and a service, or between organisations.

The EDI Wallet demo makes this tangible. Rather than reading about verifiable credentials and selective disclosure, you experience them.

What the Demo Shows

The demo simulates a complete SSI wallet interaction cycle:

  • Credential issuance: A credential issuer (such as a university, government agency, or employer) issues a verifiable credential to your wallet. You see the credential's structure — the claims it contains, the issuer's digital signature, and the expiry.
  • Credential storage: The credential is stored in your wallet, organised and accessible. You control which credentials are in your wallet and can revoke or delete them.
  • Credential presentation with selective disclosure: When a verifier (a service or organisation) requests proof, you choose exactly which attributes to share. The wallet generates a cryptographic proof that satisfies the verifier's request without revealing anything beyond what you chose to disclose.
  • QR-based presentation flow: The demo includes a realistic QR scanning flow — the mechanism used in real-world eIDAS 2.0 interactions — so you can see how in-person and online verification works in practice.

Who It Is For

Identity architects and developers building digital identity systems, wallet applications, or verifier integrations will get hands-on familiarity with the SSI interaction model and understand how eIDAS 2.0 compliance requirements translate to real implementation choices.

Government digital teams working on national eIDAS 2.0 wallet implementations or digital service transformation will find the demo a useful reference point for what a compliant wallet interaction looks and feels like from the user's perspective.

Privacy researchers and data protection officers can use the demo to understand how selective disclosure works in practice — and how it differs from the consent-based data minimisation approaches that most current systems use.

Product managers and UX designers building services that will need to accept eIDAS 2.0 wallet credentials can explore the verification flow and understand what their users will experience on the wallet side of the interaction.

How to Use the Demo

  1. Enter through the gate. Provide your name and organisation to access the demo environment. No account or special software is required.
  2. Receive a credential. The demo issues a verifiable credential to your simulated wallet — for example, a professional qualification or an age verification credential. You can inspect the credential's structure and the issuer's attestation.
  3. Store it in your wallet. The credential is added to your wallet. Explore the wallet interface to see how credentials are organised and what information is displayed to the holder.
  4. Scan a QR code to present. Navigate to a verifier scenario and scan the QR code to trigger a presentation request. The wallet will show you exactly what the verifier is asking for.
  5. Choose what to disclose. Select which attributes to share in response to the verifier's request. The wallet generates a selective disclosure proof — and you can see what the verifier receives versus what remains private in your wallet.

See it in action

Experience credential management and selective disclosure first-hand

Receive credentials, store them in a privacy-first wallet, and present only what is needed — with QR scanning and eIDAS 2.0 selective disclosure.

Explore the EDI Wallet Demo →

Interested in how digital identity intersects with product passports and supply chain trust? Read our post on Trusted Digital Product Passports — which explores how SSI and verifiable credentials underpin the trust architecture of compliant DPP systems.

Want to explore how an EDI wallet could work in your organisation's context? Reach out at info@regenstudio.world.