Using Privacy Wallets
This guide walks you through the complete workflow for using privacy wallets with verifiable credentials, from credential issuance to shielded transactions.
Under the Hood
This section provides a brief summary of the mechanics that power the Private Wallets functionality, including workflows and data structures involved