9.1 What is a digital wallet, and what does it typically contain?9.2 What is a digital agent, and how does it typically work with a digital wallet?9.3 An example scenario9.4 Design principles for SSI digital wallets and agents9.4.1 Portable and Open-By-Default9.4.2 Consent-driven9.4.3 Privacy by design9.4.4 Security by design9.5 Basic anatomy of an SSI digital wallet and agent9.6 Standard features of end-user digital wallets and agents9.6.1 Notifications and user experience9.6.2 Connecting: Establishing new digital trust relationships9.6.3 Receiving, offering, and presenting digital credentials9.6.4 Revoking and expiring digital credentials9.6.5 Authenticating: Logging you in9.6.6 Applying digital signatures9.7 Backup and recovery9.7.1 Automatic encrypted backup9.7.2 Offline recovery9.7.3 Social recovery9.7.4 Multi-device recovery9.8 Advanced features of wallets and agents9.8.1 Multiple-device support and wallet synchronization9.8.2 Offline operations9.8.3 Verifying the verifier9.8.4 Compliance and monitoring9.8.5 Secure data storage (vault) support9.8.6 Schemas and overlays9.8.7 Emergencies9.8.8 Insurance9.9 Enterprise wallets9.9.1 Delegation (rights, roles, permissions)9.9.2 Scale9.9.3 Specialized wallets and agents9.9.4 Credential revocation9.9.5 Special security considerations9.10 Guardianship and delegation9.10.1 Guardian wallets9.10.2 Guardian delegates and guardian credentials9.11 Certification and accreditation9.12 The Wallet Wars: The evolving digital wallet/agent marketplace9.12.1 Who9.12.2 What9.12.3 HowReference