How Do Verifiable Credentials and Decentralized Identities Work?