Skip to main content

Mindmap

hackmd-github-sync-badge

This is a mindmap of the emcompassing concept of KERI and ACDC

Concept

What is this?

  1. the things we've designed (whitepapers, technical designs)
  2. the things we've created (repos and code)
  3. the terminology we use.

Why this page?

  1. to be better and quicker understood
  2. anchor our wording to our objectives
  3. criteria how we distinguish importance to us

For Whom?

  1. the newbie digital identity expert
  2. the advanced SSI identity expert
  3. SSI expert

How?

  1. static site generated on Github
  2. reuse resources all over the web
  3. can be searched and commented on

When?

  1. continuously from now
  2. automatic deployment at changes

Core Values

Social values

  • existance and persistance
  • access and transparency
  • privacy - consent to use
  • confidentiality - minimal disclosure

Societal values

  • commitment and compliance to rules - signature
  • freedom of speech and movement - inception of AIDs, rotation
  • self-sovereignty - portability, delegation and revocation
  • Protection – users’ rights, censorship-resistant

Use cases

  • Self-sovereign security
  • portable identifiers
  • proofs verifiable to the root-of-trust
  • break down silos of control and surveillance

KERI

Objectives KERI

Open source - Apache2

Trust spanning layer for the internet

Secure Attribution over the internet

Practical principles

Simple cryptography

Minimal sufficient means to an end

Round-robin transposable streaming format

Out-of-band introduction, strong in-band validation

Possibilty to transfer off a leger

Use dumb crypto

Development choices

REST API

It's under construction

ACDC

  1. authentic
  2. chained
  3. serialized data containers

SAID

  1. greater interoperability
  2. reduced ambiguity
  3. enhanced security
  4. better immutably

Objectives ACDC

Veracity of credentials

Signed commitments by controllers

Framework conditions

Only cryptography can safe our digital twin

Network dynamics prove that centralized system will lose

Moore’s law in IoT

Anonymity doesn't exist

Guiding Principles

Design principles

  1. Security first
  2. then confidentiality
  3. then privacy

Strong bindings - security first

Verifiable to primary root of trust

Generic classes of self-certifying identifiers

Autonomic Governance

Don't trust duplicity

Use consensus mechanism to reconcile duplicity

Non-custodial delegation

Secondary extra layer of guarantee

Human governance

Freedom of witness and backer organization

Freedom of validator and watchtower organization

Private keys need to be kept private

Verfication of Key event logs to last verified

Minimize correlation

Guarantee sufficient randomness

Sharing SSI-community values

Open source

Zero trust

10 principles of SSI

SSI identity book Reed / Preukschat

Key management and asset planning

Prevent repeated use of a public key 

Self-determination

Permission-less society

No needless control, no needless surveillance