Mindmap
This is a mindmap of the emcompassing concept of KERI and ACDC
Concept
What is this?
- the things we've designed (whitepapers, technical designs)
- the things we've created (repos and code)
- the terminology we use.
Why this page?
- to be better and quicker understood
- anchor our wording to our objectives
- criteria how we distinguish importance to us
For Whom?
- the newbie digital identity expert
- the advanced SSI identity expert
- SSI expert
How?
- static site generated on Github
- reuse resources all over the web
- can be searched and commented on
When?
- continuously from now
- automatic deployment at changes
Core Values
Social values
- existance and persistance
- access and transparency
- privacy - consent to use
- confidentiality - minimal disclosure
Societal values
- commitment and compliance to rules - signature
- freedom of speech and movement - inception of AIDs, rotation
- self-sovereignty - portability, delegation and revocation
- Protection – users’ rights, censorship-resistant
Use cases
- Self-sovereign security
- portable identifiers
- proofs verifiable to the root-of-trust
- break down silos of control and surveillance
KERI
Objectives KERI
Open source - Apache2
Trust spanning layer for the internet
Secure Attribution over the internet
Practical principles
Simple cryptography
Minimal sufficient means to an end
Round-robin transposable streaming format
Out-of-band introduction, strong in-band validation
Possibilty to transfer off a leger
Use dumb crypto
Development choices
REST API
It's under construction
ACDC
- authentic
- chained
- serialized data containers
SAID
- greater interoperability
- reduced ambiguity
- enhanced security
- better immutably
Objectives ACDC
Veracity of credentials
Signed commitments by controllers
Framework conditions
Only cryptography can safe our digital twin
Network dynamics prove that centralized system will lose
Moore’s law in IoT
Anonymity doesn't exist
Guiding Principles
Design principles
- Security first
- then confidentiality
- then privacy