Skip to main content

Mindmap

hackmd-github-sync-badge

This is a mindmap of the emcompassing concept of KERI and ACDC

Concept

What is this?

  1. the things we've designed (whitepapers, technical designs)
  2. the things we've created (repos and code)
  3. the terminology we use.keridoc/

Why this page?

  1. to be better and quicker understood
  2. anchor our wording to our objectiveskeridoc/
  3. criteria how we distinguish importance to us

For Whom?

  1. the newbie digital identity expertkeridoc/
  2. the advanced SSI identity expert
  3. SSI expert

How?

keridoc/

  1. static site generated on Github
  2. reuse resources all over the web
  3. can be searched and commented on keridoc/

When?

  1. continuously from now
  2. automatic deployment at changes keridoc/

Core Values

Social values

  • existance and persistance
  • access and transparency
  • privacy - consent to use
  • confidentiality - minimal disclosure

Societal values

  • commitment and compliance to rules - signature
  • freedom of speech and movement - inception of AIDkeridoc/
  • self-sovereignty - portability, delegation and revocation
  • Protection – users’ rights, censorship-resistant

Use caseskeridoc/

  • Self-sovereign security
  • portable identifiers
  • proofs verifiable to the root-of-trust
  • break down silos of control and surveillancekeridoc/

KERI

Objectives KERI

Open source - Apache2

Trust spanning layer for the internet

Secure Attribution over the internet

Practical principles

keridoc/

Simple cryptography

Minimal sufficient means to an end

Round-robin transposable streaming format

Out-of-band introduction, strong in-band validation

Possibilty to transfer off a leger

Use dumb crypto

Development choices

REST API

keridoc/

It's under construction

ACDC

keridoc/

  1. authentic
  2. chained
  3. serialized data containers

SAID

  1. greater interoperability
  2. reduced ambiguity
  3. enhanced security
  4. better immutablykeridoc/

Objectives ACDC

Veracity of credentials

Signed commitments by controllers

Framework conditions

Only cryptography can safe our digital twinkeridoc/

Network dynamics prove that centralized system will lose

Moore’s law in IoT

Anonymity doesn't exist

Guiding Principles

Design principles

  1. Security first
  2. then confidentiality
  3. then privacy

Strong bindings - security first

Verifiable to primary root of trust

Generic classes of self-certifying identifiers

Autonomic Governance

Don't trust duplicity

Use consensus mechanism to reconcile duplicity

Non-custodial delegation

Secondary extra layer of guarantee

Human governance

Freedom of witness and backer organization

Freedom of validator and watchtower organization

Private keys need to be kept private

Verfication of Key event logs to last verified

Minimize correlation

Guarantee sufficient randomness

Sharing SSI-community values

Open source

Zero trust

10 principles of SSI

SSI identity book Reed / Preukschat

Key management and asset planning

Prevent repeated use of a public key

Self-determination

Permission-less society

No needless control, no needless surveillance