Mindmap
This is a mindmap of the emcompassing concept of KERI and ACDC
Concept
What is this?
- the things we've designed (whitepapers, technical designs)
- the things we've created (repos and code)
- the terminology we use.keridoc/
Why this page?
- to be better and quicker understood
- anchor our wording to our objectiveskeridoc/
- criteria how we distinguish importance to us
For Whom?
- the newbie digital identity expertkeridoc/
- the advanced SSI identity expert
- SSI expert
How?
keridoc/
- static site generated on Github
- reuse resources all over the web
- can be searched and commented on keridoc/
When?
- continuously from now
- automatic deployment at changes keridoc/
Core Values
Social values
- existance and persistance
- access and transparency
- privacy - consent to use
- confidentiality - minimal disclosure
Societal values
- commitment and compliance to rules - signature
- freedom of speech and movement - inception of AIDkeridoc/
- self-sovereignty - portability, delegation and revocation
- Protection – users’ rights, censorship-resistant
Use caseskeridoc/
- Self-sovereign security
- portable identifiers
- proofs verifiable to the root-of-trust
- break down silos of control and surveillancekeridoc/
KERI
Objectives KERI
Open source - Apache2
Trust spanning layer for the internet
Secure Attribution over the internet
Practical principles
keridoc/
Simple cryptography
Minimal sufficient means to an end
Round-robin transposable streaming format
Out-of-band introduction, strong in-band validation
Possibilty to transfer off a leger
Use dumb crypto
Development choices
REST API
keridoc/
It's under construction
ACDC
keridoc/
- authentic
- chained
- serialized data containers
SAID
- greater interoperability
- reduced ambiguity
- enhanced security
- better immutablykeridoc/
Objectives ACDC
Veracity of credentials
Signed commitments by controllers
Framework conditions
Only cryptography can safe our digital twinkeridoc/
Network dynamics prove that centralized system will lose
Moore’s law in IoT
Anonymity doesn't exist
Guiding Principles
Design principles
- Security first
- then confidentiality
- then privacy