IIW | Internet Identity Workshop twice in a year un-conference since 2005 | https://internetidentityworkshop.com | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m03s | 7 |
KERI | Key Event Receipt Infrastructure | https://github.com/WebOfTrust/keri | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m12s | 7 |
repo | Software repository | https://github.com/trustoverip/acdc/wiki/repo | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m27s | 3 |
KERIpy | Python implementation of KERI | https://github.com/WebOfTrust/keripy | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m27s | 7 |
repo | Software repository | https://github.com/trustoverip/acdc/wiki/repo | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m33s | 1 |
coroutines | Computer programs that can be suspended and resumed at will. | https://github.com/trustoverip/acdc/wiki/coroutines | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m41s | 1 |
I/O | Input / output | https://github.com/trustoverip/acdc/wiki/input-output-(I-O) | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m41s | 1 |
HIO | Hierarchical asynchronous coroutines and I/O in Python | https://github.com/trustoverip/acdc/wiki/hio | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m41s | 7 |
Sam Smith | Samuel M. Smith PhD, Inventor and lead developer of KERI | https://www.linkedin.com/in/samuel-m-smith/ | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m41s | 7 |
python | Programming Language | https://www.python.org | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m49s | 3 |
clone | A copy of a system that is - and works exactly as the original | https://github.com/trustoverip/acdc/wiki/clone | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m55s | 3 |
branch | A duplicate of an object under version control for further separate modification | https://github.com/trustoverip/acdc/wiki/branch | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m00s | 3 |
kli | KERI command line interface | https://github.com/trustoverip/acdc/wiki/kli | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m12s | 7 |
Kubernetes | Kubernetes is an open source platform for managing software containers | https://kubernetes.io | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m18s | 3 |
kubectl | Kubernetes command line interface | https://kubernetes.io/docs/reference/kubectl/ | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m18s | 7 |
verifiable credentials | The digital variant of our daily live's credentials (ike passport, driver's license), but in a machine-verifiable way | https://github.com/trustoverip/acdc/wiki/verifiable-credential-(VC) | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m26s | 1 |
Docker containers | Docker takes away repetitive, mundane configuration tasks and is used for application development | https://www.docker.com | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m38s | 3 |
sub shell | a child shell started up from - and contained in another parent shell | https://github.com/trustoverip/acdc/wiki/sub-shell | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m46s | 1 |
agent | A representative for an identity | https://github.com/trustoverip/acdc/wiki/agent | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m01s | 3 |
cloud agent | Cloud agent is software that is installed on the cloud server instances for security, monitoring, and analysis | https://github.com/trustoverip/acdc/wiki/cloud-agent | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m01s | 3 |
Py installer | Python installer bundles a Python application and all its dependencies into a single package | https://pypi.org/project/pyinstaller/ | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m09s | 3 |
Electron | A Python interface for Apache Electron command line interface | https://pypi.org/project/python-electron/ | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m16s | 3 |
U/I | A user interface (UI) is the space where interactions between humans and machines occur. | https://github.com/trustoverip/acdc/wiki/user-interface-(U-I) | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m16s | 1 |
multi-sig | A digital signature scheme which allows a group of users to sign a single piece of digital data. | https://github.com/trustoverip/acdc/wiki/multisig | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m29s | 1 |
identifier | Something to uniquely identify (public) identities; pointing to something or someone else. | https://github.com/trustoverip/acdc/wiki/identifier-system | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m29s | 3 |
wallet | A wallet is a collection of data stores; made up of a keystore, local and remote key event log database and credential database. | https://github.com/trustoverip/acdc/wiki/wallet | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m34s | 7 |
wallet commands | The section of kli where verifiable credentials can be listed | https://docs.google.com/presentation/d/1RIMX7J-cdg8OctoG4JqxPOfqKZsVNodqajtpQ0oFIyE/edit#slide=id.gf2168aef68_0_12 | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m34s | 7 |
witnesses | Entity that may receive, verify, and store key events for an identifier | https://github.com/trustoverip/acdc/wiki/witness | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m44s | 7 |
watchers | Guarantee that KERI logs are immutable | https://github.com/trustoverip/acdc/wiki/watcher | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m44s | 7 |
key management | Management of cryptographic keys in a crypto-system. | https://github.com/trustoverip/acdc/wiki/key-management | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m16s | 7 |
init | Initialization, a command in the kli | https://docs.google.com/presentation/d/1RIMX7J-cdg8OctoG4JqxPOfqKZsVNodqajtpQ0oFIyE/edit#slide=id.gf2168aef68_0_12 | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m21s | 3 |
single sig identifier | An identifier that is controlled by a one-of-one signing keypair | https://github.com/trustoverip/acdc/wiki/single-signature-identifier | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m27s | 3 |
key store | A keystore in KERI is the encrypted data store that hold the private keys for a collection of AIDs. | https://github.com/trustoverip/acdc/wiki/keystore | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m33s | 7 |
key events | Events happening to controlling keys of an identifier recorded in a Key Event Log (KEL). | https://github.com/trustoverip/acdc/wiki/key-event | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m39s | 3 |
interaction event | Anchors external data to the key-state as established by the most recent prior establishment event | https://github.com/trustoverip/acdc/wiki/interaction-event | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m39s | 7 |
rotation event | Changes the key-state which includes a change to the set of authoritative keypairs for an AID | https://github.com/trustoverip/acdc/wiki/rotation-event | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m39s | 7 |
signing thresholds | Minimum number of valid signatures to satisfy the requirement for successful validation | https://github.com/trustoverip/acdc/wiki/signing-threshold | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m48s | 7 |
KEL | Key Event Log is the native KERI verifiable data structure | https://github.com/trustoverip/acdc/wiki/key-event-log-(KEL) | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=05m01s | 7 |
verify signatures | Applying an algorithm that either accepts or rejects the message's claim to authenticity | https://github.com/trustoverip/acdc/wiki/verify-signature | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=05m32s | 3 |
peer-to-peer communications | Peers are equally privileged, equipotent participants in a network | https://github.com/trustoverip/acdc/wiki/peer-to-peer-(P2P) | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=06m13s | 3 |
bootstrap command | Start an empty agent or to run a single agent against one that's already been started | https://docs.google.com/presentation/d/1RIMX7J-cdg8OctoG4JqxPOfqKZsVNodqajtpQ0oFIyE/edit#slide=id.gf2168aef68_0_20 | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=06m31s | 3 |
salts | Random data that is used as an additional input to a cryptographic one-way function | https://github.com/trustoverip/acdc/wiki/salt | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=06m50s | 7 |
delegation | Delegation can be defined as “the act of empowering to act for another” | https://github.com/trustoverip/acdc/wiki/delegation | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=07m44s | 7 |
multi-sig delegation | delegated identifiers under multi-signature control | https://github.com/trustoverip/acdc/wiki/delegation | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=07m44s | 7 |
JSON | JavaScript Object Notation | https://en.wikipedia.org/wiki/JSON | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=08m08s | 3 |
transferable | Control over identifier can be transferred by rotating keys | https://github.com/trustoverip/acdc/wiki/transferable-identifier | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=08m34s | 7 |
ports | A number assigned to uniquely identify a connection endpoint and to direct data to a specific service. | https://en.wikipedia.org/wiki/Port_(computer_networking) | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=09m04s | 3 |
configuration file | File used to configure the parameters and initial settings for some computer programs | https://github.com/trustoverip/acdc/wiki/configuration-files | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=09m16s | 1 |
REST | REpresentational State Transfer (REST) is a software architectural style that developers apply to web APIs | https://github.com/WebOfTrust/keri/blob/main/docs/keri-dev-env.md#what-exactly-is-a-rest-api | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=10m00s | 3 |
APIs | Application Programming Interface | https://github.com/WebOfTrust/keri/blob/main/docs/keri-dev-env.md#what-exactly-is-a-rest-api | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=10m00s | 3 |
CURL | Command-line tool (curl) for transferring data using various network protocols. | https://en.wikipedia.org/wiki/CURL | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=10m17s | 3 |
post and put | HTTP request methods to indicate the desired action to be performed on the identified resource | https://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=10m17s | 3 |
Swagger | OpenAPI (former Swagger) is important to KERI, CESR and ACDC. It's open sourced and has many ready-usable extensions in JSON available. | https://github.com/WebOfTrust/keri/blob/main/docs/keri-dev-env.md#what-is-swagger-and-openapi | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=10m31s | 7 |
passcode | Secret data, typically a string of characters, usually used to confirm a user's identity | https://github.com/trustoverip/acdc/wiki/passcode | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=11m06s | 3 |
stretched into an encryption key | make a possibly weak key, typically a password or passphrase, more secure against a brute-force attack by increasing the resources | https://github.com/trustoverip/acdc/wiki/key-stretching | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=11m11s | 7 |
flag | Many command line programs can be set to various mode by using a flag; e.g. -v or --verbose for verbose mode | https://en.wikipedia.org/wiki/Verbose_mode | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=12m20s | 3 |
non-transferable identifier | Controlling keys over this identifier cannot be rotated and therefore this identifier is non-transferable to other control | https://github.com/trustoverip/acdc/wiki/non-transferable-identitifer | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=14m28s | 7 |
toad | Field in KERI data structure for describing the witness thresshold | https://github.com/WebOfTrust/keripy/blob/28873f42aabef096d2b6f4bf1af5dbd9e219d13f/src/keri/core/eventing.py | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=15m37s | 7 |
witness threshold | The minimum number of valid witness signatures required | https://github.com/trustoverip/acdc/wiki/threshold-signature-scheme | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=15m37s | 7 |
pre-rotation | commitment to next rotated key set in previous rotation or inception event | https://github.com/trustoverip/acdc/wiki/pre-rotation | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=15m54s | 7 |
prefixes | A prefix that is composed of a basic Base-64 (URL safe) derivation code pre-pended to Base-64 encoding of a basic public digital signing key | https://github.com/trustoverip/acdc/wiki/prefix | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=16m47s | 7 |
Base64 | A group of binary-to-text encoding schemes that represent binary data | https://github.com/trustoverip/acdc/wiki/base64 | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=16m53s | 7 |
qualified | when qualified, a cryptographic primitive includes a prepended derivation code | https://github.com/trustoverip/acdc/wiki/qualified | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=16m53s | 7 |
derivation code | A special character that encodes the derivation process, pre-pended to the identifier | https://github.com/trustoverip/acdc/wiki/derivation-code | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=16m53s | 7 |
Blake3 hash | BLAKE3 is a relatively young (2020) cryptographic hash function based on Bao and BLAKE2. | https://github.com/trustoverip/acdc/wiki/blake3 | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=16m57s | 7 |
anchor data into | Data anchors are digests of digital data, that uniquely identify this data | https://github.com/trustoverip/acdc/wiki/data-anchor | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=17m14s | 7 |
AID | An identifier that is self-certifying and self-sovereign | https://github.com/trustoverip/acdc/wiki/autonomic-identifier-(AID) | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=17m50s | 7 |
sequence number | Incremental number in a log | https://www.storyofmathematics.com/number-sequences/ | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=17m57s | 3 |
digest | Verifiable cryptographic commitment. It's a collision resistant hash of content | https://github.com/trustoverip/acdc/wiki/digest | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=17m57s | 3 |
issuance event | The inception event of a verifiable credential | https://github.com/trustoverip/acdc/wiki/issuance-event | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=18m02s | 7 |
public transaction event log | Is a hash linked data structure of transactions that can be used to track state | https://github.com/trustoverip/acdc/wiki/public-transaction-event-log-(PTEL) | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=18m05s | 7 |
verifiable | When you can succesfully verify a signature | https://github.com/trustoverip/acdc/wiki/verify-signature | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=19m34s | 7 |
establishment | An event that establishes control authority | https://github.com/trustoverip/acdc/wiki/establishment-event | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=19m39s | 7 |
lmdb databases | Lightning Memory-Mapped Database | https://en.wikipedia.org/wiki/Lightning_Memory-Mapped_Database | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=21m42s | 7 |
indexed signatures | Used when signing anything with a multi-key autonomic identifier; a verifier knows which of the multiple public keys was used | https://github.com/trustoverip/acdc/wiki/indexed-signature | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=23m46s | 7 |
hex | Hexadecimal notation | https://en.wikipedia.org/wiki/Hexadecimal | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=23m59s | 3 |
verbose | An option available in many computer operating systems and programming languages that provides additional details as to what the computer is doing | https://en.wikipedia.org/wiki/Verbose_mode | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=25m01s | 3 |
self-addressing identifiers | An identifier that is deterministically generated from and embedded in the content it identifies, making it and its data mutually tamper-evident | https://github.com/trustoverip/acdc/wiki/self-addressing-identifier-(SAID) | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=25m29s | 7 |
backer | Backers include both regular KERI witnesses and ledger-registered backers | https://github.com/trustoverip/acdc/wiki/backer | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=27m48s | 7 |
ledger backer | A witness in KERI that is ledger-registered | https://github.com/trustoverip/acdc/wiki/ledger-backer | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=27m55s | 7 |
witness backer | A native KERI witness whose control authority is established in a KEL | https://github.com/trustoverip/acdc/wiki/witness | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=27m55s | 7 |
vLEI | Digital verifiable credentials issued by (delegates) of GLEIF to prove that information about a legel entity is verifiably authentic | https://github.com/trustoverip/acdc/wiki/verifiable-legal-entity-identifier-(vLEI) | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=30m17s | 7 |
SSI system | SSI Infrastructure consisting of the technological components that are deployed all over the world | https://github.com/trustoverip/acdc/wiki/ssi-system | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=30m22s | 1 |
Indy network | Hyperledger Indy network is an SSI system based on a private blockchain | https://www.hyperledger.org/use/hyperledger-indy | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=30m22s | 7 |
transfer off a ledger | The act of transferring control authority over an identifier from a ledger (or blockchain) to the native verifiable KERI data structure KEL | https://github.com/trustoverip/acdc/wiki/transfer-off-ledger | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=30m39s | 7 |
Ethereum | Ethereum is the community-run technology powering the cryptocurrency ether (ETH) and thousands of decentralized applications | https://ethereum.org/en/ | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=31m02s | 7 |
Aries | Hyperledger Aries provides an interoperable tool kit for creating, transmitting and storing verifiable digital credentials | https://www.hyperledger.org/use/aries | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=31m46s | 7 |
service endpoints | A web service endpoint which is a URL at which clients of specific service can get access to the service. | https://github.com/trustoverip/acdc/wiki/service-endpoint | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=32m54s | 3 |
URLs | A reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it | https://github.com/trustoverip/acdc/wiki/uniform-resource-locator-(URL) | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=33m00s | 1 |
IP-address | A numerical label such as '192.0.2.1' that is connected to a computer network that uses the Internet Protocol for communication | https://github.com/trustoverip/acdc/wiki/ip-address | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=33m42s | 1 |
TCP endpoint | This is a service endpoint of the web transmission control protocol | https://github.com/trustoverip/acdc/wiki/tcp-endpoint | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=34m00s | 3 |
inquisitor | | https://github.com/trustoverip/acdc/wiki/inquisitor | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=37m19s | 7 |
dip: tag | | | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=49m13s | 7 |
icp: tag | | | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=49m13s | 7 |
di: tag | | | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=49m20s | 7 |
locked state | default state of an encrypted KERI data store with a passcode | https://github.com/trustoverip/acdc/wiki/locked-state | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=52m22s | 7 |
onepass | password manager | https://github.com/doglex/onepass | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=53m04s | 7 |
data OOBIs | data out-of-band ntroductions | https://github.com/trustoverip/acdc/wiki/out-of-band-introduction-(OOBI) | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=53m48s | 7 |
credential schema OOBIs | credential schema out-of-band ntroductions | https://github.com/trustoverip/acdc/wiki/out-of-band-introduction-(OOBI) | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=53m54s | 7 |
Keep | Is KERI's and ACDC's crypto wallet: A task orientated application for managing AIDs in ecosystems, e.g. the vLEI Ecosystem | https://github.com/trustoverip/acdc/wiki/keep | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=54m12s | 7 |
zero trust | a Zero Trust approach trusts no one | https://github.com/trustoverip/acdc/wiki/zero-trust | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=55m37s | 3 |
credential registries | Is a functional component that has the capability to register and advertise the information about Credential Types that their respective Governing Parties have decided to disclose | https://essif-lab.github.io/framework/docs/terms/credential-catalogue | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=55m53s | 3 |
revocation events | An event that revokes control authority over an identifier | https://github.com/trustoverip/acdc/wiki/revocation-event | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=55m58s | 3 |
two-factor auth | Is an electronic authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence | https://en.wikipedia.org/wiki/Multi-factor_authentication | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=56m13s | 1 |
escrow states | | https://github.com/trustoverip/acdc/wiki/escrow-state | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=56m59s | 7 |
server-sent events | Mailbox notifications; a streaming service for the agent U/I, to get notifications from the KERI system itself | https://github.com/trustoverip/acdc/wiki/server-sent-event | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=57m19s | 7 |
| | | | |