Skip to main content

kli-demo-2022

Interviewer: Steven Milstein
Interviewee: Phil Feairheller

Subtitles, Links table, Brief explanations: Henk van Cann

This footage is the topic of this file.

Explanation

Terms are words used by Phil Feairheller, I provided a link to more explanation, mainly to the ACDC glossary. The point in the video where Phil mentions the term for the first time is called vidstart, the level of understanding at which this term might need explanation, and finally a brief explanation in field text of the term in the first column.

Scroll table to the right

To get to the links and other columns of the table you might need to scroll the table all the way to the right.

Level

Since KERI and ACDC education start off at the level of SSI-expert, a beginner is not a layman, but somebody with a good common understanding of IT and digital identity.

  • 1=beginner digital identity expert
  • 3=advanced self-sovereign identity expert
  • 7=SSI experts
Just my 2 cents:
Don't try KERI and ACDC on your family, friends and other innocent bystanders.
Termtextlinkvidstartlevel
IIWInternet Identity Workshop twice in a year un-conference since 2005https://internetidentityworkshop.comhttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m03s7
KERIKey Event Receipt Infrastructurehttps://github.com/WebOfTrust/kerihttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m12s7
repoSoftware repositoryhttps://github.com/trustoverip/acdc/wiki/repohttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m27s3
KERIpyPython implementation of KERIhttps://github.com/WebOfTrust/keripyhttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m27s7
repoSoftware repositoryhttps://github.com/trustoverip/acdc/wiki/repohttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m33s1
coroutinesComputer programs that can be suspended and resumed at will.https://github.com/trustoverip/acdc/wiki/coroutineshttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m41s1
I/OInput / outputhttps://github.com/trustoverip/acdc/wiki/input-output-(I-O)https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m41s1
HIOHierarchical asynchronous coroutines and I/O in Pythonhttps://github.com/trustoverip/acdc/wiki/hiohttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m41s7
Sam SmithSamuel M. Smith PhD, Inventor and lead developer of KERIhttps://www.linkedin.com/in/samuel-m-smith/https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m41s7
pythonProgramming Languagehttps://www.python.orghttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m49s3
cloneA copy of a system that is - and works exactly as the originalhttps://github.com/trustoverip/acdc/wiki/clonehttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m55s3
branchA duplicate of an object under version control for further separate modificationhttps://github.com/trustoverip/acdc/wiki/branchhttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m00s3
kliKERI command line interfacehttps://github.com/trustoverip/acdc/wiki/klihttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m12s7
KubernetesKubernetes is an open source platform for managing software containershttps://kubernetes.iohttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m18s3
kubectlKubernetes command line interfacehttps://kubernetes.io/docs/reference/kubectl/https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m18s7
verifiable credentialsThe digital variant of our daily live's credentials (ike passport, driver's license), but in a machine-verifiable wayhttps://github.com/trustoverip/acdc/wiki/verifiable-credential-(VC)https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m26s1
Docker containersDocker takes away repetitive, mundane configuration tasks and is used for application developmenthttps://www.docker.comhttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m38s3
sub shella child shell started up from - and contained in another parent shellhttps://github.com/trustoverip/acdc/wiki/sub-shellhttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m46s1
agentA representative for an identityhttps://github.com/trustoverip/acdc/wiki/agenthttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m01s3
cloud agentCloud agent is software that is installed on the cloud server instances for security, monitoring, and analysishttps://github.com/trustoverip/acdc/wiki/cloud-agenthttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m01s3
Py installerPython installer bundles a Python application and all its dependencies into a single packagehttps://pypi.org/project/pyinstaller/https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m09s3
ElectronA Python interface for Apache Electron command line interfacehttps://pypi.org/project/python-electron/https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m16s3
U/IA user interface (UI) is the space where interactions between humans and machines occur.https://github.com/trustoverip/acdc/wiki/user-interface-(U-I)https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m16s1
multi-sigA digital signature scheme which allows a group of users to sign a single piece of digital data.https://github.com/trustoverip/acdc/wiki/multisighttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m29s1
identifierSomething to uniquely identify (public) identities; pointing to something or someone else.https://github.com/trustoverip/acdc/wiki/identifier-systemhttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m29s3
walletA wallet is a collection of data stores; made up of a keystore, local and remote key event log database and credential database.https://github.com/trustoverip/acdc/wiki/wallethttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m34s7
wallet commandsThe section of kli where verifiable credentials can be listedhttps://docs.google.com/presentation/d/1RIMX7J-cdg8OctoG4JqxPOfqKZsVNodqajtpQ0oFIyE/edit#slide=id.gf2168aef68_0_12https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m34s7
witnessesEntity that may receive, verify, and store key events for an identifierhttps://github.com/trustoverip/acdc/wiki/witnesshttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m44s7
watchersGuarantee that KERI logs are immutablehttps://github.com/trustoverip/acdc/wiki/watcherhttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m44s7
key managementManagement of cryptographic keys in a crypto-system.https://github.com/trustoverip/acdc/wiki/key-managementhttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m16s7
initInitialization, a command in the klihttps://docs.google.com/presentation/d/1RIMX7J-cdg8OctoG4JqxPOfqKZsVNodqajtpQ0oFIyE/edit#slide=id.gf2168aef68_0_12https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m21s3
single sig identifierAn identifier that is controlled by a one-of-one signing keypairhttps://github.com/trustoverip/acdc/wiki/single-signature-identifierhttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m27s3
key storeA keystore in KERI is the encrypted data store that hold the private keys for a collection of AIDs.https://github.com/trustoverip/acdc/wiki/keystorehttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m33s7
key eventsEvents happening to controlling keys of an identifier recorded in a Key Event Log (KEL).https://github.com/trustoverip/acdc/wiki/key-eventhttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m39s3
interaction eventAnchors external data to the key-state as established by the most recent prior establishment eventhttps://github.com/trustoverip/acdc/wiki/interaction-eventhttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m39s7
rotation eventChanges the key-state which includes a change to the set of authoritative keypairs for an AIDhttps://github.com/trustoverip/acdc/wiki/rotation-eventhttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m39s7
signing thresholdsMinimum number of valid signatures to satisfy the requirement for successful validationhttps://github.com/trustoverip/acdc/wiki/signing-thresholdhttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m48s7
KELKey Event Log is the native KERI verifiable data structurehttps://github.com/trustoverip/acdc/wiki/key-event-log-(KEL)https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=05m01s7
verify signaturesApplying an algorithm that either accepts or rejects the message's claim to authenticityhttps://github.com/trustoverip/acdc/wiki/verify-signaturehttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=05m32s3
peer-to-peer communicationsPeers are equally privileged, equipotent participants in a networkhttps://github.com/trustoverip/acdc/wiki/peer-to-peer-(P2P)https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=06m13s3
bootstrap commandStart an empty agent or to run a single agent against one that's already been startedhttps://docs.google.com/presentation/d/1RIMX7J-cdg8OctoG4JqxPOfqKZsVNodqajtpQ0oFIyE/edit#slide=id.gf2168aef68_0_20https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=06m31s3
saltsRandom data that is used as an additional input to a cryptographic one-way functionhttps://github.com/trustoverip/acdc/wiki/salthttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=06m50s7
delegationDelegation can be defined as “the act of empowering to act for another”https://github.com/trustoverip/acdc/wiki/delegationhttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=07m44s7
multi-sig delegationdelegated identifiers under multi-signature controlhttps://github.com/trustoverip/acdc/wiki/delegationhttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=07m44s7
JSONJavaScript Object Notationhttps://en.wikipedia.org/wiki/JSONhttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=08m08s3
transferableControl over identifier can be transferred by rotating keyshttps://github.com/trustoverip/acdc/wiki/transferable-identifierhttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=08m34s7
portsA number assigned to uniquely identify a connection endpoint and to direct data to a specific service.https://en.wikipedia.org/wiki/Port_(computer_networking)https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=09m04s3
configuration fileFile used to configure the parameters and initial settings for some computer programshttps://github.com/trustoverip/acdc/wiki/configuration-fileshttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=09m16s1
RESTREpresentational State Transfer (REST) is a software architectural style that developers apply to web APIshttps://github.com/WebOfTrust/keri/blob/main/docs/keri-dev-env.md#what-exactly-is-a-rest-apihttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=10m00s3
APIsApplication Programming Interfacehttps://github.com/WebOfTrust/keri/blob/main/docs/keri-dev-env.md#what-exactly-is-a-rest-apihttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=10m00s3
CURLCommand-line tool (curl) for transferring data using various network protocols.https://en.wikipedia.org/wiki/CURLhttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=10m17s3
post and putHTTP request methods to indicate the desired action to be performed on the identified resourcehttps://en.wikipedia.org/wiki/Hypertext_Transfer_Protocolhttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=10m17s3
SwaggerOpenAPI (former Swagger) is important to KERI, CESR and ACDC. It's open sourced and has many ready-usable extensions in JSON available.https://github.com/WebOfTrust/keri/blob/main/docs/keri-dev-env.md#what-is-swagger-and-openapihttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=10m31s7
passcodeSecret data, typically a string of characters, usually used to confirm a user's identityhttps://github.com/trustoverip/acdc/wiki/passcodehttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=11m06s3
stretched into an encryption keymake a possibly weak key, typically a password or passphrase, more secure against a brute-force attack by increasing the resourceshttps://github.com/trustoverip/acdc/wiki/key-stretchinghttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=11m11s7
flagMany command line programs can be set to various mode by using a flag; e.g. -v or --verbose for verbose modehttps://en.wikipedia.org/wiki/Verbose_modehttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=12m20s3
non-transferable identifierControlling keys over this identifier cannot be rotated and therefore this identifier is non-transferable to other controlhttps://github.com/trustoverip/acdc/wiki/non-transferable-identitiferhttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=14m28s7
toadField in KERI data structure for describing the witness thressholdhttps://github.com/WebOfTrust/keripy/blob/28873f42aabef096d2b6f4bf1af5dbd9e219d13f/src/keri/core/eventing.pyhttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=15m37s7
witness thresholdThe minimum number of valid witness signatures requiredhttps://github.com/trustoverip/acdc/wiki/threshold-signature-schemehttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=15m37s7
pre-rotationcommitment to next rotated key set in previous rotation or inception eventhttps://github.com/trustoverip/acdc/wiki/pre-rotationhttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=15m54s7
prefixesA prefix that is composed of a basic Base-64 (URL safe) derivation code pre-pended to Base-64 encoding of a basic public digital signing keyhttps://github.com/trustoverip/acdc/wiki/prefixhttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=16m47s7
Base64A group of binary-to-text encoding schemes that represent binary datahttps://github.com/trustoverip/acdc/wiki/base64https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=16m53s7
qualifiedwhen qualified, a cryptographic primitive includes a prepended derivation codehttps://github.com/trustoverip/acdc/wiki/qualifiedhttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=16m53s7
derivation codeA special character that encodes the derivation process, pre-pended to the identifierhttps://github.com/trustoverip/acdc/wiki/derivation-codehttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=16m53s7
Blake3 hashBLAKE3 is a relatively young (2020) cryptographic hash function based on Bao and BLAKE2.https://github.com/trustoverip/acdc/wiki/blake3https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=16m57s7
anchor data intoData anchors are digests of digital data, that uniquely identify this datahttps://github.com/trustoverip/acdc/wiki/data-anchorhttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=17m14s7
AIDAn identifier that is self-certifying and self-sovereignhttps://github.com/trustoverip/acdc/wiki/autonomic-identifier-(AID)https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=17m50s7
sequence numberIncremental number in a loghttps://www.storyofmathematics.com/number-sequences/https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=17m57s3
digestVerifiable cryptographic commitment. It's a collision resistant hash of contenthttps://github.com/trustoverip/acdc/wiki/digesthttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=17m57s3
issuance eventThe inception event of a verifiable credentialhttps://github.com/trustoverip/acdc/wiki/issuance-eventhttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=18m02s7
public transaction event logIs a hash linked data structure of transactions that can be used to track statehttps://github.com/trustoverip/acdc/wiki/public-transaction-event-log-(PTEL)https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=18m05s7
verifiableWhen you can succesfully verify a signaturehttps://github.com/trustoverip/acdc/wiki/verify-signaturehttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=19m34s7
establishmentAn event that establishes control authorityhttps://github.com/trustoverip/acdc/wiki/establishment-eventhttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=19m39s7
lmdb databasesLightning Memory-Mapped Databasehttps://en.wikipedia.org/wiki/Lightning_Memory-Mapped_Databasehttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=21m42s7
indexed signaturesUsed when signing anything with a multi-key autonomic identifier; a verifier knows which of the multiple public keys was usedhttps://github.com/trustoverip/acdc/wiki/indexed-signaturehttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=23m46s7
hexHexadecimal notationhttps://en.wikipedia.org/wiki/Hexadecimalhttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=23m59s3
verboseAn option available in many computer operating systems and programming languages that provides additional details as to what the computer is doinghttps://en.wikipedia.org/wiki/Verbose_modehttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=25m01s3
self-addressing identifiersAn identifier that is deterministically generated from and embedded in the content it identifies, making it and its data mutually tamper-evidenthttps://github.com/trustoverip/acdc/wiki/self-addressing-identifier-(SAID)https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=25m29s7
backerBackers include both regular KERI witnesses and ledger-registered backershttps://github.com/trustoverip/acdc/wiki/backerhttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=27m48s7
ledger backerA witness in KERI that is ledger-registeredhttps://github.com/trustoverip/acdc/wiki/ledger-backerhttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=27m55s7
witness backerA native KERI witness whose control authority is established in a KELhttps://github.com/trustoverip/acdc/wiki/witnesshttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=27m55s7
vLEIDigital verifiable credentials issued by (delegates) of GLEIF to prove that information about a legel entity is verifiably authentichttps://github.com/trustoverip/acdc/wiki/verifiable-legal-entity-identifier-(vLEI)https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=30m17s7
SSI systemSSI Infrastructure consisting of the technological components that are deployed all over the worldhttps://github.com/trustoverip/acdc/wiki/ssi-systemhttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=30m22s1
Indy networkHyperledger Indy network is an SSI system based on a private blockchainhttps://www.hyperledger.org/use/hyperledger-indyhttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=30m22s7
transfer off a ledgerThe act of transferring control authority over an identifier from a ledger (or blockchain) to the native verifiable KERI data structure KELhttps://github.com/trustoverip/acdc/wiki/transfer-off-ledgerhttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=30m39s7
EthereumEthereum is the community-run technology powering the cryptocurrency ether (ETH) and thousands of decentralized applicationshttps://ethereum.org/en/https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=31m02s7
AriesHyperledger Aries provides an interoperable tool kit for creating, transmitting and storing verifiable digital credentialshttps://www.hyperledger.org/use/arieshttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=31m46s7
service endpointsA web service endpoint which is a URL at which clients of specific service can get access to the service.https://github.com/trustoverip/acdc/wiki/service-endpointhttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=32m54s3
URLsA reference to a web resource that specifies its location on a computer network and a mechanism for retrieving ithttps://github.com/trustoverip/acdc/wiki/uniform-resource-locator-(URL)https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=33m00s1
IP-addressA numerical label such as '192.0.2.1' that is connected to a computer network that uses the Internet Protocol for communicationhttps://github.com/trustoverip/acdc/wiki/ip-addresshttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=33m42s1
TCP endpointThis is a service endpoint of the web transmission control protocolhttps://github.com/trustoverip/acdc/wiki/tcp-endpointhttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=34m00s3
inquisitorhttps://github.com/trustoverip/acdc/wiki/inquisitorhttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=37m19s7
dip: taghttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=49m13s7
icp: taghttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=49m13s7
di: taghttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=49m20s7
locked statedefault state of an encrypted KERI data store with a passcodehttps://github.com/trustoverip/acdc/wiki/locked-statehttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=52m22s7
onepasspassword managerhttps://github.com/doglex/onepasshttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=53m04s7
data OOBIsdata out-of-band ntroductionshttps://github.com/trustoverip/acdc/wiki/out-of-band-introduction-(OOBI)https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=53m48s7
credential schema OOBIscredential schema out-of-band ntroductionshttps://github.com/trustoverip/acdc/wiki/out-of-band-introduction-(OOBI)https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=53m54s7
KeepIs KERI's and ACDC's crypto wallet: A task orientated application for managing AIDs in ecosystems, e.g. the vLEI Ecosystemhttps://github.com/trustoverip/acdc/wiki/keephttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=54m12s7
zero trusta Zero Trust approach trusts no onehttps://github.com/trustoverip/acdc/wiki/zero-trusthttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=55m37s3
credential registriesIs a functional component that has the capability to register and advertise the information about Credential Types that their respective Governing Parties have decided to disclosehttps://essif-lab.github.io/framework/docs/terms/credential-cataloguehttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=55m53s3
revocation eventsAn event that revokes control authority over an identifierhttps://github.com/trustoverip/acdc/wiki/revocation-eventhttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=55m58s3
two-factor authIs an electronic authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidencehttps://en.wikipedia.org/wiki/Multi-factor_authenticationhttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=56m13s1
escrow stateshttps://github.com/trustoverip/acdc/wiki/escrow-statehttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=56m59s7
server-sent eventsMailbox notifications; a streaming service for the agent U/I, to get notifications from the KERI system itselfhttps://github.com/trustoverip/acdc/wiki/server-sent-eventhttps://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=57m19s7