This is a mindmap of the emcompassing concept of KERI and ACDC
- the things we've designed (whitepapers, technical designs)
- the things we've created (repos and code)
- the terminology we use.
- to be better and quicker understood
- anchor our wording to our objectives
- criteria how we distinguish importance to us
- the newbie digital identity expert
- the advanced SSI identity expert
- SSI expert
How?
- static site generated on Github
- reuse resources all over the web
- can be searched and commented on
When?
- continuously from now
- automatic deployment at changes
- existance and persistance
- access and transparency
- privacy - consent to use
- confidentiality - minimal disclosure
- commitment and compliance to rules - signature
- freedom of speech and movement - inception of AIDs, rotation
- self-sovereignty - portability, delegation and revocation
- Protection – users’ rights, censorship-resistant
- Self-sovereign security
- portable identifiers
- proofs verifiable to the root-of-trust
- break down silos of control and surveillance
- authentic
- chained
- serialized data containers
- greater interoperability
- reduced ambiguity
- enhanced security
- better immutably
- Security first
- then confidentiality
- then privacy