Skip to content

Latest commit

 

History

History
166 lines (103 loc) · 4.74 KB

mindmap.md

File metadata and controls

166 lines (103 loc) · 4.74 KB

Mindmap

hackmd-github-sync-badge

This is a mindmap of the emcompassing concept of KERI and ACDC

Concept

  1. the things we've designed (whitepapers, technical designs)
  2. the things we've created (repos and code)
  3. the terminology we use.
  1. to be better and quicker understood
  2. anchor our wording to our objectives
  3. criteria how we distinguish importance to us
  1. the newbie digital identity expert
  2. the advanced SSI identity expert
  3. SSI expert
  1. static site generated on Github
  2. reuse resources all over the web
  3. can be searched and commented on
  1. continuously from now
  2. automatic deployment at changes

Core Values

  • existance and persistance
  • access and transparency
  • privacy - consent to use
  • confidentiality - minimal disclosure
  • commitment and compliance to rules - signature
  • freedom of speech and movement - inception of AIDs, rotation
  • self-sovereignty - portability, delegation and revocation
  • Protection – users’ rights, censorship-resistant

Use cases

  • Self-sovereign security
  • portable identifiers
  • proofs verifiable to the root-of-trust
  • break down silos of control and surveillance

KERI

Open source - Apache2

Secure Attribution over the internet

Simple cryptography

Minimal sufficient means to an end

Round-robin transposable streaming format

Out-of-band introduction, strong in-band validation

Possibilty to transfer off a leger

Use dumb crypto

REST API

It's under construction

ACDC

  1. authentic
  2. chained
  3. serialized data containers

SAID

  1. greater interoperability
  2. reduced ambiguity
  3. enhanced security
  4. better immutably

Veracity of credentials

Signed commitments by controllers

Only cryptography can safe our digital twin

Network dynamics prove that centralized system will lose

Moore’s law in IoT

Anonymity doesn't exist

Guiding Principles

  1. Security first
  2. then confidentiality
  3. then privacy

Strong bindings - security first

Verifiable to primary root of trust

Generic classes of self-certifying identifiers

Don't trust duplicity

Use consensus mechanism to reconcile duplicity

Non-custodial delegation

Secondary extra layer of guarantee

Freedom of witness and backer organization

Freedom of validator and watchtower organization

Private keys need to be kept private

Verfication of Key event logs to last verified

Minimize correlation

Guarantee sufficient randomness

Open source

Zero trust

10 principles of SSI

SSI identity book Reed / Preukschat

Key management and asset planning

Prevent repeated use of a public key 

Self-determination

Permission-less society

No needless control, no needless surveillance