Mindmap KERI and ACDC

This is a mindmap of the emcompassing concept of KERI and ACDC


# Concept

## [What is this](./concepts.md#what-is-this)?
1. the things we've designed (whitepapers, technical designs)
2. the things we've created (repos and code)
3. the terminology we use.

## [Why this page](./concepts.md#why-this-page)?
1. to be better and quicker understood
2. anchor our wording to our objectives 
3. criteria how we distinguish importance to us

## [For Whom](./concepts.md#for-whom)?
1. the newbie digital identity expert
2. the advanced SSI identity expert
3. SSI expert

## [How](./concepts.md#how)?
1. static site generated on Github
2. reuse resources all over the web 
3. can be searched and commented on

## [When](./concepts.md#when)?
1. continuously from now
2. automatic deployment at changes

# Core Values

## [Social values](./concepts.md#social-values)
- existance and persistance
- access and transparency
- privacy - consent to use
- confidentiality - minimal disclosure

## [Societal values](./concepts.md#societal-values)
- commitment and compliance to rules - signature
- freedom of speech and movement - inception of AIDs, rotation
- self-sovereignty - portability, delegation and revocation
- Protection – users’ rights, censorship-resistant

## Use cases
- Self-sovereign security
- portable identifiers
- proofs verifiable to the root-of-trust
- break down silos of control and surveillance

# KERI

## [Objectives KERI](./concepts.md#objectives-keri)

### Open source - Apache2

### Waist identity layer for the internet

### Secure Attribution over the internet

<!-- #######NEW BLOCK####### -->
## [Practical principles](./concepts.md#practical-principles)

### Simple cryptography

### Minimal sufficient means to an end

### Round-robin transposable streaming format

### Out-of-band introduction, strong in-band validation

### Possibilty to transfer off a leger

### Use dumb crypto

## [Development choices](./concepts.md#development-choices)

### REST API

### It's under construction

# ACDC

<!-- #######NEW BLOCK####### -->
## [Objectives ACDC](./concepts.md#objectives-acdc)

### Veracity of credentials 
 
### Signed commitments by controllers

## [Framework conditions](./concepts.md#framework-conditions)

### Only cryptography can safe our digital twin

### Network dynamics prove that centralized system will lose

### Moore’s law in IoT

### Anonymity doesn't exist

# Guiding Principles 

## [Design principles](./concepts.md#design-principles)
1. Security first
2. then confidentiality
3. then privacy

### Strong bindings - security first

### Verifiable to primary root of trust

### Generic classes of self-certifying identifiers

## [Autonomic Governance](./concepts.md#autonomic-governance)

### Don't trust duplicity

### Use consensus mechanism to reconcile duplicity

### Non-custodial delegation 

### Secondary extra layer of guarantee

## [Human governance](./concepts.md#human-governance)

### Freedom of witness and backer organization 

### Freedom of validator and watchtower organization

### Private keys need to be kept private

### Verfication of Key event logs to last verified

### Minimize correlation 

### Guarantee sufficient randomness

## [Sharing SSI-community values](./concepts.md#sharing-ssi-community-values)

### Open source

### Zero trust

### 10 principles of SSI

### SSI identity book Reed / Preukschat

### Key management and asset planning

### Prevent repeated use of a public key 

### Self-determination

### Permission-less society
Select a repo