Learn More →
This is a mindmap of the emcompassing concept of KERI and ACDC
# Concept
## [What is this](./concepts.md#what-is-this)?
1. the things we've designed (whitepapers, technical designs)
2. the things we've created (repos and code)
3. the terminology we use.
## [Why this page](./concepts.md#why-this-page)?
1. to be better and quicker understood
2. anchor our wording to our objectives
3. criteria how we distinguish importance to us
## [For Whom](./concepts.md#for-whom)?
1. the newbie digital identity expert
2. the advanced SSI identity expert
3. SSI expert
## [How](./concepts.md#how)?
1. static site generated on Github
2. reuse resources all over the web
3. can be searched and commented on
## [When](./concepts.md#when)?
1. continuously from now
2. automatic deployment at changes
# Core Values
## [Social values](./concepts.md#social-values)
- existance and persistance
- access and transparency
- privacy - consent to use
- confidentiality - minimal disclosure
## [Societal values](./concepts.md#societal-values)
- commitment and compliance to rules - signature
- freedom of speech and movement - inception of AIDs, rotation
- self-sovereignty - portability, delegation and revocation
- Protection – users’ rights, censorship-resistant
## Use cases
- Self-sovereign security
- portable identifiers
- proofs verifiable to the root-of-trust
- break down silos of control and surveillance
# KERI
## [Objectives KERI](./concepts.md#objectives-keri)
### Open source - Apache2
### Waist identity layer for the internet
### Secure Attribution over the internet
<!-- #######NEW BLOCK####### -->
## [Practical principles](./concepts.md#practical-principles)
### Simple cryptography
### Minimal sufficient means to an end
### Round-robin transposable streaming format
### Out-of-band introduction, strong in-band validation
### Possibilty to transfer off a leger
### Use dumb crypto
## [Development choices](./concepts.md#development-choices)
### REST API
### It's under construction
# ACDC
<!-- #######NEW BLOCK####### -->
## [Objectives ACDC](./concepts.md#objectives-acdc)
### Veracity of credentials
### Signed commitments by controllers
## [Framework conditions](./concepts.md#framework-conditions)
### Only cryptography can safe our digital twin
### Network dynamics prove that centralized system will lose
### Moore’s law in IoT
### Anonymity doesn't exist
# Guiding Principles
## [Design principles](./concepts.md#design-principles)
1. Security first
2. then confidentiality
3. then privacy
### Strong bindings - security first
### Verifiable to primary root of trust
### Generic classes of self-certifying identifiers
## [Autonomic Governance](./concepts.md#autonomic-governance)
### Don't trust duplicity
### Use consensus mechanism to reconcile duplicity
### Non-custodial delegation
### Secondary extra layer of guarantee
## [Human governance](./concepts.md#human-governance)
### Freedom of witness and backer organization
### Freedom of validator and watchtower organization
### Private keys need to be kept private
### Verfication of Key event logs to last verified
### Minimize correlation
### Guarantee sufficient randomness
## [Sharing SSI-community values](./concepts.md#sharing-ssi-community-values)
### Open source
### Zero trust
### 10 principles of SSI
### SSI identity book Reed / Preukschat
### Key management and asset planning
### Prevent repeated use of a public key
### Self-determination
### Permission-less society
or
or
By clicking below, you agree to our terms of service.
New to HackMD? Sign up
Syntax | Example | Reference | |
---|---|---|---|
# Header | Header | 基本排版 | |
- Unordered List |
|
||
1. Ordered List |
|
||
- [ ] Todo List |
|
||
> Blockquote | Blockquote |
||
**Bold font** | Bold font | ||
*Italics font* | Italics font | ||
~~Strikethrough~~ | |||
19^th^ | 19th | ||
H~2~O | H2O | ||
++Inserted text++ | Inserted text | ||
==Marked text== | Marked text | ||
[link text](https:// "title") | Link | ||
 | Image | ||
`Code` | Code |
在筆記中貼入程式碼 | |
```javascript var i = 0; ``` |
|
||
:smile: | ![]() |
Emoji list | |
{%youtube youtube_id %} | Externals | ||
$L^aT_eX$ | LaTeX | ||
:::info This is a alert area. ::: |
This is a alert area. |
On a scale of 0-10, how likely is it that you would recommend HackMD to your friends, family or business associates?
Please give us some advice and help us improve HackMD.
Syncing