KID0000 - Glossary, overview, how to use - Commentary

hackmd-github-sync-badge

Back to table of contents

Link Commentary Section
0000 X Glossary, overview, how to use
0001 X Prefixes, Derivation and derivation reference tables
0002 X Data model (field & event concepts and semantics)
0003 X Serialization
0004 X Key Configuration (Signing threshold & key set)
0005 X Next Key Commitment (Pre-Rotation)
0006 X Seals
0007 X Delegation (pending PR by Sam)
0008 X Key-Event State Machine
0009 X Indirect Mode & Witnesses
0010 Recovery/consensus Algorithm (KAACE)
0010 Database & Storage Considerations
0097 n/a Non-Normative Implementation Guidance
0098 n/a Use Cases
0099 n/a Test Vectors and Normative Statement Index

Editorial Notes

  • march 16
    • "promiscuous"/"non-promiscuous" modes of event processing accepting all events = prom, validating against some criterion = non-prom (for example, only accept events originating from your trasnferible identifier unless they come via local interface, i.e. accept them from no one except yourself)
  • jan 5 notes
    • KID0000 - Glossary, overview, how to use {Leave for later}
      • High-Level overview of Operating Modes (Direct, Indirect, Ephemeral)
      • Dainty and Narrow Scope
        • Dependency/RFC List (the thorax between the KERI neck and the IP waist): base64, messagePack, CBOR & JSON, ECC Dig Sigs, [128+] Cr. Digests, Messaging: UDP/TCP/HTTP (for now), standard HEX alphabet RFC
        • {Note to self: review this}
        • Implementation guide: explanation of higher-level behavior assumptions codified into test suites
    • KID0000Comment - Mental models & big-picture rationale
      • Intro to SCIDs? (Whitepaper 2.3)
        • {Include link to Unified Identifier whitepaper}
      • Cryptographic Trust Basis (Whitepaper 2.4)
      • Autonomic Namespace (Whitepaper 3.1) & Syntax (3.2)
      • Unified Identifier Model (3.3)
      • KERI "Layering" and Scope
        • Explanation of VCs, VC-Auth/Capabilities, etc.
        • Out of scope but useful if specified: Assumptions one layer up
          • link to Authentic Chained Data Container spec at ToIP
Select a repo