owned this note
owned this note
Published
Linked with GitHub
<!-- <link rel="stylesheet" href="../style.css" type="text/css"></link> -->
<!-- This should be placed in a CSS file and referenced with the command above in comments -->
<style>
table a {
display: inline-block;
width: 50px;
white-space: nowrap;
overflow: hidden;
text-overflow: ellipsis;
}
table th:first-of-type {
width: 20%;
}
table th:nth-of-type(2) {
width: 50%;
}
table th:nth-of-type(3) {
width: 10%;
}
table th:nth-of-type(4) {
width: 10%;
}
table th:nth-of-type(5) {
width: 10%;
}
</style>
# kli-demo-2022
Interviewer: Steven Milstein\
Interviewee: Phil Feairheller
Subtitles, Links table, Brief explanations: Henk van Cann
This [footage](https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG) is the topic of this file.
## Explanation
**Term**s are words used by Phil Feairheller, I provided a **link** to more explanation, mainly to the [ACDC glossary](https://github.com/trustoverip/acdc/wiki/). The point in the video where Phil *mentions the term for the first time* is called **vidstart**, the **level** of understanding at which this term might need explanation, and finally a *brief explanation* in field **text** of the term in the first column.
### Scroll table to the right
To get to the links and other columns of the table you might need to scroll the table all the way to the right.
### Level
Since KERI and ACDC education start off at the level of SSI-expert, a *beginner* is not a layman, but somebody with a good common understanding of IT and digital identity.
- 1=beginner digital identity expert
- 3=advanced self-sovereign identity expert
- 7=SSI experts
```
Just my 2 cents:
Don't try KERI and ACDC on your family, friends and other innocent bystanders.
```
<!-- Paste table data between <Div > tags and cut off unnecessary columnns
Adjust column width in the table CSS style definition above -->
<div class="foo">
| Term | text | link | vidstart | level |
|---|---|---|---|---|
| IIW | Internet Identity Workshop twice in a year un-conference since 2005 | https://internetidentityworkshop.com | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m03s | 7 | 0:00:03.520 | 00 | 03 |
| KERI | Key Event Receipt Infrastructure | https://github.com/WebOfTrust/keri | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m12s | 7 | 0:00:12.480 | 00 | 12 |
| repo | Software repository | https://github.com/trustoverip/acdc/wiki/repo | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m27s | 3 | 0:00:27.600 | 00 | 27 |
| KERIpy | Python implementation of KERI | https://github.com/WebOfTrust/keripy | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m27s | 7 | 0:00:27.600 | 00 | 27 |
| repo | Software repository | https://github.com/trustoverip/acdc/wiki/repo | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m33s | 1 | 0:00:33.120 | 00 | 33 |
| coroutines | Computer programs that can be suspended and resumed at will. | https://github.com/trustoverip/acdc/wiki/coroutines | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m41s | 1 | 0:00:41.840 | 00 | 41 |
| I/O | Input / output | https://github.com/trustoverip/acdc/wiki/input-output | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m41s | 1 | 0:00:41.840 | 00 | 41 |
| HIO | Hierarchical asynchronous coroutines and I/O in Python | https://github.com/trustoverip/acdc/wiki/hio | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m41s | 7 | 0:00:41.840 | 00 | 41 |
| Sam Smith | Samuel M. Smith PhD, Inventor and lead developer of KERI | https://www.linkedin.com/in/samuel-m-smith/ | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m41s | 7 | 0:00:41.840 | 00 | 41 |
| python | Programming Language | https://www.python.org | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m49s | 3 | 0:00:49.840 | 00 | 49 |
| clone | A copy of a system that is - and works exactly as the original | https://github.com/trustoverip/acdc/wiki/clone | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m55s | 3 | 0:00:55.200 | 00 | 55 |
| branch | A duplicate of an object under version control for further separate modification | https://github.com/trustoverip/acdc/wiki/branch | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m00s | 3 | 0:01:00.000 | 01 | 00 |
| kli | KERI command line interface | https://github.com/trustoverip/acdc/wiki/kli | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m12s | 7 | 0:01:12.960 | 01 | 12 |
| Kubernetes | Kubernetes is an open source platform for managing software containers | https://kubernetes.io | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m18s | 3 | 0:01:18.720 | 01 | 18 |
| kubectl | Kubernetes command line interface | https://kubernetes.io/docs/reference/kubectl/ | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m18s | 7 | 0:01:18.720 | 01 | 18 |
| verifiable credentials | The digital variant of our daily live's credentials (ike passport, driver's license), but in a machine-verifiable way | https://github.com/trustoverip/acdc/wiki/verifiable-credential | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m26s | 1 | 0:01:26.080 | 01 | 26 |
| Docker containers | Docker takes away repetitive, mundane configuration tasks and is used for application development | https://www.docker.com | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m38s | 3 | 0:01:38.320 | 01 | 38 |
| sub shell | a child shell started up from - and contained in another parent shell | https://github.com/trustoverip/acdc/wiki/sub-shell | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m46s | 1 | 0:01:46.640 | 01 | 46 |
| agent | A representative for an identity | https://github.com/trustoverip/acdc/wiki/agent | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m01s | 3 | 0:02:01.840 | 02 | 01 |
| cloud agent | Cloud agent is software that is installed on the cloud server instances for security, monitoring, and analysis | https://github.com/trustoverip/acdc/wiki/cloud-agent | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m01s | 3 | 0:02:01.840 | 02 | 01 |
| Py installer | Python installer bundles a Python application and all its dependencies into a single package | https://pypi.org/project/pyinstaller/ | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m09s | 3 | 0:02:09.200 | 02 | 09 |
| Electron | A Python interface for Apache Electron command line interface | https://pypi.org/project/python-electron/ | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m16s | 3 | 0:02:16.800 | 02 | 16 |
| U/I | A user interface FUI) is the space where interactions between humans and machines occur. | https://github.com/trustoverip/acdc/wiki/user-interface | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m16s | 1 | 0:02:16.800 | 02 | 16 |
| multi-sig | A digital signature scheme which allows a group of users to sign a single piece of digital data. | https://github.com/trustoverip/acdc/wiki/multisig | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m29s | 1 | 0:02:29.600 | 02 | 29 |
| identifier | Something to uniquely identify (public) identities; pointing to something or someone else. | https://github.com/trustoverip/acdc/wiki/identifier-system | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m29s | 3 | 0:02:29.600 | 02 | 29 |
| wallet | A wallet is a collection of data stores; made up of a keystore, local and remote key event log database and credential database. | https://github.com/trustoverip/acdc/wiki/wallet | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m34s | 7 | 0:02:34.320 | 02 | 34 |
| wallet commands | The section of kli where verifiable credentials can be listed | https://docs.google.com/presentation/d/1RIMX7J-cdg8OctoG4JqxPOfqKZsVNodqajtpQ0oFIyE/edit#slide=id.gf2168aef68_0_12 | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m34s | 7 | 0:02:34.320 | 02 | 34 |
| witnesses | Entity that may receive, verify, and store key events for an identifier | https://github.com/trustoverip/acdc/wiki/witness | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m44s | 7 | 0:02:44.560 | 02 | 44 |
| watchers | Guarantee that KERI logs are immutable | https://github.com/trustoverip/acdc/wiki/watcher | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m44s | 7 | 0:02:44.560 | 02 | 44 |
| key management | Management of cryptographic keys in a crypto-system. | https://github.com/trustoverip/acdc/wiki/key-management | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m16s | 7 | 0:04:16.400 | 04 | 16 |
| init | Initialization, a command in the kli | https://docs.google.com/presentation/d/1RIMX7J-cdg8OctoG4JqxPOfqKZsVNodqajtpQ0oFIyE/edit#slide=id.gf2168aef68_0_12 | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m21s | 3 | 0:04:21.360 | 04 | 21 |
| single sig identifier | An identifier that is controlled by a one-of-one signing keypair | https://github.com/trustoverip/acdc/wiki/single-signature-identifier | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m27s | 3 | 0:04:27.920 | 04 | 27 |
| key store | A keystore in KERI is the encrypted data store that hold the private keys for a collection of AIDs. | https://github.com/trustoverip/acdc/wiki/keystore | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m33s | 7 | 0:04:33.600 | 04 | 33 |
| key events | Events happening to controlling keys of an identifier recorded in a Key Event Log (KEL). | https://github.com/trustoverip/acdc/wiki/key-event | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m39s | 3 | 0:04:39.440 | 04 | 39 |
| interaction event | Anchors external data to the key-state as established by the most recent prior establishment event | https://github.com/trustoverip/acdc/wiki/interaction-event | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m39s | 7 | 0:04:39.440 | 04 | 39 |
| rotation event | Changes the key-state which includes a change to the set of authoritative keypairs for an AID | https://github.com/trustoverip/acdc/wiki/rotation-event | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m39s | 7 | 0:04:39.440 | 04 | 39 |
| signing thresholds | Minimum number of valid signatures to satisfy the requirement for successful validation | https://github.com/trustoverip/acdc/wiki/signing-threshold | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m48s | 7 | 0:04:48.480 | 04 | 48 |
| KEL | Key Event Log is the native KERI verifiable data structure | https://github.com/trustoverip/acdc/wiki/key-event-log | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=05m01s | 7 | 0:05:01.600 | 05 | 01 |
| verify signatures | Applying an algorithm that either accepts or rejects the message's claim to authenticity | https://github.com/trustoverip/acdc/wiki/verify-signature | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=05m32s | 3 | 0:05:32.000 | 05 | 32 |
| peer-to-peer communications | Peers are equally privileged, equipotent participants in a network | https://github.com/trustoverip/acdc/wiki/peer-to-peer | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=06m13s | 3 | 0:06:13.600 | 06 | 13 |
| bootstrap command | Start an empty agent or to run a single agent against one that's already been started | https://docs.google.com/presentation/d/1RIMX7J-cdg8OctoG4JqxPOfqKZsVNodqajtpQ0oFIyE/edit#slide=id.gf2168aef68_0_20 | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=06m31s | 3 | 0:06:31.280 | 06 | 31 |
| salts | Random data that is used as an additional input to a cryptographic one-way function | https://github.com/trustoverip/acdc/wiki/salt | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=06m50s | 7 | 0:06:50.480 | 06 | 50 |
| delegation | Delegation can be defined as “the act of empowering to act for another” | https://github.com/trustoverip/acdc/wiki/delegation | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=07m44s | 7 | 0:07:44.720 | 07 | 44 |
| multi-sig delegation | delegated identifiers under multi-signature control | https://github.com/trustoverip/acdc/wiki/delegation | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=07m44s | 7 | 0:07:44.720 | 07 | 44 |
| JSON | JavaScript Object Notation | https://en.wikipedia.org/wiki/JSON | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=08m08s | 3 | 0:08:08.320 | 08 | 08 |
| transferable | Control over identifier can be transferred by rotating keys | https://github.com/trustoverip/acdc/wiki/transferable-identifier | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=08m34s | 7 | 0:08:34.880 | 08 | 34 |
| ports | A number assigned to uniquely identify a connection endpoint and to direct data to a specific service. | https://en.wikipedia.org/wiki/Port_(computer_networking) | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=09m04s | 3 | 0:09:04.800 | 09 | 04 |
| configuration file | File used to configure the parameters and initial settings for some computer programs | https://github.com/trustoverip/acdc/wiki/configuration-files | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=09m16s | 1 | 0:09:16.000 | 09 | 16 |
| REST | REpresentational State Transfer (REST) is a software architectural style that developers apply to web APIs | https://github.com/WebOfTrust/keri/blob/main/docs/keri-dev-env.md#what-exactly-is-a-rest-api | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=10m00s | 3 | 0:10:00.240 | 10 | 00 |
| APIs | Application Programming Interface | https://github.com/WebOfTrust/keri/blob/main/docs/keri-dev-env.md#what-exactly-is-a-rest-api | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=10m00s | 3 | 0:10:00.240 | 10 | 00 |
| CURL | Command-line tool (curl) for transferring data using various network protocols. | https://en.wikipedia.org/wiki/CURL | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=10m17s | 3 | 0:10:17.440 | 10 | 17 |
| post and put | HTTP request methods to indicate the desired action to be performed on the identified resource | https://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=10m17s | 3 | 0:10:17.440 | 10 | 17 |
| Swagger | OpenAPI (former Swagger) is important to KERI, CESR and ACDC. It's open sourced and has many ready-usable extensions in JSON available. | https://github.com/WebOfTrust/keri/blob/main/docs/keri-dev-env.md#what-is-swagger-and-openapi | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=10m31s | 7 | 0:10:31.600 | 10 | 31 |
| passcode | Secret data, typically a string of characters, usually used to confirm a user's identity | https://github.com/trustoverip/acdc/wiki/passcode | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=11m06s | 3 | 0:11:06.560 | 11 | 06 |
| stretched into an encryption key | make a possibly weak key, typically a password or passphrase, more secure against a brute-force attack by increasing the resources | https://github.com/trustoverip/acdc/wiki/key-stretching | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=11m11s | 7 | 0:11:11.360 | 11 | 11 |
| flag | Many command line programs can be set to various mode by using a flag; e.g. -v or --verbose for verbose mode | https://en.wikipedia.org/wiki/Verbose_mode | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=12m20s | 3 | 0:12:20.240 | 12 | 20 |
| non-transferable identifier | Controlling keys over this identifier cannot be rotated and therefore this identifier is non-transferable to other control | https://github.com/trustoverip/acdc/wiki/non-transferable-identitifer | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=14m28s | 7 | 0:14:28.240 | 14 | 28 |
| toad | Field in KERI data structure for describing the witness thresshold | https://github.com/WebOfTrust/keripy/blob/28873f42aabef096d2b6f4bf1af5dbd9e219d13f/src/keri/core/eventing.py | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=15m37s | 7 | 0:15:37.120 | 15 | 37 |
| witness threshold | The minimum number of valid witness signatures required | https://github.com/trustoverip/acdc/wiki/threshold-signature-scheme | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=15m37s | 7 | 0:15:37.120 | 15 | 37 |
| pre-rotation | commitment to next rotated key set in previous rotation or inception event | https://github.com/trustoverip/acdc/wiki/pre-rotation | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=15m54s | 7 | 0:15:54.320 | 15 | 54 |
| prefixes | A prefix that is composed of a basic Base-64 (URL safe) derivation code pre-pended to Base-64 encoding of a basic public digital signing key | https://github.com/trustoverip/acdc/wiki/prefix | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=16m47s | 7 | 0:16:47.520 | 16 | 47 |
| Base64 | A group of binary-to-text encoding schemes that represent binary data | https://github.com/trustoverip/acdc/wiki/base64 | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=16m53s | 7 | 0:16:53.520 | 16 | 53 |
| qualified | when qualified, a cryptographic primitive includes a prepended derivation code | https://github.com/trustoverip/acdc/wiki/qualified | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=16m53s | 7 | 0:16:53.520 | 16 | 53 |
| derivation code | A special character that encodes the derivation process, pre-pended to the identifier | https://github.com/trustoverip/acdc/wiki/derivation-code | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=16m53s | 7 | 0:16:53.520 | 16 | 53 |
| Blake3 hash | BLAKE3 is a relatively young (2020) cryptographic hash function based on Bao and BLAKE2. | https://github.com/trustoverip/acdc/wiki/blake3 | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=16m57s | 7 | 0:16:57.920 | 16 | 57 |
| anchor data into | Data anchors are digests of digital data, that uniquely identify this data | https://github.com/trustoverip/acdc/wiki/data-anchor | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=17m14s | 7 | 0:17:14.720 | 17 | 14 |
| AID | An identifier that is self-certifying and self-sovereign | https://github.com/trustoverip/acdc/wiki/autonomic-identifier-(AID) | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=17m50s | 7 | 0:17:50.640 | 17 | 50 |
| sequence number | Incremental number in a log | https://www.storyofmathematics.com/number-sequences/ | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=17m57s | 3 | 0:17:57.280 | 17 | 57 |
| digest | Verifiable cryptographic commitment. It's a collision resistant hash of content | https://github.com/trustoverip/acdc/wiki/digest | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=17m57s | 3 | 0:17:57.280 | 17 | 57 |
| issuance event | The inception event of a verifiable credential | https://github.com/trustoverip/acdc/wiki/issuance-event | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=18m02s | 7 | 0:18:02.640 | 18 | 02 |
| public transaction event log | Is a hash linked data structure of transactions that can be used to track state | https://github.com/trustoverip/acdc/wiki/public-transaction-event-log-(PTEL) | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=18m05s | 7 | 0:18:05.840 | 18 | 05 |
| verifiable | When you can succesfully verify a signature | https://github.com/trustoverip/acdc/wiki/verify-signature | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=19m34s | 7 | 0:19:34.880 | 19 | 34 |
| establishment | An event that establishes control authority | https://github.com/trustoverip/acdc/wiki/establishment-event | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=19m39s | 7 | 0:19:39.440 | 19 | 39 |
| lmdb databases | Lightning Memory-Mapped Database | https://en.wikipedia.org/wiki/Lightning_Memory-Mapped_Database | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=21m42s | 7 | 0:21:42.000 | 21 | 42 |
| indexed signatures | Used when signing anything with a multi-key autonomic identifier; a verifier knows which of the multiple public keys was used | https://github.com/trustoverip/acdc/wiki/indexed-signature | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=23m46s | 7 | 0:23:46.480 | 23 | 46 |
| hex | Hexadecimal notation | https://en.wikipedia.org/wiki/Hexadecimal | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=23m59s | 3 | 0:23:59.040 | 23 | 59 |
| verbose | An option available in many computer operating systems and programming languages that provides additional details as to what the computer is doing | https://en.wikipedia.org/wiki/Verbose_mode | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=25m01s | 3 | 0:25:01.600 | 25 | 01 |
| self-addressing identifiers | An identifier that is deterministically generated from and embedded in the content it identifies, making it and its data mutually tamper-evident | https://github.com/trustoverip/acdc/wiki/self-addressing-identifier | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=25m29s | 7 | 0:25:29.040 | 25 | 29 |
| backer | Backers include both regular KERI witnesses and ledger-registered backers | https://github.com/trustoverip/acdc/wiki/backer | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=27m48s | 7 | 0:27:48.240 | 27 | 48 |
| ledger backer | A witness in KERI that is ledger-registered | https://github.com/trustoverip/acdc/wiki/ledger-backer | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=27m55s | 7 | 0:27:55.840 | 27 | 55 |
| witness backer | A native KERI witness whose control authority is established in a KEL | https://github.com/trustoverip/acdc/wiki/witness | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=27m55s | 7 | 0:27:55.840 | 27 | 55 |
| vLEI | Digital verifiable credentials issued by (delegates) of GLEIF to prove that information about a legel entity is verifiably authentic | https://github.com/trustoverip/acdc/wiki/verifiable-legal-entity-identifier | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=30m17s | 7 | 0:30:17.200 | 30 | 17 |
| SSI system | SSI Infrastructure consisting of the technological components that are deployed all over the world | https://github.com/trustoverip/acdc/wiki/ssi-system | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=30m22s | 1 | 0:30:22.800 | 30 | 22 |
| Indy network | Hyperledger Indy network is an SSI system based on a private blockchain | https://www.hyperledger.org/use/hyperledger-indy | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=30m22s | 7 | 0:30:22.800 | 30 | 22 |
| transfer off a ledger | The act of transferring control authority over an identifier from a ledger (or blockchain) to the native verifiable KERI data structure KEL | https://github.com/trustoverip/acdc/wiki/transfer-off-ledger | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=30m39s | 7 | 0:30:39.040 | 30 | 39 |
| Ethereum | Ethereum is the community-run technology powering the cryptocurrency ether (ETH) and thousands of decentralized applications | https://ethereum.org/en/ | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=31m02s | 7 | 0:31:02.080 | 31 | 02 |
| Aries | Hyperledger Aries provides an interoperable tool kit for creating, transmitting and storing verifiable digital credentials | https://www.hyperledger.org/use/aries | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=31m46s | 7 | 0:31:46.880 | 31 | 46 |
| service endpoints | A web service endpoint which is a URL at which clients of specific service can get access to the service. | https://github.com/trustoverip/acdc/wiki/service-endpoint | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=32m54s | 3 | 0:32:54.640 | 32 | 54 |
| URLs | A reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it | https://github.com/trustoverip/acdc/wiki/uniform-resource-locator | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=33m00s | 1 | 0:33:00.720 | 33 | 00 |
| IP-address | A numerical label such as '192.0.2.1' that is connected to a computer network that uses the Internet Protocol for communication | https://github.com/trustoverip/acdc/wiki/ip-address | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=33m42s | 1 | 0:33:42.160 | 33 | 42 |
| TCP endpoint | This is a service endpoint of the web transmission control protocol | https://github.com/trustoverip/acdc/wiki/tcp-endpoint | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=34m00s | 3 | 0:34:00.320 | 34 | 00 |
| inquisitor | | https://github.com/trustoverip/acdc/wiki/inquisitor | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=37m19s | 7 | 0:37:19.280 | 37 | 19 |
| dip: tag | | | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=49m13s | 7 | 0:49:13.520 | 49 | 13 |
| icp: tag | | | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=49m13s | 7 | 0:49:13.520 | 49 | 13 |
| di: tag | | | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=49m20s | 7 | 0:49:20.000 | 49 | 20 |
| locked state | default state of an encrypted KERI data store with a passcode | https://github.com/trustoverip/acdc/wiki/locked-state | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=52m22s | 7 | 0:52:22.640 | 52 | 22 |
| onepass | password manager | https://github.com/doglex/onepass | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=53m04s | 7 | 0:53:04.320 | 53 | 04 |
| data OOBIs | data out-of-band ntroductions | https://github.com/trustoverip/acdc/wiki/out-of-band-introduction | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=53m48s | 7 | 0:53:48.720 | 53 | 48 |
| credential schema OOBIs | credential schema out-of-band ntroductions | https://github.com/trustoverip/acdc/wiki/out-of-band-introduction | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=53m54s | 7 | 0:53:54.800 | 53 | 54 |
| Keep | Is KERI's and ACDC's crypto wallet: A task orientated application for managing AIDs in ecosystems, e.g. the vLEI Ecosystem | https://github.com/trustoverip/acdc/wiki/keep | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=54m12s | 7 | 0:54:12.560 | 54 | 12 |
| zero trust | a Zero Trust approach trusts no one | https://github.com/trustoverip/acdc/wiki/zero-trust | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=55m37s | 3 | 0:55:37.600 | 55 | 37 |
| credential registries | Is a functional component that has the capability to register and advertise the information about Credential Types that their respective Governing Parties have decided to disclose | https://essif-lab.github.io/framework/docs/terms/credential-catalogue | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=55m53s | 3 | 0:55:53.840 | 55 | 53 |
| revocation events | An event that revokes control authority over an identifier | https://github.com/trustoverip/acdc/wiki/revocation-event | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=55m58s | 3 | 0:55:58.400 | 55 | 58 |
| two-factor auth | Is an electronic authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence | https://en.wikipedia.org/wiki/Multi-factor_authentication | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=56m13s | 1 | 0:56:13.360 | 56 | 13 |
| escrow states | | https://github.com/trustoverip/acdc/wiki/escrow-state | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=56m59s | 7 | 0:56:59.200 | 56 | 59 |
| server-sent events | Mailbox notifications; a streaming service for the agent U/I, to get notifications from the KERI system itself | https://github.com/trustoverip/acdc/wiki/server-sent-event | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=57m19s | 7 | 0:57:19.920 | 57 | 19 |
| | | | | | | | |
</div>