hvancann
    • Create new note
    • Create a note from template
      • Sharing URL Link copied
      • /edit
      • View mode
        • Edit mode
        • View mode
        • Book mode
        • Slide mode
        Edit mode View mode Book mode Slide mode
      • Customize slides
      • Note Permission
      • Read
        • Only me
        • Signed-in users
        • Everyone
        Only me Signed-in users Everyone
      • Write
        • Only me
        • Signed-in users
        • Everyone
        Only me Signed-in users Everyone
      • Engagement control Commenting, Suggest edit, Emoji Reply
      • Invitee
    • Publish Note

      Share your work with the world Congratulations! 🎉 Your note is out in the world Publish Note

      Your note will be visible on your profile and discoverable by anyone.
      Your note is now live.
      This note is visible on your profile and discoverable online.
      Everyone on the web can find and read all notes of this public team.
      See published notes
      Unpublish note
      Please check the box to agree to the Community Guidelines.
      View profile
    • Commenting
      Permission
      Disabled Forbidden Owners Signed-in users Everyone
    • Enable
    • Permission
      • Forbidden
      • Owners
      • Signed-in users
      • Everyone
    • Suggest edit
      Permission
      Disabled Forbidden Owners Signed-in users Everyone
    • Enable
    • Permission
      • Forbidden
      • Owners
      • Signed-in users
    • Emoji Reply
    • Enable
    • Versions and GitHub Sync
    • Note settings
    • Engagement control
    • Transfer ownership
    • Delete this note
    • Save as template
    • Insert from template
    • Import from
      • Dropbox
      • Google Drive
      • Gist
      • Clipboard
    • Export to
      • Dropbox
      • Google Drive
      • Gist
    • Download
      • Markdown
      • HTML
      • Raw HTML
Menu Note settings Sharing URL Create Help
Create Create new note Create a note from template
Menu
Options
Versions and GitHub Sync Engagement control Transfer ownership Delete this note
Import from
Dropbox Google Drive Gist Clipboard
Export to
Dropbox Google Drive Gist
Download
Markdown HTML Raw HTML
Back
Sharing URL Link copied
/edit
View mode
  • Edit mode
  • View mode
  • Book mode
  • Slide mode
Edit mode View mode Book mode Slide mode
Customize slides
Note Permission
Read
Only me
  • Only me
  • Signed-in users
  • Everyone
Only me Signed-in users Everyone
Write
Only me
  • Only me
  • Signed-in users
  • Everyone
Only me Signed-in users Everyone
Engagement control Commenting, Suggest edit, Emoji Reply
Invitee
Publish Note

Share your work with the world Congratulations! 🎉 Your note is out in the world Publish Note

Your note will be visible on your profile and discoverable by anyone.
Your note is now live.
This note is visible on your profile and discoverable online.
Everyone on the web can find and read all notes of this public team.
See published notes
Unpublish note
Please check the box to agree to the Community Guidelines.
View profile
Engagement control
Commenting
Permission
Disabled Forbidden Owners Signed-in users Everyone
Enable
Permission
  • Forbidden
  • Owners
  • Signed-in users
  • Everyone
Suggest edit
Permission
Disabled Forbidden Owners Signed-in users Everyone
Enable
Permission
  • Forbidden
  • Owners
  • Signed-in users
Emoji Reply
Enable
Import from Dropbox Google Drive Gist Clipboard
   owned this note    owned this note      
Published Linked with GitHub
Subscribed
  • Any changes
    Be notified of any changes
  • Mention me
    Be notified of mention me
  • Unsubscribe
Subscribe
<!-- <link rel="stylesheet" href="../style.css" type="text/css"></link> --> <!-- This should be placed in a CSS file and referenced with the command above in comments --> <style> table a { display: inline-block; width: 50px; white-space: nowrap; overflow: hidden; text-overflow: ellipsis; } table th:first-of-type { width: 20%; } table th:nth-of-type(2) { width: 50%; } table th:nth-of-type(3) { width: 10%; } table th:nth-of-type(4) { width: 10%; } table th:nth-of-type(5) { width: 10%; } </style> # kli-demo-2022 Interviewer: Steven Milstein\ Interviewee: Phil Feairheller Subtitles, Links table, Brief explanations: Henk van Cann This [footage](https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG) is the topic of this file. ## Explanation **Term**s are words used by Phil Feairheller, I provided a **link** to more explanation, mainly to the [ACDC glossary](https://github.com/trustoverip/acdc/wiki/). The point in the video where Phil *mentions the term for the first time* is called **vidstart**, the **level** of understanding at which this term might need explanation, and finally a *brief explanation* in field **text** of the term in the first column. ### Scroll table to the right To get to the links and other columns of the table you might need to scroll the table all the way to the right. ### Level Since KERI and ACDC education start off at the level of SSI-expert, a *beginner* is not a layman, but somebody with a good common understanding of IT and digital identity. - 1=beginner digital identity expert - 3=advanced self-sovereign identity expert - 7=SSI experts ``` Just my 2 cents: Don't try KERI and ACDC on your family, friends and other innocent bystanders. ``` <!-- Paste table data between <Div > tags and cut off unnecessary columnns Adjust column width in the table CSS style definition above --> <div class="foo"> | Term | text | link | vidstart | level | |---|---|---|---|---| | IIW | Internet Identity Workshop twice in a year un-conference since 2005 | https://internetidentityworkshop.com | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m03s | 7 | 0:00:03.520 | 00 | 03 | | KERI | Key Event Receipt Infrastructure | https://github.com/WebOfTrust/keri | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m12s | 7 | 0:00:12.480 | 00 | 12 | | repo | Software repository | https://github.com/trustoverip/acdc/wiki/repo | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m27s | 3 | 0:00:27.600 | 00 | 27 | | KERIpy | Python implementation of KERI | https://github.com/WebOfTrust/keripy | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m27s | 7 | 0:00:27.600 | 00 | 27 | | repo | Software repository | https://github.com/trustoverip/acdc/wiki/repo | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m33s | 1 | 0:00:33.120 | 00 | 33 | | coroutines | Computer programs that can be suspended and resumed at will. | https://github.com/trustoverip/acdc/wiki/coroutines | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m41s | 1 | 0:00:41.840 | 00 | 41 | | I/O | Input / output | https://github.com/trustoverip/acdc/wiki/input-output | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m41s | 1 | 0:00:41.840 | 00 | 41 | | HIO | Hierarchical asynchronous coroutines and I/O in Python | https://github.com/trustoverip/acdc/wiki/hio | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m41s | 7 | 0:00:41.840 | 00 | 41 | | Sam Smith | Samuel M. Smith PhD, Inventor and lead developer of KERI | https://www.linkedin.com/in/samuel-m-smith/ | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m41s | 7 | 0:00:41.840 | 00 | 41 | | python | Programming Language | https://www.python.org | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m49s | 3 | 0:00:49.840 | 00 | 49 | | clone | A copy of a system that is - and works exactly as the original | https://github.com/trustoverip/acdc/wiki/clone | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m55s | 3 | 0:00:55.200 | 00 | 55 | | branch | A duplicate of an object under version control for further separate modification | https://github.com/trustoverip/acdc/wiki/branch | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m00s | 3 | 0:01:00.000 | 01 | 00 | | kli | KERI command line interface | https://github.com/trustoverip/acdc/wiki/kli | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m12s | 7 | 0:01:12.960 | 01 | 12 | | Kubernetes | Kubernetes is an open source platform for managing software containers | https://kubernetes.io | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m18s | 3 | 0:01:18.720 | 01 | 18 | | kubectl | Kubernetes command line interface | https://kubernetes.io/docs/reference/kubectl/ | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m18s | 7 | 0:01:18.720 | 01 | 18 | | verifiable credentials | The digital variant of our daily live's credentials (ike passport, driver's license), but in a machine-verifiable way | https://github.com/trustoverip/acdc/wiki/verifiable-credential | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m26s | 1 | 0:01:26.080 | 01 | 26 | | Docker containers | Docker takes away repetitive, mundane configuration tasks and is used for application development | https://www.docker.com | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m38s | 3 | 0:01:38.320 | 01 | 38 | | sub shell | a child shell started up from - and contained in another parent shell | https://github.com/trustoverip/acdc/wiki/sub-shell | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m46s | 1 | 0:01:46.640 | 01 | 46 | | agent | A representative for an identity | https://github.com/trustoverip/acdc/wiki/agent | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m01s | 3 | 0:02:01.840 | 02 | 01 | | cloud agent | Cloud agent is software that is installed on the cloud server instances for security, monitoring, and analysis | https://github.com/trustoverip/acdc/wiki/cloud-agent | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m01s | 3 | 0:02:01.840 | 02 | 01 | | Py installer | Python installer bundles a Python application and all its dependencies into a single package | https://pypi.org/project/pyinstaller/ | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m09s | 3 | 0:02:09.200 | 02 | 09 | | Electron | A Python interface for Apache Electron command line interface | https://pypi.org/project/python-electron/ | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m16s | 3 | 0:02:16.800 | 02 | 16 | | U/I | A user interface FUI) is the space where interactions between humans and machines occur. | https://github.com/trustoverip/acdc/wiki/user-interface | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m16s | 1 | 0:02:16.800 | 02 | 16 | | multi-sig | A digital signature scheme which allows a group of users to sign a single piece of digital data. | https://github.com/trustoverip/acdc/wiki/multisig | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m29s | 1 | 0:02:29.600 | 02 | 29 | | identifier | Something to uniquely identify (public) identities; pointing to something or someone else. | https://github.com/trustoverip/acdc/wiki/identifier-system | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m29s | 3 | 0:02:29.600 | 02 | 29 | | wallet | A wallet is a collection of data stores; made up of a keystore, local and remote key event log database and credential database. | https://github.com/trustoverip/acdc/wiki/wallet | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m34s | 7 | 0:02:34.320 | 02 | 34 | | wallet commands | The section of kli where verifiable credentials can be listed | https://docs.google.com/presentation/d/1RIMX7J-cdg8OctoG4JqxPOfqKZsVNodqajtpQ0oFIyE/edit#slide=id.gf2168aef68_0_12 | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m34s | 7 | 0:02:34.320 | 02 | 34 | | witnesses | Entity that may receive, verify, and store key events for an identifier | https://github.com/trustoverip/acdc/wiki/witness | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m44s | 7 | 0:02:44.560 | 02 | 44 | | watchers | Guarantee that KERI logs are immutable | https://github.com/trustoverip/acdc/wiki/watcher | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m44s | 7 | 0:02:44.560 | 02 | 44 | | key management | Management of cryptographic keys in a crypto-system. | https://github.com/trustoverip/acdc/wiki/key-management | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m16s | 7 | 0:04:16.400 | 04 | 16 | | init | Initialization, a command in the kli | https://docs.google.com/presentation/d/1RIMX7J-cdg8OctoG4JqxPOfqKZsVNodqajtpQ0oFIyE/edit#slide=id.gf2168aef68_0_12 | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m21s | 3 | 0:04:21.360 | 04 | 21 | | single sig identifier | An identifier that is controlled by a one-of-one signing keypair | https://github.com/trustoverip/acdc/wiki/single-signature-identifier | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m27s | 3 | 0:04:27.920 | 04 | 27 | | key store | A keystore in KERI is the encrypted data store that hold the private keys for a collection of AIDs. | https://github.com/trustoverip/acdc/wiki/keystore | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m33s | 7 | 0:04:33.600 | 04 | 33 | | key events | Events happening to controlling keys of an identifier recorded in a Key Event Log (KEL). | https://github.com/trustoverip/acdc/wiki/key-event | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m39s | 3 | 0:04:39.440 | 04 | 39 | | interaction event | Anchors external data to the key-state as established by the most recent prior establishment event | https://github.com/trustoverip/acdc/wiki/interaction-event | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m39s | 7 | 0:04:39.440 | 04 | 39 | | rotation event | Changes the key-state which includes a change to the set of authoritative keypairs for an AID | https://github.com/trustoverip/acdc/wiki/rotation-event | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m39s | 7 | 0:04:39.440 | 04 | 39 | | signing thresholds | Minimum number of valid signatures to satisfy the requirement for successful validation | https://github.com/trustoverip/acdc/wiki/signing-threshold | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m48s | 7 | 0:04:48.480 | 04 | 48 | | KEL | Key Event Log is the native KERI verifiable data structure | https://github.com/trustoverip/acdc/wiki/key-event-log | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=05m01s | 7 | 0:05:01.600 | 05 | 01 | | verify signatures | Applying an algorithm that either accepts or rejects the message's claim to authenticity | https://github.com/trustoverip/acdc/wiki/verify-signature | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=05m32s | 3 | 0:05:32.000 | 05 | 32 | | peer-to-peer communications | Peers are equally privileged, equipotent participants in a network | https://github.com/trustoverip/acdc/wiki/peer-to-peer | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=06m13s | 3 | 0:06:13.600 | 06 | 13 | | bootstrap command | Start an empty agent or to run a single agent against one that's already been started | https://docs.google.com/presentation/d/1RIMX7J-cdg8OctoG4JqxPOfqKZsVNodqajtpQ0oFIyE/edit#slide=id.gf2168aef68_0_20 | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=06m31s | 3 | 0:06:31.280 | 06 | 31 | | salts | Random data that is used as an additional input to a cryptographic one-way function | https://github.com/trustoverip/acdc/wiki/salt | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=06m50s | 7 | 0:06:50.480 | 06 | 50 | | delegation | Delegation can be defined as “the act of empowering to act for another” | https://github.com/trustoverip/acdc/wiki/delegation | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=07m44s | 7 | 0:07:44.720 | 07 | 44 | | multi-sig delegation | delegated identifiers under multi-signature control | https://github.com/trustoverip/acdc/wiki/delegation | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=07m44s | 7 | 0:07:44.720 | 07 | 44 | | JSON | JavaScript Object Notation | https://en.wikipedia.org/wiki/JSON | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=08m08s | 3 | 0:08:08.320 | 08 | 08 | | transferable | Control over identifier can be transferred by rotating keys | https://github.com/trustoverip/acdc/wiki/transferable-identifier | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=08m34s | 7 | 0:08:34.880 | 08 | 34 | | ports | A number assigned to uniquely identify a connection endpoint and to direct data to a specific service. | https://en.wikipedia.org/wiki/Port_(computer_networking) | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=09m04s | 3 | 0:09:04.800 | 09 | 04 | | configuration file | File used to configure the parameters and initial settings for some computer programs | https://github.com/trustoverip/acdc/wiki/configuration-files | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=09m16s | 1 | 0:09:16.000 | 09 | 16 | | REST | REpresentational State Transfer (REST) is a software architectural style that developers apply to web APIs | https://github.com/WebOfTrust/keri/blob/main/docs/keri-dev-env.md#what-exactly-is-a-rest-api | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=10m00s | 3 | 0:10:00.240 | 10 | 00 | | APIs | Application Programming Interface | https://github.com/WebOfTrust/keri/blob/main/docs/keri-dev-env.md#what-exactly-is-a-rest-api | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=10m00s | 3 | 0:10:00.240 | 10 | 00 | | CURL | Command-line tool (curl) for transferring data using various network protocols. | https://en.wikipedia.org/wiki/CURL | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=10m17s | 3 | 0:10:17.440 | 10 | 17 | | post and put | HTTP request methods to indicate the desired action to be performed on the identified resource | https://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=10m17s | 3 | 0:10:17.440 | 10 | 17 | | Swagger | OpenAPI (former Swagger) is important to KERI, CESR and ACDC. It's open sourced and has many ready-usable extensions in JSON available. | https://github.com/WebOfTrust/keri/blob/main/docs/keri-dev-env.md#what-is-swagger-and-openapi | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=10m31s | 7 | 0:10:31.600 | 10 | 31 | | passcode | Secret data, typically a string of characters, usually used to confirm a user's identity | https://github.com/trustoverip/acdc/wiki/passcode | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=11m06s | 3 | 0:11:06.560 | 11 | 06 | | stretched into an encryption key | make a possibly weak key, typically a password or passphrase, more secure against a brute-force attack by increasing the resources | https://github.com/trustoverip/acdc/wiki/key-stretching | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=11m11s | 7 | 0:11:11.360 | 11 | 11 | | flag | Many command line programs can be set to various mode by using a flag; e.g. -v or --verbose for verbose mode | https://en.wikipedia.org/wiki/Verbose_mode | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=12m20s | 3 | 0:12:20.240 | 12 | 20 | | non-transferable identifier | Controlling keys over this identifier cannot be rotated and therefore this identifier is non-transferable to other control | https://github.com/trustoverip/acdc/wiki/non-transferable-identitifer | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=14m28s | 7 | 0:14:28.240 | 14 | 28 | | toad | Field in KERI data structure for describing the witness thresshold | https://github.com/WebOfTrust/keripy/blob/28873f42aabef096d2b6f4bf1af5dbd9e219d13f/src/keri/core/eventing.py | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=15m37s | 7 | 0:15:37.120 | 15 | 37 | | witness threshold | The minimum number of valid witness signatures required | https://github.com/trustoverip/acdc/wiki/threshold-signature-scheme | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=15m37s | 7 | 0:15:37.120 | 15 | 37 | | pre-rotation | commitment to next rotated key set in previous rotation or inception event | https://github.com/trustoverip/acdc/wiki/pre-rotation | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=15m54s | 7 | 0:15:54.320 | 15 | 54 | | prefixes | A prefix that is composed of a basic Base-64 (URL safe) derivation code pre-pended to Base-64 encoding of a basic public digital signing key | https://github.com/trustoverip/acdc/wiki/prefix | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=16m47s | 7 | 0:16:47.520 | 16 | 47 | | Base64 | A group of binary-to-text encoding schemes that represent binary data | https://github.com/trustoverip/acdc/wiki/base64 | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=16m53s | 7 | 0:16:53.520 | 16 | 53 | | qualified | when qualified, a cryptographic primitive includes a prepended derivation code | https://github.com/trustoverip/acdc/wiki/qualified | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=16m53s | 7 | 0:16:53.520 | 16 | 53 | | derivation code | A special character that encodes the derivation process, pre-pended to the identifier | https://github.com/trustoverip/acdc/wiki/derivation-code | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=16m53s | 7 | 0:16:53.520 | 16 | 53 | | Blake3 hash | BLAKE3 is a relatively young (2020) cryptographic hash function based on Bao and BLAKE2. | https://github.com/trustoverip/acdc/wiki/blake3 | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=16m57s | 7 | 0:16:57.920 | 16 | 57 | | anchor data into | Data anchors are digests of digital data, that uniquely identify this data | https://github.com/trustoverip/acdc/wiki/data-anchor | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=17m14s | 7 | 0:17:14.720 | 17 | 14 | | AID | An identifier that is self-certifying and self-sovereign | https://github.com/trustoverip/acdc/wiki/autonomic-identifier-(AID) | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=17m50s | 7 | 0:17:50.640 | 17 | 50 | | sequence number | Incremental number in a log | https://www.storyofmathematics.com/number-sequences/ | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=17m57s | 3 | 0:17:57.280 | 17 | 57 | | digest | Verifiable cryptographic commitment. It's a collision resistant hash of content | https://github.com/trustoverip/acdc/wiki/digest | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=17m57s | 3 | 0:17:57.280 | 17 | 57 | | issuance event | The inception event of a verifiable credential | https://github.com/trustoverip/acdc/wiki/issuance-event | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=18m02s | 7 | 0:18:02.640 | 18 | 02 | | public transaction event log | Is a hash linked data structure of transactions that can be used to track state | https://github.com/trustoverip/acdc/wiki/public-transaction-event-log-(PTEL) | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=18m05s | 7 | 0:18:05.840 | 18 | 05 | | verifiable | When you can succesfully verify a signature | https://github.com/trustoverip/acdc/wiki/verify-signature | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=19m34s | 7 | 0:19:34.880 | 19 | 34 | | establishment | An event that establishes control authority | https://github.com/trustoverip/acdc/wiki/establishment-event | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=19m39s | 7 | 0:19:39.440 | 19 | 39 | | lmdb databases | Lightning Memory-Mapped Database | https://en.wikipedia.org/wiki/Lightning_Memory-Mapped_Database | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=21m42s | 7 | 0:21:42.000 | 21 | 42 | | indexed signatures | Used when signing anything with a multi-key autonomic identifier; a verifier knows which of the multiple public keys was used | https://github.com/trustoverip/acdc/wiki/indexed-signature | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=23m46s | 7 | 0:23:46.480 | 23 | 46 | | hex | Hexadecimal notation | https://en.wikipedia.org/wiki/Hexadecimal | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=23m59s | 3 | 0:23:59.040 | 23 | 59 | | verbose | An option available in many computer operating systems and programming languages that provides additional details as to what the computer is doing | https://en.wikipedia.org/wiki/Verbose_mode | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=25m01s | 3 | 0:25:01.600 | 25 | 01 | | self-addressing identifiers | An identifier that is deterministically generated from and embedded in the content it identifies, making it and its data mutually tamper-evident | https://github.com/trustoverip/acdc/wiki/self-addressing-identifier | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=25m29s | 7 | 0:25:29.040 | 25 | 29 | | backer | Backers include both regular KERI witnesses and ledger-registered backers | https://github.com/trustoverip/acdc/wiki/backer | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=27m48s | 7 | 0:27:48.240 | 27 | 48 | | ledger backer | A witness in KERI that is ledger-registered | https://github.com/trustoverip/acdc/wiki/ledger-backer | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=27m55s | 7 | 0:27:55.840 | 27 | 55 | | witness backer | A native KERI witness whose control authority is established in a KEL | https://github.com/trustoverip/acdc/wiki/witness | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=27m55s | 7 | 0:27:55.840 | 27 | 55 | | vLEI | Digital verifiable credentials issued by (delegates) of GLEIF to prove that information about a legel entity is verifiably authentic | https://github.com/trustoverip/acdc/wiki/verifiable-legal-entity-identifier | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=30m17s | 7 | 0:30:17.200 | 30 | 17 | | SSI system | SSI Infrastructure consisting of the technological components that are deployed all over the world | https://github.com/trustoverip/acdc/wiki/ssi-system | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=30m22s | 1 | 0:30:22.800 | 30 | 22 | | Indy network | Hyperledger Indy network is an SSI system based on a private blockchain | https://www.hyperledger.org/use/hyperledger-indy | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=30m22s | 7 | 0:30:22.800 | 30 | 22 | | transfer off a ledger | The act of transferring control authority over an identifier from a ledger (or blockchain) to the native verifiable KERI data structure KEL | https://github.com/trustoverip/acdc/wiki/transfer-off-ledger | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=30m39s | 7 | 0:30:39.040 | 30 | 39 | | Ethereum | Ethereum is the community-run technology powering the cryptocurrency ether (ETH) and thousands of decentralized applications | https://ethereum.org/en/ | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=31m02s | 7 | 0:31:02.080 | 31 | 02 | | Aries | Hyperledger Aries provides an interoperable tool kit for creating, transmitting and storing verifiable digital credentials | https://www.hyperledger.org/use/aries | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=31m46s | 7 | 0:31:46.880 | 31 | 46 | | service endpoints | A web service endpoint which is a URL at which clients of specific service can get access to the service. | https://github.com/trustoverip/acdc/wiki/service-endpoint | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=32m54s | 3 | 0:32:54.640 | 32 | 54 | | URLs | A reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it | https://github.com/trustoverip/acdc/wiki/uniform-resource-locator | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=33m00s | 1 | 0:33:00.720 | 33 | 00 | | IP-address | A numerical label such as '192.0.2.1' that is connected to a computer network that uses the Internet Protocol for communication | https://github.com/trustoverip/acdc/wiki/ip-address | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=33m42s | 1 | 0:33:42.160 | 33 | 42 | | TCP endpoint | This is a service endpoint of the web transmission control protocol | https://github.com/trustoverip/acdc/wiki/tcp-endpoint | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=34m00s | 3 | 0:34:00.320 | 34 | 00 | | inquisitor | | https://github.com/trustoverip/acdc/wiki/inquisitor | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=37m19s | 7 | 0:37:19.280 | 37 | 19 | | dip: tag | | | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=49m13s | 7 | 0:49:13.520 | 49 | 13 | | icp: tag | | | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=49m13s | 7 | 0:49:13.520 | 49 | 13 | | di: tag | | | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=49m20s | 7 | 0:49:20.000 | 49 | 20 | | locked state | default state of an encrypted KERI data store with a passcode | https://github.com/trustoverip/acdc/wiki/locked-state | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=52m22s | 7 | 0:52:22.640 | 52 | 22 | | onepass | password manager | https://github.com/doglex/onepass | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=53m04s | 7 | 0:53:04.320 | 53 | 04 | | data OOBIs | data out-of-band ntroductions | https://github.com/trustoverip/acdc/wiki/out-of-band-introduction | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=53m48s | 7 | 0:53:48.720 | 53 | 48 | | credential schema OOBIs | credential schema out-of-band ntroductions | https://github.com/trustoverip/acdc/wiki/out-of-band-introduction | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=53m54s | 7 | 0:53:54.800 | 53 | 54 | | Keep | Is KERI's and ACDC's crypto wallet: A task orientated application for managing AIDs in ecosystems, e.g. the vLEI Ecosystem | https://github.com/trustoverip/acdc/wiki/keep | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=54m12s | 7 | 0:54:12.560 | 54 | 12 | | zero trust | a Zero Trust approach trusts no one | https://github.com/trustoverip/acdc/wiki/zero-trust | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=55m37s | 3 | 0:55:37.600 | 55 | 37 | | credential registries | Is a functional component that has the capability to register and advertise the information about Credential Types that their respective Governing Parties have decided to disclose | https://essif-lab.github.io/framework/docs/terms/credential-catalogue | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=55m53s | 3 | 0:55:53.840 | 55 | 53 | | revocation events | An event that revokes control authority over an identifier | https://github.com/trustoverip/acdc/wiki/revocation-event | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=55m58s | 3 | 0:55:58.400 | 55 | 58 | | two-factor auth | Is an electronic authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence | https://en.wikipedia.org/wiki/Multi-factor_authentication | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=56m13s | 1 | 0:56:13.360 | 56 | 13 | | escrow states | | https://github.com/trustoverip/acdc/wiki/escrow-state | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=56m59s | 7 | 0:56:59.200 | 56 | 59 | | server-sent events | Mailbox notifications; a streaming service for the agent U/I, to get notifications from the KERI system itself | https://github.com/trustoverip/acdc/wiki/server-sent-event | https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=57m19s | 7 | 0:57:19.920 | 57 | 19 | | | | | | | | | | </div>

Import from clipboard

Paste your markdown or webpage here...

Advanced permission required

Your current role can only read. Ask the system administrator to acquire write and comment permission.

This team is disabled

Sorry, this team is disabled. You can't edit this note.

This note is locked

Sorry, only owner can edit this note.

Reach the limit

Sorry, you've reached the max length this note can be.
Please reduce the content or divide it to more notes, thank you!

Import from Gist

Import from Snippet

or

Export to Snippet

Are you sure?

Do you really want to delete this note?
All users will lose their connection.

Create a note from template

Create a note from template

Oops...
This template has been removed or transferred.
Upgrade
All
  • All
  • Team
No template.

Create a template

Upgrade

Delete template

Do you really want to delete this template?
Turn this template into a regular note and keep its content, versions, and comments.

This page need refresh

You have an incompatible client version.
Refresh to update.
New version available!
See releases notes here
Refresh to enjoy new features.
Your user state has changed.
Refresh to load new user state.

Sign in

Forgot password

or

By clicking below, you agree to our terms of service.

Sign in via Facebook Sign in via Twitter Sign in via GitHub Sign in via Dropbox Sign in with Wallet
Wallet ( )
Connect another wallet

New to HackMD? Sign up

Help

  • English
  • 中文
  • Français
  • Deutsch
  • 日本語
  • Español
  • Català
  • Ελληνικά
  • Português
  • italiano
  • Türkçe
  • Русский
  • Nederlands
  • hrvatski jezik
  • język polski
  • Українська
  • हिन्दी
  • svenska
  • Esperanto
  • dansk

Documents

Help & Tutorial

How to use Book mode

Slide Example

API Docs

Edit in VSCode

Install browser extension

Contacts

Feedback

Discord

Send us email

Resources

Releases

Pricing

Blog

Policy

Terms

Privacy

Cheatsheet

Syntax Example Reference
# Header Header 基本排版
- Unordered List
  • Unordered List
1. Ordered List
  1. Ordered List
- [ ] Todo List
  • Todo List
> Blockquote
Blockquote
**Bold font** Bold font
*Italics font* Italics font
~~Strikethrough~~ Strikethrough
19^th^ 19th
H~2~O H2O
++Inserted text++ Inserted text
==Marked text== Marked text
[link text](https:// "title") Link
![image alt](https:// "title") Image
`Code` Code 在筆記中貼入程式碼
```javascript
var i = 0;
```
var i = 0;
:smile: :smile: Emoji list
{%youtube youtube_id %} Externals
$L^aT_eX$ LaTeX
:::info
This is a alert area.
:::

This is a alert area.

Versions and GitHub Sync
Get Full History Access

  • Edit version name
  • Delete

revision author avatar     named on  

More Less

Note content is identical to the latest version.
Compare
    Choose a version
    No search result
    Version not found
Sign in to link this note to GitHub
Learn more
This note is not linked with GitHub
 

Feedback

Submission failed, please try again

Thanks for your support.

On a scale of 0-10, how likely is it that you would recommend HackMD to your friends, family or business associates?

Please give us some advice and help us improve HackMD.

 

Thanks for your feedback

Remove version name

Do you want to remove this version name and description?

Transfer ownership

Transfer to
    Warning: is a public team. If you transfer note to this team, everyone on the web can find and read this note.

      Link with GitHub

      Please authorize HackMD on GitHub
      • Please sign in to GitHub and install the HackMD app on your GitHub repo.
      • HackMD links with GitHub through a GitHub App. You can choose which repo to install our App.
      Learn more  Sign in to GitHub

      Push the note to GitHub Push to GitHub Pull a file from GitHub

        Authorize again
       

      Choose which file to push to

      Select repo
      Refresh Authorize more repos
      Select branch
      Select file
      Select branch
      Choose version(s) to push
      • Save a new version and push
      • Choose from existing versions
      Include title and tags
      Available push count

      Pull from GitHub

       
      File from GitHub
      File from HackMD

      GitHub Link Settings

      File linked

      Linked by
      File path
      Last synced branch
      Available push count

      Danger Zone

      Unlink
      You will no longer receive notification when GitHub file changes after unlink.

      Syncing

      Push failed

      Push successfully