kli-demo-2022

Interviewer: Steven Milstein
Interviewee: Phil Feairheller

Subtitles, Links table, Brief explanations: Henk van Cann

This footage is the topic of this file.

Explanation

Terms are words used by Phil Feairheller, I provided a link to more explanation, mainly to the ACDC glossary. The point in the video where Phil mentions the term for the first time is called vidstart, the level of understanding at which this term might need explanation, and finally a brief explanation in field text of the term in the first column.

Scroll table to the right

To get to the links and other columns of the table you might need to scroll the table all the way to the right.

Level

Since KERI and ACDC education start off at the level of SSI-expert, a beginner is not a layman, but somebody with a good common understanding of IT and digital identity.

  • 1=beginner digital identity expert
  • 3=advanced self-sovereign identity expert
  • 7=SSI experts
Just my 2 cents:
Don't try KERI and ACDC on your family, friends and other innocent bystanders.
Term text link vidstart level
IIW Internet Identity Workshop twice in a year un-conference since 2005 https://internetidentityworkshop.com https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m03s 7
KERI Key Event Receipt Infrastructure https://github.com/WebOfTrust/keri https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m12s 7
repo Software repository https://github.com/trustoverip/acdc/wiki/repo https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m27s 3
KERIpy Python implementation of KERI https://github.com/WebOfTrust/keripy https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m27s 7
repo Software repository https://github.com/trustoverip/acdc/wiki/repo https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m33s 1
coroutines Computer programs that can be suspended and resumed at will. https://github.com/trustoverip/acdc/wiki/coroutines https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m41s 1
I/O Input / output https://github.com/trustoverip/acdc/wiki/input-output https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m41s 1
HIO Hierarchical asynchronous coroutines and I/O in Python https://github.com/trustoverip/acdc/wiki/hio https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m41s 7
Sam Smith Samuel M. Smith PhD, Inventor and lead developer of KERI https://www.linkedin.com/in/samuel-m-smith/ https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m41s 7
python Programming Language https://www.python.org https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m49s 3
clone A copy of a system that is - and works exactly as the original https://github.com/trustoverip/acdc/wiki/clone https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m55s 3
branch A duplicate of an object under version control for further separate modification https://github.com/trustoverip/acdc/wiki/branch https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m00s 3
kli KERI command line interface https://github.com/trustoverip/acdc/wiki/kli https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m12s 7
Kubernetes Kubernetes is an open source platform for managing software containers https://kubernetes.io https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m18s 3
kubectl Kubernetes command line interface https://kubernetes.io/docs/reference/kubectl/ https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m18s 7
verifiable credentials The digital variant of our daily live's credentials (ike passport, driver's license), but in a machine-verifiable way https://github.com/trustoverip/acdc/wiki/verifiable-credential https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m26s 1
Docker containers Docker takes away repetitive, mundane configuration tasks and is used for application development https://www.docker.com https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m38s 3
sub shell a child shell started up from - and contained in another parent shell https://github.com/trustoverip/acdc/wiki/sub-shell https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m46s 1
agent A representative for an identity https://github.com/trustoverip/acdc/wiki/agent https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m01s 3
cloud agent Cloud agent is software that is installed on the cloud server instances for security, monitoring, and analysis https://github.com/trustoverip/acdc/wiki/cloud-agent https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m01s 3
Py installer Python installer bundles a Python application and all its dependencies into a single package https://pypi.org/project/pyinstaller/ https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m09s 3
Electron A Python interface for Apache Electron command line interface https://pypi.org/project/python-electron/ https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m16s 3
U/I A user interface FUI) is the space where interactions between humans and machines occur. https://github.com/trustoverip/acdc/wiki/user-interface https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m16s 1
multi-sig A digital signature scheme which allows a group of users to sign a single piece of digital data. https://github.com/trustoverip/acdc/wiki/multisig https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m29s 1
identifier Something to uniquely identify (public) identities; pointing to something or someone else. https://github.com/trustoverip/acdc/wiki/identifier-system https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m29s 3
wallet A wallet is a collection of data stores; made up of a keystore, local and remote key event log database and credential database. https://github.com/trustoverip/acdc/wiki/wallet https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m34s 7
wallet commands The section of kli where verifiable credentials can be listed https://docs.google.com/presentation/d/1RIMX7J-cdg8OctoG4JqxPOfqKZsVNodqajtpQ0oFIyE/edit#slide=id.gf2168aef68_0_12 https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m34s 7
witnesses Entity that may receive, verify, and store key events for an identifier https://github.com/trustoverip/acdc/wiki/witness https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m44s 7
watchers Guarantee that KERI logs are immutable https://github.com/trustoverip/acdc/wiki/watcher https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m44s 7
key management Management of cryptographic keys in a crypto-system. https://github.com/trustoverip/acdc/wiki/key-management https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m16s 7
init Initialization, a command in the kli https://docs.google.com/presentation/d/1RIMX7J-cdg8OctoG4JqxPOfqKZsVNodqajtpQ0oFIyE/edit#slide=id.gf2168aef68_0_12 https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m21s 3
single sig identifier An identifier that is controlled by a one-of-one signing keypair https://github.com/trustoverip/acdc/wiki/single-signature-identifier https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m27s 3
key store A keystore in KERI is the encrypted data store that hold the private keys for a collection of AIDs. https://github.com/trustoverip/acdc/wiki/keystore https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m33s 7
key events Events happening to controlling keys of an identifier recorded in a Key Event Log (KEL). https://github.com/trustoverip/acdc/wiki/key-event https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m39s 3
interaction event Anchors external data to the key-state as established by the most recent prior establishment event https://github.com/trustoverip/acdc/wiki/interaction-event https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m39s 7
rotation event Changes the key-state which includes a change to the set of authoritative keypairs for an AID https://github.com/trustoverip/acdc/wiki/rotation-event https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m39s 7
signing thresholds Minimum number of valid signatures to satisfy the requirement for successful validation https://github.com/trustoverip/acdc/wiki/signing-threshold https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m48s 7
KEL Key Event Log is the native KERI verifiable data structure https://github.com/trustoverip/acdc/wiki/key-event-log https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=05m01s 7
verify signatures Applying an algorithm that either accepts or rejects the message's claim to authenticity https://github.com/trustoverip/acdc/wiki/verify-signature https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=05m32s 3
peer-to-peer communications Peers are equally privileged, equipotent participants in a network https://github.com/trustoverip/acdc/wiki/peer-to-peer https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=06m13s 3
bootstrap command Start an empty agent or to run a single agent against one that's already been started https://docs.google.com/presentation/d/1RIMX7J-cdg8OctoG4JqxPOfqKZsVNodqajtpQ0oFIyE/edit#slide=id.gf2168aef68_0_20 https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=06m31s 3
salts Random data that is used as an additional input to a cryptographic one-way function https://github.com/trustoverip/acdc/wiki/salt https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=06m50s 7
delegation Delegation can be defined as “the act of empowering to act for another” https://github.com/trustoverip/acdc/wiki/delegation https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=07m44s 7
multi-sig delegation delegated identifiers under multi-signature control https://github.com/trustoverip/acdc/wiki/delegation https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=07m44s 7
JSON JavaScript Object Notation https://en.wikipedia.org/wiki/JSON https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=08m08s 3
transferable Control over identifier can be transferred by rotating keys https://github.com/trustoverip/acdc/wiki/transferable-identifier https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=08m34s 7
ports A number assigned to uniquely identify a connection endpoint and to direct data to a specific service. https://en.wikipedia.org/wiki/Port_(computer_networking) https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=09m04s 3
configuration file File used to configure the parameters and initial settings for some computer programs https://github.com/trustoverip/acdc/wiki/configuration-files https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=09m16s 1
REST REpresentational State Transfer (REST) is a software architectural style that developers apply to web APIs https://github.com/WebOfTrust/keri/blob/main/docs/keri-dev-env.md#what-exactly-is-a-rest-api https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=10m00s 3
APIs Application Programming Interface https://github.com/WebOfTrust/keri/blob/main/docs/keri-dev-env.md#what-exactly-is-a-rest-api https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=10m00s 3
CURL Command-line tool (curl) for transferring data using various network protocols. https://en.wikipedia.org/wiki/CURL https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=10m17s 3
post and put HTTP request methods to indicate the desired action to be performed on the identified resource https://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=10m17s 3
Swagger OpenAPI (former Swagger) is important to KERI, CESR and ACDC. It's open sourced and has many ready-usable extensions in JSON available. https://github.com/WebOfTrust/keri/blob/main/docs/keri-dev-env.md#what-is-swagger-and-openapi https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=10m31s 7
passcode Secret data, typically a string of characters, usually used to confirm a user's identity https://github.com/trustoverip/acdc/wiki/passcode https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=11m06s 3
stretched into an encryption key make a possibly weak key, typically a password or passphrase, more secure against a brute-force attack by increasing the resources https://github.com/trustoverip/acdc/wiki/key-stretching https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=11m11s 7
flag Many command line programs can be set to various mode by using a flag; e.g. -v or verbose for verbose mode https://en.wikipedia.org/wiki/Verbose_mode https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=12m20s 3
non-transferable identifier Controlling keys over this identifier cannot be rotated and therefore this identifier is non-transferable to other control https://github.com/trustoverip/acdc/wiki/non-transferable-identitifer https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=14m28s 7
toad Field in KERI data structure for describing the witness thresshold https://github.com/WebOfTrust/keripy/blob/28873f42aabef096d2b6f4bf1af5dbd9e219d13f/src/keri/core/eventing.py https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=15m37s 7
witness threshold The minimum number of valid witness signatures required https://github.com/trustoverip/acdc/wiki/threshold-signature-scheme https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=15m37s 7
pre-rotation commitment to next rotated key set in previous rotation or inception event https://github.com/trustoverip/acdc/wiki/pre-rotation https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=15m54s 7
prefixes A prefix that is composed of a basic Base-64 (URL safe) derivation code pre-pended to Base-64 encoding of a basic public digital signing key https://github.com/trustoverip/acdc/wiki/prefix https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=16m47s 7
Base64 A group of binary-to-text encoding schemes that represent binary data https://github.com/trustoverip/acdc/wiki/base64 https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=16m53s 7
qualified when qualified, a cryptographic primitive includes a prepended derivation code https://github.com/trustoverip/acdc/wiki/qualified https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=16m53s 7
derivation code A special character that encodes the derivation process, pre-pended to the identifier https://github.com/trustoverip/acdc/wiki/derivation-code https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=16m53s 7
Blake3 hash BLAKE3 is a relatively young (2020) cryptographic hash function based on Bao and BLAKE2. https://github.com/trustoverip/acdc/wiki/blake3 https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=16m57s 7
anchor data into Data anchors are digests of digital data, that uniquely identify this data https://github.com/trustoverip/acdc/wiki/data-anchor https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=17m14s 7
AID An identifier that is self-certifying and self-sovereign https://github.com/trustoverip/acdc/wiki/autonomic-identifier-(AID) https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=17m50s 7
sequence number Incremental number in a log https://www.storyofmathematics.com/number-sequences/ https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=17m57s 3
digest Verifiable cryptographic commitment. It's a collision resistant hash of content https://github.com/trustoverip/acdc/wiki/digest https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=17m57s 3
issuance event The inception event of a verifiable credential https://github.com/trustoverip/acdc/wiki/issuance-event https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=18m02s 7
public transaction event log Is a hash linked data structure of transactions that can be used to track state https://github.com/trustoverip/acdc/wiki/public-transaction-event-log-(PTEL) https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=18m05s 7
verifiable When you can succesfully verify a signature https://github.com/trustoverip/acdc/wiki/verify-signature https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=19m34s 7
establishment An event that establishes control authority https://github.com/trustoverip/acdc/wiki/establishment-event https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=19m39s 7
lmdb databases Lightning Memory-Mapped Database https://en.wikipedia.org/wiki/Lightning_Memory-Mapped_Database https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=21m42s 7
indexed signatures Used when signing anything with a multi-key autonomic identifier; a verifier knows which of the multiple public keys was used https://github.com/trustoverip/acdc/wiki/indexed-signature https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=23m46s 7
hex Hexadecimal notation https://en.wikipedia.org/wiki/Hexadecimal https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=23m59s 3
verbose An option available in many computer operating systems and programming languages that provides additional details as to what the computer is doing https://en.wikipedia.org/wiki/Verbose_mode https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=25m01s 3
self-addressing identifiers An identifier that is deterministically generated from and embedded in the content it identifies, making it and its data mutually tamper-evident https://github.com/trustoverip/acdc/wiki/self-addressing-identifier https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=25m29s 7
backer Backers include both regular KERI witnesses and ledger-registered backers https://github.com/trustoverip/acdc/wiki/backer https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=27m48s 7
ledger backer A witness in KERI that is ledger-registered https://github.com/trustoverip/acdc/wiki/ledger-backer https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=27m55s 7
witness backer A native KERI witness whose control authority is established in a KEL https://github.com/trustoverip/acdc/wiki/witness https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=27m55s 7
vLEI Digital verifiable credentials issued by (delegates) of GLEIF to prove that information about a legel entity is verifiably authentic https://github.com/trustoverip/acdc/wiki/verifiable-legal-entity-identifier https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=30m17s 7
SSI system SSI Infrastructure consisting of the technological components that are deployed all over the world https://github.com/trustoverip/acdc/wiki/ssi-system https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=30m22s 1
Indy network Hyperledger Indy network is an SSI system based on a private blockchain https://www.hyperledger.org/use/hyperledger-indy https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=30m22s 7
transfer off a ledger The act of transferring control authority over an identifier from a ledger (or blockchain) to the native verifiable KERI data structure KEL https://github.com/trustoverip/acdc/wiki/transfer-off-ledger https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=30m39s 7
Ethereum Ethereum is the community-run technology powering the cryptocurrency ether (ETH) and thousands of decentralized applications https://ethereum.org/en/ https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=31m02s 7
Aries Hyperledger Aries provides an interoperable tool kit for creating, transmitting and storing verifiable digital credentials https://www.hyperledger.org/use/aries https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=31m46s 7
service endpoints A web service endpoint which is a URL at which clients of specific service can get access to the service. https://github.com/trustoverip/acdc/wiki/service-endpoint https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=32m54s 3
URLs A reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it https://github.com/trustoverip/acdc/wiki/uniform-resource-locator https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=33m00s 1
IP-address A numerical label such as '192.0.2.1' that is connected to a computer network that uses the Internet Protocol for communication https://github.com/trustoverip/acdc/wiki/ip-address https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=33m42s 1
TCP endpoint This is a service endpoint of the web transmission control protocol https://github.com/trustoverip/acdc/wiki/tcp-endpoint https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=34m00s 3
inquisitor https://github.com/trustoverip/acdc/wiki/inquisitor https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=37m19s 7
dip: tag https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=49m13s 7
icp: tag https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=49m13s 7
di: tag https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=49m20s 7
locked state default state of an encrypted KERI data store with a passcode https://github.com/trustoverip/acdc/wiki/locked-state https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=52m22s 7
onepass password manager https://github.com/doglex/onepass https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=53m04s 7
data OOBIs data out-of-band ntroductions https://github.com/trustoverip/acdc/wiki/out-of-band-introduction https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=53m48s 7
credential schema OOBIs credential schema out-of-band ntroductions https://github.com/trustoverip/acdc/wiki/out-of-band-introduction https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=53m54s 7
Keep Is KERI's and ACDC's crypto wallet: A task orientated application for managing AIDs in ecosystems, e.g. the vLEI Ecosystem https://github.com/trustoverip/acdc/wiki/keep https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=54m12s 7
zero trust a Zero Trust approach trusts no one https://github.com/trustoverip/acdc/wiki/zero-trust https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=55m37s 3
credential registries Is a functional component that has the capability to register and advertise the information about Credential Types that their respective Governing Parties have decided to disclose https://essif-lab.github.io/framework/docs/terms/credential-catalogue https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=55m53s 3
revocation events An event that revokes control authority over an identifier https://github.com/trustoverip/acdc/wiki/revocation-event https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=55m58s 3
two-factor auth Is an electronic authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence https://en.wikipedia.org/wiki/Multi-factor_authentication https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=56m13s 1
escrow states https://github.com/trustoverip/acdc/wiki/escrow-state https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=56m59s 7
server-sent events Mailbox notifications; a streaming service for the agent U/I, to get notifications from the KERI system itself https://github.com/trustoverip/acdc/wiki/server-sent-event https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=57m19s 7
Select a repo