
Navigation
Back to table of contents
|Link|Commentary|Section
|—|—|—|
|0000|X|Glossary, overview, how to use|
|0001|X|Prefixes, Derivation and derivation reference tables|
|0002|X|Data model (field & event concepts and semantics)|
|0003|X|Serialization|
|0004|X|Key Configuration (Signing threshold & key set)|
|0005|X|Next Key Commitment (Pre-Rotation)|
|0006|X|Seals|
|0007|X|Delegation (pending PR by Sam)|
|0008|X|Key-Event State Machine|
|0009|X|Indirect Mode & Witnesses|
|0010||Recovery/consensus Algorithm (KAACE)|
|0010||Database & Storage Considerations|
|0097|n/a|Non-Normative Implementation Guidance|
|0098|n/a|Use Cases|
|0099|n/a|Test Vectors and Normative Statement Index|
Editorial Notes
- jan 5 notes
- KID0000 - Glossary, overview, how to use {Leave for later}
- High-Level overview of Operating Modes (Direct, Indirect, Ephemeral)
- Dainty and Narrow Scope
- Dependency/RFC List (the thorax between the KERI neck and the IP waist): base64, messagePack, CBOR & JSON, ECC Dig Sigs, [128+] Cr. Digests, Messaging: UDP/TCP/HTTP (for now), standard HEX alphabet RFC
- {Note to self: review this}
- Implementation guide: explanation of higher-level behavior assumptions codified into test suites
- KID0000Comment - Mental models & big-picture rationale
- Intro to SCIDs? (Whitepaper 2.3)
- {Include link to Unified Identifier whitepaper}
- Cryptographic Trust Basis (Whitepaper 2.4)
- Autonomic Namespace (Whitepaper 3.1) & Syntax (3.2)
- Unified Identifier Model (3.3)
- KERI “Layering” and Scope
- Explanation of VCs, VC-Auth/Capabilities, etc.
- Out of scope but useful if specified: Assumptions one layer up
- link to Authentic Chained Data Container spec at ToIP