What is a self addressing identifier, a SAID? What does this mean and how is a SAID created and verified? This post answers these questions. We show a generalized process for calculating SAIDs and delve into the encoding format for CESR-compliant self addressing identifiers. Examples with three popular algorithms, SHA2-256, […]
Estimated reading time: 65 minutes
Welcome to the inner workings of the Python implementation of KERI! HIO stands for Hierarchical IO. Disclaimer: this post is for a technical audience who have a need to read and understand the WebOfTrust Python implementation of the KERI, ACDC, and CESR Trust over IP (ToIP) specifications. Have you ever […]
Estimated reading time: 26 minutes
The WebOfTrust community recently released a major update to the Key Event Receipt Infrastructure (KERI) and Authentic Chained Data Containers (ACDC) implementation as a coordinated release across the suite of WebOfTrust repositories. Coordinated Release This resulted in the following release versions: Branch Strategy Change Recent Blog Posts See Nuttawut Kongsuwan’s […]
Estimated reading time: 1 minute
Welcome to the latest installment in the KERI Tutorial Series! In a prior article we learned how to use KERI to sign and verify simple messages. This tutorial goes to the full depth of issuing and verifying credentials (ACDCs). We outfit our team of explorers bound on a treasure hunting […]
Estimated reading time: 185 minutes
Ever needed to send a love letter and trust that your recipient knew it was really you that sent it? If so then this post is for you! KERI provides the end-verifiability and secure attribution you need to trust your communications are secure.Join Brett and Allie as they show how […]
Estimated reading time: 48 minutes