Difference between revisions of "Identity"

From Organic Design wiki
(pickie)
(WebOfTrust primer intro)
 
(36 intermediate revisions by 5 users not shown)
Line 1: Line 1:
[[Category:Glossary]][[Category:Nodal Concepts]]
+
{{stub}}
The nodes composing the network each have a [http://en.wikipedia.org/wiki/Universally_Unique_Identifier unique identifer] sometimes called a ''GUID'' (globally unique identifier) or ''UUID'' (universally unique identifier). Since the physical nodes are all separated and often have transient availability, the method of ensuring the uniquness of a newly created nodes identifier must not rely on communications between physical-nodes.
+
WebOfTrust introduce decentralized identifiers (DID) in their [https://github.com/WebOfTrustInfo/rwot7-toronto/blob/master/topics-and-advance-readings/did-primer.md DID primer] as follows. At a superficial level, a  DID is simply a new type of globally unique identifier. But at a deeper level, DIDs are the core component of an entirely new layer of decentralised digital identity and public key infrastructure (PKI) for the Internet. This [https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust/blob/master/final-documents/dpki.pdf decentralised public key infrastructure] (DPKI) could have as much impact on global cybersecurity and cyberprivacy as the development of the [https://en.wikipedia.org/wiki/Transport_Layer_Security SSL/TLS protocol] for encrypted Web traffic (now the largest PKI in the world).
  
Most P2P networks are built upon a ''[http://en.wikipedia.org/wiki/DHT distributed hash table]'' where node identifiers are a hash of their content. This is an exclellent solution for file-based networks because files are distinguished from each other by their content.
+
A DID is an address on the internet that someone called a subject (you, a company, a device) can "own" and control directly, like a username but randomly generated. It can be used to find a connected ''DID document'' which is like a business card, providing extra information for finding or contacting or checking the signatures of that subject; that subject can update or remove that ''listing'' over time, directly.
  
In object-oriented environments, identifers cannot be a function of content because an objects' reference should remain constant even though its state may be very dynamic. In this kind of environment, unique identifers are usually created from a combination of host information, local time and a random number (this could then be hashed so the identifers are of the same form as the content-hashes).
+
Strictly speaking, a DID is a string that functions as an address. Sometimes people might use the term to refer ''both'' to the DID ''and'' the DID Document, When you use a ''DID Method'' to resolve the DID you get the associated DID Document. A DID without a DID Document is like a dead end!
  
#Why not the usual way?
+
== See also ==
Usually content is referred to by content-hashes, and dynamic objects by a hash of a unique string composed of randomness, local environment and time.
+
*[https://www.w3.org/2019/did-wg/ W3C DID Working Group] and [https://www.w3.org/TR/did-spec-registries/#did-methods DID methods]
 
+
*[https://identity.foundation/faq/ Identity Foundation]
The entire possible hash-space is given a geometry and then divided amongst the peers in a determinastic way (meaning they don't need to communicate with one another to be able to determine whether a hash-key is within their domain). The geometry allows shortest-path routes from one peer to another to be calculated.
 
*[[Wikipedia:Distributed_hash_table|Distributed Hash Tables]]
 
 
 
#GUID's
 
The nodal model does '''not''' use ''hashes'', ''randomness'' or ''localtime'' as these are not based on fundamental principles and they do not scale perfectly, so they are not in accord with the foundation [[Philosophical Notes|philosophies]] of the project. In an ''organised'' network, there is another solution to this unique-identifer problem. The problem was that nodes could not communicate together to reserve names in real-time due to node transiency and separation. But in an organisaed network, names can be treated like any other resource and be booked, reserved, merged and managed with the same processes that schedule and storage already use.
 
 
 
Identifiers are all binary sequences, they are created in response to demand as local ''id-stock'' falls too low. Ranges of unused id's are passed down the ''physical axis'' (explained below) on request because they are a network resource. The size of a requested id-range is based on the expected demand between the time of request and the next ''id meeting''. The size of id-ranges is always a power of two such that all id's in the range differ only in the least-significant-bits.
 
 
 
:A node does not need an identifier until it forms a relationship with a node outside the local peer-node. At runtime, direct memory references are used, universal identifiers are only needed for inter-peer communications. Later id-expiry and re-use will be implimented to reduce the growth rate of id-size.
 
 
 
:The distributed application handling the GUID's (global unique identifers) does not need to be very dynamic since the size of the ranges being booked can increase to account for the period involved. Since dynamic bandwidth is more expensive in terms of energy, a slower cycle is perferred so it is set to 24 hourly.
 
 
 
----
 
 
 
[[Image:Nodal-identity.jpg]]
 
 
 
;See also
 
*[[Storage and Distribution]]
 
*[[Nodal Reduction]]
 

Latest revision as of 16:25, 22 September 2021

Cone.png This article or section is a stub. Stubs are articles that have not yet received substantial attention from the authors. They are short or insufficient pieces of information and require additions to further increase the article's usefulness. The project values stubs as useful first steps toward complete articles.

WebOfTrust introduce decentralized identifiers (DID) in their DID primer as follows. At a superficial level, a DID is simply a new type of globally unique identifier. But at a deeper level, DIDs are the core component of an entirely new layer of decentralised digital identity and public key infrastructure (PKI) for the Internet. This decentralised public key infrastructure (DPKI) could have as much impact on global cybersecurity and cyberprivacy as the development of the SSL/TLS protocol for encrypted Web traffic (now the largest PKI in the world).

A DID is an address on the internet that someone called a subject (you, a company, a device) can "own" and control directly, like a username but randomly generated. It can be used to find a connected DID document which is like a business card, providing extra information for finding or contacting or checking the signatures of that subject; that subject can update or remove that listing over time, directly.

Strictly speaking, a DID is a string that functions as an address. Sometimes people might use the term to refer both to the DID and the DID Document, When you use a DID Method to resolve the DID you get the associated DID Document. A DID without a DID Document is like a dead end!

See also