Trust Over IP

Bite-Sized Trust — Learning Pathways

Table of Contents

  1. Foundations of Digital Trust
  2. How Decentralized Identifiers Work
  3. Keys Inside DID Documents
  4. Advanced Key Management
  5. Storing and Protecting Private Keys
  6. Introduction to Governance
  7. Making Governance Work: Conformance and Trust Registries
  8. Privacy-Preserving Verification
  9. What Next?
    1. Learn the broader model
    2. Explore concrete outputs
    3. Join the ecosystem

Foundations of Digital Trust

Goal: Understand the core building blocks that make digital trust possible, before diving into any specific technology or system.

# Video Link
1 Identifiers Watch
2 Private and Public Keys Watch
3 Digests Watch
4 Digital Signatures Watch
5 Verifiable Credentials Watch

What you will gain: a working vocabulary and a basic mental model of how identity, integrity, and authenticity are established in digital systems — the essential foundation for everything else in this series.


How Decentralized Identifiers Work

Goal: Understand what DIDs are, how they are structured, stored, and resolved, and what distinguishes one DID method from another.

# Video Link
1 Self-certifying Identifiers Watch
2 DIDs and Key Rotation Watch
3 Where DID Documents Live Watch
4 Resolving a DID Watch
5 Detecting DID Document Duplicity Watch
6 Control of DID Document Data Watch

What you will gain: a complete picture of how DIDs are created, resolved, and updated, and how to evaluate the trust assumptions of different DID methods — including which ones offer cryptographic proof of legitimate changes and which do not.


Keys Inside DID Documents

Goal: Go beyond the basics and understand the specific types of cryptographic keys that appear in a DID document and the distinct role each one plays.

# Video Link
1 Passwords and Keys Watch
2 Keys in DIDs Watch
3 Authentication Keys in DIDs Watch
4 Assertion Keys in DIDs Watch
5 Key Agreement Keys in DIDs Watch
6 Service Endpoints Watch

What you will gain: a detailed understanding of how DID documents assign different keys to different functions — authentication, signing, and encrypted communication — and how service endpoints extend a DID into a full contact point for real-world interactions.


Advanced Key Management

Goal: Understand the techniques used to make key management more resilient, including how to handle rotation, pre-rotation, and shared control.

# Video Link
1 Key Pre-rotation Watch
2 Multiple Keys Watch

What you will gain: an understanding of how pre-rotation protects against identity hijacking by committing to the next key before the current one is compromised, and how multisignature and threshold schemes eliminate single points of failure through shared key control.


Storing and Protecting Private Keys

Goal: Understand the practical options for storing private keys, the trade-offs between them, and the strategies available for recovery if something goes wrong.

# Video Link
1 Where to Store Private Keys Watch
2 Protecting Private Keys Watch
3 Hybrid Key Storage Watch

What you will gain: a practical understanding of the spectrum from clear storage to hardware secure modules, how hybrid storage balances security with recoverability, and how social recovery can protect access even if a device is lost.


Introduction to Governance

Goal: Understand what governance is, who the key players are, and why it is just as important as cryptography in building trustworthy digital systems.

# Video Link
1 What is Governance Watch
2 Players in a Governed Ecosystem Watch
3 How Governance Ecosystems Assess Risk Watch
4 How Governance Ecosystems Develop Requirements Watch

What you will gain: a solid understanding of what governance is, who plays which role in a governed ecosystem, how risks are identified and prioritized, and how those risks are translated into enforceable requirements.


Making Governance Work: Conformance and Trust Registries

Goal: Understand how governance ecosystems move from writing rules to enforcing them, and how trust registries make that enforcement queryable and machine-readable.

# Video Link
1 How Conformance Schemes Work Watch
2 Trust Registries: Whose DID is it, anyway? Watch
3 What Trust Registries Do Watch

What you will gain: a concrete understanding of how conformance schemes turn rules into verifiable accountability, and how trust registries serve as the authoritative, queryable backbone that makes digital governance actionable for both humans and software systems.


Privacy-Preserving Verification

Goal: Understand how decentralized identity systems can verify claims and authenticate users while minimizing the personal data that needs to be shared.

# Video Link
1 Zero Knowledge Proofs Watch

What you will gain: an understanding of how zero-knowledge proofs allow a person to prove a specific claim — such as being over a legal age — without revealing any underlying personal data, and why this is becoming a key tool for privacy-preserving identity in decentralized systems.


What Next?

Learn the broader model

Explore concrete outputs

Join the ecosystem


Want to go deeper? Explore the architecture and deliverables behind these concepts. Want to help shape the work? Join a working group. Want the bigger picture? Start with the ToIP model.


This site uses Just the Docs, a documentation theme for Jekyll.