
Bite-Sized Trust — Learning Pathways
Table of Contents
- Foundations of Digital Trust
- How Decentralized Identifiers Work
- Keys Inside DID Documents
- Advanced Key Management
- Storing and Protecting Private Keys
- Introduction to Governance
- Making Governance Work: Conformance and Trust Registries
- What Next?
Foundations of Digital Trust
Goal: Understand the core building blocks that make digital trust possible, before diving into any specific technology or system.
| # | Video | Link |
|---|---|---|
| 1 | Identifiers | Watch |
| 2 | Private and Public Keys | Watch |
| 3 | Digests | Watch |
| 4 | Digital Signatures | Watch |
| 5 | Verifiable Credentials | Watch |
| 6 | Zero Knowledge Proofs | Watch |
What you will gain: a working vocabulary and a basic mental model of how identity, integrity, and authenticity are established in digital systems — including how claims can be verified while minimizing the amount of data that must be disclosed.
How Decentralized Identifiers Work
Goal: Understand what DIDs are, how they are structured, stored, and resolved, and what distinguishes one DID method from another.
Integrity, History, and Trust in DIDs
| # | Video | Link |
|---|---|---|
| 1 | Self-certifying Identifiers | Watch |
| 2 | DIDs and Key Rotation | Watch |
| 3 | Cryptographic Binding for Trust | Watch |
| 4 | Anchored Commitments | Watch |
| 5 | Where DID Documents Live | Watch |
| 6 | Resolving a DID | Watch |
| 7 | Detecting DID Document Duplicity | Watch |
| 8 | Control of DID Document Data | Watch |
What you will gain: a complete picture of how DIDs are created, resolved, and updated, how cryptographic binding ensures that changes remain tamper-evident, and how anchored commitments extend this by providing verifiable historical records that protect against forgery and key compromise. You will also understand how systems detect conflicting histories (duplicity) and what trust assumptions different DID methods make.
Keys Inside DID Documents
Goal: Go beyond the basics and understand the specific types of cryptographic keys that appear in a DID document and the distinct role each one plays.
| # | Video | Link |
|---|---|---|
| 1 | Passwords and Keys | Watch |
| 2 | Keys in DIDs | Watch |
| 3 | Authentication Keys in DIDs | Watch |
| 4 | Assertion Keys in DIDs | Watch |
| 5 | Key Agreement Keys in DIDs | Watch |
| 6 | Service Endpoints | Watch |
What you will gain: a detailed understanding of how DID documents assign different keys to different functions — authentication, signing, and encrypted communication — and how service endpoints extend a DID into a full contact point for real-world interactions.
Advanced Key Management
Goal: Understand the techniques used to make key management more resilient, including how to handle rotation, pre-rotation, and shared control.
What you will gain: an understanding of how pre-rotation protects against identity hijacking by committing to the next key before the current one is compromised, how multisignature and threshold schemes eliminate single points of failure through shared key control, and why additional mechanisms—like verifiable history—are needed to maintain trust over time.
Storing and Protecting Private Keys
Goal: Understand the practical options for storing private keys, the trade-offs between them, and the strategies available for recovery if something goes wrong.
| # | Video | Link |
|---|---|---|
| 1 | Where to Store Private Keys | Watch |
| 2 | Protecting Private Keys | Watch |
| 3 | Hybrid Key Storage | Watch |
What you will gain: a practical understanding of the spectrum from clear storage to hardware secure modules, how hybrid storage balances security with recoverability, and how social recovery can protect access even if a device is lost.
Introduction to Governance
Goal: Understand what governance is, who the key players are, and why it is just as important as cryptography in building trustworthy digital systems.
| # | Video | Link |
|---|---|---|
| 1 | What is Governance | Watch |
| 2 | Players in a Governed Ecosystem | Watch |
| 3 | How Governance Ecosystems Assess Risk | Watch |
| 4 | How Governance Ecosystems Develop Requirements | Watch |
What you will gain: a solid understanding of what governance is, who plays which role in a governed ecosystem, how risks are identified and prioritized, and how those risks are translated into enforceable requirements.
Making Governance Work: Conformance and Trust Registries
Goal: Understand how governance ecosystems move from writing rules to enforcing them, and how trust registries make that enforcement queryable and machine-readable.
| # | Video | Link |
|---|---|---|
| 1 | How Conformance Schemes Work | Watch |
| 2 | Trust Registries: Whose DID is it, anyway? | Watch |
| 3 | What Trust Registries Do | Watch |
What you will gain: a concrete understanding of how conformance schemes turn rules into verifiable accountability, and how trust registries serve as the authoritative, queryable backbone that makes digital governance actionable for both humans and software systems.
What Next?
Learn the broader model
Explore concrete outputs
Join the ecosystem
Want to go deeper? Explore the architecture and deliverables behind these concepts. Want to help shape the work? Join a working group. Want the bigger picture? Start with the ToIP model.