Full Video Index
| Video | Why this matters | Tags | Watch next | Go deeper |
|---|---|---|---|---|
| Identifiers | Every trust system starts by deciding how things are named and referenced. | Beginner | Private and Public Keys | ToIP Overview |
| Private and Public Keys | The cryptographic basis for secure exchange and verification. | Beginner, Recommended | Digests | Technical Architecture |
| Digests | Hashing explains integrity and tamper evidence. | Beginner | Digital Signatures | Technical Architecture |
| Digital Signatures | Where integrity and authenticity become operational. | Beginner, Recommended | Verifiable Credentials | Technical Architecture Spec (PDF) |
| Verifiable Credentials | How claims can be verified without repeatedly calling the issuer. | Beginner, Recommended | DIDs and Key Rotation | The ToIP Model |
| Self-certifying Identifiers | Identifiers that carry cryptographic assurance directly. | Deep Dive, Architecture | DIDs and Key Rotation | Evolution of the ToIP Stack |
| DIDs and Key Rotation | Identity is not static; secure systems need lifecycle and recovery logic. | Recommended, Architecture | Where DID Documents Live | Evolution of the ToIP Stack |
| Where DID Documents Live | DID methods differ materially in storage and trust assumptions. | Deep Dive, Architecture | Resolving a DID | Technical Architecture Spec (PDF) |
| Resolving a DID | Resolution is the bridge from identifier to usable trust data. | Deep Dive, Architecture | Detecting DID Document Duplicity | Technical Architecture Spec (PDF) |
| Detecting DID Document Duplicity | Trust requires confidence that history and updates are not being manipulated. | Deep Dive, Architecture, Governance | Control of DID Document Data | Deliverables |
| Control of DID Document Data | Not all DID methods provide cryptographic proof of legitimate updates — your choice of method determines how much trust you can place in changes. | Deep Dive, Architecture | Passwords and Keys | Technical Architecture Spec (PDF) |
| Passwords and Keys | Passwords are fragile; keys and DIDs offer a stronger, phishing-resistant foundation for online trust. | Beginner, Recommended | Keys in DIDs | Evolution of the ToIP Stack |
| Keys in DIDs | A DID document contains different key types for different purposes — making a DID a versatile toolkit for trust and authority. | Recommended, Architecture | Authentication Keys in DIDs | Technical Architecture Spec (PDF) |
| Authentication Keys in DIDs | Password-free authentication via key control puts identity in the hands of the DID subject rather than a central authority. | Recommended, Architecture | Assertion Keys in DIDs | Technical Architecture Spec (PDF) |
| Assertion Keys in DIDs | Assertion keys enable portable, verifiable credentials that can be checked anywhere without a central authority. | Recommended, Architecture | Key Agreement Keys in DIDs | The ToIP Model |
| Key Agreement Keys in DIDs | Key agreement keys extend DIDs beyond identity into secure, confidential communication between trusted parties. | Deep Dive, Architecture | Service Endpoints | Technical Architecture Spec (PDF) |
| Service Endpoints | Service endpoints connect a decentralized identity to real-world networks, showing not just who you are but how to reach you. | Architecture | Multiple Keys | Technical Architecture Spec (PDF) |
| Key Pre-rotation | Pre-rotation protects against identity hijacking by committing to the next key before the current one is ever compromised. | Deep Dive, Architecture | Multiple Keys | Evolution of the ToIP Stack |
| Multiple Keys | Multisignature and threshold schemes eliminate single points of failure and support shared responsibility in identity systems. | Deep Dive, Architecture | Where to Store Private Keys | Technical Architecture Spec (PDF) |
| Where to Store Private Keys | The choice between edge and cloud storage determines how you balance security, control, and recoverability. | Beginner, Recommended | Hybrid Key Storage | Evolution of the ToIP Stack |
| Hybrid Key Storage | Hybrid storage and social recovery make DIDs both secure and recoverable without sacrificing control. | Recommended | Protecting Private Keys | Evolution of the ToIP Stack |
| Protecting Private Keys | Understanding the spectrum from clear storage to HSMs helps you choose the right protection for your keys. | Recommended, Architecture | Trust Registries | Technical Architecture Spec (PDF) |
| Trust Registries: Whose DID is it, anyway? | Cryptography alone cannot tell you which DID is legitimate — governance and trust registries fill that gap. | Recommended, Governance | What Trust Registries Do | Governance Architecture Spec (PDF) |
| What is Governance | Governance is the foundation of accountable systems — understanding it is essential before engaging with any trust ecosystem. | Beginner, Governance | Players in a Governed Ecosystem | Governance Architecture Spec (PDF) |
| Players in a Governed Ecosystem | Knowing who plays which role — governing body, governed party, arbiter, relying party — is essential for designing or joining any trust ecosystem. | Beginner, Governance | How Ecosystems Assess Risk | Governance Architecture Spec (PDF) |
| How Governance Ecosystems Assess Risk | Risk assessment determines which problems are worth governing — without it, rules are arbitrary. | Governance | How Ecosystems Develop Requirements | Governance Architecture Spec (PDF) |
| How Governance Ecosystems Develop Requirements | Requirements built on risk, mandate, suitability, and leverage are the difference between rules that work and rules that don’t. | Governance | How Conformance Schemes Work | Governance Architecture Spec (PDF) |
| How Conformance Schemes Work | Rules without enforcement are suggestions — conformance schemes are what make governance real. | Governance | What Trust Registries Do | Governance Architecture Spec (PDF) |
| What Trust Registries Do | Trust registries are the authoritative, queryable backbone of digital governance — the machine-readable successor to business registries and certification boards. | Recommended, Governance | Zero Knowledge Proofs | Governance Architecture Spec (PDF) |
| Zero Knowledge Proofs | ZKPs allow selective disclosure of only what is needed — a key tool for privacy-preserving identity in decentralized systems. | Deep Dive, Recommended | Verifiable Credentials | The ToIP Model |
What Next?
Learn the broader model
Explore concrete outputs
Join the ecosystem
Want to go deeper? Explore the architecture and deliverables behind these concepts. Want to help shape the work? Join a working group. Want the bigger picture? Start with the ToIP model.