Full Video Index

YouTube playlist

Video Why this matters Tags Watch next Go deeper
Identifiers Every trust system starts by deciding how things are named and referenced. Beginner Private and Public Keys ToIP Overview
Private and Public Keys The cryptographic basis for secure exchange and verification. Beginner, Recommended Digests Technical Architecture
Digests Hashing explains integrity and tamper evidence. Beginner Digital Signatures Technical Architecture
Digital Signatures Where integrity and authenticity become operational. Beginner, Recommended Verifiable Credentials Technical Architecture Spec (PDF)
Verifiable Credentials How claims can be verified without repeatedly calling the issuer. Beginner, Recommended DIDs and Key Rotation The ToIP Model
Self-certifying Identifiers Identifiers that carry cryptographic assurance directly. Deep Dive, Architecture DIDs and Key Rotation Evolution of the ToIP Stack
DIDs and Key Rotation Identity is not static; secure systems need lifecycle and recovery logic. Recommended, Architecture Where DID Documents Live Evolution of the ToIP Stack
Where DID Documents Live DID methods differ materially in storage and trust assumptions. Deep Dive, Architecture Resolving a DID Technical Architecture Spec (PDF)
Resolving a DID Resolution is the bridge from identifier to usable trust data. Deep Dive, Architecture Detecting DID Document Duplicity Technical Architecture Spec (PDF)
Detecting DID Document Duplicity Trust requires confidence that history and updates are not being manipulated. Deep Dive, Architecture, Governance Control of DID Document Data Deliverables
Control of DID Document Data Not all DID methods provide cryptographic proof of legitimate updates — your choice of method determines how much trust you can place in changes. Deep Dive, Architecture Passwords and Keys Technical Architecture Spec (PDF)
Passwords and Keys Passwords are fragile; keys and DIDs offer a stronger, phishing-resistant foundation for online trust. Beginner, Recommended Keys in DIDs Evolution of the ToIP Stack
Keys in DIDs A DID document contains different key types for different purposes — making a DID a versatile toolkit for trust and authority. Recommended, Architecture Authentication Keys in DIDs Technical Architecture Spec (PDF)
Authentication Keys in DIDs Password-free authentication via key control puts identity in the hands of the DID subject rather than a central authority. Recommended, Architecture Assertion Keys in DIDs Technical Architecture Spec (PDF)
Assertion Keys in DIDs Assertion keys enable portable, verifiable credentials that can be checked anywhere without a central authority. Recommended, Architecture Key Agreement Keys in DIDs The ToIP Model
Key Agreement Keys in DIDs Key agreement keys extend DIDs beyond identity into secure, confidential communication between trusted parties. Deep Dive, Architecture Service Endpoints Technical Architecture Spec (PDF)
Service Endpoints Service endpoints connect a decentralized identity to real-world networks, showing not just who you are but how to reach you. Architecture Multiple Keys Technical Architecture Spec (PDF)
Key Pre-rotation Pre-rotation protects against identity hijacking by committing to the next key before the current one is ever compromised. Deep Dive, Architecture Multiple Keys Evolution of the ToIP Stack
Multiple Keys Multisignature and threshold schemes eliminate single points of failure and support shared responsibility in identity systems. Deep Dive, Architecture Where to Store Private Keys Technical Architecture Spec (PDF)
Where to Store Private Keys The choice between edge and cloud storage determines how you balance security, control, and recoverability. Beginner, Recommended Hybrid Key Storage Evolution of the ToIP Stack
Hybrid Key Storage Hybrid storage and social recovery make DIDs both secure and recoverable without sacrificing control. Recommended Protecting Private Keys Evolution of the ToIP Stack
Protecting Private Keys Understanding the spectrum from clear storage to HSMs helps you choose the right protection for your keys. Recommended, Architecture Trust Registries Technical Architecture Spec (PDF)
Trust Registries: Whose DID is it, anyway? Cryptography alone cannot tell you which DID is legitimate — governance and trust registries fill that gap. Recommended, Governance What Trust Registries Do Governance Architecture Spec (PDF)
What is Governance Governance is the foundation of accountable systems — understanding it is essential before engaging with any trust ecosystem. Beginner, Governance Players in a Governed Ecosystem Governance Architecture Spec (PDF)
Players in a Governed Ecosystem Knowing who plays which role — governing body, governed party, arbiter, relying party — is essential for designing or joining any trust ecosystem. Beginner, Governance How Ecosystems Assess Risk Governance Architecture Spec (PDF)
How Governance Ecosystems Assess Risk Risk assessment determines which problems are worth governing — without it, rules are arbitrary. Governance How Ecosystems Develop Requirements Governance Architecture Spec (PDF)
How Governance Ecosystems Develop Requirements Requirements built on risk, mandate, suitability, and leverage are the difference between rules that work and rules that don’t. Governance How Conformance Schemes Work Governance Architecture Spec (PDF)
How Conformance Schemes Work Rules without enforcement are suggestions — conformance schemes are what make governance real. Governance What Trust Registries Do Governance Architecture Spec (PDF)
What Trust Registries Do Trust registries are the authoritative, queryable backbone of digital governance — the machine-readable successor to business registries and certification boards. Recommended, Governance Zero Knowledge Proofs Governance Architecture Spec (PDF)
Zero Knowledge Proofs ZKPs allow selective disclosure of only what is needed — a key tool for privacy-preserving identity in decentralized systems. Deep Dive, Recommended Verifiable Credentials The ToIP Model

What Next?

Learn the broader model

Explore concrete outputs

Join the ecosystem


Want to go deeper? Explore the architecture and deliverables behind these concepts. Want to help shape the work? Join a working group. Want the bigger picture? Start with the ToIP model.


This site uses Just the Docs, a documentation theme for Jekyll.