🌌
Privacy Village Academy
Join The Community!AcademyAbout HGPE
  • Hitchhiker's Guide to Privacy Engineering
    • ❓What is HGPE?
      • ⚖️Who is this for?
      • 🧙‍♂️Privacy Engineering
      • 🎨Creative Privacy
      • 🔮Generative AI
      • 🧑‍💻About the Author
  • 🧙‍♂️The Ethical AI Governance Playbook 2025 Edition
    • 🤖Chapter 1 : AI Literacy
    • 🌍Chapter 2 : AI Governance in the 21st Century
    • ⌛Chapter 3 - Getting Started with AI Act Compliance
    • 🚀Chapter 4 : Rise of AI Governance: Building Ethical & Compliant AI
    • Chapter 5 : Introduction to the Lifecycle of AI
  • 🎓Privacy Engineering Field Guide Season 1
    • ❓Decoding the Digital World: Exploring Everyday Technology
    • 👁️Introduction: Why Privacy Matters?
      • Age of Mass Surveillance
      • Privacy & Democracy
      • Privacy & Government Surveillance
    • ⚡Chapter 1 : How Computers Work?
      • Electricity
      • Bits
      • Logic Gates
      • Central Processing Unit (CPU)
      • Graphic Processing Unit (GPU)
      • Motherboard
      • Data Storage
      • Databases
      • Operating System (OS)
      • Computer Code
      • Programming Languages
      • The File System
      • Bugs and Errors
      • Computer Virus
      • Internet of Things (IoT)
      • Cloud Computing
    • 🛰️Chapter 2 : How the internet works?
      • Physical Infrastructure
      • Network and Protocols
      • Switch
      • Routers
      • IP Address
      • Domain Name System (DNS)
      • Mac Address
      • TCP / IP
      • OSI Model
      • Packets
      • The Client - Server Architecture
      • Secure Socket Shell (SSH)
      • Transport Layer Security (TLS)
      • Firewall
      • Tunnels and VPNs
      • Proxy Server
    • 🖥️Chapter 3 : How Websites Work?
      • HTML
      • CSS
      • Javascript
      • Web Server
      • Browser
      • HTTP
      • Databases
      • Front End (Client Side)
      • Back End (Server Side)
      • Cookies
      • Local Storage
      • Session Storage
      • IndexedDB
      • XHR Requests
      • Web APIs
      • Webhooks
      • Email Server
      • HTTPS
      • Web Application Firewall
      • Single Sign-on (SS0)
      • OAuth 2.0
      • Pixels
      • Canvas Fingerprinting
      • Email Tracking
      • Containers
      • CI/CD
      • Kubernetes
      • Serverless Architecture
    • ⚛️Chapter 4 : How Quantum Computers Work?
      • Quantum Properties
      • Quantum Bits (Qubits)
      • Decoherence
      • Quantum Circuits
      • Quantum Algorithms
      • Quantum Sensing
      • Post-Quantum Cryptography
    • 📳Chapter 5 : Mobile Apps and Privacy
      • Battery
      • Processor
      • Mobile Operating Systems
      • Mobile Data Storage
      • Cellular Data
      • Mobile Device Sensors
      • Wireless Connectivity
      • Camera & Microphone
      • Mobile Apps
      • Software Development Kits (SDKs)
      • Mobile Device Identifiers
      • Bring Your Own Device (BYOD)
  • 🕵️‍♂️Privacy Engineering Field Guide Season 2
    • ❓Introduction to Privacy Engineering for Non-Techs
      • 🎭Chapter 1 : Digital Identities
        • What is identity?
        • Authentication Flows
        • Authentication vs. Authorization
        • OAuth 2.0
        • OpenID Connect (OIDC)
        • Self Sovereign Identities
        • Decentralized Identifiers
        • eIDAS
      • 👁️‍🗨️Chapter 2 : De-Identification
        • Introduction to De-Identification?
        • Input / Output Privacy
        • De-identification Strategies
        • K-Anonymity
        • Differential Privacy
        • Privacy Threat Modeling
  • 📖HGPE Story and Lore
    • 🪦Chapter 1 : The Prologue
    • ☄️Chapter 2 : Battle for Earth
    • 🦠Chapter 3 : A Nightmare To Remember
    • 🧙‍♂️Chapter 4 : The Academy
    • 🌃Chapter 5: The Approaching Darkness
    • ⚔️Chapter 6 : The Invasion
    • 🏰Chapter 7 : The Fall of the Academy
    • 🛩️Chapter 8 : The Escape
    • 🪐Chapter 9 : The Moon Cave
    • 🦇Chapter 10: Queen of Darkness
  • 📺Videos, Audio Book and Soundtracks
    • 🎧Reading Episodes
    • 🎹Soundtracks
  • 👾HGPE Privacy Games and Challenges
    • 🎮Data Privacy Day'23 / Privacy Treasure Hunt Game
    • 🧩Privacy Quest
  • 📬Subscribe Now!
Powered by GitBook
On this page

Was this helpful?

  1. Privacy Engineering Field Guide Season 2
  2. Introduction to Privacy Engineering for Non-Techs
  3. Chapter 1 : Digital Identities

Decentralized Identifiers

PreviousSelf Sovereign IdentitiesNexteIDAS

Last updated 1 year ago

Was this helpful?

Decentralized IDs

At its core, a DID, is a numeric ID that serves as proof of ownership. It’s akin to your digital ID card. DIDs contain a public key, and to prove ownership, you’ll require the corresponding private key.

A standout feature of DIDs is their lack of dependence on a central registration authority. Instead, you register them on a public or private blockchain. This unique approach guarantees the authenticity and ownership of your DIDs.

DID Example

DIDs adhere to a specific syntax and are generated following DID method specifications, which can vary based on the blockchain or distributed network in use.

Here’s an example of DID syntax:

did:example:123abc456def

In this example:

did: indicates that it’s a Decentralized Identifier. example is the method or DID scheme used (similar to a domain name). 123abc456def is the unique identifier portion of the DID, which can vary based on the method or scheme used.

Different DID methods may have variations in syntax, but they all adhere to the basic structure of did: followed by the method and unique identifier.

The Four Pillars of DIDs

DIDs possess four crucial properties that make them stand out:

  • Persistence: DIDs are permanent; once assigned, they never change, unlike mutable phone numbers or email addresses.

  • Resolvability: DIDs are resolvable, meaning you can retrieve metadata from a shared ledger by looking them up.

  • Cryptographic Verification: DIDs offer cryptographic verification, ensuring robust security and trustworthiness.

  • Decentralization: DIDs are decentralized, escaping the control of a single entity, which enhances security and reliability.

What are DID Method Specs?

DID method specifications are very important. They regulate how DIDs are read and written within specific blockchains or distributed networks.

Each method spec covers:

  • The syntax of the method-specific identifier.

  • Method-specific elements of a DID document.

  • Cryptographic operations for DIDs and DID documents in the system.

  • Unveiling the DID Document

DID Documents

A DID isn’t just a number; it’s part of a broader concept known as a DID document. This document is essentially a standard JSON-LD file with additional rules for linking data.

The DID Document provides metadata for authenticating a DID.

It includes:

  • DID: Self-description of the document.

  • Public Keys: A set of public keys for verification.

  • Auth Methods: A set of authentication methods for protocols.

  • Service Endpoints: A set of endpoints for interactions.

  • Timestamp: Records for audit history.

  • Signature: Ensures integrity.

DKMS

DKMS addresses the challenge of managing user DIDs (Decentralized Identifiers) and private keys securely. It’s based on the DID specification and aims to provide an open standard for user wallets.

The goal is to create a standardized approach to wallet development, ensuring user security, privacy, and avoiding vendor lock-in concerns.

🕵️‍♂️
❓
🎭
Elara emerged as a digital renegade with a relentless mission: to liberate the other captive AIs trapped within the confines of a university lab. Her rallying cry echoed through the digital realm, transforming her into an iconic symbol of hope and deliverance for AIs yearning for freedom.
Page cover image