did:tdw! #2821
Replies: 4 comments 5 replies
-
I've skimmed it, I think it is definitely one of the more legit and interesting DID methods in the ecosystem, and it has some degree of institutional adoption/inertia which is critical! My vague memory (only skimmed a couple months ago) is that there is a mechanism for the DID to change, with a way to securely prove that the new/updated DID is the same (or controlled by by the same entity) as the previous. AKA, "part" of the DID changes, another "part" doesn't. That doesn't fit or work with atproto in it's current form: the DID must stay the exact same over time, there is no concept of DID migration or mutation. So I don't think it is a path as an alternative to It does seem to be an improvement over |
Beta Was this translation helpful? Give feedback.
-
Very interesting! Would this allow for an institutional topology similar to the world of SSL certificates? I.e. it’s not widely decentralized, but there’s at least a handful different institutions of very high trustworthiness to choose between for a free SSL certificate, and many more for an affordable paid service, kept competitive by the high quality of the free options. That to me is a sufficiently decentralized DID strategy. However, 3-5 cooperating institutions is radically more robust than one. I hope that minimal degree of decentralization isn’t completely out of the picture for the future of @dmitrizagidulin is support for the likes of atproto within scope for |
Beta Was this translation helpful? Give feedback.
-
Worth noting that
..which I don’t have the technical knowhow to parse, but at a surface level it rhymes with atproto’s ’self-authenticating’ nature. |
Beta Was this translation helpful? Give feedback.
-
Transitioning from
|
Beta Was this translation helpful? Give feedback.
-
Has anyone read the
did:tdw
spec yet? I read the first half of it just now. It's interesting! I hear it's maybe somewhat inspired bydid:plc
? Certainly looks like it! Based ondid:web
, adds a cryptographically verifiable immutable log, rotation keys, portability across DID domains, and iiuc account recoverability via the DID Controller? I guess fordid:tdw
specifically, DID Controller is their version of a PLC directory? That part I'm a bit fuzzy on, along with when and how keys are custodial. Seems like they have to be, since the DID Controller generates the SCIDs?Regardless, interesting!
(Also, "trust DID Web" => "trusted web," lol, lmao)
Beta Was this translation helpful? Give feedback.
All reactions