
Welcome!
This personal blog includes a collection of my thoughts on
all things crypto, tech, philosophy, and whatever strikes my fancy.
Latest from the Blog
KERI Series: Understanding Self-Addressing Identifiers (SAID)
What is a self addressing identifier, a SAID? What does this mean and how is a SAID created and verified? This post answers these questions. We show a generalized process for calculating SAIDs and delve into the encoding format for CESR-compliant self addressing identifiers. Examples with three popular algorithms, SHA2-256, SHA3-256, and Blake3-256, show specifics…
KERI Internals Part 1: Concurrency and Async Programming with the HIO Async Framework and I/O Library
Welcome to the inner workings of the Python implementation of KERI! HIO stands for Hierarchical IO. Disclaimer: this post is for a technical audience who have a need to read and understand the WebOfTrust Python implementation of the KERI, ACDC, and CESR Trust over IP (ToIP) specifications. Have you ever wanted to contribute to the…
IIW 38 KERI & ACDC Session List
It’s been two weeks since the 38th bi-annual Internet Identity Workshop. The KERI community had a big showing with 19 session across three days. This included a variety of sessions on the vLEI ecosystem, the Trust Over IP (ToIP) Foundation, the Trust Spanning Protocol, KERI basics, CESR 2.0, new Witness infrastructure, and business-focused sessions. A…
Get new content delivered directly to your inbox.