forked from WebOfTrust/WOT-terms
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathmindmap.html
40 lines (40 loc) · 12.8 KB
/
mindmap.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
<!DOCTYPE html>
<html>
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta http-equiv="X-UA-Compatible" content="ie=edge">
<title>Markmap</title>
<style>
* {
margin: 0;
padding: 0;
}
#mindmap {
display: block;
width: 100vw;
height: 100vh;
}
</style>
<link rel="stylesheet" href="https://cdn.jsdelivr.net/npm/[email protected]/dist/style.min.css">
</head>
<body>
<svg id="mindmap"></svg>
<script src="https://cdn.jsdelivr.net/npm/[email protected]"></script><script src="https://cdn.jsdelivr.net/npm/[email protected]"></script><script src="https://cdn.jsdelivr.net/npm/[email protected]/dist/index.umd.min.js"></script><script>(r => {
setTimeout(r);
})(() => {
const {
markmap,
mm
} = window;
const toolbar = new markmap.Toolbar();
toolbar.attach(mm);
const el = toolbar.render();
el.setAttribute('style', 'position:absolute;bottom:20px;right:20px');
document.body.append(el);
})</script><script>((getMarkmap, getOptions, root, jsonOptions) => {
const markmap = getMarkmap();
window.mm = markmap.Markmap.create('svg#mindmap', (getOptions || markmap.deriveOptions)(jsonOptions), root);
})(() => window.markmap,null,{"type":"heading","depth":0,"payload":{"lines":[0,1]},"content":"Mindmap","children":[{"type":"heading","depth":1,"payload":{"lines":[5,6]},"content":"Concept","children":[{"type":"heading","depth":2,"payload":{"lines":[7,8]},"content":"<a href=\"https://github.com/WebOfTrust/WOT-terms/blob/gh-pages/concepts.md#what-is-this\">What is this</a>?","children":[{"type":"list_item","depth":3,"payload":{"lines":[8,9],"index":1},"content":"1. the things we've designed (whitepapers, technical designs)"},{"type":"list_item","depth":3,"payload":{"lines":[9,10],"index":2},"content":"2. the things we've created (repos and code)"},{"type":"list_item","depth":3,"payload":{"lines":[10,11],"index":3},"content":"3. the terminology we use."}]},{"type":"heading","depth":2,"payload":{"lines":[12,13]},"content":"<a href=\"https://github.com/WebOfTrust/WOT-terms/blob/gh-pages/concepts.md#why-this-page\">Why this page</a>?","children":[{"type":"list_item","depth":3,"payload":{"lines":[13,14],"index":1},"content":"1. to be better and quicker understood"},{"type":"list_item","depth":3,"payload":{"lines":[14,15],"index":2},"content":"2. anchor our wording to our objectives"},{"type":"list_item","depth":3,"payload":{"lines":[15,16],"index":3},"content":"3. criteria how we distinguish importance to us"}]},{"type":"heading","depth":2,"payload":{"lines":[17,18]},"content":"<a href=\"https://github.com/WebOfTrust/WOT-terms/blob/gh-pages/concepts.md#for-whom\">For Whom</a>?","children":[{"type":"list_item","depth":3,"payload":{"lines":[18,19],"index":1},"content":"1. the newbie digital identity expert"},{"type":"list_item","depth":3,"payload":{"lines":[19,20],"index":2},"content":"2. the advanced SSI identity expert"},{"type":"list_item","depth":3,"payload":{"lines":[20,21],"index":3},"content":"3. SSI expert"}]},{"type":"heading","depth":2,"payload":{"lines":[22,23]},"content":"<a href=\"https://github.com/WebOfTrust/WOT-terms/blob/gh-pages/concepts.md#how\">How</a>?","children":[{"type":"list_item","depth":3,"payload":{"lines":[23,24],"index":1},"content":"1. static site generated on Github"},{"type":"list_item","depth":3,"payload":{"lines":[24,25],"index":2},"content":"2. reuse resources all over the web"},{"type":"list_item","depth":3,"payload":{"lines":[25,26],"index":3},"content":"3. can be searched and commented on"}]},{"type":"heading","depth":2,"payload":{"lines":[27,28]},"content":"<a href=\"https://github.com/WebOfTrust/WOT-terms/blob/gh-pages/concepts.md#when\">When</a>?","children":[{"type":"list_item","depth":3,"payload":{"lines":[28,29],"index":1},"content":"1. continuously from now"},{"type":"list_item","depth":3,"payload":{"lines":[29,30],"index":2},"content":"2. automatic deployment at changes"}]}]},{"type":"heading","depth":1,"payload":{"lines":[31,32]},"content":"Core Values","children":[{"type":"heading","depth":2,"payload":{"lines":[33,34]},"content":"<a href=\"https://github.com/WebOfTrust/WOT-terms/blob/gh-pages/concepts.md#social-values\">Social values</a>","children":[{"type":"list_item","depth":3,"payload":{"lines":[34,35]},"content":"existance and persistance"},{"type":"list_item","depth":3,"payload":{"lines":[35,36]},"content":"access and transparency"},{"type":"list_item","depth":3,"payload":{"lines":[36,37]},"content":"privacy - consent to use"},{"type":"list_item","depth":3,"payload":{"lines":[37,38]},"content":"confidentiality - minimal disclosure"}]},{"type":"heading","depth":2,"payload":{"lines":[39,40]},"content":"<a href=\"https://github.com/WebOfTrust/WOT-terms/blob/gh-pages/concepts.md#societal-values\">Societal values</a>","children":[{"type":"list_item","depth":3,"payload":{"lines":[40,41]},"content":"commitment and compliance to rules - signature"},{"type":"list_item","depth":3,"payload":{"lines":[41,42]},"content":"freedom of speech and movement - inception of AIDs, rotation"},{"type":"list_item","depth":3,"payload":{"lines":[42,43]},"content":"self-sovereignty - portability, delegation and revocation"},{"type":"list_item","depth":3,"payload":{"lines":[43,44]},"content":"Protection – users’ rights, censorship-resistant"}]},{"type":"heading","depth":2,"payload":{"lines":[45,46]},"content":"Use cases","children":[{"type":"list_item","depth":3,"payload":{"lines":[46,47]},"content":"Self-sovereign security"},{"type":"list_item","depth":3,"payload":{"lines":[47,48]},"content":"portable identifiers"},{"type":"list_item","depth":3,"payload":{"lines":[48,49]},"content":"proofs verifiable to the root-of-trust"},{"type":"list_item","depth":3,"payload":{"lines":[49,50]},"content":"break down silos of control and surveillance"}]}]},{"type":"heading","depth":1,"payload":{"lines":[51,52]},"content":"KERI","children":[{"type":"heading","depth":2,"payload":{"lines":[53,54]},"content":"<a href=\"https://github.com/WebOfTrust/WOT-terms/blob/gh-pages/concepts.md#objectives-keri\">Objectives KERI</a>","children":[{"type":"heading","depth":3,"payload":{"lines":[55,56]},"content":"Open source - Apache2"},{"type":"heading","depth":3,"payload":{"lines":[57,58]},"content":"<a href=\"https://github.com/WebOfTrust/WOT-terms/blob/gh-pages/concepts.md#trust-spanning-layer-for-the-internet\">Trust spanning layer for the internet</a>"},{"type":"heading","depth":3,"payload":{"lines":[59,60]},"content":"Secure Attribution over the internet"},{"type":"heading","depth":3,"payload":{"lines":[64,65]},"content":"Simple cryptography"},{"type":"heading","depth":3,"payload":{"lines":[66,67]},"content":"Minimal sufficient means to an end"},{"type":"heading","depth":3,"payload":{"lines":[68,69]},"content":"Round-robin transposable streaming format"},{"type":"heading","depth":3,"payload":{"lines":[70,71]},"content":"Out-of-band introduction, strong in-band validation"},{"type":"heading","depth":3,"payload":{"lines":[72,73]},"content":"Possibilty to transfer off a leger"},{"type":"heading","depth":3,"payload":{"lines":[74,75]},"content":"Use dumb crypto"}]},{"type":"heading","depth":2,"payload":{"lines":[76,77]},"content":"<a href=\"https://github.com/WebOfTrust/WOT-terms/blob/gh-pages/concepts.md#development-choices\">Development choices</a>","children":[{"type":"heading","depth":3,"payload":{"lines":[78,79]},"content":"REST API"},{"type":"heading","depth":3,"payload":{"lines":[80,81]},"content":"It's under construction"}]}]},{"type":"heading","depth":1,"payload":{"lines":[82,83]},"content":"ACDC","children":[{"type":"ordered_list","depth":2,"payload":{"lines":[83,87],"startIndex":1},"content":"","children":[{"type":"list_item","depth":3,"payload":{"lines":[83,84],"index":1},"content":"1. authentic"},{"type":"list_item","depth":3,"payload":{"lines":[84,85],"index":2},"content":"2. chained"},{"type":"list_item","depth":3,"payload":{"lines":[85,86],"index":3},"content":"3. serialized data containers"}]},{"type":"heading","depth":2,"payload":{"lines":[87,88]},"content":"SAID","children":[{"type":"ordered_list","depth":3,"payload":{"lines":[88,93],"startIndex":1},"content":"","children":[{"type":"list_item","depth":4,"payload":{"lines":[88,89],"index":1},"content":"1. greater interoperability"},{"type":"list_item","depth":4,"payload":{"lines":[89,90],"index":2},"content":"2. reduced ambiguity"},{"type":"list_item","depth":4,"payload":{"lines":[90,91],"index":3},"content":"3. enhanced security"},{"type":"list_item","depth":4,"payload":{"lines":[91,92],"index":4},"content":"4. better immutably"}]},{"type":"heading","depth":3,"payload":{"lines":[96,97]},"content":"Veracity of credentials"},{"type":"heading","depth":3,"payload":{"lines":[98,99]},"content":"Signed commitments by controllers"}]},{"type":"heading","depth":2,"payload":{"lines":[100,101]},"content":"<a href=\"https://github.com/WebOfTrust/WOT-terms/blob/gh-pages/concepts.md#framework-conditions\">Framework conditions</a>","children":[{"type":"heading","depth":3,"payload":{"lines":[102,103]},"content":"Only cryptography can safe our digital twin"},{"type":"heading","depth":3,"payload":{"lines":[104,105]},"content":"Network dynamics prove that centralized system will lose"},{"type":"heading","depth":3,"payload":{"lines":[106,107]},"content":"Moore’s law in IoT"},{"type":"heading","depth":3,"payload":{"lines":[108,109]},"content":"Anonymity doesn't exist"}]}]},{"type":"heading","depth":1,"payload":{"lines":[110,111]},"content":"Guiding Principles","children":[{"type":"heading","depth":2,"payload":{"lines":[112,113]},"content":"<a href=\"https://github.com/WebOfTrust/WOT-terms/blob/gh-pages/concepts.md#design-principles\">Design principles</a>","children":[{"type":"ordered_list","depth":3,"payload":{"lines":[113,117],"startIndex":1},"content":"","children":[{"type":"list_item","depth":4,"payload":{"lines":[113,114],"index":1},"content":"1. Security first"},{"type":"list_item","depth":4,"payload":{"lines":[114,115],"index":2},"content":"2. then confidentiality"},{"type":"list_item","depth":4,"payload":{"lines":[115,116],"index":3},"content":"3. then privacy"}]},{"type":"heading","depth":3,"payload":{"lines":[117,118]},"content":"Strong bindings - security first"},{"type":"heading","depth":3,"payload":{"lines":[119,120]},"content":"Verifiable to primary root of trust"},{"type":"heading","depth":3,"payload":{"lines":[121,122]},"content":"Generic classes of self-certifying identifiers"}]},{"type":"heading","depth":2,"payload":{"lines":[123,124]},"content":"<a href=\"https://github.com/WebOfTrust/WOT-terms/blob/gh-pages/concepts.md#autonomic-governance\">Autonomic Governance</a>","children":[{"type":"heading","depth":3,"payload":{"lines":[125,126]},"content":"Don't trust duplicity"},{"type":"heading","depth":3,"payload":{"lines":[127,128]},"content":"Use consensus mechanism to reconcile duplicity"},{"type":"heading","depth":3,"payload":{"lines":[129,130]},"content":"Non-custodial delegation"},{"type":"heading","depth":3,"payload":{"lines":[131,132]},"content":"Secondary extra layer of guarantee"}]},{"type":"heading","depth":2,"payload":{"lines":[133,134]},"content":"<a href=\"https://github.com/WebOfTrust/WOT-terms/blob/gh-pages/concepts.md#human-governance\">Human governance</a>","children":[{"type":"heading","depth":3,"payload":{"lines":[135,136]},"content":"Freedom of witness and backer organization"},{"type":"heading","depth":3,"payload":{"lines":[137,138]},"content":"Freedom of validator and watchtower organization"},{"type":"heading","depth":3,"payload":{"lines":[139,140]},"content":"Private keys need to be kept private"},{"type":"heading","depth":3,"payload":{"lines":[141,142]},"content":"Verfication of Key event logs to last verified"},{"type":"heading","depth":3,"payload":{"lines":[143,144]},"content":"Minimize correlation"},{"type":"heading","depth":3,"payload":{"lines":[145,146]},"content":"Guarantee sufficient randomness"}]},{"type":"heading","depth":2,"payload":{"lines":[147,148]},"content":"<a href=\"https://github.com/WebOfTrust/WOT-terms/blob/gh-pages/concepts.md#sharing-ssi-community-values\">Sharing SSI-community values</a>","children":[{"type":"heading","depth":3,"payload":{"lines":[149,150]},"content":"Open source"},{"type":"heading","depth":3,"payload":{"lines":[151,152]},"content":"Zero trust"},{"type":"heading","depth":3,"payload":{"lines":[153,154]},"content":"10 principles of SSI"},{"type":"heading","depth":3,"payload":{"lines":[155,156]},"content":"SSI identity book Reed / Preukschat"},{"type":"heading","depth":3,"payload":{"lines":[157,158]},"content":"Key management and asset planning"},{"type":"heading","depth":3,"payload":{"lines":[159,160]},"content":"Prevent repeated use of a public key"},{"type":"heading","depth":3,"payload":{"lines":[161,162]},"content":"Self-determination"},{"type":"heading","depth":3,"payload":{"lines":[163,164]},"content":"Permission-less society"},{"type":"heading","depth":3,"payload":{"lines":[165,166]},"content":"No needless control, no needless surveillance"}]}]}]},null)</script>
</body>
</html>