Skip to content

Commit 9fee1a4

Browse files
committed
reorg to add chapter 4
r
1 parent 2f40aea commit 9fee1a4

20 files changed

Lines changed: 196 additions & 195 deletions

docs/01_2_Your_First_XID.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -417,7 +417,7 @@ momentarily). Once you find the right hash, you simply tell the
417417
Envelope CLI to remove the data represented by that particular
418418
hash. [§2.2](02_2_Managing_Claims_Elision.md) includes a mininimal
419419
look at the technique, then
420-
[§3.5](03_5_Creating_Views_and_Versions.md) examines it more
420+
[§4.3](04_3_Creating_Views_and_Versions.md) examines it more
421421
extensively.
422422

423423
However, we don't need that to elide the secrets of the private key

docs/01_3_Making_a_XID_Verifiable.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -395,7 +395,7 @@ instead use somewhat more complex `find` and extract commands that:
395395
2. Find the assertion with a `dereferenceVia` predicate.
396396
3. Extract the object of that predicate, which is the URL.
397397

398-
We'll talk more about this process in [§3.5](03_5_Creating_Views_and_Versions.md).
398+
We'll talk more about this process in [§4.3](04_3_Creating_Views_and_Versions.md).
399399

400400

401401
```

docs/02_2_Managing_Claims_Elision.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -195,7 +195,7 @@ value and it hashes correctly, your commitment has been fulfilled.
195195

196196
Elision becomes trickier when you want to create new views of your XID
197197
by removing individual elements of the XID's
198-
data. [§3.5](03_5_Creating_Views_and_Versions.md) demonstrates how to
198+
data. [§4.3](04_3_Creating_Views_and_Versions.md) demonstrates how to
199199
do so.
200200

201201
### Step 4: Store Your Work

docs/03_0_Edges.md

Lines changed: 2 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Chapter Three: Working with Edges
1+
# Chapter Three: Attesting with Edges
22

33
Claims and other credentials offer crucial support for an XID. They
44
reveal the experience of the person behind the digital identity;
@@ -19,8 +19,7 @@ separate.
1919

2020
This chapter will discuss a variety of ways to add data to a XID using
2121
_edges_, which are a methodology for placing a claim directly on a
22-
XID. It will also talk about how to produce clean views of a XID, even
23-
when it's grown quite complex.
22+
XID.
2423

2524
## Major Objectives for this Chapter
2625

@@ -29,8 +28,6 @@ After working through this chapter, a developer will be able to:
2928
- Create self-attestation edges
3029
- Create peer endorsement edges
3130
- Extract attestations from XIDs
32-
- Remove elements from XIDs
33-
- Build a Web of Trust
3431

3532
Supporting objectives include the ability to:
3633

@@ -44,5 +41,3 @@ Supporting objectives include the ability to:
4441
* [Section One: Creating Edges](03_1_Creating_Edges.md)
4542
* [Section Two: Supporting Cross Verification](03_2_Supporting_Cross_Verification.md)
4643
* [Section Three: Creating Peer Endorsements](03_3_Creating_Peer_Endorsements.md)
47-
* [Section Four: Creating Binding Agreements](03_4_Creating_Binding_Agreements.md)
48-
* [Section Five: Creating Views and Versions](03_5_Creating_Views_and_Versions.md)

docs/03_2_Supporting_Cross_Verification.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -318,7 +318,7 @@ XID_EDGE=$(envelope xid edge all $FETCHED_XID)
318318
```
319319

320320
If you have multiple edges, you'd need to figure out which one to use
321-
(again, see §3.5), but when you just have one, as is the case here,
321+
(again, see §4.3), but when you just have one, as is the case here,
322322
the extraction is all that's required.
323323
```
324324
echo "✅ Found edge:"
@@ -362,7 +362,7 @@ information) that they'll use for the purpose of cross-verification.
362362
extract data from a XID. Generally, you need to iteratively cut an
363363
envelope down to the point where you just have a subject and a set of
364364
assertions, and then pull out the assertions that you want. (Again,
365-
more on this in [§3.5](03_5_Creating_Views_and_Versions.md).)
365+
more on this in [§4.3](04_3_Creating_Views_and_Versions.md).)
366366

367367
To do so here requires stepping down through the envelope three times:
368368
```

docs/03_3_Creating_Peer_Endorsements.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -525,7 +525,7 @@ envelope format $XID_WITH_EDGE
525525
| 'signed': Signature(Ed25519)
526526
| ]
527527
```
528-
Yes! It's gotten big at this point! We'll talk more about what to do about that in [§3.5](03_5_Creating_Views_and_Versions.md).
528+
Yes! It's gotten big at this point! We'll talk more about what to do about that in [§4.3](04_3_Creating_Views_and_Versions.md).
529529

530530
### Step 13: Export & Store Your Work
531531

@@ -849,9 +849,9 @@ specific about what you've observed and what you can't speak to.
849849

850850
## What's Next
851851

852-
[§3.4: Creating Binding
853-
Agreements](3_4_Creating_Binding_Agreements.md) extends the power of
854-
XIDs by discussing how to use them for contracts.
852+
[Chapter Four: Expanding & Contracting Your XIDs](04_0_Advanced.md)
853+
will take the next step, discussing how XIDs can be used to store
854+
other sorts of content and how a XID can be kept lean and clean.
855855

856856
## Appendix I: Key Terminology
857857

docs/04_0_Advanced.md

Lines changed: 37 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,37 @@
1+
# Chapter Four: Expanding & Contracting Your XIDs
2+
3+
Chapters Two and Three focused on self-attestations and peer
4+
endorsements, both detached ([in chapter 2](02_0_Claims.md)) and
5+
embedded ([in chapter 3](03_0_Edges.md)). They're a great start for
6+
improving the trust in a pseudonymous identity.
7+
8+
However, you sometimes want to add other details to a XID. There are a
9+
number of methods for doing so (such as attachments and services), but
10+
this chapter will focus on how to attest to other content, such as
11+
contracts.
12+
13+
But moreso, this chapter will focus on what to do with the potential
14+
bloat of a XID. How can you fit something as big as a contract into a
15+
XID? How can you reference it in privacy protecting ways? And
16+
ultimately how can you modify your XID down the road so that its size
17+
remains manageable and its content therefore accessible.
18+
19+
## Major Objectives for this Chapter
20+
21+
After working through this chapter, a developer will be able to:
22+
23+
- Sign contracts with a XID.
24+
- Incorporate complex data into a XID with commitments.
25+
- Use commitments to preserve herd privacy.
26+
- Adjust a XID for accessibility
27+
28+
Supporting objectives include the ability to:
29+
30+
- Know the power of hashing.
31+
- Understand the advantages of creating views versus editions.
32+
33+
## Table of Contents
34+
35+
* [Section One: Creating Binding Agreements](04_1_Creating_Binding_Agreements.md)
36+
* [Section Two: Publishing for Privacy](04_2_Publishing_for_Privacy.md)
37+
* [Section Three: Creating Views and Versions](04_3_Creating_Views_and_Versions.md)

0 commit comments

Comments
 (0)