You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Like all of the "Learning from ..." courses, "Learning XIDs from the
@@ -166,7 +165,7 @@ encryption, as well as other technologies such as Provenance
166
165
Marks. XIDs are built to be autonomous cryptographic objects, which
167
166
means that they can be used without depending on a central server or
168
167
even a reliable communication network. More details are available in
169
-
the [XID concepts file](../concepts/xid) and the [envelope concepts
168
+
the [XID concepts file](https://github.com/BlockchainCommons/XID-Quickstart/tree/main/concepts/xid) and the [envelope concepts
170
169
file](../ceoncepts/gordian-envelope.md).
171
170
172
171
A single `envelope` operation creates a complete XID that contains
@@ -227,7 +226,7 @@ to the wrapped envelope. Signatures are assertions, so for a signature
227
226
to apply to an entire envelope (in this case, all of the XID
228
227
information), the envelope must be wrapped prior to signing.
229
228
230
-
> 🧠 **Learn More.** The [Signing and Verification](../concepts/signing.md) concept doc explains the cryptographic details of many of these elements.
229
+
> 🧠 **Learn More.** The [Signing and Verification](https://github.com/BlockchainCommons/XID-Quickstart/tree/main/concepts/signing.md) concept doc explains the cryptographic details of many of these elements.
231
230
232
231
### Step 2: View Your XID Structure
233
232
@@ -275,7 +274,7 @@ Here's what the individual parts of that "formatting" mean:
275
274
- The `privateKey` section has been `ENCRYPTED`, indicating that the private keys are protected.
276
275
- The `'hasSecret': EncryptedKey(Argon2id)` notation notes that the private keys are encrypted with Argon2id, a modern algorithm designed to resist brute-force attacks.
277
276
-`salt` is a random value that further obscures its subject.
278
-
- The `allow` statement determines what access these keys have to this identity, as described in [key management](../concepts/key-management.md). By default, keys have total access (`All`).
277
+
- The `allow` statement determines what access these keys have to this identity, as described in [key management](https://github.com/BlockchainCommons/XID-Quickstart/tree/main/concepts/key-management.md). By default, keys have total access (`All`).
279
278
- The `nickname` is inside the `PublicKeys` section, not at the top level. That's because a nickname labels a key, not the XID Document. Later keys could have different nicknames while maintaining the same XID identity.
280
279
- The `ProvenanceMark(...)` is a "genesis" mark: the first in a chain that tracks this identity's evolution.
281
280
- The encrypted `provenanceGenerator` is the secret that created this mark and will create all future marks when Amira publishes new editions of her XID Document.
@@ -385,7 +384,7 @@ that, you're going to go over the crical step that _would_ be required
385
384
to publish a XID: creating a public view.
386
385
387
386
When you create a shareable public view of a XID, you are engaging in
0 commit comments