Skip to content

Commit b3732c2

Browse files
authored
Update 01_1_Your_First_XID.md
1 parent 2d34723 commit b3732c2

1 file changed

Lines changed: 7 additions & 8 deletions

File tree

docs/01_1_Your_First_XID.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,8 @@ security.
66

77
> 🧠 **Related Concepts.** Before or after completing this
88
tutorial, you may want to read about [XID
9-
Fundamentals](../concepts/xid.md) and [Gordian Envelope
10-
Basics](../concepts/gordian-envelope.md) to understand the
9+
Fundamentals](https://github.com/BlockchainCommons/XID-Quickstart/tree/main/concepts/xid.md) and [Gordian Envelope
10+
Basics](https://github.com/BlockchainCommons/XID-Quickstart/tree/main/concepts/gordian-envelope.md) to understand the
1111
theoretical foundations.
1212

1313
## Objectives for this Section
@@ -53,7 +53,7 @@ presence that can evolve over time.
5353
On the advice of her friend Charlene, Amira investigates RISK, a
5454
network that connects developers with social-impact projects and
5555
protects participants' privacy. It uses a Blockchain Commons
56-
technology called [XIDs](../concepts/xid.md): these "eXtensible
56+
technology called [XIDs](https://github.com/BlockchainCommons/XID-Quickstart/tree/main/concepts/xid.md): these "eXtensible
5757
IDentifiers" enable pseudonymous identity with progressive trust
5858
development. Amira will use RISK to create the "BRadvoc8" (Basic
5959
Rights Advocate) identity. Through RISK, Amira can then connect with
@@ -101,7 +101,6 @@ and endorsement history).
101101
true self-sovereignty, rich metadata support, holder-based elision,
102102
and ongoing key management.
103103

104-
105104
## Part I: Preparing to Work
106105

107106
Like all of the "Learning from ..." courses, "Learning XIDs from the
@@ -166,7 +165,7 @@ encryption, as well as other technologies such as Provenance
166165
Marks. XIDs are built to be autonomous cryptographic objects, which
167166
means that they can be used without depending on a central server or
168167
even a reliable communication network. More details are available in
169-
the [XID concepts file](../concepts/xid) and the [envelope concepts
168+
the [XID concepts file](https://github.com/BlockchainCommons/XID-Quickstart/tree/main/concepts/xid) and the [envelope concepts
170169
file](../ceoncepts/gordian-envelope.md).
171170

172171
A single `envelope` operation creates a complete XID that contains
@@ -227,7 +226,7 @@ to the wrapped envelope. Signatures are assertions, so for a signature
227226
to apply to an entire envelope (in this case, all of the XID
228227
information), the envelope must be wrapped prior to signing.
229228

230-
> 🧠 **Learn More.** The [Signing and Verification](../concepts/signing.md) concept doc explains the cryptographic details of many of these elements.
229+
> 🧠 **Learn More.** The [Signing and Verification](https://github.com/BlockchainCommons/XID-Quickstart/tree/main/concepts/signing.md) concept doc explains the cryptographic details of many of these elements.
231230
232231
### Step 2: View Your XID Structure
233232

@@ -275,7 +274,7 @@ Here's what the individual parts of that "formatting" mean:
275274
- The `privateKey` section has been `ENCRYPTED`, indicating that the private keys are protected.
276275
- The `'hasSecret': EncryptedKey(Argon2id)` notation notes that the private keys are encrypted with Argon2id, a modern algorithm designed to resist brute-force attacks.
277276
- `salt` is a random value that further obscures its subject.
278-
- The `allow` statement determines what access these keys have to this identity, as described in [key management](../concepts/key-management.md). By default, keys have total access (`All`).
277+
- The `allow` statement determines what access these keys have to this identity, as described in [key management](https://github.com/BlockchainCommons/XID-Quickstart/tree/main/concepts/key-management.md). By default, keys have total access (`All`).
279278
- The `nickname` is inside the `PublicKeys` section, not at the top level. That's because a nickname labels a key, not the XID Document. Later keys could have different nicknames while maintaining the same XID identity.
280279
- The `ProvenanceMark(...)` is a "genesis" mark: the first in a chain that tracks this identity's evolution.
281280
- The encrypted `provenanceGenerator` is the secret that created this mark and will create all future marks when Amira publishes new editions of her XID Document.
@@ -385,7 +384,7 @@ that, you're going to go over the crical step that _would_ be required
385384
to publish a XID: creating a public view.
386385

387386
When you create a shareable public view of a XID, you are engaging in
388-
[data minimization](../concepts/data-minimization.md). You're creating
387+
[data minimization](https://github.com/BlockchainCommons/XID-Quickstart/tree/main/concepts/data-minimization.md). You're creating
389388
a new way to look at the current edition of your XID that only
390389
includes the data that your recipient needs to see. This is "selective
391390
disclosure." Now, there's not a lot of information yet in Amira's XID,

0 commit comments

Comments
 (0)