- From: Alan Karp <alanhkarp@gmail.com>
- Date: Sun, 29 Dec 2024 14:08:31 -0800
- To: Melvin Carvalho <melvincarvalho@gmail.com>
- Cc: "Michael Herman (Trusted Digital Web)" <mwherman@parallelspace.net>, Kishore Rajasekharuni <kishore.rajasekharuni@jukshio.com>, "public-credentials (public-credentials@w3.org)" <public-credentials@w3.org>
- Message-ID: <CANpA1Z0A3NwEmfOB+dQuxrPSjvEy++J9F3SrDGphY+EuXPKYPA@mail.gmail.com>
On Sun, Dec 29, 2024 at 1:49 PM Melvin Carvalho <melvincarvalho@gmail.com> wrote: > > FWIW we built petnames into the core protocol of nostr. They have not > really been used so far, after millions of users with different workflows. > There are still a few devs that advocate for them, but they have yet to > show what the utility is. I'd be happy if someone could articulate a use > case that might catch on. > > I don't know enough about nostr to comment, but petnames aren't meant to be a part of a core protocol. They typically only appear in the UI. The one-to-one relationship allows the UI to translate between the low level opaque name and what the user sees. -------------- Alan Karp On Sun, Dec 29, 2024 at 1:49 PM Melvin Carvalho <melvincarvalho@gmail.com> wrote: > > > ne 29. 12. 2024 v 19:15 odesÃlatel Alan Karp <alanhkarp@gmail.com> napsal: > >> On Sun, Dec 29, 2024 at 2:29 AM Michael Herman (Trusted Digital Web) < >> mwherman@parallelspace.net> wrote: >> >>> An interesting related question for a UX expert is: If DIDs are >>> low-level technology artifacts, what are the best/most appropriate UX >>> metaphors to surface in real apps? >>> >>> Petnames. A petname is a human meaningful string that is associated >> one-to-one with an opaque identifier. >> > > FWIW we built petnames into the core protocol of nostr. They have not > really been used so far, after millions of users with different workflows. > There are still a few devs that advocate for them, but they have yet to > show what the utility is. I'd be happy if someone could articulate a use > case that might catch on. > > >> >> -------------- >> Alan Karp >> >> >> On Sun, Dec 29, 2024 at 2:29 AM Michael Herman (Trusted Digital Web) < >> mwherman@parallelspace.net> wrote: >> >>> An interesting related question for a UX expert is: If DIDs are >>> low-level technology artifacts, what are the best/most appropriate UX >>> metaphors to surface in real apps? >>> >>> Get Outlook for Android <https://aka.ms/AAb9ysg> >>> ------------------------------ >>> *From:* Michael Herman (Trusted Digital Web) <mwherman@parallelspace.net >>> > >>> *Sent:* Sunday, December 29, 2024 8:13:29 AM >>> *To:* Kishore Rajasekharuni <kishore.rajasekharuni@jukshio.com> >>> *Cc:* public-credentials (public-credentials@w3.org) < >>> public-credentials@w3.org> >>> *Subject:* Re: [External] Pop Quiz: Where do DIDs belong from an >>> Enterprise Architecture perspective? >>> >>> Thank you for your analysis Kishore.When I say "DIDs", I'm being very >>> literal: >>> A DID = decentralized identifier = "did:wxyz:1234" character string. >>> >>> The answer to the question gets into the subtleties of decentralized >>> identifiers (e.g. did:wxyz:1234). They are not intended to be >>> human-friendly or comprehensible (like a checksum or a GUID); hence in my >>> mind, they are low-level technical/infrastructure concepts/elements - at >>> the very most, the lowest levels of your application architecture >>> (admitting this is actually going too far IMO). >>> >>> It would be interesting to revisit how a platform like .NET abstracts an >>> identifier up the chain into higher level application objects like an >>> Identity or Principal (.NET terminology). >>> >>> Michael Herman >>> CEO and First Principles Thinker >>> Web 7.0 Foundation / Trusted Digital Web (TDW) >>> >>> Get Outlook for Android <https://aka.ms/AAb9ysg> >>> ------------------------------ >>> *From:* Kishore Rajasekharuni <kishore.rajasekharuni@jukshio.com> >>> *Sent:* Friday, December 27, 2024 8:34:31 AM >>> *To:* Michael Herman (Trusted Digital Web) <mwherman@parallelspace.net> >>> *Cc:* public-credentials (public-credentials@w3.org) < >>> public-credentials@w3.org> >>> *Subject:* Re: [External] Pop Quiz: Where do DIDs belong from an >>> Enterprise Architecture perspective? >>> >>> My understanding - DiD can be part of Party Management in the Business >>> architecture layer. At the application architecture layer, it can be the >>> Digital Identity module exposing APIs for Onboarding, Identity Proofing and >>> Fraud Detection. The underlying Digital Identity Apps / Portals can be part >>> of the Technology / Infrastructure architecture. >>> >>> regards >>> Kishore >>> >>> On 27 Dec 2024, at 12:07 PM, Michael Herman (Trusted Digital Web) < >>> mwherman@parallelspace.net> wrote: >>> >>> Are DIDs part of the: >>> - Business architecture/layer/domain >>> - Application architecture/layer/domain >>> - Technology/Infrastructure architecture/layer/domain? >>> >>> Get Outlook for Android >>> <https://www.google.com/url?q=https://aka.ms/AAb9ysg&source=gmail-imap&ust=1735886469000000&usg=AOvVaw3dZOsMm5uX8vKzgHgmZY6E> >>> >>> >>>
Received on Sunday, 29 December 2024 22:08:47 UTC