Re: [Email-to-DID Bridge] Exploring a practical migration path for email infrastructure

Hey All,

Have a look at our demo run of Universal DID Native Addressing CGs
implementation on a local wifi, looking forward to feedback, comments and
suggestions.

On Wed, 28 Jan 2026 at 05:34, Amir Hameed <amsaalegal@gmail.com> wrote:

>
>
> On Wed, 28 Jan 2026 at 6:56 PM, Michael Herman (Trusted Digital Web) <
> mwherman@parallelspace.net> wrote:
>
>> Updated diagram…
>>
>>
>>
>>
>>
>> *From:* Michael Herman (Trusted Digital Web) <mwherman@parallelspace.net>
>>
>> *Sent:* Wednesday, January 28, 2026 1:18 PM
>> *To:* Jori Lehtinen <lehtinenjori03@gmail.com>; Amir Hameed <
>> amsaalegal@gmail.com>
>> *Cc:* Daniel Hardman <daniel.hardman@gmail.com>; W3C Credentials CG <
>> public-credentials@w3.org>
>> *Subject:* RE: [Email-to-DID Bridge] Exploring a practical migration
>> path for email infrastructure
>>
>>
>>
>> Loose-related, at the Web 7.0 Foundation, we’re looking at forking the
>> open-source ZeroTier project and turning it into a DID-native,
>> DIDComm-native router/DID virtual network for DID-native, DIDComm-native
>> apps (aka Neuroplexes).
>>
>>
>>
>> Michael Herman
>>
>> Chief Digital Architect
>>
>> Web 7.0 Foundation
>>
>>
>>
>>
>>
>> *From:* Jori Lehtinen <lehtinenjori03@gmail.com>
>> *Sent:* Wednesday, January 28, 2026 12:30 PM
>> *To:* Amir Hameed <amsaalegal@gmail.com>
>> *Cc:* Michael Herman (Trusted Digital Web) <mwherman@parallelspace.net>;
>> Daniel Hardman <daniel.hardman@gmail.com>; W3C Credentials CG <
>> public-credentials@w3.org>
>> *Subject:* Re: [Email-to-DID Bridge] Exploring a practical migration
>> path for email infrastructure
>>
>>
>>
>> I can totally see it working that way, but how do you deliver the
>> response from Bob's DIDComm client to Alice's email client with end-to-end
>> encryption, wich is obviously the more crucial part here as Bob  is the one
>> that cares about total privacy. I think this can still be a good idea even
>> without e2e encryption guarantee, however if you can solve that part it is
>> always better. An organizations internal messaging can always be
>> "decenralized" by making it centralized to the organization controlled
>> machinery just by self-hosting any regular server software. But as stated I
>> think this can help with "adoption pain" regardless so it is not
>> necessarily a bad idea.
>>
>>
>>
>> ke 28.1.2026 klo 14.14 Amir Hameed (amsaalegal@gmail.com) kirjoitti:
>>
>> Hi Jori
>>
>>
>>
>> It’s hard to explain every detail in a single email but since the points
>> raised are critical I would try best to give a proper walkthrough
>>
>>
>>
>> Let me walk through the protocol step by step and show precisely where
>> privacy risks arise and how the architecture addresses them.
>>
>> Step-by-Step Protocol Flow
>>
>>
>>
>> Phase 1: Sender initiation
>>
>>
>>
>> Scenario: Alice (an email user) wants to message Bob (a DID user).
>>
>>    1. Alice composes an email to bob-executive@company.org
>>    2. Her email client performs a standard DNS/MX lookup for company.org
>>    3. The message is delivered to company.org’s SMTP server, which runs
>>    the bridge
>>
>>
>>
>> At this stage, privacy behaves exactly like normal email. Alice’s email
>> provider sees standard SMTP metadata. The receiving SMTP server at
>> company.org receives the message within infrastructure controlled by
>> that organization. This is the baseline privacy model of email and cannot
>> be changed by any overlay system.
>>
>> Phase 2: Bridge processing
>>
>>    4. The SMTP server invokes bridge.handle_email(message)
>>    5. The bridge consults its internal routing table:
>>
>> bob-executive@company.org → did:web:company.org:bob
>>
>>    6. The bridge converts the email into a DID message representation
>>
>>
>>
>> The critical design decision here is that the email-to-DID routing table
>> is privately maintained by each organization. There is no global directory
>> and no shared mapping service. company.org alone controls and stores
>> this mapping inside its own infrastructure.
>>
>> Phase 3: Message transformation
>>
>>    7. The bridge constructs a DID message:
>>
>>
>>
>>    - The payload is encrypted using Bob’s public key from his DID
>>    document
>>    - Metadata such as sender, timestamp, and subject is preserved
>>    - Email headers are mapped into DID message attributes
>>
>>
>>
>> End-to-end encryption is applied at this stage. Only Bob can decrypt the
>> message. The bridge itself handles ciphertext only and cannot read the
>> content.
>>
>> Phase 4: Protocol-agnostic routing
>>
>>    8. The bridge inspects Bob’s DID document to discover service
>>    endpoints. This may include:
>>
>>
>>
>>    - A DIDComm endpoint (preferred)
>>    - A WebSocket endpoint
>>    - An HTTP/HTTPS endpoint
>>    - Or email as a fallback if no DID endpoint is available
>>
>>
>>
>>    9. The message is delivered using the selected transport
>>
>>
>>
>> Decentralization emerges here because each DID holder independently
>> controls their service endpoints. Multiple transport options avoid
>> single-point dependencies, and fallback mechanisms ensure reliable delivery.
>>
>> Phase 5: Recipient processing
>>
>>    10. Bob’s DID wallet receives the encrypted message
>>    11. The message is decrypted locally using Bob’s private key
>>    12. The message is presented in Bob’s interface (wallet, agent, or
>>    email client via plugin)
>>
>>
>>
>> Decryption occurs only on Bob’s device, not on any intermediary system.
>>
>>
>>
>> Where privacy could break and how it is prevented
>>
>> One risk is the bridge becoming a centralized surveillance point if
>> everyone relied on a single service. The architecture avoids this by
>> treating the bridge as open-source software, not as a hosted service.
>> Organizations deploy their own instances, control their own routing tables,
>> audit the code, and remain independent of external operators.
>>
>> Another risk is metadata correlation. Even with encrypted content, timing
>> and volume can reveal patterns. Bridges can mitigate this using message
>> batching, randomized delays, optional padding to normalize sizes, and
>> privacy-preserving transports such as Tor or I2P for DIDComm delivery.
>>
>> A third risk is a centralized mapping database. This is avoided because
>> mappings exist only within each organization’s infrastructure. There is no
>> global registry of email-to-DID associations.
>>
>>
>>
>> What decentralization actually means in this design
>>
>> Each organization retains sovereign control over its routing tables,
>> security policies, supported transports, and encryption standards.
>>
>> Multiple implementations are possible because the system is defined
>> through standard interfaces. Organizations can use a reference
>> implementation, build their own, or extend it with custom logic, while
>> remaining interoperable.
>>
>> Recipients control which DIDs map to which email addresses, which
>> endpoints they publish, what transports they accept, and whether they
>> participate at all.
>>
>>
>>
>> Addressing your core concern
>>
>> You noted that it is “quite hard to uphold the promise of privacy and
>> decentralization.” That concern is valid for centralized service models.
>>
>> This design is different: it is a protocol implementation, not a service.
>>
>> Privacy and decentralization arise from localized processing inside each
>> organization’s infrastructure, end-to-end encryption before messages leave
>> the bridge, recipient-controlled cryptographic identity and endpoints, and
>> the absence of any central registry.
>>
>>
>>
>> Realistic boundaries
>>
>> We cannot change the fundamental architecture of email. When senders use
>> external providers, those providers will always see metadata.
>>
>> What this system provides is end-to-end encryption after the message
>> enters the recipient organization, full control over identity translation
>> for domain owners, and a migration path that does not require universal or
>> immediate adoption.
>>
>>
>>
>> Discovery model
>>
>> The bridge serves recipients, not senders.
>>
>> Bob’s email-to-DID mapping exists only inside his organization’s bridge.
>> The sender needs only Bob’s email address.
>>
>> In the DID-to-email direction, if a sender knows Bob’s DID but Bob’s DID
>> endpoints route through his bridge, the message can be translated to email.
>> If not, delivery fails, correctly reflecting Bob’s choice not to accept
>> email delivery.
>>
>>
>>
>> Practical example
>>
>> An external partner emails contact@enterprise.com.
>>
>> The enterprise bridge routes the message to internal DIDs, encrypts it,
>> and delivers it to internal teams via DIDComm.
>>
>> Replies are sent as DID messages, translated back into email by the
>> bridge, and delivered to the external partner.
>>
>> The partner receives a normal email and is unaware of the DID layer.
>>
>> The privacy benefit is strongest for the organization and its internal
>> users, while compatibility with the existing internet is preserved.
>>
>>
>>
>> Conclusion
>>
>> Privacy and decentralization are achieved through:
>>
>>    - Distributed deployment, with each organization operating its own
>>    bridge
>>    - End-to-end encryption for translated messages
>>    - Recipient-controlled identities and endpoints
>>    - No central mapping or routing authority
>>    - Transparent, auditable implementation
>>
>> We are not proposing a centralized gateway. We are providing protocol
>> building blocks that organizations can deploy inside their own security
>> perimeter, under their own governance and access controls.
>>
>>
>>
>>
>>
>> Best regards,
>>
>> Amir Hameed Mir
>>
>> Sirraya Labs
>>
>>
>>
>>
>>
>> On Wed, 28 Jan 2026 at 4:48 PM, Jori Lehtinen <lehtinenjori03@gmail.com>
>> wrote:
>>
>> I think that would be extremely valuable. But it also might be quite hard
>> to uphold the promise of privacy and decentralization there. If you could
>> walk us trough the protocol/process step by step, it would be easier to
>> consider how it would work exactly and identify + tackle possible issues.
>>
>>
>>
>> ke 28.1.2026 klo 13.13 Amir Hameed (amsaalegal@gmail.com) kirjoitti:
>>
>> Hi Jori,
>>
>>
>>
>> Yes, conceptually there are two symmetric gateway endpoints. One
>> translates SMTP email into DIDComm messages and delivers them to a DID
>> inbox. The other translates DIDComm messages back into email and delivers
>> them via SMTP.
>>
>>
>>
>> The key value is that one side can use decentralized, cryptographically
>> secure messaging (DIDComm) without requiring the other side to migrate,
>> install anything, or even know about DIDs.
>>
>>
>>
>> This removes the adoption barrier that normally kills new identity and
>> messaging systems, while still enabling privacy, authentication, and
>> decentralization where it is needed.
>>
>>
>>
>>
>>
>> Regards
>>
>> Amir Hameed
>>
>>
>>
>> On Wed, 28 Jan 2026 at 4:40 PM, Jori Lehtinen <lehtinenjori03@gmail.com>
>> wrote:
>>
>> So two endpoints? One that translates email to did, and another one that
>> translates did to email? And the value proposition is what? Takes email
>> message and transforms it to a DIDComm message and delivers it to some kind
>> of DIDComm inbox and the other way around allows to respond with a DIDComm
>> message turned in to email and gets translated and delivered to an email
>> inbox. So if another party wants decentralized and private messaging they
>> can have that with a person that doesn't want to migrate or doesn't care or
>> something like this?
>>
>>
>>
>> ke 28.1.2026 klo 12.10 Amir Hameed (amsaalegal@gmail.com) kirjoitti:
>>
>> Hi Michael
>>
>>
>>
>> Thank you for engaging, I don’t have single full architecture diagram but
>> I just draw one for you and I am attaching it here , I believe it will give
>> you an idea of how bidirectional runtime mapping happens between two
>> different identifiers, Have a look then we can dive deep into what goes
>> under the hood, there are two mappings happening inside runtime, one is
>> header mapping and another is message format mapping.
>>
>>
>>
>> On Wed, 28 Jan 2026 at 3:26 PM, Michael Herman (Trusted Digital Web) <
>> mwherman@parallelspace.net> wrote:
>>
>>
>>    1. RE: a bidirectional DID ↔ Email bridge acting as a universal
>>    message router
>>
>>
>>
>> This is confusing because “DID” (an identifier) and “Email” (an email
>> message/system/protocol) are “not of the same type”.
>>
>>
>>
>> For example: DID and Email Address are of the same type (both character
>> string identifiers).
>>
>>
>>
>>    2. RE: translates email messages into DID-native formats
>>
>>
>>
>> What is a “DID-native (email message) format”? …an example?
>>
>>
>>
>> Michael Herman
>>
>> Chief Digital Architect
>>
>> Web 7.0 Foundation / TDW™
>>
>>
>>
>> *From:* Amir Hameed <amsaalegal@gmail.com>
>>
>> *Sent:* Tuesday, January 27, 2026 1:05 PM
>> *To:* Daniel Hardman <daniel.hardman@gmail.com>
>> *Cc:* Michael Herman (Trusted Digital Web) <mwherman@parallelspace.net>;
>> W3C Credentials CG <public-credentials@w3.org>
>> *Subject:* Re: [Email-to-DID Bridge] Exploring a practical migration
>> path for email infrastructure
>>
>>
>>
>> Hi Michael
>>
>> The core idea of this bridge is to be fully protocol-agnostic. While
>> DIDComm is currently the strongest candidate for DID-native messaging, the
>> design is not limited to it—we have already tested WebSockets and
>> HTTP-based delivery methods as well.
>>
>> The real problem we are addressing is that today there are two types of
>> users: those who prefer communicating via DIDs, and those for whom
>> traditional email is perfectly sufficient. In real-world scenarios such as
>> customer support or enterprise communication, both groups must be able to
>> coexist and communicate seamlessly.
>>
>> This becomes a classic translation problem, similar to human languages.
>> If one person speaks Hindi and another speaks English, communication is
>> only possible through a translator. In the same way, the DID world and the
>> email world require a neutral translation layer.
>>
>> That is what this system provides: a bidirectional DID ↔ Email bridge
>> acting as a universal message router. It maps email addresses to DIDs and
>> translates email messages into DID-native formats (and vice versa) at
>> runtime.
>>
>> Rather than being just a mailbox, it functions as a universal message
>> box, capable of handling both email and DID messages simultaneously. Users
>> remain free to choose how they communicate, while the bridge ensures
>> interoperability underneath.
>>
>> The goal is to enable gradual adoption of decentralized identity without
>> breaking compatibility with the existing, widely-used email ecosystem,
>> while keeping the system open-source and extensible for future protocols.
>>
>> Regards
>>
>> Amir Hameed Mir
>>
>> Sirraya Labs
>>
>>
>>
>>
>>
>> On Tue, 27 Jan 2026 at 5:55 PM, Daniel Hardman <daniel.hardman@gmail.com>
>> wrote:
>>
>> email + DIDComm work:
>> https://github.com/decentralized-identity/didcomm-messaging/blob/main/extensions/email_transport/main.md
>>
>>
>>
>> On Mon, Jan 26, 2026 at 4:57 PM Michael Herman (Trusted Digital Web) <
>> mwherman@parallelspace.net> wrote:
>>
>> Amir, once you’ve mapped an SMTP email address to a DID, which protocol
>> are you using to complete the email message delivery?  …for example, is it
>> DIDComm?
>>
>>
>>
>> Best regards,
>>
>> Michael Herman
>>
>> Chief Digital Architect
>>
>> Web 7.0™ / TDW™
>>
>>
>>
>> *From:* Amir Hameed <amsaalegal@gmail.com>
>> *Sent:* Sunday, January 25, 2026 12:51 PM
>> *To:* W3C Credentials CG <public-credentials@w3.org>
>> *Subject:* [Email-to-DID Bridge] Exploring a practical migration path
>> for email infrastructure
>>
>>
>>
>> Hello CCG community,
>>
>> I'm writing from Sirraya Labs to share an early-stage but
>> production-tested approach we've been developing: an *Email–DID Router* that
>> bridges traditional email infrastructure with decentralized identity
>> (DID/VC) systems. We're keen to gather feedback, explore alignment with
>> related W3C work, and understand whether this direction resonates with the
>> community’s broader interoperability goals.
>> What we’re exploring
>>
>> The system operates as an enterprise-grade gateway that:
>>
>>    - Maps traditional email addresses (e.g., executive@company.com) to
>>    DIDs (e.g., did:example:alice123)
>>    - Transforms SMTP-based emails into verifiable, identity-aware
>>    messages
>>    - Routes messages using confidence-based logic, security screening,
>>    and configurable policies
>>    - Runs with full auditability and measurable performance (tested in
>>    live environments)
>>
>> Here’s a snapshot from a recent run:
>>
>> text
>>
>> [2026-01-25T11:31:28Z INFO  email_did_gateway] Processing incoming email from chairman@board-of-directors.com to executive@company.com
>>
>> [2026-01-25T11:31:28Z INFO  email_did_gateway] Successfully processed email into DID message: 71259949-4f38-46a1-8c74-c86540ba5917
>>
>> [2026-01-25T11:31:28Z INFO  email_did_router] Processed executive email - Confidence: 0.78, Method: RuleBased
>>
>> Why this matters for DID/VC adoption
>>
>> Email remains the dominant channel for business, institutional, and
>> personal communication. Rather than proposing a disruptive replacement,
>> we’re focused on *building incremental, opt-in bridges* that allow:
>>
>>    1. Gradual migration of trust from SMTP+PKI to DID/VC models
>>    2. Immediate value through better routing, security screening, and
>>    audit capabilities
>>    3. Preservation of existing infrastructure and investment while
>>    enabling verifiable communication
>>
>> We see potential alignment with several W3C efforts—DID Comm, VC-API,
>> identity hubs, and trust spanning protocols—and are keen to explore how
>> this work might complement ongoing standardization.
>> Questions for the community
>>
>> Before we formalize or release anything publicly, we’d value your
>> perspectives on:
>>
>>    - *Use cases* we may have overlooked (enterprise, government,
>>    healthcare, education, etc.)
>>    - *Privacy and compliance considerations* (GDPR, residency,
>>    retention, consent)
>>    - *Mapping lifecycle* (persistence, revocation, recovery, expiration)
>>    - *Confidence and trust models* suitable for email→DID routing
>>    - *Potential alignment* with existing or emerging W3C specifications
>>
>> We’re particularly interested in whether this kind of bridge could help
>> accelerate real-world adoption of DID/VC systems in environments where
>> email remains non-negotiable.
>>
>> We’re at the stage of gauging interest and refining the approach based on
>> community feedback. If this resonates, we’d be happy to:
>>
>>    - Share more detailed design notes
>>    - Discuss integration with related CCG work items
>>    - Potentially present in a future CCG call
>>    - Explore collaboration with groups working on interoperability,
>>    trust layers, or migration pathways
>>
>> Our goal is to help build *responsible, incremental bridges*—not to
>> replace email or DIDs, but to enable them to coexist and evolve together.
>>
>> We look forward to your thoughts, critiques, and suggestions.
>>
>> Best regards,
>> Amir Hameed
>> Sirraya Labs
>>
>>

Received on Tuesday, 3 February 2026 09:30:58 UTC