- From: Amir Hameed <amsaalegal@gmail.com>
- Date: Tue, 3 Feb 2026 03:58:49 -0800
- To: Jori Lehtinen <lehtinenjori03@gmail.com>
- Cc: "Michael Herman (Trusted Digital Web)" <mwherman@parallelspace.net>, Daniel Hardman <daniel.hardman@gmail.com>, W3C Credentials CG <public-credentials@w3.org>
- Message-ID: <CANGYBsyW3i0fwjurzB+0rxhD6tyFOrP458bhORjsuPT7u3b8+Q@mail.gmail.com>
You mentioned: *"Instead of replacing it, the goal should be to hollow it out from within: keep the web as the discovery and transport plane, but move identity, state, authority, and continuity into the client."* While this approach (as taken by z-base) is valuable for certain use cases, UDNA goes a step further by re-architecting the addressing layer itself. UDNA rethinks addressing from first principles: - Instead of https://server.com/resource, UDNA uses udna://did:entity.example/resource. - The address is cryptographic, not geographic. - The DID (Decentralized Identifier) represents the *entity*, not its location. - Service endpoints are discovered via DID documents, not DNS. This isn't about making servers "blind relays" but about making addressing intrinsically tied to identity, not infrastructure. On Tue, 3 Feb 2026 at 03:57, Amir Hameed <amsaalegal@gmail.com> wrote: > What UDNA Actually Addresses > > Today's internet is built around location-based addressing: > > - > > URLs and IP addresses point to *where* something is (a server, a > service, a resource). > - > > DNS maps human-readable names to locations. > - > > Trust is delegated to centralized authorities (CAs, DNS providers, > identity brokers). > > This creates several fundamental problems: > > 1. > > Services are tied to infrastructure – If a service moves, its address > breaks. > 2. > > Identity is an afterthought – Authentication and authorization are > bolted on top of location-based protocols. > 3. > > Trust is centralized – Certificate Authorities, DNS hierarchies, and > identity providers become single points of failure and surveillance. > 4. > > No intrinsic privacy – IPs and metadata leak correlation data by > design. > > > > On Tue, 3 Feb 2026 at 03:55, Amir Hameed <amsaalegal@gmail.com> wrote: > >> Hi Jori, >> >> Thanks for sharing your thoughts on the current state of transport >> protocols and the vision behind z-base. You've made several valid points >> about the role of SMTP, HTTP, WebSockets, Tor, libp2p, QUIC, and DNS in >> handling transport and discovery—and you're right that these protocols >> already solve the problem of moving bytes and providing global discovery. >> >> However, I'd like to clarify that UDNA is not focused on replacing >> transport or discovery layers. Instead, it aims to solve a deeper >> architectural problem: decoupling identity from location. >> >> On Tue, 3 Feb 2026 at 01:45, Jori Lehtinen <lehtinenjori03@gmail.com> >> wrote: >> >>> Transport is already solved. SMTP, HTTP, WebSockets, Tor, libp2p, QUIC, >>> they all move bytes. What they do not solve is who someone is, where they >>> can be reached, and how that mapping can change without a central >>> authority. The current web already provides global discovery through DNS, >>> domains, and centralized routing tables. Instead of replacing it, the goal >>> should be to hollow it out from within: keep the web as the discovery and >>> transport plane, but move identity, state, authority, and continuity into >>> the client. That is what z-base is doing. It does not fight the web, it >>> parasitizes it. Servers become blind relays and caches. Trust, history, and >>> control live at the edge. Everything else is just useful plumbing. >>> >>> https://github.com/z-base >>> >>> ti 3.2.2026 klo 11.30 Amir Hameed (amsaalegal@gmail.com) kirjoitti: >>> >>>> Hey All, >>>> >>>> Have a look at our demo run of Universal DID Native Addressing CGs >>>> implementation on a local wifi, looking forward to feedback, comments and >>>> suggestions. >>>> >>>> On Wed, 28 Jan 2026 at 05:34, Amir Hameed <amsaalegal@gmail.com> wrote: >>>> >>>>> >>>>> >>>>> On Wed, 28 Jan 2026 at 6:56 PM, Michael Herman (Trusted Digital Web) < >>>>> mwherman@parallelspace.net> wrote: >>>>> >>>>>> Updated diagram… >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> *From:* Michael Herman (Trusted Digital Web) < >>>>>> mwherman@parallelspace.net> >>>>>> *Sent:* Wednesday, January 28, 2026 1:18 PM >>>>>> *To:* Jori Lehtinen <lehtinenjori03@gmail.com>; Amir Hameed < >>>>>> amsaalegal@gmail.com> >>>>>> *Cc:* Daniel Hardman <daniel.hardman@gmail.com>; W3C Credentials CG < >>>>>> public-credentials@w3.org> >>>>>> *Subject:* RE: [Email-to-DID Bridge] Exploring a practical migration >>>>>> path for email infrastructure >>>>>> >>>>>> >>>>>> >>>>>> Loose-related, at the Web 7.0 Foundation, we’re looking at forking >>>>>> the open-source ZeroTier project and turning it into a DID-native, >>>>>> DIDComm-native router/DID virtual network for DID-native, DIDComm-native >>>>>> apps (aka Neuroplexes). >>>>>> >>>>>> >>>>>> >>>>>> Michael Herman >>>>>> >>>>>> Chief Digital Architect >>>>>> >>>>>> Web 7.0 Foundation >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> *From:* Jori Lehtinen <lehtinenjori03@gmail.com> >>>>>> *Sent:* Wednesday, January 28, 2026 12:30 PM >>>>>> *To:* Amir Hameed <amsaalegal@gmail.com> >>>>>> *Cc:* Michael Herman (Trusted Digital Web) < >>>>>> mwherman@parallelspace.net>; Daniel Hardman <daniel.hardman@gmail.com>; >>>>>> W3C Credentials CG <public-credentials@w3.org> >>>>>> *Subject:* Re: [Email-to-DID Bridge] Exploring a practical migration >>>>>> path for email infrastructure >>>>>> >>>>>> >>>>>> >>>>>> I can totally see it working that way, but how do you deliver the >>>>>> response from Bob's DIDComm client to Alice's email client with end-to-end >>>>>> encryption, wich is obviously the more crucial part here as Bob is the one >>>>>> that cares about total privacy. I think this can still be a good idea even >>>>>> without e2e encryption guarantee, however if you can solve that part it is >>>>>> always better. An organizations internal messaging can always be >>>>>> "decenralized" by making it centralized to the organization controlled >>>>>> machinery just by self-hosting any regular server software. But as stated I >>>>>> think this can help with "adoption pain" regardless so it is not >>>>>> necessarily a bad idea. >>>>>> >>>>>> >>>>>> >>>>>> ke 28.1.2026 klo 14.14 Amir Hameed (amsaalegal@gmail.com) kirjoitti: >>>>>> >>>>>> Hi Jori >>>>>> >>>>>> >>>>>> >>>>>> It’s hard to explain every detail in a single email but since the >>>>>> points raised are critical I would try best to give a proper walkthrough >>>>>> >>>>>> >>>>>> >>>>>> Let me walk through the protocol step by step and show precisely >>>>>> where privacy risks arise and how the architecture addresses them. >>>>>> >>>>>> Step-by-Step Protocol Flow >>>>>> >>>>>> >>>>>> >>>>>> Phase 1: Sender initiation >>>>>> >>>>>> >>>>>> >>>>>> Scenario: Alice (an email user) wants to message Bob (a DID user). >>>>>> >>>>>> 1. Alice composes an email to bob-executive@company.org >>>>>> 2. Her email client performs a standard DNS/MX lookup for >>>>>> company.org >>>>>> 3. The message is delivered to company.org’s SMTP server, which >>>>>> runs the bridge >>>>>> >>>>>> >>>>>> >>>>>> At this stage, privacy behaves exactly like normal email. Alice’s >>>>>> email provider sees standard SMTP metadata. The receiving SMTP server at >>>>>> company.org receives the message within infrastructure controlled by >>>>>> that organization. This is the baseline privacy model of email and cannot >>>>>> be changed by any overlay system. >>>>>> >>>>>> Phase 2: Bridge processing >>>>>> >>>>>> 4. The SMTP server invokes bridge.handle_email(message) >>>>>> 5. The bridge consults its internal routing table: >>>>>> >>>>>> bob-executive@company.org → did:web:company.org:bob >>>>>> >>>>>> 6. The bridge converts the email into a DID message representation >>>>>> >>>>>> >>>>>> >>>>>> The critical design decision here is that the email-to-DID routing >>>>>> table is privately maintained by each organization. There is no global >>>>>> directory and no shared mapping service. company.org alone controls >>>>>> and stores this mapping inside its own infrastructure. >>>>>> >>>>>> Phase 3: Message transformation >>>>>> >>>>>> 7. The bridge constructs a DID message: >>>>>> >>>>>> >>>>>> >>>>>> - The payload is encrypted using Bob’s public key from his DID >>>>>> document >>>>>> - Metadata such as sender, timestamp, and subject is preserved >>>>>> - Email headers are mapped into DID message attributes >>>>>> >>>>>> >>>>>> >>>>>> End-to-end encryption is applied at this stage. Only Bob can decrypt >>>>>> the message. The bridge itself handles ciphertext only and cannot read the >>>>>> content. >>>>>> >>>>>> Phase 4: Protocol-agnostic routing >>>>>> >>>>>> 8. The bridge inspects Bob’s DID document to discover service >>>>>> endpoints. This may include: >>>>>> >>>>>> >>>>>> >>>>>> - A DIDComm endpoint (preferred) >>>>>> - A WebSocket endpoint >>>>>> - An HTTP/HTTPS endpoint >>>>>> - Or email as a fallback if no DID endpoint is available >>>>>> >>>>>> >>>>>> >>>>>> 9. The message is delivered using the selected transport >>>>>> >>>>>> >>>>>> >>>>>> Decentralization emerges here because each DID holder independently >>>>>> controls their service endpoints. Multiple transport options avoid >>>>>> single-point dependencies, and fallback mechanisms ensure reliable delivery. >>>>>> >>>>>> Phase 5: Recipient processing >>>>>> >>>>>> 10. Bob’s DID wallet receives the encrypted message >>>>>> 11. The message is decrypted locally using Bob’s private key >>>>>> 12. The message is presented in Bob’s interface (wallet, agent, >>>>>> or email client via plugin) >>>>>> >>>>>> >>>>>> >>>>>> Decryption occurs only on Bob’s device, not on any intermediary >>>>>> system. >>>>>> >>>>>> >>>>>> >>>>>> Where privacy could break and how it is prevented >>>>>> >>>>>> One risk is the bridge becoming a centralized surveillance point if >>>>>> everyone relied on a single service. The architecture avoids this by >>>>>> treating the bridge as open-source software, not as a hosted service. >>>>>> Organizations deploy their own instances, control their own routing tables, >>>>>> audit the code, and remain independent of external operators. >>>>>> >>>>>> Another risk is metadata correlation. Even with encrypted content, >>>>>> timing and volume can reveal patterns. Bridges can mitigate this using >>>>>> message batching, randomized delays, optional padding to normalize sizes, >>>>>> and privacy-preserving transports such as Tor or I2P for DIDComm delivery. >>>>>> >>>>>> A third risk is a centralized mapping database. This is avoided >>>>>> because mappings exist only within each organization’s infrastructure. >>>>>> There is no global registry of email-to-DID associations. >>>>>> >>>>>> >>>>>> >>>>>> What decentralization actually means in this design >>>>>> >>>>>> Each organization retains sovereign control over its routing tables, >>>>>> security policies, supported transports, and encryption standards. >>>>>> >>>>>> Multiple implementations are possible because the system is defined >>>>>> through standard interfaces. Organizations can use a reference >>>>>> implementation, build their own, or extend it with custom logic, while >>>>>> remaining interoperable. >>>>>> >>>>>> Recipients control which DIDs map to which email addresses, which >>>>>> endpoints they publish, what transports they accept, and whether they >>>>>> participate at all. >>>>>> >>>>>> >>>>>> >>>>>> Addressing your core concern >>>>>> >>>>>> You noted that it is “quite hard to uphold the promise of privacy and >>>>>> decentralization.” That concern is valid for centralized service models. >>>>>> >>>>>> This design is different: it is a protocol implementation, not a >>>>>> service. >>>>>> >>>>>> Privacy and decentralization arise from localized processing inside >>>>>> each organization’s infrastructure, end-to-end encryption before messages >>>>>> leave the bridge, recipient-controlled cryptographic identity and >>>>>> endpoints, and the absence of any central registry. >>>>>> >>>>>> >>>>>> >>>>>> Realistic boundaries >>>>>> >>>>>> We cannot change the fundamental architecture of email. When senders >>>>>> use external providers, those providers will always see metadata. >>>>>> >>>>>> What this system provides is end-to-end encryption after the message >>>>>> enters the recipient organization, full control over identity translation >>>>>> for domain owners, and a migration path that does not require universal or >>>>>> immediate adoption. >>>>>> >>>>>> >>>>>> >>>>>> Discovery model >>>>>> >>>>>> The bridge serves recipients, not senders. >>>>>> >>>>>> Bob’s email-to-DID mapping exists only inside his organization’s >>>>>> bridge. The sender needs only Bob’s email address. >>>>>> >>>>>> In the DID-to-email direction, if a sender knows Bob’s DID but Bob’s >>>>>> DID endpoints route through his bridge, the message can be translated to >>>>>> email. If not, delivery fails, correctly reflecting Bob’s choice not to >>>>>> accept email delivery. >>>>>> >>>>>> >>>>>> >>>>>> Practical example >>>>>> >>>>>> An external partner emails contact@enterprise.com. >>>>>> >>>>>> The enterprise bridge routes the message to internal DIDs, encrypts >>>>>> it, and delivers it to internal teams via DIDComm. >>>>>> >>>>>> Replies are sent as DID messages, translated back into email by the >>>>>> bridge, and delivered to the external partner. >>>>>> >>>>>> The partner receives a normal email and is unaware of the DID layer. >>>>>> >>>>>> The privacy benefit is strongest for the organization and its >>>>>> internal users, while compatibility with the existing internet is preserved. >>>>>> >>>>>> >>>>>> >>>>>> Conclusion >>>>>> >>>>>> Privacy and decentralization are achieved through: >>>>>> >>>>>> - Distributed deployment, with each organization operating its >>>>>> own bridge >>>>>> - End-to-end encryption for translated messages >>>>>> - Recipient-controlled identities and endpoints >>>>>> - No central mapping or routing authority >>>>>> - Transparent, auditable implementation >>>>>> >>>>>> We are not proposing a centralized gateway. We are providing protocol >>>>>> building blocks that organizations can deploy inside their own security >>>>>> perimeter, under their own governance and access controls. >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> Best regards, >>>>>> >>>>>> Amir Hameed Mir >>>>>> >>>>>> Sirraya Labs >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> On Wed, 28 Jan 2026 at 4:48 PM, Jori Lehtinen < >>>>>> lehtinenjori03@gmail.com> wrote: >>>>>> >>>>>> I think that would be extremely valuable. But it also might be quite >>>>>> hard to uphold the promise of privacy and decentralization there. If you >>>>>> could walk us trough the protocol/process step by step, it would be easier >>>>>> to consider how it would work exactly and identify + tackle possible issues. >>>>>> >>>>>> >>>>>> >>>>>> ke 28.1.2026 klo 13.13 Amir Hameed (amsaalegal@gmail.com) kirjoitti: >>>>>> >>>>>> Hi Jori, >>>>>> >>>>>> >>>>>> >>>>>> Yes, conceptually there are two symmetric gateway endpoints. One >>>>>> translates SMTP email into DIDComm messages and delivers them to a DID >>>>>> inbox. The other translates DIDComm messages back into email and delivers >>>>>> them via SMTP. >>>>>> >>>>>> >>>>>> >>>>>> The key value is that one side can use decentralized, >>>>>> cryptographically secure messaging (DIDComm) without requiring the other >>>>>> side to migrate, install anything, or even know about DIDs. >>>>>> >>>>>> >>>>>> >>>>>> This removes the adoption barrier that normally kills new identity >>>>>> and messaging systems, while still enabling privacy, authentication, and >>>>>> decentralization where it is needed. >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> Regards >>>>>> >>>>>> Amir Hameed >>>>>> >>>>>> >>>>>> >>>>>> On Wed, 28 Jan 2026 at 4:40 PM, Jori Lehtinen < >>>>>> lehtinenjori03@gmail.com> wrote: >>>>>> >>>>>> So two endpoints? One that translates email to did, and another one >>>>>> that translates did to email? And the value proposition is what? Takes >>>>>> email message and transforms it to a DIDComm message and delivers it to >>>>>> some kind of DIDComm inbox and the other way around allows to respond with >>>>>> a DIDComm message turned in to email and gets translated and delivered to >>>>>> an email inbox. So if another party wants decentralized and private >>>>>> messaging they can have that with a person that doesn't want to migrate or >>>>>> doesn't care or something like this? >>>>>> >>>>>> >>>>>> >>>>>> ke 28.1.2026 klo 12.10 Amir Hameed (amsaalegal@gmail.com) kirjoitti: >>>>>> >>>>>> Hi Michael >>>>>> >>>>>> >>>>>> >>>>>> Thank you for engaging, I don’t have single full architecture diagram >>>>>> but I just draw one for you and I am attaching it here , I believe it will >>>>>> give you an idea of how bidirectional runtime mapping happens between two >>>>>> different identifiers, Have a look then we can dive deep into what goes >>>>>> under the hood, there are two mappings happening inside runtime, one is >>>>>> header mapping and another is message format mapping. >>>>>> >>>>>> >>>>>> >>>>>> On Wed, 28 Jan 2026 at 3:26 PM, Michael Herman (Trusted Digital Web) >>>>>> <mwherman@parallelspace.net> wrote: >>>>>> >>>>>> >>>>>> 1. RE: a bidirectional DID ↔ Email bridge acting as a universal >>>>>> message router >>>>>> >>>>>> >>>>>> >>>>>> This is confusing because “DID” (an identifier) and “Email” (an email >>>>>> message/system/protocol) are “not of the same type”. >>>>>> >>>>>> >>>>>> >>>>>> For example: DID and Email Address are of the same type (both >>>>>> character string identifiers). >>>>>> >>>>>> >>>>>> >>>>>> 2. RE: translates email messages into DID-native formats >>>>>> >>>>>> >>>>>> >>>>>> What is a “DID-native (email message) format”? …an example? >>>>>> >>>>>> >>>>>> >>>>>> Michael Herman >>>>>> >>>>>> Chief Digital Architect >>>>>> >>>>>> Web 7.0 Foundation / TDW™ >>>>>> >>>>>> >>>>>> >>>>>> *From:* Amir Hameed <amsaalegal@gmail.com> >>>>>> >>>>>> *Sent:* Tuesday, January 27, 2026 1:05 PM >>>>>> *To:* Daniel Hardman <daniel.hardman@gmail.com> >>>>>> *Cc:* Michael Herman (Trusted Digital Web) < >>>>>> mwherman@parallelspace.net>; W3C Credentials CG < >>>>>> public-credentials@w3.org> >>>>>> *Subject:* Re: [Email-to-DID Bridge] Exploring a practical migration >>>>>> path for email infrastructure >>>>>> >>>>>> >>>>>> >>>>>> Hi Michael >>>>>> >>>>>> The core idea of this bridge is to be fully protocol-agnostic. While >>>>>> DIDComm is currently the strongest candidate for DID-native messaging, the >>>>>> design is not limited to it—we have already tested WebSockets and >>>>>> HTTP-based delivery methods as well. >>>>>> >>>>>> The real problem we are addressing is that today there are two types >>>>>> of users: those who prefer communicating via DIDs, and those for whom >>>>>> traditional email is perfectly sufficient. In real-world scenarios such as >>>>>> customer support or enterprise communication, both groups must be able to >>>>>> coexist and communicate seamlessly. >>>>>> >>>>>> This becomes a classic translation problem, similar to human >>>>>> languages. If one person speaks Hindi and another speaks English, >>>>>> communication is only possible through a translator. In the same way, the >>>>>> DID world and the email world require a neutral translation layer. >>>>>> >>>>>> That is what this system provides: a bidirectional DID ↔ Email bridge >>>>>> acting as a universal message router. It maps email addresses to DIDs and >>>>>> translates email messages into DID-native formats (and vice versa) at >>>>>> runtime. >>>>>> >>>>>> Rather than being just a mailbox, it functions as a universal message >>>>>> box, capable of handling both email and DID messages simultaneously. Users >>>>>> remain free to choose how they communicate, while the bridge ensures >>>>>> interoperability underneath. >>>>>> >>>>>> The goal is to enable gradual adoption of decentralized identity >>>>>> without breaking compatibility with the existing, widely-used email >>>>>> ecosystem, while keeping the system open-source and extensible for future >>>>>> protocols. >>>>>> >>>>>> Regards >>>>>> >>>>>> Amir Hameed Mir >>>>>> >>>>>> Sirraya Labs >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> On Tue, 27 Jan 2026 at 5:55 PM, Daniel Hardman < >>>>>> daniel.hardman@gmail.com> wrote: >>>>>> >>>>>> email + DIDComm work: >>>>>> https://github.com/decentralized-identity/didcomm-messaging/blob/main/extensions/email_transport/main.md >>>>>> >>>>>> >>>>>> >>>>>> On Mon, Jan 26, 2026 at 4:57 PM Michael Herman (Trusted Digital Web) >>>>>> <mwherman@parallelspace.net> wrote: >>>>>> >>>>>> Amir, once you’ve mapped an SMTP email address to a DID, which >>>>>> protocol are you using to complete the email message delivery? …for >>>>>> example, is it DIDComm? >>>>>> >>>>>> >>>>>> >>>>>> Best regards, >>>>>> >>>>>> Michael Herman >>>>>> >>>>>> Chief Digital Architect >>>>>> >>>>>> Web 7.0™ / TDW™ >>>>>> >>>>>> >>>>>> >>>>>> *From:* Amir Hameed <amsaalegal@gmail.com> >>>>>> *Sent:* Sunday, January 25, 2026 12:51 PM >>>>>> *To:* W3C Credentials CG <public-credentials@w3.org> >>>>>> *Subject:* [Email-to-DID Bridge] Exploring a practical migration >>>>>> path for email infrastructure >>>>>> >>>>>> >>>>>> >>>>>> Hello CCG community, >>>>>> >>>>>> I'm writing from Sirraya Labs to share an early-stage but >>>>>> production-tested approach we've been developing: an *Email–DID >>>>>> Router* that bridges traditional email infrastructure with >>>>>> decentralized identity (DID/VC) systems. We're keen to gather feedback, >>>>>> explore alignment with related W3C work, and understand whether this >>>>>> direction resonates with the community’s broader interoperability goals. >>>>>> What we’re exploring >>>>>> >>>>>> The system operates as an enterprise-grade gateway that: >>>>>> >>>>>> - Maps traditional email addresses (e.g., executive@company.com) >>>>>> to DIDs (e.g., did:example:alice123) >>>>>> - Transforms SMTP-based emails into verifiable, identity-aware >>>>>> messages >>>>>> - Routes messages using confidence-based logic, security >>>>>> screening, and configurable policies >>>>>> - Runs with full auditability and measurable performance (tested >>>>>> in live environments) >>>>>> >>>>>> Here’s a snapshot from a recent run: >>>>>> >>>>>> text >>>>>> >>>>>> [2026-01-25T11:31:28Z INFO email_did_gateway] Processing incoming email from chairman@board-of-directors.com to executive@company.com >>>>>> >>>>>> [2026-01-25T11:31:28Z INFO email_did_gateway] Successfully processed email into DID message: 71259949-4f38-46a1-8c74-c86540ba5917 >>>>>> >>>>>> [2026-01-25T11:31:28Z INFO email_did_router] Processed executive email - Confidence: 0.78, Method: RuleBased >>>>>> >>>>>> Why this matters for DID/VC adoption >>>>>> >>>>>> Email remains the dominant channel for business, institutional, and >>>>>> personal communication. Rather than proposing a disruptive replacement, >>>>>> we’re focused on *building incremental, opt-in bridges* that allow: >>>>>> >>>>>> 1. Gradual migration of trust from SMTP+PKI to DID/VC models >>>>>> 2. Immediate value through better routing, security screening, >>>>>> and audit capabilities >>>>>> 3. Preservation of existing infrastructure and investment while >>>>>> enabling verifiable communication >>>>>> >>>>>> We see potential alignment with several W3C efforts—DID Comm, VC-API, >>>>>> identity hubs, and trust spanning protocols—and are keen to explore how >>>>>> this work might complement ongoing standardization. >>>>>> Questions for the community >>>>>> >>>>>> Before we formalize or release anything publicly, we’d value your >>>>>> perspectives on: >>>>>> >>>>>> - *Use cases* we may have overlooked (enterprise, government, >>>>>> healthcare, education, etc.) >>>>>> - *Privacy and compliance considerations* (GDPR, residency, >>>>>> retention, consent) >>>>>> - *Mapping lifecycle* (persistence, revocation, recovery, >>>>>> expiration) >>>>>> - *Confidence and trust models* suitable for email→DID routing >>>>>> - *Potential alignment* with existing or emerging W3C >>>>>> specifications >>>>>> >>>>>> We’re particularly interested in whether this kind of bridge could >>>>>> help accelerate real-world adoption of DID/VC systems in environments where >>>>>> email remains non-negotiable. >>>>>> >>>>>> We’re at the stage of gauging interest and refining the approach >>>>>> based on community feedback. If this resonates, we’d be happy to: >>>>>> >>>>>> - Share more detailed design notes >>>>>> - Discuss integration with related CCG work items >>>>>> - Potentially present in a future CCG call >>>>>> - Explore collaboration with groups working on interoperability, >>>>>> trust layers, or migration pathways >>>>>> >>>>>> Our goal is to help build *responsible, incremental bridges*—not to >>>>>> replace email or DIDs, but to enable them to coexist and evolve together. >>>>>> >>>>>> We look forward to your thoughts, critiques, and suggestions. >>>>>> >>>>>> Best regards, >>>>>> Amir Hameed >>>>>> Sirraya Labs >>>>>> >>>>>>
Attachments
- image/jpeg attachment: image001.jpg
- image/jpeg attachment: image005.jpg
- image/jpeg attachment: image004.jpg
Received on Tuesday, 3 February 2026 09:57:58 UTC