- From: Amir Hameed <amsaalegal@gmail.com>
- Date: Wed, 28 Jan 2026 18:17:54 +0530
- To: Jori Lehtinen <lehtinenjori03@gmail.com>
- Cc: "Michael Herman (Trusted Digital Web)" <mwherman@parallelspace.net>, Daniel Hardman <daniel.hardman@gmail.com>, W3C Credentials CG <public-credentials@w3.org>
- Message-ID: <CANGYBsz3S7LStqNuh-Ono6NwhLWpgP0L5mzik+LqoNh4n0au0Q@mail.gmail.com>
Hi jori You’re right that Bob→Alice cannot be true E2E without Alice participating cryptographically. We intentionally accept this in Phase 1 to avoid breaking compatibility. The design secures the recipient side immediately (which is where organizations face the highest risk), while creating a clean upgrade path to bridge-to-bridge E2E as adoption grows. In other words: we optimize for deployability first, and asymptotically approach full decentralization and E2E as the network evolves. We think small steps actually help with breaking anything and it’s a well thought out approach to on ramp Regards Amir Hameed On Wed, 28 Jan 2026 at 6:00 PM, Jori Lehtinen <lehtinenjori03@gmail.com> wrote: > I can totally see it working that way, but how do you deliver the response > from Bob's DIDComm client to Alice's email client with end-to-end > encryption, wich is obviously the more crucial part here as Bob is the one > that cares about total privacy. I think this can still be a good idea even > without e2e encryption guarantee, however if you can solve that part it is > always better. An organizations internal messaging can always be > "decenralized" by making it centralized to the organization controlled > machinery just by self-hosting any regular server software. But as stated I > think this can help with "adoption pain" regardless so it is not > necessarily a bad idea. > > ke 28.1.2026 klo 14.14 Amir Hameed (amsaalegal@gmail.com) kirjoitti: > >> Hi Jori >> >> It’s hard to explain every detail in a single email but since the points >> raised are critical I would try best to give a proper walkthrough >> >> Let me walk through the protocol step by step and show precisely where >> privacy risks arise and how the architecture addresses them. >> >> Step-by-Step Protocol Flow >> >> >> Phase 1: Sender initiation >> >> >> Scenario: Alice (an email user) wants to message Bob (a DID user). >> >> >> 1. >> >> Alice composes an email to bob-executive@company.org >> 2. >> >> Her email client performs a standard DNS/MX lookup for company.org >> 3. >> >> The message is delivered to company.org’s SMTP server, which runs the >> bridge >> >> >> At this stage, privacy behaves exactly like normal email. Alice’s email >> provider sees standard SMTP metadata. The receiving SMTP server at >> company.org receives the message within infrastructure controlled by >> that organization. This is the baseline privacy model of email and cannot >> be changed by any overlay system. >> >> Phase 2: Bridge processing >> >> >> 4. >> >> The SMTP server invokes bridge.handle_email(message) >> 5. >> >> The bridge consults its internal routing table: >> >> bob-executive@company.org → did:web:company.org:bob >> 6. >> >> The bridge converts the email into a DID message representation >> >> >> The critical design decision here is that the email-to-DID routing table >> is privately maintained by each organization. There is no global directory >> and no shared mapping service. company.org alone controls and stores >> this mapping inside its own infrastructure. >> >> Phase 3: Message transformation >> >> >> 7. >> >> The bridge constructs a DID message: >> >> >> >> - >> >> The payload is encrypted using Bob’s public key from his DID document >> - >> >> Metadata such as sender, timestamp, and subject is preserved >> - >> >> Email headers are mapped into DID message attributes >> >> >> End-to-end encryption is applied at this stage. Only Bob can decrypt the >> message. The bridge itself handles ciphertext only and cannot read the >> content. >> >> Phase 4: Protocol-agnostic routing >> >> >> 8. >> >> The bridge inspects Bob’s DID document to discover service endpoints. >> This may include: >> >> >> >> - >> >> A DIDComm endpoint (preferred) >> - >> >> A WebSocket endpoint >> - >> >> An HTTP/HTTPS endpoint >> - >> >> Or email as a fallback if no DID endpoint is available >> >> >> >> 9. >> >> The message is delivered using the selected transport >> >> >> Decentralization emerges here because each DID holder independently >> controls their service endpoints. Multiple transport options avoid >> single-point dependencies, and fallback mechanisms ensure reliable delivery. >> >> Phase 5: Recipient processing >> >> >> 10. >> >> Bob’s DID wallet receives the encrypted message >> 11. >> >> The message is decrypted locally using Bob’s private key >> 12. >> >> The message is presented in Bob’s interface (wallet, agent, or email >> client via plugin) >> >> >> Decryption occurs only on Bob’s device, not on any intermediary system. >> >> >> Where privacy could break and how it is prevented >> >> One risk is the bridge becoming a centralized surveillance point if >> everyone relied on a single service. The architecture avoids this by >> treating the bridge as open-source software, not as a hosted service. >> Organizations deploy their own instances, control their own routing tables, >> audit the code, and remain independent of external operators. >> >> Another risk is metadata correlation. Even with encrypted content, timing >> and volume can reveal patterns. Bridges can mitigate this using message >> batching, randomized delays, optional padding to normalize sizes, and >> privacy-preserving transports such as Tor or I2P for DIDComm delivery. >> >> A third risk is a centralized mapping database. This is avoided because >> mappings exist only within each organization’s infrastructure. There is no >> global registry of email-to-DID associations. >> >> >> What decentralization actually means in this design >> >> Each organization retains sovereign control over its routing tables, >> security policies, supported transports, and encryption standards. >> >> Multiple implementations are possible because the system is defined >> through standard interfaces. Organizations can use a reference >> implementation, build their own, or extend it with custom logic, while >> remaining interoperable. >> >> Recipients control which DIDs map to which email addresses, which >> endpoints they publish, what transports they accept, and whether they >> participate at all. >> >> >> Addressing your core concern >> >> You noted that it is “quite hard to uphold the promise of privacy and >> decentralization.” That concern is valid for centralized service models. >> >> This design is different: it is a protocol implementation, not a service. >> >> Privacy and decentralization arise from localized processing inside each >> organization’s infrastructure, end-to-end encryption before messages leave >> the bridge, recipient-controlled cryptographic identity and endpoints, and >> the absence of any central registry. >> >> >> Realistic boundaries >> >> We cannot change the fundamental architecture of email. When senders use >> external providers, those providers will always see metadata. >> >> What this system provides is end-to-end encryption after the message >> enters the recipient organization, full control over identity translation >> for domain owners, and a migration path that does not require universal or >> immediate adoption. >> >> >> Discovery model >> >> The bridge serves recipients, not senders. >> >> Bob’s email-to-DID mapping exists only inside his organization’s bridge. >> The sender needs only Bob’s email address. >> >> In the DID-to-email direction, if a sender knows Bob’s DID but Bob’s DID >> endpoints route through his bridge, the message can be translated to email. >> If not, delivery fails, correctly reflecting Bob’s choice not to accept >> email delivery. >> >> >> Practical example >> >> An external partner emails contact@enterprise.com. >> >> The enterprise bridge routes the message to internal DIDs, encrypts it, >> and delivers it to internal teams via DIDComm. >> >> Replies are sent as DID messages, translated back into email by the >> bridge, and delivered to the external partner. >> >> The partner receives a normal email and is unaware of the DID layer. >> >> The privacy benefit is strongest for the organization and its internal >> users, while compatibility with the existing internet is preserved. >> >> >> Conclusion >> >> Privacy and decentralization are achieved through: >> >> >> - >> >> Distributed deployment, with each organization operating its own >> bridge >> - >> >> End-to-end encryption for translated messages >> - >> >> Recipient-controlled identities and endpoints >> - >> >> No central mapping or routing authority >> - >> >> Transparent, auditable implementation >> >> We are not proposing a centralized gateway. We are providing protocol >> building blocks that organizations can deploy inside their own security >> perimeter, under their own governance and access controls. >> >> >> >> Best regards, >> >> Amir Hameed Mir >> >> Sirraya Labs >> >> >> On Wed, 28 Jan 2026 at 4:48 PM, Jori Lehtinen <lehtinenjori03@gmail.com> >> wrote: >> >>> I think that would be extremely valuable. But it also might be quite >>> hard to uphold the promise of privacy and decentralization there. If you >>> could walk us trough the protocol/process step by step, it would be easier >>> to consider how it would work exactly and identify + tackle possible issues. >>> >>> ke 28.1.2026 klo 13.13 Amir Hameed (amsaalegal@gmail.com) kirjoitti: >>> >>>> Hi Jori, >>>> >>>> >>>> Yes, conceptually there are two symmetric gateway endpoints. One >>>> translates SMTP email into DIDComm messages and delivers them to a DID >>>> inbox. The other translates DIDComm messages back into email and delivers >>>> them via SMTP. >>>> >>>> >>>> The key value is that one side can use decentralized, cryptographically >>>> secure messaging (DIDComm) without requiring the other side to migrate, >>>> install anything, or even know about DIDs. >>>> >>>> >>>> This removes the adoption barrier that normally kills new identity and >>>> messaging systems, while still enabling privacy, authentication, and >>>> decentralization where it is needed. >>>> >>>> >>>> >>>> Regards >>>> Amir Hameed >>>> >>>> On Wed, 28 Jan 2026 at 4:40 PM, Jori Lehtinen <lehtinenjori03@gmail.com> >>>> wrote: >>>> >>>>> So two endpoints? One that translates email to did, and another one >>>>> that translates did to email? And the value proposition is what? Takes >>>>> email message and transforms it to a DIDComm message and delivers it to >>>>> some kind of DIDComm inbox and the other way around allows to respond with >>>>> a DIDComm message turned in to email and gets translated and delivered to >>>>> an email inbox. So if another party wants decentralized and private >>>>> messaging they can have that with a person that doesn't want to migrate or >>>>> doesn't care or something like this? >>>>> >>>>> ke 28.1.2026 klo 12.10 Amir Hameed (amsaalegal@gmail.com) kirjoitti: >>>>> >>>>>> Hi Michael >>>>>> >>>>>> Thank you for engaging, I don’t have single full architecture diagram >>>>>> but I just draw one for you and I am attaching it here , I believe it will >>>>>> give you an idea of how bidirectional runtime mapping happens between two >>>>>> different identifiers, Have a look then we can dive deep into what goes >>>>>> under the hood, there are two mappings happening inside runtime, one is >>>>>> header mapping and another is message format mapping. >>>>>> >>>>>> On Wed, 28 Jan 2026 at 3:26 PM, Michael Herman (Trusted Digital Web) < >>>>>> mwherman@parallelspace.net> wrote: >>>>>> >>>>>>> >>>>>>> 1. RE: a bidirectional DID ↔ Email bridge acting as a universal >>>>>>> message router >>>>>>> >>>>>>> >>>>>>> >>>>>>> This is confusing because “DID” (an identifier) and “Email” (an >>>>>>> email message/system/protocol) are “not of the same type”. >>>>>>> >>>>>>> >>>>>>> >>>>>>> For example: DID and Email Address are of the same type (both >>>>>>> character string identifiers). >>>>>>> >>>>>>> >>>>>>> >>>>>>> 2. RE: translates email messages into DID-native formats >>>>>>> >>>>>>> >>>>>>> >>>>>>> What is a “DID-native (email message) format”? …an example? >>>>>>> >>>>>>> >>>>>>> >>>>>>> Michael Herman >>>>>>> >>>>>>> Chief Digital Architect >>>>>>> >>>>>>> Web 7.0 Foundation / TDW™ >>>>>>> >>>>>>> >>>>>>> >>>>>>> *From:* Amir Hameed <amsaalegal@gmail.com> >>>>>>> >>>>>>> *Sent:* Tuesday, January 27, 2026 1:05 PM >>>>>>> *To:* Daniel Hardman <daniel.hardman@gmail.com> >>>>>>> *Cc:* Michael Herman (Trusted Digital Web) < >>>>>>> mwherman@parallelspace.net>; W3C Credentials CG < >>>>>>> public-credentials@w3.org> >>>>>>> *Subject:* Re: [Email-to-DID Bridge] Exploring a practical >>>>>>> migration path for email infrastructure >>>>>>> >>>>>>> >>>>>>> >>>>>>> Hi Michael >>>>>>> >>>>>>> The core idea of this bridge is to be fully protocol-agnostic. While >>>>>>> DIDComm is currently the strongest candidate for DID-native messaging, the >>>>>>> design is not limited to it—we have already tested WebSockets and >>>>>>> HTTP-based delivery methods as well. >>>>>>> >>>>>>> The real problem we are addressing is that today there are two types >>>>>>> of users: those who prefer communicating via DIDs, and those for whom >>>>>>> traditional email is perfectly sufficient. In real-world scenarios such as >>>>>>> customer support or enterprise communication, both groups must be able to >>>>>>> coexist and communicate seamlessly. >>>>>>> >>>>>>> This becomes a classic translation problem, similar to human >>>>>>> languages. If one person speaks Hindi and another speaks English, >>>>>>> communication is only possible through a translator. In the same way, the >>>>>>> DID world and the email world require a neutral translation layer. >>>>>>> >>>>>>> That is what this system provides: a bidirectional DID ↔ Email >>>>>>> bridge acting as a universal message router. It maps email addresses to >>>>>>> DIDs and translates email messages into DID-native formats (and vice versa) >>>>>>> at runtime. >>>>>>> >>>>>>> Rather than being just a mailbox, it functions as a universal >>>>>>> message box, capable of handling both email and DID messages >>>>>>> simultaneously. Users remain free to choose how they communicate, while the >>>>>>> bridge ensures interoperability underneath. >>>>>>> >>>>>>> The goal is to enable gradual adoption of decentralized identity >>>>>>> without breaking compatibility with the existing, widely-used email >>>>>>> ecosystem, while keeping the system open-source and extensible for future >>>>>>> protocols. >>>>>>> >>>>>>> Regards >>>>>>> >>>>>>> Amir Hameed Mir >>>>>>> >>>>>>> Sirraya Labs >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> On Tue, 27 Jan 2026 at 5:55 PM, Daniel Hardman < >>>>>>> daniel.hardman@gmail.com> wrote: >>>>>>> >>>>>>> email + DIDComm work: >>>>>>> https://github.com/decentralized-identity/didcomm-messaging/blob/main/extensions/email_transport/main.md >>>>>>> >>>>>>> >>>>>>> >>>>>>> On Mon, Jan 26, 2026 at 4:57 PM Michael Herman (Trusted Digital >>>>>>> Web) <mwherman@parallelspace.net> wrote: >>>>>>> >>>>>>> Amir, once you’ve mapped an SMTP email address to a DID, which >>>>>>> protocol are you using to complete the email message delivery? …for >>>>>>> example, is it DIDComm? >>>>>>> >>>>>>> >>>>>>> >>>>>>> Best regards, >>>>>>> >>>>>>> Michael Herman >>>>>>> >>>>>>> Chief Digital Architect >>>>>>> >>>>>>> Web 7.0™ / TDW™ >>>>>>> >>>>>>> >>>>>>> >>>>>>> *From:* Amir Hameed <amsaalegal@gmail.com> >>>>>>> *Sent:* Sunday, January 25, 2026 12:51 PM >>>>>>> *To:* W3C Credentials CG <public-credentials@w3.org> >>>>>>> *Subject:* [Email-to-DID Bridge] Exploring a practical migration >>>>>>> path for email infrastructure >>>>>>> >>>>>>> >>>>>>> >>>>>>> Hello CCG community, >>>>>>> >>>>>>> I'm writing from Sirraya Labs to share an early-stage but >>>>>>> production-tested approach we've been developing: an *Email–DID >>>>>>> Router* that bridges traditional email infrastructure with >>>>>>> decentralized identity (DID/VC) systems. We're keen to gather feedback, >>>>>>> explore alignment with related W3C work, and understand whether this >>>>>>> direction resonates with the community’s broader interoperability goals. >>>>>>> What we’re exploring >>>>>>> >>>>>>> The system operates as an enterprise-grade gateway that: >>>>>>> >>>>>>> - Maps traditional email addresses (e.g., executive@company.com) >>>>>>> to DIDs (e.g., did:example:alice123) >>>>>>> - Transforms SMTP-based emails into verifiable, identity-aware >>>>>>> messages >>>>>>> - Routes messages using confidence-based logic, security >>>>>>> screening, and configurable policies >>>>>>> - Runs with full auditability and measurable performance (tested >>>>>>> in live environments) >>>>>>> >>>>>>> Here’s a snapshot from a recent run: >>>>>>> >>>>>>> text >>>>>>> >>>>>>> [2026-01-25T11:31:28Z INFO email_did_gateway] Processing incoming email from chairman@board-of-directors.com to executive@company.com >>>>>>> >>>>>>> [2026-01-25T11:31:28Z INFO email_did_gateway] Successfully processed email into DID message: 71259949-4f38-46a1-8c74-c86540ba5917 >>>>>>> >>>>>>> [2026-01-25T11:31:28Z INFO email_did_router] Processed executive email - Confidence: 0.78, Method: RuleBased >>>>>>> >>>>>>> Why this matters for DID/VC adoption >>>>>>> >>>>>>> Email remains the dominant channel for business, institutional, and >>>>>>> personal communication. Rather than proposing a disruptive replacement, >>>>>>> we’re focused on *building incremental, opt-in bridges* that allow: >>>>>>> >>>>>>> 1. Gradual migration of trust from SMTP+PKI to DID/VC models >>>>>>> 2. Immediate value through better routing, security screening, >>>>>>> and audit capabilities >>>>>>> 3. Preservation of existing infrastructure and investment while >>>>>>> enabling verifiable communication >>>>>>> >>>>>>> We see potential alignment with several W3C efforts—DID Comm, >>>>>>> VC-API, identity hubs, and trust spanning protocols—and are keen to explore >>>>>>> how this work might complement ongoing standardization. >>>>>>> Questions for the community >>>>>>> >>>>>>> Before we formalize or release anything publicly, we’d value your >>>>>>> perspectives on: >>>>>>> >>>>>>> - *Use cases* we may have overlooked (enterprise, government, >>>>>>> healthcare, education, etc.) >>>>>>> - *Privacy and compliance considerations* (GDPR, residency, >>>>>>> retention, consent) >>>>>>> - *Mapping lifecycle* (persistence, revocation, recovery, >>>>>>> expiration) >>>>>>> - *Confidence and trust models* suitable for email→DID routing >>>>>>> - *Potential alignment* with existing or emerging W3C >>>>>>> specifications >>>>>>> >>>>>>> We’re particularly interested in whether this kind of bridge could >>>>>>> help accelerate real-world adoption of DID/VC systems in environments where >>>>>>> email remains non-negotiable. >>>>>>> >>>>>>> We’re at the stage of gauging interest and refining the approach >>>>>>> based on community feedback. If this resonates, we’d be happy to: >>>>>>> >>>>>>> - Share more detailed design notes >>>>>>> - Discuss integration with related CCG work items >>>>>>> - Potentially present in a future CCG call >>>>>>> - Explore collaboration with groups working on interoperability, >>>>>>> trust layers, or migration pathways >>>>>>> >>>>>>> Our goal is to help build *responsible, incremental bridges*—not to >>>>>>> replace email or DIDs, but to enable them to coexist and evolve together. >>>>>>> >>>>>>> We look forward to your thoughts, critiques, and suggestions. >>>>>>> >>>>>>> Best regards, >>>>>>> Amir Hameed >>>>>>> Sirraya Labs >>>>>>> >>>>>>>
Attachments
- image/jpeg attachment: IMG_5909.jpeg
Received on Wednesday, 28 January 2026 12:48:14 UTC