- From: Amir Hameed <amsaalegal@gmail.com>
- Date: Wed, 28 Jan 2026 19:04:26 +0530
- To: "Michael Herman (Trusted Digital Web)" <mwherman@parallelspace.net>
- Cc: Jori Lehtinen <lehtinenjori03@gmail.com>, Daniel Hardman <daniel.hardman@gmail.com>, W3C Credentials CG <public-credentials@w3.org>
- Message-ID: <CANGYBswK3tHLAHHvc7psANGSVbN3hy+N97+Am2-htvUZAWjjKg@mail.gmail.com>
On Wed, 28 Jan 2026 at 6:56 PM, Michael Herman (Trusted Digital Web) < mwherman@parallelspace.net> wrote: > Updated diagram… > > > > > > *From:* Michael Herman (Trusted Digital Web) <mwherman@parallelspace.net> > *Sent:* Wednesday, January 28, 2026 1:18 PM > *To:* Jori Lehtinen <lehtinenjori03@gmail.com>; Amir Hameed < > amsaalegal@gmail.com> > *Cc:* Daniel Hardman <daniel.hardman@gmail.com>; W3C Credentials CG < > public-credentials@w3.org> > *Subject:* RE: [Email-to-DID Bridge] Exploring a practical migration path > for email infrastructure > > > > Loose-related, at the Web 7.0 Foundation, we’re looking at forking the > open-source ZeroTier project and turning it into a DID-native, > DIDComm-native router/DID virtual network for DID-native, DIDComm-native > apps (aka Neuroplexes). > > > > Michael Herman > > Chief Digital Architect > > Web 7.0 Foundation > > > > > > *From:* Jori Lehtinen <lehtinenjori03@gmail.com> > *Sent:* Wednesday, January 28, 2026 12:30 PM > *To:* Amir Hameed <amsaalegal@gmail.com> > *Cc:* Michael Herman (Trusted Digital Web) <mwherman@parallelspace.net>; > Daniel Hardman <daniel.hardman@gmail.com>; W3C Credentials CG < > public-credentials@w3.org> > *Subject:* Re: [Email-to-DID Bridge] Exploring a practical migration path > for email infrastructure > > > > I can totally see it working that way, but how do you deliver the response > from Bob's DIDComm client to Alice's email client with end-to-end > encryption, wich is obviously the more crucial part here as Bob is the one > that cares about total privacy. I think this can still be a good idea even > without e2e encryption guarantee, however if you can solve that part it is > always better. An organizations internal messaging can always be > "decenralized" by making it centralized to the organization controlled > machinery just by self-hosting any regular server software. But as stated I > think this can help with "adoption pain" regardless so it is not > necessarily a bad idea. > > > > ke 28.1.2026 klo 14.14 Amir Hameed (amsaalegal@gmail.com) kirjoitti: > > Hi Jori > > > > It’s hard to explain every detail in a single email but since the points > raised are critical I would try best to give a proper walkthrough > > > > Let me walk through the protocol step by step and show precisely where > privacy risks arise and how the architecture addresses them. > > Step-by-Step Protocol Flow > > > > Phase 1: Sender initiation > > > > Scenario: Alice (an email user) wants to message Bob (a DID user). > > 1. Alice composes an email to bob-executive@company.org > 2. Her email client performs a standard DNS/MX lookup for company.org > 3. The message is delivered to company.org’s SMTP server, which runs > the bridge > > > > At this stage, privacy behaves exactly like normal email. Alice’s email > provider sees standard SMTP metadata. The receiving SMTP server at > company.org receives the message within infrastructure controlled by that > organization. This is the baseline privacy model of email and cannot be > changed by any overlay system. > > Phase 2: Bridge processing > > 4. The SMTP server invokes bridge.handle_email(message) > 5. The bridge consults its internal routing table: > > bob-executive@company.org → did:web:company.org:bob > > 6. The bridge converts the email into a DID message representation > > > > The critical design decision here is that the email-to-DID routing table > is privately maintained by each organization. There is no global directory > and no shared mapping service. company.org alone controls and stores this > mapping inside its own infrastructure. > > Phase 3: Message transformation > > 7. The bridge constructs a DID message: > > > > - The payload is encrypted using Bob’s public key from his DID document > - Metadata such as sender, timestamp, and subject is preserved > - Email headers are mapped into DID message attributes > > > > End-to-end encryption is applied at this stage. Only Bob can decrypt the > message. The bridge itself handles ciphertext only and cannot read the > content. > > Phase 4: Protocol-agnostic routing > > 8. The bridge inspects Bob’s DID document to discover service > endpoints. This may include: > > > > - A DIDComm endpoint (preferred) > - A WebSocket endpoint > - An HTTP/HTTPS endpoint > - Or email as a fallback if no DID endpoint is available > > > > 9. The message is delivered using the selected transport > > > > Decentralization emerges here because each DID holder independently > controls their service endpoints. Multiple transport options avoid > single-point dependencies, and fallback mechanisms ensure reliable delivery. > > Phase 5: Recipient processing > > 10. Bob’s DID wallet receives the encrypted message > 11. The message is decrypted locally using Bob’s private key > 12. The message is presented in Bob’s interface (wallet, agent, or > email client via plugin) > > > > Decryption occurs only on Bob’s device, not on any intermediary system. > > > > Where privacy could break and how it is prevented > > One risk is the bridge becoming a centralized surveillance point if > everyone relied on a single service. The architecture avoids this by > treating the bridge as open-source software, not as a hosted service. > Organizations deploy their own instances, control their own routing tables, > audit the code, and remain independent of external operators. > > Another risk is metadata correlation. Even with encrypted content, timing > and volume can reveal patterns. Bridges can mitigate this using message > batching, randomized delays, optional padding to normalize sizes, and > privacy-preserving transports such as Tor or I2P for DIDComm delivery. > > A third risk is a centralized mapping database. This is avoided because > mappings exist only within each organization’s infrastructure. There is no > global registry of email-to-DID associations. > > > > What decentralization actually means in this design > > Each organization retains sovereign control over its routing tables, > security policies, supported transports, and encryption standards. > > Multiple implementations are possible because the system is defined > through standard interfaces. Organizations can use a reference > implementation, build their own, or extend it with custom logic, while > remaining interoperable. > > Recipients control which DIDs map to which email addresses, which > endpoints they publish, what transports they accept, and whether they > participate at all. > > > > Addressing your core concern > > You noted that it is “quite hard to uphold the promise of privacy and > decentralization.” That concern is valid for centralized service models. > > This design is different: it is a protocol implementation, not a service. > > Privacy and decentralization arise from localized processing inside each > organization’s infrastructure, end-to-end encryption before messages leave > the bridge, recipient-controlled cryptographic identity and endpoints, and > the absence of any central registry. > > > > Realistic boundaries > > We cannot change the fundamental architecture of email. When senders use > external providers, those providers will always see metadata. > > What this system provides is end-to-end encryption after the message > enters the recipient organization, full control over identity translation > for domain owners, and a migration path that does not require universal or > immediate adoption. > > > > Discovery model > > The bridge serves recipients, not senders. > > Bob’s email-to-DID mapping exists only inside his organization’s bridge. > The sender needs only Bob’s email address. > > In the DID-to-email direction, if a sender knows Bob’s DID but Bob’s DID > endpoints route through his bridge, the message can be translated to email. > If not, delivery fails, correctly reflecting Bob’s choice not to accept > email delivery. > > > > Practical example > > An external partner emails contact@enterprise.com. > > The enterprise bridge routes the message to internal DIDs, encrypts it, > and delivers it to internal teams via DIDComm. > > Replies are sent as DID messages, translated back into email by the > bridge, and delivered to the external partner. > > The partner receives a normal email and is unaware of the DID layer. > > The privacy benefit is strongest for the organization and its internal > users, while compatibility with the existing internet is preserved. > > > > Conclusion > > Privacy and decentralization are achieved through: > > - Distributed deployment, with each organization operating its own > bridge > - End-to-end encryption for translated messages > - Recipient-controlled identities and endpoints > - No central mapping or routing authority > - Transparent, auditable implementation > > We are not proposing a centralized gateway. We are providing protocol > building blocks that organizations can deploy inside their own security > perimeter, under their own governance and access controls. > > > > > > Best regards, > > Amir Hameed Mir > > Sirraya Labs > > > > > > On Wed, 28 Jan 2026 at 4:48 PM, Jori Lehtinen <lehtinenjori03@gmail.com> > wrote: > > I think that would be extremely valuable. But it also might be quite hard > to uphold the promise of privacy and decentralization there. If you could > walk us trough the protocol/process step by step, it would be easier to > consider how it would work exactly and identify + tackle possible issues. > > > > ke 28.1.2026 klo 13.13 Amir Hameed (amsaalegal@gmail.com) kirjoitti: > > Hi Jori, > > > > Yes, conceptually there are two symmetric gateway endpoints. One > translates SMTP email into DIDComm messages and delivers them to a DID > inbox. The other translates DIDComm messages back into email and delivers > them via SMTP. > > > > The key value is that one side can use decentralized, cryptographically > secure messaging (DIDComm) without requiring the other side to migrate, > install anything, or even know about DIDs. > > > > This removes the adoption barrier that normally kills new identity and > messaging systems, while still enabling privacy, authentication, and > decentralization where it is needed. > > > > > > Regards > > Amir Hameed > > > > On Wed, 28 Jan 2026 at 4:40 PM, Jori Lehtinen <lehtinenjori03@gmail.com> > wrote: > > So two endpoints? One that translates email to did, and another one that > translates did to email? And the value proposition is what? Takes email > message and transforms it to a DIDComm message and delivers it to some kind > of DIDComm inbox and the other way around allows to respond with a DIDComm > message turned in to email and gets translated and delivered to an email > inbox. So if another party wants decentralized and private messaging they > can have that with a person that doesn't want to migrate or doesn't care or > something like this? > > > > ke 28.1.2026 klo 12.10 Amir Hameed (amsaalegal@gmail.com) kirjoitti: > > Hi Michael > > > > Thank you for engaging, I don’t have single full architecture diagram but > I just draw one for you and I am attaching it here , I believe it will give > you an idea of how bidirectional runtime mapping happens between two > different identifiers, Have a look then we can dive deep into what goes > under the hood, there are two mappings happening inside runtime, one is > header mapping and another is message format mapping. > > > > On Wed, 28 Jan 2026 at 3:26 PM, Michael Herman (Trusted Digital Web) < > mwherman@parallelspace.net> wrote: > > > 1. RE: a bidirectional DID ↔ Email bridge acting as a universal > message router > > > > This is confusing because “DID” (an identifier) and “Email” (an email > message/system/protocol) are “not of the same type”. > > > > For example: DID and Email Address are of the same type (both character > string identifiers). > > > > 2. RE: translates email messages into DID-native formats > > > > What is a “DID-native (email message) format”? …an example? > > > > Michael Herman > > Chief Digital Architect > > Web 7.0 Foundation / TDW™ > > > > *From:* Amir Hameed <amsaalegal@gmail.com> > > *Sent:* Tuesday, January 27, 2026 1:05 PM > *To:* Daniel Hardman <daniel.hardman@gmail.com> > *Cc:* Michael Herman (Trusted Digital Web) <mwherman@parallelspace.net>; > W3C Credentials CG <public-credentials@w3.org> > *Subject:* Re: [Email-to-DID Bridge] Exploring a practical migration path > for email infrastructure > > > > Hi Michael > > The core idea of this bridge is to be fully protocol-agnostic. While > DIDComm is currently the strongest candidate for DID-native messaging, the > design is not limited to it—we have already tested WebSockets and > HTTP-based delivery methods as well. > > The real problem we are addressing is that today there are two types of > users: those who prefer communicating via DIDs, and those for whom > traditional email is perfectly sufficient. In real-world scenarios such as > customer support or enterprise communication, both groups must be able to > coexist and communicate seamlessly. > > This becomes a classic translation problem, similar to human languages. If > one person speaks Hindi and another speaks English, communication is only > possible through a translator. In the same way, the DID world and the email > world require a neutral translation layer. > > That is what this system provides: a bidirectional DID ↔ Email bridge > acting as a universal message router. It maps email addresses to DIDs and > translates email messages into DID-native formats (and vice versa) at > runtime. > > Rather than being just a mailbox, it functions as a universal message box, > capable of handling both email and DID messages simultaneously. Users > remain free to choose how they communicate, while the bridge ensures > interoperability underneath. > > The goal is to enable gradual adoption of decentralized identity without > breaking compatibility with the existing, widely-used email ecosystem, > while keeping the system open-source and extensible for future protocols. > > Regards > > Amir Hameed Mir > > Sirraya Labs > > > > > > On Tue, 27 Jan 2026 at 5:55 PM, Daniel Hardman <daniel.hardman@gmail.com> > wrote: > > email + DIDComm work: > https://github.com/decentralized-identity/didcomm-messaging/blob/main/extensions/email_transport/main.md > > > > On Mon, Jan 26, 2026 at 4:57 PM Michael Herman (Trusted Digital Web) < > mwherman@parallelspace.net> wrote: > > Amir, once you’ve mapped an SMTP email address to a DID, which protocol > are you using to complete the email message delivery? …for example, is it > DIDComm? > > > > Best regards, > > Michael Herman > > Chief Digital Architect > > Web 7.0™ / TDW™ > > > > *From:* Amir Hameed <amsaalegal@gmail.com> > *Sent:* Sunday, January 25, 2026 12:51 PM > *To:* W3C Credentials CG <public-credentials@w3.org> > *Subject:* [Email-to-DID Bridge] Exploring a practical migration path for > email infrastructure > > > > Hello CCG community, > > I'm writing from Sirraya Labs to share an early-stage but > production-tested approach we've been developing: an *Email–DID Router* that > bridges traditional email infrastructure with decentralized identity > (DID/VC) systems. We're keen to gather feedback, explore alignment with > related W3C work, and understand whether this direction resonates with the > community’s broader interoperability goals. > What we’re exploring > > The system operates as an enterprise-grade gateway that: > > - Maps traditional email addresses (e.g., executive@company.com) to > DIDs (e.g., did:example:alice123) > - Transforms SMTP-based emails into verifiable, identity-aware messages > - Routes messages using confidence-based logic, security screening, > and configurable policies > - Runs with full auditability and measurable performance (tested in > live environments) > > Here’s a snapshot from a recent run: > > text > > [2026-01-25T11:31:28Z INFO email_did_gateway] Processing incoming email from chairman@board-of-directors.com to executive@company.com > > [2026-01-25T11:31:28Z INFO email_did_gateway] Successfully processed email into DID message: 71259949-4f38-46a1-8c74-c86540ba5917 > > [2026-01-25T11:31:28Z INFO email_did_router] Processed executive email - Confidence: 0.78, Method: RuleBased > > Why this matters for DID/VC adoption > > Email remains the dominant channel for business, institutional, and > personal communication. Rather than proposing a disruptive replacement, > we’re focused on *building incremental, opt-in bridges* that allow: > > 1. Gradual migration of trust from SMTP+PKI to DID/VC models > 2. Immediate value through better routing, security screening, and > audit capabilities > 3. Preservation of existing infrastructure and investment while > enabling verifiable communication > > We see potential alignment with several W3C efforts—DID Comm, VC-API, > identity hubs, and trust spanning protocols—and are keen to explore how > this work might complement ongoing standardization. > Questions for the community > > Before we formalize or release anything publicly, we’d value your > perspectives on: > > - *Use cases* we may have overlooked (enterprise, government, > healthcare, education, etc.) > - *Privacy and compliance considerations* (GDPR, residency, retention, > consent) > - *Mapping lifecycle* (persistence, revocation, recovery, expiration) > - *Confidence and trust models* suitable for email→DID routing > - *Potential alignment* with existing or emerging W3C specifications > > We’re particularly interested in whether this kind of bridge could help > accelerate real-world adoption of DID/VC systems in environments where > email remains non-negotiable. > > We’re at the stage of gauging interest and refining the approach based on > community feedback. If this resonates, we’d be happy to: > > - Share more detailed design notes > - Discuss integration with related CCG work items > - Potentially present in a future CCG call > - Explore collaboration with groups working on interoperability, trust > layers, or migration pathways > > Our goal is to help build *responsible, incremental bridges*—not to > replace email or DIDs, but to enable them to coexist and evolve together. > > We look forward to your thoughts, critiques, and suggestions. > > Best regards, > Amir Hameed > Sirraya Labs > >
Attachments
- image/jpeg attachment: image001.jpg
- image/jpeg attachment: image005.jpg
- image/jpeg attachment: image004.jpg
- image/jpeg attachment: IMG_5886.jpeg
- image/jpeg attachment: IMG_5885.jpeg
- image/jpeg attachment: IMG_5887.jpeg
Received on Wednesday, 28 January 2026 13:34:52 UTC