Over the course of 2020, Jolocom added support for an off-chain element based on KERI. This is in addition to the Jolocom DID method (did:jolo and did:keri), which supports the Jolocom-Lib, our own SD
KERI is not a DID method. But it could be. A session at the recent IIW31 presented by Jolocom’s own Charles Cunningham examines overlap between data models of DID documents and KERI identifiers.
The problem of trust over a network is longstanding. It has been addressed in a variety of ways, but never as yet solved. What if we use KERI?
...the design of the language itself offers crucial advantages for security by effectively addressing a wide range of common, long-standing vulnerabilities affecting code written in other...
... the Ministry for Economic Affairs, Innovation, Digitalization and Energy of the State North Rhein-Westphalia (MWIDE) conducted the Online-Sicherheitsprüfung (OSiP) SSI project...