KERI is not a DID method. But it could be. A session at the recent IIW31 presented by Jolocom’s own Charles Cunningham examines overlap between data models of DID documents and KERI identifiers.
The problem of trust over a network is longstanding. It has been addressed in a variety of ways, but never as yet solved. What if we use KERI?
...the design of the language itself offers crucial advantages for security by effectively addressing a wide range of common, long-standing vulnerabilities affecting code written in other...
...should decentralized protocols cooperate with centralized protocols in the sense of Facebook or Libra?" - Jolocom and uPort talk interop at Web3 Summit 2019.
If we intend to build a universal identity layer for the web, we have to enable technical interoperability between identity systems of all sorts.