An XID (eXtensible IDentifier) is a 32-byte cryptographic identifier derived from a public key. Unlike traditional usernames, your XID stays stable even through key rotation and device changes — your identity is truly yours.
Now that you have an XID, others need a way to find and verify it. By adding a resolution method (a URL where your XID is published) and using provenance marks (a hash chain tracking updates), your identity becomes verifiable and fresh.
dereferenceVia assertion tells verifiers where to find the canonical version of your XID. This could be a GitHub repo, a website, or any stable URL you control. The inception signature proves this XID was created by the holder of the inception key.
This is the public version of your XID -- safe to share. Private keys are removed but signatures still verify.
Now you can add verifiable claims to your XID. Attachments are vendor-qualified containers that hold custom data — like proving you control a GitHub account or an SSH signing key. Services declare endpoints where your identity can be used.
Services declare where your identity is used, linking a URI to specific keys and capabilities.
In this final step, you take on Ben's role -- a project maintainer who needs to verify Amira's XID before granting access. Cross-verification means checking claims against independent sources to build trust incrementally.
Create an XID to see output