Skip to content

SEDI Framework & Core Principles

SEDI is built on six foundational principles that ensure digital identity serves individuals while maintaining security and trust.

Principle 1

Comprehensive Legal Framework

Before implementing any digital identity system, states should establish a comprehensive legal and governance framework that protects an individual's rights and ensures accountability.

Key Requirements

  • Clear governance structures
  • Comprehensive program requirements
  • Enforceable standards for digital identity systems
  • Open standards and open protocols
  • Explicit provisions for transparency
  • Separation of duties and enforcement mechanisms
Principle 2

Individual Control

Individuals create globally unique digital identifiers using cryptography that they alone control. The state endorses, not creates, identity through cryptographically bound credentials.

Key Requirements

  • User-controlled digital identifiers
  • State endorsement via digital signatures
  • Individual custody and control
  • Digital wallet of user's choosing
  • Mathematical binding to credentials
Principle 3

Privacy

SEDI implements a decentralized, peer-to-peer approach with mathematical proofs, eliminating privacy-invasive 'phone-home' checks and tracking.

Key Requirements

  • Decentralized peer-to-peer verification
  • Mathematical proof systems
  • No central authority phone-home checks
  • Selective disclosure of facts
  • Zero tracking by third parties
Principle 4

Parental Rights and Delegation

Parents can manage their children's digital identity and credentials. SEDI provides technical tools to protect children from exploitation while enabling guardian delegation.

Key Requirements

  • Parental management of children's identity
  • Protection from digital exploitation
  • Guardian delegation capabilities
  • Legally appointed guardian support
  • Technical safeguards for vulnerable adults
Principle 5

Critical Public Infrastructure and Security

SEDI expects constant attacks and provides powerful means to detect compromise, contain intrusions, and rapidly recover. Credentials work offline during outages or attacks.

Key Requirements

  • Nation-state attack resilience
  • Compromise detection systems
  • Rapid intrusion containment
  • Full recovery capabilities
  • Offline verification support
Principle 6

Backward Compatibility

SEDI is backward compatible with existing digital identity technologies, ensuring seamless transition without disruption or loss of functionality.

Key Requirements

  • Compatibility with existing systems
  • Seamless transition pathways
  • No functionality loss
  • Principled and practical approach
  • Continuity during advancement

SEDI Capabilities & Opportunities

Proof of identity
Replace usernames & passwords
Consent & permission management
Delegation capabilities
Personal data management
Agentic AI integration
Government records
Age verification
Peer-to-peer communication
Download the Full SEDI Framework PDF

Version 1.0 · October 17, 2025