SEDI Framework & Core Principles
SEDI is built on six foundational principles that ensure digital identity serves individuals while maintaining security and trust.
Comprehensive Legal Framework
Before implementing any digital identity system, states should establish a comprehensive legal and governance framework that protects an individual's rights and ensures accountability.
Key Requirements
- Clear governance structures
- Comprehensive program requirements
- Enforceable standards for digital identity systems
- Open standards and open protocols
- Explicit provisions for transparency
- Separation of duties and enforcement mechanisms
Individual Control
Individuals create globally unique digital identifiers using cryptography that they alone control. The state endorses, not creates, identity through cryptographically bound credentials.
Key Requirements
- User-controlled digital identifiers
- State endorsement via digital signatures
- Individual custody and control
- Digital wallet of user's choosing
- Mathematical binding to credentials
Privacy
SEDI implements a decentralized, peer-to-peer approach with mathematical proofs, eliminating privacy-invasive 'phone-home' checks and tracking.
Key Requirements
- Decentralized peer-to-peer verification
- Mathematical proof systems
- No central authority phone-home checks
- Selective disclosure of facts
- Zero tracking by third parties
Parental Rights and Delegation
Parents can manage their children's digital identity and credentials. SEDI provides technical tools to protect children from exploitation while enabling guardian delegation.
Key Requirements
- Parental management of children's identity
- Protection from digital exploitation
- Guardian delegation capabilities
- Legally appointed guardian support
- Technical safeguards for vulnerable adults
Critical Public Infrastructure and Security
SEDI expects constant attacks and provides powerful means to detect compromise, contain intrusions, and rapidly recover. Credentials work offline during outages or attacks.
Key Requirements
- Nation-state attack resilience
- Compromise detection systems
- Rapid intrusion containment
- Full recovery capabilities
- Offline verification support
Backward Compatibility
SEDI is backward compatible with existing digital identity technologies, ensuring seamless transition without disruption or loss of functionality.
Key Requirements
- Compatibility with existing systems
- Seamless transition pathways
- No functionality loss
- Principled and practical approach
- Continuity during advancement
SEDI Capabilities & Opportunities
Version 1.0 · October 17, 2025