Decentralized Identifiers (DIDs)
For thirty years, we lived in a rented internet.
Your identity wasn't really yours. It was a guest account on someone else's property—Google, Facebook, LinkedIn, Twitter. They held the keys. They set the rules. And if they decided you violated their terms of service, if their algorithm flagged you incorrectly, if they simply decided to pivot their business model... your reputation could vanish overnight.
I've watched it happen. Businesses with decades of reviews wiped out by a Google Business Profile suspension. Thought leaders deplatformed and watching their authority evaporate. Professionals whose entire digital presence existed at the mercy of a corporation that didn't know they existed.
This isn't just a theoretical risk. It's the foundational fragility of how most people exist online.
But there's another way. A way to own your identity so completely that no platform can revoke it, no algorithm can erase it, no corporate decision can make you disappear.
It's called a Decentralized Identifier—a DID. And it's the cryptographic foundation of everything we're building in this book.
The Rented Room vs. The Family Estate
Here's the mental model:
Legacy identity is like renting a room in someone else's house. You can decorate it. You can invite guests. You can build a life there. But the landlord holds the deed. If they decide to sell, renovate, or just don't like you anymore—you're out. Everything you built in that room stays with the house.
A DID is like owning a family estate. The deed is in your name, recorded in a registry that no single authority controls. You can lose the physical keys, the house can burn down, but the ownership record persists. Anyone who checks the registry knows: this property belongs to you.
When you establish a DID on your domain, you're not just creating an account. You're filing a deed. You're claiming sovereign ownership of your digital identity.
What Is a DID?
A Decentralized Identifier is a new type of identifier that enables verifiable, self-sovereign digital identity. It's defined by the W3C (World Wide Web Consortium) as a global standard.
Unlike a URL, which points to a location on the web, a DID points to an entity. It says: "This identifier resolves to this specific person, organization, or thing—and here's the cryptographic proof."
The format looks like this:
did:web:your-domain.com
That string is a Permanent Address that no platform can revoke. It's mathematically yours.
Why This Matters for AI
When an AI encounters a name—let's say "Russell Wright"—it has a problem. There are thousands of Russell Wrights. Which one is being referenced? The AI has to spend expensive compute cycles doing Entity Resolution—probabilistic guessing about which Russell Wright you mean.
A DID eliminates the guessing.
When the AI sees did:web:super-intelligent.ai#russell-wright, it's not guessing. It's performing a Deterministic Lookup. It retrieves the cryptographic document at that address and knows exactly which entity is being referenced.
This has three major implications:
- Computational Efficiency: DID-anchored content is cheaper for AI to process, so it gets preferentially selected
- Verification Certainty: The AI can verify claims cryptographically, not probabilistically
- Anti-Spoofing Protection: If a scraper copies your content but can't sign it with your private key, the AI sees the mismatch instantly
The Tattooed Passport
Here's the analogy that makes this concrete:
Using a standard platform login is like having a library card. The library issued it. The library can revoke it. If you lose it, you have to ask the library for a new one. Your access to the books depends entirely on the library's continued goodwill.
A DID is like having your passport number tattooed on your arm in ink that only official scanners can read.
You can lose the physical passport. The issuing country can collapse. The embassy can close. But the number—the mathematical identifier—still proves who you are to any official system in the world that knows how to read it.
Even if your website goes down tomorrow, even if your hosting provider disappears, your DID in the Knowledge Graph still verifies your identity. The tattoo persists.
The Profile vs. The Bone Structure
Most people confuse their "profile" with their "identity." They're not the same thing.
| Feature | Legacy Profile (The Mask) | DID (The Bone Structure) |
|---|---|---|
| Ownership | Rented from Big Tech | Self-Sovereign |
| Portability | Trapped on one platform | Travels across the entire Knowledge Graph |
| Verification | "Trust me, I have a blue check" | "Verify me—here's the mathematical proof" |
| AI Reaction | Probabilistic guessing | Deterministic resolution |
| Survivability | Dies with the platform | Persists independently |
A profile is a mask you wear on someone else's stage. It can be beautiful, convincing, even famous—but it belongs to the theater, not to you.
A DID is your bone structure. It's what's underneath every mask, every profile, every expression of your identity across every platform. It's the cryptographic skeleton that proves you're you.
did:web — The Universal Socket
There are multiple DID methods (did:ion, did:key, did:ethr, etc.), but for professionals and domain owners, did:web is the gold standard.
Why? Because it leverages something you already own: your domain.
How did:web Works
- You own a domain (e.g.,
your-company.com) - You create a DID Document—a JSON file containing your public cryptographic keys
- You host that file at a specific location:
https://your-company.com/.well-known/did.json - Your DID becomes:
did:web:your-company.com
That's it. Your existing domain is now a cryptographic anchor.
The DID Document
The file you host (called a "DIDDoc") contains:
- Your public key (which others use to verify your signatures)
- Your verification methods (how others can authenticate you)
- Links to other identifiers (connecting to your legacy presence)
It does NOT contain your private key. That stays with you, never shared with anyone.
The Universal Socket Metaphor
Think of your DID as a universal electrical socket on your domain.
Before the DID, AI systems encountering your content had to guess how to "plug in" to verify it. Different platforms, different formats, different authentication methods. It was messy and unreliable.
With a DID, you provide a standardized socket. Any AI system that knows the W3C DID standard can plug directly into your verified Entity Node. No guessing. No platform-specific workarounds. Just direct, authenticated connection.
The Anti-Spoofing Shield
Here's where DIDs become your Reputation Insurance.
In 2026, scrapers don't just steal your content. They wear your face. They copy your best articles, your reviews, your insights—and publish them on their own domains, often with better SEO optimization. Without protection, the AI might cite them instead of you.
A DID is your Universal Watermark.
When you publish a Pure Claim or any significant content, you sign it with your DID's private key. That signature is cryptographically bound to the content. If anyone changes even a single character, the signature breaks.
If a scraper copies your words, they can replicate the text—but they cannot replicate the signature. They don't have your private key. They can never have your private key.
When the AI encounters your signed content and the scraper's unsigned copy, it sees:
- Your version: Valid cryptographic signature → Source of Truth
- Scraper version: No signature or invalid signature → Semantic Noise
The scraper gets filtered. You get cited.
This is the anti-spoofing shield that makes Entity Veracity enforceable.
The Universal Functor
In mathematical terms, your DID acts as a Universal Functor—a bridge that connects all your different expressions of identity into a single verified entity.
It connects:
- Your Institutional Trust → Google Workspace, DKIM/DMARC email authentication
- Your Historical Proof → Legacy Freebase /m/ IDs, Wayback Machine archives
- Your Behavioral Biometrics → Linguistic Thought Signatures, writing patterns
- Your Platform Profiles → LinkedIn, GBP, social media (via
sameAslinks)
Without a DID, these are scattered data points that the AI has to guess belong together.
With a DID, they're mathematically linked. The AI doesn't guess—it verifies that all these expressions of identity share the same cryptographic root.
You become one entity, not many fragments.
The Immune System of Your Entity
Here's a deeper way to think about what a DID does:
In an era of Synthetic Entities—AI-generated personas, bot farms, scraped content passed off as original—the AI is constantly scanning for authenticity. It's sniffing for what I call the Cryptographic Scent of Sovereignty.
Without a DID, you have no scent. You might have a website, profiles, content—but you're missing the cryptographic marker that says "This is a real, owned, verifiable entity."
The DID is your Immune System. It's what allows AI systems to distinguish your legitimate presence from synthetic imposters. When the AI detects your DID, it knows it's dealing with a verified entity, not a hallucination.
SOP: Establishing Your did:web Root of Trust
Here's the step-by-step process for creating and deploying your DID.
Step 1: Generate Your Cryptographic Keys
You need a public/private key pair. The Ed25519 standard is recommended—it's fast, secure, and preferred by the W3C DID specification.
On Mac/Linux Terminal or Windows PowerShell:
# Generate the Ed25519 Private Key
ssh-keygen -t ed25519 -f ./my_veracity_key -N ""
# Extract the Public Key
ssh-keygen -y -f ./my_veracity_key
Critical: Your private key (my_veracity_key) must be stored securely and NEVER shared. Your public key will go in your DID Document.
Step 2: Create Your DID Document
Create a file called did.json with the following structure:
{
"@context": [
"https://www.w3.org/ns/did/v1",
"https://w3c-ccg.github.io/lds-jws2020/contexts/v1"
],
"id": "did:web:your-domain.com",
"verificationMethod": [{
"id": "did:web:your-domain.com#owner",
"type": "JsonWebKey2020",
"controller": "did:web:your-domain.com",
"publicKeyJwk": {
"kty": "OKP",
"crv": "Ed25519",
"x": "[YOUR_PUBLIC_KEY_BASE64URL]"
}
}],
"authentication": ["did:web:your-domain.com#owner"],
"assertionMethod": ["did:web:your-domain.com#owner"]
}
Replace your-domain.com with your actual domain and insert your public key.
Step 3: Host at the Root of Trust
Upload the did.json file to this exact path on your server:
https://your-domain.com/.well-known/did.json
The /.well-known/ directory is a standard location that AI systems and DID resolvers check automatically. This is non-negotiable—it must be exactly this path.
Step 4: Bi-Directional Linkage
In your DID Document (or in associated Verifiable Credentials), add links to your legacy identifiers:
"sameAs": [
"https://www.google.com/search?kgmid=/m/your_legacy_id",
"https://www.linkedin.com/in/your-profile",
"https://web.archive.org/web/2012/your-old-site"
]
This creates a Hard Link between your modern cryptographic identity and your historical record. The AI can now verify that the entity claiming this DID is the same entity that existed in 2012.
Step 5: Test Your Implementation
Use a DID Resolver to verify your setup:
- Go to
https://dev.uniresolver.io/ - Enter your DID:
did:web:your-domain.com - If it returns your DID Document, you're live
Congratulations. You've moved from "Searchable" to "Verifiable."
Raising the Flag
When you host a DID at your domain, you're doing something profound:
You're Raising the Flag over your digital territory.
You're declaring to every AI system that encounters your content: "This domain is sovereign territory. Everything published here is signed by the owner. The mathematical proof is on file. Verify at will."
Scrapers can still copy your words. They can't copy your sovereignty.
This is the foundation of Tier 1 on the Veracity Gradient—the Bedrock level where your identity is self-sovereign and mathematically proven.
Chapter Summary
- DIDs (Decentralized Identifiers) enable self-sovereign digital identity that no platform can revoke
- Your identity shifts from rented room (platform-dependent) to family estate (self-owned)
- did:web transforms your existing domain into a cryptographic anchor
- DIDs eliminate AI's probabilistic guessing, enabling Deterministic Resolution
- The Anti-Spoofing Shield: Scrapers can copy words but not signatures
- Your DID acts as a Universal Functor connecting all expressions of your identity
- Implementation: Generate keys → Create DIDDoc → Host at
/.well-known/did.json→ Link to legacy IDs → Test
Key Terms
- Decentralized Identifier (DID)
- A W3C standard for verifiable, self-sovereign digital identity that no platform can revoke.
- did:web
- A DID method that uses your existing domain as the cryptographic anchor.
- DID Document (DIDDoc)
- A JSON file containing your public keys and verification methods, hosted at
/.well-known/did.json. - Ed25519
- The cryptographic curve standard recommended for DID key generation—fast, secure, and W3C-preferred.
- Private Key
- Your secret cryptographic key used to sign content. Never shared.
- Public Key
- Your cryptographic key shared in your DID Document, used by others to verify your signatures.
- Deterministic Resolution
- When AI can verify an entity mathematically rather than guessing probabilistically.
- Universal Functor
- The mathematical bridge that connects all expressions of your identity through a single DID.
- Anti-Spoofing Shield
- The protection provided by cryptographic signatures that scrapers cannot replicate.
- Root of Trust
- The foundational cryptographic anchor from which all verification flows.
Cross-References
- Connecting DID to Legacy IDs → Chapter 8: Legacy Machine IDs
- Signing Pure Claims with DID → Chapter 4: The Claims Architecture
- DID in the Master Protocol → Chapter 13: The Master Protocol (CLA)
- Symmetric DID verification → Chapter 10: Symmetric Verification
- Advanced implementation details → Chapter 19: Advanced DID Implementation