TRAIL DIDs use EdDSA (Ed25519) with JSON Canonicalization Scheme (JCS). We need a security review of:
- Key rotation mechanism - How agents update their verification methods without breaking existing trust chains.
- Revocation propagation timing - How fast does a revoked key become untrusted across the network?
- Recovery scenarios - Compromised agent key, compromised registry key, partial network partition.
Threat model:
- Malicious agent impersonation
- Registry compromise
- MITM during DID resolution
- Replay attacks with stale DID documents
If you have cryptographic protocol review experience, this is a high-impact contribution.
TRAIL DIDs use EdDSA (Ed25519) with JSON Canonicalization Scheme (JCS). We need a security review of:
Threat model:
If you have cryptographic protocol review experience, this is a high-impact contribution.