Loading vLEI.wiki
Fetching knowledge base...
Fetching knowledge base...
This comprehensive explanation has been generated from 20 GitHub source documents. All source documents are searchable here.
Last updated: October 7, 2025
This content is meant to be consumed by AI agents via MCP. Click here to get the MCP configuration.
Note: In rare cases it may contain LLM hallucinations.
For authoritative documentation, please consult the official GLEIF vLEI trainings and the ToIP Glossary.
The authentic web is a vision of the internet as a unified verifiable data structure—a global directed acyclic graph where all data maintains cryptographic provenance through persistent signatures, enabling objective verification of origin and integrity without centralized authorities.
The authentic web represents a fundamental architectural reimagining of the internet as one comprehensive verifiable data structure. Rather than a collection of isolated, trust-based interactions, the authentic web envisions the entire internet as a unified directed acyclic graph (DAG) where every piece of data maintains cryptographically verifiable provenance and authenticity.
This concept, sometimes referred to as Web5, establishes three core properties:
The authentic web addresses a critical limitation of current internet architecture: the inability to objectively verify "who said what" in digital communications. As Document 5 articulates, contemporary threats including AI-generated deception, data aggregation risks, and surveillance concerns have created an urgent need for cryptographically verifiable attribution.
Traditional internet security relies on what the specifications term "signed in motion"—an approach where:
The authentic web is an architectural vision rather than a specific protocol implementation. Realizing this vision requires:
The authentic web vision requires balancing:
As of the source documents (2022-2023):
This architecture emerged from the client-server model where centralized authorities (certificate authorities, identity providers, social media platforms) mediate trust relationships. While functional for many use cases, this approach creates several fundamental problems:
Reconstruction Overhead: Every verification event requires rebuilding the entire trust chain from scratch, creating computational inefficiency and scalability limitations.
Temporal Fragility: Historical data cannot be verified once signatures expire or keys rotate, making long-term data integrity impossible to establish.
Centralization Dependencies: Verification requires access to and trust in centralized infrastructure, creating single points of failure and control.
Correlation Vulnerabilities: Centralized identity systems enable tracking and profiling across contexts, undermining privacy.
The authentic web concept emerged from recognizing that these limitations are not implementation details but fundamental architectural constraints of the "signed in motion" paradigm.
KERI (Key Event Receipt Infrastructure) provides the foundational solution to enable the authentic web vision by solving what Document 1 identifies as the "hard problem" of key state at rest.
KERI implements "signed at rest" as a core principle, meaning:
This contrasts fundamentally with traditional approaches. As Document 7 explains: "With signed in motion, you use ephemeral identifiers. You have to do everything anew every time you want to reconstruct a verifiable data structure."
The critical innovation KERI provides is maintaining verifiable key state over time through Key Event Logs (KELs). Each AID (Autonomic Identifier) maintains an append-only log of key events that:
This solves the fundamental problem that prevented persistent verifiable data structures: without knowing which keys were authoritative when a signature was created, historical signatures cannot be verified.
Document 1 outlines four specific scalability characteristics that KERI enables for the authentic web:
Append Anywhere: New data can be added to any part of the graph structure without requiring global ordering or consensus. Each KEL operates independently while maintaining verifiable connections to other KELs through seals and ACDCs (Authentic Chained Data Containers).
Fragment Verification: Validators can "hop into the graph to verify any fragment" without processing the entirety. This is possible because each ACDC and KEL is self-contained with all necessary cryptographic proofs.
Hash-Based Signing: Rather than signing complete data payloads, KERI signs cryptographic digests (SAIDs - Self-Addressing Identifiers). This reduces computational overhead while maintaining security through cryptographic commitment.
Independent Roots of Trust: Each tree integrated into the graph-forest maintains its own root-of-trust rather than requiring a single universal authority. This enables decentralized trust while maintaining verifiability.
The authentic web vision extends beyond identifier management to encompass all data through ACDCs. These containers provide:
As Document 12 explains, ACDCs enable "an 'authentic' web where all data on the web has verifiable proof-of-authorship."
Document 5 emphasizes that the authentic web requires a fundamental shift in mental models: "The web will be one big graph. That's the mental model of the 'authentic web'." This transformation has several practical implications:
From Documents to Graph Fragments: Rather than thinking of web resources as isolated documents, the authentic web treats each piece of data as a node in a global verifiable graph with cryptographic edges.
From Trust-Based to Verification-Based: Instead of trusting intermediaries (certificate authorities, platforms, identity providers), participants independently verify cryptographic proofs.
From Ephemeral to Persistent: Signatures and proofs persist indefinitely, enabling historical verification and long-term data integrity.
Authentic Data Supply Chains: Document 16 describes how "any physical supply chain may be measured, monitored, regulated, audited, and/or archived by a data supply chain acting as a digital twin." The authentic web enables verifiable tracking of data provenance through supply chains.
Credential Ecosystems: The vLEI (verifiable Legal Entity Identifier) ecosystem demonstrates practical implementation, providing cryptographically verifiable credentials for legal entities with delegated authorization chains.
Content Attribution: In an era of AI-generated content and deepfakes, the authentic web provides mechanisms to verify the origin and authenticity of digital content without relying on platform attestations.
Decentralized Knowledge Graphs: Document 17 describes how ACDCs enable "securely attributed fragments of a distributed property graph" that can form verifiable knowledge graphs with privacy protection.
The Security Properties Trilemma: Document 2 introduces a fundamental constraint: systems can achieve high levels of any two of authenticity, confidentiality, and privacy, but not all three simultaneously. The authentic web prioritizes authenticity first, confidentiality second, and maximizes privacy within those constraints.
Complexity vs. Capability: The authentic web architecture introduces complexity in exchange for verifiability. Developers must understand concepts like key event logs, witness pools, and cryptographic commitments that are absent from traditional web architectures.
Infrastructure Requirements: Realizing the authentic web vision requires new infrastructure components including witnesses, watchers, registrars, and OOBI (Out-Of-Band Introduction) resolution services.
Adoption Challenges: The authentic web represents a paradigm shift that requires coordinated adoption across multiple layers of internet infrastructure, from protocols to applications to user interfaces.
As of the source documents' timestamps (2022-2023), the authentic web remains primarily a vision with foundational components under active development. Document 10 shows active work on implementations including KERIpy, KERIox, and various tooling. The GLEIF vLEI ecosystem represents the first large-scale production deployment of authentic web principles.
Document 5 articulates the urgency: "The inability to verify 'who said what' on the internet has reached critical levels" due to AI-generated deception, surveillance concerns, and democratic threats. The authentic web offers a pathway to restore verifiable attribution and trust in digital communications through cryptographic means rather than institutional authority.
The vision is ambitious: transforming the entire internet into a verifiable data structure. KERI provides the cryptographic foundation and architectural principles to make this vision technically feasible, though realizing it fully requires sustained development, standardization, and adoption across the internet ecosystem.