Loading vLEI.wiki
Fetching knowledge base...
Fetching knowledge base...
This comprehensive explanation has been generated from 24 GitHub source documents. All source documents are searchable here.
Last updated: October 7, 2025
This content is meant to be consumed by AI agents via MCP. Click here to get the MCP configuration.
Note: In rare cases it may contain LLM hallucinations.
For authoritative documentation, please consult the official GLEIF vLEI trainings and the ToIP Glossary.
A non-fungible token (NFT) is a uniquely identifiable digital asset recorded on a blockchain, representing ownership of digital or physical items. From KERI's perspective, NFTs exhibit fundamental architectural flaws in security, transferability, and monetization that can be addressed through KERI identifiers and ACDC veracity claims.
A non-fungible token (NFT) is a financial security consisting of digital data stored in a blockchain, a form of distributed ledger. NFTs represent uniquely identifiable assets that cannot be directly exchanged one-for-one like cryptocurrencies, which are fungible. Each NFT is distinct and carries unique properties that differentiate it from other tokens.
Uniqueness: Each NFT has a unique identifier that distinguishes it from all other tokens, even within the same collection or contract.
Ownership Recording: NFT ownership is recorded on blockchains and can be transferred between parties, enabling NFTs to be sold and traded in digital marketplaces.
Digital File References: NFTs typically contain references to digital files such as photos, videos, audio, or other media. The NFT itself is not the media file but rather a pointer or reference to it, along with metadata.
Low Barrier to Creation: NFTs can be created ("minted") by anyone with minimal or no coding skills, using platforms that abstract away the technical complexity of blockchain interactions.
Non-Fungibility: Unlike cryptocurrencies where one Bitcoin is equivalent to any other Bitcoin, NFTs are non-fungible—each token has unique characteristics that affect its value and cannot be directly substituted for another.
NFTs emerged from the broader development of blockchain technology and smart contracts, particularly on the Ethereum blockchain. The concept gained mainstream attention in the late 2010s and early 2020s as a mechanism for representing ownership of digital art, collectibles, and other unique digital assets.
When implementing unique asset identifiers using KERI instead of NFTs:
For asset attributes and metadata:
For monetary value and ownership:
For ownership transfer:
For integration with existing systems:
Traditional NFT implementations rely on blockchain-based public key infrastructure (PKI) where:
From the KERI/ACDC perspective, traditional NFTs represent "just another unique identifier controlled by a public private key pair" but with three fundamental architectural flaws:
NFT security is entirely dependent on the host ledger to which the NFT is anchored. This creates a centralized point of failure despite the distributed nature of blockchains. If the underlying blockchain experiences a security compromise, consensus failure, or becomes deprecated, all NFTs anchored to it are affected.
KERI's approach provides cryptographic self-certification independent of any specific ledger. AIDs (Autonomic IDentifiers) offer end-verifiable proof of control without transaction dependencies, creating a more robust security foundation.
Ownership transfer of traditional NFTs requires a blockchain transaction, and critically, controlling keys cannot be rotated. This limitation creates several problems:
KERI's key pre-rotation mechanism enables ownership transfer of unique digital assets without requiring blockchain transactions. Through rotation events in the Key Event Log (KEL), control authority can be transferred while maintaining cryptographic proof of the transfer's legitimacy. This provides:
Traditional NFTs conflate the uniqueness property of a digital asset with its value aspect. The document argues there is "no good reason whatsoever to mingle the value aspect and the uniqueness property of a digital asset." This architectural conflation creates unnecessary constraints:
KERI's approach advocates for separation of concerns:
This separation enables:
The recommended approach for "uniqueness tokenization done right" uses:
AIDs provide:
ACDCs support the value and attributes of identifiers separately from monetary aspects:
Monetary value can be recorded:
Some NFTs serve as digital twins backed by real-world assets—representing physical objects, property rights, or other off-chain assets. Even in this use case, KERI/ACDC implementations are positioned as more comprehensive:
KERI-based digital twins are not anchored to (locked into) a specific blockchain. This provides:
Digital twins built on KERI can:
ACDCs enable:
Long-term Asset Management: For assets expected to exist for decades, KERI's key rotation capabilities provide security that traditional NFTs cannot match.
Cross-Platform Assets: Digital assets that need to exist across multiple platforms or ecosystems benefit from KERI's platform independence.
Privacy-Sensitive Assets: Assets requiring selective disclosure of attributes (e.g., real estate with confidential ownership details) benefit from ACDC's graduated disclosure mechanisms.
Regulated Assets: Assets subject to regulatory requirements benefit from the separation of identity, attributes, and value representation.
Infrastructure Requirements: KERI-based systems require witness infrastructure and watcher networks rather than relying on existing blockchain infrastructure.
Ecosystem Maturity: Traditional NFT ecosystems have established marketplaces, tooling, and user bases that KERI-based alternatives are still developing.
Interoperability: Traditional NFTs benefit from standardization (e.g., ERC-721, ERC-1155) within blockchain ecosystems, while KERI-based approaches require new standards and bridges.
Security: Independence from single ledger security, key rotation capabilities, post-quantum resistance through pre-rotation.
Flexibility: Separation of concerns allows optimization of each component (identity, attributes, value) independently.
Portability: Not locked into any specific blockchain or platform.
Privacy: Selective disclosure and graduated disclosure mechanisms not available in traditional NFTs.
Cost: Transfers through key rotation don't require blockchain transaction fees.
The fundamental critique of NFTs from the KERI perspective centers on architectural principles:
Decentralization of Trust: Traditional NFTs replace centralized trust with blockchain consensus, but still depend on a single infrastructure. KERI provides truly decentralized trust through cryptographic self-certification.
Separation of Concerns: Identity, attributes, and value should be managed by systems optimized for each purpose rather than conflated in a single token.
Long-term Security: Key rotation is essential for long-term security, which traditional NFTs cannot provide.
Verifiable Control: Control over identifiers should be verifiable through cryptographic proofs rather than blockchain state.
This positions KERI/ACDC as a more robust foundation for representing unique digital assets with proper security, transferability, and decentralized control, while acknowledging that traditional NFTs may remain appropriate for use cases where blockchain-specific features (like established marketplaces or smart contract integration) are priorities.