Anchored Data
To achieve end-to-end verifiable persistent data provenance, we will show you how to leverage the advanced features of the KERI protocol to “anchor your data”.
Coming Soon
Anchored data represents a true innovation in cybersecurity. The protocol is the only Distributed Public Key Infrastructure (DPKI) protocol available that allows you apply digital signatures to data that can survive identifier key rotations while simultaneously protecting your data from a dead key attack. healthKERI’s gateways provide advanced configuration options for anchoring every signature on every bit of data in the key state of signing identifiers ensuring the longevity of each signature as well as ensuring that only the data you meant to sign is ever trusted.
When anchored data is combined with healthKERI’s hosted Witness Operational Network and Watcher Operational Network, you can be sure that all data is exchanged in Zero-Trust. And in the event of any key compromise (including a post quantum event), you will be immediately notified and able to recover.
In this installment of our tutorial series, we will walk you through the configuration for anchored data and help you set up Witnesses and Watchers to lock down all your data exchange flows.
Please stay tuned…