<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>The Interledger Community 🌱: Juan Caballero</title>
    <description>The latest articles on The Interledger Community 🌱 by Juan Caballero (@by_caballero).</description>
    <link>https://community.interledger.org/by_caballero</link>
    <image>
      <url>https://community.interledger.org/images/Ol0prWiVyWHiPhmA323WLUf_QRud5eQsJZbjiTgUCsA/rs:fill:90:90/g:sm/mb:500000/ar:1/aHR0cHM6Ly9jb21t/dW5pdHkuaW50ZXJs/ZWRnZXIub3JnL3Jl/bW90ZWltYWdlcy91/cGxvYWRzL3VzZXIv/cHJvZmlsZV9pbWFn/ZS84MC8wMTY3ZWE3/Ni1mNTUyLTRiMDMt/YTNjOC05ODU1Njkw/NjQ4M2UuanBn</url>
      <title>The Interledger Community 🌱: Juan Caballero</title>
      <link>https://community.interledger.org/by_caballero</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://community.interledger.org/feed/by_caballero"/>
    <language>en</language>
    <item>
      <title>SourceCheck — Final Grant Report for Imprimatur Project</title>
      <dc:creator>Juan Caballero</dc:creator>
      <pubDate>Wed, 19 May 2021 06:23:42 +0000</pubDate>
      <link>https://community.interledger.org/by_caballero/sourcecheck-final-grant-report-for-imprimatur-project-5c5h</link>
      <guid>https://community.interledger.org/by_caballero/sourcecheck-final-grant-report-for-imprimatur-project-5c5h</guid>
      <description>&lt;h1&gt;
  
  
  SourceCheck — Grant Report for Imprimatur Project
&lt;/h1&gt;

&lt;p&gt;&lt;a href="https://community.webmonetization.org/images/LB7wrdCuX3-MLkuXa0_csZCx8VmQP2u6s9tGjV6xKWw/w:880/mb:500000/ar:1/aHR0cHM6Ly9pLmlt/Z3VyLmNvbS9zN2V1/WDZKLnBuZw" class="article-body-image-wrapper"&gt;&lt;img src="https://community.webmonetization.org/images/LB7wrdCuX3-MLkuXa0_csZCx8VmQP2u6s9tGjV6xKWw/w:880/mb:500000/ar:1/aHR0cHM6Ly9pLmlt/Z3VyLmNvbS9zN2V1/WDZKLnBuZw" alt="" width="" height=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Project Update
&lt;/h2&gt;

&lt;p&gt;Our project involved a lot of unexpected complexities and surprise limitations to the frameworks and tooling we stitched together, but we're proud to have released an end-to-end prototype covering all the areas we set out to cover, and all of it open-source and reusable by the greater community.&lt;/p&gt;

&lt;p&gt;We've got a live demo &lt;a href="https://wms.sourcecheck.org/"&gt;here&lt;/a&gt; but note that you will need a Credible wallet to log in (explained below). You can email us for an APK file or build your own using the build instructions &lt;a href="https://github.com/spruceid/credible"&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  Progress on objectives
&lt;/h2&gt;

&lt;p&gt;Our objectives, ranked by importance, with an explanation of our results:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;✅✅Embed authenticity and royalty-transparency in a long-lived, portable, vendor-agnostic &lt;a href="https://www.w3.org/TR/vc-data-model/"&gt;Verifiable Credential&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;👍 Our prototype used a simple JSON-LD schema to express only the most basic authenticity statement (SourceCheck witnessed this publisher signing this exact version of this work) and a simplified royalty statement on the "honor system"&lt;/li&gt;
&lt;li&gt;🧠 We look forward to modeling more granular or interoperable authenticity statements and royalty obligations in the standards community over the life of this project&lt;/li&gt;
&lt;li&gt;👎 In principle, the VCs our prototype generates could be stored in a standards-conformant SSI wallet, represented elsewhere, consumed elsewhere... but testing this principle and experimenting with issuing these credentials to the end-user's Credible wallet had to be descoped in the interest of time!&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;✅✅Embed this verifiable credential in a tamperproof "repackaged" PDF enabling WMS payment endpoints and triggers

&lt;ul&gt;
&lt;li&gt;👍 Our prototype includes a custom PDF reader that checks for the VC mentioned above and, if detected and its signatures verified, reads the WMS endpoint and passes it to the browser's enabled WMS extension to pay for the content it contains. &lt;/li&gt;
&lt;li&gt;💪 &lt;strong&gt;THIS IS HUGE&lt;/strong&gt;: a decentralized and end-to-end verifiable identity/provenance mechanism to vouchsafe WMS relationships! Forget Know Your Customer (KYC)-- this is Know Your Content Creator (KYCC)😎&lt;/li&gt;
&lt;li&gt;🧠 The PDF viewer is a little idiosyncratic but we're proud of the DevOps gymnastics it took to render it server-side. This work might be a reusable or inspirational starting point for many other PDF-WMS projects, so we put it in a &lt;a href="https://github.com/SourceCheckOrg/wms-ssi-preview"&gt;separate github repo&lt;/a&gt;. The functionality can be previewed &lt;a href="https://wms.sourcecheck.org/verify"&gt;here&lt;/a&gt; (requires authenticated session).&lt;/li&gt;
&lt;li&gt;👎 We were dismayed at the complexity of PDFs' existing data model, tamperproofing and signing mechanism, and layering-- fully integrating VCs into the PDF with existing tooling would take 10X the budget and time frame of this grant. We are applying to European Open Source grants to continue the work and reimplement it in a more production-grade, PDF-native way, machine-code, bare metal, warts and all!&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;✅✅Incorporate SSI "under the hood" in signup flow and backend so that publishers can seamlessly "sign" their content with a &lt;a href="https://www.w3.org/TR/did-core/"&gt;Decentralized Identifier&lt;/a&gt; (even if they don't know what that is)

&lt;ul&gt;
&lt;li&gt;👍 Our prototype used Spruce's &lt;a href="https://github.com/spruceid/didkit"&gt;DIDKit&lt;/a&gt; to handle all the signing and SSI logistics on the issuer/verifier end; close reading of our repo will show that we install it via the NPM package manager for node.js. As for the publisher interface, we used the Strapi framework for a readymade backend, and inherited its user account model. &lt;/li&gt;
&lt;li&gt;💪 Our extension of Strapi requires an SSI wallet to sign up for an account-- and in the process, stores the DID controlled by said wallet discretely in the metadata of that account. This way, all future sign-ins are password-free, and all publication events are automatically signed by "confirmation" on the wallet app; sneaky stuff!&lt;/li&gt;
&lt;li&gt;🧠 We pick all our tools and dependencies carefully, and we think &lt;a href="https://strapi.io/"&gt;Strapi&lt;/a&gt; will get more use in coming years. Hopefully open-sourcing our SSI-Strapi integration is useful to future developers, so we also made a &lt;a href="https://github.com/SourceCheckOrg/wms-ssi-api"&gt;separate github repo&lt;/a&gt; for that code, as well as a &lt;a href="https://github.com/SourceCheckOrg/wms-ssi-db"&gt;dockerized container&lt;/a&gt; of the whole back-end.&lt;/li&gt;
&lt;li&gt;👎 We were dismayed at the complexity of PDFs' existing data model, tamperproofing and signing mechanism, and layering-- fully integrating VCs into the PDF with existing tooling would take 10X the budget and time frame of this grant. We are applying to European Open Source grants to continue the work and reimplement it in a more production-grade, PDF-native way, machine-code, bare metal, warts and all!&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;✅❎Support multiple SSI wallets

&lt;ul&gt;
&lt;li&gt;👍 Our prototype integrated the Credible mobile wallet by Spruce, which our research led us to believe was the most standards-conformant and interchangeable with other wallets that follow the W3C standards closely. We feel we have an upgrade path to add support to future wallets, so if you want to work with us to support your wallet, reach out! &lt;/li&gt;
&lt;li&gt;👎 It was a huge lift incorporating one mobile wallet into our authentication flow and signing flow and incorporating SSI on the backend-- we simply ran out of time to incorporate an alternate mobile app, or for that matter, even Spruce's web-extension version of Credible. We would love to have focused more on SSI in this project, but the space is still young, with all the documentation-gaps and testing burdens that entails.&lt;/li&gt;
&lt;li&gt;🚀 We were very involved with the standardization process of SSI wallets across the &lt;a href="https://w3c-ccg.github.io/"&gt;W3C-CCG&lt;/a&gt; and &lt;a href="https://identity.foundation/"&gt;DIF&lt;/a&gt;, where we invite all interested parties to come participate and move the needle forward! &lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;✅❎Support multiple payment rails - WMS + some other direct-payment alternative

&lt;ul&gt;
&lt;li&gt;👍 WMS works as documented and expected! We hope more infrastructural players will enter the market and offer more variations to experiment with and grow the range of guarantees and business models.&lt;/li&gt;
&lt;li&gt;👎 We had to scale back our ambitions on enabling other forms of direct payment-- for now. &lt;/li&gt;
&lt;li&gt;🚀 Our ambition after delivering this prototype is returning to the original idea of "honor system" payments rather than WMS-powered "low paywalls". Given recent developments in the identity-proofing and NFT markets, it seems that the Rebase Protocol that Spruce has been &lt;a href="https://github.com/spruceid/tzprofiles"&gt;experimenting with in the NFT space&lt;/a&gt; could be very useful for low-fee direct microdonations, and we look forward to contributing to the nascent &lt;a href="https://www.w3.org/community/rebase/"&gt;standardization of Rebase in the W3C&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Key activities
&lt;/h2&gt;

&lt;p&gt;Perhaps we bit off more than we could chew, but we spent about 1/3 of our budgeted technical time on research, planning, and design, and 2/3 working up until the very last minute on the prototype, including open-sourcing and documenting it all to be not just intelligible and perusable but reusable and composable. &lt;/p&gt;

&lt;h2&gt;
  
  
  Communications and marketing
&lt;/h2&gt;

&lt;p&gt;We actually chose to defer much of our marketing efforts until after a prototype was developed (i.e., in the coming month or two), and we will be using the bulk of that portion of our budget to document what we've done rather than do conventional marketing for our future publishing platform.&lt;/p&gt;

&lt;h2&gt;
  
  
  What’s next?
&lt;/h2&gt;

&lt;p&gt;All of the marketing and business time we allocated ended up being used for feasibility of next steps, which mostly hinge on finding grants or infrastructure partners to extend these contexts to their &lt;strong&gt;payment and/or identity and/or publication&lt;/strong&gt; infrastructures.  As for payment infrastructures, we are &lt;em&gt;most&lt;/em&gt; interested in returning to the original "honor box" content of providing various kinds of provenance and identity assurance to direct donations and [voluntary, post facto] micropayments from content consumer to content creator via direct cryptocurrency or fiat channels. We are pausing our WMS research until there is more competition between wallet and infrastructure providers and more optionality around revenue-sharing, but continuing to advance the verifiable revenue-sharing &lt;em&gt;transparency&lt;/em&gt; mechanism we prototyped in this project in the meantime.&lt;/p&gt;

&lt;p&gt;If you represent a payment, identity, wallet, or publication infrastructure provider who wants to reach out about grant or partnership opportunities, please contact juan at sourcecheck dot org directly.&lt;/p&gt;

&lt;h2&gt;
  
  
  What community support would benefit your project?
&lt;/h2&gt;

&lt;p&gt;It might sound trite, but bug reports and feature reports can be just as useful as pull requests and code donations! Feedback on the prototype is warmly welcome.&lt;/p&gt;

&lt;h2&gt;
  
  
  Relevant links/resources  (optional
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://github.com/SourceCheckOrg/wms-ssi-prototype"&gt;Main prototype repo&lt;/a&gt; (GitHub)&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://community.webmonetization.org/by_caballero/progress-report-from-team-sourcecheck-org-1e7g"&gt;High-level Architecture overview&lt;/a&gt; (on WMS Grant for the Web blog)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/SourceCheckOrg/wms-ssi-prototype/blob/main/architecture.md"&gt;More detailed technical Architecture overview&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://github.com/SourceCheckOrg/wms-ssi-prototype/blob/main/CHANGELOG.md"&gt;Project changelog&lt;/a&gt; (includes short- and medium-term feature roadmap/wishlist-- PRs accepted!)&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>publishing</category>
      <category>webmonetization</category>
      <category>ssi</category>
      <category>revenuesharing</category>
    </item>
    <item>
      <title>Progress Report from Team SourceCheck.org</title>
      <dc:creator>Juan Caballero</dc:creator>
      <pubDate>Fri, 26 Feb 2021 18:20:07 +0000</pubDate>
      <link>https://community.interledger.org/by_caballero/progress-report-from-team-sourcecheck-org-1e7g</link>
      <guid>https://community.interledger.org/by_caballero/progress-report-from-team-sourcecheck-org-1e7g</guid>
      <description>&lt;p&gt;Our project was very technologically ambitious, and we bit off a lot stitching together various open-source solutions to create a kind of publishing "platform" with WMS and SSI capabilities.  Architecting and planning took considerable research and experimentation, but we committed to a plan 1Jan and are more than halfway to a working end-to-end prototype. What follows below is a detailed overview of the architecture we landed on, which might be overkill for non-technical readers.&lt;/p&gt;

&lt;h2&gt;
  
  
  API / Backend Server
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://community.interledger.org/images/rq8vt1-CauLOgrK3Ap_6ZG0FuP8nNRW6MadTcNtBmx8/w:880/mb:500000/ar:1/aHR0cHM6Ly9jb21t/dW5pdHkuaW50ZXJs/ZWRnZXIub3JnL3Jl/bW90ZWltYWdlcy91/cGxvYWRzL2FydGlj/bGVzL2dldGt3a3Zr/YmVvZjdrNHlpbWZ2/LnBuZw" class="article-body-image-wrapper"&gt;&lt;img src="https://community.interledger.org/images/rq8vt1-CauLOgrK3Ap_6ZG0FuP8nNRW6MadTcNtBmx8/w:880/mb:500000/ar:1/aHR0cHM6Ly9jb21t/dW5pdHkuaW50ZXJs/ZWRnZXIub3JnL3Jl/bW90ZWltYWdlcy91/cGxvYWRzL2FydGlj/bGVzL2dldGt3a3Zr/YmVvZjdrNHlpbWZ2/LnBuZw" alt="image" width="216" height="179"&gt;&lt;/a&gt;   &lt;/p&gt;

&lt;p&gt;To build a full-featured content API would beyond of the scope of this project; our goal instead was to identify the best open-source components that could be combined to meet all our functional requirements:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;REST API to be consumed by client app&lt;/li&gt;
&lt;li&gt;Content type customization to support our specific needs&lt;/li&gt;
&lt;li&gt;Content ownership and ACL to allow simultaneous utilization of the app by different publishers&lt;/li&gt;
&lt;li&gt;Extensible through plugin architecture to support authentication using SSI (more on that bellow)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;We chose &lt;a href="https://strapi.io/"&gt;Strapi&lt;/a&gt; as our base for the backend development and have been finding it quite straightforward and full-featured.&lt;/p&gt;

&lt;h2&gt;
  
  
  UI / Front End app
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://community.interledger.org/images/JGcdKKhXvA7qRvgsLGvSOWYtUq8bXCgE_EJuY51mjMk/w:880/mb:500000/ar:1/aHR0cHM6Ly9jb21t/dW5pdHkuaW50ZXJs/ZWRnZXIub3JnL3Jl/bW90ZWltYWdlcy91/cGxvYWRzL2FydGlj/bGVzL251cmdpYWFh/ZGg0MmJtNHJtaWU0/LnBuZw" class="article-body-image-wrapper"&gt;&lt;img src="https://community.interledger.org/images/JGcdKKhXvA7qRvgsLGvSOWYtUq8bXCgE_EJuY51mjMk/w:880/mb:500000/ar:1/aHR0cHM6Ly9jb21t/dW5pdHkuaW50ZXJs/ZWRnZXIub3JnL3Jl/bW90ZWltYWdlcy91/cGxvYWRzL2FydGlj/bGVzL251cmdpYWFh/ZGg0MmJtNHJtaWU0/LnBuZw" alt="image" width="367" height="319"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The front-end of this platform will be of utmost importance in launching this project as a hosted platform some day, but for now, in the spirit of the GftW grant, we are trying to prototype a minimum viable project, maximizing for reusable open-source functionality. As such, we are focusing first on the &lt;strong&gt;main goal&lt;/strong&gt; of our intended future front-end is to allow publishers to upload their publications as PDF files, define royalty structures for each piece of content, and digitally sign both in a portable, binding way: verifiable credentials. These can be downloaded by publishers as receipts, are embedded in the final PDF publication, and can be consumed and processed by customized PDF readers. Our front-end currently includes one such custom PDF reader, but our modular architecture allows upgrading or swapping out any given element.&lt;/p&gt;

&lt;p&gt;Our frontend requirements for now are:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Server Side Rendering (SSR): custom metadata for each page to allow content-level web monetization hooks and, some day, content-level &lt;em&gt;royalty structures&lt;/em&gt; for monetization&lt;/li&gt;
&lt;li&gt;Single Page Application functionality whenever possible&lt;/li&gt;
&lt;li&gt;Convenience of modern web application libraries and frameworks&lt;/li&gt;
&lt;li&gt;Possibility to render PDFs without allowing download and printing, to allow for a "WMS Paywall" in-browser without having to establish a direct payment or subscription.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;We have decided to develop the frontend app using &lt;a href="https://nextjs.org/"&gt;Next.js&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;As &lt;strong&gt;"stretch goals"&lt;/strong&gt;, more likely to be addressed after the grant period, we want to support multiple payment systems and publication channels for these signed, authenticated publications. Some day, we want to make these royalty schemes codified in the publications consumable &lt;em&gt;by&lt;/em&gt; payment systems to allow micropayments and/or automated/smart-contract payments.&lt;/p&gt;

&lt;h2&gt;
  
  
  Authentication and Infrastructure for portable signatures
&lt;/h2&gt;

&lt;p&gt;The main feature of our project is to add a provenance layer to the publications in a both machine-readable and human-readable way; in other words, encoding into each publication verifiable information about who who created the content and who published it. This is a deep-rooted problem in all web publication, but it is also a structural problem particularly felt in the web monetization community, where fraud is a real concern and disputed originality could even open the door to liability action for lost income! We also consider our work a "down payment" on the long-term goal of not just transparent but &lt;em&gt;verifiable&lt;/em&gt; distribution of direct payments between the various parties contributing to content. While most WM use-cases focus on small-scale productions and individual creators, we see real potential for bringing WM to non-profit newsrooms, chapbook presses, academic journals, and many other places where &lt;strong&gt;large teams&lt;/strong&gt; of creators and collaborators do collective, rather than individual, work. These contexts require a more complex licensing and payment model than simple direct payments!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://community.interledger.org/images/ifF3-5ORHAIPmn4YR8WbbfQ1uBkaqTXaKNVopbG5Nj4/w:880/mb:500000/ar:1/aHR0cHM6Ly9jb21t/dW5pdHkuaW50ZXJs/ZWRnZXIub3JnL3Jl/bW90ZWltYWdlcy91/cGxvYWRzL2FydGlj/bGVzLzF0cXF4bzhh/bzF3b29qNXJzMDBs/LnBuZw" class="article-body-image-wrapper"&gt;&lt;img src="https://community.interledger.org/images/ifF3-5ORHAIPmn4YR8WbbfQ1uBkaqTXaKNVopbG5Nj4/w:880/mb:500000/ar:1/aHR0cHM6Ly9jb21t/dW5pdHkuaW50ZXJs/ZWRnZXIub3JnL3Jl/bW90ZWltYWdlcy91/cGxvYWRzL2FydGlj/bGVzLzF0cXF4bzhh/bzF3b29qNXJzMDBs/LnBuZw" alt="image" width="411" height="350"&gt;&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;We have advocated for the maximally standards-driven, open-source implementation we could find of &lt;a href="https://spruceid.dev/docs/primer.md"&gt;Self-Sovereign Identity&lt;/a&gt; technology as the infrastructure for handling the these identities and high-value signatures. We are using a backend library called &lt;a href="https://spruceid.dev/docs/didkit"&gt;DIDkit&lt;/a&gt; and the mobile wallet &lt;a href="https://spruceid.dev/docs/credible/"&gt;Credible&lt;/a&gt;, both developed by Spruce Systems (USA).&lt;/p&gt;

&lt;p&gt;The user can sign up for an "account" with our app using the identity wallet rather than a username/password, and they receive a verifiable credential as "receipt" after confirming her/his email and login to the application using a so-called &lt;a href="https://www.w3.org/TR/vc-data-model/#presentations-0"&gt;"verifiable presentation"&lt;/a&gt; (i.e., a proof of possession of unique credential). In addition to authenticating with this app, content and royalty structures are both signed with cryptographic material stored securely in the app (in most cases, in the phone's OS-layer keystore).  We have developed a Strapi plugin that handles SSI authentication in the backend and integrates with Strapi's built-in ACL system. This plug-in also renders QR codes in the frontend to be scanned by the identity wallet. The triangular synchronisation between the backend, the frontend, and the wallet is achieved using &lt;a href="https://socket.io/"&gt;Socket.io&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Current status
&lt;/h2&gt;

&lt;p&gt;At time of writing, we have most the the architectural components developed and integrated. The user interface is still very much in progress and requires some improvements to be feature complete as a prototype. We still need to implement the code that will embed provenance data into the PDF files, and decide on/design a prototype-grade schema for storing the authorship information and royalties in the document. Our plan after the grant is to refine this schema in alignment with ongoing digital content provenance structures such as the Adobe-led &lt;a href="https://contentauthenticity.org/"&gt;Content Authenticity Initiative&lt;/a&gt; and/or the Open Content Certification Protocol (OCCP)(&lt;a href="https://posth.me/occp/"&gt;https://posth.me/occp/&lt;/a&gt;). &lt;/p&gt;

</description>
      <category>ssi</category>
      <category>grantfortheweb</category>
      <category>grantreports</category>
      <category>opensource</category>
    </item>
    <item>
      <title>Imprimatur (SourceCheck.org)</title>
      <dc:creator>Juan Caballero</dc:creator>
      <pubDate>Wed, 02 Dec 2020 11:34:25 +0000</pubDate>
      <link>https://community.interledger.org/by_caballero/imprimatur-sourcecheck-org-25j4</link>
      <guid>https://community.interledger.org/by_caballero/imprimatur-sourcecheck-org-25j4</guid>
      <description>&lt;p&gt;We are prototyping a lightweight e-publication system that cryptographically binds each secure publication to its provenance and payment information. An electronic book, a magazine, or a comic can be published in a secure digital form (essentially, a "fancy PDF") containing information about its authorship and authenticity, and optionally also information about revenue-shares or other royalty or non-profit commitments. The “self-sovereign” identifiers used to literally and figuratively “sign” the works can be public or private or somewhere in between, at the discretion of the parties involved. These options include various kinds of notarization, indexing, and discovery methods for different kinds of publications (including Rebase networks and traditional DOI databases). The resulting publications can be sold conventionally or “previewed” using a WMS plug-in, offering a third option between paywalls and completely free access.&lt;/p&gt;

</description>
      <category>publishing</category>
      <category>pdf</category>
      <category>ssi</category>
      <category>transparency</category>
    </item>
  </channel>
</rss>
