Trust Over IP Architecture review. Trust spanning Protocol

Volodymyr Pavlyshyn
3 min readFeb 25, 2023

The beginning of 2023 is fruitful for specs and news in Selfe sovereign identity space—new specs for OIDC-compliant protocols for VC and VPs, new European wallet, etc.

Types Of Systems

it is a paper that revisits and defines a structure of Trust over IP stack and layered protocols

Let's take critical notes from a paper. I used some of the diagrams from the article itself.

Trust over IP defines the following types of systems

ToIP systems (c) Trust over IP foundation
  • Endpoint System — autonomous system with boundaries of concrete locus of control. Service, user-centric mobile app, institutions, etc.
  • Intermediary Systems — similar idea to Hyperladger mediators and relays help to facilitate and route messages via trust-spanning protocol
  • Supporting Systems — utility systems for trust-specific needs like — key management, transport, and secure storage. DID method implementation go to this bucket
© Trust over IP founndation

The Layers

© Trust over IP founndation

Layer 4: Trust Applications

So concrete applications that will use a Layer 3 Trust task protocol and Layer 2 Spanning protocol enable to build of business logic and new services like payment, data economy exchangers, KYC stems, and new DeSoc and DeFi systems.

Layer 3: Trust Tasks

Families of Protocols that connect Endpoint Systems and players of Endpoint Systems.

  • Credential and verifiable data exchange protocols
  • payments protocol
  • Data streaming protocols
  • Asset exchange protocols

Layer 2: Trust Spanning

This is the main subject of our talk. An hourglass neck and a key part give a fundamental building block.

In a paper, ToIP defines an essential requirement. A significant part of a requirement is focused on Autonomic decentralized identifiers and a secured message exchange on top of identifiers. We have yet to have one concrete implementation or standard that satisfies all needs, but ToIP selects a few candidates.

I am disappointed that DWN ignored a DIDComm and built its own messaging. It is still unclear to me.

Layer 1: Trust Support.

Correlate with support systems set of network tools. secure storage and cryptographic tooling.

More detailed explanation



Volodymyr Pavlyshyn

I believe in SSI, web5 web3 and democratized open data.I make all magic happens! dream & make ideas real, read poetry, write code, cook, do mate, and love.