Trust infrastructure for the synthetic reality era

Trust delivered by humans,
verified by cryptography,
outside compromised systems.

selfdriven.codes generates unique human-verifiable trust codes and delivers them through a distributed network of trusted human couriers — establishing root trust between humans in an era where voices can be cloned, faces synthesised, and every digital channel forged.

Live trust code · Session preview Active
ORBIT-LANTERN-482
Bound to AID
EKE4g_0h…OPxoP
Expires in
04:32
Courier path
Verified · 2 hops
SAID anchor
EJq8K…vN3w
01 · The Trust Crisis

When digital identity becomes infinitely forgeable, trust must leave the wire.

The modern internet was built on assumptions that communication channels were difficult to fake, identity theft was expensive, and human deception did not scale efficiently. AI changes all three.

Voices, cloned

Three seconds of audio is now enough. CEO fraud, family extortion, and live impersonation operate at industrial scale.

Faces, synthesised

Live video, real-time face swap, persistent synthetic identities. Pixels are no longer proof.

Channels, spoofed

Email, SMS, chat, meetings, websites — every primary channel can be convincingly impersonated.

Deception, autonomous

Social engineering campaigns now run continuously, adapt in real time, and require no human attacker.

02 · The Code

Human-readable, short-lived, out-of-band.

A selfdriven.code is a memorable phrase bound to a session, an identity, and a cryptographic anchor. Easy enough to read aloud. Impossible to guess. Useless once the session closes.

  • Verbally exchangeable in three seconds
  • Bound to a KERI AID and ACDC session SAID
  • Rotated continuously — replay attacks expire on their own
  • Travels through an independent channel from the request itself

"The code itself is not the trust. The trust emerges from who generated it, how it was transported, and the independence of the delivery pathway."

selfdriven.code generator
SES · LIVE
EMBER-RIVER-91
SAID: EJq8K3vN3w TTL: 04:32
03 · The Network

Trust travels through people, not packets.

AI compromises email, SMS, video, and voice. Physical and social continuity remain significantly harder to compromise at scale. A trusted courier network introduces physical, social, geographic, and contextual continuity — a living trust bridge between humans.

SUSPECT CHANNEL · EMAIL · VOICE · VIDEO CEO Initiator EKE4g_0h… CFO Recipient EL3p7_4d… C₁ Community Courier C₂ Licensed Professional C₃ Verified Delegate EMBER-91 INDEPENDENT COURIER PATHWAY ↑ DIGITAL · COMPROMISED ↑ ↓ HUMAN · TRUSTED ↓
COURIER · 01

Community Members

Verified neighbourhood participants with established local reputation and KERI-anchored identity histories.

COURIER · 02

Licensed Professionals

Notaries, solicitors, and accredited agents holding ACDC professional credentials anchored to GLEIF vLEI.

COURIER · 03

Governance Participants

Members of validated trust networks with cryptographic attestations and rotating operational trust identities.

COURIER · 04

Organisation Representatives

Designated trust officers operating under KERI-delegated AIDs with scoped, time-limited delivery authority.

04 · Scenario

A CFO receives an urgent payment request.

In the AI era, every primary channel — email, voice, video — can be convincingly impersonated. Here is how root trust is re-established between two humans before any meaningful action occurs.

1

Urgent payment request arrives

An email from "the CEO" requests an immediate $2.4M wire transfer. The signature, tone, and prior thread context are all convincing.

Email · Suspect
2

Voice verification attempted

The CFO calls back and reaches "the CEO" on the expected number. The voice matches perfectly — but in the AI era, that is no longer sufficient evidence.

Voice · Suspect
3

Trust code requested

The CFO requests a fresh selfdriven.code. The CEO's verified KERI AID generates a session-bound code, anchored to an ACDC credential and witnessed across the network.

KERI · ACDC
4

Courier dispatch

The code EMBER-RIVER-91 is dispatched through an independent human courier network — a community-verified delegate physically delivers the phrase via a parallel channel.

Courier · Out-of-band
5

Code matched, identity bound

The CFO validates the courier-delivered code against the session SAID. The match is cryptographically verifiable. Identity continuity is confirmed across two independent pathways.

SAID · Verified
6

Root trust established

Only now does the CFO proceed. Every step is logged as a KERI ixn event in the append-only key event log — an immutable audit trail of the trust establishment itself.

Root trust ✓
05 · Architecture

Six layers, one continuous trust path.

selfdriven.codes is not a single product. It is a trust orchestration stack — combining cryptographic anchoring, decentralised identity, human-readable phrases, courier networks, and governance-grade audit trails into a single coherent pathway.

01
Cryptographic

Code generation & proof integrity

Each code is bound to a session SAID and signed by the issuer's KERI AID. Codes are deterministic, verifiable, and unforgeable.
02
Identity

SSI / KERI / ACDC continuity

icp · rot · ixn events maintain identity continuity for both initiator and courier. Pre-rotation enables instant recovery.
03
Courier

Human transport & delivery

Physical, relay, split-trust, proximity, and community delivery models. Each courier holds an ACDC role credential with scoped authority.
04
Reputation

Trust scoring & validation

Courier reputation is accumulated through verifiable interaction histories, anchored to Cardano for tamper-evident long-term continuity.
05
Session

Temporary interaction trust

Codes are short-lived and contextual. A session SAID binds the code to a specific request, decision, or approval — replay is structurally impossible.
06
Governance

Rules, auditability, delegation

Every step recorded as ixn in the KEL. Audit trails are append-only, witnessed, and independently verifiable by all parties.
06 · Delivery Models

Many pathways, one principle: independence.

No two interactions require the same trust path. selfdriven.codes supports a spectrum of delivery models, calibrated to the stakes of the interaction and the topology of the parties involved.

Physical delivery

Courier physically provides the code in person — the highest-assurance pathway.

Relay delivery

Code transferred through a chain of trusted intermediaries, each verifying the previous.

Split trust

Multiple couriers deliver fragments of a sequence — no single courier holds the full code.

Proximity

Codes exchanged only within defined geographic boundaries — geofenced trust.

Community

Trusted local organisations act as delivery nodes — neighbourhood trust networks.

07 · The Shift

From pixels to proofs.

The internet was built on visual trust. The next internet is being built on verifiable trust. selfdriven.codes is the human-friendly bridge between them.

Dimension
Old internet
Emerging internet
Visual
"Looks real"
"Can be verified"
Email
Channel trust
Proof trust
Identity
Username trust
KERI AID continuity
Interface
Visual recognition
Cryptographic verification
Trust path
Single channel
Independent + human
Friction
Frictionless = good
Trust-preserving friction
selfdriven Institute

In the intelligence era,
human trust becomes infrastructure.

selfdriven.codes is part of the selfdriven Foundation ecosystem. We are working with institutions, communities, and trusted-courier networks to establish the trust primitives the next internet requires. Join us.