selfdriven.codes generates unique human-verifiable trust codes and delivers them through a distributed network of trusted human couriers — establishing root trust between humans in an era where voices can be cloned, faces synthesised, and every digital channel forged.
The modern internet was built on assumptions that communication channels were difficult to fake, identity theft was expensive, and human deception did not scale efficiently. AI changes all three.
Three seconds of audio is now enough. CEO fraud, family extortion, and live impersonation operate at industrial scale.
Live video, real-time face swap, persistent synthetic identities. Pixels are no longer proof.
Email, SMS, chat, meetings, websites — every primary channel can be convincingly impersonated.
Social engineering campaigns now run continuously, adapt in real time, and require no human attacker.
A selfdriven.code is a memorable phrase bound to a session, an identity, and a cryptographic anchor. Easy enough to read aloud. Impossible to guess. Useless once the session closes.
"The code itself is not the trust. The trust emerges from who generated it, how it was transported, and the independence of the delivery pathway."
AI compromises email, SMS, video, and voice. Physical and social continuity remain significantly harder to compromise at scale. A trusted courier network introduces physical, social, geographic, and contextual continuity — a living trust bridge between humans.
Verified neighbourhood participants with established local reputation and KERI-anchored identity histories.
Notaries, solicitors, and accredited agents holding ACDC professional credentials anchored to GLEIF vLEI.
Members of validated trust networks with cryptographic attestations and rotating operational trust identities.
Designated trust officers operating under KERI-delegated AIDs with scoped, time-limited delivery authority.
In the AI era, every primary channel — email, voice, video — can be convincingly impersonated. Here is how root trust is re-established between two humans before any meaningful action occurs.
An email from "the CEO" requests an immediate $2.4M wire transfer. The signature, tone, and prior thread context are all convincing.
The CFO calls back and reaches "the CEO" on the expected number. The voice matches perfectly — but in the AI era, that is no longer sufficient evidence.
The CFO requests a fresh selfdriven.code. The CEO's verified KERI AID generates a session-bound code, anchored to an ACDC credential and witnessed across the network.
The code EMBER-RIVER-91 is dispatched through an independent human courier network — a community-verified delegate physically delivers the phrase via a parallel channel.
The CFO validates the courier-delivered code against the session SAID. The match is cryptographically verifiable. Identity continuity is confirmed across two independent pathways.
Only now does the CFO proceed. Every step is logged as a KERI ixn event in the append-only key event log — an immutable audit trail of the trust establishment itself.
selfdriven.codes is not a single product. It is a trust orchestration stack — combining cryptographic anchoring, decentralised identity, human-readable phrases, courier networks, and governance-grade audit trails into a single coherent pathway.
KERI AID. Codes are deterministic, verifiable, and unforgeable.
icp · rot · ixn events maintain identity continuity for both initiator and courier. Pre-rotation enables instant recovery.
ixn in the KEL. Audit trails are append-only, witnessed, and independently verifiable by all parties.
No two interactions require the same trust path. selfdriven.codes supports a spectrum of delivery models, calibrated to the stakes of the interaction and the topology of the parties involved.
Courier physically provides the code in person — the highest-assurance pathway.
Code transferred through a chain of trusted intermediaries, each verifying the previous.
Multiple couriers deliver fragments of a sequence — no single courier holds the full code.
Codes exchanged only within defined geographic boundaries — geofenced trust.
Trusted local organisations act as delivery nodes — neighbourhood trust networks.
The internet was built on visual trust. The next internet is being built on verifiable trust. selfdriven.codes is the human-friendly bridge between them.
selfdriven.codes is part of the selfdriven Foundation ecosystem. We are working with institutions, communities, and trusted-courier networks to establish the trust primitives the next internet requires. Join us.