Self-Sovereign Authentication (SSAuthN)

Create and manage identities you wish to have in the world.

Personal Asymmetric Cryptography

Generate and manage your own keys.

Multiple Identities

Maintain a bank of identities used to build up different reputations for different situations.

Key Revocation

Revoke a private key that has been stolen.

Identify Recovery

Recover a lost private key.