Skip to content

Commit 0270d2e

Browse files
committed
moved step 0s to part 0s
1 parent d01dd56 commit 0270d2e

7 files changed

Lines changed: 734 additions & 40 deletions

docs/01_2_Your_First_XID.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,7 @@ and endorsement history).
101101
true self-sovereignty, rich metadata support, holder-based elision,
102102
and ongoing key management.
103103

104-
## Part I: Preparing to Work
104+
## Part 0: Preparing to Work
105105

106106
Like all of the "Learning from ..." courses, "Learning XIDs from the
107107
Command Line" is intended for hands-on work. By experimenting with
@@ -146,7 +146,7 @@ envelope._This is expected._ Focus on understanding what each step
146146
accomplishes, not matching exact output. Additional differences at
147147
this level will appear in future tutorials.
148148

149-
## Part II: Creating the XID
149+
## Part I: Creating the XID
150150

151151
This first tutorial will take you through the basic steps to create a
152152
XID. It's deliberately simple. Subsequent tutorials, we'll explore
@@ -589,7 +589,7 @@ fi
589589

590590
The digests are identical. You removed the private key, yet the hash didn't change.
591591

592-
## Part III: Verifying a XID
592+
## Part II: Verifying a XID
593593

594594
One of the powers of a XID is that it can be verified in various ways
595595
(though that doesn't necessarily mean someone is who they say they
@@ -704,7 +704,7 @@ Amira creates information with her secrets, and only she can update
704704
that information. But after she distributes her public XID, anyone can
705705
check it.
706706

707-
## Part IV: Storing Your Files
707+
## Part III: Storing Your Files
708708

709709
This course will frequently store copies of files for future
710710
usage. But, we're not quite there yet because we'll be finishing up

docs/01_3_Making_a_XID_Verifiable.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -33,12 +33,7 @@ This isn't about discovery (how Ben finds Amira's XID in the first
3333
place). It's about freshness (how Ben verifies he has the current
3434
version).
3535

36-
## Part I: Publishing a XID
37-
38-
You'll add a publication URL to Amira's XID and then publish a public
39-
view of that.
40-
41-
### Step 0: Verify Dependencies
36+
## Part 0: Verify Dependencies
4237

4338
Before you start, ensure that you have the required CLI tools from Tutorial 01:
4439

@@ -54,6 +49,11 @@ If either tool is not installed, see [Step 0 of
5449
§1.2](01_2_Your_First_XID.md#step-0-setting-up-your-workspace) for
5550
installation instructions.
5651

52+
## Part I: Publishing a XID
53+
54+
You'll add a publication URL to Amira's XID and then publish a public
55+
view of that.
56+
5757
### Step 1: Load Your XID
5858

5959
To reload your XID, first be sure to recreate your environmental variables:

docs/02_1_Creating_Self_Attestations.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -86,15 +86,7 @@ witness attestations do their best to report without bias. This makes
8686
them more verifiable, and verifiability is what's important in the
8787
world of pseudonymous claims.
8888

89-
## Part I: Adding an Attestation Key
90-
91-
Amira contributed to Galaxy Project, an open source bioinformatics
92-
platform. Her pull request added mass spectrometry visualization
93-
features. This is the kind of specific, verifiable claim that builds
94-
real credibility. You're going to build an attestation about that
95-
claim, but first you need to create a secure way to make attestations.
96-
97-
### Step 0: Verify Dependencies & Reload XID
89+
## Part 0: Verify Dependencies & Reload XID
9890

9991
Before you get started, ensure you have the required tools installed:
10092

@@ -116,6 +108,14 @@ XID=$(cat envelopes/BRadvoc8-xid-private-1-03.envelope)
116108
XID_ID=$(envelope xid id $XID)
117109
```
118110

111+
## Part I: Adding an Attestation Key
112+
113+
Amira contributed to Galaxy Project, an open source bioinformatics
114+
platform. Her pull request added mass spectrometry visualization
115+
features. This is the kind of specific, verifiable claim that builds
116+
real credibility. You're going to build an attestation about that
117+
claim, but first you need to create a secure way to make attestations.
118+
119119
### Step 1: Create an Attestation Key
120120

121121
Every attestation, even a self-attestation should be signed. Viewers

docs/02_2_Managing_Claims_Elision.md

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -66,11 +66,10 @@ Amira has three options for handling the correlation risk of her crypto audit ex
6666

6767
Amira decides her crypto audit experience fits the middle category. She might need to prove this capability to future collaborators, but she doesn't want to publish it broadly. She'll commit an elided version publicly and reveal the full attestation selectively.
6868

69-
> :brain: **Learn more**: These three approaches are part of the broader concept of [Selective Disclosure](../concepts/selective-disclosure.md), which is the ability to reveal different information to different parties from the same underlying data structure.
69+
> :brain: **Learn more**: These three approaches are part of the broader concept of [Selective Disclosure](../concepts/selective-disclosure.md), which is the ability to reveal different information to different parties from the same underlying data structure
70+
.
7071

71-
## Part I: Creating a Commitment
72-
73-
### Step 0: Verify Dependencies & Reload XID
72+
## Part 0: Verify Dependencies & Reload XID
7473

7574
As usual, check your `envelope-cli` version:
7675
```
@@ -90,6 +89,12 @@ ATTESTATION_PUBKEYS=$(cat envelopes/key-attestation-public-2-01.ur)
9089
```
9190
If you instead need to create new ones, see [§2.2](02_1_Creating_Self_Attestations.md#step-1-create-an-attestation-key) for how to do so, then register your keys in your XID.
9291

92+
93+
## Part I: Creating a Commitment
94+
95+
Creating a commitment means creating an attestation (or really, any
96+
data) and then boiling it down to just a digest by hasing the data.
97+
9398
### Step 1: Create the Sensitive Attestation
9499

95100
You should create Amira's crypto audit attestation with [fair witness](../concepts/fair-witness.md) precision:

docs/02_3_Managing_Claims_Encryption.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -69,12 +69,7 @@ sensitive. Amira's crypto audit experience could be committed publicly
6969
hinting she has human rights tech credentials could draw unwanted
7070
attention.
7171

72-
## Part I: Setting Up for Encryption
73-
74-
Setting up requires you making sure you have your variables in order
75-
and DevReviewer sharing a public key.
76-
77-
### Step 0: Verify Dependencies
72+
## Part 0: Verify Dependencies
7873

7974
As usual, check your `envelope-cli` version:
8075
```
@@ -91,6 +86,11 @@ ATTESTATION_PRVKEYS=$(cat envelopes/key-attestation-private-2-01.ur)
9186
ATTESTATION_PUBKEYS=$(cat envelopes/key-attestation-public-2-01.ur)
9287
```
9388

89+
## Part I: Setting Up for Encryption
90+
91+
Setting up requires you making sure you have your variables in order
92+
and DevReviewer sharing a public key.
93+
9494
### Step 1: Create Keys for Receiving
9595

9696
DevReviewer needs keys to receive encrypted data. They create a

docs/03_1_Creating_Edges.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -80,17 +80,7 @@ information can be found.
8080

8181
Edges will be the topic of this chapter.
8282

83-
## Part I: Setting Up a GitHub Account
84-
85-
The first step is one that Amira did a while ago: setting up her
86-
BRadvoc8 GitHub account. She created a signing key for it, uploaded
87-
it, and has since been using that to sign commits, including the
88-
Galaxy Project commit that she references in her claim from
89-
[§2.1](02_1_Creating_Self_Attestations.md).
90-
91-
Here's a review of how all that was done.
92-
93-
### Step 0: Verify Dependencies
83+
## Part 0: Verify Dependencies
9484

9585
As usual, check your `envelope-cli` version:
9686
```
@@ -106,6 +96,16 @@ XID_ID=$(envelope xid id $XID)
10696
PASSWORD="your-password-from-previous-tutorials"
10797
```
10898

99+
## Part I: Setting Up a GitHub Account
100+
101+
The first step is one that Amira did a while ago: setting up her
102+
BRadvoc8 GitHub account. She created a signing key for it, uploaded
103+
it, and has since been using that to sign commits, including the
104+
Galaxy Project commit that she references in her claim from
105+
[§2.1](02_1_Creating_Self_Attestations.md).
106+
107+
Here's a review of how all that was done.
108+
109109
### Step 1: Generate SSH Signing Key
110110

111111
Amira needed to create SSH keys for signing her Git commits. These are

0 commit comments

Comments
 (0)