Posted on :: Source Code

The first installment of the KERI Tutorial Series focused on the KERI command line interface. This tutorial demonstrates how to establish trust between two parties, create KERI identifiers with witness networks, perform out-of-band introductions (OOBIs), complete challenge-response authentication, and sign/verify messages using KERI's end-verifiable secure attribution.