1
Handle Resolution
Your human-readable handle (like a domain name) maps to a DID
2
DID Document
The DID resolves to a document containing keys and service endpoints
3
Bidirectional Verification
Handle and DID document must agree — preventing hijacking
4
PDS Discovery
Find the Personal Data Server that hosts the user's data
5
Repository
Explore the Merkle tree of signed data
6
Signing Key
The cryptographic key that proves data authenticity