Skip to content

Understanding Trust Chains

Trust chains are at the heart of HAVEN's security model. This guide explains how to use them effectively.

What is a Trust Chain?

A trust chain is a set of three memorable phrases that: 1. Verify your connection to the community 2. Allow you to submit content once 3. Can never be reused

Example Chain

A trust chain looks like this:

radiant spirits soar autumn stars
gentle healers bloom crystal pools
peaceful guardians flow moonlit paths

Each phrase follows the pattern: [emotion] [community] [nature] [place]

Getting a Trust Chain

  1. Connect with a trusted member in person
  2. They will generate a new chain for you
  3. Write down the phrases exactly
  4. Verify each phrase verbally
  5. Never share chains electronically

Using Your Chain

  1. Prepare your content in Markdown format
  2. Run the signing tool:
    python -m haven.tools.sign content.md
    
  3. Enter your chain when prompted
  4. Submit the signed content

Chain Security

  • Each chain can only be used once
  • Used chains are "burned" (permanently recorded)
  • Chains cannot be reused or replayed
  • Always verify chains in person

Best Practices

  1. Write Clearly
  2. Use exact spelling and punctuation
  3. Verify each word carefully
  4. Double-check before using

  5. Stay Secure

  6. Never share chains electronically
  7. Don't photograph or scan chains
  8. Don't store chains on your computer

  9. Verify In Person

  10. Meet in a safe, public place
  11. Follow the verbal verification protocol
  12. Take your time to verify correctly

Troubleshooting

Chain Rejected

  • Check spelling and punctuation
  • Verify no extra spaces
  • Ensure chain hasn't been used
  • Get a new chain if needed

Verification Failed

  • Meet again in person
  • Generate a new chain
  • Follow the protocol exactly

Technical Issues

  • Update your tools
  • Check your key status
  • Contact support if needed

Emergency Procedures

If you suspect a chain has been compromised:

  1. Contact a trusted member immediately
  2. Do not use the compromised chain
  3. Follow the Emergency Protocol
  4. Wait for confirmation

Next Steps

  1. Generate your keys
  2. Connect with the community
  3. Start contributing content
  4. Consider becoming a trusted member