Trust Model
HAVEN's trust model is built on the principle of in-person trust chains rather than centralized verification. This document explains how our trust system works and why it's designed this way.
Core Concepts
Trust Chains
A trust chain is a cryptographically secure way to verify that content comes from a trusted community member. It consists of:
- A unique set of memorable phrases generated by the system
- Digital signatures from trusted keys
- A one-time use mechanism to prevent replay attacks
Phrase Structure
Each trust chain contains three phrases, each structured as:
For example:
radiant spirits soar autumn stars
gentle healers bloom crystal pools
peaceful guardians flow moonlit paths
These phrases are designed to be: - Memorable and easy to verify in person - Poetic and meaningful to our community - Resistant to automated generation - Unique across the network
Trust Flow
-
Initial Connection
- A trusted member generates a new chain
- They share the phrases in person with a new contributor
- The phrases are verified visually and verbally
-
Content Submission
- The contributor signs their content with the chain
- The system verifies the chain hasn't been used before
- The content is added to the static site
-
Chain Burning
- Each chain can only be used once
- Used chains are permanently recorded
- This prevents replay attacks and chain reuse
Emergency Revocation
If a trust chain or key is compromised:
- Trusted members can initiate an emergency revocation
- A quorum of signatures (>50%) is required
- The revocation is distributed through multiple channels
- All content signed with the compromised chain/key is marked for review
Security Properties
Our trust model provides:
- Forward Secrecy: Compromised keys can't affect past content
- Revocation: Quick response to compromised chains/keys
- Quorum Decisions: No single point of failure
- Audit Trail: All actions are signed and verifiable
- Privacy: No central authority or user database
Implementation Details
The system uses:
- Ed25519 for digital signatures (quantum-resistant)
- BLAKE3 for hashing (modern, secure, fast)
- Static site generation (no server-side processing)
- Multiple distribution channels (CDN + Tor mirrors)
Best Practices
-
Never share phrases electronically
- Only share trust chain phrases in person
- Verify the person matches their community references
- Use the verbal verification protocol
-
Protect your keys
- Store signing keys securely
- Use hardware security if possible
- Have an emergency revocation plan
-
Verify content
- Check that content matches community guidelines
- Verify sources when possible
- Report concerning content immediately
-
Stay updated
- Keep your local tools updated
- Check for security advisories
- Participate in community reviews