LDUX - Local PDS
Origin First Research
(Protect Your Home)


There's no place like 127.0.0.1

Evolving General Idea

Imagine a standard for loopback mechanisms ultlizing the Orgin Private File System - (OPFS) standard in the browser via the origin https://localhost with encryption at rest to help solve presistent storage, privacy, security, and trust in the browser. This system would utilize a Conflict-free Replicated Data Type - (CRDT) data structure to sync data and files from Broswer Agent to Browser Agent to localhost. The localhost will have a mapped folder on a native loopback device for persistant storage and all code would originate from the localhost to help prevent Man In The Middle - (MITM) attacks and code injections.


This document is a collection of evolving research for a concept. The resources cited in this document are intended to support the research and may or may not make their way into the final draft. If you are interested in discussing this concept further, please feel free to reach out to me.

Origin Private File System - (OPFS) in The File System API Demo

Create

Read

Delete


OPFS MDN

OPFS

OPFS Explorer Chrome Extension

Localhost loopback network interface

Localy Delivered Browser Secure Context

localhost

Loopback

.localhost tld reserved by IETF

Native Mobile localhost

iOS Swift Local Native Server

Android Kotlin Local Native Server

Research Resources

Identity Flow

Self Issued - OIDC

FedCM

FedCM Demo

Apple's general support response to FedCM

Verifiable Identity Credentials

WICG identity credential

W3C Verifiable Credentials Data Model v2.0

Open Wallet Foundation Identity Credential

Apple verify idenity with wallet

ID.me Attribute Exchange

Trust Flow <~> Stamp Envelopes

Ruben Verborgh On Trust Flows

SXG Signed HTTP Exchanges CBOR CDDL for loading Cert Chains📜⛓️ = 🤯

Verifiable Credential Data Integrity 1.0

Assertion Claims

JWT.io Introduction to JSON Web Tokens

JSON Web Token Claims (JWT)

IANA JSON Web Token Claims registry

JSON web token (JWT) validation

JWT Custom Claims

Javascript Object Signing and Encryption (JOSE)

CBOR Object Signing and Encryption (COSE)

Securing Verifiable Credentials using JOSE and COSE

Binary Semantic CDDL Mapping

CDDL - IETF Proposal

CBOR-LD 1.0 - A CBOR-based Serialization for Linked Data

Granular Consent

(DPV) Data Protection Vocabulary Protecting your data with legal vocabulary on a granular level.This is not legal advice it's a concept idea.

Okta 3rd Party Consent

ACL and Capabilities

UCAN - Distributed Auth

ZCAP-LD - Authorization Capabilities for Linked Data

ACP - Access Control Policy

WAC - Web Access Control

WASM Local SQLite Database

SQLite OPFS

Glitch WASM SQLite example

Glitch code for above example

SQLite CRDTs Looking for feedback please reach out.

Imagine an HMAC Secret on both the IDP and RP via something like FedCM with Secure Chain Proofs that could provide a blind index CRDT for any persistent availability needed by 3rd parties on the internet. This could be for profile pics public comments, etc.

Vulcan - CR-SQLite SQLite CRDTs

Braid CRDT Protocol

Local Encryption At Rest

hmac-secret

FIDO Encrypt Decrypt

HPKE

JavaScript Browser Delivery Integrety

CSP

SRI - Sub Resource Integrety

Secure Contexts in Browser Windows

Fenced Frame

PIR - Private Information Retrieval

PIR - Using homomorphic encryption

Local First Influence Projects

Ink & Switch

m-ld

TinyBase

ODD Stack - IPFS, DIDs, UCANs

This document is intended for research purposes only. It is not intended to be used as a legal document and should not be relied upon as such. This document is provided “as is” without warranty of any kind, either express or implied, including but not limited to the implied warranties of merchantability, fitness for a particular purpose, or non-infringement. The author(s) of this document shall not be liable for any damages whatsoever arising out of or in connection with the use or inability to use this document, even if the author(s) have been advised of the possibility of such damages.