did:meme is a deterministic transformation of did:key, that uses IPFS, image content and bech32.
did-meme-format := did:meme:<bech32-value>
bech32-value := [a-zA-HJ-NP-Z0-9]+
The bech32-value is an encoded multihash.
The multihash is a content identifier for an image.
The image contains a steganographically embedded did:key.
See did-key.
Another way of representing the did:meme identifier encoding:
did:meme:<bech32(
multihash(
stego-embed(image, did:key)
)
)>
See did-key.
did:keydid:meme with bech32.did:meme identifier.did:key multicodec.did:key document from the identifier.did:meme identifier.Not supported.
Not supported.
See did-key
Because update and deactivate are not supported, did:meme should only be used for very short lived interactions, or just lulz.
Because did:meme identifiers are a super set of did:key, it is possible for multiple did:meme to map to the same did:key… This can be problematic when private key compromise has occured.
Generally speaking, did:meme has similar or weaker security properties compared with did:key.
Be careful to strip XIF data or other meta data from images before constructing did:meme.
Do not use images that identify physical locations or people.