Protocol authority page

The PassPod Trust Protocol Charter

A trust framework for safer digital decisions across wallets, services, and sensitive digital actions. PassPod is designed to complement wallets, strengthen consent and requester accountability, and add a trust-and-action layer alongside cybersecurity.

Version 1.0 — Public Draft
Status Foundational protocol charter
Official source passpod.io
Applies to PassPod, PassPal trust flows, DIDX trust-read outputs

Preamble

PassPod exists to make trust decision-ready.

It does not replace identity wallets. It does not replace cybersecurity systems. It does not replace law, compliance, or human judgment.

It adds a missing layer: a trust-and-action protocol that helps people, companies, institutions, and digital systems decide what to trust, what to request, what to share, and what to allow next.

PassPod is designed to work with serious wallet ecosystems while remaining globally portable and wallet-agnostic. It is built for a world in which identity can be proven, yet decisions still fail because trust is unclear, consent is weak, requester legitimacy is uncertain, and malicious humans or malicious automation exploit that gap.

Charter articles

These articles define the core operating principles of the PassPod Trust Protocol.

1

Wallet-complementary by design

PassPod shall complement wallets, never compete with them. Wallets prove and carry identity and attestations. PassPod interprets whether a request or action is trustworthy, proportionate, and safe.

2

Universal in reach

PassPod shall remain globally portable and jurisdiction-aware. It may align with regional ecosystems, including EUDI-era flows, but it shall not be framed as owned by, limited to, or dependent on any single political bloc, institution, or wallet provider.

3

Trust is decision-specific

PassPod shall evaluate trust in relation to a specific action, not as a vague permanent label on a person or company. Trust for hiring is not trust for onboarding. Trust for delegated authority is not trust for age-gating. Trust for healthcare is not trust for payment approval.

4

Evidence over status

PassPod shall rely on relevant, lawful, auditable, and verifiable signals. It shall not raise or lower trust because of fame, wealth, title, power, ethnicity, nationality, religion, political influence, or social position unless a factor is strictly required by law for the exact decision context.

5

Minimum necessary disclosure

PassPod shall request only the minimum data required for the decision. If the decision can be made with less, less shall be requested.

6

Explicit and scoped consent

PassPod shall require clear approval before trust-relevant data is presented, derived, reused, or acted upon. Consent must be tied to purpose, recipient, scope, and duration.

7

Human readability

PassPod shall make trust understandable to normal humans. Every important trust output must answer what was checked, by whom, for what purpose, how fresh it is, and what should happen next.

8

Requester authenticity first

PassPod shall help verify who is asking before asking the user to share, approve, or act. Unclear, deceptive, overreaching, or unauthenticated requesters shall be downgraded, warned, challenged, limited, or blocked.

9

Non-custodial by default

PassPod shall avoid becoming a raw document vault. Its default posture is to store receipts, proofs of interaction, policy outcomes, status references, and user-approved summaries. It should avoid storing underlying sensitive source documents unless strictly necessary and lawfully justified.

10

Freshness, revocation, and contradiction

PassPod shall treat stale, revoked, inconsistent, or contradictory signals as weakened trust. Trust is temporal. Old proof must decay. Revoked proof must fall. Contradictions must trigger review.

11

Safe request, safe action

PassPod shall help assess not only whether data is real, but whether the next action should proceed. For higher-risk flows, PassPod shall support step-up review, delay, limitation, escalation, or refusal.

12

Cyber-resilient trust control

PassPod shall operate as a trust-and-action control layer above identity and alongside cybersecurity. It shall reduce unsafe disclosures, deceptive requests, compromised workflows, malicious digital actions, and hostile automation abuse through requester verification, consent checks, policy checks, action gating, and audit trails.

13

No social ranking engine

PassPod shall not function as a generalized social score. It may produce contextual trust outputs for specific decisions. It shall not produce permanent human worth rankings.

14

Neutral and non-discriminatory

PassPod shall remain neutral toward irrelevant personal traits and protected characteristics. Its policies and outputs must be explainable, challengeable, and reviewable so that direct discrimination and proxy discrimination can both be reduced.

15

User control must be visible

PassPod shall give users meaningful visibility into what was requested, what was shared, what was derived, what trust summaries exist, what expired, and what can be revoked, challenged, or reviewed. Trust without user visibility is weak trust.

16

Structured outputs, not vague claims

PassPod shall produce structured, interoperable outputs rather than vague trust language. At minimum, the protocol shall support Trust Request, Consent Receipt, Trust Receipt, Trust Summary, and Status Object.

17

Policy-modular architecture

PassPod shall use one core protocol with sector-specific policy packs. The same trust skeleton may support hiring, onboarding, healthcare, payments, marketplace safety, delegated authority, education, telecom, and regulated access.

18

Portability across wallet ecosystems

PassPod shall avoid lock-in. Its trust logic and outputs should remain portable across serious wallet ecosystems and standards-based identity environments.

19

Independent auditability

PassPod shall be designed for regular independent review across privacy, security, governance, interoperability, and trust-decision controls. Claims of trustworthiness must be supported by repeatable audit practice, not brand language alone.

20

Explainability and challenge

Trust outputs must be challengeable where appropriate. Users and authorized reviewers should be able to understand, question, and review meaningful trust decisions, especially where those decisions affect access, approval, opportunity, or reputation.

21

Governance discipline

PassPod shall maintain visible protocol discipline through versioning, update history, stewardship clarity, policy change tracking, and clear scope boundaries.

22

Calm, fast, understandable experience

PassPod shall reward trust interactions with clarity and speed. Users should feel safer and more in control, not buried under jargon, fear, friction, or unnecessary ceremony.

23

Brand integrity and authenticity

PassPod names, marks, logos, protocol identity, and official protocol publications shall be presented in a way that makes their origin clear and verifiable. Unofficial forks, clones, mirrors, derivative services, or third-party deployments must not imply endorsement, affiliation, authorship, certification, or official status where none exists.

24

No spoofing or passing off

No person or entity may present a product, service, site, document, trust signal, or interface in a way that is likely to confuse users into believing it is PassPod, PassPal, DIDX, or an officially affiliated service when it is not.

25

No false protocol equivalence

No person or entity may claim that a third-party system is official PassPod, PassPod-certified, PassPod-compatible, or equivalent in trust standing unless such status has been expressly granted and remains valid.

26

Protected expression

The official PassPod Charter text, protocol descriptions, diagrams, design language, explanatory materials, and official brand assets constitute protected authored expression and must not be copied, republished, or reused in misleading or unauthorized ways.

27

Confidential development integrity

Unreleased protocol features, internal strategy, unpublished product logic, and designated confidential implementation details shall be treated as confidential where marked or controlled as such. Protection of those materials depends on reasonable confidentiality measures.

28

Official source discipline

The canonical public source for the PassPod protocol shall be the official PassPod web properties and officially designated publications. Users, partners, and implementers should rely on those canonical sources when assessing authenticity, status, or current protocol language.

29

No false regulatory equivalence

PassPod shall not claim, imply, or market itself as having the legal status, certification standing, assurance level, or regulatory role of any wallet, qualified trust service, public authority, or conformity-assessed system unless that status has been formally obtained and remains valid.

30

Scope discipline

PassPod shall clearly disclose the scope of its claims, including what it does, what it does not do, and where external legal, regulatory, or institutional controls remain necessary.

Mandatory protocol objects

These objects define the minimum structure PassPod should standardize.

Trust Request

Who is asking, what is requested, why, risk level, and expiry.

Consent Receipt

What the user approved, for whom, for what purpose, and for how long.

Trust Receipt

What was verified, by whom, under what policy, with what status and freshness.

Trust Summary

A human-readable decision object for users, verifiers, reviewers, and services.

Status Object

Active, expired, revoked, downgraded, contradictory, or review-needed.

Policy Pack

The rule set for a specific decision context.

Challenge Log

Disputes, overrides, human review, corrections, and appeal outcomes.

Audit Record

Reviewable history of trust-relevant actions, checks, and governance events.

Five hard implementation rules

1. Never ask for more than the decision requires.

2. Never hide who is requesting and why.

3. Never present trust output without freshness and status.

4. Never let a score stand alone without context.

5. Never make the user feel trapped, judged, or blind.

Five forbidden anti-patterns

No pseudo-wallet behavior

PassPod must not imitate official identity roles it does not own.

No raw data hoarding

PassPod must not become a silent personal-data vault.

No vanity trust signals

PassPod must not issue decorative trust without auditable substance.

No black-box social scoring

PassPod must not rely on hidden, unchallengeable ranking logic.

No fake cyber claims

PassPod must not pretend to replace core cybersecurity, legal controls, institutional assurance, or regulatory certification.

Audit and governance posture

Privacy and consent controls

Trust decisions must stay aligned with clear approval, clear scope, and clear user visibility.

Security and architecture review

Threat posture, requester flows, safety controls, and risk boundaries should be reviewable.

Interoperability readiness

PassPod should remain compatible with serious wallet ecosystems while preserving universal portability.

Policy explainability

Trust logic should be understandable enough to review, challenge, and improve over time.

One ecosystem. Three distinct roles.

PassPal

The trust decision interface

Where people, companies, and services interact with trust in practice.

Go to PassPal
DIDX

The trust registry

Where selected public trust signals become easier to read.

Go to DIDX
PassPod

The trust protocol

The rules, receipts, and trust logic behind the ecosystem.

Go to PassPod home
Closing

PassPod turns verified facts, consent, and contextual signals into safer digital decisions.

Wallets prove. Cybersecurity protects. PassPod helps decide what should happen next.

Authenticity notice: PassPod, PassPal, DIDX, their logos, official charter text, official protocol materials, and official diagrams are part of the PassPod ecosystem. Misleading clones, spoofed branding, false affiliation claims, and false certification or equivalence claims are prohibited.