These articles define the core operating principles of the Passpod Trust Protocol.
1
Wallet-complementary by design
Passpod shall complement wallets, never compete with them. Wallets prove and carry identity and attestations. Passpod helps assess whether a request is authenticated, scoped, consented, proportionate, and reviewable for the specific decision context.
Passpod shall remain globally portable and jurisdiction-aware. It may align with regional ecosystems, including EUDI-era flows, but it shall not be framed as owned by, limited to, or dependent on any single political bloc, institution, or wallet provider.
3
Trust is decision-specific
Passpod shall evaluate trust in relation to a specific action, not as a vague permanent label on a person or company. Trust for hiring is not trust for onboarding. Trust for delegated authority is not trust for age-gating. Trust for healthcare is not trust for payment approval.
Passpod shall rely on relevant, lawful, auditable, and verifiable signals. It shall not raise or lower trust because of fame, wealth, title, power, ethnicity, nationality, religion, political influence, or social position unless a factor is strictly required by law for the exact decision context.
5
Minimum necessary disclosure
Passpod shall request only the minimum data required for the decision. If the decision can be made with less, less shall be requested.
6
Explicit and scoped consent
Passpod shall require clear approval before trust-relevant data is presented, derived, reused, or acted upon. Consent must be tied to purpose, recipient, scope, and duration.
Passpod shall make trust understandable to normal humans. Every important trust output must answer what was checked, by whom, for what purpose, how fresh it is, and what should happen next.
8
Requester authenticity first
Passpod shall help verify who is asking before asking the user to share, approve, or act. Unclear, deceptive, overreaching, or unauthenticated requesters shall be downgraded, warned, challenged, limited, or blocked.
9
Non-custodial by default
Passpod shall avoid becoming a raw document vault. Its default posture is to store receipts, proofs of interaction, policy outcomes, status references, and user-approved summaries. It should avoid storing underlying sensitive source documents unless strictly necessary and lawfully justified.
10
Freshness, revocation, and contradiction
Passpod shall treat stale, revoked, inconsistent, or contradictory signals as weakened trust. Trust is temporal. Old proof must decay. Revoked proof must fall. Contradictions must trigger review.
11
Scoped request, reviewable action
Passpod shall help assess not only whether data is real, but whether the next action should proceed. For higher-risk flows, Passpod shall support step-up review, delay, limitation, escalation, or refusal.
12
Cyber-resilient trust control
Passpod shall operate as a trust receipt control layer above identity and alongside cybersecurity. It shall help review high-risk disclosures, deceptive requests, compromised workflows, malicious digital actions, and hostile automation abuse through requester verification, consent checks, policy checks, action gating, and audit trails.
13
No generalized human-ranking engine
Passpod shall not function as a generalized human-ranking system. It may produce contextual trust outputs for specific decisions. It shall not produce permanent human worth rankings.
14
Neutral and non-discriminatory
Passpod shall remain neutral toward irrelevant personal traits and protected characteristics. Its policies and outputs must be explainable, challengeable, and reviewable so that direct discrimination and proxy discrimination can both be reduced.
15
User control must be visible
Passpod shall give users meaningful visibility into what was requested, what was shared, what was derived, what trust summaries exist, what expired, and what can be revoked, challenged, or reviewed. Trust without user visibility is weak trust.
16
Structured outputs, not vague claims
Passpod shall produce structured, interoperable outputs rather than vague trust language. At minimum, the protocol shall support Trust Request, Consent Receipt, Trust Receipt, Trust Summary, and Status Object.
17
Policy-modular architecture
Passpod shall use one core protocol with sector-specific policy packs. The same trust skeleton may support hiring, onboarding, healthcare, payments, marketplace safety, delegated authority, education, telecom, and regulated access.
18
Portability across wallet ecosystems
Passpod shall avoid lock-in. Its trust logic and outputs should remain portable across serious wallet ecosystems and standards-based identity environments.
19
Independent auditability
Passpod shall be designed for regular independent review across privacy, security, governance, interoperability, and trust-decision controls. Claims of trustworthiness must be supported by repeatable audit practice, not brand language alone.
20
Explainability and challenge
Trust outputs must be challengeable where appropriate. Users and authorized reviewers should be able to understand, question, and review meaningful trust decisions, especially where those decisions affect access, approval, opportunity, or reputation.
Passpod shall maintain visible protocol discipline through versioning, update history, stewardship clarity, policy change tracking, and clear scope boundaries.
22
Calm, fast, understandable experience
Passpod shall reward trust interactions with clarity and speed. Users should feel more informed and in control and more in control, not buried under jargon, fear, friction, or unnecessary ceremony.
23
Brand integrity and authenticity
Passpod names, marks, logos, protocol identity, and official protocol publications shall be presented in a way that makes their origin clear and verifiable. Unofficial forks, clones, mirrors, derivative services, or third-party deployments must not imply endorsement, affiliation, authorship, certification, or official status where none exists.
24
No spoofing or passing off
No person or entity may present a product, service, site, document, trust signal, or interface in a way that is likely to confuse users into believing it is Passpod, PassPal, DIDX, or an officially affiliated service when it is not.
25
No false protocol equivalence
No person or entity may claim that a third-party system is official Passpod, Passpod-certified, Passpod-compatible, or equivalent in trust standing unless such status has been expressly granted and remains valid.
The official Passpod Charter text, protocol descriptions, diagrams, design language, explanatory materials, and official brand assets constitute protected authored expression and must not be copied, republished, or reused in misleading or unauthorized ways.
27
Confidential development integrity
Unreleased protocol features, internal strategy, unpublished product logic, and designated confidential implementation details shall be treated as confidential where marked or controlled as such. Protection of those materials depends on reasonable confidentiality measures.
28
Official source discipline
The canonical public source for the Passpod protocol shall be the official Passpod web properties and officially designated publications. Users, partners, and implementers should rely on those canonical sources when assessing authenticity, status, or current protocol language.
29
No false regulatory equivalence
Passpod shall not claim, imply, or market itself as having the legal status, certification standing, assurance level, or regulatory role of any wallet, qualified trust service, public authority, or conformity-assessed system unless that status has been formally obtained and remains valid.
Passpod shall clearly disclose the scope of its claims, including what it does, what it does not do, and where external legal, regulatory, or institutional controls remain necessary.