Skip to content

Commit 240525c

Browse files
committed
Fix build
1 parent 01f4a2b commit 240525c

File tree

3 files changed

+3
-4
lines changed

3 files changed

+3
-4
lines changed

docs/commitment-trees/overview.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,13 +12,13 @@ Although Rarimo users fully own their confidential social graph, some on-chain s
1212

1313
Rarimo Protocol defines the following tree types:
1414
- [Statement Trees(ST)](/commitment-trees/statement-trees) containing basic statements
15-
- [Credential Trees(CT)](/credential-trees) used for hierarchical one-to-many relations
15+
- Credential Trees(CT) used for hierarchical one-to-many relations
1616
- [Time Trees(TT)](/commitment-trees/time-trees) active for a specific time range
1717

1818
<IdealImage img={require('/img/social-forest.png')} alt="Social forest" />
1919

2020
An aggregation of commitment trees corresponding to some confidential social graph forms a social forest. The social forest can be used to build novel privacy-first social apps. Here are several examples of such applications:
2121
- Users seeking to create a permissionless chat may utilize the [Arbitrary Statement Tree(ARST)](/commitment-trees/statement-trees#arbitrary-statement-trees). Each message is encapsulated within a corresponding commitment. For anonymity, participants might opt for random salts and signatures, discarding them after usage. Deterministic salt and consistent keypairs for signing can be used to prove the message sequence later.
2222
- The [Adjustable Statement Tree(ADST)](/commitment-trees/statement-trees#adjastable-statement-trees) can be employed to establish a chat accessible only to users meeting specific criteria. Users must provide proof of eligibility when posting messages, with the eligibility criteria set transparently by the chat's creator and enforced via smart contract.
23-
- Entities desiring to act as identity providers, such as authoritative organizations issuing verifiable credentials, should use the [Credential Trees](/credential-trees). Unlike the `ARST` and `ADST` trees, this tree type is exclusively manageable by its owner.
23+
- Entities desiring to act as identity providers, such as authoritative organizations issuing verifiable credentials, should use the Credential Trees. Unlike the `ARST` and `ADST` trees, this tree type is exclusively manageable by its owner.
2424
- The [Time Trees(TT)](/commitment-trees/time-trees) are most suitable for events confined to a specific timeframe, such as petition signings or periodic check-ins for liveness proofs.

docs/commitment-trees/time-trees.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,4 +8,4 @@ import IdealImage from '@site/src/components/IdealImage';
88

99
# Time trees
1010

11-
Time Trees are active within some time frame and restrict the addition of new commitments after a predetermined point. They can be implemented on top of both [statement trees](/commitment-trees/statement-trees) and [credential trees](/credential-trees).
11+
Time Trees are active within some time frame and restrict the addition of new commitments after a predetermined point. They can be implemented on top of both [statement trees](/commitment-trees/statement-trees) and credential trees.

docs/rarimo-core/overview.mdx

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,6 @@ Oracles observe events in the outer world in a trustless way, and Validators col
2626

2727
The protocol provides a general messaging protocol foundation for cross-chain use cases.
2828
Users can implement their own sub-protocols and submit them via the proposals mechanism.
29-
Rarimo offers ready-to-use [identity](/credential-trees) sub-protocol.
3029

3130
<IdealImage img={require('/img/protocol-layers.png')} alt="Rarimo Protocols" />
3231

0 commit comments

Comments
 (0)