Why DeDi exists
Most trust systems eventually hit the same operational bottleneck. A verifier can validate a signature, but still needs to know which public key is current, whether the entity is still recognized, whether a credential or participant has been revoked, and which registry is authoritative for the namespace in question.
Those questions are rarely answered through a consistent interface. Teams end up integrating one registry at a time, re-implementing trust logic for each deployment, and carrying registry-specific assumptions directly into application code.
DeDi exists to reduce that fragmentation. It defines a common protocol and schema surface for publishing and consuming public directory data that matters to trust decisions.
The practical problem
Without a shared directory protocol, ecosystems tend to accumulate:
- custom resolver logic,
- inconsistent freshness and cache semantics,
- ambiguous authority boundaries,
- ad hoc revocation handling,
- and higher integration and audit cost.
The design response
DeDi separates a few concerns cleanly:
- directory infrastructure from any single hosted product,
- record shape from ecosystem-specific policy,
- discovery and retrieval from the downstream decision policy,
- and interoperability from external assurance claims.
What success looks like
A successful DeDi deployment makes it easier to:
- expose authoritative public state predictably,
- discover the right registry for a namespace,
- retrieve records through stable interfaces,
- validate payloads against shared schemas,
- and integrate multiple registries without rewriting the same logic repeatedly.