Andamio LogoAndamio

2. Building Blocks

Three trust problems, three solutions

Trust: From Purpose, Participation, and Proof

In the previous section, we introduced three questions and three connected principles.

QuestionPrinciple
PurposeDo we trust that our work matters?Purpose should be locally defined
ParticipationDo we trust the people we are working with?Participation should create artifacts
ProofDo we trust that others can do what they say they can do?Proof must be portable

Andamio Protocol

Andamio is built on three hypotheses about how each of these questions should be answered.

Andamio provides:

  1. Localized Solution Infrastructure: Anyone can issue credentials and verify others
  2. Global Connection: Shared infrastructure for coordinated action
  3. Access Token: Web3 authentication and access control

Andamio addresses the connected problems of trust by taking a holistic approach that builds momentum incrementally. Value emerges as each problem is solved, creating conditions for solving the next.

Local Solution Infrastructure

Andamio "local states" might provide infrastructure for learning, onboarding, treasury management, task governance, or participation rewards.

Existing local states can be combined into cohesive applications. For example, the Andamio Platform issues learning credentials from a "course local states" and uses them as a prerequisites for participation in "project local states".

Coming soon: Protocol documentation will include details on how to build new local states.

Global Connection

Standardized credentials are stored on the Andamio protocol and accessible from anywhere. Any time a new local solution is built, it can draw on the global credentialing network.

Access Tokens

Access tokens are as secure as the Cardano blockchain, and can be used to gain access to new opportunities.

Implications

Andamio allows anyone to build a local solution that is connected to a global network of trusted collaborators. Outside of a local solution, no one can change the requirements for who can participate. When participation is completed, no one can tamper with the record that it happened, or prevent the use of a credential from one initiative as a prerequisite for participation in another.