Welcome to the official developer documentation and API reference

1.1 The Problem We Are Solving

The internet was designed to move information, not value, and not identity.

As a result, identity was never built into the protocol layer. Instead, it was added later using convenience mechanisms:

  • Passwords

  • Email inbox access

  • SMS phone numbers

  • Centralized identity databases

These mechanisms were never meant to represent who someone is. They only represent what someone knows or what they can access.

The core flaw

All Web2 identity systems rely on shared secrets.

If a secret can be typed, it can be phished. If it can be stored, it can be breached. If it can be forwarded, it can be replayed.

This is not an implementation problem — it is a structural limitation.

Once a secret is copied, the system has no cryptographic way to distinguish:

  • The legitimate user

  • A stolen credential

  • An automated attacker

PTERI exists to replace shared-secret trust with cryptographic proof of authority.

Last updated

Was this helpful?