Welcome to the official developer documentation and API reference
1.1 The Problem We Are Solving
The internet was designed to move information, not value, and not identity.
As a result, identity was never built into the protocol layer. Instead, it was added later using convenience mechanisms:
Passwords
Email inbox access
SMS phone numbers
Centralized identity databases
These mechanisms were never meant to represent who someone is. They only represent what someone knows or what they can access.
The core flaw
All Web2 identity systems rely on shared secrets.
If a secret can be typed, it can be phished. If it can be stored, it can be breached. If it can be forwarded, it can be replayed.
This is not an implementation problem — it is a structural limitation.
Once a secret is copied, the system has no cryptographic way to distinguish:
The legitimate user
A stolen credential
An automated attacker
PTERI exists to replace shared-secret trust with cryptographic proof of authority.

Last updated
Was this helpful?