# Welcome to the official developer documentation and API reference

1.1 The Problem We Are Solving

The internet was designed to move **information**, not **value**, and not **identity**.

As a result, identity was never built into the protocol layer. Instead, it was added later using convenience mechanisms:

* Passwords
* Email inbox access
* SMS phone numbers
* Centralized identity databases

These mechanisms were never meant to represent *who someone is*.\
They only represent *what someone knows* or *what they can access*.

#### The core flaw

All Web2 identity systems rely on **shared secrets**.

> If a secret can be typed, it can be phished.\
> If it can be stored, it can be breached.\
> If it can be forwarded, it can be replayed.

This is not an implementation problem — it is a **structural limitation**.

Once a secret is copied, the system has no cryptographic way to distinguish:

* The legitimate user
* A stolen credential
* An automated attacker

**PTERI exists to replace shared-secret trust with cryptographic proof of authority.**

<figure><img src="https://4228504584-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FJn0UkERqF0RJQReQlLo9%2Fuploads%2F3wuJrzjBaAAHRLYZegkL%2Fimage.png?alt=media&#x26;token=c6c06859-0471-40b2-a04c-ab33f74b8545" alt=""><figcaption></figcaption></figure>
