Life is hard, have a token.

By Jay Kuri
2025-10-08

OR - Tokens, Not Keys: A Better Way to Think About Digital Trust

When people first see Vouchsafe, it’s natural to compare it to familiar systems like PGP, PKI, or even DIDs, after all, they use the same terms… keys, signatures, identity.

Unfortunately, while the comparison is natural, it is also misleading. Vouchsafe’s model of trust is different, and today I’ll show you how.

How Traditional Systems Think About Trust

In PKI or GPG, trust is bound to a key. If you trust the key, you’re essentially saying:

This is almost never what we actually want, so to be useful, two things happen:

1) Every ecosystem must bolt-on its own special rules to limit the scope of tust. The Arch User Repository trusts keys only for publishing. Debian maintainers have their own policies. Email encryption invents its own webs of trust.

2) Revocation of trust becomes central. You have to be able to cancel the trust… which is why PKI needs global CRLs and responders.

In other words, the primitives (keys, identities) are the same everywhere, but the way trust is applied is different every time.

How We Actually Trust

In everyday life, we rarely trust people “for everything, forever.”

Instead, we trust people in specific situations:

In other words, Trust is scoped, temporary, and renewable.

Vouchsafe: Trust Lives in Tokens

Vouchsafe’s model maps more closely to the model we use in real life.

Instead of keys being the basic unit of trust, tokens are.

What that means is with Vouchsafe you don’t say ‘I trust this person forever’ you say I trust this token for this purpose for this precise period of time.

To continue our earlier valet example, the valet issues a “park Alice’s car” token and Alice vouches for it for 5 minutes. This means the valet is trusted to drive the car for that precise period of time and no longer. Alice doesn’t have to revoke the trust, because it expires automatically and relatively quickly.

This works because:

Built-In, Not Bolted-On

In PKI and GPG, scoped trust isn’t part of the design, it’s something every ecosystem has to invent for itself.

Each solution is different because the primitive (a forever-valid key) doesn’t provide scope by itself.

With Vouchsafe, scoped trust is built in.

That means trust isn’t an ad-hoc policy anymore, it’s part of the token. Every system can express trust in the same, portable language, instead of reinventing the rules.

Why It Matters

By centering trust in tokens, Vouchsafe makes digital trust behave more like real trust:

A Better Mental Model: SSH Keys++

We’ve talked about what doesn’t match the Vouchsafe model, but there is is a better match for the vouchsafe model that you are already familiar with: SSH Keys.

With SSH keys:

That’s already much closer to Vouchsafe than PKI is.

But Vouchsafe is SSH keys++:

If SSH was the leap from passwords to per-context keys, Vouchsafe is the leap from raw keys to portable, renewable, trust tokens.

There is too much, let me sum up.

What Vouchsafe does is shift the primitive of trust from keys to tokens. That one change makes digital trust line up with how real trust works: scoped, temporary, renewable, and easy to communicate. Instead of every ecosystem reinventing its own way to express limited trust, Vouchsafe provides a simple, standardized envelope. You still decide who you trust and what you trust them for, but now you can say it in a way that anyone can verify, anywhere, even offline.