Source Trust Networks
Who you trust is important. Multiple providers can store metadata and authenticate identities. Both metadata and identities can be endorsed to build your network of trusted sources.
By using de-centralized, distributed storage, metadata cannot be altered, adjusted or removed. Provenance is maintained by including both the timestamp, and a hash of the metadata.