Ny bil til salgs i Ål

34,444 kr Ny 52 Seller Dawood Hamidi
Beskrivelse

Eg sel min nesten nye bil som framleis er i utmerkt stand.

Bilen er kjøpt for kort tid sidan og har berre vore brukt til lett køyre, noko som betyr at den er i nærmast ny tilstand med minimalt slitasje.

Den har moderne teknologiske funksjonar som klimaanlegg, navigasjonssystem og sikkerheitsfunksjonar som kollisjonsputer og ABS-bremser.

Bilen har også god drivstofføkonomi og er enkel å køyre i både by og på landeveg.

Det er ein ideell bil for både kvardagsbruk og lengre turar.

Bilen står klar for visning og prøvekjøring i Ål.

Ta kontakt for meir informasjon eller for å avtale tid til å sjå på bilen.

Område

Berglyveien 9, Oslo, Norway

Ads you might like

Kontakt selger
Seller
Dawood Hamidi
38 ads @Persian
Approved

Joined: Feb 2023
38 m
More ads from this seller
View all
Grønmo Golfklubb.
Grønmo Golfklubb.
Det er kort vei til alle servicetilbud man trenger i hverdagen. Det er kort vei til Sæterkrysset og Holtet. Her finner du et godt utvalg av koselige kaféer og restauranter med bl.a. Norlaks, Egon og W.B. Samson med pizza servering på ettermiddagene, butikker og helsetilbud med Dr. Dropin, tannlege og kiropraktor. Den nyåpnede vinbaren "Poppel" ligger også på Sæter torg og kan by på nydelig utendørsservering. Dagligvarehandelen kan gjøres på Kiwi, MENY eller Rema 1000 i Sæterkrysset. Her finner du også Gutta på Haugen. Ellers er det kort vei til Holtet hvor man finner Kaffebrenneriet, Åpent Bakeri som på ettermiddagstid blir Lofthus Samvirkelag og kan by på en fantastisk pizza, samt Jacobs på Holtet. Jacobs hadde en gjenåpning i 2024, og har et areal på ca. 2.700 kvadratmeter fylt med kompromissløs matglede.Tur, trening og rekreasjon:I nærområdet finner man flere treningstilbud og idrettslag. På Sæter torg finner man treningsstudioene EVO og Krathe Helse. Nærområdets idrettslag har en allsidig satsning innenfor et bredt spekter av diverse idrettsgrener. Nordstrand IF har en lang historie som strekker seg tilbake til 1919. I dag har foreningen rundt 1.900 aktive medlemmer innenfor grenene fotball, håndball, parasport, triatlon og e-sport. I tillegg finner man i området flere tennisanlegg, svømmehall, treningssenter og ridesenter. For golfentusiasten er det omtrent 12 minutter til Grønmo Golfklubb.Det er kort vei til flere tur- og rekreasjonsområder fra leiligheten. Langs Bunnefjorden finner man flere populære og flotte badeplasser som blant annet Nordstrand Bad, Katten, Sydstranda på Ulvøya og Bekkelagsbadet rett før brua ved Ormøya. Bekkelagsbadet stod ferdig i 2019 og er blitt en attraktiv destinasjon for badegjestene. Her er det en stor gressplen med sandvolleyballbane, ballbinge og parkour-anlegg, samt flott badebrygge, stupetårn og foodtrucken Fjordvogna. Ekebergsletta ligger rundt 3 kilometer fra leiligheten. Her er det gode muligheter for en gå-, jogge- eller skitur (vinterstid) rundt Brannfjell eller i Skulpturparken. På Ballsletta finner man flere aktiviteter som EKT ridesenter, minigolf og diverse andre muligheter for barna.Skoler og barnehager:Her bor man i trygge omgivelser med kort vei til barneskole, ungdomsskole og barnehager. Eiendommen ligger ca. 10 minutters gange fra Munkerud barneskole og ca. 30 minutters gange (eller 10-11 minutter med sykkel) fra Nordseter ungdomsskole. Det finnes flere videregående skoler i nærheten, som Holtet, Kongshavn og Lambertseter, samt et bredt utvalg av kommunale og private barnehager. Steinerskolen ligger ca. 2 kilometer fra boligen.Offentlig kommunikasjon:Her bor du med et godt utvalg av kollektivtilbud i nær omkrets, bestående av både buss, trikk, T-bane og tog. Nærmeste bussholdeplass ligger bare 200 meter fra eiendommen, noe som gir enkel tilgang til offentlig transport. Lambertseter senter og Oslo sentrum er godt innenfor rekkevidde via buss eller bil.
Mobil test
Mobil test
Jeg selger den for noen dager siden
500% Resource Increase on New Hosting Orders
500% Resource Increase on New Hosting Orders
We’re excited to share some great news!At YottaSrc, we are continuously working to deliver high-performance hosting solutions, and today we’re proud to announce a major upgrade to our hosting infrastructure. 500% Resource Increase on New Hosting OrdersWe have significantly increased resources by up to 500% for the following hosting services:cPanel HostingWordPress HostingAll Reseller Hosting PackagesEach hosting account now comes with dedicated resources per user, ensuring:Faster website performanceBetter stability under high trafficImproved overall reliability Important Note:These upgraded resources apply only to new orders. Existing packages will not be automatically affected. Upgrade Your Existing Package (No Downtime)If you would like to apply the new resources to your current hosting package, simply:Open a support ticket from your client areaRequest a package/resource upgradeOur technical team will review the request and, if eligible, upgrade your resources safely: No data loss No downtime All websites and files remain intact New Global DNS Partnership (IPv4 & IPv6)We’re also happy to announce our new partnership with ClouDNS, allowing us to deliver:Advanced DNS with IPv4 & IPv6Global access latency of 0.6 - 5 ms worldwideFaster DNS resolution and quicker site response timesThese DNS improvements are already applied to:Our nameserversNew serversWe are actively working to roll this out to all existing servers very soon, as part of our ongoing growth and commitment to customer satisfaction. Check Your New Resource AllocationYou can view detailed resource usage and allocations here: https://yottasrc.com/data/resource-usage/We remain committed to providing fast, secure, and high-performance hosting as we continue to grow with you.
SIMPL Specification
SIMPL Specification
1. Document StatusThis document is an independent Editor’s Draft published by the SSIMPL project. It is not affiliated with, endorsed by, or produced by the World Wide Web Consortium (W3C) or any W3C Working Group.This draft may change at any time and should not be considered a stable standard.No patent commitments are made through W3C or any standards organization.2. ConformanceAs well as sections marked as non-normative, all authoring guidelines, diagrams, examples, and notes in this specification are non-normative. Everything else in this specification is normative.The key words MAY, MUST, MUST NOT, and SHOULD in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.3. IntroductionThe internet has evolved rapidly, but with each iteration new challenges have emerged in protecting personal data. While legislation attempts to safeguard users’ rights, technical solutions are often necessary to prevent misuse and unauthorized access to sensitive information.Current authentication and authorization methods rely heavily on centralized providers. OpenID Connect flows and other single sign-on mechanisms place identity management in the hands of commercial services, which cannot always guarantee the trustworthiness or privacy of the credentials they issue.In contrast, physical-world identity verification relies on standardized, verifiable documents such as passports or driver’s licenses. Informal authorization uses signatures or initials, which provide contextually appropriate trust without centralized control. SSIMPL was designed to replicate these principles in the digital realm, providing self-sovereign, verifiable credentials while minimizing reliance on third-party intermediaries.4. OverviewThe SSIMPL protocol defines a Self-Sovereign Identity & Mondial Pseudonymous Ledger framework that allows individuals to maintain control over their digital identity while enabling verifiable credential issuance and revocation. It bridges physical trust anchors (e.g. ePassports) with digital identity systems, ensuring cryptographic verification without reliance on centralized authorities.SSIMPL addresses several key problems:Pseudonymous digital identity - tied to a physical identity.User control over digital identity – eliminating reliance on centralized identity providers.Verification of identities – ensuring online credentials correspond to real individuals using cryptographic proofs.Sharing of identity-related data - allowing secure and transparent sharing of dataThe protocol balances decentralization, peer authority, and (optional) server-assisted reconciliation for efficiency and availability. Everything is made to be deterministic by default, so no authorities whatsoever are required except the one that signed the Trust Anchor (TA).4.1 Identity Trust ModelSSIMPL identities are rooted in cryptographically verifiable credentials derived from Trust Anchors, such as government-issued ePassports. A valid wallet:MUST extract cryptographic material from a TAMUST perform necessary processes to verify chip authenticity. For example, an Active Authentication (AA) challenge.MUST extract and store all relevant claims and their proofs. See VCRThis ensures only owners of verifiable physical credentials can create valid DIDs.4.1.1 ConsiderationsIdentity is hard to verify by nature. Using a state-issued TA is not a perfect solution, but it\'s the best deterministic proof of (human) identity available at the moment.In transactions where a TA is used, there is often a final verification check done by comparing the photo on the document with the one providing the document. This verification step is the actual crucial part tying the document to the bearer. It is therefor recommended to implement something similar in a SSIMPL wallet. In case of the ICAO ePassport implementations, one could extract the raw bytes from the DG2 (the photograph on the document) and let the user take a picture of themselves. Using image-comparison algorithms/software, it would be possible to add this verification.4.2 Levels of AuthenticationSSIMPL DIDs can come in two forms: ephemeral and stable. The ephemeral DIDs are created from randomly selected BIP32 children keypairs from their respective stable parent BIP32 keypair. Whereas, their stable counterparts are based upon the actual parent keypairs OR by storing the path to the actual child keypair. The latter situation would give you the benefit of being able to decide for yourself what the scope/lifetime of a keypair would be.Level 0: ephemeral DID + TrustAnchorProof confirms human ownership (bot detection).Level 1: stable DID + TrustAnchorProof confirms human ownership (bot detection) and identifies owner spanning multiple sessions.Level 2: Level 0/1 + unverifiable attributes (e.g. the owners home address) requested via scope.Level 3: Level 2 + verifiable credentials requested via scope.These different levels allow people to authenticate themselves on several levels, depending on the context. Say a person would like to order a product from a website. Using SSIMPL, the webshop could request a certain scope of credentials (like a shipping address). The owner of the identity could then approve or disapprove this request. This flow is very similar to Open ID Connect, except that there is no need for a 3rd party.4.3 RolesIdentity The owner of the TA and user of the network.Wallet: The actual software responsible for encapsulating the owners TA.Peers: Mobile devices with the Wallet installed.Relay Peers: Servers that act both as Peers and distribution points, allowing other Peers to sync their ledger.5. The did:ssimpl MethodA SSIMPL DID captures several things: a public key used for signing tied to a verifiable identity and the network where the identity is registered. The significance of the signature can be as little as \'I am a human being and have signed this piece of data\', or as much as \'I am John Doe, age 39, and this is my DID\'. DIDs rely on the owners ability to restore them when necessary, with the use of the BIP39 mnemonic.5.1 DID SyntaxA did:ssimpl identifier has the following structure, conforming to the generic DID syntax defined in [DIDCORE]:ssimpl-did = \"did:ssimpl:\" ssimpl-specific-id\r\nssimpl-specific-id = Multibase( network-bytes || pk-bytes )\r\nnetwork-bytes = country-bytes subnetwork-byte node-byte\r\ncountry-bytes = 3ALPHA ; ICAO 9303 alpha-3 country code\r\nsubnetwork-byte = 1OCTET ; unsigned integer 0–255\r\nnode-byte = 1OCTET ; unsigned integer 0–255\r\npk-bytes = 33OCTET ; compressed secp256k1 public key\r\nThe method-specific identifier is a single Multibase-encoded opaque string. It encodes 38 bytes: 3 bytes of country code, 1 byte of subnetwork identifier, 1 byte of node identifier, and 33 bytes of compressed public key. No delimiters are used. Decoding is deterministic by fixed byte offset.Example 1: Example DIDdid:ssimpl:3vYhGpQrKmNxTfBwLsAeDcJqZiUoMbXnThe above identifier decodes to: country = NLD, subnetwork = 0, node = 3, public key = 02ab….5.2 Byte LayoutThe 38-byte payload prior to Multibase-encoding is laid out as follows:Offset012345 – 37FieldCountry (3 bytes)Subnetwork (1 byte)Node (1 byte)Public Key (33 bytes)ExampleNLD0x000x0302ab cd…The country code MUST be an ICAO 9303 [ICAO9303] alpha-3 code encoded as ASCII uppercase bytes. The subnetwork and node fields are unsigned 8-bit integers (range 0–255). The public key is a 33-byte compressed secp256k1 public key.5.3 Decoding AlgorithmGiven a did:ssimpl identifier, the following algorithm recovers the network coordinates and public key:Strip the did:ssimpl: prefix to obtain the method-specific identifier string.Multibase-decode the string to obtain a byte array. The result MUST be exactly 38 bytes. If not, the DID is malformed.Extract bytes[0..2] (inclusive) as the country code. Interpret as ASCII. The result MUST be a valid ICAO 9303 alpha-3 country code.Extract bytes[3] as the subnetwork identifier (unsigned integer).Extract bytes[4] as the node identifier (unsigned integer).Extract bytes[5..37] (inclusive) as the 33-byte compressed secp256k1 public key.5.4 Key DerivationThe keypair corresponding to a did:ssimpl identifier is derived using [BIP32] hierarchical deterministic key derivation. The seed is computed as:seed = HASH( mnemonic )\r\nDID keypair = BIP32( seed )\r\nWhere mnemonic is the user\'s secret mnemonic phrase, and HASH is a cryptographically secure hash function (SHA-256 or equivalent).For TA-backed identities, the mnemonic is additionally bound to the passport\'s AA public key:seed = HASH( mnemonic || HASH( aa_public_key ) )\r\nThis binding ensures that possession of the DID keypair implicitly attests possession of the corresponding passport material, without exposing the AA public key or mnemonic to any external party.NoteThe salt MUST be changed between identity rotation events to ensure that successive DIDs derived from the same mnemonic are computationally unlinkable.6. Network Addressing6.1 Network StructureSSIMPL networks are organized hierarchically by country and subnetwork. Each country identified by its ICAO 9303 alpha-3 code constitutes a top-level network. Large countries MAY be subdivided into subnetworks to bound ledger size on mobile devices.Every peer holds a complete copy of the ledger for their own network. No peer holds a privileged or partial role. Relay peers and wallet peers are structurally identical.A network SHOULD be sized such that its ledger remains manageable on a contemporary mobile device. A suggested ceiling is one million registered identities per subnetwork, corresponding to approximately 200 megabytes of ledger storage at maximum capacity. This is also where the subnetworks come into play. Each subnetwork can be used for one separate ledger. Depending on the identity you\'re interacting with, you either need your ledger AND theirs, or can keep using your own.6.2 DNS Addressing SchemeIndividual nodes are addressed using DNS subdomain names under the networks domain e.g. ssimpl.org. The addressing scheme is:<country>.<subnetwork>.<node>.<domain>\r\nWhere <country> is the lowercase ICAO 9303 alpha-3 country code, <subnetwork> is the decimal subnetwork number, and <node> is the decimal node number.Example 2: DNS address examplesnld.0.3.ssimpl.orgNetherlands, subnetwork 0, node 3.usa.4.12.ssimpl.orgUnited States, subnetwork 4, node 12.deu.0.0.ssimpl.orgGermany, subnetwork 0, node 0.A client wishing to reach any node within a given subnetwork MAY omit the node segment and resolve at the subnetwork level:<country>.<subnetwork>.ssimpl.org ; any node in subnetwork\r\n<country>.ssimpl.org ; any node in country\r\nDNS wildcard records SHOULD be configured to support these resolution patterns. The DNS infrastructure does not carry authoritative identity data; it serves only as a bootstrap mechanism for peer discovery.NoteCountry codes in DNS addresses are lowercase for compatibility with DNS conventions, while country codes within DID byte payloads are uppercase ASCII per ICAO 9303.6.3 Network Resolution from a DIDGiven a did:ssimpl identifier, the corresponding network and node are resolved as follows:Decode the DID per the algorithm in 5.3 Decoding Algorithm to obtain countryConstruct the DNS address: (start with 0 for subnetwork/node) lower(country).<subnetwork>.<node>.ssimpl.org.Resolve via DNS to obtain the peer\'s IP address and port.To query any peer in the same subnetwork (e.g. for ledger synchronisation), resolve lower(country).ssimpl.org.6.4 Network Segregation and Ledger SizeCountry-based network segregation provides a natural bound on ledger size. Peers overwhelmingly interact with others from the same country, meaning most peers need only one ledger. Additional ledgers are downloaded lazily on first encounter with a foreign DID and MAY be pruned after a configurable period of inactivity.For countries with populations where passport adoption would exceed the recommended per-subnetwork ceiling, additional subnetworks MUST be provisioned. Subnetwork assignment for new registrations SHOULD be load-balanced across available subnetworks within the country.Example 3: Ledger size estimatesAt 200 bytes per entry and a ceiling of one million identities:Netherlands (NLD): single subnetwork, ~200 MB at full capacity.United States (USA): requires multiple subnetworks at meaningful adoption; each subnetwork ~200 MB.6.5 Cross-Network VerificationWhen a peer encounters a DID from a foreign network, they MUST download the relevant subnetwork ledger before verifying the identity. Ledgers are cached locally and synchronized incrementally on subsequent interactions.A peer MAY pre-emptively download ledgers for networks they anticipate interacting with — for example, before international travel. Implementations SHOULD provide a mechanism for users to manage which ledgers are retained on their device.Ledger freshness is maintained by delta synchronisation: a peer requests only entries added since their last known ledger state. Full re-download is not required after initial acquisition.7. Wallet SpecificationThe wallet is a Self-Sovereign means of identification that can be installed and bootstrapped entirely independent of any authority. It solely relies on cryptographic proof. This cryptographic proof is contained within the so-called VCR. The Verifiable Credential Root is a VC, as defined in [VC], necessary to link the signer of this VC to the related public key & DID.The VCR can also be used as the root of a chain of VCs. This way it can, either explicitly or implicitly, verify association to other credentials further up in the chain.7.1 Wallet RequirementsWallets MUST:Extract cryptographic material from a Trust Anchor (TA).Support Active Authentication challenge verification.Derive a BIP32 keypair (as defined in [BIP32]), from the BIP39 mnemonic (as defined in [BIP39]).Present the BIP39 mnemonic to the owner. Note: the BIP39 mnemonic should be stored redundantly, preferably offline.Generate a fresh BIP32 keypair (as defined in [BIP32]).Store the master BIP32 private key in a secure storage section of their device (e.g. Apple Keychain, Android Keystore).Sign and manage the TA data.Generate (BIP32 child) DIDs compliant with did:key for interoperability.Support JWT issuance and asymmetric key exchange.Wallets SHOULD:Encrypt credentials for local storage.Extract and store additional VCs such as DG11 for user convenience.7.2 Wallet FunctionalityBefore any transaction, the Wallet MUST call either the Well-known Relay Peer, or one of it\'s known Relay Peers for the latest delta.If the Wallet is new, it must first be bootstrapped. Which means acquiring the full current Ledger. This is done by requesting delta\'s in chunks between epochs, starting with 0 (Unix Time). Until the Ledger is fully in place, the Wallet MUST NOT allow any transactions.Before any transaction, the Wallet MUST call either the Well-known Relay Peer, or one of it\'s known Relay Peers for the latest list of known Relay Peers.7.3 Wallet SecurityA SSIMPL Wallet has certain security scenario\'s that need to be addressedThe owners TA is lost/stolen: The owner MUST revoke their current TA - No transactions can take place until a new TA has been used to bootstrap.The owners device is lost/stolen: The owner MUST use their BIP39 mnemonic to restore their Wallet on a new device, then the owner MUST revoke their current DID and reinitialize their wallet. AND The owner MUST revoke their current TA through Delegated Revocation.The owners BIP39 mnemonic is lost/stolen: The owner MUST revoke their current DID and reinitialize their wallet. This will result in a double entry in respect to the same TA. But the \'older\' one will be automatically ignored.The owners BIP39 mnemonic AND TA is lost/stolen: The owner MUST use their BIP39 mnemonic to restore their Wallet on a new device, then the owner MUST revoke their current DID and reinitialize their wallet. AND The owner MUST revoke their current TA through Delegated Revocation.⚠️The owners BIP39 mnemonic AND TA is lost/stolen AND Delegated Revocation hasn\'t been configured: There is currently no way to come back from this scenario. Until the natural expiration of the used TA, a malicious actor could potentially impersonate the owner of the original Identity. SSIMPL implementations MUST therefore have a mandatory Delegated Revocation exchange flow.7.4 Delegated RevocationIn order to mitigate the scenario where the user has no access to their wallet anymore, SSIMPL offers a relatively straight-forward solution: two Peers (you and someone you trust, like a close relative) exchange a complete Revocation. In case of emergency, either Peer can always revoke the other Peers DID.7.5 Example activation ProcessUser installs wallet.Wallet prompts for MRZ line.NFC scan and extraction of passport data.Creation of Verifiable Credential Root (VCR).BIP39 mnemonic generation (and presentation to the user).BIP32 keypair derivation and storage.Signing of the TrustAnchorProof.(lazy) publication of the TrustAnchorProof to the network.8. Relay Peer SpecificationThe Relay Peer is a special kind of Peer in the sense that it is static and reachable over the internet on a fixed hostname. It acts like any other Peer, but it also adds a storage layer for the Ledger and serves as distribution point for the Ledger. All Relay Peers together form a subnetwork on which all other (mobile) Peers \'ride\'. This is purely infrastructural to help communication between Peers. It doesn\'t give any special privileges or authorities to any of the Relay Peers and does therefore still fulfill all requirements to be called decentralized.NoteAny network can use their own domainThe ring serves two distinct purposes:Bootstrap and discovery— any client or new Relay Peer can locate an active peer without prior knowledge, by traversing the ring until a responsive node is found.Exhaustive reconciliation— a client that detects ledger inconsistency can traverse the entire ring to collect and reconcile all known valid entries.Index gaps MAY occur when a Relay Peer goes permanently offline. Gaps are acceptable and do not affect ring traversal. Re-indexing is outside the scope of this specification.8.1 Relay Peer ResponsibilitiesReceive, validate and store new Registrations/Revocations.Propagate ledger changes to a minimum quorum of N = 3* other Relay Peers upon receiving a new valid ledger entry or revocation, using the traversal algorithm.Provide metadata about the ledger.Note*if N >= 3, otherwise the minimum quorum should just be N8.2 Relay Peer Bootstrap and VerificationTo enable deterministic network formation and secure onboarding of Relay Peers, the SSIMPL protocol defines a bootstrap and verification procedure.8.2.1 Relay Peer BootstrappingUpon first contact with the network:The DNS controller assigns the next available index and creates the corresponding DNS record {country}.{subnetworkIndex}.{nodeIndex}.ssimpl.org pointing to the new Relay Peer\'s hostname. Where the network index can be used to allow for multiple networks to co-exist.Requests delta\'s from one (or more) of the Relay Peers in the network in chunks based on the time between two epochs. Starting with 0 (Unix Time) if it has never been online and otherwise starting with the epoch it was last online.Index assignment is strictly sequential: the assigned index MUST equal the highest currently assigned index plus one. The DNS controller is the sole arbiter of index assignment.A newly registered Relay Peer MAY take several minutes to become discoverable via DNS, due to TTL propagation. This is acceptable behavior.9. Ring Traversal AlgorithmThe ring traversal algorithm is used for both peer discovery and gossip propagation. Given a node\'s own networkIndex n & nodeIndex i and the traversal purpose (discovery or propagation), a client or peer MUST traverse as follows:9.1 For discovery (finding any single responsive peer)Attempt contact with n.{i+1}.ssimpl.org.If unresponsive, assume end of ring and wrap to 0.ssimpl.org.Continue incrementally (1, 2, ...) until a responsive peer is found or all indices up to i have been exhausted.An unresponsive node MUST be skipped; it is not an error condition.9.2 For gossip propagation (pushing a ledger change)Beginning at {country}.n.{i+1}.ssimpl.org, push the change to each responsive peer in sequence.Count each successful push. If the minimum quorum of N = 3 successful pushes is reached, propagation is complete.If the end of the ring is reached before quorum is met, wrap to n.0.ssimpl.org and continue.If the full ring is exhausted without reaching quorum, propagation MUST still be considered complete — quorum is a best-effort guarantee.A peer that receives a pushed change via gossip MUST validate the entry before storing it, and *MUST NOT* re-propagate it (the originating peer is responsible for reaching quorum).10. Ledger SpecificationThe SSIMPL ledger is a deterministically canonical, peer-replicated structure tracking valid DIDs, maintained across Peers and Relay Peers.10.1 GoalsTrack valid DIDs without a central authority.Support bounded state and deterministic pruning.Enable single-peer verification.Eventual consistency via optional gossip or client/server reconciliation.Mobile-friendly operation for large ledgers (5–30 GB).10.2 State and Canonical ConstructionFilter expired entries based on did_expiry and GRACE_PERIOD.Normalize entries into canonical byte format.Sort lexicographically by did_expiry then by hash(did).Compute root_hash using a Merkle tree over the current, complete, pruned ledger.10.3 Merkle TreeThe SSIMPL ledger uses a Merkle tree to enable efficient verification of ledger state and individual entries.10.3.1 StructureLeaves: Hashes of canonical ledger entries. See LedgerEntryBranches: Hashes of concatenated child nodes.Root: root_hash representing the current canonical ledger state.
President Ahmed al-Sharaa
President Ahmed al-Sharaa
President Ahmed al-Sharaa said the deal would allow Syrian state institutions to reassert control over most areasThe Syrian government has announced an immediate nationwide ceasefire with the Kurdish-led Syrian Democratic Forces (SDF), taking almost full control of the country, Syrian state media says.The ceasefire ends nearly two weeks of fighting and forms part of a broader 14-point agreement that will see the SDF integrated into Syria's military and state institutions.Speaking in Damascus, President Ahmed al-Sharaa said the deal would allow Syrian state institutions to reassert control over three eastern and northern governorates - al-Hasakah, Deir Ezzor and Raqqa.It follows a meeting between al-Sharaa and the US special envoy to Syria, Tom Barrack, in Damascus. Barrack praised the agreement as a step toward a "unified Syria."SDF commander Mazloum Abdi was expected to attend the meeting but was unable to travel due to weather conditions, with his visit postponed until Monday, al-Sharaa said.In a televised address, Abdi confirmed the meeting and said he would share more details about the agreement with Syria's Kurds after returning from the capital.Speaking on Kurdish television channel Ronahi, he said the deal he had agreed to with Damascus included a ceasefire to avoid a broader war, stressing that the fighting had been "imposed" on the SDF.Kurdish-led forces established their autonomous administration during Syria's civil war, almost a decade ago, with strong backing from the United States, which armed and trained the SDF as its main local partner in the fight against the Islamic State group (Isis).With US military support, the SDF drove Isis from much of northeastern Syria and went on to govern both Kurdish and Arab-majority areas.Under the agreement, signed by al-Sharaa and Abdi, Syrian authorities will take over civilian institutions, border crossings and oil and gas fields that have underpinned Kurdish self-rule.SDF military and security personnel will be integrated into Syria's defence and interior ministries following vetting, while Damascus will assume responsibility for prisons and detention camps holding tens of thousands of foreign Isis fighters and their families.Damascus also reiterated pledges to recognise Kurdish cultural and linguistic rights, including giving Kurdish official language status and marking the Kurdish new year as a national holiday - the first formal recognition of Kurdish rights since Syria's independence from France in 1946.Kuridsh media reported that Abdi said the SDF remained committed to protecting what he described as the "achievements" and "specific characteristics" of the Kurdish-led administration in northeast Syria.The agreement also reaffirms Syria's participation in the US-led coalition against Islamic State.The deal follows months of stalled negotiations after a previous integration effort failed and comes after Syrian government forces moved into Raqqa and nearby oil facilities following an SDF withdrawal earlier on Sunday.Al-Sharaa said last week it was unacceptable for a militia to control a quarter of the country and hold its main oil and commodities resources.