Goal: define a stable cryptographic root for each identity that:
- hides all private data
- can evolve over time (updates, rotation, recovery)
- is cheap to verify on or off chain
1. Identity Object (conceptual)
5. State Evolution (Commitment Chain)
6. What Goes On-Chain vs Off-Chain