In many applications, identity management (IdM) is used to associate a subject public key with an endpoint at which the can be contacted (telephone number, email, etc.). decentralized applications based on distributed ledger technologies (DLTes), it desirable for IdM as well. Currently, endpoints are either verified by who needs it, impractical in DLT-based or centralized authority, contrasts s...