...
Main Goal of this meeting: Approval of Harms Paper, Progress with IPTF
Attendees: Judith Fleenor Ryan Koble Keerthi Thomas Andrew Slack Bentley Farrington
Time | Item | Lead | Notes |
5 mins |
| Andrew |
|
10 mins | Intro's & Updates | Andrew | Keerthi Thomas a new attendee Co-chair of GSWG, I work as a Senior Technologist for a UK Government funded innovation lab. I specialise in SSI especially in implementing and solving real world problems, I am interested in this group because SSI systems are often developed by software engineers for end-users who may not be technically savvy. I am interested in the human angle this TF is focusing on. I really appreciate you. |
5mins | Harms Paper approval | Nicky | no additional comments or suggested changes to text https://trustoverip.org/wp-content/uploads/Overcoming-Human-Harm-Challenges-in-Digital-Identity-Ecosystems-V1.0-2022-11-16.pdf except that it has an incorrect glossary. a finalised paper with corrected glossary. a short cheat sheet : Practical Steps for Overcoming Human Harm Challenges in Digital Identity Ecosystems. Discussion: how to publish the cheat sheet; - Andrew Slack and Judith Fleenor suggested publishing together. Judith Fleenor commented that both would be published together Nicky Hickman to add cover sheet and add to template and then ensure that permalinks align, double check 1.1 and change permalink, send both to steering committee, send ASAP. DECISION: Approved y/n to send to Steering Committee for 24/05 Plenary ? APPROVED following CC meeting is last week May and so send blog to CC for 26th. Judith Fleenor recommended publishing a blog once approved & published. Send to SC ASAP. |
35mins | Interaction Patterns Task Force | All |
In this call, are there others that any want to bring to the table? Scenarios which create interactions or patterns that we're not used to. e.g. no QR codes!? In person and remote actions e.g. in air traveler scenario, travelling with minors / children and introducing guardianship Keerthi Thomas commented that he would put in some of the use cases he's working on. EG drone pilot use case, had a human angle but other use cases e.g. in context of supply chain. Right now avoiding enterprise wallets. But definitely returning to this. Nicky Hickman suggested looking at a coming of age IP, e.g. become personally liable for their own data. In HX is a rite of passage, in governance requires different applications of policy. Keerthi Thomas recalled 'redbook' conversation, is in UK assigned to every child, records vaccinations and health milestones. Especially important for those in care, until 16 years of age then transferred to ownership of individual. What Keerthi implemented was also family artifacts including photo's especially. Included handover of care from social security worker who acts in the role of the guardian, is constantly changing. EG Birth certificates as credentials in the wallet, how are they transferred from 1 social worker to another; (Multiple guardians). Andrew Slack agreed needed to be examined. Nicky Hickman also suggested looking at death of the individual. Keerthi Thomas commented, guardianship for those w/dementia, also guardianship for data about a deceseased individual? Handover of controller, no facility at the moment for multi-party control. This is where KERI can play incl. key rotation Bentley Farrington also commented non-human use cases e.g. animals/ pets, fewer legal frameworks make it interesting challenge. Also interested in self-attested credentials e.g. within self-organizing social groups. Ryan Koble Migratory farm worker scenario's will consider. Andrew Slack commented IP interesting w/ different ecosystems credentials attempting to communicate. e.g. different languages all please update those patterns in the Miro board, otherwise in Friday sessions we'll start expanding on those and walk through tasks to map the patterns. ` |