...
NOTE: These Zoom meeting links will be replaced by links to recordings of the meetings once they are available (usually by the end of the day of the meeting).
Attendees
NA/EU:
APAC:
...
Time | Agenda Item | Lead | Notes |
3 min |
| Chairs |
|
2 min | Review of previous action items | Chairs |
|
20 mins | Report-out on Internet Identity Workshop TSP sessions | Wenjing Chu | Wenjing Chu called one session each of the three days of IIW: 1) Overview, 2) Technical Deep Dive; 3) Implementations & Demo. In the first session, Wenjing covered direct mode. In the second one, he covered routing mode. In the third, he showed the Rust implementation his team is working on and gave a short demo. Most of the feedback was questions about higher level applications. One that was brought up was a way to prevent voice fraud on mobile calls. It could be implemented by telcos. Currently spoofing of phone numbers is widespread, so authentication needed to rely on voice recognition. AI is decimating the latter, so applying TSP could be a solution. Social media is another application area. This is about the longstanding goal of building a decentralized social media platform. Another area is personal data stores and wallets. There was also discussion of how it would would fit into existing SSI/decentralized identity projects like ACA-PY. Ed Eykholt asked about different VID types that Wenjing mentioned. Wenjing Chu also said his TSP sessions led to several conversations that were outside the typical IAM focus that we often have at ToIP and at IIW. These areas included superapps and 3D content management and social media. Ed Eykholt suggested that we might want to create a video series. Drummond Reed agreed. Judith Fleenor said there is discussion about how to make those videos for the ToIP Trust Canvas. |
10 mins | Report-out on IIW CESR 2.0 session | Sam Smith | Some attendees thought Sam's session on CESR 2.0 was one of his best ever. Here are the slides he shared. Sam said that even some in the KERI community were surprised about how performant KERI would be. Judith Fleenor said that her main takeaway is that Sam has been "burying the lead" about the cost-efficiency of CESR's bandwidth savings. The second lead is the cryptographic agility of CESR and its ability to help us deal with quantum-proofing. Eric Drury said that Sam highlighted a key takeaway for him was that it helped him answer questions about Web text comment. Darrell O'Donnell mentioned the Web Origin protocol. |
20 mins | The case for a separate VID 1.0 specification | See this new GitHub discussion thread. I took a crack at writing something up for VIDs about 5 months back. It might be outmoded, but still worth looking at: https://github.com/dgc-cgn/CAS-Digital-Trade-Documentation/blob/main/scheme/objects/obj-verifiable-identifier.md | |
5 mins |
| Chairs |
...