...
Time | Agenda Item | Lead | Notes |
5 min |
| Chairs |
|
5 min | Announcements | All | Updates of general interest to TATF members.
|
5 min | Review of previous action items | Chairs |
|
15 mins | Canonical use cases and scope limitations for the V1 ToIP stack | All | Per the second action item above, we want to gather inputs about scope limitations for the first version of the ToIP stack.
|
20 mins | New Working Draft 01 of ToIP Technology Architecture Specification | Drummond Reed | Per the last action item above, Drummond has prepared a new version of the Google doc that is now a full Working Draft and started filling in content that needs review and feedback.
|
10 mins | Spanning layer discussion | This is to recap a discussion between Wenjing Chu and Sam Smith from last week—which Drummond listened to on the recording and has already reflected in the Working Draft 01 outline.
| |
APAC CALL ONLY | Chain-link confidentiality | Sam Smith | APAC CALL ONLY—Sam would like to explain the ACDC concept of chain-link confidentiality and how it provides a different type of privacy protection/preservation that selective disclosure and zero-knowledge proofs. Here is a link to the slides Sam presented (PDF).
ACTION: Sam Smith to post to the Meeting Notes and TATF Slack channel a link to his paper and/or slides on chain-link confidentiality. |
5 mins |
| Chairs | THERE ARE ONLY TWO MORE MEETINGS BEFORE Internet Identity Workshop (April 26-28). So the next two meetings will focus heavily on finishing a complete Working Draft of the ToIP Technology Architecture Specification so we can be ready to present it at IIW. |
...