Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

TimeAgenda ItemLeadNotes
3 min
  • Start recording
  • Welcome & antitrust notice
  • New member introductions
  • Agenda review
Leads
  • Antitrust Policy Notice: Attendees are reminded to adhere to the meeting agenda and not participate in activities prohibited under antitrust and competition laws. Only members of ToIP who have signed the necessary agreements are permitted to participate in this activity beyond an observer role.
  • New Members:
2 minReview of previous action itemsLeads
  •  

    ACTION: Drummond Reed to start a Github discussion on the VID appraisability framework in section 2.1.5.

  •  

    ACTION: ALL TSPTF MEMBERS review the Github discussion once posted and decide if you want to contribute to the VID appraisability framework in section 2.1.5.

  •  ACTION: Wenjing Chu, in the subsection of Messages on nesting, to include the pattern of applying a source signature on the plain text first, before nesting, in order to support that requirement for legally valid digital signatures in certain jurisdictions.
10 minsReview Appraisability Framework discussionDrummond Reed See the opening post.
40 minsWorking Draft Progress ReviewWenjing Chu 

Draft text: https:// docs.google.com/document/d/1DsvAOGXlMFeE6tYlcaHlitoGLbWGfromRGrvR43zsgs


NA/EU:

Sam Smith suggested that the sender should not be optional in the baseline protocol. If it was necessary to have an optional sender, that could be an edge case that we could add later.

Wenjing and Drummond agreed. So we will make it required.

ACTION: Wenjing Chu to make sender VID required.

Wenjing next went over the message structure (see screenshots #__ - #__.

ACTION: Wenjing Chu to review section 3.4.1 to see about adding an optional signature on the plaintext within the ciphertext.

ACTION: Wenjing Chu to review section 3.4.2 to decide if the ciphertext block can be removed.

We discussed that there is no need for the innermost layer of nesting to be encrypted because it is already protected by at least one outer layer.

Sam Smith 

5 minsIIW Topic ProposalsAllDiscuss potential/planned TSPTF topics for Internet Identity Workshop next week.
5 mins
  • Review decisions/action items
  • Planning for next meeting 
LeadsNOTE: NO MEETINGS NEXT WEEK due to IIW.

...