...
- NA/EU meeting: 08:00-09:00 PT / 15:00-16:00 UTC
- TSWG Weekly APAC meeting: 18:00-19:00 PT / 01:00-02:00 UTC
See the Calendar of ToIP Meetings for exact meeting dates, times and Zoom links.
Zoom Meeting
...
Recording
- NA/EU Meeting: https://zoom.us/j/97402960831?pwd=dVdYRWNOOEE3a3ZpQXVLM1h5VFpUQT09
- TSWG Weekly APAC Meeting: https://zoom.us/j/96772881287?pwd=bzZUNXRhVUNzVjR2Z3B2cVVxc2ZUZz09
NOTE: These Zoom meeting links will be replaced by links to recordings of the meetings once they are available (usually by the end of the day of the meeting).
Attendees
Attendees
Agenda Items and Notes (including all relevant links)
Time | Agenda Item | Lead | Notes | |||
3 min |
| Chairs |
| |||
2 min | Review of previous action items | Chairs |
| |||
5 mins | Update on the Identifier Traits topic | At our 2024-06-26 meeting, we discussed the topic of "Identifier Traits" raised at DICE raised by Jan Christoph Ebersbach (known as "JC"). See this Github Gist page for a summary. We agreed at that meeting that the TSPTF focus was on appraisability frameworks for dynamic appraisability of a VID, but that we would welcome work on a generalized set identifier traits that could feed into our appraisability framework. Drummond will give a brief updated on the Identifier Traits work going to the DIF | ID WGIdentifiers and Discovery Working Group co-chaired by Markus Sabadello. | |||
40 mins | KERI example of dynamic risk assessment of a VID | Sam Smith Sam will present | AllThe slides Sam presented are here: https://github.com/SmithSamuelM/Papers/blob/master/presentations/KERI_Appraisal.pdf Some of the slides are also captures as screenshots #1 thru #9 below. Sam's presentation covered a lot of background about KERI architecture in order to build up to showing a use case for how real-time appraisal of a VID can work using KERI , highlighting why dynamic appraisability is important and how it enables a validator to make a live appraisal thereby protecting themselves from a compromised or malicious controller. | 5 mins | Any other business | In the Q&A, Sam clarified that key event logs (KELs) that use interaction events and key delegation are the ways that key management infrastructure can be scaled to millions of transactions in a short period. Sam explained how the current bearer-token-based code signing used by companies by Microsoft is subject to (and has been) compromised by an attack on a bearer token. With KERI key management, the exact key that was compromised (and the exact key controller) can be identified and recovered. Neil Thomson: "This suggests that on any interaction between VIDs (2 party) that they regularly perform a Live Assessment (e.g. once a day, every XX transactions)". Drummond agreed. |
5 mins |
| Chairs |
Screenshots/Diagrams (numbered for reference in notes above)
#1
...
#2
...
#3
...
#4
...
#5
...
#6
...
#7
...
#8
...
#9
#10
...
Decisions
- Sample Decision ItemNone
Action Items
- Sample Action ItemNone