...
- NA/EU meeting: 08:00-09:00 PT / 15:00-16:00 UTC
- TSWG Weekly APAC meeting: 18:00-19:00 PT / 01:00-02:00 UTC
See the Calendar of ToIP Meetings for exact meeting dates, times and Zoom links.
Zoom Meeting
...
Recording
- NA/EU Meeting: https://zoom.us/j/97402960831?pwd=dVdYRWNOOEE3a3ZpQXVLM1h5VFpUQT09
- TSWG Weekly APAC Meeting: https://zoom.us/j/96772881287?pwd=bzZUNXRhVUNzVjR2Z3B2cVVxc2ZUZz09
...
Attendees
Agenda Items and Notes (including all relevant links)
Time | Agenda Item | Lead | Notes | |||
3 min |
| Chairs |
| |||
2 min | Review of previous action items | Chairs |
| |||
5 mins | Update on the Identifier Traits topic | At our 2024-06-26 meeting, we discussed the topic of "Identifier Traits" raised at DICE raised by Jan Christoph Ebersbach (known as "JC"). See this Github Gist page for a summary. We agreed at that meeting that the TSPTF focus was on appraisability frameworks for dynamic appraisability of a VID, but that we would welcome work on a generalized set identifier traits that could feed into our appraisability framework. Drummond will give a brief updated on the Identifier Traits work going to the DIF Identifiers and Discovery Working Group co-chaired by Markus Sabadello. | ||||
40 mins | KERI example of dynamic risk assessment of a VID | Sam Smith | AllSam will present The slides Sam presented are here: https://github.com/SmithSamuelM/Papers/blob/master/presentations/KERI_Appraisal.pdf Some of the slides are also captures as screenshots #1 thru #9 below. Sam's presentation covered a lot of background about KERI architecture in order to build up to showing a use case for how real-time appraisal of a VID can work using KERI , highlighting why dynamic appraisability is important and how it enables a validator to make a live appraisal thereby protecting themselves from a compromised or malicious controller. | 5 mins | Any other business | In the Q&A, Sam clarified that key event logs (KELs) that use interaction events and key delegation are the ways that key management infrastructure can be scaled to millions of transactions in a short period. Sam explained how the current bearer-token-based code signing used by companies by Microsoft is subject to (and has been) compromised by an attack on a bearer token. With KERI key management, the exact key that was compromised (and the exact key controller) can be identified and recovered. Neil Thomson: "This suggests that on any interaction between VIDs (2 party) that they regularly perform a Live Assessment (e.g. once a day, every XX transactions)". Drummond agreed. |
5 mins |
| Chairs |
Screenshots/Diagrams (numbered for reference in notes above)
#1
...
#2
...
#3
...
#4
...
#5
...
#6
...
#7
...
#8
...
#9
#10
...
Decisions
- Sample Decision ItemNone
Action Items
- Sample Action ItemNone