2023-06-14 TSPTF Meeting Notes

Meeting Date & Time

This Task Force meets three out of every four Wednesdays (the fourth Wednesday is the Technology Stack WG plenary meeting). There are two meetings each Wednesday to serve different time zones:

  • NA/EU meeting: 08:00-09:00 PT / 15:00-16:00 UTC
  • APAC meeting: 18:00-19:00 PT / 01:00-02:00 UTC

See the Calendar of ToIP Meetings for exact meeting dates, times and Zoom links.

Zoom Meeting Links / Recordings

Attendees

NA/EU:

APAC:

Agenda Items and Notes (including all relevant links)

TimeAgenda ItemLeadNotes
3 min
  • Start recording
  • Welcome & antitrust notice
  • New member introductions
  • Agenda review
Leads
  • Antitrust Policy Notice: Attendees are reminded to adhere to the meeting agenda and not participate in activities prohibited under antitrust and competition laws. Only members of ToIP who have signed the necessary agreements are permitted to participate in this activity beyond an observer role.
  • New Members:
5 minReview of previous action itemsLeads
  • ACTION: Oskar van Deventer to digest the feedback from today's discussion about engaging telcos in the work of developing the ToIP stack, and then continue this discussion in TSPTF discussion thread #16.
  • ACTION: Sam Smith to propose a strawman mapping of the ToIP principles to ToIP stack layers for next week's meetings.
  • ACTION: Drummond Reed to review the use cases that were prepared for the ToIP Technology Architecture Specification and compile a proposed list of canonical use cases for presentation at next week's meetings.
50 minsStrawman Mapping of ToIP Principles to LayersSam Smith 

Per the action item above, we agreed last week to dedicate this meeting to Sam's strawman mapping of the ToIP principles to ToIP stack layers. This is a deep topic, so expect the presentation and Q&A to take the whole meeting.

https://github.com/SmithSamuelM/Papers/blob/master/whitepapers/SPAC_Message.md
https://github.com/SmithSamuelM/Papers/blob/master/presentations/SPAC_Overview.web.pdf

Sam's opening point (screenshot #1) is the PAC theorem about the tradeoffs that usually end out trading off privacy.

His second point was about the two definitions of privacy (screenshot #2). Understanding the difference between data rights privacy with transmitted data vs. surveillance privacy which is to prevent unwanted correlation.

Sam provided some deeper definitions in screenshot #3.

In screenshot #4, Sam argues that the goal should be to avoid exploitation of correlatable identifiers, rather than trying to prevent correlation absolutely.

#5 shows the exploitation model.

#6 shows the ways the attacks that can be exploited.

#7 explains why AIDs are needed.

#8 shows how to provide end-to-end "viewability", which means that "detectability" is built into the protocol.

#9 puts a stake in the ground about the strongest space for confidentiality. 

#10 turns to the critical role of authenticity.

Sam also covered the types of cryptographic algorigthms & signature schemes that provide the strongest forms of authenticity.

We ran out of time to go further in the NA/EU call, so we agreed to continue Sam's presentation in the APAC meeting.

APAC Meeting:

Sam Smith picked up where he left off in the NA/EU meeting with the rest of his presentation. 

Screenshot #15 explains the syntax that Sam uses through his documentation of his proposed protocol.

The narrative of screenshots #16 through #21 is quite deep, so it was not feasible to capture it in these notes.

ACTION: ALL TSPTF MEMBERS: We highly recommend listening to the complete Zoom recordings of BOTH the NA/EU meeting and the APAC meeting in order to have a full understanding of Sam Smith's strawman protocol proposal. Note that this means an investment of 2.25 hours of listening time (or longer, as this is one set of recordings that you may actually wish to run at SLOWER than normal speed rather than faster). But it is worth listening to the entire recordings of both meetings to fully understand both the substance and the impact of what Sam is proposing.

The ultimate properties of the proposed protocol are summarized in slide #21:

  • Secure authenticity
  • Confidentiality
  • Correlation privacy
  • DDOS protection
  • Routing table protection

Everyone thanked Sam for his in-depth explanation of his complete strawman. This will bear serious study by the rest of the members of the task force (especially given that only four of us were able to join Sam for Part 2 in the APAC meeting — which is the part where Sam actually explains the protocol).

At the end of the meeting, we agreed on the following next step:

ACTION: Wenjing Chu to study the slides Sam presented and prepare his proposed next steps for our next regular meeting in 2 weeks (June 28).

2 mins
  • Review decisions/action items
  • Planning for next meeting 
LeadsNEXT WEEK IS THE TSWG PLENARY MEETING, so our next TSPTF meeting will be in 2 weeks, on Wednesday June 28.

Screenshots/Diagrams (numbered for reference in notes above)

#1


#2


#3


#4


#5


#6


#7


#8


#9


#10


#11

#12


#13


#14


#15


#16


#16


#17


#18


#19


#20


#21

Decisions

  • None

Action Items

  • ACTION: ALL TSPTF MEMBERS: We highly recommend listening to the complete Zoom recordings of BOTH the NA/EU meeting and the APAC meeting in order to have a full understanding of Sam Smith's strawman protocol proposal. Note that this means an investment of 2.25 hours of listening time (or longer, as this is one set of recordings that you may actually wish to run at SLOWER than normal speed rather than faster). But it is worth listening to the entire recordings of both meetings to fully understand both the substance and the impact of what Sam is proposing.
  • ACTION: Wenjing Chu to study the slides Sam presented and prepare his proposed next steps for our next regular meeting in 2 weeks (June 28).