1) Highlights from IIW including from Wenjing's presentation on the ToIP stack, 2) Discussing how to incorporate Wenjing's reference architecture into the ToIP Technology Architecture Specification, 3) Planning for the next two week's meetings.
Agenda Items and Notes (including all relevant links)
Time
Agenda Item
Lead
Notes
5 min
Start recording
Welcome & antitrust notice
Introduction of new members
Agenda review
Chairs
Antitrust Policy Notice:Attendees are reminded to adhere to the meeting agenda and not participate in activities prohibited under antitrust and competition laws. Only members of ToIP who have signed the necessary agreements are permitted to participate in this activity beyond an observer role.
New Members:
5 min
Announcements
All
Updates of general interest to TATF members.
All the updates were about Internet Identity Workshop (see below).
5 min
Review of previous action items
Chairs
ACTION:Drummond Reed to merge sections 3: Motivations and section 4: Canonical Uses Cases & Scope Limitations.
Wenjing will end out doing this in Working Draft 02 — see his action item at the end.
ACTION: Wenjing Chuto prepare slide deck for Internet Identity Workshop presentation on the ToIP Technology Stack.
15 mins
Highlights from IIW including from Wenjing's presentation of the ToIP stack
The slide deck that Wenjing Chu presented (fabulously) is here.
Key takeaways:
Very strong interest among the OpenID community about "incorporating" SSI and decentralized identity model.
Wenjing Chu felt that the reference model will be a good tool for the dialog with the OIDC community about interoperability. Our ToIP Technology Architecture Specification will give us a solid basis for that conversation and help us carefully evaluate the tradeoffs.
Wenjing also gave a session on Identity in the Age of AI that brought new concepts for how to think about identity that is more holistic and inclusive of the many different inputs and contexts of digital identity.
Sam Smith and the GLEIF team also gave several well-received presentations about KERI and ACDC credentials.
GLEIF brought their entire team and held a total of 12 sessions on all facets of what they are building and starting POCs for with vLEI infrastructure.
APAC
Sam Smith agreed that ACDC credentials are now much better understood by IIW attendees.
The same for GLEIF and the sessions on vLEI.
Sam also co-hosted with Markus Sabadello a session called "Building a Tunnel to the KERI Beautiful Island" in which they showed exactly what a KERI tunnel looks like in a DID and DID document.
The session used the analogy is that KERI is a cookoo bird that lays its eggs in other bird's nests (other ledgers).
The phrase came that "KERI has trust issues" because KERI doesn't trust any discovery mechanism—you always verify a KERI AID via the key event log (KEL) no matter where you discover it.
Sam also gave a session on AI and ACDC that showed how you could publish a multi-criteria decision graph and prove you are using the same algorithm.
Richard Esplin hosted a session twice on KERI and ledgers. Sam verified that KERI is agnostic about roots of trust. So the session focused on how the AID controller could use a ledger as a witness pool, and the AID controller can move over time to other ledgers.
Sam explained how KERI witness pools work. They do a very simple form of consensus.
He then talked about how KERI watcher pools work. It is the same approach as Certificate Transparency.
Drummond Reed asked about the did:orb method and how it compares with KERI.
Sam pointed out that did:orb does not use multi-sig nor delegated identifiers.
did:orb does not do inbound verification, only outbound verification.
Sam was open to a conversation with the did:orb team for deeper exploration.
15 mins
Incorporating Wenjing's reference architecture into the spec
Darrell said that his team was able to convert the spec to Markdown.
Now they are processing the outstanding comments.
He would like to take roughly 20 mins in each of the two meetings of the TATF next week to review the comments on this spec.
The goal is to finalize V1 and put it up for the Steering Committee vote.
There is a growing realization in the market that trust registries will be required and that they will need to interoperate as peers—Drummond gave another example from Australia.
Darrell gave the example of a Canadian province that sees that they need to interoperate as peers with hundreds of others.
Neil Thomson has requested a topic to talk about the role of intermediaries.
There are several key ways in which two entities that have established trust can then involve intermediary.
This in particular will involve how data exchange is accomplished.
Antti Kettunen said he just had a discussion with the International Data Spaces people about the role of intermediaries in the exchange of data. The IDS people have "connectors of controllers" for managing that.
ACTION: Neil Thomson to chat with Wenjing about how intermediaries fit into the architecture—for example how the role that MyData defines as a "MyData operator" would fit.
Drummond Reed will most likely miss the next two meetings due to travel.
APAC call time
All
We discussed that our APAC call time is currently too early.
DECISION: We will move our weekly APAC call to 6PM PT / 1:00-2:00 UTC / 11:00-12:00 AEST.
Neil Thomson to share his thoughts about the role of intermediaries.
ACTION: Drummond Reed to prepare the Meeting Notes page in advance for next week's meeting (since he will need to miss it due to the European Identity Conference).
Decisions
DECISION: We will move our weekly APAC call to 6PM PT / 1:00-2:00 UTC / 11:00-12:00 AEST.
ACTION: Drummond Reed to prepare the Meeting Notes page in advance for next week's meeting (since he will need to miss it due to the European Identity Conference).