Meeting Date & Time

  •  
    • NA/EU 07:00-8:00 PT / 14:00-15:00 UTC 
    • APAC 1:00-2:00PM PT / 20:00-21:00 UTC

Zoom Meeting Recordings

Attendees

NA/EU

APAC

Main Goals of this Meeting

1) Highlights from IIW including from Wenjing's presentation on the ToIP stack, 2) Discussing how to incorporate Wenjing's reference architecture into the ToIP Technology Architecture Specification, 3) Planning for the next two week's meetings. 

Agenda Items and Notes (including all relevant links)

TimeAgenda ItemLeadNotes
5 min
  • Start recording
  • Welcome & antitrust notice
  • Introduction of new members
  • Agenda review
Chairs
  • Antitrust Policy Notice: Attendees are reminded to adhere to the meeting agenda and not participate in activities prohibited under antitrust and competition laws. Only members of ToIP who have signed the necessary agreements are permitted to participate in this activity beyond an observer role.
  • New Members:
5 minAnnouncementsAll

Updates of general interest to TATF members.

  • All the updates were about Internet Identity Workshop (see below).
5 minReview of previous action itemsChairs
  • ACTION: Drummond Reed to merge sections 3: Motivations and section 4: Canonical Uses Cases & Scope Limitations.
    • Wenjing will end out doing this in Working Draft 02 — see his action item at the end.
  • ACTION: Wenjing Chu to prepare slide deck for Internet Identity Workshop presentation on the ToIP Technology Stack.
15 minsHighlights from IIW including from Wenjing's presentation of the ToIP stack

The slide deck that Wenjing Chu presented (fabulously) is here

Key takeaways:

  • Very strong interest among the OpenID community about "incorporating" SSI and decentralized identity model.
  • Wenjing Chu felt that the reference model will be a good tool for the dialog with the OIDC community about interoperability. Our ToIP Technology Architecture Specification will give us a solid basis for that conversation and help us carefully evaluate the tradeoffs.
  • Wenjing also gave a session on Identity in the Age of AI that brought new concepts for how to think about identity that is more holistic and inclusive of the many different inputs and contexts of digital identity.
  • Sam Smith and the GLEIF team also gave several well-received presentations about KERI and ACDC credentials.
  • Drummond Reed explained that he helped Sam with an ACDC for Muggles presentation that had an audience of about 50 folks that finally "got" what ACDC was all about.
  • GLEIF brought their entire team and held a total of 12 sessions on all facets of what they are building and starting POCs for with vLEI infrastructure.

APAC

  • Samuel Smith agreed that ACDC credentials are now much better understood by IIW attendees.
    • The same for GLEIF and the sessions on vLEI.
    • Sam also co-hosted with Markus Sabadello a session called "Building a Tunnel to the KERI Beautiful Island" in which they showed exactly what a KERI tunnel looks like in a DID and DID document.
      • The session used the analogy is that KERI is a cookoo bird that lays its eggs in other bird's nests (other ledgers).
      • The phrase came that "KERI has trust issues" because KERI doesn't trust any discovery mechanism—you always verify a KERI AID via the key event log (KEL) no matter where you discover it.
    • Sam also gave a session on AI and ACDC that showed how you could publish a multi-criteria decision graph and prove you are using the same algorithm.
    • Richard Esplin hosted a session twice on KERI and ledgers. Sam verified that KERI is agnostic about roots of trust. So the session focused on how the AID controller could use a ledger as a witness pool, and the AID controller can move over time to other ledgers.
      • Sam explained how KERI witness pools work. They do a very simple form of consensus.
      • He then talked about how KERI watcher pools work. It is the same approach as Certificate Transparency.
      • Drummond Reed asked about the did:orb method and how it compares with KERI.
        • Sam pointed out that did:orb does not use multi-sig nor delegated identifiers.
        • did:orb does not do inbound verification, only outbound verification.
        • Sam was open to a conversation with the did:orb team for deeper exploration.
15 minsIncorporating Wenjing's reference architecture into the spec
  • Wenjing gave an overview of how the early sections of the current spec would be revised to explain the full reference architecture up front.
  • Also discuss another view of the reference architecture that Allan Thomson is preparing.

ACTION: Wenjing Chu will prepare Working Draft 02 of the ToIP Technology Architecture Specification including refactoring the early sections and incorporating his reference architecture diagrams.

10 minsTopics for the next 2 weeks meetingsAll
  • Darrell O'Donnell has requested a topic to discuss finalization of the ToIP Trust Registry Protocol Specification.
    • Darrell said that his team was able to convert the spec to Markdown.
    • Now they are processing the outstanding comments.
    • He would like to take roughly 20 mins in each of the two meetings of the TATF next week to review the comments on this spec.
    • The goal is to finalize V1 and put it up for the Steering Committee vote.
    • There is a growing realization in the market that trust registries will be required and that they will need to interoperate as peers—Drummond gave another example from Australia.
    • Darrell gave the example of a Canadian province that sees that they need to interoperate as peers with hundreds of others.
  • Neil Thomson has requested a topic to talk about the role of intermediaries.
    • There are several key ways in which two entities that have established trust can then involve intermediary.
    • This in particular will involve how data exchange is accomplished.
    • Antti Kettunen said he just had a discussion with the International Data Spaces people about the role of intermediaries in the exchange of data. The IDS people have "connectors of controllers" for managing that.
    • ACTION: Neil Thomson to chat with Wenjing about how intermediaries fit into the architecture—for example how the role that MyData defines as a "MyData operator" would fit.
  • Drummond Reed will most likely miss the next two meetings due to travel.

APAC call timeAll

We discussed that our APAC call time is currently too early.

DECISION: We will move our weekly APAC call to 6PM PT / 1:00-2:00 UTC / 11:00-12:00 AEST.


European Identity Conference prepJudith FleenorWe discussed prep for the European Identity Conference where Judith will moderate a panel for EIC.
5 mins
  • Review decisions/action items
  • Planning for next meeting 
Chairs

Next week's meeting agenda will include:

ACTION: Drummond Reed to prepare the Meeting Notes page in advance for next week's meeting (since he will need to miss it due to the European Identity Conference).

Decisions

  • DECISION: We will move our weekly APAC call to 6PM PT / 1:00-2:00 UTC / 11:00-12:00 AEST.

Action Items

  • ACTION: Wenjing Chu will prepare Working Draft 02 of the ToIP Technology Architecture Specification including refactoring the early sections and incorporating his reference architecture diagrams.
  • ACTION: Drummond Reed to prepare the Meeting Notes page in advance for next week's meeting (since he will need to miss it due to the European Identity Conference).


  • No labels