Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

NOTE: These Zoom meeting links will be replaced by links to recordings of the meetings once they are available (usually by the end of the day of the meeting).

Attendees

NA/EU:

Image RemovedImage Added

APAC:

...

TimeAgenda ItemLeadNotes
3 min
  • Start recording
  • Welcome & antitrust notice
  • New member introductions
  • Agenda review
Chairs
  • Antitrust Policy Notice: Attendees are reminded to adhere to the meeting agenda and not participate in activities prohibited under antitrust and competition laws. Only members of ToIP who have signed the necessary agreements are permitted to participate in this activity beyond an observer role.
  • New Members:
2 minReview of previous action itemsChairs



20 minsReport-out on Internet Identity Workshop TSP sessionsWenjing Chu 

Wenjing Chu called one session each of the three days of IIW: 1) Overview, 2) Technical Deep Dive; 3) Implementations & Demo.

In the first session, Wenjing covered direct mode. In the second one, he covered routing mode. In the third, he showed the Rust implementation his team is working on and gave a short demo.

Most of the feedback was questions about higher level applications. One that was brought up was a way to prevent voice fraud on mobile calls. It could be implemented by telcos. Currently spoofing of phone numbers is widespread, so authentication needed to rely on voice recognition. AI is decimating the latter, so applying TSP could be a solution.

Social media is another application area. This is about the longstanding goal of building a decentralized social media platform.

Another area is personal data stores and wallets.

There was also discussion of how it would would fit into existing SSI/decentralized identity projects like ACA-PY.

Ed Eykholt asked about different VID types that Wenjing mentioned.

Wenjing Chu also said his TSP sessions led to several conversations that were outside the typical IAM focus that we often have at ToIP and at IIW. These areas included superapps and 3D content management and social media.

Ed Eykholt suggested that we might want to create a video series. Drummond Reed agreed. Judith Fleenor said there is discussion about how to make those videos for the ToIP Trust Canvas.

10 minsReport-out on IIW CESR 2.0 sessionSamuel Smith 

Some attendees thought Sam's session on CESR 2.0 was one of his best ever. Here are the slides he shared.

Sam said that even some in the KERI community were surprised about how performant KERI would be.

Judith Fleenor said that her main takeaway is that Sam has been "burying the lead" about the cost-efficiency of CESR's bandwidth savings. The second lead is the cryptographic agility of CESR and its ability to help us deal with quantum-proofing.

Eric Drury said that Sam highlighted a key takeaway for him was that it helped him answer questions about Web text comment. 

Darrell O'Donnell mentioned the Web Origin protocol.

20 minsThe case for a separate VID 1.0 specification

See this new GitHub discussion thread.

I took a crack at writing something up for VIDs about 5 months back. It might be outmoded, but still worth looking at: https://github.com/dgc-cgn/CAS-Digital-Trade-Documentation/blob/main/scheme/objects/obj-verifiable-identifier.md

5 mins
  • Review decisions/action items
  • Planning for next meeting 
Chairs

...