...
NA/EU:
APAC:
...
Time | Agenda Item | Lead | Notes |
3 min |
| Chairs |
|
2 min | Review of previous action items | Chairs |
|
20 mins | Call for Implementations | Chairs | This is to discuss what implementation projects are underway and what others we might attract. Wenjing Chu began by sharing that his team is working on an open source implementation that they plan to contribute to the OpenWallet Foundation. He plans to have more info on the repos and project structure shortly. There is more info in the Internet Identity Workshop proceedings. ACTION: Wenjing Chu to post more information in our Slack channel after this meeting. The question before us is who else is interested in implementing and what development resources would be most helpful. For example, it is helpful to know which VID types there is demand for implementing. Wenjing's team is currently focused on did:web and its variants, plus did:peer. The other area of interest is trust task protocols: which of these are in highest demand:
Another area is transport protocols: which bindings are most needed? Which ones are most needing standardization & implementation (usually the latter is a good basis for the former). Samuel Smith said that he's working on a Python implementation and would welcome additional development resources. Wenjing Chu also mentioned interop test suites. Drummond Reed said this is an area he may be able to find resources. |
15 mins | Comparison of VID methods and other protocols | Chairs | This is another discussion that is helpful both for the spec and implementations. Suggestion: Use Github discussions to have one discussion per protocol. Judith Fleenor suggested then one blog post per "family" of other protocols, summarizing our conclusions. She suggested that it will be very helpful to compare TSP to protocols that are outside of digital identity. Wenjing Chu suggested that we start with digital identity & credential protocols for EIC. ACTION: Drummond Reed to start discussions on:
Samuel Smith explained the reasons for the security features in the ACDC protocols. A hash (SAID) of each transaction is added to a transaction event log which is signed to bind it to the key state. Each transaction event log is a secure chained. In the KERI stack, the TSP is a tunneling protocol that enables protection of confidentiality and metadata privacy. The authenticity comes via the VID type. The stronger the authenticity of the VID type, the stronger the security of the stack above it. Sam shared a statistic that, for every U.S. FBI agent, there are 50 cybersecurity attackers. |
15 mins | Switching to a bi-weekly meeting schedule | Chairs | Now that we are to Implementers Draft stage, we propose to switch to a bi-weekly meeting schedule and make more use of GitHub for asynchronous discussions. Bi-weekly meetings would focus primarily on issue resolution. ACTION ITEM: Drummond Reed to have Michelle update the schedule. |
5 mins |
| Chairs | If we agree to switch to bi-weekly meetings, the next meeting will be Wednesday May 15. Judith Fleenor suggests that during the month of May, let's use the alternate weeks to finish the second public review draft of the ToIP Technology Architecture Specification and update the ToIP website pages covering these artifacts. ACTION: Drummond Reed to share via Slack and the ToIP mailing list that two meetings in May will be devoted to finishing the second public review draft of the ToIP Technology Architecture Specification and updating the ToIP website pages covering these artifacts. |
Screenshots/Diagrams (numbered for reference in notes above)
...