Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

This page contains the meeting agendas and notes for the ACDC Task Force.

No Meeting April 16th 2024.

Next Meeting:

20232024-1005-17 14 KERI/ACDC Meeting Notes

Last Meeting:

20232024-1005-03 07 KERI/ACDC Meeting Notes

...

Meetings

Children Display
sorttitle
reversetrue

...

Then click here (not yet) → https://wiki.trustoverip.org/display/HOME/2023+ACDC+Index+of+Meeting+Notes+and+Recordings  
Click "Create", enter the title of "YYYY-MM-DD ACDC Meeting Notes" and paste the template.

Future Topics:

  •  IPEX Specification
  •  How ACDCs can be included with the Linux Foundation Open Wallet
  •  Linux Foundation Open Wallet Initiative  https://github.com/openwallet-foundation
  •  AnonCreds as a separate library
  •  SKWA Signify ACDC authorizations access control
  •  EGF of vLEI
  •  ACDC Validation Bundling - From validating signature, chains and schema all the way up the business logic stack
  •  IOT and KERI and ACDC
  •  Revisit BADA-RUN
  •  Next IIW - tickets/game for next IIW
  •  Revocation approach
  •  

    From Drummond Reed:

     - There is a very active thread on the DID Core spec right now discussing the issues around DID subjects being different from DID key controllers.

           I'd love to get the ACDC TF's view on if and how KERI addresses those issues. https://github.com/w3c/did-core/issues/83
  • Show the dependencies among the specs and mini specs.
  •  First steps in doing a CESR/KERI/ACDC implementation
  •  Review enhancement to fractionally weighted threshold
  •  Inflection point in the Cyber Security Battle
  •  User Experience
    •  OOBI exchanges
  •  Watcher Network
  •  Fido2 integration
  •  Where to store rotation keys?  From meeting chat:

    "we don’t have a recommendation about storing and generating pre-rotation keys. If we are generating and storing pre-rotation keys on same system that is generating signing keys, and if an attacker can compromise signing keys, the attacker can very easily compromise rotation keys as well"

  •