Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Notes from the APAC Meeting are recorded in the Table below in green text

Attendees: sankarshan 

2022-06-06 SSI HARMS BGBU TF USA/EU TF Meeting

...

TimeItemLeadNotes
5 min

Welcome & antitrust notice

Agenda review

Nicky

Antitrust Policy Notice: Attendees are reminded to adhere to the meeting agenda and not participate in activities prohibited under antitrust and competition laws. Only members of ToIP who have signed the necessary agreements are permitted to participate in  this activity beyond an observer role.

5minUpdates & New Intro'sNicky

There is now a terms wiki and we should use a # for SSI Harms  =  #harm #harmtf  (see conventions)

Note film is being scheduled related to digital ID & vulnerable communities - relates to harms of centralized systems could be good alignment & shows importance of harms paper

45minReview APAC discussion & Agree next steps

for discussion see this Miro Board

NEW (Google Slides): https://docs.google.com/presentation/d/1Y404nJpSOkJFK5pc2aYUmJtrXtCkwcx-eIMC9ZMC0DU/edit?usp=sharing

Phil has transferred to a G-DOC https://docs.google.com/document/d/151cqN0HY-ECmGwcS_SSBCeCHtszuwGyQebLRJq8sODA/edit?usp=sharing which contains the same material but in a doc format

Johari window = personal psychology version of Rumsfeld  https://www.communicationtheory.org/the-johari-window-model/

Kaliya Young Problem w/AI is it makes the blind spot big and run by computers - 

Darrell O'Donnell Identification & ID Systems

Nicky Hickman - differentiate between identification & identity - problem of exacerbation

Kaliya Young DISCO - fun SSI party approach - build your own avatar in the metaverse - new market niches in SSI - we need more diversity like this in SSI than just Gov use cases 

Participatory design approach - use of on the ground communities to prioritise our work and give us case studies / persona's, will help us with prioritization and be more practical for implementers.

Many implementations are social networks backed by identity implementations - could have same problems as other social networks - always malicious actors - so how do we strengthen n/w's already to reduce risks of vulnerability associated with bad actors

5minsAOBNicky

Schedule - 

Nicky writing week in next 2  draft for assiging sections & building on by mid june

Draft for internal review by end July

Aim to publish in September

Agreed

2022-05-26 BGBU APAC TF Meeting

...