Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

...

Rohit Shitre - Working with AyanWorks as a blockchain developer. Working on HL Indy. 

Tony Bellan

Recording

audio

video

Minutes

Anti-trust Policy and Code of Conduct

...

How do you protect on-chain in a DLT. As soon as I give a pairwise pseudo-anonymous channel - we're off-chain and in a different domain. That's any Identity management domain. Rife with leak problems.


Image AddedImage Added

Image Added

Certain headings, if you go to Consumer Rights and Business Obligations - all are present in one form or another. Some laws do not protect certain items. Say all going to be implemented in Identity and Access Management Systems and we are the 'glue'. 

If a customer wants access to collect data and ask for it - lots of ideas with cryptography, zero knowledge proofs, etc. Need to discuss what is stored and not in the ledger. Do we need a ledger? The accumulator and transaction audits. The accumulator keeps track of valid verifiable credentials and revoked verifiable credentials.

SSI - what is the latest state of DIDs and SSI technology including Indy, Aries, and other associated. 

End of meeting.