Summary:
Excerpt |
---|
Planned Topics:
|
Recordings from the call:
- Full Meeting: 20220503 ACA-Pug Community Call Recording.mp4dummyfile.txt
- Extracted segments:
- Chat:
08:24:10 From Timo Glastra : In addition to the allow list for connections, having an allow list for dids would also be useful (in an application we're building we do it based on did)
08:29:51 From Colton Wolkins : Will take a deeper look into what's there and what the requirements currently are. Thank you for starting the project!
08:34:12 From Colton Wolkins : My biggest concern with authentication is a problem that Discord has with their QR Code system. I look forward to see how everything pans out in the future
08:41:07 From Paul Wenzel : https://github.com/hyperledger/aries-cloudagent-python/issues/1743
08:46:09 From Fabio Tagliaferro : The JSON-LD Credentials in ACA-Py tutorial lacks the Present Proof section https://github.com/hyperledger/aries-cloudagent-python/blob/main/JsonLdCredentials.md#present-proof
In case, I would be happy to contribute to improve the tutorial with the missing sectionThis could be an alternative to follow https://github.com/hyperledger/aries-cloudagent-python/blob/main/demo/AliceWantsAJsonCredential.md
But I found it confusing with some endpoints that I cannot find in a non-demo ACA-py agent
Namely: /issue-credential-2.0/send-offer and /request-presentation-2.0/request-proofIn the meanwhile, could you please link some useful resources to use the BBS+ credential for a verifiable presentation?
08:51:29 From Colton Wolkins : I'm not 100% certain if revocation entries are endorsed ATM. I'd have to double check
08:53:10 From Ian Costanzo : It’s configurable by ledger
08:53:48 From Ian Costanzo : By default the tails file location and the original accumulator has to be endorsed, but when crews are revoked and the updated accumulator is written that doesn’t need to be endorsed
08:54:03 From Wade Barnes : Currently on most networks rev_reg_entries do not need to be endorsed, however there is nothing stopping a network from enforcing the rule, so we've decided to have the ability to send all transactions through an endorser.
08:54:29 From Colton Wolkins : Right x3
08:55:01 From Colton Wolkins : I just don't remember seeing signatures on the Revocation records the last time I was playing with Author/Endorser
Hyperledger is committed to creating a safe and welcoming community for all. For more information please visit the Hyperledger Code of Conduct. |
---|
Welcome and Introductions
...
- Stephen Curran (Cloud Compass Computing Inc.) <swcurran@cloudcompass.ca>
- Timo Glastra (Animo Solutions) <timo@animo.id>
- Frostyfrog(Indicio) <colton@indicio.tech>
- Char Howland (Indicio PBC) <char@indicio.tech>
Announcements
Deployments and Work Updates
...