Summary:
Excerpt |
---|
|
...
Examples of types of actions that are prohibited at Linux Foundation meetings and in connection with Linux Foundation activities are described in the Linux Foundation Antitrust Policy available at http://www.linuxfoundation.org/antitrust-policy . If you have questions about these matters, please contact your company counsel, or if you are a member of the Linux Foundation, feel free to contact Andrew Updegrove of the firm of Gesmer Updegrove LLP, which provides legal counsel to the Linux Foundation.
...
Related Meetings Review
- Ursa -
- Semantics - Next meeting: Never - transitioning to be in the ToIP Foundation - see RocketChat channel for details and how to join the successor group
- DID UX Call - Active?
- SSI in IoT WG
- Indy Contributors - Every 2nd Tuesday 8am US/Pacific - Monitoring Indy
- Identity WG / Identity WG Implementer calls (Wed / Thurs) - This week! 9 am US/Mountain
- DIF DIDComm WG - Monday's at Noon US/Pacific - Sam Curren (Mon) - DID Doc services, etc.
...
- Intro and project updates (Sam Curren - 20 min)
- Aries Storage (Andrew Whitehead - 30 min)
- Reuse as part of OOB (Sam Curren)
- Credential Replacement_id (Sam Curren)
- Open Discussion / Next Week Topics / Wrap Up (5 min)
Next Week
- Requests?
- Credential Exchange Load testing - Thomas Shelton
- Tracing Discussion. Warpage Prevention?
Future Topics
- Migrating to new JWE envelope format: https://github.com/hyperledger/aries-rfcs/issues/478
- DKMS status
- Credential Fraud: Example how in ACA-Py to verify same link secret across multiple credentials in presentation
- Schema interop - how to reuse a schema across different networks Robert Mitwicki(RFC in progress)
- Using WebSocket as a way to communicate back to the mobile/desktop wallet (Agent (services or user) as a proxy for communication between service and digital wallet) Robert Mitwicki
...