Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 16 Current »

Summary:

DID Comms Envelopes, Encryption, and Transports

Note: This call is Recorded. Recordings posted at the bottom of the page.

Date

Anti-Trust Policy:

Linux Foundation meetings involve participation by industry competitors, and it is the intention of the Linux Foundation to conduct all of its activities in accordance with applicable antitrust and competition laws. It is therefore extremely important that attendees adhere to meeting agendas, and be aware of, and not participate in any activities that are prohibited under applicable US state, federal or foreign antitrust and competition laws.

Examples of types of actions that are prohibited at Linux Foundation meetings and in connection with Linux Foundation activities are described in the Linux Foundation Antitrust Policy available at http://www.linuxfoundation.org/antitrust-policy. If you have questions about these matters, please contact your company counsel, or if you are a member of the Linux Foundation, feel free to contact Andrew Updegrove of the firm of Gesmer Updegrove LLP, which provides legal counsel to the Linux Foundation.

Hyperledger Code of Conduct

Attendees

NameOrganizationEmail
Cloud Compass Computing/BC Govswcurran@cloudcompass.ca
Mattr Globalindy@kyledenhartog.com
Troy RondaSecureKey Technologiestroy.ronda@securekey.com
Sam CurrenSovrin Foundationsam@sovrin.org
Matthew HailstoneBYUmatthew_hailstone@byu.edu
George AristySecureKey Technologiesgeorge.aristy@securekey.com
Albert SolanaValidated Idalbert.solana@validatedid.com
Audrius Ramoska123c Consultingaudrius@123c.eu
Paul KnowlesDativapaul.knowles@dativa.com
Markus SabadelloDanube Techmarkus@danubetech.com
Nathan GeorgeSovrin Foundationnathan@sovrin.org
Tobias LookerMattrtobias.looker@mattr.global
Steve Graber Unfolding Technologysteve.graber@unfolding.technolgy
Alexi FalquierSpaceman IDalexis@spaceman.id
Adam BurdettSovrin Foundationadam@sovrin.org
Drummond ReedEvernym & Sovrin Foundationdrummond.reed@evernym.com
Nader HelmyDanube Technader.helmy@danubetech.com

























Announcements

Agenda

ItemWhoNotes
Welcome / IntroductionsStephen Curran
Envelopes
(15 min)
Tobias Lookerhttps://github.com/hyperledger/aries-rfcs/blob/master/concepts/0021-didcomm-message-anatomy/README.md
Encrypted Envelopes
(25 min)
Kyle Den Hartoghttps://github.com/hyperledger/aries-rfcs/blob/master/features/0019-encryption-envelope/README.md

DIDComms Transports

(15 min )

Sam Currenhttps://github.com/hyperledger/aries-rfcs/pull/25
DIDCom over XMPP - new draft HIPE
(10 min)

Oskar van Deventer (TNO)

Alexander Blom (Bloqzone)

https://github.com/Oskar-van-Deventer/indy-hipe/tree/didcom-over-xmpp/text/didcom-over-xmpp

Purpose: have DIDCom messages traverse firewalls.

Discussion

-Use DID in of XMPP address for better privacy?

-Fast XMPP service endpoint rotation for even more privacy?




Open Discussion


Next Week

Connection Initiate Protocol - Sam Curren

Techniques for creating unified Mobile Agent links - Tomislav Markovski  

Protocols - Daniel Hardman

Future Topics



Action items

Call Recording

  File Modified



  • No labels