Summary:
- Work updates
- IIW32 - recap
- Why W3C VC Data Model is not "secure" - (JSON-LD/RDF end state) https://hackmd.io/rnY5xiXESWqWBlyDPHDorA?edit
- Open Discussion (as time permits)
Note: This call was recorded and the recording and chat transcript are at the bottom of the page.
Date
(7AM Los Angeles, 10AM New York, 3PM London, 4PM CET, 18H Moscow)
Hyperledger is committed to creating a safe and welcoming community for all. For more information please visit the Hyperledger Code of Conduct. |
---|
Anti-Trust Policy:
Linux Foundation meetings involve participation by industry competitors, and it is the intention of the Linux Foundation to conduct all of its activities in accordance with applicable antitrust and competition laws. It is therefore extremely important that attendees adhere to meeting agendas, and be aware of, and not participate in any activities that are prohibited under applicable US state, federal or foreign antitrust and competition laws.
Examples of types of actions that are prohibited at Linux Foundation meetings and in connection with Linux Foundation activities are described in the Linux Foundation Antitrust Policy available at http://www.linuxfoundation.org/antitrust-policy. If you have questions about these matters, please contact your company counsel, or if you are a member of the Linux Foundation, feel free to contact Andrew Updegrove of the firm of Gesmer Updegrove LLP, which provides legal counsel to the Linux Foundation.
Attendees
- Name (Organization) <email>
- Robert Mitwicki <robert.mitwicki@humancolossus.org>
- Steve McCown (Anonyome Labs) <smccown@anonyome.com>
Welcome / Introductions
Announcements
- Hyperledger Aries Proposal to Exit Incubation Status
https://bestpractices.coreinfrastructure.org/en/projects/4088- TSC will discuss at their meeting tomorrow.
- IIW April - virtual event (April 20th-22nd, 2021) - https://internetidentityworkshop.com
- The website states that tickets are already available (from December 14th onwards) but nothing appears to have been activated yet.
- Aries Bifold - new project for open source mobile agent
- Meeting today, the hour prior to Aries B call
- Aries Bifold User Group Meetings
- The Content theme for April is #HyperledgerIdentity
- Please send a short summary of any identity related projects to pr@hyperledger.org to be included in a blog roundup, due out later this month
- Also looking for help in writing blog to spotlight Aries/Indy communities/technologies and how they work together
- Please attend DevRel Marketing call
- Wednesday, April 14, the second Wednesday of every month at 9am PT Join Zoom: https://zoom.us/j/92403869974?pwd=V0ZFSmdpdmFjVDloUVJFQ2RzZjIzdz09
- CEN JNC 19 established
Related Calls
Previous Aries Working Group B calls
ACDC - see ACDC (Authentic Chained Data Container) Task Force at ToIP for more info.
- Input and Semantic WG at ToIP
- DIF DIDComm WG Call: Rolling Agenda.
- Indy contributors call
- Indy DID Specification
- 2021-05-06 : Identity Implementers WG Call (9am MT / 4pm UTC) : James Ebert (Indicio) will be presenting on the new Aires Bifold project.
Release Status and Work Updates
- Aries Protocol Test Suite
- Aries Agent Test Harness
- Aries Framework Go backchannel working
- DID Exchange tests added
- Adding a summary of results of what is there, what is missing.
- Aries Shared:
- Aries Shared: Fully functional branch that uses the shared libraries, not indy-sdk
- indy-vdr (Andrew Whitehead) https://github.com/hyperledger/indy-vdr
- indy-shared-rs - https://github.com/hyperledger/indy-shared-rs
- aries-askar (storage): https://github.com/hyperledger/aries-askar
- Aries Shared: Fully functional branch that uses the shared libraries, not indy-sdk
- Aries-CloudAgent-Python (bc.gov)
- Release 0.6.0-RC1 is out – some cleanup after RC0
- DID Exchange/OOB
- Multi-tenancy
- Mediator
- Internal support for Indy/Aries Shared libraries
- In progress work
- New BDD test suite
- Credential Exchange 2.0 with AnonCreds support
- Persistent Queues to better run in scalable environments (Kubernetes)
- Starting on W3C Standard Verifiable Credential support with ZKP/Selective Disclosure (BBS+)
- Release 0.6.0-RC1 is out – some cleanup after RC0
- Aries-Framework-Go (Troy) #aries-go
- 2020-11-03 Meeting Notes
- BBS+ Verifiable Credentials implemented using pure Go. Example.
- Next tasks: interop testing against Mattr implementation and selective disclosure capabilities.
- Working on adding remote encrypted storage capability - with a default implementation of DIF Secure Data Storage - Encrypted Data Vaults.
- Encrypted Data Vault (EDV) from DIF SDS spec format has been implemented. Works as an encryption wrapper to underlying storage providers.
- DIF EDV/SDS REST client is in progress. Docker image will support configuring EDV endpoint as wallet storage.
- Remote KMS support is in progress. Docker image will support configuring remote KMS.
- Created repo to handle pluggable go framework components such as Indy VDR: https://github.com/hyperledger/aries-framework-go-ext
- MySQL and CouchDB components moved to ext repo.
- New contributions of MongoDB and RabbitMQ support to the ext repo.
- Aries-SDK-Ruby (Jack)
- Aries-Framework-DotNet (Tomislav)
- Aries-Toolbox
- Connections Update Complete
- ACA-Py Toolbox Plugin updated to support ACA-Py 5.3
- Dependency Updates
- Converted to a web application by HCF - repo https://github.com/thclab/aries
- Aries-SDK-Java
- Aries-Framework-JavaScript
- Rich Schemas and W3C Verifiable Credentials (Brent & Ken)
- Aries-MobileAgent-Xamarin (Aries MAX)
- Pending contributions from GlobalID:
- indy-sdk PR for IOS
- indy-sdk-android
- Aries Framework IOS (Swift)
- Aries Framework Android (Kotlin)
- Ursa
Notes:
RFC Progress
Other Business
Future Topics
- Next Meeting
- Other:
- Where should we document interoperability results (AIP 1.0)? A page in this wiki space?
- Hubs vs Agents
- Status and future of wallet query language
- DID Resolution W3C and Sam's concerns: https://github.com/hyperledger/aries-rfcs/issues/130
- Connectionless
- KERI - deep dive / transaction family / Notary groups /
Action items
Call Recording