2019-05-15 Aries Working Group Call
Summary:
Credential Based Access Use Case
Aries RFC Process
Date
Anti-Trust Policy:
Linux Foundation meetings involve participation by industry competitors, and it is the intention of the Linux Foundation to conduct all of its activities in accordance with applicable antitrust and competition laws. It is therefore extremely important that attendees adhere to meeting agendas, and be aware of, and not participate in any activities that are prohibited under applicable US state, federal or foreign antitrust and competition laws.
Examples of types of actions that are prohibited at Linux Foundation meetings and in connection with Linux Foundation activities are described in the Linux Foundation Antitrust Policy available at http://www.linuxfoundation.org/antitrust-policy. If you have questions about these matters, please contact your company counsel, or if you are a member of the Linux Foundation, feel free to contact Andrew Updegrove of the firm of Gesmer Updegrove LLP, which provides legal counsel to the Linux Foundation.
Attendees
Name | Organization | |
---|---|---|
Stephen Curran | Cloud Compass/BC Gov | swcurran@cloudcompass.ca |
Sam Curren | Sovrin Foundation | sam@sovrin.org |
Troy Ronda | SecureKey | troy.ronda@securekey.com |
Tobias Looker | Mattr | tobias.looker@mattr.global |
Paul Knowles | Dativa | paul.knowles@dativa.com |
Duane Johnson | Medici Land Governance | dujohnson@mediciland.com |
Ken Ebert | Sovrin Foundation | ken@sovrin.org |
Kyle Den Hartog | Mattr | indy@kyledenhartog.com |
Daniel Bluhm | Sovrin Foundation | daniel.bluhm@sovrin.org |
TNO | oskar.vandeventer@tno.nl | |
Alexander Blom | Bloqzone | alexander.blom@bloqzone.com |
Helen Garneau | Sovrin Foundation | |
Sovrin Foundation | adam@sovrin.org | |
Albert Solana | Validated Id | albert.solana@validatedid.com |
Tomislav Markovski | Streetcred | tmarkovski@gmail.com |
Gary de Beer | SAFBC | dibbs.za@gmail.com |
Cody Mace | Anonyome Labs | cmace@anonyome.com |
Danube Tech | nader.helmy@danubetech.com | |
Audrius Ramoska | 123c Consulting | audrius@123c.eu |
Alexi Falquier | Spaceman ID | alexis@spaceman.id |
Markus Sabadello | Danube Tech | markus@danubetech.com |
Daniel Hardman | Evernym | daniel.hardman@evernym.com |
George Aristy | SecureKey Technologies | george.aristy@securekey.com |
Robert Mitwicki | Lab10 Collective | robert@lab10.coop |
Nathan George | Kiva | nathang@kiva.org |
Announcements
- Aries announced at Consensus in NY
Agenda
Item | Who | Notes |
---|---|---|
Credential Access Use Case | Stephen Curran | |
Aries RFC Process Selection of DID Comms Related RFCs for Ratification | Sam Curren | https://github.com/hyperledger/aries-rfcs/pull/2 bring over did comms related HIPEs (v1, under the knowledge that the conversation is continuing) |
--- stuff we didn't get to below --- | ||
Credential Exchange Protocol Update | Stephen Curran | |
DIDCom over XMPP - new draft HIPE | Oskar van Deventer (TNO) Alexander Blom (Bloqzone) | https://github.com/Oskar-van-Deventer/indy-hipe/tree/didcom-over-xmpp/text/didcom-over-xmpp Purpose: have DIDCom messages traverse firewalls. Discussion -Use DID in userpart of XMPP address for better privacy? -Fast XMPP service endpoint rotation for even more privacy? |
Peer DID discussion - update | Oskar, Daniel, Kyle | Current status: • Understanding Peer DID (Oskar): https://docs.google.com/document/d/1SgKvuG7u0r5UkaDRnnkQmnarVylCx5VF5y0eIyV-I6Y Result will be likely set of PRs to Peer DID, and possibly other HIPEs |
Open Discussion |
Next Week
Review of DID Comms Related RFCs
Future Topics
Action items
Call Recording