Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

https://github.com/jeffgarratt/fabric-prototype/tree/tcf-demo and https://github.com/jeffgarratt/hyperledger-member-summit-2019-tcf-demo-app

FAQ

What is TCF and Gardener connection? TCF and Gardener discovered each other recently and we definitely agree that there is shared scope between these two projects and both projects are interested in working together in the process of evaluating optimal collaboration options. 

Chainlink work with Google- does this have any bearing (except for the Ethereum angle)? Chainlink joined TCF to contribute implementation and use case for attested decentralized oracles.

Intel SGX vulnerabilities - what bearing will this have on the work? Intel tracks information about vulnerabilities and mitigations on a central website at following links facts-about-side-channel-analysis-and-intel-products and engineering-new-protections-into-hardware. Please refer to the website for information about specific security vulnerabilities, resources, and responses, including mitigation by product CPU model.

What are identity bindings between off-chain identities (both Enterprise and TCF identities) and on-chain? At this time TCF assumes that identities can be user defined, blockchain address, or public signature verification key of the requester.  This is an area that can be defined further, e.g. to accommodate DID. 

Any current work or hooks in TCF that deals with other forms of trusted computation (Hardware TEEs, HME, MPC, ZK etc.)? The TCF architecture is specifically designed to accommodate additional trusted compute options (via KV storage interface). There is a work in the process to locate potential contributors with appropriate domain expertise via EEA. Also TCF encourages anybody with such expertise to join the project and contribute additional worker types to the project.

Closure

The success of this project can be measured by successful integration of TCF with multiple DLTs and, more importantly, by its broad utilization in real world enterprise-focused use cases emphasizing requirements of scalability and privacy preservation. 

...