...
Excerpt |
---|
|
Note: This call is Recorded. Recordings posted at the bottom of the page.
...
- Name (Organization) <email>
- Robert Mitwicki Robert Mitwicki(The Human Colossus Foundation)
- Michael Richardson ( EuroLedger) <emerysolutions@yahoo.co.uk>
- Stephen Curran (Cloud Compass Computing Inc.) <swcurran@cloudcompass.ca>
- George Aristy (SecureKey) <george.aristy@securekey.com>
- Steve McCown (Anonyome Labs) <smccown@anonyome.com>
- Ed Eykholt (iRespond) <edeykholt@irespond.org>
Welcome / Introductions
Announcements
...
- Aries Protocol Test Suite
- One agent under test
- Issue, credential, and proof tests are merged.
- Aries Agent Test Harness
- Test compatibility between any two agents
- https://github.com/bcgov/aries-agent-test-harness_
- Aries Shared:
- Aries Shared:
- indy-vdr (Andrew Whitehead)
- https://github.com/hyperledger/indy-vdr
- Nearing release
- 0.
- 6(?) - most work complete that was needed: Design doc, FFI, testing, CI / CD
- CI - GitHub actions runs unit tests and basic integration tests
- CD not there
- No design doc, but crate docs
- 6(?) - most work complete that was needed: Design doc, FFI, testing, CI / CD
- As an Aries interface becomes standardized, will add that API layer
- Do we hold off on setting the version until this is in place. Maybe 0.8
- Rich Schema merged and behind a feature flag
- Refactoring PR not merged - cleanup, internal simplification, crate docs
- indy-credx - https://github.com/
- need to move ASAP to at least BC Gov repo - Andrew Whitehead
- Experimental ACA-Py branch created that can do credential exchange with indy-credx
- Next up: adding revocation 2.0 support Integrating upgraded PyO3 library
- indy-shared-rs - https://github.com/bcgov/indy-shared-rs
- Shared features across indy-vdr and indy-credx
- pack/unpack on Ursa (not libsodium)
- aries-credx
- https://github.com/sovrin-foundation/aries-credx-framework-rs
- 6 most common attribute encodings
- https://github.com/sovrin-foundation/aries-credx-framework-rs
- (but not
- anoncreds 1 attribute encoding
- )
- Can make a non-revocable credential and create proofs
- .
- Mike will be working on revocation registry 2.0
- Aries Secure Storage initiatives:
- Mike working on documentation and architecture as an Aries RFC (KMS architecture) and Ursa RFC (API)
- PR is submitted: https://github.com/hyperledger/aries-rfcs/pull/440
- Mike and Cam's work aries-kms-mayaguez -
- Mike working on documentation and architecture as an Aries RFC (KMS architecture) and Ursa RFC (API)
- Postgres backend for credential storage
https://github.com/sovrin-foundation/aries-kms-rs- Persistence work allows plugging in any database engine.
- Focus is using an external enclave.
- Postgres backend for credential storage
- Working on Postgres storage; will need help on lox Something out the end of the week.
- aries-kms-vostok - indy-wallet capabilities moved to an Aries base
- Andrew also working on that
- Aries Shared:
- Release 0.5.1 is on PyPi.
- Revocation support added and tested with Streetcred and esatus Mobile Agents; major/minor version handling
- Implementing the Out-Of-Band protocol
- Implementing issue-credential and present-proof protocols
- Edge agent in work based aries-framework-go using WASM with support for DIDs, VCs and DIDComm support being added
- Added DID/Verkey sign_and_submit to aries_sdk_ruby and published new gem (0.0.8)
- Created aries-rails-docker experiment that support Rails 4 with Indy 1.8.1 on Heroku & Dokku
- Release last week for Aries compatibility with ACApy and LibVCX (RFC 0094)
- Added basic message admin
- Working on a getting started video
- PR for Connections Update
- Converted to a web application by Robert Mitwicki - repo https://github.com/thclab/aries
- Upcoming cleanup items
- Started regular meetings: Framework JS Meetings
- Current focus is on mediator use case (NodeJS)
- Some work has been done to support the W3C Verifiable Credentials Data Model specification
- Evolution of the open source mobile agent (Mattr Global's OSMA)
- https://github.com/hyperledger/aries-mobileagent-xamarin
- 0.4.0 scheduled for late March
- Improved hash to curve algorithm
- Updates to AMCL wrapper
- To replace libsodium, need to have a replacement for the anoncrypt / authcrypt sealed box for pack / unpack.
- Can be done in Ursa with two steps, but might add as a single function call.
Agenda:
Chained credentials (delegated credentials) - Aries RFC 0104: Chained Credentials
- Substantial update since the last version
- Chained credential solves the delegation problem but that is not the only one
- There is no specific requirements to change anything in the VC spec at all. is just about adopting convection
- VC are head for a problem - same problem as the certificate authorities at the beginning of the web, this what we are trying to avoid is to keep the list of all trusted parties. Instead of small list of entities to trust and cover whole space.
- If everyone can be issuers, the problem appears how to keep truck who I can trust.
- Data provenance → side the sources into VC
- We need clever way to do the revocation (wip)
- logic in verifier code is needed to support chained credentials
- how nonce is used in embedded proofs:
- verifier checks old nonce to verifiy that this happened in the past
- Does I have to disclose privacy by just letting someone walk up the history upstream of the credentials?:
- ZKP veriants and their privacy implications
- Cross correlation through multiple use - offline
- Anonymous of the entities in the chain can be achieved.
- Late and strong anonymity - is up to the case
Aries toolbox
- base Intention: "Postman" for Agent - to help developers to develop agents.
- Development tool
- Administrator tool - to control the agent
- Demo purposes
- UI module - corresponds to one or more protocols in the backend
- Discussion will be continued on the Call B .
RFC Progress
Other Business
...