...
- Name (Organization) <email>
- Stephen Curran (Cloud Compass/BC Gov) <swcurran@cloudcompass.ca>
- Richard Esplin (Evernym) <richard.esplin@evernym.com>
- Alexis Falquier (Spaceman ID) <alexis@spaceman.id>
- John Callahan (Veridium) <jcallahan@veridiumid.com>
- George Aristy (SecureKey) <george.aristy@securekey.com>
- Steve McCown (Anonyome Labs) <smccown@anonyome.com>
- Daniel Hardman (Evernym) <daniel.hardman@evernym.com>
Welcome / Introductions
Announcements
...
- Ursa - No calls since the last Aries meeting.
- Semantics - yesterday's call: Handling big data in an Indy Credential - workaround - Hashlink. Link to Paper
- DID UX Call - Slack/Mailing list - details in the shared document as well minutes and additional information, currently focus on Purpose Based Services
- F2F Meeting meetup
- SSI in IoT WG
- Indy Contributors - Richard Esplin (Mon) - Notes
- Identity WG / Identity WG Implementer calls (Wed / Thurs) - no calls since last Aries meeting
- DIF DIDComm WG - Monday's at Noon US/Pacific
- W3C DID Working Group F2F meeting in Amsterdam (Jan 29-31)
- Slides from the F2F meeting (200+)
- SSI Meetup Webinar by Drummond Reed & Markus Sabadello with a full recap of the F2F meeting
Upcoming Releases and Work Updates
- Aries Protocol Test Suite
- Thanks again to Keith Smith, Issue Credential tests are merged; Present Proof soon to follow once some minor merge conflicts are resolved.
- Aries Shared:
- Aries KMS
- Verifiable Data Registry Interface (VDRI) library: indy-aries-vdr (Andrew Whitehead) https://github.com/andrewwhitehead/indy-ledger-clientvdr
- Other Core Libraries (pack / unpack)
- Aries-CloudAgent-Python (bc.gov) - Release 0.4.1 is pendingreleased, with a change to the forward message handling for compatibility with RFC.
- Release 0.4.2 coming soon with a regression fix related to the ephemeral challenge.
- Deployment of 0.4.1 to be synchronized to the Streetcred Agent release, which estimated to be in the next couple of days.
- ACA-Pug (User Group) starting, with first meeting next Wednesday, 1 hour before this meeting. ACA-Pug page is here.
- Aries-Framework-Go (Troy) #aries-go
- Released v0.1.1
- Route coordination and forwarding implemented (RFC 94 and RFC 211) and integrated with DID Exchange. Go API Package | BDD test
- Question raised on how to reconcile RFC 94 and RFC 211.
- Basic JavaScript scaffolding implemented for browser and node.js to use the WASM. NPM packaging in progress.
- Next: expose framework operations (similar to the REST API).
- External message handler and purpose decorator implemented (RFC 351). REST API in progress.
- HTTP over DIDComm in progress (RFC 335). HTTP request portion implemented.
- Continuing efforts on routing & relays, crypto/kms, WebAssembly, verifiable credentials, generic message handlers (and external registration), JWE envelopes.
- Aries-SDK-Ruby (Jack)
- Aries-Framework-DotNet (Tomislav)
- Aries-StaticAgent-Python - Now up to 0.6.1; more details
- Aries-Toolbox
- Official repo moved to aries-toolbox
- Preparing for a new release based on the latest ACA-Py
- Aries-SDK-Python - Wrapper from JeromK and SBCA?
- Aries-SDK-Java
- Aries-Framework-JavaScript / Aries-SDK-JavaScript
- As agreed in the connect-a-thon, planning efforts on merging the aries-sdk-javascript codebase into a single framework repo - aries-framework-javascript
- Starting with the efforts on the React-Native Mobile Agent.
- Rich Schemas and W3C Verifiable Credentials (Brent & Ken)
- HIPEs/RFCs
- Next HIPEs/RFCs for
- encoding
- mapping
- credential definition
- Node implementation of
- context (merged)
- schema PR in progress https://github.com/hyperledger/indy-node/pull/1513
- Ursa 0.3.1 release in January
- Delegate-able credentials
- Flexible configuration options
- ZMix 0.1.0 expected in January
- Ursa and ZMix will be separate releases. ZMix is the proving code, and Ursa is everything else.
...
IssuePR Game: Can we merge this? (15 min):- Routing coordination (progress checking)
- Protocol Semver
- Additional data in protocol needs a version bump?
- need template update per 0003
- Service Block / Endpoint URI for Agents without an endpoint (Issue 405)
- Needs to know which key to encrypt for.
- The implication is that agent will 'pick-up' messages
- DID Exchange (RFC)
- Extraction of Invitation Protocol? - Yes (Sam if nobody beats me to it.)
- note about security
- includes inline keys described below
- use of ~service decorator
- inline key representations
- - use did:key: as a temporary solution
- reference of 0268 Deep Linking RFC
- solve reuse problem by starting a protocol
- pass DID Docs as attachments
- replace inline ~sig with attachment signatures
- Extraction of Invitation Protocol? - Yes (Sam if nobody beats me to it.)
- Named states and coprotocols Daniel Hardman
- Chained Credentials RFC 104 - Paul/Jan
- Open Discussion / Next Week Topics
...
- DIF Interop Project - Project is proceeding, connect the communities at IIW
- DKMS status
- Credential Fraud: Example how in ACA-Py to verify same link secret across multiple credentials in presentation
- Schema interop - how to reused schema across different networks Robert Mitwicki(RFC in progress)
- Using WebSocket as a way to communicate back to the mobile/desktop wallet (Agent (services or user) as a proxy for communication between service and digital wallet) Robert Mitwicki
- What's left for DID Exchange protocol?
- Some discussion in: https://github.com/hyperledger/aries-rfcs/pull/366
...