• Work updates
  • Intro to chained credentials - Aries RFC 0104: Chained Credentials - Daniel Hardman
  • Using WebSocket as a way to communicate back to the mobile/desktop wallet (Agent (services or user) as a proxy for communication between service and digital wallet - Robert Mitwicki
  • Aries Toolbox the vision and plans for the future - open discussion
  • Other businesses

Note: This call is Recorded. Recordings posted at the bottom of the page.


(7AM Los Angeles, 10AM New York, 3PM London, 4PM CET, 18H Moscow)

Remember the Hyperledger Code of Conduct

Anti-Trust Policy:

Linux Foundation meetings involve participation by industry competitors, and it is the intention of the Linux Foundation to conduct all of its activities in accordance with applicable antitrust and competition laws. It is therefore extremely important that attendees adhere to meeting agendas, and be aware of, and not participate in any activities that are prohibited under applicable US state, federal or foreign antitrust and competition laws.

Examples of types of actions that are prohibited at Linux Foundation meetings and in connection with Linux Foundation activities are described in the Linux Foundation Antitrust Policy available at If you have questions about these matters, please contact your company counsel, or if you are a member of the Linux Foundation, feel free to contact Andrew Updegrove of the firm of Gesmer Updegrove LLP, which provides legal counsel to the Linux Foundation.


Welcome / Introductions


Related Calls

  • Previous Aries Working Group calls
  • DIF DIDComm WG Call: Rolling Agenda.
  • Identity Implementors Working Group call
    • Main place to get project updates, release status, and announcements.

Release Status and Work Updates

  • Aries Protocol Test Suite
    • One agent under test
    • Issue, credential, and proof tests are merged.
  • Aries Agent Test Harness
  • Aries Shared:
    • Aries Shared:
      • indy-vdr (Andrew Whitehead)
        • Nearing release 0.6(?) - most work complete that was needed: Design doc, FFI, testing, CI / CD
          • CI - GitHub actions runs unit tests and basic integration tests
          • CD not there
          • No design doc, but crate docs
          • Rich Schema merged and behind a feature flag
          • Refactoring PR not merged - cleanup, internal simplification, crate docs
      • indy-credx -
        • Experimental ACA-Py branch created that can do credential exchange with indy-credx
      • indy-shared-rs -
        • Shared features across indy-vdr and indy-credx
        • pack/unpack on Ursa (not libsodium)
      • aries-credx
      • Aries Secure Storage initiatives:
  • Aries-CloudAgent-Python (
    • Release 0.5.1 is on PyPi.
    • Revocation support added and tested with Streetcred and esatus Mobile Agents; major/minor version handling
  • Aries-Framework-Go (Troy) #aries-go
    • Implementing the Out-Of-Band protocol
    • Implementing issue-credential and present-proof protocols
    • Edge agent in work based aries-framework-go using WASM with support for DIDs, VCs and DIDComm support being added
  • Aries-SDK-Ruby (Jack)
  • Aries-Framework-DotNet (Tomislav)
    • Release last week for Aries compatibility with ACApy and LibVCX (RFC 0094)
  • Aries-StaticAgent-Python
  • Aries-Toolbox
  • Aries-SDK-Java
  • Aries-Framework-JavaScript
  • Rich Schemas and W3C Verifiable Credentials (Brent & Ken)
    • Some work has been done to support the W3C Verifiable Credentials Data Model specification
  • Aries-MobileAgent-Xamarin (Aries MAX)
  • Ursa
    • 0.4.0 scheduled for late March
      • Improved hash to curve algorithm
      • Updates to AMCL wrapper
    • To replace libsodium, need to have a replacement for the anoncrypt / authcrypt sealed box for pack / unpack.
      • Can be done in Ursa with two steps, but might add as a single function call.


Chained credentials (delegated credentials) - Aries RFC 0104: Chained Credentials

  • Substantial update since the last version
  • Chained credential solves the delegation problem but that is not the only one
  • There is no specific requirements to change anything in the VC spec at all. is just about adopting convection
  • VC are head for a problem - same problem as the certificate authorities at the beginning of the web, this what we are trying to avoid is to keep the list of all trusted parties. Instead of small list of entities to trust and cover whole space. 
  • If everyone can be issuers, the problem appears how to keep truck who I can trust. 
  • Data provenance → side the sources into VC
  • We need clever way to do the revocation (wip)
  • logic in verifier code is needed to support chained credentials
  • how nonce is used in embedded proofs: 
    • verifier checks old nonce to verifiy that this happened in the past
  • Does I have to disclose privacy by just letting someone walk up the history upstream of the credentials?:
    •  ZKP veriants and their privacy implications
  • Cross correlation through multiple use - offline
  • Anonymous of the entities in the chain can be achieved. 
  • Late and strong anonymity - is up to the case

Aries toolbox

  • base Intention: "Postman" for Agent - to help developers to develop agents. 
  • Development tool
  • Administrator tool - to control the agent
  • Demo purposes
  • UI module - corresponds to one or more protocols in the backend
  • Discussion will be continued on the Call B .

RFC Progress

Other Business

Future Topics

Action items


Call Recording

  • No labels