← @ChristopherA Twitter archive

Christopher Allen

@ChristopherA

…The paper briefly discusses establishing TOFU (trust on first use) for a new DID by one of two methods, an out-of-band communication confirmation such as a hash, or a verifiable credential from someone you already trust.

8/25/2019, 1:30:24 PM

Favs: 2

Retweets: 0

Christopher Allen

@ChristopherA

…”For example, a randomart image could be embedded into a QR code and then the randomart image could be displayed on the users device as well. The user would then be required to verify the image displayed on the user's device is the same as the one embedded in the QR code.”

8/25/2019, 1:31:45 PM

Favs: 2

Retweets: 0

Christopher Allen

@ChristopherA

…This paper doesn’t dive deeply into the problem space here and I might have some quibbles with some specifics, but the point of this kind of paper is an expression of interest that this topic should be dived into more deeply at #RWOT9.

8/25/2019, 1:34:20 PM

Favs: 1

Retweets: 0

Christopher Allen

@ChristopherA

…This paper is just a beginning, more of a skeleton to be filled out if this topic is selected for more iteration at #RWOT9. I appreciate that they start with an analysis of 2 different approaches. This area is an important next step now that VCs are becoming a formal standard.

8/25/2019, 1:46:18 PM

Favs: 1

Retweets: 0

Christopher Allen

@ChristopherA

…”the process of presenting…is often not initialized by the Holder of the Credential, but rather requested by the verifier to fulfill a specific need. Therefore, the process is often triggered by a Verifier requesting a specific Credential.”

8/25/2019, 1:50:13 PM

Favs: 2

Retweets: 0

Christopher Allen

@ChristopherA

…“scalable by eliminating the high overhead involved with maintaining global consensus & constructing absolute time sequencing. Real-world identity works fine without requiring either of those constraints, digital identity should also be able to be constructed without them.”

8/25/2019, 1:58:09 PM

Favs: 3

Retweets: 1

Christopher Allen

@ChristopherA

…”Holochain operates less like a global state blockchain, and more like git plus BitTorrent. Each node…signs any actions it originates to a local hashchain (providing an immutable sequence of local state changes) then publishes entries from their chain to a shared ledger space”

8/25/2019, 2:00:19 PM

Favs: 7

Retweets: 2

Christopher Allen

@ChristopherA

…”Every application…functions as its own P2P encrypted network. The network ID is the SHA-256 hash of the application code as compiled to WASM (also called the DNA of the app). And the address space of network nodes and data, is the SHA-256 hash of the data…”

8/25/2019, 2:02:24 PM

Favs: 5

Retweets: 1

Christopher Allen

@ChristopherA

…”…This makes for an extremely large address space (about 1.34e+154) with no top level namespace to create artificial scarcity or encourage name squatting. This should be plenty of elbow room for identity applications and other dApps.”

8/25/2019, 2:03:04 PM

Favs: 4

Retweets: 1

Christopher Allen

@ChristopherA

…Paper continues with details on Holochain’s runtime called Conductor, and its key management architectures, how it handles multiple personas and profiles per person.

8/25/2019, 2:06:47 PM

Favs: 6

Retweets: 1

Christopher Allen

@ChristopherA

…IMHO the best thing about Holochain is that they committed to implementing this architecture very differently than those based on the now more traditional permissionless or permissioned blockchains. IMHO we need this “new blood” to challenge some of our assumptions.

8/25/2019, 2:10:43 PM

Favs: 12

Retweets: 4

Christopher Allen

@ChristopherA

…This advance reading is another example of a topic paper to express interest and support for a joining with others to collaborate at #RWOT9, and in this case not to do a paper but code. There is a zkp library in the Sovrin ecosystem but it is important we have another.

8/25/2019, 2:19:09 PM

Favs: 3

Retweets: 1

Christopher Allen

@ChristopherA

…”while Joram and Amira are both very tech-spec focused papers, I do believe that there’s space here for a less technical approach in order for us to help grasp what aspects and angles may still be missing from our current conversation.”

8/25/2019, 2:26:11 PM

Favs: 3

Retweets: 1

Christopher Allen

@ChristopherA

…”Different minority groups have different needs, and they can’t all be addressed with one simple solution. What we need to do is find a way to address those needs, in their own time and space.”

8/25/2019, 2:27:05 PM

Favs: 3

Retweets: 1

Christopher Allen

@ChristopherA

…”this paper wants to begin by mapping out some of those issues, so we have base to stand on and continue working from.”

8/25/2019, 2:27:58 PM

Favs: 3

Retweets: 1

Christopher Allen

@ChristopherA

…This paper asks an important question — “Is a Web of Trust reliable for marginalized groups? Or does it require you to be part of a majority group in order for it to work properly?”

8/25/2019, 2:29:00 PM

Favs: 4

Retweets: 2

Christopher Allen

@ChristopherA

I appreciate that this kind of topic continues to be presented before all the #RWOT community, going back to the refugee use case from our first design workshop. How does our community address the needs of all, not just of those in power or those with easier access to power!

8/25/2019, 2:36:00 PM

Favs: 4

Retweets: 3

Christopher Allen

@ChristopherA

That wraps up my read-thru of another 5 #RWOT9 advance topic papers. A few last minute ones have been added, but I still plan to finish and highlight all of them in the coming week. We will use them in Prague as input for our collaborative choices of what to focus on F2F.

8/25/2019, 2:43:20 PM

Favs: 4

Retweets: 1