Replies: 12 comments 31 replies
This comment has been hidden.
This comment has been hidden.
This comment has been hidden.
This comment has been hidden.
-
I am confused. Suppose that Trust Domain TD-A supports only DIDcomm, whereas TD-B supports only KERI. Would your ITDP then still connect the two? Or would IDTP be a negotiation protocol, where both sides agree to e.g. use KERI to keep their trust-relation keys synchronized? Oskar |
Beta Was this translation helpful? Give feedback.
This comment has been hidden.
This comment has been hidden.
This comment has been hidden.
This comment has been hidden.
-
In the NA/EU meeting, Daniel asked a great question on the "pressure" that ITDP may produce in the overall solution space. ITDP itself only help convey trust signals between trust domains, it does not create new trust signals that are not already in existence in their respective trust domains. But an Inter-Trust Domain Protocol - its interoperability - does potentially create a "pressure" - that would push the ecosystem in a direction that favors many benefits we desire (eg privacy, interoperability, decentralization, ... and so on). I thought Daniel's term "pressure" is a very appropriate one. When the Internet Protocol was introduced, it didn't explicitly pick Ethernet as a favor - but once interoperability based on IP is possible, consumers of the LAN technology can choose their favorite - and they chose Ethernet. The same mechanism could work here with ITDP. |
Beta Was this translation helpful? Give feedback.
-
In today's NA/EU meeting, Sam asked a great question after my presentation. It's about how ITDP may pair with other protocols. I want to summarize that q&a here. I see - as normally how protocols tend to evolve - we may eventually get a suite of protocols. Some protocols may "partner" or "pair" together very commonly, but not exclusively. Since ITDP is not intended as a primary data path protocol, it will often (not always) pair with some data path protocol. People may choose different data path protocols for many reasons - and that data path protocol will deal with formats/encoding/performance/efficiency/communication patterns ... many considerations. ITDP can work/partner with many of them but does not specify one in particular. |
Beta Was this translation helpful? Give feedback.
-
@wenjing thank you for your presentation. I listened to it while on the move on my phone, so I wasn't able to follow intensively everything. I wanted to check if I understood your proposal correctly in relation to Sam's & Daniel's proposals. It sounded like ITDP is a wider and more abstract protocol description that encapsulates all trust domain messaging, whether or not they use ToIP stack. Sam's & Daniels models together could be considered as one type of implementation of ITDP, as they seem to fulfill most of ITDP's requirements, or at least when I read some of the requirements, I could see them solved nicely with them. Have I understood your viewpoint & context? |
Beta Was this translation helpful? Give feedback.
-
Hi @wenjing, Referring to Statement (6) in your proposal: "Speakers of ITDP are any generic endpoints with much constraints - ... .. could be any of above, all of above, none of above or any mix we can't yet imagine." Why do you want to work with such an extremely broad definition of who the speakers of ITDP can be? |
Beta Was this translation helpful? Give feedback.
-
Hi @wenjing, Referring to Statement (15) in your proposal: "ITDP may function without a destination VID. If used in this way, it should mean 'to whom it may concern'..." Could you mention a (set of) use case(s) where this could be helpful? |
Beta Was this translation helpful? Give feedback.
-
Hi @wenjing, Referring to Statement (11) in your proposal: "ITDP needs to support a generic identification that can be efficiently mapped to trust domain specific addresses AND can be verified for authenticity (verifiable). ... The actual implementations of such generic verifiable identification are out of scope." How can one efficiently and accurately speak about generic (verifiable) identification when the speakers of ITDP are generic endpoints (not further specified)? What does generic identification mean? |
Beta Was this translation helpful? Give feedback.
-
@wenjing , after reading the responses you made to the comments I think I now better understand your proposal. My struggle was between your point to make it as generic as possible but at the same time the thinnest. Looked contradictory in my mind at first glance, but you are right that’s what the IP part of the IP stack does. |
Beta Was this translation helpful? Give feedback.
-
This is the thread to discuss Proposal 3. I'll provide links/references after the presentation meeting.
The following links have been updated to include the second part presentation.
Here is the link to slides: https://github.com/trustoverip/trust-spanning-protocol/blob/main/TSP%20is%20an%20Inter-Trust%20Domain%20Protocol%20(ITDP).pdf
And the recording of the first presentation (sections 1-4): https://zoom.us/rec/share/e0QA2wkxRHm1ZiJUArxXKQmJjhVnlrbqc69L4V7iTuNd2hyYO-myVxo2YG5ZNVqt.Yr--8yysWI1ctdTm
The recording of the second presentation (sections 5 and 6):
NA/EU Meeting: https://zoom.us/rec/share/_Rf0dGbj4M34vY2736n2ZJXe5hMS0gAshpq0QnvbZy0lCYOLOe-99Bx4Oii-caS4.uRj5aPAm6oWFMFsj
APAC Meeting: https://zoom.us/rec/share/B0r0TgWH6L1DEYNpOjSOr39Y-hPVnaKyjRy3yepcjH074qC0Zjo4NOBy5HJ30B__.VbmPu3iaaem4Gcyx
Beta Was this translation helpful? Give feedback.
All reactions