Proposal 5: Withdraw Proposal 1, Proposal 2, and Proposal 3 #39
Replies: 6 comments 12 replies
-
Trust Protocol Profile-Trust Spanning Layer Framework: Proposal 4 Assessment Trust Protocol Profile-Trust Spanning Layer Framework: Assessment of Other Proposals UPDATE: @dhh1128 I've clarified the title of the 3rd column - changing it to "Messaging Network Stack" from "Messaging Protocol Stack". |
Beta Was this translation helpful? Give feedback.
-
I think it is true, @mwherman2000 , that proposals 1-3 have different kind of details than your proposal does. However, we did not say when we started the proposal phase that each proposal had to provide a specific answer to the questions you are enumerating (messaging protocol stack, message format, identity system, message payloads). Thus, what we got was legitimate proposals -- but proposals that focus on and address different issues from the ones you care about. Sam's focuses on how we get authenticity out of the system, and on some principles and approaches for layering. Wenjing's focuses on what should be in and out of scope, and on how we might adapt existing technologies to use TSP as a foundation. Mine focuses on which questions the TSP has to answer, and on a way to rationalize those answers into clumps of functionality. Yours is wonderfully concrete (it avoids some of the theoretical arguments that the other 3 are making). It focuses on a mental model for trusted communication, a repeatable pattern that can glue everything together, and how we can deliver this with existing approaches. In my view, all of these are valid proposals, but they are proposals about partially different things. The purpose of a consolidation phase would be to identify ways that these proposals are compatible and ways that they are fundamentally at odds with each other -- and then to begin working through the points of contention. Your matrix provides some useful points of comparison, and it might be one helpful way to tackle some consolidation work. Because I think that, I will provide some answers to your questions re. my proposal and the others, as I understand them. However, I am not doing this to make proposals 1 to 3 worthy peers of proposal 4 -- I claim they already are -- only to further dialog.
Of course, @SmithSamuelM and @wenjing are authoritative about their own minds; what I put in that table was my own understanding only. I thought it might be interesting to share another spreadsheet that I prepared, that examines the implications of one of your questions (identifier system) in greater detail: https://docs.google.com/spreadsheets/d/1K7UqQMjL7L5l28LFjXz74YfjAVXuoC5Wt5cchPauEWE/edit#gid=0 I would also like to suggest that your proposal fails to answer some questions that some other proposals do address. I will give some examples below -- again, not to demand that your proposal be upgraded to answer them, but to simply show that all of us have things to learn from one another, and to support my contention that the consolidation phase as it's been proposed is the right way to make progress. Please don't feel like I'm picking on you -- my own proposal doesn't answer any of these questions, either.
|
Beta Was this translation helpful? Give feedback.
-
This is a solved problem in the Web 7.0 Global DIDComm Network. It's a Layer 1 Trust Foundation Services Subprotocol discussion. |
Beta Was this translation helpful? Give feedback.
-
Thank you again @dhh1128 ...back to Amsterdam, my inflight movie. 😉🙂 |
Beta Was this translation helpful? Give feedback.
-
I am weighing in here as I find this discussion item quite troubling. I have watched, over the past year, some incredible efforts from amazing people, move the bar forward for Trust Over IP. This work, I believe, is forming the foundation for truly world-changing capabilities to be developed. I include your efforts in that. The exploration of the new domain that we are working on has been some of the most fulfilling work of my career. Seeing the deep thinking that has gone into the efforts as well as the sharing and feedback loops that have formed is incredibly rewarding. What I have not seen is the active tearing down of other people's ideas. Perhaps I am misinterpreting your statements, but I fail to understand what requesting withdrawal of incredibly value input accomplishes. Information, ideas, and knowledge are being openly shared and that is done in a realm of trust. We all know just how valuable and fragile trust is. I suggest you reconsider your ask here. |
Beta Was this translation helpful? Give feedback.
-
Where do crypto suites (cryptography services) belong in the Trust Spanning Layer Base Protocol model? |
Beta Was this translation helpful? Give feedback.
-
Proposal 5: Withdraw Proposal 1, Proposal 2, and Proposal 3 because they don't meet the bar with respect to defining an actual protocol ...let alone a Trust Spanning Layer Protocol.
"These 3 proposals are examples of a bird's leg, a fish's tail, and a mosquito's nose ...when the basis of every proposal needs to be at least an example of a mammal." Proposal 4 is a "mammal" aka a concrete protocol.
If each of the initial proposers chooses to, each proposal can be updated and re-released as Proposal 6, Proposal 7, and/or Proposal 8, respectively.
See below...
Beta Was this translation helpful? Give feedback.
All reactions