
14:41
https://hackmd.io/V7UENLVFRKOWXJzy5316wA

16:00
haha

16:04
that was awesome

17:51
Please add yours if it is not listed

17:58
Hi Everyone. This is the link to my company: https://www.zerionsoftware.com

18:10
encrypted queens mile ;)

18:18
;)

21:25
anyone have the hack md link handy?

21:39
https://hackmd.io/V7UENLVFRKOWXJzy5316wA

21:44
thx

24:10
we have a couple of people with their hands up

24:40
ooh, that one should go down on the list Juan

24:46
Yeah +1!

24:54
confidential only pertains to the data that you don't want publicly available

25:21
At the decentralized app level, you have fully confidential/private, shared with a sub-group, and fully public

25:24
Does confidential just mean a constrained audience?

25:39
Could, but what about data that is fully public?

26:11
Daniel -- the difference here might be choice

26:20
We need to stop thinking in terms of everything private - it's just a gradient for every object

26:20
mind BLOWN

26:27
sure

26:32
every object is a choice

26:43
Yeah I think choice is the distinction

26:46
Zero trust data vault

26:56
Lol took the words from my mouth

27:02
good point, Sze!

27:07
hmmmmm

27:23
Zero Trust Data Fabric :)

27:26
q+

27:35
haha zerotrust cloud storage :)

28:11
Or deleting it all lol

28:32
or moving your server to a sanctioned country hehe

28:40
+1 Juan

28:42
q+ to point out challenge/difficulty/elephant

28:47
reduced trust isn't as catchy :)

28:58
neither is "limited trust"

29:08
Should use the most differentiated concept to lead it

29:12
sort of trusty?

29:24
because that will be the thing most devs and users see and interact with, plus it's less hazy

29:26
Confidential or Encrypted are just too specific to be useful

29:41
they share did anchoring

29:44
i think more specific is ok for the lower level primitive (the Encrypted Data Vault)

29:53
the higher level thing should be less specific

29:57
but its hard to sell that to people who don't care what a did is

30:33
q+

30:40
Trusty Hubs

30:42
much of "hubs" is not about servers, so we shouldn't prefer that in the top level name, IMO

31:25
IMO, resource servers are already a dime a dozen in various specs, it doesn't differentiate enough

31:40
Instead of trying to find a short set of words that describe what it is, would it make sense to just pick a ‘word’, a la ‘Aries’

32:12
For instance you could argue Dropbox is a secure data storage solution

32:13
is there a mythical or legendary thing that fits?

32:36
i think going with something like "Aries" makes it sound too much like a product and not a technology

32:39
+1

32:40
+1

32:41
+1 to exclude the word "Secure" -- it's misleading

32:41
+1

32:47
PROPOSAL: Exclude the adjective “Secure” in name candidates

32:50
+1

32:51
+1

32:51
+1

32:52
+1

32:52
+1

32:55
+ to exclude

33:08
+1

33:11
0

33:13
yesss, yessssss, let the haaate flow through you (for the word "Secure")

33:31
Encrypted also problematic

33:32
Insecure but Confidential Trusty Hubs

33:43
+1 "trusy"

33:46
trusty

33:52
Gives the impression that everything is masked from everyone

33:54
Hard no to "Decentralized"?

33:55
encrypted is literally true for the low level primitive, i don't see it as problematic in the same way "secure" is

34:07
Mesh better than decentralized

34:10
same, not a huge fan

34:22
Data Mesh is a thing too

34:34
I prefer "confidential" or "opaque" to define that it's hard to learn or deduce from watching it (i.e. traffic analysis, correlation, etc)

34:42
Imagine calling Windows Pro Windows Full Disk Encryption

34:52
q+

35:00
Clippy Store

36:02
obviously someone can decrypt it at some point, or it's not useful :)

36:08
kill “Pubsubhubbub hubs” if anything it should be Pubsubhubbubs.

36:10
That'll be a "no" to your "no"

36:35
Decentralized doesn't === multiple copies

36:37
imo

36:39
Evan, I put that one, snarkily, before the "no snarky names" rule got written

36:47
i'll see myself out

37:01
I’ll allow it.. :)

37:38
The name can be something other than a single attribute of the product/output

38:22
RCV them separately?

38:28
self-sovereign storage SSS/S^3 (high level)

39:12
agree that marketing is important

40:02
Pumpernickel

40:37
oh yeah, a code name

41:12
Rumplestiltskin?

41:29
it does imply larger scale

41:40
"Mesh" is kinda copyrighted

41:47
^ IMPORTANT

41:51
Fabric and Lake have architectural implications

41:53
is it associated with one company?

41:57
yes

42:02
https://www.youtube.com/watch?v=52MCFe4v0UU

42:10
sounds like a big negative :/

42:24
https://www.thoughtworks.com/radar/techniques/data-mesh#:~:text=Data%20mesh%20is%20an%20architectural%20paradigm%20that%20unlocks%20analytical%20data,intensive%20applications%20across%20the%20organization.

42:46
"Fabric" TMK is not

42:52
tbqh I tend to avoid "self-sovereignty" because it's too close to a trademark IMHO

43:10
for my very anti-enclosure preferences :D

43:30
thanks kaliya

43:44
Everybody, make all the decisions, now!

44:00
+1

44:02
+1

44:05
+1

44:07
too much pressure!!

44:08
+1

44:10
+

44:11
+1 sure why not

44:12
+1

44:13
+1

44:19
+1

44:23
PROPOSAL: Ranked choice voting will be separately for/against Nouns and Adjectives separately

44:30
roll of dice

44:44
i don't think we've considered Storage McStorageFace yet

44:51
+1

45:26
@Dave - added to the list! can’t pass that up.

45:54
just remember the last time Boaty McBoat Face was on a list…..

46:46
ZKP and ZTD

47:04
ZTD sounds like what you get from doing too much ZKP

47:18
Marketing -> Cryptography

47:25
as we do in this group...

47:26
https://docs.google.com/presentation/d/1QEHSs4XJ05yQl2mvpiqbM80-MySxlVI9cNDLPq_XkkY/edit#slide=id.g8a2289ca98_0_0

51:50
adrian's hand is up

52:02
I know

52:05
ok :)

55:05
hmm?

55:11
oh, right

55:24
The way Dmitri said it made it seem strange...

55:37
but I think I get what he was saying.

57:28
q+

57:43
Could you give a concrete example?

57:45
q-

58:16
+1 Tobias, sorry this feels like we're poking at what technology we think we want

01:00:12
Why do we have to have two :/

01:00:14
q+

01:00:34
having two separate permissioning systems sounds like a tall task for a single spec

01:00:36
authorization/attenuation OR dynamic consent

01:00:53
Daniel - we don't have to have two -- we want to have one.

01:00:55
schema-based consent

01:01:16
but the requirements may make it so we need more than one mechanism.

01:01:20
(and I hope we don't go there)

01:02:05
i don't mean that the permission mechanisms need to be different, but i think there are entirely different types of policy that would need to be supported -- we don't need all the smarts at the server that stores the encrypted data

01:02:48
adrian is looking for very rich policy processing -- which doesn't belong, IMO, on dumb storage servers that are just serving up encrypted data (that they cannot decrypt)

01:03:23
lols at the "read_page" action also allowing the "and delete comments" for Facebook.

01:04:00
Oh, OAuth 2.0 -- you're such a rascal!

01:04:16
delete your own comments on the page you're reading?

01:04:29
/me deletes Juans comment by reading it.

01:04:33
oops

01:04:41
ouch

01:04:44
tough crowd!

01:04:50
harsh

01:04:52
I didn't meant to!

01:05:15
I was just using OAuth 2.0 -- I was young and a confused deputy.

01:05:21
Haha

01:06:01
it's ok, I'm a byzantine general anyways. i'm used to a little confusion.

01:06:17
and now its parity

01:06:19
haha

01:06:48
I suggest we try and define things like the following resource, action and permission

01:06:56
@Juan, just don't be orthogonal

01:07:30
+1 to that -- feels useful... meta authz requirements

01:07:33
Use this for GNAP https://datatracker.ietf.org/doc/draft-richer-transactional-authz/?include_text=1