
04:09
attendance doc: https://hackmd.io/lKmW-LZ4Tw-0-RcFAxjsJA

05:10
Who am I?

05:13
Where am I?

06:20
We clearly need a third name...

06:33
We are in the “Secure Data Storage WG"

06:51
We are working on the “Confidential Storage Specification”

06:59
We are under some IPR agreement

07:17
attendance doc: https://hackmd.io/lKmW-LZ4Tw-0-RcFAxjsJA (add yourself)

08:41
Very intereesting

09:15
I had a chat with the Tangem Card folks about adding hardware support for x25519, for a similar type of scenario to support hardware protected edvs

10:28
Congrats Kaliya!

10:37
+1

11:19
Secure Data Storage WG

11:20
q+

12:11
q-

12:16
I’m in favor of moving to EDV.

12:24
q+

13:00
q+ to describe why we can’t name the spec edv

13:42
I think if we did Hubs, folks like Ceramic and Solid would be smart to develop completely independently of this group

14:06
which may be OK, but we definitely want to understand that EDV usage may MASSIVELY decline as a result

14:20
q+

14:25
because Hubs is where most applications will exist

14:42
devs don't write dapps against low-level DB-centric calls

14:56
that's not controversial, it's just reality, even today

15:45
@daniel - I agree, I look at EDV as more of a backend for Hubs and wallets and such

15:53
Why would Hubs be controllers?

15:57
they don't mutate data

16:02
and can't read encrypted data

16:06
q+

16:26
Indexes are plain text

16:34
indexes are also encrypted

16:42
^ not in hubs

16:45
ohhh right

16:46
sorry

16:50
yeah

16:57
Hence confusion

17:08
w+

17:10
q

17:17
Lets keep everyone together until we can’t :)

18:33
datashards

18:48
noted, great to know, thank you

18:58
https://github.com/decentralized-identity/confidential-storage/issues/157

19:00
? what do you mean in the document itself?

19:07
aha

19:09
The one oddity is that you're essentially writing an entirely different layer to circulate publicly exposed private keys just for the public data

19:16
^ 157 is a proposal for EDVs

19:18
Not hubs

19:20
Not be clear

19:37
*to bee

19:46
God I hate zoom chat

19:57
so you say "I want everyone to see this in plaintext", but then you encrypt that, and then need to include a private key with it, even though you never wanted to encrypt it in the first place

20:20
I agree - it’s rificulous

20:23
Take your crying to the issue

20:27
:)

20:46
https://identity.foundation/confidential-storage/#terminology

21:23
q+

21:48
https://identity.foundation/confidential-storage/use-cases/#functional-requirements

24:00
q+

24:02
q+

24:22
q+

24:43
to talk about share data

25:52
+1 what Dmitri said about authorization

27:37
Alice to Bob is more of an AuthZ use case

27:54
q+

27:59
alice to alice is sharing with 0 entities?

28:12
Its encryption and access to only yourself

28:29
thus not sharing?

28:39
The word sharing is meaningly

28:43
Meaningless cancer

29:04
“Sharing” is not sufficiently defined

29:09
For anyone to understand

30:07
q+ tp talk about backup

30:50
q+

30:55
are we talking about something that should be invisible to the client or not?

31:02
In my mind “replication” can be a means of “data sharing”

31:07
why Dave, it sounds like you want to join the queue :)

31:11
q+

31:56
orie is /never/ unclear.

32:12
Thats not true, please ask for clarity always

32:16
:)

32:39
q+

32:47
+1 to dave

32:56
To talk about visibility of replicatiton

33:01
+1 dave

34:30
"client-controlled replication"

34:30
+1

34:35
q+

34:50
to say what Orie is NOT replication

34:51
Wyoming underground citadel, FTW

35:00
data protected by buffalo

35:06
woooot, underground citadel as a service!

35:52
Replication is simply the act of replicating data to other instances of a thing

35:56
q+ to say that it is replication and provide a concrete example

36:14
0 work

36:16
"client-controlled replication" (what Orie describes -- perhaps we need a better name, naming is hard) would be a potential feature for the spec, "server-controlled replication" would not be.

36:20
literally not even flinch

36:37
I feel we need a clear distinction of layers to frame these conversations; “server” EDV, “client” EDV, Hub. We may likely have different types of replication supported at those different layers.

36:37
q+

36:38
https://guide.couchdb.org/draft/replication.html

36:47
^ wow look, a definition for replication

36:56
Alice changes nothing

38:05
q+ to discuss visibility vs controlled.

38:08
q+

38:52
@chris - great point.

39:58
all are just SE endpoints in your DID Doc

40:04
yes, magically they do their thing!

40:12
that's my goal with replication

40:23
yes

40:23
Or not in your dod document…. You don’t need to disclose them to use them.

40:23
well, magic we have to design and implement :)

40:55
q+ to object to Daniels language

40:56
I suspect magic, in terms of replication, will be more the domain of Hubs. whereas EDVs will be much more of a 'manual ditch digging' sort of thing

41:16
“We don’t know if instances are equivalent"

41:30
Orie: huh?

41:45
We should be careful to promise folks they can just use ___any__ edv thats is listed

41:53
To not *

42:05
Don't hate on me saying "Magic"

42:17
:) thats basically what I am about to do

42:25
because the section title in the CouchDB doc is literally "The Magic" LOLOL

42:48
With couch, replication can be client as well, via PouchDB

43:47
I am tremendously good at bothering people, but especially Orie - we all have our special talents

44:09
I agree that there is differential replication

44:19
q+

45:01
q+

45:07
Yep, I love pouchdb

45:34
The will get, “what they are configured to get"

45:42
And the client gets to tell them that part.

45:49
Or it won’t work :)

45:51
Filtered replication is still a SLA issue.

46:21
But is it separate service entities?

46:22
q+ to mention namespaces

46:43
filtered replication

46:44
@Orie: Yeah exactly. With pouch/couch you can use either client/server replication.

46:48
if that's what the spec sats

46:48
I’m note sure the watch will even know about filters that it won’t have.

47:09
Orie: there's a base-level map that all instances should have

47:12
@orie / chris - I would argue that with Pouch, it's /still/ "server"-controlled replication. Except that the library essentially runs a little server in the browser

47:16
so they know what to send others, and not to send

47:27
Daniel: No, there is no “base level map” :)

47:42
Or at least, not one I have seen

47:44
entities here means infra providers ?

47:46
q+ to say we should differentiate based on what the client needs to do, does it set a configuration option on the server and walk away or does it have to *do* the replication

47:55
entity is getting slippery

48:01
***insert meme: Well it would be a lot cooler if it did***

48:19
^ sure, I am not opposed to defining that…. later

48:34
Simple things first.

48:39
Then complex things

49:19
q+

49:24
Please Dave pick a “place to start”

49:28
Need to support both IMO

49:31
The Client is just one instance of the same logical thing, imo

49:34
Don’t ask this group more open ended questions

49:36
:)

49:40
so it should do the same functions

49:57
q+ to propose the simple case

50:20
+1 Dave’s framing is useful.

50:57
I think we can have the server do differential replication…

50:59
that's an important distinction

51:02
I have a proposal

51:04
q+

51:14
q+

51:23
Dave really helped me understand where this is really a thing to throw to Hubs

51:30
Orie, yes, maybe there's something we could do with encrypted indexes... would need to think about it.

51:31
don't be a half-way replication crook

51:42
Lets talk about what we have working today

51:47
And how we could make indexes work

51:48
it will be more complex to do that with half on each side

51:52
@Daniel, yes, the client-controlled replication, I think, belongs in Hub space.

51:59
q+

53:02
q-

53:06
We can’t keep avoiding the authorization issue by calling it replication.

53:18
+1 to what Orie is saying.

53:23
q+ to say we can explore what Orie is saying, it may be possible, but having not done it yet, i can't say what the pitfalls would be.

53:48
q+

54:39
+1 Orie

55:07
My proposal will work for both “filtered” and “unfiltered"

55:16
With encrypted indexes or not.

55:37
q+

55:54
You won’t always know the filter when designing the indexes, needs to be dynamic

56:30
q+ to answer the bob indy question

57:09
Yes, agree with Chris

57:36
dynamism in the index means that inbound writers need to write in a way that new objects fall into the right indexes

57:50
^ this is possible :)

58:09
but without having to know all of the reindexing logic, unless we also replication those types of things *across participants*

58:19
The only requirement is that the writer intend to be indexed.

58:33
And therefor replicated

58:49
Orie: I think your thing would require Alice's instances to actively replication index logic to Bob, so Bob can do the right thing with the objects he's inbounding

59:01
actively replicate*

59:34
I think it would be non-trivial

01:00:01
and assume the writer IS NOT Alice writing to Alice

01:00:12
the harder question is what Bob needs to do

01:00:25
q+

01:01:50
(top of the hour warning)

01:03:09
you'd probably want to have a number of different indexes (perhaps over the same data) using different keys to enable some "sharing" use cases here (to use the evil "sharing" term)