# Blockcert
As the standards around verifiable credentials are starting to take form, different flavours of ‘verifiable credentials’ like data structures need to make necessary changes in order to leverage on the rulesets outlined and constantly reviewed by a knowledgeable community like RWOT and W...
Group updates
# Alice abuses verifiable credentials
We restricted our scope to a manageable slice of the problem we think we can realistically handle. It's been very productive. We made an outline together, and now everyone can work on individual parts of the paper. I think it's been great.
# Blo...
# Group 1: Agents
We talked about minimal requirements for ... a different set of protocols and other implementations, and we asked the question, what's out there for being able to create a minimal requirement for... Are we able to map this and pull it all down into a minimal requirement architectu...
# Introduction
Why are we here? We are here to write papers, code, make UI/UX mock-ups. If you want to work on something and it doesn't fit into that category, then let us know. There might be other people that want to work on it too. We want you to find something you enjoy working on. If you feel ...
# Paralelni Polis
First I'd like to introduce the space we're in right now. Welcome to Paralelni Polis. It is an education organization. It's a first organization in the world that is running fully on crypto. It is running solely on cryptoeconomics and donations. I'd like to welcome you to the even...
# Discussion
Chris Howe make a damn good start of a C version of Shamir secret sharing. We need to take it another level. This could be another project that we could engage on. We also didn't finish the actual paper, as such. I'd like to get both of those things resolved.
SatoshiLabs is saying t...
Swashbuckling safety training with decentralized identifiers and verifiable credentials
Kim Hamilton Duffy, kimdhamilton
# Introduction
I was very excited to hear that I was speaking right after someone from the Pirate Party. We're part of the Digital Credentials Effort led by MIT and 12 other ...
Rebooting Web of Trust topic selection
Dictionary terms: we have a glossary that I wrote 6 months ago which by definition glosses everything. A dictionary would give an opportunity to go into more depth, to look at disagreements without getting lost in the weeds, and also talk about some foundation...
Weak signals exercise
# Group 1: Decentralized
Decentralization is a means of preventing a single point of control existing.
# Group 3: Cloud
We picked a term preventing decentralized identity. The one that resonated for us was "cloud". We equated the "cloud" with the idea of centralized conveni...
Transcripts
Community-maintained archive to unlocking knowledge from technical bitcoin transcripts