Adrian Gropper
Adrian Gropper
Please see: https://github.com/tiangolo/fastapi/issues/3328#issuecomment-854811233
There seems to be consensus that EDVs are multi-tenant storage with each tenant having separate control of encryption keys and access authorization. In other words, access authorization (ideally based on...
I propose starting the GNAP v4 role definitions for now and making additions and changes as necessary. https://www.ietf.org/archive/id/draft-ietf-gnap-core-protocol-04.html#section-1.2
Separation of concerns between controllers and processors underlies most new privacy regulations as well as Zero Trust Architecture security. A protocol connects a controller to a processor. Standardizing this protocol...
ADV is for Authorized Data Vaults - where the storage provider has access to the data so they can re-encrypt it? For example, in the ML use-case, the owner of...
A requesting party, represented by a client, approaches the store, and requests access to a resource. The access request, typically has three kinds of components: - credentials of the requesting...
@Chris and @Adrian - it would be great to open an issue and bring up the subject of Streams. (since we don’t have a concept of those defined so far
Wallet appears once outside of the [Ecosystem Diagram](https://identity.foundation/secure-data-store/#ecosystem-overview) and DID does not appear at all outside of the appendix. Which prompts me to open this discussion of the relationship between...
The [Abstract](https://identity.foundation/decentralized-web-node/spec/#abstract) says: > Decentralized Web Nodes are a mesh-like datastore construction that enable an entity to operate multiple nodes that sync to the same state across one another, enabling...
On August 4, EFF and ACLU again [objected to a CA law](https://www.eff.org/document/2020-08-04-letter-eff-and-aclu-opposing-ab-2004) about digital verifiable credentials. Although it's about VCs, the objection raises significant issues around DIDs that we could...