►
From YouTube: The Baseline Show - India
Description
The weekly office hours for the Baseline Protocol open source community. Learn more at https://baseline-protocol.org.
This is the India office hours hosted by Samrat Kishor | @samratkishor
#baselineinindia #B2BBlockchain
B
There
we
go
we're
on
now.
Live
hey
mark
thanks,
so
much
for
making
it
this
morning,
and
we
are
now
live
from
india's
hi
everyone.
My
name
is
amrat
and
we
are
now
live
with
the
baseline
show
in
india
and
I'm
part
of
the
technical
setting
committee
of
baseline
protocol
and
also
the
head
for
india
community
with
myself.
I
have
mark
mark,
go
ahead.
A
I
basically
am
on
the
go
to
market
and
enablement
committee
meeting
for
baseline
protocol
and
I've
been
an
enthusiast
at
baseline
for
going
for
it's
a
year
and
a
half
now
so
it's
it's
actually
really
interesting
watching
I
mean
how
the
whole
thing
I
just
I
stumbled
across
it
really
just
because
I
had
been
reading
some
of
the
just
so
some
of
the
communications
that
were
going
on
around
the
you
know
community
as
it
was
forming
and
stuff,
and
I
just
you
know,
kind
of
said
you
know
I
want
to
start
paying
attention
to
this,
and
so
I
started
going
to
the
first
couple
of
meetings
and
I
just
kept
going
and
now
all
of
a
sudden
here
we
are
a
year
and
a
half
later
and.
C
B
Absolutely
I
had
promised
the
viewers
that
we'll
be
playing
a
new
theme
song
this
week,
so
I
I
have
something
and
I
wanted
people's
opinion
on
it.
So
I'm
just
gonna
play
it
and
I
want
your
opinion
as
well.
Mark.
A
B
B
So
last
time
was
a
was
a
superb
episode
and
we
had
jack
leahy
and
we
had
and
we
had
john
and
we
were
talking
about
yeah
john
walpert,
and
we
were
talking
about
everything
so.
C
A
B
So
so
yeah
for
people
so
for
people
watching
us
on
youtube.
If
you
have
any
comments
about
it,
just
let
us
know
on
the
comments
so
so
yeah,
that's
the
that's
the
new
song.
We
also
have
an
outro
from
the
same
theme.
This
is
very
interesting.
You
know
I
enjoyed.
B
Making
some
pieces
of
it
not
the
whole
thing
so
so
yeah,
I
I
truly
enjoy
the
process
mark
and
what
I
was
thinking
is
that
we've
we've
come
a
long
way
in
the
india
chapter
as
well.
This
is
the
fifth
episode,
but
I
keep.
I
keep
getting
some
messages
from
people
saying
that
how
do
we
join?
How
do
we
contribute?
B
So
what
we
could
also
do
is
we
could
use
the
time
today
and
just
walk
them
through
the
various
channels
through
which
they
can
participate.
You
know,
of
course
we
keep
talking
about
the
youtube
channel
where
we
are
doing
this
this
session,
and
we
do
it
every
saturday
at
6
o'clock,
there's
also
the
website
which
is
baseline,
hyphen
protocol.org,
and
then
we
also
have
a
slack
channel
and
that's
the
most
active,
that's
always
lit
up
with
with
with
so
many
things
happening.
You
know,
questions
being
asked
and
updates
being
shared
and
announcements
being
made.
B
So
so
anybody
who
wants
to
participate
and
contribute
to
baseline
as
an
organization
or
as
an
individual
you're
most
welcome
to
join
our
slack
channel
and
start
contributing.
The
github
repo
is
also
updated.
Most
of
our
issues
there
you'll
see
what's
happening.
The
active
the
active
issues
are
always
you
know
all
our
comments,
votes
everything
is
there
for
the
public
to
see
and
audit
us.
What
we're
doing
two
very
interesting
grant
requests
recently
got
almost
approved.
B
I
think
I
think
one
of
them
got
approved,
but
the
other
one
is
still
on
in
in
voting,
but
I
think
two
very
interesting
grant
requests
which
have
come
up
are
around
the
ids
ones.
So
it's
like
it's
like
having
a
phone
book
now
being
made
after
we
handed
out
the
cell
phone
to
people,
so
so
so
I
think
yeah.
B
Of
course
you
know
it
may
be
out
of
out
of
sequence
for
some,
you
know,
as
some
of
them
may
be
calling
it,
but
now
at
least
we
have
these
two
very
interesting
groups
working
on
the
matter
of
dids.
So
that's
that's
very
interesting,
and
you
know
these
are
solid
teams,
so
people
can
go
to
get
go
to
github
read
about
the
background
of
people
who
are
working
on
these
grants.
B
B
The
other
important
update
that
I
have
is
on
the
grant
request
which
our
very
own
anais
had
had
submitted.
She's
the
head
of
standard
committee
and
she's.
She
submitted
this
grant
request
for
acting
as
the
you
know.
What
should
I
say?
What's
the
best
word
for
it,
I
mean
she's
she's
going
to
bring
in
order
to
the
chaos.
I
think
she's
she's
she's,
going
to
bring
in
a
lot
of
order
into
the
into
the
documentation
that
we've
created
so
far.
You
know
we've
grown
by
leaps
and
bounds.
B
You
know
this
whole
community
and
we've
all
been
contributing
documents
and
codes
and
and
a
lot
of
things
over
a
period
of
time
so
now
anais
comes
in
and
she
she's
gonna
prepare
a
whole
system
of
documentation
so
that
anybody
who's
joining
a
new
beat
an
organization
or
an
individual,
finds
it
useful.
B
A
I
would
say
that
you
know
a
lot
of
us
again.
A
lot
of
us
have
done
many
laps
around
the
track
and
we
are
drawing
from
and
learning
from
the
well-meaning,
but
still
mistakes
made.
You
know
through
various
different
emerging
technologies.
I
myself
came
from
the
blockchain
space,
which
has
had
an
enormous
amount
of
trial
and
error.
A
You
know
an
enormous
amount
of
excitement
and
even
hype
was
put
on
baseline
when
it
first
came
out
because
a
lot
of
us
you
know
I
mean
I'm
not
baseline,
but
blockchain
and
you
started.
You
know.
A
Everyone
remembers
that
blockchain
was
gonna
end
world
hunger
and
it
was
going
to
make
out
make
us
hold
tight.
A
Make
us
all
taller
and
smarter
and
prettier
and
get
all
the
weeds
out
of
our
lawn
and.
C
A
All
of
this
stuff-
and
you
know
it
was
easy
to
get
really
caught
up
in
that,
but
you
know
when
all
of
that
comes
back
down
to
earth
you
have
to,
you
know,
come
to
find
out.
You
know,
how
can
we
actually,
you
know,
implement
this
and.
C
A
With
baseline,
we
want
to
look
for
the
nails
first,
you
know,
as
we
are
perfecting
the
hammer
and
we
are
paying
a
lot
of
attention
to
using
standards.
Since
this
is
going
to
be
an
ecosystem
approach,
network
effect
being
the
the
goal
we
need
to
have
everyone
operating
under
the
same
taxonomy
of
standards,
yeah.
C
A
That
everything
just
kind
of
works,
because
if
not
it's
it's
it's
doomed
to
fail.
I
mean
a
lot
of
people
really.
They
start
thinking
about
standards.
As
far
as
everyone's
gonna
have
that
commonality
everyone's
going
to
wait.
You
know
after
they
get
all
of
the
capability
and
the
technology
together.
They
they
really
didn't
pay
as
much
attention
to
as
well.
A
So
can
I'm
ace
and
I'm
a
so
frank,
is,
is
our
chair
of
our
standards
committee,
and
so
there
is
no
better
person
to
actually
try
to
bring
order
to
the
chaos.
A
So
so,
and
I'm
really
excited
to
hear
hear
about
that-
and
it's
it's-
you
know
an
exciting
time
for
baseline
right
now,
because
it
you
know,
for
me
at
least
it
addressed.
A
So
many
of
the
pitfalls
and
the
you
know,
shortcomings
I
guess
of
blockchain
technology,
because
there
were
a
lot
of
assumptions
made
that
you
know
people
were
going
to
adopt
baseline.
I
mean
I
adopt
blockchain
that
everybody
else
is
going
to
be
doing
it
too,
and
you
know
you
start
having
a
cascade
of
questions
well,
which
blockchain
are
you
using,
and
what
implementation
and
are
using
private
and
permission?
A
Private
permissions
are
using
public
and
if
you
were
using
public,
we
really
did
not
at
the
time
have
the
the
framework
put
together
to
how
you
could
actually
at
least
control,
that
access
and
plus
you
had
a
lot
of
private
enterprises,
which
was
where
the
adoption
was
going
to
come
from.
Plus
most
of
the
funding
was
going
to
come
from,
you
know
basically
said
we
need
to
be
able
to
control
access
to
this
blockchain,
it's
very
robust,
but
we
only
want
the
people
that
should
be
participating
with.
A
Then
we
want
to
exclude
all
others,
which
is
how
they,
how
that
that
really
works,
and
my
cat
wants
to
visit
us
again
this
time.
A
Absolutely,
but
at
the
same
time,
when
you're
working
on
baseline,
you
start
to
think
you
know
around
other
ancillary
technologies
that
are
going
to
be
working
for
this
baseline
enablement
and
digital
identity.
Yeah
in
the
form
of
dids
is
a
very
important
part
of
that.
There's
a
big
push
right
now
within
the
digital
identity
space
that
people
can
you
know
it's
basically
proving
you
are
you.
C
A
I
am
who
I
am,
and
I
am
using
a
verified
credential,
which
is
a
digital
version
of
you
know,
a
document
that
you
may
keep
in
your
bill.
Folder
your
wallet.
You
know
whether
it's
a
driver's
license
a
passport
or
whatever
you
are
taking
this
physical
item
out
and
showing
it
to
someone
that,
then,
is
you
know
you
are
proving
that
you
are
who
you
are,
because
you
are
they
being
able
to
physically
hand
them
the
document,
and
they
are
verifying
that?
Yes,
this
appears
to
be
real.
A
It
appears
to
be
have
all
the
proper
markings
and
stuff
of
whoever
issued
this
credential.
A
This
is
taking
that
digitally
and
it
can
be
done
in
a
wallet
that
is
on
a
phone
that
you
can
basically
sit
there
and
prove
that
you
are
you
and
at
the
same
time
you
have
that
granularity
that
is
being
introduced
into
it,
because
you
can,
then
you
know,
select
the
level
or
the
threshold
that
you
want
to
then
prove
that
you
are
who
you
say
you
are
or
that
you
have
training,
and
you
can
do
all
of
that.
So
you
know
it
could
work
to.
A
You
know
the
simplest
example
is
if
I
were
to
buy
a
bottle
of
wine
here
in
the
states
minimum
alcohol
purchase
is
age
21..
I
only
have
to
prove
that
I
am
21
years
of
age.
You
do
not
need
to
know
anything
else
about
me.
You
know
I
showed
you
my
driver's
license.
You
don't
need
to
know
my
height
my
weight,
my
eye
color
or
my
home
address
yeah
just
need
to
you.
Don't
even
need
to
know
my
date
of
birth.
All
you
absolutely
is.
A
C
A
B
B
It's
like
it's
the
same
way
that
uber
changed
the
whole
experience
of
taking
a
taxi
and
and
going
from
point
a
to
point
b.
Where
we're
saying
you
know
what
you
just.
You
just
need
to
prove
that
you're,
you
that's
it
and
you're
all
checked
in
and
it
can
be
any
hotel
where
you've
made
a
booking.
It
need
not
be
the
one
where
you
are.
You
know
you're
a
loyal
member
and
maybe
a
new
one.
B
You
may
be
traveling
to
a
new
city,
but
you
just
need
to
prove
that
you're,
you
and
the
rest
of
the
paperwork
just
because,
eventually
what
people
do
is
you
hand
over
your
passport
to
an
unknown
person
standing
behind
a
counter,
and
then
that
person
takes
away
the
passport
and
goes
to
some
room,
which
you
don't
even
know
where
it
is
right?
So
so
so
it's
it's.
It's
sometimes
scary.
B
C
B
Those
are
the
kind
of
cases
which
which
you
know,
definitely
need
zkp
coming
in
and
and
something
like
baseline
coming
in
systems
talking
to
each
other,
the
booking
portal.
Talking
to
this,
the
hotel
systems
etc.
Oh
yeah
yeah,
exactly
yeah,
so.
A
You
know,
and
by
doing
that,
you're
not
surrendering
any
control,
you
retain
all
of
the
control
all
the
time,
and
that
is
the
emerging
and
that's
a
lot
of
the
philosophy
behind
the
emerging
movement
towards
self-sovereign
identity.
To
where
you
say
I
am
controlling,
you
know
how
much
that
I
am
sharing
enough
for
you
to
validate
or
authenticate
or
accept
the
proof
that
I
am
who
I
am
and
at
the
same
time
you
really
you're
able
to
do
this.
You
know
and
maintain
control,
and
you
only
need
to
reveal
you
know.
A
There's
there's,
there's
much
less
data
leakage,
you
know
and
you
maintain
the
absolute
the
the
actual
control,
and
so,
if
you
look
at
a
lot
of
the
you
know,
potential
use
cases.
You
know
the
mechanisms
have
very
compelling
application,
especially
in
in
healthcare
in
life
science.
I
mean
a
lot
of
people,
talk
about
vaccine
passports
and
stuff
yeah.
A
You
can
basically
say
here,
and
it's
digitally
saying
you
know.
Yes,
I
have
had
I've
had
I've
had
all
of
my
vaccines
and
stuff.
A
There
is
some
legal
framework
that
would
need
to
be
worked
out
out
of
that,
but
it
it
is
at
least
getting
everyone
paying
attention
to
that
so
and
the
more
people
we
have
paying
attention.
The
more
people
are
going
to
speak
up
and
say:
have
you
thought
about
this
right?
Not
about
that
so,
and
we
want
to
have
as
many
people
talking
about
that
as
possible.
A
But
digital
identity
is
going
to
be
a
very
big
thing
going
forward
and
it's
getting
a
lot
of
attention,
not
only
in
the
self-sovereign
aspect,
which
I
think
is
really
cool
but
you're
going
to
have
a
small
amount
of
people
at
this
stage
of
the
journey
that
are
really
kind
of
thinking.
Yeah.
That
really
is
kind
of
cool.
C
C
C
A
If
you
really
want
to
start
driving
some
adoption,
get
something
get
that
aha
moment
sit
there
and
say
what
you
mean
I
don't
have
to.
I
can
basically
either
through
a
biometric
or
some
type
of
method.
You
know,
through
a
wallet
on
a
phone
I
can
who
I
am
and
I
don't
have
to
sit
there
and
come
up
with.
I
don't
have
to
you
know,
do
a
new
password
every
30
days.
A
Characters
and
it's
gotta
be
upper
and
lower
case
with
you
know,
additional
symbols
and
stuff
like
that
and
you've
got
to
read.
C
A
Now
I've
got
to
remember
that,
and
you
know
passwords
were
a
really
persistent
problem,
and
so
I
guess
kind
of
the
I
guess
kind
of
the
remedy
for
that
it
was
and
it
was
a
partial
remedy,
is
you
know
they
started
using
federated
identity,
which.
A
If
you
are
logged
into
your
into
your
computer,
you're-
probably
logged
in
to
something
that
has
a
federated
aspect
to
it.
So
you
probably
will
see
that
when
people
say
you're
going
through
a
website-
and
they
say
you
can
sign
in
with
your
google
account-
you
can
sign
into
your
facebook
account,
you
can
sign.
C
A
With
any
number
one
of
those
platforms
that
you're
probably
already
signed
in,
let's
just
use
those
that
credential
to
you
know
sign
into
this
space
over
here,
because
in
the
internals
of
your
computer
they
say:
we've
already
captured
that
elsewhere.
Can
we
actually
translate
it
across
here
and
I'm
not
really
at
all
excited
about
wanting
to
log
into
something
using
my
social
media
credentials.
I'm
just
I'm
not
interested
in
doing
that.
A
That's
too
much
cross-pollination,
yeah,
federated
identity
was
really
a
way
of
you
know,
starting
to
kind
of
you
know,
maybe
you
know
circumvent
the
passwords
or
at
least
having
to
re.
A
But
when
you
do
that,
like
you
were
talking
about
earlier
about
dids
and
that's
decentralized
identifiers-
and
if
I
have
you
know
with
my
bank
or
with
my
utility,
you
know
maybe
a
power
company
or
a
phone
or
something
I
can
set
up
a
decentralized
identifier
and
that's
the
phone
book
that
we
already
have
established
that
we
know
each
other.
We
have
a
relationship,
we
have
an
interaction
environment,
and
so
we
have
proven
through
decentralized
identifiers
that
we
are
who
we
are
and
if
we,
you
know,
leave
and
then
come
back.
A
C
A
B
Yeah
totally
totally,
I
think
that's
a
that's
a
key.
You
know,
especially
with
a
pandemic
situation.
That's
a
key
area
which
could
be
explored
for
messaging.
You
know
talk
about
board
members,
communicating
each
other
with
each
other.
Using
you
know,
com
freely,
available
messaging
tools,
I'm
not
gonna,
take
any
names,
but
you
know
everybody
understands
what
they're
using
today.
So
so
you
know
look
at
look
at
the
words
you
know,
they're
discussing,
really
important
stuff,
utilizing
absolutely
freely
available
messengers.
B
When
you
are
not
paying
anything,
then
you
are
the
product
right.
So
so
so
there
are
people
who
are
who
are
at
risk
of
you
of
losing
their
information
to
to
to
one
big,
daddy
or
even
you
know
there
may
be.
There
are
several
forms
of
corporate
espionage
right,
so
there
may
be
various
things
snooping
on
them
and
then
you
know
talk
about
a
messenger
service
which
is
utilizing
dids.
B
You
know
you're,
you're,
absolutely
secure
or
to
the
extent
you
know
you
protect
the
issuance
and
authentication
of
the
dids
right
in
the
beginning,
then
you're
you're
sure
of
of
what's
going
on
the
other
portion.
You
know
we
just
spoke
about
individuals
now
talk
about
machines,
you
know,
machines
will
have
dids
and
they
will
have
various
transactions
which
will
rely
on
each
other
to
to
you
know,
give
result
to
one
common
outcome.
B
Yeah,
so
those
are
the
kind
of
things
which
will
which
will
require
this.
You
know
absolutely
rock
solid
identification
and
and
non-repudiation
you
know
so
to
say
to
to
to
be
implemented
and
and
to
be
implemented
fast,
because
I
think
people
have
grown
impatient.
Consumers
have
grown
impatient
and
people
want
services
like
these,
I'm
sure
there'll
be
very
few
nerds
who
will
start
using
it
first,
but
but
I'm
you
know
with
with
adoption,
you
know,
will
come
economies
of
scale
and
then
people
will
realize
that
yeah.
This
is
the.
B
This
is
the
best
way
to
do
it.
This
is
a
lazy
way
to
do
it
and
then,
and
then
whatever
we
are
doing
today
is,
is,
is
sort
of
more
taxing.
You
know
so
so
you
know
absolutely
fantastic
discussion.
We
had
mark
and
thanks
so
much
for
being
impromptu
with
this,
but
this
is
this
is
leading
in
a
very
interesting
direction.
I'm
so
excited.
A
Well,
and
actually
I
mean
the
possibilities
I
mean
it
can
really
expand.
I
mean
beyond
that
and
stuff,
because
to
your
point
that
you
made
earlier
that
going
away
from
individuals
into
machines
that
you
know
I
did.
Human
beings
are
not
the
only
ones
with
identities,
it
does
not
have
to
be
a
human.
I
mean,
if
you
look
at
it
in,
say
a
healthcare
setting.
I
mean
it
can
be
a
lab
or
it
could
be
a
clinic.
A
It
can
be
a
building
for
storage,
but
really
and
and
that's
really
kind
of
cool
to
show
how
that's
going
to
go.
But
the
big
thing
that
big
non-human
identity
use
case
is
going
to
be
vehicles,
especially
when
it
comes
to
paying
tolling,
if
you're
going
to
have
surge
pricing
you're
starting
to
have
because
the
technology
exists.
Now
that
you
know
municipalities
and
cities
and
transportation
authorities
can
now
do
this,
but
they're
starting
to
implement
surge
pricing
like
for
for
new
york
city.
A
They
are
right
now
looking
to
and
of
course,
covid
has
derailed
this
a
little
bit
or
delayed
it
a
little
bit,
but
it's
still
coming
because
it's
an
additional
revenue
source
for
for
the
entity.
So
they're
not
going
to
ignore
that,
but
surge
pricing
to
where
you
know
we
want
to
have
fewer
cars
on
manhattan,
island.
C
A
What
we
want
to
do
is
when
we
have
all
these
cars
that
are,
you
know,
entering
the
city,
you
know
below,
say
the
59th
street
and
stuff
we
want
to
and
anyone
that
yeah
you
can
still
come
in
there,
but
you're
going
to
pay
a
higher
higher
rate.
C
A
For
your
car,
but
at
the
same
time
we
want
to
make
sure
that
you
have
the
certain
exemptions
that
are
going
to
be
built
into
that
you're
going
to
have
you
know
those
with
disability
plates
and
stuff.
They
want
to
make
sure
that
they're
not
being
charged
the
surge
pricing
and
that
you
just
you
know,
be
able
to
have
that.
You
know
I
this
this
vehicle
is
who
they
say
they
are
yeah
and
the.
C
A
Actually,
through
a
transponder
on
the
windshield
or
you
know
some
other
method
can
you
know
basically
handle
the
the
display
and
authentication,
as
well
as
the
payment.
A
Right,
so
vehicles
are
going
to
be
really
big.
You
know
when
it
comes
to
dids
and
digital
identity,
absolutely
absolutely.
B
I
I
created
a
model
for
for
a
cryptocurrency
for
africa,
where
the
first
use
case
that
they
wanted
to
develop
was
cars
paying
for
the
fuel.
C
B
Say
you
know
here
I've
just
fueled.
My
car,
the
car
knows
how
much
has
gone
in
the
pump
knows
how
much
has
gone
in,
and
you
know
why
can't
a
machine-to-machine
transaction
happen
here
and
free
the
driver,
so
so
so
that's
something
which
which
they
hadn't
received.
It's
not
launched
yet,
but
yeah
that
was
in
the
works.
A
A
Much
like
they'll
they'll
do
jet
they're.
C
A
Private
jets
right
now,
yeah,
but
and
all
of
that
you
know,
because
it's
going
to
be
interacting
with
a
lot
of
different.
You
know
through
apis
or
through
you
know
some
whatever
method
and
stuff,
but
you're
gonna
want
to
have
that
end
user.
Have
that
single
portal?
That's
you
know
in
in
a
single
transaction.
C
C
B
B
Then
you
know
the
one
of
the
other
very
important
things
which,
which
you
know
which,
which
we
had
been
working
on,
was
also.
You
know
these.
These
vehicles,
transacting
with
each
other,
telling
people
about
accidents
and
traffic
jams
and
and
stuff
like
that.
So
so,
while
there
is
generic
information
required,
I
don't
need
to
share
who
I
am
and
and
where
am
I
coming
from?
Where
am
I
going?
B
I
don't
need
to
do
that,
but
still
if
there
is
a
public
safety
issue
on
the
road,
I
need
to
inform
the
others
right
so
that
you
know
congestion
can
be
lesser
and
and
the
safety
vehicles
can
actually
travel
on
the
roads.
So
those
are
the
kind
of
use
cases.
You
know
machines
talking
to
machines,
cars
talking
to
cars,
they
really
fascinate
me
and
they
and
they're
all
you
know
I
think
they're
all
born
out
of
the
ids.
You
know
getting
the
id
right.
A
Dids,
especially
with
the
march
toward
to
w3c
for
web
web
3.0,
because
there
are
so
many
capabilities
that
are
being
put
into
the
plumbing
right
now,
you
know
dids
and
and
verified
credentials.
A
Yeah
are
our
way
of
doing
it
and
at
the
same
time,
you
can
actually
take
control,
which
is
really
kind
of
a
delicate
balancing
act
because
and
we've
brushed
upon
this
several
times
in.
C
A
C
A
A
A
So
if
you
are
traveling
internationally
and
you
slip
on
some
gravel
and
practice
your
ankle
and
you're
you're
in
singapore,
you
actually
can
have
to
the
even
say
these
are
my.
This
is
my
medical
history,
which
sounds
really,
which
sounds
really
cool
until
you
start
to
think
about
what
would
it
take
for
you
and
me?
What
would
it
take
to
assemble
our
entire
medical
history?
Yeah.
C
A
And
where
would
we
find
that
and
it's
gonna
be
in
a
whole
menagerie
of
formats?
You
know
a
few
of
them
digital.
You
know
everything's
going
to
be
paper-based,
it's
going
to
be
pdfs
and
but
at
the
same
time
where
we
to
you
know
fracture
our
ankles
slipping
on
some
gravel
in
singapore,
it
would
take
a
while
for
them
to
go
all
the
way
back.
You
know
to
our
home
country,
and
who
would
we
talk
to?
How
could
we
say
all
right?
You
know
it
has
samrat
and
mark.
You
know.
C
C
B
B
To
communicate,
you
know
I
I
so
so
there
was
this
poc,
which
I
did
with
one
of
the
state
governments
a
while
back
where
they
wanted
us
to
implement
tids
for
health
records,
and
you
know
one
of
one
of
the
biggest
hospitals
in
india
was
hospital
chain
in
india
was
involved.
They
do
they
do
more
heart
surgeries,
that's
just
one
hospital.
They
do
more
surgeries
than
the
entire
uk
in
a
year,
so
they
they're
huge
yeah
yeah,
so
they
were
involved
and
they.
B
So
what
we
did
was
we
were
like
you
know
here
is
an
authorized
individual,
this,
this
hospital,
proving
that
who
they
are,
and
why
do
they
need
to
be
to
be
accessing
these
records?
They
should
be
able
to
access
the
health
records
of
the
patient
using
their
driver's
license
their
credit
card,
anything
which
is
on
their
person.
C
B
And
eventually
it
could
also
move
on
to
to
your
fingerprints,
because
we
also
have
a
national
id
system
which,
which
could
be
used
to
authenticate
the
guy
and
then
again,
depending
on
you
know
this.
The
entire
risk
lied
with
the
past.
With
the
point
of
you
know,
or
not
the
point
pause.
Basically,
we
should
call
it
point
of
contact
where,
where
the
information
was
being
requested,.
A
A
But
and
now,
but
it
actually
flips
it
to
where
you
say.
I
now
have
an
inbound
query
of
saying:
you
know:
I'm
national,
I'm
just
the
the
hospital
in
mumbai
are,
is
requesting
this
yeah
and
then
you
can
then
sit
there
and
say
well
what
are
you
requesting
and
what
you
know?
What
what
can
I
provide,
and
all
of
that
you
know
be
done
seamlessly.
A
You
know,
I
I
think
that's
something
a
lot
of
people
would
find
attractive
to
say
I
I
like
the
fact
that
I
still
maintain
my
hand
on
the
wheel.
I
still
contain
that,
and
so
instead
of
me
just
relying
and
trusting
where
you
know
I
have
to
make
that
judgment
has
that
trust
been
earned.
A
A
What
you
have
and
so
and
it's
it's
the
same
interaction
that
you
know
people
do
every
day.
C
A
A
An
issuer
that
has
you
know
it's
going
to
be
the
the
the
public
authority
that
issues
your
driver's
license:
yeah
and
using
blockchain
technology
that
is
secured
on
a
blockchain
using.
C
A
Immutability
and
tamper
evidence
of
of
the
blockchain
on
this,
and
so
that
credential
is
an
issue
to
you.
You
were
the
prover,
you
were
the
one
saying
hey,
you
know
what
I'm
the
one
that
has
to
prove
that
I
am
that
I
can
buy
this
bottle
of
wine.
I
that
I've
accessed
this
hospital
or
that
I
can
view
these
records
and
stuff.
I
am
proving
my
credential
that
to
a
verifier
who
will
then
read
it
from
the
blockchain
and
you
can
automate
that
process.
Yeah
basically
say
this
is
a
very
verified
credential.
A
B
Do
the
people
yeah
and
some
people
will
come
on
youtube
and
and
linkedin
and
twitter
and
say,
are
you
gonna
put
data
on
the
blockchain
and
we're
gonna
respond
to
that
saying
no
data
on
the
blockchain
only
hashes
and
proofs
go
on
the
blockchain
so
and
mark
you
know
this
is
one
sort
of
ancillary
question.
The
one
one
risk
that
we
all
sit
on
where
the
id
is
is
the
security
of
devices
or
wallets
where
they're
stored,
yeah.
B
Yeah
endpoint
security.
I
think
that
needs
some
more
development.
I
think
that
was
sort
of
the
biggest
risk
which
I
saw
was
still
left
open.
You
know
either
you
do
two-factor,
you
do.
You
know
stuff
like
that,
and
you
know-
and
you
just
just
reminds
me
of
one
incident.
I
was
in
norway
and
talking
to
a
banking
client
and
about
cyber
security.
B
B
B
You
know
she,
the
user
should
be
jumping
through
so
many
hoops
to
be
able
to
access
their
account
and
then
reset
their
password
or
stuff
like
that
they
said
you
know
there
was
one
one
simple
answer
and
I
was
I
was
shot.
So
they
said
you
know
what
the
user
feels
safe
when
they're
doing
all
this,
so
it
may
may
not
be
serving
the
purpose,
but
this
one
guy's
opinion
changed
mind.
So
it
was
like
users
feel
safe
when
they're
required
to
do
all
this
to
to
come
inside.
So.
A
B
B
I
mean
even
I
used
to
use
that
at
some
point
in
time
I
used
to
use
a
hardware
wallet
for
my
cryptocurrency
and
only
because
you
know
I
did
not
have
a
lot
of
trust
on
people,
and
especially
there
were
so
many
news
about
exchanges,
running
away
and
and
and
bitcoin
getting
locked
and
people
dying
and
then
stuff
like
that,
so
so
it
was
always
good
to
so
so
it
was
always
good
to
own.
B
You
know,
but
not
everybody
is,
is
capable
of
securing
the
end
points,
and
even
I
felt
that
at
times
you
know
it's
not
safe
to
carry
this
around
so
especially
with
the
value
rising
and
everything.
So
so
so
what
do
you
think
is?
Is
the
next
step
you
know
we
should
be
doing.
Should
we
be
storing
dids
and
phones.
A
Well,
the
ids
and
phones,
I
I
think
can
be
secured
to
the
wallet
and
the
endpoint
security
is
definitely
an
addressable
concern
there
and
so
much
so
much
movement
has
been
made
already
and
stuff
because
you
know
so
long
as
you
have.
I
mean
if
you
look
at
okay.
Well,
if
we're
gonna
have
endpoint
security,
what
what
methods
are
we
going
to
use
and
right
now,
it's
multi-factor
authentication,
which
is
very
friction?
And
yes,
if
you
want
to
feel
safe
and
you
want
to
be
diligent
and
thorough
by
all
means,
but.
C
A
C
C
C
A
Type
of
unique,
you
know
physical
attribute,
you
know
for
biometrics.
Really,
you
know,
increases
the
endpoint
security
because
yeah
at
some
point
they
sit
there
and
say
you
know,
is
something
100
secure?
No,
you
know.
D
C
C
A
B
It's
first
a
deterrent,
and
then
you
know
then
a
blocker.
So
I
I
completely
agree,
and-
and
you
know
there
was
also
some
debate
around
having
honey
parts-
you
know
let
them
let
them
get
in
and
find
nothing
so
so
so
yeah.
I
think
pretty
interesting
discussion
mark.
I
think
we
discussed
too
many
use
cases
and
and
challenges
opportunities
with
dids,
I'm
sure.
In
the
coming
weeks
we
are
going
to
build
on
that.
B
The
next
one
is
going
to
be
around
compliances,
so
I'm
going
to
get
somebody
big
from
productivity.
Kpmg,
we're
gonna
be
talking
about
how
the
compliance
landscape
can
be
baselined
yeah.
B
So
so
I
myself
work
with
a
lot
of
cyber
security
projects
and-
and
I
feel
that
once
we
are
shaking
hands,
I
mean
doing,
business
is
like
shaking
hands
once
you're
shaking
hands.
Is
there
a
possibility
to?
I
mean
I'm
planting
a
seed
right
now?
Is
there
a
possibility
to
also
hand
shake
your
cyber
posture.
C
C
A
Is
be
years
away?
That's
going
to
be
specialized
yeah.
I
can
remember
when
I
guess
there
was
an
american
company
called
nextel
that
came
out
and
they
said
right
now.
A
Cellular
networks
were
just
being
built
out
and
the
popularity
was
creating
capacity
issues,
but
at
the
same
time
there
was
a
very
secure
and
very
mature
technology.
The
push
to
talk,
and
so
they
said
we're
good.
Who
are
the
types
of
people
that
you
know
talk
amongst
each
other
within
their
own
ecosystem
every
day
and
that
basically
can
use
this
push
to
talk
so
that
we
can
reduce
some
of
the
load
on
the
cellular
network.
A
A
Of
having
to
set
up
a
new
call
set
up
that
you
know
the
the
circuit
you
know
from
from
a
plumbing
standpoint,
then
they
could
just
have
the
the
radio.
You
know
the
the
push
to
talk
and
they
they
identified
builders
home
builders.
You
know
use
a
lot
of
that,
because
you're
gonna
have
the
carpenters.
A
You
know
the
crews,
the
suppliers
have
them
all
on
that
same
network
and
they're
all
talking
to
each
other.
Oh
okay,
so
realtors
realtors
get
the
realtors
and
the
mortgage
brokers
on
the
same
network
using
all
of
that,
and
so
yes
you're
going
to
be
able
to
have
that.
I
I
guess
these
groups
that
are
going
to
you
know
probably
use
this
more
often,
instead
of
just
having
everybody
use
it
and
stuff,
and
so.
C
B
Yeah
yeah,
so
I
think
this
is
a
this
is
a
fantastic
way
we
could.
We
could
first
find
that
that
nerd
group
and
then
and
then
build
something
for
them.
I
think
this
is
this
is
very
interesting,
so
I
think
these
cyber
security
idea
that
was,
I
was
talking
about
it's
it's.
It's
more
got
to
do
with
people
who
want
to
work
together
really
fast.
I
don't
have
time
to
establish
trust,
let's
just
hand
shake
and
and
see
that
we
are
our
cyber
security
alliance
or
people.
B
You
know
going
up
to
the
government
level.
I
don't
know
it
may
come
in
the
next
25
years.
But
what
if
you
know,
I
wanted
to
establish
a
working
relationship
with
the
government
and
I
could
just
go
and
and
submit
to
them
on
the
portals
that
you
know
here
is
my
security
portion.
I
want
to
work
with
you,
because
currently,
small
businesses
are
just
just
burdened
with
with
compliance
when
they
want
to
work
with
the
government
and
it
happens
across
the
world-
it's
not
just
india
or
us
or
anyway.
B
A
C
A
Just
like
you
know,
on
credit
cards,
you
know
you're
gonna
pay
two
to
three
percent.
You
know
yeah,
so
you
can
have
money
now
we'll
handle
all
the
back
in
the
the
back
office,
reconciliation
and
all
of
that
and
stuff.
But
we're
going
to
charge
you
three
percent
and
merchants
and
business
owners
just
view
that
as
a
cost,
that
is
unavoidable.
A
B
So
and
eventually
what
happens
is
you
know
with,
especially
with
the
government
contract
which
I
have
seen
over
my
experience?
I
mean
this
is
just
my
opinion,
but
what
happens
is
eventually
a
bigger
company
gets,
it
gets
the
contracts
and
then
they
outsource
the
same
guys
who
were
trying
out
their
luck
to
apply
for
the
tenders
in
the
first
place.
So
I
think
yeah
I
think
there
are.
There,
are
these
pockets
of
opportunity
where
a
baseline
can
come
in
and
make
a
difference.
So
with
that,
I
think
work
we
should
wrap
up
for
today.
B
I
welcome
you
to
the
next
one
as
well.
You
know
that's
an
important
one.
It's
it's
yeah,
it's
gonna
be
on
compliances.
I
think
I
think,
no
sorry,
my
bad
the
compliances
one
is
on.
So
I'm
just
looking
at
my
calendar.
The
compliance
one
is
on
21st.
B
So
so
we're
going
to
be
talking
about
yeah,
gdpr,
iso,
compliances
etc,
which
particularly
to
for
cyber
security
data
previously
etc,
which
are
you
know
if,
if
let's
say
you're,
you're
interacting
with
a
company
and
and
if
it
is
beyond
borders,
then
then
you
have
to
spend
time
and
money
on
getting
that
get
audited
and
and-
and
you
know
time
especially,
you
know
you-
you
wait
till
all
that
is
done
to
do
business
so
so
all
that
can
be
eliminated
potentially.
B
So
I'm
just
going
to
invite
some
people
who
want
to
talk
about
stuff
and
one
more
announcement
which
I
have
going
back
to
my
notes.
I
have
an
announcement
around
joining
baseline
in
india,
so
we've
got
tons
of
interest
from
companies
in
india.
We
are
evaluating
companies
to
become
sponsors
contributors
to
baseline
protocol
in
india.
B
We
may
be
closing
the
memberships
for
some
time,
so
I'm
going
to
be
floating
out
a
google
form
where
people
can
reach
out
to
me
or
you
can
reach
out
to
me
via
linkedin
and
and
we're
going
to
see
how
we
can
take
you
in
so
so
for
a
period
of
time.
There
may
be,
you
know
we
may
be
stopping
memberships.
This
is,
let's
just
manage
the
the
pile
that
we're
sitting
on
so
so
that's
that
and
then
we
have
a
very
crucial
thing
coming
up,
which
is
east
atlanta.
B
So
today
I
shared
a
post
about
eat
atlanta,
first
or
third
of
october.
It's
also
got
a
hackathon.
It's
also
got
some
online
sessions,
so
people
in
india
can
can
easily
participate,
start
winning
money
guys
it's
up
to
you.
So
with
that
I
come
to
the
end
of
today's
episode.
Thank
you
so
much
for
watching
us
on
youtube
and
who
will
be
watching
us
in
future.
Do
do
not
forget
to
subscribe
to
the
channel.
B
We
keep
coming
up
with
this
show
every
saturday
at
6
p.m,
and
we
also
make
a
lot
of
announcements
via
this
this
office
hours.
Thank
you
so
much
mark
for
making
it
and
you're
killing
it
in
the
in
the
gtm
space.
You
know
I'm
happy
that
we
are
now
together
in
that.
So
thanks
so
much
everybody
who
joined
in.
B
So,
okay
cool,
so
we're
going
to
end
with
the
song
again.
B
Seems
something
seems
off
anyway,
I'm
gonna
be
next
time
on.
I'm
gonna
find
a
setting
in
zoom.
I
think
that's
the
that's
that's
something
which
is
keeping
it
from
from
playing
last
time,
and
today,
thanks
so
much
for
everyone
who
tuned
in
today,
we'll
see
you
next
week
at
six
o'clock,
cheers.