►
From YouTube: Baseline Protocol v0.1 Sessions 1
Description
Session with Kyle Thomas of Provide Svcs and John Wolpert of ConsenSys talking about changes to the codebase going into v0.1
A
Everybody
it's
john
and
kyle
here
from
the
baseline
protocol
and
we're
going
to
be
talking
now
about
we're
going
to
be
doing
a
session.
We
call
go,
don't
lie
and
code
don't
lie
is
where
we
walk
through
the
new
code
of
the
init
core
branch
that
would
be
pushed
in
the
next
month
or
so
so.
There's
six
packages.
B
That
we
need
to
look
through,
or
do
we
need
to
talk
about
some
of
them
are,
there's
really
only
three
that
I
think
you
really
absolutely
must
implement.
Really,
for
that
you
absolutely
must
depend.
C
On
so
there's
four
packages,
I
think
you
need
to
absolutely
depend
on
if
you
want
to
build
something
that
can
be
considered
a
baseline
compliant
or
in
the
future.
I
guess
the
position
to
absorb
the
rapidly
involving
a
base
of
the
protocol
or
maybe
not
rapidly
evolving,
all
those
the
contract.
C
Package
and
the
price
match,
the
persistence
of
sex
characters
are
not
necessarily
required
in
order
to
implement
the
core
minimalistic
baseline.
You
know
implementation,
replication
or
just
process
circuit,
so
we'll
talk
about
the
resistance
as
well.
So
the
first
package
is
the
almost
package
and
what
that
is
is
a
standard.
C
C
Reference
that
was
demo
that
kind
of
gave
us
all
a
lot
of
ideas
about
how
to
build
a
protocol
yeah.
This
is
the
first
release
of
what
you
could
call
this
is
this
is
this
is
early.000
the
packaging
that
forms
the
protocol
and
patching
right
and
then
they're
in,
like
we'll
use
the
the
the
architecture
here
to
inform
the
standards.
So
if
you
wanna,
if
you
wanna,
dig
through
the
level
of
my
ide,
we
can
also
look
at
it
on
the
level
of
maybe
a
little
bit
more
content.
C
So
if
we
look
at
the
api,
what
we
see
are
a
couple
things:
we
have
the
baseline
json,
which
this
is
essentially
the
the
design
that
ties
the
basic.
C
To
the
change
database
and
it's
away
to
the
position,
contracts
are
easily
or
track
existing
contracts
that
have
already
been
deployed,
and
so
we're
now
using
this
devotional
contract,
it's
actually
the
same
contract
where
it's,
basically
the
the
base
contract.
That
was
that
was
the
shield
that
was
being
inherited
in
the
right
and
registered
foreign
field,
which
is
the
the
merkle
tree
shop
contract
that
the
watching
timber
project,
I'll
probably
say
a
little
bit.
C
We're
saying,
is
that
there's
a
shield
contractor
for
people
don't
know
is,
is
the
container
for
the
mercury
that
stores
the
baseline
proofs,
and
if
you
don't
know
what
that
is
all
about,
then
you
know
just
going
to
go
through
the
dots
right.
That'll
tell
you
why.
Why
were
those
and
what
you
know
the
fact
that
the
baseline
could
be
used
as
a
state
marker
or
a
tnt
lookup,
and
a
way
of
confirming
that
every
counterparty
to
a
particular
workstep
and
based
on
workflow
has
verified.
C
It
has
generated
the
same
results
from
the
same
code
with
same
inputs
and
basically
has
the
same
record
in
their
respective
system.
The
shield
contract
is
a
part
of
the
of
the
zero.
C
C
You
wind
up
in
a
shield
contract
being
able
to
say
to
hide
a
lot
of
attributes
right,
so
you
can
say
somebody
did
something
with
something
which
allows
us
to
not
allow
people
just
to
be
observing
these
mercury
morphology
changes
right
and
say
an
answer,
change
information
about
who's.
Doing
what
is
that.
C
C
So
there's
a
set
of
functions
that
shield
contract
contains
that
allow
you
to
do
things
like
check
ordering
and
other
debt
right.
So
you
can
say
this.
This
merkle
tree
item
can't
happen
before
the
seven
or
three
which
one
happened
before
the
other,
and
so
you
can
call
those
functions
from
those
are
all
contained
in
the
shield
contract
right.
So
yeah.
B
This
is
the
contract
that
we're
using.
So
when
you
call
baseline,
deploy,
it
says,
deploy
contract.
C
B
C
It's
what
it
does
is
it
it
lets.
You
name
a
contract
name
the
contract
and
that
contract
must
be
must
exist
on
the
on
the
rpc
endpoint,
but
the
artifacts
already
have
to
exist
like
the
that
we're
doing
in
the
in
the
spec
here
in
the
api
and
in
the
api
stack
right.
We
have
the
voice
shield
method.
If
we
actually
want
to
run
runs
test.
Would.
C
C
C
A
B
You
actually
you.
C
C
Is
going
to
have
lots
of
processes
and
so
like
one
verify
one
shield
player
and
hopefully
the
future
of
just
one
shield,
contact
in
general
and
hold
on
to
their
fires?
Really.
C
Know
are
you
saying
that
is
the
cardinality
here?
This
is
really
interesting.
Now
what
a
work
group
is
defined
by
an
order
registry
and
a
workflow,
you
can
have
multiple
workflows
defined
by
a
shield
contract
and
a
verifier
yeah.
B
C
B
B
C
These
you
know
three
or
three
three
four
packages
that
you
really
need
to
use
and
then
the
assumptions
the
fourth
package,
the
contracts
package-
is
actually
also
being
used,
but
maybe
it's
just
already
been
deployed
for
you
right
on
the
main
order
and
your
group?
Okay,
all
right.
So
that's
good!
That's
a
big
change
right
now
register
contract
yeah
that
you're
deploying
at
the
registry
in
1820.
I
think
what
you're
just
calling
it
is
then
yeah
it's
repeatable
right.
So
now
I
can
do
is
I
can
go
to
it's
a
people
thing
right
right.
C
B
All
you
gotta
do
is
basically
like,
and
what
is
that
doing.
C
For
me,
the
worker
is
it's:
actually
it's
the
it's
the
tv,
the
registry
for
all
the
organization
is
the
phone
book,
it's
the
phone
book,
but
anyways.
Why
would
I
just
call
people?
Why
can't
I
just
know
in
the
code.
I
called
it
like
a
roller
decks.
Yes,
but
beyond
being
a
fast
look
up
yeah,
it
never
seemed
to
me
that
it
did
much
well.
It's.
B
C
For
the
public
keys,
it's
where
you
can
establish
other
other
methods
of
encryption,
such
as
having
those
problems
in
the
same
place
really
important
does
that?
Does
that
create
an
opportunity,
for
somebody
wants
to
do
an
exploit
grab
a
bunch
of
identities
that
might
be
obviously,
but
still
right
and
do
some
analysis
to
figure
out
who
they
are
and
what.
B
C
C
C
Parties
and
they're
having
another
individual
registries
that
are
also
they're
also
on
chain
that
are,
are
referencing
the
other.
You
know
the
original
keys
right.