►
A
A
I
forgot
cloning.
Gay
repos
has
been
blue
screening,
my
my
my
my
windows
machine
lately,
so
you
guys.
A
I
think
I
think
you
all
understand
why
I
so
desperately
desperately
want
us
to
have
distributed
compute.
I
can't
I
can't
maintain
computers
for
the
life
of
me,
so
it
better
be
easy
to
move
one
thing
from
one
computer
to
the
next
computer
because
they
don't
stick
around
for
long.
Okay,
is
this
working
all
right,
great,
all
right?
That
is
going
the
other
window.
A
Perfect
great
all
right,
this
says
we're
on
nope
nope.
Yes,
yes,
it
does.
Okay,
all
right
so
back
to
it.
So
we
are
in
the
active
directory
verifiable
credentials
code
which
we
should
not
have
done
in
wsl
for
some
reason,
because
the
system
doesn't
like
that.
A
A
A
B
Provider
I
subscribe
to,
I
want
to
use
azure.
I
want
to
use
a
distributed
network
of
compute.
A
A
Okay,
so
somebody
did
a
binding
to
java
to
web
assembly.
We're
doing
this
all
right
here
we
go
here.
We
go
folks
example:
oh
god,
these
people
always
have
their
act
together.
Oh
my
gosh.
A
B
A
A
So
this
looks
great.
I
think
we
already
have
some
webassembly
code
that
we
can
integrate,
so
it
should
just
be.
A
A
Okay,
of
course,
robust
mechanisms
for
secure
communication
already
exists.
However,
most
rely
on
key
registries,
identity,
prover
providers,
certificate
authorities,
browser
app
vendors
or
similar
centralizations.
Many
are
unsaturated
or
many
are
unstructured.
Rich
chat
only
or
enable
value-add
behaviors
through
proprietary
extensions.
A
Oh,
are
they
talking
about
just
messaging
in
general,
okay,
yeah?
Okay,
I
see,
and
he
also
assumes
single
transport.
A
A
Alice
wants
to
negotiate
with
bob
to
sell
something
online
because
d-I-d-com,
not
direct
human
communications
methodology
in
this
example
alice's
software
agent
on
bob
software
agent.
This
is
exactly
what
we're
saying
are
going
to
exchange
a
series
of
messages.
Alice
may
pay
just
press
a
button
and
be
unaware
of
the
details,
but
underneath
her
agent
begins
by
preparing
a
plain
text,
json
message
about
the
proposed
sale
particular
sign
of
irrelevant
here,
but
would
describe
as
a
spec
of
a
higher
level,
sell
something
protocol
that
uses
the
iq
column
messaging
as
its
foundation.
This
looks
perfect.
A
Alice's
agent
then
gets
two
key
pieces
of
information
from
bob
typically
by
resolving
bob's
did
doc
an
endpoint
where
messages
can
be
delivered
to
bob
perfect
if
public
key
the
bob's
agent
is
using
in
the
alice
bob
relationship
perfect.
Now,
alice's
agent
uses
bob's,
qd
and
crypto
plain
text.
So
if
anybody
got
roped
into
chill
chat,
if
I
roped
you
into
chill
chat,
this
will
sound
familiar.
A
So
now,
alice's
agent
uses
bob's
public
key
to
encrypt
the
plain
text
so
that
bob's
agent
can
read
it
adding
authentication
with
its
own
private
key.
The
agent
arranges
delivery
to
bob
this
arranging
can
involve
various
hops
and
intermediates.
It
can
be
complex.
A
A
I
think
what
did
I
come
down
to
yeah?
I
think
I
came
down
to
the
fact
that
you
needed
attestation,
because
how
am
I
supposed
to
trust
your
node
to
relay
my
rest
message?
Yeah,
that's
what
I
came
down
to
yeah
and
so
that's
what
we're
talking
about
with
the
with
the
review
system
and
then
the
yeah,
the
attestation
and
the
attestation
is
basically
you're
proving
that
you're
running
on
what
you
say,
you're
running
on
and
then
now
we're
also
talking
about
running
basically
sandbox
code.
A
On
top
of
that,
just
to
define
an
agnostic
way
to
interact
with
an
application
from
an
end
user
perspective,
that's
programmatic!
A
A
Like
a
multi-rest
like
a
like,
if
you
passed,
if,
instead
of
passing
just
a
rest,
call
to
a
api
right
or
just
a
body
in
a
rest
call
to
an
api,
imagine
now
that
you're
passing
like
a
siri
like
you're,
passing
it
a
program
that
it
it
interprets
in
an
an
execution
environment
right,
an
execution
environment,
that's
sandboxed
specifically
for
that
application,
and
it
has
automated
tooling
to
do
all
of
the
checks
on
on
what
that
sandboxing
is
required
and
and-
and
you
know
then
allows
for
reconfigurability
and
integration
in
different
places
if
need
be,
and
and
then
maintains,
that
knowledge
of
what
sandboxing
is
needed
in
different
contexts
in
different
deployment,
contexts,
yeah,
and
so
that's
what
we're
doing
so,
and
this
is
the
transport
layer.
A
Basically,
and
that's
what
they're
saying
that's
what
they're
saying
is
is
is
is
there's
projects
like
our
project
right
now
who
we
want
to
use
this
so
two
years
ago
we
did
a
gsoc
project
to
do
distributed
server
with
with
nats
a
distributed
setup
with
nats,
and
we
didn't
we.
We
didn't
know
enough
about
how
this
should
work
then,
and
so
a
lot
of
great
stuff
got
done,
but
at
the
end
of
the
day
we
didn't.
Quite,
I
think
we
we've.
A
A
Because
we
want
to,
you
know,
be
able
to
host
things
on
our
own
machines
and
be
like
hey.
You
know,
try
this
new
little
model
that
I
wrote
right
or
try.
You
know
whatever,
and
and
so
that
we
can
all
hack
together
collaboratively
remotely
right,
but
you
know
it's
very
hard
to
do
that
when
you're,
like
you,
know,
you're
trying
to
share
your
application,
you
know
with
somebody,
maybe
so
so
what
what?
If
you
wrote?
What
I
had
one
earlier
like.
A
You
know
you
write,
you
write
a
cool
little
you
you
just
write
hello
world
right,
but
you
should
be
able
to
deploy
hello
world.
You
know
to
your
grandma's
iphone.
If
you
wanted
to
right,
like
you,
should
be
able
to
do
that
by
sending
her
a
it,
it
shouldn't
be
hard
to
make
it
say
like
to
do
the
same
thing.
You
know
that
you
would,
if
you
have,
if
you
have
these
predefined
relationships
of
trust
in
the
real
world,
to
then
extend
them
to
the
digital
world,
and
then
you
know
sort
of
extend.
A
You
know
what
you
would
be
doing
if
you
were
sitting
there
right
or
like,
or
had
the
time
to
go,
do
that
right,
but
you
can
just
automate
all
of
it,
because
it's
all
on
one
shared
well,
that's
more
of
like
the
whole
architecture
thing
in
synthesis,
but
it's
yeah
the
communications
and
everything
just
get
breaks
down
over
different
use
cases,
and
so
the
reason
why
the
reason
why,
basically
you
so
so
you
can
solve
so
that
in
that
use
case
with
the
iphone-
and
that
was
bad
one
for
this,
that's
more
of
like
that's
the
generic,
like
that's
what
is
nice
about
keeping
your
basically,
your
declaration
of
how
you
want
to
grab,
take
your
prototypes
and
put
them
together
and,
as
opposed
to
you
know,
actually
like
compiling
like
compiling
is
like
synthesis
is,
like
you
know
it's
it's.
A
A
It
is
that
you
wanted
to
do,
and
so
basically
what
we're
saying
what
what
we're
saying
here
in
this
series,
where
we're
going
to
do
this
12
12
months
right,
where
we're
going
to
build
this,
you
know
ai
software
architect
is
that
so
12
months
is
a
short
amount
of
time
and
we
need
to
get
this
thing
learning
as
fast
as
possible
and
that's
why
we're
starting
with
what
is
the
basis
for
the
communication
and
for
the
storage
format
and
for
for
getting
things
in
and
out
and
communicating
between
nodes,
because,
obviously
we
we're
all
about
massive
concurrency
and
parallelism.
A
So
we
need
to
you
know,
but
to
facilitate
this
communication
of
all
these
nodes.
A
In
this,
like
mesh
giant
distributed
mesh
network
of
whatever
computer,
we
can
get
access
to.
We
we
can,
you
know
we,
we
don't
have
to
jump
through
a
lot
of
hoops.
We.
Basically,
if
we
want
to
proxy
you,
you
write,
you
can
write
anytime,
you
want
to
get
data.
Basically,
all
of
the
data
travels
between
nodes.
Through
this
you
know
web3
interface
or
wait.
Do
we
really?
Even
now,
I'm
actually
thinking
about
this
again.
A
A
20
more
minutes
so
12
20,
and
if
we
can
use
something,
if
we
can
run
some
code,
we
can
run
some
code
that
will
transmit
and
receive
a
message.
A
A
A
This
is
the
world
of
open
api,
swagger
and
most
rpc
for
that
matter,
and
it
has
many
virtues.
Unfortunately,
many
agents
are
not
good
analogs
to
web
servers.
They
may
be
mobile
devices
that
turn
off
at
unpredictable
intervals
and
lack
stable
connection
in
the
network.
They
may
need
to
be
work
peer-to-peer
when
the
internet
is
not
available.
They
may
need
to
interact
in
time
frames
of
hours
or
days
now
with
30
second
timeouts,
and
we
listen
to
the
same
channel
that
they
used
to
talk.
A
So,
if
you're
interested
in
doing
embedded
device,
development
and
stuff
like
that,
this
is
like
you
know.
Maybe
you
know,
building
building
these
protocols
into
the
low-level
drivers
on
on
some
of
these.
You
know
resource
constraint,
devices
in
yeah,
in
protocols
like
rus
or
in
things
like
rust,
would
be
some
some
cool
projects
or
you
know,
into
existing
projects
that
are
written
in
whatever
language
they
already
are
and
to
add
support.
A
Something
like
zephyr
would
be
really
cool
to
add
this
to
so
because
of
this
fundamental
paradigm
of
ddi.d.com
messaging
is
message
based
asynchronous
and
simplex.
Alice's
agent
sends
message
over
channel
a
sometime
labor
later
it
may
receive
a
message
which
may
or
may
not
be
a
response
from
bob's
agent
over
channel
b.
This
is
much
closer
to
an
email
paradigm
than
a
web
paradigm.
On
top
of
this
foundation,
it's
possible
but
elegant
synchronous,
request
response
interactions.
All
of
us
have
interaction
with
their
friends
god.
This
is
just.
A
I
love
this,
I'm
so
happy.
Somebody
finally
did
this.
It
just
makes
me
so
happy.
This
is
just
just
just
warms
my
heart.
Thank
you
list
of
people
and
encrypted
method
messages.
Okay,
okay,
okay,
let
me
add
it.
Let
me
add
it.
Let
me
add
it.
A
Okay,
what
about
you
do
you
have
appendix
okay,
so
yeah?
This
is
the
other
thing
about
this,
and
this
is
why,
and
so
so,
you'll
say
well
what
we
can
have
all
these
public
relays.
Like
you
know,
you
know,
people
will
relay
things
it's
great.
A
It's
distributed
well,
okay,
but
I
don't
trust
them
when
this
information,
you
know,
if
you
can
break
these
keys
20
years
from
now,
then
I'm
not
sure
that
I
trust
them
random
people
to
relay
stuff
for
me
and
that
was
kind
of
the
the
conundrum
that
I
ran
into.
You
can
set
things
up,
obviously,
but
everything
at
the
end
of
the
day
ends
up
being
like.
A
A
B
A
Okay,
oh
sorry,
the
id
com
messaging
is
a
powerful
way
for
people,
institutions
and
iot
things,
internet
of
things,
things
to
interact
via
machine,
readable
messages,
using
features
of
decentralized
identifiers
as
the
basis
for
security
and
privacy.
It
works
over
any
transport,
http,
bluetooth,
smtp
raw,
socket
sneakernet,
for
example.
I
don't
know
what
sneakernet
is,
but
I
know
what
smtp
http,
bluetooth
and
raw
sockets
are,
and
I
like
that.
It
works
over
all
of
them
and
is
that
it
is
that
it.
What
is
this
hyperledger?
B
What
is
this,
this
is
so
cool.
This
is
so
cool.
B
A
Why
why
okay?
I
am
questioning
why
I'm
doing
this,
though,
because
I
think
maybe
I
should
just
implement
the
data
flows
class
stuff.
Okay,
I
think
we
decided
that
yes,
this
is
a
valid
way
to
go.
We
haven't
okay,
we
haven't
been
able
to
put
a
system
context
in
there
yet
so
we
need
to
know
that
we
can
put
a
system
context
in
there
if
we
can
put
a
system
context
in
a
message.
A
A
A
A
A
A
A
A
Okay,
let's
use
this
one,
here's
this
guy,
this
guy's
put
some
stuff
on
here
and
he
was
on
the
one
that's
active
recently,
which
is
this
one
there.
He
is
so
because,
and
so,
once
again
we're
building
these
we're
building
these
these
graphs
where's
where's,
who
are
the
key
players
who's
involved
in
what
projects?
How
do
you
know
you
need
to
understand
who?
What
what
code
bases?
Do
you
trust
and
what
people
can
you
trust?
Who
wrote
those
code
bases
what
base
or
and
what,
like
things,
based
on
what
stuff
you're
seeing
like
on?
A
You
know:
you're
looking
on
twitter
and
you're
like
okay,
so
we
see
that
you
know
this
guy
daniel
he's.
Obviously
he
knows
he
knows
what
he's
talking
about.
We
should
go.
Listen
to
him
right
this
guy.
He
seems
to
be
another
another
smart
daniel,
so
we
need
to
go,
listen
to
him
and-
and
so,
if
he's
working
on
this
one,
if
they're
keeping
this
up
to
date,
that's
a
good
sign.
A
It's
getting
updated
like
somebody's
working
on
it.
It
looks
like
there's
a
working
group,
we
could
join
oh
and
they
have
slack
channel
okay,
so
we
can
go
check
that
out,
but
not
right
now,
okay,
so,
but
for
now
we
know
that,
basically,
okay,
so
by
association,
we
can
sort
of
trust
that
this
is.
This
is
good.
This
seems
like
good
stuff
right
here.
You
know
like
this
is
stuff
that
we
can
build
build
stuff.
A
A
A
A
Years
just
years
just
years,
sometimes
it's
just
the
right
time
now
is
the
right
time.
Now
is
the
right
time
for
this
project.
These
things
look
at
all
these
things
that
just
okay,
so
this
d
they're,
all
everything-
is
just
coming
together.
A
Okay,
so
this
did
com
v2
is
our
new
best
friend
I
mean
this
is
just
the
coolest
thing:
where's
twitter.
This
is
something
worth
tweeting
about.
A
A
Okay,
so
well
we
kind
of
got
burned
last
time.
That's
why
we're
on
5.2.
Last
time
we
did
a
git
clone
on
this
computer,
so
distributed
copy
descriptor
distributed
copy.
B
A
A
A
B
B
A
All
right
so
we're
going
to
fire
up
nodemon
here
we're
going
to
tell
it
hey
nodemon
soon,
we're
just
going
to
say:
hey!
Let's
do
this
go
ahead
and
watch
these
files,
node
1.?
What.
B
B
A
B
A
Are
they
in
here?
I
think
they're
defined
here,
yeah
they're
defined
here,
resolvers
config,
okay,
here
we
go
so
this
is
what
we're
doing
secrets
resolver
I'll
ask
to
see.
This
is
why
I
really
hate
this
from
pi
test
and
why?
But
it's
nice
that
pi
test
does
this,
because
this
is
a
data
flow
based
approach.
So
it's
going
to
be
very.
It
should
be
trivial
to
extract
this
information
from
pi
test
and
and
it's
it's
it's
basically,
it's
it's.
It's
internal
data
flow.
That's
keeping
right!
So
that's
going
to
be
great!
A
I
love
it
for
that,
but
I'm
glad
that
we're
gonna
have
a
way
to
make
it
look
a
little
more
organized
here.
So
that's.
B
A
B
A
Yeah
we
have
this;
they
have
this.
They
have
this
thing
where
they'll
search
through
the
code
for
a
name
right
now,
so
let's
try
it.
A
A
B
A
B
A
A
And
referencing
verification
methods
allows
them
to
be
used
by
more
than
one
verification
relationship.
It's
like
a
ref
or
something
or
it's
like
a
yeah.
It's
like
one
of
those
json
schema
refs.
If
the
value
of
a
verification
property
is
a
map,
the
verification
method
has
been
embedded
in
its
properties
and
can
be
accessed
directly.
However,
if
the
value
is
urls
string,
the
verification
method
has
been
included
by
reference
and
its
properties
will
be
needed
to
be
retrieved
from
elsewhere
in
a
did
document
or
from
another
did
document.
A
I
don't
think
this
throws
wrenching
anything
for
us.
I
think
we'll
just
sort
of
take
it
as
face
value
and
say:
okay,
cool
the
following
curves
in
our
in
grand
prize
supported.
Okay,
great.
This
is
where
we
asked
matt
thanks
forward
protocols
implemented.
Okay,
you
gotta
have
crypto
getting
gotta
gotta,
find
a
crypto
person.
Gotta
find
good
math
people
crypto
people.
A
B
A
A
Now
it's
within
the
main
package
secrets
demo:
this
is
fantastic.
A
A
I'm
so
excited
okay,
so
this
is
all
what
this
means
is
that
all
we
have
to
do
is
implement
this
class,
and
so
since
this
is
you
know,
since
what
we're
doing
here,
you
know
our
first
objective
was,
you
know,
suss
out
this
integration
with
with
the
ids
and
then
we
came
to
did
com
which
and
did
com
version
two,
and
then
this
python
library,
and
then
we
found
this
and-
and
it
looks
like
okay-
maybe
it
hasn't
been
in
updated
in
quite
that
long,
but
you
know
we
can
also
do
is
we
can
also
reach
out
to
this
guy
and
see
what
he's
been
up
to,
and
you
know
see
see
what's
up
so.
A
Okay
looks
like
this
is
from
the
last
stuff.
He
did
well,
he
might
have
been
making
bow
loads
of
money
yeah
and
then
he
just
might
have
stopped,
because
that
is
what
I
just
advocated
for
so
and
good
on.
You
dude,
sweet,
okay.
Well,
we
won't
bug
him,
then
he's
probably
just
chilling.
Then
I
think
we
can
just
assume
that
he
kind
of
cashed
out,
because
this
is
just
fantastic.
A
A
Okay,
all
right,
so
we've
confirmed
that
you
know
it's
not
going
to
get
all
mad
at
us
about
this.
You
know
we
want
to.
You
know,
go
touch
the
network.
For
god's
sake,
we
want
it
to
be
async
all
the
way
down
and.
A
So
now
we
just
need
to
figure
out
how
to
run
some
code
still
so
so
do
we
even
need
to
do
that
yeah?
Let's
make
sure
that
we
can
put
something
in
there
and
then
we
know
that.
A
A
Okay,
so
and
I
don't
think
well,
okay,
great
okay.
So,
basically,
yes,
so
we
learned
that
you
know
there's,
basically
we
so
we
followed
what
we
did
is
we
we.
We
followed
the
train
of
thought.
A
We,
if
you
think
about
like
sort
of
there's
different
problem
spaces
right
and
you
know
people
are
working
within
those
problem
spaces,
and
this
is
where
we
we
talked
about
like
the
w3c
and
rcfs
and
our
rfcs,
and
you
know,
then
the
adrs
within
the
individual,
repos
and
sort
of
how
you
know
like
adrs,
then
w3c,
then
rfc
or
like
you
know,
but
this
is
the
widest
widest
reach,
because
it's
all
of
the
internet
right
and
so
what
we
did
is
we.
We
said
we
need
this.
A
We
want
to
build
this
thing
and
this
thing
we
want
it.
We
want
it
to
be
ubiquitous
right.
We
we
see
a
gap
in
the
current.
A
Deployment
environment
and
there's
people
working
on
this
type
of
stuff,
of
course
right
this,
I
think
I
saw
I
think,
zelenka
brooklyn
zelenka,
I
believe
she's
her
company
looks
similar
to
this.
I
saw
it
but
heavily
based
on
elixir.
It
looks
like
they're
doing
some
really
cool
stuff
there
and
yeah,
so
this
is
this
is
definitely.
A
This
is
definitely
like
an
interesting
space
to
be,
and
I
think
that
you
know
adding
some
some
machine
learning
on
top
of
there
and
and
basically
just
focusing
on
that
distributed
nature
of
programming
and
the
need
for
us
to
test
our
code
more
and
more
and
and
to
you
know,
make
that
feedback
loop
with
the
ml
and
and
and
try
to
get
it
to
to
sort
of
go
to
to
guide
us
even
more
and
more
and
help
us
just
make
our
development
in
this
asynchronous
model
more
effective
right
and
then
you
know,
the
side
effect
may
eventually
be
that
if,
if
we
can
make
this
so
effective
at
us
collaborating,
then
we
take
that
step
and
we
see
if
the.
A
If,
if,
if
alice
can
start
writing
her
own
code
right
after
she's,
really
helped
us
communicate
better.
A
And
alice
is
just
obviously
you
know
the
the
instance,
the
name
for
the
instance
of
the
entity
and
so
any
any,
and
like
any
instance
where
you
run
it,
you
can
name
it
whatever.
You
want
right,
like
so
so
great
so
yeah,
so
so
our
alice
is
going
to
be
our
our
bot
for
our
project,
and
so
because
we
had
talked
about
spinning
up
infrastructure
and
stuff,
and
so
basically
we're
just
going
to
wrap
all
that.
A
All
of
that
is
going
to
get
wrapped
into
there's
the
bot
the
bot
will
do
all
the
stuff
right,
and
so,
if
we
want
to
deploy
infrastructure,
this
will
help
us
keep
our
infrastructure
as
code
right
and
so,
and
it
will
also
help
us
create
a
distributed
network
of
of
infrastructure
amongst
our
own
machines.
A
As
you
know,
developers
on
our
project,
where
we're
very
geographically
distributed-
and
you
know,
maybe
have
different
hardware
and
different
problems
on
different
hardware
and
and
just
different
systems
and
configs
and
stuff,
and
so
if
we
can
communicate
those
environments
right.
If
we
can
take
snapshot
these
system
system
contacts,
we
can
then
begin
to
eliminate
the
it
works.
On
my
machine
or
the
it
doesn't
work
on
my
machine
problem
right
because
we
can
say
well.
Why
is
your
machine
different
than
some
other
machine
right
right
now?
A
We
don't
know,
but
we're
going
to
find
out
right
because
we're
going
to
capture
state
and
we're
going
to
capture
overlays
on
on
upstream
and
and
and
just
we're
going
to
capture
a
lot
of
state
basically
and
then
we're
going
to
put
it
in
this
in
this
web
3
network
and
likely
what
we'll
do
here
is
so
what
we're
seeing
here
is
so
bob
and
alice
are
passing
messages
to
each
other
right
and
in
the
event
that
we
are,
you
know,
maybe
doing
a
method
call
within
a
data
flow
execution.
That's
distributed.
A
We
may
encode
the
the
message
as
the
the
the
sending
operation
we
may
encode
the
message.
A
As
a
you
know,
we
may
we
may
send
it
to
multiple
parties
right,
so
we
may
send
it
to
the
telemetry
service
or
telemetry
services,
or
maybe
you
know
we're
doing
this
like
pull
model
dev
tooling
issue
is
talking
about
and-
and
you
know,
we're
just
sort
of
sending
a
notification
out
to
the
network
and
the
network
is
all
the
other
developers
that
we're
working
with,
and
we
say:
hey
here's
a
new
change
right
here.
A
I'm
publishing
my
new
change
right
and-
and-
and
you
know
you
can
also
have
these-
you
could
have
the
basically
the
nice
part
about
using
this.
This
web3
message
bridge
is
that
now
we
can,
we
can
take
any
service,
anybody
can
stand
up
a
service
anywhere
and
it
doesn't
have
to
be
connected
to
http.
You
don't
need
a
website,
you
don't
need,
you
can
run
stuff
in
webassembly.
You
can
run
stuff
in
your
browser
because
we're
going
to
pass
it
all
through
this
right,
and
so
you
don't
need
to
maintain
servers
anymore.
A
You
can
run
your
stuff
in
in,
like
you
know,
base
anything
that
runs.
Wasn't
you
can
run
your
stuff
right
and,
and
what
is
your
stuff
well,
your
stuff
is
defined
by
these.
These
these
system
context
these
data
flows
that
are
living
in
at
least
their
their
very
most
basic
form
where
they
go
and
get
the
rest
of
the
data
that
they
need
on
chain.
A
A
That's
what
we're
doing
and
then
we're
going
to
throw
the
ml
on
top
of
it
to
basically
do
automated
feature
engineering
on
auto
and
feature
engineering
across
the
whole
set
of
data
that
we
see
as
we
throw
everything
in
the
network.
B
A
A
Sometimes
sometimes
it's
like
when
I
it's
like:
oh
man,
it's
still
good.
It's
still
good.
It's
still
good
still
making
progress,
but
it's
just
it's
better
to
have
the
recording,
because
I'm
talking
to
it
and
not
writing
it
down,
which
saves
time.
Obviously
it
also,
you
know,
takes
time
to
explain
some
things,
but
it's
good
to
explain
things
because
we
need
to
get
this
all
written
down
of
the
whole
process
right.
A
We
need
to
understand
the
process.
Okay,
so
I'm
a
little
bit,
I'm
a
little
bit
upset
about
the
fact
that.
A
Did
com
secrets
secrets
resolver
in
memory
now?
What
does
this
look
like?
This
looks
just
like
some
code
that
we
have.
This
looks
just
like
the
memory.
The
the
memory
source
looks
just
like
it.
A
B
A
A
A
A
Also,
putting
the
upstream
url,
where
you
got
the
source
from
this,
ensures
that
you
can
double
check
very
easily,
that
that
is
the
license.
You
think
it
is
and
because
you
don't
want
to
run
down
the
line
and
realize
you
actually
switched
the
wrong
tab
there
and
which
is
actually
now
I'm
going
to
do
it
again
to
double
check
and
it
is
apache,
2.,
okay,
great
yeah,
you
don't
want
to
you
don't
want
to.
You,
do
not
want
to
be
down
the
line
and
and
using
the
wrong
license.
A
Okay!
No!
So
now
we
have
to
do
secrets,
resolver
alice,
all
right,
okay,
just
keeps
coming
just
keep
coming
see.
This
is
why
this
is
why
we're
gonna
get
the
data
flows
and
we're
gonna
get
it
so
that
we
can
introspect.
John
was
already
doing.
White
man
was
already
doing
some
python,
ast,
parsing
and
so
we're
gonna,
and
I
mean
this:
is
you
don't
even
need
to
do
ast
parsing
for
this
right?
You
just
you
just
load
all
the
files?
A
A
We
just
once
we
get
this
once
we
get
this
solid
foundation
down
where
we
get
this
sort
of
one
level,
always
one
level
deep
execution
like
the
kvm
nested
setup,
then
it's
gonna,
be
you
know,
I
think
I
think
basically
we'll
we'll
be
ironing
out
documentation
and
auto
ml
stuff
and
because
the
current
stuff
that's
in
there
was
probably
like
the
least
performing
way
you
could
ever
possibly
do
something.
I
think
we
have
some
some
some
basics.
A
Obviously
this
is
why
you
know
it
takes.
It
takes
everybody
to
figure
it
out.
So
I
think
once
we
get
this
distributed
to
compute
down,
that's
gonna
make
a
lot
easier
to
interact
and
and
and
once
we
get
this
sort
of
you
know
things
we
we
get
this
data
flow
as
class
and
we
get
the
data
flow
as
class
down,
and
then
we
do
the
yeah
we
get
the
data
flows
class
down.
A
I
think
that's
going
to
be
really
good.
I
think
that's
that's
going
to
be
we're
gonna
be
in
a
good
spot
there
and
then-
and
then
you
know
also.
Maybe
we
also
just
need
to
do
like
introspection.
You
know.
Maybe
we
could
do
it
where
we
look
at
a
pie
test
test
and
we
enable
running
it.
Maybe
we
should
do
that.
That's
actually
really
good.
That
could
be
a
really
good
course
of
action.
A
I
know
some
people
who
run
pi
test
so
including
cv
bentool,
so
you
could
basically
take
any.
A
We
could
experiment
with
the
cv,
bend
tool,
pi
tests
and
we
could
see
if
we
could
write
the
cli
using
only
the
existing
tests
or
modification
or
just
only
tests,
and
that
way
you
have
the
same
interface,
so
you're
never
duplicating
any
code,
but
you're
grabbing
the
argument
from
these
fixtures
actually
from
the
command
line
or
maybe
from
an
http
api
because
you're
importing
it
to
a
data
flow,
and
then
you
can
do
this
transparent.
A
You
know
rewiring
of
things
so
because
your
data
flows,
your
intermediate
representation.
That's
that's
the
cross
language.
Intermediate
representation
focused
on
that
on
the
data
right
all
right.
Let's,
let's
pack
this
measure,
I
think
I'm
probably
getting
tired
here.
So,
let's
pack
this
message:
if
we
can
pack
a
message,
then
oh.
A
Okay,
I'm
kind
of
I'm
kind
of
really
fed
up
with
put
up
with
the
fact
that
this
is
not
cloned,
but
I
don't
want
to
a
blue
screen
again.
The
id
resolver
come
on.
Just
secrets
was
over.
I
want
to
figure
this
out
tonight.
B
A
So
these
are
a
lot
of
different
secret
keys
here.
How
do
we
generate
them?.
A
A
All
right,
so
what
is
this?
And
why
is
it
interesting?
So
this
will
get
into
our
you
know:
yeah
relaying
nodes.
I
believe
I
wonder
how
this
is
interacting
with
the
distributed
web
node
spec
work.
A
We
won't
concern
ourselves
with
that
for
now,
so
we
just
want
to
make
sure
that
we
can
encode
this
message,
and
if
we
can
do
this,
then
we
are
good
so
secrets
or
somewhere
else,
but
I
also
want
to
make
sure
that
we
can
actually
create
keys
because
I've
gotten
into
this
situation
before
where,
where
okay
are
these
just
jwk?
B
B
A
A
So
this
thing
says
it
can
generate
these
json
web
tokens.
A
So
we're
gonna
try
to
we're
gonna
we're
gonna,
we're
gonna,
we're
gonna
double
check
that
these
things
work
together,
so
secrets,
resolver,
alice,
so
secrets
was
oliver
alice
had
one
too
many
had
one
too
many
statically
defined
keys
and
I've
been
in
too
many
times.
Have
I
gotten
into
a
situation
where
you
start
using
some
library
and
then
all
of
a
sudden,
you
need
to
generate
keys,
and
it's,
like
god,
help
you
you're
deep
in
the
open,
ssl
apis.
A
A
A
A
It's
because
yeah,
I
think
I
fell
into
this
one.
B
A
B
A
A
B
A
B
A
A
This
is
a
media
or
this
is
the
type
yeah.
Oh,
my
god,
how
many
times
have
we
all
written?
Something
like
this?
The
structure
of
the
body
is
predicted
a
value
of
message.
However,
some
attributes
are
common
in
different.
Many
different
messaging
types.
Metadata
about
a
message
means
the
same
thing,
regardless
of
the
context
and
when
it
is
susceptible
to
red
to
generic
rather
than
message
specific
handling,
the
metadata
can
be
placed
in
headers,
headers
are
siblings
of
body
and
may
be
added
to
any
message
type.
A
B
B
A
A
Uri
associated
body
of
plain
text,
message
with
published,
published
and
versioned
schema
very
important,
manifest
that
makes
this
a
manifest,
so
it
has
yeah
published
in
version
schema
makes
it
a
manifest.
B
A
Actually,
I
think
that
shim
code
yeah
that
shim
code
is
kind
of
there's
some
stuff
in
there
that
might
get
reused
and
most
of
it
was
its
own
plugin
system.
Everything
ends
up
being
a
plugin
system,
so
now
we're
just
we'll
just
ditch
that
we'll
just
do
it
with
ndfml.
That's
why
dfml
has
to
be
dependency
free,
it's
just
it'd,
be
nice.
It
would
be
a
one
line
file.
A
A
A
B
A
A
Ids
keys
used
by
specifically
both
senders
or
your
keys,
derived
by
key
agreement.
Okay,
so
they're
going
to
agree
to
you
some
specific
type
of
keys
that
they're
using
both
of
the
same
type
of
asymmetric
key
as
my
understanding
here.
Okay,
I'm
just
it's,
that's
quite
a
scam,
but
that's
my
guess.
Protecting
the
sender
identities.
A
They're
gonna
do
something
to
do
that
with
some
math
authentic
mandates,
use
of
family
of
content,
christian
algorithm,
it's
very
difficult
to
figure
out.
I
always
have
a
really
hard
time
figuring
out
what
the
right
algorithm
I'm
supposed
to
use
is.
A
This
is
why
I
think
you
need
to
really
pull
this
stuff
out
all
the
way
to
where
you
can
say.
You
know,
have
this
transparency
and
say:
hey,
you
know,
where's
all
the
places
I'm
using
random,
crypto
algorithms!
Okay!
Well,
hey!
You
know,
let's
have
visibility
on
that,
because
that
is
not
easy
to
trace
through
right
how
each
one
is
configured.
So
if
you
can
use
a
data
flow,
you
could
trace
that
through
or
you
know,
if
you
can
represent
it
as
a
graph
and
a
properly
instrument.