►
A
All
right,
let's
go,
let's
go,
let's
go,
let's
go,
we
are
back
in
cryptography
and
we
are
figuring
this
out.
So
what
do
we
got?
What
do
we
got?
We
have
our
signing
key
which
we're
going
to
rename
from
jwt
to
key
signing
just
messing
around
right
now.
A
And
then
we
will
pass
it
down
here.
So,
let's
just
see,
where
else
are
we
using
that
value?
So
key
is
signing
keys,
encryption
right,
so
we're
going
to
pass
the
encryption
key
to
the
we're
going
to
pass
the
encryption
key
to
the
encryption
stuff
and
we're
going
to
get
it
by.
A
A
A
Because
we
don't
care
about
the
public
proportion
right
now,
because
we're
only
using
for
encryption
so
derived
key
derive
shared
key
private
key
dot
exchange
pure
public
key
okay
generate
private
key,
generate
private
key
exchange,
pure
public
key
okay:
let's
pull
up
philippo's
go,
go
cold,
go
go,
go
code
again,
let's
take
a
look
at
them
side
by
side.
A
Okay.
What
do
we
got
here
and
let's
make
sure
that
we
attribute
appropriately.
A
References
I
like
to
put
references
here
so
we'll
say.
A
A
A
C
A
A
A
A
A
A
A
A
A
Okay,
yeah
yeah.
Well,
we
don't
want
to
well.
We
want
to
reuse
a
key
only
because
this
is
all
we've
got
right
now
and
we
need
to
let's
see.
A
A
They
know
what
they're
doing
yeah,
I'm
pretty
sure
they
work
on
all
of
the
krypto
stuff
yeah.
We
don't
want
to
go
against
the
recommendation.
A
Yeah
and
so
why
don't
we
reuse
keys?
I'm
sorry,
I
should
have
explained
that,
so
why
don't
we
reuse
keys
and
what
what
are
we
being
told
to
do
here
so
we're
being
told
to
generate
some
new
keys
and
then
basically,
you
know,
you
know,
figure
out
a
way
to
link
them
back
to
the
old
keys,
so
why?
A
Why
was
I
so
hell
bent
on
on
using
the
same
key
because
the
it
could
just
be
like
this,
because
we
could
have
had
parody
with
the
did
key
like
we
could
have
had
the
same
key
like
if
we
could
have
used
the
same
key.
So
basically,
I
could
look
up
on
github
without
being
told.
A
A
A
Cannot
concatenate
stir
not
jwk
to
stir,
so
maybe
we
need
to
do
maybe
if
we
did
json
or
dot
export.
A
C
B
A
A
A
A
A
A
B
A
A
A
A
B
A
A
A
A
A
A
A
A
B
C
A
A
C
Okay,
fine,
that's
fine!.
A
C
A
B
A
Is
the
user
with
the
browser
getting
a
point
where
connections
need
to
return
to
websites?
Enterprise
agent,
qr
petition,
display
scan
and
if
protocol
is
established?
Life
is
good.
However,
the
current
invitation
process,
the
same
user
returns
to
the
same
page.
The
process
is
executed.
New
connection
is
created
between
the
two
agent
there's
no
way
the
users
they
just
say.
Hey.
I've
already
got
a
connection
with
you.
We
need
the
ability
to
reuse
a
connection
existing
connection.
Some
did
invitation
handling.
The
inviter
dictates
the
connection
establishment,
okay,
so
handling
about
a
band.
A
A
A
Okay,
oh-
and
here
was
the
stuff
that
we
were
just
trying
to
figure
out.
Okay,
all
right,
that
was
a
red
herring
on
that
github
keys,
okay,
so
resolve
pdid.
A
A
A
A
A
C
A
A
A
Hack
signed
yeah,
that's
right:
small
resolvers,
config.