►
Description
https://github.com/intel/dffml/pull/1401#issuecomment-1170489046
Frank's tutorial (https://frankhinek.com/getting-started-with-tbds-ssi-service/): https://www.youtube.com/watch?v=UnRS1DQbHj4&list=PLtzAOVTpO2jaHsS4o-sDzDyHEug-1KRbK&index=89&t=3163
A
All
right,
so
I
renamed
the
last
video
into
the
thing
about
spinning
up
the
vm
and
now
we're
going
to
try
to
launch
the
stack
all
right,
so
we
need
to
copy
over
our
the
contents
of
our
our
git
config
and
our
big
data
see.
So,
let's
take
a
look
at
the
git
config
right,
so
this
basically
says
hey.
You
know
this
is
my
settings
here
and
it's
also.
A
The
credential
helper
has
been
set
for
github
and
gist
to
clone
and
with
it
with
the
auth
helper,
that's
used
by
the
github
cli
and
then
the
auth
is
stored
in
this
dot,
big
gh,
folder,
and
so
we're
gonna
grab
that
as
well
so
configuration.getconfig
we're
going
to
create
a
tar
file
out
of
that
we're
going
to
deter
file,
we'll
be
output,
the
standard
out
and
then
we'll
pipe
that
output
into
the
we'll
type,
that
output
into
a
tar
file
or
into
the
extraction
and
on
the
other
host
right.
A
So
now,
if
we
ssh
in
we'll
see.
A
Running
the
ssh
command
see
that
the
dot
config
is
there
and
the
interesting
it
created
them
as
a
different
user,
so
preserve
the
user.
A
So
okay,
so
let's
do
user,
add
dash
mpdx,
johnny,
okay,
so,
let's
add
a
user
and
let's
do
cp
dot.
Ssh
authorize,
keys,
pdx
johnny
that
ssh.
A
So
we
we
call
makeder
and
we
pass
it
their
name
on
whatever
the
last
thing
was
and
then
we
can
go
ahead
and
copy
that
over
there
and
then
we
can
go
ahead
and
copy
config
as
well.
B
A
A
Sudo
user,
mod
g,
p
d,
x,
johnny
or
pseudo
pdx
johnny,
so
this
says,
or
actually
we're
already
rude,
so
we
just
say:
modify
the
user.
Add
a
group,
the
sudo
group
to
pdx
johnny,
the
user
and
now
now
I'll
have
sudo,
and
then
we're
also
going
to
do
we're
going
to
set
the
shell
to
be
we'll.
Do
a
command
substitution
we'll
do
which
bash
and
that
way,
when
I
log
in
the
shell
will
be
bash.
B
B
A
A
All
right
and
then
copy
the
files
into
that
users
create
a
new
user
with
studios
roots
like
shooter
privileges
and
their
own
home.
A
A
A
A
B
B
A
A
A
A
A
B
A
A
A
A
A
Okay,
so
modified
dot
files
for
the
host.
If
tmox
opens
with
errors
and
copy
paste
errors
into.
B
A
We
can
just
say
cat.
A
B
A
A
A
Okay,
I
don't
know
what
was
supposed
to
happen
there.
It
doesn't
matter
we're
not
we're.
Only
gonna
start
to
launch
too
much
shock.
B
B
B
A
A
B
A
A
A
Do
the
pseudoline
here
we
want
to
be
no
password
all
right
so
that
way
I
don't
have
to
type
in
a
password,
so
I
don't
have
a
password.
A
A
A
A
A
All
right
there
we
go
now:
we've
got
the
pseudo
command
all
right,
so
let's
go
back
up
here
and
update
the
docs.
While
this
thing
runs
it's
here.
Okay,
so
you
note
that
there
is
both
a
backslash
t,
tab
and
a
space.
A
A
A
A
A
A
A
A
A
A
B
A
A
A
A
A
All
right,
so
we
grab
the
location
of
where
it
is
right,
so
add
the
pip
installed
scripts
to
the
path.
A
B
A
A
A
A
A
A
The
home
variable
is
the
home
dealer,
liberal,
with
the
home
variable
yeah
cd.
Add
the
addition
to
the
path.
A
A
A
A
A
B
A
A
A
A
Okay,
it's
because
of
this
quote
right
there,
all
right!
So
there
we
go
okay,
so
we
were
able
to
issue
a
verify:
a
bull
credential.
B
A
Okay,
so
it
looks
like
we
can
effectively
encode
arbitrary
data
via
the
verifiable
credentials,
so
we're
going
to
go
ahead
and
use
that
to
to
create
our
open
architecture,
graphs
and
then
we'll
use
it
from
it
for
execution
yeah
in
the
distributed
environment.
Okay,
so
and
we've
already
done
the
encoding,
so
so
we're
going
to
just
dump
in
there
it's
going
to
be
ugly,
but
remember
the
we're
gonna
dump
a
minimally
encoded
version,
and
I
think
you
know
originally.
We.
A
A
So
then,
we
could
have
proper
schema
for
them
as
well
to
match
their
manifest
right
and
the
manifest
will
tell
us
how
to
get
the
data
that's
off
chain,
okay,
that
because
we'll
execute
it
based
on
the
sandbox
defined
by
the
orchestrator,
that's
applicable
to
that
context
or
by
the
orchestrated
given
right,
which
we
validate
with
our
sandbox
properties,
as
we
do
execution
based
on
these
things
that
are
going
to
be
given
to
us
via
the
other
distributed
environment.
A
Okay,
so
because
we
need
to
verify
our
change
of
trust
on
things
and
what
do
we
actually
want
to
issue?
So
we
might
check
for
multiple
variable
credentials
on
something
right
and
one
of
the
verifiable
credentials
might
actually
be
the
thing
that
we're
executing-
and
one
of
them
might
actually
be
a
thing
that
says
yeah.
We
actually,
we
might
be
like
the
provenance
information
that
that
tells
us
that
we
do
actually
want
to
be
executing.