►
A
All
right
back
back
in
the
diagram,
okay,
so
I
believe
we
were
confused
about
where
what
idv
is
so,
let's
go
ahead
and
I
think
we
had
the
here's.
The
paper.
A
The
wallet
sends
ask
message
to
identity
hubs
of
each
pfi.
It
desires
to
include
as
a
potential
fulfillment
counterparty
all
right,
so
alice's
wallet
resolves
number
one.
On-Ramp
example:
alice's
resolves
and
caches
the
current
set
of
keys
and
identity
habit
points
for
the
dids
of
known
and
discovered
pfis.
This
is
a
periodic
activity.
The
wallet
repeats
as
needed
all
right.
You
got
a
new
person,
you're
interacting
with
a
new
other
friend
bot
on
the
network.
A
That's
going
to
be
you
know
your
your
pfi,
basically
everybody's,
going
to
act
as
a
pfi
to
each
other
in
this
in
this
situation,
because
we
all
have
these
unique
currencies
which
are
the
the
and
the
currency
is
production
right
if
you're
playing
like
if
you're
familiar
with
like
a
civilization
game
or
something
you
know
like
we
care
about
it's
production
right,
there's!
No,
I
mean
money
could
be
involved
right,
but
money
is
one
aspect
of
production:
okay,
so,
okay,
so.
A
D
A
A
A
A
A
C
D
A
A
I
have
to
fix
the
highlighting
on
this,
or
else
when
we
do
select
on
these
recordings.
We
aren't
going
to
know.
A
When
we
do
select
on
these
recordings
else,
won't
know
so
we're
going
to
take
the
recordings
of
these
this
development
sessions
and
we're
going
to
feed
them
to
alice
as
training
data,
to
sort
of
teach
her
how
she
is
built
and.
A
You
know
our
like
a
level
of
success
on
this
project
is,
to
you
know,
give
verbal
instructions
on
how
to
take
the
code
bases,
as
they
were
at
the
snapshot
in
time
that
we
start
the
project
and
then
to
have
alice,
go
transform.
You
know
into
the
version
which
she
exists,
as
you
know,
whatever
the
code
base
looks
like
then
or
functionally
equivalent
when
we
in
the
project.
A
So
basically
what
we
would
do
is
you
know
we
do
the
whole
project
and
then
we
say:
hey,
you
know,
alice
redo
the
project
which
is
herself
and
we
will
come
up
with.
You
know,
an
architecture
that
you
know
learns
from
all
of
the
things
that
we
did
so,
maybe
as
to
do
it
better
right,
like
a
refactor
on
an
automated
refactor.
A
I
think
a
lot
of
what
we're
going
to
get
into
is
probably
going
to
be
automated
refactoring,
because
they
we
need
to
take
things
from
like
the
ideation
phase
through
to
something
modular
right
like
our
goal
is
really
to
shoot
for
functions
right
as
as
the
one
like
a
a
function.
A
Per
file
is
really
our
goal
right
for
in
terms
of
portability
and
modularity
right,
because
if
we
could
do
a
function
per
file,
if
we
could,
you
know,
facilitate
processes
which
would
allow
for
representing
code
bases
as
purely
one
one
function
profile
and
the
tooling
around
that
to
make
that
feel
integrated,
then
everything
would
be
sort
of
as
modular
as
possible,
right
and
as
testable
as
possible,
and
so,
but
also
yeah.
Okay,
it
doesn't
really
okay,
it
doesn't
really
even
doesn't
really
even
matter
because.
A
Yeah,
it
is,
it
is
because
every
file
and
every
function
becomes
like
this
data
transformation
right
and
it's
basically,
you
know
the
inputs
and
outputs.
We
record
right.
We
know
their
definitions
and
then
the
config
we
record
right.
So
we
basically
have
you
know
like
we're.
Creating
almost
this
like
functional
programming
out
of
not
functional
programming
right,
so
we're
going
to
analyze
all
the
code
and
then
we're
going
to
map
it
into
this.
A
You
know
intermediate
representation,
which
is
our
open
architecture,
which
is
our
data
flow
and
then
we're
going
to
and
then
we're
going
to.
You
know
sort
of
optimize
across
right
and
and
kind
of
refactor
and
fix
things
across
okay.
So
I
can't
remember
how.
A
All
right,
no
more
explaining
oh
yeah
and
oh
yeah.
We
were
talking
about
feeding
these
videos
to
house
yeah.
A
So
really
it'll
just
be
interesting,
because
we
need
it
to
be
explainable
right
and-
and
we
need
to
be
able
to
have
this
arbitrary
level
of
abstraction
upon
which
we
use
to
interact
with
alice
right
so
that
we
can
define
things
by
hand
where
we
need
to
and
write
our
own
functions
as
we
iterate
over
this
activity,
which
will
be,
you
know,
fairly
complex
right
and
we
won't
have
all
the
answers
so
we're
going
to
hand
code
parts
of
it
decision,
trees,
etc.
D
A
And
we
just
keep
iterating
that
loop
until
you
know
the
intel
you
know
one
can
successfully
feed
the
data
set
of
you
know
how
we
got
to
as
far
as
we
have
and
to
the
final
product
right.
So
basically,
you
know.
A
D
A
Would
be
up
to
speed,
I
guess:
okay,
okay!
Well,
let's
not
think
about
that!
Now,
okay,
so
the
pfi
and
alice
swapped
here
and
we're
gonna
put
this
on
the
side
here
and
we're
gonna
go
back
to
this
on
ramp
example.
A
Okay,
so
the
pfi
is
bob
and
alice
is
so
the
pfi
is
submitting
in,
let's
see
so
the
wallet
sends
the
ask
message
to
the
identity
hubs
of
each
pfi.
Okay,
so
bob
is
go,
is
to
include
as
a
potential
fulfillment
counterparty.
Okay,
so
bob
is
fulfilling
the
desire
for
this
currency
and
what
is
the
currency?
A
The
currency
is
the
execution
flow,
which
bob
proposes
as
a
counter
proposal
to
the
execution
flow,
which
alice
already
put
out
there
right,
because-
and
this
is
where
this
is-
why
it's
a
little
bit
confusing,
because
there's
there's
there's
already
one
counter
proposal.
That's
happened
here
by
the
time
we're
involving
tb
dex
right.
So
how
do
I
draw
this?
You
know
we'll
just
do
it
on
here.
Okay,
I
just
feel
like
now
it's
getting
a
little
bit;
okay,
so
maybe,
let's
just
yeah.
Okay,
I'm
having.
D
A
Like
the
highlighting
helps,
okay,
okay,
so
alice,
does
the
ask
we'll
just
work
that.
D
A
As
prioritizer
goes
to
ask
okay,
so
new
system
contacts
from
external
entity
create
offer
okay,
so
let's
remove
the
word
bid
anywhere.
It's
used
because
we're
overloading
that
term
now,
because
I
believe,
let's
see
what
is
bid
in
the
tbdx
notation.
A
D
A
Alice
does
the
ask
the
identity
hub?
Is
bob
bob?
Does
the
bid?
So
bob
says
yes
alice.
This
is
an
acceptable
system
context
for
you
to
execute
in
response
to
my
call
for
execution
right,
so
you
may
say:
okay,
so
bob
may
say,
for
example.
This
is
where-
and
this
is
where
the
strategic
plans
get
interesting
right.
A
I
want
to
deploy
a
service
with
99.999
uptime
and
I
want
it
to
cost
five
bucks
a
month
right,
so
alice
can
say.
Okay,
I
can
do
that
right.
She
can
look
and
she
can
say.
Okay,
look.
I
have
some
provenance
information
in
the
form
of
reviews.
That
says
you
know
I
can
offer
nine
nine.
You
know
whatever
whatever
amount
of
nines
of
uptime
right
and
so
then
you
know
bob
will
get
that
back.
Bob
the
identity,
hub
and
he'll
say:
okay,
let's
see.
A
He
issues
the
bid
and
then
so
bob
issues
the
bid
right
so
alice
says
yes,
I
can
do.
I
can
do
that.
Here's
the
ask
basically
bob!
You
know.
I
have
x
system
contacts
right.
You
know
I
have.
I
have
currency
target
current.
What
is
it
target
currency?
Where
is
the?
How
did
this
become
its
own
thing?.
A
Target
currency
search
currency,
serious
currency,
so
we
need
because
we
need,
we
need,
we
need
string.
We
need
a
string
field
to
plug
in
our
dids,
all
right,
so
source
currency,
the
currency
that
you
currently
hold.
Okay,
yes,
and
so
this
is
alice
alice
holds
what
what
currency
does
she
hold?
Well,
she
holds
the
system
context
which
she
is
able
to
create
right
because
she's
creating
it
as
a
as
a
response
which
is
a
which
is
a
counter
response
to
bob's.
A
You
know
proposed
system
context
right
so
alice
may
say
I
can
spin
you
up
those
four
servers
on.
You
know
this.
Maybe
we
had
something
that
we
were
gonna
use
to,
let
you
pay
for
servers
with
with
cryptocurrency
right.
So
what
we
could
do
is
we
could
say,
hey.
You
know.
A
Let's
see
what
we
could
do
is
we
could
say,
alice
could
say
hey.
You
know,
I
can
spin
you
up
these
servers,
but
you
know
you
you're,
not
gonna
get
nine
nines
off
time.
You
know,
maybe
you
get
maybe
get
four
nines
of
uptime
right
and
so
bob.
A
Bob
the
identity
hub
in
this
case
where's
our.
A
Who,
unfortunately,
doesn't
fit
on
the
screen
anymore?
Okay,
we're
gonna
have
to
use
a
little
trick
here.
Okay,
so
bid
we're
gonna
get
rid
of
bid,
so
bob
the
identity
hub
comes
back,
and
that's
why
we're
here?
So
we
need
to
get
rid
of
this
word
before
it
confuses
me
again,
all
right,
okay,
we're
just
gonna
call
it!
You
know
response.
A
This
is
another
bad
choice,
but
just
to
get
us
through
this
few
seconds
here,
so
all
right,
okay,
response
on
job,
okay,
so
response
on
job,
that's
not
what
we
really
want
so
create
offer
response,
enter.
Okay,
new
system
contacts
from
external
entity
response,
okay,.
A
A
A
Counter
proposal:
it's
a
counter
proposal
yeah,
it's
like
it's
a
counter
proposal
right.
So
what
does
this
counter
propose?
Counter
proposed
system
context.
A
A
Proposed
acceptable,
proposed
aligned,
proposed,
aligned,
proposed,
aligned
proposed,
align
system
context,
because
the
key
here
is
that
we
don't
care.
If
you
do
it
exactly
the
same
way,
we
care,
if
you
do
it
within
acceptable
guidelines
right
and
so
the
thing
is
you
can't
and
the
reason
why
some
of
these
you
know
why?
Why
why
transferring
around
some
machine
learning
models
is
going
to
be
helpful
here
is
because
and
and
the
combination
with
this
whole
idea
that
the
tv
dex
is
also
talking
about
it.
A
Like
your
trusted
parties
in
this
reviewing
system,
is
you
can't?
Every
everybody's
environment
is
going
to
be
very
difficult
or
different
right,
and
so
you
know
you
need
to
have
this
translation
mechanism
which
allows
you
to
say:
okay,
yes,
this
is
this
fits.
You
know
this.
This
is
the
this
is
sort
of
like
the
compliance
that
scales
to
your.
You
know
it's
it's
it's
a
scalable
compliance
right,
scalable,
risk
mitigation
and
management,
that's
built
in
here,
so
that
you
can
basically
say
hey.
A
You
know,
whatever,
whatever
the
scope
of
the
problems,
that
we're
dealing
with
within
these
transactions
right,
where
we're
trying
to
get
stuff
done
right,
basically
choose
subcontract
within
a
within
subcontract
and
scale
within
my
overall
organizational
or
set
of
organizational
risk
management
policies
right,
and
she
can
do
that
all
in
an
automated
way.
A
Okay,
so
what
do
we
decide
response.
D
A
We
called
it
aligned.
A
A
A
Align
system
context,
analysis,
align
system
context,
let's
see
so
new
system
contacts
from
external
entity.
So
what
happens
so
align
system
context,
so
we
go
in
search
so
first
we
decide
whether
we
care
right.
Okay,
you
told
me
that
you're
doing
something
right.
A
Okay,
I
don't
care,
but
you
know,
maybe
you
know
maybe
it's
like
I'm.
You
know
I'm
focused
on
something
else.
So
let's
take
that
example
where
we
were
talking
about
the
you
know
two
developers
working
on
a
project.
A
The
database
service
goes
down
right
and
they're,
both
they're
co-developing
on
on
a
feature
branch
right,
each
each
their
own
feature
branches,
but
they
have
some
cross
independent,
cross-dependent
stuff
that
they've
been
cherry-pricking
cherry-picking
across
each
other's
branches
right
and
so,
when
they
do
this,
they
you
know
sometimes
developer
or
sometimes
alice
is
going
to
be
working
in.
A
A
Yeah
we
have
two
services:
yeah,
okay,
so
basically
remember
when
we
yeah.
So
we
remember,
we
said
the
database
goes
down.
So
maybe,
if
I'm
not
working
on
anything,
that's
related
to
the
database,
then
I
don't
care
right.
I'm
not
going
to
you
know
bob
may
be
saying
hey
the
database
went
down
right
like
I
need
help
right
and
that
might
trigger
alice
to
go,
generate
a
system
context
which
says:
hey.
A
You
know,
notify
john's
phone
that
the
database
went
down
and
you
know
you
know
he
needs
some
help
right
now,
right,
you
know
maybe
there's
some
kind
of
threshold
which
you
know
alice
knows
how
to
help
some
situations
and
then
what
other
ones
she
doesn't
know
how
to
help
you.
She
calls
out
right-
and
so
so
within
that
you
know
these
this,
this
regular
broadcast
of
system
context.
A
Sometimes
you
know
you
may
have
a
profile
set
up
where
it's
like
okay,
well,
within
these
trains
of
thought
right
and
so
what
are
the
trains
of
thought?
Well,
a
train
of
thought
is
a
classification
that
happens
on
a
sequence
of
system
contexts
right.
So
if
you
have
a
sequence
of
system
contact
or
like
the
general
clustering,
which
a
sequence
or
set
of
system
context
falls
into
right,
so
basically
you
know
effectively.
A
So
maybe
maybe
you
know
the
two
johns
we're
doing
development
work
on
the
project
right
and
you
know
we're
writing
some
collector
interfaces,
and
you
know
we're
writing
some
visualizations
and
and
okay,
and
we
want
to.
A
We
want
to
automatically
you
know,
re-validate
the
changes
that
we're
doing
you
know
against
each
other's
against
each
other's
development
work
right,
so
we
want
to.
Essentially
this
is
like
this:
a
b
feature
testing
stuff.
A
Basically,
we
want
alice
to
automatically
cherry
pick
automatically
cherry
pick
off
each
branch
to
generate
this
like
matrix
of
permutations,
to
understand
the
commits,
almost
as
if
they
were,
if
they
were
individual
feature
flags
which
will
feed
in
as
inputs
right
and
then
we'll
generate
all
the
valid
system,
context
being
the
ones
that
pass
the
test
between
our
two
branches,
where
we
cherry
picked
across
all
of
the
you
know,
individual
commits
right,
and
this
will
basically
tell
us-
you
know
what
is
our
bleeding
edge
version
that
you
know
we're
both
working
off
of
right
and
that's
sort
of
you
know
the
best
known
tested
version
with
all
applicable
feature
flags,
available,
right
and
and
enabled,
and
then
everything
else,
sort
of
molding
to
that
you
know
figuring
out
what
other
api
calls
need
to
be
changed
to
support
those
feature
flex
would
get
into
that.
A
That
would
be
a
later
thing
that
we
would
do
right,
but
in
that
case
you
know
the
execution
policy
may
be
such
that
you
know
when
you
see,
bob's
changes
come
in
or
well
yeah.
So
when
you
see
bob's
changes
come
in
right,
pfi,
one
identity
hub,
for
example,
says
it
issues.
So
aside
from
these
two
things,
let
me
just
get
out
paint.
E
A
C
A
So
essentially
you
know
this
would
be.
This
is
make
this
like,
not
the
giant
and
then
let's
say
okay
so
made
commit
right,
so
bob
made
a
commit,
and
so
this
would
be
here
right
and
then
so
bob.
A
A
Bob
says
alice,
something
happened,
alice
says:
oh
bob.
I
would
like
to
help
you
with
that.
Here's
how
I
can
help
you
and
then
bob
says
great.
I
would
like
your
help
with
that.
Here's,
my
bid,
which
says
I
would
like
this
many
helps
of
that
right.
This
many
helpings
of
help
right
and
then
alice,
goes
and
does
it
okay
and
then
they
do
the
settlement
or
whatever
right.
A
A
All
right,
okay,
great
I'm
glad
we
got
that
figured
out
okay
paint!
Thank
you
paint
always
there
when
you
need
it.
A
Okay,
this
is
great
okay,
so
new
system
context
from
external
entity
align
system
context;
okay,
so
new
system
context
for
external
entity.
Let's
just
leave
it
right
there
that
that
is
the
end
of
that
sentence
or
phrase
okay.
So
this
is
what's
happening
right
here
right,
so
we're
going
to
create
an
offer.
A
A
By
pushing
or
by
creating
a
d
id
for
a
or
d
id
yeah,
creating
a
did
for
an
align
system
context
right,
so
we
create
the
align
system
context.
We
store
it
off
chain.
We
issue
a
did
which
says
you
know
this
is
the
align
system?
Context?
Hey
bob?
Would
you
like
me
to
execute
this
thing
right
and
then
and
and
to
do
that
align
system
context,
creation.
A
Determinability,
we
determine
the
ability
to
create
the
valid
system
content.
We
determine
the
set
of
valid
system
context,
given
the
top
level
so
determine
set
of
valid
system
context,
given
top
level
system
context
and
assets
at
disposal
right.
So
what
what
do
I
have
any
computers
you
know.
Can
I
actually
run
anything?
No?
A
I
guess
this
is
a
bit
of
a
mess
of
a
thing
anyways
at
this
point.
We
should
just
split
this
up.
A
I
don't
really
want
to
split
this
up.
It's
all
sort
of
this
is
basically
a
subflow.
Well,
not
really,
but
it's
fine,
it's
fine!
For
now
we
could
refactor
it
later
right.
Okay,
respond
with
proposed
id
to
be
ex
of
to
be
executed,
system
context,
given
as
source
currency,
generate
the
ask
bing.
A
Okay,
so
ensure
content,
okay,
so
okay,
so
at
that
point
we
jump
back
over
to
bob
the
pfi
good
old
bob,
the
pfi
okay,
so
ensure
that's
spelled
wrong.
A
Pfi
get
aligned
system
context
now
that
is
a
much
much
much
much
better
name
for
an
operation
than
then
get
bids.
Much
more
descriptive.
Okay,
pfi
check
on
align
system
contacts,
okay,
so
prioritizer
feeds
into
pif.
I
get
align
system
context,
check
on
align
system
context
and
timeout
are
all
going
to
feed
back
into
the
prioritizer,
which
then
will
feed
into
get
align
system
context.
Okay,
because
everything
is
one
level
deep,
so
ensure
system
context
on
chain
and
clearly
broadcast
request
that
shouldn't
be
capitalized.
D
To
be
careful,
I
say:
didn't
I,
okay,
none
of
that
needs
to
be
capitalized.
Okay,.
A
A
Collaboration
because
this
is
not
necessarily
like
you
might
work
together,
you
might
propose
a
subcontext
where
you
both
share
resources
right,
so
so
alice
may
say
or
or
bob
may
say
I
have
this-
you
know
I
would
like
to
get
this
thing
done
and
alice
would
may
say:
hey.
A
I
queried
your
inventory
of
available
machines
for
jobs
like
this,
and
it
says
that
you
have
this
many
pool
with
this
many,
this
many
job
or
this
many
runners
that
you
could
be
using
to
help
with
this
job
and
bob
says:
oh,
hey
greet
gee
gee
thanks
right.
I
didn't
know
that
because
I
just
issued
the
request
for
for
the
for
the
system
context
to
be
executed,
right,
bob
didn't
go,
go
check,
he
didn't
go
check.
He's
checked
the
validity
of
the
system
context
before
he
submitted
it
right.
A
He
didn't
check
the
providence
information
all
the
way
through
right,
so
alice
goes.
She
does
the
due
diligence
right
and
then
she
submits
it
back
to
bob
and
bob
says:
okay
looks
like
you
did.
Your
due
diligence
looks
like
everybody
who
I
trust,
signed
off
on
your
due
diligence
right.
Basically,
let's
go,
you
know
here
you
go
here
here
you
go,
I
accept
right
and
in
in
in
that,
in
that
case
then
then
we
go
execute.
A
So
let's
look
at
the
tbdx
thing,
so
I
offer
accept
idp
request.
Idb
submission
set
of
my
request
set
up
my
details:
settlement
receipt,
okay,
so,
okay,
let's
go
back
to
the
white
paper.
D
A
Okay,
let's,
let's
here's,
what
we're
going
to
do
we're
going
to
dump
this.
A
We
can
use
a
little
trick
on
the
tricks
page
of
the
blog,
which
is
basically,
if
you
do
echo,
and
then
you
just
give
it
the
http
headers
so
like.
Let's
just
do
1.0,
I
can't
remember
if
it's
backslash
or
forward
slash,
I
think
it's
backslash.
D
A
1.0
200,
okay,
quite
honestly,
I'm
not
even
sure.
If
it
matters,
I
think
it'll
eat
the
headers
either
way,
then
give
it
two
new
lines
or
give
it
one
new
line,
because
the
echo
will
add
the
other
new
line
and
then
give
it
a
cat.
A
A
A
Okay,
oh
everything
is
alice.
I
think
something
happened
in
the
tv
dex
flow
alice
is
doing
everything.
This
is
a
problem.
A
Okay
and
here's
what
we
can
do
check
so
we
can
run
nodemon
and
then
we
can
just
say
on
markdown
file,
change,
clear,
the
terminal
pipe
through
netcat
and
then
test
one.
I
always
add
test
one
at
the
end,
or
else
nodemon
will
be
unhappy.
If
sometimes
it
doesn't,
if
it
fails.
Sometimes,
okay,
it's
not
happy,
but
the
quotes.
A
A
We
can
hit
this
url
as
many
times
as
we
please,
although
I
think
we
should
run
ncat
with
that
and.
A
A
Where
is
it,
I
think
it's
on
here
so
now
we're
updating
our
notes.
Basically,
this
is
a
generic
generic
node
stock,
and
here
it
is
so
display
a
file
as.
D
Plain
text
in
the
browser
so
console,
so
this
would
be
redisplay
on
reload.
A
And
then
we'll
put
a
note
here
that
dash
capital
n
to
netcat
means
close
socket
on
eof
from
stdn
from
standard
input.
A
D
A
All
right
so
yeah
here
here
here,
all
right
great
now
that
looks
better
right,
so
the
non-variable
names,
the
ones
where
spaces
are
not
sensitive,
so,
okay,
so
okay,
so
ensure
so
bob.
The
pfi
ensures
system
contacts
on
chain,
clearly
broadcast
request
for
a
line
system
contacts
to
chain
right,
so
he's
doing
call
for
proposals.
Give
me
your
align
system.
Contacts
alice
goes
down
and
she.
A
Says:
hi
bob
here's
a
new
system
context
from
external
entity.
Let
me
create
an
offer
by
creating
a
did
for
an
align
system
context.
Let
me
determine
the
set
of
valid
system
contexts
given
the
top
level
context
and
assets
at
disposal
and
then
respond
with
the
proposed
did
of
the
executed
system
context,
giving
us
the
source
currency
with
provenance.
Information,
let's
say,
determine
respond
so.
A
D
A
C
A
Execution-
and
you
know,
I
think
there
might
be
another
one
here-
I
think
it's
execution
remembrance,
which
I'm
not
sure,
if
that's
a
word,
but
it
could
be
or
hypothesis,
and
so
basically
remembrance
would
be
pulling
information
out
of
the
memory
of
an
entity.
You
know
just
please
remember
something
for
me.
You
know,
please
give
me
this
data,
basically
cached
execution
right.
So
what
we're
going
to
do
is
we're
going
to
go
ahead
and
make
graphql
we're
basically
going
to.
A
We
can
overlay
using
our
output
methods,
and
it's
will
basically
in
our
cached
execution-
will
basically
overlay
a
graphql
endpoint
system
on
top
of
the
cached
executions
and
we
can
blow
like
we
talked
about
sort
of
blowing
something
up
like
we'll
get
rid
of
cached
entries
where
we
want
to
do
re-execution
by
simply
requesting
a
different
graphql,
node
type,
and
that
graphql
node
type
will
just
be
a
orchestrator
which
will
basically
be
a
system
context
backed
by
an
orchestrator
which
is
not
based
on
the
caching
stuff.
A
But
if
you
wanted
to
do
caching
within
that
one
somewhere,
then
you
could
so
you
can
basically
get
rid
of
whatever
you
need
to
right,
and
so
you
can
query.
You
know
the
state
of
your
network
and
well.
What
is
this
data
of
your
network
going
to
be
right
effectively?
What
we'll
do
is
say
you
know
what
is,
for
example,
what
is
my,
what
is
my
organization's,
we're
all
working
on
a
code
base?
What
is
the
leading
edge
version
right?
A
So
what's
the
one
that
has
all
the
feature
flags
that
we've
you
know
tested
together
across
all
of
the
ci
jobs
and
all
the
functional
and
all
of
the
the
fuzz
and
all
of
the
things
that
alice
came
up
with
external
to
all
of
that
right
in
terms
of
you
know,
measuring
kpis
or
whatever,
to
determine
what
you
know,
what
other
things,
what
other
test
tests
really
should
we
running
be
running
these
things
through?
A
You
know
you
basically
what
you're
saying
is
you're
running
that
query
on
a
continuous
basis
and
you're
saying
feed
me
more
results
as
it
happens,
right
and
then
publish
that
right.
So
well,
how
can
you
do
that?
Well,
you
know
you.
Basically
you
you.
A
D
That's
right:
we
screwed
up.
We
have
to
go
re-copy
paste
from.
D
D
A
A
D
A
D
A
B
A
D
A
Bob
can
we
execute
this
system
context?
Is
this
aligned
bob
says
sure,
alice,
that's
aligned
and
within
that
system
context
we
may
include
some
information
right
because
we
are
specifying
contracts
to
be
executed
right
on
on.
You
know:
we're
specifying
contract,
we're
going
to
put
contracts
into
the
chain
right
to
be
executed
off
chain
and
on
chain
right
and
we're
going
to
say
you
know
part
of
that
contract.
A
Is
bob
pays
alice
to
do
this
right,
so
alice
says
I
propose
that
I'm
going
to
you
know,
spin
up
on
cloud
provider
xyz
and
what
a
whatever
rate-
and
this
will
get,
what
you
want
done.
Bob
and
bob
will
say:
okay
great
now,
in
that
proposal
you
should
have
included
for
me.
You
know
all
of
the
things
that
I
told
you
about
hey.
These
are
acceptable
system
contacts.
These
are
the
strategic
plans
right
which
I'm
going
to
vet
these
system
contacts
with
ding
ding
ding,
ding
ding.
That's
the
next
thing.
A
We
need
to
write
down,
okay,
so
okay,
so
bob.
Where
are
we
bob
bob,
the
pfi?
Okay?
So
if
I
operation
prior
to
check
the
line
system,
context
trigger
okay,
so
trigger
timeout
goes
to
trigger,
trigger
trigger,
goes
to
check,
align
system
context,
system,
contacts.
Okay,
if
time
is
off
up
or
good
enough
offer
threshold
met
conditional
offer,
okay,
so
the
okay,
so
strategic
plans,
you
found
a
little
warm
thing.
Yay.
A
Strategic
plans,
so
why
is
it
important
that
we
put
that
that
alice
go
on
chain
right
is
because
to
facilitate
this
trading
right
of
arbitrary
resources,
we
need
to
have
the
ability
to
map
one
person's
understanding
to
the
other
person's
understanding
so
as
to
come
up
with
a
you
know,
valid
aligned,
context
right,
because
I
really
have
no
idea
what
the
hell
you
consider
to
be.
You
know
a
a
okay
way
to
spin
up
three
servers
right.
You
know
if,
if
to
you,
spinning
up
three
servers
means
because
of
your
you
know.
A
Particular
situation
means
you
need
them
in
a
bunker
somewhere
right
and
you
need
like
one
line
in
that.
Somebody
is
like
you
know,
waiting
with
an
axe
next
to
to
chop,
then
that's
going
to
be
different
than
you
know,
a
different
fulfillment
than
someone
who
says
you
know.
A
Let
me
just
run
that
on
qemu,
for
you
at
this
raspberry
pi
that
I
left
in
a
coffee
shop
right,
the
different
level
of
security
assurance
involved
there,
and
so
you
know
these
are
things
that
we're
going
to
need
to
understand
as
we
create
our
bids
so
that
we
need.
We
or
so
sorry
as
we
create
our
asks,
because
we
need
to
know
you
know
whether
we
should
even
bother
you
know
submitting
an
ask
for
this
job
or
an
ask
to
be
rewarded
for
a
aligned
job.
A
They
all
really
mean
execute
some
architecture,
maybe
a
data
flow
which
might
include
something
which
would
allow
for
scoped
sandbox
execution.
A
You
know
a
given
a
given
privilege,
or
you
know
two
given
constraints
constraints.
That
is
one
of
the
things
that
I
think
we
were
forgetting
within
the
system
context.
So
constraints
constraints
are
important.
A
A
A
E
E
A
A
You
know
one
tag
associated
sort
of
do
like
a
association
conceptually
right
and
say
you
know
the
most
aligned
conceptually
so
basically,
you
know
called
restraints
means
you
know
within
the
english
language
the
best
used,
the
you
know
the
most
closely
aligned
word
for
the
description,
which
is
these
notes
right
organized
in
this
manner.
A
A
A
Are
called
constraints,
so
how
would
we
have
alice
know
that
the
right
word
is
constraints.
A
D
E
A
A
Design
constraint
would
be
the
correct
word,
probably
conditions
that
need
to
happen
for
a
project
to
be
successful.
Design
constraints
are
conditions,
so
in
this
case
you
know,
are
called
design
constraints,
and
then
we
can
put
our
little
quote
here
with
our
link
and
I'm
not
going
to
think
of
any
more
right
now.
But
if
you
want
to
think
any
more
about
how
we
might
have
alice
understand
that
she
should
describe
using
the
word
design
constraints.
A
That
would
be
great,
okay,
so
and
we'll
just
say,
you
know
reworded
true.
A
A
All
right,
let's
jump
back
to
mermaid,
okay,
let's
copy
paste
this
over
while
we're
at
it.
So
I
think
we
made
progress
and
I
don't
want
us
to
lose
this.
B
E
A
D
Okay,
yeah,
okay,
align
system
contacts;
okay,
that's
the
right
version,
all
right.
A
D
A
Okay,
so
alice
okay,
so
ask
pfi
conditional
offer
alice,
so
alice
submits
the
ask
the
pfi
submits
the
conditional
offer
alice
accepts
right,
so
bob
says:
okay.
That
sounds
acceptable
to
me.
So
alice
says
alice,
says
bob.
I
would
like
to
help
you
by
doing
this
align
system
context,
which
may
be
not
exactly
what
you
wanted,
but
I
think
is
pretty
much
still
pushing
the
strategic
principles
you
were
looking
for
and
how
is
she
going
to
know
that?
A
You
know
what
are
basically
to
run
through
the
strategic
plan,
so
we're
going
to
give
alice
the
strategic
plans
in
the
form
of
the
of
the
system,
context
in
the
form
of
an
open
architecture
spec
in
the
form
of
a
data
flow
which
she
can
go
run
to
help
her
determine
whether
the
valid
system
context,
which
is
thinking
up,
are
aligned
with
bob's
strategic
principles
right
and
whether
that
they
would
be
acceptable
for
the
execution
of
this
context,
specifically
as
an
acceptable,
you
know
sort
of
either
verbatim
the
same
thing
or
replacement.
A
You
know-
or
just
you
know-
maybe
hey
you
know,
notice,
you're
working
on
something
I'm
working
on
something.
If
we
both
could
share
a
server.
You
know
hey
based
on
the
uptime
of
our
you
know
our
other
interactions.
We
can
add
this
asset
to
our
pool
and
we
project
that
that
may
be.
You
know,
help
us
in
the
future
on
other
jobs
right
that
could
be
okay.
A
A
A
A
It
is
possible
for
the
pfi
to
offer
a
bid
with
no
credential
requirements,
given
that
each
additional
vc
presumably
reduces
the
risk
taken
by
the
pfi.
So
we
are
basically
so
they're
saying
that
you
know
the
pfi
should
come
up
with
providence
information
right.
A
So
what
we're
saying
is,
basically,
you
know
we're
going
to
come
up
with
that
for
you
right,
I'm
going
to
I'm
asking
you
if
I
can
do
the
job
right,
so
I'm
going
to
go
figure
out
your
provenance
information
for
you,
because
I'm
gonna
figure
out
whether
you
can
pay
me
or
not
right,
whether
I
before
I
even
submit
this
job
back
right.
So
the
first
thing
I'm
gonna
do
is
hey
this
person's
submitting
a
call
for
a
line
jobs
right.
Is
this
even
something?
That's
worth
me?
Looking
where'd,
you
go
dude.
A
Okay,
so
yeah,
so
we're
basically
saying
hey,
you
know:
let's
do
this
up
front
right,
because
we
don't
want
to
go
and
do
any
work
any
more
work.
So
basically
we're
going
to
do
an
initial
gate
that
says:
hey.
Do
I
even
know
you
right?
Do
I
even
care
about
offering
an
aligned
context?
You
know
maybe
you're
some
kind
of
crazy.
A
You
know
you
know
person
who's,
trying
to
get
me
to
spin
all
my
cpu
cycles.
You
know
creating
a
line
context
right,
so
I'm
just
going
to
drop
those
packets
right.
I'm
going
to
say
I
don't
care
right
so
for
those
people
who
I
do
care
about,
creating
aligned
context
for
right
or
the
you
know,
just
these
aligned
contacts.
A
That's
come
in
right,
I'm
going
to
say
I'm
going
to
say
well,
okay,
so
in
that
check
of
do
I
want
to
do
it
at
all,
I'm
going
to
say
well,
dude
did
this,
you
know.
Is
there
something
here,
let's
see,
so
what
is
if
it's
liberty
to
choose,
which.
C
A
C
D
A
A
Stay
here,
for
example,
some
pfis
may
accept
credit
cards,
while
others
may
not.
The
tb
dex
protocol
may
carry
information
that
enables
pfis
to
decide
whether
they
seek
to
bid
for
the
wallets
business
and,
if
so,
what
vcs
to
ask
to
ask
of
wallets
the
protocol
will
also
carry
the
regular
required
regulatory
querying
information
required
by
pfis
to
just
could
to
conduct
conduct
their
aml
and
k.
Well,
I
say
I
don't
know
what
that
is,
checks
before
the
provision
in
liquidity
to
the
wallet
owner.
A
However,
necessary
information
may
be
very,
very
based
on
jurisdiction
to
participate
in
the
network.
Pfis
will
run
nodes
that
facilitate
the
reception
of
ass
and
transmission
of
bids.
Conceptually
pfi
nodes
are
similar
to
wallets
and
will
rely
on
the
same
underlying
modules
and
library.
The
tbx
protocol
does
not
execute
fiat
or
cryptocurrency
cringe
transactions.
A
This
is
provided
by
the
pfi
and
made
discoverable
through
the
pfizd
id.
Yes
precisely
so
this
is,
you
know
for
negotiating
right,
and
so
the
actual
execution
is
what
we're
doing
of
like
we're.
Just
gonna
execute
whatever
data
flow
right.
We
don't
care
about
what
is
in
it
right.
If
what
is
in
it
says,
hey
we're
gonna
go,
you
know.
If,
if
what
is
in
it
says
we're
gonna
go,
you
know,
spin,
you
up
three
servers
on
qmu,
then
great
right.
It
doesn't
have
to
be.
A
I
want
cryptocurrency,
send
it
to
me
right,
it
can
be
do
whatever
you
want
and
that's
the
point
of
what
we're
using
tbx
for
is
to
agree
on
what
hey
you
told
me.
You
want
to
do
something
or
you
told
me
you
want
something
right.
I
told
you
I
can
offer
this
to
you,
it's
aligned
with
your
desires,
right,
you
say:
okay,
I
accept
right,
which
is
this
now,
let's
picks
one
of
the
bits
by
responding
to
the
original
assigned
hash
of
that
bid,
along
with
the
presentation
of
credentials
required
by
that
bid.
A
Okay,
so
this
is
interesting,
so
alice
picks
one
of
the
bids
by
response,
so
the
pfi
is
bob
right
and
so
bob's
gonna
say
alice
picks
one
of
the
bids
by
responding
to
the
original
signed
hash
of
that
bid,
along
with
the
presentation
of
the
credentials
required
by
that
bid.
Okay,
so
presentation
of
the
credentials
required
by
that
bid.
A
Because
we're
just
going
to
say
you
know,
you're
not
even
gonna,
consider
because
the
bob
is
the
pfi
and
bob
has
already
made
an
offer
at
this
point
so
or
he
already
he's
already
put
it
out
there
and
said
you
know:
hey,
I'm
looking
for
people
to
execute
a
line
context
right,
so
we
better
be
ready
to
rock
and
roll
by
the
time
we
get
back.
We
don't
want
to
make
another
hop
here
to
do
vc
lookup.
A
We
should
include
that
up
front
so,
along
with
the
presentation
of
the
creditor,
so
we're
not
going
to
worry
about
that.
Pfi
verifies
alice's
presentation,
along
with
the
credentials
within
that
presentation.
If
every
thing
checks
out
sends
a
final
bid
to
alice
okay,
so
basically
we're
going
to
skip
okay,
so
maybe
that's
idv
now
alice
accepts
the
bid
by
signing
it
and
send
it
back
to
the
bfi.
A
The
pfi
publishes
a
smart
contract
to
the
blockchain
and
funds
it
to
establish
proof
of
ability
to
settle
with
the
agreed
upon
amount
of
xyz
cryptocurrency
and
sends
the
transaction
address
to
alice
alice
as
well
as
queries
the
contract
to
ensure
the
agreed
upon
amount
is
present.
Alice's
wallace,
then
fetches
the
accepted
means
of
payment
from
the
pfi's
hub.
This
means
the
payment
will
be
exposed
as
individual
services
alice,
selects
her
preferred
means
of
payment
from
the
ones
available.
Alice's
wife
facilitates
payment
through
the
service
associated
with
the
selected
means
of
payment.
A
Alice
is
submitting
an
aligned
contract
and
she
wants
to
be
rewarded
right.
The
reward
from
bob
may
come
in
the
form
of
crypto
right.
It
may
come
somehow
else
right
so
send
funds
in
this
example
right
so
pfi
1
is
bob
or
let's
see
no
pfi.
2
is
bob
right
and
we're
going
to
do
this
verify
credentials
in
here
up
here
right,
because
alice
is
going
to
do
the
ask
with
the
credentials
and
and
we're
gonna
we're
gonna
have
them
be.
Basically,
the
credentials
are
gonna
come
through
with
the
ask
right.
A
A
So
do
I
have
the
required
creds
decide
which
bid
is
best
disclose
the
creds
house?
Yes,
here
are
the
credentials
you
asked
for
verify
credentials.
Here's
my
bid
accept
this
bid.
Yes,
okay.
I
accept
your
bid
and
then
create
transaction
on
the
blockchain
okay.
So
this
basically
says
hey.
You
know
the
money's
out
there
right
you
can.
We
can
prove
that
the
money
is
out
there
right.
So
this
is,
you
know,
publish
this
is
not
for
the
blockchain.
This
is
not
up.
It's
us
so
okay.
So
I
accept
your
bid
so
where's
that
I
don't.
B
D
A
To
the
wallet
alice
initiates
a
flow
to
request
currency,
in
this
case
usd
in
exchange
for
100
units
of
cryptocurrency
xyz,
so,
basically
alice
initiates
a
flow
to
request.
You
know
one
system
context
or
one,
let's
see.
D
A
Request
her
own
execution,
yeah,
she's,
issu
she's,
initiating
a
flow
to
request
to
she's
initiating
a
flow
to
propose
that
she
execute
a
align
system.
Context
in
exchange
for
something
alice's
wallet
generates
a
semantic
message
that
reflects
an
ask
encoded
with
the
parameters
of
alice's
request.
Alice's
wallet
sends
the
ask
message
to
the
identity
hubs
of
each
pfi
to
each
bob.
It
desires
to
include
as
a
fulfillment
counterparty
an
interested
pfi
responds
to
the
ask
and
receives
receives
with
a
list
of
bids.