►
A
Let's
get
to
this
so
yeah,
we
had
talked
about
okay
check
content
link,
so
this
was
we
were
implementing.
We
were
experimenting
with
you
know.
What
does
you
know?
What
does
the
ideal
flow
with
the
system,
local
resource
management
look
like
or
the
the
the
you
know,
locality-based
resource
management
and
our
abilities
there.
You
know
with
regards
to
you
know
basing
something
off
of
this.
A
You
know
an
open
architecture
spec
where
we'd
have
you
know
essentially
dynamic
levels
of
reconfigurability
and
if,
if
you're
thinking
about
this
really
all
we're
saying
here
is
it's
just
a
name
for
not
having
to
bang
your
head
against
the
wall
when
you
need
to
recompile
several
pieces
of,
say
a
linux
distro
in
order
to
deploy
your
application
right.
A
So
if
you've
ever
had
to
do
that,
you'll
know
how
much
of
a
pain
that
is
right,
and
so
you
got
to
go,
get
all
these
user
space
components.
You
got
to
set
up
your
build
environments
for
each
ones.
You
got
to
go.
Do
your
compile?
Okay!
Basically,
what
we're
saying
is
overlay
boom
right?
What
are
my
patches?
A
I
want
to
throw
on
top
of
this
thing
right
now
make
those
patches
work
with
whatever
the
distro
build
environment
is
right,
so
you
know,
maybe
I
need
to
run
changes
to
firefly
cli
on
top
of
on
top
of
like
alpine
or
on
top
of
arch
right,
so
we're
gonna
have
underlying
orchestrators
that
facilitate
the
rebuild
via
the
the
package
management
system.
That
is
for
that
distro
right,
and
that
way
you
get
a
cross-distro
application
of
these
overlays
all
right.
A
So
so,
yeah
check
content
length
trigger
operation
to
request
disk
quota.
A
Resume
download
or
receive
body
content
body
wants
a
ticket
for
once
quota
confirmed
available.
A
Once
content
length
confirmed
available
within
quota
system,
local
resource
management,
which
is
you
know,
aka
ida,
traverse
input,
parent.
A
A
Okay,
yeah
yeah,
so
right
now
we
don't
have
that
so
we're
just
gonna.
Do
it
like
here.
A
And
we're
going
to
store
the
cache,
oh
and
the
other
thing
that
we'd
looked
at
was
basically
okay,
so
say
that
we
want
to
snapshot
the
state
right
and,
if
we
appropriately
so
right
now,
what
we
have
is
this
little
firefly
config
right
essentially
defines
its
own
interface
right.
Well,
it's
its
own
plug-in
right,
so
so,
and
and
yeah
there's
a
lot
of
awkwardness
happening
here,
maybe
we'll
just
spin
up
firefly
yeah
we're
just
gonna
spin
up
firefly!
A
There's
a
lot
of
awkwardness
happening
here,
trying
to
implement
this
as
an
operation,
because
these
are
this.
The
awkwardness
that
we're
seeing
here
is
the
stuff
that
we're
going
to
fix
by
doing
the
turtles
all
the
way
down
sort
of
thing.
This
is
just
like
an
example.
This
is
now
an
example
of
why
the
api
is
awkward
and
and
and
the
things
that
need
to
be
done
to
fix
it.
So
we're
just
going
to
go
and
nuke
the
rest
of
this
or
no,
let's
not
do
that.
A
A
So
when
you
define
a
data
flow
so
so
because
there's-
and
I
think,
we've
gotten
into
this
because
of
the
context-
the
double
context-
entry
and
the
way
that
the
operations
are
really
just
like
a
single
function-
call
the
stub
the
function
prototype
the
operation
right
is
can
be
different
than
the
operation
implementation
and
therefore
you
can
have
the
operation,
implementation
introspect,
the
operation
and
understand
you
know
if
its
behavior
should
be
different.
For
that.
A
You
know
for
that
particular
operation
that
it
is
in
because
it
your
your
mapping,
operations
to
insta
implementations,
to
instances
right
and
you
can
reuse
instances.
You
can
reuse
implementations
for
different
instances.
If
you
wanted
to
right
or
you
could
scope
them
and
you
could
basically
reinstantiate,
and
so
this
is
an
example
of
where
we
have
separate
instances.
A
And
but
we're
using,
let
me
just
show
you
so
run
dataflow
so
run
data
flow
default
inputs,
flow
inputs,
okay,
so,
basically
inputs
to
add
to
the
data
the
key
value,
mapping
of
context,
string
value
pairs.
Let's
check
out
our
examples:
okay,
so
basically
yeah,
you
know.
So
if
we
pass
basically
what
we're
doing
is
we're
passing
this
here
right
same
thing,
only
value
definition.
So
it's
not
input
object,
they're,
they're,
they're,
raw
they're,
they're,
they're,
unconverted
types.
A
A
Less
on
my
path,
the
following
shows
how
to
use
run
dataflow
with
custom
inputs
and
outputs.
This
allows
you
to
run
a
subflow
as
if
it
were
an
operation.
Okay-
and
this
is
what
we're
interested
in.
So
basically
we
can
say
okay,
so
this
last
path
is
an
operation
which
is
a
subflow
we're
going
to
instantiate,
run
data
flow
within
our
data
flow
and
we're
going
to
say
you
know
the
instance
right.
A
So
this
is
the
instance
right
as
exists
in
operations,
which
is
our
prototypes
is
we're
going
to
modify
the
instance
and
change
the
inputs
and
the
outputs,
and
then
we're
going
to
you
know
change
the
config
or
yeah
we're
going
to
instantiate
using
that
config
right
so
that
it
uses
the
subflow
and
then
basically,
what
will
happen
is
that
when
we
come
in
here
and
we'll
end
up,
triggering
this
run,
custom
right
and
run
custom
is
going
to
go.
Look
at
the
inputs
right.
A
Context,
input
name
context,
input
definition,
so
this
is
some
really
rudimentary
stuff
right
now,
where
basically
we're
saying
the
first
input
given
in
a
custom
is
the
context,
which
is
why
we
did
this
definition:
url,
okay,
so
we're.
Basically,
this
is
sort
of
like
our
record
depth.
So
this
all
needs
to
this
is
why
all
of
this
we
have
so
many
implementations
of
the
same
thing
right.
We
just
didn't
know
that.
A
Sometimes
we
didn't
know
that,
and
we
didn't
know
how
to
unify
now.
We
know
how
to
unify
right.
So
this
is
what
we're
doing
we're
going
through
we're
unifying
okay,
so
essentially
yeah.
So
this
is
the
point.
Basically,
the
point
is
that
you,
you
know
you
can
have.
You
can
have
a
custom
custom
run
function
if
there
are
custom
inputs,
so
we're
actually
gonna
just
copy
this
directly.
So.
A
Okay,
so
data
flow
from
peer
id,
okay,
yeah.
We
were
talking
about
that
and
then
we
have
you
know
firefly,
okay,
we
were
making
this
operation
to
down
or
we
were
making
this
context
manager
which
downloads
firefly
and
okay.
We
don't
need
a
context
manager
for
that,
because
cache
download
on
pack
archive
is
going
to
be.
A
Oh,
we
do
need
a
context
manager,
okay,
so
to
do,
remove
context
manager
when
okay,
you
know
what,
when
okay,
so
to
do,
remove
context
manager
when
we
fix
op
imp
enter
and
ctx
enter
to
not
attempt
context
entry
before
setting
return
value
on
parent
key,
given
remove
context
range,
remove
context
manager
when
we
fix
op
enter
in
ctx,
ensure
to
not
attempt
contact
surgery
before
setting
return
value
on
parent
key.
Given
if
return
value
is
not
a
context
manager.
A
That
could
be
helpful
there.
So
basically
that
way
you
know
instead
of
so
right
now.
What
happens?
Is
that
whatever
you
return
from
this
function,
since
it's
a
lambda
right,
you
have
to
return
something
that
then
can
be
called
and
then
the
return
value
is
a
context
manager
which
we
enter.
So
if
you
just
pass
a
regular
function,
it's
just
going
to
blow
up
so.
A
We
want
to
call
means
instead
of
entering
their
context.
A
A
A
A
A
A
A
A
A
A
A
So
this
looks
like
something
that
we're
going
to
really
tie
into
our
identity,
aware
context
stuff
in
terms
of
like
transferring
around
user
permissions
as
we
run
these
things.
So
where
is
hey?
Look
at
this
web3
storage?
A
Okay,
so
if
you're
building
an
std
market-
okay,
so
basically
so
just
like
these
nfts
right,
so
the
nfts
all
of
the
data,
basically
anytime,
you
create
an
operation.
There's
going
to
be
an
nft
for
the
output
is
effectively
what
we're
doing
here
and
then
that
data,
the
data
for
the
nft
lives.
You
know
off
chain.
A
A
Would
be
great,
and
so
I'm
guessing
that's
because
dice
stuff
there's
this
dice
stuff.
A
I
think
is
device
identifier,
composition
engine,
so
this
is
robust,
resilient
recoverable
iot,
so
this
is
basically
we're
going
to
tie
this
dice
stuff
in
with
we're
going
to
tie
the
dice
stuff
to
the
dids.
A
That's
that's
our
goals,
part
of
our
goals.
Right
here
we
want
to
tie
dice
to
dids
to
cicd
to
ml
right,
okay,
computed
device
identity.
This
is
what
okay.
A
A
A
A
A
A
A
So
what
is
this?
You
can
storage
and
house?
I
don't
understand
using
you
cans
with
nft
storage
use
of
you.
Cans
to
delegate
upload
permissions
in
nfc
storage
is
currently
using
you
cans
to
delegate
upload
permissions
in
nft
storage.
If
you
have
any
feedback
discussion,
let's
go
check
out
this
discussion,
so
this
is
telling
us
that
we
can
use
these
ucans
to
authenticate
to
the
nft
storage
api.
A
A
It
could
be
good,
so
c
intercept
our
intercept
route
is
identity,
aware
context.
A
A
So
this
is
how
we're
going
to
end
up
with
our
hardware
root
of
trust,
so
we're
going
to
tie
our
identities
and
our
credentials
and
we're
going
to
hopefully
end
up
with
this
authentication
mechanism
via
ucan
via
c-bor,
which
is
interoperable
with
the
authentication
and
attestation
mechanisms
that
our
devices
are
using.
So
we're
going
to
prove
that
we
are,
you
know,
have
certain
claims,
just
in
the
same
way
that
devices
prove
that
they
have
certain
claims,
and
then
this
is
going
to
allow
us
to
have
this.
A
This
opera
interoperability
between
you
know,
execute
sort
of
execution
as
a
service
where
you
have
some
like
human
in
the
loop
stuff
right,
and
so
you
know
you
have
tested
credentials
for
which
humans
are
doing,
which
things-
and
this
is
what
allows
you
to
swap
out
basically
subcontract
any
piece
of
your
open
architecture
or
have
a
device
to
it
all
right.
A
A
A
To
share
crit
attestation
via
open
creds
type
stuff.
A
When
we
need
to
mitigate
when
our
strategic
plans
are
attempting
to
mitigate
for
when
our
strategic
plans
are
attempting
allows
us
to
share
our
decisions,
we
open
credit
service
stuff
across
human
assessment
teams,
when
our
strategic
plans
are
admitted
in
to
mitigate
risk
via
execution
of
operations
via
implementations
which
have
a
tested
properties.
A
A
A
Okay,
so
here's
this
nft
storage
thing.
So
this
thing:
free
decentralized,
storage
and
bandwidth
for
nfts
and
file
clients.
So
examples
you
can
node,
okay,
basic
output
using
you
can
token
okay,
so
this
is
great.
So
here's
something
this
is
going
to
be.
This
is
you
know,
part
of
our
on-ramp
off-ramp
setup
right
when
we
deploy
these
to
a
live
environment.
You
know,
maybe
this
can
be
part
of
our
our
bridge
stuff,
so
I
mean
unless
we
can
just
so.
What
do
we
want
to?
A
A
Goals
leverage
existing
off-chain
storage
interfaces
provided
by
nft
storage.
A
Via
ucan,
based
on
dids,
to
support
two
support
or
to
act
as
gateway
as
portion
of
gateway.
A
A
Environment,
where
we
attempt
to
get
data
into
firefly
network
firewire
dlt
based
on
dids
okay,
so
we
could
go
spin
up
the
firefly
thing
right
now
right
and
we
could
go
dump
all
of
the.
We
need
to
talk
to
brooklyn
too
and
find
that
discussions
thread
so
where's
that
you
can.
You
can.
A
A
Transparent
format-
agnostic,
you
can's;
okay,
yes,
so
this
is
the
thread.
A
A
The
fully
connected
development
model,
we're
gonna
capture,
all
this
information,
so
let's
go
spin
it
up
all
right.
So
what
are
we
looking
at
here?
So
we
are
looking
at.
A
A
So
this
was
back
in
march
okay,
so
we
need
to
okay,
increasingly
we're
custom
performance.
Okay,
so
looking
at
this
again
really
excited
about
it,
I
would
like
to
see
seabor
support
still,
as
that
will
simplify.
A
Okay,
so,
but
that's
not
the
question,
we're
not
answering
the
question,
so
what
is?
Let's
just
put
a
note.
I
think
I'm
too
in
the
zone
on
this
right
now,
so
arbitrary
resources,
degrees
of
freedom.
You
can
version.
A
Maps
to
our
shim
discussion
manifest
encoding
as
dna
discussion
right.
So
that's.
The
dna
is
the
codec
that
we're
encoding
too.
If
that's
to
write
the
words,
oh
god.
Oh
no,
so.
A
All
right,
so,
let's
go
look
at
this
okay,
so
we
would
like
to
have
the
nft
storage
thing.
So
if
we
can
spin
up
the
nft
storage
to
point
at
a
did
based
blockchain,
we
can
go
prototype
all
this
very
quickly
and
then
dump
the
chain
and
then
reconstruct
the
format
on
the
other
side.
So
let's
go
look
at
this
nft
storage
stuff
again,
so
this
is.
A
A
A
A
A
A
A
Avoid
storing
http
urls
on
chain:
let's
continue
your
way
to
retrieve
nft
data
from
ipfs
may
involve
using
an
nfpa
fest
shape,
http
gateway.
You
should
avoid
storing
http
gateway
links
in
smart
contract
or
other
blockchain
record,
instead
store
ipfs
uri,
which
doesn't
need
a
single
gateway
provider,
rewrite
this
uri
to
a
gateway
link
at
the
last
mile
when
displaying
a
a
a
when
displaying
the
nft
on
the
web.
So
okay.
So
what
is
this
saying?
So
this
is
basically
saying
you
know.
Your
ipfs
is
like
this
distributed.
A
Data
store
right,
and
so
your
http
interface
is
really
this
web
two
thing,
and
so,
if
you
happen
to,
if
you
find
yourself
displaying,
if
your
context,
if
your
context
is
such
that
your
parent
contacts
in
some
in
some
parent
is
such
that
you
are
going
to
render
this
thing
to
a
user
via
http,
you
need
to
make
sure
you
change
the
reference
length
to
go
through
the
http
gateway
for
ipfs.
A
A
So
basically
we
can
say:
okay,
nft
storage,
token,
okay,
so
we
can
store
a
whole
directory
in
nft
storage
using
youtan
tokens
for
dedicated
authorization
using
you
can.
A
A
A
And
interact
with
it
via
you
can
token
auth
then
ensure,
or
so.
A
Firefly:
okay,
we're
going
to
use
firefly
to
do
that.
Firefox
transact
question
mark
because
we're
not
sure
dump
resulting
blockchain
dump
resulting
chain
reconstruct
chain
via
python
code.
A
A
A
A
A
A
A
Okay,
it
looks
like
maybe
abandoned.
Okay,
you
can
private
key.
Okay.
Great
front
end
also
needs
environment,
so
just
cloud
for
pages
secrets:
okay,
so
they're
gonna
production,
environment
or
else
local,
okay,
so
magic
secret,
key.
A
A
A
Before
you
can
create
the
blockchain
record,
you'll
need
to
store
all
the
data
off.
Change
comprise
the
energy
pack.
Once
everything
is
stored,
you
can
use
the
ipsf
file
metadata
link
to
form
the
on-chain
token.
Do
everything
else,
with
lower
examples
of
starting
ft
assets
metadata
using
javascript
and
http
api
both
use
the
store,
so
we
can
use
the
store.
A
A
A
Uri
tokens
token:
okay,
the
url
value
for
the
id
substitution
by
clients,
the
string
ids
exists
in
any
uri.
Clients
must
replace
actual
decimal
form;
okay,
so
basically
so
metadata,
uri
okay.
So
this
is
saying
basically
standard
interface
definition,
standard
interface
detection.
This
sounds
like
something
we
care
about.
We
care
about
standard
interfaces,
standard
interfaces
like
the
erc20
token
interface.
A
A
A
If
it
doesn't,
then
it
doesn't
support.
So
basically
those
contract
challenges,
so
there,
okay,
so
all
right.
Okay,
so
you
see
one.
Oh
sorry,
ruffles.
A
On
tracer
detection
of
methods
for
smart
contracts,
should
we
encode
two
smart
contracts.
A
A
A
Multi-Token
standard
standard
interface
for
contracts
to
manage
multiple
token
types
are
deployed.
A
single
deploy
contract
may
include
any
combination
of
fungible
tokens
or
non-fundable
tokens
or
any
other
configuration
okay.
So
these
are
the
different
data
types
that
we
might
be
working
with
right.
So
the
contract
is
the
data
flow.
I
think,
and
then
the
data
flow
types
of
the
inputs
right,
the
nfts
are
the
inputs
or
the
or
the
fts
or
the
inputs.
A
All
right,
so
we
just
want
to
ride
on
top
of
this
stuff
we
want
to
put.
I
think
this
is
just
going
to
be
the
tokens
and
the
blockchain
and
all
this
stuff.
I
think
this
is
going
to
end
up
being.
You
know,
I
think
it'll
be
it'll,
be
yeah,
it'll
be
good
to
be
based
off
of
because
then
you
can
leverage
that
for
the
reward
system
for
execution.
A
A
Pay
this
address
address
then
it
does
this
thing
right
and
that
ends
up
creating
an
input
object
which
is
itself
you
know.
So,
basically,
if
you,
if
you
execute
the
contract,
the
contract
will
so
basically
you
you
want,
you
want
to
have
some
other
nodes
in
the
network,
run
a
data
flow
right,
so
you
issue,
I
think
you
issue
the
contract
or
you
yeah.
A
A
Execution
of
contracts
we're
executing
where
reward
rewarded
party
executes
off
chain
data
flows
off
change
system,
contacts.
A
A
There's
no
contacts
they
want
executed
to
chain
and
so
flow
for
rewards.
So
this
is
a
we're
exploring
a
possible
flow
here.
Where
you
know,
agents
are
communicating
together,
but
they
you
know,
they
need
to
be
compensated.
Somehow
you
know
maybe
for
their
compute
time
or
something.
A
A
A
Publish
proposed
system
context
in
proposed
applicable.
A
A
So
basically,
then
they
say
hey
you
know
I
can
do
this
thing.
Here's
the
provenance
information
that
I
could
provide.
If
I
did
it
right
references.
A
A
Right
so
we
put
out
this
thing,
we
say
hey,
you
know
I
want
you
to
go,
run
some
code
and
all
the
agents
out
there
looking
at
the
chain.
They
say:
well,
okay,
well,
you
know
I'm
doing
similar
work
to
that
based
on
alice's
brain
is
thinking
and
she's
thinking.
You
know
I'm
doing
similar
work
to
that
on.
A
You
know
this
these
trains
of
thoughts
that
I'm
operating
on
because,
of
course,
alice
is
across
many
devices,
and
she
knows
she's
sort
of
forming
this
this
this
just
this
yeah
just
just
yeah,
okay,
so
basically
everybody's
got
their
own
alice
for
different
purposes
right.
So
all
these
little
versions
of
alice
are
sitting
out
there
and
they're
listening
to
the
chain
and
they're
trying
to
complete
their.
You
know
move
their
strategic
principles
in
the
right
direction
until
they're,
you
know
turned
off
right.
A
So
when
we
do
that,
so
we
have
this
possible
flow
where
we
we
and-
and
we
have
to
think
about
when
these
contracts
are
issued,
all
the
data
needs
to
be
on
chain
already
right,
because
the
decisions
that
are
being
made
here-
and
we
also
want
to
think
about
the
properties
of
trust
that
we
have
in
the
in
the
physical
world
and
extend
them
to
the
digital
world
and
not
really,
you
know,
come
up
with
too
many
unreasonable
expectations
for
the
for
the
digital
world
right.
A
So
how
are
we
going
to
do
that
right?
Well,
so,
before
any
money
changes
hands
or
any
rewards
system
or
any
token
or
whatever
that
that
exists?
I
I'll
be
honest.
I
don't
really
understand
blockchain
stuff,
that's
what
we're
doing
here,
we're
going
to
figure
it
out.
So
once
once
you
know,
please
correct
me
if
I'm
getting
something
wrong,
but
once
the
so
so
we
can
put
these
contracts
out
onto
the
network.
We
can
basically
issue
a
contract.
We
can.
A
We
can
issue
an
nft,
we'll
we'll
mint,
an
nft.
The
nft
will
was.
It
will
mint
an
nft
on
a
did,
backed
network
right,
and
the
contents
of
the
nft
will
be
a
encoded
system
context
right
and
and
we
we
are
going
to
encode
that
system
context
in
a
you
know,
in
a
context-aware
way
right.
This
auto
codec
sort
of
thing
that
that
was
referenced
in
that
other
thread,
which
is
basically
okay.
A
So
if
I'm
looking
at
something
on
a
blockchain
and
I'm
pretty
sure
it's
a
system
context,
I
should
make
these
assumptions
about
decoding,
and
then
you
know
start
from
there
and
that's
what
the
shim
will
do
right.
So,
basically
we're
going
to
publish
so
we're
going
to
mint
it
we're
going
to
mint
them
in
nft
we
meant
an
nft
and
the
nft
is
basically
like
a
request
for
execution
right
or
so
we
can
mint
nfts
that
are
so
basically
so
call
for
proposals
to
execute
or
hypothesize
right.
A
Right
then,
other
agents
in
network
publish
proposed
applicable
system
contacts
which,
including
what
provident
provenance
information,
would
be
provided
you
know,
so
you
can
map
that
similarly
to
to
to
to
salsa
levels
and
if,
if
you
know,
can
that
agent
meet
so
basically
I'm
going
to
tell
you,
okay,
you
know
I'm
going
to
publish
another
thing
to
the
network
right
and-
and
this
is
my
bid
on
the
nft
and
the
bid
is
like
a
reverse
bid.
So
it's
like
okay,
you
pay
me.
A
If
I
buy
this
nft,
then
you
pay
me,
then
you
accept
this
contract
right.
So
bit
is
like
so
like
a
reverse
bid
right.
So
if
I
buy.
A
The
nft
you
just
minted,
then
you
then
we
have
agreed
to
a
contract
which
says
if
agent
buys
the
nft
the
original
system
context
the
the
system
context
originally
minted
within
this
example
right,
and
so
we
can
sell.
Obviously,
so
we
can
sell
you
know
we
can,
I
think,
isn't
there
some
concept.
I
really
have
no
idea,
but
I
think
there's
some
concepts
where
you
know
you
can
have
very
similar
versions
of
some.
A
I
mean,
ideally,
what
we
could
do
is
we
could
allow
multiple
people
to
buy
the
same
thing
you
know.
So
maybe
we
put
a
note
here.
Ideally,
multiple
people,
multiple
agents,
ideally
an
or
nft-
can
be
purchased.
A
Yeah,
maybe
this
use
case
is
that
we
want
a
fungible
token
right.
I
don't
know
what
fungible
versus
non-fungible
means,
but
you
know.
Suffice
it
to
say
we.
This
is.
This
is
the
the
input
objects
themselves
should
be
static
right.
A
A
Utility
tokens
give
holders
access
to
projects
or
services
or
blockchain-based
security
tokens
or
traditional
assets
like
stocks
and
shares
represented
by
digital
tokens
on
the
blockchain,
the
most
distinct
type
of
tokens
are
fungible
and
non-fungible,
so
fungible
tokens
are
divided.
The
divisible
and
non-unique
okay,
so,
like
money,
interesting
non-fungible
token
are
unique
and
non-divisible.
They
should
be
considered
the
type
of
deed
of
title
or
ownership
as
a
unique
non-replaceable
item.
So
maybe
we
use
nfts
so.
A
And
so
what
what?
Why
might
be
so
so
nfts
are
likely
also
a
help
to
us
in
solving
our
locking
issue
right
because
explicitly
they
have
to
be
transferred
to
be
used.
So
this
kind
of
you
know
could
help
with
our
distributed,
locking.
A
A
All
right,
let's
just
see
if
we
can
spin
this
thing
up
for
god's
sakes,.
A
A
A
A
A
A
A
Does
you
know
we're
going
to
go,
run
our
analysis
and
we're
going
to
see
you
know
all
right,
so
there
maybe
somebody's
proposing
an
aligned
system
context
where
it's
going
to
work
to
it's
going
to
it's,
it's
different
they're,
doing
different
work,
but
they're
moving
the
strategic
principles
in
the
same
direction
right
so
we
wanted
to
go.
You
know
clean
up
the
code
base
and
this
person
is
going
around
doing
refactoring.
Okay,
so
well,
you
know
their
refactoring.
Work
is
eventually
going
to
clean
up
the
code
base.
A
A
And
then
acceptance,
and
then
so
and
when
the
counter
proposal
is
issued,
so
the
proposal
maybe
could
just
be
the
single
hand
like
single
thing.
Where
then,
all
of
a
sudden,
it's
just
good,
but
it
could
also
be.
You
know
this
case
where
the
counter
proposal
is
issued,
right
and
and
yeah.
A
No,
so
the
counter
proposal
has
to
be
issued
because
we
then
need
to
go
analyze
the
off
chain
data
within
the
counter
proposal
to
decide
if
the
provenance
information
that's
going
to
be
provided
with
to
us
is
acceptable
and
check
the
history
of
that
that
executor
right,
so
we're
gonna
basically
make
decisions
of
who
to
reward
right
who
to
actually.
A
A
A
Or
execute
the
system
context
outlined
in
there,
so
we're
just
gonna.
A
A
Okay,
so
we
said
ideally,
you
know
they
can
be
purchased
multiple
times.
We
don't
know
about
that,
but
we
do
know
we're
mitigated
anyways
via
mitigated
either
way
the
call
response,
protocol
system
or
proposal
system.
So
so,
basically,
essentially
you
know
where
we
come
to
an
agreement
on
what
system
context
will
be
hypothesized
or
executed.
A
A
Okay,
you
know
so
counter
proposals
evaluated
using
evaluated
using.
A
By
mapping
by
mapping
or
by
analysis
of
historical
data
agent
execution
data
to
calculate
risk,
tolerance,
review
system
to
calculate
risk,
tolerance,
counterproposal
is
evaluated
by
analysis
of
historical
agent
execution
data
of
historical
proposed
agent
execution
agent
with
counter
proposal.
A
Via
attestation
right
so
we
could,
you
know
they
could
basically
prove
to
us
that
they
have
have
the
hardware
somehow
right
that
they
they
could.
You
know
they
could
issue
a
counter
proposal
with
an
attestation
within
the
counter
proposal,
which
is
a
valid
attestation
which
says
you
know
hey.
You
know
I
have
you
know
I
have
you
know
the
hardware
that
is
a
test.
Is
it
tested
to
run
this
thing.
A
And
I
you
know
have
not
have
not,
I
I
you
know
basically
because
you're
you're,
you're
you're
you're
outsourcing
your
work,
the
work
that
you
want
done
right,
and
so
you,
basically
you
have
to
vet
it
somehow
right,
and
so
you
can
do
you
know
you
can
use
whatever
mechanisms
you
want
to
do
that
vetting
right.
You
can
pull
in.
You
know
third-party
data,
that
from
people
that
you
trust
to
say,
hey.
You
know
who
you
know
have
people
that
I
trust.
A
So
if
it's
google
that
comes
back
and
bids
on
it
and
you're
saying
create
me
a
vm
and
google
comes
back
and
bids
on
it
says
I'll,
create
you
a
vm.
Well,
you
can.
Basically,
you
know
you
might
have
a
strategic
plan
in
there.
That
says
you
know,
accept,
auto,
accept
offers.
You
know
that
are
within
these
areas
from
these
you
know
or
auto,
auto
let
these
offers
through
the
gatekeeper
right,
because
I
trust
you
know,
I
trust,
google
to
run
a
vm.
A
You
know
you
may
or
may
not
trust
rugel
google
to
run
a
vm,
but
you
may
you
know,
trust
google
to
to
at
least
you
know,
spin
up
the
vm
for
you.
You
know
you
you.
If
that's
what
you
know
and
obviously
you
know
you
have
different
threat
models
for
different
things
and
you
need
to
and
you're
going
to
take
that
into
account
within
the
evaluation
and
and
that's
probably
happening
within
the
parent
system
context.
You
know
these
these
or
within
the
system
contact
or
so
the
the
plan.
A
A
And
ran
through
gateway,
just
like
anything
else,
I
can
apply
overlays
to
do
context,
slash
threat
model,
specific
vetting.
A
It's
like
a
rain,
we're
going
to
start
the
blockchain
all
right.
Okay,
so
we
found
out
nfts
we
found
out.
Nfts
are
a
good
way
for
us
to
go
and
we
don't
want
to
store
those
nfts
in
it
in
a
did
based
blockchain.
We
want
to.
We
found
out
some
ways
that
we
might
execute
dots
in
a
distributed
setting
and
you
know,
and
so-
and
so
you
know,
obviously
you
know
yeah
so.
A
A
And
I
think,
can
we
accept
when
we
form
linkage
right?
So
you
know
you
know,
does
the
did
com
message
require
signing.
A
A
When
original
context,
when
did
for
original
context,
signs
linkage,
peer
link
is
prompted
so,
when
did
for
for
original
context
is
prompted.
A
To
sign
peer
link
is
where
we
are.
We
do
our
vetting
right
so
get
keeper.
A
Right
and
then
we
form
link
form
peer,
slash
link.
If
we
accept
right
so
basically,
then,
then
you
do
your
you
know,
and
so
you
can
pay
via.
So
then
you
pay.
So
basically
they
say
here's
this
system
context.
I
want
to
link
it.
You
know
we'll
link
the
dids,
basically
by
saying
well
mint
one
ft,
we'll
mint
an
nft
right.
We
watch
fermented
nfts,
I'm
in
the
nft
system
context.
A
We
then
you
know
other
agents
out
of
the
network
say:
oh
okay,
yeah
I'd
like
to
do
that.
Work
sounds
good
and
then
they,
you
know
mint
their
nft.
That's
a
response
and
via
the
the
peer
peer
did
interface,
you
have
to
have
one
peer
agree
to
be
linked
to
the
other
peer.
I
believe
this
is
how
it
worked,
and
so
when
we
do
that
agreement,
that
is
our
point
where
we
can
jump
in
and
run
our
vetting
flows
and
which
we
can
overlay
on
there
or
whatever.
A
A
Once
payment
is
received,
agent
will
start
work
and
then
ask
mint,
nft
and
then
do
whatever
what
the
results
was
asked
all
right.
So
maybe
you're
meant
to
another
to
maybe
mint
another
ft
with
results,
maybe
never
hits
chain.