►
From YouTube: EIP Editing Office Hour Meeting 7
Description
Agenda: https://github.com/ethereum-cat-herders/EIPIP/issues/194
A
I
have
shared
the
link
for
the
agenda
in
chat.
We
are
joined
by
a
few
EAP
authors
today,
Sam
I
have
list
of
The
Proposal
number
of
request
number.
A
Yeah
we
can
see
Sam's
shared
screen,
okay,.
B
B
To
this
one
before
yes,
let's.
C
D
There
is
a
very
related
one
which
is
which
is
998,
but
we
explain
the
differences
perfect.
B
D
B
Without
no
no
problem
whatsoever,
I
know
Zoom
is
sketchy
sometimes.
D
B
C
You
in
the
desktop
app
or
are
you
in
the
browser.
B
B
B
Actually
renders
properly
on
or
like
with
our.
C
B
C
E
D
F
B
B
So
how
gas
efficient
is
it
when
you
have
like
really
deep
nested
nfts
like
if
you
have
a
like
three
child,
three.
D
Sorry,
let
me
make
sure
I'm
here
yeah,
so
it's
actually
not
very
different.
I
mean
we.
We
have
compared
the
cost
of
our
operations
against
regular
operations
for
ERC
721s
and
at
most
it's
twice
the
the
cost
and
but
it
doesn't
affect
when
you're
handling
children.
It
doesn't
affect.
How
many
are
there,
because
that
that's
why
we
use
indexes
no.
B
No
like
the
depth,
because
so
each
child
so
like
if
you
have
like
a
chain
of
like
one
parent
one
child
who
has
another
child
who
has
another
child.
D
G
D
Many
operations
are
only
can
only
be
done
by
the
direct
parent,
which
is
an
nft
like
transferring.
So
in
that
case,
you
you
don't
need
to
go
much.
You
just
go
one
level
up,
but
for
other
operations
we
do
need
to
get
the
root
owner,
so
it
depends
yeah.
If
you
have
more
like
more
nested
levels,
you
would
have
to
call
more
external
contracts
to
get
the
actual
root
owner.
Okay,
so
yeah
there
is
a
cost
there,
which
increases.
If
there
is
many.
C
B
B
E
E
E
C
B
C
E
B
You
know
you
didn't
hit
any
of
the
common
problems.
A
lot
of
people
hit
in
their
eips,
so
I
will
probably
go
a
little
bit
more
in
depth,
but
yeah.
It
looks,
looks
great
so
far.
D
B
B
D
Well,
I,
we
put
some
of
the
use
cases
they're
like
bundling
or
membership
delegation.
Oh.
B
Right
right,
but
like
so
so
I
think
both
can
implement
the
same
thing
right.
So
you
have
a
smart
contract
and
the
so
our
contract
owns
the
child
out
of
T
and
allows
the
address
that
holds
the
parent
nft
to
interact
like.
A
D
C
A
Puja
yeah
I'm,
probably
screen
sometimes
Zoom
gives
up.
So
we
should
wait
for
a
minute
or
so
maybe
he
will
try
to
rejoin
foreign.
A
A
F
Wow
sound,
like
is
trying
to
reconnect
I,
think
what
he
means
is
whether
the
author
is
my
favorite
alternative
options
to
use
the
contract
instead
of
pointing
the
ownership
to
another
nft,
and
whether
this
consideration
has
been
reflected
in
the
rationale.
A
D
Yes,
I
I
was
lost,
I
lost
the
screen,
but
yes,
I.
Think
I
also
think
that's
why
he's
referring
and
well.
The
main
thing
is
that,
well
it's
not
yet
in
the
Russian
alley.
We
will
like
it
definitely,
but
the
main
thing
is
that,
with
this
approach
of
having
a
contract
just
being
the
owner,
it's
limiting
because
it.
D
Level,
while
with.
D
Can
have
as
many
levels
as
you
want,
or
as
long
as
gas
is
reasonable,
so
you
can
have.
For
instance,
one
of
the
samples
we
have
is
like
you
have
a
King,
which
is
an
NFD
which
owns
a
kingdom
which
is
another
nft,
and
this
Kingdom
may
have
different
lands,
which
are
also
nfts,
and
this
land
may
have
soldiers
which
are
also
nfts
and
so
on,
so
or
also
for
gaming.
D
Like
you,
you
have
a
an
item
which
owns
its
armor
and
weapons
and
it's
it's
different
to
just
having
in
a
different
contract
because
it
like
this
relationship,
is
stated
on
chain
directly
and
as
a
standard.
It's
something
like
any
nft
could
be
nested
into
any
other
nft
as
long
as
As
It
implements
this
interface.
So
it's
not
just
for
a
custom
use.
D
D
A
While
we
are
waiting
I
know,
Victor
is
also
a
very
active
reviewer
and
is
proposed
for
any
IP
editor
in
upcoming
EAP
meeting
I
would
love
to
have
your
feedback
or
maybe
thoughts
if
you
have
any
for
the
next
proposal,
which
is
here
which
is
6051,
Stephen
I
would
like
to
get
back
on
proposal
6059
when
Sam
is
back,
but
in
the
essence
of
time
we
can
probably
move
on
and
get
feedback
for
the
next
proposal,
which
is
in
the
draft,
if
that's
fine,
sure.
A
I,
don't
see
Sam
online,
so
I'm
assuming
something
went
wrong
with
his
internet
or
like
that
so
yeah.
Maybe
we
can
continue
with
it
Victor.
Would
it
be
possible
for
you
to
screen
share.
H
F
Yeah
yeah
I
can
I
can
share.
Let
me
use
my
let
me
jump
to
my
computer
to
connect
Ed.
A
Steven
you
did
mention
that
the
team
has
experience
with
another
proposal,
maybe
know
the
number
again.
Please.
E
D
C
F
Well,
let
me
quit
my.
A
F
F
C
D
F
All
along
okay,
okay,
all
righty,
okay,
finally
yeah,
so
this
EIP
is
proposing
a
private
key
in
encapsulation
they're,
trying
to
encapsulate
your
a
private
key.
What
it
does
is
encapsulate
a
pip,
so
we
can
locate
in
another
application
without
providing
the
seat.
Oh,
let
me
see
what
is
this
proposing
core
algorithms.
F
Interface,
or
are
you
proposing
how
application
works
together,
meaning
like
small
Contra
work
together.
F
H
F
Okay,
so
the
first
thing
I
think
I
will
ask
about,
is
consider
using
interface
category
that
is
applying
for
for,
for
example,
if
you
see
the
Json
RPC
Are
all
categorized
as
interfaces
there's
four
layers,
the
first
layer
will
be
the
bottom
layer
being
called
core,
which
is
consensus,
plus
the
execution,
and
then
the
second
layer
is
Network,
which
is
like
how
we
spread
the
how
we
spread
all
the
transactions
and
and
then
like
gossip
Network,
and
then
third
layer
is
usually
about
I.
F
How
Json,
rpcs
and
other
other
obviously
calls
are
in.
F
And
it
seems
like
by
just
reading
very
briefly:
I
might
be
wrong.
It
looks
like
it's
it's
at
least
what
light
look
like
here
is
about
proposing
some
new
eth
domain
etas
namespaced
interface,
so
consider
that
first,
that's
what
I
would
suggest
and
then
second,
let
me
let
me
see
so.
C
F
We
doing
is
this
an
algorithm
trying
to
do
the
private
key
exchange.
H
It's
a
a
tree
yeah.
There
is
a
key
agreement.
C
F
Okay,
okay,
let
me
think
about
it:
you're
trying
to
increase
a
product
key
and
then
let
the
other
side
of
it
are
decrypted.
C
H
F
It's
interesting,
yeah,
I
I,
see
that's
the
abbreviation
of
that.
Yeah
I,
like
I
I,
know
that
it's
very
hard
for
us
to
put
a
link
here
I
would
generally
hope.
F
My
personal
opinion
is
that
things
like
that
be
at
least
spell
out
because,
like
if
people
first
time
see
it
here,
they
might
not
know
what
you're
referring
to
as
a
as
a
self
and
what
you're
referring
to
and
so
spell
out
when
you
use
a
acronym
when
at
the
first
time
in
in
a
text,
would
be
a
good
idea
and
I
yeah
I
will
Advocate
linking
it
externally,
but
our
current
editor
or
your
policy
doesn't
allow
us
to
link
here.
So
if
you
have
additional
con
yeah.
C
F
Have
it
I
I
guess
you
might
have
tried
to
link
it.
Let
me
see
yeah
anyway,
so
but
at
least
explain
them
and
then
put
some
relevant
explanation
in
would
be
helpful.
A
Sam
just
tweeted
that
there
is
internet
down.
C
B
F
Okay,
yeah
I'm,
just
hey
Sam
you,
you
are
an
FK
for
non-linking
and
then
I
just
have
this
authors
putting
in
ecises
and
I'm
I
was
hoping.
This
isn't
a
text
that
having
a
link
would
be
a
good
idea
to
kind
of
get
more
time
contest.
But
for
now,
given
our
policy
I'm
suggesting
the
author
to
adding
to
to
spell
out
the
ecies
for
the
first
time
and
provide
rather
than
explanation.
F
F
Trying
to
understand
what
the
key
exchange
component
parties
are
you
trying
to
enable
like
what
this?
What
what
the
security
model
are
you
trying
to
kind
of
set
up,
for
example,
who
is
the
intended
sender
and
intended
intended
receiver,
and
then,
who
do
you
assume,
have
access
to
the
communication
channel?
Do
you
assume
the
adversary
will
have
access
to
the
communication?
Channel
I
think
it's
something
that
I
will
be
looking
for
in
The
Next
Step.
C
H
Elements
just
a
standard,
mature,
algorithm
or
particles
like
ecdh,
hkdf
or
authentic
energy,
inclusion
that
that's
a
Asus
GCM
or
something
like.
E
F
Yeah
yeah
because
I'm
trying
to
figure
out
what
the
Yen
encryption
is.
Okay,
now
assuming
you
are
able
to.
H
Yeah
there
is
music
nature
yeah.
If
you
use
look
at
number
two.
F
Number
two
or
are
you,
can
you,
can
you
tell.
H
Understand
confidentiality
is
achieved
by
increasing
where
I
think
when
we
talk
about
the
random
attacker,
we
are
talking
about.
Oh
discipline.
Public
key
is
to
be
tested
another
way
so.
F
I
see
yeah
basic
means.
The
the
receiver
has
signed
off
the
have
authenticated
the
response
right.
F
Okay,
all
right,
so
this
is
key
exchange
now
you're,
defining
a
key
exchange
and
then
now
there's
the
network
communication
process.
You
define
this
request
with
the
method
with
the
version
with
this
assigner
private
key.
F
Public
key,
okay,
reasonable,
must
Generate
random
query
private.
F
Let
me
see
what
the
response
did.
You
specify
I
think
at
this
at
this
section
it
is
ideal
that
you
also
specify
the
format
of
the
response.
This
is
the
input
or
parameter
right.
Yeah
you
mentioned
the
return
value
is
R.
This
is
this.
This
is
mathematic
representation,
and
this
section
and
I
think
you
start
entering
the
process
of
describing
what
the
interface
looked
like
so
I
would
suggest
also
put
in
such
as
putting
in
the
interface
the
response
format
right.
All
right
does
it
does
that
make
sense.
H
Yeah
yeah.
F
And
for
things
like
version
and
the
sign
and
then
and
public
key,
this
is
a
public
key
right.
Are
you
looking
for
the.
F
Ecdsa
public
key,
which,
and
then
oh
yeah
I-
think
you
would
need
to
for
this
is
an
editorial
question
for
you.
The
technical
choice
you
make
is
that
you
have.
Is
this
an
example,
or
is
this
the
the
selection?
Wait,
that's
a
Shard,
so
basically
the
question
I
have
for
you
is.
F
C
H
F
F
B
C
F
Or
after
but
yeah
this
is
great
I'll
specify
the
length
of
version
and
and.
H
What
do
you
mean
Lance
version,
if
it's
just
as
a
string.
F
When
you
communicate
that
there
is
going
to
be
a
version
stream,
you
either
say
that
okay,
our
string
is
several
bytes
right.
Our
version
is
represented
by
a
number
which
is
the
provides,
and
then
we
are
here
going
to
use
a
hack
string
or
any
a
mathematical
representation.
F
Yeah,
basically
just
communicate
the
data
type
data
type
and
size.
How
about
that.
F
H
F
Yeah
I
think
it's
worthy
of
mentioning
that
you
either
specify
here
what
is
allowable
or
mentioned.
It
will
be
synthesized
in
which,
following
sections
like,
for
example,
you
all
have
a
dedicated
section
for
version
for
all
the
versions
that's
considered
today
and
then
in
that
table.
What
each
kind
of
will
look
like.
How
does
that
is
that?
Does
that
make
sense.
H
Yeah
I
think
I
will
point
of
view
upon.
F
Right,
that's
great
yeah!
Let
me
just
put
it
here:
cool
information
must
generate
as
a
security
sender,
R2
send
request
for
sender
to
encapsulate
the
private
key
request
to
Sender,
and
usually
these
requests
are
I'm.
Trying
to
imagine
like
who
is
like
in
in
real
use
case.
Can
you
explain
to
me
help
me
understand
in
real
use
cases
who
are
your
intended
sender
and
who
are
intended
receiver
in
a
typical
use
case?
United
are
targeted
major
targeted
use
cases.
H
Yeah
sender
is
a
maybe
like
a
hardware
wallet,
and
then
you
have
a
c.
Then
you
can
derive
many
private
keys
and
addresses
and.
C
The
recipient,
the
receiver,
it.
H
F
F
That's
helpful,
actually
yeah
that
helps
a
lot
I
think
describing
them
in
the
motivation
could
be
helpful.
Oh
yeah,
you
did
cool
yeah.
That.
C
F
A
lot
on
putting
in
the
context
where
is
oval
B
being
mentioned,
I'll,
be
oh,
this
is
the
hologram.
C
F
F
C
C
F
Probably
put
more
time
into
reading
this,
the
the
I'm
kind
of
revealed
well,
one
third
of
it
I'm
probably
put
more
time
into
the
other
thing,
but
in
in
a
sense
in,
for
the
sake
of
time,
I
guess
I'll
pause
here
and
then
see
what
Sam
thinks
and
what
poetry
things
should
we
continue
reviewing
this
particular
EIP?
Should
we
give
it
back
to
Sam
or
what
should
we
do
here?
What
what's
your
preference.
B
All
right
so
do
we
have
authors
for
other
eip's
here
or.
C
G
D
Yes-
and
there
was
a
pending
question,
you
were
asking
so
and
if
you
want
that
answer
now
or
we
can
add
it
to
the
rationale
later
and
you
just
review.
B
It
and
we
can
do
it
offline,
okay,.
E
E
B
C
B
C
B
B
Okay,
so
I
feel
like
the
abstract's
a
little
too
light
on
details
here,
I.
B
Like
I
get
a
sense
for
what's
your
knowledge
brings
to
the
table
for
this
I,
don't
think
it
goes
into
enough
detail
about
who'd,
be
assigning
these.
These
certificates
and
who'd
be
verifying
them.
So
a
little
bit
more
information
about
like.
G
So
we
had
explained
it
afterwards
with
the
diagram
and
workflow,
but
that
has
we
have
to
also
give
brief
detail
in
abstract.
Is
that
the
case.
B
C
B
By
defining
the
optimal
functional
interfaces
that
defines
the
identity
with
something
weird
with
that
sentence,
what's
going
on?
Okay,
so
that's
your
results.
Calendar
is
not
being
addressed
by
other
standards
by
defining
the
optimal
functional
interfaces
that
defines
the
identity
issue
should
probably
be
that
allows
the
identity
issuer
to
validate
the
web.
2
base
yeah.
G
He
basically
create
an
attestation,
so
I
wanted
to
basically
summarize
here
that
the
way
to
create
an
attestation
which
is
of
a
web
tool
based
verification
on
web3,
on
on-chain
verification
so
and.
E
C
B
B
The
the
EIP
is
yeah
scissors.
B
B
B
C
B
B
B
B
B
B
B
G
Which
is
been
instantiated
by
the
standard
they
will
map
to
this
ID
with
this
spt
token,
so.
C
G
So
it's
verified
is
just
modify
a
function
that
has
to
be
called
by
any
and
to
verify
whether
the
holder
of
this
SVT.
So
if
someone
wants
to
use
the
services,
so
this
function
will
validate
that
the
address
which
holds
this
SVT
with
this
token
ID
so.
G
No,
it's
issued
to
the
people
who
are
verified,
who
are
given
identity
by
the
administrator
and
then
the
other.
Let's
say
service
who
wants
to
use
this
identity
as
verification
they
will
do?
They
will
create
a
modifier
on
the
functions.
Let's
say,
I
want
to
access
to
the
liquidity
pool
in
uni,
swap
so
add
liquidity
pool
this
function
will
have
this
modifier
function,
which
will
check
whether
the
caller
of
this
function.
The
address
of
this
function.
Has
this
token
ID
or
not
token,.
E
G
Actual
owner
of
this
nft
or
nokius-
so
it's
it's
very
so
the
owner
of
it's
it's
yeah
I
mean
there
are
two
different
thumbs.
It
just
gives
a
Boolean
result.
B
C
B
So
you're
saying:
do
you
have
the
identity
provider.
B
G
E
C
C
B
B
G
E
G
So
they
can
from
their
side
Define,
off-chain
or
yipfs
that
these
These
are
the
data
they
want
to
verify,
and
then
they
will
compare
it
with
the
requirement
structure
which
is
presented
on
chain.
But.
G
B
721
metadata
that
might
be
useful,
or
it's
just
like
a
URI
to
the
requirements
and
then
that
URI
could
be
a
like
ipfs
link
or
or
something
like
that.
Just
because.
C
B
Does
the
zero
knowledge
like
Proof
come
into
this,
or
is
that
verified
on
change?
Is
that
verified
off
chain?
How
does
that
work
so.
G
Based
upon
that
type
of
protocol,
if
it
we
need
initial
creation
of
the
shared
roof
string,
we
will
have
to
use
that
so
it's
agnostic
to
it
can
be
ZK
Stark.
It
can
be
any
other
category
of
protocol,
so
we
are
not
special
for,
for
example,
we
have
used
Merkel
roots
to.
G
We
will
store
the
Merkel
root
by
creating
the
hashes
of
the
your
personal
ident,
personal
information.
Let's
say
address
and
other
details,
and
then
once
you
have
to
prove,
is
you
just
have
in
the
metadata?
Only
the
hashes
of
the
of
the
certain
leaves,
and
then
it
will
recompute
whether
this
information
on
chain
will
give
the
same
rule
Merkel
root
as
initialized
by
the
administrator.
G
G
It
will
be
stored
on
the
requirement
structure,
all
the
proofs
beliefs
that
you
want
to
verify,
and
then
there
will
be
a
mapping
corresponding
to
the
each
address
and
corresponding
to
wire
threads.
Multiple
root
is
of
is
all
identity,
data
and
user
data.
So
we
just
use
the
let's
say
same
mechanism
that
is
used
for
white
listing
on
chain.
B
Okay,
I'm,
probably
gonna,
have
to
give
this
like
a
couple
more
reads,
sir
I'm
not
super
familiar
with
the
ZK
stuff
and
I
think
we're
almost
out
of
time
today.
But
I'll
add
this
to
my
list
of
things
to
to
pay
attention
to
and
I'll
get
back
to
you
with
the
rest
of
my
feedback.
E
I
mean
we
we
basically
like
for
for
any
ID
property.
We
just
slice
them
into
different
attributes.
So
all
these
ID
attributes
are
kind
of
are
fragmented
and
all
this
value
will
be
on
the
Boolean
value.
So
it's
basically
provide
a
certificate
to
to
attest
to
this
person.
Behold
a
ID
he's
like
over
18
or
21
he's
in
this
section,
digital
nodes,
and
all
these
will
be
totally
with
all
of
my
offline
encryption
fires
and
according
to
the
Drupal
race
plan,
with
the
metadata.
E
G
Yeah,
so
you
are
just
you
rephrase
that.
G
Basically,
we
follow
yeah
to
generate
this
credentials.
Okay,.
E
B
This
information
is
probably
going
to
be
in
your
reference
implementation,
and
you
know
it's
probably
just
that
I'm
not
reading.
That's
in.
G
Sure
so,
for
the
drafts
we
need
to,
let's
say,
brush
up
all
the
feedback
that
you
have
given
now,
apart
from
grammatical
and
other
issues
and
then
also
kind
of
go
in
much
more
details
about
the
how
we
store
the
requirement
structure
and
also
what
it
how
it
refers
to
the
zero
knowledge
groups.
E
B
This
is
like
the
EIP
should
only
expose
the
interface
it
shouldn't
ex,
like
it
shouldn't
specify
the
implementation
details
so
yeah
just
just
be
careful
not
to
get
two
in
the
Weeds
about
how
your
particular
implementation
does
it,
but
yeah
yeah.