►
From YouTube: IETF105-DINRG-20190724-1000
Description
DINRG meeting session at IETF105
2019/07/24 1000
https://datatracker.ietf.org/meeting/105/proceedings/
A
Tell
me
hello
and
welcome
to
the
decentralized
internet
infrastructure
research
group.
We
are
an
IIT
F
activity
and,
as
such
the
note
well,
it
might
be
a
little
bit
different
from
what
you've
seen
in
IETF
working
groups
we're
under
a
similar
but
not
identical,
IPR
regime.
A
little
certain
coordinates
for
finding
us.
We've
got,
of
course
the
mailing
list,
URL
is
there
and
we've
got
a
wiki
as
well.
A
So
today's
agenda
is
going
to
be
know
well,
which
we
just
did
minutes
an
attacker
in
Java.
Skype
will
cut
much
gratitude
to
the
folks
who
volunteered
blue
sheets,
and
now
we
are
gender
bashing.
So
we've
got
three
talks:
whoops,
that's
bad
everything.
In
my
part,
we've
actually
only
got
one
talk
from
Lisa
Jiang,
which
is
decentralization
from
the
ground
up
on
the
other.
Two
talks
are
going
to
be
lat
knee
and
O's
on
messed
up
and
hands
on
a
block,
team-based
test
bed
for
PGP
verification.
A
C
Hi
so
I'm
going
to
present
some
work,
we've
been
doing
in
the
last
year
or
so
related
to
a
like
longer,
work
we've
been
doing
with
with
a
wireless
community
networking
in
Barcelona.
This
is
therefore
about
decentralized
networks
which
emerge
because
someone
needs
connectivity
and
they
they'd
set
up
an
antenna.
They
make
connections
with
neighbors
and
then
all
these
routers,
which
are
connected
wirelessly,
they
form
a
mesh
network
and
then
not
mention
network
can
provide
coverage
in
a
given
region.
C
In
our
case,
we
are
working
with
one
of
group
of
the
given
at
community
network
which
has
about
60,000
members
in
the
Spain,
mainly
in
Catalonia,
and
the
South
of
Catalonia,
in
Valencia
and
in
Barcelona.
There
is
a
community
network
that,
where
the
university
is
part
of
which
has
about
hundred
routers
and
then,
of
course,
in
the
edges,
we
have
like
access
points
where
people
connect
to
the
with
end-user
devices
and
on
the
other
side,
there
are
one
or
several
internet
gateways
which
allow
people
to
reach
the
internet.
So
the
network
is
decentralized.
C
Everyone
contributes
a
note,
and
then
we
use
the
term
crowdsourcing,
because
it's
not
just
about
setting
the
network,
but
also
about
contributing
connectivity
and
about
investing
in
in
the
capacity
of
the
network
and
so
on.
So
we
restored
the
idea
that
we
would
like
to
have
networks
which
self-sustaining
not
only
in
terms
of
traffic
of
data
but
also
in
the
say,
traffic
of
economic
value,
so
people
can
can
pay
for
the
infrastructure
and
the
and
the
services
that
they
provide.
So,
as
I
said,
is
about
combining,
let's
say,
routing
of
data
which
is
automated.
C
This
is
nice,
in
fact,
the
idea
in
a
mechanism
that
and
keifa
net
uses
for
they
call
it
economic
compensation,
so
infrastructure
shared
and
then
the
payment
is
based
on
capex
and
OPEX
and
is
proportional
to
contribution
and
consumption.
So
so
automation
is
important
because,
as
we
have
seen
in
in
in
in
the
in
the
larger
community
network,
unless
we
automate
things
are
very
difficult
to
manage,
dealing
with
money
is
complicated,
fare
accounting
because
there
are
participants
which
are
very
tiny
in
others,
but
which
are
pretty
big.
C
Finding
the
optimal
fair
charging
is
is
important,
and
we
have
seen
when,
especially
with
money
operations
have
to
be
Amina.
You
need
to
be
accountable
with
respect
to
your
members
also
to
the
tax
office.
You
need
to
have
a
proper
accounting
and,
and
if
there
is
a
commitment,
the
commitment
has
to
be.
We
use
the
term
inexorable.
So
if
we
committee-
but
things
have
to
happen
us
as
planned
and
well,
the
important
concepts
in
in
in
this
work
is
the
idea
of
automation.
C
With
respect
to
the
past.
In
with
respect
to
the
future,
we
we
use
the
idea
of
as
my
contracts
to
reflect
that
if
there
is
a
commitment,
imagine
like
a
service
agreement
to
connect
to
the
internet
or
an
agreement
to
route
traffic
or
whatever
once
is
signed,
it
has
to
be
has
to
happen
sooner,
so
it's
inevitable
or
inexorable
because
he
will
work
as
suspected.
So
in
the
system
we
have
like
like
this
little,
you
could
divide
it
into
three
layers.
C
Once
part
is
a
monitoring
system
where
we
have
a
database
of
notes,
but
that
participate
in
the
network
and
we
collect
measurements
of
our
traffic
in
the
middle.
That
is
the
let's
say
the
network
chain
from
a
user
that
connects
with
the
user
device
to
an
access
point.
Then
there
are
several
routers
in
the
end
somewhere
there
is
a
gateway
to
the
internet,
and
all
that
network
is,
let's
say,
supported
by
a
group
of
servers.
C
Imagine
like
there
are
several
participants
who
can
have
want
to
have
a
copy
of
the
accounting
to
make
sure
that
things
are
really
not
correct
and
no
one
is
doing
anything
wrong.
You
have
a
few
servers
where
the
smart
contracts
and
the
blockchain
are
stored,
and
so
we
use
a
private
product
chain,
a
permission
blockchain
in
in
the
inside
the
network,
and
then
the
idea
when
the
formulation
is
a
bit
complicated,
but
there
it
is
very
simple.
I
mean
people
get
two
access
points.
They
find
prices
for,
like
the
network
access.
C
Imagine
like
paying
for
electricity,
you
see
how
much
is
kilowatt
per
hour
at
that
moment
and
and
the
price
is
collected
from
users.
That
is
a
smart
contract
that
gives
you
rinoa
few
gigabytes
of
traffic,
and
then
you
deposit
an
amount
of
money,
and
if
the
services
is
correct,
that
amount
is
then
taken
from
the
user
and
those
payments
from
end
users
go
to.
C
We
call
it
the
wholesale
market,
where
we
collect
data
about
who
contributed
to
deliver
that
traffic
to
the
clients,
and
then
the
amounts
of
money
are
split
proportionally
to
the
effort
done
by
the
routers
and
the
gateways
to
the
internet
because
are
the
ones
who
similar
to
the
power
generation.
There
are
different
sources
of
electricity.
That
price
per
kilowatt
hour
is
a
balance
between
demand
and
offer
and
then
there's
a
mediator.
C
Who
is
a
smart
guy
who
computes
the
the
kilowatt
hour
price
for
the
next
time,
depending
on
how
much
each
router
charges
or
each
gateway
charges
to
move
through
the
network?
So
we
have
a
group
of
nine
contracts.
We
have
a
the
mesh
network,
the
Dow
and
then
on
one
side.
We
have
on
the
right
side,
we
have
an
Oracle,
which
is
the
one
that
collects
monitoring
information.
Imagine
like
enough
in
a
trust
of
a
way
so
that
they
measure
traffic
in
different
points
of
the
network.
To
avoid
that
people
can
tamper
with
the
traffic.
C
There
is
also
a
local
currency,
a
local
token,
which
is
supported
by
an
ELC
20
contract
and
then
on
the
site
of
consumption.
People
can
instantiate
select
and
instantiate.
One
is
one
of
the
smart
contracts
that
grew
like
access
like
what
you
would
do.
If
you
wanted
to
connect
to
a
mobile
operator,
you
would
choose
the
one
that
the
volume
per
time
whatever
per
quality
and
on
the
right
side
routers
they
have.
We
have
a
smart
contract.
That
is
an
ELC
7:21,
compatible
which
it
is
with
the
let's
say.
C
Tokens
that
reflect
ownership
of
devices,
so
you
own
a
device.
You
have
fun
like
a
token
on
fungible
token,
that
reflects
that
you
own
that
device
and
then,
of
course,
when
that
device
works
and
thus
for
wedding,
it
gets
paid.
So
we
pay
the
router.
The
router
gives
the
money
to
the
owner.
So
this
is
the
list
of
contracts
and
ingredients,
so
basically
yeah.
We
need
them
fungible
token
to
pay
between
the
different
between
all
participants
in
the
network.
C
We
have
a
non
front
super
token
that
allows
to
manage
ownership
of
the
devices
in
the
network.
We
need
this
Oracle,
which
allows
to
connect
the
economic
and
the
technical
words
to
make
sure
that
traffic
is
properly
accounted
and
well
and
and
the
concerns
that
is
mentioned
about
three
roles
in
the
system.
This
is
implemented
using
the
gas
theory
of
software,
but
configured
to
work
in
the
inner
proof
of
authority
mode.
C
That
means
we
have
a
I
mean
an
intranet,
let's
say
where
we
use
our
knowns
around
service
and
but
then
that
allows
us
to
write
the
smart
contracts
in
solidity
and
environments.
Quite
stepa
so
I
mean
we
also
tried
hydrology
lubricant,
so
it
took
this
because
simply
it
works
and
then,
of
course,
in
the
network,
our
network
is
already
there,
but
in
a
imagine,
someone
wants
to
set
up
a
network
in
a
different
location.
They
would
bootstrap
a
network
by
adding
at
least
one
server.
C
Then
the
network
can
grow
by
minting.
We
call
it
meeting
at
devices
registering
devices
in
the
inductor
local
blockchain
sooner
or
later
internet.
That
way
will
appear.
It
is
necessary
to
get
to
the
Internet.
Sooner
or
later,
an
access
point
will
appear
which
isn't
it
required
to
connect
end
users
with
a
mesh
network.
C
Then
people
can
select
a
contract
and
start
a
connection,
and
then
the
system
periodically
would
compensate
everyone,
so
owners
of
devices
would
be
paid
for
the
effort
that
divides
us
and
eventually
over
time,
that
owner
would
be
compensated
and
return
would
see
its
investment
returned
and
maybe
with
some
profit,
if
necessary,
although
in
our
network,
social
profit
is
more
important
than
economic.
This
is
a
kind
of
block
of
activity
in
the
in
the
prototype.
C
They
see
that
well
in
the
service
you
see
load
when
there
is
bootstrap
when
we
add
as
a
node
when
we
establish
a
contract
and
when
the
conversation
is
run,
but
we
don't
do
it
every
second.
We
do
it
periodically
could
even
be
everyday,
not
necessarily
to
make
it
too
fast.
And
then
this
is
a
pic
of
a
picture
that
shows
how
money
flows.
You
can
see
that
clients
have
less
and
less
money
that
red
line
in
exchange
of
the
blue
line,
which
means
that
the
client
is
getting
more
and
more
traffic.
C
So
you
pay
for
the
traffic
you
get
and
then,
of
course,
the
routers
which
are
involved
in
the
Gateway
gets
money
out
of
that,
and
because
there
is
some
unbalanced
like
in
the
electric
system,
sometimes
the
every
period
the
prices
are
not
properly
fixed.
So
there's
a
there's:
a
reserve
account
where
we
save
money
to
compensate
every
in
April
cycle,
whatever
small
differences
between
prices
and
and
costs.
C
So
we
we
experimented
the
beaut.
We
learn
about
a
bit
from
the
implementation
and
we
started
to
prepare
a
pilot
with
the
local
network
and
see
how
they
perceive
the
system,
because
we
want
later
on
a
scale
it
up
to
a
wider
to
the
wider,
with
giving
that
network
and
but
I
think
it's
not
worth
to
enter
into
details.
C
If
you
are
interested
in
any
aspect
that
we
like
I
comment,
but
basically
is
I,
think
we
achieve
the
aim
of
automated
from
combining
routing
that
we've
worked
on
the
topic
for
a
few
years,
with
also
routing
of
economic
flows,
to
make
networks
self-sustaining,
economically
and
and
with
the
community.
We
have
discussed
that.
Well,
if
you
invest
in
a
router,
you
would
like
to
see
your
investment
return.
I,
don't
know
so
three
years,
four
years.
We
need
to
make
sure
that
that
happens.
C
It's
not
the
same
to
be
constantly
entered
like
in
an
internet
exchange
for
a
community
network
or
be
profit
oriented
in
which
people
can
optimistically
deploy
routers
to
to
get
a
profit.
How
the
profit
relates
to
quality
of
service
coverage,
whatever
how
what
happens
when
people
charge
differently
for
doing
the
same
job?
How
to
deal
with
clients
who
want
to
pay
more
because
we
want
to
have
all
the
conference,
which
is
requires
better
connectivity
ventures,
downloading
files.
C
B
D
C
The
idea
of
the
blockchain
is
because,
in
these
networks
there
are
different
owners,
so
the
if,
if
you
deal
with
money,
you
have
to
make
sure
that
no
one
feels
that
someone
is
playing
with
the
numbers
so
inside
the
network.
If
you
add
a
server,
because
you
want
to
know
what's
going
on,
you
could
receive
a
feed
of
what's
wrong,
what's
happening
in
the
network,
so
you
can
see
what
everything
that
is
going
on
there.
C
You
will
also
be
running
your
an
instance
of
the
smart
contracts,
so
everyone
has
access
to
everything
as
we
used
to
do
in
the
monitor
network
monitoring
their
economic
monitoring
is
the
same.
You
see
everything
you
contribute
to
the
computation
of
values
and
the
consensus.
I
don't
know
if
this
is
an
answer
to
you.
Anyone
can
read
yeah.
D
C
The
other
values,
because
nowadays,
for
instance,
the
dimension
network
publishes
monitoring
data
among
the
members
and
also
part
of
it
also
publicly
filtering
private
information,
but
when
it
comes
to
paying
for
maintenance
for
new
nose
and
everything
they
use
a
bank
account,
they
transfer
money
periodically
and
it's
a
kind
of
mobile
overhead.
Someone
has
to
centrally
manage
the
accounting.
Someone
has
to
make
sure
that
everyone
pays
at
the
right
time
and
everything.
C
C
C
Matisse's
Connect
is
a
connection
with
another
project,
but
yeah
I
mean
definitely
privacy
is
is,
is
an
issue,
but
not
in
this
kind
of
networks,
because
here
generally
people
is
completely
transparent
about
money
flows,
because
compensation
is
based
on
declaring
how
much
you
contributed,
how
much
you
consumed
and
then
balancing
things.
So
you
need
to
know
who
are
these
related
to
know
the
identifier
of
the
participants.
F
Hello,
everyone
Chen
Yin
from
hobby.
This
is
a
work
form
hobby,
telefónica,
colored
university
to
not
have
fun
and
see
unique.
It's
named
a
blockchain
based
a
testbed
for
the
PGP
verification.
So
it's
about
our
research
project
named
decentralized
Internet
infrastructure
project.
Last
year,
my
colleague,
Peng
Lu,
has
published
were
named
decentralized,
Internet
resource
trust
infrastructure
in
102,
also
in
Banco,
and
this
is
the
update
above
a
research.
So
this
is
an
overview
of
our
DRI
DRI
system.
F
So
in
the
bottom
is
the
distributed
ledger
layer
is,
it
is
the
basic
of
the
decentralized
network
infrastructure
and
it's
in
charge
of
provide
decentralized
system
structure
and
distributed
consensus,
MEC
didn't
and
smart
contracts
capabilities,
so
in
each
node.
There
is
two
key
functions
in
in
the
note.
1
is
the
ledger:
who
is
responsible
for
the
storage
and
and
then
other
the
other
party
of
their
smart
contract
who
functions
and
in
the
middle
we
have
the
namespace
management
layer
which
will
storage
their
ownership
and
mapping.
F
F
If
we
combine
the
IP
address
with
the
s
number,
it
will
produce
the
BGP
problems
and
then,
if
we
combine
the
IP
address
and
with
the
name
it
will
be,
that
is
DNS
system
architecture
and
also,
if
we
combine
the
IP
address
with
the
identity
of
lightweight
devices
of
IOT,
it
can
describe
the
IOT
structures.
So
in
our
so
in
this
work
we
mainly
focus
on
the
the
part
of
the
rice
frame,
which
is
called
bgp
verification.
Oh
I
must
be
a
clarify
that
here
the
word
is
it.
F
It's
a
word:
application
layer
is
different
from
the
other
traditional
application
layer.
However
traditional
African
there
should
be
in
the
top
of
this
system.
Okay,
so
what
we
focus
on
to
solve
the
these
three
bgp
issues,
the
first
one
is
orange
in
hijack.
That
means
that
it
is
attack
traffic
by
publishing
the
prefix
that
are
not
their
own.
So
the
second
one
is
the
pass
hijack.
That's
means
the
hijack
traffic
by
publishing
false
pass
information.
F
So
here's
an
example
such
as
the
free
team
will
received
path,
information
from
AF,
666
and
then
AF
66
said
that
I
have
a
root
or
I'm
the
neighbor
of
a
s1,
so
the
victim
will
fall
as
if
traffic
directly
to
the
a.s
66,
because
the
new
route
is
shorter
than
the
traditional
pass.
Three
two
one.
So
this
is
the
project
and
the
third
one
is:
we
want
to
solve
the
leak
problems.
F
Here's
a
classic
example
here
that
Google
was
also
the
epic
team,
not
looting
leak,
so
the
peer-to-peer
route,
who
was
leaked
by
the
by
their
customer
and
truly
published,
and
then
the
traffic
was
gone
wrong.
So
why
not
are
PKR?
Pika
is
really
a
good
good
method
to
solve
a
lot
of
security
or
trustworthy
problems,
but
the
erica
is
centralized
trust
model.
F
So
what
we
want
to
do
here
is
to
build
up
a
decentralized
trust,
trust
model,
trust
architecture
here,
so
the
centralized
trans
model,
once
the
other
authority
node
in
the
high
layer
is
miss,
can
feed
intentionally
or
unintentionally.
The
older
low
layer
node
will
not
avoid
the
influence
of
their
mystic.
So
there's
some
research
about
the
real
case
that,
even
though
we
deployed
our
key
care
system
in
the
real
network,
we
will
also
cost
routing
or
other
signal
problems.
F
So
this
is
the
overview
of
our
test
that
we
use
have
larger
fabric
to
build
up
the
whole
system.
It
is
a
can
famous
consultants,
blockchain
and
also
we
can
implement
this
system
by
public
blockchain
or
private
proteins.
That's
okay!
We
think
that
the
consortium
blockchain
is
similar
with
the
current
network
structures.
F
So
on
the
chain
we
have
the
consensus,
consensus
system,
we
have
the
chain
admission
system
and
others
are
the
AIS
as
one
two
three
four
and
in
each
a
s
there
is
at
least
once
public
note
who
maintains
the
IP
address
a
s
number
or
a
neighbor
information,
also
the
the
transaction.
And
why
are
the
article
RTR
interface?
F
The
fabric
note,
will
sent
the
RIAA
information
through
this
interface
and
then
to
do
the
synchronization.
So
in
each
fabric
note
we
will
install
the
ownership
ROA
and
neighbor,
whose
neighbor
information
such
as
here
we
store
the
IP
ownership,
who
will
own
the
IP
prefix
and
the
expiry
date,
and
also
there
is
a
column
I
are
on.
F
It
should
be
the
max
length
of
the
prefix
another
one
is
the
a
s
ownership
and
who
is
the
owner
of
the
a
s
number
and
also
the
external
time
and
now
and
then
there
will
be
the
roa
information.
That
means
the
mapping
between
the
IP
prefix
and
a
s
number
and
then
the
last
one
is
the
neighborhood
of
the
neighbor
information
of
between
the
a
s
so
from
the
re
we
can
do
the
prefix
orange
in
verification
from
the
neighbor
information.
We
can
do
the
root,
password
validation
and
root
leak
detection.
F
So,
firstly,
how
to
do
the
origin
verification,
so
the
IP
address
initiate
an
RA,
actually
is
IP
to
a
s
number
mapping
as
a
transaction
and
then
the
smart
contracts
verify
the
address
ownership
and
ride
our
way
into
the
legend,
and
then
the
relying
parties
get
a
blog
or
a
from
the
ledger
and
synchronize
to
the
beach
periodic,
and
then
they
can
verify
that.
Here's
an
example
such
as
the
ISP
he
said.
F
I
authorized
a
a
three,
the
number
a
f3
to
arraign
tonight,
this
prefix
2001
da
832,
and
then
he
a
broadcast
or
multicast
or
mati
single-car
whatever
to
other
or
other
knows
another
knows
we
receive
this
and
verify
whether
p
is
the
ownership
is
the
owner
of
the
of
these
prefix
and
then
right
right.
The
right
there
are
a
information
to
the
local
later
and
local
later,
the
ra
will
be
synchronized
to
the
relying
party
and
then
to
the
water
and
their.
This
AS
fought
for
the
PDP
update
fortification.
F
So
this
is
the
first
step
and
then
we
can
do
the
a
s
possible
vacation.
Each
s
published
its
neighbor
information
to
the
later,
and
the
neighbor
information
will
be
used
for
the
a
s
pass,
versification
in
PT
p
announcement
and
then
the
relying
party
cat
neighbor
information
from
the
later
and
synchronize.
The
information
to
the
rogers,
so
example
here
is
PB
published
its
neighborhoods
with.
I
is
3
a
by
broadcast
or
multicast
and
then
other
knows
will
listen.
F
This
information,
such
as
d,
will
listen
to
the
information
and
wait
for
the
confirm
and
I
received.
This
can
receive.
Did
the
this
information
ends
and
to
verify
whether
B
is
his
neighborhoods
and
then
he
confirmed
and
the
broadcast
to
other
other
nodes
that
I
confirmed
a
my
neighborhood
is
is
PB
and
after
this
is
PT
will
receive
both
of
these
two
information
and
we'll
verify
the
transaction
and
record
information
in
its
local
nature,
and
then
the
design
part
is
synchronized,
the
neighbor
relationship
information
to
all
the
voters
in
this.
F
Yes,
so
finally,
there
will
be
a
s
neighbor,
who's
least
in
each
fabric.
Note
a
star
in
the
laser.
This
is
the
as
is
used
to
the
heirs
possible
vacation
and
then
to
how
to
verify
the
leak
protection,
so
ETS
will
register
their
business
relationship
with
their
neighbor
into
the
later,
and
the
business
relationship
will
be
mistake
will
be
a
satisfied
certified
by
the
payer
of
a
s.
So
here's
a
let's
see
the
example
directly
so
SP
be
published,
is
bitterness.
F
Relationship
with
is
PA
as
provider
to
customer
and
other
nodes,
such
as
C
and
D.
We'll
listen
to
this
information
and
then
is
PA
confirmed
that
it
confirmed
that
yes,
I
am
is
VP
our
relationship
this
with
the
relationship
this
customer
to
provider.
So
D
can
verify
the
transaction
and
record
this
information
in
the
ledger.
That
means
s
1
and
s.
2.
F
F
We
can
get
a
very
good,
stable,
PGP,
environment
Internet,
so
the
testbed
is
based
on
the
headlight
fabric,
our
initial
participants,
including
China
Mobile,
China,
Telecom,
Telefonica,
Xinhua,
universe,
debut,
PT,
colors,
University
of
Madrid
and
ourself.
We
will
expect
we
will
enlarge
this
team
in
the
future
and
state
1
1,
so
state
1.
We
will
set
up
two
ISPs
directly
connections.
We
will
simulate
multiple
fabric
note
in
each
IP
area
and
then
to
build
out
point-to-point
verification
functions
and
then,
after
that,
we
enlarge
our
team
to
the
cross
layer.
F
G
Putting
that
off
ledger
and
creating
like
the
Merkle
tree
and
just
putting
the
head
of
the
tree,
which
you
don't
want
to
populate
the
transaction
blocks
with
the
neighbor
ocean
formulation,
it's
gonna
grow
because
the
neighborhood
configuration
changes
over
time.
There's
one
comment.
Second
comment:
I
think
you.
F
I
I
Stop
next
month,
that's
not
okay,
so
and
when
we
see
here
behind
those
two
things
called
IP
ownership
and
ASM
ownership
for
assumably,
what
you
call
an
ISP
one
is
the
holder
of
some
public/private
key
pair
in
the
blockchain
yeah.
I
Why
do
you
own
one
dot,
one
dot
0/24
and
why
can't
I
say
I
am
how
do
you
uniquely
determine
who
has
the
authority
to
make
that
claim
into
the
ledger
and
how
our
conflicting
claims
resolved
same
thing
applies
to
ASM
ownership.
My
the
reason
why
these
questions
are
critical
is
that
every
other
part
of
what
you're
saying
is
a
mix
of
sob,
GP
and
SP
GP
and
has
about
20
years
of
history.
Now.
H
I
Literally,
nothing
about
any
of
the
rest
of
this
is
not
it's
not
it's
the
same
old
stuff
we've
always
had,
and
every
time
we've
come
to
this
part
of
the
problem
is
the
initial
injection
of
unique
authority
to
assert
control
over
an
ASN
or
IP.
So
I
have
the
same
question
here.
Is
we've
had
all
the
time
in
all
the
other
mergers.
J
F
F
Thank
you
very
continuous
Lee,
our
focus
our
projects.
So
in
my
salt,
this
is
some
some
of
the
a
chicken-egg
problems
such
as
we
start
from
Rio.
We
start
to
our
project.
We
start
our
orange
in
the
original
information
insurance
in
our
system.
So
we
have
three
potential
Meza
to
solve
your
your
question.
The
first
one
is,
we
use
an
absolutely
new
IP
assignment.
F
Because
the
chance
system
has
consensus
consensus
scheme
here,
then
you
have
the
order
of
each
try
sections.
The
first
one
will
be
accept
and
later
will
be
objects.
I
I
F
We
can
maybe
we
can
exchange
some
background
of
the
of
the
blockchain
system
that
we
have
the
relative
scheme
and
knowledge
to
hold
on
it
to
hold
this
form
to
host
this
problem
or
others,
and
otherwise
we
have.
Maybe
we
have
second
a
solution
for
that,
such
as
we
use
the
current
IP
and
DNS
assignment
rules
and
then
miniature.
The
information
from
the
current
network
use
the
stability
of
the
such
as
the
PDP
environment,
and
then
we
can
construct
our
origin
information
storage.
So
this
is
maybe
the
second
potential
solutions
for
that.
I
A
few
cities
yeah,
assuming
that
somebody
else
has
solved
the
really
hard
problems
which
are
the
heart
of
this
issue.
We
propose
the
following
theme:
that
assumes
a
solution
anyway
and
I'm
struggling
to
understand
the
novelty
at
that
particular
point
in
time,
because
the
really
difficult
issues
in
a
distributed
system
and
alleges
such
as
what
we
have
and
what
you're
proposing
the
really
fundamental
issues
are
where
you're
dispensing
going
I
just
assume
that
works
and
I
think
that's
the
heart
of
why
this
is
so
difficult
to
understand
as
be
a
self-contained
and
adequate
measure.
D
Because
I
mean
the
biggest
problem
is
attributing
IP
on
a
centipede.
Also,
everything
else
is
just
technical
details
so,
but
I
have
one
technical
detail.
I
want
to
ask
about.
You
said
on
one
slide
that
the
people
published
in
the
abduction
some
networks,
it
already
exists,
it's
called
Internet,
ultimately
systems.
We
all
know
that
it's
far
from
perfect.
So
how
do
using
an
ignorant.
D
H
D
We
observe
that
people
don't
do
it
properly.
That's
one
of
the
biggest
problem
is
BGP
sexuality.
So
then
don't
do
it
properly
for
many
many
reasons,
one
of
them
being
that
business
anyway.
How
do
you
solve
this
problem?
I
mean
what
makes
you
think
that
people
will
put
in
the
blockchain
what
the
don't
put
into
this
internet
routing
wedges.
Yes,.
F
One
wonder
what
the
one
player
want
to
want
to
draw
in
the
games.
They
do
you
evaluate
what
they
will
input,
what
you
output,
what
benefit
they
can
get
from
the
system,
so
someone
if
they
do
not
want
to
input
some
information
into
the
laser
into
the
decentralized
system
that
they
cannot
get
a
benefit.
That's
okay,
no
problem,
but
even
though
you
want
to
are
once
you
want
to
input
some
business
relationship
into
this
system,
you
can
get
a
related
benefit
from
this
system,
so
forest.
That's
your
choice!
F
I
So
kind
of
agreeing
and
disagreeing
with
this
I
think
there
was
a
kernel
of
truth
here
and
a
lot
of
unnecessary
plot.
So
the
answer
to
the
question
that
was
asked
by
the
person
you
know
well
the
last
two.
The
answer
to
that
question
is:
who
is
the
source
of
authority?
The
last
two
people
at
the
mics,
the
Knicks
are
the
source
of
authority.
I
You
cannot
be
centralized
a
registry
based
system
unless
there's
a
political
decision
that
we're
going
to
decentralize
it,
and
the
political
decision
is
that
they
want
to
absolutely
maintain
control,
and
that
comes
all
the
way
down
from
ICANN
and
I
sock
on
whatever,
and
so
what
you
will
need
to
run.
It
is
that
those
two
gentlemen
would
have
to
decide
to
run
the
the
chain,
and
once
you
decide
that
you
don't
want
any
of
the
blockchain
stuff
kidney
go
in,
the
garbage
can
yeah
a
smart
contract
that
they're
not
needed.
H
I
Was
the
wrong
technology
basis?
What
should
have
happened
was
that
the
NIC
should
have
simply
provided
a
harvest
on
that
attack
log
with
a
Merkle
tree
and
assigned
it
every
few
hours
and
what
every
one
of
the
allocations
that
they
have
made
into
that
chain,
and
then
anybody
could
pull
a
net
a
station
from
that
single
source
of
authority
and
get
approved
for
any
allocation,
and
that
would
be
a
much
more
compact
and
sensible
approach
than
the
one
that
was
foisted
upon
us
because
the
NSA
likes
x.509.
I
So
that's
the
kernel
of
truth
here,
but
it's
not
D
centralizing
anything.
It
is
in
fact
centralizing.
The
existing
system
even
more
just
moving
a
more
appropriate
technology
and
Bitcoin,
is
based
on
that
technology.
But
it
is
not
that
technology
and
anything
that
involves
smart
contracts
is
not
appropriate
for
this
problem.
L
H
F
Of
our
system,
so
in
this
case,
is
the
consensus
here:
it's
not
very
complex,
just
what,
if
I,
whether
you
have
you
have
the
legal
identity
or
whether
you
have
the
right
to
control
the
traffic's
to
to
publish
the
the
relative
information
here.
So
what
we
need
to
do,
the
the
complex
consensus
algorithm
may
be
used
to
other
other
part
of
this.
M
I'm
not
gonna
straight
the
other.
You
clarify
us
all
points.
I
heard
this
term
like
centralize,
the
name
and
location
I,
think
maybe
we
should
discuss
whether
to
centralize
the
name
allocation,
the
actuaries
working
on
hierarchical
namespace,
for
example.
Oh
yeah
I
forgot
my
name
Alicia
John
from
UCLA
you
shall
we
had
the
older
freedom
doing
our
own
limitation
because
of
us
a
hierarchical
system.
Oh
that
I
guess
powered
it's
and
only
pays
the
fees,
so
I
wouldn't
count
as
a
centralized
naming
system
because
in
the
lower
part,
is
completely
distributed.
M
So
I
think
this
conceptual
distinction
may
be
important
to
keep
in
mind
and
I
hope
to
stay
and
I
think
a
judgment
a
little
hard
on
you,
but
but
he's
correct.
That
is
four
addresses
that
namespaces.
You
cannot
use
this
whole
team
this
listener.
You
know
what
do
you
have
damage?
You
feel
the
lighter,
so
I
choice
the
same
problem
that
I
spirity
stuff
to
new
unified
tribe,
but
you
don't
solve
their
power.
N
Edina
lispers
that
net,
so
the
comments
Jeff
we're
making
about
allocation
of
prefixes
is
because
the
I
think
the
way
you
proposed
it
was
I
want
to
take
this
slash,
tweet
or
prefix,
and
if
I'm,
the
first
one
in
front
of
the
line,
I
get
it
no,
not
actually
enough.
Not
actually
I
had
not
lying
to
you
if
I
say
I'm
Dino
and
my
private
key
sides,
a
transaction
that
says
I
want
to
slash
24.
You
told
him
that
you
will
give
him
that
right.
F
Not
actually
so
about
the
IP
address,
IP
perfect,
an
IP
address
allocation.
The
work
is
included
in
our
last
year's
presentation
and
we
may
check
it
later.
So
we
have
a
different
method
to
solve
this
property
solve
the
problem,
one
for
the
a
build
up,
a
new
system
and
the
other
one
is
to.
We
can
use
the
current
scheme
to
keep
control
of
the
unique.
N
F
N
You
don't
need
smart
contracts,
because
it's
no
different
than
buying
something
if
I
a
keyholder
and
I
have
a
balance
and
I
want
to
debit
coins
or
tokens
whatever,
for
my
account
to
buy
something
and
you're
the
owner
of
something
because
you've
been
authorized
to
be
the
owner
in
this
transaction
takes
place.
A
ledger
is
useful
to
know
that
right
has
allocated
via
slash,
24
and
right
has
the
authority
to
be
able
to
do
okay.
H
N
The
fact
this
is
no
different
than
a
token
offering
you
can
have
a
token
reserve
and
you
allocate
tokens
basically
to
owners.
Just
like
prefixes
are
allocated
to
read
things
and
when
I
want
to
go
ahead
and
get
us
last
one
for
I
pay,
money
to
ripe
and
that
transaction
is
recorded
on
the
ledger.
That's
how
it
could
work
as
I
think
a
smart
contract
is
just
complicating
the
situation.
This
is
no
different
than
like
a
token
offering.
I
Hi
George
Michaelson
from
a
pending,
you
did
present
last
year
on
a
model
of
address
distribution
and
hierarchy
using
the
chain
and
at
the
time
we
critiqued
fundamental
behaviors
of
that
contract.
We
critiqued
it
with
things
that
I
do
not
believe
you
can
resolve.
In
particular,
if
I
have
an
assertion
in
a
contract
on
the
chain
that
I
have
a
prefix,
a
large
encompassing
prefix,
validly
and
I
lose
my
key.
I
Then
you
must
assert
the
etherium
logic
of
magic
rights
and
to
reassert
the
lock
bank
into
the
chain,
which
in
effect
means
you
cannot
trust
the
innate
properties
of
the
chain.
You
must
bless
somebody
to
fix
the
chain.
Who
do
you
bless?
So
this
is
not
proven
unique
to
the
IP
address
mapping
in
the
chain.
This
problem
exists
in
any
FinTech
model
using
block
chains.
I
I
The
magic
reset
key
you
do
not
actually
have
distribution.
That
was
the
fundamental
of
our
critique.
I
would
also
like
to
say,
I
agree
with
the
previous
marriage.
Public
ledger
crypto
backed
an
unrepeatable
public
ledger
is
fundamentally
what
is
needed
to
be
the
visible
state
of
a
system.
If
you
want
some
degree
of
assurance
of
responsibility,
the
blockchain
is
not
the
value
proposition.
The
public
ledger
is
the
value
proposition.
I
F
O
Don't
even
you
say,
UPC
personal
thick,
so
it's
like
sorry
coming
sounded
promising
keys.
There
are
mechanisms
to
tackle
it.
So
it's
not
that
it
is
your
priority
here.
Also
Tocqueville
says
you
can't
a
lot
of
static
and
put
some
special
logic,
the
blockchain
to
record
blocks.
So
it's
not
say
yes
or
no
questions.
I
think
it
needs
further
await.
O
You
know
it's
a
pro
Americans
have
now
when
you,
and
also
regarding
how
you,
how
your
sign
the
property
I'm
going
to
point
out
that
if
you
do
a
private-public
deployment,
I
agree
that
you
need
some
registry
or
some
public
key,
that
it
has
all
that
as
a
space
panel
located.
But
if
you
want
to
do
a
private
deployment,
you
could
have
like
a
authority
that
has
all
the
addresses
and
all
the
parties
agree
that
each
donor
cd25
a
deployment.
One
cares
we.
G
F
H
F
Ya
feel
it
depends
on
the
function
of
day
as
the
contract.
Yes,
so
just
one
one
sentence
to
say
to
say,
since
thank
you
for
all
the
comments
argues
questions
for
for
the
presentation,
sauce,
so
I
believe
that
we
should
open
our
mind
open
our
attitude
for
this
new
potential
technology
to
see
whether
they
can
bring
us
benefit,
or
we
can
bring
us
new
potential
opportunities
to
build
up
new
functions
and
bring
more
benefit
income
for
our
current.
Never
thank
you.
Thank
you.
Doctor
yeah.
B
M
P
M
M
M
The
pony
decide
whether
blockchain
is
a
road
towards
decentralization.
That's.
My
first
point
I'd
like
to
discuss
with
you
guys,
someone
sides.
Is
it
go
now
I'll
take
this
one:
okay,
you
know
more
taken
shoulders,
so
people
say
that
the
blockchain
is
I
wrote
two
other
centralization,
because
it
has
no
obvious
central
controllers.
This
old
cart,
only
four
people
old
enough
you
saw
this
is
so
Millie
er
that
not
only
that
blockchain
has
no
central
controllers,
it
didn't
even
have
identities,
it
just
likes
the
cartoon
size
on
the
internet.
Nobody
knows
you
are
doc.
M
Okay
for
that
matter,
so
on
the
software,
we
trust,
but
does
this
vlog
change
them,
especially
represented
by
the
Bitcoin
approach,
can't
beat
us
to
decentralization?
My
personal
view
is
that
they
cannot,
because
it's
a
mama
city
actually
is
a
killer.
The
only
way
you
can
get
it
the
the
system
is
about.
This
show
your
muscle,
you
know
proof
of
work
who
can
do
the
most
amount
of
a
proof
of
work.
Whoever
has
the
most
the
resources.
M
There's
lots
of
academic
publications
that
did
the
measurement
is
showing
that,
where
are
the
major
players,
a
big
players
on
the
Bitcoin
I
think
that
the
number
is
something
like
a
75%
or
so
Oh
located
in
China,
because
there
are
people
who
gave
me
this
technology
this
before
the
Chinese
government.
It
is
something
against
it:
giving
the
technology
to
make
the
profit.
M
But
there
is
a
different
approaches
to
this
proudly
defined
the
blockchain
interaction.
Let's
distribute
the
lecture.
I
think
someone
mentioned
I
so
let's
can
be
represented
by
this.
A
specific
example
called
a
hyper
ledger.
I
give
you
the
pointer
there,
how
is
hyper
writer
different
from
Provo
work
Fluxion?
First
of
all,
we
can
see
that
hypervisor
is
doing
something
important
relevance
like
a
case
study
and
the
change
of
healthcare
stuff.
M
I
think
the
later
there
is
the
financial
discussions
or
something
that
believed
us
I
haven't
heard
that
yet,
but
a
Mac
McCarty
is
that
it
goes
on
the
same
direction.
What
is
that
the
same
direction?
Here's
a
statement.
It
says
that
we're
happy
light
rail
fabric
bricks
from
some
other
blockchain
systems-
is
that
a
to
the
private
and
the
permission,
rather
than
open
permission
rather
than
open
permission
is
a
system
that
allow
unknown
entities
to
participate
in
the
network.
Therefore,
you
require
protocols
like
for
offer
work
to
validate
in
transactions.
M
M
Now
we
may
have
a
question:
wouldn't
this
my
fee
become
the
new
central
controller.
I
must
admit
that
I
only
learned
about
HEPA
lighter
like
three
weeks
ago
and
I've,
been
mostly
on
the
road
so
having
it
dived
into
the
literature
to
see
exactly
the
how
it
works,
but
I
cannot
cut
a
rough
idea.
I
cannot
talk.
M
Give
you
specifics
of
how
Elisha
I
want
to
show
you
another
example
which
is
I,
think
we
evolved
or
something
along
the
same
interaction
like
a
hypervisor,
but
before
we
knew
it
so
call
me
ignorant,
there's
so
much
stuff
going
on
under
the
song.
Sometimes
I
feel
justified,
not
knowing
everything
but
I'm
trying
to
catch
up
this
other
example.
Actually,
the
something
we've
been
working
on
for
the
last
couple
of
years,
there's
a
very
drafty
draft
hanging
on
the
archive.
M
Don't
kill
me
if
that
son
said
something
wrong,
because
still
it's
just
a
work
in
progress,
but
I
found,
oh
sure,
the
logistic
after
the
basic
idea.
So
so
it's
a
theologia.
It's
really
kind
of
a
tool.
It's
really
to
shoot.
The
lighter
better,
facilitate
the
security
solution.
Be
one
moment
myself
is
not
security,
it
doesn't
come
to
use,
provide
security
per
se,
but
it's
a
very
effective
in
a
powerful
tool.
M
So
essentially
it's
immutable
distributed
ledger
that
requires
all
the
entities
in
the
system
lock
everything
we
do
into
the
lighter
and
the
through
some
clever
recording
entry
scheme.
We
call
the
interlock
to
make
the
whole
system
to
be
totally
in
immutable.
No
single
party,
including
like
this
eternity
management
provider,
can
make
changes
to
the
system
without
being
publicly
locked
into
the
system.
So
just
like
all
the
other
members
that
I
need
a
manager
in
the
later
our
design
master
and
always
actions
prove
our
new
members
issuing
of
a
certificate,
a
real
vocational
certificate.
M
Everything
you
lock
into
this
immutable.
Ledger
mistakes,
cracker
actions,
everything
crashes
failures.
So
what
good
does
it
do
this
actually
based
on
some
very
old
idea?
We
had
the
published.
You
can
see
that
the
modern
tank
is
ago
in
that
short
paper
called
securities
through
publicity.
Again,
don't
kill
me
if
that
paper
said
something
wrong,
because
you
have
to
to
focus
for
mistakes,
because
that's
old,
but
nevertheless,
I
think
the
guys
some
basic
ideas
right.
M
It
decides
that
the
key
principle
behind
this
design
we
call
the
PS
ki
I,
don't
even
remember
what
PS
care
stand
for
is.
The
PS
is
definitely
public.
Space
may
be
knowledge
infrastructure,
because
this
statement
is
that
every
action
should
be
made
in
a
public
space.
This
public
space
concept-
you
know
we're
part
from
others-
derives
from
a
similar
principle
to
those
in
other
areas
of
public
knowledge.
M
Acting
in
public
does
not
guarantee
that
the
actions
is
correct,
but
it
does
provide
users
with
a
quantifiable
set
of
information.
What
has
happened?
Who
has
done
what
the
information
semantics
of
the
enables
applications
to
construct
their
meaningful
actions,
decisions
based
on
laws,
whatever
things
happened?
I
think
this
really
echoes
back
for
some
comment.
I
heard
earlier
that
the
most
actually
one
most
useful
tools
is
this
distribute
ledger
immutable
distributed
available
everywhere,
and
this
tool
will
help
us
build
the
future
secure
systems.
M
Alta
also
said
mention
that
this
identity
management
is
important.
You
cannot
just
you
know,
push
off
that
idea
to
say
whoever
grabbed
the
identity
first
will
will
be
the
ownership.
That's
not
the
solution
to
the
problem,
the
so-called
thing,
as
as
a
centralized,
the
name
allocation
system,
I
think,
as
my
personal
opinion,
as
to
incorrect
statement,
I
think
the
unique
namespace
is
critical
for
healthy
internet
and
and
that's
what
the
icons
Tod
allocation
is
about.
M
It's
not
centralized
and
naming
name
allocation
system,
because
the
beyond
the
TLD,
every
single
party
has
their
freedom
to
to
their
own
name
allocation.
This
hierarchy
is
needed
just
to
assure
the
name,
space
uniqueness
and
also
I'll,
make
another
point:
that
is
the
namespace
identity,
aids
and
should
be
decoupled
from
your
trusted
relations.
It
doesn't
mean
that
there
is
a
TS
name
as
a
charge.
Worthy
party
and
light
must
be
separate
loud.
You
can
share
with
someone
under
the
same
hierarchy.
It
doesn't
necessarily
mean
you
trust
it.
M
How
many
names
under
that
that
come
now
I
think
it's
three
years
back
I
ask
to
someone
that
this
I
died,
that
there's
like
300
million
and
I,
don't
know
what's
the
number
now,
how
can
you
trust
anyone
under
the
same
domain?
It's
a
trattoria
nod,
but
I
definitely
give
you
the
unique
identity.
There's
one
person,
one
entity
that
owns
that
name
so
now,
I
want
to
run
animation
to
disclose
one
man
at
the
time
what
I
really
mean
by
granda.
M
It's
really
need
to
be
from
grant
app.
Look
at
today's
distributed
ledger
systems
they
are
built
on
top
of
existing
tcp/ip
protocol
stack
in
will
know
that
IV
had
the
published.
This
internet
draft
under
considerations
on
internet
consolidation
has
mostly
talk
about
the
consolidations
of
power
at
the
state
on
top
about
the
services
applications
and
my
conjecture,
that's
why
I
say
I'm
making
outrageous
opinions.
M
My
conjecture
is
that
the
consolidation
of
the
top
in
a
V
EE
leads
to
the
consolidation
of
the
supporting
substrate
beneath
those,
let's
the
inevitable,
because
its
nature,
it's
a
market,
economical
drive.
It's
only
when
the
underlying
substrate
got
a
more
kind
of
consistent
with
the
upper
there's,
a
moral
profit
to
be
made.
If
you
want
to
me,
give
me
your
proofs,
evidences
I
want
to
come
back
with
the
well
prepared
talking
exam.
M
So
therefore,
if
you
really
want
to
build
this
distributed
ledger
as
a
useful
tool
towards
a
decentralization,
you
need
to
build
this
lighter
and
pop
alpha
decentralize.
The
system
decentralize.
The
network
protocol,
and
now
here
I,
give
you
this
one
example.
So
I'd
be
larger.
It's
a
built
to
run
on
top
of
our
name.
The
data
networking
I
bet,
not
many
people
have
heard
this
a
password
in
the
end,
so
here's
a
pointer,
you
can
take
a
look.
M
M
We
we
have
matured
the
concept,
we
have
the
build,
a
prototype
running
system
and
I
think
we
now
know
how
to
load
out
now
in
the
last
of
the
invitation.
So
what
we're
on
is
a
new
Andean
community
meeting
and
that
thanks
to
an
East,
they
will
be
hosting
this
year's
meeting
not
too
far
from
now
in
Washington
DC.
So
whoever
interested
take
a
look
at
our
back
of
our
flyers
on
the
ITF
registration
desk.
Thank
you
very
much.
I
I
At
D
centralizing
accountability,
because
if
you
have
an
authority
that
you
give
a
task
and
they
put
the
information
into
the
log,
then
everybody
can
audit
them,
which
is,
of
course
the
heart
of
trans.
So
if
we
stop
thinking
about
security
purely
in
terms
of
access
control
and
instead
broaden
our
view
to
accountability,
a
lot
of
this
makes
a
lot
more
sense.
But
I
don't
see
a
lot
of
this.
Let's.
M
E
To
again
think
about
this
talk
and
the
previous
talk
together,
sorry
Jonathan,
rowing
club
that
wouldn't
the
sort
of
block
chains
that
canonical
way
of
doing
this,
be
if
I
want.
You
know,
slash
zero
of
or
like
if
I
want,
the
entire
internet
and
I
just
have
to
get
more
than
half
the
people
to
agree
with
me,
and
so
it
you
can
have
it.
You
don't
have
to
bless
anyone
per
se.
You
can
just
say
as
long
as
half
of
people
agree
that
I
own
this
address
I
own.
It.
Q
Or
I
answer
that
one
with
respect
to
what
Lisa
just
said
very
shortly,
you
know
no,
because
we
have
two
models:
proof
of
ways
for
work
and
identity.
What
Lisa
was
just
talking
about
was
identity
in
order
to
get
into
the
ledger.
What
you're
saying
is,
if
you
need
over
half
of
something
that
would
be
proof
of
waste,
they're,
very
different
ways
of
using
the
same
structure.
E
H
M
Okay,
thank
you.
This
thank
you
for
pinch
and
have
a
see,
but
that
won't
come
criticisms
afterwards.
It
should
me
my
emails.
Okay,.
B
A
No,
but
we
can
take
that
to
the
mailing
list
in
the
interest
of
giving
to
the
its
Ageha
his
time
so.
E
S
S
S
So
traveler
to
the
meeting
this
was
happened
initiated
by
the
quest
from
Japanese
Japanese
government
that
fSV
Financial
Stability
Board,
you
may
like
heard
of
it
from
the
news,
is
a
published
report
on
a
July
6
2009
team.
That
is
just
before
the
g20
of
coke
a
meeting.
The
document
is
initiated
from
the
request
form
of
Japanese
people
and
what
the
document
says
is
was
it
is
important
to
have
a
dialogue
between
the
financial
regulators
and
technology,
tech
communities,
stakeholders,
including
the
tech
communities.
S
So
this
exact
statement
appears
in
the
report
and
it
appeared
just
before
the
g20
of
Coca
meeting.
So
we
were
working
on
to
have
a
workshop
called
the
high-level
seminar
financial
innovation
out
of
during
the
Crocker
meeting.
Then,
at
a
meeting,
the
attendees
of
the
g20
meeting
come
to
the
session
under
listen
to
the
dis
panel.
What
these
panels
discusses.
So
the
picture
is
that
it
is
small,
so
you'd
well
I'm,
not
sure
whether
you
can
see
you
not,
but
it's
a
it.
S
This
session
is
a
model
a
with
the
data
to
by
Jim
were
Professor
Joe
Mariah
by
the
project
to
carry
diversity
and
also
with
Professor
Matt,
so
from
Georgetown
University's
on
the
board
on
the
punished
and
also
I
want
to
mention
that
dr.
Adam
back,
who
is
a
very
famous
cyberpunk,
is
also
on
the
board
on
the
on
the
on
the
meeting
to
talk
under
these
specific
topics,
so
the
finest
of
Governors
of
the
other
guys
listen
to
the
these
Christ's
heart.
So
this
meeting
itself
is
a
multi-stakeholder
simulation
or
talk
among
the
stakeholders.
S
So
finally,
each
of
these
meeting
is
each
publisher
communicate
under
in
this
communicate.
We
can
see
the
de
Sade's
para
that
the
mentioning
that
we
will
come
to
efface,
which
directly
or
whatever
so
so
it
is
minced
in
cities
differenced
to
the
document
deficit.
We
just
published
and
saying
it
is
important
and
I
think
this
is
a
way
the
communique
load,
but
we
welcome
means
that
we
are
listening
to
so
this.
S
They
are
sure
they
understand
that
this
topic
is
very
product
and
I
want
to
mention
that
if
you
click
the
link,
I
ask
to
the
core
artificial,
with
this
meeting
that
at
the
leading
there
are
several
opening
remarks
and
Walmsley
mark
is
spoken
by
that
Toshi,
the
endo.
That
is
a
commissioner
of
the
gfs
a,
and
he
mentioned
that
without
about
the
IETF.
S
That
is
unusual,
but
they
understand
that
IETF
is
important
role
in
the
Internet.
They
cannot
deployment
and
internet
second
technology
development,
so
they
think
that
it.
They
think
that
it
is
important
to
have
similar
people
working
together
with
them
to
make
possibly
the
standardization
I
don't
know,
but
to
add,
to
have
a
better
multi
district
with
the
discussion
forums.
S
So
take
committee
in
trouser
that
now,
the
greatest
in
the
g20
country
share
the
idea
that
it
is
crucial
to
harbor
such
a
dialogue
among
the
stakeholders,
including
the
committee's
so,
and
also
for
the
legatus
point
of
view.
The
most
critical
part
critical
issues
are
consumer
protection
and
the
prevention
of
the
usual
technology
for
criminal
activities,
including
them
money
handling,
but
also
he
they
understand
that
say
blocking
innovation
is
a
bad
idea.
S
Working
the
innovation
by
allegation
is
about
area
in
this
context,
so
they
want
to
promote,
but
at
least
they
want
to
prevent
these
to
each
part
that
they
want
to
discuss
with
these
two
issues,
even
in
a
minor
so
I'm
going
to
the
Q&A,
but
the
far
from
first.
Let
me
quickly
leave
you
some
numbers,
a
comment:
I
crumbs,
a
baby
email
so.
S
Several
people
mentioned
in
the
DNA
are
three
Mariners.
The
Internet
has
a
crucial
role
to
establish
the
atps
technology
that
is
given
right.
So,
of
course,
it
is
right
under
dat,
relying
on
some
ability
of
documents.
Of
course,
Anna
I
know
there
are
tons
of
problem
directed
to
the
use
of
the
bat
ciphers,
which
is
not
well
understood
and
they're,
the
guys
who
is
creating
a
new
ciphers,
but
as
we
know
that
we
are
very
carefully
pick
ciphers
to
to
be
deployed
and
the
control
controlling
that
from
the
IDF's
document.
S
So
that's
a
good
idea,
so
no
they
are
relying
on
such
kind
of
document.
I
want
to
also
mention
about
some
of
the
discussion
by
negationism
over
there
on
generic
security
consideration
for
the
crypt
asset
coastal.
Yes,
that
kind
of
document
might
be
useful,
but
I'm
personally
think
this
document
fits
to
the
IETF
community
or
not
I'm
wondering
whether
it
is
okay
or
not.
So
we
need
to
find
out
that
the
light
we
need
to
discuss
this
also
this
sort
of
a
technique.
Of
course.
Of
course
a
courier
is.
S
S
S
Standardization
of
DRT
will
interfere
with
your
DLT,
so
I
honestly
think
it
is
too
early
on
the
way
we
do.
We
can't
do
that
in
the
future,
but
at
this
moment
it
is
too
early,
so
I'm
not
into
this.
Yet
still,
we
need
to
find
out
a
good
architecture
for
deity.
I,
don't
know,
but
we
needed
it
before.
We
start
working
on
data
standardization
and,
of
course,
there's
no
defector
standards
yet
so
we
do
care
about
finance
a
lot.
S
So
the
entity
relationship
to
finance
internals
technology
is
important,
since
deity
depends
on
the
Internet
as
we
discussed,
but
any
application
depends
on
internet
type
so
why
he
did
not
and
the
possible
engine
in
the
certain
context,
it
might
be
more
more
important
and
I
may
skip
some
of
the
slides
but
anyway.
So
someone
was
a
quick
discussion
in
our
mind.
S
Is
that
somebody
mentioned
about
whether
we
can
discuss
I
used
I
is
over
iqt
UI
TFW
sushi
I
have
no
idea,
of
course,
these
communities
each
of
this
committee
has
on
go
and
the
different
stake.
So
it
is
not
simple
answer
but,
like
the
document
I
mentioned
and
created
by
the
cocoon
is
that
it
doesn't
fit
any
of
them
right
but
important.
So
we
may
need
to
have
a
new
place
or
we
can
fit
try
to
fit
in
some
of
the
community.
S
I
don't
know,
but
at
least
we
need
to
find
out
what
kind
of
document
we
need
to
be
standardized
and
aware
to
have
her
to
do
that.
Activities
and
some
of
the
mentions
about
a
IP
is
a
DML.
The
prevent
proposal.
Thank
were
bitter
comment
self.
As
a
VIP
and
as
a
each
of
the
software
process
of
the
development
community
has
adopted
their
own
way
to
control
system
and
for
that
standardization,
but
that
we
process
we
need
something
but
I'm
not
sure
under.
We
need
to
discuss
and
we
want
to
listen
to.
S
Decorators
want
to
talk
to
somebody
in
a
tech
committee
who
want
to
talk
to
such
kind
of
people.
It's
a
question
and
we
need
to
find
out
a
way
to
do
that,
and
this
potentially
affect
some
of
the
work
we
are
doing
here.
I
think
somebody,
many
people
may
not
think
this
is
not
like
a
flock.
We
did
not
have
relationship
with
that
is
worked,
work,
I
think
it
does
might
be
true,
but
it
has
a
potential
that
we
need
to
be
influenced
by
these
kind
of
activities
so
studying
earlier
there.
S
L
H
My
personal
capacity,
it's
just
a
clarifying
question.
What
I
didn't
understand
fully
I
heard
from
you
that
the
g20
finance
people
are
interested
in
speaking
to
tech
community,
particularly
the
standards
community.
But,
what's
not
clear
to
me
is
what
kind
of
conversation
do
they
want
to
have?
What
are
they
interested
in
understanding?
What
help
do
they
need
purpose
if
you
qualify
that
it
morpholino
be
helpful
things
a.
S
Lot
of
things,
this
is
very,
very
specific:
I
think
that
they
want
to
find
out
how
they
can
prevent
money
laundering,
and
that
is
very
related
to
the
how
the
identity
is
managed.
Of
course,
Caesar.
If
you
want
to
prevent
that,
you
need
to
do
a
Qureshi
to
buy
bounds
or
Leo
physical
person
towards
us
some
rigt
in
the
cyberspace.
G
So
both
the
g20
people
and
at
ATF
this
is
the
they
are.
The
number
one
concern
is
anti
monthly
and
AML
kyc.
An
anti
terrorist
financing
raises,
and
so
IBM
has
a
whole
to
set
of
stuff
could
give
out
for
the
past
thirty
something
years
x.509
starts
could
use
it
for
that.
I
was
looking
at
the
discrete
pieces.
Now
the
crypto
assets
draft
terminology,
very
good
suggestion-
would
be
to
alignment
to
the
terminology
of
the
f80,
a
that
they
call.
You
know
custodian
providers
as
vast
virtual
asset
service
providers
and
have
a
model
there
already.
G
N
I
I
Because
I'm
going
to
be
using
that
I
want
help
working
out
how
to
unpick
the
Ponzi
schemes
and
the
fraud
or
whatever
I've
been
thinking
about
that
a
lot.
There
are
many
points
of
vulnerability
in
that
ecosystem
and
that
ecosystem
is
pure
fraud.
I
must,
however,
what
really
concerns
been
concerning
me
is
that
at
heart
they
have
hijacked
of
really
cool
technology.
The
harvest
Aneta
hash
chain
that
was
invented
in
not
me
I
was
patented
in
1990
yeah,
and
that
is
something
that
can
be
and
should
be
applied.
I
I
would
like
to
see
infrastructure
that
allows
actually
applied
to
projects
that
isn't
contaminated
by
all
the
frauds
and
all
the
waste
I've
been
doing
some
work
in
that
vein,
afters
I
need
some
facilities
like
that
on
the
mesh,
but
I
think
that
we
need
to
detach
and
Libra
might
well
need
part
of
that
detachment
because
had
Bitcoin
collapsed
six
months
ago.
People
might
work
and
said:
well,
that's
because
the.
F
F
I
Q
Paul
Hoffman
I'm,
going
back
to
your
previous
slide
about
where's
Tavis
I
mean
because
I
think
that
that
was
your
big
question.
Your
list
is
very
short
there
at
the
top
and
I
proposed.
Given
what
you
said
earlier
and
also
the
answer
to
the
first
question
from
I
saw
I.
Think
really,
where
you
want
to
go,
is
to
two
places
that
specialize
in
identity-
and
you
know
Thomas
correctly
pointed
out
that
we
we
do
some
identity
here
or
we
did
it
20
years
sort
of
finished
it,
but
that's
just
work.
That's
not
describing
identity.
Q
That
doesn't
say
how
you
tell
that
this
person
is
not
this
person
on
that
or
or
that
this
private
key
is
not
assisting
this
person.
There
are
plenty
of
really
good
mature
identity
communities
out
there,
some
of
whom
are
finance
related.
Many
of
them
who
are
not
but
wouldn't
mind,
being
I,
would
imagine
and
I
think
those
would
be
the
best
communities
for
you
to
start
with.
The
technologies
are
well
known.
You
know,
it's
really
just
said
we're
actually
working
on
something
that
is
closed.
Happens.
You
know
it's
that
old,
it's
not!
Q
You
don't
have
a
technology
problem,
you
have
an
identification
problem
and
there
are
plenty
of
groups
out
there
that
really
are
trying
hard
to
deal
with
individual
identities.
Different
groups
are
trying
to
deal
with
corporate
identities.
That
is,
is
this
company
the
same
as
that
company
and
is
somebody
who
says
that
they
work
for
this
company
actually
working
for
that
company?
We
were
dealing
with
that
in
the
United
States
at
least
right
now.
What
does
the
word
Huawei?
Q
Q
S
Thank
you
very
much.
Yes,
actually
zest
and
a
job
other
things
so
really
undercooked,
but
so
it's
bringing
here
destroyed
is
too
early,
but
I
think
it's
a
suggestion
that
identity
committee
is
a
great
idea.
I
want
to
think
about
that.
Yet,
of
course
that
was
a
list
that
seems
to
be
Betty
Botta.
To
start
with
that.
So
thank
you
very
much
for
the
comment.
N
I,
don't
know
if
you
just
want
the
standardization
effort
to
be
focused
solely
on
FinTech,
but
if
you
consider
leashes
ground
up
approach,
I
I
think
you
should
consider
it.
So
we
have
a
holistic
design
from
the
network
layer
all
the
way
up
to
the
application.
I
don't
know
if
that's
boiling
the
ocean,
but
at
least
it's
a
good
place
to
start
before
the
organization's
get
together.
Thinking
at
those
levels,
yeah.
S
S
Okay,
so,
if
you
have
interest,
please
I
will
try
to
I'm
not
sure
whether
I'm
good
with
I'm
posting
some
information.
Only
the
DNA
DNA
RG.
Very
nice
is
good
at
not
good
a
lot,
so
I
probably
needed
create
a
list
of
people
who
has
interest
anyway.
So
if
you
have
interested
please
please
kindly,
let
me
know
you
I
have
in
my
nosy
my
email
address.
I
have
posted
a
message
on
the
DNA
already
exist,
so
you're
sure
that
my
may
be
made
a
decision.
So
please
contact
me.
J
H
J
A
When
Deshawn
fastly
seems
like
the
this
would
mailing
list,
discussion
is
highly
decentralized
in
a
little
chaotic
as
well.
There's
been
a
lot
of
interest
in
the
possibility
of
doing
something
at
the
IETF
related
to
decentralization
something
standard
you
waited,
and
so
we
can.
You
know,
certainly
kick
off
a
discussion
about
that
and
with
the
possibility
of
having
a
side
meeting
on
the
technology
itself
or
even
possibly
evolve
in
Singapore
or
in
in
March
in
Vancouver.