►
From YouTube: RATS Architecture Design Team, 2021-01-26
Description
RATS Architecture Design Team, 2021-01-26
A
So
do
you
think
it's
fine
for
me
to
ask
arya
to
submit
a
zero
zero
that
is
clean
and
then
is
zero
one,
because
that's
my
ocd
and
I
really
like
my
diffs
being
an
order
and
across
tracks.
A
A
Should
always
have
this
really
like
intentional
no
changes,
and
then
you
can
a
second
later
submit
is
zero.
One
that
addresses
comments.
B
You
address
comments
as
people
make
them
and
because
someone
says
I
won't,
don't
want
you
to
adopt
it
until
you
make
this
change.
A
B
No,
but
sometimes
people
want
to
adopt
want
to.
Sometimes
people
want
to.
You
know,
see
the
the
result
before
they'll
agree
to
adoption,
and
I
don't
know
how
I
feel
about
that.
So
I
I
feel
it
depends
a
lot
on
the
author.
I
think
that
that
I
think
that
the
zero
zero
should
be
exactly
identical
to
the
the
last
one
before
it
was
adopted.
B
A
Yeah,
I
see
your
point,
but
I'm
okay
with
this
an
somehow.
So
that's
fine,
I
think
so.
Another
people
are
joining
good
by
the
way
way
will
not
join
today
way
is
out
of
order.
He
I
think
he
has
the
same
thing.
I
got
a
sore
throat
and
really
has
to
die
down
a
bit.
A
B
Yeah
I
was
having
the
sore
throat
because
the
fairness
is
running
problem.
Okay,
we
got
lots
of
people
here,
I'm
going
to
share
a
window.
A
C
B
We
have
a
total
of
five
okay,
good
wonderful.
So
let's
talk
about
the
handles
first
and
specifically,
this
one,
I
think,
would
be
the
right
thing
to
do.
First,.
B
D
Sentence,
and
so
if
you
wanted
a
low
hanging,
fruit
well
knock
on
wood,
one
at
least
full
hanging
fruit
in
terms
of
the
number
of
text
we'll
see
if
number
of
comments,
but
that
one
is,
there
was
a
comments
in
the
appendix
stuff
where
we
said
gosh,
the
parenthesis
stuff
is
not
even
explained,
and
I
responded
to
hank
saying
yes,
I
agree,
we
should
add
an
explanation,
and
so
that's
what
this
one
sentence
is.
This
is
back
in
the
first
example.
B
D
It
wasn't
any
other
poor
request
that
I
said
yes,
I
agree
we
should
do
it,
so
I
just
went
ahead
and
did
a
sentence
there.
So
thanks.
Okay,
so
thank
you
all
right.
Let's
get
back.
D
D
B
C
D
F
B
D
A
Five
seven,
so
so
two
five
eight
did
you
just
accept
that
or
yeah
okay,
because
I
thought
we
were
looking
at
that,
but
maybe.
B
I
I
yeah,
I
thought
we
were
supposed
to
do
this
one
first,
because
okay,.
B
B
F
F
F
B
F
B
All
right
so
add
ie
for.
D
D
Fixed
an
error
in
my
wording,
and
so
the
notion
of
an
epic
counter
that
I
had
in
mind
is
where
your
handle
is
just
assigned
sequence
number,
and
so
what
happens?
As
I
mentioned
the
comment
here,
that's
just
the
placeholder,
not
in
the
green
text,
but
in
my
comment
to
where
yours
used
to
be
the
use
of
a
signed
sequence.
Counter
means,
if
you
ever
receive
a
handle
from
you
know.
Let's
say
a
verifier
sees
a
handle
in
evidence.
Okay
and.
A
D
B
F
A
B
Sorry
am
I
supposed
to
do
something
I
don't
know
my
phone
right.
D
C
D
So
thomas
is
adding
another
example
into
the
ore,
which
I
think
is
great,
which
is
the
buffering
incoming
messages.
You
wait
and
see
if
you're
gonna
get
a
handle
in
the
in
the
near
future.
So
and
you
have
some
maximum
buffering
time
after
which
you
got
to
give
up,
or
maybe
it's
until
you
get
another
one.
So
you
just
have
a
cache
of
one
that
you
don't
know
about
something
like
that.
So
then
you
don't
need
any
clock.
D
There's
nothing
in
a
handle
distributor
in
any
of
the
text.
Here
I
can
generate
three
different
handle
distribution.
Things
that
are
completely
independent
of
prop
delay.
Properly
could
be
a
month.
Everybody
gets
it
about
the
same
time.
The
thing
is
sitting
on
mars
or
sitting
on
jupiter
or
something
so
works
fine
yeah,
but
I
don't
care
what
it
was
you
only
the
difference
between
if
the
epic
changes
every
day,
but
it
takes
three
months
to
get
here
from
jupiter,
then
that's
fine
as
long
as
it
changes
every
day.
B
Yeah,
that's
right.
We
it's
it's
yeah
it
it
there's
cones
of
of
information
that
matters
yeah.
A
A
D
D
Of
seconds
or
minutes
and
you're
epic
is
on
the
order
of
you
know.
You
know
15
minutes
or
something
like
that,
then
you're,
fine,
so
so.
D
Approximately
I
think
that
was
what
the
old
text
said
and
I
used
the
word
periodically.
I
think
it
was
in
the
when
I
copied
it
up
into
here.
D
I
don't
know
that
it
has
to
be
the
same
length
every
time
as
long
as
it's
larger
than
the
prop
delay
between
the
tester
and
the
verifier,
the
prop
delay
between
the
verifier
and
the
relying
party.
I
don't
think
it
matters
whether
the
first
one
is
15
minutes.
The
next
one
is
30
minutes
the
next
one
is
two
hours
and
the
next
one
is
20
minutes.
D
B
D
Is
seeing
you
know
right
three
handles
because
okay.
B
Right
it
doesn't
it
doesn't
matter
if
the
handles
take
a
year
to
arrive
as
long
as
they
arrive
around
the
same
time
in
each
group,
because
handle
establishes
a
new
epoch
is
what
I
understand.
D
B
So
so,
but
but
let's
actually
talk
about
delays
like
you
know,
solar
system
type,
late,
delays
with
you
know,
minutes
to
hours
between
things
and
different
amounts.
Does
it
work?
If,
if
does
it
work,
if
one
node
is
many
propagation
delays
closer
to
the
trend,
the
handle
distributor
than
others.
D
I
think
what's
important
is
how
many
different,
if
you're
a
receiver,
not
not
a
receiver
of
the
handle,
but
a
receiver
of
you
know
evidence.
Let's
say
yes,.
A
D
Say
you're
a
verifier
and
you've
got
a
bunch
of
testers
scattered
around
okay.
The
question
is,
as
you
start
getting
in
evidence,
if
you
get
a
bunch,
if
you
get
like
three
pieces
of
evidence
back
to
back
all
from
different
testers
that
are
scattered
around
the
question,
is
how
many
different
epics
can
you
be
having
how
many
different
epic
candles
that
are
all
correct,
according
to
the
center
of
that
evidence,
and
you
receive
at
the
same
time.
D
Correct
and
so
the
higher
the
number
is,
the
more
ethics
you
have
to
remember
right.
So
do
I
need
to
remember
the
last
one,
the
last
two,
the
last
five,
the
last
ten,
and
so
that's
it's
not
a
clock.
It's
time
when
you
throw
them
out
it's.
I
need
to
remember
the
last
n
that
I've
gotten
from
the
handle
distributor
and
what's
that
and
how
many
of
those
do
I
have
to
save.
B
A
F
A
D
And
if
you're
holding
the
case
where
you
typically
expect
the
I
mean
a
typical
example
where
you're
not
dealing
with
solar
system
stuff
is
where
n
equals
two
right.
B
So
is
there
also
a
case
where
a
verifier
or,
I
guess,
a
relying
party
even
where,
for
some
reason,
they've
missed
a
handle
because
of
network
goof
and
they
now
receive
evidence
that
appears
to
have
a
handle
they've
never
heard
of
yeah
is
there
is
and-
and
so
should
a
protocol
actually
be
tolerant
of
that
in
the
sense
it
says,
could
you
re-transmit
it's.
D
B
D
His
example
was,
you
could
buffer
it.
My
example
was,
if
it
is
signed,
you
can
just
accept
it
as
if
you'd
gotten
it
from
that
one
another
and
the
other
one
in
that
list
was.
You
could
also
drop
it
and
say
sorry,
this
is
rejected,
and
then
you
got
to
try
again
right-
that's
probably
the
least
good
one,
but
it's
possible
saying
I
haven't
seen
this
one
yet
go
away
and
then
the
intestine
just
has
to
retry.
Well
how
about
now
you
got
it
now.
F
B
F
D
I
think
it
does
avoid
the
problem
thomas
and
that's
because
either
you
have
to
block
all
p
all
evidence
coming
in
into
the
verifier
except
attestation
just
always
fails,
and
then
you
don't
know
it
doesn't
matter
whether
it's
handles
or
nonces
or
clocks,
or
anything.
If
you're
going
to
be
able
to
block
all
the
evidence
coming
in
and
you
can
attestation
right
now.
If
you
say
I'm
going
to
let
the
evidence
in
and
you're
going
to
prevent
the
handle
distribution.
D
D
That's
where
I'm
saying
using
a
signed
counter
works
if
you're
only
dosing
it
at
the
verifier.
In
other
words,
if
the
tester
gets
the
right
handle
and
you're
allowing
the
evidence
through,
then
you
have
the
channel
that
goes
to
the
verifier.
It
just
happens
to
go
via
the
tester.
Now
that
what
you
can
do
is
your
point
is:
if
you
could
dos
the
handle
distributor
such
that
it
can't
get
handles
out
to
anybody,
whether
it's
a
testers.
A
D
C
D
Delay
it
for
everybody
collectively
yeah,
because
that
is
not
going
to
be
detectable
if
you
can
deliver
it
for
everybody.
So
if
you
can
block,
if
you
can
insert
a
huge
delay
at
the
handle
verifier
or
at
the
handle
verifiers
router
or
something
like
that,
then
then
it's
undetectable
right
by
people
who
don't
have
clocks.
B
Yeah
yeah,
that's
that
was
that
movie
entrapment
with
sean
connery
and
renee
zellweger
yeah.
Okay,
it's
all
it's
so
weird
as
we
go
along
and
invent
new
security.
D
Yeah-
and
this
is
the
part
that
the
other
one
needs
to
be
based
on,
which
is
just
that's
the
red
text
at
1423
on
down
that
I
use
as
the
source
for
creating
the
text
in
line
up
above
so
I
deleted
the
the
text
that
I
said
should
move
up
and
replaced
it
with
the
summary
sentence.
Intro
sentence
that
matches
the
intro
sentences
of
examples,
one
and
two.
F
D
A
I
like
this,
I
like
that
dave
first,
basically
reintroduce
the
timekeeping
sections.
I
I
thought
that
was
a
nice
cherry
on
top.
Thank
you.
D
Well,
in
particular
the
thing
that
so
when
I
was
explaining
this
to
people
in
azure,
this
was
you
know
months
ago,
shortly
after
you
and
I
actually
had
the
offline
meeting
hank
the
thing
that
they
liked
the
best
when
we
watched
the
different
examples
that
they
pointed
out,
and
so
I
added
that
in
the
text
here
is
that
that
that,
in
the
non's
case,
the
non-sender
has
to
keep
state
to
remember
that
knots.
D
F
D
D
D
B
D
D
Yeah
yeah,
I
think
it
was
256..
Wasn't
that
one,
the
one
that
I've
approved,
I
don't
remember.
D
D
D
A
The
criticism
is
this:
would
this
could
be
read
as,
and
I
can
create
evidence
about
myself
me
being
the
root
of
trust?
That's
not
possible.
D
A
D
A
D
I
think
that's
where
different
people
on
the
call
have
different
views
that
they
can
include
stuff
about
themselves.
You
just
can't
trust
it
without
something
else
attesting
it
like
an
endorser.
A
D
Include
it,
you
just
can't
trust
it
without
something
else
like
an
appraiser.
A
E
So
we've
said
in
the
past
that
we
didn't
want
to
embrace.
You
know
you
know,
statements
that
we
think
are
not.
You
know
not
correct
or
are
not
leading
in
the
right
direction.
I
think
this
is
in
the
context
of
policy.
E
It's
I
think
it's
I
think,
hank's
point
is
that
we
don't
want
to
give
the
impression
that
that
we
think
that
it's
the
right
approach
for
something
to
self-assert
a
claim,
but
that
needs
to
be
made
authoritatively
claims
have
to
be
asserted
authoritatively,
and
so,
while
mechanistically
it's
possible
we're
relying
on
if
we
say
that
that's
legitimate,
then
we're
relying
on
the
policy
of
the
verifier
to
to
distinguish
the
two.
D
A
A
D
D
A
D
A
D
D
D
About
each
layer,
that's
from,
but
the
about
word
if
the
root
of
truth
thing,
if
they
collect
claims
about
a
root
of
trust,
then
right
now
it's
only
talking
about
a
tester
is
collecting
claims,
and
so
the
only
thing
the
tester
that
can
collect
claims
about
the
rooster
frost
is
due
to
trust.
So
that's
that's.
E
E
B
I
guess
it's
also
might
be
worth
re
recognizing
that
this
is
an
architecture
and
it
is
an
in
for
more
information,
informational
document
that
does
not
have
bcp14
language.
So
the
only
case
case
I
see
if
someone
gets
this
wrong
is
you
could
come
along
and
try
to
bash
them
over
the
head
and
said
you
got
it
wrong
and
here's
the
sentence
and
they
may
argue
backwards
the
other
way,
but
ultimately
the
guy
that
want
thinks
he
can
do
that.
Didn't
understand
the
whole
problem
anyway.
B
So
this
text
fixing
this
text
isn't
going
to
isn't
going
to
fix
your
system
right.
B
Inventing
inventing
tp
we're
inventing
attestation
in
this
document
and
no
one's
ever
heard
of
it
before
right,
we're
trying
to
get
a
consensus
model
for
protocols
afterwards,.
B
A
It's
just
surprisingly
specific.
I
like
it
better
this
way.
I
think
it's
just
not
focusing
spontaneously
on
root
of
just
claims
here
and
then
people,
I
don't
know,
get
the
wrong
idea.
I'm
happy
with
this.
E
A
B
B
B
Probably
so
thomas,
can
you
try
to
rebase
this
yeah
yeah.
D
Look
at
it
because
the
the
other
technical
issue
that
I
had
with
it
was
still
that
discussion.
We
were
having
about
the
prop
delay
whether
the
prop
delay
is
relevant
and
whether
the
handle
transmission
time
is
relevant.
Where
I
claim
it's
not
that's
the
technical
issue,
and
hopefully
from
our
your
discussion,
you
at
least
understand
where
I'm
coming
from
so.
B
Okay,
that's
the
same,
so
there
was
this
complaint
from
guy.
This
is.
There
are
three
ways
in
which
the
process
may
fail.
There's
a
reason
to
enumerate
the
failure
cases.
There
are
only
three:
what
is
the
blah
blah
blah.
D
So
part
of
that
paragraph
was
already
rewritten
in
a
previous
pr
that
we
did
maybe
two
weeks
ago
or
something
but
yeah.
D
D
Any
objections
punctuation
wise
it's
odd-
to
have
a
colon
without
either
bullets
or
part
of
the
same
sentence,
so
maybe
include
the
following,
or
something
like
that.
So
that's
a
complete
sentence,
because
usually
anytime,
that
you
have
a
colon
there's
always
has
to
be
something
that
would
be
a
period.
So
if
it
was
a
bulleted
list
for
example,
then
you
know
the
last
bullet
would
be
the
thing
that
has
a
period.
But
here
there's
not
bullets
or
anything.
So.
D
B
D
Well,
let's
see
I'll
put,
I
like
your
include,
because
the
reason
that
I
like
drawing
clued
is
because
it
was
clear
that
it
was
not
limited
to
three.
Now
it's
less
clear,
so
I
wonder
if
we
can
the
other
way
to
do
this.
Let
me
how
long
is
the
text
that's
below
this?
D
The
646
is
this
like
one
sentence
each
is,
or
is
it
more
all
right,
so
here's
my
other
suggestion
put
it
back
to
the
way
that
you
had
it
with
a
colon
and
make
first,
second
and
third
be
bullets,
because
they're
all
one
liners.
D
I
don't
think
you
do
but
go
ahead
and
preview
it.
It
should
show
up
right
either
way.
D
No,
I
wanted
to
see
the
preview
view.
You
know
what
I
mean
inside
your
c
inside
your
suggestion,
where
you
were
typing
before
there
was
a
preview
tab
that
you
went
past.
D
B
So
this
was
a
guy
comment
as
well.
Ned
wrote
back
on
this.
Oh
wait.
Okay,
hang
on
here.
Is
that
really
the
right
one?
No,
that
is
not
the
right
one.
B
Out
guy
asks
is
this
a
normative
statement,
and
so
I
rewrote.
B
B
B
D
So,
michael
in
893,
I
think
you
have
a
missing
word
this
may,
in
the
form
of
I
think
you
mean
this
may
be
in
the
form
of.
C
D
And
that's
because
yes,
it's
because
that
or
is
not
an
or
that
goes
to
the
first
door,
it's
inside
the
so
in
other
words,
this
may
be
in
the
form
of
an
appropriate
trust,
anchor
or
open
parentheses.
The
sorry
or
the
verifier
may
be
open.
D
You
don't
have
another
or
maybe
right,
and
so
the
or
even
actually
goes
with
the
verifier
may
and
then
the
even
carefully
secured
list
of
is
after
maybe
provided
with
either.
Then
there's
the
open
parenthesis
goes
between
with
an
a
database
and
if
I
were
to
sentence
diagram
it
right,
maybe
provided.
C
D
Like
that
may
be
provided
with
a
database
of
public
keys
or
the
verifier
may
be
even
before
the
word
provided,
but
yeah,
so
I
don't
know
if
you
need
to
rewrite
it
or
whatever,
but
that
that
that's
why
the
parentheses
need
to
go
away
all
right.
So
now
you
can
delete
those
extra
parentheses
that
were
for
diagramming
the
sentence,
but.
C
E
D
B
The
galaxy
that
allow
grammar
thing
that
allows
you
to
do
the
time
travel
tenses.
Did
you
even
have
that
hank
again
verb
tense
is
for
time
travel?
Oh,
I
will
have.
B
Okay,
so
the
pull
request
here
is:
is
this
one
which
thomas
is
going
to
work
on
so
relying
party
mutual
authentication
so.
B
Yeah,
that's
not
the
one
I
wanted
to
have,
and
then
this
issue
here
almost
the
same
thing
as
the
same
thing,
description
of
mutual
authentication
and
ned
asked.
Should
we
have
this
term
and
I
took
a
a
half-assed
attempt
to
put
it
into
the
into
the
terminology
realized
that
with
the
reorganization
with
the
terminology,
I
had
no
idea,
which
section
to
put
it
in
and-
and
I
felt
it
was
such
a
big
thing
to
add
that
I
just
backed
off-
and
I
don't
know
whether
or
not
we
think
we
need
to.
B
E
D
Yes,
I
think
you're
absolutely
right
then
so
logic
is
sound.
B
So
if
we
are
going
to
going
to
define
it,
I
think
if
you
look
at
the
terminology
section
right,
we
have
roles
and
then
we
have
artifacts.
D
B
D
A
Typical
mutual
attestation
are
totally
different
processes.
I
mean
yes,
cell
phones
or
as
a
private
evidence
to
cell
phone
and
cell
phone
is
providing
evidence
to
siphon
tower,
but
your
infrastructure
at
the
back
end
is
totally
different
when
the
the
the
the
trust
relationships
are
different.
The
trust
anchors
probably
even
are,
and-
and
so
so
yes
why
this
might
be
a
requirement-
it's
just
two
times
times
two.
B
So
first,
your
cell
tower
example
is
a
terrible
example,
because
that's
an
example
where
it
mostly
doesn't
happen,
but
anyway
never
mind
that
point.
Okay,
a
sim
card
aka,
was
a
is
a
stillborn
until
we
get
to
5g,
but
the
issue
with
mutual
attestation,
also
with
mutual.
I
think
more
so
than
mutual
authentication
comes
down
to
who
goes
first
right,
and
I
won't
I
I
won't
prove
to
who
I
am.
D
Yeah,
so
I
was
thinking
about
that,
as,
as
you
were,
introducing
this
issue,
I
think
mutual
authentication
to
me
means
the
same
to
you
as
you're,
typically
going
at
the
same
time,
because
that's
how
you
usually
think
about
it
like
in
mutual.
D
Tls
or
something
like
that
right
and
so
what
the
problem
actually
comes
up,
and
so
this
is
a
case
where
I
would
prefer
to
not
bring
up
the
topic
unless
there's
a
reason
to
you,
but
since
we're
bringing
it
up
here,
not
in
the
text
or
whatever,
there's
also
authentication
cases
that
says,
I
don't
want
to
reveal
my
dead
identity
until
the
other
guy
goes
first
right,
and
so,
if
you
think
about
you
know
whatever
one
side
presents
a
certificate,
then
you
decide
whether
to
present
your
certificates.
D
You
can
do
it
well,
one
at
a
time
and
that's
really
the
same
concept
which
you're
talking
about
with
attestation
right
with
privacy
sensitive
stuff.
I
don't
want
to
attest
until
the
other
guy
test
me
first,
so
I
know
that
I'm
only
revealing
my
sense
of
information
to
somebody
that
I
know
who
it
is,
and
so
I
think
it
actually
does
come
up
the
same
issue
about
you
know
the
same
time
or
one
at
a
time.
It
comes
up
in
both
authentication
and
attestation.
They
use
alternatives
so.
B
Well,
I
I
understood
that
there
were
some
useful,
zero
knowledge
proofs
that
that
work
for
authentication
in
some
cases
that
allow
you
to
not
have
to
decide
who
goes
first.
I
can't
imagine.
D
D
E
D
D
B
Daa,
I
don't
know
if
we
mentioned
them
by
name,
but
we
certainly
have
have
mentioned.
B
The
in
the
privacy
considerations
this
other
ticket,
which
is
sort
of
about
the
same
thing
there
somewhat
longer
assurance
of
the
trust
for
the
verified,
sending
evidence
to
it
right
and
there's
some
other
pii
stuff
around
this.
This
text
now,
or
at
least
there
is.
D
I
know
we
did
in
like
the
ccc
white
paper
attestation
section
and
I'm
thinking
that
was
in
here
too,
but
I'm
afraid
that
I
might
be
confusing
it
to
you.
So
that's
why
yeah.
B
Well,
I
I'm
I'm,
I
don't
okay.
So
aside
from
the
fact
that
we've
said
that
there
are
cases
where
you
must
be
more
careful
and
therefore
your
protocol
better
deal
with
it,
we're
not
defining
the
protocol,
that's
going
to
deal
with
it,
so
I
don't
know
where
we
need
to
be
gets
that
far
into
it.
There
there
are
architectural.
B
The
architectural
impacts
of
this
is
that
there
are
potentially
additional
round
trips
to
you
know,
do
something
else
to
figure
it
out
right,
but
I
don't
see
how
we
can
get
this
into
the
architecture
in
a
meaningful
way.
I
think
it
belongs
in
the
protocol.
If
you
have
to
do.
B
I
think
you're,
alluding
to
you,
know
the
phone
first
as
a
class
attestation
that
it
is
a
particular
kind
of
phone
and
then
the
verifier
says
oh
and
therefore
you'll
trust
me,
because
I
have
blah
blah
blah
and
then
the
phone
will
reveal
some
pii.
After
that
point,
that
sounds
like
a
three-letter
three-way
handshake.
That's.
D
Not
quite
the
same
thing
but
so
ned
I
did
check
and
it
is
not
in
this
document
I
was
thinking
of
the
their
document.
B
D
I
can't
comment
on
the
ladder,
but
is
there
a
text
for
the
document?
Yes,
whether
you
think
it
would
work
well,
I
guess
you
have
to
make
a
judgment
on
that,
but.
D
E
B
So
I'm
just
going
to
all
right,
so
I'm
just
going
to
go
back
to
issues
and
we
have
seven
minutes
left.
So
my
goal
here
is
to
find
tickets
that
don't
have
anyone
assigned
to
them.
D
Okay,
the
text
that
I
was
referring
to
is
in
section
6.2
of
the
pdf.
I
posted
in
the
chat
room
to
link
to.
D
D
B
B
A
D
For
people
that
haven't
seen
this
pdf
before,
if
you
remember
one
of
our
use
cases
in
the
use
cases
section
is
concrete
competing.
This
is
a
deep
dive
into
the
confidence
competing
use
case
and,
of
course,
one
of
the
sections
is
about
attestation
for
that
and
that's
where
it
references
the
rats
architecture
in
that
section
six,
so
just
rats
architecture
is
more
general
right,
but
this
is
the
special
case
of
attestation.
That
section
six
is
a
special
case
of
at
the
station
four.
D
D
Different
white
papers
from
the
comprehensive
community
consortium,
this
one
is
the
technical,
deep
dive,
there's
another
one,
that's
much
more
higher
level
that
doesn't
go
into
all
the
you
know:
attestation,
details
and
stuff.
It's
like
what's
the
actual
use
case
for
it
as
if
you're
a
you
know,
c-level
person
trying
to
understand
what
it
is
or
whatever
or
you're
a
marketing
person
or
whatever.
Then
it's
very
high
level,
and
so
there's
another
one.
D
That's
actually
slightly
more
readable,
but
this
one
is
for
us
engineers
and
so
usually
engineers,
the
ones
that
read
rfc
is
not
marketing
people,
so
this
would
probably
be
if
we
were
going
to
reference
one.
This
is
probably
the
more
appropriate
one
given
the
audience
of
rfcs
and
it's
the
out
of
the
two.
This
is
the
only
one
that
references
the
rat's
architecture,
because
the
other
one
doesn't
go
into
that
level
of
technical
detail.
D
So,
by
the
way,
I
am
the
chair
of
the
group
that
put
this
together.
Thomas
was
there
at
some
of
the
discussions.
So
I
appreciate
all
the
thomas's
input
on
this
document
and
as
well
as
some
of
you
worked
for.
Companies
that
had
active
people
participating
in
the
offering
of
this
text,
cheers.
B
D
B
B
D
D
D
B
Okay,
so
going
back
to
here,
so
I
had
opened
a
bunch
of
issues.
We
don't
really
have
time
to
step
through
them
all,
but
we
need
to
do
this
and
get
some
of
these
there.
Okay,
so
we
had
a
won't
fix
on
that
one.
We
have
a
won't
fix
on
that.
One.
B
Wow!
I
see
I
added
the
strength
of
function.
That's
a
commit,
and
so
I'm
gonna
close
this
one
here
because
we
fixed
it
what's
what's
what's
open.
Is
it
needs
a
reference
to
common
criteria?
Public
citation
in
here.
D
B
D
B
B
Yeah
as
a
term,
and
it's
in
one
of
those
so
so
yeah
having
this,
this
actually
helps
to
to
get
to
the
right
thing.
So
I
guess
I
just
assumed
it
was
a
paper
download
only
go
buy
it.
Okay,
so
listen!
It's
top
of
the
hour!
B
We're
gonna
do
this
again
next
week,
I
wouldn't
mind
if
you
have
time
next
week,
if
we
could
schedule
two
meetings,
I'm
not
proposing
this
week
because
there's
like
six
virtual
interim
meetings
this
week,
including
one
on
friday
for
me
so
but
next
week,
if
you're
available
on
tuesday
and
friday,
that
would
be
great.
D
That
particular
day,
I
have
a
fairly
flexible
schedule
and
you
were
talking
february
5th,
right,
yeah
that
one
I
can
make
just
about
any
time.
I
I
know
just
later
for
the
europeans
so.
A
Yeah
we
have
to
move
a
block
out
there,
but
I
think
that's
a
no
brainer.
I
guess
because
it's
all
at
the
station
ready
there
so.