►
Description
IDM project updates.
Check out the github repo:
https://github.com/ipfs-shipyard/pm-idm/blob/master/docs/idm-concept.md
B
A
Miss
project
project
from
the
moxie
team:
here
we
have
a
and
rikuo
shadows,
are
Pedro
Miguel
and
also
on
the
call
we
have
Evan
and
and
Jorge.
So
don't
not
forget
to
add
your
names
to
the
attendees
list
and
please
share
your
progress.
Your
report
to
the
during
the
agenda
so
I
think
we
can
start
and
going
to
through
the
list.
First,
one
is
Salazar
and
Andre.
C
B
C
C
There's
a
I
just
seen
finish
the
first
implementation
of
it
it
you
can
just
check
the
source
code.
I
put
the
Red
Bull
a
link
there
associated
with
a
client
I've
also
implemented
the
first
IBM
bridge,
which
is
based
on
post
message.
So
the
way
these
works
is
that
we
we
have
the
wallet
we
have
the
clients
and
we
have
a
bridge
in
between
that
allows
for
a
client
to
discover
wallets
and
also
to
exchange
messages
between
the
client
and
their
and
the
wallet
side.
C
So
this
bridge
is
based
on
post
message
because
everything
works
in
within
the
browser
in
the
first
interaction
of
normies
and
IBM
projects,
so
that
was
implemented
as
well.
You
might
shed
might
check
the
source
code
there.
If
you
are
curious,
I've
also
implemented
the
the
first
iteration
of
IBM
signatures
or
signatures.
C
C
So
if
you're
curious
as
well,
you
can
check
the
workshop
and
even
follow
the
workshop.
It's
working
so
and
actually
the
demo
that
I
will
be
leaving,
will
be
a
short
version
of
the
the
final
result
of
the
workshop,
which
is
mini,
shut
up
where
we
can
out-educate
and,
of
course,
do
the
opposite,
which
is
a
logout
or
some
like
that,
and
also
we
can
send
messages
and
those
messages
are
being
signed
and
other
peers
are
verifying
those
signatures
or
checking
if
they
are
correct
or
invalid.
C
So,
in
terms
of
my
next
steps,
by
the
way,
I'm
not
locked
in
anything
and
currently
I'm-
not
in
progress
of
anything
I,
finished
everything
from
the
last
sprint
in
the
next
sprint,
I
will
feel
a
deep
dive
on
identity
that
I
will
be
driving
on
on
ipfs
camp
I
will
be
filming
a
marked
on
with
some
description
and
a
problem
that
mystery,
solvents
and
and
I
still
need
to
choose
the
specific
subject.
There
are
a
lot
of
open
problems.
C
Also
I'll
be
implementing
the
revoke
up
in
amuse,
so
we're
hoping
enough
is
actually
implemented
in
the
in
the
IDM
wallet
package.
But
it's
not
there
isn't
yet
a
user
interface
click
to
call
that
method
on
the
wallet
on
the
JavaScript
package.
So
I
will
implement
that
on
noemi's,
which
is
kind
of
nice,
because
I
will
be
able
to
show
the
feature
in
the
actual
lecture.
C
So
I
will
actually
like
authenticate
to
the
to
the
demo
shut
up,
and
the
app
itself
will
appear
in
my
wallet
saying
that
I
now
use
that
app
and
once
I
click
it
I
click.
The
revoke
up
my
session
will
be
destroyed
on
that
up.
So
it's
a
cool
feature
that
I
will
be
able
to
show
on
the
on
the
actual
lecture
and
also
in
my
next
steps.
I
will
improve
further
improve
the
workshops.
The
workshop
there
are
some
minor
stuff
that
I
need
to
improve,
so
that
people
can
follow
the
workshop
more
easily.
C
C
I
was
cut
down
in
the
initial
part,
but
I
think
I
could
I
got
your
question
so
you're
asking
if
the
the
problem
that
I
state
or
the
help
that
I
asked
was
the
final
solution
was
that
the
question
yeah?
Basically
alright.
So
yes,
the
strategy
that
we
are
using
for
sinuses
is
something
something
really
simple.
So
we
have
the
device.
So
first
we
have
an
identity.
C
An
identity
has
multiple
devices,
because
you
use
your
identity
wallets
in
your
phone,
in
your
laptop
in
your
hello,
any
device
that
you
that
you
have
and
those
are
device,
private
keys
and
public
is
different
for
each
one
and
underneath
each
device
you
have
session
keys.
So
a
session
key
is
associated
always
with
to
a
device.
C
Just
one,
and
the
thing
is
that
those
session
keys
are,
there
are
coyotes
or
children
keys
from
that
device
key
by
using
deep
VIP
32,
so
use
that
to
derive
a
key
which,
which
is
nice
because
they
are
deterministic
and
the
thing
is
if
we
revoke
a
device.
All
the
session
keys
are
also
revoked
because
the
seniors
themselves
always
mention
the
device,
even
if
those
are
from
the
session
sign
senators
from
the
session
key,
because
within
the
signature
we
also
have
a
key
path,
which
is
the
deliberation
key.
C
The
revision
path
that
we
used
to
derive
the
session
key
from
the
device.
Key,
that's
the
whole
strategy,
and
the
thing
is
that
old.
With
this
strategy,
the
signatures
are
compact,
because
the
session
public
keys
don't
need
to
be
part
of
the
signature
itself.
They
can
be
derived
from
the
from
the
from
the
device
key,
which
is
just
a
D,
ID,
VAR
l,
which
basically
contains
your
deed
and
the
pointer
to
the
public
key.
C
E
I
have
a
question
as
well.
Andre,
would
you
mind
describing
the
process
by
which
you're
planning
on
picking
an
open
problem
today
I
didn't
deep
dive
for
I
kept
asking
like
what
are
your
criteria
yeah?
So
they
won't
ask
because
if,
if
you
wanted
to
run
a
queue
by
George
in
me
and
see
what
like
get
art-
and
you
know
what
we
think
is
interesting
or
important-
we'd
be
happy
to
yeah.
C
Honestly,
I
haven't
yet
thought
about
exactly
which
wish
I
to
my
own
shoes.
There
are
a
few
open
problems
that
I
need
to
that.
We
need
to
find
a
solution,
of
course,
and
the
criteria
will
be
not
something
easy,
but
not
something
too
complex,
because
we
have
like
one
hour
and
a
half
I
think
for
the
d-type.
C
So
I
will
just
first
go
through
all
the
open
problems
and
do
a
filter
and
just
to
get
a
small
list,
and
perhaps
I
will
post
that
on
the
IRC
I,
don't
know
if
you,
if
you
are
on
the
IRC
channel,
which
is
ipfs
identity
and
perhaps
I,
will
post
a
link
there.
The
the
Lister
or
maybe
I
can
in
my
the
list
with
you
guys,
and
you
also
provide
your
feedback
to
that
or
maybe
really
to
issue
on.
You
know,
I
know
yeah.
E
C
Alright
I
will
perhaps
send
an
email
with
the
list
and
and
get
feedback
on
dots.
The
thing
is:
I
need
to
feel
that
document
like
I
I,
needed
to
finish
that
up
with
like
two
days
ago
and
Alan
Alan
is
like
making
a
lot
of
pressure.
So,
if
I,
if
I
don't
last
for
the
feedback
to
be
fast,
so
that
I
can
today
create
the
issue
today
in
fill
the
document
today,
if
possible.
So
this
won't
happen
like
in
two
hours
or
something
awesome.
A
So,
let's
continue
with
a
round
of
updates
the
next
one
is
actually
it's
me.
So
I
came
back
from
vacations
like
two
days
ago,
one
week
and
then
from
Monday.
Until
yesterday,
I
just
saw
the
mini
shop
mini
chat,
app
that
andrea
was
talking
about
using
a
DM
for
the
adjudication.
Everything
is
the
design
and
the
specs
for
the
handoff
were
already
prepared.
A
You
can
see
the
link
on
on
github
is
present
on
the
agenda
as
well,
and
then
for
the
nominal
SIA
landing
page
I
have
already
to
take
a
walk
through
and
and
took
the
the
list
of
items
that
we
need
to
improve
on
the
landing
page.
Everything
is
already
described
and
prepared
for
Jill
one
see
you
can
start
to
do
to
do
so
and
then
next
for
me
for
the
end.
Actually
this
sprint
will
be
way
shorter.
A
We
have
a
holiday
this
week
and
then
next
week
as
well
on
next
Monday,
so
this
week
will
be,
which
are
just
two
days
less
and
it
since
it's
starting
just
today
like
this,
we
already
lost
in
a
way
like
four
days,
so
I
will
work
on
the
revoke
devices
or
slow.
It's
something
that
we
didn't
prepare
for
the
proof-of-concept,
but
will
be
the
next
next
test
for
me
and
yeah.
That's
that's
almost
it
any
questions,
no
okay!
So
next
one
is
Pedro.
B
Everyone,
so
what
I
have
concluded
this
two
weeks
and
I've
completed
the
backup
identity
flow?
You
have
all
the
PR
links
there.
If
you
want
to
check
out
and
I've
also
completed
the
model
global
component,
that
is
a
component
that
allows
you
to
to
open
and
close
a
model.
Even
if
you
are
not
inside
the
model.
In
the
context
of
that
model
and
I've
also
made
some
bug
fixes,
you
have
all
the
fixes
that
I
did
I
will
not
read
and
mold,
but
you
can.
You
can
check
them.
B
I
am
finishing
the
authenticate,
so
the
pr
will
be
open
soon.
It's
I
think
I
just
need
some
some
refactor
to
the
code,
and
it's
almost
then
the
next
tasks
for
me
are
implement
the
site,
design,
prompt
and
also
the
split
button.
This
click
button
will
actually
use
the
drop
on
component
data
that
I
created
before.
So
these
are
my
my
updates.
Any.
A
B
A
bit
more
on
sure
sure,
so
this
split
button
will
be
used
in
the
in
their
own.
But
sorry
in
the
identity
page
and
you
you
can
this,
this
button
will
have
two
actions
or
two
main
actions.
One
of
them
is
to
make
a
pure
identity.
If
you
haven't
done
yet
and
the
other
one
is
revoke
your
identity.
I
guess
am
I
right,
yeah,
okay,
so
these
are
the
two
main,
the
two
main
actions
that
this
button
will
be
used
for.
D
A
C
So
let
me
see
I
like
sheep,
we
know
my
identity
so
that
we
can
start
from
the
scratch,
because
I
think
everyone
didn't
see
anything
about
mummies.
Yet
so
I
will
show
you
the
full
flow
of
setting
up
your
anomalies
wallets
and
create
an
identity
as
well
and
and
also
the
by
capsule,
because
we
can
show
that
again.
So
now
so
I
will
share
my
screen.
C
So
this
is
the
first
screen,
actually
a
really
fresh,
so
that
you
can
see
that
we
have
like
animation
when
the
thing
is
booting
when
he's
putting
like
starting
very
pure
snow.
They
took
like
that.
So
the
first
thing
that
you
need
to
do
whenever
you
in
turn
on
is
for
the
first
time,
is
to
set
up
your
Walker
because
most
of
the
things
things
within
the
wallet
are
encrypted.
So
you
need
to
encrypt
that
with
one
or
more
lock
types.
C
For
now
we
are
just
relying
on
a
passphrase
which
is
one
of
the
lock
types,
but
later
on,
we'll
be
adding
all
the
wrong
types,
such
as
web
of
n,
which
allows
us
to
use
things
from
your
device,
such
as
touch
ID
and
something
like
in
the
mobile,
for
instance,
face
ID.
It's
an
touch,
ID
and
stuff
like
that.
C
But
for
now,
as
I
said,
we
just
have
the
passphrase,
but
the
world
architecture
is
already
prepared
for
that,
so
I'm
gonna
type
phosphorus
and,
as
you
can
see,
we
have
like
a
cool
library
that
shows
you
why
your
phosphorus
is
weak.
We
are
using
the
library
that
actually
shows
or
ex-teammates
cracking
times
for
passphrases,
so
we
are
not
kind
of
relying
if
it
has
symbol,
symbols
or
stuff
like
that.
C
We
actually
trying
to
be
smarter
and
pretty
revealing
week
passes,
even
even
if
they
are
large,
but
they
are
like
of
like
just
ACE,
for
instance
like
Tenet's,
it
will
show
its
weak
because
it's
a
repeatable
pattern
anyway,
using
our
before
that
from
robots.
It's
called
c
CX
z.
I
think
I'm
not
sure
about
them.
So
let's
proceed
the
second.
The
second
scream
that
that
I
have
is
the
idle
time
for
for
the
lockscreen.
C
So
this
time
defines
the
amount
of
time
to
the
idle
maxing
time
before
actually
closing
the
NAM
use
again
similar
to
your
operating
system.
Lockscreen,
it's
the
same
concept.
Basically
in
this
case,
I
will
just
use
ten
minutes
just
for
fun
sake
of
the
use
demo.
So
these
on
page
is
like
a
placeholder
is
nothing
final.
We
will
be
actually
improving.
The
placeholder
page
for
the
thief
has
come
to
be
clear,
but
for
now
is
just
this
and
let's
create
my
first
identity,
so
we
go
through
the
process
of
cleaning
identity.
C
I
can
either
create
or
import,
but
because
I
haven't
I,
don't
have
an
idea
together,
we've
created
first,
so
the
first
screen
allows
you
to
choose
your
type
of
identity.
You
can
choose
a
person,
an
organization
or
other,
because
identities
are
not
tied
to
person's
identity.
It
can
be
anything
can
be
a
person
organization,
company
can
be
a
foundation
can
be
even
your
kids
can
I
have
an
identity
because
your
cats
must
be
vaccinated.
C
So
it's
it's
feasible
to
create
an
identity
for
kids
and
say
that
is
but
United
the
breed
fiber
connection,
for
instance,
in
disguise,
of
course,
I'm
a
person
I
think
it's
person
and
gonna
type,
my
name
and
I
will
leave
the
photo
to
be
field,
because
the
workshop
that
we
that
I
will
be
demoing
is
not
doing
very
well
yet
with
the
avatars,
but
I
will
be
fixing
that
before
that
which
has
come
next
step
is
to
setup
your
device.
So
you
need
to
choose
the
name
of
your
device.
C
We
automatically
inferred
that
this
is
a
laptop,
but
you
can
like
specify
a
different
device
if
you
think
the
initial
thing
that
means
further
is
not
correct.
In
this
case,
of
course,
it's
correct.
It's
a
laptop
and
I
can
choose
the
name
because,
as
I
said,
your
identity
is
associated
with
one
or
more
devices,
and
these
will
be
my
first
device
and
so
let's
proceed
and
now
mine,
it
is
being
created
and
I
will
try
to
explain,
what's
happening
here.
So
under
the
hood.
If
these
goes
well.
A
C
Right
so
we
have
this
global
called
underscore
underscore
idea:
Carvalho
Mosconi
Lascar,
which
just
exposes
the
underlying
wallet
module
in
development
mode.
So
let's
see
what
happens
that
happened
under
the
hood.
So
if
we
pick
over
that
entities,
sorry,
if
we
pick
over
the
identities
list,
you
will
see
that
we
have
one
identity
here
and
we
can
check
what's
its
the
ID
all
right.
So
sorry,
it's
the
index
0
against
the
view.
C
So,
as
you
can
see,
my
D
ID
is
by
his
own
IP
ID,
which
is
based
on
IP
FS.
Basically,
it
uses
I,
penis
and
IP
LD,
and
it
has
these
identifiers
here,
which
is
basically
the
harsh,
pointing
to
your
apenas
records,
which
it
sells
points
to
see.
Id
that
points
to
a
DNA
document.
That's
the
thing
so
I
would
try
to
resolve
that
that
happiness
record
by
resolving
the
D
ID.
So
for
these
we
have
also
a
scope
called
di
di
DM,
which
stands
for
deed
manager,
and
we
have
the
resolve
function.
C
Oops
and
as
you
can
see,
this
is
my
dear
D
document
and
the
most
important
bits
of
my
di
document
is
the
public
keys
and
I.
Have
two
kids
here:
I
have
my
master
key,
which
is
like
labeled
IDM
mastered,
which
is
my
master
key.
It's
basically
the
key
that
controls
I,
pianist
records
in
the
case
of
Idid
and
I
have
a
second
key,
which
is
my
device
key.
C
If
you
check
the
label,
it's
IDM
device
and
the
song
identifier,
which
is
basically
inertia
of
the
public
key,
and
also
it's
important
to
mention
that
this
last
key,
my
device
key,
is
allowed
for
authentication
all
right,
there's
also
another
another
fields
on
the
document.
There
are
parts
of
the
spec,
but
the
most
important
bits
are
the
public,
key
and
authentication,
but
indication
array,
so
I
will
just
mute.
My
notifications,
as
I'm
being
so
anyway,
are
you
following
a
true?
If
not
please,
just
stop
me
and
I
will
explain
any
question
that
might
arise.
C
E
C
So,
in
the
case
of
organizations
you
have
this
feel
like
the
controller,
and
these
are
like
more
advanced
scenarios,
but
I
can
put
a
controller,
that
is
that
missions
or
refers
to
another,
the
ID.
So
let's
say
that
I'm
Moxie
as
let's
say
that
we
have
an
identity
Moxie,
we
can
add
a
public
key
here
which
is
controlled
by
a
person.
E
Are
you
today
so
there's
the
controller
which
gives
identities
to
devices
that
controller
in
the
individual
case
is
the
individual
and
in
the
organization
case,
there's
a
like
there's
some.
There
are
some
individuals
that
are
they
each
have
devices
that
can
wear
in
some
individuals
can
but
exert
control
over
the
controller.
C
Yeah
like,
for
instance,
in
these
guys,
let's,
let's
give
an
example,
an
actual
example.
Let's
say
that
we,
instead
of
this
controller
being
myself,
I,
could
be
telling
that
Sosa
also
controls
my
identity,
for
instance,
and
he
itself
could
have
three
public
keys
and
how
is
how
is
public
keys
will
be
able
to
also
control
my
my
identity
and
but
also
there
is
this
public
key,
which
is
which
I
must
use
to
sign
up
early
for
the
private
key.
C
Sorry,
the
private
key
will
be
used
to
sign
is,
is
the
proof
that
I
authorized
him
basically,
so
this
is
like
a
chain
of
authorization
that
is
possible
with
the
ID
schema,
but
but,
as
I
said,
we
haven't
explored
much
of
it
yet
because
we
are
just
trying
to
solve
the
simplest
case
for
now,
but
that
is
the
ID.
Spec
is
actually
some
examples
with
that.
So
it's
not
something
that
the
spec
doesn't
allow,
just
something
that
we
haven't
explored.
Yet
in
our
case.
C
All
right,
so,
let's
get
me
the
demo.
We
won
on
luck
because
we
spent
ten
minutes.
So
let's
show
the
backup
flow,
which
is
something
that
we
just
finished
I
mean
it
was
the
console.
So,
of
course,
because
picking
up
your
I
didn't,
let
me
explain
that
so
we
actually
created
my
identity
and
then
the
master
key,
which
is
the
one
that
controls
I
pianist
record,
is
very
important
in
the
kinds
of
IP
ID,
because
if
you
lose
it
or
if
it
gets
stolen,
your
identity
gets
basically
compromised
forever.
This
is
a
problem
with
that.
C
Guy
respect
itself
is
not
a
problem
with
other
dating
methods,
for
instance
other
daily
methods
based
on
it
here
in
actually
point
to
a
smartphone
short.
That
is
a
contra
that
might
have
some
logic.
So
even
if
you
lose
you,
the
owner
loses
the
private
key
that
controls
that
contract
that
smart
contract-
that's
my
country,
might
have
functional
to
issue.
Another
owner
buys
on,
for
instance,
social
recovery
mechanisms
such
as
your
friends
and
stuff,
like
that.
C
It
really
depends
on
that
the
again
yeah
in
method,
so
it
is
guys
the
my
private
key,
my
master
private
key
stored
in
this
browser,
so
I
will
back
it
up
and
he
raised
it
from
the
browser.
Basically,
so
let's
complete
this
work,
so
you'll
face
with
a
paper
key
for
now.
This
is
something
that,
for
the
short-term
medium-term
you
workouts
but
later
on,
we'll
be
having
other
methods
more
friendly
methods.
C
Of
course,
as
I
said,
is
not
very
friendly
at
the
moment,
but
you
might
improve
that
so
I
don't
copy.
The
minim
onic
is
a
twelve
word
money
money
that
will
be
able
to
restore
the
sieve,
and
with
that
seed
we
will
be
able
to
restore
the
master
our
psyche.
This
is
something
that
we
implemented,
because
our
psyches
are
kind
of
complex
to
recover
from
any
1
million.
Emmonak.
Sorry,
but
other
type
of
keys
are
easy,
easy
because
it
just
requires
some
random
bytes,
but
in
case
of
RSA,
is
different.
C
A
B
C
Right
so
I'm
gonna
paste
them
the
money,
because
I
will
need
it,
because
we
we
have
like
a
brief
ocation
process
so
that
we
are
sure
that
the
person
really
wrote
the
the
words
so
I
need
to
select
eight
and
one.
So
when
his
body-
and
it
is
one
two
three
four
five
six
seven
eight
tone-
hopefully
I-
know
what
counts
you.
Yours,
yes,.
A
C
That's
it
so
at
the
moment
my
master
key
was
completely
removed
from
my
browser.
So
even
if
a
user
sorry
rubber
managed
it
manages
to
you
know,
get
access
to
my
my
ID,
my
wallet
and
and
even
asks
me
to
put
the
password.
My
master
key
won't
be
there
right
and
to
prove
that
we
have
here
functionality
on
an
identity,
so
one
access
my
identity.
So
we
have
the
backup
and
the
backup
get.
Data
should
be
undefined
and
is
complete
shall
be
true.
C
So
I
think
that's
it
for
the
backup
demo
and
now
the
most
interesting
part
is
to
provide
authentication,
of
course,
to
to
UPS,
and
this
case
I
have
your
and
up.
But
before
that,
let
me
show
you
the
profile
page,
because
I
missed
this
for
even
forever.
So
this
is
the
profile
page
and,
as
you
can
see,
it
has
like
my
name.
Yes,
your
edit
profile
button.
C
You
can
see
the
devices
currently
associated
with
your
identity,
which
is
just
one
and
I,
can
prove
myself
on
social
networks
and
and
also
I
will
be
able
to
later
prove
that
I
want
a
certain
size
for
now.
Those
are
not
implemented
as
of
yet,
but
they
will
be
soon
and
also
I.
Don't
have
any
apps,
because
I
haven't
yet
authenticated
with
enough
I
will
just
show
you
the
edit
profile,
so
I
can
feel
some
more
details
about
myself.
C
C
C
How
much
you
want
to
disclose
yeah
yeah.
These
are
like
similar
to
Facebook
scopes
or
all
scopes,
but
we
haven't
implemented
them
yet.
So
at
the
moment
it's
it
will
receive
the
personal
details.
So
if
I,
if
I
tries
and
logged
in
on
on
the
chat
and
I'll,
be
able
to
to
type
a
message
and
I
will
want
you
to
take
a
closer
look
at
the
message
itself,
that
will
appear
here.
You'll
see
like
a
loading
and
the
check
mark.
C
C
Yeah,
maybe
the
Internet
is
not
really
fast
anyway,
if
I
like
you,
you
were
seeing
the
loading.
It
should
now
be
instant.
The
next
message,
because
there's
some
kind
of
cash
on
on
the
IP
NS
records
fetching
so
the
next
lol.
Second,
it
will
feel
more
fast
because
there's
cash,
so
let
me
try
to
kind
of
explain
what
is
happening
under
the
hood
in
terms
of
the
signatures.
I
really
try
to
explain,
but
it's
better
to
actually
follow
a
rapper
here
that
we
have
signatures.
C
C
So
what
I
need
to
do
to
verify
signature
is
to
fetch
the
any
document
check
if
that
publicly
mentioned
by
that
fragment
referenced
by
that
fragment,
is
there
and
then
I
need
to
derive
the
real
public
key
that
was
used
for
signing
via
this
key
path
in
this
guy's
it
would
be
just
the
device
key
in
this
example,
but
in
normals
in
the
Soaring
that
IDM
shut
demo
I
was
actually
signing
with
my
session
key.
So
the
key
path
will
be
something
like
this.
Instead,
sorry
I
will
show
you
Spira,
because
I'm
logging,
the
messages.
C
Can
you
see
so
it's
like
m
/
and
an
unique
identifier,
that's
maps
to
the
public?
Sorry,
the
key
path
that
allows
me
to
derive
the
session
precession
public
key
so
that
I
can
check
if
the
value
here
on
the
signature
matches
the
actual
data
that
was
signed,
that's
how
it
works.
This
uses
VIP
32
to
derive
the
keys.
So
this
is
something
that
many
bitcoins
Bitcoin
wallets
use
a
tool
to
have.
Deterministic
Bitcoin
comes
so
that's
basically
how
it
works.
C
We'll
ask
you
to
authorize
this
signature
all
right.
So,
of
course,
you'll
see
some
wheels.
Sorry
possible.
You
will
see
a
raw
screen
because
we
are
still
implementing
this
well.
This
will
be
like
the
design
will
be
very
similar
to
the
2.8
occasion
prompts,
but
we
will,
with
a
different,
slightly
different
design.