►
Description
The fourth call of the IDM project.
IDM stands for identity manager and André Cruz gives us another update on the project.
Check out the github repo:
https://github.com/ipfs-shipyard/pm-idm/blob/master/docs/idm-concept.md
A
C
B
A
B
Thank
you
Paul.
By
the
way
you
were
muted,
but
that's
not
a
problem.
Sao
Paulo
will
be
taking
the
notes
first
and
so
I
think
at
this
point,
people
already
added
the
notes
into
the
the
updates.
So,
let's
start
with
the
wrong
amount
of
interest
and
the
plates
by
the
order
of
setting
these
lists
so
I'm,
actually
the
first
one
I'm,
always
the
first
time
I
will
I
will
start
putting
my
name
in
the
bottom
of
the
list
anyway.
B
Also
I've
refactored
and
edit
model
the
model
entrance
and
exit
animations,
because
basically
Sousa
is
ahead
and
decided
about
how
the
actual
module
insurance
works
and
in
the
exit
as
well
so
I
prefer
to
implemented
that,
or
this
help
implement
in
momentum
that
and
also
I've
helped
setting
up
the
sector
phones,
because
the
sector
font
is
not
not
an
open
phone
she's.
Actually,
a
licensed
phone,
so
I
actually
bought
the
font
and
plated
help
the
plating,
the
wrapper
and
setting
up
licenses.
B
And
all
of
that,
so
that's
you
know,
the
project
is
MIT,
except
for
this
part
specifically
for
the
font,
which
has
a
different
license.
I'm
sorry,
do
we
do
a
lot
of
code
and
pull
requests
from
all
the
members
of
the
team
and
going
forwards?
What
I'm
doing
next
by
the
way
I
know
I,
know
tasks
in
progress
and
more
block
norwalk.
B
C
C
B
C
Mostly
I'm
working
on
the
verifiable
credentials
working
group
and
actually
a
little
bit
distracted
because
I'm,
actually,
the
the
calls
overlap
right
now,
and
so
a
lot
of
that
is
the
standards
for
the
interoperability.
So
that's
the
right
now.
The
IP
ID,
which
is
a
did
method,
is,
is
I'm
still
working
on
the
specifications,
but
a
lot
of
it
is
now
actually
once
we
have.
This
method
is
actually
work
out.
C
So
there's
a
lot
of
it
is
just
sending
those
up
within
the
guy
of
go
code
and
then
transporting
the
keys
to
your
wallet
and
then
ultimately,
to
your
your
your
either
you
through
your
browser,
so
so
only
to
find
out
that
these
are
terribly
insecure.
C
C
Know
I
want
to
make
those
I
fancy.
It
was
actually
like
so
like
these
are
actually
the
was
this
ledger
net
nano
is
actually
is
where
I
actually
store
all
my
Bitcoin
billions
right
now.
So
actually
these
are,
but
you
can't
shake
you
can't
do
a
lot
of
interoperability
about.
This
is
a
rating,
the
C
code,
and
actually
someone
has
done
this
for
iota
and
creating
it
in,
but
it's
just
a
pain
in
the
butt.
C
A
B
B
B
Because
your
your
what
forces
my
mother
took
actually
has
a
hardware
device
that
is
able
to
encrypt
stuff
for
me
and
I
can
leverage
that
to
store
information
encrypted
within
the
hardware
or
at
least
in
the
storage
encrypted,
with
a
key
that
only
the
hardware
is
able
to
quit.
So
we
exported
to
unlock
the
idea
modes,
but
but
later
on,
we
can
explore
using
hardware
Hardware
keys
in
order
to
import
your
master
key
or
at
least
obtain
a
signature
of
your
of
your
must-have
key.
Basically,
but
it's
still
too
far
away
in
terms
of
so.
C
Yeah
in
Inca,
so
the
hardware
wallets
for
the
you
fight
of
a
lion
Alliance
actually,
as
the
you
cookie
actually
does
support
that.
But
unfortunately,
actually
it's
x.509
self
signed
certificate
is
all
you
can
do.
Is
you
actually
can't
do
like
a
sha-256
hash
and
then
signing
that
with
it
with
a
it?
Looked
a
curve?
It's
so
it's
it's
very
limited
to
just
x.509.
C
So
it's
really
trying
to
get
to
the
it's
either
signing
it
art
with
RSA
or
ideally
with
Edie,
two
five,
five,
one
nine,
which
is
a
lot
of
the
curve
that
I'm
focusing
on
or
SEC
p25,
six
K
ones.
So
that's
where
I've
actually
gone
to
more
of
a
hardware
security
module.
So
so
it's
altima,
because
I
think
it's
ultimately
like
it's
generation
of
the
keys,
and
I
don't
trust
myself
to
be
smart
enough
to
do
that.
C
And
so
I
want
to
push
that
off
into
some
device
that
actually
is
recognized
as
being
secure
and
audited
and
just
basically
using
whatever
key.
Actually,
it
comes
from
that
device
that
actually
is
like
outside
my
control,
it's
all
about
then,
once
having
that
is
signing
and
and
and
then
just
getting
to
the
cool
stuff.
I
want
to
get
to
the
cool
stuff
great.
B
C
I
think
it's,
you
know
right
now.
What
is
it
twenty
lines
of
code?
So
it
really
once
you
actually
get
to
it.
It
actually
sets
go
code
interfacing
with
the
GoSee
library,
so
once
actually
it
it's
really
simple.
It's
just
understanding
the
complexity
and
simplifying
it
and
realizing
just
that.
I
get
you
easily.
This
is
the
standard
for
the
US
government
and
like
for
military
purposes,
but
they're
bogus.
So
it's.
B
D
That
already
mentioned
so
another
thing
that
I
concluded
was
the
standardization
for
the
current
illustrators
illustrations
that
I'm
using
across
the
pages,
and
they
were
added
to
the
style
guide
with
the
proper
pads,
and
so
they
can
be
tweaked
by
the
implementation
side.
I
already
finished
the
morph
animation
for
the
branding
brand
I
can
into
the
lock
icon.
I
used
the
Lottie,
it's
a
great
tool
from
from
my
B&B,
and
it
works
really
flawless.
So
in
progress
right
now,
I
have
the
temporary
illustration
for
the
profile
page.
D
It
was
something
that
I
already
mentioned
on
the
progress
last
on
the
last
two
weeks
that
there
are
still
a
bit
some
details
to
refine
and
it's
almost
finished.
But
it's
something
that
I,
maybe
I
can
conclude
today.
Let
me
see
so
the
next
step
for
me
regarding
this
print
will
be
the
design
to
the
notifications.
Components
predict
all
the
scenarios
for
the
notifications
itself,
where
the
where
and
how
they
appear
across
the
pages.
D
B
D
B
In
the
design
section
of
the
readme
of
the
PM
IDM
I
read
on
the
profession
PR
you
have
design,
and
then
you
have
here
a
link
to
the
Google
Drive
folder.
That
is
public.
You
can
never
get
freely
there
and
see
all
the
work.
There
is
mean
for
those
readers
in
terms
of
design
and
also
all
the
code
ways
is
currently
living
on
several
cripples.
These
list
might
erode
over
time.
For
instance,
two
weeks
ago
we
didn't
have
both
of
these
rifles
here.
Cryptokey
composite
in
crypto
keys,
so
will
be
a
planning
these.
E
Guys,
I
will
be
quicker
than
souls
I
promise,
so
for
the
past
two
weeks
and
what
I've
been
doing
was
I
adjusted
models
and
flow
model
contents
component
for
different
resolutions.
I
have
the
link
under
under
clipped,
but
if
you
want
to
check
it
out
and
I
also
implemented
the
type
select
and
type
option
components
that
will
be
useful
for
for
the
user
to
choose
their
type
of
identity,
and
we
also
use
this.
E
We
will
also
use
this
component
for
for
the
type
of
the
device
that
they
want
to
have
when
they
are
creating
a
new
identity
and
what
I
am
currently
doing.
I
am
fixing
some
bugs
on
a
flow
model.
Content
component
I
will
try
to
do
this
as
soon
as
possible,
so
that
I
can
I
can
keep
with
implementation
of
create
identity
user
journey
that
this
was
where
what
I
was
doing
previously
and
I
need
to
keep
with
that,
and
I
will
also
implement
the
Avatar
component.
E
B
F
Hi
guys
so,
since
the
past
time,
we,
since
the
last
time
we
met
I,
concluded
the
lockscreen
implementation.
That
I
show
you
that,
in
that
progress
report
hall
in
the
past,
Sprint
I've
been
working
on
the
setup
block
or
user
journey
which
I'll
be
showing
showing
you
the
current
state
in
the
in
the
demo
section
and
after
I
finished
that
journey
I
will
be
working
on
the
import
identity
user.
B
A
Hi
guys
so
during
this
print
I
conclude
of
the
human
crypto,
keys
and
Ray
started
this,
but
since
crypto
keys,
composer
actually
got
even
a
little
bit
of
time
to
finish,
I
picked
it
up
and
finished
it
myself
and
I
also
finished
the
D
ID
first
implementation
in
JSI
DM
wallet.
Currently,
this
implementation
only
supports
the
IP
ID
method
in
the
future.
We
want
to
support
more,
but
for
now
it's
the
only
one
that
we
are
supporting
and
I
don't
have
anything
in
progress.
A
Our
blood
our
sprint
is
starting
and
in
during
the
this
new
sprint,
I
will
implement
the
identity.
Scope
in
the
IBM
was
wallet
module
and
also,
as
I
said,
I
will
do
a
little
bit
of
research
and
development
about
the
modeling
data
of
Narva,
TV
about
the
identities,
credentials
apps
and
sessions.
So
we
look
forward
to
check
the
best
way
to
to
store
this
kind
of
information
how
we
are
going
to
do
it.
We
are
sharing
this
between
imported
identities
and
all
of
that
stuff.
So
this
was
mainly
it.
B
So,
regarding
the
identity,
scopes,
scope
on
body-
emotions-
oh
well,
just
to
be
more
detailed.
What
you
it
will
actually
do
is
is
to
use
the
previously
implemented
the
ID
scope
on
the
IDM
wallet,
so
it
will
call
the
create
method,
the
import
method
and
so
on,
but
will
actually
store
the
actual
identity
in
the
storage
of
the
idea
mode
encrypted
with
the
secret,
the
secret
key
that
is
in
the
locker
and
also
it
will
because
it
will
persist
the
the
that
information.
B
The
storage
will
be
able
to
also
implement
the
method,
such
as
get
identity
and
released
identities
least.
Identity
are
stored
within
the
wallet
right.
So
hang
on,
I
think.
Ok,
we
have
Jim,
but
Jim
had
to
left
to
live.
So
let's
go
into
the
second
part,
I
think
we
are
exactly
in
time
because
it's
often
our
sorry
health
half
an
hour
for
the
first
part
and
half.
However,
for
the
second
part,
so
let's
start
with
the
demos
and
I
think
you
guys
forgot
to
image
here,
but
we
have
to
demo
stitcher.
B
F
F
F
C
C
A
D
A
Okay,
okay,
okay,
sorry
so
I
will
demo
the
human
crypto
keys
that
we
did
this
last
sprint.
So
basically,
the
human
crypto
keys
currently
exposes
three
methods:
its
generates
keeper
get
keep
air
from
a
mnemonic
and
get
keeper
from
sea.
I
will
explain
this
in
a
little
bit
of
detail,
but
I'll
show
you
so
I
will
run
a
demo
here,
so
we
will
generate
the
keeper
an
RSI
keeper
and
after
that,
we'll
we'll
use
a
Mahna,
Mahna
k--,
and
I
will
explain
it
later
to
get
the
same
keeper
and
use
the
same
seed.
A
A
A
So
basically,
we
generate
a
minimum
ik
with
that
module
and,
as
you
can
see
here,
these
Mahna
Mahna
k--
will
be
able
to
recover
your
keeper.
So
basically,
if
you
ever
lose-
or
you
don't
know
your
actual
key
keys,
for
example,
your
private
key-
that's
it's
inconvenient
pam
here
you
can
use
this
mana
Manik
to
later
recover
it
also
this
Mahna,
Mahna
k--
will
be
transformed,
or
we
will
derive
a
seed
from
this
manic
and
the
seed
that
it
was
right
from
this
mathematic.
A
A
No
sorry,
we
actually
it
depends
on
the
on
the
on
the
algorithm
if
it
is
an
RSA
key
key
priori
krypton.
Basically,
we
use
these
VSIP
to
further
the
entropy
of
PRNG
seller,
condom
numbers
generated
and
this
seed
will
serve
it
as
it's
entropy
to
and
after
that
we
will
use
that
PRNG
and
no
forge
to
generate
the
the
key
pair.
So
this
is
it.
A
So
I
don't
know
if
you
guys
can
see
it,
because
it's
quite
a
big
and
it
sink
all
that
in
time
using
the
crypto
crypto
keys,
composer,
that's
Andre
developed
in
the
in
this
period,
but
they
are
exactly
the
same.
Both
private
keys
and
public
keys
are
exactly
the
same,
and
this
is
the
minimum
that
was
used.
A
So
we
have
spell
panel
duty
nominee,
it's
exactly
the
same
as
provided
here
spell
line
of
duty
nominee
and
depends
in
match,
and
Al
are
exactly
the
same
here
so
and
we
also
have
the
method
get
keep
read
from
sieve.
That
actually
does
the
same
thing.
You
just
passed
the
sieve
that
served
as
the
entropy
for
the
an
RSA
trng
for
the
generation
of
an
RSA
key
pair,
and
it's
exactly
the
same.
A
Also.
We
provide
a
few
options
to
compose
the
the
keys
differently,
based
on
what
the
package
that
and
ready
takis
composer
provides
us.
So,
for
example,
we
can
use.
Currently
we
are
using
PK
PK
cs8
for
the
for
the
private
key
and
s
PK.
I
am
for
the
public
key,
but
we
can
adjust
this
and
use
all
other
kinds
of
formats
depending
on
our
needs.
So
we
provide
a
set
of
options
that
you
can
configure
and
get
your
your
property
paired
composing,
whatever
you
like.
A
B
A
These
for
those
types
of
keys
right,
so
this
is
the
the
demo
example
that
I
have
here.
Firstly,
I'm
generating
the
keeper
will
be
algorithm
where
the
algorithm
is
RSA,
as
I
said
it,
and
after
that
I
doing
the
gatekeeper
from
mnemonic
from
the
first
results,
so
when
using
the
mnemonic
and
the
same
algorithm.
So,
but
what
if
I
change
these
to
do
this?
So
let's
run
this
again,
let's
see.
A
So
actually,
the
first
thing
that
we
noticed
it's,
that
the
generation
is
quite
about
quite
a
lot
faster,
but
it's
because
of
the
algorithm
that
we
choose,
so
we
are
using
EB
255
1/9,
the
minim
on
ik,
it's
another
mnemonic,
another
generator
mnemonic
based
on
a
English
word
list
in
the
future.
We
we
hope
to
support
other
kind
of
of
kind
or
other
kind
of
word
lists
to
support
other
languages,
and
it
is
the
the
same
it
generated
a
private
key
and
a
public
key.
B
B
By
the
way,
this
desert
ready
for
ad
two
five
five
one
nine-
is
to
get
so
the
serious
as
64
bytes
and
to
generate
the
seed
for
the
ad
two
five
five
one,
because
the
way
you
generate
is
the
the
ad
two
five
five
one
nine
key
is
to
take
a
seed
of
32
bytes.
So
we
take
the
the
the
first
32
bytes
of
the
64
bytes,
if
based
on
demonic.
So
it's
pretty
straightforward
and
also
the
actual
speed
of
the
generation
is
much
faster.
That's
why
we
actually
are
very
interested
in
82
509.
B
Just
because
it
has
you
know
more,
is
more
secure
and
also
it's
much
faster,
both
to
generate
code
to
sign
to
profess
anxious
and
of
that.
So
we
hope
in
the
future
to
do
a
pull
request
to
Libby
to
pick
crypto
in
order
to
use
the
crypto
keys,
composer
library
that
that
we
both
created
in
order
for
it
to
be
able
to
import
and
export
ad
to
509
keys,
so
that
we
can
later
use
those
keys
in
IP
NS
records
so
that
we
can
publish
I
penis
records
using
these
types
of
keys.
C
Using
so
I
published,
two
IP
NS
using
the
go
and
the
unfortunately
there's
some
issues
right
now
in
that
it's
the
key
format.
So
right
now,
it's
really
just
stored
as
binary
in
the
ipfs
folder,
and
so,
if
you
do
generate
it
and
store
it
and
the
ipfs
folder
and
reuse
that
one
then
it's
you
should
have
to
pull
it
from
the
binary
file
and
it's
not
really
very
secure
to
store
it
and
on
disk
could
be
better
just
or
yeah.
B
I've
not
included
in
any
tasks
in
order
to
actually
into
it
easily
be
to
be
greater,
but
I
will
try
to
do
to
do
the
integration
in
my
spare
time,
hopefully
in
the
weekend,
or
something
like
that,
because
I'm
really
interested
in
having
these
types
of
is
really
fast
and
and
worship
your
most
securing
and
actually
they
are
smaller.
The
public
keys
are
very
small,
which
is
kind
of
nice
for
for
in
terms
of
one
way
to
know
that,
and
that's
it
cool
more
questions
for
for
this
demo
for
follow
the
questions.
F
Second
yeah:
let's
share
it
again:
okay
I
had
to
it
had
to
break
once
at
least
okay.
So
let's
try
this
with
a
secure
password
and
it
should
give
us
the
information
that
in
fact,
secure
password
is
obviously
not
a
secure
password,
so
it
doesn't
enable
the
continue
button,
even
if
we
replaced
in
the
in
the
confirm
section.
So
we
have
to
select
a
better
password
than
this.
F
This,
for
example,
this
one
and
once
they
match,
and
once
they
match
this
line
turns
blue
and
the
continue
button
is
enabled
allowing
us
to
proceed
to
the
next
step.
The
next
step
is
the
setup
expiration
time.
So
we
have
this
slider
right
here
to
determine
how
long
the
Locker
will
stay
open
without
any
interaction
before
it
closes
again.
It
locks
again,
so
we
finish
it
and
we
proceed
to
the
to
the
to
the
screen
we
have
as
our
current
main
screen.
Obviously
it
won't
be.
This
simple.
F
Color
for
its
it's
from
the
demo
that
followed
it
some
time
ago.
I
can
also
show
you
by
the
way
the
finished
sides
of
the
lock
screen,
which
I
chose
you
in
the
past.
Progress
record
call
very
mind
that
my
my
computer
is
currently
running
a
lot
of
stuff
at
the
same
time,
so
the
animation
may
not
be
totally
fluid,
but
here's
the
exit
animation
for
the
lock
screen.
So
if
you
have
any
questions,
feel
free
to
to
ask
and
be
stopping
the
screen
share.
F
B
In
terms
of
that
animation,
it
was
not
smooth
because
of
the
the
zooming
compression
and
so
on.
So
if
you
want,
you
can
record
a
small
video
and
loading
it
to
you
to
us
about
that
and
linking
eating
the
notes
so
that
people
can
can
actually
see
the
smooth
experience
and
not
the
compressed
experience
that
we
have
here
in
them.
B
So
I
think
that's
all
for
the
demos,
so
anything
on
I
will
share
my
screen
and
so
to
confirm.
So,
yes,
we
have
just
two
demos:
you're
missing
your
demo
here
in
the
list.
So
if
you
put
a
few
minutes,
it
will
be
nice,
so
we
have
like
13
minutes
and
if
there
are
any
questions
general
questions
that
you
want
to
ask
feel
free
to
ask
them
you.
B
You
can
always
reach
us
in
IRC
we
are
in
ipfs,
identity,
Channel
and
also
in
the
epidemic
data
IRC
channel,
which
was
you
know,
the
identity
project
started
within
that
working
group.
So
you
can
always
reach
us
there,
but
if
you
have
any
questions,
feel
free
to
ask
and
I
think
that's
all
Johnny
crunchy
and
any
questions
yeah.
B
Keys,
we
avoid
storing
the
master
key
in
the
in
the
storage
of
the
browser.
That's
why
we
have
at
the
moment
very
much.
This
is
a
way
to
store
your
masaki,
but
we
are
looking
into
having
paper
key.
So
essentially
you
have
you.
Have
you
print
your
paper
key
or
write
your
mini
monic?
That's
that's
why
we
have
that
module
the
12
words
somewhere
or
you
can
printed
documents
and
store
it
safely.
I
know
that
is
not.
This
is
not
a
very
user
friendly
process.
B
We
are
looking
to
other
processes
such
as
social,
covering
mechanisms
or
even
the
adware
wallets
that
you
there
you
mention,
but
for
now
we
are,
we
are
using
them
or
they
are
looking
into
using
the
paper
key
as
a
first
strategy,
but
we
are
not
storing
the
misuki,
but
we
are.
We
are
storing
the
device
keys
so
essentially
have
your
master
key.
B
That
controls
your
your
a-10s
records
in
case
of
a
key
ID,
and
then
we
have
the
device
keys,
which
are
the
which
are
listed
in
your
data
documents,
but
we
are
storing
in
the
storage
of
the
IDM
wallet
which
is
encrypted.
So
that's
why
we
have
the
setup
blocker
and
the
lock
screen
that
you
just
saw,
but
basically
when,
when
you
put
a
passphrase
and
also
we
are
looking
to
other
methods,
Judd
says
you
know
the
touch
ID
and
face
ID
later
on
and
so
on.
B
B
It
will
be
encrypted
and
it
will
give
you
plenty
of
time
to
go
into
or
another
device
using
your
master
key
to
revoke
that
device,
right,
cool,
I,
think
that's
it
any
more
questions,
Ernie,
look,
no
more
questions,
all
right,
so
I
think
I
think
we
are
over
and
thank
you
for
for
our
participation
and
see
you
in
the
next
IDM
progress
report
called
in
two
weeks
from
now.
Bye,
bye,
guys.