►
From YouTube: Sigstore Community Meeting - April 20, 2021
Description
No description was provided for this meeting.
If this is YOUR meeting, an easy way to fix this is to add a description to your video, wherever mtngs.io found it (probably YouTube).
A
B
Yeah
one
went
out
yesterday
we
screwed
something
up,
though
so
we're
gonna
have
to
do
a
point
release
hopefully
later
today,
jake's
working
on
it.
C
B
A
A
A
Okay,
cool
understand,
yeah
right.
Let
me
come
back
to
the
to
the
meeting,
so,
let's
see
full
seo
so
rule
of
trust
set
up
the
protocol
for
key
holders,
dan
luke,
bob,
santiago,
marina
dan.
Sorry,
also,
where
are
we
with
that?
Again,
I
remember
you
talking
about
that
in
your
blog
piece,
you've
got
an
update,
haven't
you.
B
Yeah
santiago
actually
thought.
Last
week
the
plan
and
eli's
been
doing
some
weird
reviews
there.
I
think
we
need
to
firm
up
with
the
tough
metadata
looks
like
a
little
bit
more.
Is
that
right,
santiago?
I
think
the
action
was
to
try
the
python
client
instead
of
the
go
on
is
marina
here
today
I
don't
see,
I
don't
know.
A
D
Working
yeah
yeah
yeah,
he
can
hear
you
okay,
great
yeah.
I
got
two
reviews.
I
didn't
have
a
chance
to
actually
address
them,
but
I
will
do
that
today.
I
was
okay
swamped
until
yesterday,
at
five
I'm
still
recovering.
A
A
Cool
so
cosign
dan
anything
you
wanted
to
go
over.
B
Yeah
the
new
release,
if
you're
running
it
outside
of
a
container
then
go
ahead
and
test
it.
It's
great.
It's
got
yubikey
support.
If
you
have
one,
you
can
start
signing
with
hardware
stuff
that
and
then
the
device
headless
flow
are
kind
of
the
two
big
things
in
the
latest
release.
B
So
yeah
give
it
a
try,
we're
hoping
to
start
verifying
signatures
inside
of
the
kubernetes
and
seo
release
processes
with
it
soon,
but
that
needs
the
containers
that
we
broke,
because
we
added
ubiki's
by
accident
so
hopefully
later
today,
we'll
be
ready.
A
And
the
device
flow,
that's
is
that
sort
of
experimental,
or
I
mean
everything
is
to
a
degree
but.
B
Yeah
that
uses
the
oauth
stuff,
so
that's
more
experimental.
The
ubc
stuff
is
good.
I
wouldn't
necessarily
try
to
reuse
the
ub
key
that
you're
using
for
something
else
critical
with
it,
but
if
you've
got
a
new
one,
then
go
ahead
and
give
it
a
try.
Yubikey
says
the
different
apps
are
independent,
but
I
haven't
like
if
you're
using
2fa
502
stuff,
and
then
they
say
that
it's
independent
and
you
can
do
stuff
like
wiping
the
private
keys
used
for
signing.
B
But
I
haven't
tried
that
enough
myself
to
tell
you
that
it's
safe
but
yeah,
give
it
a
try,
though,
if
you've
got
one.
B
I
think
it
should
just
work.
If
mark
is
here,
we
can
we
can
check
it.
I
think
we
just
have
to
update
the
version,
but
it
should
just
work
the
code
detects
if
you're
in
a
headless
environment
and
if
you
didn't
pass
any
keys
and
stuff
it'll
just
do
the
right
thing,
there's
some
ux
and
polish
and
stuff.
We
can
do
around
house
because.
A
A
Is
mark's
still
there
if
we
lost
mark
mark,
maybe
he
can't
hear
us
okay,
I'll
chat
tomorrow,
oh
yeah,
there
we
go
yeah.
Did
you
catch
that
mark?
No.
C
I
was,
it
was
away
from
keyboard,
no.
A
Worries
yeah,
so
we
have
dan
was
just
saying
he
has
device
flow.
E
A
Device
flow
allows
you
to
do
the
unattended,
sign-in,
okay
yeah,
it's
kind
of
a
you're
up
to
speed
on
it,
so
we're
thinking
it
for
the
github
action.
Currently
you
and
correct
me
on
to
anyone
wrong
on
any
of
this
is:
is
the
code
you
pull
it
from
a
log,
okay,
and
so
there
might
be
some
interesting
ui
thing
that
we
can
do
to
to
make
it.
I
don't
know,
might
be
worth
having
a
play
with
see
what
you
can
come
up
with.
C
A
Cool
great,
so
you
can
always
reach
out
to
dan
and
you
need
any
sort
of
further
details.
Well,
bob
as
well.
Bob
worked
on
his
voice,
but.
C
D
A
A
Device
flow,
I
always
I
always
portrait
when
I
try
to
describe
it.
It's
it's
a
part
of
open
id
connect
or
to
spec
or
whichever
spec
it
is,
and
it's
used
where
you
might
have
seen
the
use
where
your
television,
you
can
kind
of
grant
like
an
identity
provider,
to
give
you
your
tv
access
to
us
to
your
account.
A
C
A
So
this
way
you
can,
you
can
have
unattended
signing,
but
probably
what
we
would
recommend
is
that
if
people,
if
there's
a
real
strong
security
guarantee
that's
needed,
then
you
can
have
like
a
ci
system,
a
device
flow
that
would
do
a
keyless
sign-in
of
a
build
okay
and
that
could
be
deployable
as
some
sort
of
staged
or
or
pre-release.
Okay.
And
then,
if
somebody
really
wants
super
security
guarantees,
then
you
can
have
identities
sign,
on
top
of
it
as
well
to
stack
up
the
consensus
kind
of
thing.
D
C
A
Be
a
get
could
be
github
in
this
instance:
yeah
right,
yeah
cool
yeah,
yeah,
very
receptive
to
hearing
that
yeah.
Okay.
So,
let's
see.
C
B
C
C
C
B
Attestation
certificates,
the
device
certificates
and
all
that
stuff
out
of
it
too
reset
the
keys
and
do
all
of
that.
The
2fa
stuff
is
part
of
the
uidc
flow
works,
but
it's
kind
of
dependent
on
the
oidc
provider.
There
is
no
idc,
there's
part
of
the
oidc
spec,
where
the
relying
party
can
request
that.
B
The
2fa
flow
mike,
probably
knows
more,
but
nobody
actually
implements
that
so
none
of
the
providers
we
found
actually
allow
that
claim
where
you
can
or
falsely
would
be
able
to
say.
Please
actually
force
them
to
go
through
re-login
and
2fa,
and
then
they
they
would
return
some
attestation
about
that.
It
is
spec,
it's
just
nobody
uses
it,
so
we
can't
really
rely
on
it
yet
yeah.
So
if
you
have
a
ubc
that
supports
the
piv
interface
that'll
all
just
work
today.
B
And
we
do
have
there's
some
proposals
around
how
to
actually
allow
signing
with
502
tokens
as
well,
which
can
work,
but
it's
a
little
tricky.
Take
a
look
at
there's
an
issue
on
the
cosine
repo
I
can
link
after
and
how
we
can
make
it
work.
B
I
haven't
been
able
to
find
a
single
other
hardware
device
that
supports
piv
other
than
yuba
keys,
so
we
may
at
some
point
end
up
if
they
end
up
dropping
support,
for
it
have
to
switch
to
this
502
thing
anyway,
since
that's,
I
assume,
in
the
near
future,
everyone's
going
to
end
up
with
the
502
devices
instead,
like
I
needed,
maybe
he
knows
one
yeah.
We
should
probably
talk.
B
Yeah
I
got
it
working,
I
kind
of
copied.
How
ssh
does
it?
It's,
not
amazing,
but
it
works.
I
don't
think
I
would
have
been
able
to
figure
it
out
without
reading
the
long
doc
the
ssh
maintainers
wrote
about
what
they
did.
E
E
B
Yeah
they
say
they
will.
I
tried
this
piv
piv
key
thing
you
linked
just
now
eli,
but
I
think
it's
only
rsa
1024
is
the
only
algorithm
it
supports.
So
I
didn't
bother
ordering
one.
B
F
A
Okay,
monitor
project
so
santiago.
D
I
think
we
had
not
a
lot
of
movement
this
week,
mostly
because
I've
been
missing,
but
I
have
spent
some
time
documenting
the
architecture
and
I
think
I'll
be
sharing
some
of
the
like
brother
goals
of
the
monitoring
project
yeah
next
week.
Hopefully
great.
A
Okay,
so
six
store
not
a
lot,
so
I
actually
know
a
fair
amount
has
happened.
Jake
did
some
good
refactoring
of
the
signing
interface
implemented
a
signer,
and
I've
got
some
rudimentary
verification
stuff
that
I've
not
really
pushed
up
yet.
But
I
want
to
sort
of
get
a
bit
of
time
to
bounce
that
off
santiago
and
yourself
and
marina.
A
So
it's
a
little
bit
parked
at
the
moment,
but
I've
got
some
stuff
there,
okay
and
and
there
was
some
refactoring
and
some
cosine
coding
as
well.
I
remember
priya
worked
on
that.
So
let's
see
ruby
plugin,
so
I've
actually
picked
that
up
again,
I'm
going
to
really
try
and
drive
it
getting
that
done
this
week,
and
so
it's
now
the
open
id
scope
dance
is
all
working.
So
I
get
the
email
back
and
I've
got
just
got
a
patch
up
for
the
key
generation.
A
After
that
I
will
do
the
proof,
challenge
and
then
post
it
off
to
full
seo,
get
the
certificate
back
and
and
then
from
there
we
can
start
to
look
at
there's,
obviously
the
signing
part.
Then
we
can
start
to
look
at
the
verification
and
how
we
wrap
that
into
rubygems.
So
we're
going
to
try
and
get
hopefully
get
something
done
this
week.
So
we
should
be
able
to
get
some
ruby
gems
folks
together
and
do
a
demonstration
for
them.
A
Cool
okay,
so
the
last
one
would
be
maven
plug-in.
I
know
bob
can't
make
it
today,
but
I.
C
Yeah
yeah,
so
I
pushed
up
the
first
implementation
of
the
working
maven
plug-in.
We've
got
it
submitted
to
the
development
snapshot
submitted
to
maven,
central
and
I'll,
be
publishing
a
blog
post
in
the
next
day
or
two
showing
folks
how
to
use
that.
C
D
C
Yeah,
I
can
send
you
a
I'll,
send
you
a
draft
of
the
blog
post?
Maybe
you
can
give
it
a
dry
run
and
make
sure
it
works
like
it
did
on
my
machine.
A
Yeah
and
while
on
that
note,
if
anybody
has
any
ruby
gems
that
they're
going
to
want
sign
in,
let
me
know-
and
that's
that's
gonna-
be
also
it's
a
plug-in,
but
it's
becomes
we're
able
to
implement
a
flag
against
the
gems
command,
so
you'll
be
able
to
run.
I
can't
remember
what
the
command
is
now,
but
gem
or
bundler,
something
or
other,
and
then
just.
C
C
D
A
That
they
should
be
receptive
to
it.
I
would
hope
anybody
in
that
area-
ruby,
gems,
great,
okay,
so
moving
on
quickly
right.
So
let's
go
over
to
the
integrity
shield,
folks
and
and
they're
gonna.
Do
a
demo
of
some
cool
stuff
they've
been
working
on
to
integrate
integrity
shield
with
six
store.
A
I
know
yuji
sun.
It
must
be
about
one
o'clock
in
the
morning
there
or
what
time
is
that
you
managing
to
stay
awake?
Okay,
that's
your
coffee!
Oh
yeah!
I'm,
okay,
yeah,
okay,
good!
Okay!
So
over
to
you
guys,
you're
welcome
to
do
a
quick
intro.
If
you
like
and
and
then
you
should
be
able
to
share
and
take
it
away.
F
A
F
F
A
Take
your
time,
you've
got
a
just
just
over
30
minutes,
yeah.
F
F
A
F
Hello,
can
you
see
my
screen
yeah
that
looks
good,
yeah?
Okay,
thank
you,
okay,
so
hello,
thank
you
for
giving
us
time
to
present
our
latest
work
around
related
to
this.
This
works
I'm
yuji
watanabe
from
ibm,
I'm
I'm
I'm
joining
with
my
creed,
the
gaijin
hero
lee
gold.
F
They
are.
They
are
also
on
the
on
this
quote:
I'm
working
on
the
security
and
research
with
this
team
and
I'm
presenting
the
latest
eoc
in
demonstration
or
with
the
integration
with
single
scope.
So
hi
can
you
do.
F
F
Yeah,
let
me
explain
so
the
let
me
start
from
the
integrity
sheet
products
introduction.
So
this
is
a
open
source
project
for
the
creators,
resource
signing
and
admission
controller
enforcement.
So
so
this
project
is
trying
to
add
the
signature
on
the
creator's
resource.
Then
enforce
admission
to
the
cluster.
At
the
admission
con
this
admission
control
the
hierarchy
idea
is
the
normally
the
the
administrator
applies,
a
yammer
file
to
rasta
to
configure
the
resource,
but
if
it's
modified,
the
cluster
state
become
unstable.
F
F
Okay,
so
the
highlight
so
how
this
is
used
this.
So
the
application
is
built.
Push
image
to
this
with
the
signature
to
the
image
registry
and
yammer
is
also
produced
for
deploying
this,
then
yamun
is
committed
to
the
gateway
for
them
administrator
or
some
city
and
picked.
This
yamaha
then
deployed
to
the
cluster.
F
Then
this
yaml
includes
a
difference
to
the
image
saying:
image
is
called
from
the
image
list.
So
in
this
float,
our
admission
controller
checks
the
signature
attached
in
the
yaml
file.
Then,
if
this
is
okay,
the
pro
deployment
is
equipped,
our
another
admission
controller
called
portuguese.
It's
check
the
image
in
the
deployment
then
checks
a
signature
on
the
attached.
In
the
event,
originally
the
this
work
for
the
gpg
signing
key
or
x,
x,
509,
but
now
we
are
trying
to.
F
Extend
this
with
cosine
2,
so
so
image
is
signed
by
cosine,
cosine,
comma
library,
and
we
all
then
it's
also
verified
with
cosine
b.
So
this
part
is
we
integrate
the
with
the
current
cosine
code
with
this
animation
and
we
also
need
another
signing
for
yama.
So
we
extended
the
current
crossing
sign
code
to
enable
this,
so
it's
cosine,
then
it's
verified
in
here.
So,
oh
so,
but
but
around
these
admission
controller
calls
logic
to
fall
in
the
cosine
verify
and
constantly.
F
So
I
will
explain,
will
show
the
theme.
So
now
I
have
a
simple
yaml
file
for
deploying
the
some
application.
This
is
a
application.
This
is
image
and
I
already
pushed
to
the
registry.
This
is
if
the
no
protection
is
enabled
on
the
cluster.
This
deployment
is
successful,
but
if
I
try
to.
F
F
F
Other
mission
is
blocked
because
this
this
yaml
file,
it
does
not
have
any
signature.
So,
but
this
in
this
namespace
signature
must
be
attached,
so
so
this
is
a
integrity
shield
blocking.
So
then,
now
I'm
trying
to
add
this
signature.
F
F
F
Okay,
it's
it's
now
it's
time!
So,
okay,
then
next,
I
this
part
is
an
extension
for
enabling
the
cause
signing
jammu,
so
this
so
sub
command
sign
yamun.
So
this
is
very
similar
to
this
original
one,
but
we
just
added
signing
so
then
same
for
executed.
Then
the
signing
is
done
so
original
yamun
is
this.
Then
a
new
signed
yamun
is
created.
F
So
sam
yamun
is
like
this,
so
it's
already
includes
another
some
annotation
for
site
certificate,
message
and
signature.
So
this
is
produced
by
cosine
too.
Then
we
we
already
signed
the
yamuna
file
and
image
and
we
can,
for
example,
we
can
verify
this.
Young
file
is
cosine,
verify
yummy.
F
So
with
this
we
can
deploy
this
cluster.
Then,
because
this
is
sign
so
and
admission
controller
accepts
signature
same
resource
is
created.
If
we
see
the.
F
F
Let
me
explain
so
we
by
using
this
we,
this
is
a
sample
use
case
of
the
yamusani.
F
Creating
updating
the
community
resource
it
can
be
signed
with
this
meeting
unemployed
by
this
mechanism,
but
the
scenario
is
operator
bundle
into
it.
So
operator
is
like
this.
It's
it's
deployed,
it's
listed.
Many
publisher
is
published,
operate
many
various
type
of
operators
here.
So
it's
it's
coming
to
the
it's
published
on
this.
F
And
many
many
operator
is
pushed
by
many
past
people
and
if
it
includes
many
yamaha.
F
Image
should
be
deployed
to
the
cluster.
So,
as
you
can
imagine,
this
integrity
of
this
yammer
wire
and
image
integrity
is
really
important.
So
the
scenario
is
like
this:
so
operator
producer
produces
a
bundle.
It's
basically
ammo
it
and
open
the
image
to
the
registry.
Then
this
is
to
deploy
to
the
class.
So
for
that
of
this
operator,
we
apply
the.
F
With
a
different
used
by
different
data,
then
publish
to
the
register,
then
if
I
try
this
is
a
sample.
So
this
is
a
coach
db
operator
bundles.
So
all
these
yamaha
is
the
ingredient
of
the
abandon.
So
and
this
is
a
cockroachdb,
so
we
put
the
sign
and
the
push
to
the
registry.
It
is
signed
image.
Then,
if
I
try
to
install.
F
F
Unauthorized
assigner,
so
this
is
blocked,
but
if
you
yeah,
if
this
so
this
coach
db,
the
cochlear
glb
is
signed
by
authorized
assigner.
So
its
verification
is
verification
passed
on
this
admission
controller,
then
it's
deployed.
F
F
That
this
is
so
this
is
this.
China
is
defined
by
the
policy
for.
F
Image,
and
so
also
we
can
switch
to
and
this
polishing
can
be
set
on
the
power
name
space,
so
we
can
specify
the
the
authorized
designer
per
name
space
by
using
this
box
okay.
So
this
is
all
the
demonstration,
so
I'm
really
happy.
If
you
you
have
any
feedback
and
comment,
and
hopefully
we
would
like
to
contribute
to
the
collaborate
the
community.
A
Project,
that's
great!
Thank
you,
yuji
son.
It's
really
good!
So
I've
seen
this
before
so
I
I
don't
have
so
many
questions
myself,
but
I
think
we
spoke
about
this
yeah
it'd
be
really
interesting
to
look
at
where
we
can
get
you
to
contribute
some
of
this
upstream,
okay
yeah,
and
we
can
look
at
the
way
the
best
place
to
learn
that
will
be,
and
I'd
also
recommend
adding
the
github
urls
to
the
community
notes,
so
that
other
people
can
take
a
look,
but
I
think
it's
really
cool
work.
A
I
really
really
like
this.
It's
really
great
to
see
somebody
starting
to
to
integrate
and
using
the
experimental
stuff
as
well
so
yeah.
So
I'm
sure
some
other
folks
have
got
some
questions,
though,
so
I
can
open
up
too.
D
For
just
a
bit
because
sure
yeah
apartment
stuff,
but
so
the
I
I
was
curious
to
know
how.
How
are
you
creating
this
like
application,
bundles?
Is
this
like
a
cloud
pack,
or
is
this
scene
app
or
what
is
it.
F
D
Cool,
so
so
the
reason
why
I
asked
this
there's
this
microsoft
project
called
cnab
cloud
native
application,
bundles
and
they
are
using
in
total
and
tough
to
do
something
very
similar.
But
I
think
the
the
twist
here
is
that
you
can
authenticate
parts
of
a
yamo
so-
and
I
think
that's
that's
interesting-
for
a
variety
of
reasons.
D
One
of
them
is,
you
may
want
a
developer
to
define
which
images
are
trusted,
but
then
you
will
have
a
the
ci
fill
in
the
blanks
of
which
parts
of
other
parts
of
the
ammo
so
having
something
having
a
way
to
actually
distribute
trust
within
an
individual
deployment.
Ammo
would
be,
I
think,
would
be
an
interesting
step
for
foreign
shield.
D
I
think
this
this
space
in
particular
it's
it's
pretty
interesting,
because
we
all
of
the
trust
really
boils
down
to.
How
can
you
actually
create
this
gmo
and
how
can
you
start
trusting
it
and
in
terms
of
usability,
we've
been
seeing,
and
I
think
anybody
that's
using
portieries
pretty
much
goes
and
says:
well,
it's
pretty
cool,
but
how
can
you
tell
whether
to
trust
an
image
if
it's
not
signed,
and
how
can
you
actually
tell
which
ones
to
verify?
D
So
I
think
this
is
a
step
in
the
right
direction.
I
would
love
to
to
interact
a
little
bit
more
and-
and
I
think
that
there's
a
lot
of
place
for
convergence
in
terms
in
terms
of
distributing
trust
within
this
individual
gmo
files-
and
I
think,
maybe
in
total,
could
be
a
good
format
for
like
test
policies,
yeah,
so
we're
all
very
excited
cool
stuff.
F
Thank
you
so
much.
We
will
look
into
the
introduction.
D
F
And
I
so
we
are
now
using
the
public
yeah.
Maybe
this
this
is
not
the
this
is
things,
but
we
are
now
developing
some
some
old
versions.
F
Then
maybe
the
kosai
and
many
code
parts
is
moving
very
fast,
so
we
are
now
so
we
are
wondering
how
what
is
the
best
way
to
work,
the
with
a
very
fast
moving
project
like
the
cosine
lucio
yeah.
So
I'm
I'm
really
interesting.
How
do
you
you?
Your
team,
is
what
developing
your
part
in
this
collaboration.
B
Yeah
we're
we're
hoping
to
get
the
at
least
the
parts
that
I
think
you're
using
stable
soon,
so
we'll
still
be
moving
fast,
but
hopefully
we
won't
keep
breaking
things.
Yeah.
A
I
hoping
put
in
a
link
to
I
just
want
to
click.
I'm
pretty
sure
this
is
the
right
repo,
because
I
see
you
did
a
commit
on
there.
Recently
I
put
in
the
chat
it's
open
cluster
management,
integrity,
shield,
yeah,
okay,
great.
A
So,
do
you
have
the
the
cosine
stuff
in
a
specific
branch
or.
F
Yeah,
I
don't
it's
on
the
branch.
It's
it's.
F
A
C
A
And
what
else
was
he
gonna
say
yeah
and
just
trying
to
think
how
could
santiago
and
eugene
if
you
were
to
meet
to
discuss
cnab
and
in
total
what
would
be
the
best
sort
of
action
item
there.
D
I
think
we
could
set
up
a
slot
at
some
point,
maybe
this
week
or
next
weekend.
D
D
It,
yes,
they
do
have
a
spec
on
this
whole,
like
bundle
stuff
with
the
security
section,
maybe
that's
the
best
first
step,
and
then
we
can
see
how
we
can
take
this
forward.
I
don't
mean
to
like
also
shoehorn
cena
in
it.
I
just
think
that
it's
worth
looking
at.
A
A
Great
fantastic,
okay,
so
is
there
any
other
any
other
questions
at
all.
A
F
A
Yeah
yeah:
well,
it's
very
much
appreciated
and
thank
you.
You
folks
are
welcome
onto
you
know
the
other
come
to
the
other
community
meetings
that
you
know
next
week
and
the
week
after
as
well
so
great,
okay,
so
we're
getting
towards
time.
Is
it
anything
that
anybody
wanted
to
bring
up
we're
kind
of
in
our
breakout
area
now?
So
if
somebody
had
something
they
wanted
to
kind
of
clarify
or
or
go
over,
they
can
do
or
we
can
briefly.
E
I
was,
I
was
just
interested
in
I've,
been
trying
to
do
a
bit
of
outreach
for
six
store
and
to
talk
to
different
projects,
and
I
think
I'd
really
enjoy
collaborating
with
other
people.
On
that
maybe
have
I
started
a
document.
E
I
think
it's
still,
sadly,
red
hat
only
so
far,
but
I
could
just
you
know,
have
a
shared
document
where
we
could
sort
of
describe
if
we
know
people
in
certain
communities,
rather
than
just
coming
up,
you
know
called
without
knowing
anybody
it's
always
better
and
who
we're
already
talking
to.
For
instance,
we
know
we're
doing
things
with
with
java,
with
maven
and
rubygems.
E
I
see
that
there's
a
mention
of
pi
pi,
so
that's
also
something
cool.
Obviously,
rust
is
something
we
want
to
reach
out
to.
I've
started
having
some
answers
or
some
interest
from
people
from
the
matrix
ecosystem
and
and
from
tor.
Potentially
at
least
there
was
one
positive
answer
to
the
email
I
sent
with
proposition
for
like
improvements,
so
it
would
be
good
to
sort
of
have
a
place
to
discuss
these
things
and
sort
of
do
them
together.
A
E
Well,
I'm
going
to
try
and
get
the
the
outreach
room
a
bit
more
active
sure,
and
we.
A
E
E
A
Gonna
come
up
with
a
system
for
that
yeah
yeah,
definitely
yeah
yeah,
so
the
meeting
would
be
good
because
then
then
you
can,
we
can,
you
know,
get
the
right
people
to
to
talk
to
the
audience
that
you
found
great.
Okay,
that's
good!